IOC Report
1CMweaqlKp.exe

loading gif

Files

File Path
Type
Category
Malicious
1CMweaqlKp.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\1000021002\ac861238af.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\5LzADXbR9e1baIzvWufsCa70.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\5W1aDm1vpFLN4gyrIiISMc4h.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\8sXk5E4IG9n4ZHu2M9Littnp.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\9SmQs0R4T5RJUISklvcv02zp.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\9WrQ2c2u5fxH1pcvCwwjGhdd.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Aghrmi42Lz5QvS8u8U6BiVXQ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Bkg8NSHXvizTVBsjT3dzRvci.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\C893DEcM3dAA247WrHBz1SDW.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\CmCQsbfi77SnYQWckHTzUjRg.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\GIz2DLitsyoTn14REJti2nqN.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\H3bqnZf96LFIOlogieo3h5K9.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\KHojJ9v7XtNSHZfW6gAnnH23.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\LIdx8BlqmZTW07MQOtXboF4f.exe
MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\4767d2e713f2021e8fe856e3ea638b58[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\NewB[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\amert[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\file300un[1].exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\jfesawdr[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\sarra[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\alexxxxxxxx[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\cred64[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\swiiiii[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\clip64[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\install[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\swiiii[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\toolspub1[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\ISetup8[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\gold[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\jok[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\NN7y6Ml4QHJBCfpeCmt1XQq3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Osh3JGbyB69u4I6NltayynfD.exe
MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\PHoZl3WswCZ1lCRWCJPBFZtN.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\QbkKvIT5uJj3Cx8h0ECIsmUK.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000019001\amert.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000071001\jok.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000077001\jfesawdr.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000079001\gold.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000080001\alexxxxxxxx.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000081001\install.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000236001\4767d2e713f2021e8fe856e3ea638b58.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u6po.0.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u6po.2\ASUS_WMI.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u6po.2\ATKEX.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u6po.2\AsIO.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\ULDq5mjQ4b5aNI3V4eIJfMVS.exe
MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Local\Z0V3bHdPFsglc9f9uLbxOZFN.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\aYtr3HT3BUqjK6QB6WYpwCcm.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\dmmb0z6yJ22pC75a4y49Nfob.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\evHtDP9yDvs3XYDQg8lqEVoH.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\f2NBhcBIObRGHagt6xPQoMa2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\gKIISy7hixfPFGDeeM7cQzit.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\gPQjkT7jjoMSIv7cXyWMW1C4.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\gzxs1MlpU5tnMfkC7kzgvR1h.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\i8dOWYOLtbNAxDJGOQ8Wt9el.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\iFyHzFXRkeOppMlu3FtGrLYy.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\iO9tAKw78L31Wsbvnq5kt5m1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\laQhqKepZhfkS5rQoYOvKJAy.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\leqbtljZtxj2WxVvdmpHiNsI.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\mBoc1pbzy7gOQT20pyEZL3en.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\oqwWhViccQzmDvkS751EZRiG.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\xF7m0A44x6KodDxbhAtiDsub.exe
MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\Pictures\0co9idnjzay1KSn3DMfCsBSw.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\11xbcpylNeYY4tZ39QN34xGC.exe
MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\Pictures\1NXbTL9dcUCk55eVv5KRJhmL.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\3N5jWnvXHqfYUsxTijnW3Uc5.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\5nFKWr1EKUheiDEHo671vxm8.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\7iI5SUAnqRGyB1YdSAO06W1v.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\D7t23m0X26bEkZqkCQtNwK5Y.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\JcuJCrKoIRAAJIb94uRnhVjr.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\Jr1vIs8XqAmt0RT7bHMte8ts.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\M4OBi0ywNcuUZRFLcfJ70nUH.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\MtYY7PxoMVCDp1NJbYQga2LV.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\QcyIEuk7gD7wTlhElB94jgu9.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\S41vy8IsPU7Iudry37c4uNtg.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\STUD4CnDuvZtXsKBuBkO31id.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\SjGlviky3CjPwV1vWXl2gdhJ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\X53t1QSznpDGsvX2qLbdQFD1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\de4IGlGSbV9c3J4m0qZtBGm8.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\g81RdhkO8Pp47pz1l8siHWuN.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\gX4d2ArXDOHTjofk9CfRb7Jz.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\gjVUxsTFUgOAjApkeCU52nGD.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\gmHwlMZnGawtAwStcAU6D1RM.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\jzMGE9Xb2Ny8jtCWlXWAk3ap.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\oXA3lyE6zGyLyvw1CwVKpLsf.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\pScZMSZH0uu2OkUDvWpN2tuz.exe
MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\Pictures\pl49PSFkcWVTQqBe8TA2VhRW.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\ppcQqLgPI8Dyy7YykX33fm5x.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\qPQ3lJ1fN9DRgfiXtyMpf1ll.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\rVg8HtIzXa4xhJHL7Pn8A6d2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\s8YO7ScTlLADC9Vt6wr10aY4.exe
MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\Pictures\tAKreBGDuozTwXSZfhU7cFT3.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\v3efLAgS1BVue6uNuzFECLaH.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Pictures\v6zcDFD3cRDhmr34kNKDn8tX.exe
MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
dropped
malicious
C:\Users\user\Pictures\zWIy5Pdf1kgq9YulaqIKrGGy.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\CGDHDHJEBGHJKFIECBGCBGCAFI
SQLite 3.x database, last written using SQLite version 3042000, file counter 12, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 12
dropped
C:\ProgramData\EHCBAAAF
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\FHCGCFHDHIIIDGCAAEGD
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\FHIIEHJK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IDAEHCFHJJJJECAAFBKJ
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_swiiiii.exe_4644a13ebcdb6e10e65a72b8ec8bc0b0ff32d1fa_6563360f_17591cc2-a55d-4452-b105-c15cda38f159\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA6A7.tmp.dmp
Mini DuMP crash report, 15 streams, Sat May 4 03:52:27 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA8AC.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAF92.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 11:02:28 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\5aIar1h6imWjPJZYPL4QSqoe.exe
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
dropped
C:\Users\user\AppData\Local\EUl5mGPccm3Ux8yn4fNnNA26.exe
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
dropped
C:\Users\user\AppData\Local\EubzUqqfLmBbNiHWxubQa6s2.exe
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
dropped
C:\Users\user\AppData\Local\K7e4fpNGO8JkAsFxVXguIAcd.exe
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
dropped
C:\Users\user\AppData\Local\MTc4G09Eq4noHZ0G091uBZf1.exe
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\swiiii.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\1000069001\0IBzoJsP8q1QzBlpBtW6hkNk.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\0eaFHVS20CPdU1bF3IvLrmew.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\0weAxDqiNFog13cyvmb9Iyll.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\1J39WMgHBH6ItCI7tnNb3DFI.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\4ZdK877cZbgGnfbGZHyuFY5m.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\5DX860qivAPKkFbfHPe3xXFZ.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\6w06slvDOvn8Kv4AS6TmhE6x.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\7fZ1uuzdpesnTJbK2s7zlM0T.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\AMnvZ4ecVgVRTE0GaWFw3wMb.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\C7O60cUu4nXNRuUr2Vq7LUKM.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\CEi1OlllqXZaH8FOP7kkjSW1.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\CtSGaLtWyp0hUfQ1Mn5nKSxw.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\K1t0QXCCtmkM5YCAHaUaNQEx.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\LioNgAcDbpgwvVAUIoPFcNK4.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\MyDBZp3IqdDcWtv8eGvAA3yE.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\NUZEoHqBL3r3M5uP65Rh5TDR.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\RQGmLZ5AzfXq1HUlOGzzOt3b.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\Uyz5k2kN9MDeUVxUSGfpoV1o.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\XCIhnAqijGuHPoBEIyjPsLIo.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\XGvWFa4NAosMbjAjuZzpyUWI.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\Xcr6QUTPDnWRF6G2JMTKKHjm.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\Y0b3PMbIThLKVdtccagUfXB5.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\anXwSKXwykesHSKjlumxtR63.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\bQJ9ItXP3EFD6151o3yv3g6N.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\bWZJ6scgd0eSfqwO4Q8ocnSc.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\c32Iri3au0EiVWLS2ox14DKF.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\eGPF8nDHc6rmBKFNiAj03m4Z.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\euMrYI7tgBOIHiqrgsMTTI6h.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\fyWMllEKNnCV3KnF26H5P8Pi.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\ggoGWZNyClVERCc8pHLm4D2v.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\kx5yxW4nZQm8bvIQ8Fe3Qu97.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\lp9PoQVyE6a6huBcuai11cbh.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\nfeTS4Rh5UD3omGvdDZWTKCN.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\pyu6hRrie1pHZfKipPCmJSug.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\qlZvaL5K8IumKQuIGtiAWDLI.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\rBAqm0StsqXtrceFRG9w8nUF.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\stqvxRyhXo0Pkc7tcdNkDx8h.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\y57AURiv2nc7k9hjcXOto2G1.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\1000069001\yNsCD42nmHDMZzaqdVWeCTVI.bat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\TmpC1FF.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\TmpC21F.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\_Files_\AIXACVYBSB.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\DTBZGIOOSO.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\DTBZGIOOSO.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\HTAGVDFUIE.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\ONBQCLYSPU.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\ONBQCLYSPU.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\UMMBDNEQBN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\XZXHAVGRAG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0n0kxdye.exj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c2cdvbso.iiy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_faqa5sid.x1v.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hacltfzh.3t5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m4sv2bmu.qzt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mggzngrg.kch.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mxxysqh0.g11.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zmzbhjpe.hng.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\u6po.1.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
modified
C:\Users\user\Pictures\AN3CiEs9vHs3cPsEPcJxdtOY.exe
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
dropped
C:\Users\user\Pictures\dq1f6mXIBjMzMXMQVeg2fNsL.exe
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
dropped
C:\Users\user\Pictures\qhzSo7WKfB79QVVeIp5fAbeL.exe
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
dropped
C:\Users\user\Pictures\r5kIpAOOvnafOvgnH4OtxIFK.exe
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
dropped
C:\Users\user\Pictures\s0yoB0FX6GRQugk063ujbi4o.exe
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
dropped
C:\Windows\Tasks\explorha.job
data
dropped
C:\Windows\Tasks\explorta.job
data
dropped
There are 190 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1CMweaqlKp.exe
"C:\Users\user\Desktop\1CMweaqlKp.exe"
malicious
C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
"C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe"
malicious
C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
malicious
C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
"C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000019001\amert.exe
"C:\Users\user\AppData\Local\Temp\1000019001\amert.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe
"C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe"
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
"C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe"
malicious
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Users\user\1000021002\ac861238af.exe
"C:\Users\user\1000021002\ac861238af.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
malicious
C:\Windows\System32\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
malicious
C:\Windows\System32\netsh.exe
netsh wlan show profiles
malicious
C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exe
"C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exe"
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal
malicious
C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe
"C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe
"C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe" /F
malicious
C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe
C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe
malicious
C:\Users\user\AppData\Local\Temp\1000071001\jok.exe
"C:\Users\user\AppData\Local\Temp\1000071001\jok.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exe
"C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exe
"C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe
"C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe"
malicious
C:\Users\user\AppData\Local\Temp\u6po.0.exe
"C:\Users\user\AppData\Local\Temp\u6po.0.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe" -Force
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://%3cfnc1%3e(79)/
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2656 --field-trial-handle=2296,i,9301016893778941798,11505312185340456869,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 928
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exe
"C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3696 --field-trial-handle=2296,i,9301016893778941798,11505312185340456869,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 37 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://trade-inmyus.com/index.php
malicious
pillowbrocccolipe.shop
malicious
185.215.113.67:26260
malicious
http://185.172.128.150/c698e1bc8a2f5e6d.php
malicious
cleartotalfisherwo.shop
malicious
http://trad-einmyus.com/index.php
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
communicationgenerwo.shop
malicious
worryfillvolcawoi.shop
malicious
diskretainvigorousiw.shop
malicious
http://tradein-myus.com/index.php
malicious
affordcharmcropwo.shop
malicious
enthusiasimtitleow.shop
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://junglethomas.com/b3e2dbff31c451a3fa7323ca95e661ba/4767d2e713f2021e8fe856e3ea638b58.exev
unknown
https://duckduckgo.com/ac/?q=
unknown
https://db-ip.com/
unknown
https://t.me/RiseProSUPPORTo5#
unknown
https://ipinfo.io/widget/demo/81.181.54.104
unknown
https://db-ip.com/demo/home.php?s=81.181.54.1042
unknown
https://db-ip.com/demo/home.php?s=81.181.54.1045
unknown
https://junglethomas.com/b3e2dbff31c451a3fa7323ca95e661ba/4767d2e713f2021e8fe856e3ea638b58.exe
unknown
https://nuget.org/nuget.exe
unknown
https://t.me/RiseProSUPPORTI
unknown
https://youtube.comVISITOR_INFO1_LIVE/
unknown
https://youtube.comVISITOR_PRIVACY_METADATAv10
unknown
https://ipinfo.io:443/widget/demo/81.181.54.1048
unknown
http://193.233.132.56/cost/lenin.exe1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://db-ip.com/demo/home.php?s=81.181.54.104
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
https://api.ip.sb/ip
unknown
https://www.youtube.com/account/v/
unknown
https://mozilla.org0/
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://db-ip.com:443/demo/home.php?s=81.181.54.104
unknown
https://affordcharmcropwo.shop/d
unknown
https://contoso.com/Icon
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
http://193.233.132.56/cost/lenin.exe;x
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://193.233.132.56/cost/go.exe4x
unknown
https://t.me/RiseProSUPPORT
unknown
https://affordcharmcropwo.shop/z
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://github.com/Pester/Pester
unknown
https://www.youtube.com/account
unknown
https://www.youtube.com/accountkO
unknown
https://yip.su/RNWPd.exeChttps://pastebin.com/raw/E0rY26ni5https://iplogger.com/1lyxz
unknown
https://ipinfo.io/
unknown
https://t.me/risepro_botrisepro4.104
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://ipinfo.io/5
unknown
https://youtube.comYSC/)?
