IOC Report
3_#U0420#U0430#U0445#U0443#U043d#U043e#U043a.pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
3_#U0420#U0430#U0445#U0443#U043d#U043e#U043a.pdf.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Exel.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: Remote Utilities - Host 7.2 installation package, Comments: This installer contains the logic and data to install Remote Utilities - Host 7.2, Keywords: Installer,MSI,Database, Subject: Remote Utilities - Host 7.2, Author: Remote Utilities Pty (Cy) Ltd., Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2021 - Premier Edition with Virtualization Pack 27, Last Saved Time/Date: Wed Oct 25 17:17:52 2023, Create Time/Date: Wed Oct 25 17:17:52 2023, Last Printed: Wed Oct 25 17:17:52 2023, Revision Number: {BFB6CB81-8A2D-41FC-A737-5CF8EB370093}, Code page: 1252, Template: Intel;1033
dropped
malicious
C:\Config.Msi\49a7b8.rbs
data
modified
C:\Program Files (x86)\Remote Utilities - Host\EULA.rtf
Rich Text Format data, version 1, ANSI, code page 1252
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\common\MessageBox.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\common\VPDAgent.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\common\emf2pdf.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\common\fwproc.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\common\pdfout.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\common\printer.ico
MS Windows icon resource - 6 icons, 32x32, 4 bits/pixel, 16x16, 4 bits/pixel
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\common\progressbar.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\common\properties.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\common\rupd.lng
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\common\srvinst.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\common\vpd_sdk.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\common\vpdisp.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\msvcp120.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\msvcr120.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\ntprint.inf
Windows setup INFormation
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\printer.ico
MS Windows icon resource - 6 icons, 32x32, 4 bits/pixel, 16x16, 4 bits/pixel
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\rupd.gpd
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\rupd.ini
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\rupd.lng
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\rupdpm.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\rupdui.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\setupdrv.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\stdnames_vpd.gpd
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\unidrv_rupd.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\unidrv_rupd.hlp
MS Windows 3.1 help, Tue Apr 17 13:11:56 2001, 21225 bytes
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\unidrvui_rupd.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\unires_vpd.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\vccorlib120.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\msvcp120.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\msvcr120.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\ntprint.inf
Windows setup INFormation
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\printer.ico
MS Windows icon resource - 6 icons, 32x32, 4 bits/pixel, 16x16, 4 bits/pixel
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\rupd.gpd
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\rupd.ini
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\rupd.lng
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\rupdpm.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\rupdui.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\setupdrv.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\stdnames_vpd.gpd
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\unidrv_rupd.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\unidrv_rupd.hlp
MS Windows 3.1 help, Tue Apr 17 13:11:56 2001, 21225 bytes
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\unidrvui_rupd.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\unires_vpd.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\vccorlib120.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\eventmsg.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\libeay32.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\ssleay32.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\vp8decoder.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\vp8encoder.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\webmmux.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\webmvorbisdecoder.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Remote Utilities - Host\webmvorbisencoder.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Remote Utilities\Logs\rut_log_2024-02.html
HTML document, Unicode text, UTF-8 text, with CR line terminators
dropped
C:\ProgramData\Remote Utilities\install.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Remote Utilities\msi\70220_{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}\Exel.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: Remote Utilities - Host 7.2 installation package, Comments: This installer contains the logic and data to install Remote Utilities - Host 7.2, Keywords: Installer,MSI,Database, Subject: Remote Utilities - Host 7.2, Author: Remote Utilities Pty (Cy) Ltd., Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2021 - Premier Edition with Virtualization Pack 27, Last Saved Time/Date: Wed Oct 25 17:17:52 2023, Create Time/Date: Wed Oct 25 17:17:52 2023, Last Printed: Wed Oct 25 17:17:52 2023, Revision Number: {BFB6CB81-8A2D-41FC-A737-5CF8EB370093}, Code page: 1252, Template: Intel;1033
dropped
C:\Windows\Installer\49a7b6.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: Remote Utilities - Host 7.2 installation package, Comments: This installer contains the logic and data to install Remote Utilities - Host 7.2, Keywords: Installer,MSI,Database, Subject: Remote Utilities - Host 7.2, Author: Remote Utilities Pty (Cy) Ltd., Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2021 - Premier Edition with Virtualization Pack 27, Last Saved Time/Date: Wed Oct 25 17:17:52 2023, Create Time/Date: Wed Oct 25 17:17:52 2023, Last Printed: Wed Oct 25 17:17:52 2023, Revision Number: {BFB6CB81-8A2D-41FC-A737-5CF8EB370093}, Code page: 1252, Template: Intel;1033
dropped
C:\Windows\Installer\49a7b9.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: Remote Utilities - Host 7.2 installation package, Comments: This installer contains the logic and data to install Remote Utilities - Host 7.2, Keywords: Installer,MSI,Database, Subject: Remote Utilities - Host 7.2, Author: Remote Utilities Pty (Cy) Ltd., Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2021 - Premier Edition with Virtualization Pack 27, Last Saved Time/Date: Wed Oct 25 17:17:52 2023, Create Time/Date: Wed Oct 25 17:17:52 2023, Last Printed: Wed Oct 25 17:17:52 2023, Revision Number: {BFB6CB81-8A2D-41FC-A737-5CF8EB370093}, Code page: 1252, Template: Intel;1033
dropped
C:\Windows\Installer\MSIAB6F.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIACD8.tmp
data
dropped
C:\Windows\Installer\SourceHash{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}\ARPPRODUCTICON.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}\UNINST_Uninstall_R_3B1E3C8B7D0945898DA82CEEED02F0C7.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}\en_server_settings_E3BFC76BE38F4CF79D2ED7163B7DECEE.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}\en_server_start_85DB64512C79429FA70AC6C0611579DD.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}\en_server_stop_B603677802D142C98E7A415B72132E14.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\26C212D9399727259664BDFCA073966E_C5856A5EB1E3B74AE8014850A678CDBF
data
dropped
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3EC49180A59F0C351C30F112AD97CFA5_ED80F76A55EEDF047A88FD3F37D62FA3
data
dropped
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\26C212D9399727259664BDFCA073966E_C5856A5EB1E3B74AE8014850A678CDBF
data
dropped
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3EC49180A59F0C351C30F112AD97CFA5_ED80F76A55EEDF047A88FD3F37D62FA3
data
dropped
C:\Windows\Temp\~DF10BD94535F44088B.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF43AE85119F93081A.TMP
data
dropped
C:\Windows\Temp\~DF46A59DA49B45DF44.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF529C0FE4C5A9CE4B.TMP
data
dropped
C:\Windows\Temp\~DF70B43A60818B563C.TMP
data
dropped
C:\Windows\Temp\~DF8E23FC32B87CAA71.TMP
data
dropped
C:\Windows\Temp\~DF9FE2B93D9F6F7365.TMP
data
dropped
C:\Windows\Temp\~DFB588C3675999CB76.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFCE78CABB386C66F3.TMP
data
dropped
C:\Windows\Temp\~DFD5F4580B380072C8.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFDE25689DD43B2CB0.TMP
data
dropped
C:\Windows\Temp\~DFE4BF60F9C7AF91F3.TMP
Composite Document File V2 Document, Cannot read section info
dropped
There are 79 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\3_#U0420#U0430#U0445#U0443#U043d#U043e#U043a.pdf.exe
C:\Users\user\Desktop\3_#U0420#U0430#U0445#U0443#U043d#U043e#U043a.pdf.exe
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i Exel.msi /qn
malicious
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
malicious
C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe
C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe" -msi_copy "C:\Users\user\AppData\Local\Temp\Exel.msi
malicious
C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe
"C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe" /silentinstall
malicious
C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe
"C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe" /firewall
malicious
C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe
"C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe" /start
malicious
C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe
"C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe" -service
malicious
C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe
"C:\Program Files (x86)\Remote Utilities - Host\rutserv.exe" -firewall
malicious
C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe
C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe
malicious
C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe
"C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe" /tray
malicious
C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe
"C:\Program Files (x86)\Remote Utilities - Host\rfusclient.exe" /tray
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 494BECA00E3009394CA5F2713F238EA9
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.openssl.org/support/faq.html....................rbwb.rndC:HOMERANDFILEPRNG
unknown
https://www.remoteutilities.com/support/docs/e
unknown
https://www.remoteutilities.com/support/docs/
unknown
https://www.remoteutilities.com/tell-me-more.phpities.com/tell-me-more.phpet
unknown
http://www.openssl.org/V
unknown
https://www.remoteutilities.com/support/docs/s0
unknown
http://madExcept.comU
unknown
https://www.remoteutilities.com/support/docs/o0
unknown
https://www.remoteutilities.com/support/docs/rt/docs/r
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://www.remoteutilities.com/tell-me-more.phpet
unknown
http://www.indyproject.org/
unknown
https://www.remoteutilities.com/support/docs/0
unknown
https://www.remoteutilities.com/tell-me-more.phpB
unknown
http://www.symauth.com/cps0(
unknown
http://rmansys.ru/internet-id/
unknown
https://www.remoteutilities.com/tell-me-more.php...
unknown
http://www.openssl.org/support/faq.html
unknown
https://www.remoteutilities.com/index.php?src=app?src=app
unknown
https://www.remoteutilities.com/index.php?src=appx.php?src=app0
unknown
http://update.remoteutilities.net/upgrade.ini
unknown
https://www.remoteutilities.com/tell-me-more.php1
unknown
https://www.remoteutilities.com/tell-me-more.php.
unknown
http://sodipodi.sourceforge.net/DTD/sodipodi-0.dtd
unknown
http://www.symauth.com/rpa00
unknown
https://www.remoteutilities.com/index.php?src=app
unknown
https://www.remoteutilities.com/support/docs/t0
unknown
https://www.remoteutilities.com/tell-me-more.phpes.
unknown
https://www.remoteutilities.com/support/docs/connecting-over-the-internet/
unknown
https://www.remoteutilities.com/support/docs/rt/docs/
unknown
https://www.remoteutilities.com/tell-me-more.php
unknown
http://update.remoteutilities.net/upgrade_beta.ini
unknown
https://www.remoteutilities.com/tell-me-more.phpdo?
