IOC Report
aeyh21MAtA.exe

loading gif

Files

File Path
Type
Category
Malicious
aeyh21MAtA.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\ast.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\astclient.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\astrct.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\aw_sas32.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\hatls.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\is-0HK0N.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\is-16KCC.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\is-5765H.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\is-5FFPK.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\is-60GLH.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\is-AAPRN.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\is-BG0DN.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\is-E6DJ2.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\is-GPS00.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\is-JCRD8.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\is-S3CIC.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\is-SNDPS.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\is-TBGHD.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\is-VO31B.tmp
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\libcrypto-1_1.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\libcryptoMD.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\libcurl.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\libeay32.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\libjpeg-turbo-win.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\libssl-1_1.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\opus.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\u7i3kw\quartz.dll (copy)
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\template\AstCrp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\template\ast.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\template\astclient.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\template\astrct.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\template\aw_sas32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\template\hatls.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\template\libcrypto-1_1.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\template\libcryptoMD.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\template\libcurl.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\template\libeay32.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\template\libjpeg-turbo-win.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\template\libssl-1_1.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\template\opus.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\template\quartz.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-3UH24.tmp\_isetup\_iscrypt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-3UH24.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-3UH24.tmp\_isetup\_shfoldr.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-KMJLJ.tmp\_isetup\_iscrypt.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-KMJLJ.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-KMJLJ.tmp\_isetup\_shfoldr.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-MK5MR.tmp\aeyh21MAtA.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-PD76Q.tmp\aeyh21MAtA.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\u7i3kw\57mskh.cfg (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\u7i3kw\9vsl3c.bat (copy)
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\u7i3kw\AstCrp.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\u7i3kw\config.ini (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\u7i3kw\exn5epb.bmp (copy)
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 186x272, components 3
dropped
C:\Users\user\AppData\Local\Temp\u7i3kw\is-9LAME.tmp
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\u7i3kw\is-HUL9G.tmp
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 186x272, components 3
dropped
C:\Users\user\AppData\Local\Temp\u7i3kw\is-INPP5.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\u7i3kw\is-MU1HO.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\u7i3kw\is-VL2GA.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\u7i3kw\msvcr120.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\template\57mskh.cfg
data
dropped
C:\Users\user\AppData\Roaming\template\9vsl3c.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\template\config.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\template\exn5epb.bmp
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 186x272, components 3
dropped
C:\Users\user\AppData\Roaming\template\msvcr120.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
There are 56 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\aeyh21MAtA.exe
"C:\Users\user\Desktop\aeyh21MAtA.exe"
malicious
C:\Users\user\Desktop\aeyh21MAtA.exe
"C:\Users\user\Desktop\aeyh21MAtA.exe" /verysilent /password=lzueuxc
malicious
C:\Users\user\AppData\Roaming\template\ast.exe
"C:\Users\user\AppData\Roaming\template\ast.exe"
malicious
C:\Users\user\AppData\Roaming\template\ast.exe
"C:\Users\user\AppData\Roaming\template\ast.exe"
malicious
C:\Users\user\AppData\Roaming\template\ast.exe
"C:\Users\user\AppData\Roaming\template\ast.exe"
malicious
C:\Users\user\AppData\Local\Temp\is-MK5MR.tmp\aeyh21MAtA.tmp
"C:\Users\user\AppData\Local\Temp\is-MK5MR.tmp\aeyh21MAtA.tmp" /SL5="$20454,6701859,404480,C:\Users\user\Desktop\aeyh21MAtA.exe"
C:\Users\user\AppData\Local\Temp\is-PD76Q.tmp\aeyh21MAtA.tmp
"C:\Users\user\AppData\Local\Temp\is-PD76Q.tmp\aeyh21MAtA.tmp" /SL5="$20464,6701859,404480,C:\Users\user\Desktop\aeyh21MAtA.exe" /verysilent /password=lzueuxc
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\u7i3kw\9vsl3c.bat""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\xcopy.exe
xcopy /Y /I /S "C:\Users\user\AppData\Local\Temp\u7i3kw\*" "C:\Users\user\AppData\Roaming\template\"

URLs

Name
IP
Malicious
https://id.xn--80akicokc0aablc.xn--p1ai:443/ING=Defaui
unknown
http://schemas.xmlsoap.org/soap/encoding/Nhttp://www.borland.com/namespaces/Types
unknown
http://www.borland.com/namespaces/Typesui
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443mUbx
unknown
http://www.borland.com/namespaces/Typesw_sas3Y
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443g
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443f
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443i
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443h
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443k
unknown
http://crl.sectigo.com/COMODOTimeStampingCA_2.crl0r
unknown
http://www.indyproject.org/
unknown
http://www.kngstr.com/?PreDefines.ishAbout
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:44335i:443y
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:44335......
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443JV
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443U
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:44335/
unknown
https://curl.haxx.se/docs/http-cookies.html#
unknown
https://datatracker.ietf.org/ipr/1526/
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:44335-
unknown
http://www.borland.com/namespaces/Typeste
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:44
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:44396
unknown
https://id.xn--80akicokc0aablc.xn--p1aiCY
unknown
https://curl.haxx.se/docs/copyright.htmlD
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443K
unknown
http://crl.globalsign.
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443/Log
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443/
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443.
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443CBOs
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:4439
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:4438
unknown
https://id.xn--80akicokc0aablc.xn--p1ai443...
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443rV
unknown
http://www.innosetup.com/
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443iVfy
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443uV
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443ts
unknown
https://id.xn--80ak
unknown
https://id.xn--80akicokc0aablc.xn--p1aiv
unknown
https://id.xn--80akicokc0aablc.xn--p1ai
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443$
unknown
https://id.xn--80akico
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443l~
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443uin
unknown
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
unknown
http://www.borland.com/namespaces/Typesw
unknown
http://ocsp2.globalsign.
unknown
http://schemas.xmlsoap.org/soap/encoding/ZZY
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:44335
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443...43
unknown
http://www.kngstr.com/?PreDefines.ish
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443/AstClnog
unknown
https://id.xn--80akicokc0ar
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443:V
unknown
https://id.xn--80akicokc0aablc.xn--p1aiIZ
unknown
https://datatracker.ietf.org/ipr/1524/
unknown
https://id.xn--80akicokc0aablc.xn--p1aid003
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:44335/templatep
unknown
https://id.xn--80akicokc0aablc.xn--p1aij
unknown
http://crypto-st.art/update.php
unknown
http://www.borland.com/namespaces/Typesnu
unknown
https://id.xn--80akicokc0aablc.xn--p1aii
unknown
http://www.openssl.org/)
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443VV
unknown
http://ocsp.sectigo.com0
unknown
http://www.openssl.org/V
unknown
https://id.xn--80akicokc0aa
unknown
http://schemas.xmlsoap.org/soap/encoding/r
unknown
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443AUB
unknown
https://curl.haxx.se/docs/http-cookies.html
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443-0
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443vU
unknown
http://www.borland.com/namespaces/Types
unknown
http://www.borland.com/namespaces/Typesh
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:44335/api/exec
unknown
https://sectigo.com/CPS0B
unknown
https://id.xn--80akicokc0aablc.xn--p1aihY
unknown
https://curl.haxx.se/V
unknown
https://datatracker.ietf.org/ipr/1914/
unknown
https://sectigo.com/CPS0C
unknown
https://sectigo.com/CPS0D
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443
unknown
https://id.xn--80akicokc0aablc.
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443...
unknown
http://www.borland.com/namespaces/Typese
unknown
https://id.xn--80akicokc0aablc.xn--p1ai1
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443NUGx
unknown
http://crt.sectigo.com/COMODOTimeStampingCA_2.crt0#
unknown
http://www.sqlite.org/copyright.html.