unknown
https://t.me/RiseProSUPPORTxR
unknown
https://junglethomas.com/
unknown
https://ipinfo.io:443/widget/demo/81.181.54.104Uz
unknown
https://db-ip.com/demo/home.php?s=81.181.54.104XNN
unknown
https://ipinfo.io:443/widget/demo/81.181.54.104
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
http://147.45.47.102:57893/hera/amadka.exe
unknown
http://147.45.47.102:57893/hera/amadka.exer.dbl
unknown
https://contoso.com/License
unknown
https://www.youtube.com/accountYouTube
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://193.233.132.56/cost/go.exehCorel.ba
unknown
https://affordcharmcropwo.shop/apitemb
unknown
https://ipinfo.io/widget/demo/81.181.54.104T
unknown
https://t.me/risepro_botP
unknown
http://193.233.132.56/cost/go.exe
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://ipinfo.io/i
unknown
https://ipinfo.io/_
unknown
https://youtube.comVISITOR_PRIVACY_METADATA/(9
unknown
http://193.233.132.56/cost/lenin.exew.s
unknown
http://193.233.132.56/cost/lenin.exea.exe68.0l
unknown
https://db-ip.com:443/demo/home.php?s=81.181.54.104r
unknown
http://193.233.132.56/cost/go.exemadka.ex
unknown
https://t.me/RiseProSUPPORT8
unknown
https://youtube.comYSCv10
unknown
http://nuget.org/NuGet.exe
unknown
https://t.me/RiseProSUPPORT3
unknown
https://accounts.googl
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://www.youtube.com/signin?action_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%
unknown
https://aka.ms/winsvr-2022-pshelpX
unknown
https://affordcharmcropwo.shop:443/apiNAME=userUSERPROFILE=C:
unknown
https://t.me/RiseProSUPPORT&
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://youtube.comVISITOR_INFO1_LIVEv10%
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://t.me/risepro_bot
unknown
https://t.me/risepro_botl
unknown
https://affordcharmcropwo.shop/api
unknown
https://t.me/risepro_bote
unknown
http://147.45.47.102:57893/hera/amadka.exe.lv
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.67
unknown
Portugal
malicious
193.233.132.56
unknown
Russian Federation
malicious
185.172.128.150
unknown
Russian Federation
malicious
185.172.128.19
unknown
Russian Federation
malicious
193.233.132.139
unknown
Russian Federation
185.172.128.90
unknown
Russian Federation
34.117.186.192
unknown
United States
193.233.132.175
unknown
Russian Federation
104.26.5.15
unknown
United States
176.97.76.106
unknown
United Kingdom
142.251.2.84
unknown
United States
192.168.2.4
unknown
unknown
193.233.132.234
unknown
Russian Federation
185.172.128.59
unknown
Russian Federation
142.250.68.68
unknown
United States
104.21.60.76
unknown
United States
8.8.8.8
unknown
United States
147.45.47.93
unknown
Russian Federation
104.21.67.211
unknown
United States
104.21.90.14
unknown
United States
77.221.151.47
unknown
Russian Federation
189.195.132.134
unknown
Mexico
172.67.169.89
unknown
United States
185.172.128.228
unknown
Russian Federation
104.20.3.235
unknown
United States
172.67.176.131
unknown
United States
1.1.1.1
unknown
Australia
13.89.179.12
unknown
United States
172.217.14.67
unknown
United States
104.21.84.71
unknown
United States
104.21.18.166
unknown
United States
31.41.44.147
unknown
Russian Federation
172.217.12.131
unknown
United States
104.21.92.190
unknown
United States
104.20.4.235
unknown
United States
239.255.255.250
unknown
Reserved
172.67.19.24
unknown
United States
142.250.72.131
unknown
United States
142.250.189.14
unknown
United States
There are 29 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
d361f35322.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ac861238af.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Startup
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
EnableLUA
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
ProgramId
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
FileId
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
LowerCaseLongPath
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
LongPathHash
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
Name
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
OriginalFileName
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
Publisher
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
Version
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
BinFileVersion
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
BinaryType
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
ProductName
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
ProductVersion
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
LinkDate
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
BinProductVersion
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
AppxPackageFullName
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
AppxPackageRelativeId
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
Size
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
Language
\REGISTRY\A\{4847497d-db2e-be93-996d-f715f8235ece}\Root\InventoryApplicationFile\swiiiii.exe|b5db2c8a646c95c9
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\BroomCleaner
Installed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E88DCCE0-B7B3-11D1-A9F0-00AA0060FA31} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance
Enabled
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\regasm_RASMANCS
FileDirectory
There are 47 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
11E0000
direct allocation
page read and write
malicious
3CB5000
trusted library allocation
page read and write
malicious
E51000
unkown
page execute read
malicious
7C6E000
heap
page read and write
malicious
E51000
unkown
page execute read
malicious
7CE8000
heap
page read and write
malicious
8152000
heap
page read and write
malicious
3640000
direct allocation
page read and write
malicious
14C0000
direct allocation
page read and write
malicious
4F10000
direct allocation
page read and write
malicious
7C6E000
heap
page read and write
malicious
C90000
direct allocation
page read and write
malicious
611000
unkown
page execute and read and write
malicious
3661000
unclassified section
page read and write
malicious
7D70000
heap
page read and write
malicious
731000
unkown
page execute read
malicious
4E00000
direct allocation
page read and write
malicious
7CCF000
heap
page read and write
malicious
3680000
direct allocation
page read and write
malicious
E51000
unkown
page execute read
malicious
701000
unkown
page execute read
malicious
931000
unkown
page execute and read and write
malicious
5260000
direct allocation
page read and write
malicious
7C2000
unkown
page readonly
malicious
1F380020000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
7C6E000
heap
page read and write
malicious
7C6E000
heap
page read and write
malicious
4981000
heap
page read and write
412000
unkown
page readonly
751000
unkown
page execute and read and write
7C9E000
heap
page read and write
14D1000
heap
page read and write
4981000
heap
page read and write
101B000
heap
page read and write
844000
heap
page read and write
CBB000
stack
page read and write
7A1000
unkown
page read and write
7C90000
trusted library allocation
page read and write
3D4E000
stack
page read and write
E07000
heap
page read and write
4DD1000
heap
page read and write
7FB9000
heap
page read and write
72BF000
stack
page read and write
7C68000
heap
page read and write
1D41CEF0000
trusted library allocation
page read and write
4C61000
heap
page read and write
50D0000
direct allocation
page execute and read and write
844000
heap
page read and write
7C6D000
heap
page read and write
284B180D000
heap
page read and write
7CD6000
heap
page read and write
3DAF000
stack
page read and write
7DC0000
trusted library allocation
page read and write
11A4000
heap
page read and write
844000
heap
page read and write
7CB8000
heap
page read and write
14D1000
heap
page read and write
D00000
heap
page read and write
125E000
stack
page read and write
1413000
heap
page read and write
7DCA000
heap
page read and write
142E000
heap
page read and write
11AB000
heap
page read and write
4B71000
heap
page read and write
135F000
stack
page read and write
11A4000
heap
page read and write
7CE6000
heap
page read and write
7D3C000
heap
page read and write
818A000
heap
page read and write
2EEF000
stack
page read and write
7C9E000
heap
page read and write
880000
heap
page read and write
4FF0000
direct allocation
page read and write
338D000
heap
page read and write
10F0000
direct allocation
page read and write
CEF000
stack
page read and write
1030000
heap
page read and write
144C000
heap
page read and write
1D436DE0000
heap
page execute and read and write
5220000
direct allocation
page execute and read and write
7D07000
heap
page read and write
325E000
stack
page read and write
375E000
stack
page read and write
844000
heap
page read and write
E5E000
unkown
page execute and write copy
7CF7000
heap
page read and write
1127000
heap
page read and write
3399000
heap
page read and write
844000
heap
page read and write
1D41CF00000
heap
page readonly
8164000
heap
page read and write
145B000
heap
page read and write
11A4000
heap
page read and write
82CC000
stack
page read and write
7D0F000
heap
page read and write
330F000
stack
page read and write
47EF000
stack
page read and write
8171000
heap
page read and write
91A000
unkown
page execute and read and write
4981000
heap
page read and write
C8554CE000
stack
page read and write
4981000
heap
page read and write
1040000
heap
page read and write
F11000
heap
page read and write
7D27000
heap
page read and write
C50000
heap
page read and write
1477000
heap
page read and write
4981000
heap
page read and write
3929000
heap
page read and write
796E000
stack
page read and write
8161000
heap
page read and write
4981000
heap
page read and write
8240000
trusted library allocation
page read and write
316F000
stack
page read and write
7CAA000
heap
page read and write
1477000
heap
page read and write
7CD7000
heap
page read and write
1447000
heap
page read and write
335F000
stack
page read and write
7DCE000
heap
page read and write
88A278E000
stack
page read and write
760000
unkown
page readonly
11A4000
heap
page read and write
7DD3000
heap
page read and write
F53000
heap
page read and write
53E0000
direct allocation
page execute and read and write
967000
unkown
page read and write
7CE4000
heap
page read and write
C30000
unkown
page execute and read and write
E23000
heap
page read and write
1384000
heap
page read and write
4981000
heap
page read and write
7DF1000
heap
page read and write
220DC000
heap
page read and write
13A4000
heap
page read and write
4F10000
direct allocation
page read and write
4981000
heap
page read and write
776E000
stack
page read and write
5120000
direct allocation
page execute and read and write
7F2000
unkown
page readonly
4981000
heap
page read and write
7DBC000
heap
page read and write
7CD6000
heap
page read and write
8175000
heap
page read and write
1417000
heap
page read and write
C20000
unkown
page execute and read and write
4981000
heap
page read and write
1D41EDE1000
trusted library allocation
page read and write
1214000
heap
page read and write
40B000
unkown
page execute read
C8544FE000
stack
page read and write
DAE000
unkown
page execute and write copy
2C20000
direct allocation
page read and write
8152000
heap
page read and write
11CA000
heap
page read and write
4B71000
heap
page read and write
1D4202DD000
trusted library allocation
page read and write
C7C000
heap
page read and write
336C000
heap
page read and write
11A4000
heap
page read and write
7DEC000
heap
page read and write
33EE000
stack
page read and write
4C61000
heap
page read and write
1D41EC5D000
heap
page read and write
7CAA000
heap
page read and write
C854779000
stack
page read and write
4981000
heap
page read and write
CA0000
direct allocation
page read and write
7D3C000
heap
page read and write
51F4000
heap
page read and write
5D0000
heap
page read and write
220D3000
heap
page read and write
113E000
heap
page read and write
14D9000
heap
page read and write
95A000
unkown
page readonly
401000
unkown
page execute read
7CE6000
heap
page read and write
8120000
heap
page read and write
3900000
heap
page read and write
50A0000
direct allocation
page execute and read and write
46AE000
stack
page read and write
146E000
heap
page read and write
400000
unkown
page readonly
10B0000
heap
page read and write
14DC000
heap
page read and write
11A4000
heap
page read and write
F13000
heap
page read and write
A20000
heap
page read and write
7D3C000
heap
page read and write
40BF000
stack
page read and write
4A70000
direct allocation
page read and write
7CB4000
heap
page read and write
8171000
heap
page read and write
CFB000
stack
page read and write
11A4000
heap
page read and write
E60000
heap
page read and write
38D5000
heap
page read and write
5240000
direct allocation
page execute and read and write
D29000
heap
page read and write
1D41E7F0000
trusted library allocation
page read and write
4981000
heap
page read and write
2EDB000
heap
page read and write
114D000
stack
page read and write
675C000
stack
page read and write
7CC7000
heap
page read and write
3CAF000
stack
page read and write
4DD1000
heap
page read and write
1D41CD40000
heap
page read and write
10EE000
stack
page read and write
1128000
heap
page read and write
4981000
heap
page read and write
793B000
heap
page read and write
7CD6000
heap
page read and write
7CCE000
heap
page read and write
7DF3000
heap
page read and write
4F73000
direct allocation
page read and write
13A4000
heap
page read and write
50A0000
direct allocation
page execute and read and write
50C0000
direct allocation
page execute and read and write
4981000
heap
page read and write
3A6E000
stack
page read and write
4D51000
heap
page read and write
1214000
heap
page read and write
7D27000
heap
page read and write
7939000
heap
page read and write
11A7000
heap
page read and write
844000
heap
page read and write
5320000
direct allocation
page execute and read and write
1195000
heap
page read and write
1340000
direct allocation
page read and write
DF0000
heap
page read and write
11E0000
direct allocation
page read and write
7E0B000
heap
page read and write
328F000
heap
page read and write
D9D000
heap
page read and write
366E000
stack
page read and write
7CF3000
heap
page read and write
4981000
heap
page read and write
2DEB000
heap
page read and write
4D51000
heap
page read and write
4A70000
direct allocation
page read and write
7DB1000
heap
page read and write
1384000
heap
page read and write
38BD000
heap
page read and write
7DC5000
heap
page read and write
1447000
heap
page read and write
4DD1000
heap
page read and write
53D0000
direct allocation
page execute and read and write
302E000
stack
page read and write
14C2000
heap
page read and write
4CE1000
heap
page read and write
7CDD000
heap
page read and write
5460000
heap
page read and write
7CD4000
heap
page read and write
2819C000
heap
page read and write
1140000
heap
page read and write
2C30000
heap
page read and write
DEA000
heap
page read and write
C90000
direct allocation
page read and write
108D000
trusted library allocation
page execute and read and write
2FDF000
stack
page read and write
7D11000
heap
page read and write
1438000
heap
page read and write
F1E000
stack
page read and write
4D51000
heap
page read and write
416F000
stack
page read and write
8240000
trusted library allocation
page read and write
7DC1000
heap
page read and write
4981000
heap
page read and write
7CD6000
heap
page read and write
1114000
heap
page read and write
998000
unkown
page execute and read and write
7DF3000
heap
page read and write
400000
remote allocation
page execute and read and write
2DEF000
stack
page read and write
394F000
stack
page read and write
358F000
stack
page read and write
299F000
stack
page read and write
7D04000
heap
page read and write
5040000
direct allocation
page execute and read and write
7CF0000
heap
page read and write
931000
unkown
page execute and write copy
3C6F000
stack
page read and write
8171000
heap
page read and write
7CAA000
heap
page read and write
492E000
stack
page read and write
7FF0000
trusted library allocation
page read and write
4C61000
heap
page read and write
12C5000
heap
page read and write
284B17D7000
heap
page read and write
7D0C000
heap
page read and write
11BA000
heap
page read and write
7650000
remote allocation
page read and write
1140000
trusted library allocation
page read and write
7CD6000
heap
page read and write
1011000
heap
page read and write
1D42F051000
trusted library allocation
page read and write
8153000
heap
page read and write
392F000
heap
page read and write
8161000
heap
page read and write
3D0F000
stack
page read and write
7DC6000
heap
page read and write
817D000
heap
page read and write
7CE8000
heap
page read and write
28184000
heap
page read and write
7E05000
heap
page read and write
7DC0000
trusted library allocation
page read and write
11A4000
heap
page read and write
2F30000
heap
page read and write
786F000
stack
page read and write
B4B000
stack
page read and write
7D27000
heap
page read and write
4CE1000
heap
page read and write
1D41CFA8000
heap
page read and write
7C8B000
heap
page read and write
AB8000
unkown
page execute and read and write
FC0000
heap
page read and write
14D0000
direct allocation
page read and write
37AE000
stack
page read and write
7CB5000
heap
page read and write
844000
heap
page read and write
4DC0000
trusted library allocation
page read and write
3E3F000
stack
page read and write
B41000
unkown
page execute and write copy
32FF000
stack
page read and write
F6E000
stack
page read and write
43AE000
stack
page read and write
90E000
unkown
page execute and read and write
7FF0000
trusted library allocation
page read and write
4981000
heap
page read and write
7951000
heap
page read and write
8DE000
unkown
page execute and read and write
38D5000
heap
page read and write
13A4000
heap
page read and write
B00000
unkown
page execute and read and write
1A10000
heap
page read and write
7C9E000
heap
page read and write
FE0000
heap
page read and write
7CDD000
heap
page read and write
2B6B000
stack
page read and write
14BF000
heap
page read and write
4EB0000
heap
page read and write
912000
unkown
page execute and read and write
31E9000
heap
page read and write
155F000
stack
page read and write
C85497D000
stack
page read and write
7DB1000
heap
page read and write
2A4F000
stack
page read and write
5160000
direct allocation
page execute and read and write
920000
unkown
page execute and read and write
4D50000
direct allocation
page execute and read and write
8155000
heap
page read and write
145B000
heap
page read and write
4981000
heap
page read and write
442E000
stack
page read and write
4980000
heap
page read and write
5A0000
heap
page read and write
818A000
heap
page read and write
4981000
heap
page read and write
8240000
trusted library allocation
page read and write
7CEA000
heap
page read and write
52E0000
direct allocation
page execute and read and write
A1C000
unkown
page read and write
C2DA5FE000
stack
page read and write
7CDE000
heap
page read and write
7CD6000
heap
page read and write
11C0000
heap
page read and write
390C000
heap
page read and write