unknown
https://www.remoteutilities.com/tell-me-more.phpken
unknown
http://www.flexerasoftware.com0
unknown
http://www.inkscape.org/namespaces/inkscape
unknown
https://www.remoteutilities.com/support/docs/a0
unknown
https://www.remoteutilities.com/support/docs
unknown
https://www.remoteutilities.com/tell-me-more.phpities.com/tell-me-more.phpum
unknown
There are 29 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
id.remoteutilities.com
64.20.61.146
fp2e7a.wpc.phicdn.net
192.229.211.108
id72.remoteutilities.com
unknown

IPs

IP
Domain
Country
Malicious
101.99.94.54
unknown
Malaysia
malicious
77.105.132.70
unknown
Russian Federation
64.20.61.146
id.remoteutilities.com
United States
185.70.104.90
unknown
Russian Federation
66.23.226.254
unknown
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
notification
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
Security
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
General
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
CallbackSettings
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
FUSClientPath
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
InternetId
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
Certificates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
CalendarRecordSettings
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
General
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
General
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
Certificates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
notification
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
General
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Usoris\Remote Utilities Host\Host\Parameters
InternetId
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\49a7b8.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\49a7b8.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E45BAE6295648E74689FC47BF4E730EB
ADD21FF3AD83F6644B3E7657CAFE5583
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6364F69515D55F943B4B3F3C669ECD32
ADD21FF3AD83F6644B3E7657CAFE5583
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6364F69515D55F943B4B3F3C669ECD32
00000000000000000000000000000000
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6EDC4423414699340B5D245426472701
ADD21FF3AD83F6644B3E7657CAFE5583
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B296F791ACC797D4585ADE4002D2800D
ADD21FF3AD83F6644B3E7657CAFE5583
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\481CA97E83DA62B4980D577BEC1AF92A
ADD21FF3AD83F6644B3E7657CAFE5583
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\E081FFDBED9215946AE89615F366707B
ADD21FF3AD83F6644B3E7657CAFE5583
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B04AC0DFA70310942A95D53DA01D552C
ADD21FF3AD83F6644B3E7657CAFE5583
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Remote Utilities - Host\Printer\common\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Remote Utilities - Host\Printer\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Remote Utilities - Host\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Remote Utilities - Host\Printer\x64\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Remote Utilities - Host\Printer\x86\
HKEY_LOCAL_MACHINE\SYSTEM\Remote Utilities Host Installer
notification
HKEY_LOCAL_MACHINE\SYSTEM\Remote Utilities Host Installer
Security
HKEY_LOCAL_MACHINE\SYSTEM\Remote Utilities Host Installer
General
HKEY_LOCAL_MACHINE\SYSTEM\Remote Utilities Host Installer
CallbackSettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
RegOwner
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
RegCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
ProductID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\509B38EF4554FFD4794F292971C81B17
ADD21FF3AD83F6644B3E7657CAFE5583
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\ADD21FF3AD83F6644B3E7657CAFE5583
RMS
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\Features
RMS
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Windows\Installer\{3FF12DDA-38DA-466F-B4E3-6775ACEF5538}\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\ADD21FF3AD83F6644B3E7657CAFE5583\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583
ProductIcon
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\509B38EF4554FFD4794F292971C81B17
ADD21FF3AD83F6644B3E7657CAFE5583
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583\SourceList\Media
DiskPrompt
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\ADD21FF3AD83F6644B3E7657CAFE5583\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\25\417C44EB
@%systemroot%\system32\FirewallControlPanel.dll,-12122
There are 104 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
21F8000
direct allocation
page read and write
3711000
heap
page read and write
1244000
unkown
page read and write
2A51000
heap
page read and write
2AA1000
heap
page read and write
263B000
direct allocation
page read and write
3996000
direct allocation
page read and write
3847000
direct allocation
page read and write
193F000
stack
page read and write
16E4000
heap
page read and write
3811000
heap
page read and write
661E000
heap
page read and write
1FF9000
heap
page read and write
1DF4000
heap
page read and write
2035000
heap
page read and write
483000
unkown
page execute read
7EAF000
stack
page read and write
31D3000
direct allocation
page read and write
9DFE000
stack
page read and write
3711000
heap
page read and write
A3BF000
stack
page read and write
7DAE000
stack
page read and write
1D8D000
stack
page read and write
3390000
direct allocation
page read and write
1A6A21BF000
heap
page read and write
1DF4000
heap
page read and write
759E000
stack
page read and write
1249000
unkown
page read and write
2023000
heap
page read and write
C48D000
stack
page read and write
673F000
heap
page read and write
5710000
heap
page read and write
1A6A0108000
heap
page read and write
B80E000
stack
page read and write
1A6A41D4000
heap
page read and write
1A69E033000
heap
page read and write
311D000
stack
page read and write
1ED8000
heap
page read and write
2671000
direct allocation
page read and write
17D1000
heap
page read and write
1F6D000
heap
page read and write
1DF4000
heap
page read and write
1611000
unkown
page readonly
1A69E051000
heap
page read and write
1254000
unkown
page read and write
66CA000
heap
page read and write
3411000
direct allocation
page read and write
6418000
direct allocation
page read and write
6405000
heap
page read and write
631D000
stack
page read and write
5120000
heap
page read and write
203F000
heap
page read and write
64FE000
heap
page read and write
E65000
unkown
page read and write
1F96000
heap
page read and write
346B000
direct allocation
page read and write
1664000
heap
page read and write
17D7000
heap
page read and write
369F000
heap
page read and write
735F000
stack
page read and write
1DC4000
heap
page read and write
2695000
direct allocation
page read and write
1A69DFCE000
heap
page read and write
6700000
heap
page read and write
3694000
direct allocation
page read and write
1204F000
unkown
page read and write
672E000
heap
page read and write
B47E000
stack
page read and write
1DC4000
heap
page read and write
1A69DFA5000
heap
page read and write
26AB000
direct allocation
page read and write
3796000
direct allocation
page read and write
1A69E062000
heap
page read and write
8300000
heap
page read and write
1FC9000
heap
page read and write
2A51000
heap
page read and write
1A69E04F000
heap
page read and write
E5E000
unkown
page read and write
2155000
direct allocation
page read and write
31E2000
direct allocation
page read and write
3712000
heap
page read and write
16C1000
unkown
page readonly
3711000
heap
page read and write
125E000
unkown
page read and write
677F000
heap
page read and write
3711000
heap
page read and write
17BF000
heap
page read and write
11140000
unkown
page read and write
2176000
direct allocation
page read and write
1A69E062000
heap
page read and write
761E000
stack
page read and write
1A6A229E000
heap
page read and write
26C8000
direct allocation
page read and write
64F0000
heap
page read and write
5138000
heap
page read and write
17DB000
heap
page read and write
67FD000
stack
page read and write
1A6A41D6000
heap
page read and write
1FD9000
heap
page read and write
4CF0000
heap
page read and write
1803000
unkown
page readonly
1F15000
heap
page read and write
F27000
unkown
page read and write
3403000
direct allocation
page read and write
675F000
heap
page read and write
1A69E01F000
heap
page read and write
5631000
direct allocation
page read and write
641F000
stack
page read and write
31AE000
direct allocation
page read and write
1BE5000
heap
page read and write
199E000
stack
page read and write
3811000
heap
page read and write
1A69E045000
heap
page read and write
1F50000
direct allocation
page execute and read and write
1F57000
heap
page read and write
1203F000
unkown
page readonly
3170000
direct allocation
page read and write
17E2000
heap
page read and write
204F000
heap
page read and write
1F60000
heap
page read and write
1660000
heap
page read and write
E5E000
unkown
page read and write
17D7000
heap
page read and write
12053000
unkown
page readonly
1DC4000
heap
page read and write
17DC000
heap
page read and write
34C3000
direct allocation
page read and write
36D0000
heap
page read and write
2048000
heap
page read and write
6617000
heap
page read and write
34C1000
direct allocation
page read and write
3179000
direct allocation
page read and write
16E4000
heap
page read and write
1634000
heap
page read and write
3711000
heap
page read and write
355E000
stack
page read and write
66AE000
stack
page read and write
19A0000
heap
page read and write
E83000
unkown
page read and write
1F6A000
heap
page read and write
1A69DFE2000
heap
page read and write
3E9D000
stack
page read and write
1FB4000
heap
page read and write
17D7000
heap
page read and write
3711000
heap
page read and write
17C6000
heap
page read and write
1F98000
heap
page read and write
1FA8000
heap
page read and write
82BE000
stack
page read and write
1634000
heap
page read and write
1F31000
heap
page read and write
53E0000
direct allocation
page read and write
3711000
heap
page read and write
2A51000
heap
page read and write
125E000
unkown
page read and write
26B2000
direct allocation
page read and write
1F57000
heap
page read and write
34AD000
direct allocation
page read and write
D41000
unkown
page execute read
17DC000
heap
page read and write
4DA0000
direct allocation
page read and write
11145000
unkown
page read and write
1F11000
heap
page read and write
85FD000
stack
page read and write
651E000
stack
page read and write
1FED000
heap
page read and write
1A6A21EE000
heap
page read and write
3811000
heap
page read and write
1654000
unkown
page readonly
15BE000
heap
page read and write
2014000
heap
page read and write
1F27000
heap
page read and write
7EEB0000
direct allocation
page read and write
1DC4000
heap
page read and write
36BE000
direct allocation
page read and write
36E0000
direct allocation
page execute and read and write
1FE6000
heap
page read and write
204F000
heap
page read and write
B17000
unkown
page execute read
16E4000
heap
page read and write
2026000
heap
page read and write
3B22000
direct allocation
page read and write
EC6000
unkown
page read and write
1DF4000
heap
page read and write
269A000
direct allocation
page read and write
64F6000
heap
page read and write
2200000
direct allocation
page read and write
33EC000
direct allocation
page read and write
684B000
stack
page read and write
2120000
direct allocation
page execute and read and write
2AA1000
heap
page read and write
1DF4000
heap
page read and write
3E80000
heap
page read and write
1DB4000
heap
page read and write
6410000
unkown
page read and write
51B0000
heap