unknown
https://id.xn--80akicokc0aablc.xn--p1ai00
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:44359
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:44302
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:44300
unknown
https://sectigo.com/CPS0
unknown
https://www.openssl.org/docs/faq.html
unknown
https://id.xn--80akicokc0aablc.xn--p1ai:443/api/exec
212.193.169.65
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
id.xn--80akicokc0aablc.xn--p1ai
212.193.169.65

IPs

IP
Domain
Country
Malicious
212.193.169.65
id.xn--80akicokc0aablc.xn--p1ai
Russian Federation
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
Security.FixPass
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
Main.Autorun
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
Main.CloseButtonOperation
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
Main.CheckUpdates
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
Security.UseLocalSecuritySettings
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
Security.DynPassKind
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
Security.PassLifetime
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
Security.CanWinAuth
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
Security.AccessKind
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
Security.CanWinLoginAnotherUser
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
Security.UNCONTROLLED_ACCESS
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
Security.CanWinLoginNotAdmin
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
Security.DenyRemoteSettingsControl
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
Security.DenyLockControls
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
Log.ServerStoreTechLog
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
Main.AWAYMODE_REQUIRED
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
Main.LogsLifetime
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
Main.LogsForMail2Support
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
ProxySettings.UseKind
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
ProxySettings.StoreUserAndPassw
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
ast
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
Values.HDD
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
IEProxyAttributes.Server
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
IEProxyAttributes.Port
HKEY_CURRENT_USER\SOFTWARE\safib\ast\SS1
IEProxyAttributes.ProxyBypass
There are 23 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
401000
unkown
page execute read
malicious
5DDE000
heap
page read and write
5DA5000
heap
page read and write
22D0000
direct allocation
page read and write
32E9000
direct allocation
page read and write
555000
unkown
page read and write
9B000
stack
page read and write
E28000
heap
page read and write
3191000
heap
page read and write
3141000
heap
page read and write
2FC1000
heap
page read and write
5D67000
heap
page read and write
717000
heap
page read and write
E0D000
heap
page read and write
8D9000
unkown
page read and write
D20000
direct allocation
page read and write
315B000
heap
page read and write
E1A000
heap
page read and write
9B000
stack
page read and write
5DD5000
heap
page read and write
635E000
stack
page read and write
5D6E000
heap
page read and write
E10000
heap
page read and write
7B40000
heap
page read and write
BF0000
trusted library allocation
page read and write
736000
unkown
page execute read
6F40000
trusted library allocation
page read and write
302D000
direct allocation
page read and write
3330000
direct allocation
page read and write
5D70000
heap
page read and write
5FA0000
trusted library allocation
page read and write
5D34000
heap
page read and write
5DB5000
heap
page read and write
2488000
direct allocation
page read and write
5D9B000
heap
page read and write
2DD0000
heap
page read and write
213F000
direct allocation
page read and write
36D6000
direct allocation
page read and write
32A7000
direct allocation
page read and write
7B50000
heap
page read and write
3164000
heap
page read and write
D30000
heap
page read and write
5D5D000
heap
page read and write
6C2C9000
unkown
page execute read
3089000
heap
page read and write
6DC0000
trusted library allocation
page read and write
3185000
heap
page read and write
5DAD000
heap
page read and write
369E000
direct allocation
page read and write
7BAA000
heap
page read and write
23AA000
direct allocation
page read and write
3168000
heap
page read and write
2E21000
heap
page read and write
600000
heap
page read and write
5DBD000
heap
page read and write
5DD6000
heap
page read and write
5D72000
heap
page read and write
3141000
heap
page read and write
21FA000
direct allocation
page read and write
2FC1000
heap
page read and write
3199000
heap
page read and write
8CA000
unkown
page read and write
36CE000
direct allocation
page read and write
DFF000
heap
page read and write
3034000
direct allocation
page read and write
2FC1000
heap
page read and write
5DAC000
heap
page read and write
3356000
direct allocation
page read and write
22F9000
heap
page read and write
322F000
stack
page read and write
6CC0000
trusted library allocation
page read and write
6900000
trusted library allocation
page read and write
5FD0000
trusted library allocation
page read and write
5F73000
trusted library allocation
page read and write
6C450000
unkown
page execute read
3168000
heap
page read and write
5DB9000
heap
page read and write
32B9000
direct allocation
page read and write
937000
unkown
page read and write
5B91000
heap
page read and write
5D87000
heap
page read and write
6C19E000
unkown
page readonly
3188000
heap
page read and write
414F000
stack
page read and write
610000
heap
page read and write
5F64000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
5D92000
heap
page read and write
2240000
direct allocation
page execute and read and write
63E0000
trusted library allocation
page read and write
7B96000
heap
page read and write
3141000
heap
page read and write
BA0000
trusted library allocation
page read and write
63C000
heap
page read and write
7006000
unkown
page read and write
3345000
direct allocation
page read and write
5D6E000
heap
page read and write
3626000
direct allocation
page read and write
3183000
heap
page read and write
2FC1000
heap
page read and write
BC0000
heap
page read and write
5D7D000
heap
page read and write
233C000
direct allocation
page read and write
315B000
heap
page read and write
7B68000
heap
page read and write
3250000
direct allocation
page read and write
391F000
stack
page read and write
2FC1000
heap
page read and write
334B000
direct allocation
page read and write
5EE000
stack
page read and write
5DB2000
heap
page read and write
73E000
stack
page read and write
5DC2000
heap
page read and write
2E4E000
stack
page read and write
5D31000
heap
page read and write
5D4B000
heap
page read and write
5DC4000
heap
page read and write
5DAE000
heap
page read and write
6A00000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
7B51000
heap
page read and write
5D96000
heap
page read and write
6A00000
trusted library allocation
page read and write
318C000
heap
page read and write
2FC1000
heap
page read and write
5DA9000
heap
page read and write
2FDC000
direct allocation
page read and write
2FC0000
heap
page read and write
337D000
direct allocation
page read and write
7B24000
heap
page read and write
36F8000
direct allocation
page read and write
44CE000
direct allocation
page read and write
21BB000
direct allocation
page read and write
5D77000
heap
page read and write
5DB2000
heap
page read and write
2D0D000
stack
page read and write
2FF6000
heap
page read and write
3282000
heap
page read and write
8D0000
unkown
page read and write
2E21000
heap
page read and write
5DCD000
heap
page read and write
7D20000
trusted library allocation
page read and write
3230000
heap
page read and write
5D6E000
heap
page read and write
7FCA0000
direct allocation
page read and write
DFF000
heap
page read and write
4410000
direct allocation
page read and write
5D72000
heap
page read and write
3141000
heap
page read and write
32E2000
direct allocation
page read and write
2CB0000
heap
page read and write
705000
heap
page read and write
5DAF000
heap
page read and write
238C000
direct allocation
page read and write
21E0000
direct allocation
page read and write
30A0000
heap
page read and write
315B000
heap
page read and write
2EB5000
direct allocation
page read and write
635000
heap
page read and write
3727000
direct allocation
page read and write
5D63000
heap
page read and write
31E0000
heap
page read and write
5D73000
heap
page read and write
5D56000
heap
page read and write
36BA000
direct allocation
page read and write
6C1AF000
unkown
page readonly
2FC1000
heap
page read and write
E0D000
heap
page read and write
3176000
heap
page read and write
5D8C000
heap
page read and write
48A6000
direct allocation
page read and write
6A40000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
3450000
heap
page read and write
2FC1000
heap
page read and write
5DBD000
heap
page read and write
367E000
stack
page read and write
36B8000
direct allocation
page read and write
5D93000
heap
page read and write
2EDC000
direct allocation
page read and write
7B21000
heap
page read and write
2FD0000
heap
page read and write
5D5A000
heap
page read and write
315B000
heap
page read and write
5DA5000
heap
page read and write
5DDD000
heap
page read and write
63E0000
trusted library allocation
page read and write
48AC000
direct allocation
page read and write
36A8000
direct allocation
page read and write
DFC000
heap
page read and write
6DBF000
stack
page read and write
27A0000
heap
page read and write
6BBD2000
unkown
page readonly
453E000
direct allocation
page read and write
5DCE000
heap
page read and write
30E0000
heap
page read and write
63E0000
trusted library allocation
page read and write
5DDD000
heap
page read and write
5D34000
heap
page read and write
21DD000
direct allocation
page read and write
5D31000
heap
page read and write
6B63000
trusted library allocation
page read and write
240D000
direct allocation
page read and write
2376000
direct allocation
page read and write
21AC000
direct allocation
page read and write
D2E000
stack
page read and write
36B2000
direct allocation
page read and write
5DD8000
heap
page read and write
550000
heap
page read and write
5DBE000
heap
page read and write
93000
stack
page read and write
2368000
direct allocation
page read and write
3159000
heap
page read and write
6F00000
trusted library allocation
page read and write
2204000
direct allocation