1D4202DB000
trusted library allocation
page read and write
4981000
heap
page read and write
8171000
heap
page read and write
1340000
direct allocation
page read and write
1C4E000
stack
page read and write
8153000
heap
page read and write
9F0000
heap
page read and write
1114000
heap
page read and write
7CAB000
heap
page read and write
812D000
heap
page read and write
47DE000
heap
page read and write
4C61000
heap
page read and write
8161000
heap
page read and write
8161000
heap
page read and write
D6E000
stack
page read and write
88A2CFE000
stack
page read and write
31E7000
heap
page read and write
143F000
heap
page read and write
8240000
trusted library allocation
page read and write
D3A000
heap
page read and write
31BD000
heap
page read and write
13CE000
heap
page read and write
2E44000
trusted library allocation
page read and write
1384000
heap
page read and write
113E000
heap
page read and write
1100000
trusted library allocation
page read and write
7CDD000
heap
page read and write
3DB000
stack
page read and write
81A9000
heap
page read and write
D36000
heap
page read and write
2C00000
direct allocation
page read and write
113E000
heap
page read and write
1384000
heap
page read and write
2CB2000
trusted library allocation
page execute and read and write
77FE000
stack
page read and write
44CE000
stack
page read and write
C2DADFD000
stack
page read and write
4DE0000
direct allocation
page read and write
1214000
heap
page read and write
7CF4000
heap
page read and write
11A4000
heap
page read and write
6B2B000
stack
page read and write
13A4000
heap
page read and write
7DB1000
heap
page read and write
112A000
heap
page read and write
7CCE000
heap
page read and write
4C61000
heap
page read and write
7DE5000
heap
page read and write
7FC2000
heap
page read and write
7D3C000
heap
page read and write
762000
unkown
page write copy
BC9000
unkown
page execute and read and write
45CF000
stack
page read and write
700000
unkown
page readonly
844000
heap
page read and write
7E1C000
heap
page read and write
220E0000
heap
page read and write
4FB0000
heap
page read and write
844000
heap
page read and write
7CE7000
heap
page read and write
2ACE000
stack
page read and write
3E7E000
stack
page read and write
4D40000
direct allocation
page execute and read and write
284B15E0000
heap
page read and write
14DC000
heap
page read and write
31BF000
stack
page read and write
DB3000
unkown
page execute and write copy
5120000
direct allocation
page execute and read and write
3384000
heap
page read and write
13A4000
heap
page read and write
C8547F8000
stack
page read and write
47F1000
heap
page read and write
999000
unkown
page write copy
7FC9000
heap
page read and write
1444000
heap
page read and write
D5C000
heap
page read and write
1D420336000
trusted library allocation
page read and write
47F1000
heap
page read and write
7AAD000
stack
page read and write
5360000
heap
page read and write
38BA000
heap
page read and write
13BE000
stack
page read and write
7CD2000
heap
page read and write
11A4000
heap
page read and write
7D14000
heap
page read and write
8172000
heap
page read and write
1384000
heap
page read and write
14D9000
heap
page read and write
81A1000
heap
page read and write
220D6000
heap
page read and write
4DE0000
direct allocation
page read and write
4D51000
heap
page read and write
11DA000
heap
page read and write
814A000
heap
page read and write
24AF000
stack
page read and write
4981000
heap
page read and write
10CD000
heap
page read and write
7E33000
heap
page read and write
844000
heap
page read and write
1195000
heap
page read and write
392B000
heap
page read and write
4D51000
heap
page read and write
7CC7000
heap
page read and write
7DF1000
heap
page read and write
13A4000
heap
page read and write
1477000
heap
page read and write
14DC000
heap
page read and write
B40000
unkown
page execute and write copy
4F80000
direct allocation
page execute and read and write
C3C000
stack
page read and write
7DF3000
heap
page read and write
7FCA000
heap
page read and write
8155000
heap
page read and write
390F000
heap
page read and write
2C20000
direct allocation
page read and write
1214000
heap
page read and write
FD3000
heap
page read and write
C26000
unkown
page execute and read and write
4A81000
heap
page read and write
E63000
unkown
page execute and write copy
11A4000
heap
page read and write
7CE6000
heap
page read and write
7C9E000
heap
page read and write
4981000
heap
page read and write
3BAE000
stack
page read and write
7DC0000
trusted library allocation
page read and write
3905000
heap
page read and write
CD6000
unkown
page execute and write copy
51D0000
direct allocation
page execute and read and write
11A4000
heap
page read and write
106E000
stack
page read and write
887000
unkown
page read and write
4D60000
heap
page read and write
13A4000
heap
page read and write
C8C000
heap
page read and write
8161000
heap
page read and write
7CEA000
heap
page read and write
7CAA000
heap
page read and write
8D8000
unkown
page execute and read and write
284B17EF000
heap
page read and write
7C6A000
heap
page read and write
844000
heap
page read and write
5230000
direct allocation
page execute and read and write
1140000
heap
page read and write
47F1000
heap
page read and write
7E0A000
heap
page read and write
790000
unkown
page readonly
4DC0000
direct allocation
page read and write
7DF3000
heap
page read and write
51E0000
direct allocation
page read and write
4981000
heap
page read and write
7E0B000
heap
page read and write
8240000
trusted library allocation
page read and write
906000
unkown
page execute and read and write
76AE000
stack
page read and write
13A4000
heap
page read and write
4B0E000
stack
page read and write
4C90000
direct allocation
page execute and read and write
36BF000
stack
page read and write
844000
heap
page read and write
924000
unkown
page execute and read and write
3BCF000
stack
page read and write
914000
unkown
page execute and read and write
2EB0000
direct allocation
page read and write
390C000
heap
page read and write
1384000
heap
page read and write
3355000
heap
page read and write
1042000
heap
page read and write
7CFD000
heap
page read and write
2A80000
trusted library allocation
page read and write
391C000
heap
page read and write
14BA000
heap
page read and write
4981000
heap
page read and write
11B7000
heap
page read and write
8050000
trusted library allocation
page read and write
7DBC000
heap
page read and write
2A67000
trusted library allocation
page execute and read and write
4DD1000
heap
page read and write
7CED000
heap
page read and write
1D4202AF000
trusted library allocation
page read and write
700000
unkown
page read and write
FA6000
heap
page read and write
251F7590000
trusted library allocation
page read and write
7CAA000
heap
page read and write
A1F000
unkown
page read and write
1384000
heap
page read and write
451E000
stack
page read and write
71BE000
stack
page read and write
2C80000
trusted library allocation
page read and write
4D51000
heap
page read and write
37AF000
stack
page read and write
2B2F000
stack
page read and write
E23000
heap
page read and write
1384000
heap
page read and write
8161000
heap
page read and write
11B2000
heap
page read and write
31FE000
stack
page read and write
7C8B000
heap
page read and write
7CFF000
heap
page read and write
4B71000
heap
page read and write
7FF0000
trusted library allocation
page read and write
5110000
direct allocation
page execute and read and write
544E000
stack
page read and write
284B1811000
heap
page read and write
2B7E000
stack
page read and write
679000
unkown
page write copy
610000
unkown
page read and write
4C61000
heap
page read and write
111F000
heap
page read and write
7DF1000
heap
page read and write
4C61000
heap
page read and write
7C8B000
heap
page read and write
D0E000
heap
page read and write
7DE7000
heap
page read and write
844000
heap
page read and write
8050000
trusted library allocation
page read and write
4C70000
direct allocation
page read and write
433F000
stack
page read and write
7DC0000
trusted library allocation
page read and write
7DBC000
heap
page read and write
4C61000
heap
page read and write
50A0000
direct allocation
page execute and read and write
51D0000
direct allocation
page execute and read and write
13B4000
heap
page read and write
4DD1000
heap
page read and write
284B17B8000
heap
page read and write
7CCF000
heap
page read and write
1D41CE40000
heap
page read and write
2FCF000
stack
page read and write
118F000
stack
page read and write
1396000
heap
page read and write
F1C000
heap
page read and write
11D6000
heap
page read and write
220D6000
heap
page read and write
220E0000
heap
page read and write
5140000
direct allocation
page execute and read and write
13A4000
heap
page read and write
13D6000
heap
page read and write
7D3C000
heap
page read and write
4DD1000
heap
page read and write
7DE5000
heap
page read and write
DDD000
stack
page read and write
930000
unkown
page read and write
1050000
heap
page read and write
1159000
stack
page read and write
391E000
heap
page read and write
7CE6000
heap
page read and write
4C70000
trusted library allocation
page read and write
1384000
heap
page read and write
13A4000
heap
page read and write
4C61000
heap
page read and write
7DC8000
heap
page read and write
419000
unkown
page read and write
7FB1000
heap
page read and write
1457000
heap
page read and write
10A6000
heap
page read and write
383E000
stack
page read and write
100E000
heap
page read and write
90A000
unkown
page execute and read and write
7E12000
heap
page read and write
472F000
stack
page read and write
DB8000
heap
page read and write
C09000
unkown
page execute and read and write
C2DA2FE000
stack
page read and write
102C000
heap
page read and write
4C61000
heap
page read and write
14D1000
heap
page read and write
840000
heap
page read and write
51D0000
direct allocation
page execute and read and write
7D3C000
heap
page read and write
104A000
heap
page read and write
7CC0000
heap
page read and write
E20000
heap
page read and write
39DE000
stack
page read and write
8142000
heap
page read and write
352F000
stack
page read and write
7E02000
heap
page read and write
4C61000
heap
page read and write
1AF0000
heap
page read and write
77BF000
stack
page read and write
7DD3000
heap
page read and write
1114000
heap
page read and write
5080000
direct allocation
page execute and read and write
1D41E905000
heap
page read and write
DAD000
unkown
page execute and read and write
1181000
heap
page read and write
7CEA000
heap
page read and write
13E6000
heap
page read and write
3232000
heap
page read and write
777F000
stack
page read and write
4C90000
direct allocation
page execute and read and write
7C90000
trusted library allocation
page read and write
402F000
stack
page read and write
3912000
heap
page read and write
2E4B000
trusted library allocation
page read and write
460E000
stack
page read and write
8171000
heap
page read and write
7D90000
heap
page read and write
2C00000
direct allocation
page read and write
D45000
heap
page read and write
FDB000
heap
page read and write
76D000
unkown
page read and write
1150000
heap
page read and write
2CA0000
heap
page execute and read and write
E7B000
heap
page read and write
512F000
stack
page read and write
5010000
direct allocation
page execute and read and write
4D51000
heap
page read and write
7DE7000
heap
page read and write
7FF0000
trusted library allocation
page read and write
4D51000
heap
page read and write
2ED7000
heap
page read and write
5100000
direct allocation
page execute and read and write
D0E000
heap
page read and write
7CB4000
heap
page read and write
6EC8000
heap
page read and write
1128000
heap
page read and write
8171000
heap
page read and write
41EE000
stack
page read and write
7E0000
unkown
page read and write
100E000
stack
page read and write
844000
heap
page read and write
4EAC000
stack
page read and write
2E5D000
trusted library allocation
page read and write
EF0000
direct allocation
page read and write
4CE1000
heap
page read and write
C90000
direct allocation
page read and write
14C0000
direct allocation
page read and write
115A000
heap
page read and write
1D436E60000
heap
page execute and read and write
7944000
heap
page read and write
4981000
heap
page read and write
7E16000
heap
page read and write
7CD3000
heap
page read and write
4A70000
direct allocation
page read and write
931000
unkown
page execute and write copy
284B17C8000
heap
page read and write
13AE000
heap
page read and write
8126000
heap
page read and write
7D3C000
heap
page read and write
7CDB000
heap
page read and write
5210000
direct allocation
page execute and read and write
891000
unkown
page execute and write copy
4B71000
heap
page read and write
F9A000
heap
page read and write
C97000
heap
page read and write
4DE0000
direct allocation
page read and write
385F000
stack
page read and write
7CE6000
heap
page read and write
7C8B000
heap
page read and write
1214000
heap
page read and write
45AE000
stack
page read and write
11A4000
heap
page read and write
47F1000
heap
page read and write
7DDE000
heap
page read and write
7DA7000
heap
page read and write
7CB5000
heap
page read and write
302F000
stack
page read and write
2F2E000
stack
page read and write
1D436F0C000
heap
page read and write
1456000
heap
page read and write
4981000
heap
page read and write
14C2000
heap
page read and write
5210000
direct allocation
page execute and read and write
5250000
direct allocation
page execute and read and write
1D41CF5E000
heap
page read and write
7CBD000
heap
page read and write
980000
heap
page read and write
8176000
heap
page read and write
2A60000
trusted library allocation
page read and write
13A4000
heap
page read and write
465E000
stack
page read and write
C09000
unkown
page execute and read and write
1214000
heap
page read and write
767000
unkown
page readonly
3500000
direct allocation
page read and write
1D420395000
trusted library allocation
page read and write
844000
heap
page read and write
337F000
stack
page read and write
8153000
heap
page read and write
145F000
heap
page read and write
4B71000
heap
page read and write
4981000
heap
page read and write
DEE000
heap
page read and write
4981000
heap
page read and write
7DBC000
heap
page read and write
47D0000
heap
page read and write
2EC0000
heap
page read and write
7CCC000
heap
page read and write
7CE7000
heap
page read and write
7CB5000
heap
page read and write
7DDD000
heap
page read and write
8240000
trusted library allocation
page read and write
5370000
heap
page read and write
CF9000
heap
page read and write
7CE7000
heap
page read and write
1B10000
heap
page read and write
111F000
heap
page read and write
E6A000
unkown
page execute and write copy
7DC0000
trusted library allocation
page read and write
7D36000
heap
page read and write
7CE6000
heap
page read and write
7A00000
trusted library allocation
page read and write
1196000
heap
page read and write
4981000
heap
page read and write
812D000
heap
page read and write
844000
heap
page read and write
5120000
direct allocation
page execute and read and write
8240000
trusted library allocation
page read and write
EB2000
unkown
page write copy
DE0000
direct allocation
page read and write
38B2000
heap
page read and write
4CE1000
heap
page read and write
1114000
heap
page read and write
306E000
stack
page read and write
910000
unkown
page execute and read and write
3358000
heap
page read and write
140C000
heap
page read and write
8140000
heap
page read and write
7CDB000
heap
page read and write
19C000
stack
page read and write
111F000
heap
page read and write
DE0000
heap
page read and write
814B000
heap
page read and write
7E05000
heap
page read and write
392A000
heap
page read and write
773000
unkown
page readonly
3909000
heap
page read and write
51E0000
direct allocation
page execute and read and write
426B000
stack
page read and write
EB7000
unkown
page readonly
4DD1000
heap
page read and write
7CD3000
heap
page read and write
8171000
heap
page read and write
C2DAAFD000
stack
page read and write
7C6B000
heap
page read and write
4F3F000
stack
page read and write
7A7E000
stack
page read and write
1D436EA6000
heap
page read and write
7CAA000
heap
page read and write
2C00000
direct allocation
page read and write
5300000
direct allocation
page execute and read and write
1D420730000
trusted library allocation
page read and write
DEF000
stack
page read and write
7951000
heap
page read and write
F50000
heap
page read and write
5230000
direct allocation
page execute and read and write
1113000
heap
page read and write
4CC0000
heap
page read and write
7DF1000
heap
page read and write
13E7000
heap
page read and write
525E000
stack
page read and write
3378000
heap
page read and write
4B71000
heap
page read and write
3871000
heap
page read and write
2AD0000
heap
page read and write
767000
unkown
page readonly
1477000
heap
page read and write
7E36000
heap
page read and write
7E1E000
heap
page read and write
7CE6000
heap
page read and write
88A2AFD000
unkown
page read and write
11A4000
heap
page read and write
46AF000
stack
page read and write
1130000
heap
page read and write
DE0000
heap
page read and write
F80000
direct allocation
page execute and read and write
78ED000
stack
page read and write
5140000
direct allocation
page execute and read and write
439F000
stack
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
F0A000
heap
page read and write
419000
unkown
page write copy
51D0000
direct allocation
page execute and read and write
7DBC000
heap
page read and write
4DD1000
heap
page read and write
4C61000
heap
page read and write
342E000
stack
page read and write
13A4000
heap
page read and write
7DC6000
heap
page read and write
7CDD000
heap
page read and write
7D05000
heap
page read and write
3C34000
heap
page read and write
1214000
heap
page read and write
7CD7000
heap
page read and write
3E2E000
stack
page read and write
940000
unkown
page readonly
119E000
stack
page read and write
7CFD000
heap
page read and write
4A70000
direct allocation
page read and write
7CEB000
heap
page read and write
701000
unkown
page execute read
4981000
heap
page read and write
7DEB000
heap
page read and write
8172000
heap
page read and write
1D41EDD0000
heap
page execute and read and write
7CE6000
heap
page read and write
220D6000
heap
page read and write
8153000
heap
page read and write
38B3000
heap
page read and write
E50000
unkown
page readonly
82F0000
heap
page read and write
3501000
heap
page read and write
7FB1000
heap
page read and write
7C9E000
heap
page read and write
13B2000
heap
page read and write
11BA000
heap
page read and write
8161000
heap
page read and write
412000
unkown
page readonly
1384000
heap
page read and write
5230000
direct allocation
page execute and read and write
7C9E000
heap
page read and write
79AD000
stack
page read and write
EFA000
stack
page read and write
AC6000
unkown
page execute read
7CDB000
heap
page read and write
47F1000
heap
page read and write
2A5A000
trusted library allocation
page execute and read and write
119E000
heap
page read and write
76BE000
stack
page read and write
1185000
heap
page read and write
7951000
heap
page read and write
