IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\1000015002\b74664dd7e.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\acentric[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\crypted[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\gold[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\newbundle2[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\2[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\Blenar[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\random[2].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\stealc_default2[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\2[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\66ed86be077bb_12[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\needmoney[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\LummaC222222[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\penis[1].exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\splwow64[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000002001\3ec4738210.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000002001\gold.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000019101\6dbb7bdf47.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000020001\610cd559ac.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000066001\stealc_default2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000284001\acentric.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000285001\2.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000287001\splwow64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000290001\crypted.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000308001\4d72d15151.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000314001\LummaC222222.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000318001\66ed86be077bb_12.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000321001\2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000322001\newbundle2.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000340001\Blenar.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_b74664dd7e.exe_cf7a3cd6c9b1a122416f4df9f48741532183e75_30c7fb27_dd540fbb-80bb-426d-bdec-35c8bb8a7d98\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_3ec4738210.exe_dba66ca2d98846d9bd340a97d0db27b1eea2da_0679789e_d94d0ac4-b190-456c-bcd1-a2bb75eab446\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_3ec4738210.exe_dba66ca2d98846d9bd340a97d0db27b1eea2da_0679789e_ebebe12a-f956-424e-ae8e-9651352ccfe5\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4E9C.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Sep 24 15:34:15 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4FA6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4FD6.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAF3F.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Sep 24 15:33:35 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB0C7.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB0F6.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD1C6.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Sep 24 15:34:49 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD2C1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD2F1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Thu Oct 5 06:54:40 2023, atime=Wed Sep 27 08:36:54 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\gold.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\Tmp1F00.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp1F11.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
C:\Windows\Tasks\axplong.job
data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 48 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user~1\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user~1\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1000002001\3ec4738210.exe
"C:\Users\user~1\AppData\Local\Temp\1000002001\3ec4738210.exe"
malicious
C:\Users\user\1000015002\b74664dd7e.exe
"C:\Users\user\1000015002\b74664dd7e.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000002001\3ec4738210.exe
"C:\Users\user~1\AppData\Local\Temp\1000002001\3ec4738210.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000019101\6dbb7bdf47.exe
"C:\Users\user~1\AppData\Local\Temp\1000019101\6dbb7bdf47.exe"
malicious
C:\Users\user\1000015002\b74664dd7e.exe
"C:\Users\user\1000015002\b74664dd7e.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000020001\610cd559ac.exe
"C:\Users\user~1\AppData\Local\Temp\1000020001\610cd559ac.exe"
malicious
C:\Users\user\AppData\Local\Temp\1000002001\3ec4738210.exe
"C:\Users\user~1\AppData\Local\Temp\1000002001\3ec4738210.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user~1\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user~1\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\1000015002\b74664dd7e.exe
"C:\Users\user\1000015002\b74664dd7e.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user~1\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\1000002001\gold.exe
"C:\Users\user~1\AppData\Local\Temp\1000002001\gold.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user~1\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7672 -s 1512
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 1500
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7812 -s 1512
There are 11 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://147.45.44.104/malesa/66ed86be077bb_12.exe01
unknown
malicious
http://185.215.113.37/X
unknown
malicious
http://185.215.113.37/O
unknown
malicious
http://185.215.113.37/
185.215.113.37
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://185.215.113.117/inc/needmoney.exeYk
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://185.215.113.37/H
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
https://www.leopardi.nl/frm/_vti_cnf/Blenar.exey
unknown
http://185.215.113.37/e2b1563c6670f193.phpk
unknown
http://103.130.147.211/Files/2.exe
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://185.215.113.117/inc/gold.exe
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://185.215.113.37/ata
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
https://www.leopardi.nl/frm/_vti_cnf/Blenar.exe
46.19.218.204
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://185.215.113.100/steam/random.exe
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://185.215.113.43/Zu7JuNko/index.php020001
unknown
http://tempuri.org/Entity/Id24Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://185.215.113.16/dobre/splwow64.exe
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
https://www.leopardi.nl/frm/_vti_cnf/Blenar.exeC
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://194.116.215.195/12dsvc.exe
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://185.215.113.16/inc/2.exe
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://185.215.113.43/15.113.43/fae1daa8e9eb4e4f9b5846d934f48b15eaa495c49##R
unknown
http://ocsp.sectigo.com0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://185.215.113.43/Zu7JuNko/index.phpR
unknown
http://185.215.113.43/Zu7JuNko/index.phpO
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://tempuri.org/D
unknown
http://185.215.113.26/Nework.exe
unknown
http://schemas.xmlsoap.org/ws/2004/06/addressingex
unknown
http://185.215.113.37I
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
unknown
http://185.215.113.16/Jo89Ku7d/index.php1K
unknown
http://185.215.113.37/tSwf
unknown
http://103.130.147.211/Files/2.exeR
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
unknown
http://185.215.113.37/e2b1563c6670f193.phpWindows
unknown
http://tempuri.org/Entity/Id13Response
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
unknown
http://tempuri.org/Entity/Id12ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
unknown
http://185.215.113.37m
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
unknown
http://185.215.113.16/inc/penis.exe
unknown
http://tempuri.org/Entity/Id7ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
unknown
http://185.215.113.43/Zu7JuNko/index.phpoft
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.leopardi.nl
46.19.218.204

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
185.215.113.37
unknown
Portugal
malicious
103.130.147.211
unknown
Turkey
malicious
185.215.113.16
unknown
Portugal
malicious
95.179.250.45
unknown
Netherlands
malicious
194.116.215.195
unknown
unknown
185.215.113.100
unknown
Portugal
185.215.113.26
unknown
Portugal
46.19.218.204
www.leopardi.nl
Netherlands
147.45.44.104
unknown
Russian Federation
185.215.113.117
unknown
Portugal
185.215.113.103
unknown
Portugal
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
3ec4738210.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
b74664dd7e.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
splwow64.exe
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
4d72d15151.exe
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
ProgramId
