IOC Report
2023-1392 Martin y Ruiz Recambio Surtekpdf.exe

loading gif

Files

File Path
Type
Category
Malicious
2023-1392 Martin y Ruiz Recambio Surtekpdf.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.chk
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V010003F.log
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat
Extensible storage engine DataBase, version 0x620, checksum 0x76a227bd, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\259ac23e-b1c3-4bfb-ac0a-e61fb0faf961.14dd425d-35b6-444b-b5ca-9c3cfaea92b8.down_meta
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\259ac23e-b1c3-4bfb-ac0a-e61fb0faf961.up_meta_secure
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\2f0aa06a-2eac-48d2-ae3c-06cbe8298669.9e2b44ee-b25d-4d2e-9efe-00a7f2fef4e4.down_meta
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\2f0aa06a-2eac-48d2-ae3c-06cbe8298669.up_meta_secure
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\329813f0-30e8-4900-86da-f7b53bdcb736.f4db8084-8e3f-4ad2-b525-ea4483360829.down_meta
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\6b696871-99e3-494b-a77d-346a0a91cac6.5cac28f9-891f-475e-9d8e-4cc4f180adc2.down_meta
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\6b696871-99e3-494b-a77d-346a0a91cac6.up_meta_secure
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\7b956fc2-10bf-4613-9ccf-8a5f37d7b08b.9e2b44ee-b25d-4d2e-9efe-00a7f2fef4e4.down_meta
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\91aa46c0-3f43-4766-b141-8d74fbc64914.e48bf1f6-87e3-4ee8-8a36-39b46b372961.down_meta
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\91aa46c0-3f43-4766-b141-8d74fbc64914.up_meta_secure
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\988036f4-7a9b-44f9-843d-56edb9834f6a.9aa337af-22d8-4530-ab5c-64635a656617.down_meta
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\988036f4-7a9b-44f9-843d-56edb9834f6a.up_meta_secure
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\9c257851-05a9-4d6f-9bfd-7b96a578b7e3.14dd425d-35b6-444b-b5ca-9c3cfaea92b8.down_meta
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\a0487ac7-b303-409b-8c03-5343321320ba.03e2ba55-9722-4c17-ad73-20e67ab4621e.down_meta
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\af9da94e-bac7-4960-9d88-76394dd61899.03e2ba55-9722-4c17-ad73-20e67ab4621e.down_meta
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\af9da94e-bac7-4960-9d88-76394dd61899.up_meta_secure
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\b3aaa0fd-1af1-47b7-9bf8-7952de8c7642.5cac28f9-891f-475e-9d8e-4cc4f180adc2.down_meta
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\b7c22f7a-f02a-4668-aae8-cac775d34a47.9aa337af-22d8-4530-ab5c-64635a656617.down_meta
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\c11189aa-fcfd-46a7-962f-9c7f6551a43f.f4db8084-8e3f-4ad2-b525-ea4483360829.down_meta
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\c11189aa-fcfd-46a7-962f-9c7f6551a43f.up_meta_secure
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\e384aa6e-decf-4cdf-9423-690993369311.e48bf1f6-87e3-4ee8-8a36-39b46b372961.down_meta
data
dropped
C:\Users\user\AppData\Local\Temp\nsr4568.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsr4568.tmp\nsExec.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\pedometrician\Burgundernes\Dweeble.lyn
data
dropped
C:\Users\user\AppData\Roaming\pedometrician\Burgundernes\Klevinkel\Quondam.kir
data
dropped
C:\Users\user\AppData\Roaming\pedometrician\Burgundernes\Klevinkel\Uncropt192.Coe
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Roaming\pedometrician\Burgundernes\Klevinkel\bjergnder.sor
data
dropped
C:\Users\user\AppData\Roaming\pedometrician\Burgundernes\Klevinkel\familiefdre.mos
data
dropped
C:\Users\user\AppData\Roaming\pedometrician\Burgundernes\Klevinkel\interhybridizes.ind
data
dropped
C:\Users\user\AppData\Roaming\pedometrician\Burgundernes\Klevinkel\jurisdiktion.sar
data
dropped
C:\Users\user\AppData\Roaming\pedometrician\Burgundernes\Klevinkel\slbemaalets.tza
data
dropped
C:\Users\user\AppData\Roaming\pedometrician\Burgundernes\Klevinkel\spermatozoers.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\pedometrician\Burgundernes\eidola.Esc
data
dropped
There are 27 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\2023-1392 Martin y Ruiz Recambio Surtekpdf.exe
"C:\Users\user\Desktop\2023-1392 Martin y Ruiz Recambio Surtekpdf.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x53^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x55^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x43^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x54^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x15^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x14^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x1C^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x1C^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x75^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4E^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x49^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x51^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x71^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x48^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x42^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x49^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x51^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0E^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x54^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x11^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0A^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x16^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x5F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4B^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x55^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x50^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x45^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x54^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x52^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x08^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x42^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4A^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4A^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x1C^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x1C^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x79^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x49^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x56^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x43^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x48^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0E^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4B^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x54^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x12^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0A^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x16^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x5E^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x1E^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x16^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x16^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x16^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0A^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x16^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x5E^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x17^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x16^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x16^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x08^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x54^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x13^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x5F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x6D^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x63^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x74^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x68^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x63^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x6A^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x15^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x14^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x1C^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x1C^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x70^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x54^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x52^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x53^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x47^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4A^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x67^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4A^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4A^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x49^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x45^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x63^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x5E^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0E^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0B^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x17^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0A^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x16^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0A^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x17^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x12^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x10^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x16^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x10^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x15^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x15^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x10^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0A^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x16^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x5E^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x15^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x16^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x16^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x16^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0A^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x10^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x12^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x56^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x08^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x54^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x12^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x5F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4B^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x55^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x50^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x45^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x54^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x52^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x1C^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x1C^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x79^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4A^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x55^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x43^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x43^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4D^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0E^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x54^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x13^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0A^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x11^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x17^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x1F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x16^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0A^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x16^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x08^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x54^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x11^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x5F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4B^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x55^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x50^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x45^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x54^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x52^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x08^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x42^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4A^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4A^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x1C^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x1C^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x79^38"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k UnistackSvcGroup
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x54^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x43^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x47^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x42^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0E^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x54^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x13^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0A^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x54^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x12^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0A^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x17^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x12^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x10^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x16^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x10^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x15^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x15^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x10^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x5F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x53^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x55^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x43^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x54^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x15^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x14^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x1C^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x1C^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x65^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x47^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4A^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4A^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x71^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x48^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x42^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x49^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x51^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x76^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x54^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x49^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x45^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x67^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0E^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x54^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x12^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0A^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x16^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0A^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x16^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0A^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x16^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0A^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x4F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x06^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x16^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x0F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c set /a "0x5F^38"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Users\user\Desktop\2023-1392 Martin y Ruiz Recambio Surtekpdf.exe
"C:\Users\user\Desktop\2023-1392 Martin y Ruiz Recambio Surtekpdf.exe"
malicious
C:\Windows\System32\dllhost.exe
C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
C:\Windows\System32\dllhost.exe
C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
C:\Windows\System32\backgroundTaskHost.exe
"C:\WINDOWS\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider
C:\Windows\System32\RuntimeBroker.exe
C:\Windows\System32\RuntimeBroker.exe -Embedding
C:\Windows\System32\BackgroundTransferHost.exe
"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Windows\System32\BackgroundTransferHost.exe
"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
C:\Windows\System32\BackgroundTransferHost.exe
"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
C:\Windows\System32\BackgroundTransferHost.exe
"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
There are 548 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.isrninjas.com/9s7p/?rPvL=sLAP7bV81f&sbH8wd=iDD5DZIpHBKwC3fUs2+dweSj3L/Jc1TvnQA5Dk5E9UV53KOnngl3KjAOAJ/+bY6yLnIXHFzkM2NbnoYddNxkDMaR6Yx+R6wrTOEuZi92Rr99LElNF3fYpfg=
3.33.130.190
malicious
http://www.hunterpur.life/u3mn/
198.177.123.106
malicious
http://www.theppelin.online/olix/
194.58.112.174
malicious
http://www.jl800.vip/1f8k/?rPvL=sLAP7bV81f&sbH8wd=QhX0EGGYplx+FzEhC39pebdgTSyI92/iz6qx2lO1iBZqIUQcG58nXSYW5JnsqL34Z2PG2Si8koxzc8hZGd6LuUYka3FiNdkGgDhZSs4cWReGV1Sd7g8C/yk=
38.47.158.215
malicious
http://www.meikhaof23.cc/ccfm/
45.205.2.38
malicious
http://www.dexiangovernment.org/s3pw/?sbH8wd=NwxaQaJsAK68DiszuFUIY+REn4y1zs0UlgA5H5FJiNYglZ0ymN6ZMAr6oJ9cBVPJOVF0fGBJyQQoApJN/tXtPMJrELNXqISlk3O8UH2PSRA10r17P1omjMI=&rPvL=sLAP7bV81f
3.33.130.190
malicious
http://www.dichbornholm.com/glaz/?rPvL=sLAP7bV81f&sbH8wd=k8ZCK4mb5hR7Ax9dLYqvgeRpCDF4laYM3Hrv7gV7FmhBp1AET1rRYhWPVs8cFCc+X0g5WpBjRoj7ZFfxcdlHlzFVQSklu6eMQml87za41m1BkG+7m+mtgF4=
46.30.215.97
malicious
http://www.tsamparlishop.gr/j32z/
209.124.66.11
malicious
http://www.theppelin.online/olix/?sbH8wd=cZ9bJeUuHpIDOHetAk0ANFSF23i/FqVNWbK6+c0EFewD0gNgRsJS0M6iOWQEynTUAGxw/fUWmIFoYuO8WzAY8uTVYmnVMlfAjps1TxR/4bX30G99VQuiBXQ=&rPvL=sLAP7bV81f
194.58.112.174
malicious
http://www.j24.top/v5wt/
185.27.134.155
malicious
http://www.1401qs.cc/puca/
122.10.51.226
malicious
http://www.hilfe24x7.de/a9n4/
3.33.130.190
malicious
http://www.businessbots.shop/wbob/?sbH8wd=eocuRqTI3drDyS/EeLiYsOgo/FtYpajbUVOgdcaC051DdDUEIYHLZXSPgfSoFhMY4mte06gjt34qTLOQEDaZYW+c7aRVSQvhlx4Xt2TNDKQtfpo8xSNzbi0=&rPvL=sLAP7bV81f
194.58.112.174
malicious
http://www.dexiangovernment.org/s3pw/
3.33.130.190
malicious
http://www.jiffad.com/t7qk/
38.173.29.32
malicious
http://www.jl800.vip/1f8k/
38.47.158.215
malicious
http://www.hilfe24x7.de/a9n4/?sbH8wd=Z6NeJWCAO4UWkQQZnIW3J6ShlWnr/mWxlv/v5WLzX4nFKsBSQwEAPdr7iKFkWsdWt1b7OqVzoLxdNpYogVex4pRwyWXNM2BCxH4E51wmZhGfueLt7Rj8IQA=&rPvL=sLAP7bV81f
3.33.130.190
malicious
http://www.j24.top/v5wt/?rPvL=sLAP7bV81f&sbH8wd=AitvoM7AOhpjFvNwM6gJW8oy9jzTdQXRe3fUqp28ahQRIkPOlm4ydpLuNxt/lnK8v7D3YRrKq+TXB/ijd3jF8hJ7oA4Hwc6IeFZMDGFGIhmWZwpXVUCu+m4=
185.27.134.155
malicious
http://www.jnurou.sbs/evun/
116.213.43.190
malicious
http://www.1401qs.cc/puca/?rPvL=sLAP7bV81f&sbH8wd=0ZaTP653MFYaNpLm0ddUsoB5BM+TvwTr8t3R21wscio1DPQxaYcdBdHAlBRg5HIF10RIIMRw0WacknLijFHBtGSe9I3f4SUofKpnwM7q1oakPR2JMNCu5s4=
122.10.51.226
malicious
http://www.tsamparlishop.gr/j32z/?rPvL=sLAP7bV81f&sbH8wd=plO+W3/VdlLNqMrGxUVnJzhjPnkKfuSvLBdGJ8+CNa+EddNwjkQbJNP1tGgw3EqHNM9wBRZ2rTMcuD/81bmrFFgcNBKK0kDq/beQOIEvOREpy4cfFJe80CE=
209.124.66.11
malicious
http://www.businessbots.shop/wbob/
194.58.112.174
malicious
http://www.dichbornholm.com/glaz/
46.30.215.97
malicious
http://www.cica-rank.com/xgxa/
183.181.79.111
malicious
http://www.hunterpur.life/u3mn/?rPvL=sLAP7bV81f&sbH8wd=nSsYYb7WXXBS266Eml+Y5PdZAuLb9H7GgybXGBvnmAj0+Kqv+gLVG017TzQmkZvOvvR4TUluUcDw+kFCzbxcDhyGe4jJW7ZpifX62Ne9qf5JQk93uU93Eac=
198.177.123.106
malicious
http://www.jiffad.com/t7qk/?sbH8wd=Kb3sbt59Ht5f9Q1h1sFXRC4j6nryo9u3djDhDh9p88f7GAlroKHENhzESgj9YPuDcOMO12qdigNZoqeXTeTYsmYtERwq0/AbFviNzEwUIhyfRWaw7mh8kVw=&rPvL=sLAP7bV81f
38.173.29.32
malicious
http://www.auronhouse.com/8rkh/?sbH8wd=vmmJHeFw5nvl69b8CbFTFU3YKXxtRr9AtMJBnyO3UFLOYhHqctbe8l5iObcZJWXr1wzkaO7vkvIrJU/SkdmR3bTJJCYeYWaVoDbBjkkAsNIuPKr3n79Ufqg=&rPvL=sLAP7bV81f
172.253.62.121
http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.
unknown
https://drive.usercontent.google.com/
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD
unknown
http://www.gopher.ftp://ftp.
unknown
https://www.google.com
unknown
http://www.auronhouse.com/8rkh/
172.253.62.121
http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
unknown
http://nsis.sf.net/NSIS_Error
unknown
https://drive.google.com/
unknown
https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
unknown
http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
unknown
http://www.quovadis.bm0
unknown
https://apis.google.com
unknown
https://ocsp.quovadisoffshore.com0
unknown
There are 32 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.theppelin.online
194.58.112.174
malicious
www.jnurou.sbs
116.213.43.190
malicious
8418a72e.jl800.vip.cname.scname.com
38.47.158.215
malicious
isrninjas.com
3.33.130.190
malicious
tsamparlishop.gr
209.124.66.11
malicious
myjohnny.rf.gd
185.27.134.155
malicious
y94hr.top
38.47.207.149
malicious
www.hunterpur.life
198.177.123.106
malicious
www.cica-rank.com
183.181.79.111
malicious
hilfe24x7.de
3.33.130.190
malicious
www.jiffad.com
38.173.29.32
malicious
dexiangovernment.org
3.33.130.190
malicious
www.dichbornholm.com
46.30.215.97
malicious
www.1401qs.cc
122.10.51.226
malicious
www.embrace-counselor.com
202.233.67.46
malicious
www.businessbots.shop
194.58.112.174
malicious
www.ericspetz.se
194.9.94.85
malicious
www.meikhaof23.cc
45.205.2.38
malicious
www.auronhouse.com
unknown
malicious
www.tsamparlishop.gr
unknown
malicious
tse1.mm.bing.net
unknown
malicious
www.isrninjas.com
unknown
malicious
www.j24.top
unknown
malicious
www.hilfe24x7.de
unknown
malicious
www.jl800.vip
unknown
malicious
www.dexiangovernment.org
unknown
malicious
www.y94hr.top
unknown
malicious
drive.usercontent.google.com
172.253.122.132
www.chooceseafood.ca
199.59.243.225
drive.google.com
142.251.167.139
ghs.googlehosted.com
172.253.62.121
There are 21 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
183.181.79.111
www.cica-rank.com
Japan
malicious
185.27.134.155
myjohnny.rf.gd
United Kingdom
malicious
46.30.215.97
www.dichbornholm.com
Denmark
malicious
38.47.158.215
8418a72e.jl800.vip.cname.scname.com
United States
malicious
209.124.66.11
tsamparlishop.gr
United States
malicious
45.205.2.38
www.meikhaof23.cc
Seychelles
malicious
116.213.43.190
www.jnurou.sbs
Hong Kong
malicious
38.173.29.32
www.jiffad.com
United States
malicious
198.177.123.106
www.hunterpur.life
United States
malicious
122.10.51.226
www.1401qs.cc
Hong Kong
malicious
194.58.112.174
www.theppelin.online
Russian Federation
malicious
3.33.130.190
isrninjas.com
United States
malicious
172.253.62.121
ghs.googlehosted.com
United States
172.253.122.132
drive.usercontent.google.com
United States
142.251.167.139
drive.google.com
United States
There are 5 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_CURRENT_USER\investeringsforeningerne\perennate\teleselskaberne
Jenskade242
HKEY_CURRENT_USER\markrknuderne\vederkvg\packwaxes
forsmt
HKEY_CURRENT_USER\styrtflyvnings\Uninstall\Suboblique43
scaldic
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\WMI\Security
c688cf83-9945-5ff6-0e1e-1ff1f8a2ec9a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator
StartWorkerOnServiceStart
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator\Scheduler
Checking to see if mostack override has changed
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator\Scheduler
UsoCrmScan
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator\Scheduler
CleanupUsoLogs

Memdumps

Base Address
Regiontype
Protect
Malicious
46E9000
direct allocation
page execute and read and write
malicious
F90000
system
page execute and read and write
malicious
2E40000
trusted library allocation
page read and write
malicious
2F60000
unkown
page execute and read and write
malicious
32560000
unclassified section
page execute and read and write
malicious
670000
system
page execute and read and write
malicious
2F10000
trusted library allocation
page read and write
malicious
32BC0000
unclassified section
page execute and read and write
malicious
72F000
heap
page read and write
malicious
3A0000
heap
page read and write
2F2F000
stack
page read and write
36AF000
unkown
page read and write
3FE000
unkown
page read and write
3591000
heap
page read and write
3610000
heap
page read and write
2E9B000
heap
page read and write
2F20000
heap
page read and write
283E000
unkown
page read and write
3841000
heap
page read and write
2EDB000
heap
page read and write
6B0000
heap
page read and write
2CFD000
stack
page read and write
31D6000
heap
page read and write
2EC6000
heap
page read and write
2FEF000
stack
page read and write
3216000
heap
page read and write
2D5D000
stack
page read and write
680000
heap
page read and write
51D000
stack
page read and write
2DF6000
heap
page read and write
3226000
heap
page read and write
53E000
unkown
page read and write
3036000
heap
page read and write
2D4E000
stack
page read and write
2A47000
heap
page read and write
3316000
heap
page read and write
21EAF940000
remote allocation
page read and write
6CE000
unkown
page read and write
3506000
heap
page read and write
2F16000
heap
page read and write
63D000
stack
page read and write
2C4E000
unkown
page read and write
36C6000
heap
page read and write
33E0000
heap
page read and write
600000
heap
page read and write
67E000
unkown
page read and write
5DE000
stack
page read and write
274E000
stack
page read and write
2E46000
heap
page read and write
35D1000
heap
page read and write
2946000
heap
page read and write
2A96000
heap
page read and write
2F60000
heap
page read and write
2C80000
heap
page read and write
5B6000
heap
page read and write
315E000
unkown
page read and write
299E000
stack
page read and write
2D80000
heap
page read and write
750000
heap
page read and write
27FE000
unkown
page read and write
74E000
unkown
page read and write
3066000
heap
page read and write
31D000
stack
page read and write
28FE000
stack
page read and write
4216000
unkown
page read and write
2C5E000
stack
page read and write
2A70000
heap
page read and write
2C3D000
unkown
page read and write
1680000
unkown
page readonly
37A0000
heap
page read and write
329B000
heap
page read and write
2C9E000
stack
page read and write
2C6F000
stack
page read and write
2FC0000
heap
page read and write
2E5E000
stack
page read and write
2E46000
heap
page read and write
2F5D000
stack
page read and write
5CE000
stack
page read and write
2C80000
heap
page read and write
325D000
stack
page read and write
262C000
heap
page read and write
30C6000
heap
page read and write
30A1000
heap
page read and write
14178000
system
page read and write
305F000
unkown
page read and write
2636000
heap
page read and write
3430000
heap
page read and write
326E000
unkown
page read and write
2947000
heap
page read and write
2890000
heap
page read and write
3226000
heap
page read and write
3640000
heap
page read and write
3376000
heap
page read and write
2EF0000
heap
page read and write
32C6000
heap
page read and write
2F76000
heap
page read and write
2D41000
heap
page read and write
2DBF000
stack
page read and write
34D0000
heap
page read and write
2B7F000
unkown
page read and write
30AE000
unkown
page read and write
507E000
unclassified section
page read and write
2B40000
heap
page read and write
289B000
heap
page read and write
2B3E000
stack
page read and write
107E000
system
page execute and read and write
3DD000
stack
page read and write
30CE000
unkown
page read and write
38D1000
heap
page read and write
1EE000
unkown
page read and write
3576000
heap
page read and write
3301000
heap
page read and write
2DFD000
stack
page read and write
2F20000
heap
page read and write
318E000
stack
page read and write
33E0000
heap
page read and write
3380000
heap
page read and write
290E000
stack
page read and write
294E000
stack
page read and write
2B8F000
stack
page read and write
2BA0000
heap
page read and write
5AD000
stack
page read and write
2643000
heap
page read and write
29D1000
heap
page read and write
2A8D000
stack
page read and write
32A6000
heap
page read and write
280000
heap
page read and write
315F000
unkown
page read and write
32A1000
heap
page read and write
32AE000
unkown
page read and write
1F4560AE000
trusted library allocation
page read and write
3B26000
heap
page read and write
327D000
stack
page read and write
3506000
heap
page read and write
3836000
heap
page read and write
27FE000
stack
page read and write
3241000
heap
page read and write
3711000
heap
page read and write
3491000
heap
page read and write
36A0000
heap
page read and write
2D00000
heap
page read and write
33B0000
heap
page read and write
315E000
stack
page read and write
32A0000
heap
page read and write
352F000
unkown
page read and write
2C9E000
unkown
page read and write
2E30000
heap
page read and write
32CF000
stack
page read and write
5D0000
heap
page read and write
2D3D000
stack
page read and write
6FF34000
unkown
page readonly
3596000
heap
page read and write
3740000
heap
page read and write
3470000
heap