4DD1000
heap
page read and write
352F000
stack
page read and write
1490000
remote allocation
page read and write
4A70000
direct allocation
page read and write
7D3C000
heap
page read and write
46EE000
stack
page read and write
284B16E0000
heap
page read and write
4D51000
heap
page read and write
347E000
stack
page read and write
C21000
unkown
page execute and write copy
394F000
heap
page read and write
7D3C000
heap
page read and write
7CB5000
heap
page read and write
50E0000
direct allocation
page execute and read and write
FC9000
heap
page read and write
882000
unkown
page execute and read and write
F8D000
heap
page read and write
4E63000
direct allocation
page read and write
7D0F000
heap
page read and write
994000
unkown
page execute and read and write
1113000
heap
page read and write
220F7000
heap
page read and write
730000
unkown
page readonly
98B000
unkown
page execute and read and write
1470000
heap
page read and write
40AE000
stack
page read and write
52F0000
direct allocation
page execute and read and write
5040000
direct allocation
page execute and read and write
7DF3000
heap
page read and write
452F000
stack
page read and write
66FF000
stack
page read and write
436D000
stack
page read and write
4C61000
heap
page read and write
C2DA7FE000
stack
page read and write
31E7000
heap
page read and write
1B1E000
heap
page read and write
47F1000
heap
page read and write
999000
unkown
page read and write
4C5F000
stack
page read and write
7DCA000
heap
page read and write
FBF000
heap
page read and write
1360000
heap
page read and write
13A4000
heap
page read and write
2C00000
direct allocation
page read and write
14E0000
direct allocation
page read and write
5030000
direct allocation
page execute and read and write
EF0000
direct allocation
page read and write
4DD1000
heap
page read and write
400000
unkown
page execute and read and write
7CC1000
heap
page read and write
EB7000
unkown
page readonly
FC2000
heap
page read and write
E6E000
heap
page read and write
1340000
direct allocation
page read and write
26AE000
stack
page read and write
D1B000
heap
page read and write
99B000
unkown
page execute and read and write
7CE3000
heap
page read and write
31CF000
stack
page read and write
11A1000
heap
page read and write
5020000
direct allocation
page execute and read and write
D03000
heap
page read and write
1440000
heap
page read and write
624000
remote allocation
page execute and read and write
7CE7000
heap
page read and write
37EE000
stack
page read and write
144A000
heap
page read and write
284B16C0000
heap
page read and write
4981000
heap
page read and write
356E000
stack
page read and write
7CDD000
heap
page read and write
FBF000
heap
page read and write
51E5000
direct allocation
page read and write
320E000
stack
page read and write
4981000
heap
page read and write
7CD3000
heap
page read and write
442F000
stack
page read and write
4981000
heap
page read and write
844000
heap
page read and write
2C7E000
stack
page read and write
28189000
heap
page read and write
E50000
unkown
page readonly
3241000
heap
page read and write
815F000
heap
page read and write
7C8B000
heap
page read and write
1384000
heap
page read and write
974000
unkown
page execute and read and write
7D89000
heap
page read and write
7CE1000
heap
page read and write
251F7590000
trusted library allocation
page read and write
7C9E000
heap
page read and write
4DD1000
heap
page read and write
3923000
heap
page read and write
DF5000
heap
page read and write
2EC5000
direct allocation
page read and write
13B0000
heap
page read and write
1214000
heap
page read and write
8155000
heap
page read and write
7CEB000
heap
page read and write
33AF000
stack
page read and write
1D41F008000
trusted library allocation
page read and write
7D3C000
heap
page read and write
4A70000
direct allocation
page read and write
FD0000
heap
page read and write
1384000
heap
page read and write
DB3000
unkown
page execute and write copy
52D0000
direct allocation
page execute and read and write
4C0F000
stack
page read and write
7CCD000
heap
page read and write
4DE0000
direct allocation
page read and write
2E02000
trusted library allocation
page read and write
7DF1000
heap
page read and write
E78000
heap
page read and write
251F7190000
trusted library allocation
page read and write
1214000
heap
page read and write
7DF8000
heap
page read and write
1185000
heap
page read and write
7CB5000
heap
page read and write
1185000
heap
page read and write
7D3C000
heap
page read and write
2C5F000
stack
page read and write
3B6F000
stack
page read and write
844000
heap
page read and write
7C8B000
heap
page read and write
5080000
direct allocation
page execute and read and write
7CDD000
heap
page read and write
143F000
heap
page read and write
2BFE000
stack
page read and write
4CD0000
direct allocation
page execute and read and write
1A2F000
stack
page read and write
32AF000
stack
page read and write
4981000
heap
page read and write
7D1E000
heap
page read and write
220DB000
heap
page read and write
9EC000
stack
page read and write
14C7000
heap
page read and write
51B0000
direct allocation
page execute and read and write
3276000
heap
page read and write
8050000
trusted library allocation
page read and write
8161000
heap
page read and write
3920000
heap
page read and write
2EB0000
direct allocation
page read and write
7DD0000
heap
page read and write
220D2000
heap
page read and write
4B71000
heap
page read and write
8172000
heap
page read and write
8149000
heap
page read and write
E14000
heap
page read and write
4DC0000
direct allocation
page read and write
1D41E8B0000
heap
page read and write
128F000
stack
page read and write
7CF2000
heap
page read and write
7DE8000
heap
page read and write
2ABE000
stack
page read and write
D90000
heap
page read and write
14DC000
heap
page read and write
C40000
unkown
page execute and write copy
13A4000
heap
page read and write
3950000
heap
page read and write
37FF000
stack
page read and write
4C61000
heap
page read and write
DFA000
heap
page read and write
4F89000
stack
page read and write
1439000
heap
page read and write
7CDF000
heap
page read and write
13B9000
heap
page read and write
C7D000
heap
page read and write
11A4000
heap
page read and write
1D4202F3000
trusted library allocation
page read and write
FC0000
heap
page read and write
5040000
direct allocation
page execute and read and write
2C00000
direct allocation
page read and write
C8542FE000
stack
page read and write
7DF1000
heap
page read and write
7F7000
unkown
page readonly
1384000
heap
page read and write
1447000
heap
page read and write
146F000
heap
page read and write
11A0000
heap
page read and write
4981000
heap
page read and write
7DBC000
heap
page read and write
4981000
heap
page read and write
2EB0000
direct allocation
page read and write
4981000
heap
page read and write
13A4000
heap
page read and write
14BF000
heap
page read and write
7CEA000
heap
page read and write
10ED000
stack
page read and write
53C7000
heap
page read and write
11E0000
direct allocation
page read and write
1300000
heap
page read and write
7CED000
heap
page read and write
7FBB000
heap
page read and write
142F000
heap
page read and write
3690000
heap
page read and write
3B6E000
stack
page read and write
701000
unkown
page execute read
5120000
direct allocation
page execute and read and write
7CEA000
heap
page read and write
D72000
heap
page read and write
38AF000
heap
page read and write
1214000
heap
page read and write
284B17FD000
heap
page read and write
146E000
heap
page read and write
11A4000
heap
page read and write
7DD3000
heap
page read and write
394F000
heap
page read and write
1114000
heap
page read and write
11B2000
heap
page read and write
446E000
stack
page read and write
4CE1000
heap
page read and write
4DD1000
heap
page read and write
EEE000
stack
page read and write
2BBC000
stack
page read and write
4DE0000
direct allocation
page read and write
3E8E000
stack
page read and write
4DD1000
heap
page read and write
11A4000
heap
page read and write
7E0000
unkown
page readonly
7DC8000
heap
page read and write
DB9000
unkown
page execute and read and write
81A9000
heap
page read and write
470F000
stack
page read and write
7DBA000
heap
page read and write
B1E000
unkown
page execute and read and write
7DBC000
heap
page read and write
4D51000
heap
page read and write
7C68000
heap
page read and write
4981000
heap
page read and write
2EC7000
heap
page read and write
4981000
heap
page read and write
4B71000
heap
page read and write
14C0000
direct allocation
page read and write
7CCF000
heap
page read and write
7CE6000
heap
page read and write
143F000
heap
page read and write
7CED000
heap
page read and write
46EE000
stack
page read and write
CA0000
direct allocation
page read and write
1447000
heap
page read and write
7FF0000
trusted library allocation
page read and write
4981000
heap
page read and write
52C3000
direct allocation
page read and write
2F34000
heap
page read and write
C2DA6FE000
stack
page read and write
4981000
heap
page read and write
5120000
direct allocation
page execute and read and write
14BA000
heap
page read and write
3344000
heap
page read and write
47F1000
heap
page read and write
7905000
heap
page read and write
10F0000
direct allocation
page read and write
750000
unkown
page readonly
7A3000
unkown
page readonly
8161000
heap
page read and write
7D3C000
heap
page read and write
45BF000
stack
page read and write
1D42038F000
trusted library allocation
page read and write
4D51000
heap
page read and write
38AA000
heap
page read and write
76D000
unkown
page write copy
7CFF000
heap
page read and write
7E1000
unkown
page execute and read and write
3ABE000
stack
page read and write
D72000
heap
page read and write
42EE000
stack
page read and write
4981000
heap
page read and write
49CE000
stack
page read and write
5387000
heap
page read and write
BC0000
heap
page read and write
2A7E000
stack
page read and write
4A1E000
stack
page read and write
389E000
stack
page read and write
76D000
unkown
page write copy
1D41FD94000
trusted library allocation
page read and write
4981000
heap
page read and write
4A70000
direct allocation
page read and write
192E000
stack
page read and write
7D18000
heap
page read and write
E20000
heap
page read and write
11B0000
trusted library allocation
page read and write
7D10000
heap
page read and write
8172000
heap
page read and write
19F7000
unkown
page read and write
4981000
heap
page read and write
DE0000
heap
page read and write
220E3000
heap
page read and write
72BD000
heap
page read and write
1181000
heap
page read and write
7CF4000
heap
page read and write
1083000
trusted library allocation
page execute and read and write
1100000
heap
page read and write
7D3D000
heap
page read and write
14BA000
heap
page read and write
7C68000
heap
page read and write
7DC8000
heap
page read and write
7CB4000
heap
page read and write
8171000
heap
page read and write
4DF0000
heap
page read and write
79BD000
stack
page read and write
51D0000
direct allocation
page execute and read and write
C11000
unkown
page execute and read and write
4981000
heap
page read and write
7A10000
remote allocation
page read and write
DBA000
stack
page read and write
3BBF000
stack
page read and write
7CB4000
heap
page read and write
11A4000
heap
page read and write
4981000
heap
page read and write
7C6E000
stack
page read and write
DD6000
heap
page read and write
7D07000
heap
page read and write
1127000
heap
page read and write
8124000
heap
page read and write
8171000
heap
page read and write
19F9000
unkown
page readonly
50F0000
direct allocation
page execute and read and write
4981000
heap
page read and write
1F380142000
trusted library allocation
page read and write
750000
unkown
page readonly
2E3F000
stack
page read and write
425F000
stack
page read and write
5020000
direct allocation
page execute and read and write
2F10000
heap
page read and write
4B71000
heap
page read and write
DB3000
heap
page read and write
4B8E000
stack
page read and write
7CAA000
heap
page read and write
7C8B000
heap
page read and write
5130000
direct allocation
page execute and read and write
13CC000
heap
page read and write
806000
unkown
page readonly
7CE0000
heap
page read and write
7FF0000
trusted library allocation
page read and write
1440000
heap
page read and write
4EB0000
heap
page read and write
999000
unkown
page write copy
7DD7000
heap
page read and write
781000
unkown
page execute and read and write
4981000
heap
page read and write
7C9E000
heap
page read and write
1D436E70000
heap
page read and write
7D3C000
heap
page read and write
1040000
heap
page read and write
1402000
heap
page read and write
4DD1000
heap
page read and write
1384000
heap
page read and write
967000
unkown
page write copy
EB7000
unkown
page readonly
FC9000
heap
page read and write
7FB6000
heap
page read and write
11D7000
heap
page read and write
4981000
heap
page read and write
FF9000
heap
page read and write
5190000
direct allocation
page execute and read and write
7CEA000
heap
page read and write
4981000
heap
page read and write
220E0000
heap
page read and write
36FE000
stack
page read and write
316E000
stack
page read and write
7D3C000
heap
page read and write
51D0000
direct allocation
page execute and read and write
53F0000
direct allocation
page execute and read and write
7FF0000
trusted library allocation
page read and write
1F4000
heap
page read and write
4B81000
heap
page read and write
7CDD000
heap
page read and write
1110000
heap
page read and write
C7A000
heap
page read and write
7E2B000
heap
page read and write
13FE000
heap
page read and write
4C61000
heap
page read and write
967000
unkown
page write copy
7C60000
heap
page read and write
10F0000
direct allocation
page read and write
4F90000
direct allocation
page execute and read and write
FF0000
heap
page read and write
115E000
stack
page read and write
3319000
heap
page read and write
12DE000
stack
page read and write
7CF4000
heap
page read and write
13BE000
heap
page read and write
D1A000
heap
page read and write
7DD0000
heap
page read and write
4D70000
direct allocation
page execute and read and write
3F6E000
stack
page read and write
FF3000
heap
page read and write
3BE3000
heap
page read and write
7CE9000
heap
page read and write
7DBC000
heap
page read and write
4B70000
heap
page read and write
73FD000
stack
page read and write
4D60000
trusted library allocation
page read and write
DB6000
heap
page read and write
14D9000
heap
page read and write
394F000
heap
page read and write
7CF0000
heap
page read and write
4981000
heap
page read and write
82FB000
heap
page read and write
42EF000
stack
page read and write
2CE7000
heap
page read and write
1F0000
heap
page read and write
7DBC000
heap
page read and write
4E3E000
stack
page read and write
220E0000
heap
page read and write
4C90000
direct allocation
page execute and read and write
3925000
heap
page read and write
7947000
heap
page read and write
F51000
heap
page read and write
3178000
heap
page read and write
1114000
heap
page read and write
D6B000
heap
page read and write
D16000
heap
page read and write
4DE0000
direct allocation
page read and write
1104000
trusted library allocation
page read and write
AE9000
unkown
page execute and read and write
2C00000
direct allocation
page read and write
7D3C000
heap
page read and write
8240000
trusted library allocation
page read and write
502E000
stack
page read and write
302F000
stack
page read and write
13BF000
stack
page read and write
1D41E90A000
heap
page read and write
7DD3000
heap
page read and write
51D0000
direct allocation
page execute and read and write
1444000
heap
page read and write
4CE1000
heap
page read and write
7CB5000
heap
page read and write
763D000
stack
page read and write
392E000
stack
page read and write
30CF000
stack
page read and write
1447000
heap
page read and write
13DE000
stack
page read and write
7D07000
heap
page read and write
1D420937000
trusted library allocation
page read and write
146F000
heap
page read and write
7FC2000
heap
page read and write
4F60000
direct allocation
page execute and read and write
4D90000
direct allocation
page execute and read and write
3900000
heap
page read and write
844000
heap
page read and write
4981000
heap
page read and write
815F000
heap
page read and write
7DC000
stack
page read and write
112B000
trusted library allocation
page execute and read and write
424E000
stack
page read and write
4DD1000
heap
page read and write
C2DA9FA000
stack
page read and write
4D51000
heap
page read and write
DB3000
heap
page read and write
7CBE000
heap
page read and write
145B000
heap
page read and write
3E4F000
stack
page read and write
157F000
stack
page read and write
EE8000
heap
page read and write
4981000
heap
page read and write
1384000
heap
page read and write
31D0000
heap
page read and write
8172000
heap
page read and write
4B71000
heap
page read and write
4D51000
heap
page read and write
2EB0000
direct allocation
page read and write
7D18000
heap
page read and write
771000
unkown
page read and write
492F000
stack
page read and write
390D000
heap
page read and write
DD8000
unkown
page execute and read and write
393F000
stack
page read and write
13D6000
heap
page read and write
E95000
heap
page read and write
844000
heap
page read and write
8161000
heap
page read and write
53CA000
heap
page read and write
CD3000
unkown
page execute and write copy
2B2E000
stack
page read and write
4DC0000
direct allocation
page read and write
2C91000
trusted library allocation
page execute and read and write
316E000
heap
page read and write
4981000
heap
page read and write
7C8B000
heap
page read and write
145D000
heap
page read and write
8E4000
unkown
page execute and read and write
F18000
direct allocation
page read and write
47F1000
heap
page read and write
AA5000
heap
page read and write
4C61000
heap
page read and write
7FE000
unkown
page execute and read and write
CDA000
unkown
page execute and write copy
4DD1000
heap
page read and write
7CF4000
heap
page read and write
8050000
trusted library allocation
page read and write
1384000
heap
page read and write
47F1000
heap
page read and write
5040000
direct allocation
page execute and read and write
6275000
heap
page read and write
79FD000
stack
page read and write
7CB4000
heap
page read and write
1F380144000
trusted library allocation
page read and write
4D00000
direct allocation
page execute and read and write
8171000
heap
page read and write
7CFE000
heap
page read and write
14D1000
heap
page read and write
3DEF000
stack
page read and write
14C3000
heap
page read and write
3923000
heap
page read and write
1477000
heap
page read and write
7D00000
heap
page read and write
7A3000
unkown
page readonly
31E0000
heap
page read and write
11A4000
heap
page read and write
220C6000
heap
page read and write
DB9000
unkown
page execute and read and write
45AE000
stack
page read and write
28196000
heap
page read and write
F90000
heap
page read and write
7D3C000
heap
page read and write
88A2BFE000
stack
page read and write
7CB4000
heap
page read and write
1D42034D000
trusted library allocation
page read and write
47AF000
stack
page read and write
1214000
heap
page read and write
7B7F000