page read and write
5D5D000
heap
page read and write
5DD2000
heap
page read and write
5F50000
trusted library allocation
page read and write
5DB1000
heap
page read and write
3530000
heap
page read and write
239A000
direct allocation
page read and write
5DDC000
heap
page read and write
5F50000
trusted library allocation
page read and write
5F50000
trusted library allocation
page read and write
2195000
direct allocation
page read and write
3723000
direct allocation
page read and write
5DDD000
heap
page read and write
570000
heap
page read and write
3178000
heap
page read and write
5F71000
trusted library allocation
page read and write
2FC1000
heap
page read and write
3183000
heap
page read and write
7B39000
heap
page read and write
5DCC000
heap
page read and write
4412000
direct allocation
page read and write
3164000
heap
page read and write
5D96000
heap
page read and write
211F000
direct allocation
page read and write
65FF000
stack
page read and write
5D8D000
heap
page read and write
36D8000
direct allocation
page read and write
7B41000
heap
page read and write
315B000
heap
page read and write
63E0000
trusted library allocation
page read and write
242B000
direct allocation
page read and write
7B60000
heap
page read and write
317B000
heap
page read and write
3731000
direct allocation
page read and write
3168000
heap
page read and write
2370000
direct allocation
page read and write
2EBD000
direct allocation
page read and write
3725000
direct allocation
page read and write
116C000
stack
page read and write
5DC6000
heap
page read and write
EF0000
trusted library allocation
page read and write
5D7A000
heap
page read and write
639C000
stack
page read and write
48B2000
direct allocation
page read and write
36F0000
direct allocation
page read and write
61EA1000
unkown
page readonly
5DD6000
heap
page read and write
C44000
heap
page read and write
2E0F000
stack
page read and write
3C30000
trusted library allocation
page read and write
3198000
heap
page read and write
36DC000
direct allocation
page read and write
9A8000
unkown
page readonly
2E21000
heap
page read and write
3B60000
heap
page read and write
5D6E000
heap
page read and write
940000
heap
page read and write
5F73000
trusted library allocation
page read and write
36AA000
direct allocation
page read and write
36B0000
direct allocation
page read and write
2EF9000
direct allocation
page read and write
2FC1000
heap
page read and write
216A000
direct allocation
page read and write
36F9000
direct allocation
page read and write
450E000
direct allocation
page read and write
5DB0000
heap
page read and write
7B51000
heap
page read and write
36C4000
direct allocation
page read and write
23B2000
direct allocation
page read and write
48AE000
direct allocation
page read and write
3148000
heap
page read and write
927000
unkown
page read and write
44D0000
direct allocation
page read and write
5DC0000
heap
page read and write
2160000
direct allocation
page read and write
2FC1000
heap
page read and write
5D7F000
heap
page read and write
DFC000
heap
page read and write
5D96000
heap
page read and write
318C000
heap
page read and write
315B000
heap
page read and write
60A000
heap
page read and write
5F50000
trusted library allocation
page read and write
5D6E000
heap
page read and write
8D3000
unkown
page read and write
19A000
stack
page read and write
3191000
heap
page read and write
5F50000
trusted library allocation
page read and write
36CA000
direct allocation
page read and write
44E8000
direct allocation
page read and write
5DCA000
heap
page read and write
6CC0000
trusted library allocation
page read and write
3176000
heap
page read and write
400000
unkown
page readonly
3089000
heap
page read and write
5D83000
heap
page read and write
6C1DA000
unkown
page read and write
5D96000
heap
page read and write
5D8D000
heap
page read and write
3130000
heap
page read and write
5D6E000
heap
page read and write
65A000
heap
page read and write
3246000
heap
page read and write
E1C000
heap
page read and write
6BBCB000
unkown
page read and write
7B8E000
heap
page read and write
5DC9000
heap
page read and write
3196000
heap
page read and write
23E2000
direct allocation
page read and write
3141000
heap
page read and write
CAE000
stack
page read and write
2208000
direct allocation
page read and write
5C0000
heap
page read and write
2F24000
direct allocation
page read and write
E6C000
stack
page read and write
3755000
direct allocation
page read and write
A6E000
stack
page read and write
4406000
direct allocation
page read and write
7B38000
heap
page read and write
6B40000
trusted library allocation
page read and write
5DD3000
heap
page read and write
3198000
heap
page read and write
315B000
heap
page read and write
7006000
unkown
page read and write
7B49000
heap
page read and write
8C3000
unkown
page read and write
381E000
stack
page read and write
7FE3B000
direct allocation
page read and write
5F50000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
5D7A000
heap
page read and write
6CF14000
unkown
page write copy
7B28000
heap
page read and write
213C000
direct allocation
page read and write
44DC000
direct allocation
page read and write
3078000
heap
page read and write
315B000
heap
page read and write
44D2000
direct allocation
page read and write
5D34000
heap
page read and write
6CCA1000
unkown
page execute read
36BE000
direct allocation
page read and write
3164000
heap
page read and write
300C000
direct allocation
page read and write
462000
unkown
page readonly
32C5000
direct allocation
page read and write
5D6C000
heap
page read and write
6C4CC000
unkown
page readonly
5DC1000
heap
page read and write
36D2000
direct allocation
page read and write
417000
unkown
page read and write
3180000
heap
page read and write
44E6000
direct allocation
page read and write
5DB9000
heap
page read and write
31AF000
stack
page read and write
6C175000
unkown
page readonly
D38000
heap
page read and write
61E9B000
unkown
page readonly
2FBE000
direct allocation
page read and write
5DCD000
heap
page read and write
CEE000
stack
page read and write
2FFC000
direct allocation
page read and write
6403000
trusted library allocation
page read and write
2143000
direct allocation
page read and write
5D7A000
heap
page read and write
8CB000
unkown
page read and write
5D6E000
heap
page read and write
2FC1000
heap
page read and write
5DD6000
heap
page read and write
23E3000
direct allocation
page read and write
7B2D000
heap
page read and write
5F50000
trusted library allocation
page read and write
2E21000
heap
page read and write
5DD4000
heap
page read and write
B90000
heap
page read and write
315B000
heap
page read and write
5C8000
heap
page read and write
6CCB9000
unkown
page readonly
32B6000
direct allocation
page read and write
3060000
trusted library allocation
page read and write
DFC000
heap
page read and write
31F0000
direct allocation
page read and write
5D71000
heap
page read and write
E1D000
heap
page read and write
2EAE000
direct allocation
page read and write
41D000
unkown
page read and write
5DBE000
heap
page read and write
6430000
remote allocation
page read and write
3051000
direct allocation
page read and write
5D8B000
heap
page read and write
5D6E000
heap
page read and write
4431000
direct allocation
page read and write
3168000
heap
page read and write
2201000
direct allocation
page read and write
2E21000
heap
page read and write
5F60000
trusted library allocation
page read and write
2473000
direct allocation
page read and write
D8C000
heap
page read and write
5DA5000
heap
page read and write
2E21000
heap
page read and write
3176000
heap
page read and write
B90000
heap
page read and write
5DDC000
heap
page read and write
6D0000
direct allocation
page execute and read and write
5DB2000
heap
page read and write
2175000
direct allocation
page read and write
31EE000
stack
page read and write
2402000
direct allocation
page read and write
3120000
heap
page read and write
3168000
heap
page read and write
5F73000
trusted library allocation
page read and write
7B26000
heap
page read and write
3168000
heap
page read and write
5ACF000
heap
page read and write
5CE0000
heap
page read and write
5D73000
heap
page read and write
44DA000
direct allocation
page read and write
6B7DB000
unkown
page readonly
DA1000
heap
page read and write
2414000
direct allocation
page read and write
3186000
heap
page read and write
5D6C000
heap
page read and write
2E21000
heap
page read and write
2FEC000
direct allocation
page read and write
6BDCC000
unkown
page readonly
351F000
stack
page read and write
392F000
stack
page read and write
66FD000
stack
page read and write
2ED0000
heap
page read and write
5DAD000
heap
page read and write
630000
heap
page read and write
3671000
direct allocation
page read and write
6CE91000
unkown
page execute read
320B000
direct allocation
page read and write
61E8B000
unkown
page readonly
3216000
direct allocation
page read and write
3D70000
direct allocation
page execute and read and write
3168000
heap
page read and write
303C000
direct allocation
page read and write
41C000
unkown
page read and write
5D7A000
heap
page read and write
2377000
direct allocation
page read and write
36DC000
direct allocation
page read and write
3064000
direct allocation
page read and write
5F50000
trusted library allocation
page read and write
5D87000
heap
page read and write
5D4D000
heap
page read and write
2E21000
heap
page read and write
32A1000
direct allocation
page read and write
5D97000
heap
page read and write
3168000
heap
page read and write
2EB0000
heap
page read and write
36BC000
direct allocation
page read and write
795000
heap
page read and write
6A40000
trusted library allocation
page read and write
5D96000
heap
page read and write
5D85000
heap
page read and write
23CE000
direct allocation
page read and write
DFE000
heap
page read and write
7B68000
heap
page read and write
D7D000
heap
page read and write
5D78000
heap
page read and write
8C3000
unkown
page read and write
5D68000
heap
page read and write
2500000
heap
page read and write
5DDB000
heap
page read and write
5D5D000
heap
page read and write
560000
heap
page read and write
5DC5000
heap
page read and write
44C8000
direct allocation
page read and write
2F50000
trusted library allocation
page read and write
5DDC000
heap
page read and write
3382000
direct allocation
page read and write
6B40000
trusted library allocation
page read and write
7B4A000
heap
page read and write
5DBD000
heap
page read and write
3168000
heap
page read and write
2FB3000
heap
page read and write
E1E000
heap
page read and write
32B5000
heap
page read and write
306E000
stack
page read and write