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
FileId
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
LowerCaseLongPath
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
LongPathHash
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
Name
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
OriginalFileName
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
Publisher
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
Version
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
BinFileVersion
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
BinaryType
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
ProductName
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
ProductVersion
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
LinkDate
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
BinProductVersion
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
AppxPackageFullName
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
AppxPackageRelativeId
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
Size
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
Language
\REGISTRY\A\{62a12ec3-79f0-dc48-f606-ba3f0c7764db}\Root\InventoryApplicationFile\3ec4738210.exe|361e54df40ff07db
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
ProgramId
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
FileId
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
LowerCaseLongPath
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
LongPathHash
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
Name
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
OriginalFileName
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
Publisher
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
Version
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
BinFileVersion
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
BinaryType
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
ProductName
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
ProductVersion
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
LinkDate
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
BinProductVersion
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
AppxPackageFullName
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
AppxPackageRelativeId
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
Size
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
Language
\REGISTRY\A\{627e2a56-603b-37b6-a42f-70ac307d3d3f}\Root\InventoryApplicationFile\b74664dd7e.exe|1febe33e7b82f67c
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00E70D16E40
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 43 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
DA1000
unkown
page execute and read and write
malicious
DB1000
unkown
page execute and read and write
malicious
4950000
direct allocation
page read and write
malicious
4EE0000
direct allocation
page read and write
malicious
4AB0000
direct allocation
page read and write
malicious
5DA000
unkown
page execute and read and write
malicious
541000
unkown
page execute and read and write
malicious
201000
unkown
page execute and read and write
malicious
D88000
heap
page read and write
malicious
201000
unkown
page execute and read and write
malicious
3775000
trusted library allocation
page read and write
malicious
201000
unkown
page execute and read and write
malicious
6F1000
unkown
page execute and read and write
malicious
F1B000
heap
page read and write
malicious
6F1000
unkown
page execute and read and write
malicious
6F1000
unkown
page execute and read and write
malicious
52E0000
direct allocation
page read and write
malicious
5450000
direct allocation
page read and write
malicious
E1000
unkown
page execute and read and write
malicious
4E50000
direct allocation
page read and write
malicious
4F00000
direct allocation
page read and write
malicious
12EC000
heap
page read and write
malicious
4C60000
direct allocation
page read and write
malicious
29A000
unkown
page execute and read and write
malicious
541000
unkown
page execute and read and write
malicious
F7C000
heap
page read and write
malicious
29A000
unkown
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3274000
trusted library allocation
page read and write
malicious
541000
unkown
page execute and read and write
malicious
4F80000
direct allocation
page read and write
malicious
4A70000
direct allocation
page read and write
malicious
4BE0000
direct allocation
page read and write
malicious
6F1000
unkown
page execute and read and write
malicious
122B000
heap
page read and write
malicious
5320000
direct allocation
page read and write
malicious
DB1000
unkown
page execute and read and write
malicious
FAB000
heap
page read and write
malicious
4D00000
direct allocation
page read and write
malicious
4E60000
direct allocation
page read and write
malicious
489F000
stack
page read and write
12CA000
heap
page read and write
5160000
direct allocation
page execute and read and write
945E000
stack
page read and write
DF1000
unkown
page execute read
4861000
heap
page read and write
4E70000
direct allocation
page read and write
4F41000
direct allocation
page read and write
DA0000
direct allocation
page read and write
DA0000
unkown
page readonly
1084000
heap
page read and write
E54000
heap
page read and write
4E20000
direct allocation
page read and write
288000
unkown
page execute and read and write
667E000
heap
page read and write
71C0000
trusted library allocation
page execute and read and write
1CCAE000
stack
page read and write
644000
heap
page read and write
384F000
trusted library allocation
page read and write
4E30000
heap
page read and write
E54000
heap
page read and write
5120000
direct allocation
page execute and read and write
15C000
stack
page read and write
38BF000
stack
page read and write
5602000
trusted library allocation
page read and write
4E31000
heap
page read and write
70E000
stack
page read and write
1D28E000
stack
page read and write
4AF1000
heap
page read and write
1710000
direct allocation
page read and write
4E31000
heap
page read and write
4A71000
heap
page read and write
EDB000
stack
page read and write
1463000
heap
page read and write
4850000
direct allocation
page read and write
5660000
direct allocation
page execute and read and write
418F000
stack
page read and write
391F000
stack
page read and write
74E000
heap
page read and write
C94000
heap
page read and write
3F2E000
stack
page read and write
2880000
heap
page read and write
4A41000
heap
page read and write
E40000
heap
page read and write
35DF000
stack
page read and write
D54000
heap
page read and write
E54000
heap
page read and write
12DF000
stack
page read and write
2870000
direct allocation
page read and write
4AF1000
heap
page read and write
4761000
heap
page read and write
4E31000
heap
page read and write
DD2000
heap
page read and write
54A0000
direct allocation
page execute and read and write
36F5000
trusted library allocation
page read and write
44D1000
heap
page read and write
4E81000
heap
page read and write
444E000
stack
page read and write
4FC1000
heap
page read and write
4861000
heap
page read and write
2E37000
heap
page read and write
44D1000
heap
page read and write
4DB0000
direct allocation
page execute and read and write
498E000
stack
page read and write
6EAE000
trusted library allocation
page read and write
4E31000
heap
page read and write
422F000
stack
page read and write
2FCE000
stack
page read and write
382F000
stack
page read and write
45F1000
heap
page read and write
49E1000
heap
page read and write
5540000
direct allocation
page execute and read and write
2BAF000
stack
page read and write
1510000
heap
page read and write
4861000
heap
page read and write
E74000
heap
page read and write
1084000
heap
page read and write
4A71000
heap
page read and write
F5E000
heap
page read and write
45F1000
heap
page read and write
4A71000
heap
page read and write
2EE0000
heap
page read and write
49E1000
heap
page read and write
1084000
heap
page read and write
4D30000
direct allocation
page execute and read and write
E54000
heap
page read and write
9FD000
unkown
page execute and read and write
45F1000
heap
page read and write
3F8F000
stack
page read and write
17AE000
stack
page read and write
1D00D000
stack
page read and write
3D4F000
stack
page read and write
4F80000
direct allocation
page read and write
6370000
heap
page read and write
1020000
direct allocation
page read and write
698C000
stack
page read and write
4A71000
heap
page read and write
2D6E000
stack
page read and write
4A30000
trusted library allocation
page read and write
1084000
heap
page read and write
380A000
trusted library allocation
page read and write
4E80000
direct allocation
page execute and read and write
486E000
stack
page read and write
47E1000
heap
page read and write
FF4000
heap
page read and write
4775000
heap
page read and write
44D1000
heap
page read and write
4631000
heap
