IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_1c77ce1ec0b3d89a6dd55c51bfa436d4dea36c5e_2b1844b5_9cb15825-2a12-4239-bf22-cbc4e7a97685\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\4ML83FcuAgQz3IZIJQZt9jp.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
modified
malicious
C:\Users\user\AppData\Local\Temp\kRsLnWC8nSKO7cxBB_GPBsv.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RageMP131.exe_c64587a9515af7bb2f60a6bd1524624be94ab9f_2a26eb84_ceef78e7-d334-4afe-9686-30c867cce4ff\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER635B.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Jun 24 17:25:53 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6465.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6503.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9F1C.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Jun 24 17:26:08 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9FC8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA056.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\spanEJ4VY2228rSf\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanEJ4VY2228rSf\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanEJ4VY2228rSf\3mMkeKh4moOvWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanEJ4VY2228rSf\4eIBzLItYm9HHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanEJ4VY2228rSf\5IwX29nqTAdcWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanEJ4VY2228rSf\AJtuLK1vTV6ZHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanEJ4VY2228rSf\CBc2atquyneKLogin Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanEJ4VY2228rSf\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanEJ4VY2228rSf\EY6Rhc1AcTOoWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanEJ4VY2228rSf\S527AOHrZ0lnWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanEJ4VY2228rSf\V5pTUTDUcVYRHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanEJ4VY2228rSf\X7AeUd2yjfmFHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanEJ4VY2228rSf\eGwW68EgNGukCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\spanEJ4VY2228rSf\g4ngTia0RD8YLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanEJ4VY2228rSf\icsYxCO2fJngWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanEJ4VY2228rSf\upMh8m2QDC4CWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanEJ4VY2228rSf\yNHsMmvixazKLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanSu5HzydNtl15\02zdBXl47cvzcookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanSu5HzydNtl15\3b6N2Xdh3CYwplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanSu5HzydNtl15\3bUDfKkYHRRCLogin Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanSu5HzydNtl15\8NRYQ89STpI4History
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanSu5HzydNtl15\D87fZN3R3jFeplaces.sqlite
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanSu5HzydNtl15\QtTjccAF0YTOHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanSu5HzydNtl15\XjpAQ5NNLFgdLogin Data For Account
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\spanSu5HzydNtl15\a5tnyiyBgaPrHistory
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\spanSu5HzydNtl15\dm6xJuVPfU3TWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanSu5HzydNtl15\huxqNYWdZdYGHistory
SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanSu5HzydNtl15\lJoQ1_cNnSfkWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanSu5HzydNtl15\mnXBjrE1mnmMCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\Local\Temp\spanSu5HzydNtl15\n7RBCXlydKsaWeb Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanSu5HzydNtl15\ppsBGe_ameh5Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\spanSu5HzydNtl15\t2Pv2_7kqPVIWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanSu5HzydNtl15\zPWIxjihMC1MWeb Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\spanSu5HzydNtl15\zy17nX_phPKILogin Data
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\trixyEJ4VY2228rSf\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyEJ4VY2228rSf\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixyEJ4VY2228rSf\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixySu5HzydNtl15\Cookies\Chrome_Default.txt
ASCII text, with very long lines (769), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixySu5HzydNtl15\information.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\trixySu5HzydNtl15\passwords.txt
Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 47 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7488 -s 1908
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7520 -s 1756
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://77.91.77.81/cost/go.exe
unknown
malicious
http://77.91.77.81/mine/amadka.exe
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://ipinfo.io:443/widget/demo/8.46.123.33
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://duckduckgo.com/ac/?q=
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33routz-
unknown
https://db-ip.com/
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://support.microsoft..
unknown
https://t.me/risepro_bot.com
unknown
https://t.me/RiseProSUPPORTV
unknown
https://ipinfo.io/widget/demo/8.46.123.33
34.117.186.192
https://db-ip.com/demo/home.php?s=8.46.123.339
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.mG
unknown
https://db-ip.com:443/demo/home.php?s=8.46.123.33
unknown
https://t.me/risepro_botrisepro
unknown
https://db-ip.com/vR
unknown
https://db-ip.com/G
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://support.microsoft.
unknown
https://t.me/risepro_botrisep
unknown
http://77.91.77.81/mine/amadka.exe338
unknown
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ipinfo.io/I
unknown
http://upx.sf.net
unknown
https://ipinfo.io/S~
unknown
https://ipinfo.io/widget/demo/8.46.123.33s
unknown
https://t.me/RiseProSUPPORT
unknown
https://t.me/RiseProSUPPORT&
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33rHt
unknown
https://www.ecosia.org/newtab/
unknown
https://ipinfo.io/Mozilla/5.0
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://db-ip.com/f
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://t.me/risepro_bot
unknown
https://ipinfo.io/
34.117.186.192
http://77.91.77.81/cost/lenin.exe00.1
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
http://www.winimage.com/zLibDll
unknown
https://support.mozilla.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://db-ip.com/demo/home.php?s=8.46.123.33
104.26.5.15
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://77.91.77.81/cost/lenin.exe
unknown
There are 41 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ipinfo.io
34.117.186.192
db-ip.com
104.26.5.15

IPs

IP
Domain
Country
Malicious
77.91.77.66
unknown
Russian Federation
malicious
34.117.186.192
ipinfo.io
United States
104.26.5.15
db-ip.com
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{64785f0f-284d-af34-7388-c4859713b6db}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
malicious
\REGISTRY\A\{64785f0f-284d-af34-7388-c4859713b6db}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
malicious
\REGISTRY\A\{64785f0f-284d-af34-7388-c4859713b6db}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
malicious
\REGISTRY\A\{64785f0f-284d-af34-7388-c4859713b6db}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
malicious
\REGISTRY\A\{64785f0f-284d-af34-7388-c4859713b6db}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
malicious
\REGISTRY\A\{64785f0f-284d-af34-7388-c4859713b6db}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
malicious
\REGISTRY\A\{64785f0f-284d-af34-7388-c4859713b6db}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
malicious
\REGISTRY\A\{64785f0f-284d-af34-7388-c4859713b6db}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
malicious
\REGISTRY\A\{64785f0f-284d-af34-7388-c4859713b6db}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
malicious
\REGISTRY\A\{64785f0f-284d-af34-7388-c4859713b6db}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
malicious
\REGISTRY\A\{64785f0f-284d-af34-7388-c4859713b6db}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
malicious
\REGISTRY\A\{64785f0f-284d-af34-7388-c4859713b6db}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
malicious
\REGISTRY\A\{64785f0f-284d-af34-7388-c4859713b6db}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
malicious
\REGISTRY\A\{64785f0f-284d-af34-7388-c4859713b6db}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
malicious
\REGISTRY\A\{64785f0f-284d-af34-7388-c4859713b6db}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
malicious
\REGISTRY\A\{64785f0f-284d-af34-7388-c4859713b6db}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
malicious
\REGISTRY\A\{64785f0f-284d-af34-7388-c4859713b6db}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
malicious
\REGISTRY\A\{64785f0f-284d-af34-7388-c4859713b6db}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
malicious
\REGISTRY\A\{64785f0f-284d-af34-7388-c4859713b6db}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
00180010B0BD7147
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 15 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
BED000
heap
page read and write
malicious
BED000
heap
page read and write
malicious
5921000
heap
page read and write
malicious
591E000
heap
page read and write
malicious
D2E000
heap
page read and write
malicious
83F000
unkown
page execute and write copy
72A000
unkown
page execute and write copy
74B000
unkown
page execute and write copy
B60000
direct allocation
page read and write
60C000
unkown
page execute and read and write
754000
unkown
page execute and write copy
6C9000
unkown
page execute and write copy
749000
unkown
page execute and write copy
6F0000
unkown
page execute and read and write
C5D000
heap
page read and write
B40000
heap
page read and write
71A000
unkown
page execute and read and write
6F9000
unkown
page execute and read and write
65F000
unkown
page execute and read and write
698000
unkown
page execute and write copy
C49000
heap
page read and write
6B0000
unkown
page execute and write copy
637000
unkown
page execute and read and write
610000
unkown
page execute and read and write
703000
unkown
page execute and read and write
747000
unkown
page execute and write copy
741000
unkown
page execute and write copy
58A000
unkown
page readonly
73F000
unkown
page execute and write copy
551F000
stack
page read and write
C1A000
heap
page read and write
643000
unkown
page execute and write copy
C8C000
heap
page read and write
5964000
heap
page read and write
5B3000
unkown
page execute and write copy
680000
unkown
page execute and read and write
752000
unkown
page execute and write copy
6DA000
unkown
page execute and write copy
704000
unkown
page execute and write copy
663000
unkown
page execute and write copy
622000
unkown
page execute and write copy
64D000
unkown
page execute and read and write
6FA000
unkown
page execute and write copy
5D1000
unkown
page execute and write copy
68C000
unkown
page execute and write copy
5530000
trusted library allocation
page read and write
19A000
stack
page read and write
728000
unkown
page execute and write copy
C8C000
heap
page read and write
C0A000
heap
page read and write
6E5000
unkown
page execute and read and write