page read and write
319B000
heap
page read and write
31D0000
heap
page read and write
2D3D000
stack
page read and write
2980000
heap
page read and write
30A0000
heap
page read and write
2C90000
heap
page read and write
2A8F000
unkown
page read and write
60E000
unkown
page read and write
2C20000
heap
page read and write
2BC0000
heap
page read and write
2C3E000
stack
page read and write
27FE000
unkown
page read and write
2FC0000
heap
page read and write
32F6000
heap
page read and write
34C6000
heap
page read and write
2BC1000
heap
page read and write
35CF000
stack
page read and write
2CFE000
stack
page read and write
36CF000
stack
page read and write
2BBE000
unkown
page read and write
3100000
heap
page read and write
2F8F000
stack
page read and write
2D20000
heap
page read and write
3320000
heap
page read and write
2FCE000
unkown
page read and write
30CF000
stack
page read and write
30AE000
unkown
page read and write
33C0000
heap
page read and write
2E50000
heap
page read and write
3440000
heap
page read and write
36A6000
heap
page read and write
3170000
heap
page read and write
2B4D000
stack
page read and write
3746000
heap
page read and write
2E70000
unkown
page readonly
3036000
heap
page read and write
298F000
unkown
page read and write
3090000
heap
page read and write
35B0000
heap
page read and write
2910000
heap
page read and write
32AE000
stack
page read and write
2C8F000
stack
page read and write
2FC6000
heap
page read and write
2EA0000
heap
page read and write
2D90000
heap
page read and write
2B4B000
heap
page read and write
2E5E000
stack
page read and write
287B000
heap
page read and write
401000
unkown
page execute read
750000
heap
page read and write
730000
heap
page read and write
335E000
stack
page read and write
2F76000
heap
page read and write
2D7F000
unkown
page read and write
F0000
heap
page read and write
398F000
stack
page read and write
3221000
heap
page read and write
3BD000
stack
page read and write
2FC0000
heap
page read and write
264A000
heap
page read and write
2FD0000
heap
page read and write
32B6000
heap
page read and write
2FF0000
heap
page read and write
2D41000
heap
page read and write
6FF30000
unkown
page readonly
31D0000
heap
page read and write
746000
heap
page read and write
2D2E000
unkown
page read and write
2EFE000
stack
page read and write
2D41000
heap
page read and write
2D6E000
unkown
page read and write
31EF000
stack
page read and write
28F0000
heap
page read and write
37E0000
heap
page read and write
3620000
heap
page read and write
3560000
heap
page read and write
312E000
unkown
page read and write
750000
heap
page read and write
73E000
unkown
page read and write
2D41000
heap
page read and write
39C6000
heap
page read and write
3296000
heap
page read and write
332F000
unkown
page read and write
2A5D000
stack
page read and write
2E1E000
unkown
page read and write
36D6000
heap
page read and write
292B000
heap
page read and write
2D56000
heap
page read and write
2D41000
heap
page read and write
27FE000
stack
page read and write
2EC0000
heap
page read and write
320E000
stack
page read and write
30F0000
heap
page read and write
3226000
heap
page read and write
3250000
heap
page read and write
2AA0000
heap
page read and write
340000
heap
page read and write
2B3E000
stack
page read and write
3506000
heap
page read and write
2CB6000
heap
page read and write
314F000
unkown
page read and write
296B000
heap
page read and write
2BF0000
heap
page read and write
34D6000
heap
page read and write
1C0000
heap
page read and write
1D297E02000
trusted library allocation
page read and write
30A0000
heap
page read and write
34F1000
heap
page read and write
2DF2000
unkown
page read and write
3AF6000
heap
page read and write
3836000
heap
page read and write
3340000
heap
page read and write
2C4E000
stack
page read and write
302E000
stack
page read and write
3810000
heap
page read and write
2E30000
heap
page read and write
3636000
heap
page read and write
330E000
unkown
page read and write
2FB0000
heap
page read and write
3406000
heap
page read and write
2C0E000
unkown
page read and write
75D000
stack
page read and write
344E000
stack
page read and write
3950000
heap
page read and write
32A0000
heap
page read and write
35A6000
heap
page read and write
281E000
unkown
page read and write
2E87000
heap
page read and write
2D41000
heap
page read and write
2FAF000
stack
page read and write
27FE000
unkown
page read and write
1027000
system
page execute and read and write
28E0000
heap
page read and write
31F1000
heap
page read and write
30FD000
stack
page read and write
2D5F000
stack
page read and write
30D0000
heap
page read and write
3910000
heap
page read and write
304E000
stack
page read and write
2FA6000
heap
page read and write
2930000
heap
page read and write
30000
heap
page read and write
2EFF000
unkown
page read and write
30FF000
unkown
page read and write
2AFE000
stack
page read and write
9D000
stack
page read and write
2CA0000
heap
page read and write
3026000
heap
page read and write
363F000
stack
page read and write
2990000
heap
page read and write
3AF0000
heap
page read and write
34B1000
heap
page read and write
33FE000
stack
page read and write
3090000
heap
page read and write
30C0000
heap
page read and write
1F454166000
system
page execute and read and write
33CE000
unkown
page read and write
35C0000
heap
page read and write
3591000
heap
page read and write
2FCF000
stack
page read and write
331E000
unkown
page read and write
35E0000
heap
page read and write
30E0000
heap
page read and write
3530000
heap
page read and write
33F1000
heap
page read and write
73E000
unkown
page read and write
30CF000
unkown
page read and write
2FF0000
heap
page read and write
2CFE000
stack
page read and write
2D50000
heap
page read and write
37DF000
stack
page read and write
2D41000
heap
page read and write
4FE000
stack
page read and write
3696000
heap
page read and write
37F0000
heap
page read and write
33D0000
heap
page read and write
446000
unkown
page readonly
320F000
unkown
page read and write
3830000
heap
page read and write
2B50000
heap
page read and write
316E000
stack
page read and write
34FE000
stack
page read and write
F50000
unkown
page read and write
322E0000
remote allocation
page read and write
326F000
unkown
page read and write
28C0000
heap
page read and write
3511000
heap
page read and write
2E01000
heap
page read and write
3100000
heap
page read and write
2D41000
heap
page read and write
37DF000
stack
page read and write
2BCE000
stack
page read and write
365F000
stack
page read and write
30D0000
heap
page read and write
31CE000
stack
page read and write
335E000
stack
page read and write
390F000
stack
page read and write
6E0000
heap
page read and write
2D41000
heap
page read and write
30CF000
unkown
page read and write
36C1000
heap
page read and write
2BD0000
heap
page read and write
73E000
unkown
page read and write
2C10000
heap
page read and write
2ABD000
stack
page read and write
2A40000
heap
page read and write
14784000
system
page read and write
2D41000
heap
page read and write
25BF000
stack
page read and write
28BF000
unkown
page read and write
2F26000
heap
page read and write
2AD1000
heap
page read and write
75E000
unkown
page read and write
36A1000
heap
page read and write
370000
heap
page read and write
2EFE000
stack
page read and write
2866000
heap
page read and write
71E000
unkown
page read and write
32FE000
stack
page read and write
F0000
heap
page read and write
270E000
stack
page read and write
33C0000
heap
page read and write
2FD000
stack
page read and write
313E000
stack
page read and write
13D000
stack
page read and write
2F76000
heap
page read and write
2EFD000
stack
page read and write
3221000
heap
page read and write
3110000
heap
page read and write
306F000
stack
page read and write
2C40000
heap
page read and write
2F90000
heap
page read and write
38B0000
heap
page read and write
740000
heap
page read and write
49D000
stack
page read and write
3460000
heap
page read and write
2F40000
heap
page read and write
2CDF000
unkown
page read and write
373E000
stack
page read and write
2D1F000
unkown
page read and write
2D41000
heap
page read and write
2FAF000
stack
page read and write
2A30000
heap
page read and write
2830000
heap
page read and write
2D50000
heap
page read and write
372E000
unkown
page read and write
386E000
stack
page read and write
2BEE000
stack
page read and write
38D0000
heap
page read and write
2CC0000
heap
page read and write
2D41000
heap
page read and write
2B6E000
stack
page read and write
36E1000
heap
page read and write
31FE000
unkown
page read and write
60E000
unkown
page read and write
3180000
heap
page read and write
2A66000
heap
page read and write
330F000
stack
page read and write
2B70000
heap
page read and write
71E000
stack
page read and write
36B0000
heap
page read and write
6C0000
heap
page read and write
315F000
unkown
page read and write
2F27000
heap
page read and write
2B96000
heap
page read and write
34EE000
unkown
page read and write
2EF6000
heap
page read and write
34CE000
stack
page read and write
33EF000
unkown
page read and write
2D41000
heap
page read and write
31F0000
heap
page read and write
303B000
heap
page read and write
2E90000
heap
page read and write
3216000
heap
page read and write
6BE000
unkown
page read and write
32DF000
unkown
page read and write
756000
heap
page read and write
6FE000
stack
page read and write
3450000
heap
page read and write
4630000
direct allocation
page execute and read and write
2E40000
heap
page read and write
2FCD000
stack
page read and write
2FF0000
heap
page read and write
1BD000
stack
page read and write
3570000
heap
page read and write
3926000
heap
page read and write
28BF000
unkown
page read and write
35A1000
heap
page read and write
3066000
heap
page read and write
2DF0000
heap
page read and write
3416000
heap
page read and write
4CD000
stack
page read and write
32E1000
heap
page read and write
30BF000
unkown
page read and write
2B10000
heap
page read and write
2EE0000
heap
page read and write
2F5F000
stack
page read and write
73E000
stack
page read and write
3220000
heap
page read and write
27FE000
unkown
page read and write
2B9F000
stack
page read and write
2918000
heap
page read and write
F0000
heap
page read and write
3436000
heap
page read and write
C60000
heap
page read and write
2C8E000
unkown
page read and write
2D41000
heap
page read and write
2D41000
heap
page read and write
21EAF940000
remote allocation
page read and write
720000
heap
page read and write
42B000
unkown
page read and write
2D60000
heap
page read and write
2DFE000
unkown
page read and write
21F607A0000
trusted library allocation
page read and write
3316000
heap
page read and write
590000
heap
page read and write
2D41000
heap
page read and write
32B6000
heap
page read and write
357F000
unkown
page read and write
2E30000
heap
page read and write
2BEE000
unkown
page read and write
341E000
unkown
page read and write
6FE000
stack
page read and write
2E4F000
unkown
page read and write
2D7B000
heap
page read and write
32C6000
heap
page read and write
35C7000
heap
page read and write
3910000
heap
page read and write
6FD000
stack
page read and write
360F000
stack
page read and write
35D6000
heap
page read and write
36A6000
heap
page read and write
305D000
stack
page read and write
34A1000
heap
page read and write
2BFD000
stack
page read and write
3950000
heap
page read and write
2950000
heap
page read and write
3E0000
unkown
page readonly
32B6000
heap
page read and write
2F3D000
stack
page read and write
330F000
stack
page read and write
314F000
unkown
page read and write
2C90000
heap
page read and write
39D6000
heap
page read and write
3960000
heap
page read and write
2F80000
heap
page read and write
3BD6000
heap
page read and write
1029000
system
page execute and read and write
3FD000
stack
page read and write
3E1000
unkown
page execute read
2B5E000
stack
page read and write
3440000
heap
page read and write
FD000
stack
page read and write
D76000
heap
page read and write
346E000
stack
page read and write
32FE000
stack
page read and write
2D10000
heap
page read and write
37FF000
unkown
page read and write
36BE000
stack
page read and write
2F9E000
stack
page read and write
2C98000
heap
page read and write
3AB6000
heap
page read and write
3396000
heap
page read and write
35F1000
heap
page read and write
3496000
heap
page read and write
2B40000
heap
page read and write
1F0000
heap
page read and write
36DE000
stack
page read and write
3A66000
heap
page read and write
2B60000
heap
page read and write
27FE000
unkown
page read and write
F50000
unkown
page read and write
290E000
stack
page read and write
308F000
stack
page read and write
756000
heap
page read and write
2E90000
heap
page read and write
7A9E000
heap
page read and write
349F000
unkown
page read and write
26E127F000
stack
page read and write
2D41000
heap
page read and write
3421000
heap
page read and write
2FCF000
stack
page read and write
3510000
heap
page read and write
2C8E000
unkown
page read and write
28BE000
unkown
page read and write
300E000
stack
page read and write
27FE000
stack
page read and write
35C1000
heap
page read and write
298F000
unkown
page read and write
6D0000
heap
page read and write
47D000
stack
page read and write
33EF000
stack
page read and write
301B000
heap
page read and write
32520000
direct allocation
page read and write
3221000
heap
page read and write
3580000
heap
page read and write
2E00000
heap
page read and write
30FD000
stack
page read and write
3AE0000
heap
page read and write
2BAD000
stack
page read and write
3130000
heap
page read and write
730000
heap
page read and write
74E000
stack
page read and write
2CB0000
heap
page read and write
2F30000
heap
page read and write
71E000
unkown
page read and write
329E000
stack
page read and write
2D41000
heap
page read and write
3041000
heap
page read and write
39FF000
stack
page read and write
3467000
heap
page read and write
3296000
heap
page read and write
48D000
stack
page read and write
2F9E000
stack
page read and write
3210000
heap
page read and write
38E1000
heap
page read and write
2FE0000
heap
page read and write
2DDF000
stack
page read and write
2D20000
heap
page read and write
446000
unkown
page readonly
2DBB000
heap
page read and write
2C80000
heap
page read and write
30C0000
heap
page read and write
2D90000
heap
page read and write
28E7000
heap
page read and write
66D000
stack
page read and write
339B000
heap
page read and write
2B00000
heap
page read and write
28C0000
heap
page read and write
3631000
heap
page read and write
2E60000
heap
page read and write
269E000
heap
page read and write
3630000
heap
page read and write
3486000
heap
page read and write
313E000
stack
page read and write
3300000
heap
page read and write
3420000
heap
page read and write
34C6000
heap
page read and write
2D41000
heap
page read and write
2FE0000
heap
page read and write
2E80000
heap
page read and write
31AF000
unkown
page read and write
28BE000
unkown
page read and write
31F0000
heap
page read and write
2E6E000
stack
page read and write
2CAD000
stack
page read and write
37B6000
heap
page read and write
3590000
heap
page read and write
327D000
stack
page read and write
3036000
heap
page read and write
2AD0000
heap
page read and write
2D24000
heap
page read and write
351F000
stack
page read and write
3970000
heap
page read and write
3011000
heap
page read and write
2E80000
heap
page read and write
3456000
heap
page read and write
1F4540C0000
heap
page read and write
2F46000
heap
page read and write
2C5F000
stack
page read and write
2F50000
heap
page read and write
2EFE000
stack
page read and write
3A10000
heap
page read and write
2C86000
heap
page read and write
35DF000
stack
page read and write
21EADE6E000
heap
page read and write
38E0000
heap
page read and write
30E6000
heap
page read and write
2CB0000
heap
page read and write
2890000
heap
page read and write
420000
heap
page read and write
6CF000
unkown
page read and write
32520000
heap
page read and write
392F000
stack
page read and write
324E000
unkown
page read and write
35A0000
heap
page read and write
2AE0000
heap
page read and write
36E0000
heap
page read and write
1F454235000
heap
page read and write
2A20000
heap
page read and write
2DC6000
heap
page read and write
33E0000
heap
page read and write
2917000
heap
page read and write
2F5F000
unkown
page read and write
2CD0000
heap
page read and write
21F6002A000
heap
page read and write
340E000
unkown
page read and write
2AB0000
heap
page read and write
73E000
stack
page read and write
340F000
stack
page read and write
69D000
stack
page read and write
2C60000
heap
page read and write
2D4D000
stack
page read and write
2D41000
heap
page read and write
3186000
heap
page read and write
75E000
stack
page read and write
36EF000
unkown
page read and write
2D5F000
stack
page read and write
2C11000
heap
page read and write
2BF6000
heap
page read and write
290D000
stack
page read and write
3A60000
heap
page read and write
37C6000
heap
page read and write
2D7D000
stack
page read and write
2F80000
heap
page read and write
2DD1000
heap
page read and write
2F9F000
stack
page read and write
309F000
stack
page read and write
35D0000
heap
page read and write
34F0000
heap
page read and write
3047000
heap
page read and write
3910000
heap
page read and write
30C0000
heap
page read and write
2B50000
heap
page read and write
2C50000
heap
page read and write
350E000
stack
page read and write
2DCB000
heap
page read and write
33F0000
heap
page read and write
35DE000
stack
page read and write
26E0FEB000
stack
page read and write
2FEF000
unkown
page read and write
2D80000
heap
page read and write
2CB6000
heap
page read and write
2B4E000
unkown
page read and write
3170000
heap
page read and write
2F5E000
unkown
page read and write
30F0000
heap
page read and write
3220000
heap
page read and write
2870000
heap
page read and write
319F000
stack
page read and write
6CE000
stack
page read and write
3297000
heap
page read and write
37AF000
unkown
page read and write
335E000
stack
page read and write
3F5000
unkown
page read and write
2D41000
heap
page read and write
2B90000
heap
page read and write
66B000
heap
page read and write
305F000
stack
page read and write
7CA0000
heap
page read and write
37C6000
heap
page read and write
29FD000
stack
page read and write
2C81000
heap
page read and write
2E70000
unkown
page readonly
3170000
heap
page read and write
39C0000
heap
page read and write
39E0000
heap
page read and write
334E000
unkown
page read and write
351E000
stack
page read and write
34CF000
stack
page read and write
337E000
unkown
page read and write
3806000
heap
page read and write
2D41000
heap
page read and write
2946000
heap
page read and write
27C0000
heap
page read and write
3E0000
unkown
page readonly
28AD000
stack
page read and write
3311000
heap
page read and write
2B66000
heap
page read and write
2BF0000
heap
page read and write
2D0F000
unkown
page read and write
39B0000
heap
page read and write
2B66000
heap
page read and write
3420000
heap
page read and write
3110000
heap
page read and write
3B0000
heap
page read and write
6BE000
stack
page read and write
2EC6000
heap
page read and write
6D0000
heap
page read and write
3631000
heap
page read and write
2FD1000
heap
page read and write
339E000
stack
page read and write
353E000
unkown
page read and write
26E12FD000
stack
page read and write
2996000
heap
page read and write
750000
heap
page read and write
2DC0000
heap
page read and write
321F000
stack
page read and write
2CA0000
heap
page read and write
2BF7000
heap
page read and write
33FF000
stack
page read and write
3610000
heap
page read and write
2DF0000
heap
page read and write
2EC0000
heap
page read and write
356E000
stack
page read and write
3586000
unkown
page read and write
35DE000
stack
page read and write
3127000
heap
page read and write
670000
heap
page read and write
5B0000
heap
page read and write
73E000
stack
page read and write
3060000
heap
page read and write
2D41000
heap
page read and write
2D41000
heap
page read and write
400000
unkown
page readonly
3630000
heap
page read and write
360E000
stack
page read and write
2E8F000
unkown
page read and write
298F000
unkown
page read and write
2DAE000
stack
page read and write
2EED000
stack
page read and write
3250000
heap
page read and write
2C50000
heap
page read and write
150000
heap
page read and write
2C0000
heap
page read and write
2D41000
heap
page read and write
5ED000
stack
page read and write
33A1000
heap
page read and write
3851000
heap
page read and write
A0000
heap
page read and write
3651000
heap
page read and write
38C6000
heap
page read and write
37A1000
heap
page read and write
1A0000
heap
page read and write
2B5E000
stack
page read and write
3026000
heap
page read and write
2980000
heap
page read and write
1250000
unkown
page readonly
29DE000
unkown
page read and write
2F3D000
stack
page read and write
2DFE000
stack
page read and write
73D000
unkown
page read and write
3576000
heap
page read and write
369E000
stack
page read and write
3926000
heap
page read and write
2BE0000
heap
page read and write
3440000
heap
page read and write
310F000
stack
page read and write
30A1000
heap
page read and write
287E000
stack
page read and write
2BD0000
heap
page read and write
3136000
heap
page read and write
315E000
unkown
page read and write
3040000
heap
page read and write
3360000
heap
page read and write
2F0E000
unkown
page read and write
33C1000
heap
page read and write
29BF000
stack
page read and write
2D1E000
stack
page read and write
3E0000
unkown
page readonly
3026000
heap
page read and write
2D41000
heap
page read and write
383F000
stack
page read and write
527000
heap
page read and write
2BD000
stack
page read and write
383F000
stack
page read and write
2F2B000
heap
page read and write
3836000
heap
page read and write
75E000
stack
page read and write
2CBE000
stack
page read and write
32CC000
stack
page read and write
3800000
heap
page read and write
2DAE000
stack
page read and write
DCC000
stack
page read and write
2A7D000
stack
page read and write
2D70000
heap
page read and write
361B000
heap
page read and write
2F87000
heap
page read and write
30BE000
stack
page read and write
340F000
stack
page read and write
700000
heap
page read and write
33FE000
stack
page read and write
AD000
stack
page read and write
2D41000
heap
page read and write
2D31000
heap
page read and write
2D3D000
stack
page read and write
378E000
stack
page read and write
500000
heap
page read and write
3340000
heap
page read and write
71E000
unkown
page read and write
32A6000
heap
page read and write
333E000
stack
page read and write
2F0B000
heap
page read and write
64E000
stack
page read and write
32A6000
heap
page read and write
39E0000
heap
page read and write
26E197D000
stack
page read and write
3054000
heap
page read and write
1F454420000
trusted library allocation
page read and write
2AFE000
stack
page read and write
2B97000
heap
page read and write
37C6000
heap
page read and write
3420000
heap
page read and write
2F26000
heap
page read and write
2DF0000
heap
page read and write
2966000
heap
page read and write
3840000
heap
page read and write
321EF000
stack
page read and write
1D297475000
heap
page read and write
28AD000
stack
page read and write
560000
direct allocation
page read and write
31BE000
unkown
page read and write
740000
heap
page read and write
29BD000
stack
page read and write
34B6000
heap
page read and write
2AD0000
heap
page read and write
32D0000
heap
page read and write
2B8F000
stack
page read and write
1D297413000
heap
page read and write
2DDE000
stack
page read and write
2830000
heap
page read and write
2B8E000
unkown
page read and write
250837D000
stack
page read and write
75E000
stack
page read and write
2C8E000
stack
page read and write
5CE000
stack
page read and write
3490000
heap
page read and write
1350000
unkown
page readonly
2B9F000
stack
page read and write
333E000
stack
page read and write
28C0000
heap
page read and write
350F000
stack
page read and write
3166000
heap
page read and write
2D41000
heap
page read and write
3D60000
unkown
page read and write
1D29748B000
heap
page read and write
2CD0000
heap
page read and write
2F20000
heap
page read and write
37F1000
heap
page read and write
2D41000
heap
page read and write
3170000
heap
page read and write
67A19FE000
stack
page read and write
2A60000
heap
page read and write
2EB6000
heap
page read and write
308E000
stack
page read and write
3871000
heap
page read and write
2D40000
heap
page read and write
2CB0000
heap
page read and write
73E000
stack
page read and write
2E40000
trusted library allocation
page read and write
26E187F000
stack
page read and write
2D1E000
stack
page read and write
37C6000
heap
page read and write
3090000
heap
page read and write
2F10000
heap
page read and write
29DE000
stack
page read and write
339E000
stack
page read and write
1CE000
stack
page read and write
3F5000
unkown
page read and write
30E0000
heap
page read and write
C60000
heap
page read and write
721000
heap
page read and write
333D000
stack
page read and write
2C96000
heap
page read and write
2D00000
heap
page read and write
3276000
heap
page read and write
360E000
stack
page read and write
29B0000
heap
page read and write
3460000
heap
page read and write
3336000
heap
page read and write
60D000
unkown
page read and write
3980000
heap
page read and write
2D41000
heap
page read and write
3006000
heap
page read and write
3300000
heap
page read and write
3560000
heap
page read and write
34F6000
heap
page read and write
3601000
heap
page read and write
3406000
heap
page read and write
315F000
stack
page read and write
3970000
heap
page read and write
2AC0000
heap
page read and write
3AD000
stack
page read and write
2DE6000
heap
page read and write
2DDD000
stack
page read and write
3881000
heap
page read and write
2E96000
heap
page read and write
2A7E000
stack
page read and write
2A30000
heap
page read and write
2DBE000
stack
page read and write
312B000
heap
page read and write
3580000
heap
page read and write
2EC6000
heap
page read and write
32DE000
stack
page read and write
2AA0000
heap
page read and write
5210000
unclassified section
page read and write
3140000
heap
page read and write
37F1000
heap
page read and write
333E000
unkown
page read and write
27F0000
heap
page read and write
1D0000
heap
page read and write
3800000
heap
page read and write
2DB0000
heap
page read and write
2E80000
heap
page read and write
35A1000
heap
page read and write
2970000
heap
page read and write
2E4B000
heap
page read and write
3A60000
heap
page read and write
35D1000
heap
page read and write
340E000
stack
page read and write
29B0000
heap
page read and write
2F50000
trusted library allocation
page read and write
2D3B000
heap
page read and write
37B1000
heap
page read and write
325E000
stack
page read and write
3246000
heap
page read and write
32AF000
unkown
page read and write
29FB000
heap
page read and write
2EFD000
stack
page read and write
34FE000
stack
page read and write
2DA0000
heap
page read and write
32AE000
stack
page read and write
3260000
heap
page read and write
2B7E000
stack
page read and write
328F000
unkown
page read and write
32DE000
stack
page read and write
37E6000
heap
page read and write
317F000
stack
page read and write
2E1E000
stack
page read and write
358F000
stack
page read and write
28DD000
stack
page read and write
68E000
stack
page read and write
3916000
heap
page read and write
27E0000
heap
page read and write
3350000
heap
page read and write
3A81000
heap
page read and write
34CF000
stack
page read and write
2A40000
heap
page read and write
3730000
heap
page read and write
21F60074000
heap
page read and write
30FD000
stack
page read and write
2BAD000
stack
page read and write
2EC0000
heap
page read and write
3221000
heap
page read and write
3651000
heap
page read and write
2C66000
heap
page read and write
353E000
stack
page read and write
6ED000
stack
page read and write
2B40000
heap
page read and write
2F70000
heap
page read and write
3160000
heap
page read and write
2E70000
heap
page read and write
36CF000
stack
page read and write
36B0000
heap
page read and write
3470000
heap
page read and write
31CF000
stack
page read and write
29CD000
stack
page read and write
3360000
heap
page read and write
3310000
heap
page read and write
CCA000
stack
page read and write
2D41000
heap
page read and write
3576000
heap
page read and write
4580000
unclassified section
page read and write
30D0000
heap
page read and write
2E3D000
stack
page read and write
46B000
heap
page read and write
3640000
heap
page read and write
3041000
heap
page read and write
33C1000
heap
page read and write
2C10000
heap
page read and write
2D4E000
unkown
page read and write
1BD000
stack
page read and write
21EAFA02000
trusted library allocation
page read and write
355F000
stack
page read and write
56E000
unkown
page read and write
1F454420000
trusted library allocation
page read and write
1719000
remote allocation
page execute and read and write
3286000
heap
page read and write
2F3E000
stack
page read and write
2EFD000
stack
page read and write
3496000
heap
page read and write
3320000
heap
page read and write
2CE6000
heap
page read and write
32FE000
stack
page read and write
33D0000
heap
page read and write
37EF000
stack
page read and write
3996000
heap
page read and write
3690000
heap
page read and write
317E000
stack
page read and write
30FD000
stack
page read and write
353E000
stack
page read and write
2D41000
heap
page read and write
46CC000
unkown
page read and write
2D41000
heap
page read and write
3810000
heap
page read and write
5F0000
heap
page read and write
3090000
heap
page read and write
2C9F000
stack
page read and write
2BF1000
heap
page read and write
21F60000000
heap
page read and write
74D000
stack
page read and write
2D41000
heap
page read and write
2960000
heap
page read and write
373E000
unkown
page read and write
2F80000
heap
page read and write