page read and write
411F000
stack
page read and write
5130000
direct allocation
page execute and read and write
E74000
heap
page read and write
4850000
direct allocation
page read and write
DB4000
heap
page read and write
49E1000
heap
page read and write
4E20000
direct allocation
page read and write
45F1000
heap
page read and write
1278000
unkown
page execute and read and write
4910000
heap
page read and write
2AF0000
direct allocation
page read and write
FDA000
heap
page read and write
34AE000
stack
page read and write
4A71000
heap
page read and write
2FAE000
stack
page read and write
14E5000
heap
page read and write
E70000
heap
page read and write
4631000
heap
page read and write
39AE000
stack
page read and write
4C1B000
stack
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
4E31000
heap
page read and write
4AF1000
heap
page read and write
49B0000
heap
page read and write
3C2E000
stack
page read and write
3C4E000
stack
page read and write
39DE000
stack
page read and write
E54000
heap
page read and write
F20000
direct allocation
page read and write
4A71000
heap
page read and write
2870000
direct allocation
page read and write
49B1000
direct allocation
page read and write
6EAB000
trusted library allocation
page read and write
4A71000
heap
page read and write
45F1000
heap
page read and write
E74000
heap
page read and write
F20000
direct allocation
page read and write
201000
unkown
page execute and write copy
47E1000
heap
page read and write
28A0000
heap
page read and write
45F1000
heap
page read and write
4A71000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
55C0000
direct allocation
page execute and read and write
A3C000
unkown
page execute and write copy
4C20000
direct allocation
page execute and read and write
4E31000
heap
page read and write
661F000
stack
page read and write
320F000
stack
page read and write
3B8E000
stack
page read and write
644000
heap
page read and write
5910000
trusted library allocation
page read and write
44D1000
heap
page read and write
4650000
heap
page read and write
720000
direct allocation
page read and write
1084000
heap
page read and write
47E1000
heap
page read and write
2F77000
heap
page read and write
4E20000
direct allocation
page read and write
4E31000
heap
page read and write
1D3B2000
heap
page read and write
720000
direct allocation
page read and write
4861000
heap
page read and write
E74000
heap
page read and write
2AF0000
direct allocation
page read and write
4761000
heap
page read and write
4BEF000
stack
page read and write
4861000
heap
page read and write
2BD000
unkown
page execute and read and write
3B7E000
stack
page read and write
2D3C000
stack
page read and write
4A71000
heap
page read and write
644000
heap
page read and write
4631000
heap
page read and write
4E31000
heap
page read and write
7000000
trusted library allocation
page execute and read and write
E54000
heap
page read and write
67BE000
stack
page read and write
3E8F000
stack
page read and write
44D1000
heap
page read and write
42BF000
stack
page read and write
6F60000
trusted library allocation
page read and write
F20000
direct allocation
page read and write
2B5C000
stack
page read and write
2F6F000
stack
page read and write
E74000
heap
page read and write
2D1E000
stack
page read and write
FF4000
heap
page read and write
DA0000
direct allocation
page read and write
E74000
heap
page read and write
467F000
stack
page read and write
F98000
unkown
page execute and read and write
39AF000
stack
page read and write
1CDBF000
stack
page read and write
3D2F000
stack
page read and write
1CDFF000
stack
page read and write
2D7E000
stack
page read and write
C94000
heap
page read and write
E0B000
unkown
page execute and read and write
DA1000
unkown
page execute and write copy
4861000
heap
page read and write
3F3E000
stack
page read and write
4E9E000
stack
page read and write
4A30000
direct allocation
page read and write
81E000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
6F1000
unkown
page execute and write copy
DF1000
unkown
page execute read
4861000
heap
page read and write
1D1EE000
stack
page read and write
2870000
direct allocation
page read and write
324E000
stack
page read and write
421E000
stack
page read and write
E54000
heap
page read and write
C4D000
trusted library allocation
page read and write
2E6E000
stack
page read and write
135E000
stack
page read and write
4A71000
heap
page read and write
49AE000
stack
page read and write
49E1000
heap
page read and write
45F1000
heap
page read and write
4631000
heap
page read and write
49EE000
stack
page read and write
4FA000
stack
page read and write
4B79000
stack
page read and write
F20000
direct allocation
page read and write
4AF1000
heap
page read and write
C94000
heap
page read and write
3805000
trusted library allocation
page read and write
DA0000
direct allocation
page read and write
4AF1000
heap
page read and write
1084000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
1084000
heap
page read and write
E74000
heap
page read and write
429E000
stack
page read and write
47E1000
heap
page read and write
55D0000
trusted library allocation
page read and write
E54000
heap
page read and write
200000
unkown
page read and write
4FF0000
heap
page read and write
920000
heap
page read and write
1D5C4000
heap
page read and write
C94000
heap
page read and write
1D4CD000
stack
page read and write
1084000
heap
page read and write
C94000
heap
page read and write
322F000
stack
page read and write
E8B000
heap
page read and write
4A70000
direct allocation
page read and write
372F000
stack
page read and write
E74000
heap
page read and write
4AF1000
heap
page read and write
C94000
heap
page read and write
93C000
stack
page read and write
395E000
stack
page read and write
341E000
stack
page read and write
35AE000
stack
page read and write
49E1000
heap
page read and write
4E31000
heap
page read and write
5A7C000
stack
page read and write
641F000
stack
page read and write
4E31000
heap
page read and write
44D1000
heap
page read and write
148E000
heap
page read and write
5060000
direct allocation
page execute and read and write
4DD0000
direct allocation
page execute and read and write
4A50000
heap
page read and write
1084000
heap
page read and write
432F000
stack
page read and write
4AF1000
heap
page read and write
2D40000
heap
page read and write
1D04D000
stack
page read and write
4631000
heap
page read and write
45F1000
heap
page read and write
5050000
direct allocation
page execute and read and write
13C6000
trusted library allocation
page execute and read and write
4861000
heap
page read and write
4E60000
direct allocation
page read and write
3D2F000
stack
page read and write
4631000
heap
page read and write
4861000
heap
page read and write
5040000
direct allocation
page execute and read and write
DA0000
direct allocation
page read and write
372E000
stack
page read and write
3DF000
unkown
page execute and read and write
1CDEE000
stack
page read and write
1D0EE000
stack
page read and write
142F000
stack
page read and write
B94000
unkown
page execute and read and write
D54000
heap
page read and write
14F3000
heap
page read and write
3BEF000
stack
page read and write
5680000
direct allocation
page execute and read and write
E74000
heap
page read and write
4861000
heap
page read and write
4E31000
heap
page read and write
E3C000
stack
page read and write
482F000
stack
page read and write
4861000
heap
page read and write
4E81000
heap
page read and write
346F000
stack
page read and write
36CF000
stack
page read and write
44EF000
stack
page read and write
392F000
stack
page read and write
1CEEF000
stack
page read and write
A3C000
unkown
page execute and write copy
1D3B0000
heap
page read and write
1494000
heap
page read and write
E74000
heap
page read and write
6E20000
trusted library allocation
page execute and read and write
E54000
heap
page read and write
47E1000
heap
page read and write
4861000
heap
page read and write
E74000
heap
page read and write
10C2000
unkown
page execute and write copy
8D7000
unkown
page execute and read and write
5CAD000
stack
page read and write
44D0000
heap
page read and write
4861000
heap
page read and write
3ACF000
stack
page read and write
14EF000
heap
page read and write
164E000
stack
page read and write
E5C000
heap
page read and write
4E31000
heap
page read and write
123C000
stack
page read and write
1084000
heap
page read and write
E54000
heap
page read and write
6318000
heap
page read and write
4631000
heap
page read and write
4F30000
heap
page read and write
422F000
stack
page read and write
44D1000
heap
page read and write
4E31000
heap
page read and write
E74000
heap
page read and write
9FE000
unkown
page execute and write copy
E54000
heap
page read and write
44D1000
heap
page read and write
5900000
heap
page read and write
5090000
direct allocation
page execute and read and write
45F1000
heap
page read and write
4C00000
heap
page read and write
E54000
heap
page read and write
335F000
