IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_a3b8183025e5d33eb444661acef6d25a49d72c_864df792_412fbb62-31c0-4596-812f-113c8ca72d34\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\userGCAFCAFHJJ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\build[1].exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\pered[1].exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\buildred[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\crypteda[1].exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\gawdth[1].exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\2[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\2020[1].exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\25072023[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\5447jsX[1].exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\crypted[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\MonsterUpdateService\Monster.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000001001\build.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000002001\crypted.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000003001\5447jsX.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000004001\crypteda.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000005001\2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000009001\25072023.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000010001\pered.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000012001\2020.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000014001\gawdth.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000027001\buildred.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\2ED92742-89DC-DD72-92E8-869FA5A66493\Browsers\Cookies.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\2ED92742-89DC-DD72-92E8-869FA5A66493\Browsers\Firefox\History.txt
Unicode text, UTF-8 text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\2ED92742-89DC-DD72-92E8-869FA5A66493\network_info.txt
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\2ED92742-89DC-DD72-92E8-869FA5A66493\process_info.txt
ASCII text, with CRLF, CR line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\2ED92742-89DC-DD72-92E8-869FA5A66493\system_info.txt
Algol 68 source, ASCII text, with CRLF, CR line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\_asyncio.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\_cffi_backend.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\_multiprocessing.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\_overlapped.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\_sqlite3.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\_uuid.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\aiohttp\_helpers.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\aiohttp\_http_parser.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\aiohttp\_http_writer.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\aiohttp\_websocket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\charset_normalizer\md.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\charset_normalizer\md__mypyc.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\cryptography\hazmat\bindings\_rust.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\frozenlist\_frozenlist.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\libcrypto-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\libssl-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\multidict\_multidict.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\pyexpat.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\python3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\python310.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\sqlite3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\stub.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\vcruntime140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\yarl\_quoting_c.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\RoamingIDBGHDGHCG.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\AAFHIIDHJEBFBFIDAKFB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\AEGHCFIDAKJEBGCAFBAE
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\AFIIIIJKFCAAECAKFIEH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\BAKEBAFI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\DAEGIDHD
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\ProgramData\DHIDHIEGIIIECAKEBFBAAEBKFC
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\ECBGCGCGIEGCBFHIIEBFCAFHIE
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\EHCFBFBAEBKJKEBGCAEHCFCBAE
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\ProgramData\FIIEGDBAEBFIIDHJJJEBAAAKJE
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\HIDHIEGIIIECAKEBFBAAEBKFCF
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\HIJJEGDBFIIDGCAKJEBK
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\HJDAKFBFBFBAAAAAEBKJEBKJEG
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\ProgramData\IDGDAAKFHIEHIECAFBAA
ASCII text, with very long lines (1743), with CRLF line terminators
dropped
C:\ProgramData\IIDHJKFBGIIJJKFIJDBG
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\IJDBGDGC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\JJJJEBGDAFHJEBGDGIJDHCAKJK
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KECFIDGC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KFBFCAFCBKFIEBFHIDBAKJJJJE
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_97a671ae5d.exe_7dcb868ca26e3aae60ffda4dccee10c0a07bb282_b2579906_72f508e7-538a-4aa3-9aa5-782ae425d0c5\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_97a671ae5d.exe_7dcb868ca26e3aae60ffda4dccee10c0a07bb282_b2579906_82289d7c-8e0e-4049-9eb7-7e6b356408d9\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9EEA.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Jul 26 23:43:08 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9F58.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9F88.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCAEB.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Jul 26 23:43:19 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCB88.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCBD8.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE1D3.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Jul 26 23:42:20 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE407.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE427.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\2ED92742-89DC-DD72-92E8-869FA5A66493.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\AutofillData.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\Cookies.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\DownloadData.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\HistoryData.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\Logins.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\Web.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_03hci5ss.42y.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w1idcepj.q44.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\j18m2gel
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\libffi-7.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite-shm
data
dropped
C:\Windows\Tasks\axplong.job
data
dropped
C:\Windows\Tasks\explorti.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 124 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\user\AppData\RoamingIDBGHDGHCG.exe"
malicious
C:\Users\user\AppData\RoamingIDBGHDGHCG.exe
"C:\Users\user\AppData\RoamingIDBGHDGHCG.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\userGCAFCAFHJJ.exe"
malicious
C:\Users\userGCAFCAFHJJ.exe
"C:\Users\userGCAFCAFHJJ.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
"C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
C:\Users\user\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
malicious
C:\Users\user\AppData\Local\Temp\1000016001\97a671ae5d.exe
"C:\Users\user\AppData\Local\Temp\1000016001\97a671ae5d.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000017001\342db65350.exe
"C:\Users\user\AppData\Local\Temp\1000017001\342db65350.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000001001\build.exe
"C:\Users\user\AppData\Local\Temp\1000001001\build.exe"
malicious
C:\Users\user\AppData\Local\Temp\onefile_3032_133665109925829724\stub.exe
"C:\Users\user\AppData\Local\Temp\1000001001\build.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "ver"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist"
malicious
C:\Users\user\AppData\Local\Temp\1000002001\crypted.exe
"C:\Users\user\AppData\Local\Temp\1000002001\crypted.exe"
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic csproduct get uuid
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000016001\97a671ae5d.exe
"C:\Users\user\AppData\Local\Temp\1000016001\97a671ae5d.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000003001\5447jsX.exe
"C:\Users\user\AppData\Local\Temp\1000003001\5447jsX.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\user\AppData\Local\MonsterUpdateService\Monster.exe""
malicious
C:\Windows\System32\attrib.exe
attrib +h +s "C:\Users\user\AppData\Local\MonsterUpdateService\Monster.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('%error_message%', 0, 'System Error', 0+16);close()""
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /IM chrome.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "chcp"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "chcp"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"
malicious
C:\Users\user\AppData\Local\Temp\1000004001\crypteda.exe
"C:\Users\user\AppData\Local\Temp\1000004001\crypteda.exe"
malicious
C:\Windows\System32\systeminfo.exe
systeminfo
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "netsh wlan show profiles"
malicious
C:\Windows\System32\netsh.exe
netsh wlan show profiles
malicious
C:\Windows\System32\wbem\WMIC.exe
wmic logicaldisk get caption,description,providername
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6456 -s 2260
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7188 -s 1040
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\taskkill.exe
taskkill /F /IM chrome.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7332 -s 1320
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist /FO LIST
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe Get-Clipboard
C:\Windows\System32\chcp.com
chcp
C:\Windows\System32\chcp.com
chcp
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\HOSTNAME.EXE
hostname
There are 54 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
http://85.28.47.31/8405906461a5200c/vcruntime140.dll
unknown
https://account.riotgames.com/api/account/v1/user
unknown
https://duckduckgo.com/ac/?q=
unknown
https://github.com/pyca/cryptography/issues/8996
unknown
https://github.com/python-attrs/attrs/issues/251
unknown
https://tiktok.com/
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://github.com/aio-libs/aiohttp/discussions/6044
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
http://python.org
unknown
https://python.org/dev/peps/pep-0263/
unknown
https://github.com/sponsors/hynek
unknown
https://oauth.reddit.com/api/v1/me
unknown
http://185.215.113.19/Vi9leo/index.php0_
unknown
https://www.attrs.org/en/23.2.0/_static/sponsors/FilePreviews.svg
unknown
http://185.215.113.19/ows
unknown
https://github.com/python-attrs/attrs/issues/1200)
unknown
http://185.215.113.19/Vi9leo/index.php
unknown
https://coe.com.vn/tmp/2.exefdm
unknown
http://ip-api.com/jsonacityatimezoneaispaorgaasuMain.GetNetworkInfoT
unknown
https://restores.name/logaYMOVKJ1WAP6PFLQqz
unknown
http://185.215.113.19/Local
unknown
http://85.28.47.31/ro2s
unknown
https://discord.com/api/v9/users/
unknown
http://85.28.47.31/8405906461a5200c/softokn3.dllAw
unknown
https://github.com/python-attrs/attrs/issues/136
unknown
https://www.tiktok.com/passport/web/account/info/?aid=1459&app_language=de-DE&app_name=tiktok_web&ba
unknown
http://curl.haxx.se/rfc/cookie_spec.html
unknown
http://speleotrove.com/decimal/decarith.html
unknown
http://docs.python.org/3/library/subprocess#subprocess.Popen.returncode
unknown
http://185.215.113.16/Jo89Ku7d/index.php4z
unknown
http://json.org
unknown
https://zopeinterface.readthedocs.io/en/latest/
unknown
https://open.spotify.com/user/u
unknown
http://185.215.113.16/stealc/random.exencodedcgN
unknown
http://85.28.47.31/8405906461a5200c/softokn3.dll
unknown
http://185.215.113.16/inc/25072023.exe
unknown
http://185.215.113.19/c0f9c30b4baed74c61395d7fac00b58987e8fcf7b8c730804042ba5ce902415450#3.
unknown
https://twitter.com/i/api/1.1/account/update_profile.jsonareqadescriptionuThere
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://85.28.47.31/8405906461a5200c/nss3.dll
unknown
https://cryptography.io/en/latest/faq/#why-can-t-i-import-my-pem-file
unknown
http://www.cl.cam.ac.uk/~mgk25/iso-time.html
unknown
http://185.215.113.16/inc/buildred.exeL
unknown
https://api.steampowered.com/IPlayerService/GetOwnedGames/v1/?key=440D7F4D810EF9298D25EDDF37C1F902&s
unknown
http://185.215.113.16/inc/gawdth.exelF~n#
unknown
https://filepreviews.io/
unknown
https://www.ecosia.org/newtab/
unknown
http://85.28.47.31lN$KsW5
unknown
https://tidelift.com/subscription/pkg/pypi-attrs?utm_source=pypi-attrs&utm_medium=referral&utm_campa
unknown
https://www.attrs.org/en/stable/changelog.html
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
unknown
https://www.variomedia.de/
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm
unknown
https://github.com/pyca/cryptography/issues
unknown
https://www.attrs.org/
unknown
https://mahler:8092/site-updates.py
unknown
http://85.28.47.31/5499d72b3i
unknown
http://85.28.47.31/8405906461a5200c/msvcp140.dllR
unknown
https://github.com/python-attrs/attrs/issues/1203)
unknown
https://www.attrs.org/en/23.2.0/_static/sponsors/Tidelift.svg
unknown
https://discord.gg/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://ip-api.com/json
unknown
https://www.attrs.org/en/latest/glossary.html#term-dunder-methods)).
unknown
http://185.215.113.19/fac00b58987e8fcf7b8c730804042ba5ce902415453
unknown
https://www.spotify.com/api/account-settings/v1/profile
unknown
http://185.215.113.16/inc/5447jsX.exed
unknown
https://github.com/python-attrs/attrs/issues/1187)
unknown
http://185.215.113.16/inc/crypted.exeo
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://85.28.47.31/5499d72b3a3e55be.php=U
unknown
http://85.28.47.31/8405906461a5200c/nss3.dllll
unknown
https://github.com/pyca/cryptography/issues/9253
unknown
https://www.attrs.org/en/stable/changelog.html)
unknown
http://www.iana.org/time-zones/repository/tz-link.html
unknown
https://www.youtube.com/accountt%
unknown
http://185.215.113.19/c0f9c30b4baed74c61395d7fac00b58987e8fcf7b8c730804042ba5ce902415450#U.
unknown
https://www.attrs.org/en/stable/comparison.html#customization)
unknown
http://185.215.113.16/Jo89Ku7d/index.php32
unknown
https://raw.githubusercontent.com/justforMonster/injection/main/injection.js
unknown
https://www.youtube.com/account.NK
unknown
http://code.activestate.com/recipes/577452-a-memoize-decorator-for-instance-methods/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://185.215.113.16/inc/gawdth.exe
unknown
https://github.com/python-attrs/attrs/blob/main/.github/CONTRIBUTING.md)
unknown
https://t.me/monster_free_cloud----------------------
unknown
https://github.com/python-attrs/attrs/issues/1172)
unknown
https://www.python.org/
unknown
http://85.28.47.31/pr
unknown
http://185.215.113.16/inc/pered.exe
unknown
http://185.215.113.19/Vi9leo/index.php17001
unknown
https://gql.twitch.tv/gql
unknown
https://discord.com/api/v8/guilds/
unknown
https://www.python.org/dev/peps/pep-0205/
unknown
https://twitter.com/
unknown
http://185.215.113.16/Jo89Ku7d/index.phpTemp
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.16
unknown
Portugal
malicious
20.52.165.210
unknown
United States
malicious
85.28.47.70
unknown
Russian Federation
malicious
85.28.47.31
unknown
Russian Federation
185.215.113.19
unknown
Portugal
20.189.173.22
unknown
United States
20.189.173.21
unknown
United States
208.95.112.1
unknown
United States
185.199.109.133
unknown
Netherlands
20.42.73.29
unknown
United States
103.28.36.182
unknown
Viet Nam
89.248.174.171
unknown
Netherlands
127.0.0.1
unknown
unknown
There are 3 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
\REGISTRY\A\{b5946fc8-ed0f-b337-bd35-e0da7d95bf1f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
malicious
\REGISTRY\A\{b5946fc8-ed0f-b337-bd35-e0da7d95bf1f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
malicious
\REGISTRY\A\{b5946fc8-ed0f-b337-bd35-e0da7d95bf1f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
malicious
\REGISTRY\A\{b5946fc8-ed0f-b337-bd35-e0da7d95bf1f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
malicious
\REGISTRY\A\{b5946fc8-ed0f-b337-bd35-e0da7d95bf1f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
malicious
\REGISTRY\A\{b5946fc8-ed0f-b337-bd35-e0da7d95bf1f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
malicious
\REGISTRY\A\{b5946fc8-ed0f-b337-bd35-e0da7d95bf1f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
malicious
\REGISTRY\A\{b5946fc8-ed0f-b337-bd35-e0da7d95bf1f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
malicious
\REGISTRY\A\{b5946fc8-ed0f-b337-bd35-e0da7d95bf1f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
malicious
\REGISTRY\A\{b5946fc8-ed0f-b337-bd35-e0da7d95bf1f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
malicious
\REGISTRY\A\{b5946fc8-ed0f-b337-bd35-e0da7d95bf1f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
malicious
\REGISTRY\A\{b5946fc8-ed0f-b337-bd35-e0da7d95bf1f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
malicious
\REGISTRY\A\{b5946fc8-ed0f-b337-bd35-e0da7d95bf1f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
malicious
\REGISTRY\A\{b5946fc8-ed0f-b337-bd35-e0da7d95bf1f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
malicious
\REGISTRY\A\{b5946fc8-ed0f-b337-bd35-e0da7d95bf1f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
malicious
\REGISTRY\A\{b5946fc8-ed0f-b337-bd35-e0da7d95bf1f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
malicious
\REGISTRY\A\{b5946fc8-ed0f-b337-bd35-e0da7d95bf1f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
malicious
\REGISTRY\A\{b5946fc8-ed0f-b337-bd35-e0da7d95bf1f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
malicious
\REGISTRY\A\{b5946fc8-ed0f-b337-bd35-e0da7d95bf1f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
97a671ae5d.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
342db65350.exe
malicious
\REGISTRY\A\{38cc4e5b-e504-7ec0-6a77-21be4debee1e}\Root\InventoryApplicationFile\97a671ae5d.exe|4ca05c607703826b
ProgramId
\REGISTRY\A\{38cc4e5b-e504-7ec0-6a77-21be4debee1e}\Root\InventoryApplicationFile\97a671ae5d.exe|4ca05c607703826b
FileId
\REGISTRY\A\{38cc4e5b-e504-7ec0-6a77-21be4debee1e}\Root\InventoryApplicationFile\97a671ae5d.exe|4ca05c607703826b
LowerCaseLongPath
\REGISTRY\A\{38cc4e5b-e504-7ec0-6a77-21be4debee1e}\Root\InventoryApplicationFile\97a671ae5d.exe|4ca05c607703826b
LongPathHash
\REGISTRY\A\{38cc4e5b-e504-7ec0-6a77-21be4debee1e}\Root\InventoryApplicationFile\97a671ae5d.exe|4ca05c607703826b
Name
\REGISTRY\A\{38cc4e5b-e504-7ec0-6a77-21be4debee1e}\Root\InventoryApplicationFile\97a671ae5d.exe|4ca05c607703826b
OriginalFileName
\REGISTRY\A\{38cc4e5b-e504-7ec0-6a77-21be4debee1e}\Root\InventoryApplicationFile\97a671ae5d.exe|4ca05c607703826b
Publisher
\REGISTRY\A\{38cc4e5b-e504-7ec0-6a77-21be4debee1e}\Root\InventoryApplicationFile\97a671ae5d.exe|4ca05c607703826b
Version
\REGISTRY\A\{38cc4e5b-e504-7ec0-6a77-21be4debee1e}\Root\InventoryApplicationFile\97a671ae5d.exe|4ca05c607703826b
BinFileVersion
\REGISTRY\A\{38cc4e5b-e504-7ec0-6a77-21be4debee1e}\Root\InventoryApplicationFile\97a671ae5d.exe|4ca05c607703826b
BinaryType
\REGISTRY\A\{38cc4e5b-e504-7ec0-6a77-21be4debee1e}\Root\InventoryApplicationFile\97a671ae5d.exe|4ca05c607703826b
ProductName
\REGISTRY\A\{38cc4e5b-e504-7ec0-6a77-21be4debee1e}\Root\InventoryApplicationFile\97a671ae5d.exe|4ca05c607703826b
ProductVersion
\REGISTRY\A\{38cc4e5b-e504-7ec0-6a77-21be4debee1e}\Root\InventoryApplicationFile\97a671ae5d.exe|4ca05c607703826b
LinkDate
\REGISTRY\A\{38cc4e5b-e504-7ec0-6a77-21be4debee1e}\Root\InventoryApplicationFile\97a671ae5d.exe|4ca05c607703826b
BinProductVersion
\REGISTRY\A\{38cc4e5b-e504-7ec0-6a77-21be4debee1e}\Root\InventoryApplicationFile\97a671ae5d.exe|4ca05c607703826b
AppxPackageFullName
\REGISTRY\A\{38cc4e5b-e504-7ec0-6a77-21be4debee1e}\Root\InventoryApplicationFile\97a671ae5d.exe|4ca05c607703826b
AppxPackageRelativeId
\REGISTRY\A\{38cc4e5b-e504-7ec0-6a77-21be4debee1e}\Root\InventoryApplicationFile\97a671ae5d.exe|4ca05c607703826b
Size
\REGISTRY\A\{38cc4e5b-e504-7ec0-6a77-21be4debee1e}\Root\InventoryApplicationFile\97a671ae5d.exe|4ca05c607703826b
Language
\REGISTRY\A\{38cc4e5b-e504-7ec0-6a77-21be4debee1e}\Root\InventoryApplicationFile\97a671ae5d.exe|4ca05c607703826b
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018400F27E67BA7
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\mlang.dll,-4387
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\mlang.dll,-4407
There are 41 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4AB0000
direct allocation
page read and write
malicious
D51000
unkown
page execute and read and write
malicious
361000
unkown
page execute and read and write
malicious
31F5000
trusted library allocation
page read and write
malicious
5520000
direct allocation
page read and write
malicious
281000
unkown
page execute and read and write
malicious
26EE000
heap
page read and write
malicious
6FC000
unkown
page read and write
malicious
D51000
unkown
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
7FF725AE6000
unkown
page readonly
malicious
4AB0000
direct allocation
page read and write
malicious
51A0000
direct allocation
page read and write
malicious
7FF725AE6000
unkown
page readonly
malicious
F0A000
heap
page read and write
malicious
2617000
heap
page read and write
malicious
4B40000
direct allocation
page read and write
malicious
281000
unkown
page execute and read and write
malicious
5540000
direct allocation
page read and write
malicious
D51000
unkown
page execute and read and write
malicious
50D0000
direct allocation
page read and write
malicious
2607000
heap
page read and write
malicious
20780A2D000
heap
page read and write
malicious
2E1000
unkown
page execute and read and write
malicious
CF0000
heap
page read and write
5320000
direct allocation
page execute and read and write
400000
unkown
page readonly
4E61000
heap
page read and write
4E61000
heap
page read and write
915D000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
27CF000
stack
page read and write
1ED000
unkown
page readonly
29382CD6000
heap
page read and write
25EA000
heap
page read and write
1FB8000
heap
page read and write
CC4000
heap
page read and write
DE6000
heap
page read and write
20E75173000
heap
page read and write
56C0000
direct allocation
page execute and read and write
4E61000
heap
page read and write
2606C6B0000
heap
page read and write
2606E860000
direct allocation
page read and write
4E61000
heap
page read and write
1470000
heap
page read and write
1744000
heap
page read and write
BD2B1AE000
stack
page read and write
370F000
stack
page read and write
29384B62000
heap
page read and write
CC5000
heap
page read and write
2EF30000
heap
page read and write
C20000
direct allocation
page read and write
29382CF8000
heap
page read and write
244C000
unkown
page readonly
403F000
stack
page read and write
101C000
unkown
page execute and read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
4BDF000
stack
page read and write
29382CF0000
heap
page read and write
51C0000
trusted library allocation
page read and write
CC4000
heap
page read and write
4ABE000
stack