3906000
heap
page read and write
2DB6000
heap
page read and write
29AE000
stack
page read and write
2AC0000
heap
page read and write
3990000
heap
page read and write
3560000
heap
page read and write
31EF000
unkown
page read and write
32B7000
heap
page read and write
2C6F000
stack
page read and write
325E000
unkown
page read and write
2BD0000
heap
page read and write
3241000
heap
page read and write
33A0000
heap
page read and write
6F0000
heap
page read and write
39D0000
heap
page read and write
2D80000
heap
page read and write
2AD1000
heap
page read and write
510000
heap
page read and write
2F21000
heap
page read and write
342F000
stack
page read and write
31E7000
heap
page read and write
2B00000
heap
page read and write
2CF0000
heap
page read and write
308E000
unkown
page read and write
308E000
stack
page read and write
3000000
trusted library allocation
page execute and read and write
3406000
heap
page read and write
2DFE000
stack
page read and write
2FE0000
heap
page read and write
34D0000
heap
page read and write
71E000
stack
page read and write
31CF000
stack
page read and write
79C9000
heap
page read and write
2ED0000
heap
page read and write
3446000
heap
page read and write
3840000
heap
page read and write
33FE000
unkown
page read and write
7A29000
heap
page read and write
310E000
unkown
page read and write
2F30000
heap
page read and write
2CFE000
stack
page read and write
358F000
stack
page read and write
393F000
stack
page read and write
1CD000
stack
page read and write
3450000
heap
page read and write
7AC0000
trusted library allocation
page read and write
2FCC000
heap
page read and write
3820000
heap
page read and write
3080000
heap
page read and write
3130000
heap
page read and write
2B61000
heap
page read and write
3B26000
heap
page read and write
388F000
stack
page read and write
3571000
heap
page read and write
3380000
heap
page read and write
33A6000
heap
page read and write
750000
heap
page read and write
79E3000
heap
page read and write
3440000
heap
page read and write
3226000
heap
page read and write
2DC0000
heap
page read and write
2C0000
heap
page read and write
15D000
stack
page read and write
2BC1000
heap
page read and write
2A7E000
stack
page read and write
327E000
unkown
page read and write
2B7D000
stack
page read and write
2B4E000
stack
page read and write
2AFE000
unkown
page read and write
315E000
stack
page read and write
2D41000
heap
page read and write
2A3D000
stack
page read and write
31D0000
heap
page read and write
2BA0000
heap
page read and write
316B000
heap
page read and write
520000
heap
page read and write
31AB000
heap
page read and write
2FF6000
heap
page read and write
2880000
heap
page read and write
3131000
heap
page read and write
3151000
heap
page read and write
56E000
stack
page read and write
2E96000
heap
page read and write
2DE0000
heap
page read and write
3261000
heap
page read and write
1BD000
stack
page read and write
3176000
heap
page read and write
6AE000
stack
page read and write
380F000
stack
page read and write
11D000
stack
page read and write
3730000
heap
page read and write
2A70000
heap
page read and write
4CD000
stack
page read and write
2B81000
heap
page read and write
2D0E000
unkown
page read and write
3711000
heap
page read and write
3980000
heap
page read and write
2D41000
heap
page read and write
2C9E000
stack
page read and write
2970000
heap
page read and write
2D31000
heap
page read and write
300C000
unkown
page read and write
330F000
stack
page read and write
353F000
stack
page read and write
291C000
heap
page read and write
ED000
stack
page read and write
31D0000
heap
page read and write
2B6F000
stack
page read and write
2DB0000
heap
page read and write
38A6000
heap
page read and write
3996000
heap
page read and write
2FDE000
stack
page read and write
2F1F000
stack
page read and write
30EE000
stack
page read and write
32E6000
heap
page read and write
381F000
stack
page read and write
37E6000
heap
page read and write
2D41000
heap
page read and write
2AFF000
stack
page read and write
2A7F000
unkown
page read and write
1A11000
unkown
page readonly
3246000
heap
page read and write
6A0000
heap
page read and write
74E000
unkown
page read and write
2FBE000
stack
page read and write
2BCE000
stack
page read and write
1680000
unkown
page readonly
29A0000
heap
page read and write
2C80000
heap
page read and write
57B000
heap
page read and write
2A5D000
stack
page read and write
35F6000
heap
page read and write
29AE000
stack
page read and write
2D20000
heap
page read and write
29D0000
heap
page read and write
34D0000
heap
page read and write
2FCE000
stack
page read and write
2900000
heap
page read and write
3286000
heap
page read and write
33B0000
heap
page read and write
2A96000
heap
page read and write
6D0000
heap
page read and write
36B6000
heap
page read and write
32D0000
heap
page read and write
2B91000
heap
page read and write
33F0000
heap
page read and write
33C0000
heap
page read and write
2E3D000
stack
page read and write
29CE000
stack
page read and write
3340000
heap
page read and write
3050000
heap
page read and write
5ED000
stack
page read and write
264C000
heap
page read and write
36BF000
stack
page read and write
2DBE000
stack
page read and write
2F70000
heap
page read and write
27FE000
stack
page read and write
28BF000
unkown
page read and write
2E5F000
unkown
page read and write
3271000
heap
page read and write
2AD1000
heap
page read and write
2D9D000
stack
page read and write
34E7000
heap
page read and write
1F455F19000
trusted library allocation
page read and write
2B70000
heap
page read and write
745000
heap
page read and write
1000000
unkown
page readonly
34B0000
heap
page read and write
34C0000
heap
page read and write
2E70000
heap
page read and write
29AB000
heap
page read and write
31FF000
stack
page read and write
27FE000
stack
page read and write
30B0000
heap
page read and write
2FBD000
stack
page read and write
3556000
heap
page read and write
2B2F000
stack
page read and write
3B20000
heap
page read and write
1EE000
stack
page read and write
3366000
heap
page read and write
30BF000
stack
page read and write
2E41000
heap
page read and write
3920000
heap
page read and write
2BC0000
heap
page read and write
2F10000
heap
page read and write
59E000
stack
page read and write
2D3D000
stack
page read and write
3731000
heap
page read and write
700000
heap
page read and write
3440000
heap
page read and write
2E5D000
stack
page read and write
32CE000
stack
page read and write
3440000
heap
page read and write
63D000
stack
page read and write
34A1000
heap
page read and write
21EADDC0000
heap
page read and write
3396000
heap
page read and write
75E000
unkown
page read and write
3041000
heap
page read and write
2E46000
heap
page read and write
2BB0000
unkown
page readonly
376F000
unkown
page read and write
35CF000
stack
page read and write
2DBF000
unkown
page read and write
2FC6000
heap
page read and write
2E70000
heap
page read and write
310F000
stack
page read and write
2ECD000
stack
page read and write
30C6000
heap
page read and write
670000
heap
page read and write
31D1000
heap
page read and write
325D000
stack
page read and write
74E000
stack
page read and write
304E000
unkown
page read and write
3360000
heap
page read and write
6CE000
stack
page read and write
2E3D000
stack
page read and write
2BBE000
stack
page read and write
680000
heap
page read and write
27FE000
stack
page read and write
3190000
heap
page read and write
32BF000
stack
page read and write
2E0F000
stack
page read and write
101B000
system
page execute and read and write
36DE000
stack
page read and write
3238E000
stack
page read and write
6D0000
heap
page read and write
2E0E000
stack
page read and write
3940000
heap
page read and write
2BAE000
unkown
page read and write
1F4560A4000
trusted library allocation
page read and write
2D41000
heap
page read and write
31D6000
heap
page read and write
37A1000
heap
page read and write
3261000
heap
page read and write
2E20000
heap
page read and write
550000
heap
page read and write
1250000
unkown
page readonly
3580000
heap
page read and write
65D000
stack
page read and write
335E000
unkown
page read and write
2BDE000
unkown
page read and write
2C0F000
stack
page read and write
3241000
heap
page read and write
34CF000
stack
page read and write
2EFD000
stack
page read and write
2D41000
heap
page read and write
291C000
heap
page read and write
332F000
unkown
page read and write
2D5F000
stack
page read and write
38B0000
heap
page read and write
3580000
heap
page read and write
39B0000
heap
page read and write
3590000
heap
page read and write
2D6B000
heap
page read and write
2E60000
heap
page read and write
29BF000
unkown
page read and write
2BCD000
stack
page read and write
7A16000
heap
page read and write
2E3F000
stack
page read and write
28BF000
unkown
page read and write
2CFE000
stack
page read and write
2C56000
heap
page read and write
341E000
stack
page read and write
730000
heap
page read and write
2C9F000
stack
page read and write
3230000
heap
page read and write
2D6F000
unkown
page read and write
3740000
heap
page read and write
2EE6000
heap
page read and write
2F8E000
unkown
page read and write
320F000
stack
page read and write
2960000
heap
page read and write
31FE000
stack
page read and write
337E000
stack
page read and write
39F1000
heap
page read and write
3836000
heap
page read and write
3036000
heap
page read and write
2D41000
heap
page read and write
75E000
stack
page read and write
2A96000
heap
page read and write
328B000
heap
page read and write
31FB000
heap
page read and write
3571000
heap
page read and write
2DC0000
heap
page read and write
2CF1000
heap
page read and write
3220000
heap
page read and write
2D41000
heap
page read and write
3146000
heap
page read and write
3050000
heap
page read and write
2EE6000
heap
page read and write
2A4F000
unkown
page read and write
3230000
heap
page read and write
2EB0000
heap
page read and write
2C00000
heap
page read and write
6FD000
stack
page read and write
353F000
stack
page read and write
32FE000
stack
page read and write
262C000
heap
page read and write
2A96000
heap
page read and write
2DDE000
unkown
page read and write
30BB000
heap
page read and write
33C6000
heap
page read and write
35A6000
heap
page read and write
6AF000
unkown
page read and write
2B40000
heap
page read and write
280F000
stack
page read and write
21EADE21000
heap
page read and write
2FFE000
stack
page read and write
3006000
heap
page read and write
2E16000
heap
page read and write
28BF000
stack
page read and write
34C0000
heap
page read and write
6AF000
unkown
page read and write
27FE000
unkown
page read and write
2F31000
heap
page read and write
302F000
stack
page read and write
38BF000
stack
page read and write
32E6000
heap
page read and write
22BE000
stack
page read and write
2FD0000
heap
page read and write
2BC0000
heap
page read and write
33E1000
heap
page read and write
388E000
stack
page read and write
3460000
heap
page read and write
38CF000
stack
page read and write
38BF000
stack
page read and write
2EFB000
heap
page read and write
3976000
heap
page read and write
3080000
heap
page read and write
2B0E000
stack
page read and write
3961000
heap
page read and write
3190000
heap
page read and write
2E6D000
stack
page read and write
2E56000
heap
page read and write
4FE000
stack
page read and write
31F0000
heap
page read and write
30000
heap
page read and write
64F000
unkown
page read and write
31B0000
heap
page read and write
35A1000
heap
page read and write
2B60000
heap
page read and write
2C6D000
stack
page read and write
2D41000
heap
page read and write
1FD000
stack
page read and write
2D41000
heap
page read and write
2D71000
heap
page read and write
34D0000
heap
page read and write
39D000
stack
page read and write
3AF6000
heap
page read and write
382C000
unclassified section
page read and write
337E000
unkown
page read and write
2FCE000
stack
page read and write
1D297450000
heap
page read and write
3546000
heap
page read and write
2696000
heap
page read and write
330000
heap
page read and write
2F60000
heap
page read and write
39B1000
heap
page read and write
329B000
heap
page read and write
2CAE000
stack
page read and write
3F0000
heap
page read and write
36D1000
heap
page read and write
2A8E000
stack
page read and write
2BC7000
heap
page read and write
303E000
stack
page read and write
328F000
stack
page read and write
35F1000
heap
page read and write
3A86000
heap
page read and write
357F000
stack
page read and write
710000
heap
page read and write
3566000
heap
page read and write
3B20000
heap
page read and write
2D41000
heap
page read and write
3996000
heap
page read and write
32FD000
stack
page read and write
2D41000
heap
page read and write
2E90000
heap
page read and write
36DE000
stack
page read and write
3426000
heap
page read and write
2D41000
heap
page read and write
310E000
stack
page read and write
35B6000
heap
page read and write
2DCD000
stack
page read and write
2D60000
heap
page read and write
2D41000
heap
page read and write
2F40000
heap
page read and write
2F7E000
stack
page read and write
2D41000
heap
page read and write
291C000
heap
page read and write
68E000
stack
page read and write
2B91000
heap
page read and write
2CB6000
heap
page read and write
31DF000
stack
page read and write
3736000
heap
page read and write
3740000
heap
page read and write
3BA6000
heap
page read and write
3396000
heap
page read and write
309E000
unkown
page read and write
2530000
heap
page read and write
35F0000
heap
page read and write
27FE000
unkown
page read and write
2E41000
heap
page read and write
3836000
heap
page read and write
60E000
stack
page read and write
47E000
unkown
page read and write
323E000
stack
page read and write
2B7F000
unkown
page read and write
28CE000
stack
page read and write
350000
heap
page read and write
9B0000
heap
page read and write
2D41000
heap
page read and write
1D297500000
heap
page read and write
3170000
heap
page read and write
37D6000
heap
page read and write
329E000
stack
page read and write
304E000
unkown
page read and write
334E000
stack
page read and write
2E60000
heap
page read and write
2B50000
heap
page read and write
2BC0000
heap
page read and write
2DCE000
stack
page read and write
3207000
heap
page read and write
3020000
heap
page read and write
2D26000
heap
page read and write
37E6000
heap
page read and write
33F0000
heap
page read and write
28BF000
stack
page read and write
2A00000
heap
page read and write
2F3E000
stack
page read and write
2DF0000
heap
page read and write
33FE000
stack
page read and write
31CE000
unkown
page read and write
2B90000
heap
page read and write
2EFE000
stack
page read and write
33AB000
heap
page read and write
65B000
heap
page read and write
33DE000
stack
page read and write
2D1D000
stack
page read and write
2D30000
heap
page read and write
3396000
heap
page read and write
3486000
heap
page read and write
2DDB000
heap
page read and write
2C5F000
unkown
page read and write
3566000
heap
page read and write
570000
heap
page read and write
31D0000
heap
page read and write
3360000
heap
page read and write
2900000
heap
page read and write
264C000
heap
page read and write
3571000
heap
page read and write
2CE0000
heap
page read and write
6A0000
heap
page read and write
2FAD000
stack
page read and write
33DB000
heap
page read and write
38C0000
heap
page read and write
2AC0000
heap
page read and write
3961000
heap
page read and write
3000000
heap
page read and write
2BEB000
heap
page read and write
49F0000
unkown
page read and write
33B0000
heap
page read and write
2A80000
heap
page read and write
27E0000
heap
page read and write
2EDB000
heap
page read and write
3D0000
heap
page read and write
2940000
heap
page read and write
2850000
heap
page read and write
2B80000
heap
page read and write
63B000
heap
page read and write
298E000
unkown
page read and write
3A21000
heap
page read and write
1FE000
stack
page read and write
6DD000
stack
page read and write
2E3F000
stack
page read and write
2A71000
heap
page read and write
3101000
heap
page read and write
2750000
heap
page read and write
444000
unkown
page read and write
2DC7000
heap
page read and write
2B46000
heap
page read and write
2D36000
heap
page read and write
28FE000
stack
page read and write
27FE000
unkown
page read and write
2A3D000
stack
page read and write
2D20000
heap
page read and write
610000
direct allocation
page read and write
30A1000
heap
page read and write
300F000
stack
page read and write
3A16000
heap
page read and write
35E0000
heap
page read and write
2EDD000
stack
page read and write
2DD0000
heap
page read and write
2DF0000
heap
page read and write
2EF0000
heap
page read and write
3040000
heap
page read and write
28B0000
heap
page read and write
2ED6000
heap
page read and write
2840000
heap
page read and write
21F60013000
heap
page read and write
37A1000
heap
page read and write
4FE000
stack
page read and write
30AF000
stack
page read and write
32FD000
stack
page read and write
2BA0000
heap
page read and write
343E000
stack
page read and write
7E0000
direct allocation
page read and write
6EE000
stack
page read and write
2AC0000
heap
page read and write
2AD0000
heap
page read and write
250000
heap
page read and write
358E000
unkown
page read and write
3620000
heap
page read and write
2890000
heap
page read and write
2EC6000
heap
page read and write
31D6000
heap
page read and write
3360000
heap
page read and write
30AF000
stack
page read and write
31D0000
heap
page read and write
29FF000
stack
page read and write
2E3B000
heap
page read and write
298B000
heap
page read and write
14B1000
unkown
page read and write
2FF1000
heap
page read and write
3990000
heap
page read and write
2FAE000
unkown
page read and write
34C6000
heap
page read and write
3240000
heap
page read and write
2D41000
heap
page read and write
2870000
direct allocation
page read and write
2E10000
heap
page read and write
3991000
heap
page read and write
32FE000
stack
page read and write
3250000
heap
page read and write
2B66000
heap
page read and write
332E000
stack
page read and write
32BF000
stack
page read and write
38FF000
stack
page read and write
30C1000
heap
page read and write
36BF000
stack
page read and write
2CDE000
unkown
page read and write
3131000
heap
page read and write
650000
heap
page read and write
7A2C000
heap
page read and write
2B81000
heap
page read and write
2B3F000
unkown
page read and write
2EA0000
heap
page read and write
3A06000
heap
page read and write
2D41000
heap
page read and write
2A77000
heap
page read and write
3300000
heap
page read and write
3106000
heap
page read and write
2C91000
heap
page read and write
2B60000
heap
page read and write
3121000
heap
page read and write
2ECE000
stack
page read and write
3A06000
heap
page read and write
3430000
heap
page read and write
341E000
stack
page read and write
37FF000
stack
page read and write
2EAF000
stack
page read and write
33BE000
stack
page read and write
2FCE000
stack
page read and write
323D000
stack
page read and write
2D41000
heap
page read and write
2F76000
heap
page read and write
35B6000
heap
page read and write
32F6000
heap
page read and write
3471000
heap
page read and write
3230000
heap
page read and write
3110000
heap
page read and write
2F6F000
unkown
page read and write
325E000
stack
page read and write
6FE000
stack
page read and write
75E000
stack
page read and write
31DF000
stack
page read and write
2F16000
heap
page read and write
31F1000
heap
page read and write
2FEE000
stack
page read and write
300E000
unkown
page read and write
3350000
heap
page read and write
2A80000
heap
page read and write
2DF0000
heap
page read and write
37DF000
stack
page read and write
3861000
heap
page read and write
39E1000
heap
page read and write
39E1000
heap
page read and write
2EDD000
stack
page read and write
299D000
stack
page read and write
2D41000
heap
page read and write
2F6E000
stack
page read and write
3241000
heap
page read and write
2DD1000
heap
page read and write
287B000
heap
page read and write
310E000
stack
page read and write
350E000
stack
page read and write
3146000
heap
page read and write
2DD0000
heap
page read and write
2D56000
heap
page read and write
1280000
heap
page read and write
3240000
heap
page read and write
2AD0000
heap
page read and write
2C6F000
stack
page read and write
2B10000
unkown
page readonly
30B0000
trusted library allocation
page read and write
2C91000
heap
page read and write
70E000
heap
page read and write
70D000
stack
page read and write
3250000
heap
page read and write
590000
heap
page read and write
3121000
heap
page read and write
354F000
stack
page read and write
30AB000
heap
page read and write
32EF000
unkown
page read and write
2D41000
heap
page read and write
100000
heap
page read and write
32BE000
stack
page read and write
34A1000
heap
page read and write
5DD000
stack
page read and write
2FCB000
heap
page read and write
38CF000
stack
page read and write
33A6000
heap
page read and write
2D41000
heap
page read and write
34F6000
heap
page read and write
5F90000
trusted library allocation
page read and write
28BE000
unkown
page read and write
3740000
heap
page read and write
690000
heap
page read and write
34A0000
heap
page read and write
2E5E000
stack
page read and write
33BB000
heap
page read and write
366F000
stack
page read and write
2E06000
heap
page read and write
3780000
heap
page read and write
3A86000
heap
page read and write
2FB0000
heap
page read and write
2E70000
heap
page read and write
31F1000
heap
page read and write
3540000
heap
page read and write
2CBD000
stack
page read and write
2CBE000
stack
page read and write
333E000
unkown
page read and write
11A1000
unkown
page readonly
2D9F000
stack
page read and write
2A00000
heap
page read and write
341E000
stack
page read and write
3876000
heap
page read and write
329B000
heap
page read and write
2F2D000
stack
page read and write
34BB000
heap
page read and write
2D60000
heap
page read and write
316F000
stack
page read and write
37EF000
stack
page read and write
3086000
heap
page read and write
3806000
heap
page read and write
33F0000
heap
page read and write
45E000
unkown
page read and write
3612000
unclassified section
page read and write
2B40000
unkown
page readonly
3280000
heap
page read and write
2C9E000
stack
page read and write
2FDE000
unkown
page read and write
530000
direct allocation
page read and write
3616000
heap
page read and write
3090000
heap
page read and write
370F000
stack
page read and write
2D60000
heap
page read and write
349E000
unkown
page read and write
1F0000
heap
page read and write
2E91000
heap
page read and write
7A99000
heap
page read and write
2FBE000
stack
page read and write
3396000
heap
page read and write
2910000
heap
page read and write
6C0000
heap
page read and write
30CF000
stack
page read and write
3390000
heap
page read and write
37F0000
heap
page read and write
21F60047000
heap
page read and write
2D26000
heap
page read and write
2ABF000
stack
page read and write
2E81000
heap
page read and write
37D000
stack
page read and write
343E000
stack
page read and write
3061000
heap
page read and write
2F00000
heap
page read and write
66E000
stack
page read and write
380F000
stack
page read and write
3711000
heap
page read and write
3490000
heap
page read and write
2FBE000
unkown
page read and write
3E1000
unkown
page execute read
3971000
heap
page read and write
2B66000
heap
page read and write
2D60000
heap
page read and write
79DE000
heap
page read and write
2C50000
heap
page read and write
2B50000
unkown
page read and write
2DAE000
stack
page read and write
2D11000
heap
page read and write
2EC1000
heap
page read and write
710000
heap
page read and write
2BD0000
heap
page read and write
2E5B000
heap
page read and write
33D0000
heap
page read and write
3261000
heap
page read and write
341F000
stack
page read and write
34D0000
heap
page read and write
32BE000
stack
page read and write
3030000
heap
page read and write
7AB0000
trusted library allocation
page read and write
2B8D000
stack
page read and write
2EB1000
heap
page read and write
3991000
heap
page read and write
3170000
heap
page read and write
2FFB000
heap
page read and write
2E90000
heap
page read and write
2BB0000
heap
page read and write
2C61000
heap
page read and write
2CA0000
heap
page read and write
646000
heap
page read and write
348F000
stack
page read and write
38B0000
heap
page read and write
3810000
heap
page read and write
3196000
heap
page read and write
1F4560B4000
trusted library allocation
page read and write
34EF000
unkown
page read and write
2C50000
heap
page read and write
3060000
heap
page read and write
2E9E000
stack
page read and write
2DB0000
heap
page read and write
4FD000
stack
page read and write
3680000
heap
page read and write
2FF1000
heap
page read and write
342E000
stack
page read and write
2CC6000
heap
page read and write
3EF2000
unkown
page read and write
36A6000
heap
page read and write
379F000
stack
page read and write
2990000
heap
page read and write
2CF0000
heap
page read and write
2AC0000
heap
page read and write
39B0000
heap
page read and write
2E7F000
stack
page read and write
2CC6000
heap
page read and write
2D41000
heap
page read and write
3840000
heap
page read and write
334E000
stack
page read and write
2D3E000
unkown
page read and write
F0000
heap
page read and write
32A6000
heap
page read and write
63D000
stack
page read and write
2D41000
heap
page read and write
610000
heap
page read and write
2BFE000
stack
page read and write
31B1000
heap
page read and write
30BF000
stack
page read and write
CCA000
stack
page read and write
2D91000
heap
page read and write
3501000
heap
page read and write
320F000
stack
page read and write
328E000
stack
page read and write
36C0000
heap
page read and write
2B10000
heap
page read and write
328F000
stack
page read and write
32D0000
heap
page read and write
2C10000
heap
page read and write
2A00000
heap
page read and write
2F2F000
unkown
page read and write
2A80000
heap
page read and write
3030000
heap
page read and write
2FA0000
heap
page read and write
2FF6000
heap
page read and write
2FAE000
stack
page read and write
3480000
heap
page read and write
28A0000
heap
page read and write
3196000
heap
page read and write
34FF000
stack
page read and write
3430000
heap
page read and write
2B80000
heap
page read and write
28FE000
stack
page read and write
3471000
heap
page read and write
2D41000
heap
page read and write
27F0000
heap
page read and write
28BF000
unkown
page read and write
2F4E000
unkown
page read and write
2840000
heap
page read and write
3A66000
heap
page read and write
300E000
unkown
page read and write
33A0000
heap
page read and write
34B6000
heap
page read and write
3560000
heap
page read and write
2D71000
heap
page read and write
43D000
stack
page read and write
33C0000
heap
page read and write
37CE000
stack
page read and write
1429000
unkown
page read and write
2D67000
heap
page read and write
2F46000
heap
page read and write
33D0000
heap
page read and write
3086000
heap
page read and write
2B20000
heap
page read and write
35DB000
heap
page read and write
560000
heap
page read and write
30C0000
heap
page read and write
7A64000
heap
page read and write
110000
heap
page read and write
3150000
heap
page read and write
2947000
heap
page read and write
29DD000
stack
page read and write
32FE000
stack
page read and write
3961000
heap
page read and write
2EC0000
heap
page read and write
28C0000
heap
page read and write
298D000
stack
page read and write
5D0000
heap
page read and write
398F000
stack
page read and write
6D0000
heap
page read and write
3A36000
heap
page read and write
2880000
heap
page read and write
370F000
stack
page read and write
2E3D000
stack
page read and write
329E000
unkown
page read and write
2EAE000
stack
page read and write
2B67000
heap
page read and write
2F31000
heap
page read and write
2E80000
heap
page read and write
37A6000
heap
page read and write
337F000
stack
page read and write
27FE000
stack
page read and write
33AF000
stack
page read and write
3460000
heap
page read and write
355E000
stack
page read and write
363F000
stack
page read and write
756000
heap
page read and write
3350000
heap
page read and write
33E0000
heap
page read and write
3300000
heap
page read and write
29EE000
unkown
page read and write
32560000
direct allocation
page read and write
28DD000
stack
page read and write
382E000
stack
page read and write
308F000
stack
page read and write
3990000
heap
page read and write
2FBD000
stack
page read and write
2BCF000
unkown
page read and write
359F000
stack
page read and write
36BE000
unkown
page read and write
59E000
unkown
page read and write
2BA0000
heap
page read and write
647000
heap
page read and write
400000
heap
page read and write
2887000
heap
page read and write
3581000
heap
page read and write
2A70000
heap
page read and write
2C10000
heap
page read and write
3329000
direct allocation
page execute and read and write
16E1000
unkown
page readonly
327E000
stack
page read and write
2E16000
heap
page read and write
6FD000
stack
page read and write
31FF000
stack
page read and write
3750000
heap
page read and write
2917000
heap
page read and write
2F40000
heap
page read and write
2BBE000
unkown
page read and write
2E9B000
heap
page read and write
620000
heap
page read and write
3690000
heap
page read and write
33EE000
unkown
page read and write
2F50000
heap
page read and write
63D000
stack
page read and write
2ACE000
stack
page read and write
2D41000
heap
page read and write
2E60000
heap
page read and write
358F000
stack
page read and write
2AFD000
stack
page read and write
57E000
stack
page read and write
48A4000
unclassified section
page read and write
3860000
heap
page read and write
30C1000
heap
page read and write
3230000
heap
page read and write
3A16000
heap
page read and write
2DD1000
heap
page read and write
3830000
heap
page read and write
2EFE000
stack
page read and write
3FD000
stack
page read and write