6C1000
unkown
page execute and write copy
764000
unkown
page execute and write copy
C10000
heap
page read and write
60E000
unkown
page execute and write copy
BFE000
heap
page read and write
596000
unkown
page write copy
86A000
unkown
page execute and read and write
5DD000
unkown
page execute and write copy
C5D000
heap
page read and write
C5C000
heap
page read and write
C5A000
heap
page read and write
721000
unkown
page execute and read and write
677000
unkown
page execute and read and write
653000
unkown
page execute and read and write
5955000
heap
page read and write
5C9000
unkown
page execute and write copy
5916000
heap
page read and write
76B000
unkown
page execute and read and write
5E0000
unkown
page execute and read and write
662000
unkown
page execute and read and write
7B9000
unkown
page execute and write copy
D99000
heap
page read and write
BA0000
heap
page read and write
65A000
unkown
page execute and write copy
5F9000
unkown
page execute and read and write
5955000
heap
page read and write
64B000
unkown
page execute and write copy
5AB000
unkown
page execute and write copy
653000
unkown
page execute and read and write
74F000
unkown
page execute and read and write
61D000
unkown
page execute and write copy
5932000
heap
page read and write
B60000
direct allocation
page read and write
6E5000
unkown
page execute and read and write
C37000
heap
page read and write
615000
unkown
page execute and write copy
6E4000
unkown
page execute and write copy
5946000
heap
page read and write
747000
unkown
page execute and write copy
59E000
unkown
page execute and write copy
6C1000
unkown
page execute and write copy
C5C000
heap
page read and write
61B000
unkown
page execute and read and write
640000
unkown
page execute and write copy
5955000
heap
page read and write
C5A000
heap
page read and write
585000
unkown
page read and write
5FE000
unkown
page execute and write copy
55E000
unkown
page readonly
5A9000
unkown
page execute and write copy
5916000
heap
page read and write
C34000
heap
page read and write
713000
unkown
page execute and read and write
749000
unkown
page execute and write copy
73B000
unkown
page execute and write copy
CFE000
heap
page read and write
73B000
unkown
page execute and write copy
74D000
unkown
page execute and write copy
58A000
unkown
page readonly
687000
unkown
page execute and write copy
59F000
unkown
page execute and read and write
612000
unkown
page execute and write copy
74B000
unkown
page execute and write copy
83F000
unkown
page execute and write copy
674000
unkown
page execute and write copy
6F1000
unkown
page execute and write copy
C10000
heap
page read and write
76A000
unkown
page execute and write copy
630000
unkown
page execute and write copy
5DE000
unkown
page execute and read and write
71F000
unkown
page execute and read and write
BCF000
heap
page read and write
6B0000
unkown
page execute and write copy
752000
unkown
page execute and write copy
5DE000
unkown
page execute and read and write
761000
unkown
page execute and write copy
68D000
unkown
page execute and read and write
6A9000
unkown
page execute and read and write
B64000
heap
page read and write
5FC000
unkown
page execute and read and write
60E000
unkown
page execute and write copy
D25000
heap
page read and write
C77000
heap
page read and write
75E000
unkown
page execute and write copy
758000
unkown
page execute and read and write
729000
unkown
page execute and read and write
719000
unkown
page execute and write copy
5932000
heap
page read and write
C72000
heap
page read and write
5932000
heap
page read and write
C5D000
heap
page read and write
6C1000
unkown
page execute and write copy
68A000
unkown
page execute and write copy
53DF000
stack
page read and write
6E0000
unkown
page execute and write copy
628000
unkown
page execute and write copy
694000
unkown
page execute and read and write
B7C000
heap
page read and write
B60000
direct allocation
page read and write
5F5000
unkown
page execute and read and write
747000
unkown
page execute and write copy
6FB000
unkown
page execute and read and write
736000
unkown
page execute and read and write
5FE000
unkown
page execute and write copy
639000
unkown
page execute and write copy
4E6F000
stack
page read and write
70B000
unkown
page execute and write copy
C8C000
heap
page read and write
83E000
unkown
page execute and read and write
6AA000
unkown
page execute and write copy
743000
unkown
page execute and read and write
9F5000
heap
page read and write
67B000
unkown
page execute and write copy
65A000
unkown
page execute and write copy
732000
unkown
page execute and write copy
677000
unkown
page execute and read and write
704000
unkown
page execute and write copy
6CE000
unkown
page execute and write copy
5932000
heap
page read and write
C89000
heap
page read and write
B60000
direct allocation
page read and write
DB1000
heap
page read and write
5932000
heap
page read and write
5DF000
unkown
page execute and write copy
57B0000
trusted library allocation
page read and write
637000
unkown
page execute and read and write
61D000
unkown
page execute and write copy
698000
unkown
page execute and write copy
C8F000
heap
page read and write
70E000
unkown
page execute and read and write
5FC000
unkown
page execute and read and write
83F000
unkown
page execute and write copy
756000
unkown
page execute and write copy
6CE000
unkown
page execute and write copy
5EE000
unkown
page execute and read and write
D64000
heap
page read and write
739000
unkown
page execute and write copy
4F30000
remote allocation
page read and write
5D6000
unkown
page execute and read and write
58A000
unkown
page readonly
718000
unkown
page execute and read and write
602000
unkown
page execute and write copy
6FB000
unkown
page execute and read and write
71F000
unkown
page execute and read and write
61B000
unkown
page execute and read and write
5932000
heap
page read and write
658000
unkown
page execute and read and write
CB0000
direct allocation
page read and write
720000
unkown
page execute and write copy
C50000
heap
page read and write
BD8000
heap
page read and write
6DD000
unkown
page execute and write copy
5F6000
unkown
page execute and write copy
609000
unkown
page execute and read and write
5520000
trusted library allocation
page read and write
83F000
unkown
page execute and write copy
D2A000
heap
page read and write
76E000
unkown
page execute and write copy
6A9000
unkown
page execute and read and write
696000
unkown
page execute and read and write
C1E000
heap
page read and write
610000
unkown
page execute and read and write
607000
unkown
page execute and read and write
541E000
stack
page read and write
595E000
heap
page read and write
C6D000
heap
page read and write
713000
unkown
page execute and read and write
661000
unkown
page execute and write copy
65D000
unkown
page execute and write copy
D3C000
heap
page read and write
C0E000
heap
page read and write
640000
unkown
page execute and write copy
65B000
unkown
page execute and read and write
5530000
trusted library allocation
page read and write
401000
unkown
page execute read
58EE000
heap
page read and write
6B5000
unkown
page execute and read and write
274E000
stack
page read and write
2830000
remote allocation
page read and write
66B000
unkown
page execute and read and write
749000
unkown
page execute and write copy
C1A000
heap
page read and write
5D6000
unkown
page execute and read and write
B60000
direct allocation
page read and write
5EF000
unkown
page execute and write copy
C5A000
heap
page read and write
69F000
unkown
page execute and write copy
5A3000
unkown
page execute and read and write
C69000
heap
page read and write
ABF000
heap
page read and write
C1E000
heap
page read and write
6F8000
unkown
page execute and write copy
73D000
unkown
page execute and write copy
5520000
trusted library allocation
page read and write
642000
unkown
page execute and read and write
D5E000
heap
page read and write
703000
unkown
page execute and read and write
D45000
heap
page read and write
5B9000
unkown
page execute and write copy
BCF000
heap
page read and write
704000
unkown
page execute and write copy
615000
unkown
page execute and write copy
65B000
unkown
page execute and read and write
722000
unkown
page execute and write copy
5D6000
unkown
page execute and read and write
583000
unkown
page execute and read and write
704000
unkown
page execute and write copy
595D000
heap
page read and write
400000
unkown
page readonly
59A000
unkown
page execute and write copy
678000
unkown
page execute and write copy
722000
unkown
page execute and write copy
55D000
unkown
page readonly
73B000
unkown
page execute and write copy
B65000
heap
page read and write
5BD000
unkown
page execute and read and write
BCF000
heap
page read and write
60B000
unkown
page execute and write copy
5ED000
unkown
page execute and write copy
B60000
direct allocation
page read and write
2780000
direct allocation
page read and write
74F000
unkown
page execute and read and write
E5E000
stack
page read and write
628000
unkown
page execute and write copy
5B3000
unkown
page execute and write copy
5988000
heap
page read and write
5FE000
unkown
page execute and write copy
761000
unkown
page execute and write copy
401000
unkown
page execute read
6DD000
unkown
page execute and write copy
737000
unkown
page execute and write copy
AB6000
heap
page read and write
73F000
unkown
page execute and write copy
720000
unkown
page execute and write copy
698000
unkown
page execute and write copy
C7B000
heap
page read and write
73F000
unkown
page execute and write copy
A80000
heap
page read and write
626000
unkown
page execute and read and write
642000
unkown
page execute and read and write
BED000
heap
page read and write
68B000
unkown
page execute and read and write
6D6000
unkown
page execute and write copy
66C000
unkown
page execute and write copy
73B000
unkown
page execute and write copy
598000
unkown
page readonly
C8C000
heap
page read and write
5915000
heap
page read and write
78E000
unkown
page execute and write copy
6AE000
unkown
page execute and read and write
74D000
unkown
page execute and write copy
687000
unkown
page execute and write copy
5B6000
unkown
page execute and read and write
722000
unkown
page execute and write copy
662000
unkown
page execute and read and write
687000
unkown
page execute and write copy
C5E000
heap
page read and write
B70000
heap
page read and write
64B000
unkown
page execute and write copy
670000
unkown
page execute and write copy
C5D000
heap
page read and write
AC5000
heap
page read and write
6E5000
unkown
page execute and read and write
5960000
heap
page read and write
B64000
heap
page read and write
6AB000
unkown
page execute and read and write
758000
unkown
page execute and write copy
69B000
unkown
page execute and read and write
731000
unkown
page execute and read and write
5D7000
unkown
page execute and write copy
6E9000
unkown
page execute and write copy
BE5000
heap
page read and write
60C000
unkown
page execute and read and write
680000
unkown
page execute and read and write
5BF000
unkown
page execute and read and write
5933000
heap
page read and write
63B000
unkown
page execute and read and write