page read and write
7FF8B27B1000
unkown
page execute read
4D21000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
DB9000
unkown
page write copy
280000
unkown
page readonly
2938316A000
heap
page read and write
13C0000
direct allocation
page read and write
3BFF000
stack
page read and write
7FF8A7AC0000
unkown
page readonly
2606F17B000
heap
page read and write
CC4000
heap
page read and write
485E000
stack
page read and write
7FF8B7830000
unkown
page readonly
2606F47C000
heap
page read and write
4E61000
heap
page read and write
6B4E000
stack
page read and write
93D0000
trusted library allocation
page execute and read and write
37F8000
trusted library allocation
page read and write
CC4000
heap
page read and write
22C9D000
heap
page read and write
12D4000
heap
page read and write
CC4000
heap
page read and write
C34000
heap
page read and write
DE4000
heap
page read and write
4CB4000
direct allocation
page execute and read and write
4563000
trusted library allocation
page read and write
CC4000
heap
page read and write
2606F2F8000
heap
page read and write
2A932001000
heap
page read and write
DE6000
heap
page read and write
649C000
stack
page read and write
1800000
direct allocation
page read and write
CC4000
heap
page read and write
2606F2C4000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
41F0000
heap
page read and write
4E61000
heap
page read and write
1670000
heap
page read and write
207816C9000
heap
page read and write
293832E5000
heap
page read and write
5F3000
unkown
page execute and write copy
206439FD000
heap
page read and write
1450000
direct allocation
page read and write
1EE3000
heap
page read and write
CC4000
heap
page read and write
22C77000
heap
page read and write
1800000
direct allocation
page read and write
429C000
heap
page read and write
2606E6A9000
heap
page read and write
5091000
heap
page read and write
4E61000
heap
page read and write
7FF8A8773000
unkown
page readonly
357E000
stack
page read and write
CC4000
heap
page read and write
1560000
heap
page read and write
C20000
direct allocation
page read and write
20781AF5000
heap
page read and write
1800000
direct allocation
page read and write
CB4000
heap
page read and write
CC4000
heap
page read and write
2606F235000
heap
page read and write
1744000
heap
page read and write
1684000
heap
page read and write
CC4000
heap
page read and write
1063000
unkown
page execute and write copy
7FF725AE2000
unkown
page write copy
CC4000
heap
page read and write
4F1000
unkown
page execute and read and write
CB4000
heap
page read and write
CB4000
heap
page read and write
11BE000
heap
page read and write
56B0000
direct allocation
page execute and read and write
1EB9473A000
heap
page read and write
3FEF000
stack
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
635000
unkown
page execute and read and write
4F60000
trusted library allocation
page read and write
74C8000
trusted library allocation
page read and write
2EEBF000
stack
page read and write
CC4000
heap
page read and write
C20000
direct allocation
page read and write
6FC000
unkown
page write copy
4E61000
heap
page read and write
3380F8F000
stack
page read and write
61ED4000
direct allocation
page readonly
4E61000
heap
page read and write
2606FA47000
heap
page read and write
CC4000
heap
page read and write
182000
unkown
page execute and read and write
C34000
heap
page read and write
C34000
heap
page read and write
20E74F28000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
2606FF78000
heap
page read and write
CC4000
heap
page read and write
7FF8A7F30000
unkown
page readonly
1090000
heap
page read and write
2606F459000
heap
page read and write
4E61000
heap
page read and write
4C40000
direct allocation
page execute and read and write
7FF8BA245000
unkown
page read and write
3EFF000
stack
page read and write
C20000
direct allocation
page read and write
7FF8B7822000
unkown
page readonly
5091000
heap
page read and write
3B7F000
stack
page read and write
3D6E000
stack
page read and write
2606C7AD000
heap
page read and write
5720000
direct allocation
page execute and read and write
5BF0000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
C0000
unkown
page readonly
4C51000
heap
page read and write
4540000
trusted library allocation
page read and write
CC4000
heap
page read and write
EDC000
heap
page read and write
1744000
heap
page read and write
2606F370000
heap
page read and write
7FF8A7F05000
unkown
page read and write
4E61000
heap
page read and write
29382CFA000
heap
page read and write
2F3E000
stack
page read and write
CC4000
heap
page read and write
2381D380000
heap
page read and write
CB5000
heap
page read and write
E99000
heap
page read and write
20780140000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
5390000
direct allocation
page execute and read and write
7FF698D88000
unkown
page readonly
1F0000
heap
page read and write
20E76ECF000
heap
page read and write
20E74F44000
heap
page read and write
2123000
heap
page read and write
CC4000
heap
page read and write
CC5000
heap
page read and write
F4E000
stack
page read and write
28664090000
heap
page read and write
4E61000
heap
page read and write
6860000
trusted library allocation
page read and write
6C820000
unkown
page read and write
4E61000
heap
page read and write
2606C6ED000
heap
page read and write
1CA90000
heap
page read and write
414E000
stack
page read and write
1B33000
heap
page read and write
981000
unkown
page execute and write copy
C4118FF000
unkown
page read and write
CB4000
heap
page read and write
D50000
unkown
page read and write
7FF8A7F07000
unkown
page readonly
5730000
direct allocation
page execute and read and write
20643A00000
heap
page read and write
20E74F53000
heap
page read and write
12E6CFE000
stack
page read and write
29382CF8000
heap
page read and write
4C80000
direct allocation
page execute and read and write
22CB3000
heap
page read and write
17C9E560000
heap
page read and write
493000
remote allocation
page execute and read and write
2606F30F000
heap
page read and write
17C9E3D0000
heap
page read and write
25DE000
heap
page read and write
CB4000
heap
page read and write
4E61000
heap
page read and write
4D21000
heap
page read and write
2606F305000
heap
page read and write
CB4000
heap
page read and write
212B2000
heap
page read and write
4E61000
heap
page read and write
2606F4A0000
direct allocation
page read and write
59EE000
stack
page read and write
66A0000
heap
page read and write
22C97000
heap
page read and write
CC4000
heap
page read and write
28663E01000
heap
page read and write
CC4000
heap
page read and write
2A7F000
stack
page read and write
7FF8B7831000
unkown
page execute read
CC4000
heap
page read and write
3BDE000
stack
page read and write
CC4000
heap
page read and write
147A000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
C34000
heap
page read and write
2F5E000
stack
page read and write
1390000
heap
page read and write
22C94000
heap
page read and write
CC4000
heap
page read and write
7FF8B78BF000
unkown
page write copy
CB4000
heap
page read and write
2EB000
unkown
page execute and read and write
2606F381000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
945E000
stack
page read and write
2606C870000
heap
page read and write
20E75653000
heap
page read and write
3EAF000
stack
page read and write
383F000
stack
page read and write
474F000
stack
page read and write
CC4000
heap
page read and write
18C5000
heap
page read and write
CC4000
heap
page read and write
D8F000
heap
page read and write
CB4000
heap
page read and write
CB5000
heap
page read and write
CC4000
heap
page read and write
4D21000
heap
page read and write
7685000
trusted library allocation
page read and write
9166000
heap
page read and write
621C000
stack
page read and write
347C000
trusted library allocation
page read and write
E7F000
heap
page read and write
20781E10000
heap
page read and write
2606FB50000
direct allocation
page read and write
7FF8A7BCF000
unkown
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
1C8CD000
stack
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
CB4000
heap
page read and write
29382D17000
heap
page read and write
1D0C68B0000
heap
page read and write
2606EB21000
heap
page read and write
3618000
trusted library allocation
page read and write
5080000
direct allocation
page read and write
7FF8B8790000
unkown
page readonly
41EE000
trusted library allocation
page read and write
1CB8F000
stack
page read and write
2663000
heap
page read and write
E9E000
heap
page read and write
38AE000
stack
page read and write
41AE000
stack
page read and write
CC4000
heap
page read and write
4C60000
direct allocation
page execute and read and write
CC4000
heap
page read and write
3D8E000
stack
page read and write
939E000
stack
page read and write
1492000
trusted library allocation
page read and write
655C000
stack
page read and write
2606F3BB000
heap
page read and write
CC4000
heap
page read and write
1744000
heap
page read and write
2606F800000
direct allocation
page read and write
CC4000
heap
page read and write
263A000
heap
page read and write
2606E6B1000
heap
page read and write
4AB0000
direct allocation
page read and write
340C000
trusted library allocation
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
CC5000
heap
page read and write
CC4000
heap
page read and write
1744000
heap
page read and write
CB4000
heap
page read and write
7FF8A85D6000
unkown
page readonly
3C0F000
stack
page read and write
E9E000
heap
page read and write
4509000
trusted library allocation
page read and write
5280000
direct allocation
page execute and read and write
CC5000
heap
page read and write
17F4000
heap
page read and write
CC4000
heap
page read and write
2A9321F0000
heap
page read and write
2EE0000
heap
page read and write
2D52E000
stack
page read and write
567F000
stack
page read and write
3547000
trusted library allocation
page read and write
3CFD000
stack
page read and write
7FF698D50000
unkown
page readonly
1B3E0552000
heap
page read and write
CB4000
heap
page read and write
D00AEFF000
stack
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
7FF8BA240000
unkown
page readonly
4B24000
heap
page read and write
7FF8B604A000
unkown
page readonly
716A000
heap
page read and write
4C30000
direct allocation
page execute and read and write
CC4000
heap
page read and write
56B0000
direct allocation
page execute and read and write
41BE000
stack
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
20E76ED5000
heap
page read and write
CC4000
heap
page read and write
35F1000
trusted library allocation
page read and write
3278000
trusted library allocation
page read and write
22C89000
heap
page read and write
4C20000
direct allocation
page execute and read and write
4293000
heap
page read and write
EDC000
heap
page read and write
33FB000
stack
page read and write
29382CD3000
heap
page read and write
4E61000
heap
page read and write
2FAF000
stack
page read and write
5091000
heap
page read and write
CC4000
heap
page read and write
428E000
stack
page read and write
22C81000
heap
page read and write
29384B6E000
heap
page read and write
18C0000
heap
page read and write
293832E2000
heap
page read and write
CC4000
heap
page read and write
2606F453000
heap
page read and write
CC4000
heap
page read and write
206439DA000
heap
page read and write
5E7E000
stack
page read and write
911F000
heap
page read and write
C10000
heap
page read and write
CB4000
heap
page read and write
CB4000
heap
page read and write
1200000
unkown
page execute and read and write
2606FC20000
direct allocation
page read and write
13C0000
direct allocation
page read and write
7FF8B7FD0000
unkown
page readonly
34AF000
stack
page read and write
1578000
heap
page read and write
C30000
heap
page read and write
20643AE0000
heap
page read and write
CC4000
heap
page read and write
274FC000
heap
page read and write
4E61000
heap
page read and write
2D9B87C8000
heap
page read and write
4D21000
heap
page read and write
4610000
direct allocation
page read and write
CB4000
heap
page read and write
CC4000
heap
page read and write
4E3E000
stack
page read and write
207FD890000
heap
page read and write
244C000
unkown
page readonly
DCF000
heap
page read and write
B5D000
stack
page read and write
7F0000
heap
page read and write
CB4000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
FFFCEFF000
unkown
page read and write
46BF000
stack
page read and write
4E61000
heap
page read and write
C20000
direct allocation
page read and write
CC4000
heap
page read and write
2ABE000
stack
page read and write
4D21000
heap
page read and write
12D4000
heap
page read and write
CC4000
heap
page read and write
7FF8B883D000
unkown
page readonly
4E61000
heap
page read and write
1AF1F000
stack
page read and write
1F0000
heap
page read and write
D20000
direct allocation
page read and write
20E7562E000
heap
page read and write
367E000
stack
page read and write
CFD000
stack
page read and write
CC4000
heap
page read and write
2606F453000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
2938316E000
heap
page read and write
4E61000
heap
page read and write
CC5000
heap
page read and write
4720000
trusted library allocation
page read and write
1450000
direct allocation
page read and write
293832E4000
heap
page read and write
CC4000
heap
page read and write
457F000
stack
page read and write
1AF8D000
stack
page read and write
CC4000
heap
page read and write
1F35943B000
heap
page read and write
CB4000
heap
page read and write
388E000
stack
page read and write
FA0000
heap
page read and write
5080000
direct allocation
page read and write
3310000
direct allocation
page read and write
23CA1550000
heap
page read and write
7FF8B783E000
unkown
page readonly
266B4551000
heap
page read and write
2032000
heap
page read and write
CC4000
heap
page read and write
D1A000
heap
page read and write
20E74F44000
heap
page read and write
5091000
heap
page read and write
2606F6C0000
direct allocation
page read and write
CC4000
heap
page read and write
41EE000
stack
page read and write
40BE000
stack
page read and write
22C89000
heap
page read and write
7FF8B27C4000
unkown
page readonly
CC4000
heap
page read and write
1EB94610000
heap
page read and write
20E74F4B000
heap
page read and write
CC4000
heap
page read and write
28D00000
heap
page read and write
266B44D0000
heap
page read and write
7FF8A7BE0000
unkown
page readonly
25E0000
heap
page read and write
1684000
heap
page read and write
5091000
heap
page read and write
16A3000
heap
page read and write
D10000
heap
page read and write
26070033000
heap
page read and write
CC4000
heap
page read and write
29382CDF000
heap
page read and write
5720000
direct allocation
page execute and read and write
7FF8B5735000
unkown
page read and write
4C40000
direct allocation
page execute and read and write
4E61000
heap
page read and write
139D000
stack
page read and write
4E61000
heap
page read and write
74B000
unkown
page readonly
29382C6D000
heap
page read and write
1EB94960000
heap
page read and write
5091000
heap
page read and write
29382D0B000
heap
page read and write
CC4000
heap
page read and write
37FE000
stack
page read and write
4E61000
heap
page read and write
20E74E40000
heap
page read and write
5CC49FF000
stack
page read and write
1601000
heap
page read and write
20E74F07000
heap
page read and write
620E000
stack
page read and write
1A93000
heap
page read and write
407F000
stack
page read and write
17F4000
heap
page read and write
1055000
unkown
page execute and read and write
CB4000
heap
page read and write
4D21000
heap
page read and write
20E74F27000
heap
page read and write
6C81E000
unkown
page read and write
4D21000
heap
page read and write
355F000
stack
page read and write
28D21000
heap
page read and write
2750E000
heap
page read and write
5B6D000
stack
page read and write
5B9A000
stack
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
7FF8B5710000
unkown
page readonly
CC4000
heap
page read and write
60CE000
stack
page read and write
322F000
stack
page read and write
2606F359000
heap
page read and write
2606FC40000
direct allocation
page read and write
7E7E000
stack
page read and write
E71000
heap
page read and write
20E76EC7000
heap
page read and write
1DC5000
heap
page read and write
43EE000
stack
page read and write
1600000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
591000
unkown
page execute and read and write
29383162000
heap
page read and write
C78D87F000
stack
page read and write
20E74F42000
heap
page read and write
CB4000
heap
page read and write
2606F2DE000
heap
page read and write
194000
unkown
page execute and write copy
2A90000
direct allocation
page read and write
CC4000
heap
page read and write
497E000
stack
page read and write
5690000
direct allocation
page execute and read and write
2606F3B1000
heap
page read and write
3C2F000
stack
page read and write
CC4000
heap
page read and write
533C000
stack
page read and write
749D000
stack
page read and write
20643989000
heap
page read and write
5091000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
2938316A000
heap
page read and write
1E13C23B000
heap
page read and write
7FF8B7827000
unkown
page read and write
493000
unkown
page execute and read and write
4E61000
heap
page read and write
5091000
heap
page read and write
7FF8A8790000
unkown
page readonly
9C000
stack
page read and write
4E61000
heap
page read and write
5091000
heap
page read and write
D4E000
heap
page read and write
2606F30F000
heap
page read and write
5F1D000
stack
page read and write
94A0000
trusted library allocation
page read and write
822000
unkown
page execute and read and write
206439B9000
heap
page read and write
22C8E000
heap
page read and write
CC5000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
355B000
trusted library allocation
page read and write
CC4000
heap
page read and write
35CF000
stack
page read and write
2606C742000
heap
page read and write
2750B000
heap
page read and write
19B65340000
heap
page read and write
56B0000
direct allocation
page execute and read and write
21415000
heap
page read and write
1250000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
1B48000
heap
page read and write
EDD000
heap
page read and write
804C000
stack
page read and write
D51000
unkown
page execute and write copy
CC4000
heap
page read and write
20643880000
heap
page read and write
11C7000
heap
page read and write
5340000
direct allocation
page execute and read and write
CC4000
heap
page read and write
1450000
direct allocation
page read and write
7FF698D6D000
unkown
page readonly
20E74F33000
heap
page read and write
29382D09000
heap
page read and write
29382D12000
heap
page read and write
2F00000
direct allocation
page read and write
1744000
heap
page read and write
981E000
stack
page read and write
2606F17A000
heap
page read and write
CC4000
heap
page read and write
1684000
heap
page read and write
1E13C22D000
heap
page read and write
9100000
heap
page read and write
2A90000
direct allocation
page read and write
28D25000
heap
page read and write
12D4000
heap
page read and write
23CA1580000
heap
page read and write
4E61000
heap
page read and write
1063000
unkown
page execute and write copy
293832C7000
heap
page read and write
2EF6D000
heap
page read and write
15C000
unkown
page execute and write copy
360B000
trusted library allocation
page read and write
18C000
unkown
page execute and write copy
2606F386000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
660000
unkown
page readonly
5E2D000
stack
page read and write
19B65400000
heap
page read and write
CB4000
heap
page read and write
9235000
heap
page read and write
56D0000
direct allocation
page execute and read and write
5320000
direct allocation
page execute and read and write
617E000
stack
page read and write
4E61000
heap
page read and write
599F000
stack
page read and write
1744000
heap
page read and write
495F000
stack
page read and write
50C1000
heap
page read and write
1EB94726000
heap
page read and write
CC4000
heap
page read and write
4631000
heap
page read and write
1750000
heap
page read and write
587000
unkown
page execute and read and write
293832CF000
heap
page read and write
7FF8A8BB3000
unkown
page read and write
7FF8B6055000
unkown
page read and write
CC5000
heap
page read and write
16A6B080000
heap
page read and write
2577000
heap
page read and write
CC4000
heap
page read and write
7FF8B77F1000
unkown
page execute read
2A932340000
heap
page read and write
29382CE3000
heap
page read and write
1744000
heap
page read and write
1744000
heap
page read and write
CC4000
heap
page read and write
2570000
heap
page read and write
4B11000
direct allocation
page read and write
2606F20D000
heap
page read and write
6960000
trusted library allocation
page read and write
4E61000
heap
page read and write
40DE000
stack
page read and write
CC4000
heap
page read and write
1800000
direct allocation
page read and write
CB4000
heap
page read and write
129E000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
369F000
stack
page read and write
7FF8B8250000
unkown
page readonly
4B11000
direct allocation
page read and write
BEE000
stack
page read and write
3DBF000
stack
page read and write
2606EAEB000
heap
page read and write
61E01000
direct allocation
page execute read
23D56AA0000
heap
page read and write
CB5000
heap
page read and write
CC5000
heap
page read and write
7FF698D71000
unkown
page readonly
361000
unkown
page execute and write copy
CC4000
heap
page read and write
7FF8B8AF0000
unkown
page readonly
7FF8BA500000
unkown
page readonly
7FF8B6171000
unkown
page execute read
9820000
trusted library allocation
page read and write
443F000
stack
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
20E74F81000
heap
page read and write
20E74F81000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
2606ED60000
direct allocation
page read and write
5C90000
trusted library allocation
page read and write
28663DE0000
heap
page read and write
3CBF000
stack
page read and write
CC4000
heap
page read and write
7FF698D50000
unkown
page readonly
266B4530000
heap
page read and write
56A6000
trusted library allocation
page read and write
2A90000
direct allocation
page read and write
CB4000
heap
page read and write
20E75658000
heap
page read and write
5750000
direct allocation
page execute and read and write
4E61000
heap
page read and write
CB4000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
29382CE4000
heap
page read and write
7FF8B9F6D000
unkown
page readonly
359C000
trusted library allocation
page read and write
2D9B8640000
heap
page read and write
2606C6ED000
heap
page read and write
61EB4000
direct allocation
page read and write
CC4000
heap
page read and write
4559000
trusted library allocation
page read and write
40BE000
stack
page read and write
5091000
heap
page read and write
20E74F53000
heap
page read and write
4D21000
heap
page read and write
D30000
heap
page read and write
2606F453000
heap
page read and write
2570000
heap
page read and write
CC4000
heap
page read and write
280000
unkown
page readonly
13C0000
direct allocation
page read and write
CC4000
heap
page read and write
2BBF000
stack
page read and write
5360000
direct allocation
page execute and read and write
7FF698D85000
unkown
page write copy
4D21000
heap
page read and write
2606F2FE000
heap
page read and write
5320000
direct allocation
page execute and read and write
B70000
heap
page read and write
4B40000
direct allocation
page read and write
2606C742000
heap
page read and write
343F000
stack
page read and write
22C97000
heap
page read and write
52D0000
direct allocation
page execute and read and write
1744000
heap
page read and write
CC4000
heap
page read and write
1D3B000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
22C86000
heap
page read and write
CC4000
heap
page read and write
12E69BF000
stack
page read and write
4E61000
heap
page read and write
20E76EC4000
heap
page read and write
4E61000
heap
page read and write
7658000
trusted library allocation
page read and write
CC4000