2890000
heap
page read and write
33D1000
heap
page read and write
313F000
unkown
page read and write
392F000
stack
page read and write
3A80000
heap
page read and write
32A0000
heap
page read and write
36E1000
heap
page read and write
3400000
heap
page read and write
53D000
stack
page read and write
2940000
heap
page read and write
32D0000
heap
page read and write
2BE0000
heap
page read and write
2C66000
heap
page read and write
28BF000
unkown
page read and write
35CE000
stack
page read and write
2830000
heap
page read and write
4DD000
stack
page read and write
43E000
unkown
page read and write
2A80000
heap
page read and write
3246000
heap
page read and write
16D000
stack
page read and write
2B20000
heap
page read and write
30FD000
stack
page read and write
291B000
heap
page read and write
31F0000
heap
page read and write
1F4543A0000
heap
page read and write
2A9F000
unkown
page read and write
2EFD000
stack
page read and write
2DC0000
heap
page read and write
3136000
heap
page read and write
3231000
heap
page read and write
28BE000
unkown
page read and write
2EB6000
heap
page read and write
385E000
stack
page read and write
1F455F02000
trusted library allocation
page read and write
3200000
direct allocation
page execute and read and write
2E64000
heap
page read and write
3050000
heap
page read and write
2E40000
heap
page read and write
32E6000
heap
page read and write
3460000
heap
page read and write
6FE000
stack
page read and write
321E000
unkown
page read and write
361E000
unkown
page read and write
2DC0000
heap
page read and write
2B27000
heap
page read and write
2FF0000
heap
page read and write
36D0000
heap
page read and write
2967000
heap
page read and write
580000
heap
page read and write
2966000
heap
page read and write
2BBD000
unkown
page read and write
2D41000
heap
page read and write
3496000
heap
page read and write
30C0000
heap
page read and write
2EF0000
heap
page read and write
2D41000
heap
page read and write
2FCE000
stack
page read and write
3AA0000
heap
page read and write
33DE000
stack
page read and write
290E000
stack
page read and write
2F90000
heap
page read and write
3A16000
heap
page read and write
2F90000
heap
page read and write
2D9E000
unkown
page read and write
3190000
heap
page read and write
DAA000
heap
page read and write
3506000
heap
page read and write
53A2000
unclassified section
page read and write
400000
unkown
page readonly
2EFD000
stack
page read and write
2B66000
heap
page read and write
3460000
heap
page read and write
610000
heap
page read and write
2C10000
heap
page read and write
64F000
unkown
page read and write
2C86000
heap
page read and write
320AE000
stack
page read and write
3A70000
heap
page read and write
3736000
heap
page read and write
55D000
stack
page read and write
2BA6000
heap
page read and write
3746000
heap
page read and write
2BDD000
stack
page read and write
3181000
heap
page read and write
340E000
stack
page read and write
2A66000
heap
page read and write
6F0000
heap
page read and write
2987000
heap
page read and write
2B20000
heap
page read and write
1F454162000
system
page execute and read and write
2F80000
heap
page read and write
2DC0000
heap
page read and write
3980000
heap
page read and write
3290000
heap
page read and write
39DF000
stack
page read and write
2A7F000
unkown
page read and write
2F30000
heap
page read and write
336E000
stack
page read and write
2DF6000
heap
page read and write
40000
heap
page read and write
32FE000
unkown
page read and write
33E1000
heap
page read and write
3420000
heap
page read and write
2F1F000
unkown
page read and write
2696000
heap
page read and write
30C0000
heap
page read and write
2FBE000
stack
page read and write
36D6000
heap
page read and write
28CE000
unkown
page read and write
73E000
stack
page read and write
27FE000
stack
page read and write
D8A000
heap
page read and write
2CC0000
heap
page read and write
33FE000
stack
page read and write
2BA0000
heap
page read and write
2D41000
heap
page read and write
70000
heap
page read and write
3020000
heap
page read and write
3846000
heap
page read and write
27FD000
stack
page read and write
2D16000
heap
page read and write
2F80000
heap
page read and write
3021000
heap
page read and write
2F6F000
unkown
page read and write
35A6000
heap
page read and write
2ABF000
stack
page read and write
2AFD000
stack
page read and write
320F000
stack
page read and write
590000
heap
page read and write
6BD000
stack
page read and write
2966000
heap
page read and write
3991000
heap
page read and write
39F1000
heap
page read and write
2D41000
heap
page read and write
408000
unkown
page readonly
316F000
unkown
page read and write
2AC7000
heap
page read and write
73D000
stack
page read and write
3636000
heap
page read and write
3086000
heap
page read and write
10A0000
unkown
page read and write
1D297402000
heap
page read and write
32CF000
unkown
page read and write
2DE1000
heap
page read and write
306E000
stack
page read and write
3466000
heap
page read and write
2D41000
heap
page read and write
2CC6000
heap
page read and write
2C6F000
stack
page read and write
3461000
heap
page read and write
39E000
unkown
page read and write
36D6000
heap
page read and write
36A6000
heap
page read and write
351F000
stack
page read and write
6E0000
heap
page read and write
746000
heap
page read and write
27D0000
heap
page read and write
3746000
heap
page read and write
3310000
heap
page read and write
2AD1000
heap
page read and write
56D000
stack
page read and write
27FD000
stack
page read and write
3336000
heap
page read and write
6FD000
stack
page read and write
372F000
unkown
page read and write
690000
heap
page read and write
28CE000
unkown
page read and write
30FE000
stack
page read and write
30B0000
trusted library allocation
page read and write
31A0000
heap
page read and write
27FE000
stack
page read and write
3246000
heap
page read and write
2EFD000
stack
page read and write
34F0000
heap
page read and write
39A0000
heap
page read and write
3336000
heap
page read and write
3140000
heap
page read and write
3700000
heap
page read and write
290000
heap
page read and write
2BFE000
stack
page read and write
2D30000
heap
page read and write
2FF0000
heap
page read and write
2C3D000
stack
page read and write
28FF000
stack
page read and write
2A8F000
stack
page read and write
2B7E000
unkown
page read and write
2BF6000
heap
page read and write
33EE000
stack
page read and write
46E000
unkown
page read and write
309B000
heap
page read and write
30A6000
heap
page read and write
3B56000
heap
page read and write
29B0000
heap
page read and write
323D000
stack
page read and write
34A1000
heap
page read and write
710000
heap
page read and write
2E90000
heap
page read and write
2ABF000
stack
page read and write
339B000
heap
page read and write
35A1000
heap
page read and write
2C10000
heap
page read and write
2C5E000
stack
page read and write
356B000
heap
page read and write
2D0E000
stack
page read and write
3670000
heap
page read and write
3176000
heap
page read and write
60000
heap
page read and write
2BA6000
heap
page read and write
2D4F000
unkown
page read and write
29CE000
unkown
page read and write
3486000
heap
page read and write
338E000
unkown
page read and write
385E000
stack
page read and write
2CF6000
heap
page read and write
289D000
stack
page read and write
333E000
unkown
page read and write
34FE000
unkown
page read and write
3840000
heap
page read and write
15D000
stack
page read and write
3846000
heap
page read and write
2D90000
heap
page read and write
2FD000
stack
page read and write
30FD000
stack
page read and write
36E1000
heap
page read and write
2E9F000
unkown
page read and write
7A5D000
heap
page read and write
3220000
heap
page read and write
3026000
heap
page read and write
3306000
heap
page read and write
74E000
stack
page read and write
1F454231000
heap
page read and write
35BF000
stack
page read and write
18E000
unkown
page read and write
36CE000
stack
page read and write
27E0000
heap
page read and write
3430000
heap
page read and write
2EF0000
heap
page read and write
335F000
unkown
page read and write
7A38000
heap
page read and write
2D41000
heap
page read and write
3AE0000
heap
page read and write
3590000
heap
page read and write
3B26000
heap
page read and write
2DA0000
heap
page read and write
37CF000
stack
page read and write
317E000
stack
page read and write
2DE8000
unkown
page read and write
352E000
stack
page read and write
2D16000
heap
page read and write
381F000
stack
page read and write
31D0000
heap
page read and write
1439C000
system
page read and write
2BDE000
stack
page read and write
79C2000
heap
page read and write
325D000
stack
page read and write
34CB000
heap
page read and write
4EEC000
unclassified section
page read and write
290000
heap
page read and write
2E30000
heap
page read and write
30B0000
heap
page read and write
334B000
heap
page read and write
21EAF910000
trusted library allocation
page read and write
3996000
heap
page read and write
2BF6000
heap
page read and write
3360000
heap
page read and write
39AF000
stack
page read and write
32FD000
stack
page read and write
2FDD000
stack
page read and write
2E2E000
unkown
page read and write
2CE0000
heap
page read and write
2EC6000
heap
page read and write
3456000
heap
page read and write
190000
heap
page read and write
32BE000
unkown
page read and write
2C50000
heap
page read and write
30A6000
heap
page read and write
2E5E000
unkown
page read and write
329F000
unkown
page read and write
2BB0000
heap
page read and write
3256000
heap
page read and write
5B6000
heap
page read and write
2F00000
heap
page read and write
31D7000
heap
page read and write
35AE000
stack
page read and write
335F000
stack
page read and write
3268000
heap
page read and write
30CE000
stack
page read and write
64E000
stack
page read and write
3861000
heap
page read and write
2F10000
heap
page read and write
3576000
heap
page read and write
355B000
heap
page read and write
38AA000
unkown
page read and write
32B1000
heap
page read and write
2D41000
heap
page read and write
3940000
heap
page read and write
2BA1000
heap
page read and write
2B5E000
unkown
page read and write
2BFE000
unkown
page read and write
2B40000
heap
page read and write
27C0000
heap
page read and write
307F000
stack
page read and write
2B3E000
unkown
page read and write
7A95000
heap
page read and write
30F0000
heap
page read and write
33E1000
heap
page read and write
2E9E000
stack
page read and write
19E000
unkown
page read and write
3800000
heap
page read and write
3866000
heap
page read and write
6F0000
heap
page read and write
720000
heap
page read and write
72D000
stack
page read and write
32FE000
stack
page read and write
2E40000
heap
page read and write
2EAE000
stack
page read and write
2E4E000
stack
page read and write
2CFD000
stack
page read and write
326B8000
heap
page read and write
342E000
stack
page read and write
401000
unkown
page execute read
2C7D000
stack
page read and write
3366000
heap
page read and write
303D000
stack
page read and write
2870000
heap
page read and write
3A66000
heap
page read and write
36EF000
stack
page read and write
322E000
unkown
page read and write
33D6000
heap
page read and write
3B26000
heap
page read and write
3651000
heap
page read and write
36A0000
heap
page read and write
3496000
heap
page read and write
2EC6000
heap
page read and write
2960000
heap
page read and write
2ECB000
heap
page read and write
34F0000
heap
page read and write
3530000
heap
page read and write
3960000
heap
page read and write
3286000
heap
page read and write
4C0000
heap
page read and write
3806000
heap
page read and write
342E000
stack
page read and write
4BC8000
unclassified section
page read and write
3416000
heap
page read and write
2FDD000
stack
page read and write
2B31000
heap
page read and write
317F000
stack
page read and write
303F000
stack
page read and write
1DE000
unkown
page read and write
250807E000
stack
page read and write
3460000
heap
page read and write
3811000
heap
page read and write
34E0000
heap
page read and write
369F000
stack
page read and write
3050000
heap
page read and write
64E000
unkown
page read and write
3180000
heap
page read and write
32EF000
unkown
page read and write
2A00000
heap
page read and write
354E000
stack
page read and write
3596000
heap
page read and write
2890000
heap
page read and write
338E000
stack
page read and write
2D1D000
stack
page read and write
3440000
heap
page read and write
317E000
stack
page read and write
21F60802000
trusted library allocation
page read and write
36C1000
heap
page read and write
2CFD000
stack
page read and write
304F000
stack
page read and write
2BCF000
stack
page read and write
2D2E000
unkown
page read and write
2FA6000
heap
page read and write
63D000
stack
page read and write
2D41000
heap
page read and write
27C0000
heap
page read and write
28C0000
heap
page read and write
3841000
heap
page read and write
28AB000
heap
page read and write
283E000
stack
page read and write
2C81000
heap
page read and write
2840000
heap
page read and write
3220000
heap
page read and write
3836000
heap
page read and write
373E000
stack
page read and write
32BE000
stack
page read and write
1B0000
heap
page read and write
3090000
heap
page read and write
2900000
heap
page read and write
325A6000
heap
page read and write
327E000
stack
page read and write
2FAD000
stack
page read and write
33F0000
heap
page read and write
3996000
heap
page read and write
2FDE000
stack
page read and write
3090000
heap
page read and write
32BF000
stack
page read and write
32C6000
heap
page read and write
32E0000
heap
page read and write
28BD000
stack
page read and write
600000
heap
page read and write
3390000
heap
page read and write
3DE000
stack
page read and write
36F1000
heap
page read and write
31BE000
unkown
page read and write
3A80000
heap
page read and write
3350000
heap
page read and write
2C7E000
unkown
page read and write
2AFF000
unkown
page read and write
1D297455000
heap
page read and write
288B000
heap
page read and write
34FB000
heap
page read and write
3636000
heap
page read and write
3A66000
heap
page read and write
2CE0000
heap
page read and write
3560000
heap
page read and write
2F90000
heap
page read and write
3730000
heap
page read and write
28AB000
heap
page read and write
3590000
heap
page read and write
2D3E000
stack
page read and write
3090000
heap
page read and write
2C81000
heap
page read and write
264F000
heap
page read and write
3640000
heap
page read and write
2A96000
heap
page read and write
3136000
heap
page read and write
38C1000
heap
page read and write
7A68000
heap
page read and write
36C1000
heap
page read and write
2E1E000
unkown
page read and write
1F454580000
heap
page read and write
3850000
heap
page read and write
3490000
heap
page read and write
2BF0000
heap
page read and write
355E000
unkown
page read and write
21EADF17000
heap
page read and write
2E2E000
unkown
page read and write
32F0000
heap
page read and write
67A09FC000
stack
page read and write
7A6E000
heap
page read and write
2BEF000
unkown
page read and write
2D46000
heap
page read and write
2C60000
heap
page read and write
3626000
heap
page read and write
383F000
stack
page read and write
3790000
heap
page read and write
3B26000
heap
page read and write
2E6F000
stack
page read and write
317F000
stack
page read and write
1DE000
unkown
page read and write
73E000
stack
page read and write
2F06000
heap
page read and write
31F6000
heap
page read and write
3846000
heap
page read and write
2F2E000
unkown
page read and write
3496000
heap
page read and write
3841000
heap
page read and write
3740000
heap
page read and write
303D000
stack
page read and write
3190000
heap
page read and write
33B0000
heap
page read and write
3367000
heap
page read and write
3360000
heap
page read and write
2C20000
heap
page read and write
2AD1000
heap
page read and write
384F000
stack
page read and write
27FE000
unkown
page read and write
35E0000
heap
page read and write
3020000
heap
page read and write
2F91000
heap
page read and write
2E50000
heap
page read and write
3011000
heap
page read and write
34E1000
heap
page read and write
2880000
heap
page read and write
397F000
stack
page read and write
3921000
heap
page read and write
324E000
unkown
page read and write
2C70000
heap
page read and write
30CF000
stack
page read and write
2C7F000
stack
page read and write
2FDF000
stack
page read and write
2C96000
heap
page read and write
30B0000
heap
page read and write
2D41000
heap
page read and write
4FE000
stack
page read and write
72E000
unkown
page read and write
2C30000
heap
page read and write
21EADE2A000
heap
page read and write
3718000
unkown
page read and write
2CFE000
stack
page read and write
3306000
heap
page read and write
6BE000
unkown
page read and write
2E7F000
unkown
page read and write
2AFE000
stack
page read and write
2E8F000
unkown
page read and write
32999000
direct allocation
page execute and read and write
3300000
heap
page read and write
31CF000
stack
page read and write
33BE000
stack
page read and write
3BE000
unkown
page read and write
2536000
heap
page read and write
2910000
heap
page read and write
345E000
unkown
page read and write
3121000
heap
page read and write
2C90000
heap
page read and write
33F0000
heap
page read and write
2B7E000
stack
page read and write
2D00000
heap
page read and write
D0000
heap
page read and write
3B56000
heap
page read and write
2D41000
heap
page read and write
1F454420000
heap
page read and write
3996000
heap
page read and write
3420000
heap
page read and write
2D41000
heap
page read and write
2DB6000
heap
page read and write
21EADE00000
heap
page read and write
D8A000
heap
page read and write
2D41000
heap
page read and write
2D41000
heap
page read and write
3227F000
stack
page read and write
2D7E000
stack
page read and write
3216000
heap
page read and write
3501000
heap
page read and write
282B000
heap
page read and write
2507B5B000
stack
page read and write
6FD000
stack
page read and write
3530000
heap
page read and write
75E000
unkown
page read and write
2D41000
heap
page read and write
335E000
stack
page read and write
39C6000
heap
page read and write
3410000
heap
page read and write
34A0000
heap
page read and write
2E0F000
unkown
page read and write
2AFE000
stack
page read and write
2A6F000
unkown
page read and write
35F0000
heap
page read and write
31B1000
heap
page read and write
73E000
unkown
page read and write
3491000
heap
page read and write
2900000
heap
page read and write
35DF000
stack
page read and write
27E0000
heap
page read and write
2890000
heap
page read and write
2B3D000
stack
page read and write
37F6000
heap
page read and write
2B5D000
stack
page read and write
2B40000
heap
page read and write
34B0000
heap
page read and write
343B000
heap
page read and write
3751000
heap
page read and write
73D000
stack
page read and write
2E3E000
unkown
page read and write
2FDE000
stack
page read and write
3850000
heap
page read and write
2B10000
heap
page read and write
2C7E000
unkown
page read and write
2D00000
heap
page read and write
2F61000
heap
page read and write
80EF000
stack
page read and write
35A6000
heap
page read and write
3821000
heap
page read and write
3020000
heap
page read and write
3870000
heap
page read and write
2D41000
heap
page read and write
3361000
heap
page read and write
36D0000
heap
page read and write
4D0000
heap
page read and write
2E4E000
stack
page read and write
32C1000
heap
page read and write
3390000
heap
page read and write
53D000
stack
page read and write
2C21000
heap
page read and write
2D2D000
stack
page read and write
2DBF000
stack
page read and write
3891000
heap
page read and write
32B0000
heap
page read and write
32870000
direct allocation
page execute and read and write
32A0000
heap
page read and write
2B8E000
unkown
page read and write
3736000
heap
page read and write
3770000
heap
page read and write
3390000
heap
page read and write
30DB000
heap
page read and write
2B0000
heap
page read and write
2EDE000
stack
page read and write
2B20000
heap
page read and write
323D000
stack
page read and write
2643000
heap
page read and write
312F000
stack
page read and write
9D000
stack
page read and write
37B0000
heap
page read and write
349E000
unkown
page read and write
30FF000
stack
page read and write
2E1F000
stack
page read and write
2B90000
heap
page read and write
61D000
stack
page read and write
2BD0000
heap
page read and write
4FE000
stack
page read and write
295D000
stack
page read and write
2D41000
heap
page read and write
3000000
heap
page read and write
2FD1000
heap
page read and write
32DF000
unkown
page read and write
353E000
stack
page read and write
38DF000
stack
page read and write
2D41000
heap
page read and write
345F000
unkown
page read and write
35AE000
unkown
page read and write
3290000
heap
page read and write
32E0000
heap
page read and write
34D000
stack
page read and write
58E000
unkown
page read and write
71D000
heap
page read and write
36EE000
stack
page read and write
3730000
heap
page read and write
3770000
heap
page read and write
2D50000
heap
page read and write
2E2E000
stack
page read and write
3280000
heap
page read and write
3736000
heap
page read and write
3596000
heap
page read and write
3A11000
heap
page read and write
2E20000
unkown
page read and write
1D297479000
heap
page read and write
26E1AFD000
stack
page read and write
51B000
heap
page read and write
1D297600000
unclassified section
page readonly
33E0000
heap
page read and write
2D41000
heap
page read and write
338F000
unkown
page read and write
2D41000
heap
page read and write
2F06000
heap
page read and write
3520000
heap
page read and write
3F7000
unkown
page readonly
32A6000
heap
page read and write
30C7000
heap
page read and write
2F5B000
heap
page read and write
3700000
heap
page read and write
29D0000
heap
page read and write
31AF000
unkown
page read and write
320E000
stack
page read and write
71E000
stack
page read and write
2BE0000
heap
page read and write
2D41000
heap
page read and write
3390000
heap
page read and write
3590000
heap
page read and write
29BE000
stack
page read and write
3876000
heap
page read and write
2F30000
heap
page read and write
3107000
heap
page read and write
37E0000
heap
page read and write
30FE000
stack
page read and write
4C0000
heap
page read and write
35F6000
heap
page read and write
323E000
stack
page read and write
14182000
system
page read and write
344F000
stack
page read and write
2B51000
heap
page read and write
2D71000
heap
page read and write
3930000
heap
page read and write
3010000
heap
page read and write
3540000
heap
page read and write
304E000
stack
page read and write
470000
heap
page read and write
30D0000
heap
page read and write
2F10000
heap
page read and write
550000
direct allocation
page read and write
2B81000
heap
page read and write
2D8B000
heap
page read and write
325F000
unkown
page read and write
334E000
unkown
page read and write
2DCD000
stack
page read and write
30A1000
heap
page read and write
2877000
heap
page read and write
29AD000
stack
page read and write
19D000
stack
page read and write
34FE000
unkown
page read and write
2B61000
heap
page read and write
2C30000
heap
page read and write
297D000
stack
page read and write
2B7F000
unkown
page read and write
283E000
stack
page read and write
3040000
heap
page read and write
3790000
heap
page read and write
3770000
heap
page read and write
311E000
stack
page read and write
3470000
heap
page read and write
2EDF000
stack
page read and write
31C0000
heap
page read and write
3711000
heap
page read and write
30A0000
heap
page read and write
321F000
unkown
page read and write
2BEF000
unkown
page read and write
2BA0000
heap
page read and write
309F000
stack
page read and write
CD000
stack
page read and write
35A1000
heap
page read and write
35A6000
heap
page read and write
1BD000
stack
page read and write
376F000
stack
page read and write
3651000
heap
page read and write
3496000
heap
page read and write
38C1000
heap
page read and write
2D46000
heap
page read and write
1D297400000
heap
page read and write
30E0000
heap
page read and write
2DB0000
heap
page read and write
2D87000
heap
page read and write
3A06000
heap
page read and write
32FE000
stack
page read and write
35B0000
heap
page read and write
3400000
heap
page read and write
27FE000
stack
page read and write
60E000
stack
page read and write
35D6000
heap
page read and write
1288000
heap
page read and write
3330000
heap
page read and write
6D6000
heap
page read and write
79C4000
heap
page read and write
33A0000
heap
page read and write
6D0000
heap
page read and write
330E000
stack
page read and write
2BD0000
heap
page read and write
11B0000
heap
page read and write
2D41000
heap
page read and write
2D86000
heap
page read and write
2F21000
heap
page read and write
3A21000
heap
page read and write
34BE000
stack
page read and write
37A0000
heap
page read and write
325D000
stack
page read and write
6D0000
heap
page read and write
3910000
heap
page read and write
2E9E000
stack
page read and write
3BCE000
unkown
page read and write
28CD000
stack
page read and write
2830000
heap
page read and write
2F80000
heap
page read and write
31F0000
heap
page read and write
2A90000
heap
page read and write
323E000
unkown
page read and write
2E70000
heap
page read and write
29DE000
stack
page read and write
2F5F000
unkown
page read and write
3571000
heap
page read and write
1BE000
unkown
page read and write
3410000
heap
page read and write
3130000
heap
page read and write
2F8E000
stack
page read and write
3796000
heap
page read and write
2B46000
heap
page read and write
39A6000
heap
page read and write
31BE000
stack
page read and write
2C96000
heap
page read and write
6B0000
heap
page read and write
21F6007B000
heap
page read and write
3146000
heap
page read and write
2F3D000
stack
page read and write
2BBE000
stack
page read and write
3AC0000
heap
page read and write
32FE000
stack
page read and write
2CBE000
unkown
page read and write
33A0000
heap
page read and write
30C6000
heap
page read and write
35D6000
heap
page read and write
3246000
heap
page read and write
2980000
heap
page read and write
2BB0000
heap
page read and write
3B26000
heap
page read and write
6FD000
stack
page read and write
3AD000
stack
page read and write
1160000
unkown
page read and write
307F000
unkown
page read and write
7A92000
heap
page read and write
38A6000
heap
page read and write
3726000
heap
page read and write
35FF000
stack
page read and write
6FD000
stack
page read and write
2CFD000
stack
page read and write
2E11000
heap
page read and write
32643000
heap
page read and write
2A5D000
stack
page read and write
29FD000
stack
page read and write
3390000
heap
page read and write
3240000
heap
page read and write
2BA0000
heap
page read and write
39F1000
heap
page read and write
2D41000
heap
page read and write
3210000
heap
page read and write
2ECD000
stack
page read and write
29A0000
heap
page read and write
2E20000
heap
page read and write
2B50000
heap
page read and write
553F000
stack
page read and write
327ED000
heap
page read and write
2FEE000
stack
page read and write
27F0000
heap
page read and write
2990000
heap
page read and write
2D41000
heap
page read and write
46D000
stack
page read and write
3380000
heap
page read and write
3861000
heap
page read and write
32A6000
heap
page read and write
3651000
heap
page read and write
2CA0000
heap
page read and write
29FB000
heap
page read and write
50000
heap
page read and write
30B0000
heap
page read and write
33D0000
heap
page read and write
3286000
heap
page read and write
37F0000
heap
page read and write
80000
heap
page read and write
3526000
heap
page read and write
2E2B000
heap
page read and write
3846000
heap
page read and write
2E30000
heap
page read and write
31CE000
stack
page read and write
570000
heap
page read and write
322E0000
heap
page read and write
2B3E000
unkown
page read and write
38D0000
heap
page read and write
2E20000
heap
page read and write
37EF000
stack
page read and write
2D41000
heap
page read and write
2B46000
heap
page read and write
361F000
unkown
page read and write
2ED7000
heap
page read and write
2DEE000
stack
page read and write
3130000
heap
page read and write
32B40000
direct allocation
page execute and read and write
3180000
heap
page read and write
2AFF000
unkown
page read and write
2B5E000
stack
page read and write
2920000
heap
page read and write
3480000
heap
page read and write
2F20000
heap
page read and write
2E26000
heap
page read and write
2C30000
heap
page read and write
3090000
heap
page read and write
294B000
heap
page read and write
2D10000
heap
page read and write
3A10000
heap
page read and write
29CD000
stack
page read and write
64E000
stack
page read and write
730000
heap
page read and write
3056000
heap
page read and write
2ED0000
heap
page read and write
2C4E000
stack
page read and write
2BDE000
stack
page read and write
27FE000
stack
page read and write
2D41000
heap
page read and write
2FD1000
heap
page read and write
29DD000
stack
page read and write
2D8E000
unkown
page read and write
2D6E000
unkown
page read and write
2C61000
heap
page read and write
2E40000
heap
page read and write
30D7000
heap
page read and write
29FE000
stack
page read and write
322E0000
remote allocation
page read and write
291C000
heap
page read and write
35B0000
heap
page read and write
2B66000
heap
page read and write
715000
heap
page read and write
2CC6000
heap
page read and write
31BE000
stack
page read and write
37D6000
heap
page read and write
32A6000
heap
page read and write
21EADE40000
heap
page read and write
2E20000
heap
page read and write
302E000
stack
page read and write
35D0000
heap
page read and write
32C0000
heap
page read and write
3430000
heap
page read and write
2D7E000
unkown
page read and write
31EE000
stack
page read and write
3546000
heap
page read and write
3410000
heap
page read and write
2FB6000
heap
page read and write
2BE0000
heap
page read and write
303E000
stack