6E5000
unkown
page execute and read and write
73D000
unkown
page execute and write copy
AF5000
heap
page read and write
719000
unkown
page execute and write copy
6C8000
unkown
page execute and read and write
66C000
unkown
page execute and write copy
C6E000
heap
page read and write
6E4000
unkown
page execute and write copy
5EA000
unkown
page execute and write copy
6AB000
unkown
page execute and read and write
5F5000
unkown
page execute and read and write
7B9000
unkown
page execute and write copy
732000
unkown
page execute and write copy
5E0000
unkown
page execute and read and write
782000
unkown
page execute and write copy
756000
unkown
page execute and write copy
9C0000
heap
page read and write
C35000
heap
page read and write
5D0000
unkown
page execute and read and write
668000
unkown
page execute and read and write
BD3000
heap
page read and write
764000
unkown
page execute and write copy
58F9000
heap
page read and write
75E000
unkown
page execute and write copy
767000
unkown
page execute and read and write
5D6000
unkown
page execute and read and write
602000
unkown
page execute and write copy
585000
unkown
page read and write
58D0000
heap
page read and write
7B2000
unkown
page execute and write copy
69F000
unkown
page execute and write copy
55E000
unkown
page readonly
C72000
heap
page read and write
71C000
unkown
page execute and write copy
756000
unkown
page execute and write copy
743000
unkown
page execute and read and write
C03000
heap
page read and write
663000
unkown
page execute and write copy
C5E000
heap
page read and write
630000
unkown
page execute and write copy
68B000
unkown
page execute and read and write
6D3000
unkown
page execute and read and write
66B000
unkown
page execute and read and write
5EC000
unkown
page execute and read and write
5C4000
unkown
page execute and write copy
5932000
heap
page read and write
6CD000
unkown
page execute and read and write
AC7000
heap
page read and write
C84000
heap
page read and write
2510000
direct allocation
page read and write
617000
unkown
page execute and write copy
6DF000
unkown
page execute and read and write
61D000
unkown
page execute and write copy
724000
unkown
page execute and read and write
654000
unkown
page execute and write copy
65A000
unkown
page execute and write copy
74F000
unkown
page execute and read and write
743000
unkown
page execute and read and write
69B000
unkown
page execute and read and write
610000
unkown
page execute and read and write
C0F000
heap
page read and write
5DF000
unkown
page execute and write copy
678000
unkown
page execute and write copy
86B000
unkown
page execute and write copy
782000
unkown
page execute and write copy
74D000
unkown
page execute and write copy
715000
unkown
page execute and read and write
5F1000
unkown
page execute and read and write
5975000
heap
page read and write
D37000
heap
page read and write
636000
unkown
page execute and write copy
6FB000
unkown
page execute and read and write
B75000
heap
page read and write
281E000
stack
page read and write
BFD000
heap
page read and write
66F000
unkown
page execute and read and write
BB5000
heap
page read and write
6F8000
unkown
page execute and write copy
616000
unkown
page execute and read and write
5AA000
unkown
page execute and read and write
400000
unkown
page readonly
C72000
heap
page read and write
B80000
direct allocation
page read and write
5AF000
unkown
page execute and read and write
C6B000
heap
page read and write
74B000
unkown
page execute and write copy
27E0000
heap
page read and write
68B000
unkown
page execute and read and write
609000
unkown
page execute and read and write
78E000
unkown
page execute and write copy
5A5000
unkown
page execute and read and write
551F000
stack
page read and write
5957000
heap
page read and write
5520000
trusted library allocation
page read and write
6DF000
unkown
page execute and read and write
6FC000
unkown
page execute and write copy
642000
unkown
page execute and read and write
D29000
heap
page read and write
5EC000
unkown
page execute and read and write
C72000
heap
page read and write
5946000
heap
page read and write
C1A000
heap
page read and write
658000
unkown
page execute and read and write
5A9000
unkown
page execute and write copy
5F6000
unkown
page execute and write copy
C62000
heap
page read and write
595E000
heap
page read and write
4F6F000
stack
page read and write
ACF000
heap
page read and write
7B2000
unkown
page execute and write copy
5B6000
unkown
page execute and read and write
5530000
trusted library allocation
page read and write
D10000
remote allocation
page read and write
663000
unkown
page execute and write copy
C5E000
heap
page read and write
271E000
stack
page read and write
C21000
heap
page read and write
6CE000
unkown
page execute and write copy
55D000
unkown
page readonly
AA0000
heap
page read and write
668000
unkown
page execute and read and write
60E000
unkown
page execute and write copy
65B000
unkown
page execute and read and write
5EF000
unkown
page execute and write copy
C89000
heap
page read and write
5520000
trusted library allocation
page read and write
59A000
unkown
page execute and write copy
674000
unkown
page execute and write copy
6DD000
unkown
page execute and write copy
5EA000
unkown
page execute and write copy
C5D000
heap
page read and write
C1E000
heap
page read and write
BFE000
heap
page read and write
626000
unkown
page execute and read and write
C64000
heap
page read and write
5F6000
unkown
page execute and write copy
63E000
unkown
page execute and read and write
5905000
heap
page read and write
55D000
unkown
page readonly
5955000
heap
page read and write
680000
unkown
page execute and read and write
5916000
heap
page read and write
5F1000
unkown
page execute and read and write
C6B000
heap
page read and write
73B000
unkown
page execute and write copy
736000
unkown
page execute and read and write
401000
unkown
page execute read
6E2000
unkown
page execute and read and write
737000
unkown
page execute and write copy
BE5000
heap
page read and write
5F6000
unkown
page execute and write copy
629000
unkown
page execute and read and write
7B9000
unkown
page execute and write copy
C5D000
heap
page read and write
5BF000
unkown
page execute and read and write
59F000
unkown
page execute and read and write
9F7000
heap
page read and write
4E1E000
stack
page read and write
741000
unkown
page execute and write copy
59A000
unkown
page execute and write copy
724000
unkown
page execute and read and write
595B000
heap
page read and write
C1A000
heap
page read and write
612000
unkown
page execute and write copy
AF0000
heap
page read and write
737000
unkown
page execute and write copy
669000
unkown
page execute and write copy
6BA000
unkown
page execute and write copy
18E000
stack
page read and write
C09000
heap
page read and write
5916000
heap
page read and write
278E000
stack
page read and write
69F000
unkown
page execute and write copy
5EC000
unkown
page execute and read and write
BFE000
heap
page read and write
6DA000
unkown
page execute and write copy
B60000
direct allocation
page read and write
B64000
heap
page read and write
26C0000
direct allocation
page read and write
70F000
unkown
page execute and write copy
5F8000
unkown
page execute and write copy
747000
unkown
page execute and write copy
BFE000
heap
page read and write
C5D000
heap
page read and write
743000
unkown
page execute and write copy
754000
unkown
page execute and write copy
6C8000
unkown
page execute and read and write
C1F000
heap
page read and write
4F30000
remote allocation
page read and write
76B000
unkown
page execute and read and write
756000
unkown
page execute and write copy
5BE000
unkown
page execute and write copy
608000
unkown
page execute and write copy
63E000
unkown
page execute and read and write
642000
unkown
page execute and read and write
B80000
direct allocation
page read and write
6CA000
unkown
page execute and read and write
635000
unkown
page execute and read and write
6D3000
unkown
page execute and read and write
86B000
unkown
page execute and write copy
DE3000
heap
page read and write
695000
unkown
page execute and write copy
754000
unkown
page execute and write copy
BD8000
heap
page read and write
62A000
unkown
page execute and write copy
5EA000
unkown
page execute and write copy
668000
unkown
page execute and read and write
BD8000
heap
page read and write
630000
unkown
page execute and write copy
60C000
unkown
page execute and read and write
27F0000
direct allocation
page read and write
643000
unkown
page execute and write copy
5932000
heap
page read and write
4784000
heap
page read and write
645000
unkown
page execute and read and write
5FC000
unkown
page execute and read and write
5922000
heap
page read and write
658000
unkown
page execute and read and write
5A9000
unkown
page execute and write copy
5935000
heap
page read and write
6D6000
unkown
page execute and write copy
B40000
direct allocation
page read and write
75C000
unkown
page execute and read and write
C84000
heap
page read and write
598000
unkown
page readonly
5A1000
unkown
page execute and write copy
6E0000
unkown
page execute and write copy
6F7000
unkown
page execute and read and write
608000
unkown
page execute and write copy
C72000
heap
page read and write
5922000
heap
page read and write
5FA000
unkown
page execute and write copy
4F30000
remote allocation
page read and write
C5E000
heap
page read and write
5905000
heap
page read and write
75C000
unkown
page execute and read and write
5902000
heap
page read and write
77F000
unkown
page execute and read and write
C89000
heap
page read and write
663000
unkown
page execute and write copy
C72000
heap
page read and write
6E9000
unkown
page execute and write copy
58A000
unkown
page readonly
663000
unkown
page execute and write copy
72A000
unkown
page execute and write copy
6FC000
unkown
page execute and write copy
C42000
heap
page read and write
C0F000
heap
page read and write
73D000
unkown
page execute and write copy
6CB000
unkown
page execute and write copy
687000
unkown
page execute and write copy
6BA000
unkown
page execute and write copy
677000
unkown
page execute and read and write
640000
unkown
page execute and write copy
62F000
unkown
page execute and read and write
C89000
heap
page read and write
7B9000
unkown
page execute and write copy
5E1000
unkown
page execute and write copy
C62000
heap
page read and write
B40000
direct allocation
page read and write
C8F000
heap
page read and write
743000
unkown
page execute and write copy
656000
unkown
page execute and read and write
C1F000
heap
page read and write
5ED000
unkown
page execute and write copy
5A1000
unkown
page execute and write copy
5A5000
unkown
page execute and read and write
647000
unkown
page execute and write copy
AC3000
heap
page read and write
5F9000
unkown
page execute and read and write
749000
unkown
page execute and write copy
5B3000
unkown
page execute and write copy
4CBD000
stack
page read and write
716000
unkown
page execute and write copy
73F000
unkown
page execute and write copy
749000
unkown
page execute and write copy
758000
unkown
page execute and write copy
5A5000
unkown
page execute and read and write
637000