heap
page read and write
2606E66D000
heap
page read and write
6C641000
unkown
page execute read
4E61000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
6A71000
heap
page read and write
4610000
direct allocation
page read and write
692A0000
unkown
page read and write
CC4000
heap
page read and write
17F4000
heap
page read and write
22BCD000
heap
page read and write
4D1000
remote allocation
page execute and read and write
22C95000
heap
page read and write
1744000
heap
page read and write
729C000
stack
page read and write
1202000
unkown
page execute and write copy
207FDA70000
heap
page read and write
CC4000
heap
page read and write
AF208FC000
stack
page read and write
22C9D000
heap
page read and write
1170000
heap
page read and write
7FF8B7FD4000
unkown
page readonly
CC5000
heap
page read and write
2606C6F3000
heap
page read and write
5091000
heap
page read and write
460F000
stack
page read and write
CC4000
heap
page read and write
29384B74000
heap
page read and write
4E61000
heap
page read and write
5700000
trusted library allocation
page read and write
22C7B000
heap
page read and write
161D000
stack
page read and write
3DFF000
stack
page read and write
7FF8B7891000
unkown
page execute read
4D50000
trusted library allocation
page read and write
1C2AE000
stack
page read and write
7F0000
unkown
page readonly
37ED000
trusted library allocation
page read and write
20643F90000
heap
page read and write
4E61000
heap
page read and write
11BA000
heap
page read and write
4E61000
heap
page read and write
38FE000
stack
page read and write
CC4000
heap
page read and write
91C1000
heap
page read and write
1B3E0569000
heap
page read and write
4CBF000
stack
page read and write
CB4000
heap
page read and write
56BC000
stack
page read and write
453F000
stack
page read and write
4E61000
heap
page read and write
15AE000
stack
page read and write
20E75641000
heap
page read and write
4E61000
heap
page read and write
28D40000
heap
page read and write
4EE4000
heap
page read and write
CC4000
heap
page read and write
4D21000
heap
page read and write
6880000
trusted library allocation
page read and write
F3F000
stack
page read and write
2606F47C000
heap
page read and write
67A5000
trusted library allocation
page read and write
2606F473000
heap
page read and write
CC4000
heap
page read and write
20E75175000
heap
page read and write
52C0000
direct allocation
page execute and read and write
2606F298000
heap
page read and write
CC4000
heap
page read and write
1B3E04F0000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
D62000
unkown
page write copy
3C2000
unkown
page execute and read and write
2606FD82000
heap
page read and write
266B4630000
heap
page read and write
29382C6A000
heap
page read and write
14D0000
trusted library allocation
page read and write
CC4000
heap
page read and write
4D21000
heap
page read and write
CC4000
heap
page read and write
CB4000
heap
page read and write
671000
unkown
page execute and read and write
1EB9474C000
heap
page read and write
48FF000
stack
page read and write
CC4000
heap
page read and write
63E000
unkown
page execute and read and write
50A0000
heap
page read and write
73F797F000
stack
page read and write
4E61000
heap
page read and write
CC5000
heap
page read and write
4296000
heap
page read and write
CC4000
heap
page read and write
18C000
unkown
page execute and read and write
29382CA0000
heap
page read and write
7FF8B93C1000
unkown
page execute read
1744000
heap
page read and write
72F000
unkown
page read and write
1B3E0549000
heap
page read and write
5E5000
unkown
page execute and read and write
CC4000
heap
page read and write
7FF8B879A000
unkown
page read and write
CC4000
heap
page read and write
34B000
unkown
page execute and read and write
33BF000
stack
page read and write
20E74F7A000
heap
page read and write
7D3C4FF000
stack
page read and write
4C8F000
stack
page read and write
2D9B87D1000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
566F000
stack
page read and write
7FF8B620D000
unkown
page readonly
22CA4000
heap
page read and write
CC4000
heap
page read and write
28D37000
heap
page read and write
420C000
trusted library allocation
page read and write
1C56F000
stack
page read and write
2606F488000
heap
page read and write
4E61000
heap
page read and write
139D000
stack
page read and write
CC5000
heap
page read and write
7FF8B9840000
unkown
page readonly
CC4000
heap
page read and write
A2E6D6F000
stack
page read and write
4E61000
heap
page read and write
1AE1E000
stack
page read and write
CC5000
heap
page read and write
2606F2FF000
heap
page read and write
4290000
heap
page read and write
334F000
stack
page read and write
2606C6E9000
heap
page read and write
1F6000
unkown
page execute and read and write
22C9D000
heap
page read and write
5C7E000
stack
page read and write
744000
unkown
page execute and write copy
207815C4000
heap
page read and write
29384B74000
heap
page read and write
1E13C23B000
heap
page read and write
C20000
direct allocation
page read and write
481F000
stack
page read and write
2606EB57000
heap
page read and write
2078140C000
heap
page read and write
ED4000
heap
page read and write
2606F920000
direct allocation
page read and write
74C0000
trusted library allocation
page read and write
5680000
direct allocation
page execute and read and write
667C000
stack
page read and write
2575000
heap
page read and write
3E3E000
stack
page read and write
2938316E000
heap
page read and write
15B0000
trusted library allocation
page read and write
692A5000
unkown
page readonly
3632000
trusted library allocation
page read and write
6E9000
unkown
page readonly
22C95000
heap
page read and write
1744000
heap
page read and write
5260000
direct allocation
page execute and read and write
20E74F71000
heap
page read and write
D50000
unkown
page readonly
4100000
direct allocation
page read and write
CC4000
heap
page read and write
183E000
stack
page read and write
6401000
heap
page read and write
4D21000
heap
page read and write
1D0C6AA0000
heap
page read and write
CC5000
heap
page read and write
EEF000
heap
page read and write
2A931FD0000
heap
page read and write
326000
unkown
page execute and read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
20E74E80000
trusted library allocation
page read and write
CC4000
heap
page read and write
1C3BE000
stack
page read and write
4C51000
heap
page read and write
19A5000
heap
page read and write
20E7000
heap
page read and write
7FF8B93C0000
unkown
page readonly
22C89000
heap
page read and write
29FC000
stack
page read and write
4D21000
heap
page read and write
7F1000
unkown
page execute read
ED9000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
CC5000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
6C61D000
unkown
page readonly
16A6B4C0000
heap
page read and write
CC4000
heap
page read and write
91A3000
heap
page read and write
4E61000
heap
page read and write
20E75174000
heap
page read and write
1B08C000
stack
page read and write
22C97000
heap
page read and write
CC4000
heap
page read and write
CB4000
heap
page read and write
2606F2E8000
heap
page read and write
59F000
unkown
page execute and read and write
4CC0000
direct allocation
page execute and read and write
2A80000
heap
page read and write
4E61000
heap
page read and write
2606EB22000
heap
page read and write
5091000
heap
page read and write
4E61000
heap
page read and write
5320000
direct allocation
page execute and read and write
4E61000
heap
page read and write
292F000
stack
page read and write
1740000
heap
page read and write
CC4000
heap
page read and write
2606FC92000
heap
page read and write
20E74F02000
heap
page read and write
29382DA0000
trusted library allocation
page read and write
2930000
heap
page read and write
CC4000
heap
page read and write
669A000
trusted library allocation
page read and write
1C7EE000
stack
page read and write
F37000
unkown
page execute and read and write
CC4000
heap
page read and write
5080000
direct allocation
page read and write
CC4000
heap
page read and write
20E7517A000
heap
page read and write
2606EA34000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
28CE0000
heap
page read and write
2EAE000
stack
page read and write
CB4000
heap
page read and write
7FF8BA241000
unkown
page execute read
2DFE000
stack
page read and write
29382D07000
heap
page read and write
2606F47C000
heap
page read and write
3260000
trusted library allocation
page read and write
D73000
heap
page read and write
4FBE000
stack
page read and write
CC4000
heap
page read and write
2606F425000
heap
page read and write
1E13C205000
heap
page read and write
5091000
heap
page read and write
CC4000
heap
page read and write
1490000
trusted library allocation
page read and write
EC1000
heap
page read and write
CC4000
heap
page read and write
C1418FF000
unkown
page read and write
324E000
stack
page read and write
CC4000
heap
page read and write
EF945EC000
stack
page read and write
67AE000
trusted library allocation
page read and write
1480000
heap
page read and write
22C93000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
449E000
stack
page read and write
4B4E000
stack
page read and write
2606EB57000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
377F000
stack
page read and write
66A0000
heap
page read and write
1C5A000
heap
page read and write
4D21000
heap
page read and write
26EA000
heap
page read and write
CC4000
heap
page read and write
2606F477000
heap
page read and write
4630000
heap
page read and write
6960000
trusted library allocation
page read and write
34B6000
trusted library allocation
page read and write
14EE000
stack
page read and write
22C95000
heap
page read and write
CC4000
heap
page read and write
CB4000
heap
page read and write
4E61000
heap
page read and write
862A0FF000
stack
page read and write
4E61000
heap
page read and write
2606F2CE000
heap
page read and write
59AE000
stack
page read and write
1C3AF000
stack
page read and write
2A931FF8000
heap
page read and write
CC4000
heap
page read and write
7FF8B5737000
unkown
page readonly
CC4000
heap
page read and write
2606FB38000
direct allocation
page read and write
4C90000
direct allocation
page execute and read and write
22D7A000
heap
page read and write
CB4000
heap
page read and write
4E61000
heap
page read and write
1430000
heap
page read and write
4E61000
heap
page read and write
50C1000
heap
page read and write
61ED3000
direct allocation
page read and write
16A6B12B000
heap
page read and write
CC4000
heap
page read and write
4E80000
heap
page read and write
20E76ECF000
heap
page read and write
CB4000
heap
page read and write
CB4000
heap
page read and write
20643968000
heap
page read and write
CC4000
heap
page read and write
4D21000
heap
page read and write
CC4000
heap
page read and write
5091000
heap
page read and write
56B0000
direct allocation
page execute and read and write
4F60000
trusted library allocation
page read and write
CB4000
heap
page read and write
1476000
trusted library allocation
page execute and read and write
7640000
trusted library allocation
page read and write
1E13C22D000
heap
page read and write
4C20000
direct allocation
page execute and read and write
280000
unkown
page read and write
2606C7AC000
heap
page read and write
22C9D000
heap
page read and write
154E000
stack
page read and write
DD8000
heap
page read and write
E81000
heap
page read and write
CC4000
heap
page read and write
206439BA000
heap
page read and write
5091000
heap
page read and write
1B3E000
heap
page read and write
29383120000
heap
page read and write
20E74F71000
heap
page read and write
4E61000
heap
page read and write
521F000
stack
page read and write
CC4000
heap
page read and write
7FF8B8797000
unkown
page readonly
20643999000
heap
page read and write
DD7000
heap
page read and write
CC4000
heap
page read and write
35FE000
stack
page read and write
5680000
trusted library allocation
page read and write
CC4000
heap
page read and write
4D21000
heap
page read and write
66D6000
heap
page read and write
30FE000
stack
page read and write
20E7562F000
heap
page read and write
18FE000
stack
page read and write
CB4000
heap
page read and write
CC4000
heap
page read and write
2606F335000
heap
page read and write
17F4000
heap
page read and write
17C9E200000
heap
page read and write
63E000
unkown
page execute and read and write
B80000
heap
page read and write
20781383000
heap
page read and write
6B76000
trusted library allocation
page read and write
1D0C68D0000
heap
page read and write
C20000
direct allocation
page read and write
150B000
heap
page read and write
360000
unkown
page read and write
298D4A8A000
heap
page read and write
5091000
heap
page read and write
293832CF000
heap
page read and write
4900000
direct allocation
page execute and read and write
CC4000
heap
page read and write
1CAA1000
heap
page read and write
22C97000
heap
page read and write
66EF000
heap
page read and write
20E74F95000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
12D4000
heap
page read and write
207816BC000
heap
page read and write
9D127FB000
stack
page read and write
4260000
heap
page read and write
20E7517B000
heap
page read and write
5091000
heap
page read and write
4E61000
heap
page read and write
7FF8B78C4000
unkown
page read and write
2606F2D2000
heap
page read and write
52E0000
direct allocation
page execute and read and write
59FA000
trusted library allocation
page read and write
4D1000
unkown
page execute and read and write
4F60000
trusted library allocation
page read and write
2606E6B5000
heap
page read and write
1F359320000
heap
page read and write
4C20000
direct allocation
page execute and read and write
4E61000
heap
page read and write
DE2000
heap
page read and write
22C97000
heap
page read and write
6940000
trusted library allocation
page execute and read and write
5091000
heap
page read and write
13D0000
heap
page read and write
5B2D000
stack
page read and write
2606C756000
heap
page read and write
1450000
direct allocation
page read and write
20E7564B000
heap
page read and write
CC4000
heap
page read and write
20E74F8E000
heap
page read and write
4E61000
heap
page read and write
22C87000
heap
page read and write
59DF000
stack
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
DF9000
heap
page read and write
1744000
heap
page read and write
4E61000
heap
page read and write
4D26000
heap
page read and write
9F0000
heap
page read and write
CC4000
heap
page read and write
1930000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
7F4B000
stack
page read and write
1C92E000
stack
page read and write
20E76ED5000
heap
page read and write
22C89000
heap
page read and write
CC4000
heap
page read and write
AF20AFF000
stack
page read and write
2606F620000
direct allocation
page read and write
CC4000
heap
page read and write
17FE000
stack
page read and write
4E61000
heap
page read and write
31BE000
stack
page read and write
20E75177000
heap
page read and write
4E61000
heap
page read and write
DE6000
heap
page read and write
1960000
heap
page read and write
CC4000
heap
page read and write
166F000
stack
page read and write
22C72000
heap
page read and write
2606C70B000
heap
page read and write
7FF698D6C000
unkown
page read and write
1064000
unkown
page execute and write copy
557000
unkown
page execute and read and write
CC4000
heap
page read and write
41BF000
stack
page read and write
CB4000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
1AA3000
heap
page read and write
2606F3C5000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
2606F3B6000
heap
page read and write
52B0000
direct allocation
page execute and read and write
1440000
trusted library allocation
page read and write
5080000
direct allocation
page read and write
7FF8A8A9E000
unkown
page readonly
56A0000
direct allocation
page execute and read and write
349A000
trusted library allocation
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
C41159C000
stack
page read and write
4D20000
direct allocation
page execute and read and write
4E61000
heap
page read and write
3ECE000
stack
page read and write
1472000
trusted library allocation
page read and write
43CE000
stack
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
2606F302000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
BD2B4FE000
stack
page read and write
5091000
heap
page read and write
4D21000
heap
page read and write
2CFF000
stack
page read and write
68E0000
trusted library allocation
page read and write
22C95000
heap
page read and write
3CB000
unkown
page execute and read and write
345E000
stack
page read and write
CC4000
heap
page read and write
3572000
trusted library allocation
page read and write
CC4000
heap
page read and write
29382CB7000
heap
page read and write
4B40000
direct allocation
page read and write
2EF53000
heap
page read and write
5091000
heap
page read and write
9D121F4000
stack
page read and write
2606EAE0000
heap
page read and write
2A90000
direct allocation
page read and write
22C81000
heap
page read and write
20E76EC0000
heap
page read and write
1063000
unkown
page execute and read and write
CC4000
heap
page read and write
20E74F82000
heap
page read and write
293832D9000
heap
page read and write
C4E000
stack
page read and write
2606F429000
heap
page read and write
4D10000
direct allocation
page execute and read and write
285E000
stack
page read and write
5F86000
heap
page read and write
CC4000
heap
page read and write
42FF000
stack
page read and write
CC4000
heap
page read and write
4D21000
heap
page read and write
4E61000
heap
page read and write
4610000
direct allocation
page read and write
26D0000
heap
page execute and read and write
4610000
direct allocation
page read and write
28663DA0000
heap
page read and write
56B0000
direct allocation
page execute and read and write
20E74F42000
heap
page read and write
2A90000
direct allocation
page read and write
1EB94700000
heap
page read and write
456F000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
CC4000
heap
page read and write
65A0000
heap
page read and write
34140000
heap
page read and write
CC4000
heap
page read and write
2606E70F000
heap
page read and write
186E000
heap
page read and write
3814000
trusted library allocation
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
DB1000
heap
page read and write
4E61000
heap
page read and write
37BF000
stack
page read and write
14B0000
trusted library allocation
page read and write
7D3C3FE000
unkown
page read and write
CC5000
heap
page read and write
22C89000
heap
page read and write
CB4000
heap
page read and write
6035000
heap
page read and write
2606F3C8000
heap
page read and write
CC4000
heap
page read and write
61ECC000
direct allocation
page read and write
4552000
trusted library allocation
page read and write
CC4000
heap
page read and write
B1FD5BE000
stack
page read and write
1B3E0825000
heap
page read and write
2606E676000
heap
page read and write
20E74F71000
heap
page read and write
4E61000
heap
page read and write
4D21000
heap
page read and write
20E76ED5000
heap
page read and write
20E74F30000
heap
page read and write
4D21000
heap
page read and write
423000
unkown
page readonly
1202000
unkown
page execute and write copy
154A000
heap
page read and write
4E61000
heap
page read and write
4C30000
direct allocation
page execute and read and write
4CD0000
direct allocation
page execute and read and write
7FF8B93D6000
unkown
page readonly
23D56920000
heap
page read and write
BD2B5FF000
stack
page read and write
1E13C217000
heap
page read and write
7FF8BA50B000
unkown
page readonly
CC4000
heap
page read and write
1E13C1C0000
heap
page read and write
1744000
heap
page read and write
5090000
heap
page read and write
BD2B57F000
stack
page read and write
4E61000
heap
page read and write
123E000
stack
page read and write
F37000
unkown
page execute and read and write
435000
unkown
page read and write
556B000
stack
page read and write
61ED4000
direct allocation
page readonly
20E75655000
heap
page read and write
1744000
heap
page read and write
111E000
stack
page read and write
213F2000
heap
page read and write
1450000
direct allocation
page read and write
2AB7000
heap
page read and write
35E9000
trusted library allocation
page read and write
4D21000
heap
page read and write
7FF698D6C000
unkown
page write copy
460F000
stack
page read and write
1460000
trusted library allocation
page read and write
CC5000
heap
page read and write
1744000
heap
page read and write
7FF8A85D0000
unkown
page write copy
CF0EB6C000
stack
page read and write
22C9D000
heap
page read and write
C20000
direct allocation
page read and write
CC4000
heap
page read and write
29382DA0000
trusted library allocation
page read and write
CC4000
heap
page read and write
1DF3000
heap
page read and write
CC4000
heap
page read and write
1744000
heap
page read and write
B3D000
stack
page read and write
1CBA0000
trusted library allocation
page read and write
CC4000
heap
page read and write
7FF8A8621000
unkown
page execute read
CC4000
heap
page read and write
CC4000
heap
page read and write
816000
unkown
page readonly
4E61000
heap
page read and write
2381D2C0000
heap
page read and write
5131000
direct allocation
page read and write
4181000
trusted library allocation
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
CF0EEFE000
unkown
page read and write
9141000
heap
page read and write
C34000
heap
page read and write
C34000
heap
page read and write
3E3E000
stack
page read and write
20E74F72000
heap
page read and write
CB4000
heap
page read and write
CB4000
heap
page read and write
1744000
heap
page read and write
4E61000
heap
page read and write
7FF725A4D000
unkown
page readonly
5E40000
remote allocation
page read and write
20E76EC3000
heap
page read and write
5091000
heap
page read and write
CB4000
heap
page read and write
1744000
heap
page read and write
588E000
stack
page read and write
4E64000
heap
page read and write
2938316B000
heap
page read and write
438F000
stack
page read and write
32FE000
stack
page read and write
5C0F000
stack
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
2606F2E6000
heap
page read and write
23CA1450000
heap
page read and write
62C000
unkown
page execute and read and write
2D6E000
stack
page read and write
CC4000
heap
page read and write
20643956000
heap
page read and write
4E61000
heap
page read and write
2606F2D9000
heap
page read and write
2A90000
direct allocation
page read and write
12E693B000
stack
page read and write
20E74E60000
heap
page read and write
293832BC000
heap
page read and write
9221000
heap
page read and write
CC4000
heap
page read and write
4B40000
direct allocation
page read and write
2606F1A1000
heap
page read and write
4E61000
heap
page read and write
1684000
heap
page read and write
4D21000
heap
page read and write
9C000
stack
page read and write
4CB4000
direct allocation
page execute and read and write
353F000
stack
page read and write
2606F30F000
heap
page read and write
74C6000
trusted library allocation
page read and write
816000
unkown
page readonly
9D12BFE000
stack
page read and write
1B3E0820000
heap
page read and write
4C4000
unkown
page execute and read and write
CC4000
heap
page read and write
12F7000
stack
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
CB4000
heap
page read and write
D30000
unkown
page readonly
29382CE5000
heap
page read and write
CC4000
heap
page read and write
1F359530000
heap
page read and write
2606C70A000
heap
page read and write
CC4000
heap
page read and write
6682000
trusted library allocation
page read and write
1F397B15000
heap
page read and write
3D1E000
stack
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
CB4000
heap
page read and write
D6F85FF000
stack
page read and write
7FF8B7892000
unkown
page readonly
1800000
direct allocation
page read and write
22C97000
heap
page read and write
20643945000
heap
page read and write
293832BE000
heap
page read and write
1880000
heap
page read and write
6830000
heap
page read and write
6929F000
unkown
page write copy
2E3F000
stack
page read and write