stack
page read and write
29F0000
direct allocation
page execute and read and write
4850000
direct allocation
page read and write
121F000
stack
page read and write
2C2E000
stack
page read and write
4760000
heap
page read and write
307F000
stack
page read and write
4861000
heap
page read and write
2D9F000
stack
page read and write
E54000
heap
page read and write
10D1000
unkown
page execute and write copy
322E000
stack
page read and write
4AF1000
heap
page read and write
47E1000
heap
page read and write
298E000
stack
page read and write
4AF1000
heap
page read and write
45F1000
heap
page read and write
3BEE000
stack
page read and write
6EB0000
heap
page read and write
4A71000
heap
page read and write
4631000
heap
page read and write
6CE000
stack
page read and write
6EA0000
trusted library allocation
page read and write
4861000
heap
page read and write
3D6F000
stack
page read and write
4A71000
heap
page read and write
45F1000
heap
page read and write
3740000
trusted library allocation
page read and write
F3E000
stack
page read and write
4761000
heap
page read and write
1084000
heap
page read and write
1CB7F000
stack
page read and write
438E000
stack
page read and write
4861000
heap
page read and write
E1B000
unkown
page execute and read and write
4E31000
heap
page read and write
4D9F000
stack
page read and write
4E31000
heap
page read and write
4AF1000
heap
page read and write
3714000
trusted library allocation
page read and write
1084000
heap
page read and write
2D2E000
stack
page read and write
472F000
stack
page read and write
E74000
heap
page read and write
32FE000
trusted library allocation
page read and write
E54000
heap
page read and write
6FC000
unkown
page execute and read and write
49E1000
heap
page read and write
4861000
heap
page read and write
14B000
unkown
page execute and read and write
E54000
heap
page read and write
DB4000
heap
page read and write
9F0000
heap
page read and write
137B000
heap
page read and write
E74000
heap
page read and write
E74000
heap
page read and write
47E1000
heap
page read and write
468F000
stack
page read and write
795F000
heap
page read and write
2870000
direct allocation
page read and write
4A7E000
stack
page read and write
D54000
heap
page read and write
4E40000
direct allocation
page read and write
4861000
heap
page read and write
317F000
stack
page read and write
50B0000
direct allocation
page execute and read and write
DB4000
heap
page read and write
4A71000
heap
page read and write
F20000
direct allocation
page read and write
1030000
heap
page read and write
4E40000
direct allocation
page read and write
4631000
heap
page read and write
6ED5000
heap
page read and write
1084000
heap
page read and write
C94000
heap
page read and write
426E000
stack
page read and write
C94000
heap
page read and write
6FF0000
trusted library allocation
page read and write
4E31000
heap
page read and write
1020000
direct allocation
page read and write
436F000
stack
page read and write
45F1000
heap
page read and write
1084000
heap
page read and write
6215000
heap
page read and write
4FC1000
heap
page read and write
DB4000
heap
page read and write
4F00000
direct allocation
page execute and read and write
461F000
stack
page read and write
3B2F000
stack
page read and write
E74000
heap
page read and write
4861000
heap
page read and write
44EE000
stack
page read and write
1084000
heap
page read and write
4A8F000
stack
page read and write
4A71000
heap
page read and write
4E50000
direct allocation
page execute and read and write
3E1F000
stack
page read and write
365E000
trusted library allocation
page read and write
4861000
heap
page read and write
3CDE000
stack
page read and write
759000
unkown
page read and write
B94000
unkown
page execute and read and write
4E31000
heap
page read and write
12FF000
stack
page read and write
367E000
trusted library allocation
page read and write
E87000
heap
page read and write
65DC000
stack
page read and write
12E0000
heap
page read and write
E50000
heap
page read and write
897000
unkown
page execute and write copy
4BEF000
stack
page read and write
4AF1000
heap
page read and write
9E5000
unkown
page execute and read and write
14EB000
heap
page read and write
EE0000
direct allocation
page read and write
3824000
trusted library allocation
page read and write
DCD000
heap
page read and write
C94000
heap
page read and write
4A71000
heap
page read and write
9EF000
unkown
page execute and read and write
4E70000
direct allocation
page read and write
5640000
direct allocation
page execute and read and write
C94000
heap
page read and write
2D90000
heap
page read and write
F8E000
stack
page read and write
45F1000
heap
page read and write
D80000
direct allocation
page read and write
44D1000
heap
page read and write
34AF000
stack
page read and write
4631000
heap
page read and write
4861000
heap
page read and write
43CE000
stack
page read and write
385F000
stack
page read and write
367E000
stack
page read and write
54C0000
direct allocation
page execute and read and write
44D1000
heap
page read and write
F50000
heap
page read and write
1CC6F000
stack
page read and write
E54000
heap
page read and write
4E90000
direct allocation
page execute and read and write
1107000
heap
page read and write
FF4000
heap
page read and write
F75000
heap
page read and write
7260000
trusted library allocation
page execute and read and write
325E000
stack
page read and write
4D61000
direct allocation
page read and write
5500000
direct allocation
page execute and read and write
4861000
heap
page read and write
2C1E000
stack
page read and write
107E000
stack
page read and write
4A90000
direct allocation
page execute and read and write
F00000
direct allocation
page read and write
EE0000
direct allocation
page read and write
45F1000
heap
page read and write
1084000
heap
page read and write
44D1000
heap
page read and write
472F000
stack
page read and write
7F5000
heap
page read and write
44A000
unkown
page execute and read and write
45F1000
heap
page read and write
C94000
heap
page read and write
BFB000
trusted library allocation
page execute and read and write
5060000
direct allocation
page execute and read and write
644000
heap
page read and write
457E000
stack
page read and write
452E000
stack
page read and write
6AB0000
trusted library allocation
page read and write
3520000
trusted library allocation
page read and write
3C9F000
stack
page read and write
C94000
heap
page read and write
E54000
heap
page read and write
4E70000
direct allocation
page execute and read and write
FF4000
heap
page read and write
810000
heap
page read and write
5520000
direct allocation
page execute and read and write
2ADF000
stack
page read and write
6E5C000
stack
page read and write
4861000
heap
page read and write
4A70000
heap
page read and write
201000
unkown
page execute and write copy
1D34D000
stack
page read and write
4861000
heap
page read and write
E8C000
unkown
page readonly
13A0000
trusted library allocation
page read and write
3ED000
unkown
page execute and write copy
9EF000
unkown
page execute and read and write
56FE000
stack
page read and write
4E31000
heap
page read and write
50CF000
stack
page read and write
541000
unkown
page execute and write copy
DB0000
unkown
page read and write
55D4000
trusted library allocation
page read and write
366E000
stack
page read and write
E9D000
heap
page read and write
4AF1000
heap
page read and write
386E000
stack
page read and write
644000
heap
page read and write
358F000
stack
page read and write
96E000
stack
page read and write
48FF000
stack
page read and write
310E000
stack
page read and write
100E000
stack
page read and write
6FD000
unkown
page execute and write copy
54D0000
direct allocation
page execute and read and write
725E000
stack
page read and write
C9E000
stack
page read and write
375D000
trusted library allocation
page read and write
DB0000
heap
page read and write
5070000
direct allocation
page execute and read and write
7937000
heap
page read and write
5460000
direct allocation
page execute and read and write
5020000
direct allocation
page execute and read and write
4861000
heap
page read and write
E74000
heap
page read and write
1400000
trusted library allocation
page execute and read and write
396F000
stack
page read and write
3B6E000
stack
page read and write
54B1000
direct allocation
page read and write
EA0000
heap
page read and write
4AF1000
heap
page read and write
455F000
stack
page read and write
1710000
direct allocation
page read and write
4A71000
heap
page read and write
4761000
heap
page read and write
D20000
heap
page read and write
4E70000
direct allocation
page read and write
D54000
heap
page read and write
170E000
stack
page read and write
1CA7E000
stack
page read and write
45F1000
heap
page read and write
380F000
stack
page read and write
1374000
heap
page read and write
143D000
heap
page read and write
288000
unkown
page execute and read and write
384E000
stack
page read and write
45F1000