page read and write
1F31000
heap
page read and write
2AA1000
heap
page read and write
34F6000
direct allocation
page read and write
2240000
direct allocation
page read and write
319F000
direct allocation
page read and write
7FFE000
stack
page read and write
1ECE000
stack
page read and write
17D7000
heap
page read and write
1A6A4251000
heap
page read and write
2A51000
heap
page read and write
2AA1000
heap
page read and write
2AA3000
heap
page read and write
1DB4000
heap
page read and write
17E3000
heap
page read and write
261E000
direct allocation
page read and write
215F000
stack
page read and write
127B000
unkown
page read and write
3B11000
heap
page read and write
E7D000
unkown
page read and write
1A6A4211000
heap
page read and write
2150000
direct allocation
page read and write
650A000
trusted library allocation
page read and write
1FF9000
heap
page read and write
8F6000
unkown
page execute read
1262000
unkown
page read and write
1ECE000
stack
page read and write
2339CEF000
stack
page read and write
3488000
direct allocation
page read and write
1FC0000
heap
page read and write
1F63000
heap
page read and write
168D000
unkown
page readonly
1F31000
heap
page read and write
18BB000
stack
page read and write
2A51000
heap
page read and write
203F000
heap
page read and write
5F20000
trusted library allocation
page read and write
3811000
heap
page read and write
647E000
direct allocation
page read and write
220E000
direct allocation
page read and write
7EEE000
stack
page read and write
3DCB000
heap
page read and write
5027000
heap
page read and write
2043000
heap
page read and write
3871000
heap
page read and write
3711000
heap
page read and write
12B7000
unkown
page read and write
1A69DFC4000
heap
page read and write
3811000
heap
page read and write
B43D000
stack
page read and write
38B3000
direct allocation
page read and write
1A69E061000
heap
page read and write
5720000
direct allocation
page read and write
2AA1000
heap
page read and write
341000
unkown
page execute read
66D1000
heap
page read and write
1DB4000
heap
page read and write
3B11000
heap
page read and write
3711000
heap
page read and write
7B8C0000
direct allocation
page read and write
3B32000
direct allocation
page read and write
1FA4000
heap
page read and write
1DF4000
heap
page read and write
2701000
direct allocation
page read and write
514D000
heap
page read and write
677A000
heap
page read and write
1DA4000
heap
page read and write
AF4000
unkown
page execute read
4D30000
heap
page read and write
17E4000
heap
page read and write
1F1A000
heap
page read and write
222B000
direct allocation
page read and write
3B11000
heap
page read and write
3871000
heap
page read and write
17DC000
heap
page read and write
1204E000
unkown
page read and write
2FB000
stack
page read and write
672B000
heap
page read and write
21CA000
direct allocation
page read and write
6E6F000
stack
page read and write
34BC000
direct allocation
page read and write
6215000
direct allocation
page read and write
6FBE000
stack
page read and write
3811000
heap
page read and write
B1FE000
stack
page read and write
3811000
heap
page read and write
1F2C000
stack
page read and write
11000000
unkown
page readonly
4E0B000
direct allocation
page read and write
E5C000
unkown
page read and write
16E4000
heap
page read and write
3864000
direct allocation
page read and write
1267000
unkown
page read and write
1DA4000
heap
page read and write
31E9000
direct allocation
page read and write
88FF000
stack
page read and write
1A69E045000
heap
page read and write
BB0E000
stack
page read and write
1A69DFA2000
heap
page read and write
6772000
heap
page read and write
3711000
heap
page read and write
2F9E000
stack
page read and write
66D6000
heap
page read and write
F05000
unkown
page read and write
670D000
heap
page read and write
1A69FFF2000
trusted library allocation
page read and write
1DF4000
heap
page read and write
F01000
unkown
page read and write
3711000
heap
page read and write
34B4000
direct allocation
page read and write
1250000
unkown
page read and write
1F21000
heap
page read and write
16E4000
heap
page read and write
66F4000
heap
page read and write
3871000
heap
page read and write
38A3000
heap
page read and write
1F82000
heap
page read and write
2AA1000
heap
page read and write
57EE000
stack
page read and write
1DF4000
heap
page read and write
3B11000
heap
page read and write
17D9000
heap
page read and write
370A000
direct allocation
page read and write
17A7000
heap
page read and write
8D7E000
stack
page read and write
1780000
heap
page read and write
265E000
direct allocation
page read and write
3B42000
direct allocation
page read and write
1684000
unkown
page readonly
1FDC000
heap
page read and write
1664000
heap
page read and write
2A51000
heap
page read and write
3910000
heap
page read and write
36AF000
direct allocation
page read and write
619E000
stack
page read and write
1A6A010E000
heap
page read and write
2A51000
heap
page read and write
126B000
unkown
page read and write
19F0000
heap
page read and write
66DD000
heap
page read and write
1D90000
heap
page read and write
1A69E01F000
heap
page read and write
AF0000
unkown
page execute read
376B000
direct allocation
page read and write
25DA000
direct allocation
page read and write
25D5000
direct allocation
page read and write
7FF6CDB6B000
unkown
page read and write
3711000
heap
page read and write
3935000
direct allocation
page read and write
17DD000
heap
page read and write
3197000
direct allocation
page read and write
31E9000
direct allocation
page read and write
2056000
heap
page read and write
957000
unkown
page execute read
19BB000
stack
page read and write
1FF9000
heap
page read and write
17DC000
heap
page read and write
F06000
unkown
page read and write
16E4000
heap
page read and write
17D3000
heap
page read and write
1F59000
heap
page read and write
E5C000
unkown
page read and write
17E6000
heap
page read and write
1FED000
heap
page read and write
B1BF000
stack
page read and write
1A6A4222000
heap
page read and write
1A69DFBC000
heap
page read and write
1A69DFB8000
heap
page read and write
3B11000
heap
page read and write
6EBE000
stack
page read and write
640B000
heap
page read and write
50A7000
heap
page read and write
34D9000
direct allocation
page read and write
17D4000
heap
page read and write
1FEA000
heap
page read and write
1664000
heap
page read and write
1A69FCF9000
heap
page read and write
C2CE000
stack
page read and write
1A6A2264000
heap
page read and write
1560000
heap
page read and write
1247000
unkown
page read and write
31CC000
direct allocation
page read and write
3871000
heap
page read and write
4DB0000
heap
page read and write
17D7000
heap
page read and write
507F000
direct allocation
page read and write
6294000
trusted library allocation
page read and write
5F5E000
stack
page read and write
89FF000
stack
page read and write
1FDF000
heap
page read and write
A0C0000
heap
page read and write
641C000
trusted library allocation
page read and write
7FF6CDB7A000
unkown
page readonly
1A69E205000
heap
page read and write
17F1000
heap
page read and write
6520000
heap
page read and write
655E000
stack
page read and write
3B5F000
direct allocation
page read and write
217E000
direct allocation
page read and write
641A000
trusted library allocation
page read and write
31A6000
direct allocation
page read and write
66EB000
heap
page read and write
127D000
unkown
page read and write
1303000
unkown
page read and write
37E0000
direct allocation
page read and write
3711000
heap
page read and write
66CE000
heap
page read and write
51A0000
heap
page read and write
1DF4000
heap
page read and write
1A69DFE4000
heap
page read and write
812000
unkown
page execute read
2ED000
stack
page read and write
F28000
unkown
page read and write
1A69DFD9000
heap
page read and write
3711000
heap
page read and write
33F3000
direct allocation
page read and write
7FF6CDB7F000
unkown
page readonly
1F21000
heap
page read and write
3472000
direct allocation
page read and write
349D000
direct allocation
page read and write
2070000
heap
page read and write
26E4000
direct allocation
page read and write
5140000
heap
page read and write
2A51000
heap
page read and write
64F0000
heap
page read and write
1DF4000
heap
page read and write
1272000
unkown
page read and write
219E000
direct allocation
page read and write
1DF4000
heap
page read and write
31BC000
direct allocation
page read and write
36D0000
heap
page read and write
1634000
heap
page read and write
3B11000
heap
page read and write
1F71000
heap
page read and write
66E2000
heap
page read and write
368B000
heap
page read and write
11149000
unkown
page read and write
351E000
stack
page read and write
12F7000
unkown
page read and write
1850000
heap
page read and write
17D7000
heap
page read and write
1A69E061000
heap
page read and write
6280000
trusted library allocation
page read and write
3711000
heap
page read and write
350C000
direct allocation
page read and write
62A8000
trusted library allocation
page read and write
3453000
direct allocation
page read and write
3711000
heap
page read and write
36A8000
direct allocation
page read and write
379A000
direct allocation
page read and write
1DA0000
heap
page read and write
3711000
heap
page read and write
2A50000
heap
page read and write
311B000
direct allocation
page read and write
1FD8000
heap
page read and write
3811000
heap
page read and write
38A0000
heap
page read and write
3711000
heap
page read and write
11F7000
stack
page read and write
11145000
unkown
page read and write
39A6000
direct allocation
page read and write
2043000
heap
page read and write
56AE000
stack
page read and write
641E000
unkown
page read and write
3B2E000
heap
page read and write
1634000
heap
page read and write
803E000
stack
page read and write
724E000
stack
page read and write
1A69E04F000
heap
page read and write
2130000
heap
page read and write
4D30000
trusted library allocation
page read and write
513A000
heap
page read and write
5149000
heap
page read and write
5000000
heap
page read and write
3811000
heap
page read and write
66D3000
heap
page read and write
34AC000
direct allocation
page read and write
4EE1000
direct allocation
page read and write
1788000
heap
page read and write
11C4000
unkown
page execute read
1955000
heap
page read and write
319F000
direct allocation
page read and write
17D8000
heap
page read and write
3B10000
heap
page read and write
E7D000
unkown
page read and write
227A000
direct allocation
page read and write
21F1000
direct allocation
page read and write
3B11000
heap
page read and write
1250000
unkown
page read and write
1FFB000
heap
page read and write
66C0000
heap
page read and write
3734000
heap
page read and write
17DB000
heap
page read and write
17D8000
heap
page read and write
3105000
direct allocation
page read and write
66FD000
heap
page read and write
197E000
stack
page read and write
BA0E000
stack
page read and write
1A6A225A000
heap
page read and write
55AF000
stack
page read and write
4010000
heap
page read and write
1FBB000
heap
page read and write
126F000
unkown
page read and write
17DC000
heap
page read and write
2207000
direct allocation
page read and write
506A000
direct allocation
page read and write
2A51000
heap
page read and write
8F3E000
stack
page read and write
17D9000
heap
page read and write
319E000
stack
page read and write
17D7000
heap
page read and write
133B000
unkown
page read and write
17DA000
heap
page read and write
1DB4000
heap
page read and write
1FA6000
heap
page read and write
7F4000
unkown
page execute read
1634000
heap
page read and write
5860000
direct allocation
page read and write
66E8000
heap
page read and write
26C1000
direct allocation
page read and write
17D8000
heap
page read and write
6269000
direct allocation
page read and write
81D000
unkown
page execute read