CC5000
heap
page read and write
CC5000
heap
page read and write
CC4000
heap
page read and write
1500000
heap
page read and write
EEF000
heap
page read and write
CB4000
heap
page read and write
CC5000
heap
page read and write
2606F335000
heap
page read and write
1CA2F000
stack
page read and write
CC5000
heap
page read and write
5680000
direct allocation
page execute and read and write
3C9000
unkown
page read and write
CC4000
heap
page read and write
CB4000
heap
page read and write
CC4000
heap
page read and write
2606F37A000
heap
page read and write
9139000
heap
page read and write
29382CFD000
heap
page read and write
5091000
heap
page read and write
1F397B10000
heap
page read and write
CC4000
heap
page read and write
36FF000
stack
page read and write
1450000
direct allocation
page read and write
19D3000
heap
page read and write
4E61000
heap
page read and write
3F5F000
stack
page read and write
427000
unkown
page write copy
17C9E180000
heap
page read and write
293832C8000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
4D21000
heap
page read and write
CC4000
heap
page read and write
3443000
trusted library allocation
page read and write
4D21000
heap
page read and write
206439EB000
heap
page read and write
19C000
unkown
page execute and read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
20E75641000
heap
page read and write
20643A00000
heap
page read and write
2606F36F000
heap
page read and write
D20000
heap
page read and write
CC4000
heap
page read and write
1A1F000
stack
page read and write
557E000
stack
page read and write
5091000
heap
page read and write
3F3E000
stack
page read and write
33D2000
trusted library allocation
page read and write
7FF8A85C3000
unkown
page write copy
297E000
stack
page read and write
2606F300000
heap
page read and write
4E61000
heap
page read and write
274C0000
heap
page read and write
4E61000
heap
page read and write
194000
stack
page read and write
20E74F40000
heap
page read and write
CB4000
heap
page read and write
3A5F000
stack
page read and write
93BF000
trusted library allocation
page read and write
611C000
stack
page read and write
4E61000
heap
page read and write
4D21000
heap
page read and write
1600000
heap
page read and write
2606F44A000
heap
page read and write
CC4000
heap
page read and write
20E74F82000
heap
page read and write
67F000
unkown
page execute and read and write
13C0000
direct allocation
page read and write
CC5000
heap
page read and write
640E000
heap
page read and write
1450000
trusted library allocation
page read and write
29382D05000
heap
page read and write
428E000
stack
page read and write
5BE0000
trusted library allocation
page read and write
4E61000
heap
page read and write
822000
unkown
page write copy
4E61000
heap
page read and write
FFA20000
direct allocation
page execute and read and write
4E61000
heap
page read and write
13C0000
direct allocation
page read and write
4E61000
heap
page read and write
44EF000
stack
page read and write
2606F45D000
heap
page read and write
266B4548000
heap
page read and write
5091000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
20E74F44000
heap
page read and write
FE0000
heap
page read and write
1684000
heap
page read and write
CC5000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
7682000
trusted library allocation
page read and write
CC4000
heap
page read and write
478E000
stack
page read and write
7FF8B7811000
unkown
page execute read
4E61000
heap
page read and write
CC4000
heap
page read and write
2606F9FC000
direct allocation
page read and write
2F5F000
stack
page read and write
398F000
stack
page read and write
EF9487F000
stack
page read and write
7FF8BA259000
unkown
page readonly
206439AA000
heap
page read and write
9D123FE000
stack
page read and write
4526000
trusted library allocation
page read and write
29384B66000
heap
page read and write
20E75172000
heap
page read and write
1B3E04E0000
heap
page read and write
2078166C000
heap
page read and write
38FF000
stack
page read and write
3C6E000
stack
page read and write
CC4000
heap
page read and write
7FF8B6170000
unkown
page readonly
20E75631000
heap
page read and write
CC4000
heap
page read and write
28D23000
heap
page read and write
29383160000
heap
page read and write
7FF725A44000
unkown
page write copy
7690000
trusted library allocation
page read and write
1B3E0566000
heap
page read and write
1B230000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
7FF698D51000
unkown
page execute read
2A932001000
heap
page read and write
6A80000
heap
page read and write
4E61000
heap
page read and write
207813FF000
heap
page read and write
61E00000
direct allocation
page execute and read and write
4E61000
heap
page read and write
7FF8A7F23000
unkown
page readonly
4E61000
heap
page read and write
298D4C90000
heap
page read and write
1F60000
heap
page read and write
3582000
trusted library allocation
page read and write
6870000
trusted library allocation
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
2E9000
unkown
page write copy
2606EAEE000
heap
page read and write
CC4000
heap
page read and write
574F000
stack
page read and write
CC4000
heap
page read and write
7FF8B7890000
unkown
page readonly
CB4000
heap
page read and write
D50000
unkown
page read and write
67A0000
trusted library allocation
page read and write
347F000
stack
page read and write
CC4000
heap
page read and write
BC0000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
7FF8B61E5000
unkown
page readonly
CC746FF000
stack
page read and write
5CA1000
trusted library allocation
page read and write
D50000
unkown
page read and write
69001000
unkown
page execute read
29382CD8000
heap
page read and write
13C0000
direct allocation
page read and write
2606F2D9000
heap
page read and write
CC4000
heap
page read and write
46DF000
stack
page read and write
4E61000
heap
page read and write
7FF8B77F9000
unkown
page read and write
1E05000
heap
page read and write
25B0000
direct allocation
page execute and read and write
7FF8A7ED7000
unkown
page readonly
6DE000
unkown
page execute and read and write
2F0F000
stack
page read and write
6791000
heap
page read and write
333F000
stack
page read and write
519C000
stack
page read and write
3290000
trusted library allocation
page read and write
EBE000
stack
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
433E000
stack
page read and write
21434000
heap
page read and write
765F000
trusted library allocation
page read and write
4D21000
heap
page read and write
EC1000
heap
page read and write
FF0000
direct allocation
page execute and read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
29382CB7000
heap
page read and write
CC5000
heap
page read and write
CC5000
heap
page read and write
CC4000
heap
page read and write
7FF8B984A000
unkown
page readonly
17C9E1A0000
heap
page read and write
393E000
stack
page read and write
68D0000
trusted library allocation
page read and write
160F000
stack
page read and write
4D21000
heap
page read and write
CB4000
heap
page read and write
CC4000
heap
page read and write
2A90000
direct allocation
page read and write
CC4000
heap
page read and write
34E4000
trusted library allocation
page read and write
CC4000
heap
page read and write
4110000
direct allocation
page read and write
CC4000
heap
page read and write
1890000
direct allocation
page execute and read and write
4D21000
heap
page read and write
2A932001000
heap
page read and write
2606F429000
heap
page read and write
4E61000
heap
page read and write
36DE000
stack
page read and write
2E2000
unkown
page execute and read and write
CC4000
heap
page read and write
2A90000
direct allocation
page read and write
2606F398000
heap
page read and write
4C50000
heap
page read and write
CC4000
heap
page read and write
3ACF000
stack
page read and write
CC4000
heap
page read and write
1800000
direct allocation
page read and write
29382D19000
heap
page read and write
4D21000
heap
page read and write
CC4000
heap
page read and write
EFE000
heap
page read and write
416F000
trusted library allocation
page read and write
443E000
stack
page read and write
CC4000
heap
page read and write
20E75653000
heap
page read and write
58DE000
stack
page read and write
C1000
unkown
page execute and read and write
2381D0DA000
heap
page read and write
4E61000
heap
page read and write
4D3E000
stack
page read and write
4E61000
heap
page read and write
54F6AFF000
stack
page read and write
166E000
stack
page read and write
3330000
heap
page read and write
1744000
heap
page read and write
CC5000
heap
page read and write
E2A000
heap
page read and write
413E000
stack
page read and write
CC4000
heap
page read and write
C34000
heap
page read and write
3263000
trusted library allocation
page read and write
4150000
heap
page read and write
C34000
heap
page read and write
D70000
heap
page read and write
CC4000
heap
page read and write
163F000
stack
page read and write
4D21000
heap
page read and write
4E60000
heap
page read and write
2606FEE8000
heap
page read and write
2606F335000
heap
page read and write
3495000
trusted library allocation
page read and write
C34000
heap
page read and write
4E61000
heap
page read and write
DE6000
heap
page read and write
CC4000
heap
page read and write
6A90000
trusted library allocation
page execute and read and write
15C0000
heap
page read and write
47C0000
trusted library allocation
page read and write
CC4000
heap
page read and write
56F0000
direct allocation
page execute and read and write
4A3F000
stack
page read and write
16A6B060000
heap
page read and write
20E74F75000
heap
page read and write
20781AE3000
heap
page read and write
20E7564A000
heap
page read and write
4C20000
direct allocation
page execute and read and write
29383167000
heap
page read and write
3F7E000
stack
page read and write
17F4000
heap
page read and write
1920000
heap
page read and write
207816B1000
heap
page read and write
23CA1810000
heap
page read and write
9199000
heap
page read and write
CC4000
heap
page read and write
412F000
stack
page read and write
5E40000
remote allocation
page read and write
4CB4000
direct allocation
page execute and read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
2606F46D000
heap
page read and write
4E3F000
stack
page read and write
4E61000
heap
page read and write
4D21000
heap
page read and write
395E000
stack
page read and write
CC4000
heap
page read and write
22C7D000
heap
page read and write
17F4000
heap
page read and write
2606F20B000
heap
page read and write
427000
unkown
page write copy
7FF8B6208000
unkown
page read and write
CC0000
heap
page read and write
5091000
heap
page read and write
CC4000
heap
page read and write
22CB3000
heap
page read and write
16A0000
heap
page read and write
CC4000
heap
page read and write
2606F40D000
heap
page read and write
33DE000
trusted library allocation
page read and write
1AA2E000
stack
page read and write
2606E760000
direct allocation
page read and write
2606F3B6000
heap
page read and write
CC4000
heap
page read and write
2E6F000
stack
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
349000
unkown
page write copy
1EB94965000
heap
page read and write
3310000
direct allocation
page read and write
CC4000
heap
page read and write
D8E000
heap
page read and write
2606F47E000
heap
page read and write
266B47B0000
heap
page read and write
1E13C1E8000
heap
page read and write
1ACAE000
stack
page read and write
147E000
heap
page read and write
4E61000
heap
page read and write
7FF8B9F72000
unkown
page readonly
36BE000
stack
page read and write
2737000
heap
page read and write
5091000
heap
page read and write
2606F235000
heap
page read and write
99B0000
heap
page read and write
4E61000
heap
page read and write
3C9000
unkown
page write copy
CC4000
heap
page read and write
3D3E000
stack
page read and write
2606F235000
heap
page read and write
28663DC0000
heap
page read and write
CC4000
heap
page read and write
4610000
direct allocation
page read and write
29382D03000
heap
page read and write
2606F484000
heap
page read and write
CC4000
heap
page read and write
4C40000
direct allocation
page execute and read and write
38BF000
stack
page read and write
3812000
trusted library allocation
page read and write
1E13C22D000
heap
page read and write
7FF8B8044000
unkown
page read and write
29384B6E000
heap
page read and write
29384B64000
heap
page read and write
744000
unkown
page execute and write copy
CC4000
heap
page read and write
35E0000
trusted library allocation
page read and write
22C81000
heap
page read and write
288F000
stack
page read and write
CC4000
heap
page read and write
5B0E000
stack
page read and write
4E61000
heap
page read and write
181B000
heap
page read and write
66E0000
heap
page read and write
5520000
direct allocation
page read and write
4CFE000
stack
page read and write
54F69FF000
unkown
page read and write
266B453A000
heap
page read and write
766F000
trusted library allocation
page read and write
2606FCD5000
heap
page read and write
293832B8000
heap
page read and write
1B3E056D000
heap
page read and write
6C640000
unkown
page readonly
2606F460000
heap
page read and write
CB4000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
564E000
stack
page read and write
7FF8A85C4000
unkown
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
1A55000
heap
page read and write
CC4000
heap
page read and write
E3A000
stack
page read and write
20E75636000
heap
page read and write
1500000
heap
page read and write
3590000
trusted library allocation
page read and write
CC5000
heap
page read and write
4D21000
heap
page read and write
3D4F000
stack
page read and write
5F80000
heap
page read and write
29382CDF000
heap
page read and write
1D6D000
heap
page read and write
5091000
heap
page read and write
2606C762000
heap
page read and write
1C7AE000
stack
page read and write
CC5000
heap
page read and write
6A70000
heap
page read and write
CC4000
heap
page read and write
20E75195000
heap
page read and write
5F85000
heap
page read and write
2606F20B000
heap
page read and write
2606C72C000
heap
page read and write
5EDD000
stack
page read and write
7FF8A7C6A000
unkown
page execute read
CC4000
heap
page read and write
2606F453000
heap
page read and write
B3A000
stack
page read and write
7FF8B7893000
unkown
page read and write
2687000
heap
page read and write
CC4000
heap
page read and write
7FF8BFAD1000
unkown
page readonly
4B70000
direct allocation
page execute and read and write
483E000
stack
page read and write
635E000
stack
page read and write
4E61000
heap
page read and write
2EF61000
heap
page read and write
4E61000
heap
page read and write
6AA0000
trusted library allocation
page execute and read and write
DDF000
heap
page read and write
2606FA50000
direct allocation
page read and write
1CAA0000
heap
page read and write
CC4000
heap
page read and write
4D21000
heap
page read and write
CC4000
heap
page read and write
2606F19E000
heap
page read and write
A2E6DEF000
stack
page read and write
CC4000
heap
page read and write
CB4000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
52F0000
direct allocation
page execute and read and write
281000
unkown
page execute and write copy
666B000
trusted library allocation
page read and write
2606F3C7000
heap
page read and write
2606C7D0000
unkown
page readonly
D00ACFB000
stack
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
1E13C206000
heap
page read and write
1C8ED000
stack
page read and write
20E75627000
heap
page read and write
CB4000
heap
page read and write
20E74F44000
heap
page read and write
FEF000
stack
page read and write
1AAF000
heap
page read and write
1EB94752000
heap
page read and write
3BBE000
stack
page read and write
4E61000
heap
page read and write
20E74F8C000
heap
page read and write
9170000
heap
page read and write
CB4000
heap
page read and write
1063000
unkown
page execute and read and write
5091000
heap
page read and write
1D0C6AB0000
heap
page read and write
5C1F000
stack
page read and write
4E61000
heap
page read and write
293832D9000
heap
page read and write
ED4000
heap
page read and write
28DE000
stack
page read and write
20E74F81000
heap
page read and write
207FDA5C000
heap
page read and write
2A90000
direct allocation
page read and write
CC4000
heap
page read and write
5260000
direct allocation
page execute and read and write
4610000
direct allocation
page read and write
4E61000
heap
page read and write
402E000
stack
page read and write
93A0000
trusted library allocation
page read and write
29382D1E000
heap
page read and write
65CF000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
344C000
trusted library allocation
page read and write
4BFF000
stack
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
CB4000
heap
page read and write
CB4000
heap
page read and write
CC4000
heap
page read and write
1EB94725000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
5091000
heap
page read and write
6410000
heap
page read and write
4C4000
unkown
page execute and read and write
4241000
trusted library allocation
page read and write
39EE000
stack
page read and write
7FF8B7FE0000
unkown
page readonly
CC4000
heap
page read and write
4BBF000
stack
page read and write
20E74F8E000
heap
page read and write
CC4000
heap
page read and write
7FF724E01000
unkown
page execute read
28663E01000
heap
page read and write
CC4000
heap
page read and write
24D0000
heap
page read and write
4E61000
heap
page read and write
7FF8B27B0000
unkown
page readonly
51DB000
stack
page read and write
37DF000
stack
page read and write
CC5000
heap
page read and write
41E1000
trusted library allocation
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
22C7B000
heap
page read and write
4C20000
direct allocation
page execute and read and write
35D2000
trusted library allocation
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
5700000
direct allocation
page execute and read and write
13C0000
direct allocation
page read and write
56C5000
trusted library allocation
page read and write
9201000
heap
page read and write
CB4000
heap
page read and write
5091000
heap
page read and write
117C000
heap
page read and write
CC4000
heap
page read and write
22CBD000
heap
page read and write
2D9B87D1000
heap
page read and write
1B3E0566000
heap
page read and write
CC4000
heap
page read and write
824000
unkown
page execute and write copy
EDD000
heap
page read and write
207FF341000
heap
page read and write
DD5000
heap
page read and write
CC4000
heap
page read and write
DDF000
heap
page read and write
20E74F8F000
heap
page read and write
295F000
stack
page read and write
20E74F25000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
2606FD93000
heap
page read and write
5091000
heap
page read and write
22CBD000
heap
page read and write
7FF698D71000
unkown
page readonly
CC4000
heap
page read and write
17F4000
heap
page read and write
1744000
heap
page read and write
7FF8B8AF7000
unkown
page readonly
5190000
trusted library allocation
page read and write
7FF8BA246000
unkown
page readonly
CC4000
heap
page read and write
7FF8B8020000
unkown
page readonly
7FF8A7AC6000
unkown
page readonly
3F80000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
3F7E000
stack
page read and write
4D21000
heap
page read and write
2606C650000
heap
page read and write
15CB000
heap
page read and write
16A6B050000
heap
page read and write
2606F3B6000
heap
page read and write
C78D5FF000
stack
page read and write
5091000
heap
page read and write
3BBE000
stack
page read and write
CC4000
heap
page read and write
23D56AA8000
heap
page read and write
7FF8A8BB0000
unkown
page read and write
CC4000
heap
page read and write
1F6A000
heap
page read and write
2BFE000
stack
page read and write
CC5000
heap
page read and write
20E76EC1000
heap
page read and write
7B0000
heap
page read and write
CC4000
heap
page read and write
6036000
heap
page read and write
2606FD93000
heap
page read and write
4E61000
heap
page read and write
7E18000
heap
page read and write
678D000
heap
page read and write
5BB0000
trusted library allocation
page execute and read and write
2606F2E8000
heap
page read and write
91DC000
heap
page read and write
22C95000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
4110000
heap
page read and write
F50000
heap
page read and write
CC5000
heap
page read and write
2D9B87B0000
heap
page read and write
12D4000
heap
page read and write
2606F44A000
heap
page read and write
4547000
trusted library allocation
page read and write
4D60000
direct allocation
page execute and read and write
4E61000
heap
page read and write
C0000
unkown
page readonly
CC4000
heap
page read and write
5DDE000
stack
page read and write
4CC0000
direct allocation
page execute and read and write
DB9000
unkown
page read and write
28D9F000
heap
page read and write
4E61000
heap
page read and write
9D12DFB000
stack
page read and write
337E000
stack
page read and write
46C1000
heap
page read and write
4D21000
heap
page read and write
500000
remote allocation
page execute and read and write
435E000
stack
page read and write
5091000
heap
page read and write
644F000
stack
page read and write
CB4000
heap
page read and write
1684000
heap
page read and write
4E61000
heap
page read and write
CC5000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
CB4000
heap
page read and write
CC4000
heap
page read and write
1B3E056F000
heap
page read and write
4C49000
stack
page read and write
D40000
heap
page read and write
CC4000
heap
page read and write
2606F2CF000
heap
page read and write
C1000
unkown
page execute and write copy
7FF8A8BAA000
unkown
page write copy
56F0000
direct allocation
page execute and read and write
4E61000
heap
page read and write
286640A0000
heap
page read and write
1450000
direct allocation
page read and write
14AF000
stack
page read and write
1C630000
heap
page read and write
393E000
stack
page read and write
1C78E000
stack
page read and write
501E000
stack
page read and write
20E74F8D000
heap
page read and write
46C2000
heap
page read and write
CC4000
heap
page read and write
CB4000
heap
page read and write
17F4000
heap
page read and write
4100000
heap
page read and write
2606E6C8000
heap
page read and write
CC5000
heap
page read and write
CB4000
heap
page read and write
5C6D000
stack
page read and write
3F3F000
stack
page read and write
4E61000
heap
page read and write
343E000
stack
page read and write
CC4000
heap
page read and write
BB0000
heap
page read and write
63E000
unkown
page execute and read and write
4E61000
heap
page read and write
EEF000
stack
page read and write
CB4000
heap
page read and write
CC4000
heap
page read and write
104E000
stack
page read and write
5240000
direct allocation
page execute and read and write
1684000
heap
page read and write
5091000
heap
page read and write
4E61000
heap
page read and write
20E74F24000
heap
page read and write
CC4000
heap
page read and write
D30000
unkown
page readonly
CC4000
heap
page read and write
2606E660000
heap
page read and write
6410000
heap
page read and write
5A00000
heap
page execute and read and write
207FDA76000
heap
page read and write
4E61000
heap
page read and write
12D4000
heap
page read and write
2606C72A000
heap
page read and write
4CBC000
direct allocation
page execute and read and write
3E7F000
stack
page read and write
CB4000
heap
page read and write
2606F2D9000
heap
page read and write
22CA5000
heap
page read and write
2C2E000
stack
page read and write
2606E6CA000
heap
page read and write
4631000
heap
page read and write
CC4000
heap
page read and write
20781ABE000
heap
page read and write
CC4000
heap
page read and write
4630000
heap
page read and write
1F3978FA000
heap
page read and write
1150000
heap
page read and write
20E7564C000
heap
page read and write
2A932001000
heap
page read and write
7FF725AC0000
unkown
page read and write
CC4000
heap
page read and write
1744000
heap
page read and write
587000
remote allocation
page execute and read and write
22C97000
heap
page read and write
20781413000
heap
page read and write
2606F3B1000
heap
page read and write