unkown
page execute and read and write
692000
unkown
page execute and write copy
686000
unkown
page execute and read and write
657000
unkown
page execute and write copy
5974000
heap
page read and write
637000
unkown
page execute and read and write
C3D000
heap
page read and write
5D7000
unkown
page execute and write copy
5988000
heap
page read and write
6F9000
unkown
page execute and read and write
19D000
stack
page read and write
673000
unkown
page execute and read and write
C66000
heap
page read and write
689000
unkown
page execute and read and write
5DC000
unkown
page execute and read and write
596000
unkown
page write copy
6D6000
unkown
page execute and write copy
52DE000
stack
page read and write
5FF000
unkown
page execute and read and write
C3C000
heap
page read and write
5944000
heap
page read and write
53DF000
stack
page read and write
64A000
unkown
page execute and read and write
83E000
unkown
page execute and read and write
661000
unkown
page execute and write copy
5BE000
unkown
page execute and write copy
5BD000
unkown
page execute and read and write
5AC000
unkown
page execute and read and write
C62000
heap
page read and write
5F5000
unkown
page execute and read and write
62F000
unkown
page execute and read and write
5F8000
unkown
page execute and write copy
68D000
unkown
page execute and read and write
596000
unkown
page write copy
83E000
unkown
page execute and read and write
B76000
heap
page read and write
C2E000
heap
page read and write
E11000
heap
page read and write
78E000
unkown
page execute and write copy
62F000
unkown
page execute and read and write
7B2000
unkown
page execute and write copy
6E0000
unkown
page execute and write copy
70B000
unkown
page execute and write copy
5EA000
unkown
page execute and write copy
C66000
heap
page read and write
596000
unkown
page write copy
752000
unkown
page execute and write copy
636000
unkown
page execute and write copy
C17000
heap
page read and write
6CB000
unkown
page execute and write copy
67A000
unkown
page execute and read and write
5530000
trusted library allocation
page read and write
5DD000
unkown
page execute and write copy
75C000
unkown
page execute and read and write
5B3000
unkown
page execute and write copy
657000
unkown
page execute and write copy
C89000
heap
page read and write
737000
unkown
page execute and write copy
67B000
unkown
page execute and write copy
5D6000
unkown
page execute and read and write
D32000
heap
page read and write
DDD000
heap
page read and write
6E0000
unkown
page execute and write copy
614000
unkown
page execute and read and write
5943000
heap
page read and write
629000
unkown
page execute and read and write
661000
unkown
page execute and write copy
673000
unkown
page execute and read and write
BFD000
heap
page read and write
62A000
unkown
page execute and write copy
629000
unkown
page execute and read and write
BA5000
heap
page read and write
C6B000
heap
page read and write
65F000
unkown
page execute and read and write
D4F000
stack
page read and write
6B8000
unkown
page execute and write copy
683000
unkown
page execute and write copy
5A4000
unkown
page execute and write copy
86A000
unkown
page execute and read and write
71A000
unkown
page execute and read and write
5B9000
unkown
page execute and write copy
747000
unkown
page execute and write copy
D47000
heap
page read and write
654000
unkown
page execute and write copy
716000
unkown
page execute and write copy
678000
unkown
page execute and write copy
714000
unkown
page execute and write copy
BFE000
heap
page read and write
DF3000
heap
page read and write
616000
unkown
page execute and read and write
6AB000
unkown
page execute and read and write
270E000
stack
page read and write
670000
unkown
page execute and write copy
6AC000
unkown
page execute and write copy
713000
unkown
page execute and read and write
594B000
heap
page read and write
6AE000
unkown
page execute and read and write
BFE000
heap
page read and write
BCF000
heap
page read and write
609000
unkown
page execute and read and write
C89000
heap
page read and write
D8A000
heap
page read and write
C8A000
heap
page read and write
621000
unkown
page execute and read and write
5E6000
unkown
page execute and read and write
BDB000
heap
page read and write
B64000
heap
page read and write
6A9000
unkown
page execute and read and write
609000
unkown
page execute and read and write
72A000
unkown
page execute and write copy
5AD000
unkown
page execute and read and write
758000
unkown
page execute and write copy
743000
unkown
page execute and write copy
656000
unkown
page execute and read and write
BA0000
heap
page read and write
5957000
heap
page read and write
F1E000
stack
page read and write
C6B000
heap
page read and write
5530000
trusted library allocation
page read and write
5A3000
unkown
page execute and read and write
5933000
heap
page read and write
635000
unkown
page execute and read and write
5530000
trusted library allocation
page read and write
596000
unkown
page read and write
6D8000
unkown
page execute and read and write
55D000
unkown
page readonly
703000
unkown
page execute and read and write
2510000
direct allocation
page read and write
6F0000
unkown
page execute and read and write
741000
unkown
page execute and write copy
683000
unkown
page execute and write copy
401000
unkown
page execute read
5944000
heap
page read and write
E17000
heap
page read and write
60B000
unkown
page execute and write copy
5A4000
unkown
page execute and write copy
5C9000
unkown
page execute and write copy
732000
unkown
page execute and write copy
BFD000
heap
page read and write
677000
unkown
page execute and read and write
5944000
heap
page read and write
754000
unkown
page execute and write copy
6F9000
unkown
page execute and read and write
C5D000
heap
page read and write
BDA000
heap
page read and write
721000
unkown
page execute and read and write
5933000
heap
page read and write
5933000
heap
page read and write
724000
unkown
page execute and read and write
AA0000
heap
page read and write
BFE000
heap
page read and write
C89000
heap
page read and write
DD7000
heap
page read and write
713000
unkown
page execute and read and write
5531000
heap
page read and write
7B9000
unkown
page execute and write copy
6B5000
unkown
page execute and read and write
5A5000
unkown
page execute and read and write
5AA000
unkown
page execute and read and write
5D7000
unkown
page execute and write copy
764000
unkown
page execute and write copy
58EE000
heap
page read and write
5F9000
unkown
page execute and read and write
77F000
unkown
page execute and read and write
BB3000
heap
page read and write
5974000
heap
page read and write
71C000
unkown
page execute and write copy
5AC000
unkown
page execute and read and write
5F1000
unkown
page execute and read and write
C24000
heap
page read and write
5BF000
unkown
page execute and read and write
C5D000
heap
page read and write
C1A000
heap
page read and write
BB0000
heap
page read and write
75E000
unkown
page execute and write copy
E1E000
heap
page read and write
64D000
unkown
page execute and read and write
7B9000
unkown
page execute and write copy
A87000
heap
page read and write
6E6000
unkown
page execute and write copy
731000
unkown
page execute and read and write
5952000
heap
page read and write
2510000
direct allocation
page read and write
62F000
unkown
page execute and read and write
C72000
heap
page read and write
C84000
heap
page read and write
5D7000
unkown
page execute and write copy
B80000
direct allocation
page read and write
75C000
unkown
page execute and read and write
74D000
unkown
page execute and write copy
614000
unkown
page execute and read and write
58A000
unkown
page readonly
55D000
unkown
page readonly
6E6000
unkown
page execute and write copy
5916000
heap
page read and write
617000
unkown
page execute and write copy
68C000
unkown
page execute and write copy
66B000
unkown
page execute and read and write
C10000
heap
page read and write
639000
unkown
page execute and write copy
612000
unkown
page execute and write copy
78B000
unkown
page execute and read and write
58F0000
heap
page read and write
621000
unkown
page execute and read and write
7B2000
unkown
page execute and write copy
401000
unkown
page execute read
5964000
heap
page read and write
59B000
unkown
page execute and read and write
612000
unkown
page execute and write copy
677000
unkown
page execute and read and write
401000
unkown
page execute read
2510000
direct allocation
page read and write
75E000
unkown
page execute and write copy
73D000
unkown
page execute and write copy
6F0000
unkown
page execute and read and write
640000
unkown
page execute and write copy
750000
unkown
page execute and write copy
D2E000
heap
page read and write
5905000
heap
page read and write
C6B000
heap
page read and write
743000
unkown
page execute and write copy
53EF000
stack
page read and write
6AA000
unkown
page execute and write copy
6DD000
unkown
page execute and write copy
6AB000
unkown
page execute and read and write
616000
unkown
page execute and read and write
715000
unkown
page execute and read and write
6B9000
unkown
page execute and read and write
6CD000
unkown
page execute and read and write
647000
unkown
page execute and write copy
695000
unkown
page execute and write copy
5932000
heap
page read and write
714000
unkown
page execute and write copy
5984000
heap
page read and write
6FC000
unkown
page execute and write copy
653000
unkown
page execute and read and write
728000
unkown
page execute and write copy
5ED000
unkown
page execute and write copy
BDB000
heap
page read and write
714000
unkown
page execute and write copy
5C4000
unkown
page execute and write copy
616000
unkown
page execute and read and write
64E000
unkown
page execute and write copy
6E0000
unkown
page execute and write copy
C5A000
heap
page read and write
653000
unkown
page execute and read and write
C1E000
heap
page read and write
D6A000
heap
page read and write
C7B000
heap
page read and write
78E000
unkown
page execute and write copy
400000
unkown
page readonly
747000
unkown
page execute and write copy
C89000
heap
page read and write
749000
unkown
page execute and write copy
630000
unkown
page execute and write copy
BD8000
heap
page read and write
601000
unkown
page execute and write copy
662000
unkown
page execute and read and write
7B2000
unkown
page execute and write copy
D92000
heap
page read and write
6FA000
unkown
page execute and write copy
5946000
heap
page read and write
5952000
heap
page read and write
6E4000
unkown
page execute and write copy
598000
unkown
page readonly
6FA000
unkown
page execute and write copy
5A3000
unkown
page execute and read and write
B60000
direct allocation
page read and write
5925000
heap
page read and write
C43000
heap
page read and write
6DF000
unkown
page execute and read and write
5C5000
unkown
page execute and read and write
617000
unkown
page execute and write copy
B70000
heap
page read and write
64D000
unkown
page execute and read and write
5BD000
unkown
page execute and read and write
74D000
unkown
page execute and write copy
C10000
heap
page read and write
6DF000
unkown
page execute and read and write
6B0000
unkown
page execute and write copy