301F000
direct allocation
page read and write
5D65000
heap
page read and write
3185000
heap
page read and write
3C30000
direct allocation
page execute and read and write
337B000
direct allocation
page read and write
6DC0000
trusted library allocation
page read and write
6B61000
trusted library allocation
page read and write
37A1000
direct allocation
page read and write
6050000
trusted library allocation
page read and write
5CE9000
heap
page read and write
382F000
stack
page read and write
36AE000
direct allocation
page read and write
5F72000
trusted library allocation
page read and write
4453000
direct allocation
page read and write
5DCA000
heap
page read and write
470000
heap
page read and write
5DAD000
heap
page read and write
5DAD000
heap
page read and write
7005000
unkown
page execute read
3198000
heap
page read and write
5DB9000
heap
page read and write
25D0000
heap
page read and write
C44000
heap
page read and write
61E9D000
unkown
page read and write
372B000
direct allocation
page read and write
2FF3000
direct allocation
page read and write
5D83000
heap
page read and write
32BE000
heap
page read and write
3168000
heap
page read and write
6BE3D000
unkown
page readonly
5D7A000
heap
page read and write
417000
unkown
page write copy
5DD5000
heap
page read and write
3296000
heap
page read and write
7B60000
heap
page read and write
315B000
heap
page read and write
5F90000
trusted library allocation
page read and write
7B48000
heap
page read and write
8DE000
unkown
page read and write
3C30000
direct allocation
page execute and read and write
231F000
direct allocation
page read and write
77E000
stack
page read and write
7B60000
heap
page read and write
D6E000
heap
page read and write
5F50000
trusted library allocation
page read and write
DFC000
heap
page read and write
7B75000
heap
page read and write
369A000
direct allocation
page read and write
5F73000
trusted library allocation
page read and write
9B000
stack
page read and write
5D75000
heap
page read and write
6032000
trusted library allocation
page read and write
5DCA000
heap
page read and write
36E0000
direct allocation
page read and write
6BC4A000
unkown
page execute read
3189000
heap
page read and write
6BE40000
unkown
page readonly
CFE000
stack
page read and write
5D76000
heap
page read and write
2F00000
direct allocation
page read and write
8BF000
unkown
page read and write
5D68000
heap
page read and write
3168000
heap
page read and write
323B000
direct allocation
page read and write
2369000
direct allocation
page read and write
417000
unkown
page read and write
5D8D000
heap
page read and write
6980000
trusted library allocation
page read and write
2E21000
heap
page read and write
5F90000
trusted library allocation
page read and write
5D5D000
heap
page read and write
3185000
heap
page read and write
7B32000
heap
page read and write
7B41000
heap
page read and write
C45000
heap
page read and write
23AB000
direct allocation
page read and write
3341000
direct allocation
page read and write
318C000
heap
page read and write
937000
unkown
page read and write
5D99000
heap
page read and write
BF0000
trusted library allocation
page read and write
7B38000
heap
page read and write
5DBD000
heap
page read and write
DFF000
heap
page read and write
6DE3000
trusted library allocation
page read and write
72C000
heap
page read and write
6C040000
unkown
page readonly
7B4D000
heap
page read and write
5D5E000
heap
page read and write
5F50000
trusted library allocation
page read and write
3359000
direct allocation
page read and write
3249000
heap
page read and write
60E000
stack
page read and write
3195000
heap
page read and write
5D6E000
heap
page read and write
6F00000
trusted library allocation
page read and write
5D7A000
heap
page read and write
7B55000
heap
page read and write
2E0F000
stack
page read and write
E18000
heap
page read and write
E1B000
heap
page read and write
3183000
heap
page read and write
6E00000
trusted library allocation
page read and write
3164000
heap
page read and write
5D7A000
heap
page read and write
6C1D8000
unkown
page write copy
23A4000
direct allocation
page read and write
6A40000
trusted library allocation
page read and write
6A00000
trusted library allocation
page read and write
3176000
heap
page read and write
5ACF000
heap
page read and write
3393000
direct allocation
page read and write
5D4D000
heap
page read and write
5DAD000
heap
page read and write
63E0000
trusted library allocation
page read and write
9AF000
stack
page read and write
BA0000
heap
page read and write
2FC1000
heap
page read and write
400000
unkown
page readonly
5D6E000
heap
page read and write
365B000
direct allocation
page read and write
5F50000
trusted library allocation
page read and write
5DAE000
heap
page read and write
2FCD000
direct allocation
page read and write
5F50000
trusted library allocation
page read and write
37C8000
direct allocation
page read and write
4414000
direct allocation
page read and write
2F16000
direct allocation
page read and write
10BF000
stack
page read and write
315B000
heap
page read and write
6CF19000
unkown
page readonly
21B8000
direct allocation
page read and write
3164000
heap
page read and write
7B30000
heap
page read and write
5DB7000
heap
page read and write
6900000
trusted library allocation
page read and write
5D6E000
heap
page read and write
5DB5000
heap
page read and write
CB0000
heap
page read and write
19A000
stack
page read and write
5DAD000
heap
page read and write
2F90000
heap
page read and write
3190000
heap
page read and write
21D8000
direct allocation
page read and write
8E0000
unkown
page read and write
3141000
heap
page read and write
318C000
heap
page read and write
2393000
direct allocation
page read and write
558000
unkown
page write copy
2E21000
heap
page read and write
7B70000
heap
page read and write
7B77000
heap
page read and write
5DC4000
heap
page read and write
7B20000
heap
page read and write
5F50000
trusted library allocation
page read and write
2E3D000
stack
page read and write
6A00000
trusted library allocation
page read and write
36EE000
direct allocation
page read and write
5C0000
heap
page read and write
DF6000
heap
page read and write
5D7A000
heap
page read and write
3141000
heap
page read and write
32AD000
heap
page read and write
726000
heap
page read and write
5DAD000
heap
page read and write
2FC1000
heap
page read and write
5D6A000
heap
page read and write
2126000
direct allocation
page read and write
3141000
heap
page read and write
246C000
direct allocation
page read and write
2213000
direct allocation
page read and write
30A9000
heap
page read and write
3297000
direct allocation
page read and write
2FC1000
heap
page read and write
5D72000
heap
page read and write
7B3A000
heap
page read and write
5D99000
heap
page read and write
5D4D000
heap
page read and write
2120000
direct allocation
page read and write
36DA000
direct allocation
page read and write
5AD0000
heap
page read and write
3141000
heap
page read and write
3188000
heap
page read and write
5D96000
heap
page read and write
3164000
heap
page read and write
2385000
direct allocation
page read and write
5DA0000
heap
page read and write
7B70000
heap
page read and write
317E000
heap
page read and write
5F73000
trusted library allocation
page read and write
4418000
direct allocation
page read and write
2F2C000
direct allocation
page read and write
3189000
heap
page read and write
32A5000
direct allocation
page read and write
2FFB000
direct allocation
page read and write
36DE000
direct allocation
page read and write
5DDD000
heap
page read and write
AAE000
stack
page read and write
21F3000
direct allocation
page read and write
6CC90000
unkown
page read and write
5D94000
heap
page read and write
7B58000
heap
page read and write
5DB4000
heap
page read and write
3269000
heap
page read and write
6CCC7000
unkown
page read and write
DF6000
heap
page read and write
5DDB000
heap
page read and write
E0D000
heap
page read and write
D40000
heap
page read and write
6B40000
trusted library allocation
page read and write
6B771000
unkown
page execute read
6CC93000
unkown
page readonly
BD4000
heap
page read and write
5D45000
heap
page read and write
7B6C000
heap
page read and write
2F50000
direct allocation
page read and write
61E8A000
unkown
page read and write
23A2000
direct allocation
page read and write
61E01000
unkown
page execute read
E0D000
heap
page read and write
7B3B000
heap
page read and write
5D6E000
heap
page read and write
61E89000
unkown
page write copy
5D6E000
heap
page read and write
5DA1000
heap
page read and write
324D000
heap
page read and write
3176000
heap
page read and write
3168000
heap
page read and write
2E7A000
stack
page read and write
3178000
heap
page read and write
2350000
direct allocation
page read and write
19A000
stack
page read and write
DFF000
heap
page read and write
3189000
heap
page read and write
2E21000
heap
page read and write
2138000
direct allocation
page read and write
6E8000
heap
page read and write
2E21000
heap
page read and write
5D83000
heap
page read and write
5F50000
trusted library allocation
page read and write
446E000
direct allocation
page read and write
8C8000
unkown
page read and write
5D75000
heap
page read and write
6BB51000
unkown
page execute read
4514000
direct allocation
page read and write
21C2000
direct allocation
page read and write
E0D000
heap
page read and write
5D7E000
heap
page read and write
8C3000
unkown
page read and write
2E21000
heap
page read and write
4400000
direct allocation
page read and write
44C4000
direct allocation
page read and write
2E21000
heap
page read and write
4404000
direct allocation
page read and write
2481000
direct allocation
page read and write
5DD2000
heap
page read and write
5DD5000
heap
page read and write
5FD0000
trusted library allocation
page read and write
3141000
heap
page read and write
8FF000
stack
page read and write
44E0000
direct allocation
page read and write
3370000
heap
page read and write
5F8000
heap
page read and write
5D72000
heap
page read and write
7B5A000
heap
page read and write
5AD0000
heap
page read and write
3141000
heap
page read and write
2FC1000
heap
page read and write
5D98000
heap
page read and write
3337000
direct allocation
page read and write
63E0000
trusted library allocation
page read and write
5F50000
trusted library allocation
page read and write
2E21000
heap
page read and write
92A000
unkown
page read and write
7B40000
heap
page read and write
5DC2000
heap
page read and write
2345000
heap
page read and write
5DD5000
heap
page read and write
219E000
direct allocation
page read and write
63E0000
trusted library allocation