1C68E000
stack
page read and write
97DC000
stack
page read and write
6770000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
4D21000
heap
page read and write
4B00000
heap
page read and write
1140000
heap
page read and write
4D21000
heap
page read and write
981000
unkown
page execute and read and write
12A7000
heap
page read and write
CC4000
heap
page read and write
12D4000
heap
page read and write
207FDB95000
heap
page read and write
4B0F000
stack
page read and write
CC4000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
7F0000
unkown
page readonly
CC4000
heap
page read and write
ED4000
heap
page read and write
CC4000
heap
page read and write
39BE000
stack
page read and write
4E61000
heap
page read and write
3A3F000
stack
page read and write
29382D12000
heap
page read and write
7FF724E00000
unkown
page readonly
362E000
stack
page read and write
28E0000
heap
page read and write
CF3000
stack
page read and write
25ED000
heap
page execute and read and write
2F00000
direct allocation
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
D31000
unkown
page execute read
1450000
direct allocation
page read and write
750E000
stack
page read and write
56B0000
direct allocation
page execute and read and write
7FF8B6021000
unkown
page execute read
62BE000
stack
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
266B4551000
heap
page read and write
206439FC000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
7FF725A6C000
unkown
page readonly
CC4000
heap
page read and write
161B000
stack
page read and write
3807000
trusted library allocation
page read and write
298D4A40000
heap
page read and write
4E61000
heap
page read and write
7FF8B5730000
unkown
page readonly
7FF8BFAD7000
unkown
page readonly
29382CF2000
heap
page read and write
293832E9000
heap
page read and write
20E7517A000
heap
page read and write
44D3000
trusted library allocation
page read and write
20E76ECF000
heap
page read and write
63D0000
heap
page read and write
2606F3CE000
heap
page read and write
CB4000
heap
page read and write
353F000
stack
page read and write
7FF8A7C7D000
unkown
page execute read
CC4000
heap
page read and write
7D0F000
stack
page read and write
1EC1000
heap
page read and write
CC5000
heap
page read and write
2606C72C000
heap
page read and write
4E61000
heap
page read and write
7FF8A7E2F000
unkown
page readonly
22C97000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
7FF8A8BAC000
unkown
page read and write
22C8F000
heap
page read and write
4D21000
heap
page read and write
40CF000
stack
page read and write
32C3000
trusted library allocation
page read and write
1C96E000
stack
page read and write
CC4000
heap
page read and write
5091000
heap
page read and write
4C90000
direct allocation
page execute and read and write
4E61000
heap
page read and write
59F000
unkown
page execute and write copy
CC4000
heap
page read and write
4E61000
heap
page read and write
317F000
stack
page read and write
5091000
heap
page read and write
17F4000
heap
page read and write
C9E000
stack
page read and write
CC4000
heap
page read and write
2606E9C4000
heap
page read and write
D20000
direct allocation
page read and write
56D0000
trusted library allocation
page read and write
CC4000
heap
page read and write
7FF8B800F000
unkown
page readonly
CC4000
heap
page read and write
22C8A000
heap
page read and write
4B20000
heap
page read and write
4D21000
heap
page read and write
CC4000
heap
page read and write
7FF8B782B000
unkown
page readonly
266B4551000
heap
page read and write
4D21000
heap
page read and write
657C000
stack
page read and write
7FF8A85D2000
unkown
page read and write
2F7F000
stack
page read and write
4CFF000
stack
page read and write
7FF698D75000
unkown
page read and write
4E61000
heap
page read and write
4620000
heap
page read and write
CC4000
heap
page read and write
13C0000
direct allocation
page read and write
349000
unkown
page read and write
CC4000
heap
page read and write
319F000
stack
page read and write
7FF8A8BBD000
unkown
page readonly
129C000
stack
page read and write
59F000
unkown
page execute and write copy
CC4000
heap
page read and write
2078002D000
heap
page read and write
32B7000
heap
page read and write
1B3E0579000
heap
page read and write
2606F209000
heap
page read and write
4E61000
heap
page read and write
3647000
trusted library allocation
page read and write
8BE9000
heap
page read and write
DE6000
heap
page read and write
CC4000
heap
page read and write
17C0000
heap
page read and write
20E7562C000
heap
page read and write
4E61000
heap
page read and write
56B0000
direct allocation
page execute and read and write
4E61000
heap
page read and write
493E000
stack
page read and write
4D21000
heap
page read and write
CC4000
heap
page read and write
4D21000
heap
page read and write
D8E000
heap
page read and write
CC4000
heap
page read and write
29384B6D000
heap
page read and write
37BF000
stack
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
4CC9000
direct allocation
page execute and read and write
1B3E0566000
heap
page read and write
1AB6E000
stack
page read and write
266B4551000
heap
page read and write
192000
stack
page read and write
7FF8B78A0000
unkown
page readonly
CC4000
heap
page read and write
7FF8B9849000
unkown
page read and write
124E000
stack
page read and write
5AC000
unkown
page execute and read and write
CC5000
heap
page read and write
C34000
heap
page read and write
2675000
heap
page read and write
5091000
heap
page read and write
CC4000
heap
page read and write
1E13C415000
heap
page read and write
4E61000
heap
page read and write
20E74F42000
heap
page read and write
CC4000
heap
page read and write
2606F3B1000
heap
page read and write
CC4000
heap
page read and write
5091000
heap
page read and write
93C0000
trusted library allocation
page execute and read and write
48FF000
stack
page read and write
4E61000
heap
page read and write
342000
unkown
page execute and read and write
CC4000
heap
page read and write
596E000
stack
page read and write
1D0C67D0000
heap
page read and write
20E74F4E000
heap
page read and write
2657000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
6671000
trusted library allocation
page read and write
CC4000
heap
page read and write
3483000
trusted library allocation
page read and write
2606F3C5000
heap
page read and write
2606F3B9000
heap
page read and write
6925F000
unkown
page readonly
CC4000
heap
page read and write
22C90000
heap
page read and write
41FE000
stack
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
4D21000
heap
page read and write
13F0000
heap
page read and write
CC4000
heap
page read and write
74E0000
trusted library allocation
page read and write
23D56A20000
heap
page read and write
40D0000
heap
page read and write
1EB9475C000
heap
page read and write
CC4000
heap
page read and write
5091000
heap
page read and write
2606EB45000
heap
page read and write
5091000
heap
page read and write
1B0CE000
stack
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
CC5000
heap
page read and write
4E61000
heap
page read and write
7E10000
heap
page read and write
4E61000
heap
page read and write
1B3E057C000
heap
page read and write
6400000
heap
page read and write
2606F235000
heap
page read and write
2606F2B4000
heap
page read and write
6AFE000
stack
page read and write
661000
unkown
page execute read
2A90000
direct allocation
page read and write
14F0000
heap
page execute and read and write
2606F39B000
heap
page read and write
5091000
heap
page read and write
20E76ECE000
heap
page read and write
4E61000
heap
page read and write
4A7F000
stack
page read and write
1E13C23B000
heap
page read and write
D50000
unkown
page readonly
3247000
trusted library allocation
page read and write
7FF8A7B24000
unkown
page readonly
7FF8B8258000
unkown
page readonly
CC4000
heap
page read and write
CC4000
heap
page read and write
CB4000
heap
page read and write
20E75177000
heap
page read and write
2E0000
unkown
page readonly
7FF699788000
unkown
page readonly
2606F469000
heap
page read and write
8629EFC000
stack
page read and write
B1FCC4D000
stack
page read and write
CC4000
heap
page read and write
1744000
heap
page read and write
1063000
unkown
page execute and write copy
1E17000
heap
page read and write
22C70000
heap
page read and write
10FE000
stack
page read and write
5FD0000
heap
page read and write
49F000
remote allocation
page execute and read and write
7680000
trusted library allocation
page read and write
4E61000
heap
page read and write
20E74F75000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
29382D03000
heap
page read and write
4E61000
heap
page read and write
ED5000
heap
page read and write
4E61000
heap
page read and write
2606F47C000
heap
page read and write
207813DB000
heap
page read and write
C20000
direct allocation
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
CB0000
heap
page read and write
641A000
heap
page read and write
13C0000
direct allocation
page read and write
2606C6D0000
heap
page read and write
6A80000
trusted library allocation
page read and write
3E5E000
stack
page read and write
2606F2F0000
heap
page read and write
CC4000
heap
page read and write
CC5000
heap
page read and write
DB9000
unkown
page read and write
4E61000
heap
page read and write
1800000
direct allocation
page read and write
336F000
stack
page read and write
4E61000
heap
page read and write
15FF000
stack
page read and write
2606E9F3000
heap
page read and write
22C8A000
heap
page read and write
2DBF000
stack
page read and write
CC4000
heap
page read and write
40C0000
direct allocation
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
20643F60000
heap
page read and write
1C83000
heap
page read and write
CC4000
heap
page read and write
298D4A60000
heap
page read and write
45BE000
stack
page read and write
53C0000
direct allocation
page execute and read and write
4E61000
heap
page read and write
4C4000
remote allocation
page execute and read and write
13C0000
direct allocation
page read and write
4E61000
heap
page read and write
FA0000
heap
page read and write
1B3E0542000
heap
page read and write
22C97000
heap
page read and write
7FF8BA243000
unkown
page readonly
457E000
stack
page read and write
55A1000
direct allocation
page read and write
4D21000
heap
page read and write
4E61000
heap
page read and write
1923000
heap
page read and write
7FF698D7F000
unkown
page read and write
1B1E000
stack
page read and write
3524000
trusted library allocation
page read and write
4CD0000
direct allocation
page execute and read and write
4E61000
heap
page read and write
CB4000
heap
page read and write
4E61000
heap
page read and write
2606F3C5000
heap
page read and write
2606F467000
heap
page read and write
386F000
stack
page read and write
2606F47C000
heap
page read and write
CC4000
heap
page read and write
4A40000
heap
page read and write
4D21000
heap
page read and write
20781DC4000
heap
page read and write
4D21000
heap
page read and write
9BA000
stack
page read and write
183B000
heap
page read and write
DBB000
unkown
page execute and read and write
2606F38A000
heap
page read and write
CC4000
heap
page read and write
5091000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
29384B60000
heap
page read and write
CC4000
heap
page read and write
1855000
heap
page read and write
6C62E000
unkown
page read and write
4E61000
heap
page read and write
2D9B87D1000
heap
page read and write
CC4000
heap
page read and write
CC5000
heap
page read and write
13C0000
direct allocation
page read and write
450E000
trusted library allocation
page read and write
7FF8A8BE0000
unkown
page readonly
578E000
stack
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
401000
unkown
page execute read
4D21000
heap
page read and write
CB4000
heap
page read and write
4E61000
heap
page read and write
29382D01000
heap
page read and write
20E74F42000
heap
page read and write
7FF8B77FE000
unkown
page readonly
6850000
trusted library allocation
page read and write
28D43000
heap
page read and write
C34000
heap
page read and write
22CB2000
heap
page read and write
D51000
unkown
page execute and write copy
634E000
stack
page read and write
4610000
direct allocation
page read and write
5091000
heap
page read and write
104E000
stack
page read and write
1B56000
heap
page read and write
5710000
direct allocation
page execute and read and write
3C7F000
stack
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
20E74F33000
heap
page read and write
1AC6D000
stack
page read and write
493F000
stack
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
CC5000
heap
page read and write
2606E9EC000
heap
page read and write
2A932345000
heap
page read and write
22C8D000
heap
page read and write
407F000
stack
page read and write
E20000
heap
page read and write
5260000
direct allocation
page execute and read and write
5091000
heap
page read and write
4E61000
heap
page read and write
1F81000
heap
page read and write
2606F0A0000
heap
page read and write
CC4000
heap
page read and write
25EE000
heap
page read and write
CC4000
heap
page read and write
28D7F000
heap
page read and write
43FF000
stack
page read and write
74B000
unkown
page readonly
1D0C68F0000
heap
page read and write
6C5A0000
unkown
page readonly
4E61000
heap
page read and write
29382D1E000
heap
page read and write
2606F5C0000
direct allocation
page read and write
3454000
trusted library allocation
page read and write
CB4000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
CC743BF000
stack
page read and write
1C66F000
stack
page read and write
500000
unkown
page execute and read and write
4AF0000
heap
page read and write
206438F5000
heap
page read and write
3CBF000
stack
page read and write
52A0000
direct allocation
page execute and read and write
4BA1000
direct allocation
page read and write
2606F2C4000
heap
page read and write
203C000
heap
page read and write
206438F0000
heap
page read and write
CC4000
heap
page read and write
4A0E000
stack
page read and write
1800000
direct allocation
page read and write
2FEE000
stack
page read and write
20E74E80000
trusted library allocation
page read and write
CC4000
heap
page read and write
207FF366000
heap
page read and write
CC4000
heap
page read and write
B1FB953000
stack
page read and write
7FF8A7F31000
unkown
page execute read
348F000
stack
page read and write
2606F3C6000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
CC5000
heap
page read and write
7FF725A44000
unkown
page read and write
1CAA1000
heap
page read and write
4E61000
heap
page read and write
4CB4000
direct allocation
page execute and read and write
293832B0000
heap
page read and write
462F000
stack
page read and write
4D30000
heap
page read and write
293832D9000
heap
page read and write
1F3977A0000
heap
page read and write
5F4000
unkown
page execute and write copy
360E000
stack
page read and write
CC4000
heap
page read and write
CC5000
heap
page read and write
20E7519B000
heap
page read and write
CC4000
heap
page read and write
1453000
trusted library allocation
page execute and read and write
CB4000
heap
page read and write
5091000
heap
page read and write
73F78FF000
stack
page read and write
1885000
heap
page read and write
64B0000
heap
page read and write
C8E000
stack
page read and write
94B0000
trusted library allocation
page execute and read and write
74D0000
trusted library allocation
page execute and read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
C70000
heap
page read and write
3DAE000
stack
page read and write
CC4000
heap
page read and write
22C9D000
heap
page read and write
4E61000
heap
page read and write
41FE000
trusted library allocation
page read and write
46C1000
heap
page read and write
1174000
heap
page read and write
4B7F000
stack
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
68F0000
trusted library allocation
page execute and read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
CC742B7000
stack
page read and write
3A7E000
stack
page read and write
4E61000
heap
page read and write
1684000
heap
page read and write
28663D90000
heap
page read and write
4E61000
heap
page read and write
274F4000
heap
page read and write
8900000
trusted library allocation
page read and write
423F000
stack
page read and write
CC4000
heap
page read and write
50D0000
direct allocation
page read and write
5A2E000
stack
page read and write
73F787E000
stack
page read and write
1C68E000
stack
page read and write
22C97000
heap
page read and write
4D21000
heap
page read and write
305F000
stack
page read and write
1ADAF000
stack
page read and write
20781646000
heap
page read and write
29382CE1000
heap
page read and write
53A0000
direct allocation
page execute and read and write
EEF000
heap
page read and write
28DA9000
heap
page read and write
CC4000
heap
page read and write
5760000
trusted library allocation
page execute and read and write
20781E6D000
heap
page read and write
5260000
direct allocation
page execute and read and write
2606F39F000
heap
page read and write
59F000
unkown
page execute and read and write
C78D57C000
stack
page read and write
4E61000
heap
page read and write
1F2E000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
7540000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
19E000
stack
page read and write
CC4000
heap
page read and write
457F000
stack
page read and write
661000
unkown
page execute read
1EB94708000
heap
page read and write
9191000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
5AD000
unkown
page execute and read and write
23D56CD0000
heap
page read and write
C1415BC000
stack
page read and write
CB4000
heap
page read and write
24D5000
heap
page read and write
3DFE000
stack
page read and write
CC4000
heap
page read and write
2606E70F000
heap
page read and write
26C7000
heap
page read and write
7160000
heap
page read and write
4E61000
heap
page read and write
FED000
stack
page read and write
3FBF000
stack
page read and write
2666000
heap
page read and write
293832B7000
heap
page read and write
2577000
heap
page read and write
32DF000
stack
page read and write
CC4000
heap
page read and write
1F3979F0000
heap
page read and write
4E61000
heap
page read and write
1684000
heap
page read and write
1EB9472B000
heap
page read and write
9D129FE000
stack
page read and write
22C93000
heap
page read and write
52F0000
direct allocation
page execute and read and write
410F000
stack
page read and write
20643932000
heap
page read and write
CC4000
heap
page read and write
293832C4000
heap
page read and write
4240000
heap
page read and write
387E000
stack
page read and write
3699000
trusted library allocation
page read and write
2E9000
unkown
page read and write
7FF724E01000
unkown
page execute read
4D21000
heap
page read and write
DDC000
heap
page read and write
68C0000
trusted library allocation
page read and write
326B000
trusted library allocation
page read and write
A2E717E000
stack
page read and write
CC4000
heap
page read and write
CB4000
heap
page read and write
7FF698D6D000
unkown
page readonly
266B000
heap
page read and write
3554000
trusted library allocation
page read and write
F00000
heap
page read and write
CC5000
heap
page read and write
5DC000
unkown
page execute and read and write
6676000
trusted library allocation
page read and write
CB4000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
12D4000
heap
page read and write
214AA000
heap
page read and write
4110000
heap
page read and write
7FF725A6C000
unkown
page readonly
7642000
trusted library allocation
page read and write
CB4000
heap
page read and write
4D21000
heap
page read and write
6354000
heap
page read and write
5080000
direct allocation
page read and write
8BB000
stack
page read and write
5091000
heap
page read and write
3F9E000
stack
page read and write
5A7000
unkown
page execute and read and write
CC5000
heap
page read and write
44DF000
trusted library allocation
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
CC5000
heap
page read and write
CC4000
heap
page read and write
2606C620000
heap
page read and write
7FF8B7FFC000
unkown
page readonly
2606FC48000
direct allocation
page read and write
2D9B8740000
heap
page read and write
CC4000
heap
page read and write
3CBE000
stack
page read and write
4D21000
heap
page read and write
50D0000
direct allocation
page read and write
4E70000
heap
page read and write
2D62F000
stack
page read and write
1C78E000
stack
page read and write
61CF000
stack
page read and write
CF0EFFF000
stack
page read and write
5091000
heap
page read and write
33C2000
trusted library allocation
page read and write
560F000
stack
page read and write
5091000
heap
page read and write
13C0000
direct allocation
page read and write
2140C000
heap
page read and write
D62000
unkown
page read and write
7FF8B783C000
unkown
page read and write
4E61000
heap
page read and write
7FF8B5D04000
unkown
page readonly
7FF8B78A1000
unkown
page execute read
7FF8B7FD7000
unkown
page readonly
293832D9000
heap
page read and write
397F000
stack
page read and write
5300000
direct allocation
page execute and read and write
400000
remote allocation
page execute and read and write
CC5000
heap
page read and write
67A2000
trusted library allocation
page read and write
22C97000
heap
page read and write
4D21000
heap
page read and write
7FF698D85000
unkown
page read and write
CC4000
heap
page read and write
C34000
heap
page read and write
352E000
trusted library allocation
page read and write
52DF000
stack
page read and write
CC4000
heap
page read and write
66E4000
heap
page read and write
1744000
heap
page read and write
CC4000
heap
page read and write
1290000
heap
page read and write
AFC000
stack
page read and write
CC4000
heap
page read and write
20E74F30000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
7FF8BA507000
unkown
page read and write
6A80000
heap
page read and write
DDD000
stack
page read and write
7FF8A7BED000
unkown
page execute read
20E74F4D000
heap
page read and write
2606E6B5000
heap
page read and write
28D3A000
heap
page read and write
7FF8B7810000
unkown
page readonly
668E000
trusted library allocation
page read and write
790000
unkown
page execute and read and write
3566000
trusted library allocation
page read and write
1C61F000
stack
page read and write
CC5000
heap
page read and write
3161000
trusted library allocation
page read and write
CC4000
heap
page read and write
B1FC2DE000
stack
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
1684000
heap
page read and write
4C51000
heap
page read and write
CC4000
heap
page read and write
54F68FD000
stack
page read and write
4E61000
heap
page read and write
2606F2EE000
heap
page read and write
1C4BF000
stack
page read and write
3B9F000
stack
page read and write
CC4000
heap
page read and write
4ADE000
stack
page read and write
338E000
stack
page read and write
7FF8B8260000
unkown
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
1C92E000
stack
page read and write
400000
remote allocation
page execute and read and write
7FF699788000
unkown
page readonly
6AB0000
trusted library allocation
page read and write
293832CF000
heap
page read and write
4CF0000
direct allocation
page execute and read and write
DB2000
unkown
page execute and read and write
2606F2F9000
heap
page read and write
910E000
heap
page read and write
34EE000
stack
page read and write
1AB2F000
stack
page read and write
7FF8B7FE1000
unkown
page execute read
29382CE1000
heap
page read and write
1C4EF000
stack
page read and write
2AB0000
heap
page read and write
98A0000
heap
page read and write
CC4000
heap
page read and write
2064399A000
heap
page read and write
CC4000
heap
page read and write
E98000
unkown
page readonly
2670000
heap
page read and write
CC4000
heap
page read and write
1744000
heap
page read and write
23CA158B000
heap
page read and write
5A0000
unkown
page execute and write copy
4206000
trusted library allocation
page read and write
28DA9000
heap
page read and write
7FF8B8251000
unkown
page execute read
CC4000
heap
page read and write
2606F45D000
heap
page read and write
7FF8BFAC1000
unkown