647000
unkown
page execute and write copy
695000
unkown
page execute and write copy
60B000
unkown
page execute and write copy
5A4000
unkown
page execute and write copy
C84000
heap
page read and write
628000
unkown
page execute and write copy
C49000
heap
page read and write
59E000
unkown
page execute and write copy
C5A000
heap
page read and write
59B000
unkown
page execute and read and write
5F8000
unkown
page execute and write copy
C15000
heap
page read and write
C6B000
heap
page read and write
C8C000
heap
page read and write
5F1000
unkown
page execute and read and write
622000
unkown
page execute and write copy
662000
unkown
page execute and read and write
C1E000
heap
page read and write
75A000
unkown
page execute and write copy
5916000
heap
page read and write
57B0000
trusted library allocation
page read and write
D7B000
heap
page read and write
C5B000
heap
page read and write
68A000
unkown
page execute and write copy
703000
unkown
page execute and read and write
C62000
heap
page read and write
743000
unkown
page execute and write copy
764000
unkown
page execute and write copy
60E000
unkown
page execute and write copy
CF0000
heap
page read and write
689000
unkown
page execute and read and write
5916000
heap
page read and write
61B000
unkown
page execute and read and write
C5E000
heap
page read and write
C5D000
heap
page read and write
63D000
unkown
page execute and write copy
401000
unkown
page execute read
5530000
trusted library allocation
page read and write
596000
unkown
page read and write
758000
unkown
page execute and write copy
63D000
unkown
page execute and write copy
C8C000
heap
page read and write
758000
unkown
page execute and write copy
6B9000
unkown
page execute and read and write
C6B000
heap
page read and write
59F000
unkown
page execute and read and write
756000
unkown
page execute and write copy
6DA000
unkown
page execute and write copy
66F000
unkown
page execute and read and write
C6B000
heap
page read and write
62A000
unkown
page execute and write copy
6F9000
unkown
page execute and read and write
60C000
unkown
page execute and read and write
669000
unkown
page execute and write copy
69F000
unkown
page execute and write copy
541E000
stack
page read and write
73D000
unkown
page execute and write copy
D10000
remote allocation
page read and write
670000
unkown
page execute and write copy
C1A000
heap
page read and write
B7C000
heap
page read and write
C5D000
heap
page read and write
673000
unkown
page execute and read and write
4BDD000
stack
page read and write
6B9000
unkown
page execute and read and write
59E000
unkown
page execute and write copy
5AF000
unkown
page execute and read and write
752000
unkown
page execute and write copy
25B0000
heap
page read and write
767000
unkown
page execute and read and write
728000
unkown
page execute and write copy
6AE000
unkown
page execute and read and write
621000
unkown
page execute and read and write
4E3E000
stack
page read and write
26BF000
stack
page read and write
635000
unkown
page execute and read and write
6CD000
unkown
page execute and read and write
63E000
unkown
page execute and read and write
73B000
unkown
page execute and write copy
64A000
unkown
page execute and read and write
719000
unkown
page execute and write copy
585000
unkown
page write copy
BED000
heap
page read and write
5932000
heap
page read and write
65F000
unkown
page execute and read and write
6FB000
unkown
page execute and read and write
5F2000
unkown
page execute and write copy
678000
unkown
page execute and write copy
6F1000
unkown
page execute and write copy
C72000
heap
page read and write
5F5000
unkown
page execute and read and write
585000
unkown
page write copy
608000
unkown
page execute and write copy
709000
unkown
page execute and read and write
75C000
unkown
page execute and read and write
59A000
unkown
page execute and write copy
716000
unkown
page execute and write copy
E2A000
heap
page read and write
19A000
stack
page read and write
E15000
heap
page read and write
71C000
unkown
page execute and write copy
542E000
stack
page read and write
64E000
unkown
page execute and write copy
5922000
heap
page read and write
C42000
heap
page read and write
400000
unkown
page readonly
65D000
unkown
page execute and write copy
BB1000
heap
page read and write
6E2000
unkown
page execute and read and write
5BE000
unkown
page execute and write copy
656000
unkown
page execute and read and write
5EF000
unkown
page execute and write copy
756000
unkown
page execute and write copy
6BA000
unkown
page execute and write copy
737000
unkown
page execute and write copy
75E000
unkown
page execute and write copy
6E8000
unkown
page execute and read and write
E1E000
heap
page read and write
86B000
unkown
page execute and write copy
615000
unkown
page execute and write copy
83E000
unkown
page execute and read and write
5FC000
unkown
page execute and read and write
5AB000
unkown
page execute and write copy
5F5000
unkown
page execute and read and write
63D000
unkown
page execute and write copy
629000
unkown
page execute and read and write
5950000
heap
page read and write
645000
unkown
page execute and read and write
661000
unkown
page execute and write copy
E16000
heap
page read and write
696000
unkown
page execute and read and write
9F0000
heap
page read and write
668000
unkown
page execute and read and write
5ED000
unkown
page execute and write copy
5D0000
unkown
page execute and read and write
749000
unkown
page execute and write copy
739000
unkown
page execute and write copy
24F0000
direct allocation
page read and write
59F000
unkown
page execute and read and write
64E000
unkown
page execute and write copy
BCD000
heap
page read and write
715000
unkown
page execute and read and write
782000
unkown
page execute and write copy
656000
unkown
page execute and read and write
622000
unkown
page execute and write copy
724000
unkown
page execute and read and write
59B000
unkown
page execute and read and write
C24000
heap
page read and write
C35000
heap
page read and write
6AC000
unkown
page execute and write copy
5E6000
unkown
page execute and read and write
5EF000
unkown
page execute and write copy
71C000
unkown
page execute and write copy
5ED000
unkown
page execute and write copy
B80000
direct allocation
page read and write
5A3000
unkown
page execute and read and write
B60000
heap
page read and write
C8C000
heap
page read and write
70B000
unkown
page execute and write copy
754000
unkown
page execute and write copy
754000
unkown
page execute and write copy
5E1000
unkown
page execute and write copy
64A000
unkown
page execute and read and write
5AB000
unkown
page execute and write copy
5FF000
unkown
page execute and read and write
C5D000
heap
page read and write
70E000
unkown
page execute and read and write
59B000
unkown
page execute and read and write
C5D000
heap
page read and write
C03000
heap
page read and write
5F1000
unkown
page execute and read and write
6D8000
unkown
page execute and read and write
C83000
heap
page read and write
58D5000
heap
page read and write
5F2000
unkown
page execute and write copy
5E1000
unkown
page execute and write copy
5C5000
unkown
page execute and read and write
59E000
unkown
page execute and write copy
5FF000
unkown
page execute and read and write
721000
unkown
page execute and read and write
78B000
unkown
page execute and read and write
5957000
heap
page read and write
5964000
heap
page read and write
729000
unkown
page execute and read and write
6D3000
unkown
page execute and read and write
400000
unkown
page readonly
761000
unkown
page execute and write copy
C0F000
heap
page read and write
696000
unkown
page execute and read and write
6B8000
unkown
page execute and write copy
5B9000
unkown
page execute and write copy
57B0000
trusted library allocation
page read and write
741000
unkown
page execute and write copy
5A1000
unkown
page execute and write copy
552E000
stack
page read and write
19D000
stack
page read and write
C1E000
heap
page read and write
60E000
unkown
page execute and write copy
5B9000
unkown
page execute and write copy
5F2000
unkown
page execute and write copy
C6E000
heap
page read and write
6AC000
unkown
page execute and write copy
B5C000
heap
page read and write
5B6000
unkown
page execute and read and write
A85000
heap
page read and write
C84000
heap
page read and write
C1A000
heap
page read and write
69F000
unkown
page execute and write copy
6F7000
unkown
page execute and read and write
596000
unkown
page write copy
741000
unkown
page execute and write copy
6BE000
unkown
page execute and read and write
D4B000
heap
page read and write
6DB000
unkown
page execute and read and write
63D000
unkown
page execute and write copy
6E4000
unkown
page execute and write copy
647000
unkown
page execute and write copy
669000
unkown
page execute and write copy
73D000
unkown
page execute and write copy
401000
unkown
page execute read
694000
unkown
page execute and read and write
5531000
heap
page read and write
67B000
unkown
page execute and write copy
670000
unkown
page execute and write copy
63E000
unkown
page execute and read and write
C17000
heap
page read and write
59E000
unkown
page execute and write copy
5BD000
unkown
page execute and read and write
BFE000
heap
page read and write
642000
unkown
page execute and read and write
5915000
heap
page read and write
D40000
heap
page read and write
B70000
heap
page read and write
AB1000
heap
page read and write
71F000
unkown
page execute and read and write
5E0000
unkown
page execute and read and write
C8C000
heap
page read and write
643000
unkown
page execute and write copy
687000
unkown
page execute and write copy
75A000
unkown
page execute and write copy
52DE000
stack
page read and write
5D1000
unkown
page execute and write copy
5925000
heap
page read and write
74F000
unkown
page execute and read and write
635000
unkown
page execute and read and write
C2E000
heap
page read and write
83F000
unkown
page execute and write copy
55D000
unkown
page execute and read and write
65D000
unkown
page execute and write copy
E22000
heap
page read and write
5AF000
unkown
page execute and read and write
764000
unkown
page execute and write copy
C5C000
heap
page read and write
686000
unkown
page execute and read and write
6DB000
unkown
page execute and read and write
BBE000
heap
page read and write
C1E000
heap
page read and write
598000
unkown
page readonly
5C5000
unkown
page execute and read and write
585000
unkown
page read and write
5FE000
unkown
page execute and write copy
5F7000
unkown
page execute and read and write
5C5000
unkown
page execute and read and write
4B6F000
stack
page read and write
73F000
unkown
page execute and write copy
615000
unkown
page execute and write copy
594E000
heap
page read and write
5960000
heap
page read and write
5EC000
unkown
page execute and read and write
728000
unkown
page execute and write copy
70E000
unkown
page execute and read and write
BED000
heap
page read and write
7B9000
unkown
page execute and write copy
E1E000
heap
page read and write
C0A000
heap
page read and write
4ADE000
stack
page read and write
5520000
trusted library allocation
page read and write
7B9000
unkown
page execute and write copy