page read and write
7B28000
heap
page read and write
19C000
stack
page read and write
6FF000
heap
page read and write
7B49000
heap
page read and write
23B9000
direct allocation
page read and write
5DAE000
heap
page read and write
BA0000
trusted library allocation
page read and write
E0D000
heap
page read and write
3089000
heap
page read and write
2E21000
heap
page read and write
5D75000
heap
page read and write
7BC000
heap
page read and write
608000
heap
page read and write
7B3D000
heap
page read and write
55E000
unkown
page readonly
3176000
heap
page read and write
317B000
heap
page read and write
3141000
heap
page read and write
5F50000
trusted library allocation
page read and write
E2E000
heap
page read and write
5DDB000
heap
page read and write
23F4000
direct allocation
page read and write
E0D000
heap
page read and write
54D000
unkown
page read and write
36F6000
direct allocation
page read and write
551000
unkown
page read and write
5D4B000
heap
page read and write
3168000
heap
page read and write
25D3000
heap
page read and write
3140000
heap
page read and write
67E000
stack
page read and write
6C462000
unkown
page readonly
5DCA000
heap
page read and write
3FFE000
stack
page read and write
5D7A000
heap
page read and write
5DA9000
heap
page read and write
36FE000
direct allocation
page read and write
380E000
stack
page read and write
215C000
direct allocation
page read and write
315A000
heap
page read and write
5DAD000
heap
page read and write
DF6000
heap
page read and write
6010000
trusted library allocation
page read and write
5D7F000
heap
page read and write
102C000
stack
page read and write
5D4B000
heap
page read and write
2163000
direct allocation
page read and write
318D000
heap
page read and write
30C9000
heap
page read and write
5D45000
heap
page read and write
7B38000
heap
page read and write
7B56000
heap
page read and write
3183000
heap
page read and write
5DBD000
heap
page read and write
6CC80000
unkown
page readonly
5DAD000
heap
page read and write
937000
unkown
page read and write
36EB000
direct allocation
page read and write
2FC1000
heap
page read and write
2415000
direct allocation
page read and write
36F2000
direct allocation
page read and write
5D31000
heap
page read and write
5F50000
trusted library allocation
page read and write
6BC45000
unkown
page execute read
7FE000
stack
page read and write
5F50000
trusted library allocation
page read and write
5DAE000
heap
page read and write
8E2000
unkown
page read and write
7B71000
heap
page read and write
70E000
heap
page read and write
6C1D7000
unkown
page read and write
6B63000
trusted library allocation
page read and write
3696000
direct allocation
page read and write
440C000
direct allocation
page read and write
36EE000
stack
page read and write
8EF000
stack
page read and write
5DAD000
heap
page read and write
6C4C3000
unkown
page read and write
6BBE0000
unkown
page readonly
3141000
heap
page read and write
2E10000
direct allocation
page read and write
7B80000
heap
page read and write
43FE000
stack
page read and write
49E0000
trusted library allocation
page read and write
D7E000
heap
page read and write
6E00000
trusted library allocation
page read and write
5D64000
heap
page read and write
60CD000
stack
page read and write
5DD4000
heap
page read and write
3176000
heap
page read and write
5D72000
heap
page read and write
23DB000
direct allocation
page read and write
E1B000
heap
page read and write
5DD1000
heap
page read and write
5D5D000
heap
page read and write
6C18E000
unkown
page readonly
390F000
stack
page read and write
5D6E000
heap
page read and write
5DB6000
heap
page read and write
72B000
heap
page read and write
5A1000
unkown
page readonly
3196000
heap
page read and write
6020000
trusted library allocation
page read and write
3689000
direct allocation
page read and write
5DAF000
heap
page read and write
3792000
direct allocation
page read and write
7B49000
heap
page read and write
5D96000
heap
page read and write
317E000
heap
page read and write
3271000
heap
page read and write
5D4D000
heap
page read and write
44E2000
direct allocation
page read and write
5DAD000
heap
page read and write
21EC000
direct allocation
page read and write
5D7A000
heap
page read and write
5DBE000
heap
page read and write
3151000
heap
page read and write
77D000
heap
page read and write
8D0000
unkown
page read and write
22D0000
direct allocation
page read and write
28E0000
heap
page read and write
5F50000
trusted library allocation
page read and write
7001000
unkown
page execute and read and write
2230000
heap
page read and write
E28000
heap
page read and write
3198000
heap
page read and write
5CE8000
heap
page read and write
2FC1000
heap
page read and write
21A8000
direct allocation
page read and write
2171000
direct allocation
page read and write
5D92000
heap
page read and write
3252000
heap
page read and write
3188000
heap
page read and write
5CF4000
heap
page read and write
5AB000
unkown
page readonly
5D9A000
heap
page read and write
5D6B000
heap
page read and write
2167000
direct allocation
page read and write
3700000
direct allocation
page read and write
6BE37000
unkown
page read and write
2221000
direct allocation
page read and write
5D31000
heap
page read and write
315B000
heap
page read and write
5F0000
heap
page read and write
241C000
direct allocation
page read and write
6430000
remote allocation
page read and write
DFC000
heap
page read and write
5D89000
heap
page read and write
19A000
stack
page read and write
6B63000
trusted library allocation
page read and write
3183000
heap
page read and write
5F50000
trusted library allocation
page read and write
5D6E000
heap
page read and write
5D4D000
heap
page read and write
5D9E000
heap
page read and write
2FC1000
heap
page read and write
63DD000
stack
page read and write
6BBFE000
unkown
page execute read
2352000
direct allocation
page read and write
3198000
heap
page read and write
5F50000
trusted library allocation
page read and write
5D88000
heap
page read and write
63E0000
trusted library allocation
page read and write
7B28000
heap
page read and write
3178000
heap
page read and write
48A4000
direct allocation
page read and write
5DC5000
heap
page read and write
341E000
stack
page read and write
37B9000
direct allocation
page read and write
5D5D000
heap
page read and write
6C4C7000
unkown
page readonly
36E6000
direct allocation
page read and write
3141000
heap
page read and write
3168000
heap
page read and write
5DC1000
heap
page read and write
214D000
direct allocation
page read and write
DC7000
heap
page read and write
5DAD000
heap
page read and write
8BB000
unkown
page read and write
5F72000
trusted library allocation
page read and write
3694000
direct allocation
page read and write
E03000
heap
page read and write
5D68000
heap
page read and write
2456000
direct allocation
page read and write
3189000
heap
page read and write
5DB9000
heap
page read and write
711000
heap
page read and write
7B2F000
heap
page read and write
5D6E000
heap
page read and write
23D5000
direct allocation
page read and write
5CE9000
heap
page read and write
36EA000
direct allocation
page read and write
6BC2F000
unkown
page execute read
23CC000
direct allocation
page read and write
5F50000
trusted library allocation
page read and write
237E000
direct allocation
page read and write
5DA5000
heap
page read and write
790000
heap
page read and write
3702000
direct allocation
page read and write
2D0E000
stack
page read and write
5ACF000
heap
page read and write
3389000
direct allocation
page read and write
DFE000
heap
page read and write
218E000
direct allocation
page read and write
3234000
direct allocation
page read and write
36A0000
direct allocation
page read and write
8D3000
unkown
page read and write
2E21000
heap
page read and write
6CC0000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
7002000
unkown
page execute and read and write
3164000
heap
page read and write
5DBE000
heap
page read and write
48AA000
direct allocation
page read and write
3164000
heap
page read and write
8E2000
unkown
page read and write
7B64000
heap
page read and write
5DBF000
heap
page read and write
2FEE000
stack
page read and write
5DA9000
heap
page read and write
6923000
trusted library allocation
page read and write
7B78000
heap
page read and write
242A000
direct allocation
page read and write
21E4000
direct allocation
page read and write
315B000
heap
page read and write
E24000
heap
page read and write
3728000
direct allocation
page read and write
5DB1000
heap
page read and write
3721000
direct allocation
page read and write
3290000
direct allocation
page read and write
5DAE000
heap
page read and write
7B84000
heap
page read and write
5DDC000
heap
page read and write
2228000
direct allocation
page read and write
36E4000
direct allocation
page read and write
5D98000
heap
page read and write
63E0000
trusted library allocation
page read and write
3168000
heap
page read and write
2310000
direct allocation
page read and write
5D9F000
heap
page read and write
21EF000
direct allocation
page read and write
44CA000
direct allocation
page read and write
377C000
direct allocation
page read and write
3195000
heap
page read and write
2E21000
heap
page read and write
3164000
heap
page read and write
2423000
direct allocation
page read and write
E03000
heap
page read and write
318C000
heap
page read and write
5DAD000
heap
page read and write
3194000
heap
page read and write
6C1DE000
unkown
page read and write
8E2000
unkown
page read and write
3249000
direct allocation
page read and write
6CF16000
unkown
page read and write
365F000
stack
page read and write
63E0000
trusted library allocation
page read and write
2F41000
direct allocation
page read and write
2E21000
heap
page read and write
2439000
direct allocation
page read and write
6B63000
trusted library allocation
page read and write
5F50000
trusted library allocation
page read and write
5DBC000
heap
page read and write
318C000
heap
page read and write
7BA0000
heap
page read and write
3168000
heap
page read and write
620E000
stack
page read and write
5DB9000
heap
page read and write
7B86000
heap
page read and write
6F80000
trusted library allocation
page read and write
7B4A000
heap
page read and write
5CF8000
heap
page read and write
33D0000
heap
page read and write
2393000
direct allocation
page read and write
6BDF2000
unkown
page readonly
3048000
direct allocation
page read and write
5D9E000
heap
page read and write
BC5000
heap
page read and write
5D83000
heap
page read and write
5DC1000
heap
page read and write
5DDC000
heap
page read and write
DC8000
heap
page read and write
5D87000
heap