page read and write
30EF000
stack
page read and write
345E000
stack
page read and write
2DAB000
heap
page read and write
3286000
heap
page read and write
2C1B000
heap
page read and write
3040000
heap
page read and write
1DE000
stack
page read and write
3876000
heap
page read and write
2ACB000
heap
page read and write
3130000
heap
page read and write
3910000
heap
page read and write
2FF6000
heap
page read and write
3521000
heap
page read and write
2C0E000
stack
page read and write
3906000
heap
page read and write
3AA6000
heap
page read and write
347B000
heap
page read and write
3041000
heap
page read and write
2B3F000
stack
page read and write
36E1000
heap
page read and write
35F0000
heap
page read and write
3480000
heap
page read and write
4D0000
heap
page read and write
281B000
heap
page read and write
2E00000
heap
page read and write
3256000
heap
page read and write
746000
heap
page read and write
2BAE000
stack
page read and write
2F4B000
heap
page read and write
2BF1000
heap
page read and write
2DD6000
heap
page read and write
319E000
stack
page read and write
27FE000
unkown
page read and write
55E000
stack
page read and write
2FDD000
unkown
page read and write
2E06000
heap
page read and write
3036000
heap
page read and write
2D41000
heap
page read and write
3860000
heap
page read and write
2AAF000
unkown
page read and write
21EADE25000
heap
page read and write
1160000
unkown
page read and write
262F000
heap
page read and write
33E1000
heap
page read and write
2CFE000
stack
page read and write
34B1000
heap
page read and write
4FE000
stack
page read and write
2970000
heap
page read and write
290B000
heap
page read and write
2D16000
heap
page read and write
2C70000
heap
page read and write
2A5D000
stack
page read and write
3030000
heap
page read and write
2D41000
heap
page read and write
2EF6000
heap
page read and write
334E000
stack
page read and write
3311000
heap
page read and write
3286000
heap
page read and write
2D36000
heap
page read and write
2D60000
heap
page read and write
38E0000
heap
page read and write
3800000
heap
page read and write
29BF000
stack
page read and write
2C17000
heap
page read and write
3550000
heap
page read and write
3021000
heap
page read and write
3921000
heap
page read and write
335E000
stack
page read and write
2D41000
heap
page read and write
2D41000
heap
page read and write
5A0000
heap
page read and write
3020000
heap
page read and write
2887000
heap
page read and write
3901000
heap
page read and write
3680000
heap
page read and write
2BFE000
stack
page read and write
35C1000
heap
page read and write
446000
unkown
page readonly
740000
heap
page read and write
30C6000
heap
page read and write
2930000
heap
page read and write
2F90000
heap
page read and write
3300000
heap
page read and write
2DE1000
heap
page read and write
690000
heap
page read and write
2A90000
heap
page read and write
3060000
heap
page read and write
190000
heap
page read and write
21F60102000
heap
page read and write
28BF000
unkown
page read and write
2ACB000
heap
page read and write
356E000
stack
page read and write
19D000
stack
page read and write
3BA0000
heap
page read and write
27FE000
stack
page read and write
310B000
heap
page read and write
2C9F000
stack
page read and write
2D41000
heap
page read and write
2CB1000
heap
page read and write
352E000
stack
page read and write
34B6000
heap
page read and write
2997000
heap
page read and write
32C6000
heap
page read and write
356F000
stack
page read and write
1F455F0A000
trusted library allocation
page read and write
2EDB000
heap
page read and write
298E000
unkown
page read and write
2DAE000
unkown
page read and write
4FD000
stack
page read and write
3030000
heap
page read and write
2D41000
heap
page read and write
32D0000
heap
page read and write
2DBE000
unkown
page read and write
2643000
heap
page read and write
30C0000
heap
page read and write
2F90000
heap
page read and write
2F31000
heap
page read and write
3B20000
heap
page read and write
2E20000
heap
page read and write
2636000
heap
page read and write
2FFD000
stack
page read and write
2DC6000
heap
page read and write
2D41000
heap
page read and write
2EFE000
stack
page read and write
73E000
unkown
page read and write
2D2D000
stack
page read and write
382E000
stack
page read and write
36B0000
heap
page read and write
2D41000
heap
page read and write
301F000
unkown
page read and write
2BFD000
stack
page read and write
21F60002000
heap
page read and write
5FD000
stack
page read and write
333E000
stack
page read and write
2D26000
heap
page read and write
2AFE000
stack
page read and write
3480000
heap
page read and write
43D000
stack
page read and write
34CE000
stack
page read and write
39D6000
heap
page read and write
2BDE000
unkown
page read and write
308E000
stack
page read and write
30EF000
stack
page read and write
3490000
heap
page read and write
3360000
heap
page read and write
3370000
heap
page read and write
29F0000
heap
page read and write
348F000
stack
page read and write
2E3D000
stack
page read and write
30B0000
heap
page read and write
21F60040000
heap
page read and write
2D41000
heap
page read and write
2CF6000
heap
page read and write
3190000
heap
page read and write
3636000
heap
page read and write
37CF000
stack
page read and write
70D000
stack
page read and write
649000
unkown
page execute read
2C60000
heap
page read and write
371F000
unkown
page read and write
3881000
heap
page read and write
322F000
stack
page read and write
3060000
heap
page read and write
2DAE000
unkown
page read and write
3B00000
heap
page read and write
1EE000
stack
page read and write
365E000
stack
page read and write
313E000
stack
page read and write
37B1000
heap
page read and write
2E91000
heap
page read and write
660000
heap
page read and write
2EA1000
heap
page read and write
31CE000
stack
page read and write
3556000
heap
page read and write
33A1000
heap
page read and write
2ED1000
heap
page read and write
2B21000
heap
page read and write
D8E000
heap
page read and write
3211000
heap
page read and write
32C6000
heap
page read and write
2B70000
heap
page read and write
35D6000
heap
page read and write
2B3F000
stack
page read and write
2C5E000
stack
page read and write
3B26000
heap
page read and write
35B6000
heap
page read and write
2FAE000
unkown
page read and write
2CF0000
heap
page read and write
2F61000
heap
page read and write
2F50000
heap
page read and write
2E5B000
heap
page read and write
3341000
heap
page read and write
6B0000
heap
page read and write
2F30000
heap
page read and write
2D7E000
stack
page read and write
2CFF000
unkown
page read and write
314F000
unkown
page read and write
2F0E000
stack
page read and write
2A5D000
stack
page read and write
3186000
heap
page read and write
2FBB000
heap
page read and write
33EB000
heap
page read and write
3590000
heap
page read and write
3851000
heap
page read and write
2B00000
heap
page read and write
2D8D000
stack
page read and write
2F8E000
stack
page read and write
3740000
heap
page read and write
2FFD000
stack
page read and write
2D80000
heap
page read and write
351E000
stack
page read and write
369F000
stack
page read and write
322F000
stack
page read and write
300E000
unkown
page read and write
21EADE70000
heap
page read and write
2DC0000
heap
page read and write
2AEB000
heap
page read and write
3746000
heap
page read and write
2E60000
heap
page read and write
3261000
heap
page read and write
2D41000
heap
page read and write
328E000
stack
page read and write
2A66000
heap
page read and write
3A06000
heap
page read and write
2D70000
heap
page read and write
2CC0000
heap
page read and write
33B0000
heap
page read and write
3700000
heap
page read and write
37F1000
heap
page read and write
331F000
stack
page read and write
3906000
heap
page read and write
7A82000
heap
page read and write
3351000
heap
page read and write
374F000
unkown
page read and write
2D41000
heap
page read and write
2C90000
heap
page read and write
3560000
heap
page read and write
2F1D000
stack
page read and write
2C70000
heap
page read and write
E9163FF000
stack
page read and write
3620000
heap
page read and write
34F0000
heap
page read and write
2F76000
heap
page read and write
2D36000
heap
page read and write
2DEE000
stack
page read and write
1EE000
stack
page read and write
30EB000
heap
page read and write
2D41000
heap
page read and write
321AE000
stack
page read and write
3736000
heap
page read and write
21EADE77000
heap
page read and write
2FE0000
heap
page read and write
3466000
heap
page read and write
6AE000
unkown
page read and write
368E000
stack
page read and write
3200000
heap
page read and write
31B6000
heap
page read and write
2D70000
heap
page read and write
3761000
heap
page read and write
3051000
heap
page read and write
33261000
unclassified section
page execute and read and write
27C0000
heap
page read and write
317D000
stack
page read and write
2BCE000
stack
page read and write
33C6000
heap
page read and write
700000
heap
page read and write
2CDF000
stack
page read and write
2BB0000
unkown
page readonly
6F0000
heap
page read and write
2DF0000
heap
page read and write
4AE000
stack
page read and write
2E06000
heap
page read and write
2D41000
heap
page read and write
38C1000
heap
page read and write
2E10000
heap
page read and write
1AD000
stack
page read and write
2DD0000
heap
page read and write
30FE000
unkown
page read and write
2EC0000
heap
page read and write
3861000
heap
page read and write
6D0000
heap
page read and write
2BC0000
heap
page read and write
305B000
heap
page read and write
3AC1000
heap
page read and write
3416000
heap
page read and write
2EAF000
unkown
page read and write
3A10000
heap
page read and write
2E00000
heap
page read and write
3996000
heap
page read and write
5DE000
stack
page read and write
3571000
heap
page read and write
2EA9000
heap
page read and write
2F20000
heap
page read and write
37B1000
heap
page read and write
3840000
heap
page read and write
2FE0000
heap
page read and write
30000
heap
page read and write
395F000
stack
page read and write
2D24000
heap
page read and write
3650000
heap
page read and write
2ED1000
heap
page read and write
3230000
heap
page read and write
2B3F000
stack
page read and write
3110000
heap
page read and write
39D6000
heap
page read and write
322F000
stack
page read and write
310000
heap
page read and write
38D0000
heap
page read and write
50E000
unkown
page read and write
29ED000
stack
page read and write
2C7E000
unkown
page read and write
3F5000
unkown
page read and write
34BE000
unkown
page read and write
2D8E000
unkown
page read and write
3960000
heap
page read and write
2C96000
heap
page read and write
70E000
stack
page read and write
27C0000
heap
page read and write
2C50000
heap
page read and write
2D41000
heap
page read and write
2D41000
heap
page read and write
2F8E000
stack
page read and write
3426000
heap
page read and write
600000
heap
page read and write
4B0000
heap
page read and write
2AE0000
heap
page read and write
2CE0000
heap
page read and write
2E80000
heap
page read and write
2B60000
heap
page read and write
32E0000
heap
page read and write
3510000
heap
page read and write
35CF000
unkown
page read and write
1F454130000
system
page execute and read and write
37F1000
heap
page read and write
344E000
stack
page read and write
2A3E000
stack
page read and write
3860000
heap
page read and write
2810000
heap
page read and write
2D41000
heap
page read and write
2CB0000
heap
page read and write
2A40000
heap
page read and write
73E000
stack
page read and write
32E6000
heap
page read and write
3416000
heap
page read and write
345E000
unkown
page read and write
33AF000
stack
page read and write
308E000
unkown
page read and write
3670000
heap
page read and write
2C0E000
unkown
page read and write
2B6F000
stack
page read and write
5F0000
heap
page read and write
4D5A000
unclassified section
page read and write
28BF000
stack
page read and write
2E06000
heap
page read and write
21EAF940000
remote allocation
page read and write
2866000
heap
page read and write
39C0000
heap
page read and write
2F2F000
unkown
page read and write
2F70000
heap
page read and write
2D41000
heap
page read and write
3041000
heap
page read and write
3941000
heap
page read and write
2D36000
heap
page read and write
2EAE000
stack
page read and write
3490000
heap
page read and write
2D41000
heap
page read and write
3110000
heap
page read and write
30D0000
heap
page read and write
3330000
heap
page read and write
2D41000
heap
page read and write
3960000
heap
page read and write
B2F000
unkown
page read and write
2C8E000
stack
page read and write
2FA0000
heap
page read and write
325D000
stack
page read and write
3751000
heap
page read and write
2FE0000
heap
page read and write
2C9F000
stack
page read and write
3190000
heap
page read and write
2820000
heap
page read and write
3851000
heap
page read and write
3180000
heap
page read and write
309F000
stack
page read and write
300000
heap
page read and write
27FE000
unkown
page read and write
377F000
stack
page read and write
36C0000
heap
page read and write
640000
heap
page read and write
330E000
unkown
page read and write
32C6000
heap
page read and write
3361000
heap
page read and write
2D16000
heap
page read and write
2F9E000
unkown
page read and write
2D10000
heap
page read and write
2BB1000
heap
page read and write
3741000
heap
page read and write
21EADD50000
heap
page read and write
369B000
heap
page read and write
264A000
heap
page read and write
337D000
stack
page read and write
343E000
stack
page read and write
49E000
stack
page read and write
39D1000
heap
page read and write
2C80000
heap
page read and write
2A20000
heap
page read and write
34D0000
heap
page read and write
3836000
heap
page read and write
29BE000
stack
page read and write
3620000
heap
page read and write
31D0000
heap
page read and write
3F0000
heap
page read and write
32BF000
unkown
page read and write
6CD000
stack
page read and write
39F1000
heap
page read and write
3416000
heap
page read and write
2FF1000
heap
page read and write
2C86000
heap
page read and write
3891000
heap
page read and write
710000
heap
page read and write
4FE000
stack
page read and write
300F000
stack
page read and write
2DC6000
heap
page read and write
2A8F000
stack
page read and write
3F5000
unkown
page read and write
28CE000
stack
page read and write
30DE000
unkown
page read and write
2F3E000
stack
page read and write
2E81000
heap
page read and write
3240000
heap
page read and write
400000
unkown
page readonly
3066000
heap
page read and write
3121000
heap
page read and write
5B0000
heap
page read and write
29F0000
heap
page read and write
3B56000
heap
page read and write
3450000
heap
page read and write
2D4E000
unkown
page read and write
3AD0000
heap
page read and write
2BFE000
stack
page read and write
3796000
heap
page read and write
2BA6000
heap
page read and write
348F000
unkown
page read and write
2D80000
heap
page read and write
3500000
heap
page read and write
2E8E000
stack
page read and write
2CB0000
heap
page read and write
2D0B000
heap
page read and write
382E000
stack
page read and write
2EC7000
heap
page read and write
33C0000
heap
page read and write
257E000
stack
page read and write
39A0000
heap
page read and write
36DF000
stack
page read and write
39E0000
heap
page read and write
600000
heap
page read and write
34A1000
heap
page read and write
3800000
heap
page read and write
3490000
heap
page read and write
2FE0000
heap
page read and write
348E000
unkown
page read and write
3471000
heap
page read and write
367F000
stack
page read and write
3490000
heap
page read and write
2960000
heap
page read and write
3220000
heap
page read and write
74E000
unkown
page read and write
2F66000
heap
page read and write
700000
heap
page read and write
3A36000
heap
page read and write
34C0000
heap
page read and write
3730000
heap
page read and write
2D41000
heap
page read and write
3571000
heap
page read and write
33A0000
heap
page read and write
2870000
heap
page read and write
2DC6000
heap
page read and write
345E000
stack
page read and write
6D0000
heap
page read and write
35A6000
heap
page read and write
2E5E000
unkown
page read and write
32FE000
stack
page read and write
2CB0000
heap
page read and write
32FD000
stack
page read and write
33A6000
heap
page read and write
3226000
heap
page read and write
29D3000
heap
page read and write
39A1000
heap
page read and write
2C86000
heap
page read and write
2D41000
heap
page read and write
34EF000
stack
page read and write
1220000
unkown
page readonly
2F36000
heap
page read and write
34D0000
heap
page read and write
6AE000
stack
page read and write
34DE000
stack
page read and write
32FD000
stack
page read and write
32D000
stack
page read and write
35C0000
heap
page read and write
11A1000
unkown
page readonly
3550000
heap
page read and write
2FB0000
heap
page read and write
311F000
unkown
page read and write
36EE000
stack
page read and write
2DF7000
heap
page read and write
2D41000
heap
page read and write
3176000
heap
page read and write
2D6E000
unkown
page read and write
2A20000
heap
page read and write
3026000
heap
page read and write
3210000
heap
page read and write
38E1000
heap
page read and write
2FB0000
heap
page read and write
2917000
heap
page read and write
2FAD000
stack
page read and write
340E000
stack
page read and write
30FD000
stack
page read and write
57E000
stack
page read and write
2FEB000
heap
page read and write
28DB000
heap
page read and write
401000
unkown
page execute read
430000
unkown
page read and write
2DC0000
heap
page read and write
2E9B000
heap
page read and write
313D000
stack
page read and write
32630000
heap
page read and write
2DC6000
heap
page read and write
3170000
heap
page read and write
2890000
heap
page read and write
2D5E000
unkown
page read and write
6F0000
heap
page read and write
2948000
heap
page read and write
3801000
heap
page read and write
3851000
heap
page read and write
367E000
stack
page read and write
337E000
unkown
page read and write
293E000
stack
page read and write
2D41000
heap
page read and write
50E9000
direct allocation
page execute and read and write
5CD000
stack
page read and write
6FE000
unkown
page read and write
30C6000
heap
page read and write
2BF0000
heap
page read and write
3070000
heap
page read and write
2D41000
heap
page read and write
2E8E000
stack
page read and write
2B3E000
stack
page read and write
329E000
stack
page read and write
2F4E000
stack
page read and write
333E000
stack
page read and write
375F000
unkown
page read and write
2EE6000
heap
page read and write
3186000
heap
page read and write
10B0000
unkown
page read and write
35A0000
heap
page read and write
3380000
heap
page read and write
2D41000
heap
page read and write
70000
heap
page read and write
2B61000
heap
page read and write
79E8000
heap
page read and write
340E000
unkown
page read and write
3056000
heap
page read and write
3780000
heap
page read and write
570000
direct allocation
page read and write
63D000
stack
page read and write
27FE000
stack
page read and write
2EBD000
stack
page read and write
2ABF000
stack
page read and write
359F000
stack
page read and write
3616000
heap
page read and write
2E80000
heap
page read and write
2B20000
unkown
page read and write
3196000
heap
page read and write
4BE000
stack
page read and write
2AA0000
heap
page read and write
2870000
heap
page read and write
453A000
unkown
page read and write
3506000
heap
page read and write
3107000
heap
page read and write
2A3E000
stack
page read and write
33CE000
stack
page read and write
21F5FFC0000
trusted library allocation
page read and write
28B0000
heap
page read and write
353F000
stack
page read and write
321F000
stack
page read and write
34A0000
heap
page read and write
2D41000
heap
page read and write
79EB000
heap
page read and write
2DD1000
heap
page read and write
28FE000
stack
page read and write
2C81000
heap
page read and write
2ED0000
heap
page read and write
1DD000
stack
page read and write
27FE000
stack
page read and write
3970000
heap
page read and write
34C0000
heap
page read and write
2D41000
heap
page read and write
34B1000
heap
page read and write
2D16000
heap
page read and write
2C1F000
stack
page read and write
3041000
heap
page read and write
2A7E000
unkown
page read and write
36FE000
stack
page read and write
33C6000
heap
page read and write
39D0000
heap
page read and write
3130000
heap
page read and write
3720000
heap
page read and write
6CE000
stack
page read and write
2636000
heap
page read and write
32FF000
stack
page read and write
3781000
heap
page read and write
36C1000
heap
page read and write
3811000
heap
page read and write
3120000
heap
page read and write
2ADD000
stack
page read and write
37AE000
stack
page read and write
29CE000
stack
page read and write
2D36000
heap
page read and write
31BE000
stack
page read and write
313E000
stack
page read and write
33DF000
unkown
page read and write
29B0000
heap
page read and write
3406000
heap
page read and write
2B8E000
stack
page read and write
363F000
stack
page read and write
2B7E000
stack
page read and write
1F454226000
heap
page read and write
3217000
heap
page read and write
2FFD000
stack
page read and write
2C5B000
heap
page read and write
62B000
heap
page read and write
2F3E000
unkown
page read and write
36CE000
stack
page read and write
2CD0000
heap
page read and write
3756000
heap
page read and write
640000
heap
page read and write
345E000
stack
page read and write
2E90000
heap
page read and write
150000
heap
page read and write
2C7E000
stack
page read and write
31D0000
heap
page read and write
383F000
stack
page read and write
3351000
heap
page read and write
2B66000
heap
page read and write
303D000
stack
page read and write
21EADF00000
heap
page read and write
5A0000
heap
page read and write
2CD0000
heap
page read and write
332F000
stack
page read and write
28BF000
stack
page read and write
293B000
heap
page read and write
2D70000
heap
page read and write
3000000
heap
page read and write
2EF0000
heap
page read and write
3271000
heap
page read and write
2E1F000
unkown
page read and write
35FF000
stack
page read and write
2FE0000
heap
page read and write
3F38000
unclassified section
page read and write
746000
heap
page read and write
2BC0000
heap
page read and write
3876000
heap
page read and write
31D0000
heap
page read and write
30FB000
heap
page read and write
2DCE000
unkown
page read and write
2D6E000
stack
page read and write
32C0000
heap
page read and write
372F000
stack
page read and write
35FE000
stack
page read and write
3450000
heap
page read and write
3626000
heap
page read and write
3146000
heap
page read and write
30EF000
unkown
page read and write
304F000
stack
page read and write
2C17000
heap
page read and write
32C0000
heap
page read and write
1E0000
heap
page read and write
32B3C000
direct allocation
page execute and read and write
3250000
heap
page read and write
3510000
heap
page read and write
3650000
heap
page read and write
2E6B000
heap
page read and write
3291000
heap
page read and write
2BFE000
stack
page read and write
3781000
heap
page read and write
32E0000
heap
page read and write
6D0000
heap
page read and write
1FE000
unkown
page read and write
1002000
system
page execute and read and write
650000
heap
page read and write
3176000
heap
page read and write
2E56000
heap
page read and write
3361000
heap
page read and write
2B00000
heap
page read and write
61B000
heap
page read and write
3500000
heap
page read and write
21EADF02000
heap
page read and write
3170000
heap
page read and write
3BA6000
heap
page read and write
2D60000
heap
page read and write
373F000
unkown
page read and write
2FCE000
stack
page read and write
33C6000
heap
page read and write
29D1000
heap
page read and write
325E000
stack
page read and write
E915F8B000
stack
page read and write
1F455F1C000
trusted library allocation
page read and write
590000
direct allocation
page read and write
3240000
heap
page read and write
2C20000
heap
page read and write
2E3D000
stack
page read and write
2A3E000
stack
page read and write
359F000
unkown
page read and write
2920000
heap
page read and write
2BA6000
heap
page read and write
2FD0000
heap
page read and write
37EF000
stack
page read and write
2FDF000
stack
page read and write
2D41000
heap
page read and write
2B70000
heap
page read and write
2B10000
heap
page read and write
3436000
heap
page read and write
1AD000
stack
page read and write
33FF000
unkown
page read and write
2A90000
heap
page read and write
2D3E000
stack
page read and write
1F454310000
heap
page read and write
307D000
stack
page read and write
2D41000
heap
page read and write
3066000
heap
page read and write
3BD6000
heap
page read and write
21EADE84000
heap
page read and write
25082FE000
stack
page read and write
2BB0000
heap
page read and write
34CE000
stack
page read and write
30000
heap
page read and write
36B6000
heap
page read and write
250827B000
stack
page read and write
31C0000
heap
page read and write
1230000
unkown
page read and write
3790000
heap
page read and write
2DC0000
heap
page read and write
55E000
stack
page read and write
28BF000
stack
page read and write
2CCF000
stack
page read and write
2900000
heap
page read and write
2EAF000
unkown
page read and write
2D31000
heap
page read and write
2E80000
heap
page read and write
73D000
stack
page read and write
2960000
heap
page read and write
3731000
heap
page read and write
309E000
stack
page read and write
2DBB000
heap
page read and write
30A1000
heap
page read and write
308F000
unkown
page read and write
2CBE000
stack
page read and write
2C20000
heap
page read and write
3291000
heap
page read and write
3560000
heap
page read and write
3050000
heap
page read and write
35E0000
heap
page read and write
3120000
heap
page read and write
31C40000
direct allocation
page read and write
2940000
heap
page read and write
3916000
heap
page read and write
3490000
heap
page read and write
2FD1000
heap
page read and write
2D41000
heap
page read and write
3331000
heap
page read and write
75E000
unkown
page read and write
29FD000
stack
page read and write
2A90000
heap
page read and write
300E000
stack
page read and write
23A4000
heap
page read and write
3AF6000
heap
page read and write
2C10000
heap
page read and write
2ED6000
heap
page read and write
308F000
unkown
page read and write
3EE000
stack
page read and write
3246000
heap
page read and write
2F66000
heap
page read and write
2B50000
heap
page read and write
7AA8000
heap
page read and write
3550000
heap
page read and write
21EAE0D0000
unclassified section
page readonly
2DA0000
heap
page read and write
3610000
heap
page read and write
F0000
heap
page read and write
31D0000
heap
page read and write
2EDF000
unkown
page read and write
30D1000
heap
page read and write
323CF000
stack
page read and write
289B000
heap
page read and write
2DE1000
heap
page read and write
2E4E000
unkown
page read and write
33D6000
heap
page read and write
3136000
heap
page read and write
3630000
heap
page read and write
2E5E000
unkown
page read and write
2F8E000
stack
page read and write
30C6000
heap
page read and write
429000
unkown
page read and write
2F6E000
stack
page read and write
27D0000
heap
page read and write
338F000
stack
page read and write
2D40000
heap
page read and write
32D0000
heap
page read and write
3687000
heap
page read and write
37E0000
heap
page read and write
351E000
unkown
page read and write
3299D000
direct allocation
page execute and read and write
2EE0000
heap
page read and write
32A6000
heap
page read and write
3876000
heap
page read and write
33CF000
stack
page read and write
33D0000
heap
page read and write
2900000
heap
page read and write
2F3E000
stack
page read and write
2EFE000
stack
page read and write
28BE000
stack
page read and write
5C0000
heap
page read and write
1D2972F0000
heap
page read and write
3127000
heap
page read and write
2D2F000
unkown
page read and write
33CF000
stack
page read and write
3920000
heap
page read and write
348F000
unkown
page read and write
1000000
unkown
page readonly
500000
heap
page read and write
2FC0000
heap
page read and write
2B60000
heap
page read and write
2ECD000
stack
page read and write
3246000
heap
page read and write
313F000
stack
page read and write
2BE0000
heap
page read and write
2FFD000
stack
page read and write
6E8000
heap
page read and write
3926000
heap
page read and write
343E000
stack
page read and write
299E000
stack
page read and write
300E000
stack
page read and write
3301000
heap
page read and write
71D000
stack
page read and write
3290000
heap
page read and write
3071000
heap
page read and write
2CD6000
heap
page read and write
3530000
heap
page read and write
3596000
heap
page read and write
3030000
heap
page read and write
50B000
heap
page read and write
6E0000
heap
page read and write
31D0000
heap
page read and write
3110000
heap
page read and write
380E000
stack
page read and write
30E6000
heap
page read and write
3491000
heap
page read and write
2ECE000
stack
page read and write
2D7E000
unkown
page read and write
2F06000
heap
page read and write
2E5E000
stack
page read and write
344E000
stack
page read and write
2CF6000
heap
page read and write
29BE000
unkown
page read and write
2B7E000
stack
page read and write
6CD000
stack
page read and write
35A0000
heap
page read and write
37F0000
heap
page read and write
5F0000
heap
page read and write
3593000
unkown
page execute and read and write
2B80000
heap
page read and write
2EFE000
stack
page read and write
37BF000
stack
page read and write
2CFE000
stack
page read and write
27FE000
unkown
page read and write
2616000
heap
page read and write
2B81000
heap
page read and write
3366000
heap
page read and write
2F1D000
stack
page read and write
6C0000
heap
page read and write
3520000
heap
page read and write
2B9E000
stack
page read and write
2EC0000
heap
page read and write
3256000
heap
page read and write
335F000
stack
page read and write
35F6000
heap
page read and write
2CFE000
unkown
page read and write