stack
page read and write
8171000
heap
page read and write
8153000
heap
page read and write
7914000
heap
page read and write
47EF000
stack
page read and write
EAE000
stack
page read and write
4981000
heap
page read and write
91E000
unkown
page execute and read and write
390D000
heap
page read and write
390B000
heap
page read and write
3CAE000
stack
page read and write
2EC0000
direct allocation
page read and write
4981000
heap
page read and write
400000
unkown
page readonly
1D42EE5C000
trusted library allocation
page read and write
4A8E000
stack
page read and write
7CCD000
heap
page read and write
762000
unkown
page readonly
44DF000
stack
page read and write
326F000
stack
page read and write
284B17B0000
heap
page read and write
8F0000
unkown
page execute and read and write
397F000
stack
page read and write
11A2000
heap
page read and write
D7C000
heap
page read and write
F51000
heap
page read and write
419000
unkown
page write copy
7CF0000
heap
page read and write
D10000
heap
page read and write
ECE000
heap
page read and write
366F000
stack
page read and write
7FF0000
trusted library allocation
page read and write
5040000
direct allocation
page execute and read and write
12C3000
heap
page read and write
96C000
unkown
page read and write
4CE1000
heap
page read and write
38B7000
heap
page read and write
11C1000
heap
page read and write
894000
unkown
page execute and read and write
2DC0000
direct allocation
page read and write
65FE000
stack
page read and write
3C30000
heap
page read and write
1038000
heap
page read and write
DB3000
heap
page read and write
11AB000
heap
page read and write
406E000
stack
page read and write
284B180D000
heap
page read and write
1050000
heap
page read and write
4981000
heap
page read and write
40FE000
stack
page read and write
1169000
heap
page read and write
D2D000
heap
page read and write
47E0000
heap
page read and write
8140000
heap
page read and write
1384000
heap
page read and write
406F000
stack
page read and write
3CEE000
stack
page read and write
97E000
stack
page read and write
8161000
heap
page read and write
1D42F0D9000
trusted library allocation
page read and write
76C000
unkown
page write copy
3E2E000
stack
page read and write
3950000
heap
page read and write
7DC2000
heap
page read and write
371F000
stack
page read and write
7A4000
unkown
page execute and read and write
1384000
heap
page read and write
773000
unkown
page readonly
7D3C000
heap
page read and write
F0A000
heap
page read and write
8050000
trusted library allocation
page read and write
38FE000
heap
page read and write
7CDE000
heap
page read and write
967000
unkown
page read and write
D77000
heap
page read and write
4981000
heap
page read and write
78AD000
stack
page read and write
4DAC000
stack
page read and write
1418000
heap
page read and write
119E000
stack
page read and write
4981000
heap
page read and write
7D3E000
heap
page read and write
47F1000
heap
page read and write
1D420547000
trusted library allocation
page read and write
330F000
heap
page read and write
50A0000
direct allocation
page execute and read and write
5040000
direct allocation
page execute and read and write
8171000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
4DD1000
heap
page read and write
7D27000
heap
page read and write
494B000
stack
page read and write
1548000
stack
page read and write
1510000
direct allocation
page read and write
2F2E000
stack
page read and write
284B3350000
heap
page read and write
4ED6000
heap
page read and write
2F7E000
stack
page read and write
7C90000
trusted library allocation
page read and write
647F000
stack
page read and write
844000
heap
page read and write
38FE000
heap
page read and write
7650000
remote allocation
page read and write
429E000
stack
page read and write
8175000
heap
page read and write
E4F000
heap
page read and write
14DC000
heap
page read and write
773000
unkown
page readonly
11A4000
heap
page read and write
844000
heap
page read and write
6D40000
heap
page read and write
10AE000
stack
page read and write
8172000
heap
page read and write
2C00000
direct allocation
page read and write
32D8000
heap
page read and write
D27000
heap
page read and write
8159000
heap
page read and write
5000000
direct allocation
page execute and read and write
1070000
heap
page read and write
8171000
heap
page read and write
7CE7000
heap
page read and write
DD0000
heap
page read and write
4D4F000
stack
page read and write
1D41E900000
heap
page read and write
4981000
heap
page read and write
1050000
direct allocation
page read and write
636000
remote allocation
page execute and read and write
D13000
heap
page read and write
10E0000
heap
page read and write
7C8B000
heap
page read and write
220C6000
heap
page read and write
3A6E000
stack
page read and write
8136000
heap
page read and write
F00000
heap
page read and write
1002000
heap
page read and write
98E000
unkown
page readonly
13A4000
heap
page read and write
7D3C000
heap
page read and write
7E36000
heap
page read and write
7DC8000
heap
page read and write
7C8B000
heap
page read and write
7FB9000
heap
page read and write
1013000
heap
page read and write
7CDD000
heap
page read and write
1D420361000
trusted library allocation
page read and write
5140000
direct allocation
page execute and read and write
14D0000
direct allocation
page read and write
962000
unkown
page execute and read and write
7CB4000
heap
page read and write
11A4000
heap
page read and write
FC7000
heap
page read and write
8240000
trusted library allocation
page read and write
7C9E000
heap
page read and write
DAE000
unkown
page execute and write copy
384E000
stack
page read and write
E13000
heap
page read and write
4981000
heap
page read and write
7D18000
heap
page read and write
4C61000
heap
page read and write
C8546F7000
stack
page read and write
8168000
heap
page read and write
113F000
heap
page read and write
1084000
trusted library allocation
page read and write
7D3C000
heap
page read and write
7CB5000
heap
page read and write
844000
heap
page read and write
284B1811000
heap
page read and write
7D1A000
heap
page read and write
4C61000
heap
page read and write
7E1E000
heap
page read and write
C84000
heap
page read and write
930000
unkown
page readonly
348E000
stack
page read and write
FD8000
heap
page read and write
1181000
heap
page read and write
11A4000
heap
page read and write
7D3C000
heap
page read and write
7CAA000
heap
page read and write
7D71000
heap
page read and write
7D3C000
heap
page read and write
13A4000
heap
page read and write
EF0000
direct allocation
page read and write
3355000
heap
page read and write
4981000
heap
page read and write
4B71000
heap
page read and write
7FB1000
heap
page read and write
4C61000
heap
page read and write
2C00000
direct allocation
page read and write
7CFD000
heap
page read and write
8050000
trusted library allocation
page read and write
8140000
heap
page read and write
4A6E000
stack
page read and write
1426000
heap
page read and write
251F7190000
trusted library allocation
page read and write
32AF000
stack
page read and write
2DC0000
direct allocation
page read and write
4C90000
direct allocation
page execute and read and write
7CEB000
heap
page read and write
13BA000
heap
page read and write
2E7E000
stack
page read and write
4DED000
stack
page read and write
2C00000
direct allocation
page read and write
4B71000
heap
page read and write
4DE0000
direct allocation
page read and write
4CE1000
heap
page read and write
C9D000
stack
page read and write
DC4000
heap
page read and write
11A4000
heap
page read and write
3217000
heap
page read and write
391B000
heap
page read and write
4D51000
heap
page read and write
9DE000
stack
page read and write
D1E000
heap
page read and write
14BA000
heap
page read and write
701000
unkown
page execute and write copy
220DD000
heap
page read and write
7CD9000
heap
page read and write
2DEE000
stack
page read and write
13A4000
heap
page read and write
1181000
heap
page read and write
456F000
stack
page read and write
960000
unkown
page execute and read and write
918000
unkown
page execute and read and write
CD6000
unkown
page execute and write copy
4CF0000
direct allocation
page execute and read and write
4981000
heap
page read and write
4CE1000
heap
page read and write
4C61000
heap
page read and write
8153000
heap
page read and write
7FF0000
trusted library allocation
page read and write
7C68000
heap
page read and write
792000
unkown
page read and write
4C4E000
stack
page read and write
7DA6000
heap
page read and write
14C2000
heap
page read and write
5360000
remote allocation
page read and write
4C61000
heap
page read and write
7CEB000
heap
page read and write
7CF7000
heap
page read and write
5220000
direct allocation
page execute and read and write
7CE6000
heap
page read and write
90C000
unkown
page execute and read and write
5040000
direct allocation
page execute and read and write
10C0000
heap
page read and write
4D51000
heap
page read and write
284B17C5000
heap
page read and write
48EF000
stack
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
13DC000
heap
page read and write
356E000
stack
page read and write
5260000
direct allocation
page read and write
220DA000
heap
page read and write
7CE6000
heap
page read and write
14D1000
heap
page read and write
791B000
heap
page read and write
3EEF000
stack
page read and write
8171000
heap
page read and write
7C68000
heap
page read and write
1408000
heap
page read and write
5170000
direct allocation
page execute and read and write
FB5000
heap
page read and write
1A1C000
unkown
page readonly
8172000
heap
page read and write
14C7000
heap
page read and write
1384000
heap
page read and write
7D0F000
heap
page read and write
700000
unkown
page readonly
4B5E000
stack
page read and write
411F000
stack
page read and write
437E000
stack
page read and write
4DC0000
direct allocation
page read and write
4CE1000
heap
page read and write
4C61000
heap
page read and write
47F1000
heap
page read and write
2F3F000
stack
page read and write
4990000
heap
page read and write
2DC0000
direct allocation
page read and write
1214000
heap
page read and write
2DC0000
direct allocation
page read and write
3FCE000
stack
page read and write
11DB000
heap
page read and write
990000
unkown
page execute and read and write
4730000
heap
page read and write
51D0000
direct allocation
page execute and read and write
45EF000
stack
page read and write
7CDD000
heap
page read and write
5070000
direct allocation
page execute and read and write
1214000
heap
page read and write
8172000
heap
page read and write
8171000
heap
page read and write
412000
unkown
page readonly
4CE1000
heap
page read and write
2C00000
direct allocation
page read and write
4BD4000
heap
page read and write
401000
unkown
page execute read
145B000
heap
page read and write
7CED000
heap
page read and write
7DBC000
heap
page read and write
12ED000
stack
page read and write
4981000
heap
page read and write
844000
heap
page read and write
1384000
heap
page read and write
38B6000
heap
page read and write
7CD2000
heap
page read and write
391B000
heap
page read and write
F7A000
heap
page read and write
4C61000
heap
page read and write
1D42EE11000
trusted library allocation
page read and write
4C70000
direct allocation
page execute and read and write
1F3F4660000
unkown
page readonly
52B000
stack
page read and write
1464000
heap
page read and write
2EB0000
heap
page read and write
4981000
heap
page read and write
3D9E000
stack
page read and write
887000
unkown
page write copy
CC1000
unkown
page execute and read and write
8DD000
stack
page read and write
2E8B000
stack
page read and write
410E000
stack
page read and write
41AF000
stack
page read and write
CD3000
unkown
page execute and write copy
11A4000
heap
page read and write
7DC4000
heap
page read and write
7CDB000
heap
page read and write
942000
unkown
page readonly
220D6000
heap
page read and write
73BF000
stack
page read and write
1214000
heap
page read and write
2E96000
trusted library allocation
page read and write
7C8B000
heap
page read and write
4A70000
direct allocation
page read and write
5120000
direct allocation
page execute and read and write
53F0000
direct allocation
page execute and read and write
53F0000
direct allocation
page execute and read and write
8171000
heap
page read and write
7CB5000
heap
page read and write
10F0000
direct allocation
page read and write
43EF000
stack
page read and write
7CDD000
heap
page read and write
11A8000
heap
page read and write
7CE6000
heap
page read and write
36CF000
stack
page read and write
1D4209FC000
trusted library allocation
page read and write
8153000
heap
page read and write
8171000
heap
page read and write
4A70000
direct allocation
page read and write
1114000
heap
page read and write
4A70000
direct allocation
page read and write
F9E000
heap
page read and write
14C7000
heap
page read and write
462E000
stack
page read and write
7D05000
heap
page read and write
64BE000
stack
page read and write
4B71000
heap
page read and write
7C68000
heap
page read and write
1214000
heap
page read and write
4D51000
heap
page read and write
7CF1000
heap
page read and write
4CE1000
heap
page read and write
4981000
heap
page read and write
968000
unkown
page execute and read and write
7DF5000
heap
page read and write
344F000
stack
page read and write
3F6E000
stack
page read and write
8240000
trusted library allocation
page read and write
4A70000
direct allocation
page read and write
38B3000
heap
page read and write
11B7000
heap
page read and write
D56000
heap
page read and write
C7E000
heap
page read and write
13A4000
heap
page read and write
1161000
heap
page read and write
7CBA000
heap
page read and write
4D51000
heap
page read and write
38B4000
heap
page read and write
4DD1000
heap
page read and write
31CF000
heap
page read and write
448F000
stack
page read and write
7CB4000
heap
page read and write
4D51000
heap
page read and write
5230000
direct allocation
page execute and read and write
37A7000
heap
page read and write
FF1000
heap
page read and write
E67000
heap
page read and write
4981000
heap
page read and write
4F80000
direct allocation
page execute and read and write
7CB5000
heap
page read and write
1195000
heap
page read and write
DB3000
unkown
page execute and write copy
7DB0000
heap
page read and write
7CDD000
heap
page read and write
7DD0000
heap
page read and write
11A4000
heap
page read and write
4981000
heap
page read and write
533E000
stack
page read and write
11DA000
heap
page read and write
7E34000
heap
page read and write
4981000
heap
page read and write
38EE000
stack
page read and write
65BF000
stack
page read and write
2C93000
trusted library allocation
page read and write
7CE1000
heap
page read and write
4C61000
heap
page read and write
844000
heap
page read and write
7D1A000
heap
page read and write
2C00000
direct allocation
page read and write
CAA000
heap
page read and write
447000
remote allocation
page execute and read and write
392E000
stack
page read and write
5130000
direct allocation
page execute and read and write
3D3E000
stack
page read and write
1442000
heap
page read and write
11A6000
heap
page read and write
4D50000
heap
page read and write
398E000
stack
page read and write
4FA0000
direct allocation
page execute and read and write
10F9000
stack
page read and write
4FF5000
direct allocation
page read and write
4CE1000
heap
page read and write
762000
unkown
page write copy
D00000
heap
page read and write
C90000
direct allocation
page read and write
4F10000
direct allocation
page read and write
1112000
heap
page read and write
81B0000
trusted library allocation
page read and write
5360000
remote allocation
page read and write
8FD000
stack
page read and write
7D3C000
heap
page read and write
7CED000
heap
page read and write
7C8B000
heap
page read and write
1490000
remote allocation
page read and write
1070000
heap
page read and write
3908000
heap
page read and write
11A4000
heap
page read and write
CCD000
unkown
page execute and read and write
80D0000
heap
page read and write
4DD1000
heap
page read and write
DDA000
unkown
page execute and write copy
1384000
heap
page read and write
7DBA000
heap
page read and write
113E000
heap
page read and write
7CAA000
heap
page read and write
13A0000
heap
page read and write
50C0000
direct allocation
page execute and read and write
11A4000
heap
page read and write
4C90000
direct allocation
page execute and read and write
E35000
heap
page read and write
220E2000
heap
page read and write
D90000
heap
page read and write
432E000
stack
page read and write
4981000
heap
page read and write
844000
heap
page read and write
8DC000
unkown
page execute and read and write
3C5E000
stack
page read and write
4A81000
heap
page read and write
4DD1000
heap
page read and write
DA0000
heap
page read and write
391E000
heap
page read and write
4DC0000
direct allocation
page read and write
1D436EB2000
heap
page read and write
4F80000
direct allocation
page execute and read and write
1214000
heap
page read and write
11A4000
heap
page read and write
7DCB000
heap
page read and write
8171000
heap
page read and write
47F1000
heap
page read and write
4DD1000
heap
page read and write
B29000
unkown
page execute and read and write
1009000
heap
page read and write
512D000
stack
page read and write
9C000
stack
page read and write
2C20000
direct allocation
page read and write
7D0C000
heap
page read and write
11A4000
heap
page read and write
7CB4000
heap
page read and write
7DF3000
heap
page read and write
4981000
heap
page read and write
A17000
unkown
page write copy
2E98000
trusted library allocation
page read and write
392F000
heap
page read and write
625E000
stack
page read and write
7D3C000
heap
page read and write
1F380001000
trusted library allocation
page read and write
7CAA000
heap
page read and write
DC0000
heap
page read and write
31C7000
heap
page read and write
7D06000
heap
page read and write
7DE7000
heap
page read and write
13A4000
heap
page read and write
FC9000
heap
page read and write
3909000
heap
page read and write
37AF000
stack
page read and write
2A6B000
trusted library allocation
page execute and read and write
7CE7000
heap
page read and write
1214000
heap
page read and write
7CDB000
heap
page read and write
284B3180000
heap
page read and write
930000
heap
page read and write
EA0000
unkown
page readonly
7CF6000
heap
page read and write
394F000
heap
page read and write
42AF000
stack
page read and write
F55000
heap
page read and write
28190000
heap
page read and write
4C71000
heap
page read and write
7DF3000
heap
page read and write
50A0000
direct allocation
page execute and read and write
5090000
direct allocation
page execute and read and write
685C000
stack
page read and write
AC6000
unkown
page execute read
8EA000
unkown
page execute and read and write
4C90000
direct allocation
page execute and read and write
1114000
heap
page read and write
2EB0000
direct allocation
page read and write
5280000
direct allocation
page execute and read and write
48F0000
trusted library allocation
page read and write
496E000
stack
page read and write
5150000
direct allocation
page execute and read and write
D4E000
heap
page read and write
7FB1000
heap
page read and write