page execute read
2606F2F8000
heap
page read and write
7FF8A8B93000
unkown
page write copy
7FF724E00000
unkown
page readonly
7FF8B8791000
unkown
page execute read
CC5000
heap
page read and write
CC4000
heap
page read and write
4621000
heap
page read and write
30BF000
stack
page read and write
A2E707E000
stack
page read and write
4CC0000
direct allocation
page execute and read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
303F000
stack
page read and write
CC4000
heap
page read and write
5310000
direct allocation
page execute and read and write
2606F44A000
heap
page read and write
CC4000
heap
page read and write
2606F429000
heap
page read and write
2606C71B000
heap
page read and write
29382CF0000
heap
page read and write
325A000
trusted library allocation
page read and write
56AD000
trusted library allocation
page read and write
28663E01000
heap
page read and write
352C000
trusted library allocation
page read and write
CC5000
heap
page read and write
1744000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
1EB94751000
heap
page read and write
2A90000
direct allocation
page read and write
7F010000
trusted library allocation
page execute and read and write
CC4000
heap
page read and write
627F000
stack
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
1684000
heap
page read and write
17F4000
heap
page read and write
4E61000
heap
page read and write
2E1000
unkown
page execute and write copy
C20000
direct allocation
page read and write
CC5000
heap
page read and write
4D21000
heap
page read and write
2A90000
direct allocation
page read and write
CC4000
heap
page read and write
7FF8BA251000
unkown
page execute read
1F6000
unkown
page execute and write copy
2606F1A1000
heap
page read and write
CC4000
heap
page read and write
9116000
heap
page read and write
29383165000
heap
page read and write
351B000
trusted library allocation
page read and write
DBB000
unkown
page execute and read and write
4D20000
heap
page read and write
2606EB48000
heap
page read and write
4E61000
heap
page read and write
941E000
stack
page read and write
CC4000
heap
page read and write
2606F39D000
heap
page read and write
CC4000
heap
page read and write
29382D00000
heap
page read and write
46C1000
heap
page read and write
29382CF0000
heap
page read and write
20781692000
heap
page read and write
274FE000
heap
page read and write
20E74F81000
heap
page read and write
CC4000
heap
page read and write
4FD000
remote allocation
page execute and read and write
2606FC94000
heap
page read and write
1EB94735000
heap
page read and write
32B0000
heap
page read and write
DE6000
heap
page read and write
113D000
stack
page read and write
5270000
direct allocation
page execute and read and write
CC4000
heap
page read and write
22CA4000
heap
page read and write
CC4000
heap
page read and write
9136000
heap
page read and write
2606E360000
direct allocation
page read and write
3511C000
stack
page read and write
28664095000
heap
page read and write
4E61000
heap
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
293832C3000
heap
page read and write
4201000
trusted library allocation
page read and write
4C20000
direct allocation
page execute and read and write
979E000
stack
page read and write
4E61000
heap
page read and write
43AF000
stack
page read and write
4D40000
heap
page read and write
4E61000
heap
page read and write
5740000
heap
page read and write
4E61000
heap
page read and write
4D21000
heap
page read and write
44F6000
trusted library allocation
page read and write
1684000
heap
page read and write
69092000
unkown
page readonly
CB4000
heap
page read and write
40FF000
stack
page read and write
CB4000
heap
page read and write
2606FC0C000
direct allocation
page read and write
822000
unkown
page read and write
4E61000
heap
page read and write
2606EC60000
direct allocation
page read and write
3FCF000
stack
page read and write
20E7517A000
heap
page read and write
4E61000
heap
page read and write
2606FA98000
direct allocation
page read and write
2381D1E0000
heap
page read and write
22C95000
heap
page read and write
4E61000
heap
page read and write
7FF8B8836000
unkown
page readonly
447E000
stack
page read and write
4E61000
heap
page read and write
282E000
stack
page read and write
3577000
trusted library allocation
page read and write
4CA0000
direct allocation
page execute and read and write
CC4000
heap
page read and write
4D21000
heap
page read and write
DB9000
unkown
page write copy
2938316A000
heap
page read and write
4EE0000
heap
page read and write
13AE000
stack
page read and write
26C1000
heap
page read and write
CC4000
heap
page read and write
2606F453000
heap
page read and write
7FF8B77FD000
unkown
page read and write
1800000
direct allocation
page read and write
63BF000
stack
page read and write
3A3F000
stack
page read and write
4E61000
heap
page read and write
244C000
unkown
page readonly
4CE0000
direct allocation
page execute and read and write
2A9321D0000
heap
page read and write
4505000
trusted library allocation
page read and write
48CE000
stack
page read and write
CC4000
heap
page read and write
20E74F81000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
28D28000
heap
page read and write
28D2E000
heap
page read and write
5091000
heap
page read and write
2720000
heap
page read and write
400E000
stack
page read and write
7FF8A7BD1000
unkown
page readonly
F68000
heap
page read and write
414E000
stack
page read and write
4E61000
heap
page read and write
143E000
stack
page read and write
7FF8B8831000
unkown
page execute read
14C0000
trusted library allocation
page execute and read and write
D56000
unkown
page readonly
22CB3000
heap
page read and write
7FF698D51000
unkown
page execute read
CC4000
heap
page read and write
207815C2000
heap
page read and write
5300000
direct allocation
page execute and read and write
400000
unkown
page readonly
DB1000
heap
page read and write
271E000
stack
page read and write
1744000
heap
page read and write
5E40000
remote allocation
page read and write
DD8000
heap
page read and write
7FF8A7EFF000
unkown
page read and write
CB4000
heap
page read and write
DD7000
heap
page read and write
20E74F2A000
heap
page read and write
207FDA69000
heap
page read and write
7FF8B883B000
unkown
page read and write
40E0000
direct allocation
page execute and read and write
68AB000
stack
page read and write
CB4000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
4CA4000
direct allocation
page execute and read and write
56B0000
direct allocation
page execute and read and write
CC4000
heap
page read and write
3EBE000
stack
page read and write
CB4000
heap
page read and write
2606E682000
heap
page read and write
28663DEA000
heap
page read and write
CC5000
heap
page read and write
4730000
trusted library allocation
page read and write
1744000
heap
page read and write
4E61000
heap
page read and write
20643978000
heap
page read and write
5091000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
22C97000
heap
page read and write
CC4000
heap
page read and write
1F0B000
heap
page read and write
207FDA64000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
1744000
heap
page read and write
206439A9000
heap
page read and write
4610000
direct allocation
page read and write
2606E6CF000
heap
page read and write
1820000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
CC5000
heap
page read and write
7FF8A7E2D000
unkown
page execute read
CC4000
heap
page read and write
20E7565A000
heap
page read and write
17F4000
heap
page read and write
44EF000
trusted library allocation
page read and write
2606F2E7000
heap
page read and write
2606F3B1000
heap
page read and write
409F000
stack
page read and write
33FF000
stack
page read and write
1EB9474C000
heap
page read and write
3B3F000
stack
page read and write
206438B0000
heap
page read and write
CC4000
heap
page read and write
CB4000
heap
page read and write
22C9D000
heap
page read and write
6C825000
unkown
page readonly
19C000
stack
page read and write
267B000
heap
page read and write
400000
unkown
page readonly
29382C10000
heap
page read and write
7FF8B78BE000
unkown
page read and write
4CB4000
direct allocation
page execute and read and write
26C5000
heap
page read and write
29382C50000
trusted library allocation
page read and write
CC4000
heap
page read and write
20E74EB0000
heap
page read and write
2606F453000
heap
page read and write
22C95000
heap
page read and write
2606FC50000
heap
page read and write
4621000
heap
page read and write
42AE000
stack
page read and write
374E000
stack
page read and write
4CC0000
direct allocation
page execute and read and write
416E000
stack
page read and write
EEF000
heap
page read and write
407E000
stack
page read and write
391F000
stack
page read and write
2606E70F000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
7FF8B9F71000
unkown
page read and write
CC4000
heap
page read and write
CB4000
heap
page read and write
22B1D000
heap
page read and write
D6F810C000
stack
page read and write
CC4000
heap
page read and write
99C1000
heap
page read and write
2595000
heap
page read and write
4C7000
unkown
page execute and read and write
6030000
heap
page read and write
1D98000
heap
page read and write
2EEC0000
trusted library allocation
page read and write
4E61000
heap
page read and write
477000
unkown
page execute and read and write
4610000
direct allocation
page read and write
CC7467F000
stack
page read and write
CB4000
heap
page read and write
2A3E000
stack
page read and write
2EB000
unkown
page execute and read and write
22C93000
heap
page read and write
2950000
heap
page read and write
CC5000
heap
page read and write
4E61000
heap
page read and write
74CC000
trusted library allocation
page read and write
5380000
direct allocation
page execute and read and write
DB2000
unkown
page execute and read and write
2606F44A000
heap
page read and write
CED000
stack
page read and write
298D4B80000
heap
page read and write
4610000
direct allocation
page read and write
4220000
trusted library allocation
page read and write
2606F3CD000
heap
page read and write
4E61000
heap
page read and write
42FE000
stack
page read and write
CC4000
heap
page read and write
CB4000
heap
page read and write
467F000
stack
page read and write
DB1000
heap
page read and write
2606E9C3000
heap
page read and write
5F3000
unkown
page execute and read and write
2E9000
unkown
page write copy
CC4000
heap
page read and write
2606F3C4000
heap
page read and write
356D000
trusted library allocation
page read and write
29382CFC000
heap
page read and write
4533000
trusted library allocation
page read and write
CB4000
heap
page read and write
CB4000
heap
page read and write
DDF000
heap
page read and write
13D5000
heap
page read and write
1450000
direct allocation
page read and write
1744000
heap
page read and write
281F000
stack
page read and write
424F000
stack
page read and write
433E000
stack
page read and write
CC5000
heap
page read and write
CC4000
heap
page read and write
1EB9475C000
heap
page read and write
A3B000
stack
page read and write
CC4000
heap
page read and write
D00ADFF000
unkown
page read and write
35220000
heap
page read and write
340000
unkown
page execute and read and write
1CA8E000
stack
page read and write
22C97000
heap
page read and write
101C000
unkown
page execute and read and write
808E000
stack
page read and write
CC4000
heap
page read and write
7FF8B5D01000
unkown
page execute read
CC4000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
3C3E000
stack
page read and write
4A9F000
stack
page read and write
4E61000
heap
page read and write
63E000
remote allocation
page execute and read and write
CC4000
heap
page read and write
550E000
stack
page read and write
CC4000
heap
page read and write
384F000
stack
page read and write
4621000
heap
page read and write
29384B76000
heap
page read and write
CB4000
heap
page read and write
1744000
heap
page read and write
4E61000
heap
page read and write
5520000
direct allocation
page read and write
C34000
heap
page read and write
61ECD000
direct allocation
page readonly
293832BF000
heap
page read and write
523B000
stack
page read and write
7674000
trusted library allocation
page read and write
20E75170000
heap
page read and write
DCF000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
A3C000
stack
page read and write
45BE000
stack
page read and write
1810000
heap
page read and write
1F41000
heap
page read and write
4E61000
heap
page read and write
4D40000
direct allocation
page execute and read and write
7FF8B8AF1000
unkown
page execute read
7FF8B8830000
unkown
page readonly
29382C60000
heap
page read and write
4E61000
heap
page read and write
46A000
unkown
page execute and read and write
67BF000
stack
page read and write
7D3C2FB000
stack
page read and write
54D0000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
CB4000
heap
page read and write
CC4000
heap
page read and write
CB4000
heap
page read and write
CC4000
heap
page read and write
91CA000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
2E2000
unkown
page execute and read and write
1447000
heap
page read and write
4E61000
heap
page read and write
20E76EC5000
heap
page read and write
CC4000
heap
page read and write
4678000
trusted library allocation
page read and write
348E000
trusted library allocation
page read and write
2606F30F000
heap
page read and write
CB4000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
22CBD000
heap
page read and write
949E000
stack
page read and write
CC4000
heap
page read and write
2606F459000
heap
page read and write
26070450000
direct allocation
page read and write
CC4000
heap
page read and write
376E000
stack
page read and write
7E15000
heap
page read and write
D68000
heap
page read and write
584000
unkown
page execute and read and write
CC4000
heap
page read and write
20E74F7B000
heap
page read and write
2A931FE0000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
206A000
heap
page read and write
4E61000
heap
page read and write
5BC0000
trusted library allocation
page execute and read and write
7FF8B6054000
unkown
page write copy
2BEF000
stack
page read and write
CC4000
heap
page read and write
7FF8A7BE1000
unkown
page execute read
CC4000
heap
page read and write
40D0000
direct allocation
page execute and read and write
CC4000
heap
page read and write
12D4000
heap
page read and write
CC5000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
4C60000
direct allocation
page execute and read and write
7FF725AA3000
unkown
page read and write
CC4000
heap
page read and write
1064000
unkown
page execute and write copy
7FF725801000
unkown
page execute read
4E61000
heap
page read and write
1744000
heap
page read and write
20E74F7A000
heap
page read and write
7FF8B9841000
unkown
page execute read
36AB000
trusted library allocation
page read and write
CC5000
heap
page read and write
2606F300000
heap
page read and write
EEF000
heap
page read and write
D98000
heap
page read and write
1744000
heap
page read and write
6320000
heap
page read and write
CC4000
heap
page read and write
7FF8B27CA000
unkown
page read and write
1B3E0566000
heap
page read and write
37BE000
stack
page read and write
DCF000
heap
page read and write
1EB94724000
heap
page read and write
2606F2CE000
heap
page read and write
22CB3000
heap
page read and write
430000
remote allocation
page execute and read and write
4154000
heap
page read and write
5250000
direct allocation
page execute and read and write
2606FC10000
direct allocation
page read and write
CC4000
heap
page read and write
93B0000
trusted library allocation
page read and write
61ED0000
direct allocation
page read and write
7FF8A8620000
unkown
page readonly
CC4000
heap
page read and write
4E61000
heap
page read and write
7FF8B5711000
unkown
page execute read
850000
unkown
page read and write
13F5000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
4C70000
direct allocation
page execute and read and write
1063000
unkown
page execute and read and write
452E000
stack
page read and write
5A0000
unkown
page execute and write copy
29384B61000
heap
page read and write
6907D000
unkown
page readonly
2606E9BB000
heap
page read and write
CB4000
heap
page read and write
2606C71A000
heap
page read and write
5750000
trusted library allocation
page read and write
14E0000
trusted library allocation
page read and write
CC4000
heap
page read and write
4D21000
heap
page read and write
1C63F000
stack
page read and write
1E13C1A0000
heap
page read and write
36BE000
stack
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
CC5000
heap
page read and write
CC4000
heap
page read and write
1744000
heap
page read and write
2606C6F2000
heap
page read and write
4E61000
heap
page read and write
34AA000
trusted library allocation
page read and write
CC4000
heap
page read and write
66BE000
stack
page read and write
CC4000
heap
page read and write
5091000
heap
page read and write
EC1000
heap
page read and write
2606FC2C000
direct allocation
page read and write
4E61000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
BD0000
direct allocation
page execute and read and write
4E61000
heap
page read and write
1C27E000
stack
page read and write
7FF8B7FD6000
unkown
page read and write
CC4000
heap
page read and write
CB4000
heap
page read and write
29382D07000
heap
page read and write
7FF8B8009000
unkown
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
1F3978F0000
heap
page read and write
7FF8B7837000
unkown
page readonly
4E61000
heap
page read and write
CC4000
heap
page read and write
2A9321B0000
heap
page read and write
2607046C000
direct allocation
page read and write
5730000
direct allocation
page execute and read and write
CB4000
heap
page read and write
5700000
direct allocation
page execute and read and write
9C000
stack
page read and write
C20000
heap
page read and write
D8D000
heap
page read and write
5230000
direct allocation
page execute and read and write
CC4000
heap
page read and write
4D21000
heap
page read and write
326E000
stack
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
2460000
heap
page read and write
EBD000
heap
page read and write
2606F18C000
heap
page read and write
6450000
heap
page read and write
22C7B000
heap
page read and write
6E9000
unkown
page readonly
3B7E000
stack
page read and write
401000
unkown
page execute read
20E74E80000
trusted library allocation
page read and write
E1E000
stack
page read and write
400000
unkown
page execute and read and write
2606F0A1000
heap
page read and write
EFE000
heap
page read and write
585B000
stack
page read and write
29382CE1000
heap
page read and write
4C10000
direct allocation
page execute and read and write
273A000
heap
page read and write
E50000
heap
page read and write
CFE000
stack
page read and write
2606C755000
heap
page read and write
7FF8B5D00000
unkown
page readonly
4E61000
heap
page read and write
1F3595B5000
heap
page read and write
D4A000
heap
page read and write
CB4000
heap
page read and write
20E7564A000
heap
page read and write
2BBF000
stack
page read and write
1064000
unkown
page execute and write copy
2607047C000
direct allocation
page read and write
CB4000
heap
page read and write
381E000
stack
page read and write
22C95000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
4AE0000
heap
page read and write
20E75638000
heap
page read and write
1ED000
unkown
page readonly
690C0000
unkown
page readonly
2135A000
heap
page read and write
3CF000
unkown
page execute and read and write
32A0000
trusted library allocation
page read and write
29382CF8000
heap
page read and write
20E74F7A000
heap
page read and write
1800000
direct allocation
page read and write
CC4000
heap
page read and write
1EB9474C000
heap
page read and write
DF9000
heap
page read and write
1550000
trusted library allocation
page read and write
CC4000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
22C97000
heap
page read and write
4AB0000
direct allocation
page read and write
CC4000
heap
page read and write
46FE000
stack
page read and write
20643F70000
heap
page read and write
4D21000
heap
page read and write
4CB4000
direct allocation
page execute and read and write
4BEF000
stack
page read and write
4C80000
direct allocation
page execute and read and write
4D21000
heap
page read and write
22C97000
heap
page read and write
5370000
direct allocation
page execute and read and write
7FF8A8469000
unkown
page readonly
5040000
heap
page read and write
3E8F000
stack
page read and write
1800000
direct allocation
page read and write
5091000
heap
page read and write
CC4000
heap
page read and write
2606F471000
heap
page read and write
2606EA33000
heap
page read and write
4E61000
heap
page read and write
2606F20A000
heap
page read and write
2E9000
unkown
page read and write
213F0000
heap
page read and write
CC4000
heap
page read and write
4C00000
direct allocation
page execute and read and write
20E74F26000
heap
page read and write
CB4000
heap
page read and write
5091000
heap
page read and write
7FF8B5713000
unkown
page readonly
935E000
stack
page read and write
CC4000
heap
page read and write
426F000
stack
page read and write
269F000
stack
page read and write
22C97000
heap
page read and write
1450000
direct allocation
page read and write
F0F000
stack
page read and write
2606F2ED000
heap
page read and write
7FF8B5716000
unkown
page readonly
363F000
stack
page read and write
584000
unkown
page execute and read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
CF8000
stack
page read and write
293832DC000
heap
page read and write
4D21000
heap
page read and write
CB4000
heap
page read and write
20E7562C000
heap
page read and write
CC4000
heap
page read and write
2606F429000
heap
page read and write
20E75641000
heap
page read and write
2606F3A1000
heap
page read and write
4E61000
heap
page read and write
CB4000
heap
page read and write
4D1F000
stack
page read and write
56B0000
direct allocation
page execute and read and write
427000
unkown
page write copy
3EEE000
stack
page read and write
CC4000
heap
page read and write
207813EF000
heap
page read and write
CB4000
heap
page read and write
2606E70F000
heap
page read and write
C1419FF000
stack
page read and write
293832C1000
heap
page read and write
2606F209000
heap
page read and write
9D125FE000
stack
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
3652000
trusted library allocation
page read and write
2606E699000
heap
page read and write
1744000
heap
page read and write
4E61000
heap
page read and write
244C000
unkown
page readonly
6781000
heap
page read and write
A2E70FE000
stack
page read and write
488F000
stack
page read and write
511E000
stack
page read and write
2A90000
direct allocation
page read and write
CC4000
heap
page read and write
20E7517E000
heap
page read and write
2A7E000
stack
page read and write
2606F209000
heap
page read and write
5C8E000
stack
page read and write
CC4000
heap
page read and write
20E74E30000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
298D4A80000
heap
page read and write
320F000
stack
page read and write
423000
unkown
page readonly
FB0000
heap
page read and write
62C000
unkown
page execute and read and write
4E61000
heap
page read and write
7FF8A8742000
unkown
page readonly
7FF8B621A000
unkown
page readonly
298D4960000
heap
page read and write
20643946000
heap
page read and write
3FFE000
stack
page read and write
471E000
stack
page read and write
162F000
stack
page read and write
104C000
unkown
page execute and read and write
34CE000
stack
page read and write
7FF8A7E8B000
unkown
page readonly
4C10000
direct allocation
page execute and read and write
1744000
heap
page read and write
5A7000
remote allocation
page execute and read and write
DFC000
heap
page read and write
13EE000
stack
page read and write
149B000
trusted library allocation
page execute and read and write
5091000
heap
page read and write
CC4000
heap
page read and write
2606EB45000
heap
page read and write
56A1000
trusted library allocation
page read and write
CC4000
heap
page read and write
2A932001000
heap