page read and write
6A00000
trusted library allocation
page read and write
315B000
heap
page read and write
5DDA000
heap
page read and write
29A5000
heap
page read and write
5D69000
heap
page read and write
5D52000
heap
page read and write
5AD0000
heap
page read and write
315B000
heap
page read and write
713000
heap
page read and write
3150000
heap
page read and write
3183000
heap
page read and write
317E000
heap
page read and write
5F50000
trusted library allocation
page read and write
5F72000
trusted library allocation
page read and write
36B6000
direct allocation
page read and write
7B2C000
heap
page read and write
5DC8000
heap
page read and write
4436000
direct allocation
page read and write
36E8000
direct allocation
page read and write
23FB000
direct allocation
page read and write
302E000
stack
page read and write
3141000
heap
page read and write
3196000
heap
page read and write
7FE00000
direct allocation
page read and write
630F000
stack
page read and write
5F73000
trusted library allocation
page read and write
3374000
direct allocation
page read and write
6C0000
heap
page read and write
54D000
unkown
page read and write
2100000
direct allocation
page read and write
77D000
heap
page read and write
3176000
heap
page read and write
2FC1000
heap
page read and write
550000
heap
page read and write
5D9F000
heap
page read and write
464C000
stack
page read and write
6B40000
trusted library allocation
page read and write
5DC4000
heap
page read and write
3194000
heap
page read and write
6900000
trusted library allocation
page read and write
5D6E000
heap
page read and write
6BB50000
unkown
page readonly
5DCB000
heap
page read and write
36A2000
direct allocation
page read and write
2FC2000
heap
page read and write
3678000
direct allocation
page read and write
5D34000
heap
page read and write
3A6D000
stack
page read and write
923000
unkown
page read and write
5DDB000
heap
page read and write
5D8D000
heap
page read and write
6430000
remote allocation
page read and write
3365000
direct allocation
page read and write
900000
heap
page read and write
5D0A000
heap
page read and write
3191000
heap
page read and write
23B0000
direct allocation
page read and write
3669000
direct allocation
page read and write
7B21000
heap
page read and write
103F000
stack
page read and write
3168000
heap
page read and write
5D87000
heap
page read and write
322C000
direct allocation
page read and write
316E000
heap
page read and write
470000
heap
page read and write
5F90000
trusted library allocation
page read and write
5D7B000
heap
page read and write
2F08000
direct allocation
page read and write
551000
unkown
page read and write
5DBD000
heap
page read and write
33AA000
direct allocation
page read and write
E19000
heap
page read and write
36AC000
direct allocation
page read and write
44D6000
direct allocation
page read and write
5F50000
trusted library allocation
page read and write
DFC000
heap
page read and write
5AD0000
heap
page read and write
5DCA000
heap
page read and write
36D0000
direct allocation
page read and write
5F64000
trusted library allocation
page read and write
5D96000
heap
page read and write
2431000
direct allocation
page read and write
5DAE000
heap
page read and write
3198000
heap
page read and write
6B7F4000
unkown
page readonly
5DB6000
heap
page read and write
2905000
heap
page read and write
29A0000
heap
page read and write
30C9000
heap
page read and write
22F0000
heap
page read and write
3180000
heap
page read and write
6BBCC000
unkown
page readonly
2E20000
trusted library allocation
page read and write
738000
heap
page read and write
339A000
direct allocation
page read and write
6BDA7000
unkown
page readonly
440A000
direct allocation
page read and write
B8B000
unkown
page readonly
3164000
heap
page read and write
5DBD000
heap
page read and write
27D0000
heap
page read and write
371D000
direct allocation
page read and write
3164000
heap
page read and write
72F000
heap
page read and write
5D72000
heap
page read and write
2335000
direct allocation
page read and write
3164000
heap
page read and write
371B000
direct allocation
page read and write
347E000
stack
page read and write
3141000
heap
page read and write
401000
unkown
page execute read
7B6A000
heap
page read and write
2361000
direct allocation
page read and write
5DDD000
heap
page read and write
5DBE000
heap
page read and write
21F6000
direct allocation
page read and write
34E0000
heap
page read and write
6DE1000
trusted library allocation
page read and write
317E000
heap
page read and write
2135000
direct allocation
page read and write
5F50000
trusted library allocation
page read and write
6C2B7000
unkown
page execute read
3141000
heap
page read and write
3168000
heap
page read and write
445E000
direct allocation
page read and write
6DC0000
trusted library allocation
page read and write
2553000
direct allocation
page read and write
4408000
direct allocation
page read and write
5D8A000
heap
page read and write
245D000
direct allocation
page read and write
6F40000
trusted library allocation
page read and write
3002000
direct allocation
page read and write
3018000
direct allocation
page read and write
6050000
trusted library allocation
page read and write
8C8000
unkown
page read and write
36E2000
direct allocation
page read and write
5D5D000
heap
page read and write
5F73000
trusted library allocation
page read and write
9B000
stack
page read and write
3089000
heap
page read and write
244F000
direct allocation
page read and write
212D000
direct allocation
page read and write
3343000
direct allocation
page read and write
6B770000
unkown
page readonly
5D7A000
heap
page read and write
317E000
heap
page read and write
7B40000
heap
page read and write
7B60000
heap
page read and write
44D4000
direct allocation
page read and write
2E21000
heap
page read and write
3183000
heap
page read and write
3783000
direct allocation
page read and write
315B000
heap
page read and write
5D72000
heap
page read and write
220C000
direct allocation
page read and write
5D6E000
heap
page read and write
5F6F000
trusted library allocation
page read and write
3164000
heap
page read and write
32A9000
direct allocation
page read and write
2E21000
heap
page read and write
44CC000
direct allocation
page read and write
5D6E000
heap
page read and write
23D4000
direct allocation
page read and write
5CF6000
heap
page read and write
5DC5000
heap
page read and write
5DC9000
heap
page read and write
3009000
direct allocation
page read and write
3189000
heap
page read and write
D48000
heap
page read and write
5DB5000
heap
page read and write
6C1F0000
unkown
page readonly
3209000
direct allocation
page read and write
5DCC000
heap
page read and write
7B5C000
heap
page read and write
DF6000
heap
page read and write
5D98000
heap
page read and write
5DD1000
heap
page read and write
5DBD000
heap
page read and write
DF3000
heap
page read and write
3056000
direct allocation
page read and write
304F000
direct allocation
page read and write
465000
unkown
page readonly
5ACD000
heap
page read and write
E21000
heap
page read and write
5D4B000
heap
page read and write
3141000
heap
page read and write
32AB000
direct allocation
page read and write
5D5E000
heap
page read and write
3164000
heap
page read and write
44C6000
direct allocation
page read and write
6DDB000
trusted library allocation
page read and write
E2E000
heap
page read and write
4416000
direct allocation
page read and write
5D67000
heap
page read and write
5DB4000
heap
page read and write
2E21000
heap
page read and write
5DDC000
heap
page read and write
5DBD000
heap
page read and write
3719000
direct allocation
page read and write
3704000
direct allocation
page read and write
5D70000
heap
page read and write
2151000
direct allocation
page read and write
36FA000
direct allocation
page read and write
2110000
direct allocation
page read and write
7B41000
heap
page read and write
5CE4000
heap
page read and write
926000
unkown
page read and write
36C6000
direct allocation
page read and write
5D6C000
heap
page read and write
5DA7000
heap
page read and write
3141000
heap
page read and write
5DB9000
heap
page read and write
6CCC9000
unkown
page readonly
BD4000
heap
page read and write
30C9000
heap
page read and write
3040000
direct allocation
page read and write
5D6B000
heap
page read and write
421000
unkown
page readonly
2E21000
heap
page read and write
3168000
heap
page read and write
2349000
heap
page read and write
302B000
direct allocation
page read and write
23FF000
direct allocation
page read and write
2146000
direct allocation
page read and write
5F50000
trusted library allocation
page read and write
36A4000
direct allocation
page read and write
2900000
heap
page read and write
DFC000
heap
page read and write
21C0000
direct allocation
page read and write
3141000
heap
page read and write
5F50000
trusted library allocation
page read and write
5DA5000
heap
page read and write
3225000
direct allocation
page read and write
30C9000
heap
page read and write
63E0000
trusted library allocation
page read and write
23B0000
direct allocation
page read and write
30A0000
heap
page read and write
474F000
stack
page read and write
63E0000
trusted library allocation
page read and write
451B000
direct allocation
page read and write
247A000
direct allocation
page read and write
374B000
direct allocation
page read and write
5D90000
heap
page read and write
5D6E000
heap
page read and write
99000
stack
page read and write
401000
unkown
page execute read
5D6E000
heap
page read and write
2FC1000
heap
page read and write
DF2000
heap
page read and write
32CC000
direct allocation
page read and write
318C000
heap
page read and write
7B58000
heap
page read and write
18D000
stack
page read and write
7B70000
heap
page read and write
6F00000
trusted library allocation
page read and write
3C30000
trusted library allocation
page read and write
5D6E000
heap
page read and write
5D7A000
heap
page read and write
218C000
direct allocation
page read and write
44F6000
direct allocation
page read and write
3183000
heap
page read and write
2159000
direct allocation
page read and write
729000
heap
page read and write
7B78000
heap
page read and write
21A5000
direct allocation
page read and write
5DDD000
heap
page read and write
6C041000
unkown
page execute read
37A8000
direct allocation
page read and write
5DA5000
heap
page read and write
5DCF000
heap
page read and write
4B40000
heap
page read and write
3347000
direct allocation
page read and write
30C9000
heap
page read and write
239C000
direct allocation
page read and write
8BB000
unkown
page read and write
6CC81000
unkown
page execute read
3010000