82D1000
heap
page read and write
7CD9000
heap
page read and write
7DF3000
heap
page read and write
F9E000
heap
page read and write
7CBE000
stack
page read and write
7D3C000
heap
page read and write
7CD7000
heap
page read and write
11E0000
direct allocation
page read and write
7D0F000
heap
page read and write
812D000
heap
page read and write
488E000
stack
page read and write
3183000
heap
page read and write
8050000
trusted library allocation
page read and write
12F9000
stack
page read and write
4C62000
heap
page read and write
475F000
stack
page read and write
C76000
heap
page read and write
844000
heap
page read and write
13A4000
heap
page read and write
2C00000
direct allocation
page read and write
F5B000
stack
page read and write
C8548FF000
stack
page read and write
19F9000
unkown
page readonly
7CEA000
heap
page read and write
11E0000
direct allocation
page read and write
7DF6000
heap
page read and write
770000
unkown
page write copy
DB6000
unkown
page execute and write copy
7DC8000
heap
page read and write
5100000
direct allocation
page execute and read and write
47F1000
heap
page read and write
2CB3000
trusted library allocation
page read and write
78BD000
stack
page read and write
4C90000
direct allocation
page execute and read and write
F47000
heap
page read and write
10F0000
direct allocation
page read and write
7DF3000
heap
page read and write
C2DAEFE000
stack
page read and write
474E000
stack
page read and write
1127000
heap
page read and write
EB2000
unkown
page read and write
7900000
heap
page read and write
7CE8000
heap
page read and write
8171000
heap
page read and write
31AE000
stack
page read and write
145B000
heap
page read and write
2C2D000
stack
page read and write
7CEA000
heap
page read and write
7CB5000
heap
page read and write
1D41CF7E000
heap
page read and write
140C000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
CEF000
heap
page read and write
108E000
stack
page read and write
DBA000
unkown
page execute and write copy
30BE000
stack
page read and write
7C9E000
heap
page read and write
7C6A000
heap
page read and write
1384000
heap
page read and write
4981000
heap
page read and write
13F2000
heap
page read and write
5040000
direct allocation
page execute and read and write
5120000
direct allocation
page execute and read and write
51D0000
direct allocation
page execute and read and write
51B0000
direct allocation
page execute and read and write
7A1000
unkown
page write copy
747E000
heap
page read and write
4A2F000
stack
page read and write
7FB1000
heap
page read and write
D3B000
heap
page read and write
4981000
heap
page read and write
7C68000
heap
page read and write
DB6000
unkown
page execute and write copy
284B1802000
heap
page read and write
1340000
direct allocation
page read and write
1214000
heap
page read and write
14C2000
heap
page read and write
47F1000
heap
page read and write
4FF0000
direct allocation
page read and write
14AC000
heap
page read and write
4DD1000
heap
page read and write
3F2F000
stack
page read and write
4981000
heap
page read and write
2DC0000
direct allocation
page read and write
7C9E000
heap
page read and write
5040000
direct allocation
page execute and read and write
15E0000
heap
page read and write
7D80000
heap
page read and write
815D000
heap
page read and write
7389000
heap
page read and write
5260000
direct allocation
page execute and read and write
5120000
direct allocation
page execute and read and write
7C90000
trusted library allocation
page read and write
1D4F000
stack
page read and write
5230000
direct allocation
page execute and read and write
922000
unkown
page execute and read and write
D36000
heap
page read and write
3CB1000
trusted library allocation
page read and write
D30000
heap
page read and write
7D3C000
heap
page read and write
7D3C000
heap
page read and write
102A000
heap
page read and write
7CA2000
heap
page read and write
3F2E000
stack
page read and write
1119000
heap
page read and write
7CB4000
heap
page read and write
7CB4000
heap
page read and write
A24000
unkown
page execute and read and write
F5D000
heap
page read and write
140E000
heap
page read and write
844000
heap
page read and write
7CD2000
heap
page read and write
7DC6000
heap
page read and write
CFB000
heap
page read and write
220E6000
heap
page read and write
13A4000
heap
page read and write
7DC6000
heap
page read and write
4D51000
heap
page read and write
1411000
heap
page read and write
7C6D000
heap
page read and write
51F0000
direct allocation
page execute and read and write
51F0000
heap
page read and write
1114000
heap
page read and write
7FF0000
trusted library allocation
page read and write
4981000
heap
page read and write
700000
unkown
page readonly
144A000
heap
page read and write
7FB0000
heap
page read and write
11A4000
heap
page read and write
50E0000
direct allocation
page read and write
7D14000
heap
page read and write
1D41F394000
trusted library allocation
page read and write
4B71000
heap
page read and write
8161000
heap
page read and write
3B2F000
stack
page read and write
4D20000
direct allocation
page execute and read and write
7CED000
heap
page read and write
5230000
direct allocation
page execute and read and write
7FBD000
heap
page read and write
7C00000
remote allocation
page read and write
366F000
stack
page read and write
1036000
heap
page read and write
E23000
heap
page read and write
13FA000
heap
page read and write
138E000
stack
page read and write
8181000
heap
page read and write
7D15000
heap
page read and write
7CD2000
heap
page read and write
91F000
unkown
page execute and write copy
284B17D7000
heap
page read and write
220F7000
heap
page read and write
7C8B000
heap
page read and write
8171000
heap
page read and write
1120000
trusted library allocation
page read and write
1441000
heap
page read and write
7A10000
remote allocation
page read and write
4FC0000
direct allocation
page execute and read and write
14DC000
heap
page read and write
E14000
heap
page read and write
2EA0000
heap
page read and write
35DF000
stack
page read and write
1125000
heap
page read and write
FEA000
heap
page read and write
4981000
heap
page read and write
5110000
direct allocation
page execute and read and write
13ED000
heap
page read and write
1F3F4662000
unkown
page readonly
7D3C000
heap
page read and write
7CB4000
heap
page read and write
1214000
heap
page read and write
7CDF000
heap
page read and write
306E000
stack
page read and write
4981000
heap
page read and write
990000
heap
page read and write
7D25000
heap
page read and write
4981000
heap
page read and write
5090000
direct allocation
page execute and read and write
3997000
heap
page read and write
E23000
heap
page read and write
5180000
direct allocation
page read and write
3180000
heap
page read and write
146F000
heap
page read and write
F10000
heap
page read and write
7DBA000
heap
page read and write
844000
heap
page read and write
4DF1000
direct allocation
page read and write
115D000
heap
page read and write
7DA3000
heap
page read and write
E17000
heap
page read and write
7D3C000
heap
page read and write
7CBB000
heap
page read and write
1214000
heap
page read and write
13A4000
heap
page read and write
4981000
heap
page read and write
ABA000
unkown
page execute and write copy
4CE1000
heap
page read and write
1090000
heap
page read and write
7946000
heap
page read and write
14D9000
heap
page read and write
1443000
heap
page read and write
4C90000
direct allocation
page execute and read and write
FBF000
heap
page read and write
4B71000
heap
page read and write
7D21000
heap
page read and write
4D51000
heap
page read and write
15E6000
heap
page read and write
3154000
heap
page read and write
4C61000
heap
page read and write
4981000
heap
page read and write
5120000
direct allocation
page execute and read and write
7CE1000
heap
page read and write
7D3C000
heap
page read and write
701000
unkown
page execute read
1F380080000
trusted library allocation
page read and write
1384000
heap
page read and write
284B17EF000
heap
page read and write
7E1E000
heap
page read and write
2EC8000
direct allocation
page read and write
3C0E000
stack
page read and write
11C2000
heap
page read and write
53F0000
direct allocation
page execute and read and write
7CFF000
heap
page read and write
1B97000
heap
page read and write
7D3C000
heap
page read and write
25AF000
stack
page read and write
C85544E000
stack
page read and write
7DE5000
heap
page read and write
EC2000
heap
page read and write
700000
unkown
page readonly
376F000
stack
page read and write
1B1A000
heap
page read and write
4981000
heap
page read and write
51D0000
direct allocation
page execute and read and write
82D0000
heap
page read and write
7D3C000
heap
page read and write
1384000
heap
page read and write
6FB000
stack
page read and write
C8545FF000
stack
page read and write
4B6F000
stack
page read and write
4DD1000
heap
page read and write
75AE000
stack
page read and write
14BF000
stack
page read and write
890000
unkown
page read and write
844000
heap
page read and write
1214000
heap
page read and write
7E03000
heap
page read and write
1121000
heap
page read and write
3A2F000
stack
page read and write
4C61000
heap
page read and write
8171000
heap
page read and write
1D420307000
trusted library allocation
page read and write
14D0000
direct allocation
page read and write
4B71000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
14C2000
heap
page read and write
4DC0000
direct allocation
page read and write
33EF000
stack
page read and write
E3E000
heap
page read and write
284B19D0000
heap
page read and write
49DF000
stack
page read and write
8DA000
unkown
page execute and read and write
2C37000
heap
page read and write
4EC0000
trusted library allocation
page read and write
4CE1000
heap
page read and write
5160000
direct allocation
page execute and read and write
3920000
heap
page read and write
370E000
stack
page read and write
F50000
heap
page read and write
CD0000
unkown
page execute and read and write
FF9000
heap
page read and write
767E000
stack
page read and write
1D41CFAC000
heap
page read and write
8E6000
unkown
page execute and read and write
C2DA8FF000
stack
page read and write
5230000
direct allocation
page execute and read and write
5171000
direct allocation
page read and write
473E000
stack
page read and write
7CCE000
heap
page read and write
47EE000
stack
page read and write
7D91000
heap
page read and write
342E000
stack
page read and write
4FD0000
direct allocation
page execute and read and write
730000
unkown
page readonly
7E47000
heap
page read and write
750000
unkown
page readonly
E28000
heap
page read and write
7DBA000
heap
page read and write
7FF0000
trusted library allocation
page read and write
7C90000
trusted library allocation
page read and write
2DC0000
direct allocation
page read and write
4D80000
direct allocation
page execute and read and write
4C61000
heap
page read and write
7DB1000
heap
page read and write
4F5E000
stack
page read and write
4C61000
heap
page read and write
C854679000
stack
page read and write
4981000
heap
page read and write
7CAA000
heap
page read and write
41A000
unkown
page write copy
34EF000
stack
page read and write
C3F000
unkown
page execute and read and write
36AE000
stack
page read and write
8153000
heap
page read and write
11A0000
trusted library allocation
page execute and read and write
4C90000
direct allocation
page execute and read and write
7D18000
heap
page read and write
5150000
direct allocation
page execute and read and write
10F0000
heap
page read and write
7DE7000
heap
page read and write
8161000
heap
page read and write
8153000
heap
page read and write
1D41CF45000
heap
page read and write
7DA8000
heap
page read and write
7CF8000
heap
page read and write
251F7590000
trusted library allocation
page read and write
39E0000
remote allocation
page read and write
A0E000
stack
page read and write
145F000
heap
page read and write
483F000
stack
page read and write
844000
heap
page read and write
4981000
heap
page read and write
4EB1000
heap
page read and write
4CE1000
heap
page read and write
4B71000
heap
page read and write
220D3000
heap
page read and write
1384000
heap
page read and write
7CCE000
heap
page read and write
1214000
heap
page read and write
1185000
heap
page read and write
4981000
heap
page read and write
4F80000
direct allocation
page execute and read and write
4DD1000
heap
page read and write
7CF0000
heap
page read and write
7C9E000
heap
page read and write
1214000
heap
page read and write
4F10000
direct allocation
page read and write
11AF000
stack
page read and write
2D8F000
stack
page read and write
5120000
direct allocation
page execute and read and write
762000
unkown
page write copy
14D1000
heap
page read and write
1114000
heap
page read and write
7650000
remote allocation
page read and write
13E0000
heap
page read and write
C8549FE000
stack
page read and write
3911000
heap
page read and write
11C1000
heap
page read and write
4B71000
heap
page read and write
1441000
heap
page read and write
1330000
heap
page read and write
7CF0000
heap
page read and write
1D4207A0000
trusted library allocation
page read and write
CD9000
unkown
page execute and read and write
3255000
heap
page read and write
4981000
heap
page read and write
1114000
heap
page read and write
DB3000
unkown
page execute and write copy
7CC4000
heap
page read and write
674000
unkown
page execute and read and write
14D9000
heap
page read and write
7CDB000
heap
page read and write
7CD3000
heap
page read and write
8161000
heap
page read and write
1114000
heap
page read and write
74FD000
stack
page read and write
4991000
heap
page read and write
FB7000
heap
page read and write
4F70000
direct allocation
page execute and read and write
5210000
trusted library allocation
page read and write
104E000
stack
page read and write
4D51000
heap
page read and write
33E0000
heap
page read and write
4D51000
heap
page read and write
5360000
remote allocation
page read and write
7CF4000
heap
page read and write
7C00000
remote allocation
page read and write
107A000
heap
page read and write
489F000
stack
page read and write
352E000
stack
page read and write
2FEF000
stack
page read and write
5270000
direct allocation
page execute and read and write
7D24000
heap
page read and write
4D51000
heap
page read and write
13BE000
heap
page read and write
8168000
heap
page read and write
4C61000
heap
page read and write
762000
unkown
page read and write
392A000
heap
page read and write
7CF4000
heap
page read and write
7C9E000
heap
page read and write
14D1000
heap
page read and write
30DF000
stack
page read and write
34DE000
stack
page read and write
7C69000
heap
page read and write
1214000
heap
page read and write
10A0000
heap
page read and write
307F000
stack
page read and write
844000
heap
page read and write
1288000
heap
page read and write
4DD1000
heap
page read and write
14D9000
heap
page read and write
40AE000
stack
page read and write
FCC000
heap
page read and write
14BB000
heap
page read and write
A4E000
stack
page read and write
5060000
direct allocation
page execute and read and write
2ED0000
heap
page read and write
10F0000
direct allocation
page read and write
4C61000
heap
page read and write
699F000
stack
page read and write
39E0000
remote allocation
page read and write
401E000
stack
page read and write
7E44000
heap
page read and write
1400000
heap
page read and write
1D41CF6B000
heap
page read and write
13EA000
heap
page read and write
844000
heap
page read and write
79ED000
stack
page read and write
7FB9000
heap
page read and write
4A81000
heap
page read and write
51C0000
heap
page read and write
7CE6000
heap
page read and write
1D42077C000
trusted library allocation
page read and write
11A4000
heap
page read and write
44AF000
stack
page read and write
357F000
stack
page read and write
4C61000
heap
page read and write
1128000
heap
page read and write
7DF3000
heap
page read and write
1384000
heap
page read and write
844000
heap
page read and write
220F7000
heap
page read and write
7D10000
heap
page read and write
7C8B000
heap
page read and write
E66000
unkown
page execute and write copy
107E000
heap
page read and write
7DC8000
heap
page read and write
7C8B000
heap
page read and write
13A4000
heap
page read and write
7944000
heap
page read and write
4A4C000
stack
page read and write
390F000
heap
page read and write
1127000
heap
page read and write
3C1F000
stack
page read and write
11A4000
heap
page read and write
4981000
heap
page read and write
6A1000
unkown
page execute read
1D41CF62000
heap
page read and write
4981000
heap
page read and write
50E0000
direct allocation
page execute and read and write
7D0F000
heap
page read and write
DAC000
heap
page read and write
19F8000
unkown
page readonly
1433000
heap
page read and write
105B000
stack
page read and write
2CDE000
stack
page read and write
7CDB000
heap
page read and write
2CAE000
stack
page read and write
E5D000
unkown
page execute and read and write
7DD7000
heap
page read and write
C21000
unkown
page execute and write copy
E6E000
heap
page read and write
5040000
direct allocation
page execute and read and write
13A4000
heap
page read and write
52A0000
heap
page read and write
3152000
heap
page read and write
1D41CED0000
heap
page read and write
5230000
direct allocation
page execute and read and write
423E000
stack
page read and write
916000
unkown
page execute and read and write
504D000
stack
page read and write
C3F000
unkown
page execute and write copy
7C8B000
heap
page read and write
1D41EE66000
trusted library allocation
page read and write
5230000
direct allocation
page execute and read and write
7CD3000
heap
page read and write
1D436E30000
trusted library allocation
page read and write
7EAE000
stack
page read and write
497F000
stack
page read and write
145B000
heap
page read and write
7DE9000
heap
page read and write
FC9000
heap
page read and write
7C9F000
heap
page read and write
B40000
unkown
page execute and read and write
C85427E000
unkown
page read and write
1214000
heap
page read and write
1D42034A000
trusted library allocation
page read and write
482E000
stack
page read and write
F20000
heap
page read and write
41EE000
stack
page read and write
10B9000
heap
page read and write
1D41CFA6000
heap
page read and write
1429000
heap
page read and write
51C0000
direct allocation
page execute and read and write
DEB000
heap
page read and write
538F000
heap
page read and write
8240000
trusted library allocation
page read and write
14C0000
direct allocation
page read and write
5120000
direct allocation
page execute and read and write
7CBA000
heap
page read and write
41AE000
stack
page read and write
7903000
heap
page read and write
7C9E000
heap
page read and write
419000
unkown
page write copy
143F000
heap
page read and write
CDF000
heap
page read and write
1214000
heap
page read and write
1384000
heap
page read and write
4E5E000
stack
page read and write
343F000
stack
page read and write
3F7F000
stack
page read and write
3BFE000
stack
page read and write
887000
unkown
page write copy
7CEA000
heap
page read and write
7FB2000
heap
page read and write
4D51000
heap
page read and write
44EE000
stack
page read and write
1214000
heap
page read and write