38C8000
direct allocation
page read and write
1FF3000
heap
page read and write
26C0000
direct allocation
page read and write
E83000
unkown
page read and write
61DB000
stack
page read and write
3FA0000
heap
page read and write
3711000
heap
page read and write
6620000
unkown
page read and write
1D0E000
stack
page read and write
1A69FEE4000
heap
page read and write
1A6A2102000
heap
page read and write
1FDE000
heap
page read and write
1A6A22BE000
heap
page read and write
26EC000
direct allocation
page read and write
E76000
unkown
page read and write
2A51000
heap
page read and write
1FF7000
heap
page read and write
66E4000
heap
page read and write
9F9000
unkown
page execute read
33A5000
direct allocation
page read and write
1A6A4229000
heap
page read and write
1A69FEF0000
heap
page read and write
7FF6CDB7E000
unkown
page readonly
16A4000
unkown
page readonly
6726000
heap
page read and write
3711000
heap
page read and write
2A51000
heap
page read and write
201F000
heap
page read and write
629D000
trusted library allocation
page read and write
EFB000
unkown
page read and write
3711000
heap
page read and write
662E000
unkown
page read and write
1A6A1900000
trusted library allocation
page read and write
1204F000
unkown
page read and write
1FF9000
heap
page read and write
33F0000
direct allocation
page read and write
3811000
heap
page read and write
4F00000
heap
page read and write
3811000
heap
page read and write
21D1000
direct allocation
page read and write
37AC000
direct allocation
page read and write
1DF4000
heap
page read and write
1F57000
heap
page read and write
4F50000
heap
page read and write
3871000
heap
page read and write
8CFE000
stack
page read and write
1FF7000
heap
page read and write
1F6A000
heap
page read and write
3504000
direct allocation
page read and write
397E000
direct allocation
page read and write
3711000
heap
page read and write
2AB3000
heap
page read and write
2AA2000
heap
page read and write
8C6F000
stack
page read and write
6C1E000
stack
page read and write
3811000
heap
page read and write
749E000
stack
page read and write
17D7000
heap
page read and write
7FF6CDB11000
unkown
page execute read
17D0000
heap
page read and write
3463000
direct allocation
page read and write
1F63000
heap
page read and write
17CD000
heap
page read and write
2AA1000
heap
page read and write
161E000
unkown
page readonly
34D2000
direct allocation
page read and write
3177000
direct allocation
page read and write
1F5E000
heap
page read and write
17AC000
heap
page read and write
53C0000
direct allocation
page read and write
3683000
heap
page read and write
5135000
heap
page read and write
675B000
heap
page read and write
66F8000
heap
page read and write
26D6000
direct allocation
page read and write
66FD000
heap
page read and write
31E2000
direct allocation
page read and write
162E000
stack
page read and write
3711000
heap
page read and write
677F000
heap
page read and write
16C8000
unkown
page readonly
37A4000
direct allocation
page read and write
37A8000
direct allocation
page read and write
260E000
direct allocation
page read and write
1FD9000
heap
page read and write
3711000
heap
page read and write
389D000
direct allocation
page read and write
11149000
unkown
page read and write
11145000
unkown
page read and write
1A69DFC4000
heap
page read and write
50B8000
direct allocation
page read and write
1249000
unkown
page read and write
1A6A421E000
heap
page read and write
1A6A4193000
heap
page read and write
3711000
heap
page read and write
17A1000
heap
page read and write
1A6A4229000
heap
page read and write
37B3000
direct allocation
page read and write
16C4000
heap
page read and write
16E4000
unkown
page readonly
347F000
direct allocation
page read and write
2E5E000
stack
page read and write
1337000
unkown
page read and write
1DF4000
heap
page read and write
6420000
heap
page read and write
5126000
trusted library allocation
page read and write
133A000
unkown
page write copy
1811000
heap
page read and write
566F000
stack
page read and write
2038000
heap
page read and write
38A4000
direct allocation
page read and write
1DC4000
heap
page read and write
5941000
direct allocation
page read and write
1660000
heap
page read and write
344D000
direct allocation
page read and write
670E000
heap
page read and write
4013000
heap
page read and write
BD0E000
stack
page read and write
6621000
trusted library allocation
page read and write
17D7000
heap
page read and write
1EC0000
direct allocation
page execute and read and write
2AA0000
heap
page read and write
594E000
stack
page read and write
F28000
unkown
page read and write
508E000
direct allocation
page read and write
1A6A4111000
heap
page read and write
1BE0000
heap
page read and write
890F000
heap
page read and write
1DB4000
heap
page read and write
3788000
direct allocation
page read and write
3711000
heap
page read and write
3C9F000
stack
page read and write
4E4F000
direct allocation
page read and write
1317000
unkown
page read and write
2F0000
heap
page read and write
17DA000
heap
page read and write
1F95000
heap
page read and write
1A6A211F000
heap
page read and write
1FA4000
heap
page read and write
17DE000
heap
page read and write
2AA1000
heap
page read and write
36A0000
direct allocation
page read and write
1A69DFAA000
heap
page read and write
33BA000
direct allocation
page read and write
57AF000
stack
page read and write
12C6000
unkown
page read and write
86FD000
stack
page read and write
B57F000
stack
page read and write
378F000
direct allocation
page read and write
17DC000
heap
page read and write
34A4000
direct allocation
page read and write
1F31000
heap
page read and write
3718000
heap
page read and write
3711000
heap
page read and write
34E0000
direct allocation
page read and write
1AE5000
heap
page read and write
3755000
direct allocation
page read and write
616000
unkown
page execute read
1DA0000
heap
page read and write
4FBF000
stack
page read and write
19BB000
stack
page read and write
3496000
direct allocation
page read and write
3880000
direct allocation
page read and write
2036000
heap
page read and write
163F000
unkown
page readonly
662C000
trusted library allocation
page read and write
372B000
heap
page read and write
15AE000
stack
page read and write
1A69E063000
heap
page read and write
1DF4000
heap
page read and write
2A51000
heap
page read and write
17CD000
heap
page read and write
2281000
direct allocation
page read and write
2A51000
heap
page read and write
1680000
unkown
page readonly
1A69FEF1000
heap
page read and write
3B11000
heap
page read and write
1337000
unkown
page read and write
127B000
unkown
page read and write
6EFE000
stack
page read and write
7E710000
direct allocation
page read and write
2339EFE000
stack
page read and write
3802000
direct allocation
page read and write
5433000
heap
page read and write
6501000
trusted library allocation
page read and write
1DF4000
heap
page read and write
1249000
unkown
page read and write
17DA000
heap
page read and write
3E50000
heap
page read and write
679F000
heap
page read and write
6407000
heap
page read and write
414E000
stack
page read and write
1FFF000
heap
page read and write
17F5000
heap
page read and write
1FD8000
heap
page read and write
5191000
direct allocation
page read and write
21BB000
direct allocation
page read and write
204F000
heap
page read and write
17D7000
heap
page read and write
E7A000
unkown
page read and write
1568000
heap
page read and write
5250000
heap
page read and write
22A0000
heap
page read and write
3985000
direct allocation
page read and write
3DC7000
heap
page read and write
38AC000
direct allocation
page read and write
1FD2000
heap
page read and write
3122000
direct allocation
page read and write
12000000
unkown
page readonly
1C20000
heap
page read and write
1634000
heap
page read and write
5120000
trusted library allocation
page read and write
650E000
unkown
page read and write
1DF4000
heap
page read and write
6FB000
unkown
page execute read
3DEA000
heap
page read and write
166F000
unkown
page readonly
1A6A4210000
heap
page read and write
1FA2000
heap
page read and write
1A6A4355000
heap
page read and write
2AA1000
heap
page read and write
E59000
unkown
page read and write
1A69E031000
heap
page read and write
1279000
unkown
page read and write
1B5D000
stack
page read and write
3B11000
heap
page read and write
1317000
unkown
page read and write
C90E000
stack
page read and write
1C40000
heap
page read and write
37E5000
direct allocation
page read and write
2AA1000
heap
page read and write
17D7000
heap
page read and write
6223000
direct allocation
page read and write
3711000
heap
page read and write
16E4000
heap
page read and write
1664000
heap
page read and write
1A69DFEB000
heap
page read and write
1ED0000
heap
page read and write
745E000
stack
page read and write
349F000
direct allocation
page read and write
1664000
heap
page read and write
386B000
direct allocation
page read and write
F29000
unkown
page write copy
2264000
direct allocation
page read and write
1DF4000
heap
page read and write
517E000
stack
page read and write
2AA1000
heap
page read and write
3711000
heap
page read and write
1690000
unkown
page readonly
673F000
heap
page read and write
1A6A00E0000
trusted library allocation
page read and write
1EF8000
heap
page read and write
C80E000
stack
page read and write
16E4000
heap
page read and write
1FA4000
heap
page read and write
1D3D000
stack
page read and write
E76000
unkown
page read and write
20DE000
stack
page read and write
17EE000
heap
page read and write
3B10000
heap
page read and write
1A69E01F000
heap
page read and write
16BB000
unkown
page readonly
3871000
heap
page read and write
4DAF000
direct allocation
page read and write
37BA000
direct allocation
page read and write
3711000
heap
page read and write
1A6A4355000
heap
page read and write
39AF000
stack
page read and write
1F21000
heap
page read and write
171E000
stack
page read and write
EF0000
unkown
page read and write
3711000
heap
page read and write
3711000
heap
page read and write
1A69E200000
heap
page read and write
17D7000
heap
page read and write
1664000
heap
page read and write
1114B000
unkown
page readonly
3711000
heap
page read and write
12C3000
unkown
page read and write
B7CE000
stack
page read and write
6705000
heap
page read and write
1D8E000
stack
page read and write
1DB4000
heap
page read and write
6291000
trusted library allocation
page read and write
14FB000
stack
page read and write
1A6A2262000
heap
page read and write
1FDF000
heap
page read and write
2AA1000
heap
page read and write
1DF0000
heap
page read and write
1950000
heap
page read and write
16CE000
heap
page read and write
1FD8000
heap
page read and write
1FA2000
heap
page read and write
F06000
unkown
page read and write
17D7000
heap
page read and write
26F3000
direct allocation
page read and write
4EC3000
direct allocation
page read and write
163B000
unkown
page readonly
1634000
heap
page read and write
2339FFE000
stack
page read and write
3B11000
heap
page read and write
1A6A22CB000
heap
page read and write
720E000
stack
page read and write
6CDE000
stack
page read and write
671E000
heap
page read and write
3811000
heap
page read and write
17D7000
heap
page read and write
3711000
heap
page read and write
3DCE000
heap
page read and write
64F5000
heap
page read and write
2F5E000
stack
page read and write
38C1000
direct allocation
page read and write
3711000
heap
page read and write
1633000
unkown
page readonly
1664000
heap
page read and write
3711000
heap
page read and write
1634000
heap
page read and write
3711000
heap
page read and write
2AA1000
heap
page read and write
672C000
heap
page read and write
1634000
heap
page read and write
17D8000
heap
page read and write
33C1000
direct allocation
page read and write
5429000
heap
page read and write
2A51000
heap