37CE000
stack
page read and write
294E000
stack
page read and write
2C71000
heap
page read and write
371E000
stack
page read and write
2F30000
heap
page read and write
3570000
heap
page read and write
300E000
unkown
page read and write
27FE000
unkown
page read and write
2FC0000
heap
page read and write
310E000
unkown
page read and write
2B0D000
stack
page read and write
302F000
stack
page read and write
37C0000
heap
page read and write
2B0D000
stack
page read and write
3AE000
unkown
page read and write
5FD000
stack
page read and write
343B000
heap
page read and write
305E000
stack
page read and write
2CFE000
stack
page read and write
37B6000
heap
page read and write
3151000
heap
page read and write
2DE6000
heap
page read and write
3261000
heap
page read and write
326E000
unkown
page read and write
2E06000
heap
page read and write
2B30000
heap
page read and write
31FE000
stack
page read and write
2B2D000
stack
page read and write
2C56000
heap
page read and write
2A3E000
stack
page read and write
317E000
unkown
page read and write
36D0000
heap
page read and write
35A1000
heap
page read and write
32AB000
heap
page read and write
32AE000
stack
page read and write
2996000
heap
page read and write
570000
heap
page read and write
320E000
stack
page read and write
3596000
heap
page read and write
3990000
heap
page read and write
30E1000
heap
page read and write
32FE000
stack
page read and write
296D000
stack
page read and write
2DE0000
heap
page read and write
2A80000
heap
page read and write
2EB6000
heap
page read and write
2D41000
heap
page read and write
3010000
heap
page read and write
3246000
heap
page read and write
3550000
heap
page read and write
32F0000
heap
page read and write
580000
heap
page read and write
2EFE000
stack
page read and write
2FED000
stack
page read and write
2890000
heap
page read and write
2DAE000
stack
page read and write
15D000
stack
page read and write
2B2F000
stack
page read and write
2CE0000
heap
page read and write
2F60000
heap
page read and write
2BAF000
stack
page read and write
3A00000
heap
page read and write
32BE000
stack
page read and write
2FDE000
stack
page read and write
2D41000
heap
page read and write
740000
heap
page read and write
35A1000
heap
page read and write
2920000
heap
page read and write
3280000
heap
page read and write
2D10000
heap
page read and write
4DD000
stack
page read and write
337E000
stack
page read and write
31A0000
heap
page read and write
2C8E000
stack
page read and write
39A6000
heap
page read and write
DD000
stack
page read and write
32A1000
heap
page read and write
18E000
unkown
page read and write
336E000
unkown
page read and write
2F0D000
stack
page read and write
2940000
heap
page read and write
3726000
heap
page read and write
3371000
heap
page read and write
4712000
unclassified section
page read and write
2CE6000
heap
page read and write
34E0000
heap
page read and write
331E000
unkown
page read and write
3557000
heap
page read and write
2FFD000
stack
page read and write
33CF000
stack
page read and write
33BE000
stack
page read and write
2A3E000
stack
page read and write
2B3F000
stack
page read and write
38D1000
heap
page read and write
35A0000
heap
page read and write
2AC0000
heap
page read and write
32F6000
heap
page read and write
2C7E000
stack
page read and write
3280000
heap
page read and write
2F16000
heap
page read and write
3547000
heap
page read and write
2980000
heap
page read and write
2D41000
heap
page read and write
34AE000
stack
page read and write
2AC0000
heap
page read and write
3346000
heap
page read and write
6EE000
stack
page read and write
35C0000
heap
page read and write
31F0000
heap
page read and write
372F000
stack
page read and write
470000
heap
page read and write
38A6000
heap
page read and write
2BF0000
heap
page read and write
28BF000
unkown
page read and write
408000
unkown
page readonly
2D41000
heap
page read and write
2FA0000
heap
page read and write
2B1E000
stack
page read and write
3360000
heap
page read and write
2E64000
heap
page read and write
2CFD000
stack
page read and write
38E0000
heap
page read and write
359E000
stack
page read and write
327E000
stack
page read and write
2B51000
heap
page read and write
2EB0000
heap
page read and write
2FF0000
heap
page read and write
35F6000
heap
page read and write
32A0000
heap
page read and write
2B70000
heap
page read and write
2D0E000
stack
page read and write
2E20000
heap
page read and write
338E000
stack
page read and write
4FD000
stack
page read and write
3390000
heap
page read and write
2CBB000
heap
page read and write
2D8E000
stack
page read and write
2AFE000
stack
page read and write
3971000
heap
page read and write
31BF000
stack
page read and write
3350000
heap
page read and write
3786000
heap
page read and write
2BA0000
heap
page read and write
3226000
heap
page read and write
27FE000
stack
page read and write
2F40000
heap
page read and write
75E000
unkown
page read and write
74E000
stack
page read and write
3691000
heap
page read and write
3440000
heap
page read and write
285B000
heap
page read and write
31F0000
heap
page read and write
34D0000
heap
page read and write
4FE000
stack
page read and write
33DE000
unkown
page read and write
2E60000
heap
page read and write
3496000
heap
page read and write
27E0000
heap
page read and write
2FB0000
heap
page read and write
2B9E000
unkown
page read and write
30E6000
heap
page read and write
35F1000
heap
page read and write
3276000
heap
page read and write
2E60000
heap
page read and write
3690000
heap
page read and write
34B1000
heap
page read and write
3300000
heap
page read and write
2BF0000
heap
page read and write
3410000
heap
page read and write
32C1000
heap
page read and write
301E000
stack
page read and write
2D41000
heap
page read and write
2E7E000
unkown
page read and write
264F000
heap
page read and write
2B7E000
stack
page read and write
369E000
stack
page read and write
140000
heap
page read and write
3661000
heap
page read and write
3750000
heap
page read and write
2E7D000
stack
page read and write
700000
heap
page read and write
3371000
heap
page read and write
2D3F000
stack
page read and write
33C6000
heap
page read and write
3500000
heap
page read and write
32A0000
heap
page read and write
306B000
heap
page read and write
5DD000
stack
page read and write
710000
heap
page read and write
2E01000
heap
page read and write
31D1000
heap
page read and write
2C81000
heap
page read and write
2A9F000
unkown
page read and write
2E50000
heap
page read and write
2EC0000
heap
page read and write
3220000
heap
page read and write
34AE000
stack
page read and write
400000
heap
page read and write
2A40000
heap
page read and write
2CFE000
stack
page read and write
2DEE000
unkown
page read and write
4DE000
stack
page read and write
2FA6000
heap
page read and write
358F000
unkown
page read and write
3561000
heap
page read and write
3A36000
heap
page read and write
3250000
heap
page read and write
2D30000
heap
page read and write
3416000
heap
page read and write
3690000
heap
page read and write
3066000
heap
page read and write
30CE000
stack
page read and write
32C0000
heap
page read and write
30C6000
heap
page read and write
31E0000
heap
page read and write
289E000
stack
page read and write
27FE000
stack
page read and write
39B1000
heap
page read and write
2D00000
heap
page read and write
3F7000
unkown
page readonly
3300000
heap
page read and write
2DC6000
heap
page read and write
2DAD000
stack
page read and write
2BA0000
heap
page read and write
2950000
heap
page read and write
2FB6000
heap
page read and write
2DC0000
heap
page read and write
32F0000
heap
page read and write
3230000
heap
page read and write
2D41000
heap
page read and write
2D41000
heap
page read and write
2AC0000
heap
page read and write
35D6000
heap
page read and write
2DBD000
stack
page read and write
3066000
heap
page read and write
37C0000
heap
page read and write
2940000
heap
page read and write
2E3B000
heap
page read and write
3320000
heap
page read and write
2D50000
heap
page read and write
3350000
heap
page read and write
2B8D000
stack
page read and write
32F0000
heap
page read and write
75D000
stack
page read and write
3B26000
heap
page read and write
30C1000
heap
page read and write
384F000
stack
page read and write
27FE000
unkown
page read and write
28E0000
heap
page read and write
39CF000
stack
page read and write
2B91000
heap
page read and write
3386000
heap
page read and write
2AD1000
heap
page read and write
3051000
heap
page read and write
2C9E000
unkown
page read and write
387E000
stack
page read and write
3E0000
unkown
page readonly
35D0000
heap
page read and write
3690000
heap
page read and write
30E0000
heap
page read and write
415000
unkown
page read and write
2EC6000
heap
page read and write
3627000
heap
page read and write
2E30000
heap
page read and write
36CF000
unkown
page read and write
3106000
heap
page read and write
331F3000
unclassified section
page execute and read and write
2D16000
heap
page read and write
70E000
stack
page read and write
3870000
heap
page read and write
6AE000
unkown
page read and write
6FF31000
unkown
page execute read
39F1000
heap
page read and write
27FE000
stack
page read and write
3300000
heap
page read and write
32E6000
heap
page read and write
2D41000
heap
page read and write
1F455F00000
trusted library allocation
page read and write
3050000
heap
page read and write
1D297493000
heap
page read and write
2CF1000
heap
page read and write
2E16000
heap
page read and write
32B6000
heap
page read and write
3460000
heap
page read and write
3390000
heap
page read and write
2C37000
heap
page read and write
2F60000
heap
page read and write
2B3E000
stack
page read and write
32F0000
heap
page read and write
2AFD000
stack
page read and write
3651000
heap
page read and write
2E30000
heap
page read and write
3560000
heap
page read and write
2C0E000
stack
page read and write
2D41000
heap
page read and write
31C0000
heap
page read and write
2D41000
heap
page read and write
2FEE000
stack
page read and write
2D41000
heap
page read and write
720000
heap
page read and write
3390000
heap
page read and write
4B82000
unkown
page read and write
2C00000
heap
page read and write
307E000
unkown
page read and write
50000
heap
page read and write
32AE000
stack
page read and write
68E000
stack
page read and write
33AB000
stack
page read and write
2BD0000
heap
page read and write
30E0000
heap
page read and write
63D000
stack
page read and write
2DDF000
stack
page read and write
3400000
heap
page read and write
330E000
unkown
page read and write
33EE000
stack
page read and write
32C0000
heap
page read and write
2CCF000
stack
page read and write
1660000
remote allocation
page execute and read and write
353B000
heap
page read and write
470000
heap
page read and write
5CD000
stack
page read and write
2B30000
heap
page read and write
2B5D000
stack
page read and write
3286000
heap
page read and write
3080000
heap
page read and write
327F1000
heap
page read and write
3590000
heap
page read and write
32A0000
heap
page read and write
38E1000
heap
page read and write
2DB1000
heap
page read and write
319B000
heap
page read and write
3596000
heap
page read and write
2B8E000
stack
page read and write
2FCF000
unkown
page read and write
33E1000
heap
page read and write
36C6000
heap
page read and write
37F6000
heap
page read and write
3680000
heap
page read and write
34FE000
stack
page read and write
3410000
heap
page read and write
2F8F000
stack
page read and write
3110000
heap
page read and write
3576000
heap
page read and write
5EA000
unkown
page execute read
2BA7000
heap
page read and write
30EF000
unkown
page read and write
2D70000
heap
page read and write
34E0000
heap
page read and write
30FE000
stack
page read and write
2FB0000
heap
page read and write
21F60033000
heap
page read and write
2507FFE000
stack
page read and write
2970000
heap
page read and write
2BC1000
heap
page read and write
375E000
stack
page read and write
2C81000
heap
page read and write
29D0000
heap
page read and write
2FC0000
heap
page read and write
324E000
stack
page read and write
38CF000
stack
page read and write
2D9F000
stack
page read and write
2CAB000
heap
page read and write
355E000
stack
page read and write
70E000
unkown
page read and write
32FE000
stack
page read and write
309E000
unkown
page read and write
2F1B000
heap
page read and write
2C70000
heap
page read and write
33B0000
heap
page read and write
710000
heap
page read and write
354E000
unkown
page read and write
3526000
heap
page read and write
2B2F000
stack
page read and write
299D000
stack
page read and write
2E9D000
stack
page read and write
3460000
heap
page read and write
2B96000
heap
page read and write
3386000
heap
page read and write
2A9E000
unkown
page read and write
35C1000
heap
page read and write
307E000
unkown
page read and write
2E56000
heap
page read and write
2EBE000
stack
page read and write
344F000
stack
page read and write
1F455F08000
trusted library allocation
page read and write
394F000
stack
page read and write
2C10000
heap
page read and write
30E0000
heap
page read and write
3756000
heap
page read and write
2AFE000
stack
page read and write
2CB6000
heap
page read and write
36DE000
stack
page read and write
62D000
stack
page read and write
2E9E000
stack
page read and write
2AFE000
stack
page read and write
3480000
heap
page read and write
1F454238000
heap
page read and write
30DF000
unkown
page read and write
2B81000
heap
page read and write
2D80000
heap
page read and write
2E9E000
stack
page read and write
3686000
heap
page read and write
2CAB000
heap
page read and write
2C2E000
stack
page read and write
2C80000
heap
page read and write
2C6E000
unkown
page read and write
30B0000
trusted library allocation
page read and write
2ED6000
heap
page read and write
339F000
stack
page read and write
3212D000
stack
page read and write
358F000
stack
page read and write
2EC0000
heap
page read and write
32B0000
heap
page read and write
3750000
heap
page read and write
2900000
heap
page read and write
2E00000
heap
page read and write
2DA0000
heap
page read and write
3436000
heap
page read and write
3581000
heap
page read and write
56D000
stack
page read and write
38E6000
heap
page read and write
3181000
heap
page read and write
2C8D000
stack
page read and write
39D6000
heap
page read and write
73E000
stack
page read and write
2B81000
heap
page read and write
46E000
unkown
page read and write
626000
unkown
page execute read
2F86000
heap
page read and write
2D9F000
stack
page read and write
2F66000
heap
page read and write
2990000
heap
page read and write
297B000
heap
page read and write
646000
heap
page read and write
35B0000
heap
page read and write
3170000
heap
page read and write
3A66000
heap
page read and write
2D32000
unkown
page read and write
3250000
heap
page read and write
30B0000
heap
page read and write
2830000
heap
page read and write
3976000
heap
page read and write
3690000
heap
page read and write
3390000
heap
page read and write
2FBF000
stack
page read and write
2E90000
heap
page read and write
2DD1000
heap
page read and write
349F000
stack
page read and write
1F454420000
trusted library allocation
page read and write
36C0000
heap
page read and write
2C3B000
heap
page read and write
320E000
stack
page read and write
2D41000
heap
page read and write
2D41000
heap
page read and write
2F51000
heap
page read and write
30BB000
heap
page read and write
2F5D000
stack
page read and write
306E000
unkown
page read and write
35D6000
heap
page read and write
2D16000
heap
page read and write
2DBE000
stack
page read and write
27FE000
stack
page read and write
2EED000
stack
page read and write
39A1000
heap
page read and write
3310000
heap
page read and write
2C3E000
stack
page read and write
2A5D000
stack
page read and write
34CE000
stack
page read and write
2EAE000
stack
page read and write
313E000
stack
page read and write
3256000
heap
page read and write
2D41000
heap
page read and write
3146000
heap
page read and write
BD000
stack
page read and write
2C3F000
stack
page read and write
32EF000
stack
page read and write
3710000
heap
page read and write
3430000
heap
page read and write
2C50000
heap
page read and write
334E000
stack
page read and write
2F76000
heap
page read and write
138B000
unkown
page read and write
2BC0000
heap
page read and write
315F000
stack
page read and write
3336000
heap
page read and write
3360000
heap
page read and write
51E000
unkown
page read and write
3796000
heap
page read and write
283B000
heap
page read and write
2B0E000
unkown
page read and write
2880000
heap
page read and write
2D3E000
unkown
page read and write
3136000
heap
page read and write
33F4000
unkown
page read and write
3101000
heap
page read and write
3220000
heap
page read and write
2B60000
heap
page read and write
320E000
stack
page read and write
2AFD000
stack
page read and write
290B000
heap
page read and write
3340000
heap
page read and write
6D4000
heap
page read and write
2FC0000
heap
page read and write
1CE000
stack
page read and write
3AB6000
heap
page read and write
2EB0000
heap
page read and write
2B66000
heap
page read and write
29A0000
heap
page read and write
21F6007E000
heap
page read and write
37C0000
heap
page read and write
39A6000
heap
page read and write
2691000
heap
page read and write
3040000
heap
page read and write
2A7E000
stack
page read and write
2FF0000
heap
page read and write
2AFF000
unkown
page read and write
2EFF000
stack
page read and write
3290000
heap
page read and write
90000
heap
page read and write
294E000
stack
page read and write
3800000
heap
page read and write
59D000
stack
page read and write
2BC0000
heap
page read and write
2DF0000
heap
page read and write
28CB000
heap
page read and write
3790000
heap
page read and write
2CFE000
stack
page read and write
2D41000
heap
page read and write
4B0000
heap
page read and write
2B91000
heap
page read and write
240000
heap
page read and write
359E000
stack
page read and write
2B0B000
heap
page read and write
2F4E000
stack
page read and write
290D000
stack
page read and write
2BFF000
stack
page read and write
2D1F000
stack
page read and write
2A7E000
stack
page read and write
2A60000
heap
page read and write
2840000
heap
page read and write
2D0E000
unkown
page read and write
2C7E000
stack
page read and write
3976000
heap
page read and write
2B20000
unkown
page read and write
1D29749C000
heap
page read and write
31C50000
direct allocation
page read and write
3580000
heap
page read and write
2BBD000
stack
page read and write
2AFD000
stack
page read and write
3600000
heap
page read and write
31CE000
stack
page read and write
660000
heap
page read and write
32FD000
stack
page read and write
38AE000
stack
page read and write
29CE000
stack
page read and write
370F000
stack
page read and write
2940000
heap
page read and write
2DB6000
heap
page read and write
3AE000
unkown
page read and write
1CE000
stack
page read and write
3800000
heap
page read and write
3346000
heap
page read and write
C3A000
stack
page read and write
2E8F000
stack
page read and write
35A1000
heap
page read and write
2EE1000
heap
page read and write
3700000
heap
page read and write
34D0000
heap
page read and write
36A6000
heap
page read and write
756000
heap
page read and write
337E000
stack
page read and write
3450000
heap
page read and write
A0000
heap
page read and write
2D9F000
stack
page read and write
1DE000
unkown
page read and write
5D0000
heap
page read and write
2BB0000
heap
page read and write
3330000
heap
page read and write
3386000
heap
page read and write
2CCD000
stack
page read and write
2D36000
heap
page read and write
313E000
unkown
page read and write
37D6000
heap
page read and write
38C0000
heap
page read and write
2D41000
heap
page read and write
2DF1000
heap
page read and write
2D41000
heap
page read and write
6D6000
heap
page read and write
2D3E000
unkown
page read and write
2CB0000
heap
page read and write
3010000
heap
page read and write
2EA0000
heap
page read and write
3400000
heap
page read and write
304F000
unkown
page read and write
2ADD000
stack
page read and write
333F000
unkown
page read and write
3240000
heap
page read and write
3406000
heap
page read and write
3496000
heap
page read and write
3720000
heap
page read and write
2B60000
heap
page read and write
32EE000
stack
page read and write
2EC0000
heap
page read and write
3608000
unclassified section
page read and write
2F60000
heap
page read and write
320E000
stack
page read and write
5F0000
unkown
page execute read
38E1000
heap
page read and write
2A2F000
stack
page read and write
19A000
stack
page read and write
28FD000
stack
page read and write
3321000
heap
page read and write
2D41000
heap
page read and write
4FE000
stack
page read and write
2CBE000
stack
page read and write
330B000
heap
page read and write
3686000
heap
page read and write
D70000
heap
page read and write
298F000
heap
page read and write
2C21000
heap
page read and write
37F6000
heap
page read and write
620000
direct allocation
page read and write
2EC6000
heap
page read and write
2ED0000
heap
page read and write
73E000
stack
page read and write
2B0D000
stack
page read and write
3686000
heap
page read and write
37F6000
heap
page read and write
2B20000
heap
page read and write
316F000
stack
page read and write
3D0000
heap
page read and write
2C7E000
stack
page read and write
3100000
heap
page read and write
2BA0000
heap
page read and write
364F000
stack
page read and write
329F000
unkown
page read and write
3930000
heap
page read and write
2B80000
heap
page read and write
2F9E000
unkown
page read and write
3450000
heap
page read and write
5F2000
unkown
page execute read
2F3B000
heap
page read and write
367F000
unkown
page read and write
21EAE0E0000
heap
page read and write
2EFD000
stack
page read and write
27FD000
stack
page read and write
331F000
unkown
page read and write
6DD000
stack
page read and write
2D91000
heap
page read and write
331E000
stack
page read and write
30CF000
unkown
page read and write
341E000
stack
page read and write
2F3D000
stack
page read and write
2911000
heap
page read and write
2BB1000
heap
page read and write
3106000
heap
page read and write
3320000
heap
page read and write
295E000
stack
page read and write
3916000
heap
page read and write
2B90000
heap
page read and write
30C1000
heap
page read and write
2F5F000
stack
page read and write
3136000
heap
page read and write
32FF000
stack
page read and write
2CB1000
heap
page read and write
30DF000
unkown
page read and write
3280000
heap
page read and write
2D80000
heap
page read and write
2EDE000
stack
page read and write
2E0B000
heap
page read and write
2B7B000
heap
page read and write
30DE000
stack
page read and write
75E000
unkown
page read and write
2F4F000
stack
page read and write
3626000
heap
page read and write
2EDD000
stack
page read and write
2F46000
heap
page read and write
32B6000
heap
page read and write
700000
heap
page read and write
2E01000
heap
page read and write
2E2F000
stack
page read and write
3731000
heap
page read and write
460000
heap
page read and write
31D0000
heap
page read and write
3861000
heap
page read and write
3140000
heap
page read and write
38F0000
heap
page read and write
3250000
heap
page read and write
2BA0000
heap
page read and write
3376000
heap
page read and write
2E7E000
stack
page read and write
1C0000
heap
page read and write
3976000
heap
page read and write
2CFE000
stack
page read and write
2CDE000
stack
page read and write
BD000
stack
page read and write
70E000
stack
page read and write
3996000
heap
page read and write
3AA6000
heap
page read and write
2C66000
heap
page read and write
2F70000
heap
page read and write
2B40000
heap
page read and write
3730000
heap
page read and write
2DF0000
heap
page read and write
30DF000
stack
page read and write
325E000
unkown
page read and write
2BB0000
heap
page read and write
348E000
stack
page read and write
71E000
unkown
page read and write
2AC0000
heap
page read and write
2E11000
heap
page read and write
2CF0000
heap
page read and write
29CD000
stack
page read and write
3100000
heap
page read and write
3626000
heap
page read and write
2DB1000
heap
page read and write
460000
heap
page read and write
5AE000
stack
page read and write
36F1000
heap
page read and write
29C0000
heap
page read and write
38E6000
heap
page read and write
3A16000
heap
page read and write
2AC0000
heap
page read and write
2F9F000
stack
page read and write
2AFF000
unkown
page read and write
3240000
heap
page read and write
3510000
heap
page read and write
3370000
heap
page read and write
3366000
heap
page read and write
2E9D000
stack
page read and write
2E90000
heap
page read and write
2C90000
heap
page read and write
35B6000
heap
page read and write
2C5E000
stack
page read and write
450000
heap
page read and write
2B41000
heap
page read and write
3261000
heap
page read and write
2D80000
heap
page read and write
2DC0000
heap
page read and write
2F1E000
stack
page read and write
3360000
heap
page read and write
359F000
unkown
page read and write
2B5E000
stack
page read and write
356F000
unkown
page read and write
369F000
stack
page read and write
485E000
unkown
page read and write
2E46000
heap
page read and write
3471000
heap
page read and write
3786000
heap
page read and write
E9162FD000
stack
page read and write
3570000
heap
page read and write
3576000
heap
page read and write
28BE000
unkown
page read and write
1D297497000
heap
page read and write
2DBF000
stack
page read and write
354B000
heap
page read and write
1CD000
stack
page read and write
3261000
heap
page read and write
3BA6000
heap
page read and write
2E00000
heap
page read and write
1ED000
stack
page read and write
80000
heap
page read and write
323E000
unkown
page read and write
3000000
heap
page read and write
435000
unkown
page read and write
3A21000
heap
page read and write
3530000
heap
page read and write
2FC0000
heap
page read and write
380F000
stack
page read and write
2C70000
heap
page read and write
300E000
stack
page read and write
21EADE61000
heap
page read and write
2CC6000
heap
page read and write
31F1000
heap
page read and write
3A16000
heap
page read and write
3A80000
heap
page read and write
3446000
heap
page read and write
6F0000
heap
page read and write
2EBF000
stack
page read and write
2DD1000
heap
page read and write
346F000
unkown
page read and write
332F000
stack
page read and write
2850000
heap
page read and write
53E000
unkown
page read and write
33B0000
heap
page read and write
3786000
heap
page read and write
2B4F000
stack
page read and write
54B000
heap
page read and write
2A50000
heap
page read and write
34D0000
direct allocation
page execute and read and write
3976000
heap
page read and write
2D10000
heap
page read and write
2AFD000
stack
page read and write
30D1000
heap
page read and write
2F46000
heap
page read and write
3030000
heap
page read and write
D3C000
stack
page read and write
ED000
stack
page read and write
3521000
heap
page read and write
294E000
stack
page read and write
3BD6000
heap
page read and write
34F0000
heap
page read and write
450000
heap
page read and write
2E0E000
unkown
page read and write
32CF000
unkown
page read and write
2F91000
heap
page read and write
2BDF000
stack
page read and write
3AD000
stack
page read and write
3490000
heap
page read and write
21F5FF70000
heap
page read and write
2A27000
heap
page read and write
2DD6000
heap
page read and write
2E3F000
stack
page read and write
3950000
heap
page read and write
313D000
stack
page read and write
27E0000
heap
page read and write
328B000
heap
page read and write
30AE000
stack
page read and write
490000
heap
page read and write
28FE000
stack
page read and write
2EB0000
heap
page read and write
3996000
heap
page read and write
2B0E000
stack
page read and write
37DF000
unkown
page read and write
1FD000
stack
page read and write
33BE000
stack
page read and write
31B7000
heap
page read and write
4FD000
stack
page read and write
2F80000
heap
page read and write
3A30000
heap
page read and write
45D000
stack
page read and write
2C86000
heap
page read and write
3130000
heap
page read and write
3866000
heap
page read and write
2D41000
heap
page read and write
30A0000
heap
page read and write
2BB1000
heap
page read and write
38D1000
heap
page read and write
29FF000
stack
page read and write
27F0000
heap
page read and write
67A29FF000
stack
page read and write
3181000
heap
page read and write
33D0000
heap
page read and write
34F6000
heap
page read and write
3340000
heap
page read and write
43EE000
unclassified section
page read and write
3220000
heap
page read and write
2E96000
heap
page read and write
33B0000
heap
page read and write
3166000
heap
page read and write
31D6000
heap
page read and write
2C70000
heap
page read and write
646000
heap
page read and write
30CE000
stack
page read and write
3601000
unkown
page execute and read and write
307D000
stack
page read and write
3491000
heap
page read and write
312F000
stack
page read and write
307F000
stack
page read and write
3026000
heap
page read and write
2F10000
heap
page read and write
2CFD000
stack
page read and write
D61000
unkown
page readonly
28C0000
heap
page read and write
52D000
stack
page read and write
28D0000
heap
page read and write
345E000
stack
page read and write
2D32000
unkown
page read and write
3831000
heap
page read and write
3B0000
heap
page read and write
355F000
unkown
page read and write
32CF000
stack
page read and write
5D7000
heap
page read and write
710000
heap
page read and write
2950000
heap
page read and write
710000
heap
page read and write
6D6000
heap
page read and write
30F1000
heap
page read and write
34EF000
stack
page read and write
2880000
heap
page read and write
3260000
heap
page read and write
70E000
stack
page read and write
3591000
heap
page read and write
70F000
unkown
page read and write
2D41000
heap
page read and write
349F000
stack
page read and write
540000
heap
page read and write
33B6000
heap
page read and write
34F6000
heap