direct allocation
page read and write
36B4000
direct allocation
page read and write
5DB0000
heap
page read and write
5D72000
heap
page read and write
2EEB000
direct allocation
page read and write
5D9E000
heap
page read and write
217E000
direct allocation
page read and write
5D83000
heap
page read and write
5D62000
heap
page read and write
6DC0000
trusted library allocation
page read and write
E25000
heap
page read and write
5DC3000
heap
page read and write
3141000
heap
page read and write
5D76000
heap
page read and write
5F50000
trusted library allocation
page read and write
30A7000
heap
page read and write
5D60000
heap
page read and write
325D000
heap
page read and write
7B24000
heap
page read and write
5DA3000
heap
page read and write
2FC1000
heap
page read and write
3194000
heap
page read and write
3272000
heap
page read and write
5DD3000
heap
page read and write
5D77000
heap
page read and write
5D4C000
heap
page read and write
701000
heap
page read and write
23EC000
direct allocation
page read and write
3183000
heap
page read and write
42FC000
stack
page read and write
304A000
direct allocation
page read and write
2180000
direct allocation
page read and write
5DC5000
heap
page read and write
5DA1000
heap
page read and write
3698000
direct allocation
page read and write
3141000
heap
page read and write
3141000
heap
page read and write
6BBED000
unkown
page execute read
942000
unkown
page readonly
2E21000
heap
page read and write
7B70000
heap
page read and write
44C2000
direct allocation
page read and write
301C000
direct allocation
page read and write
3175000
heap
page read and write
BD0000
heap
page read and write
44DE000
direct allocation
page read and write
6A00000
trusted library allocation
page read and write
36C0000
direct allocation
page read and write
C40000
heap
page read and write
7B5F000
heap
page read and write
3198000
heap
page read and write
36FC000
direct allocation
page read and write
5DCF000
heap
page read and write
5D6B000
heap
page read and write
5DD3000
heap
page read and write
5F71000
trusted library allocation
page read and write
2E21000
heap
page read and write
336C000
direct allocation
page read and write
36CC000
direct allocation
page read and write
6010000
trusted library allocation
page read and write
DC0000
heap
page read and write
2F0F000
direct allocation
page read and write
404E000
stack
page read and write
3189000
heap
page read and write
5F60000
trusted library allocation
page read and write
3141000
heap
page read and write
E2E000
heap
page read and write
5DBD000
heap
page read and write
6CEF3000
unkown
page readonly
3180000
heap
page read and write
46A000
unkown
page readonly
3775000
direct allocation
page read and write
5DBB000
heap
page read and write
2438000
direct allocation
page read and write
2A50000
trusted library allocation
page read and write
2E56000
heap
page read and write
FBE000
stack
page read and write
2FC1000
heap
page read and write
36B6000
direct allocation
page read and write
315B000
heap
page read and write
E19000
heap
page read and write
5DB2000
heap
page read and write
216E000
direct allocation
page read and write
2F1D000
direct allocation
page read and write
5DDB000
heap
page read and write
3D70000
trusted library allocation
page read and write
6C1E0000
unkown
page readonly
2E10000
direct allocation
page read and write
2EE3000
direct allocation
page read and write
3191000
heap
page read and write
2FC5000
direct allocation
page read and write
67F5000
stack
page read and write
3176000
heap
page read and write
240D000
direct allocation
page read and write
6BBC8000
unkown
page write copy
7B91000
heap
page read and write
2549000
direct allocation
page read and write
5D69000
heap
page read and write
2FC1000
heap
page read and write
5DC5000
heap
page read and write
44B9000
direct allocation
page read and write
3164000
heap
page read and write
7008000
unkown
page readonly
E19000
heap
page read and write
2406000
direct allocation
page read and write
3090000
trusted library allocation
page read and write
3168000
heap
page read and write
5D72000
heap
page read and write
7B54000
heap
page read and write
3183000
heap
page read and write
6BBE000
stack
page read and write
6FB000
heap
page read and write
5D7A000
heap
page read and write
5DD3000
heap
page read and write
5D61000
heap
page read and write
7FDDB000
direct allocation
page read and write
37EF000
stack
page read and write
33B9000
direct allocation
page read and write
3168000
heap
page read and write
5DBE000
heap
page read and write
2464000
direct allocation
page read and write
3185000
heap
page read and write
30B7000
heap
page read and write
44E4000
direct allocation
page read and write
E0A000
heap
page read and write
21CF000
direct allocation
page read and write
720000
heap
page read and write
2385000
direct allocation
page read and write
5D84000
heap
page read and write
2F20000
direct allocation
page read and write
3198000
heap
page read and write
6403000
trusted library allocation
page read and write
7B2F000
heap
page read and write
36C2000
direct allocation
page read and write
7000000
unkown
page readonly
394E000
stack
page read and write
315B000
heap
page read and write
36A6000
direct allocation
page read and write
3184000
heap
page read and write
7B5A000
heap
page read and write
32A2000
heap
page read and write
6B40000
trusted library allocation
page read and write
23C0000
direct allocation
page read and write
2E20000
heap
page read and write
3198000
heap
page read and write
3168000
heap
page read and write
442F000
direct allocation
page read and write
5D96000
heap
page read and write
5DAD000
heap
page read and write
E16000
heap
page read and write
5F72000
trusted library allocation
page read and write
6900000
trusted library allocation
page read and write
3168000
heap
page read and write
6CCA0000
unkown
page readonly
7BF000
stack
page read and write
21B4000
direct allocation
page read and write
5D64000
heap
page read and write
7B38000
heap
page read and write
5F50000
trusted library allocation
page read and write
5DD1000
heap
page read and write
318C000
heap
page read and write
3089000
heap
page read and write
6800000
heap
page read and write
7B35000
heap
page read and write
318C000
heap
page read and write
7FE35000
direct allocation
page read and write
3133000
heap
page read and write
5D0000
heap
page read and write
3662000
direct allocation
page read and write
5DC6000
heap
page read and write
64D000
heap
page read and write
2E21000
heap
page read and write
63E0000
trusted library allocation
page read and write
317E000
heap
page read and write
E0D000
heap
page read and write
7BB2000
heap
page read and write
7B74000
heap
page read and write
728000
heap
page read and write
E0D000
heap
page read and write
66A000
heap
page read and write
5DBF000
heap
page read and write
5D7B000
heap
page read and write
63E0000
trusted library allocation
page read and write
106D000
stack
page read and write
392F000
stack
page read and write
3219000
direct allocation
page read and write
6C4C1000
unkown
page write copy
3690000
direct allocation
page read and write
7B39000
heap
page read and write
5DC5000
heap
page read and write
3692000
direct allocation
page read and write
6980000
trusted library allocation
page read and write
364C000
direct allocation
page read and write
5D6E000
heap
page read and write
E28000
heap
page read and write
5D65000
heap
page read and write
5D96000
heap
page read and write
2300000
direct allocation
page read and write
3164000
heap
page read and write
31F7000
direct allocation
page read and write
5DA1000
heap
page read and write
5D73000
heap
page read and write
6C2CF000
unkown
page execute read
7C6000
heap
page read and write
36DE000
stack
page read and write
5DD2000
heap
page read and write
317E000
heap
page read and write
5D6E000
heap
page read and write
E09000
heap
page read and write
3768000
direct allocation
page read and write
5DD9000
heap
page read and write
7B4A000
heap
page read and write
5DD1000
heap
page read and write
5DC7000
heap
page read and write
6BBE1000
unkown
page execute read
3164000
heap
page read and write
440E000
direct allocation
page read and write
5D5E000
heap
page read and write
23C5000
direct allocation
page read and write
3032000
direct allocation
page read and write
3168000
heap
page read and write
3193000
heap
page read and write
8BB000
unkown
page write copy
2432000
direct allocation
page read and write
3A4D000
stack
page read and write
C2C000
stack
page read and write
F3F000
stack
page read and write
355E000
stack
page read and write
396C000
stack
page read and write
9C90000
heap
page read and write
33C9000
direct allocation
page read and write
3653000
direct allocation
page read and write
5DC3000
heap
page read and write
8CA000
unkown
page read and write
5D65000
heap
page read and write
2185000
direct allocation
page read and write
3070000
heap
page read and write
318C000
heap
page read and write
5F66000
trusted library allocation
page read and write
317B000
heap
page read and write
6C4C0000
unkown
page read and write
5DDC000
heap
page read and write
5D31000
heap
page read and write
315B000
heap
page read and write
54D000
unkown
page write copy
5D60000
heap
page read and write
2CB0000
heap
page read and write
36AE000
stack
page read and write
3708000
direct allocation
page read and write
77D000
heap
page read and write
318A000
heap
page read and write
9BC000
unkown
page readonly
35AE000
stack
page read and write
3089000
heap
page read and write
6B7F1000
unkown
page read and write
95000
stack
page read and write
21AF000
direct allocation
page read and write
2E21000
heap
page read and write
61E00000
unkown
page readonly
710A000
direct allocation
page read and write
7FE3F000
direct allocation
page read and write
5DBD000
heap
page read and write
369C000
direct allocation
page read and write
E03000
heap
page read and write
5DB2000
heap
page read and write
5DD6000
heap
page read and write
3183000
heap
page read and write
61EA0000
unkown
page write copy
7B38000
heap
page read and write
604C000
stack
page read and write
726000
heap
page read and write
36C6000
direct allocation
page read and write
DF2000
heap
page read and write
3273000
heap
page read and write
19C000
stack
page read and write
7B74000
heap
page read and write
33AA000
direct allocation
page read and write
235A000
direct allocation
page read and write
7007000
unkown
page write copy
5D8D000
heap
page read and write
5FB0000
trusted library allocation
page read and write
400000
unkown
page readonly
7B68000
heap
page read and write
5DBE000
heap
page read and write
5DCD000
heap
page read and write
7006000