heap
page read and write
47E1000
heap
page read and write
2870000
direct allocation
page read and write
68E000
stack
page read and write
3F9E000
stack
page read and write
4C9C000
stack
page read and write
2870000
direct allocation
page read and write
4ED0000
direct allocation
page read and write
456E000
stack
page read and write
385F000
stack
page read and write
DB4000
heap
page read and write
41EF000
stack
page read and write
200000
unkown
page read and write
C94000
heap
page read and write
1085000
heap
page read and write
30EE000
stack
page read and write
535E000
stack
page read and write
44E1000
heap
page read and write
1CC6F000
stack
page read and write
440F000
stack
page read and write
1CE8F000
stack
page read and write
D50000
heap
page read and write
4861000
heap
page read and write
13FF000
stack
page read and write
4E31000
heap
page read and write
2F2E000
stack
page read and write
1084000
heap
page read and write
1D307000
heap
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
44CE000
stack
page read and write
7E6000
heap
page read and write
7D21000
heap
page read and write
3721000
trusted library allocation
page read and write
1CD2E000
stack
page read and write
3ADF000
stack
page read and write
45F1000
heap
page read and write
4761000
heap
page read and write
A3C000
unkown
page execute and read and write
4AF1000
heap
page read and write
107F000
unkown
page execute and read and write
DB1000
unkown
page execute and write copy
49E1000
heap
page read and write
382E000
trusted library allocation
page read and write
4A71000
heap
page read and write
3F0F000
stack
page read and write
150000
unkown
page execute and read and write
5050000
direct allocation
page execute and read and write
394F000
stack
page read and write
4011000
trusted library allocation
page read and write
4861000
heap
page read and write
F5A000
heap
page read and write
E54000
heap
page read and write
1CB6E000
stack
page read and write
4861000
heap
page read and write
E19000
unkown
page write copy
43AE000
stack
page read and write
4861000
heap
page read and write
F30000
heap
page read and write
3F1F000
stack
page read and write
417F000
stack
page read and write
398F000
stack
page read and write
5D8E000
stack
page read and write
1084000
heap
page read and write
4AF1000
heap
page read and write
E54000
heap
page read and write
45F1000
heap
page read and write
1084000
heap
page read and write
1084000
heap
page read and write
5430000
direct allocation
page execute and read and write
451E000
stack
page read and write
4861000
heap
page read and write
6E5E000
trusted library allocation
page read and write
465E000
stack
page read and write
1CCFE000
stack
page read and write
2870000
direct allocation
page read and write
4E70000
direct allocation
page read and write
D54000
heap
page read and write
3747000
trusted library allocation
page read and write
7D28000
heap
page read and write
1D202000
heap
page read and write
1084000
heap
page read and write
386E000
stack
page read and write
35EE000
stack
page read and write
1D04D000
stack
page read and write
1D790000
trusted library allocation
page read and write
1020000
direct allocation
page read and write
6D48000
trusted library allocation
page read and write
E7A000
heap
page read and write
E96000
heap
page read and write
37EF000
stack
page read and write
D54000
heap
page read and write
6E70000
trusted library allocation
page read and write
C94000
heap
page read and write
5625000
trusted library allocation
page read and write
47E1000
heap
page read and write
D40000
heap
page read and write
5310000
direct allocation
page read and write
2760000
heap
page read and write
363F000
stack
page read and write
2AF0000
direct allocation
page read and write
47E1000
heap
page read and write
43EF000
stack
page read and write
6360000
heap
page read and write
5A30000
trusted library allocation
page read and write
4E20000
direct allocation
page read and write
49AF000
stack
page read and write
4AF1000
heap
page read and write
2D30000
direct allocation
page read and write
D54000
heap
page read and write
4861000
heap
page read and write
EE0000
direct allocation
page read and write
6E52000
trusted library allocation
page read and write
D8E000
stack
page read and write
2D9F000
stack
page read and write
439F000
stack
page read and write
F20000
direct allocation
page read and write
D54000
heap
page read and write
9650000
heap
page read and write
118F000
stack
page read and write
1084000
heap
page read and write
E74000
heap
page read and write
1084000
heap
page read and write
4A71000
heap
page read and write
3CCE000
stack
page read and write
10BB000
unkown
page execute and read and write
4761000
heap
page read and write
1CCEF000
stack
page read and write
69D0000
trusted library allocation
page execute and read and write
30EF000
stack
page read and write
3EDE000
stack
page read and write
4861000
heap
page read and write
45F1000
heap
page read and write
633A000
heap
page read and write
3499000
trusted library allocation
page read and write
50E0000
direct allocation
page execute and read and write
52D0000
direct allocation
page read and write
35AF000
stack
page read and write
49E1000
heap
page read and write
49B1000
heap
page read and write
78A000
unkown
page execute and read and write
5E8000
unkown
page execute and read and write
4861000
heap
page read and write
5F0000
heap
page read and write
E54000
heap
page read and write
1CF4D000
stack
page read and write
412E000
stack
page read and write
2C9B000
stack
page read and write
940000
heap
page read and write
EC0000
unkown
page write copy
1D1C4000
heap
page read and write
1D02E000
stack
page read and write
31AE000
trusted library allocation
page read and write
2DEF000
stack
page read and write
1CF4D000
stack
page read and write
4E20000
direct allocation
page read and write
4631000
heap
page read and write
F97000
stack
page read and write
49AF000
stack
page read and write
4A71000
heap
page read and write
3FDF000
stack
page read and write
1400000
heap
page read and write
446F000
stack
page read and write
1D38E000
stack
page read and write
6D80000
trusted library allocation
page read and write
4DFF000
stack
page read and write
C94000
heap
page read and write
54E0000
direct allocation
page execute and read and write
FFE000
heap
page read and write
54E0000
direct allocation
page execute and read and write
50A0000
direct allocation
page execute and read and write
1CF0D000
stack
page read and write
4EB0000
trusted library allocation
page read and write
E54000
heap
page read and write
4861000
heap
page read and write
1CE2E000
stack
page read and write
D54000
heap
page read and write
32BE000
stack
page read and write
13A0000
heap
page read and write
44D1000
heap
page read and write
F1E000
stack
page read and write
2F6F000
stack
page read and write
3EAF000
stack
page read and write
371F000
stack
page read and write
4870000
heap
page read and write
439F000
stack
page read and write
353E000
stack
page read and write
45F1000
heap
page read and write
1CFCF000
stack
page read and write
45E000
unkown
page execute and read and write
2EE7000
heap
page read and write
A3C000
stack
page read and write
1200000
direct allocation
page read and write
2EAF000
stack
page read and write
FF4000
heap
page read and write
E74000
heap
page read and write
5790000
heap
page read and write
164F000
heap
page read and write
1D24F000
stack
page read and write
4861000
heap
page read and write
1084000
heap
page read and write
9C3000
trusted library allocation
page execute and read and write
4A71000
heap
page read and write
401E000
stack
page read and write
391E000
stack
page read and write
4631000
heap
page read and write
4AF1000
heap
page read and write
42EB000
trusted library allocation
page read and write
10D2000
unkown
page execute and write copy
720000
direct allocation
page read and write
4A3F000
stack
page read and write
EE0000
direct allocation
page read and write
807000
heap
page read and write
3F6F000
stack
page read and write
4861000
heap
page read and write
3DEE000
stack
page read and write
34AE000
stack
page read and write
3D0F000
stack
page read and write
56B2000
trusted library allocation
page read and write
32CE000
stack
page read and write
4FF0000
direct allocation
page execute and read and write
5E8000
unkown
page execute and read and write
752000
unkown
page execute and read and write
FA8000
unkown
page execute and read and write
809000
heap
page read and write
E74000
heap
page read and write
49E1000
heap
page read and write
C94000
heap
page read and write
5460000
direct allocation
page execute and read and write
3ACE000
stack
page read and write
D54000
heap
page read and write
3673000
trusted library allocation
page read and write
4E88000
stack
page read and write
424E000
stack
page read and write
2CDE000
stack
page read and write
331C000
trusted library allocation
page read and write
426E000
stack
page read and write
E54000
heap
page read and write