40CF000
stack
page read and write
7D24000
heap
page read and write
392F000
heap
page read and write
4DA0000
direct allocation
page execute and read and write
7D19000
heap
page read and write
6D40000
heap
page read and write
C97000
heap
page read and write
4981000
heap
page read and write
8E2000
unkown
page execute and read and write
363E000
stack
page read and write
11A4000
heap
page read and write
A17000
unkown
page read and write
4D51000
heap
page read and write
EA0000
unkown
page readonly
2EBC000
stack
page read and write
521E000
stack
page read and write
540E000
stack
page read and write
750000
unkown
page readonly
1114000
heap
page read and write
3141000
heap
page read and write
4D51000
heap
page read and write
47F1000
heap
page read and write
8E0000
unkown
page execute and read and write
2C20000
trusted library allocation
page read and write
910000
unkown
page execute and read and write
127E000
stack
page read and write
2C0E000
stack
page read and write
3650000
unclassified section
page read and write
81A9000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
52B0000
direct allocation
page execute and read and write
7DC8000
heap
page read and write
220E8000
heap
page read and write
47F1000
heap
page read and write
15AC000
stack
page read and write
8161000
heap
page read and write
4D51000
heap
page read and write
390B000
heap
page read and write
6710000
heap
page read and write
7C6D000
heap
page read and write
7C00000
remote allocation
page read and write
590000
heap
page read and write
4C61000
heap
page read and write
1214000
heap
page read and write
7D3C000
heap
page read and write
14C7000
heap
page read and write
2E58000
trusted library allocation
page read and write
D67000
heap
page read and write
5CC000
stack
page read and write
4CE1000
heap
page read and write
1D41CF20000
heap
page read and write
1055000
heap
page read and write
7CED000
heap
page read and write
8153000
heap
page read and write
4C61000
heap
page read and write
1214000
heap
page read and write
4A70000
direct allocation
page read and write
E13000
heap
page read and write
D6B000
stack
page read and write
CD0000
unkown
page execute and write copy
442F000
stack
page read and write
136B000
heap
page read and write
7DE7000
heap
page read and write
5120000
direct allocation
page execute and read and write
48DE000
stack
page read and write
4CE1000
heap
page read and write
7DE5000
heap
page read and write
101B000
heap
page read and write
773000
unkown
page readonly
12FE000
stack
page read and write
7C68000
heap
page read and write
2C60000
heap
page execute and read and write
7CEA000
heap
page read and write
1B44000
heap
page read and write
3905000
heap
page read and write
4981000
heap
page read and write
4C90000
direct allocation
page execute and read and write
284B17EF000
heap
page read and write
2EEF000
stack
page read and write
1384000
heap
page read and write
E50000
heap
page read and write
7D0C000
heap
page read and write
7DC8000
heap
page read and write
8F2000
unkown
page execute and read and write
4DC0000
direct allocation
page read and write
7E1000
unkown
page execute and write copy
2DE0000
heap
page read and write
1200000
heap
page read and write
6D30000
heap
page read and write
4D51000
heap
page read and write
8157000
heap
page read and write
4D30000
direct allocation
page execute and read and write
4DC0000
direct allocation
page read and write
787F000
stack
page read and write
4DD1000
heap
page read and write
4F80000
direct allocation
page execute and read and write
7C6C000
heap
page read and write
4DD1000
heap
page read and write
67B000
unkown
page execute and read and write
DB6000
unkown
page execute and write copy
7CDB000
heap
page read and write
35CE000
stack
page read and write
4DD1000
heap
page read and write
13A4000
heap
page read and write
7947000
heap
page read and write
EF7000
heap
page read and write
51A0000
direct allocation
page execute and read and write
4981000
heap
page read and write
7DF1000
heap
page read and write
7CDB000
heap
page read and write
32DA000
heap
page read and write
11B7000
heap
page read and write
88A2FFF000
stack
page read and write
7CFE000
heap
page read and write
13A4000
heap
page read and write
96C000
unkown
page read and write
81A9000
heap
page read and write
7D0E000
heap
page read and write
1214000
heap
page read and write
5010000
direct allocation
page execute and read and write
36C0000
heap
page read and write
8153000
heap
page read and write
4C61000
heap
page read and write
1040000
heap
page read and write
7D0C000
heap
page read and write
792E000
heap
page read and write
7CE1000
heap
page read and write
7CE7000
heap
page read and write
2E9A000
trusted library allocation
page read and write
C90000
direct allocation
page read and write
7DD6000
heap
page read and write
14D9000
heap
page read and write
4981000
heap
page read and write
4D51000
heap
page read and write
7DA3000
heap
page read and write
844000
heap
page read and write
7A00000
trusted library allocation
page read and write
4DD1000
heap
page read and write
B31000
unkown
page execute and read and write
1443000
heap
page read and write
4981000
heap
page read and write
7DA5000
heap
page read and write
DF5000
heap
page read and write
4D51000
heap
page read and write
7D14000
heap
page read and write
EAE000
stack
page read and write
7DE7000
heap
page read and write
2DE7000
heap
page read and write
4981000
heap
page read and write
38FE000
heap
page read and write
4981000
heap
page read and write
7D0C000
heap
page read and write
1D436E66000
heap
page execute and read and write
7D0F000
heap
page read and write
6A0000
unkown
page readonly
4C61000
heap
page read and write
13A4000
heap
page read and write
5340000
direct allocation
page execute and read and write
4B71000
heap
page read and write
15F0000
heap
page read and write
815B000
heap
page read and write
14D9000
heap
page read and write
3DEE000
stack
page read and write
7CE6000
heap
page read and write
38EF000
stack
page read and write
38B7000
heap
page read and write
7D0F000
heap
page read and write
8E8000
unkown
page execute and read and write
1195000
heap
page read and write
1477000
heap
page read and write
7CAA000
heap
page read and write
7FC9000
heap
page read and write
908000
unkown
page execute and read and write
A20000
unkown
page execute and read and write
31AE000
stack
page read and write
7CE8000
heap
page read and write
4C61000
heap
page read and write
82ED000
heap
page read and write
C854479000
stack
page read and write
2DBB000
stack
page read and write
753D000
stack
page read and write
930000
unkown
page readonly
7DF1000
heap
page read and write
7C6B000
heap
page read and write
7CEA000
heap
page read and write
91F000
unkown
page execute and read and write
4FB0000
direct allocation
page execute and read and write
5260000
direct allocation
page read and write
3B6F000
stack
page read and write
32C4000
heap
page read and write
F2C000
heap
page read and write
220E0000
heap
page read and write
D03000
heap
page read and write
C90000
direct allocation
page read and write
4D51000
heap
page read and write
14DC000
heap
page read and write
E6E000
heap
page read and write
2C80000
heap
page read and write
F40000
trusted library allocation
page read and write
C11000
unkown
page execute and read and write
7E02000
heap
page read and write
7CAB000
heap
page read and write
4D51000
heap
page read and write
434F000
stack
page read and write
7D26000
heap
page read and write
46FF000
stack
page read and write
7FCA000
heap
page read and write
797000
unkown
page readonly
3D5F000
stack
page read and write
284B19D5000
heap
page read and write
251F7190000
trusted library allocation
page read and write
8171000
heap
page read and write
456F000
stack
page read and write
844000
heap
page read and write
8161000
heap
page read and write
50B0000
direct allocation
page execute and read and write
7D3C000
heap
page read and write
334E000
stack
page read and write
390B000
heap
page read and write
47F1000
heap
page read and write
11A4000
heap
page read and write
D6D000
heap
page read and write
7CB6000
heap
page read and write
4C61000
heap
page read and write
E0C000
heap
page read and write
6D31000
heap
page read and write
220D2000
heap
page read and write
CF6000
heap
page read and write
4C61000
heap
page read and write
7DE7000
heap
page read and write
13D9000
heap
page read and write
7944000
heap
page read and write
44BE000
stack
page read and write
391C000
heap
page read and write
DB6000
unkown
page execute and write copy
689E000
stack
page read and write
D0B000
heap
page read and write
B00000
unkown
page execute and read and write
1009000
heap
page read and write
7DE7000
heap
page read and write
891000
unkown
page execute and read and write
4DC0000
direct allocation
page read and write
7D3C000
heap
page read and write
7C0000
unkown
page readonly
DCD000
heap
page read and write
7C69000
heap
page read and write
10EF000
stack
page read and write
4981000
heap
page read and write
1114000
heap
page read and write
7CE4000
heap
page read and write
498F000
stack
page read and write
5240000
direct allocation
page execute and read and write
73C000
unkown
page readonly
4DD1000
heap
page read and write
7CED000
heap
page read and write
1384000
heap
page read and write
2EB0000
direct allocation
page read and write
7D26000
heap
page read and write
4A80000
heap
page read and write
7CC1000
heap
page read and write
7DF3000
heap
page read and write
DBA000
unkown
page execute and write copy
3306000
heap
page read and write
147F000
stack
page read and write
EF0000
direct allocation
page read and write
4D10000
direct allocation
page execute and read and write
7FF0000
trusted library allocation
page read and write
7CDB000
heap
page read and write
8F7000
stack
page read and write
38AF000
stack
page read and write
88C000
unkown
page read and write
7DC4000
heap
page read and write
8153000
heap
page read and write
D1D000
heap
page read and write
7CDD000
heap
page read and write
7D3C000
heap
page read and write
4ACF000
stack
page read and write
47F0000
heap
page read and write
7CCC000
heap
page read and write
E84000
heap
page read and write
932000
unkown
page readonly
3EDE000
stack
page read and write
7C68000
heap
page read and write
5230000
direct allocation
page execute and read and write
14D1000
heap
page read and write
4981000
heap
page read and write
51C0000
direct allocation
page execute and read and write
8F4000
unkown
page execute and read and write
8050000
trusted library allocation
page read and write
1020000
heap
page read and write
4C80000
direct allocation
page execute and read and write
E60000
heap
page read and write
4981000
heap
page read and write
8171000
heap
page read and write
CFC000
stack
page read and write
415E000
stack
page read and write
C20000
unkown
page execute and write copy
5310000
direct allocation
page execute and read and write
7CDB000
heap
page read and write
7E16000
heap
page read and write
7D3C000
heap
page read and write
5100000
direct allocation
page execute and read and write
8DA000
unkown
page execute and read and write
96F000
unkown
page read and write
7CF2000
heap
page read and write
974000
unkown
page execute and read and write
50A0000
direct allocation
page execute and read and write
3910000
heap
page read and write
7C90000
trusted library allocation
page read and write
32AE000
stack
page read and write
3500000
heap
page read and write
4981000
heap
page read and write
7CB5000
heap
page read and write
930000
unkown
page readonly
701000
unkown
page execute and read and write
47F1000
heap
page read and write
390C000
heap
page read and write
406F000
stack
page read and write
F02000
heap
page read and write
484F000
stack
page read and write
E66000
unkown
page execute and write copy
8EC000
unkown
page execute and read and write
7CCD000
heap
page read and write
4DD1000
heap
page read and write
14DC000
heap
page read and write
7D19000
heap
page read and write
7FF0000
trusted library allocation
page read and write
1384000
heap
page read and write
4981000
heap
page read and write
F00000
trusted library allocation
page read and write
4F50000
direct allocation
page execute and read and write
DBF000
heap
page read and write
7DBC000
heap
page read and write
4CE1000
heap
page read and write
11D0000
heap
page read and write
1C150000
trusted library allocation
page read and write
B40000
unkown
page execute and write copy
14C0000
direct allocation
page read and write
13A4000
heap
page read and write
2C9E000
stack
page read and write
11BA000
heap
page read and write
1D4202C3000
trusted library allocation
page read and write
14BA000
heap
page read and write
4DC0000
direct allocation
page read and write
F15000
heap
page read and write
7DE7000
heap
page read and write
7C8B000
heap
page read and write
3A7F000
stack
page read and write
7CEA000
heap
page read and write
1D42F0D5000
trusted library allocation
page read and write
4C90000
direct allocation
page execute and read and write
4DD1000
heap
page read and write
7DE5000
heap
page read and write
7D36000
heap
page read and write
7CFC000
heap
page read and write
7C90000
trusted library allocation
page read and write
4DD1000
heap
page read and write
4DD1000
heap
page read and write
3905000
heap
page read and write
7CB5000
heap
page read and write
8156000
heap
page read and write
4C61000
heap
page read and write
7DE3000
heap
page read and write
731000
unkown
page execute read
7DF3000
heap
page read and write
7CE6000
heap
page read and write
52C0000
direct allocation
page execute and read and write
DE5000
heap
page read and write
7D0F000
heap
page read and write
5350000
direct allocation
page execute and read and write
4D51000
heap
page read and write
7DE2000
heap
page read and write
7CFF000
heap
page read and write
7E0000
unkown
page readonly
8161000
heap
page read and write
DF4000
heap
page read and write
79D000
unkown
page read and write
890000
unkown
page readonly
80D3000
heap
page read and write
7D3C000
heap
page read and write
1127000
heap
page read and write
7D91000
heap
page read and write
C85437F000
stack
page read and write
3A2E000
stack
page read and write
7CFD000
heap
page read and write
7E1000
unkown
page execute and write copy
11BA000
heap
page read and write
4981000
heap
page read and write
11C0000
heap
page read and write
220D4000
heap
page read and write
47F1000
heap
page read and write
47F1000
heap
page read and write
7CB5000
heap
page read and write
1114000
heap
page read and write
7DC5000
heap
page read and write
8240000
trusted library allocation
page read and write
4981000
heap
page read and write
4C61000
heap
page read and write
33EF000
stack
page read and write
133D000
stack
page read and write
AA0000
heap
page read and write
1124000
heap
page read and write
1447000
heap
page read and write
11A4000
heap
page read and write
7CB4000
heap
page read and write
447F000
stack
page read and write
4DC0000
direct allocation
page read and write
1466000
heap
page read and write
4DD1000
heap
page read and write
5040000
direct allocation
page execute and read and write
81A1000
heap
page read and write
C3F000
unkown
page execute and write copy
2EEF000
stack
page read and write
284B1790000
heap
page read and write
43DE000
stack
page read and write
F1B000
heap
page read and write
E34000
heap
page read and write
EB9000
heap
page read and write
DA0000
heap
page read and write
771000
unkown
page write copy
284B318A000
heap
page read and write
7D3C000
heap
page read and write
7CAA000
heap
page read and write
33BC000
heap
page read and write
7A00000
trusted library allocation
page read and write
D13000
heap
page read and write
7CDB000
heap
page read and write
1214000
heap
page read and write
7DE5000
heap
page read and write
14BA000
heap
page read and write
4D51000
heap
page read and write
2817D000
heap
page read and write
1D420320000
trusted library allocation
page read and write
7CEB000
heap
page read and write
AF6000
unkown
page execute read
4DC0000
direct allocation
page read and write
1441000
heap
page read and write
220D6000
heap
page read and write
3CFF000
stack
page read and write
4C61000
heap
page read and write
1214000
heap
page read and write
112A000
heap
page read and write
3A2F000
stack
page read and write
7DCB000
heap
page read and write
1490000
remote allocation
page read and write
432E000
stack
page read and write
7C8B000
heap
page read and write
7FF0000
trusted library allocation
page read and write
EF0000
direct allocation
page read and write
14D9000
heap
page read and write
2D3F000
stack
page read and write
1280000
heap
page read and write
11B0000
heap
page read and write
1384000
heap
page read and write
144C000
heap
page read and write
611000
unkown
page execute and write copy
8EE000
unkown
page execute and read and write
7D07000
heap
page read and write
7CB5000
heap
page read and write
1340000
direct allocation
page read and write
1D420A00000
trusted library allocation
page read and write
1D4202C7000
trusted library allocation
page read and write
C85487E000
stack
page read and write
D6E000
heap
page read and write
CC2000
heap
page read and write
8181000
heap
page read and write
1D420334000
trusted library allocation
page read and write
95B000
unkown
page execute and read and write
311E000
stack
page read and write
1443000
heap
page read and write
51E0000
direct allocation
page read and write
7CDF000
heap
page read and write
4DE0000
trusted library allocation
page read and write
4981000
heap
page read and write
4B71000
heap
page read and write
53D2000
heap
page read and write
E63000
heap
page read and write
D37000
stack
page read and write
7CFF000
heap
page read and write
5261000
direct allocation
page read and write
76D000
unkown
page write copy
45FE000
stack
page read and write
4B71000
heap
page read and write
1D42EE02000
trusted library allocation
page read and write
BC9000
unkown
page execute and read and write
BB0000
unkown
page execute and read and write
1197000
heap
page read and write
2DED000
heap
page read and write
10EA000
heap
page read and write
284B3183000
heap
page read and write
5230000
direct allocation
page execute and read and write
3B1E000
stack
page read and write
795D000
heap
page read and write
487E000
stack
page read and write
284B3184000
heap
page read and write
1D41CEC0000
trusted library allocation
page read and write
7CC7000
heap
page read and write
4DD1000
heap
page read and write
D46000
heap
page read and write
3FBE000
stack
page read and write
2DB0000
trusted library allocation
page read and write
446E000
stack
page read and write
7DD0000
heap
page read and write
1444000
heap
page read and write
7DE5000
heap
page read and write
8050000
trusted library allocation
page read and write
14D1000
heap
page read and write
7CBA000
heap
page read and write
1125000
heap
page read and write
4FF8000
direct allocation
page read and write
466F000
stack
page read and write
7DF1000
heap
page read and write
13A4000
heap
page read and write
51D0000
direct allocation
page execute and read and write
82FD000
heap
page read and write
7CE7000
heap
page read and write
2EB0000
direct allocation
page read and write
316E000
heap
page read and write
111C000
heap
page read and write
7AFD000
stack