5AA000
unkown
page execute and read and write
86A000
unkown
page execute and read and write
5A1000
unkown
page execute and write copy
4DDD000
stack
page read and write
59A000
unkown
page execute and write copy
6C8000
unkown
page execute and read and write
58F2000
heap
page read and write
BA7000
heap
page read and write
719000
unkown
page execute and write copy
6F0000
unkown
page execute and read and write
BFD000
heap
page read and write
76E000
unkown
page execute and write copy
5932000
heap
page read and write
694000
unkown
page execute and read and write
6C9000
unkown
page execute and write copy
5AE000
unkown
page execute and write copy
BD6000
heap
page read and write
718000
unkown
page execute and read and write
5960000
heap
page read and write
6AC000
unkown
page execute and write copy
61B000
unkown
page execute and read and write
C09000
heap
page read and write
73F000
unkown
page execute and write copy
70E000
unkown
page execute and read and write
626000
unkown
page execute and read and write
743000
unkown
page execute and read and write
683000
unkown
page execute and write copy
C5A000
heap
page read and write
756000
unkown
page execute and write copy
B7C000
heap
page read and write
64D000
unkown
page execute and read and write
55D000
unkown
page execute and read and write
C89000
heap
page read and write
C8C000
heap
page read and write
6C1000
unkown
page execute and write copy
B60000
direct allocation
page read and write
B6F000
heap
page read and write
595E000
heap
page read and write
58A000
unkown
page readonly
B64000
heap
page read and write
9C0000
heap
page read and write
680000
unkown
page execute and read and write
58A000
unkown
page readonly
6F8000
unkown
page execute and write copy
2510000
direct allocation
page read and write
55D000
unkown
page readonly
689000
unkown
page execute and read and write
5AA000
unkown
page execute and read and write
714000
unkown
page execute and write copy
608000
unkown
page execute and write copy
5E6000
unkown
page execute and read and write
6FA000
unkown
page execute and write copy
6E5000
unkown
page execute and read and write
782000
unkown
page execute and write copy
D70000
heap
page read and write
647000
unkown
page execute and write copy
6BA000
unkown
page execute and write copy
767000
unkown
page execute and read and write
65A000
unkown
page execute and write copy
63B000
unkown
page execute and read and write
77F000
unkown
page execute and read and write
739000
unkown
page execute and write copy
724000
unkown
page execute and read and write
64A000
unkown
page execute and read and write
5DD000
unkown
page execute and write copy
400000
unkown
page readonly
595F000
heap
page read and write
65B000
unkown
page execute and read and write
C8A000
heap
page read and write
DDD000
heap
page read and write
607000
unkown
page execute and read and write
5916000
heap
page read and write
6CD000
unkown
page execute and read and write
65D000
unkown
page execute and write copy
58E0000
heap
page read and write
741000
unkown
page execute and write copy
5952000
heap
page read and write
6E2000
unkown
page execute and read and write
750000
unkown
page execute and write copy
622000
unkown
page execute and write copy
754000
unkown
page execute and write copy
5EE000
unkown
page execute and read and write
6E8000
unkown
page execute and read and write
5960000
heap
page read and write
6E6000
unkown
page execute and write copy
741000
unkown
page execute and write copy
5530000
heap
page read and write
639000
unkown
page execute and write copy
689000
unkown
page execute and read and write
C1C000
heap
page read and write
621000
unkown
page execute and read and write
739000
unkown
page execute and write copy
5B3000
unkown
page execute and write copy
696000
unkown
page execute and read and write
EA0000
trusted library allocation
page read and write
5FF000
unkown
page execute and read and write
C0A000
heap
page read and write
657000
unkown
page execute and write copy
BA5000
heap
page read and write
709000
unkown
page execute and read and write
658000
unkown
page execute and read and write
66B000
unkown
page execute and read and write
C89000
heap
page read and write
74D000
unkown
page execute and write copy
BFE000
heap
page read and write
75F000
unkown
page execute and read and write
D77000
heap
page read and write
653000
unkown
page execute and read and write
67A000
unkown
page execute and read and write
6A9000
unkown
page execute and read and write
77F000
unkown
page execute and read and write
6DA000
unkown
page execute and write copy
5530000
heap
page read and write
6E9000
unkown
page execute and write copy
715000
unkown
page execute and read and write
E16000
heap
page read and write
750000
unkown
page execute and write copy
7B2000
unkown
page execute and write copy
715000
unkown
page execute and read and write
73B000
unkown
page execute and write copy
400000
unkown
page readonly
5F9000
unkown
page execute and read and write
D10000
remote allocation
page read and write
5D0000
unkown
page execute and read and write
639000
unkown
page execute and write copy
669000
unkown
page execute and write copy
60B000
unkown
page execute and write copy
5952000
heap
page read and write
6DB000
unkown
page execute and read and write
70F000
unkown
page execute and write copy
86A000
unkown
page execute and read and write
5E6000
unkown
page execute and read and write
C84000
heap
page read and write
747000
unkown
page execute and write copy
6BE000
unkown
page execute and read and write
680000
unkown
page execute and read and write
68A000
unkown
page execute and write copy
761000
unkown
page execute and write copy
5932000
heap
page read and write
6E8000
unkown
page execute and read and write
74B000
unkown
page execute and write copy
5BD000
unkown
page execute and read and write
758000
unkown
page execute and read and write
77F000
unkown
page execute and read and write
D75000
heap
page read and write
C1A000
heap
page read and write
764000
unkown
page execute and write copy
718000
unkown
page execute and read and write
57B0000
trusted library allocation
page read and write
617000
unkown
page execute and write copy
55D000
unkown
page readonly
C6B000
heap
page read and write
69B000
unkown
page execute and read and write
686000
unkown
page execute and read and write
C5A000
heap
page read and write
718000
unkown
page execute and read and write
BD1000
heap
page read and write
5905000
heap
page read and write
78B000
unkown
page execute and read and write
BBE000
heap
page read and write
C5C000
heap
page read and write
C5A000
heap
page read and write
C72000
heap
page read and write
C5D000
heap
page read and write
741000
unkown
page execute and write copy
75F000
unkown
page execute and read and write
5916000
heap
page read and write
400000
unkown
page readonly
BD3000
heap
page read and write
661000
unkown
page execute and write copy
57B0000
trusted library allocation
page read and write
756000
unkown
page execute and write copy
C1A000
heap
page read and write
5984000
heap
page read and write
59A000
unkown
page execute and write copy
BFE000
heap
page read and write
747000
unkown
page execute and write copy
731000
unkown
page execute and read and write
719000
unkown
page execute and write copy
BB3000
heap
page read and write
60C000
unkown
page execute and read and write
6AA000
unkown
page execute and write copy
68B000
unkown
page execute and read and write
BFE000
heap
page read and write
608000
unkown
page execute and write copy
C66000
heap
page read and write
D73000
heap
page read and write
754000
unkown
page execute and write copy
5AD000
unkown
page execute and read and write
B59000
heap
page read and write
74B000
unkown
page execute and write copy
674000
unkown
page execute and write copy
752000
unkown
page execute and write copy
739000
unkown
page execute and write copy
5990000
heap
page read and write
C1C000
heap
page read and write
754000
unkown
page execute and write copy
5D1000
unkown
page execute and write copy
A7E000
stack
page read and write
2830000
remote allocation
page read and write
73D000
unkown
page execute and write copy
E13000
heap
page read and write
400000
unkown
page readonly
67A000
unkown
page execute and read and write
5530000
trusted library allocation
page read and write
5A3000
unkown
page execute and read and write
583000
unkown
page execute and read and write
626000
unkown
page execute and read and write
B80000
direct allocation
page read and write
5975000
heap
page read and write
BFE000
heap
page read and write
70B000
unkown
page execute and write copy
5B9000
unkown
page execute and write copy
4A6E000
stack
page read and write
610000
unkown
page execute and read and write
616000
unkown
page execute and read and write
654000
unkown
page execute and write copy
739000
unkown
page execute and write copy
602000
unkown
page execute and write copy
736000
unkown
page execute and read and write
BDB000
heap
page read and write
585000
unkown
page write copy
9C000
stack
page read and write
9B000
stack
page read and write
6E8000
unkown
page execute and read and write
598000
unkown
page readonly
C2E000
heap
page read and write
B64000
heap
page read and write
75A000
unkown
page execute and write copy
622000
unkown
page execute and write copy
5F8000
unkown
page execute and write copy
752000
unkown
page execute and write copy
6C8000
unkown
page execute and read and write
76E000
unkown
page execute and write copy
C72000
heap
page read and write
5990000
heap
page read and write
5933000
heap
page read and write
67A000
unkown
page execute and read and write
749000
unkown
page execute and write copy
739000
unkown
page execute and write copy
615000
unkown
page execute and write copy
59A000
unkown
page execute and write copy
B80000
direct allocation
page read and write
720000
unkown
page execute and write copy
694000
unkown
page execute and read and write
6F0000
unkown
page execute and read and write
4F3F000
stack
page read and write
6BA000
unkown
page execute and write copy
640000
unkown
page execute and write copy
6FC000
unkown
page execute and write copy
74D000
unkown
page execute and write copy
72A000
unkown
page execute and write copy
BB8000
heap
page read and write
595D000
heap
page read and write
D20000
heap
page read and write
6CB000
unkown
page execute and write copy
5DF000
unkown
page execute and write copy
76B000
unkown
page execute and read and write
E1E000
heap
page read and write
5916000
heap
page read and write
64E000
unkown
page execute and write copy
5C9000
unkown
page execute and write copy
5F8000
unkown
page execute and write copy
747000
unkown
page execute and write copy
658000
unkown
page execute and read and write
73F000
unkown
page execute and write copy
630000
unkown
page execute and write copy
BD1000
heap
page read and write
645000
unkown
page execute and read and write
AE0000
heap
page read and write
612000
unkown
page execute and write copy
692000
unkown
page execute and write copy
86B000
unkown
page execute and write copy
5DC000
unkown
page execute and read and write
C5A000
heap
page read and write
78E000
unkown
page execute and write copy
5D1000
unkown
page execute and write copy
C5D000
heap
page read and write