page read and write
4E61000
heap
page read and write
CC5000
heap
page read and write
2606FC92000
heap
page read and write
4E61000
heap
page read and write
417F000
stack
page read and write
4E61000
heap
page read and write
4C4000
unkown
page execute and read and write
CC4000
heap
page read and write
CB4000
heap
page read and write
56B0000
direct allocation
page execute and read and write
CC4000
heap
page read and write
1E13C216000
heap
page read and write
CC4000
heap
page read and write
CB4000
heap
page read and write
274E0000
heap
page read and write
2F10000
heap
page read and write
29382CF0000
heap
page read and write
4E61000
heap
page read and write
1E4E000
heap
page read and write
5091000
heap
page read and write
CC7477E000
stack
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
29382CF1000
heap
page read and write
1B3E057D000
heap
page read and write
1800000
direct allocation
page read and write
7FF8B78C5000
unkown
page readonly
2D9B8A30000
heap
page read and write
2606F381000
heap
page read and write
49F000
unkown
page execute and read and write
359E000
stack
page read and write
23CA1680000
heap
page read and write
2606F2FF000
heap
page read and write
9123000
heap
page read and write
274F9000
heap
page read and write
5080000
direct allocation
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
2606F2CC000
heap
page read and write
3456000
trusted library allocation
page read and write
CB4000
heap
page read and write
459F000
stack
page read and write
742000
unkown
page execute and read and write
293832E2000
heap
page read and write
4CC9000
direct allocation
page execute and read and write
1B3E0528000
heap
page read and write
7FF8A7EB1000
unkown
page readonly
4E61000
heap
page read and write
46BF000
stack
page read and write
CC4000
heap
page read and write
2606F130000
heap
page read and write
56A0000
direct allocation
page execute and read and write
645E000
stack
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
6787000
heap
page read and write
20E76ECF000
heap
page read and write
CB4000
heap
page read and write
91E9000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
1800000
heap
page read and write
2606FCD0000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
50C0000
heap
page read and write
CC4000
heap
page read and write
7FF8A7C45000
unkown
page execute read
2606E69A000
heap
page read and write
2606EE60000
direct allocation
page read and write
1E13C23F000
heap
page read and write
CB4000
heap
page read and write
7FF8B27CE000
unkown
page readonly
CC4000
heap
page read and write
CC4000
heap
page read and write
1744000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
766A000
trusted library allocation
page read and write
CC4000
heap
page read and write
1545000
heap
page read and write
4D21000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
363C000
trusted library allocation
page read and write
555000
unkown
page execute and read and write
4AFE000
stack
page read and write
7FF8B6052000
unkown
page read and write
3B2E000
stack
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
2606EAEE000
heap
page read and write
DBB000
unkown
page execute and read and write
17C9E20D000
heap
page read and write
22C93000
heap
page read and write
5091000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
2D9B87D1000
heap
page read and write
29384B74000
heap
page read and write
CC4000
heap
page read and write
6736000
heap
page read and write
25FD000
heap
page execute and read and write
CC4000
heap
page read and write
450E000
stack
page read and write
45DE000
stack
page read and write
447E000
stack
page read and write
61EB4000
direct allocation
page read and write
5168000
trusted library allocation
page read and write
CC4000
heap
page read and write
5091000
heap
page read and write
20643FA0000
heap
page read and write
12E6DFF000
stack
page read and write
7FF8A8B73000
unkown
page read and write
D00000
heap
page read and write
CC5000
heap
page read and write
2D9B87D1000
heap
page read and write
CC4000
heap
page read and write
C4119FF000
stack
page read and write
53B0000
direct allocation
page execute and read and write
CC5000
heap
page read and write
20E74F33000
heap
page read and write
B1FE89F000
stack
page read and write
CB5000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
EFD000
stack
page read and write
CC4000
heap
page read and write
568B000
trusted library allocation
page read and write
739C000
stack
page read and write
44CE000
trusted library allocation
page read and write
CC4000
heap
page read and write
4C50000
direct allocation
page execute and read and write
127E000
stack
page read and write
4BBE000
stack
page read and write
1B3E0579000
heap
page read and write
CB4000
heap
page read and write
CC4000
heap
page read and write
2606E66A000
heap
page read and write
CC4000
heap
page read and write
214F3000
heap
page read and write
22C90000
heap
page read and write
7FF8B803C000
unkown
page readonly
1C53E000
stack
page read and write
2381D0D0000
heap
page read and write
4E61000
heap
page read and write
1672000
heap
page read and write
12E6D7F000
stack
page read and write
367F000
stack
page read and write
4A3E000
stack
page read and write
CB4000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
101C000
unkown
page execute and read and write
CC4000
heap
page read and write
2606EB21000
heap
page read and write
6C81F000
unkown
page write copy
29382CDF000
heap
page read and write
29382CF0000
heap
page read and write
4F7E000
stack
page read and write
29382D07000
heap
page read and write
4E61000
heap
page read and write
4513000
trusted library allocation
page read and write
CC4000
heap
page read and write
4621000
heap
page read and write
20781E14000
heap
page read and write
2606EB57000
heap
page read and write
F00000
heap
page read and write
22C97000
heap
page read and write
1C37F000
stack
page read and write
7FF8B8AFD000
unkown
page readonly
4E61000
heap
page read and write
7FF698D73000
unkown
page read and write
2A931FEA000
heap
page read and write
680000
unkown
page execute and write copy
2606F387000
heap
page read and write
CC7433F000
stack
page read and write
34BE000
stack
page read and write
7FF698D88000
unkown
page readonly
CC4000
heap
page read and write
20E75632000
heap
page read and write
1EB94735000
heap
page read and write
7FF8B8021000
unkown
page execute read
5091000
heap
page read and write
1497000
trusted library allocation
page execute and read and write
CC4000
heap
page read and write
7FF8B879C000
unkown
page readonly
2530000
heap
page read and write
CC4000
heap
page read and write
22CBD000
heap
page read and write
16A6B120000
heap
page read and write
266B43F0000
heap
page read and write
1C6AE000
stack
page read and write
17F4000
heap
page read and write
1684000
heap
page read and write
CC4000
heap
page read and write
7FF8B9F60000
unkown
page readonly
309C000
stack
page read and write
168F000
stack
page read and write
CC4000
heap
page read and write
16CE000
stack
page read and write
4C40000
direct allocation
page execute and read and write
293832D9000
heap
page read and write
1055000
unkown
page execute and read and write
20E74F36000
heap
page read and write
D20000
direct allocation
page read and write
1EB9475D000
heap
page read and write
2606F469000
heap
page read and write
CC4000
heap
page read and write
207FF340000
heap
page read and write
1744000
heap
page read and write
6908E000
unkown
page read and write
CC4000
heap
page read and write
16A6B128000
heap
page read and write
1BFE000
heap
page read and write
DB2000
unkown
page execute and read and write
15D9000
heap
page read and write
CC4000
heap
page read and write
3380E8C000
stack
page read and write
1566000
heap
page read and write
CC5000
heap
page read and write
419B000
trusted library allocation
page read and write
CB4000
heap
page read and write
ED4000
heap
page read and write
BD2B127000
stack
page read and write
20E750F0000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
6FC80FD000
stack
page read and write
3310000
direct allocation
page read and write
11B0000
heap
page read and write
346F000
trusted library allocation
page read and write
1F3978A0000
heap
page read and write
2606F3E7000
heap
page read and write
2AEF000
stack
page read and write
7FF8BA250000
unkown
page readonly
792000
unkown
page execute and write copy
4E61000
heap
page read and write
CC4000
heap
page read and write
8EF0000
heap
page read and write
198000
stack
page read and write
D1E000
heap
page read and write
56E0000
direct allocation
page execute and read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
22C8A000
heap
page read and write
7FF8B93CC000
unkown
page readonly
4578000
trusted library allocation
page read and write
56C0000
trusted library allocation
page read and write
CC4000
heap
page read and write
D31000
unkown
page execute read
4E61000
heap
page read and write
50C1000
heap
page read and write
4E61000
heap
page read and write
20643958000
heap
page read and write
2D9B8A35000
heap
page read and write
206438F9000
heap
page read and write
1D79000
heap
page read and write
464E000
stack
page read and write
DDF000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
CC4000
heap
page read and write
1FD2000
heap
page read and write
2606EB57000
heap
page read and write
7FF8BFAD6000
unkown
page read and write
CC4000
heap
page read and write
EDD000
heap
page read and write
2606F2FB000
heap
page read and write
CB4000
heap
page read and write
20E74F5E000
heap
page read and write
4C51000
heap
page read and write
7FF725A4D000
unkown
page readonly
23D56CD5000
heap
page read and write
50D0000
direct allocation
page read and write
CC4000
heap
page read and write
4D21000
heap
page read and write
99CB000
heap
page read and write
CC4000
heap
page read and write
142E000
stack
page read and write
CC4000
heap
page read and write
EED000
heap
page read and write
4E61000
heap
page read and write
4610000
direct allocation
page read and write
CC5000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
20E74EF0000
heap
page read and write
435000
remote allocation
page execute and read and write
20E74E80000
trusted library allocation
page read and write
CB4000
heap
page read and write
CC4000
heap
page read and write
22C97000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
2606F3B6000
heap
page read and write
CC4000
heap
page read and write
1680000
heap
page read and write
4E61000
heap
page read and write
4610000
direct allocation
page read and write
4CA0000
direct allocation
page execute and read and write
4C50000
direct allocation
page execute and read and write
CB4000
heap
page read and write
CB4000
heap
page read and write
40BF000
stack
page read and write
50C1000
heap
page read and write
17F4000
heap
page read and write
293832CF000
heap
page read and write
1E13C23B000
heap
page read and write
44C9000
trusted library allocation
page read and write
1B1CD000
stack
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
2606F44A000
heap
page read and write
7FF8BFAC0000
unkown
page readonly
2606C875000
heap
page read and write
3CFE000
stack
page read and write
E9B000
heap
page read and write
12D4000
heap
page read and write
1B3E057C000
heap
page read and write
CC4000
heap
page read and write
158E000
stack
page read and write
129A000
heap
page read and write
323E000
stack
page read and write
CC4000
heap
page read and write
CC5000
heap
page read and write
207FDA17000
heap
page read and write
4E61000
heap
page read and write
2606F44B000
heap
page read and write
32BF000
stack
page read and write
7FF8A7C59000
unkown
page execute read
29382C30000
heap
page read and write
2606C763000
heap
page read and write
2606F47C000
heap
page read and write
4E61000
heap
page read and write
20E74F30000
heap
page read and write
207FD970000
heap
page read and write
CC4000
heap
page read and write
26C0000
heap
page read and write
43CE000
stack
page read and write
5091000
heap
page read and write
423000
unkown
page readonly
2381D2E0000
heap
page read and write
CFE000
heap
page read and write
1B3E0554000
heap
page read and write
2EDBE000
stack
page read and write
29383167000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
7645000
trusted library allocation
page read and write
CC4000
heap
page read and write
4D21000
heap
page read and write
455E000
trusted library allocation
page read and write
589E000
stack
page read and write
99AD000
stack
page read and write
12D4000
heap
page read and write
49F000
unkown
page execute and read and write
12D4000
heap
page read and write
1C7EE000
stack
page read and write
4631000
heap
page read and write
1E13C190000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
1E13C23F000
heap
page read and write
3337000
heap
page read and write
1D0C68FA000
heap
page read and write
6B70000
trusted library allocation
page read and write
4E61000
heap
page read and write
26070474000
direct allocation
page read and write
38FE000
stack
page read and write
22C9C000
heap
page read and write
155E000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
61E01000
direct allocation
page execute read
D35000
heap
page read and write
310F000
stack
page read and write
35EF000
stack
page read and write
CB4000
heap
page read and write
1800000
direct allocation
page read and write
5080000
direct allocation
page read and write
3B0E000
stack
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
3FBE000
stack
page read and write
CC4000
heap
page read and write
3CDF000
stack
page read and write
5091000
heap
page read and write
E9F000
heap
page read and write
67F000
unkown
page execute and write copy
2142C000
heap
page read and write
445E000
stack
page read and write
CB4000
heap
page read and write
4D21000
heap
page read and write
ED3000
heap
page read and write
20643F80000
heap
page read and write
6660000
trusted library allocation
page read and write
CB5000
heap
page read and write
6410000
heap
page read and write
4C70000
direct allocation
page execute and read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
2606F47C000
heap
page read and write
CC4000
heap
page read and write
4F7F000
stack
page read and write
CC4000
heap
page read and write
400000
unkown
page execute and read and write
41BF000
stack
page read and write
4E61000
heap
page read and write
1CC7000
heap
page read and write
7FF8B8038000
unkown
page readonly
46C1000
heap
page read and write
7FF8B5721000
unkown
page execute read
CC4000
heap
page read and write
293832C2000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
28663E01000
heap
page read and write
22CB2000
heap
page read and write
6890000
trusted library allocation
page read and write
2EF5B000
heap
page read and write
20E74F7F000
heap
page read and write
1202000
unkown
page execute and write copy
2606E682000
heap
page read and write
CC5000
heap
page read and write
7FF8A7AC1000
unkown
page execute read
438F000
stack
page read and write
2606F3AD000
heap
page read and write
421E000
stack
page read and write
CB4000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
2606F3B6000
heap
page read and write
1EB94630000
heap
page read and write
CC4000
heap
page read and write
54CB000
stack
page read and write
4E61000
heap
page read and write
20E74F8C000
heap
page read and write
7FF8B8045000
unkown
page readonly
20E74F79000
heap
page read and write
CC5000
heap
page read and write
CB4000
heap
page read and write
5260000
direct allocation
page execute and read and write
CC4000
heap
page read and write
1B3E0542000
heap
page read and write
CC4000
heap
page read and write
CC5000
heap
page read and write
418A000
trusted library allocation
page read and write
493000
unkown
page execute and read and write
1CA6E000
stack
page read and write
CC4000
heap
page read and write
2606F2F8000
heap
page read and write
32BD000
heap
page read and write
2606F8C8000
direct allocation
page read and write
305F000
stack
page read and write
22C95000
heap
page read and write
5ADE000
stack
page read and write
293832C5000
heap
page read and write
DDF000
heap
page read and write
4E61000
heap
page read and write
507F000
stack
page read and write
29383164000
heap
page read and write
7F1000
unkown
page execute read
2606F473000
heap
page read and write
7670000
trusted library allocation
page read and write
244C000
unkown
page readonly
5740000
direct allocation
page execute and read and write
59F0000
trusted library allocation
page read and write
CB4000
heap
page read and write
5330000
direct allocation
page execute and read and write
156A000
heap
page read and write
FFFCBDB000
stack
page read and write
BD2B47F000
stack
page read and write
424F000
stack
page read and write
7FF8B93D4000
unkown
page read and write
2606C77E000
heap
page read and write
29382CB2000
heap
page read and write
4E61000
heap
page read and write
5520000
direct allocation
page read and write
1744000
heap
page read and write
50C1000
heap
page read and write
5350000
direct allocation
page execute and read and write
4BFE000
stack
page read and write
AF209FF000
unkown
page read and write
2606F3DE000
heap
page read and write
4E61000
heap
page read and write
416E000
stack
page read and write
7FF8A7F27000
unkown
page readonly
59DE000
stack
page read and write
5080000
direct allocation
page read and write
D72000
heap
page read and write
2606EB60000
direct allocation
page read and write
4E61000
heap
page read and write
EDD000
heap
page read and write
4E61000
heap
page read and write
2606C74E000
heap
page read and write
64C000
stack
page read and write
DB9000
unkown
page write copy
D6F84FF000
unkown
page read and write
41DF000
stack
page read and write
4CB4000
direct allocation
page execute and read and write
7C0000
heap
page read and write
CB4000
heap
page read and write
22C91000
heap
page read and write
2606F460000
heap
page read and write
2606FC91000
heap
page read and write
7FF8B5D02000
unkown
page readonly
2606F335000
heap
page read and write
4D21000
heap
page read and write
59F5000
trusted library allocation
page read and write
7FF8A7E5A000
unkown
page readonly
CB4000
heap
page read and write
FFFCFFF000
stack
page read and write
4B8C000
stack
page read and write
1744000
heap
page read and write
2F17000
heap
page read and write
3AEF000
stack
page read and write
5091000
heap
page read and write
43C000
unkown
page execute and read and write
DE4000
heap
page read and write
4BF0000
direct allocation
page execute and read and write
2606C779000
heap
page read and write
4E61000
heap
page read and write
4FD000
unkown
page execute and read and write
22C97000
heap
page read and write
307E000
stack
page read and write
CC4000
heap
page read and write
CB4000
heap
page read and write
1BE2000
heap
page read and write
5091000
heap
page read and write
2606F473000
heap
page read and write
CC4000
heap
page read and write
353E000
stack
page read and write
4CD0000
direct allocation
page execute and read and write
29382CD2000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
6C5A1000
unkown
page execute read
7FF8B77F6000
unkown
page readonly
5091000
heap
page read and write
20E75637000
heap
page read and write
CC4000
heap
page read and write
1200000
unkown
page execute and read and write
CC4000
heap
page read and write
73E000
unkown
page read and write
27460000
heap
page read and write
4E61000
heap
page read and write
182B000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
4F1000
remote allocation
page execute and read and write
CC5000
heap
page read and write
4E61000
heap
page read and write
4631000
heap
page read and write
1450000
direct allocation
page read and write
1EB9474C000
heap
page read and write
20E74F4E000
heap
page read and write
4E61000
heap
page read and write
98C000
stack
page read and write
1450000
direct allocation
page read and write
DB9000
unkown
page read and write
CC4000
heap
page read and write
1E13C410000
heap
page read and write
CC4000
heap
page read and write
179E000
stack
page read and write
4621000
heap
page read and write
2606F29A000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
20643890000
heap
page read and write
4C1E000
stack
page read and write
341F000
stack
page read and write
1B01000
heap
page read and write
555000
unkown
page execute and read and write
CC4000
heap
page read and write
1684000
heap
page read and write
2606F2FE000
heap
page read and write
6424000
heap
page read and write
CC4000
heap
page read and write
20E75629000
heap
page read and write
6500000
heap
page read and write
4E61000
heap
page read and write
274A0000
heap
page read and write
1C7CE000
stack
page read and write
4CB4000
direct allocation
page execute and read and write
2606E460000
direct allocation
page read and write
425E000
stack
page read and write
2606F2F8000
heap
page read and write
209A000
heap
page read and write
7FF8B9845000
unkown
page readonly
CC4000
heap
page read and write
C34000
heap
page read and write
5290000
direct allocation
page execute and read and write
CC4000
heap
page read and write
20E74F42000
heap
page read and write
CB4000
heap
page read and write
5091000
heap
page read and write
56F3000
heap
page read and write
46BE000
stack
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
631F000
stack
page read and write
29BF000
stack
page read and write
CB4000
heap
page read and write
372F000
stack
page read and write
5080000
direct allocation
page read and write
1EB94530000
heap
page read and write
35BF000
stack
page read and write
2E7E000
stack
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
7FF8B6213000
unkown
page readonly
4E61000
heap
page read and write
1744000
heap
page read and write
12D4000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
29382D16000
heap
page read and write
4E61000
heap
page read and write
4E7E000
stack
page read and write
29384B63000
heap
page read and write
300F000
stack
page read and write
7FF8B8AFA000
unkown
page read and write
1E13C205000
heap
page read and write
CC5000
heap
page read and write
34FF000
stack
page read and write
315E000
stack
page read and write
CC5000
heap
page read and write
20E75639000
heap
page read and write
3FAE000
stack
page read and write
22C89000
heap
page read and write
3A9E000
stack
page read and write
CC4000
heap
page read and write
31FF000
stack
page read and write
CB4000
heap
page read and write
4421000
trusted library allocation
page read and write
104C000
unkown
page execute and read and write
CC4000
heap
page read and write
CB4000
heap
page read and write
5D8F000
stack
page read and write
2606F385000
heap
page read and write
CC4000
heap
page read and write
281000
unkown
page execute and write copy
16BA000
heap
page read and write
4AB0000
direct allocation
page read and write
8BD0000
heap
page read and write
2EFF000
stack
page read and write
6929E000
unkown
page read and write
20E74F44000
heap
page read and write
7FF8B61E3000
unkown
page execute read
1C36F000
stack
page read and write
2606F2E1000
heap
page read and write
49CF000
stack
page read and write
5080000
direct allocation
page read and write
CC4000
heap
page read and write
640F000
stack
page read and write
7FF725801000
unkown
page execute read
4E61000
heap
page read and write
41A3000
trusted library allocation
page read and write
DCF000
heap
page read and write
7FF8B5715000
unkown
page read and write
7FF8A8791000
unkown
page execute read
7FF8A7B70000
unkown
page readonly
2606F3D1000
heap
page read and write
431F000
stack
page read and write
4D21000
heap
page read and write
CC5000
heap
page read and write
22CA5000
heap
page read and write
44FC000
trusted library allocation
page read and write
4E20000
trusted library allocation
page read and write
20E74F07000
heap
page read and write
818F000
stack
page read and write
47FE000
stack
page read and write
20E75620000
heap
page read and write
401000
unkown
page execute read
22C7D000
heap
page read and write
7FF8A8AC3000
unkown
page readonly
3637000
trusted library allocation
page read and write
2606FF78000
heap
page read and write
1E13C1E0000
heap
page read and write
26CB000
heap
page read and write
CC4000
heap
page read and write