3FEF000
stack
page read and write
6ED000
unkown
page execute and read and write
4A71000
heap
page read and write
79E000
unkown
page execute and read and write
6F1000
unkown
page execute and write copy
322E000
stack
page read and write
45F1000
heap
page read and write
EB2000
unkown
page readonly
4A71000
heap
page read and write
4E80000
heap
page read and write
740000
heap
page read and write
34EF000
stack
page read and write
4861000
heap
page read and write
3A5E000
stack
page read and write
114F000
stack
page read and write
4D3E000
stack
page read and write
336E000
stack
page read and write
5170000
direct allocation
page execute and read and write
4A4F000
stack
page read and write
5450000
direct allocation
page read and write
45F1000
heap
page read and write
1200000
direct allocation
page read and write
1CB2F000
stack
page read and write
359F000
stack
page read and write
4BF0000
direct allocation
page execute and read and write
55E0000
direct allocation
page execute and read and write
4E31000
heap
page read and write
1480000
heap
page read and write
1084000
heap
page read and write
C94000
heap
page read and write
54A0000
direct allocation
page execute and read and write
93E000
stack
page read and write
13BE000
stack
page read and write
75B000
unkown
page execute and read and write
49E1000
heap
page read and write
55EE000
trusted library allocation
page read and write
1084000
heap
page read and write
6D70000
trusted library allocation
page read and write
4FD0000
direct allocation
page execute and read and write
2AF0000
direct allocation
page read and write
493E000
stack
page read and write
DB4000
heap
page read and write
45F1000
heap
page read and write
5610000
direct allocation
page execute and read and write
1020000
direct allocation
page read and write
E74000
heap
page read and write
EE0000
direct allocation
page read and write
419F000
stack
page read and write
370F000
stack
page read and write
45F1000
heap
page read and write
4861000
heap
page read and write
720000
direct allocation
page read and write
3AAF000
stack
page read and write
4861000
heap
page read and write
3527000
trusted library allocation
page read and write
4E31000
heap
page read and write
410E000
stack
page read and write
45F1000
heap
page read and write
329F000
stack
page read and write
3D5F000
stack
page read and write
A2D000
unkown
page execute and read and write
4631000
heap
page read and write
1084000
heap
page read and write
2AF0000
direct allocation
page read and write
10B3000
unkown
page execute and read and write
4AF1000
heap
page read and write
17F0000
heap
page read and write
4BF0000
trusted library allocation
page read and write
E54000
heap
page read and write
4B10000
direct allocation
page execute and read and write
644000
heap
page read and write
E74000
heap
page read and write
4861000
heap
page read and write
44D1000
heap
page read and write
2F6C000
stack
page read and write
174F000
stack
page read and write
2E6E000
stack
page read and write
5070000
direct allocation
page execute and read and write
EE0000
direct allocation
page read and write
6E79000
trusted library allocation
page read and write
E54000
heap
page read and write
560B000
stack
page read and write
55E0000
direct allocation
page execute and read and write
4ED0000
direct allocation
page execute and read and write
37D9000
trusted library allocation
page read and write
35EF000
stack
page read and write
45F1000
heap
page read and write
47E1000
heap
page read and write
4A71000
heap
page read and write
E54000
heap
page read and write
E74000
heap
page read and write
3FAF000
stack
page read and write
45F1000
heap
page read and write
4761000
heap
page read and write
DB4000
heap
page read and write
45F1000
heap
page read and write
1623000
heap
page read and write
4E00000
direct allocation
page execute and read and write
6E00000
trusted library allocation
page execute and read and write
9F0000
heap
page read and write
4A9F000
stack
page read and write
797F000
heap
page read and write
55E0000
direct allocation
page execute and read and write
1D24C000
stack
page read and write
4861000
heap
page read and write
47E1000
heap
page read and write
B94000
unkown
page execute and read and write
2D2F000
stack
page read and write
E74000
heap
page read and write
D7B000
heap
page read and write
294E000
stack
page read and write
45F1000
heap
page read and write
75B000
unkown
page execute and read and write
4761000
heap
page read and write
475F000
stack
page read and write
5C6D000
stack
page read and write
4A30000
direct allocation
page read and write
51FE000
stack
page read and write
3C6E000
stack
page read and write
C94000
heap
page read and write
C94000
heap
page read and write
4DEF000
stack
page read and write
E74000
heap
page read and write
1390000
heap
page read and write
DB4000
heap
page read and write
19C000
stack
page read and write
D54000
heap
page read and write
1200000
direct allocation
page read and write
452F000
stack
page read and write
644000
heap
page read and write
DB4000
heap
page read and write
DA0000
direct allocation
page read and write
300E000
stack
page read and write
2A07000
heap
page read and write
436F000
stack
page read and write
44D1000
heap
page read and write
4AF1000
heap
page read and write
34EE000
stack
page read and write
315F000
stack
page read and write
4D1F000
stack
page read and write
4631000
heap
page read and write
2D20000
heap
page read and write
4861000
heap
page read and write
1D650000
heap
page read and write
4AF1000
heap
page read and write
5920000
trusted library allocation
page execute and read and write
44D1000
heap
page read and write
4861000
heap
page read and write
4761000
heap
page read and write
45F1000
heap
page read and write
E74000
heap
page read and write
2C9F000
stack
page read and write
E54000
heap
page read and write
6F50000
trusted library allocation
page read and write
4861000
heap
page read and write
2BC0000
heap
page read and write
FC0000
heap
page read and write
1200000
direct allocation
page read and write
1084000
heap
page read and write
10BB000
unkown
page execute and read and write
2D0F000
stack
page read and write
E74000
heap
page read and write
720000
direct allocation
page read and write
1C93E000
stack
page read and write
45F1000
heap
page read and write
1084000
heap
page read and write
E54000
heap
page read and write
4761000
heap
page read and write
3A8F000
stack
page read and write
4E31000
heap
page read and write
4861000
heap
page read and write
45F1000
heap
page read and write
E82000
heap
page read and write
5080000
direct allocation
page execute and read and write
4AF1000
heap
page read and write
C94000
heap
page read and write
4FC0000
direct allocation
page execute and read and write
1D4AE000
stack
page read and write
46DE000
stack
page read and write
2772000
trusted library allocation
page execute and read and write
2CFF000
stack
page read and write
619E000
stack
page read and write
4A70000
trusted library allocation
page read and write
DA0000
direct allocation
page read and write
453F000
stack
page read and write
45F1000
heap
page read and write
4E70000
direct allocation
page read and write
1200000
heap
page read and write
44D1000
heap
page read and write
4E31000
heap
page read and write
6E10000
trusted library allocation
page execute and read and write
351F000
stack
page read and write
2A00000
heap
page read and write
DA0000
direct allocation
page read and write
49DF000
stack
page read and write
C94000
heap
page read and write
79C5000
heap
page read and write
377F000
stack
page read and write
5DAC000
stack
page read and write
4AF1000
heap
page read and write
3A3000
unkown
page execute and read and write
1084000
heap
page read and write
1420000
heap
page read and write
4E60000
direct allocation
page execute and read and write
308F000
stack
page read and write
5E6B000
stack
page read and write
44EE000
stack
page read and write
44D1000
heap
page read and write
E74000
heap
page read and write
E74000
heap
page read and write
1084000
heap
page read and write
4610000
heap
page read and write
47E1000
heap
page read and write
4E31000
heap
page read and write
644000
heap
page read and write
1B0000
heap
page read and write
E74000
heap
page read and write
4E70000
direct allocation
page read and write
364C000
trusted library allocation
page read and write
990000
heap
page read and write
1D18D000
stack
page read and write
1C8EE000
stack
page read and write
752000
unkown
page execute and read and write
C94000
heap
page read and write
4AF1000
heap
page read and write
A23000
unkown
page execute and read and write
EDC000
stack
page read and write
3CEF000
stack
page read and write
44E0000
heap
page read and write
335F000
stack
page read and write
469F000
stack
page read and write
6360000
heap
page read and write
4A71000
heap
page read and write
6F0000
unkown
page read and write
1370000
heap
page read and write
7C80000
heap
page read and write
34CE000
stack
page read and write
378F000