628000
unkown
page execute and write copy
739000
unkown
page execute and write copy
5D1000
unkown
page execute and write copy
628000
unkown
page execute and write copy
5DF000
unkown
page execute and write copy
D7B000
heap
page read and write
731000
unkown
page execute and read and write
5A9000
unkown
page execute and write copy
718000
unkown
page execute and read and write
C7B000
heap
page read and write
C84000
heap
page read and write
62F000
unkown
page execute and read and write
5E6000
unkown
page execute and read and write
74B000
unkown
page execute and write copy
19C000
stack
page read and write
C5A000
heap
page read and write
6E8000
unkown
page execute and read and write
C5A000
heap
page read and write
63E000
unkown
page execute and read and write
C1E000
heap
page read and write
B55000
heap
page read and write
5EE000
unkown
page execute and read and write
5FC000
unkown
page execute and read and write
DD6000
heap
page read and write
6B8000
unkown
page execute and write copy
5B6000
unkown
page execute and read and write
6D8000
unkown
page execute and read and write
5530000
trusted library allocation
page read and write
5DE000
unkown
page execute and read and write
758000
unkown
page execute and read and write
58A000
unkown
page readonly
728000
unkown
page execute and write copy
5E1000
unkown
page execute and write copy
BE5000
heap
page read and write
C59000
heap
page read and write
C84000
heap
page read and write
629000
unkown
page execute and read and write
674000
unkown
page execute and write copy
7B2000
unkown
page execute and write copy
58A000
unkown
page readonly
5A4000
unkown
page execute and write copy
732000
unkown
page execute and write copy
5BE000
unkown
page execute and write copy
6B9000
unkown
page execute and read and write
C49000
heap
page read and write
752000
unkown
page execute and write copy
654000
unkown
page execute and write copy
5EF000
unkown
page execute and write copy
BD1000
heap
page read and write
76A000
unkown
page execute and write copy
5933000
heap
page read and write
5932000
heap
page read and write
C5A000
heap
page read and write
C8C000
heap
page read and write
686000
unkown
page execute and read and write
6F7000
unkown
page execute and read and write
692000
unkown
page execute and write copy
B80000
direct allocation
page read and write
5932000
heap
page read and write
70E000
unkown
page execute and read and write
71F000
unkown
page execute and read and write
D5A000
heap
page read and write
6E9000
unkown
page execute and write copy
76B000
unkown
page execute and read and write
6DB000
unkown
page execute and read and write
750000
unkown
page execute and write copy
B40000
heap
page read and write
5C4000
unkown
page execute and write copy
594B000
heap
page read and write
66B000
unkown
page execute and read and write
636000
unkown
page execute and write copy
6BE000
unkown
page execute and read and write
9D0000
heap
page read and write
C5A000
heap
page read and write
BFE000
heap
page read and write
5BE000
unkown
page execute and write copy
6AA000
unkown
page execute and write copy
76A000
unkown
page execute and write copy
6B8000
unkown
page execute and write copy
6C9000
unkown
page execute and write copy
C84000
heap
page read and write
DA5000
heap
page read and write
662000
unkown
page execute and read and write
75F000
unkown
page execute and read and write
AEE000
stack
page read and write
7B2000
unkown
page execute and write copy
73F000
unkown
page execute and write copy
752000
unkown
page execute and write copy
5EE000
unkown
page execute and read and write
70F000
unkown
page execute and write copy
5947000
heap
page read and write
74D000
unkown
page execute and write copy
64B000
unkown
page execute and write copy
65B000
unkown
page execute and read and write
5DC000
unkown
page execute and read and write
63B000
unkown
page execute and read and write
6BE000
unkown
page execute and read and write
C5D000
heap
page read and write
5BF000
unkown
page execute and read and write
756000
unkown
page execute and write copy
5943000
heap
page read and write
598000
unkown
page readonly
5C5000
unkown
page execute and read and write
6CB000
unkown
page execute and write copy
5EE000
unkown
page execute and read and write
67B000
unkown
page execute and write copy
5955000
heap
page read and write
636000
unkown
page execute and write copy
B40000
direct allocation
page read and write
6CA000
unkown
page execute and read and write
720000
unkown
page execute and write copy
5DE000
unkown
page execute and read and write
C2F000
heap
page read and write
698000
unkown
page execute and write copy
C27000
heap
page read and write
758000
unkown
page execute and read and write
598000
unkown
page readonly
66F000
unkown
page execute and read and write
D62000
heap
page read and write
BCF000
heap
page read and write
4DFF000
stack
page read and write
614000
unkown
page execute and read and write
BB0000
heap
page read and write
D62000
heap
page read and write
C1E000
heap
page read and write
C89000
heap
page read and write
767000
unkown
page execute and read and write
C5C000
heap
page read and write
6F1000
unkown
page execute and write copy
596000
unkown
page read and write
B80000
heap
page read and write
5946000
heap
page read and write
5530000
trusted library allocation
page read and write
5AA000
unkown
page execute and read and write
C84000
heap
page read and write
683000
unkown
page execute and write copy
6E2000
unkown
page execute and read and write
6CB000
unkown
page execute and write copy
4F1F000
stack
page read and write
2830000
remote allocation
page read and write
6C1000
unkown
page execute and write copy
610000
unkown
page execute and read and write
BB1000
heap
page read and write
5AE000
unkown
page execute and write copy
2840000
heap
page read and write
401000
unkown
page execute read
62A000
unkown
page execute and write copy
722000
unkown
page execute and write copy
741000
unkown
page execute and write copy
5F7000
unkown
page execute and read and write
5DF000
unkown
page execute and write copy
686000
unkown
page execute and read and write
C59000
heap
page read and write
5AF000
unkown
page execute and read and write
C5A000
heap
page read and write
732000
unkown
page execute and write copy
76A000
unkown
page execute and write copy
9B000
stack
page read and write
5F7000
unkown
page execute and read and write
63D000
unkown
page execute and write copy
5F9000
unkown
page execute and read and write
749000
unkown
page execute and write copy
703000
unkown
page execute and read and write
4BBE000
stack
page read and write
5916000
heap
page read and write
709000
unkown
page execute and read and write
739000
unkown
page execute and write copy
722000
unkown
page execute and write copy
5FA000
unkown
page execute and write copy
656000
unkown
page execute and read and write
68A000
unkown
page execute and write copy
C41000
heap
page read and write
C1A000
heap
page read and write
C04000
heap
page read and write
B60000
direct allocation
page read and write
E1E000
heap
page read and write
5530000
trusted library allocation
page read and write
73F000
unkown
page execute and write copy
BFE000
heap
page read and write
C5A000
heap
page read and write
695000
unkown
page execute and write copy
C5C000
heap
page read and write
5949000
heap
page read and write
6FC000
unkown
page execute and write copy
607000
unkown
page execute and read and write
9C0000
heap
page read and write
5DC000
unkown
page execute and read and write
6F8000
unkown
page execute and write copy
6D6000
unkown
page execute and write copy
729000
unkown
page execute and read and write
71C000
unkown
page execute and write copy
ADD000
heap
page read and write
657000
unkown
page execute and write copy
2770000
heap
page read and write
704000
unkown
page execute and write copy
66C000
unkown
page execute and write copy
76A000
unkown
page execute and write copy
401000
unkown
page execute read
5B6000
unkown
page execute and read and write
70F000
unkown
page execute and write copy
C16000
heap
page read and write
716000
unkown
page execute and write copy
C89000
heap
page read and write
74B000
unkown
page execute and write copy
B40000
heap
page read and write
617000
unkown
page execute and write copy
26FE000
stack
page read and write
6FB000
unkown
page execute and read and write
61D000
unkown
page execute and write copy
6E9000
unkown
page execute and write copy
C7D000
heap
page read and write
5F6000
unkown
page execute and write copy
6F8000
unkown
page execute and write copy
73D000
unkown
page execute and write copy
5D0000
unkown
page execute and read and write
2690000
direct allocation
page read and write
5935000
heap
page read and write
6D8000
unkown
page execute and read and write
66C000
unkown
page execute and write copy
5F2000
unkown
page execute and write copy
607000
unkown
page execute and read and write
D8C000
heap
page read and write
5FE000
unkown
page execute and write copy
71A000
unkown
page execute and read and write
AE2000
heap
page read and write
713000
unkown
page execute and read and write
71A000
unkown
page execute and read and write
6B0000
unkown
page execute and write copy
752000
unkown
page execute and write copy
674000
unkown
page execute and write copy
C62000
heap
page read and write
67A000
unkown
page execute and read and write
C3D000
heap
page read and write
609000
unkown
page execute and read and write
C5D000
heap
page read and write
68B000
unkown
page execute and read and write
643000
unkown
page execute and write copy
626000
unkown
page execute and read and write
6B5000
unkown
page execute and read and write
5FA000
unkown
page execute and write copy
5530000
trusted library allocation
page read and write
C89000
heap
page read and write
75A000
unkown
page execute and write copy
C5A000
heap
page read and write
B00000
heap
page read and write
5DC000
unkown
page execute and read and write
6CE000
unkown
page execute and write copy
65D000
unkown
page execute and write copy
66C000
unkown
page execute and write copy
5DE000
unkown
page execute and read and write
6B9000
unkown
page execute and read and write
C84000
heap
page read and write
5F7000
unkown
page execute and read and write
B60000
direct allocation
page read and write
5957000
heap
page read and write
5932000
heap
page read and write
6B5000
unkown
page execute and read and write
7B2000
unkown
page execute and write copy
716000
unkown
page execute and write copy
65F000
unkown
page execute and read and write
C1C000
heap
page read and write
C1C000
heap
page read and write
C5E000
heap
page read and write
5D0000
unkown
page execute and read and write
76E000
unkown
page execute and write copy
5922000
heap
page read and write
720000
unkown
page execute and write copy
58DB000
heap
page read and write
721000
unkown
page execute and read and write
57B0000
trusted library allocation
page read and write
9C0000
heap
page read and write
678000
unkown
page execute and write copy
73B000
unkown
page execute and write copy
636000
unkown
page execute and write copy
5630000
trusted library allocation
page read and write
6AE000
unkown
page execute and read and write
698000
unkown
page execute and write copy
70F000
unkown
page execute and write copy