5581000
direct allocation
page read and write
20E74F35000
heap
page read and write
742000
unkown
page execute and read and write
493000
unkown
page execute and read and write
6691000
trusted library allocation
page read and write
2606F3A8000
heap
page read and write
353A000
trusted library allocation
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
569E000
trusted library allocation
page read and write
2606C6E9000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
12D4000
heap
page read and write
9FB000
stack
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
16A6B4C5000
heap
page read and write
5B1E000
stack
page read and write
17BE000
stack
page read and write
CC5000
heap
page read and write
50BF000
stack
page read and write
39AF000
stack
page read and write
1B3E0566000
heap
page read and write
4E61000
heap
page read and write
29382D1A000
heap
page read and write
DDF000
heap
page read and write
3DFE000
stack
page read and write
4E61000
heap
page read and write
4500000
trusted library allocation
page read and write
4610000
direct allocation
page read and write
5091000
heap
page read and write
9215000
heap
page read and write
DCF000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
1F359400000
heap
page read and write
28D79000
heap
page read and write
5D2D000
stack
page read and write
F3A000
stack
page read and write
4E61000
heap
page read and write
EA6000
heap
page read and write
CC4000
heap
page read and write
C20000
direct allocation
page read and write
194000
stack
page read and write
CC5000
heap
page read and write
32FE000
stack
page read and write
CB4000
heap
page read and write
56C0000
direct allocation
page execute and read and write
2606F30F000
heap
page read and write
3818000
trusted library allocation
page read and write
CC4000
heap
page read and write
22C87000
heap
page read and write
1B3E0573000
heap
page read and write
1B34D000
heap
page read and write
17C9E20B000
heap
page read and write
1810000
heap
page read and write
2F00000
direct allocation
page read and write
CB5000
heap
page read and write
29382D07000
heap
page read and write
22CA5000
heap
page read and write
4E61000
heap
page read and write
E2E000
heap
page read and write
4A46000
heap
page read and write
61ECD000
direct allocation
page readonly
4CD0000
direct allocation
page execute and read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
3380F0F000
stack
page read and write
CC4000
heap
page read and write
13C0000
direct allocation
page read and write
7FF8B9F61000
unkown
page execute read
4E61000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
7FF8B6020000
unkown
page readonly
4E61000
heap
page read and write
206439FD000
heap
page read and write
4D21000
heap
page read and write
CC4000
heap
page read and write
33AE000
stack
page read and write
7FF8A876E000
unkown
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
8629FFF000
unkown
page read and write
1B240000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
DDF000
heap
page read and write
CC4000
heap
page read and write
450E000
stack
page read and write
39FF000
stack
page read and write
2606F3CA000
heap
page read and write
CB5000
heap
page read and write
56B0000
direct allocation
page execute and read and write
20E75190000
heap
page read and write
CC4000
heap
page read and write
4CA3000
direct allocation
page execute and read and write
42BF000
stack
page read and write
4E61000
heap
page read and write
CB4000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
4263000
heap
page read and write
CC5000
heap
page read and write
1744000
heap
page read and write
7FF8A7C70000
unkown
page execute read
1A36000
heap
page read and write
20E76ED5000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
6C632000
unkown
page readonly
1744000
heap
page read and write
29384B6E000
heap
page read and write
CB4000
heap
page read and write
6A7E000
heap
page read and write
CC4000
heap
page read and write
264A000
heap
page read and write
4E61000
heap
page read and write
2381D370000
heap
page read and write
4C70000
direct allocation
page execute and read and write
607E000
stack
page read and write
4E61000
heap
page read and write
17CF000
stack
page read and write
29382D10000
heap
page read and write
266B44F0000
heap
page read and write
9BAE000
stack
page read and write
5684000
trusted library allocation
page read and write
4130000
heap
page read and write
CC5000
heap
page read and write
56D0000
direct allocation
page execute and read and write
1800000
direct allocation
page read and write
5091000
heap
page read and write
3AFE000
stack
page read and write
690C1000
unkown
page execute read
3C4E000
stack
page read and write
DB1000
heap
page read and write
A2E6CEB000
stack
page read and write
2FBE000
stack
page read and write
4E61000
heap
page read and write
128E000
stack
page read and write
357E000
stack
page read and write
12D0000
heap
page read and write
3F3F000
stack
page read and write
1C3EE000
stack
page read and write
2606F3C5000
heap
page read and write
97E000
unkown
page execute and write copy
73F756F000
stack
page read and write
3A3E000
stack
page read and write
CC4000
heap
page read and write
5790000
trusted library allocation
page read and write
1B3E0544000
heap
page read and write
5710000
direct allocation
page execute and read and write
2A932001000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
20E74F88000
heap
page read and write
477000
unkown
page execute and read and write
CB4000
heap
page read and write
73F74EB000
stack
page read and write
CB4000
heap
page read and write
4F3F000
stack
page read and write
CC4000
heap
page read and write
2606F392000
heap
page read and write
61ED0000
direct allocation
page read and write
CC4000
heap
page read and write
41E8000
trusted library allocation
page read and write
C30000
heap
page read and write
660000
unkown
page readonly
360000
unkown
page readonly
12CE000
stack
page read and write
146D000
trusted library allocation
page execute and read and write
613F000
stack
page read and write
CC4000
heap
page read and write
7FF8B6059000
unkown
page readonly
4610000
direct allocation
page read and write
14E0000
heap
page read and write
1B3E057C000
heap
page read and write
2606F235000
heap
page read and write
C20000
direct allocation
page read and write
CB4000
heap
page read and write
3521C000
stack
page read and write
CB4000
heap
page read and write
1440000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
373E000
stack
page read and write
2606E67B000
heap
page read and write
5BD0000
heap
page execute and read and write
2606F357000
heap
page read and write
2D3E000
stack
page read and write
854000
unkown
page readonly
4C20000
direct allocation
page execute and read and write
664000
unkown
page execute and read and write
4E61000
heap
page read and write
35221000
heap
page read and write
22C95000
heap
page read and write
4E61000
heap
page read and write
4D21000
heap
page read and write
2606F46D000
heap
page read and write
854000
unkown
page readonly
1B3E057C000
heap
page read and write
25D0000
heap
page read and write
1EB94735000
heap
page read and write
C0E000
stack
page read and write
B90000
heap
page read and write
29382C50000
trusted library allocation
page read and write
207FD990000
heap
page read and write
2606F335000
heap
page read and write
CC4000
heap
page read and write
601E000
stack
page read and write
CC4000
heap
page read and write
EC0000
heap
page read and write
EE8000
heap
page read and write
2606F19D000
heap
page read and write
CB4000
heap
page read and write
46A000
remote allocation
page execute and read and write
37FE000
stack
page read and write
CFA000
heap
page read and write
C20000
direct allocation
page read and write
26070033000
heap
page read and write
CC4000
heap
page read and write
26070034000
heap
page read and write
21446000
heap
page read and write
CB4000
heap
page read and write
12D4000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
2606F19D000
heap
page read and write
CC4000
heap
page read and write
3D7E000
stack
page read and write
6757000
heap
page read and write
CC4000
heap
page read and write
4C40000
direct allocation
page execute and read and write
4E61000
heap
page read and write
5080000
direct allocation
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
244C000
unkown
page readonly
CC4000
heap
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
CB4000
heap
page read and write
CC4000
heap
page read and write
1E13C23F000
heap
page read and write
4D21000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
5320000
direct allocation
page execute and read and write
28D84000
heap
page read and write
E98000
unkown
page readonly
4C40000
direct allocation
page execute and read and write
1EB94739000
heap
page read and write
2381D0F0000
heap
page read and write
20643988000
heap
page read and write
516A000
trusted library allocation
page read and write
7E0000
direct allocation
page execute and read and write
4D21000
heap
page read and write
20E74F4B000
heap
page read and write
CC4000
heap
page read and write
20E75652000
heap
page read and write
256E000
stack
page read and write
659C000
stack
page read and write
4D00000
direct allocation
page execute and read and write
1CBAA000
heap
page read and write
CB4000
heap
page read and write
5091000
heap
page read and write
CC4000
heap
page read and write
4D30000
direct allocation
page execute and read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
7FF8B7894000
unkown
page readonly
44E9000
trusted library allocation
page read and write
1450000
direct allocation
page read and write
1F359437000
heap
page read and write
2064391C000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
56B2000
trusted library allocation
page read and write
2606FCD5000
heap
page read and write
5740000
direct allocation
page execute and read and write
D51000
unkown
page execute and write copy
7665000
trusted library allocation
page read and write
293E000
heap
page read and write
4C4F000
stack
page read and write
20E74F82000
heap
page read and write
4204000
trusted library allocation
page read and write
208C000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
5091000
heap
page read and write
326E000
trusted library allocation
page read and write
331E000
stack
page read and write
4D21000
heap
page read and write
5091000
heap
page read and write
5091000
heap
page read and write
1C26F000
stack
page read and write
293830E0000
heap
page read and write
CC4000
heap
page read and write
CC5000
heap
page read and write
2937000
heap
page read and write
6C7DF000
unkown
page readonly
1744000
heap
page read and write
5AD000
remote allocation
page execute and read and write
CB4000
heap
page read and write
CC4000
heap
page read and write
4D21000
heap
page read and write
CC4000
heap
page read and write
1744000
heap
page read and write
4161000
trusted library allocation
page read and write
4E61000
heap
page read and write
5320000
direct allocation
page execute and read and write
280000
unkown
page read and write
1F359430000
heap
page read and write
1470000
trusted library allocation
page read and write
1EB9474F000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
101E000
stack
page read and write
44CF000
stack
page read and write
CC4000
heap
page read and write
1A6AE000
stack
page read and write
CB4000
heap
page read and write
33C7000
trusted library allocation
page read and write
2606C741000
heap
page read and write
4E61000
heap
page read and write
CC5000
heap
page read and write
EFE000
heap
page read and write
15F2000
heap
page read and write
CC4000
heap
page read and write
2606F459000
heap
page read and write
CC4000
heap
page read and write
CB4000
heap
page read and write
CB4000
heap
page read and write
CC5000
heap
page read and write
42FF000
stack
page read and write
CC4000
heap
page read and write
3FCE000
stack
page read and write
4E61000
heap
page read and write
2606C6C3000
heap
page read and write
41F8000
trusted library allocation
page read and write
4E61000
heap
page read and write
2606FC90000
heap
page read and write
5260000
direct allocation
page execute and read and write
349F000
trusted library allocation
page read and write
22CA5000
heap
page read and write
CC4000
heap
page read and write
D50000
unkown
page readonly
31DE000
stack
page read and write
2EF65000
heap
page read and write
4D21000
heap
page read and write
22C7A000
heap
page read and write
CB4000
heap
page read and write
CC4000
heap
page read and write
E67000
heap
page read and write
17F4000
heap
page read and write
1744000
heap
page read and write
CB4000
heap
page read and write
4D21000
heap
page read and write
61ECC000
direct allocation
page read and write
30EF000
stack
page read and write
67AB000
trusted library allocation
page read and write
CC4000
heap
page read and write
2606E6CC000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
29383163000
heap
page read and write
4C40000
direct allocation
page execute and read and write
2590000
heap
page read and write
7FF8A7B73000
unkown
page readonly
917F000
heap
page read and write
CC4000
heap
page read and write
17FE000
stack
page read and write
2606F6D8000
direct allocation
page read and write
17F4000
heap
page read and write
5091000
heap
page read and write
6760000
heap
page read and write
4FDD000
stack
page read and write
4E61000
heap
page read and write
73F75EF000
stack
page read and write
CC5000
heap
page read and write
28E7000
heap
page read and write
1B3E06F0000
heap
page read and write
CC4000
heap
page read and write
29382CE2000
heap
page read and write
56E0000
direct allocation
page execute and read and write
207FDA10000
heap
page read and write
23D56A00000
heap
page read and write
2606F488000
heap
page read and write
5080000
direct allocation
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
591000
unkown
page execute and read and write
145D000
trusted library allocation
page execute and read and write
4D21000
heap
page read and write
5091000
heap
page read and write
3B7F000
stack
page read and write
49F000
unkown
page execute and read and write
5091000
heap
page read and write
24AE000
stack
page read and write
4E61000
heap
page read and write
5690000
direct allocation
page execute and read and write
3462000
trusted library allocation
page read and write
1454000
trusted library allocation
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
1665000
heap
page read and write
2682000
heap
page read and write
5201000
direct allocation
page read and write
C34000
heap
page read and write
3A7E000
stack
page read and write
2606F46F000
heap
page read and write
EE8000
heap
page read and write
293832DA000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
43C000
remote allocation
page execute and read and write
1F3595B0000
heap
page read and write
CC4000
heap
page read and write
7FF8B77F0000
unkown
page readonly
5080000
direct allocation
page read and write
1B3E0520000
heap
page read and write
2A90000
direct allocation
page read and write
4E61000
heap
page read and write
20643967000
heap
page read and write
7649000
trusted library allocation
page read and write
674A000
heap
page read and write
CC5000
heap
page read and write
8BCC000
stack
page read and write
CC4000
heap
page read and write
1684000
heap
page read and write
4D50000
direct allocation
page execute and read and write
630F000
stack
page read and write
450B000
trusted library allocation
page read and write
1200000
unkown
page execute and read and write
1C16E000
stack
page read and write
1C51E000
stack
page read and write
266B47B5000
heap
page read and write
147A000
trusted library allocation
page execute and read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
CB4000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
5080000
direct allocation
page read and write
F37000
unkown
page execute and read and write
CC4000
heap
page read and write
2606F466000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
69000000
unkown
page readonly
2606E960000
heap
page read and write
D94000
heap
page read and write
7FF725A9E000
unkown
page read and write
CB4000
heap
page read and write
CC4000
heap
page read and write
29EF000
stack
page read and write
CC4000
heap
page read and write
1495000
trusted library allocation
page execute and read and write
4AEE000
stack
page read and write
3ABF000
stack
page read and write
20B5000
heap
page read and write
4DFF000
stack
page read and write
EEF000
heap
page read and write
204E000
heap
page read and write
20E74F75000
heap
page read and write
1960000
heap
page read and write
1E13C23F000
heap
page read and write
312E000
stack
page read and write
20E74F8C000
heap
page read and write
17C9E170000
heap
page read and write
40AF000
stack
page read and write
4E61000
heap
page read and write
27480000
heap
page read and write
7FF8B78AD000
unkown
page readonly
665E000
stack
page read and write
5A03000
heap
page execute and read and write
56B0000
direct allocation
page execute and read and write
29382CEE000
heap
page read and write
4E61000
heap
page read and write
39CE000
stack
page read and write
4E61000
heap
page read and write
1F397880000
heap
page read and write
1EB9474E000
heap
page read and write
91B1000
heap
page read and write
15E4000
heap
page read and write
26070470000
direct allocation
page read and write
1E92000
heap
page read and write
2606F378000
heap
page read and write
2E0000
unkown
page read and write
5CC48FE000
unkown
page read and write
13C0000
direct allocation
page read and write
367F000
stack
page read and write
2606F130000
heap
page read and write
CC4000
heap
page read and write
7FF8A8BA8000
unkown
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
104C000
unkown
page execute and read and write
D56000
unkown
page readonly
1744000
heap
page read and write
2606FC30000
direct allocation
page read and write
6950000
trusted library allocation
page execute and read and write
20643F50000
heap
page read and write
7FF8BA4F1000
unkown
page execute read
7FF8A89CD000
unkown
page readonly
1684000
heap
page read and write
2CBF000
stack
page read and write
29382C6E000
heap
page read and write
1CA2E000
stack
page read and write
4E61000
heap
page read and write
47FF000
stack
page read and write
22C97000
heap
page read and write
CB4000
heap
page read and write
1858000
heap
page read and write
CC5000
heap
page read and write
1055000
unkown
page execute and read and write
CC5000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
19E000
stack
page read and write
289E000
stack
page read and write
47BF000
stack
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
1C8ED000
stack
page read and write
1F0000
heap
page read and write
CC4000
heap
page read and write
7FF8A7BCC000
unkown
page readonly
7FF8B5720000
unkown
page readonly
82C0000
trusted library allocation
page read and write
CC4000
heap
page read and write
20E75634000
heap
page read and write
20781739000
heap
page read and write
C20000
direct allocation
page read and write
6443000
heap
page read and write
3620000
trusted library allocation
page read and write
2D9B8720000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
22C8E000
heap
page read and write
4E61000
heap
page read and write
451A000
trusted library allocation
page read and write
29382C65000
heap
page read and write
4E61000
heap
page read and write
2606FE3E000
heap
page read and write
CB4000
heap
page read and write
2606F489000
heap
page read and write
CB4000
heap
page read and write
2D9B88B0000
heap
page read and write
29382B30000
heap
page read and write
61E00000
direct allocation
page execute and read and write
15EF000
stack
page read and write
26070034000
heap
page read and write
CC4000
heap
page read and write
20E76ED5000
heap
page read and write
CC4000
heap
page read and write
22C81000
heap
page read and write
5BA0000
trusted library allocation
page read and write
400000
unkown
page execute and read and write
444000
remote allocation
page execute and read and write
5091000
heap
page read and write
4E61000
heap
page read and write
CC5000
heap
page read and write
4E61000
heap
page read and write
2606FBB0000
direct allocation
page read and write
17F0000
heap
page read and write
27DF000
stack
page read and write
7FF8BA256000
unkown
page readonly
56F0000
heap
page read and write
4E61000
heap
page read and write
1E13C20B000
heap
page read and write
CC4000
heap
page read and write
41FE000
stack
page read and write
EC1000
heap
page read and write
2606F3B1000
heap
page read and write
2D2F000
stack
page read and write
5C3C000
stack
page read and write
35FE000
trusted library allocation
page read and write
7FF8BA4F0000
unkown
page readonly
5CC454C000
stack
page read and write
4E61000
heap
page read and write
1744000
heap
page read and write
7FF725AE0000
unkown
page write copy
266B4551000
heap
page read and write
867F000
stack
page read and write
44CF000
stack
page read and write
20E7517E000
heap
page read and write
2137000
heap
page read and write
4E61000
heap
page read and write
CC4000
heap
page read and write
1EB9472B000
heap
page read and write
CC4000
heap
page read and write
CC5000
heap
page read and write
1E5000
unkown
page execute and write copy
CC4000
heap
page read and write
2606F429000
heap
page read and write
293832E9000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
7FF8B7FD1000
unkown
page execute read
679D000
heap
page read and write
601C000
stack
page read and write
1967000
heap
page read and write
61EB7000
direct allocation
page readonly
CC4000
heap
page read and write
CC4000
heap
page read and write
499E000
stack
page read and write
2606F3C5000
heap
page read and write
7FF8B8262000
unkown
page readonly
5752000
trusted library allocation
page read and write
20643910000
heap
page read and write
BED000
stack
page read and write
293832CF000
heap
page read and write
25DA000
heap
page read and write
5091000
heap
page read and write
CC5000
heap
page read and write
41F5000
trusted library allocation
page read and write
2606C540000
heap
page read and write
CC4000
heap
page read and write
20E7564A000
heap
page read and write
6350000
heap
page read and write
35CC000
trusted library allocation
page read and write
206439CA000
heap
page read and write
20E74F4C000
heap
page read and write
23CA1530000
heap
page read and write
362B000
trusted library allocation
page read and write
443F000
stack
page read and write
617E000
stack
page read and write
20643979000
heap
page read and write
4E61000
heap
page read and write
20E74F75000
heap
page read and write
EEC000
stack
page read and write
20E75636000
heap
page read and write
28D8D000
heap
page read and write
20781620000
heap
page read and write
4E61000
heap
page read and write
5091000
heap
page read and write
CC4000
heap
page read and write
207FDB90000
heap
page read and write
CC4000
heap
page read and write
25BE000
stack
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
12E6C7F000
stack
page read and write
2606E3E8000
direct allocation
page read and write
129C000
stack
page read and write
CB4000
heap
page read and write
4A7E000
stack
page read and write
1C46F000
stack
page read and write
CC4000
heap
page read and write
D8E000
heap
page read and write
4E61000
heap
page read and write
108E000
stack
page read and write
DD8000
heap
page read and write
1744000
heap
page read and write
2606F2CE000
heap
page read and write
3E1F000
stack
page read and write
DD8000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
CC4000
heap
page read and write
DD0000
heap
page read and write
2606F469000
heap
page read and write
CC4000
heap
page read and write
CC5000
heap
page read and write
40F0000
heap
page read and write
61ED3000
direct allocation
page read and write
CC4000
heap
page read and write
4E61000
heap
page read and write
4DEB000
stack
page read and write
1F75000
heap
page read and write
2D9B87BA000
heap
page read and write
670F000
heap
page read and write
1450000
direct allocation
page read and write
4E61000
heap
page read and write
There are 4829 hidden memdumps, click here to show them.