unkown
page read and write
3194000
heap
page read and write
36F2000
direct allocation
page read and write
BE0000
heap
page read and write
219B000
direct allocation
page read and write
2FC1000
heap
page read and write
5DCA000
heap
page read and write
36D4000
direct allocation
page read and write
6BE10000
unkown
page readonly
36E3000
direct allocation
page read and write
7004000
unkown
page execute and write copy
3089000
heap
page read and write
93A000
unkown
page read and write
3729000
direct allocation
page read and write
5D18000
heap
page read and write
3089000
heap
page read and write
7BC000
heap
page read and write
3089000
heap
page read and write
5DA3000
heap
page read and write
70B000
heap
page read and write
2FC1000
heap
page read and write
5DC7000
heap
page read and write
6802000
heap
page read and write
2343000
direct allocation
page read and write
5D64000
heap
page read and write
59C0000
direct allocation
page read and write
3183000
heap
page read and write
6921000
trusted library allocation
page read and write
32D4000
direct allocation
page read and write
8BF000
unkown
page read and write
5D67000
heap
page read and write
2E21000
heap
page read and write
5DB0000
heap
page read and write
5DB3000
heap
page read and write
E1E000
heap
page read and write
555000
unkown
page read and write
6050000
trusted library allocation
page read and write
3164000
heap
page read and write
48A2000
direct allocation
page read and write
5D87000
heap
page read and write
6B40000
trusted library allocation
page read and write
DF6000
heap
page read and write
5A90000
heap
page read and write
41E000
unkown
page write copy
32DB000
direct allocation
page read and write
214A000
direct allocation
page read and write
71E000
heap
page read and write
3185000
heap
page read and write
5DD0000
heap
page read and write
7B41000
heap
page read and write
318C000
heap
page read and write
3349000
direct allocation
page read and write
5DBD000
heap
page read and write
7BA0000
heap
page read and write
B30000
unkown
page readonly
23DB000
direct allocation
page read and write
3023000
direct allocation
page read and write
3060000
heap
page read and write
69FD000
stack
page read and write
3250000
direct allocation
page read and write
5D90000
heap
page read and write
5D68000
heap
page read and write
6900000
trusted library allocation
page read and write
E19000
heap
page read and write
7B50000
heap
page read and write
5CE1000
heap
page read and write
7B21000
heap
page read and write
2F50000
direct allocation
page execute and read and write
3141000
heap
page read and write
3168000
heap
page read and write
5DAC000
heap
page read and write
2A60000
trusted library allocation
page read and write
3198000
heap
page read and write
3026000
direct allocation
page read and write
939000
unkown
page write copy
3636000
direct allocation
page read and write
5F90000
trusted library allocation
page read and write
7B3D000
heap
page read and write
8BB000
unkown
page read and write
BC3000
trusted library allocation
page read and write
61E8A000
unkown
page read and write
8D7000
unkown
page read and write
3186000
heap
page read and write
23B1000
direct allocation
page read and write
5D9D000
heap
page read and write
7B43000
heap
page read and write
5D34000
heap
page read and write
EAD000
stack
page read and write
44BB000
direct allocation
page read and write
2187000
direct allocation
page read and write
5DAD000
heap
page read and write
2179000
direct allocation
page read and write
2FF5000
direct allocation
page read and write
736000
heap
page read and write
8DE000
unkown
page read and write
5F50000
trusted library allocation
page read and write
371F000
direct allocation
page read and write
8DE000
unkown
page read and write
3141000
heap
page read and write
7B2B000
heap
page read and write
5D9A000
heap
page read and write
3194000
heap
page read and write
5D67000
heap
page read and write
3185000
heap
page read and write
2E21000
heap
page read and write
61E8A000
unkown
page read and write
357C000
stack
page read and write
5D94000
heap
page read and write
5DCA000
heap
page read and write
5A91000
heap
page read and write
315B000
heap
page read and write
318C000
heap
page read and write
2EF2000
direct allocation
page read and write
5DA5000
heap
page read and write
5D7A000
heap
page read and write
221A000
direct allocation
page read and write
5DC7000
heap
page read and write
3090000
direct allocation
page execute and read and write
241C000
direct allocation
page read and write
236F000
direct allocation
page read and write
5DAE000
heap
page read and write
2BD0000
heap
page read and write
6914000
trusted library allocation
page read and write
3070000
direct allocation
page execute and read and write
3183000
heap
page read and write
5D7F000
heap
page read and write
6BBB1000
unkown
page readonly
21CF000
direct allocation
page read and write
5DD0000
heap
page read and write
3141000
heap
page read and write
23BD000
direct allocation
page read and write
2155000
direct allocation
page read and write
6CC91000
unkown
page readonly
7C60000
trusted library allocation
page read and write
37DF000
stack
page read and write
E2E000
heap
page read and write
6B40000
trusted library allocation
page read and write
4516000
direct allocation
page read and write
5D63000
heap
page read and write
93A000
unkown
page read and write
2340000
heap
page read and write
7FD90000
direct allocation
page read and write
5DCC000
heap
page read and write
3185000
heap
page read and write
3164000
heap
page read and write
34BE000
stack
page read and write
2FB0000
heap
page read and write
637000
heap
page read and write
452D000
direct allocation
page read and write
315B000
heap
page read and write
923000
unkown
page read and write
6DD2000
trusted library allocation
page read and write
77D000
heap
page read and write
5DAE000
heap
page read and write
5D95000
heap
page read and write
7B42000
heap
page read and write
C11000
trusted library allocation
page read and write
717000
heap
page read and write
6EBF000
stack
page read and write
B90000
heap
page read and write
21FD000
direct allocation
page read and write
3141000
heap
page read and write
E26000
heap
page read and write
5D96000
heap
page read and write
3141000
heap
page read and write
23C7000
direct allocation
page read and write
2FC1000
heap
page read and write
3196000
heap
page read and write
305D000
direct allocation
page read and write
3701000
direct allocation
page read and write
96F000
stack
page read and write
3189000
heap
page read and write
3719000
direct allocation
page read and write
2F3A000
direct allocation
page read and write
714000
heap
page read and write
3151000
heap
page read and write
2118000
direct allocation
page read and write
E03000
heap
page read and write
36C8000
direct allocation
page read and write
234A000
direct allocation
page read and write
382E000
stack
page read and write
5C0000
heap
page read and write
6CF12000
unkown
page read and write
5BE000
stack
page read and write
5DDC000
heap
page read and write
3389000
direct allocation
page read and write
5CEC000
heap
page read and write
2543000
heap
page read and write
3194000
heap
page read and write
67FF000
stack
page read and write
5DBD000
heap
page read and write
254F000
direct allocation
page read and write
5DC5000
heap
page read and write
E28000
heap
page read and write
6030000
trusted library allocation
page read and write
2DF0000
heap
page read and write
22C0000
heap
page read and write
2F4F000
stack
page read and write
E28000
heap
page read and write
61CD000
stack
page read and write
6A00000
trusted library allocation
page read and write
5DAD000
heap
page read and write
2FC1000
heap
page read and write
63E0000
trusted library allocation
page read and write
E1E000
heap
page read and write
5DD4000
heap
page read and write
7B60000
heap
page read and write
44D8000
direct allocation
page read and write
30AD000
heap
page read and write
5DAE000
heap
page read and write
3141000
heap
page read and write
3698000
direct allocation
page read and write
23E9000
direct allocation
page read and write
3194000
heap
page read and write
307B000
heap
page read and write
2E21000
heap
page read and write
2FC1000
heap
page read and write
3191000
heap
page read and write
5D7F000
heap
page read and write
641F000
stack
page read and write
372D000
direct allocation
page read and write
5D96000
heap
page read and write
DF7000
heap
page read and write
D00000
heap
page read and write
6BC7E000
unkown
page execute read
36F4000
direct allocation
page read and write
5F66000
trusted library allocation
page read and write
2E30000
heap
page read and write
3168000
heap
page read and write
3183000
heap
page read and write
5DD1000
heap
page read and write
5D72000
heap
page read and write
5B90000
heap
page read and write
2540000
heap
page read and write
3159000
heap
page read and write
2326000
direct allocation
page read and write
71B000
heap
page read and write
3141000
heap
page read and write
21D6000
direct allocation
page read and write
63E0000
trusted library allocation
page read and write
22F5000
heap
page read and write
7B28000
heap
page read and write
3142000
heap
page read and write
5D65000
heap
page read and write
3141000
heap
page read and write
5DDC000
heap
page read and write
6BC40000
unkown
page execute read
3242000
direct allocation
page read and write
36EC000
direct allocation
page read and write
5F73000
trusted library allocation
page read and write
5F50000
trusted library allocation
page read and write
5F50000
trusted library allocation
page read and write
6CE90000
unkown
page readonly
3176000
heap
page read and write
3183000
heap
page read and write
2FC1000
heap
page read and write
5D88000
heap
page read and write
608D000
stack
page read and write
5DA7000
heap
page read and write
4505000
direct allocation
page read and write
32C1000
heap
page read and write
3194000
heap
page read and write
5DD3000
heap
page read and write
2360000
direct allocation
page read and write
5DC5000
heap
page read and write
3168000
heap
page read and write
736000
heap
page read and write
3242000
heap
page read and write
6F40000
trusted library allocation
page read and write
3EFD000
stack
page read and write
378B000
direct allocation
page read and write
2E22000
heap
page read and write
6E0000
heap
page read and write
6401000
trusted library allocation
page read and write
3164000
heap
page read and write
7B2A000
heap
page read and write
6CBF000
stack
page read and write
372F000
direct allocation
page read and write
731000
heap
page read and write
7B49000
heap
page read and write
There are 1888 hidden memdumps, click here to show them.