page read and write
29CE000
heap
page read and write
2866000
heap
page read and write
337E000
unkown
page read and write
2EA0000
heap
page read and write
3811000
heap
page read and write
30DE000
stack
page read and write
2DD0000
heap
page read and write
2D41000
heap
page read and write
3150000
heap
page read and write
30E1000
heap
page read and write
2ACD000
stack
page read and write
30AE000
stack
page read and write
341E000
stack
page read and write
2C00000
heap
page read and write
2D41000
heap
page read and write
2A71000
heap
page read and write
2DEF000
unkown
page read and write
319B000
heap
page read and write
3026000
heap
page read and write
2D41000
heap
page read and write
3AC0000
heap
page read and write
2E01000
heap
page read and write
322E0000
remote allocation
page read and write
31DB000
heap
page read and write
3796000
heap
page read and write
29A0000
heap
page read and write
2F31000
heap
page read and write
735000
heap
page read and write
3351000
heap
page read and write
31E0000
heap
page read and write
2E3E000
stack
page read and write
2E26000
heap
page read and write
2D6D000
stack
page read and write
2CE0000
heap
page read and write
3470000
heap
page read and write
3511000
heap
page read and write
3626000
heap
page read and write
2D0E000
stack
page read and write
2DD0000
heap
page read and write
31C0000
heap
page read and write
65D000
stack
page read and write
2D6F000
unkown
page read and write
36C6000
heap
page read and write
3552000
unclassified section
page read and write
57D000
stack
page read and write
3351000
heap
page read and write
3330000
heap
page read and write
3007000
heap
page read and write
2A70000
heap
page read and write
2D41000
heap
page read and write
2B5D000
stack
page read and write
2E70000
heap
page read and write
2A2B000
heap
page read and write
3056000
heap
page read and write
37F0000
heap
page read and write
3396000
heap
page read and write
2830000
direct allocation
page read and write
2E51000
heap
page read and write
3370000
heap
page read and write
3490000
heap
page read and write
2F6E000
unkown
page read and write
540000
heap
page read and write
2F40000
heap
page read and write
36FF000
unkown
page read and write
6CE000
stack
page read and write
283E000
stack
page read and write
353B000
heap
page read and write
37D1000
heap
page read and write
2B30000
heap
page read and write
3931000
heap
page read and write
345F000
stack
page read and write
2E46000
heap
page read and write
2E06000
heap
page read and write
2F86000
heap
page read and write
2FCE000
stack
page read and write
2AF0000
heap
page read and write
38AF000
stack
page read and write
28A0000
heap
page read and write
37B6000
heap
page read and write
2BDB000
heap
page read and write
3226000
heap
page read and write
2DBF000
stack
page read and write
2F60000
heap
page read and write
3200000
heap
page read and write
2BA0000
heap
page read and write
3576000
heap
page read and write
334F000
stack
page read and write
3A06000
heap
page read and write
125C000
unkown
page read and write
2F9E000
stack
page read and write
2950000
heap
page read and write
2E87000
heap
page read and write
6BE000
unkown
page read and write
3271000
heap
page read and write
6FD000
stack
page read and write
3AA6000
heap
page read and write
30E1000
heap
page read and write
2D86000
heap
page read and write
3550000
heap
page read and write
30CF000
stack
page read and write
3220000
heap
page read and write
6D0000
heap
page read and write
38E6000
heap
page read and write
50E000
unkown
page read and write
2D40000
heap
page read and write
33D1000
heap
page read and write
34A0000
heap
page read and write
570000
heap
page read and write
2BCB000
heap
page read and write
3211000
heap
page read and write
291D000
stack
page read and write
2F20000
heap
page read and write
34D0000
heap
page read and write
2F16000
heap
page read and write
3560000
heap
page read and write
2A7D000
stack
page read and write
2C80000
heap
page read and write
3521000
heap
page read and write
3217000
heap
page read and write
324F000
stack
page read and write
3120000
heap
page read and write
2F40000
heap
page read and write
2C40000
heap
page read and write
3306000
heap
page read and write
33D6000
heap
page read and write
C3A000
stack
page read and write
3396000
heap
page read and write
2BCE000
unkown
page read and write
2840000
direct allocation
page read and write
2ED0000
heap
page read and write
35AF000
stack
page read and write
2ADF000
unkown
page read and write
2EB0000
heap
page read and write
3290000
heap
page read and write
2CEF000
stack
page read and write
2B10000
heap
page read and write
2C8B000
heap
page read and write
2D50000
heap
page read and write
3181000
heap
page read and write
6C0000
heap
page read and write
60E000
stack
page read and write
2FE0000
heap
page read and write
2E20000
unkown
page read and write
390F000
stack
page read and write
2C60000
heap
page read and write
3BA6000
heap
page read and write
31E0000
heap
page read and write
291C000
heap
page read and write
314E000
stack
page read and write
3560000
heap
page read and write
3337000
heap
page read and write
750000
heap
page read and write
2DAE000
stack
page read and write
2BE0000
heap
page read and write
2F51000
heap
page read and write
2CA0000
heap
page read and write
2B9E000
stack
page read and write
67A21FE000
stack
page read and write
36A1000
heap
page read and write
2EFD000
stack
page read and write
3480000
heap
page read and write
D61000
unkown
page readonly
408000
unkown
page readonly
3830000
heap
page read and write
327E000
stack
page read and write
3611000
heap
page read and write
3870000
heap
page read and write
3061000
heap
page read and write
2900000
heap
page read and write
298F000
unkown
page read and write
311F000
stack
page read and write
33BE000
stack
page read and write
3550000
heap
page read and write
4BD000
stack
page read and write
3830000
heap
page read and write
31B6000
heap
page read and write
34CE000
stack
page read and write
2AD000
stack
page read and write
67A11FD000
stack
page read and write
2D0E000
unkown
page read and write
3A81000
heap
page read and write
2F50000
heap
page read and write
560000
heap
page read and write
2E80000
heap
page read and write
3540000
heap
page read and write
29D1000
heap
page read and write
2EC6000
heap
page read and write
2E8D000
stack
page read and write
2FAE000
stack
page read and write
2AF0000
heap
page read and write
2910000
heap
page read and write
395F000
stack
page read and write
337F000
unkown
page read and write
10D000
stack
page read and write
30FD000
stack
page read and write
3036000
heap
page read and write
287E000
stack
page read and write
2D41000
heap
page read and write
2EA1000
heap
page read and write
3421000
heap
page read and write
2D41000
heap
page read and write
3336000
heap
page read and write
33D0000
heap
page read and write
2C4E000
stack
page read and write
2860000
heap
page read and write
1280000
heap
page read and write
2BBD000
stack
page read and write
2B90000
heap
page read and write
311F000
stack
page read and write
2B31000
heap
page read and write
2860000
heap
page read and write
32C0000
heap
page read and write
283E000
stack
page read and write
2FD0000
heap
page read and write
3356000
heap
page read and write
5FB000
stack
page read and write
35EF000
unkown
page read and write
30F1000
heap
page read and write
3261000
heap
page read and write
2BC1000
heap
page read and write
3346000
heap
page read and write
322E000
stack
page read and write
2C70000
heap
page read and write
3EE000
unkown
page read and write
38C0000
heap
page read and write
350E000
unkown
page read and write
2E10000
heap
page read and write
28A0000
heap
page read and write
58E000
stack
page read and write
3310000
heap
page read and write
53E000
stack
page read and write
68E000
unkown
page read and write
3231000
heap
page read and write
37F6000
heap
page read and write
27FE000
stack
page read and write
2E20000
heap
page read and write
2FC0000
heap
page read and write
2AFD000
stack
page read and write
29BF000
stack
page read and write
33EF000
stack
page read and write
2FBF000
stack
page read and write
32B0000
heap
page read and write
3210000
heap
page read and write
31A0000
heap
page read and write
740000
heap
page read and write
2F80000
heap
page read and write
510000
heap
page read and write
3396000
heap
page read and write
352B000
heap
page read and write
377F000
stack
page read and write
1D297C00000
trusted library allocation
page read and write
35CF000
unkown
page read and write
2996000
heap
page read and write
500000
heap
page read and write
38D1000
heap
page read and write
2EE1000
heap
page read and write
2AD1000
heap
page read and write
58E000
stack
page read and write
334B000
heap
page read and write
2EA1000
heap
page read and write
2A20000
heap
page read and write
33E0000
heap
page read and write
2DEF000
stack
page read and write
2AFE000
stack
page read and write
366E000
stack
page read and write
2ABF000
stack
page read and write
3811000
heap
page read and write
3670000
heap
page read and write
3600000
heap
page read and write
2D4E000
unkown
page read and write
3846000
heap
page read and write
35AE000
unkown
page read and write
326D000
stack
page read and write
2FF0000
heap
page read and write
2810000
direct allocation
page read and write
29CF000
unkown
page read and write
2CA0000
heap
page read and write
2CD6000
heap
page read and write
37C0000
heap
page read and write
30A1000
heap
page read and write
2EFE000
stack
page read and write
3570000
heap
page read and write
30A1000
heap
page read and write
2F00000
heap
page read and write
31CF000
stack
page read and write
3761000
heap
page read and write
2B66000
heap
page read and write
2F31000
heap
page read and write
3DA6000
unclassified section
page read and write
34B0000
heap
page read and write
2B5F000
unkown
page read and write
35A1000
heap
page read and write
2DFE000
unkown
page read and write
2FB6000
heap
page read and write
3626000
heap
page read and write
2E8F000
unkown
page read and write
2A3E000
stack
page read and write
2CD0000
heap
page read and write
31B0000
heap
page read and write
2C0F000
stack
page read and write
2B8D000
stack
page read and write
21F60068000
heap
page read and write
2ACF000
stack
page read and write
2BA0000
heap
page read and write
2F10000
heap
page read and write
330B000
heap
page read and write
3AC1000
heap
page read and write
33D0000
heap
page read and write
314E000
unkown
page read and write
3050000
heap
page read and write
2E10000
heap
page read and write
2BC1000
heap
page read and write
5C0000
heap
page read and write
2FEE000
stack
page read and write
35FE000
unkown
page read and write
3A00000
heap
page read and write
2E3D000
stack
page read and write
2C7B000
heap
page read and write
2C81000
heap
page read and write
27D7000
heap
page read and write
2D41000
heap
page read and write
34F1000
heap
page read and write
3271000
heap
page read and write
2EB1000
heap
page read and write
2D5D000
stack
page read and write
3340000
heap
page read and write
3AE0000
heap
page read and write
2FF0000
heap
page read and write
2EC1000
heap
page read and write
3796000
heap
page read and write
31E0000
heap
page read and write
2B5D000
stack
page read and write
2E00000
heap
page read and write
36B0000
heap
page read and write
346F000
stack
page read and write
72E000
stack
page read and write
2DC0000
heap
page read and write
2FED000
stack
page read and write
34F0000
heap
page read and write
325F000
stack
page read and write
2D41000
heap
page read and write
361E000
stack
page read and write
2F8F000
stack
page read and write
3030000
heap
page read and write
2C7F000
stack
page read and write
2B8B000
heap
page read and write
3611000
heap
page read and write
2D41000
heap
page read and write
2C3E000
stack
page read and write
35F6000
heap
page read and write
2F00000
heap
page read and write
43A8000
unkown
page read and write
3396000
heap
page read and write
2CFE000
stack
page read and write
2BB1000
heap
page read and write
2BBE000
unkown
page read and write
33E0000
heap
page read and write
3570000
heap
page read and write
10D000
stack
page read and write
3496000
heap
page read and write
62D000
stack
page read and write
3300000
heap
page read and write
2C30000
heap
page read and write
D80000
heap
page read and write
D3C000
stack
page read and write
30FD000
stack
page read and write
34A1000
heap
page read and write
363E000
stack
page read and write
2E46000
heap
page read and write
3EE000
unkown
page readonly
6FE000
stack
page read and write
3931000
heap
page read and write
2D56000
heap
page read and write
335E000
stack
page read and write
3406000
heap
page read and write
560000
heap
page read and write
3471000
heap
page read and write
3406000
heap
page read and write
300E000
stack
page read and write
370E000
stack
page read and write
3390000
heap
page read and write
30BE000
stack
page read and write
3770000
heap
page read and write
3ED000
stack
page read and write
2F3E000
stack
page read and write
318E000
stack
page read and write
35BF000
unkown
page read and write
2D90000
heap
page read and write
2F5D000
stack
page read and write
3A70000
heap
page read and write
2FD0000
heap
page read and write
2D9E000
unkown
page read and write
15D000
stack
page read and write
ED000
stack
page read and write
2A60000
heap
page read and write
47D000
stack
page read and write
374F000
unkown
page read and write
3C14000
unclassified section
page read and write
2EFF000
unkown
page read and write
337E000
stack
page read and write
2C5E000
unkown
page read and write
3310000
heap
page read and write
35D6000
heap
page read and write
3830000
heap
page read and write
30A0000
heap
page read and write
2BB1000
heap
page read and write
330F000
stack
page read and write
2F1B000
heap
page read and write
5B6000
heap
page read and write
2922000
heap
page read and write
30FD000
stack
page read and write
3901000
heap
page read and write
61B000
heap
page read and write
346E000
stack
page read and write
4084000
unkown
page read and write
80000
heap
page read and write
3506000
heap
page read and write
3A10000
heap
page read and write
2920000
heap
page read and write
2F46000
heap
page read and write
2B90000
heap
page read and write
57D000
stack
page read and write
2EB0000
heap
page read and write
31A0000
heap
page read and write
33B1000
heap
page read and write
2D41000
heap
page read and write
34CF000
stack
page read and write
36D0000
heap
page read and write
39A0000
heap
page read and write
1D297481000
heap
page read and write
B0000
heap
page read and write
35A0000
heap
page read and write
29C0000
heap
page read and write
2F7E000
stack
page read and write
320ED000
stack
page read and write
35A1000
heap
page read and write
3566000
heap
page read and write
2F8E000
unkown
page read and write
37BF000
stack
page read and write
3380000
heap
page read and write
2B81000
heap
page read and write
3661000
heap
page read and write
329F000
stack
page read and write
3836000
heap
page read and write
350E000
stack
page read and write
3926000
heap
page read and write
3860000
heap
page read and write
38C6000
heap
page read and write
2AD1000
heap
page read and write
2D4E000
stack
page read and write
7A8D000
heap
page read and write
3000000
heap
page read and write
32560000
direct allocation
page read and write
2D41000
heap
page read and write
3260000
heap
page read and write
2EC0000
heap
page read and write
2A80000
heap
page read and write
660000
heap
page read and write
2D41000
heap
page read and write
2911000
heap
page read and write
425C000
unclassified section
page read and write
37C6000
heap
page read and write
2F90000
heap
page read and write
3836000
heap
page read and write
349B000
heap
page read and write
21F60081000
heap
page read and write
4A36000
unclassified section
page read and write
67E000
unkown
page read and write
33C1000
heap
page read and write
D70000
heap
page read and write
31F6000
heap
page read and write
29BF000
stack
page read and write
3696000
heap
page read and write
2B81000
heap
page read and write
60D000
stack
page read and write
2BEE000
stack
page read and write
73E000
stack
page read and write
2EBF000
stack
page read and write
30C0000
heap
page read and write
3696000
heap
page read and write
2D71000
heap
page read and write
3176000
heap
page read and write
3290000
heap
page read and write
2F3B000
heap
page read and write
304E000
unkown
page read and write
2A87000
heap
page read and write
98000
stack
page read and write
2FBE000
stack
page read and write
2D41000
heap
page read and write
37B1000
heap
page read and write
720000
heap
page read and write
2D41000
heap
page read and write
3B50000
heap
page read and write
362F000
stack
page read and write
3A00000
heap
page read and write
29F0000
heap
page read and write
3430000
heap
page read and write
30C0000
heap
page read and write
29DE000
stack
page read and write
6EE000
stack
page read and write
7A32000
heap
page read and write
3520000
heap
page read and write
2C56000
heap
page read and write
2D0E000
stack
page read and write
3BA0000
heap
page read and write
2B67000
heap
page read and write
2F60000
heap
page read and write
2ABF000
stack
page read and write
357B000
heap
page read and write
2BA0000
heap
page read and write
441000
unkown
page read and write
33BF000
unkown
page read and write
39D1000
heap
page read and write
32C0000
heap
page read and write
2BF0000
heap
page read and write
2D41000
heap
page read and write
2B60000
heap
page read and write
35D6000
heap
page read and write
2B50000
unkown
page read and write
38C0000
heap
page read and write
2DDE000
unkown
page read and write
33AF000
stack
page read and write
2DE6000
heap
page read and write
7A8A000
heap
page read and write
35F0000
heap
page read and write
2EAF000
stack
page read and write
32D0000
heap
page read and write
31B0000
heap
page read and write
2A9F000
unkown
page read and write
2D86000
heap
page read and write
33D000
stack
page read and write
2BA0000
heap
page read and write
3790000
heap
page read and write
3370000
heap
page read and write
39C6000
heap
page read and write
2F7F000
unkown
page read and write
348B000
heap
page read and write
312F000
unkown
page read and write
6FE000
stack
page read and write
28BF000
stack
page read and write
3926000
heap
page read and write
391F000
stack
page read and write
36EE000
stack
page read and write
336D000
stack
page read and write
1D297502000
heap
page read and write
2C80000
heap
page read and write
2B90000
heap
page read and write
37BF000
stack
page read and write
2F16000
heap
page read and write
322E000
unkown
page read and write
34F0000
heap
page read and write
3397000
heap
page read and write
2C50000
heap
page read and write
3210000
heap
page read and write
3796000
heap
page read and write
2CFE000
stack
page read and write
34BE000
stack
page read and write
355F000
stack
page read and write
308F000
stack
page read and write
370E000
stack
page read and write
37F6000
heap
page read and write
2C4E000
unkown
page read and write
39D6000
heap
page read and write
2A90000
heap
page read and write
291C000
heap
page read and write
2D0000
heap
page read and write
35B0000
heap
page read and write
3371000
heap
page read and write
3296000
heap
page read and write
2CD6000
heap
page read and write
32D1000
heap
page read and write
74E000
stack
page read and write
34D6000
heap
page read and write
3040000
heap
page read and write
2BA1000
heap
page read and write
2CB6000
heap
page read and write
346E000
stack
page read and write
2DF1000
heap
page read and write
3220000
heap
page read and write
34D0000
heap
page read and write
2E10000
heap
page read and write
3360000
heap
page read and write
2A40000
heap
page read and write
325E000
stack
page read and write
61E000
stack
page read and write
3746000
heap
page read and write
3636000
heap
page read and write
700000
heap
page read and write
2E40000
heap
page read and write
3991000
heap
page read and write
30A1000
heap
page read and write
30FE000
stack
page read and write
3490000
heap
page read and write
6D4000
heap
page read and write
3570000
heap
page read and write
31D6000
heap
page read and write
3500000
heap
page read and write
2FA0000
heap
page read and write
2F37000
heap
page read and write
296D000
stack
page read and write
348F000
stack
page read and write
31BE000
stack
page read and write
2E50000
heap
page read and write
27E0000
heap
page read and write
115C000
unkown
page read and write
35F6000
heap
page read and write
330F000
unkown
page read and write
31E1000
heap
page read and write
3270000
heap
page read and write
366C000
unclassified section
page read and write
3A50000
heap
page read and write
38C6000
heap
page read and write
30A6000
heap
page read and write
2F2E000
unkown
page read and write
2E6E000
stack
page read and write
2E5E000
stack
page read and write
2BEE000
stack
page read and write
39D6000
heap
page read and write
2D41000
heap
page read and write
1230000
unkown
page read and write
312E000
stack
page read and write
3431000
heap
page read and write
31F6000
heap
page read and write
31DB000
heap
page read and write
3060000
heap
page read and write
3640000
heap
page read and write
2E4C000
unkown
page read and write
2B17000
heap
page read and write
313D000
stack
page read and write
348F000
stack
page read and write
269E000
heap
page read and write
2850000
direct allocation
page read and write
3400000
heap
page read and write
71E000
unkown
page read and write
3841000
heap
page read and write
3A3C000
unkown
page read and write
74E000
unkown
page read and write
32E1000
heap
page read and write
2D31000
heap
page read and write
32A6000
heap
page read and write
2F6B000
heap
page read and write
3000000
heap
page read and write
2FCF000
unkown
page read and write
80000
heap
page read and write
3B26000
heap
page read and write
2A1B000
heap
page read and write
28FD000
stack
page read and write
3280000
heap
page read and write
746000
heap
page read and write
3A30000
heap
page read and write
2B50000
heap
page read and write
32D0000
heap
page read and write
31E0000
heap
page read and write
36B0000
heap
page read and write
2D41000
heap
page read and write
3026000
heap
page read and write
2CB1000
heap
page read and write
2DD0000
heap
page read and write
2BCE000
stack
page read and write
29B0000
heap
page read and write
5ED000
stack
page read and write
3696000
heap
page read and write
3210000
heap
page read and write
2970000
heap
page read and write
27FE000
unkown
page read and write
2C90000
heap
page read and write
2B6F000
stack
page read and write
3230000
heap
page read and write
3750000
heap
page read and write
332D000
direct allocation
page execute and read and write
3280000
heap
page read and write
2820000
heap
page read and write
29E0000
heap
page read and write
33B1000
heap
page read and write
31EE000
unkown
page read and write
5C0000
heap
page read and write
29E6000
heap
page read and write
30FE000
stack
page read and write
2B3D000
stack
page read and write
2E0E000
stack
page read and write
2D41000
heap
page read and write
2AE0000
heap
page read and write
2F16000
heap
page read and write
5BD000
stack
page read and write
34D6000
heap
page read and write
337B000
heap
page read and write
2CBB000
heap
page read and write
2C6B000
heap
page read and write
299E000
unkown
page read and write
3926000
heap
page read and write
3850000
heap
page read and write
2FF1000
heap
page read and write
2D2E000
unkown
page read and write
2BC1000
heap
page read and write
2D5F000
unkown
page read and write
340000
heap
page read and write
2B0D000
stack
page read and write
700000
heap
page read and write
2C90000
heap
page read and write
2D7D000
stack
page read and write
373F000
unkown
page read and write
2DF1000
heap
page read and write
2C56000
heap
page read and write
2D10000
heap
page read and write
2BCE000
unkown
page read and write
3260000
heap
page read and write
37CF000
unkown
page read and write
6EE000
stack
page read and write
28DD000
stack
page read and write
3AB0000
heap
page read and write
3241C000
stack
page read and write
30C6000
heap
page read and write
2B51000
heap
page read and write
3620000
heap
page read and write
74F000
unkown
page read and write
430000
heap
page read and write
3146000
heap
page read and write
2DEE000
stack
page read and write
264F000
heap
page read and write
32F0000
heap
page read and write
3366000
heap
page read and write
318E000
stack
page read and write
2913000
heap
page read and write
3A66000
heap
page read and write
2EC0000
heap
page read and write
32E0000
heap
page read and write
303D000
stack
page read and write
29FF000
stack
page read and write
2CFE000
stack
page read and write
3246000
heap
page read and write
3511000
heap
page read and write
610000
heap
page read and write
375F000
stack
page read and write
2ABF000
stack
page read and write
37B0000
heap
page read and write
37F0000
heap
page read and write
3467000
heap
page read and write
2DBE000
stack
page read and write
2D41000
heap
page read and write
3A16000
heap
page read and write
35C0000
heap
page read and write
2B8F000
stack
page read and write
3151000
heap
page read and write
3696000
heap
page read and write
2AFD000
stack
page read and write
3336000
heap
page read and write
2E8D000
stack
page read and write
3470000
heap
page read and write
2F7F000
stack
page read and write
33BF000
stack
page read and write
2D00000
heap
page read and write
3EE000
stack
page read and write
2B80000
heap
page read and write
311E000
stack
page read and write
2B8E000
unkown
page read and write
310E000
stack
page read and write
29FE000
stack
page read and write
5EE000
unkown
page execute read
2BC1000
heap
page read and write
2E5F000
stack
page read and write
2EEF000
stack
page read and write
2BBE000
unkown
page read and write
333E000
unkown
page read and write
290E000
unkown
page read and write
31D0000
heap
page read and write
34D7000
heap
page read and write
3921000
heap
page read and write
3EE000
unkown
page readonly
2A97000
heap
page read and write
2EB0000
heap
page read and write
29BF000
stack
page read and write
17D000
stack
page read and write
290E000
stack
page read and write
1D297610000
heap
page read and write
3E1000
unkown
page execute read
3540000
heap
page read and write
2F86000
heap
page read and write
3631000
heap
page read and write
2A50000
heap
page read and write
333E000
stack
page read and write
34B0000
heap
page read and write
2C60000
heap
page read and write
3840000
heap
page read and write
32CE000
stack
page read and write
80AE000
stack
page read and write
2B66000
heap
page read and write
D50000
unkown
page readonly
28AD000
stack
page read and write
3B0000
heap
page read and write
2D41000
heap
page read and write
2B3D000
stack
page read and write
2A3E000
stack
page read and write
2E90000
heap
page read and write
2EE0000
heap
page read and write
2E50000
heap
page read and write
2E60000
heap
page read and write
37D1000
heap
page read and write
6FD000
stack
page read and write
2B91000
heap
page read and write
29CD000
stack
page read and write
2FC6000
heap
page read and write
3570000
heap
page read and write
2FFF000
stack
page read and write
3340000
heap
page read and write
2C56000
heap
page read and write
31FEE000
stack
page read and write
3921000
heap
page read and write
318E000
stack
page read and write
2A3D000
stack
page read and write
2F0F000
stack
page read and write
18E000
unkown
page read and write
2E0E000
unkown
page read and write
27C0000
heap
page read and write
2DB1000
heap
page read and write
333E000
stack
page read and write
28BF000
unkown
page read and write
28BF000
unkown
page read and write
31D0000
heap
page read and write
29AE000
stack
page read and write
2D41000
heap
page read and write
3380000
heap
page read and write
3A06000
heap
page read and write
2E51000
heap
page read and write
540000
heap
page read and write
38F0000
heap
page read and write
313E000
stack
page read and write
2880000
direct allocation
page read and write
2D11000
heap
page read and write
2F40000
heap
page read and write
1D297499000
heap
page read and write
2BA6000
heap
page read and write
33C1000
heap
page read and write
3466000
heap
page read and write
40A000
unkown
page read and write
2E9D000
stack
page read and write
5FE000
unkown
page read and write
2B66000
heap
page read and write
1D297290000
heap
page read and write
318F000
stack
page read and write
2F16000
heap
page read and write
2D41000
heap
page read and write
5A0000
heap
page read and write
2B41000
heap
page read and write
3210000
heap
page read and write
303D000
stack
page read and write
31D0000
heap
page read and write
34F6000
heap
page read and write
2F00000
heap
page read and write
28F0000
heap
page read and write
3731000
heap
page read and write
3151000
heap
page read and write
2AFD000
stack
page read and write
3BA6000
heap
page read and write
3521000
heap
page read and write
2B10000
heap
page read and write
2D41000
heap
page read and write
2C8E000
stack
page read and write
33FE000
stack
page read and write
29ED000
stack
page read and write
2960000
heap
page read and write
2FAF000
stack
page read and write
326C4000
heap
page read and write
21EADE13000
heap
page read and write
2119000
remote allocation
page execute and read and write
2B8E000
unkown
page read and write
333F000
stack
page read and write
35F1000
heap
page read and write
2D5E000
stack
page read and write
315E000
stack
page read and write
28A0000
heap
page read and write
3556000
heap
page read and write
2890000
heap
page read and write
2EE1000
heap
page read and write
30DE000
stack
page read and write
33AE000
stack
page read and write
36A6000
heap
page read and write
30EE000
stack
page read and write
2E8E000
unkown
page read and write
2FC0000
heap
page read and write
3470000
heap
page read and write
39F1000
heap
page read and write
1288000
heap
page read and write
2D70000
heap
page read and write
2F00000
heap
page read and write
25D0000
heap
page read and write
3160000
heap
page read and write
36C0000
heap
page read and write
3950000
heap
page read and write
3176000