page read and write
3B1B000
direct allocation
page read and write
1608000
unkown
page readonly
2718000
direct allocation
page read and write
392E000
direct allocation
page read and write
8D3E000
stack
page read and write
671E000
heap
page read and write
54B3000
direct allocation
page read and write
1DB4000
heap
page read and write
1A6A4251000
heap
page read and write
1A69DFEB000
heap
page read and write
1247000
unkown
page read and write
1DC4000
heap
page read and write
2FDE000
stack
page read and write
11149000
unkown
page read and write
17F1000
heap
page read and write
650C000
trusted library allocation
page read and write
1244000
unkown
page read and write
159C000
heap
page read and write
1634000
heap
page read and write
1DB4000
heap
page read and write
7E7E0000
direct allocation
page read and write
1F74000
heap
page read and write
E86000
unkown
page read and write
17D7000
heap
page read and write
177C000
heap
page read and write
AEFE000
stack
page read and write
11145000
unkown
page read and write
1806000
heap
page read and write
15FF000
unkown
page readonly
3711000
heap
page read and write
1DC4000
heap
page read and write
17D7000
heap
page read and write
1DB4000
heap
page read and write
791F000
stack
page read and write
17DC000
heap
page read and write
2A4000
heap
page read and write
9CFD000
stack
page read and write
3711000
heap
page read and write
1EAE000
stack
page read and write
3B11000
heap
page read and write
1605000
unkown
page readonly
1262000
unkown
page read and write
204A000
heap
page read and write
3711000
heap
page read and write
E7D000
unkown
page read and write
318F000
direct allocation
page read and write
2A51000
heap
page read and write
2C9D000
stack
page read and write
25FE000
direct allocation
page read and write
7CCF0000
direct allocation
page read and write
1337000
unkown
page read and write
301E000
stack
page read and write
26A4000
direct allocation
page read and write
3496000
direct allocation
page read and write
1664000
heap
page read and write
1F0C000
heap
page read and write
1F24000
heap
page read and write
1DB4000
heap
page read and write
1279000
unkown
page read and write
17D8000
heap
page read and write
1EF0000
heap
page read and write
BE8E000
stack
page read and write
1FB1000
heap
page read and write
17D3000
heap
page read and write
1A6A2228000
heap
page read and write
1560000
heap
page read and write
3711000
heap
page read and write
3811000
heap
page read and write
17DA000
heap
page read and write
37FB000
direct allocation
page read and write
36BC000
stack
page read and write
700B000
stack
page read and write
1F57000
heap
page read and write
1FF2000
heap
page read and write
1A69FE91000
heap
page read and write
1D3E000
stack
page read and write
1DB4000
heap
page read and write
6270000
direct allocation
page read and write
B2FF000
stack
page read and write
3231000
direct allocation
page read and write
7F450000
direct allocation
page read and write
17D7000
heap
page read and write
1349000
unkown
page readonly
3427000
direct allocation
page read and write
1A6A41D4000
heap
page read and write
34BA000
direct allocation
page read and write
2026000
heap
page read and write
2339DFD000
stack
page read and write
3EC0000
heap
page read and write
3731000
heap
page read and write
1DA4000
heap
page read and write
577F000
stack
page read and write
2AA1000
heap
page read and write
25EF000
direct allocation
page read and write
7FF6CDB58000
unkown
page readonly
2AA2000
heap
page read and write
1A6A41D3000
heap
page read and write
5406000
heap
page read and write
3711000
heap
page read and write
2AA1000
heap
page read and write
5020000
direct allocation
page execute and read and write
1664000
heap
page read and write
1739000
unkown
page readonly
1A6A223B000
heap
page read and write
64F7000
heap
page read and write
161A000
unkown
page readonly
1A6A4293000
heap
page read and write
1DB4000
heap
page read and write
17D8000
heap
page read and write
18BB000
stack
page read and write
1DA4000
heap
page read and write
7FF6CDB58000
unkown
page readonly
4010000
heap
page read and write
3838000
direct allocation
page read and write
17D8000
heap
page read and write
B6BE000
stack
page read and write
3711000
heap
page read and write
3738000
direct allocation
page read and write
1303000
unkown
page read and write
1A69DFAB000
heap
page read and write
1FF5000
heap
page read and write
5134000
trusted library allocation
page read and write
17D7000
heap
page read and write
639F000
direct allocation
page read and write
3711000
heap
page read and write
1A69DFBC000
heap
page read and write
3855000
direct allocation
page read and write
17D7000
heap
page read and write
4F09000
heap
page read and write
126B000
unkown
page read and write
645E000
stack
page read and write
1A6A21A0000
heap
page read and write
B74E000
stack
page read and write
1634000
heap
page read and write
3711000
heap
page read and write
E72000
unkown
page read and write
3560000
direct allocation
page read and write
3528000
direct allocation
page read and write
2280000
heap
page read and write
1244000
unkown
page read and write
1A69E01E000
heap
page read and write
F37000
unkown
page readonly
3711000
heap
page read and write
F2A000
unkown
page read and write
1A6A4355000
heap
page read and write
17D9000
heap
page read and write
17BF000
heap
page read and write
1560000
heap
page read and write
1F35000
heap
page read and write
3711000
heap
page read and write
3961000
direct allocation
page read and write
3711000
heap
page read and write
1279000
unkown
page read and write
66F5000
heap
page read and write
1F64000
heap
page read and write
341A000
direct allocation
page read and write
17D7000
heap
page read and write
233A2FE000
stack
page read and write
2023000
heap
page read and write
E76000
unkown
page read and write
314A000
direct allocation
page read and write
1A6A4292000
heap
page read and write
1F68000
heap
page read and write
264A000
direct allocation
page read and write
1D70000
heap
page read and write
133B000
unkown
page read and write
3690000
direct allocation
page read and write
3A20000
heap
page read and write
3B66000
direct allocation
page read and write
53DA000
direct allocation
page read and write
3711000
heap
page read and write
1DB4000
heap
page read and write
1250000
unkown
page read and write
1FE4000
heap
page read and write
8B60000
remote allocation
page read and write
1262000
unkown
page read and write
7FF6CDB10000
unkown
page readonly
B0BF000
stack
page read and write
675D000
heap
page read and write
16BD000
unkown
page readonly
1634000
heap
page read and write
36BC000
stack
page read and write
1F14000
heap
page read and write
1A6A2CCE000
heap
page read and write
1FAF000
heap
page read and write
2046000
heap
page read and write
17F5000
heap
page read and write
2AA1000
heap
page read and write
1DC4000
heap
page read and write
1DB4000
heap
page read and write
3772000
direct allocation
page read and write
66FC000
heap
page read and write
1A6A4252000
heap
page read and write
1858000
heap
page read and write
1DF4000
heap
page read and write
1A6A2162000
heap
page read and write
2A51000
heap
page read and write
6280000
trusted library allocation
page read and write
3711000
heap
page read and write
1FB4000
heap
page read and write
15C0000
heap
page read and write
2AA1000
heap
page read and write
6430000
trusted library allocation
page read and write
17DC000
heap
page read and write
1FE0000
heap
page read and write
66E8000
heap
page read and write
1A69FEE0000
heap
page read and write
340000
unkown
page readonly
84FE000
stack
page read and write
16ED000
unkown
page readonly
36E0000
direct allocation
page execute and read and write
1F77000
heap
page read and write
5136000
trusted library allocation
page read and write
312A000
direct allocation
page read and write
BE4F000
stack
page read and write
22C6000
heap
page read and write
17D7000
heap
page read and write
348F000
direct allocation
page read and write
4EBE000
stack
page read and write
1A6A4315000
heap
page read and write
3711000
heap
page read and write
1A69DFBC000
heap
page read and write
17E7000
heap
page read and write
341F000
direct allocation
page read and write
1FBD000
heap
page read and write
17C3000
heap
page read and write
3DB0000
heap
page read and write
E6F000
unkown
page read and write
3790000
direct allocation
page read and write
6C5E000
stack
page read and write
F2F000
unkown
page read and write
3129000
direct allocation
page read and write
1FB8000
heap
page read and write
9F7D000
stack
page read and write
3D10000
heap
page read and write
4040000
heap
page read and write
1630000
heap
page read and write
1F58000
heap
page read and write
3711000
heap
page read and write
16B0000
heap
page read and write
16BE000
stack
page read and write
380A000
direct allocation
page read and write
1DC0000
heap
page read and write
1FE2000
heap
page read and write
1249000
unkown
page read and write
513B000
heap
page read and write
AFBD000
stack
page read and write
1F34000
heap
page read and write
1204F000
unkown
page read and write
3B20000
direct allocation
page execute and read and write
17E6000
heap
page read and write
6296000
trusted library allocation
page read and write
8CAE000
stack
page read and write
215A000
direct allocation
page read and write
17B5000
heap
page read and write
540F000
direct allocation
page read and write
3711000
heap
page read and write
343E000
direct allocation
page read and write
1A69DFD0000
heap
page read and write
9A7E000
stack
page read and write
6400000
heap
page read and write
1FD8000
heap
page read and write
1A6A4229000
heap
page read and write
315E000
stack
page read and write
771E000
stack
page read and write
1F36000
heap
page read and write
17DC000
heap
page read and write
8B60000
remote allocation
page read and write
3B11000
heap
page read and write
1DF4000
heap
page read and write
16E4000
heap
page read and write
3445000
direct allocation
page read and write
17DC000
heap
page read and write
25CF000
stack
page read and write
B993000
heap
page read and write
16DD000
unkown
page readonly
1A6A00E6000
heap
page read and write
3711000
heap
page read and write
110EA000
unkown
page readonly
1DF4000
heap
page read and write
6485000
direct allocation
page read and write
EBB000
unkown
page read and write
201F000
heap
page read and write
16C4000
heap
page read and write
1FA4000
heap
page read and write
17D7000
heap
page read and write
5136000
heap
page read and write
36CE000
direct allocation
page read and write
66F5000
heap
page read and write
1D73000
heap
page read and write
2A51000
heap
page read and write
3888000
direct allocation
page read and write
3711000
heap
page read and write
344C000
direct allocation
page read and write
2AA1000
heap
page read and write
17DC000
heap
page read and write
22C0000
heap
page read and write
3B58000
direct allocation
page read and write
3711000
heap
page read and write
7EF000
unkown
page execute read
3795000
direct allocation
page read and write
64D9000
direct allocation
page read and write
1279000
unkown
page read and write
1740000
heap
page read and write
1A6A4359000
heap
page read and write
21D8000
direct allocation
page read and write
2625000
direct allocation
page read and write
12A5000
unkown
page read and write
5140000
heap
page read and write
5063000
direct allocation
page read and write
205C000
heap
page read and write
3899000
direct allocation
page read and write
17DB000
heap
page read and write
1DC4000
heap
page read and write
1317000
unkown
page read and write
371F000
direct allocation
page read and write
6708000
heap
page read and write
385C000
direct allocation
page read and write
17D7000
heap
page read and write
162A000
unkown
page readonly
6A5F000
stack
page read and write
6777000
heap
page read and write
200E000
heap
page read and write
6B0000
unkown
page execute read
19F3000