stack
page read and write
55F6000
trusted library allocation
page read and write
D54000
heap
page read and write
42AF000
stack
page read and write
3D2E000
stack
page read and write
3D8E000
stack
page read and write
4A71000
heap
page read and write
A3D000
unkown
page execute and write copy
6F0000
unkown
page readonly
7050000
trusted library allocation
page execute and read and write
1084000
heap
page read and write
30CF000
stack
page read and write
45F1000
heap
page read and write
3FCF000
stack
page read and write
FF4000
heap
page read and write
4631000
heap
page read and write
1084000
heap
page read and write
D54000
heap
page read and write
3637000
trusted library allocation
page read and write
4861000
heap
page read and write
4761000
heap
page read and write
2BDE000
stack
page read and write
6900000
trusted library allocation
page read and write
1416000
heap
page read and write
3A9E000
stack
page read and write
1CCBE000
stack
page read and write
D54000
heap
page read and write
49F0000
heap
page read and write
3DAF000
stack
page read and write
47F0000
heap
page read and write
9FD000
unkown
page execute and read and write
476E000
stack
page read and write
FF4000
heap
page read and write
935E000
stack
page read and write
4133000
trusted library allocation
page read and write
1710000
direct allocation
page read and write
132E000
stack
page read and write
E54000
heap
page read and write
49E1000
heap
page read and write
2FC0000
heap
page read and write
4E31000
heap
page read and write
348E000
stack
page read and write
D54000
heap
page read and write
D54000
heap
page read and write
3C5E000
stack
page read and write
4631000
heap
page read and write
399F000
stack
page read and write
D54000
heap
page read and write
FD0000
heap
page read and write
45F1000
heap
page read and write
336F000
stack
page read and write
54F0000
direct allocation
page execute and read and write
DB4000
heap
page read and write
E74000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
2C20000
heap
page read and write
50B0000
direct allocation
page execute and read and write
2BC7000
heap
page read and write
44D1000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
67B5000
heap
page read and write
1710000
direct allocation
page read and write
442E000
stack
page read and write
4631000
heap
page read and write
4D50000
direct allocation
page execute and read and write
3D6E000
stack
page read and write
400000
remote allocation
page execute and read and write
4BA0000
trusted library allocation
page read and write
A3C000
unkown
page execute and write copy
2C5F000
stack
page read and write
389E000
stack
page read and write
4AF1000
heap
page read and write
1084000
heap
page read and write
50C0000
direct allocation
page execute and read and write
6920000
trusted library allocation
page read and write
4BAF000
stack
page read and write
449E000
stack
page read and write
2CCF000
stack
page read and write
6E90000
trusted library allocation
page read and write
1084000
heap
page read and write
4E31000
heap
page read and write
4F30000
heap
page read and write
DB4000
heap
page read and write
4761000
heap
page read and write
40EF000
stack
page read and write
285000
unkown
page execute and read and write
282C000
stack
page read and write
5381000
direct allocation
page read and write
45F1000
heap
page read and write
39CE000
stack
page read and write
1D10F000
stack
page read and write
D54000
heap
page read and write
4E81000
heap
page read and write
9FA000
heap
page read and write
47DF000
stack
page read and write
6EC8000
heap
page read and write
FA3000
heap
page read and write
1084000
heap
page read and write
328F000
stack
page read and write
1328000
heap
page read and write
3FAE000
stack
page read and write
1F0000
heap
page read and write
9A0000
heap
page read and write
4761000
heap
page read and write
3C1F000
stack
page read and write
1084000
heap
page read and write
4AF1000
heap
page read and write
104A000
heap
page read and write
2AF0000
direct allocation
page read and write
44D1000
heap
page read and write
382F000
stack
page read and write
4861000
heap
page read and write
2AF0000
direct allocation
page read and write
4FC1000
heap
page read and write
622000
unkown
page execute and read and write
54A0000
direct allocation
page execute and read and write
4631000
heap
page read and write
BD6000
unkown
page execute and read and write
13AD000
trusted library allocation
page execute and read and write
E8C000
unkown
page readonly
6EBF000
heap
page read and write
5110000
direct allocation
page execute and read and write
45F1000
heap
page read and write
1084000
heap
page read and write
1409000
heap
page read and write
31DF000
trusted library allocation
page read and write
7FF000
stack
page read and write
3FEE000
stack
page read and write
4A71000
heap
page read and write
DB4000
heap
page read and write
6FD000
unkown
page execute and write copy
37AE000
trusted library allocation
page read and write
47AF000
stack
page read and write
2D30000
direct allocation
page read and write
3AEE000
stack
page read and write
4861000
heap
page read and write
E74000
heap
page read and write
4E70000
direct allocation
page read and write
2FAF000
stack
page read and write
34AE000
stack
page read and write
46CE000
stack
page read and write
3E9F000
stack
page read and write
446000
remote allocation
page execute and read and write
F20000
direct allocation
page read and write
4AF1000
heap
page read and write
E74000
heap
page read and write
44D1000
heap
page read and write
49E1000
heap
page read and write
4BBE000
stack
page read and write
45F1000
heap
page read and write
44D1000
heap
page read and write
955E000
stack
page read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
C94000
heap
page read and write
316E000
stack
page read and write
1084000
heap
page read and write
B3D000
stack
page read and write
49E1000
heap
page read and write
4E80000
direct allocation
page execute and read and write
44D1000
heap
page read and write
3302000
trusted library allocation
page read and write
44D1000
heap
page read and write
80A000
heap
page read and write
338F000
stack
page read and write
1D08D000
stack
page read and write
D54000
heap
page read and write
311E000
stack
page read and write
DA0000
direct allocation
page read and write
44D1000
heap
page read and write
4761000
heap
page read and write
55E0000
direct allocation
page execute and read and write
F20000
direct allocation
page read and write
44D1000
heap
page read and write
49E1000
heap
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
FCE000
stack
page read and write
5100000
direct allocation
page execute and read and write
E54000
heap
page read and write
369E000
stack
page read and write
2E0F000
stack
page read and write
4631000
heap
page read and write
644000
heap
page read and write
2DAE000
stack
page read and write
4631000
heap
page read and write
13D0000
trusted library allocation
page read and write
44D1000
heap
page read and write
4E31000
heap
page read and write
11EE000
stack
page read and write
4761000
heap
page read and write
30DF000
stack
page read and write
50D0000
direct allocation
page execute and read and write
4631000
heap
page read and write
3DBF000
stack
page read and write
D54000
heap
page read and write
E54000
heap
page read and write
47BF000
stack
page read and write
1100000
heap
page read and write
3D4E000
stack
page read and write
4861000
heap
page read and write
9EF000
unkown
page execute and read and write
44D1000
heap
page read and write
4E31000
heap
page read and write
6D78000
trusted library allocation
page read and write
E54000
heap
page read and write
644000
heap
page read and write
5490000
direct allocation
page execute and read and write
A3C000
unkown
page execute and read and write
33BF000
stack
page read and write
4AF1000
heap
page read and write
1084000
heap
page read and write
E54000
heap
page read and write
4AF1000
heap
page read and write
4E31000
heap
page read and write
305E000
stack
page read and write
5A40000
trusted library allocation
page execute and read and write
599000
stack
page read and write
4A71000
heap
page read and write
1020000
direct allocation
page read and write
5630000
trusted library allocation
page read and write
DB4000
heap
page read and write
DB4000
heap
page read and write
4E81000
heap
page read and write
4861000
heap
page read and write
45F1000
heap
page read and write
47E1000
heap
page read and write
DB4000
heap
page read and write
DB4000
heap
page read and write
484F000
stack
page read and write
E74000
heap
page read and write
47E1000
heap
page read and write
2D67000
heap
page read and write
2D97000
heap
page read and write
43DE000
stack
page read and write
4861000
heap
page read and write
4C60000
direct allocation
page read and write
47E1000
heap
page read and write
406D000
stack
page read and write
4E31000
heap
page read and write
DB0000
unkown
page readonly
2E4F000
stack
page read and write
4AF1000
heap
page read and write