heap
page read and write
30CE000
stack
page read and write
2F6E000
unkown
page read and write
36B6000
heap
page read and write
36D1000
heap
page read and write
3EE000
unkown
page readonly
6FE000
stack
page read and write
300B000
heap
page read and write
2B7F000
stack
page read and write
2D8B000
heap
page read and write
2C3D000
stack
page read and write
343E000
stack
page read and write
29D1000
heap
page read and write
2CE6000
heap
page read and write
3AB6000
heap
page read and write
30FE000
stack
page read and write
2D46000
heap
page read and write
2B9F000
stack
page read and write
385F000
stack
page read and write
5422000
trusted library allocation
page read and write
700000
heap
page read and write
35D0000
heap
page read and write
2B96000
heap
page read and write
33A0000
heap
page read and write
2CE0000
heap
page read and write
3996000
heap
page read and write
2A80000
heap
page read and write
480000
heap
page read and write
2D41000
heap
page read and write
2CB1000
heap
page read and write
3800000
heap
page read and write
11B0000
heap
page read and write
5EC000
unkown
page execute read
3696000
heap
page read and write
30C1000
heap
page read and write
317E000
unkown
page read and write
31F0000
heap
page read and write
348F000
stack
page read and write
3821000
heap
page read and write
2AFE000
stack
page read and write
3576000
heap
page read and write
29BB000
heap
page read and write
3EE000
unkown
page readonly
325E000
unkown
page read and write
640000
heap
page read and write
3181000
heap
page read and write
2ABF000
stack
page read and write
37D0000
heap
page read and write
31E1000
heap
page read and write
2B9F000
stack
page read and write
3477000
heap
page read and write
2F9E000
stack
page read and write
2B21000
heap
page read and write
3060000
heap
page read and write
2B50000
heap
page read and write
2E5E000
stack
page read and write
312E000
stack
page read and write
2BFF000
unkown
page read and write
2830000
heap
page read and write
2D40000
heap
page read and write
3410000
heap
page read and write
3A30000
heap
page read and write
36A0000
heap
page read and write
2D41000
heap
page read and write
73D000
stack
page read and write
33CF000
unkown
page read and write
3746000
heap
page read and write
2E50000
heap
page read and write
2D41000
heap
page read and write
32D1000
heap
page read and write
30E0000
heap
page read and write
31F0000
heap
page read and write
311B000
heap
page read and write
2820000
direct allocation
page read and write
2E5D000
stack
page read and write
3851000
heap
page read and write
2B70000
heap
page read and write
3376000
heap
page read and write
53E000
stack
page read and write
2C8B000
heap
page read and write
340F000
stack
page read and write
2B3F000
stack
page read and write
2ED0000
heap
page read and write
288B000
heap
page read and write
28D0000
heap
page read and write
3040000
heap
page read and write
347B000
heap
page read and write
21F5FF60000
unclassified section
page readonly
3396000
heap
page read and write
3396000
heap
page read and write
3930000
heap
page read and write
3751000
heap
page read and write
3286000
heap
page read and write
3200000
heap
page read and write
2D16000
heap
page read and write
3470000
heap
page read and write
3446000
heap
page read and write
31CE000
stack
page read and write
2D80000
heap
page read and write
38A0000
heap
page read and write
3990000
heap
page read and write
32D000
stack
page read and write
37A6000
heap
page read and write
35B6000
heap
page read and write
339E000
stack
page read and write
3961000
heap
page read and write
2BBD000
stack
page read and write
21F5FE50000
heap
page read and write
2D41000
heap
page read and write
29C0000
heap
page read and write
2C86000
heap
page read and write
2D41000
heap
page read and write
3246000
heap
page read and write
2870000
heap
page read and write
29BE000
stack
page read and write
315F000
unkown
page read and write
26E19FE000
stack
page read and write
2D20000
heap
page read and write
5D0000
heap
page read and write
2D5F000
unkown
page read and write
3260000
heap
page read and write
33B6000
heap
page read and write
72E000
stack
page read and write
3590000
heap
page read and write
320E000
unkown
page read and write
32520000
direct allocation
page read and write
3370000
heap
page read and write
36B0000
heap
page read and write
3870000
heap
page read and write
3140000
heap
page read and write
2FCB000
heap
page read and write
6D5000
heap
page read and write
34DB000
heap
page read and write
3831000
heap
page read and write
2696000
heap
page read and write
2B9F000
unkown
page read and write
340E000
stack
page read and write
6FE000
stack
page read and write
3290000
heap
page read and write
3640000
heap
page read and write
30E0000
heap
page read and write
5B0000
heap
page read and write
3366000
heap
page read and write
2A5F000
unkown
page read and write
2B27000
heap
page read and write
28BE000
unkown
page read and write
1260000
heap
page read and write
33FE000
stack
page read and write
3311000
heap
page read and write
366F000
stack
page read and write
2B40000
heap
page read and write
5F0000
heap
page read and write
2D41000
heap
page read and write
2FF6000
heap
page read and write
27FE000
unkown
page read and write
2B5E000
unkown
page read and write
21EADE67000
heap
page read and write
350E000
stack
page read and write
33D0000
heap
page read and write
2B51000
heap
page read and write
2E80000
heap
page read and write
2C3F000
unkown
page read and write
746000
heap
page read and write
3396000
heap
page read and write
2913000
heap
page read and write
2D30000
heap
page read and write
2E10000
heap
page read and write
3680000
heap
page read and write
32EE000
unkown
page read and write
3290000
heap
page read and write
2C50000
heap
page read and write
33EE000
stack
page read and write
28BF000
unkown
page read and write
2C56000
heap
page read and write
2C1E000
unkown
page read and write
3BE000
stack
page read and write
2AB0000
heap
page read and write
33F1000
heap
page read and write
2D41000
heap
page read and write
2D16000
heap
page read and write
3166000
heap
page read and write
2C70000
heap
page read and write
2B3E000
stack
page read and write
3BA6000
heap
page read and write
2BC1000
heap
page read and write
3A86000
heap
page read and write
3020000
heap
page read and write
34FE000
stack
page read and write
3941000
heap
page read and write
2E3D000
stack
page read and write
2980000
heap
page read and write
362F000
stack
page read and write
36AE000
stack
page read and write
638000
stack
page read and write
331B000
heap
page read and write
298F000
unkown
page read and write
2E2F000
unkown
page read and write
3691000
heap
page read and write
2E26000
heap
page read and write
2D41000
heap
page read and write
2E5E000
stack
page read and write
35BF000
unkown
page read and write
32FD000
stack
page read and write
34DB000
heap
page read and write
2D41000
heap
page read and write
2C1B000
heap
page read and write
3202F000
stack
page read and write
129E000
stack
page read and write
35CF000
stack
page read and write
2C60000
heap
page read and write
31FF000
unkown
page read and write
2FC7000
heap
page read and write
3406000
heap
page read and write
2E6E000
stack
page read and write
2DFF000
unkown
page read and write
3851000
heap
page read and write
2DE0000
heap
page read and write
27EF000
stack
page read and write
2D41000
heap
page read and write
33C0000
heap
page read and write
3851000
heap
page read and write
303D000
stack
page read and write
2DC0000
heap
page read and write
29EE000
unkown
page read and write
2B40000
heap
page read and write
D50000
unkown
page readonly
2D41000
heap
page read and write
34FE000
stack
page read and write
3226000
heap
page read and write
329E000
stack
page read and write
308F000
stack
page read and write
3631000
heap
page read and write
37A1000
heap
page read and write
27FE000
unkown
page read and write
33DE000
unkown
page read and write
3990000
heap
page read and write
2F80000
heap
page read and write
2CFD000
stack
page read and write
7A35000
heap
page read and write
2D30000
heap
page read and write
3746000
heap
page read and write
3601000
heap
page read and write
2DF0000
heap
page read and write
2340000
heap
page read and write
60E000
stack
page read and write
3371000
heap
page read and write
264A000
heap
page read and write
2B0F000
stack
page read and write
29BD000
stack
page read and write
3276000
heap
page read and write
27FE000
stack
page read and write
2F40000
heap
page read and write
3406000
heap
page read and write
2DD0000
heap
page read and write
2E9E000
unkown
page read and write
314F000
unkown
page read and write
3180000
heap
page read and write
3351000
heap
page read and write
73D000
stack
page read and write
2F20000
heap
page read and write
40A000
unkown
page write copy
3760000
heap
page read and write
2CB7000
heap
page read and write
33BB000
heap
page read and write
3876000
heap
page read and write
33DF000
stack
page read and write
630000
heap
page read and write
21EADF13000
heap
page read and write
2D41000
heap
page read and write
6D0000
heap
page read and write
2D41000
heap
page read and write
79F8000
heap
page read and write
352F000
stack
page read and write
1F455E00000
trusted library allocation
page read and write
29BB000
heap
page read and write
2E60000
heap
page read and write
4FD000
stack
page read and write
79E1000
heap
page read and write
3550000
heap
page read and write
338B000
heap
page read and write
2C2B000
heap
page read and write
2EED000
stack
page read and write
343F000
stack
page read and write
2F60000
heap
page read and write
2DAF000
unkown
page read and write
43D000
stack
page read and write
1ED000
stack
page read and write
2C9B000
heap
page read and write
2DD6000
heap
page read and write
670000
heap
page read and write
2E40000
heap
page read and write
2D41000
heap
page read and write
33B6000
heap
page read and write
2EEE000
unkown
page read and write
3996000
heap
page read and write
3620000
heap
page read and write
3A0000
heap
page read and write
2F9E000
stack
page read and write
3410000
heap
page read and write
540000
heap
page read and write
2A8B000
heap
page read and write
1F0000
heap
page read and write
2CFE000
stack
page read and write
356E000
stack
page read and write
2A6E000
unkown
page read and write
54B000
heap
page read and write
2AD0000
heap
page read and write
2D7F000
stack
page read and write
3996000
heap
page read and write
3BD0000
heap
page read and write
2AC0000
heap
page read and write
37E0000
heap
page read and write
470000
heap
page read and write
3880000
heap
page read and write
2B9E000
stack
page read and write
2507EFC000
stack
page read and write
343B000
heap
page read and write
3830000
heap
page read and write
2CBD000
stack
page read and write
303E000
unkown
page read and write
2870000
heap
page read and write
3050000
heap
page read and write
31EE000
stack
page read and write
314E000
stack
page read and write
3356000
heap
page read and write
30FD000
stack
page read and write
3026000
heap
page read and write
2C30000
heap
page read and write
43D000
stack
page read and write
21F5FDE0000
heap
page read and write
3801000
heap
page read and write
36D0000
heap
page read and write
2946000
heap
page read and write
2D41000
heap
page read and write
3110000
heap
page read and write
2D6E000
stack
page read and write
3241000
heap
page read and write
318E000
stack
page read and write
140C2000
system
page read and write
2CEF000
stack
page read and write
2870000
heap
page read and write
3530000
heap
page read and write
3006000
heap
page read and write
2AAD000
stack
page read and write
32E0000
heap
page read and write
33BF000
stack
page read and write
401000
unkown
page execute read
3561000
heap
page read and write
356B000
heap
page read and write
3271000
heap
page read and write
3190000
heap
page read and write
2DD0000
heap
page read and write
3746000
heap
page read and write
2860000
direct allocation
page read and write
3846000
heap
page read and write
2CFD000
stack
page read and write
31D0000
heap
page read and write
29FE000
stack
page read and write
2EA0000
heap
page read and write
2FB0000
heap
page read and write
2D41000
heap
page read and write
6CE000
stack
page read and write
3230000
heap
page read and write
2F5F000
unkown
page read and write
2DA0000
heap
page read and write
30FE000
stack
page read and write
56B000
heap
page read and write
322E000
stack
page read and write
302E000
stack
page read and write
2C9F000
stack
page read and write
2BF6000
heap
page read and write
32DE000
stack
page read and write
3270000
heap
page read and write
3F7000
unkown
page readonly
31A0000
heap
page read and write
3290000
heap
page read and write
D8E000
heap
page read and write
2EF0000
heap
page read and write
306F000
stack
page read and write
331F000
unkown
page read and write
347F000
stack
page read and write
2DA0000
heap
page read and write
3976000
heap
page read and write
2F50000
heap
page read and write
354F000
stack
page read and write
2ED0000
heap
page read and write
2CCE000
unkown
page read and write
6ED000
stack
page read and write
2A10000
heap
page read and write
329B000
heap
page read and write
180000
heap
page read and write
2B91000
heap
page read and write
2BA6000
heap
page read and write
3851000
heap
page read and write
3320000
heap
page read and write
3900000
heap
page read and write
2910000
heap
page read and write
392F000
stack
page read and write
3060000
heap
page read and write
358F000
stack
page read and write
37F0000
heap
page read and write
53D000
stack
page read and write
3351000
heap
page read and write
72E000
unkown
page read and write
30E0000
heap
page read and write
36AF000
unkown
page read and write
28FE000
stack
page read and write
27C0000
heap
page read and write
34FF000
stack
page read and write
34CE000
stack
page read and write
600000
heap
page read and write
3226000
heap
page read and write
2ED0000
heap
page read and write
6FD000
stack
page read and write
2990000
heap
page read and write
2CBF000
stack
page read and write
2F16000
heap
page read and write
28DE000
stack
page read and write
2D41000
heap
page read and write
30E1000
heap
page read and write
269E000
heap
page read and write
2AC0000
heap
page read and write
389F000
stack
page read and write
2DDD000
stack
page read and write
3287000
heap
page read and write
4FD000
stack
page read and write
37A6000
heap
page read and write
2908000
heap
page read and write
2D41000
heap
page read and write
2C56000
heap
page read and write
2C56000
heap
page read and write
3611000
heap
page read and write
36FF000
stack
page read and write
2F7E000
unkown
page read and write
2D41000
heap
page read and write
2EF6000
heap
page read and write
3271000
heap
page read and write
34B0000
heap
page read and write
2D41000
heap
page read and write
33DF000
unkown
page read and write
2F36000
heap
page read and write
21EADE9A000
heap
page read and write
2D41000
heap
page read and write
32B6000
heap
page read and write
6D4000
heap
page read and write
2B0E000
stack
page read and write
29FD000
stack
page read and write
2D7F000
stack
page read and write
2F8E000
stack
page read and write
32B0000
heap
page read and write
2A7E000
unkown
page read and write
2F3E000
stack
page read and write
2D60000
heap
page read and write
2F16000
heap
page read and write
2FF0000
heap
page read and write
21F6005A000
heap
page read and write
690000
heap
page read and write
2A20000
heap
page read and write
35B0000
heap
page read and write
340F000
stack
page read and write
2F26000
heap
page read and write
2D80000
heap
page read and write
23A0000
heap
page read and write
2C9E000
stack
page read and write
2D3E000
stack
page read and write
1D29742B000
heap
page read and write
2CC0000
heap
page read and write
32A0000
heap
page read and write
3440000
heap
page read and write
79BF000
heap
page read and write
2D60000
heap
page read and write
2D20000
heap
page read and write
2C56000
heap
page read and write
3380000
heap
page read and write
9B0000
heap
page read and write
680000
heap
page read and write
2E2F000
unkown
page read and write
3570000
heap
page read and write
2D41000
heap
page read and write
36A0000
heap
page read and write
3460000
heap
page read and write
79BC000
heap
page read and write
3FE000
stack
page read and write
1D297440000
heap
page read and write
35BB000
heap
page read and write
540000
direct allocation
page read and write
348E000
unkown
page read and write
2F31000
heap
page read and write
3820000
heap
page read and write
460000
heap
page read and write
2B61000
heap
page read and write
2B5D000
stack
page read and write
323D000
stack
page read and write
28FD000
stack
page read and write
2FC0000
heap
page read and write
2D4E000
stack
page read and write
3181000
heap
page read and write
3223E000
stack
page read and write
3361000
heap
page read and write
34FB000
heap
page read and write
71F000
unkown
page read and write
2E1F000
unkown
page read and write
2DAE000
stack
page read and write
32FD000
stack
page read and write
5CD000
stack
page read and write
363F000
stack
page read and write
31CF000
stack
page read and write
37EF000
stack
page read and write
3010000
heap
page read and write
73E000
stack
page read and write
3307000
heap
page read and write
3170000
heap
page read and write
33BE000
stack
page read and write
2D10000
heap
page read and write
2E90000
heap
page read and write
35D6000
heap
page read and write
4FD000
stack
page read and write
2DC0000
heap
page read and write
2C96000
heap
page read and write
3616000
heap
page read and write
2DF1000
heap
page read and write
29BF000
stack
page read and write
6DE000
stack
page read and write
32BE000
unkown
page read and write
ED000
stack
page read and write
3866000
heap
page read and write
31E0000
heap
page read and write
39D0000
heap
page read and write
320E000
stack
page read and write
3100000
heap
page read and write
2DEF000
stack
page read and write
3A11000
heap
page read and write
3071000
heap
page read and write
3246000
heap
page read and write
700000
heap
page read and write
2FF6000
heap
page read and write
31F0000
heap
page read and write
6FE000
stack
page read and write
6EE000
unkown
page read and write
31C0000
heap
page read and write
2ED0000
heap
page read and write
30CF000
unkown
page read and write
3546000
heap
page read and write
2D20000
heap
page read and write
345E000
stack
page read and write
3CE000
unkown
page read and write
2B6B000
heap
page read and write
3636000
heap
page read and write
34A0000
heap
page read and write
332F000
stack
page read and write
36D000
stack
page read and write
2B10000
unkown
page readonly
3280000
heap
page read and write
D80000
heap
page read and write
368E000
stack
page read and write
2F40000
heap
page read and write
33FE000
unkown
page read and write
2D80000
heap
page read and write
297B000
heap
page read and write
35D0000
heap
page read and write
2D41000
heap
page read and write
289D000
stack
page read and write
2D41000
heap
page read and write
762000
heap
page read and write
2EC0000
heap
page read and write
32E6000
heap
page read and write
2BF6000
heap
page read and write
3321000
heap
page read and write
2C00000
heap
page read and write
28BF000
unkown
page read and write
3540000
heap
page read and write
28FE000
stack
page read and write
2F46000
heap
page read and write
1350000
unkown
page readonly
68E000
stack
page read and write
6FE000
stack
page read and write
2B7F000
stack
page read and write
2E1B000
heap
page read and write
338E000
stack
page read and write
39E0000
heap
page read and write
306E000
stack
page read and write
3140000
heap
page read and write
35B0000
heap
page read and write
36CE000
stack
page read and write
2C81000
heap
page read and write
3100000
heap
page read and write
3120000
heap
page read and write
2AFE000
stack
page read and write
2F5E000
stack
page read and write
50E000
unkown
page read and write
2CA0000
heap
page read and write
316F000
stack
page read and write
2D5D000
stack
page read and write
2E3D000
stack
page read and write
3610000
heap
page read and write
5CE000
stack
page read and write
2D41000
heap
page read and write
2CB6000
heap
page read and write
33E1000
heap
page read and write
6E0000
heap
page read and write
2E8E000
stack
page read and write
3591000
heap
page read and write
5CE000
stack
page read and write
32B1000
heap
page read and write
2DB1000
heap
page read and write
2FF6000
heap
page read and write
36E0000
heap
page read and write
75F000
unkown
page read and write
3746000
heap
page read and write
30B0000
heap
page read and write
34CC000
direct allocation
page execute and read and write
2CC0000
heap
page read and write
2C70000
heap
page read and write
2EA1000
heap
page read and write
610000
heap
page read and write
3220000
heap
page read and write
33C7000
heap
page read and write
37A0000
heap
page read and write
2EAF000
stack
page read and write
319E000
stack
page read and write
160000
heap
page read and write
380000
heap
page read and write
2EDE000
stack
page read and write
3356000
heap
page read and write
336E000
stack
page read and write
710000
heap
page read and write
3210000
heap
page read and write
32FF000
unkown
page read and write
3611000
heap
page read and write
2FA0000
heap
page read and write
3471000
heap
page read and write
3150000
heap
page read and write
2CEE000
stack
page read and write
2DE0000
heap
page read and write
285E000
stack
page read and write
337E000
stack
page read and write
600000
direct allocation
page read and write
3980000
heap
page read and write
3340000
heap
page read and write
10D000
stack
page read and write
3256000
heap
page read and write
30BE000
stack
page read and write
3310000
heap
page read and write
2FCF000
unkown
page read and write
3751000
heap
page read and write
1F454208000
heap
page read and write
2D7E000
stack
page read and write
37F0000
heap
page read and write
1A11000
unkown
page readonly
39E0000
heap
page read and write
2D8D000
stack
page read and write
2C71000
heap
page read and write
34F6000
heap
page read and write
2B40000
unkown
page readonly
340B000
heap
page read and write
324F000
stack
page read and write
DCC000
stack
page read and write
670000
heap
page read and write
3206E000
stack
page read and write
2E0000
heap
page read and write
2D4E000
stack
page read and write
27CE000
stack
page read and write
364F000
stack
page read and write
2FD0000
heap
page read and write
7A09000
heap
page read and write
3190000
heap
page read and write
2D41000
heap
page read and write
6FF36000
unkown
page readonly
3F7000
unkown
page readonly
2D3E000
stack
page read and write
35E0000
heap
page read and write
2E60000
heap
page read and write
3050000
heap
page read and write
5E0000
heap
page read and write
21EADE6A000
heap
page read and write
2FF0000
heap
page read and write
327F000
unkown
page read and write
2CB0000
heap
page read and write
33CB000
heap
page read and write
2DDE000
unkown
page read and write
2B9F000
unkown
page read and write
32C0000
heap
page read and write
36CF000
unkown
page read and write
3461000
heap
page read and write
2E6E000
stack
page read and write
5BE000
stack
page read and write
27FE000
stack
page read and write
30ED000
stack
page read and write
375F000
unkown
page read and write
2BF6000
heap
page read and write
3286000
heap
page read and write
2FD0000
heap
page read and write
3940000
heap
page read and write
3600000
heap
page read and write
40A000
unkown
page write copy
2D20000
heap
page read and write
28FE000
stack
page read and write
570000
heap
page read and write
2EFE000
stack
page read and write
630000
direct allocation
page read and write
31AE000
stack
page read and write
2A4B000
heap
page read and write
32FB000
heap
page read and write
74E000
unkown
page read and write
2922000
heap
page read and write
5D0000
heap
page read and write
293D000
stack
page read and write
33C6000
heap
page read and write
3736000
heap
page read and write
2B3D000
stack
page read and write
3270000
heap
page read and write
1220000
unkown
page readonly
3576000
heap
page read and write
3340000
heap
page read and write
16E1000
unkown
page readonly
2D41000
heap
page read and write
30F0000
heap
page read and write
3AB0000
heap
page read and write
3741000
heap
page read and write
30D0000
heap
page read and write
298E000
unkown
page read and write
2AA0000
heap
page read and write
2F3E000
stack
page read and write
347E000
unkown
page read and write
2930000
heap
page read and write
3431000
heap
page read and write
2D41000
heap
page read and write
31CB000
heap
page read and write
54E000
unkown
page read and write
379E000
stack
page read and write
46D000
stack
page read and write
31F0000
heap
page read and write
3840000
heap
page read and write
368F000
stack
page read and write
2ED0000
heap
page read and write
21EAF8D0000
trusted library allocation
page read and write
3A21000
heap
page read and write
2D41000
heap
page read and write
63E000
stack
page read and write
3650000
heap
page read and write
3246000
heap
page read and write
37C6000
heap
page read and write
317D000
heap
page read and write
2F37000
heap
page read and write
348E000
stack
page read and write
314F000
stack
page read and write
2EFE000
stack
page read and write
264C000
heap
page read and write
4FE000
stack
page read and write
43E000
unkown
page read and write
30C6000
heap
page read and write
3756000
heap
page read and write
1F454200000
heap
page read and write
73E000
stack
page read and write
3256000
heap
page read and write
2C5D000
stack
page read and write
31BE000
stack
page read and write
38C1000
heap
page read and write
3180000
heap
page read and write
32B0000
heap
page read and write
70E000
unkown
page read and write
2F3E000
stack
page read and write
360F000
stack
page read and write
300C000
unkown
page read and write
2BFE000
unkown
page read and write
3280000
heap
page read and write
3181000
heap
page read and write
3341000
heap
page read and write
29A0000
heap
page read and write
3511000
heap
page read and write
2A90000
heap
page read and write
3920000
heap
page read and write
3740000
heap
page read and write
3E1000
unkown
page execute read
2C70000
heap
page read and write
53E000
stack
page read and write
33FB000
heap
page read and write
3290000
heap
page read and write
3426000
heap
page read and write
2BEB000
heap
page read and write
3710000
heap
page read and write
28BF000
stack
page read and write
25D8000
heap
page read and write
79CD000
heap
page read and write
2CC6000
heap
page read and write
2BAD000
stack
page read and write
3970000
heap
page read and write
2BB1000
heap
page read and write
2BDD000
stack
page read and write
35EB000
heap
page read and write
3251C000
stack
page read and write
30C1000
heap
page read and write
4ED000
stack
page read and write
34E1000
heap
page read and write
630000
heap
page read and write
32560000
direct allocation
page read and write
3526000
heap
page read and write
A0000
heap
page read and write
2D41000
heap
page read and write
32DB000
heap
page read and write
2C90000
heap
page read and write
15D000
stack
page read and write
40CA000
unclassified section
page read and write
344E000
stack
page read and write
3870000
heap
page read and write
2EA0000
heap
page read and write
3720000
heap
page read and write
2EB0000
heap
page read and write
3580000
heap
page read and write
3950000
heap
page read and write
3200000
heap
page read and write
26E157D000
stack
page read and write
342E000
unkown
page read and write
2EE1000
heap
page read and write
2CCE000
stack
page read and write
29DD000
stack
page read and write
32A7000
heap
page read and write
2AF0000
heap
page read and write
32F0000
heap
page read and write
6E0000
heap
page read and write
2F36000
heap
page read and write
3860000
heap
page read and write
3500000
heap
page read and write
2AC0000
heap
page read and write
3456000
heap
page read and write
250817E000
stack
page read and write
5E8000
unkown
page execute read
33CE000
stack
page read and write
2DF0000
heap
page read and write
750000
heap
page read and write
3250000
heap
page read and write
3311000
heap
page read and write
2DF6000
heap
page read and write
2B66000
heap
page read and write
4FE000
stack
page read and write
35C1000
heap
page read and write
2D3E000
stack
page read and write
2F5D000
stack
page read and write
323E000
stack
page read and write
1260000
heap
page read and write
3900000
heap
page read and write
3726000
heap
page read and write
2DDE000
stack
page read and write
2E0E000
stack
page read and write
35B6000
heap
page read and write
610000
heap
page read and write
304F000
unkown
page read and write
28BF000
unkown
page read and write
359F000
unkown
page read and write
100B000
system
page execute and read and write
6EE000
stack
page read and write
540000
heap
page read and write
2F9E000
unkown
page read and write
2D41000
heap
page read and write
307E000
stack
page read and write
2DE0000
heap
page read and write
3590000
heap
page read and write
39D0000
heap
page read and write
313F000
stack
page read and write
2D41000
heap
page read and write
3871000
heap
page read and write
2CC0000
heap
page read and write
2A2E000
stack
page read and write
2980000
heap
page read and write
2B30000
heap
page read and write
33CE000
unkown
page read and write
31D6000
heap
page read and write
3861000
heap
page read and write
2A96000
heap
page read and write
3300000
heap
page read and write
3241000
heap
page read and write
2C96000
heap
page read and write
31B6000
heap
page read and write
37B0000
heap
page read and write
3331000
heap
page read and write
3450000
heap
page read and write
2DE1000
heap
page read and write
303F000
stack
page read and write
2ED000
stack
page read and write
75E000
stack
page read and write
2C11000
heap
page read and write
2E0E000
unkown
page read and write
2B40000
heap
page read and write
2B5F000
unkown
page read and write
2F7E000
unkown
page read and write
3316000
heap
page read and write
440000
heap
page read and write
2C00000
heap
page read and write
580000
direct allocation
page read and write
There are 6354 hidden memdumps, click here to show them.