heap
page read and write
12D7000
unkown
page read and write
1275000
unkown
page read and write
1244000
unkown
page write copy
513E000
heap
page read and write
17DC000
heap
page read and write
17D5000
heap
page read and write
3811000
heap
page read and write
1A69E032000
heap
page read and write
3B34000
heap
page read and write
51A0000
heap
page read and write
3920000
direct allocation
page read and write
1664000
heap
page read and write
1DB4000
heap
page read and write
34A5000
direct allocation
page read and write
36B6000
direct allocation
page read and write
1F66000
heap
page read and write
6726000
heap
page read and write
1DC4000
heap
page read and write
268B000
direct allocation
page read and write
1A69DFCF000
heap
page read and write
7E900000
direct allocation
page read and write
1A69E04F000
heap
page read and write
17D8000
heap
page read and write
1F93000
heap
page read and write
233A3FE000
stack
page read and write
1F08000
heap
page read and write
661B000
heap
page read and write
4E58000
direct allocation
page read and write
214E000
stack
page read and write
19BB000
stack
page read and write
12EC000
unkown
page read and write
2A4000
heap
page read and write
26FA000
direct allocation
page read and write
16E4000
heap
page read and write
1736000
unkown
page readonly
11142000
unkown
page write copy
832000
unkown
page execute read
125C000
unkown
page read and write
3B11000
heap
page read and write
3487000
direct allocation
page read and write
3711000
heap
page read and write
17D8000
heap
page read and write
4D40000
heap
page read and write
17DA000
heap
page read and write
384E000
direct allocation
page read and write
17D0000
heap
page read and write
C58F000
stack
page read and write
3711000
heap
page read and write
3711000
heap
page read and write
F2F000
unkown
page read and write
513E000
heap
page read and write
1A69DF50000
heap
page read and write
1FB4000
heap
page read and write
1637000
unkown
page readonly
672E000
heap
page read and write
3D9D000
stack
page read and write
1F14000
heap
page read and write
6615000
heap
page read and write
204A000
heap
page read and write
2F1E000
stack
page read and write
2A4000
heap
page read and write
3711000
heap
page read and write
1A6A22BC000
heap
page read and write
53C7000
direct allocation
page read and write
1664000
heap
page read and write
646E000
direct allocation
page read and write
3A58000
direct allocation
page read and write
1DC4000
heap
page read and write
1DF4000
heap
page read and write
6280000
trusted library allocation
page read and write
192B000
stack
page read and write
21C2000
direct allocation
page read and write
17D7000
heap
page read and write
6726000
heap
page read and write
17D7000
heap
page read and write
17B7000
heap
page read and write
63C4000
direct allocation
page read and write
1DB4000
heap
page read and write
224F000
direct allocation
page read and write
1DC4000
heap
page read and write
2060000
heap
page read and write
2AA1000
heap
page read and write
180D000
heap
page read and write
50C0000
heap
page read and write
17D7000
heap
page read and write
E5E000
unkown
page read and write
16FA000
unkown
page readonly
17C4000
heap
page read and write
3436000
direct allocation
page read and write
3831000
direct allocation
page read and write
6610000
heap
page read and write
1F14000
heap
page read and write
4D8C000
direct allocation
page read and write
340000
unkown
page readonly
605D000
stack
page read and write
1664000
heap
page read and write
66D6000
heap
page read and write
22B000
stack
page read and write
3711000
heap
page read and write
3727000
heap
page read and write
14FB000
stack
page read and write
5A9D000
stack
page read and write
5EDF000
stack
page read and write
3711000
heap
page read and write
11A7000
unkown
page execute read
53A0000
heap
page read and write
5289000
direct allocation
page read and write
6724000
heap
page read and write
2224000
direct allocation
page read and write
1F21000
heap
page read and write
1091000
unkown
page readonly
233A4FF000
stack
page read and write
1F0C000
heap
page read and write
2A51000
heap
page read and write
226C000
direct allocation
page read and write
1679000
unkown
page readonly
1A69DFC6000
heap
page read and write
62A8000
trusted library allocation
page read and write
16C4000
heap
page read and write
1DF4000
heap
page read and write
3949000
direct allocation
page read and write
2AB2000
heap
page read and write
4D00000
direct allocation
page read and write
1F35000
heap
page read and write
1648000
unkown
page readonly
8AFE000
stack
page read and write
1DF4000
heap
page read and write
4CC0000
heap
page read and write
64DE000
stack
page read and write
204A000
heap
page read and write
513E000
heap
page read and write
1F8C000
heap
page read and write
16D0000
heap
page read and write
17D7000
heap
page read and write
7F1000
unkown
page execute read
31C4000
direct allocation
page read and write
17D1000
heap
page read and write
2339CF5000
stack
page read and write
5170000
direct allocation
page read and write
1F74000
heap
page read and write
5070000
heap
page read and write
514B000
heap
page read and write
1664000
heap
page read and write
225D000
direct allocation
page read and write
5150000
heap
page read and write
552F000
stack
page read and write
3B11000
heap
page read and write
53C2000
direct allocation
page read and write
17D8000
heap
page read and write
17D9000
heap
page read and write
2AA1000
heap
page read and write
64FB000
heap
page read and write
1204D000
unkown
page write copy
481000
unkown
page execute read
127F000
unkown
page read and write
9BFF000
stack
page read and write
16C4000
heap
page read and write
26DD000
direct allocation
page read and write
609D000
stack
page read and write
2620000
direct allocation
page read and write
1DB4000
heap
page read and write
3B63000
heap
page read and write
17CD000
heap
page read and write
8EBE000
stack
page read and write
17D8000
heap
page read and write
3168000
direct allocation
page read and write
1A69DF30000
heap
page read and write
25E8000
direct allocation
page read and write
2076000
heap
page read and write
39DD000
direct allocation
page read and write
2007000
heap
page read and write
1F50000
heap
page read and write
3711000
heap
page read and write
3811000
heap
page read and write
16B2000
unkown
page readonly
62AA000
trusted library allocation
page read and write
AEBF000
stack
page read and write
1DC4000
heap
page read and write
6714000
heap
page read and write
2A51000
heap
page read and write
3720000
heap
page read and write
5137000
heap
page read and write
1A69E01F000
heap
page read and write
1A69FE90000
heap
page read and write
B90F000
stack
page read and write
3B34000
direct allocation
page read and write
1244000
unkown
page read and write
A2BE000
stack
page read and write
11B7000
unkown
page execute read
2678000
direct allocation
page read and write
66F3000
heap
page read and write
262C000
direct allocation
page read and write
34E8000
direct allocation
page read and write
188C000
heap
page read and write
650000
unkown
page readonly
1FCB000
heap
page read and write
3711000
heap
page read and write
16E4000
heap
page read and write
3711000
heap
page read and write
66F5000
heap
page read and write
1340000
unkown
page read and write
1A69DFC4000
heap
page read and write
5054000
direct allocation
page read and write
545A000
direct allocation
page read and write
66E2000
heap
page read and write
61FE000
direct allocation
page read and write
678F000
heap
page read and write
3513000
direct allocation
page read and write
674E000
heap
page read and write
590E000
stack
page read and write
3896000
direct allocation
page read and write
1690000
heap
page read and write
1FD8000
heap
page read and write
17D7000
heap
page read and write
2232000
direct allocation
page read and write
2A51000
heap
page read and write
3711000
heap
page read and write
2642000
direct allocation
page read and write
538E000
stack
page read and write
31D8000
direct allocation
page read and write
374E000
direct allocation
page read and write
16B9000
unkown
page readonly
17B4000
heap
page read and write
659000
unkown
page execute read
A4BF000
stack
page read and write
BD4E000
stack
page read and write
3123000
direct allocation
page read and write
1A6A4151000
heap
page read and write
3764000
direct allocation
page read and write
6D1E000
stack
page read and write
17D7000
heap
page read and write
34CB000
direct allocation
page read and write
1EFE000
stack
page read and write
3711000
heap
page read and write
3711000
heap
page read and write
1A6A2256000
heap
page read and write
1DB4000
heap
page read and write
2675000
direct allocation
page read and write
1DC4000
heap
page read and write
17D7000
heap
page read and write
1268000
unkown
page read and write
125D000
unkown
page read and write
65AE000
stack
page read and write
3811000
heap
page read and write
2680000
direct allocation
page read and write
17DE000
heap
page read and write
11149000
unkown
page read and write
5717000
heap
page read and write
3711000
heap
page read and write
3871000
heap
page read and write
7B1F000
stack
page read and write
1F76000
heap
page read and write
E59000
unkown
page write copy
7FF6CDB6B000
unkown
page write copy
26C8000
direct allocation
page read and write
3872000
direct allocation
page read and write
17D0000
heap
page read and write
2286000
heap
page read and write
2001000
heap
page read and write
1876000
heap
page read and write
3A10000
heap
page read and write
1699000
heap
page read and write
16AE000
stack
page read and write
3711000
heap
page read and write
36EC000
direct allocation
page read and write
5020000
heap
page read and write
C08E000
stack
page read and write
36F0000
heap
page read and write
16C4000
heap
page read and write
5A6F000
stack
page read and write
A07E000
stack
page read and write
567E000
stack
page read and write
5240000
heap
page read and write
1C45000
heap
page read and write
66F5000
heap
page read and write
2A51000
heap
page read and write
1DA5000
heap
page read and write
6291000
trusted library allocation
page read and write
310D000
direct allocation
page read and write
36B5000
direct allocation
page read and write
390F000
stack
page read and write
1F2F000
heap
page read and write
18B8000
stack
page read and write
1DC4000
heap
page read and write
8DBE000
stack
page read and write
1634000
heap
page read and write
3405000
direct allocation
page read and write
1F9A000
heap
page read and write
218E000
direct allocation
page read and write
6700000
heap
page read and write
6409000
direct allocation
page read and write
17D2000
heap
page read and write
3181000
direct allocation
page read and write
17F4000
heap
page read and write
E7A000
unkown
page read and write
6500000
unkown
page read and write
1A69FCF0000
heap
page read and write
3B49000
direct allocation
page read and write
6616000
heap
page read and write
37AF000
direct allocation
page read and write
1D40000
heap
page read and write
134B000
unkown
page readonly
2010000
heap
page read and write
16C4000
heap
page read and write
4E14000
direct allocation
page read and write
4D70000
heap
page read and write
E7D000
unkown
page read and write
17DC000
heap
page read and write
16D2000
unkown
page readonly
8F5000
unkown
page execute read
1640000
heap
page read and write
1FB9000
heap
page read and write
1696000
unkown
page readonly
1F5F000
heap
page read and write
1302000
unkown
page read and write
E67000
unkown
page read and write
1A69E062000
heap
page read and write
3454000
direct allocation
page read and write
14FB000
stack
page read and write
C70D000
stack
page read and write
17DA000
heap
page read and write
2037000
heap
page read and write
1262000
unkown
page read and write
385B000
direct allocation
page read and write
4D20000
direct allocation
page execute and read and write
1A6A21E5000
heap