page read and write
11A4000
heap
page read and write
4981000
heap
page read and write
7CED000
heap
page read and write
1D42030A000
trusted library allocation
page read and write
7CE6000
heap
page read and write
13A4000
heap
page read and write
F15000
direct allocation
page read and write
5230000
direct allocation
page execute and read and write
32FF000
stack
page read and write
7C6B000
heap
page read and write
780000
unkown
page readonly
D7B000
heap
page read and write
50F0000
direct allocation
page execute and read and write
E70000
heap
page read and write
38D5000
heap
page read and write
7D15000
heap
page read and write
11A4000
heap
page read and write
8240000
trusted library allocation
page read and write
7DE5000
heap
page read and write
4ED5000
heap
page read and write
4981000
heap
page read and write
82FB000
heap
page read and write
4DD1000
heap
page read and write
3905000
heap
page read and write
4A6F000
stack
page read and write
3905000
heap
page read and write
4C61000
heap
page read and write
E8E000
heap
page read and write
7E12000
heap
page read and write
C79000
unkown
page execute and read and write
1447000
heap
page read and write
1210000
heap
page read and write
4D51000
heap
page read and write
380F000
stack
page read and write
7C6A000
heap
page read and write
8171000
heap
page read and write
47F1000
heap
page read and write
EB2000
unkown
page write copy
2DC0000
direct allocation
page read and write
316F000
stack
page read and write
4E50000
trusted library allocation
page read and write
1214000
heap
page read and write
284B3186000
heap
page read and write
962000
unkown
page execute and read and write
844000
heap
page read and write
47F1000
heap
page read and write
14BA000
heap
page read and write
7C5F000
stack
page read and write
4E9E000
stack
page read and write
7FBD000
heap
page read and write
C20000
unkown
page execute and read and write
11A4000
heap
page read and write
4DD1000
heap
page read and write
394F000
heap
page read and write
78FE000
stack
page read and write
1185000
heap
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
4981000
heap
page read and write
41AF000
stack
page read and write
7C6D000
heap
page read and write
10F0000
heap
page read and write
50B0000
direct allocation
page execute and read and write
1384000
heap
page read and write
399F000
stack
page read and write
52A0000
heap
page read and write
7DF3000
heap
page read and write
4C61000
heap
page read and write
4C60000
heap
page read and write
36E0000
direct allocation
page read and write
284B3188000
heap
page read and write
812D000
heap
page read and write
700000
unkown
page readonly
7DFD000
heap
page read and write
5200000
direct allocation
page execute and read and write
774000
unkown
page readonly
1492000
heap
page read and write
8172000
heap
page read and write
7DCF000
heap
page read and write
11A4000
heap
page read and write
4D51000
heap
page read and write
7FC1000
heap
page read and write
143F000
heap
page read and write
3ACE000
stack
page read and write
39EF000
stack
page read and write
4C61000
heap
page read and write
38D5000
heap
page read and write
3E9F000
stack
page read and write
14C2000
heap
page read and write
792000
unkown
page write copy
C853FB3000
stack
page read and write
139B000
heap
page read and write
333E000
stack
page read and write
32EE000
stack
page read and write
3A8F000
stack
page read and write
7BBE000
stack
page read and write
11A4000
heap
page read and write
1D41FE1B000
trusted library allocation
page read and write
7CE6000
heap
page read and write
2C00000
direct allocation
page read and write
C853FFE000
stack
page read and write
321F000
stack
page read and write
7DE7000
heap
page read and write
780000
unkown
page readonly
220F3000
heap
page read and write
7CE6000
heap
page read and write
13A4000
heap
page read and write
4800000
heap
page read and write
7DCA000
heap
page read and write
3CEE000
stack
page read and write
7DD0000
heap
page read and write
1384000
heap
page read and write
817D000
heap
page read and write
7E33000
heap
page read and write
13A4000
heap
page read and write
7CE6000
heap
page read and write
46AF000
stack
page read and write
774000
unkown
page execute and read and write
7D3C000
heap
page read and write
7E12000
heap
page read and write
1214000
heap
page read and write
7CE4000
heap
page read and write
38FE000
heap
page read and write
4C61000
heap
page read and write
7C90000
trusted library allocation
page read and write
4D51000
heap
page read and write
701000
unkown
page execute and write copy
4DD1000
heap
page read and write
1443000
heap
page read and write
2F15000
heap
page read and write
1214000
heap
page read and write
1384000
heap
page read and write
A8E000
stack
page read and write
1D4202F1000
trusted library allocation
page read and write
C854A7B000
stack
page read and write
610000
unkown
page readonly
79D000
unkown
page write copy
7FB2000
heap
page read and write
920000
unkown
page execute and write copy
145B000
heap
page read and write
1384000
heap
page read and write
7D1E000
heap
page read and write
7D87000
heap
page read and write
740000
heap
page read and write
CCE000
unkown
page execute and write copy
42EF000
stack
page read and write
7DB1000
heap
page read and write
D70000
heap
page read and write
1119000
heap
page read and write
251F7190000
trusted library allocation
page read and write
53C0000
direct allocation
page execute and read and write
10F9000
heap
page read and write
4C61000
heap
page read and write
7D0E000
heap
page read and write
7CB4000
heap
page read and write
4981000
heap
page read and write
767000
unkown
page readonly
3F2E000
stack
page read and write
35BE000
stack
page read and write
2E86000
trusted library allocation
page read and write
361E000
stack
page read and write
7C90000
trusted library allocation
page read and write
88F000
unkown
page read and write
3165000
heap
page read and write
7CEA000
heap
page read and write
13A4000
heap
page read and write
844000
heap
page read and write
D4C000
heap
page read and write
4DD1000
heap
page read and write
C20000
unkown
page execute and write copy
36AE000
stack
page read and write
4C61000
heap
page read and write
4DD1000
heap
page read and write
4CE1000
heap
page read and write
11B2000
heap
page read and write
400000
unkown
page readonly
51D0000
direct allocation
page execute and read and write
679000
unkown
page read and write
7CEA000
heap
page read and write
2BCF000
stack
page read and write
8171000
heap
page read and write
52A0000
direct allocation
page execute and read and write
7D3C000
heap
page read and write
251F7190000
trusted library allocation
page read and write
814A000
heap
page read and write
5301000
direct allocation
page read and write
7DE7000
heap
page read and write
2C10000
trusted library allocation
page execute and read and write
14DC000
heap
page read and write
815F000
heap
page read and write
7E17000
heap
page read and write
1090000
trusted library allocation
page read and write
220E2000
heap
page read and write
C85457F000
stack
page read and write
7DC2000
heap
page read and write
4C61000
heap
page read and write
412000
unkown
page readonly
7DC6000
heap
page read and write
2CB1000
trusted library allocation
page read and write
505F000
stack
page read and write
11C1000
heap
page read and write
27AD000
stack
page read and write
7CF7000
heap
page read and write
7DF3000
heap
page read and write
7DBA000
heap
page read and write
53CF000
heap
page read and write
7CA1000
heap
page read and write
844000
heap
page read and write
7CEF000
heap
page read and write
5120000
direct allocation
page execute and read and write
112E000
heap
page read and write
5180000
direct allocation
page execute and read and write
4A70000
direct allocation
page read and write
1B40000
heap
page read and write
7C90000
trusted library allocation
page read and write
11A4000
heap
page read and write
844000
heap
page read and write
7E0000
unkown
page read and write
7DF3000
heap
page read and write
8153000
heap
page read and write
7CE6000
heap
page read and write
1214000
heap
page read and write
E50000
unkown
page readonly
7CB4000
heap
page read and write
7CC7000
heap
page read and write
37C8000
heap
page read and write
8172000
heap
page read and write
5130000
direct allocation
page execute and read and write
1449000
heap
page read and write
EC2000
heap
page read and write
52FE000
stack
page read and write
2DAF000
stack
page read and write
7CAA000
heap
page read and write
7C90000
trusted library allocation
page read and write
7C8B000
heap
page read and write
1D42EDE1000
trusted library allocation
page read and write
115E000
heap
page read and write
1D41CF10000
trusted library allocation
page read and write
7CB4000
heap
page read and write
53F0000
direct allocation
page execute and read and write
F01000
heap
page read and write
10FD000
heap
page read and write
14BE000
heap
page read and write
8240000
trusted library allocation
page read and write
143F000
heap
page read and write
EB4000
unkown
page write copy
797000
unkown
page readonly
2E9B000
stack
page read and write
4981000
heap
page read and write
39E0000
remote allocation
page read and write
32EE000
stack
page read and write
5040000
direct allocation
page execute and read and write
53BD000
stack
page read and write
1040000
heap
page read and write
2E5E000
stack
page read and write
CB9000
unkown
page execute and read and write
3923000
heap
page read and write
7CDB000
heap
page read and write
7D6F000
stack
page read and write
142D000
heap
page read and write
7C8B000
heap
page read and write
4DD1000
heap
page read and write
7CE4000
heap
page read and write
C2DA0F3000
stack
page read and write
E69000
unkown
page execute and read and write
AC6000
unkown
page execute read
AC6000
unkown
page execute read
1384000
heap
page read and write
7CDD000
heap
page read and write
4B71000
heap
page read and write
4DD1000
heap
page read and write
7DBC000
heap
page read and write
13A4000
heap
page read and write
AF6000
unkown
page execute read
7D3C000
heap
page read and write
7D60000
trusted library allocation
page read and write
401000
unkown
page execute read
7CB5000
heap
page read and write
7E02000
heap
page read and write
1D42031E000
trusted library allocation
page read and write
7CDE000
heap
page read and write
529D000
stack
page read and write
461F000
stack
page read and write
1340000
direct allocation
page read and write
D6E000
heap
page read and write
5330000
direct allocation
page execute and read and write
4981000
heap
page read and write
7FB6000
heap
page read and write
220E8000
heap
page read and write
7CFC000
heap
page read and write
7CAA000
heap
page read and write
817D000
heap
page read and write
D13000
heap
page read and write
BFA000
unkown
page execute and read and write
CB0000
direct allocation
page read and write
7DF1000
heap
page read and write
31FE000
stack
page read and write
8181000
heap
page read and write
10F3000
trusted library allocation
page execute and read and write
1181000
heap
page read and write
CA0000
heap
page read and write
771000
unkown
page write copy
4981000
heap
page read and write
13A4000
heap
page read and write
397E000
stack
page read and write
143F000
heap
page read and write
7DC0000
trusted library allocation
page read and write
5070000
direct allocation
page execute and read and write
2FFB000
heap
page read and write
8153000
heap
page read and write
4981000
heap
page read and write
7A10000
remote allocation
page read and write
5110000
direct allocation
page execute and read and write
251F7590000
trusted library allocation
page read and write
F27000
heap
page read and write
420F000
stack
page read and write
3FDF000
stack
page read and write
5230000
direct allocation
page execute and read and write
50D0000
direct allocation
page execute and read and write
700000
unkown
page readonly
2FB0000
trusted library allocation
page read and write
51E8000
direct allocation
page read and write
1D41CE80000
heap
page read and write
3CAF000
stack
page read and write
844000
heap
page read and write
7CDD000
heap
page read and write
2C6F000
stack
page read and write
88A277D000
stack
page read and write
7D3C000
heap
page read and write
51D0000
direct allocation
page execute and read and write
4B71000
heap
page read and write
D1F000
heap
page read and write
7C6A000
heap
page read and write
7DCB000
heap
page read and write
7CEA000
heap
page read and write
251F7190000
trusted library allocation
page read and write
167E000
stack
page read and write
4DC0000
direct allocation
page read and write
7D21000
heap
page read and write
F10000
direct allocation
page read and write
1091000
heap
page read and write
7CC0000
heap
page read and write
4D51000
heap
page read and write
7FF0000
trusted library allocation
page read and write
7C9E000
heap
page read and write
3333000
heap
page read and write
4B1F000
stack
page read and write
10EE000
heap
page read and write
7DDB000
heap
page read and write
CDC000
stack
page read and write
4DD1000
heap
page read and write
50A0000
direct allocation
page execute and read and write
53F0000
direct allocation
page execute and read and write
7CE7000
heap
page read and write
7CF0000
heap
page read and write
1D41CE20000
heap
page read and write
7DBC000
heap
page read and write
7938000
heap
page read and write
220C6000
heap
page read and write
4981000
heap
page read and write
CD1000
unkown
page execute and write copy
767000
unkown
page readonly
5120000
direct allocation
page execute and read and write
7D3C000
heap
page read and write
88A2784000
stack
page read and write
13DE000
heap
page read and write
3F8F000
stack
page read and write
1D41CED5000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
11A4000
heap
page read and write
91C000
unkown
page execute and read and write
1384000
heap
page read and write
CD7000
heap
page read and write
4DD1000
heap
page read and write
7DDB000
heap
page read and write
8171000
heap
page read and write
EC0000
heap
page read and write
EB5000
unkown
page read and write
BB0000
heap
page read and write
5050000
direct allocation
page execute and read and write
512B000
stack
page read and write
456E000
stack
page read and write
7DBC000
heap
page read and write
34F0000
direct allocation
page execute and read and write
7D00000
heap
page read and write
4DD1000
heap
page read and write
1214000
heap
page read and write
312F000
stack
page read and write
F11000
heap
page read and write
D03000
heap
page read and write
4C61000
heap
page read and write
7DBA000
heap
page read and write
6276000
heap
page read and write
137E000
stack
page read and write
7DF1000
heap
page read and write
4981000
heap
page read and write
7CF4000
heap
page read and write
339E000
stack
page read and write
13A4000
heap
page read and write
1384000
heap
page read and write
771000
unkown
page write copy
4C61000
heap
page read and write
1195000
heap
page read and write
47F1000
heap
page read and write
284B17D7000
heap
page read and write
6D3E000
heap
page read and write
362F000
stack
page read and write
10F0000
direct allocation
page read and write
7CB4000
heap
page read and write
820000
heap
page read and write
4C61000
heap
page read and write
D3E000
heap
page read and write
8240000
trusted library allocation
page read and write
4D60000
direct allocation
page execute and read and write
4B71000
heap
page read and write
7CE6000
heap
page read and write
8171000
heap
page read and write
4981000
heap
page read and write
14C7000
heap
page read and write
4981000
heap
page read and write
8172000
heap
page read and write
4C90000
direct allocation
page execute and read and write
37EE000
stack
page read and write
4981000
heap
page read and write
8172000
heap
page read and write
51A0000
direct allocation
page execute and read and write
438E000
stack
page read and write
10F4000
trusted library allocation
page read and write
7941000
heap
page read and write
4DD1000
heap
page read and write
479E000
stack
page read and write
4F80000
direct allocation
page execute and read and write
7DD0000
heap
page read and write
13A4000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
3BAE000
stack
page read and write
1003000
heap
page read and write
1340000
direct allocation
page read and write
32E4000
heap
page read and write
E63000
unkown
page execute and write copy
7E1000
unkown
page execute and read and write
1B2B000
heap
page execute and read and write
8171000
heap
page read and write
96F000
unkown
page read and write
844000
heap
page read and write
4C61000
heap
page read and write
3ADF000
stack
page read and write
7C9E000
heap
page read and write
1384000
heap
page read and write
1214000
heap
page read and write
A12000
unkown
page execute and read and write
11B2000
heap
page read and write
CA0000
direct allocation
page read and write
4C61000
heap
page read and write
2C8E000
stack
page read and write
47F1000
heap
page read and write
430000
unkown
page read and write
C2DA3FB000
stack
page read and write
1F380091000
trusted library allocation
page read and write
4CE1000
heap
page read and write
1C051000
heap
page read and write
38EF000
stack
page read and write
4A70000
direct allocation
page read and write
4CE1000
heap
page read and write
5290000
direct allocation
page execute and read and write
F1B000
heap
page read and write
D54000
heap
page read and write
DAD000
unkown
page execute and read and write
38B8000
heap
page read and write
14C2000
heap
page read and write
2CE0000
heap
page read and write
3DEF000
stack
page read and write
41FE000
stack
page read and write
7CD3000
heap
page read and write
349F000
stack
page read and write
28182000
heap
page read and write
EA0000
unkown
page readonly
CD6000
unkown
page execute and write copy
844000
heap
page read and write
C8543FE000
stack
page read and write
6270000
heap
page read and write
D60000
heap
page read and write
7B5E000
stack
page read and write
7FAE000
stack
page read and write
7DF3000
heap
page read and write
7CE4000
heap
page read and write
13D2000
heap
page read and write
11B7000
heap
page read and write
3BE0000
heap
page read and write
14C0000
direct allocation
page read and write
FC9000
heap
page read and write
4CE1000
heap
page read and write
EF0000
direct allocation
page read and write
4DC0000
direct allocation
page read and write
CD3000
unkown
page execute and write copy
13A4000
heap
page read and write
7DC8000
heap
page read and write
4DD1000
heap
page read and write
EF0000
direct allocation
page read and write
11A4000
heap
page read and write
77AF000
stack
page read and write
2C00000
direct allocation
page read and write
7C90000
trusted library allocation
page read and write
50F0000
direct allocation
page execute and read and write
1214000
heap
page read and write
8153000
heap
page read and write
7C9E000
heap
page read and write
D53000
heap
page read and write
98C000
stack
page read and write
38D5000
heap
page read and write
7E1C000
heap
page read and write
38AF000
heap
page read and write
7D3F000
heap
page read and write
7CF4000
heap
page read and write
A28000
heap
page read and write
139F000
heap
page read and write
5200000
direct allocation
page execute and read and write
4981000
heap
page read and write
There are 3481 hidden memdumps, click here to show them.