4A7E000
stack
page read and write
C6D000
heap
page read and write
58A000
unkown
page readonly
55D000
unkown
page readonly
BB8000
heap
page read and write
4851000
heap
page read and write
59F000
unkown
page execute and read and write
601000
unkown
page execute and write copy
64B000
unkown
page execute and write copy
C89000
heap
page read and write
761000
unkown
page execute and write copy
27E0000
heap
page read and write
A80000
heap
page read and write
74F000
unkown
page execute and read and write
72A000
unkown
page execute and write copy
6B5000
unkown
page execute and read and write
BFE000
heap
page read and write
673000
unkown
page execute and read and write
73F000
unkown
page execute and write copy
5AE000
unkown
page execute and write copy
5FA000
unkown
page execute and write copy
27CE000
stack
page read and write
6E6000
unkown
page execute and write copy
621000
unkown
page execute and read and write
61D000
unkown
page execute and write copy
598000
unkown
page readonly
D80000
heap
page read and write
6CA000
unkown
page execute and read and write
6AA000
unkown
page execute and write copy
5C9000
unkown
page execute and write copy
74B000
unkown
page execute and write copy
6C9000
unkown
page execute and write copy
6F9000
unkown
page execute and read and write
6DD000
unkown
page execute and write copy
67B000
unkown
page execute and write copy
5990000
heap
page read and write
78B000
unkown
page execute and read and write
5530000
trusted library allocation
page read and write
6DF000
unkown
page execute and read and write
7B9000
unkown
page execute and write copy
69B000
unkown
page execute and read and write
6CA000
unkown
page execute and read and write
5DD000
unkown
page execute and write copy
714000
unkown
page execute and write copy
5530000
trusted library allocation
page read and write
75A000
unkown
page execute and write copy
73D000
unkown
page execute and write copy
6F7000
unkown
page execute and read and write
47F1000
heap
page read and write
758000
unkown
page execute and read and write
6DA000
unkown
page execute and write copy
6F7000
unkown
page execute and read and write
A10000
heap
page read and write
C37000
heap
page read and write
5943000
heap
page read and write
731000
unkown
page execute and read and write
657000
unkown
page execute and write copy
6D8000
unkown
page execute and read and write
74D000
unkown
page execute and write copy
64E000
unkown
page execute and write copy
5933000
heap
page read and write
729000
unkown
page execute and read and write
76E000
unkown
page execute and write copy
5E0000
unkown
page execute and read and write
764000
unkown
page execute and write copy
6D6000
unkown
page execute and write copy
86B000
unkown
page execute and write copy
73B000
unkown
page execute and write copy
5989000
heap
page read and write
598000
unkown
page readonly
66F000
unkown
page execute and read and write
D18000
heap
page read and write
75F000
unkown
page execute and read and write
5942000
heap
page read and write
607000
unkown
page execute and read and write
5932000
heap
page read and write
5916000
heap
page read and write
400000
unkown
page readonly
71F000
unkown
page execute and read and write
4B7D000
stack
page read and write
BE5000
heap
page read and write
ACC000
heap
page read and write
761000
unkown
page execute and write copy
58DC000
heap
page read and write
57B0000
trusted library allocation
page read and write
598000
unkown
page readonly
5C4000
unkown
page execute and write copy
9C0000
heap
page read and write
736000
unkown
page execute and read and write
5BF000
unkown
page execute and read and write
692000
unkown
page execute and write copy
756000
unkown
page execute and write copy
7B9000
unkown
page execute and write copy
689000
unkown
page execute and read and write
6C9000
unkown
page execute and write copy
59A000
unkown
page execute and write copy
69B000
unkown
page execute and read and write
692000
unkown
page execute and write copy
76B000
unkown
page execute and read and write
645000
unkown
page execute and read and write
764000
unkown
page execute and write copy
73D000
unkown
page execute and write copy
C1E000
heap
page read and write
59A000
unkown
page execute and write copy
741000
unkown
page execute and write copy
D6C000
heap
page read and write
9C000
stack
page read and write
74B000
unkown
page execute and write copy
C0F000
heap
page read and write
694000
unkown
page execute and read and write
5AB000
unkown
page execute and write copy
AE8000
heap
page read and write
5946000
heap
page read and write
6B0000
unkown
page execute and write copy
585000
unkown
page read and write
5984000
heap
page read and write
5EC000
unkown
page execute and read and write
C1A000
heap
page read and write
C10000
heap
page read and write
5FA000
unkown
page execute and write copy
6FA000
unkown
page execute and write copy
65A000
unkown
page execute and write copy
C1A000
heap
page read and write
C1E000
heap
page read and write
6E6000
unkown
page execute and write copy
C5D000
heap
page read and write
5AC000
unkown
page execute and read and write
D75000
heap
page read and write
764000
unkown
page execute and write copy
AA0000
heap
page read and write
5AE000
unkown
page execute and write copy
754000
unkown
page execute and write copy
654000
unkown
page execute and write copy
57B0000
trusted library allocation
page read and write
670000
unkown
page execute and write copy
761000
unkown
page execute and write copy
61B000
unkown
page execute and read and write
614000
unkown
page execute and read and write
7B2000
unkown
page execute and write copy
71A000
unkown
page execute and read and write
709000
unkown
page execute and read and write
729000
unkown
page execute and read and write
C8A000
heap
page read and write
C1B000
heap
page read and write
C5E000
heap
page read and write
5A9000
unkown
page execute and write copy
BFE000
heap
page read and write
4CDF000
stack
page read and write
5A1000
unkown
page execute and write copy
739000
unkown
page execute and write copy
6DB000
unkown
page execute and read and write
6AB000
unkown
page execute and read and write
5E1000
unkown
page execute and write copy
6CA000
unkown
page execute and read and write
24F0000
heap
page read and write
62A000
unkown
page execute and write copy
749000
unkown
page execute and write copy
696000
unkown
page execute and read and write
5AF000
unkown
page execute and read and write
5E0000
unkown
page execute and read and write
673000
unkown
page execute and read and write
6F1000
unkown
page execute and write copy
5A4000
unkown
page execute and write copy
C1E000
heap
page read and write
643000
unkown
page execute and write copy
709000
unkown
page execute and read and write
668000
unkown
page execute and read and write
5530000
trusted library allocation
page read and write
BFE000
heap
page read and write
761000
unkown
page execute and write copy
75F000
unkown
page execute and read and write
73B000
unkown
page execute and write copy
86A000
unkown
page execute and read and write
BB9000
heap
page read and write
639000
unkown
page execute and write copy
C03000
heap
page read and write
782000
unkown
page execute and write copy
5EA000
unkown
page execute and write copy
596000
unkown
page read and write
65F000
unkown
page execute and read and write
64A000
unkown
page execute and read and write
5FF000
unkown
page execute and read and write
63B000
unkown
page execute and read and write
585000
unkown
page read and write
6B8000
unkown
page execute and write copy
74B000
unkown
page execute and write copy
BBE000
heap
page read and write
D5C000
heap
page read and write
596000
unkown
page read and write
5C9000
unkown
page execute and write copy
683000
unkown
page execute and write copy
5D7000
unkown
page execute and write copy
C8F000
heap
page read and write
6AE000
unkown
page execute and read and write
C17000
heap
page read and write
767000
unkown
page execute and read and write
68A000
unkown
page execute and write copy
750000
unkown
page execute and write copy
5916000
heap
page read and write
C17000
heap
page read and write
5DD000
unkown
page execute and write copy
57B0000
trusted library allocation
page read and write
78B000
unkown
page execute and read and write
C89000
heap
page read and write
669000
unkown
page execute and write copy
C03000
heap
page read and write
6CE000
unkown
page execute and write copy
DBE000
heap
page read and write
C5D000
heap
page read and write
637000
unkown
page execute and read and write
764000
unkown
page execute and write copy
6A9000
unkown
page execute and read and write
721000
unkown
page execute and read and write
BFD000
heap
page read and write
A30000
heap
page read and write
585000
unkown
page write copy
6BE000
unkown
page execute and read and write
A3E000
stack
page read and write
C0A000
heap
page read and write
63B000
unkown
page execute and read and write
60B000
unkown
page execute and write copy
743000
unkown
page execute and read and write
BE5000
heap
page read and write
C1A000
heap
page read and write
AFB000
heap
page read and write
18E000
stack
page read and write
52EE000
stack
page read and write
736000
unkown
page execute and read and write
585000
unkown
page write copy
70B000
unkown
page execute and write copy
5F2000
unkown
page execute and write copy
B60000
direct allocation
page read and write
E14000
heap
page read and write
5A5000
unkown
page execute and read and write
6D3000
unkown
page execute and read and write
59B000
unkown
page execute and read and write
9B000
stack
page read and write
761000
unkown
page execute and write copy
83E000
unkown
page execute and read and write
614000
unkown
page execute and read and write
6E4000
unkown
page execute and write copy
594B000
heap
page read and write
5952000
heap
page read and write
6AC000
unkown
page execute and write copy
6D3000
unkown
page execute and read and write
5F7000
unkown
page execute and read and write
26B0000
direct allocation
page read and write
CFA000
heap
page read and write
B60000
direct allocation
page read and write
5C4000
unkown
page execute and write copy
74D000
unkown
page execute and write copy
64B000
unkown
page execute and write copy
761000
unkown
page execute and write copy
6CD000
unkown
page execute and read and write
6C8000
unkown
page execute and read and write
747000
unkown
page execute and write copy
57B0000
trusted library allocation
page read and write
66F000
unkown
page execute and read and write
5AE000
unkown
page execute and write copy
B08000
heap
page read and write
64D000
unkown
page execute and read and write
4CFE000
stack
page read and write
5AB000
unkown
page execute and write copy
5964000
heap
page read and write
C8A000
heap
page read and write
6F1000
unkown
page execute and write copy
BE5000
heap
page read and write
6E2000
unkown
page execute and read and write
5933000
heap
page read and write
635000
unkown
page execute and read and write
C3D000
heap
page read and write
BED000
heap
page read and write
695000
unkown
page execute and write copy
645000
unkown
page execute and read and write
59A000
unkown
page execute and write copy
752000
unkown
page execute and write copy
There are 1986 hidden memdumps, click here to show them.