page read and write
1337000
unkown
page read and write
3870000
heap
page read and write
25F6000
direct allocation
page read and write
16D5000
unkown
page readonly
1FD2000
heap
page read and write
16C4000
heap
page read and write
11001000
unkown
page execute read
3711000
heap
page read and write
3229000
direct allocation
page read and write
1FEF000
heap
page read and write
3D11000
heap
page read and write
12001000
unkown
page execute read
7CAE000
stack
page read and write
17E1000
heap
page read and write
1A69FFF0000
trusted library allocation
page read and write
38BA000
direct allocation
page read and write
3B11000
heap
page read and write
7FF6CDB7A000
unkown
page readonly
7FF6CDB10000
unkown
page readonly
37B6000
direct allocation
page read and write
1FFC000
heap
page read and write
17D7000
heap
page read and write
2AA1000
heap
page read and write
17DC000
heap
page read and write
E5E000
unkown
page read and write
25D0000
direct allocation
page read and write
37CE000
direct allocation
page read and write
66FD000
heap
page read and write
1317000
unkown
page read and write
1DF4000
heap
page read and write
6C9E000
stack
page read and write
2046000
heap
page read and write
3D11000
heap
page read and write
3421000
direct allocation
page read and write
17AF000
heap
page read and write
3871000
heap
page read and write
5260000
heap
page read and write
556E000
stack
page read and write
2A51000
heap
page read and write
3711000
heap
page read and write
17DC000
heap
page read and write
E65000
unkown
page read and write
17DC000
heap
page read and write
504D000
direct allocation
page read and write
17D7000
heap
page read and write
50C0000
heap
page read and write
4030000
heap
page read and write
1652000
unkown
page readonly
17D8000
heap
page read and write
1A69DF70000
heap
page read and write
510E000
stack
page read and write
201F000
heap
page read and write
3711000
heap
page read and write
7FF6CDB74000
unkown
page read and write
51B0000
heap
page read and write
50A3000
direct allocation
page read and write
1DF4000
heap
page read and write
2A51000
heap
page read and write
17DC000
heap
page read and write
1A6A4356000
heap
page read and write
1A6A422A000
heap
page read and write
290000
heap
page read and write
160D000
unkown
page readonly
1F93000
heap
page read and write
C1CE000
stack
page read and write
36DE000
direct allocation
page read and write
195E000
stack
page read and write
1A6A22C0000
heap
page read and write
21AC000
direct allocation
page read and write
1DC4000
heap
page read and write
694E000
stack
page read and write
F39000
unkown
page readonly
34EF000
direct allocation
page read and write
127F000
unkown
page read and write
1A6A21B2000
heap
page read and write
4F70000
direct allocation
page read and write
1FDA000
heap
page read and write
1A6A2222000
heap
page read and write
31A0000
direct allocation
page read and write
3B30000
heap
page read and write
3463000
direct allocation
page read and write
1F6D000
heap
page read and write
33E000
stack
page read and write
21DF000
direct allocation
page read and write
2658000
direct allocation
page read and write
3811000
heap
page read and write
1A69DFC6000
heap
page read and write
2AA1000
heap
page read and write
6775000
heap
page read and write
33FD000
direct allocation
page read and write
3B2A000
direct allocation
page read and write
3731000
direct allocation
page read and write
3B27000
heap
page read and write
3811000
heap
page read and write
2017000
heap
page read and write
1A69E04F000
heap
page read and write
5426000
heap
page read and write
4E66000
direct allocation
page read and write
2168000
direct allocation
page read and write
3B18000
heap
page read and write
3871000
heap
page read and write
2A51000
heap
page read and write
1F6C000
heap
page read and write
1F15000
heap
page read and write
53BE000
heap
page read and write
2A4000
heap
page read and write
17D7000
heap
page read and write
514B000
trusted library allocation
page read and write
1F74000
heap
page read and write
2687000
direct allocation
page read and write
1A6A435A000
heap
page read and write
1DB0000
heap
page read and write
2651000
direct allocation
page read and write
3711000
heap
page read and write
1A69E01F000
heap
page read and write
1634000
heap
page read and write
1A69DFF0000
heap
page read and write
37BE000
direct allocation
page read and write
14FB000
stack
page read and write
2010000
heap
page read and write
1811000
heap
page read and write
1A69E01F000
heap
page read and write
1676000
unkown
page readonly
66CA000
heap
page read and write
1A69FE92000
heap
page read and write
127B000
unkown
page read and write
53CB000
direct allocation
page read and write
17DD000
heap
page read and write
6732000
heap
page read and write
1DF4000
heap
page read and write
1FEE000
heap
page read and write
1615000
unkown
page readonly
167D000
unkown
page readonly
640E000
heap
page read and write
E59000
unkown
page read and write
E81000
unkown
page read and write
1FE2000
heap
page read and write
1FF7000
heap
page read and write
3B12000
direct allocation
page read and write
64B0000
heap
page read and write
17D7000
heap
page read and write
E2D000
unkown
page execute read
2708000
direct allocation
page read and write
3B11000
heap
page read and write
9AFE000
stack
page read and write
16C4000
heap
page read and write
1664000
heap
page read and write
2248000
direct allocation
page read and write
E59000
unkown
page read and write
B33E000
stack
page read and write
1FE7000
heap
page read and write
17DB000
heap
page read and write
3711000
heap
page read and write
1DC4000
heap
page read and write
1F69000
heap
page read and write
1950000
heap
page read and write
2A51000
heap
page read and write
6B5E000
stack
page read and write
2215000
direct allocation
page read and write
11145000
unkown
page read and write
37EC000
direct allocation
page read and write
320D000
direct allocation
page read and write
1EBF000
stack
page read and write
26F4000
direct allocation
page read and write
674F000
heap
page read and write
1A69E045000
heap
page read and write
1303000
unkown
page read and write
5F1E000
stack
page read and write
3B60000
heap
page read and write
221C000
direct allocation
page read and write
3D2B000
heap
page read and write
1693000
unkown
page readonly
1A6A4355000
heap
page read and write
82FE000
stack
page read and write
1622000
unkown
page readonly
1A69DFCE000
heap
page read and write
3840000
direct allocation
page read and write
BF8E000
stack
page read and write
4C30000
heap
page read and write
3131000
direct allocation
page read and write
122A000
unkown
page execute read
907E000
stack
page read and write
818D000
stack
page read and write
503E000
direct allocation
page read and write
5141000
trusted library allocation
page read and write
7A1E000
stack
page read and write
162F000
unkown
page readonly
6740000
heap
page read and write
5220000
heap
page read and write
E83000
unkown
page read and write
3747000
direct allocation
page read and write
1F70000
heap
page read and write
17ED000
heap
page read and write
1FF3000
heap
page read and write
17DC000
heap
page read and write
3B6D000
direct allocation
page read and write
37C8000
direct allocation
page read and write
50A6000
direct allocation
page read and write
17D8000
heap
page read and write
2AA1000
heap
page read and write
515F000
heap
page read and write
1A6A42D4000
heap
page read and write
3811000
direct allocation
page read and write
1A6A22CE000
heap
page read and write
17DC000
heap
page read and write
2AA2000
heap
page read and write
1A69DFCF000
heap
page read and write
126F000
unkown
page read and write
3871000
heap
page read and write
6411000
trusted library allocation
page read and write
32E0000
direct allocation
page read and write
1A69E01F000
heap
page read and write
678F000
heap
page read and write
4DC0000
direct allocation
page read and write
1244000
unkown
page read and write
3711000
heap
page read and write
1A6A2258000
heap
page read and write
3480000
direct allocation
page read and write
E65000
unkown
page read and write
3B11000
heap
page read and write
671C000
heap
page read and write
3A43000
direct allocation
page read and write
11F7000
stack
page read and write
17CE000
heap
page read and write
E86000
unkown
page read and write
388F000
direct allocation
page read and write
203B000
heap
page read and write
739E000
stack
page read and write
216F000
direct allocation
page read and write
1EF2000
heap
page read and write
53A7000
heap
page read and write
7B6E000
stack
page read and write
1269000
unkown
page read and write
2AA1000
heap
page read and write
1D3E000
stack
page read and write
1FCD000
heap
page read and write
345C000
direct allocation
page read and write
1A69E035000
heap
page read and write
3B4B000
heap
page read and write
1A6A4314000
heap
page read and write
36E5000
direct allocation
page read and write
17D7000
heap
page read and write
E7F000
unkown
page read and write
87FF000
stack
page read and write
1811000
heap
page read and write
2038000
heap
page read and write
1F5E000
heap
page read and write
EDB000
unkown
page read and write
2136000
heap
page read and write
2AA1000
heap
page read and write
17D7000
heap
page read and write
1303000
unkown
page read and write
1AE0000
heap
page read and write
F06000
unkown
page read and write
50A9000
direct allocation
page read and write
1A69DFBB000
heap
page read and write
1FF6000
heap
page read and write
17F8000
heap
page read and write
2270000
heap
page read and write
1A69E01F000
heap
page read and write
17D1000
heap
page read and write
1A69DFE6000
heap
page read and write
1FF3000
heap
page read and write
1A69E002000
heap
page read and write
1DF4000
heap
page read and write
1A6A2289000
heap
page read and write
15EE000
stack
page read and write
1FA9000
heap
page read and write
3152000
direct allocation
page read and write
1664000
heap
page read and write
64E8000
direct allocation
page read and write
12B000
stack
page read and write
58EF000
stack
page read and write
1FB6000
heap
page read and write
3100000
direct allocation
page read and write
1A6A4221000
heap
page read and write
673F000
heap
page read and write
1A5F000
stack
page read and write
3711000
heap
page read and write
17CF000
heap
page read and write
26CF000
direct allocation
page read and write
3780000
direct allocation
page read and write
379D000
direct allocation
page read and write
3B7C000
direct allocation
page read and write
1DC4000
heap
page read and write
1DA4000
heap
page read and write
3927000
direct allocation
page read and write
349000
unkown
page execute read
1FF8000
heap
page read and write
3DB1000
heap
page read and write
17D7000
heap
page read and write
6718000
heap
page read and write
34FD000
direct allocation
page read and write
9E7E000
stack
page read and write
269C000
direct allocation
page read and write
5036000
direct allocation
page read and write
6F3E000
stack
page read and write
3479000
direct allocation
page read and write
1DF4000
heap
page read and write
3711000
heap
page read and write
1DF4000
heap
page read and write
339D000
direct allocation
page read and write
712000
unkown
page execute read
127F000
unkown
page read and write
1634000
heap
page read and write
1A6A21F1000
heap
page read and write
3B11000
heap
page read and write
5141000
heap
page read and write
348F000
direct allocation
page read and write
1FFB000
heap
page read and write
351A000
direct allocation
page read and write
3718000
direct allocation
page read and write
6D6E000
stack
page read and write
7CB000
unkown
page execute read
3D13000
heap
page read and write
265F000
direct allocation
page read and write
37DE000
direct allocation
page read and write
1A69E062000
heap
page read and write
2044000
heap
page read and write
268E000
direct allocation
page read and write
3A23000
heap
page read and write
17DC000
heap
page read and write
8B60000
remote allocation
page read and write
1DF4000
heap
page read and write
1A6A2266000
heap
page read and write
710F000
stack
page read and write
168A000
unkown
page readonly
1A69DF79000
heap
page read and write
51C3000
heap
page read and write
1DC4000
heap
page read and write
500B000
stack
page read and write
17ED000
heap
page read and write
3521000
direct allocation
page read and write
31F8000
direct allocation
page read and write
167E000
stack
page read and write
3811000
heap
page read and write
2A51000
heap
page read and write
2692000
direct allocation
page read and write
203E000
heap
page read and write
5C9D000
stack
page read and write
1F17000
heap
page read and write
3711000
heap
page read and write
1269000
unkown
page read and write
2A51000
heap
page read and write
1A69FE93000
heap
page read and write
1F66000
heap
page read and write
3711000
heap
page read and write
17DB000
heap
page read and write
1279000
unkown
page read and write
1E0E000
stack
page read and write
1268000
unkown
page read and write
3DD1000
heap
page read and write
17DB000
heap
page read and write
5130000
heap
page read and write
3811000
heap
page read and write
2A51000
heap
page read and write
1687000
unkown
page readonly
381F000
direct allocation
page read and write
6726000
heap
page read and write
16BF000
unkown
page readonly
1249000
unkown
page read and write
50B0000
trusted library allocation
page read and write
1A69DFDA000
heap
page read and write
17D7000
heap
page read and write
1E4E000
stack
page read and write
1F14000
heap
page read and write
2AA1000
heap
page read and write
E59000
unkown
page read and write
8EFE000
stack
page read and write
17D7000
heap
page read and write
7B20000
heap
page read and write
2A0000
heap
page read and write
3B11000
heap
page read and write
1560000
heap
page read and write
1A6A4251000
heap
page read and write
3711000
heap
page read and write
3DB1000
heap
page read and write
B78E000
stack
page read and write
530E000
stack
page read and write
16E4000
heap
page read and write
17F0000
heap
page read and write
7FF6CDB7E000
unkown
page write copy
1FBB000
heap
page read and write
3711000
heap
page read and write
1634000
heap
page read and write
53C4000
heap
page read and write
1A6A4152000
heap
page read and write
16E4000
heap
page read and write
3B50000
direct allocation
page read and write
1317000
unkown
page read and write
2A51000
heap
page read and write
2A51000
heap
page read and write
1F57000
heap
page read and write
1F21000
heap
page read and write
17D7000
heap
page read and write
1D96000
heap
page read and write
1F35000
heap
page read and write
1D40000
heap
page read and write
17E1000
heap
page read and write
8F7E000
stack
page read and write
650000
unkown
page readonly
3871000
heap
page read and write
1664000
heap
page read and write
50A8000
direct allocation
page read and write
127F000
unkown
page read and write
63AE000
direct allocation
page read and write
31F8000
direct allocation
page read and write
17EA000
heap
page read and write
1640000
heap
page read and write
2A51000
heap
page read and write
3711000
heap
page read and write
66EB000
heap
page read and write
2A51000
heap
page read and write
17DC000
heap
page read and write
649E000
stack
page read and write
5148000
trusted library allocation
page read and write
17DA000
heap
page read and write
16E4000
heap
page read and write
3B2B000
heap
page read and write
78D000
unkown
page execute read
36FB000
direct allocation
page read and write
3A2000
unkown
page execute read
1A7E000
stack
page read and write
6B9E000
stack
page read and write
3154000
direct allocation
page read and write
1F93000
heap
page read and write
1DCE000
stack
page read and write
2AA1000
heap
page read and write
1FF2000
heap
page read and write
6294000
trusted library allocation
page read and write
1A69E032000
heap
page read and write
1FB4000
heap
page read and write
5350000
heap
page read and write
3B11000
heap
page read and write
1D40000
heap
page read and write
125E000
unkown
page read and write
1DB4000
heap
page read and write
3818000
direct allocation
page read and write
1A69FEB0000
heap
page read and write
2A4000
heap
page read and write
3711000
heap
page read and write
31EB000
direct allocation
page read and write
3711000
direct allocation
page read and write
1A69DFF6000
heap
page read and write
677F000
heap
page read and write
2A4000
heap
page read and write
2AA1000
heap
page read and write
2A51000
heap
page read and write
E2F000
unkown
page execute read
1DB4000
heap
page read and write
17D7000
heap
page read and write
1DF4000
heap
page read and write
2A51000
heap
page read and write
2A51000
heap
page read and write
22B0000
direct allocation
page execute and read and write
BC0E000
stack
page read and write
1601000
unkown
page readonly
266E000
direct allocation
page read and write
17DB000
heap
page read and write
1FC7000
heap
page read and write
1FFB000
heap
page read and write
34B3000
direct allocation
page read and write
6296000
trusted library allocation
page read and write
53D2000
direct allocation
page read and write
1A69E04F000
heap
page read and write
1A69DFCE000
heap
page read and write
1FB3000
heap
page read and write
17DF000
heap
page read and write
1A6A228E000
heap
page read and write
1A6A4355000
heap
page read and write
EE6000
unkown
page read and write
3811000
heap
page read and write
620E000
direct allocation
page read and write
1A6A4192000
heap
page read and write
1FF6000
heap
page read and write
1B7E000
stack
page read and write
1FF9000
heap
page read and write
6705000
heap
page read and write
315C000
direct allocation
page read and write
1A69E045000
heap
page read and write
1DF4000
heap
page read and write
1811000
heap
page read and write
1DC4000
heap
page read and write
1C20000
heap
page read and write
11F7000
stack
page read and write
3710000
heap
page read and write
3871000
heap
page read and write
17D8000
heap
page read and write
75DE000
stack
page read and write
3810000
heap
page read and write
1748000
heap
page read and write
1F31000
heap
page read and write
3711000
heap
page read and write
2273000
direct allocation
page read and write
2AA1000
heap
page read and write
E7A000
unkown
page read and write
1A69DFBC000
heap
page read and write
6F7E000
stack
page read and write
1A69DFAC000
heap
page read and write
17DC000
heap
page read and write
1204F000
unkown
page read and write
7F350000
direct allocation
page read and write
2339CF9000
stack
page read and write
17AC000
heap
page read and write
997E000
stack
page read and write
1C20000
heap
page read and write
1A6A41D4000
heap
page read and write
2AA1000
heap
page read and write
3478000
direct allocation
page read and write
1A6A21AC000
heap
page read and write
12E3000
unkown
page read and write
1FF0000
heap
page read and write
651000
unkown
page execute read
3711000
heap
page read and write
6BDE000
stack
page read and write
2037000
heap
page read and write
1A69DE40000
heap
page read and write
4F70000
direct allocation
page read and write
3471000
direct allocation
page read and write
3711000
heap
page read and write
4EEA000
direct allocation
page read and write
1A69DF20000
heap
page readonly
375C000
direct allocation
page read and write
1A6A42D3000
heap
page read and write
1664000
heap
page read and write
3FF0000
heap
page read and write
17D7000
heap
page read and write
6701000
heap
page read and write
E76000
unkown
page read and write
2AA2000
heap
page read and write
17CD000
heap
page read and write
11F7000
stack
page read and write
781E000
stack
page read and write
3711000
heap
page read and write
39CE000
stack
page read and write
3711000
heap
page read and write
1A6A1904000
heap
page read and write
1A6A010B000
heap
page read and write
3710000
heap
page read and write
1A6A4110000
heap
page read and write
16C0000
heap
page read and write
3740000
direct allocation
page read and write
1A69DFF4000
heap
page read and write
17DA000
heap
page read and write
E65000
unkown
page read and write
16C4000
heap
page read and write
1A69DFBC000
heap
page read and write
1657000
unkown
page readonly
3711000
heap
page read and write
6493000
direct allocation
page read and write
1F72000
heap
page read and write
670E000
heap
page read and write
3B11000
heap
page read and write
7C6F000
stack
page read and write
17ED000
heap
page read and write
16E0000
heap
page read and write
127F000
unkown
page read and write
1FDF000
heap
page read and write
17D7000
heap
page read and write
21A5000
direct allocation
page read and write
4DA8000
direct allocation
page read and write
1DB4000
heap
page read and write
5131000
trusted library allocation
page read and write
1A69E01E000
heap
page read and write
662A000
trusted library allocation
page read and write
1FFF000
heap
page read and write
17E1000
heap
page read and write
6787000
heap
page read and write
62DE000
stack
page read and write
233A5FB000
stack
page read and write
1FBF000
heap
page read and write
7FF6CDB11000
unkown
page execute read
5159000
heap
page read and write
3913000
heap
page read and write
1797000
heap
page read and write
1262000
unkown
page read and write
1A69DFC6000
heap
page read and write
63B6000
direct allocation
page read and write
1FEA000
heap
page read and write
342F000
direct allocation
page read and write
808B000
stack
page read and write
1626000
unkown
page readonly
3B11000
heap
page read and write
17DC000
heap
page read and write
1DC4000
heap
page read and write
12FE000
unkown
page read and write
17E1000
heap
page read and write
3B11000
heap
page read and write
2AA1000
heap
page read and write
1A6A4251000
heap
page read and write
E83000
unkown
page read and write
2AA1000
heap
page read and write
1E8E000
stack
page read and write
31DA000
direct allocation
page read and write
3811000
heap
page read and write
7EA10000
direct allocation
page read and write
6530000
trusted library allocation
page read and write
1A69E045000
heap
page read and write
1DB4000
heap
page read and write
1250000
unkown
page read and write
675F000
heap
page read and write
1F27000
heap
page read and write
53E1000
direct allocation
page read and write
17CD000
heap
page read and write
AD8000
unkown
page execute read
17D0000
heap
page read and write
E67000
unkown
page read and write
1F57000
heap
page read and write
3197000
direct allocation
page read and write
37C1000
direct allocation
page read and write
16E4000
heap
page read and write
1A69DFB0000
heap
page read and write
66F4000
heap
page read and write
5120000
trusted library allocation
page read and write
34C8000
direct allocation
page read and write
E4E000
unkown
page execute read
1643000
unkown
page readonly
B5BE000
stack
page read and write
17DC000
heap
page read and write
3418000
direct allocation
page read and write
1664000
heap
page read and write
16EB000
heap
page read and write
53B0000
heap
page read and write
4E30000
heap
page read and write
7E120000
direct allocation
page read and write
6406000
heap
page read and write
3EDC000
stack
page read and write
542E000
stack
page read and write
2A4000
heap
page read and write
53D9000
direct allocation
page read and write
50D0000
trusted library allocation
page read and write
1FE6000
heap
page read and write
2048000
heap
page read and write
36F0000
heap
page read and write
4D50000
heap
page read and write
3B11000
heap
page read and write
3871000
heap
page read and write
51A5000
heap
page read and write
5257000
heap
page read and write
3711000
heap
page read and write
E2D000
unkown
page execute read
16D2000
heap
page read and write
2256000
direct allocation
page read and write
17D7000
heap
page read and write
6350000
heap
page read and write
17E3000
heap
page read and write
ECA000
unkown
page read and write
17D7000
heap
page read and write
1DB4000
heap
page read and write
There are 2133 hidden memdumps, click here to show them.