4FB0000
direct allocation
page execute and read and write
E19000
unkown
page read and write
9A0000
heap
page read and write
38AE000
stack
page read and write
644000
heap
page read and write
640000
heap
page read and write
593E000
stack
page read and write
E74000
heap
page read and write
3FEE000
stack
page read and write
12CE000
heap
page read and write
95A0000
trusted library allocation
page read and write
45F1000
heap
page read and write
E54000
heap
page read and write
C30000
trusted library allocation
page execute and read and write
5100000
direct allocation
page execute and read and write
4A90000
direct allocation
page execute and read and write
143B000
heap
page read and write
2C27000
heap
page read and write
2B10000
heap
page read and write
2C7000
unkown
page execute and read and write
541F000
stack
page read and write
3D9D000
stack
page read and write
2D30000
direct allocation
page read and write
E54000
heap
page read and write
49C000
stack
page read and write
E74000
heap
page read and write
466F000
stack
page read and write
80A000
heap
page read and write
C90000
heap
page read and write
6E61000
trusted library allocation
page read and write
12E0000
heap
page read and write
9D4000
trusted library allocation
page read and write
416F000
stack
page read and write
6E3000
unkown
page execute and read and write
4861000
heap
page read and write
3FAF000
stack
page read and write
45F1000
heap
page read and write
CFE000
stack
page read and write
1084000
heap
page read and write
340E000
stack
page read and write
FF4000
heap
page read and write
4032000
trusted library allocation
page read and write
F20000
direct allocation
page read and write
E74000
heap
page read and write
4631000
heap
page read and write
644000
heap
page read and write
45F1000
heap
page read and write
2D30000
direct allocation
page read and write
4631000
heap
page read and write
49B1000
heap
page read and write
314F000
stack
page read and write
7C70000
heap
page read and write
344F000
stack
page read and write
44D1000
heap
page read and write
1084000
heap
page read and write
44D1000
heap
page read and write
431F000
stack
page read and write
644000
heap
page read and write
5E8000
unkown
page execute and read and write
48AE000
stack
page read and write
BEF000
stack
page read and write
F3B000
heap
page read and write
E54000
heap
page read and write
2EAE000
stack
page read and write
127A000
unkown
page execute and write copy
4850000
direct allocation
page read and write
476E000
stack
page read and write
1D09E000
stack
page read and write
2E2F000
stack
page read and write
2D2F000
stack
page read and write
45EF000
stack
page read and write
EBC000
unkown
page read and write
49E1000
heap
page read and write
415E000
stack
page read and write
47E1000
heap
page read and write
59A000
unkown
page execute and read and write
9FE000
unkown
page execute and write copy
4E31000
heap
page read and write
4F00000
direct allocation
page read and write
45F0000
heap
page read and write
4AF1000
heap
page read and write
54B0000
direct allocation
page execute and read and write
54B0000
direct allocation
page execute and read and write
2B2E000
stack
page read and write
45F1000
heap
page read and write
13FE000
stack
page read and write
E12000
unkown
page execute and read and write
E74000
heap
page read and write
4B00000
direct allocation
page execute and read and write
44D1000
heap
page read and write
49E1000
heap
page read and write
810000
heap
page read and write
375E000
stack
page read and write
4DE0000
direct allocation
page execute and read and write
4A71000
heap
page read and write
4E31000
heap
page read and write
437000
remote allocation
page execute and read and write
4E31000
heap
page read and write
4A90000
direct allocation
page execute and read and write
DB4000
heap
page read and write
2B80000
direct allocation
page execute and read and write
4AF1000
heap
page read and write
60EF000
stack
page read and write
5FD000
unkown
page execute and read and write
3DAE000
stack
page read and write
644000
heap
page read and write
4F3B000
stack
page read and write
1466000
heap
page read and write
1084000
heap
page read and write
47E1000
heap
page read and write
4AF1000
heap
page read and write
45F1000
heap
page read and write
5DCE000
stack
page read and write
6D35000
trusted library allocation
page read and write
411F000
stack
page read and write
44D1000
heap
page read and write
14F1000
heap
page read and write
365F000
stack
page read and write
DB4000
heap
page read and write
4AF1000
heap
page read and write
4E31000
heap
page read and write
4AF1000
heap
page read and write
E60000
heap
page read and write
37B7000
trusted library allocation
page read and write
9FF000
unkown
page execute and read and write
DB4000
heap
page read and write
3EFF000
stack
page read and write
E74000
heap
page read and write
514C000
stack
page read and write
4AF1000
heap
page read and write
E54000
heap
page read and write
EE0000
direct allocation
page read and write
50C0000
trusted library allocation
page read and write
1200000
direct allocation
page read and write
5060000
direct allocation
page execute and read and write
EFD000
stack
page read and write
44D1000
heap
page read and write
E74000
heap
page read and write
4C10000
direct allocation
page execute and read and write
474E000
stack
page read and write
3EEE000
stack
page read and write
E74000
heap
page read and write
E74000
heap
page read and write
E74000
heap
page read and write
42AE000
stack
page read and write
44D1000
heap
page read and write
54A0000
direct allocation
page execute and read and write
4A30000
direct allocation
page read and write
49E1000
heap
page read and write
426F000
stack
page read and write
3C2E000
stack
page read and write
1CFB0000
heap
page read and write
30CE000
stack
page read and write
4861000
heap
page read and write
1E0000
heap
page read and write
612E000
stack
page read and write
4BC0000
heap
page read and write
4AB0000
direct allocation
page execute and read and write
49E1000
heap
page read and write
382E000
stack
page read and write
4861000
heap
page read and write
426E000
stack
page read and write
161B000
heap
page read and write
2FE0000
heap
page read and write
4DC0000
direct allocation
page execute and read and write
126C000
stack
page read and write
4A71000
heap
page read and write
5310000
direct allocation
page read and write
6C1C000
stack
page read and write
1090000
heap
page read and write
330F000
stack
page read and write
9B3000
unkown
page execute and read and write
4CF0000
direct allocation
page read and write
4631000
heap
page read and write
49E1000
heap
page read and write
D7C000
stack
page read and write
111E000
stack
page read and write
E74000
heap
page read and write
44D1000
heap
page read and write
349F000
stack
page read and write
5FD000
unkown
page execute and read and write
4F10000
direct allocation
page execute and read and write
43DE000
stack
page read and write
1CF8E000
stack
page read and write
2E8E000
stack
page read and write
9FD000
unkown
page execute and write copy
434F000
stack
page read and write
1D304000
heap
page read and write
286E000
stack
page read and write
644000
heap
page read and write
137F000
stack
page read and write
44D1000
heap
page read and write
1CEF0000
heap
page read and write
3A1F000
stack
page read and write
44D1000
heap
page read and write
DB4000
heap
page read and write
4E31000
heap
page read and write
4601000
heap
page read and write
5460000
direct allocation
page execute and read and write
2D50000
heap
page read and write
4E8E000
stack
page read and write
644000
heap
page read and write
3E9F000
stack
page read and write
1D30E000
stack
page read and write
79A9000
heap
page read and write
EE0000
direct allocation
page read and write
124F000
stack
page read and write
F86000
heap
page read and write
432000
remote allocation
page execute and read and write
7951000
heap
page read and write
49E0000
heap
page read and write
930000
heap
page read and write
4AF1000
heap
page read and write
FDC000
heap
page read and write
1494000
heap
page read and write
49B1000
heap
page read and write
2E4E000
stack
page read and write
4761000
heap
page read and write
D40000
heap
page read and write
4A71000
heap
page read and write
BDC000
stack
page read and write
1210000
heap
page read and write
6910000
trusted library allocation
page read and write
360E000
stack
page read and write
38AF000
stack
page read and write
4AF1000
heap
page read and write
1084000
heap
page read and write
35AF000
stack
page read and write
E74000
heap
page read and write
17FE000
heap
page read and write
FC0000
heap
page read and write
495F000
stack
page read and write
5510000
direct allocation
page execute and read and write
4B00000
heap
page read and write
441F000
stack
page read and write
E9E000
stack
page read and write
4E81000
heap
page read and write
27EE000
stack
page read and write
32AE000
stack
page read and write
3E5E000
stack
page read and write
63F9000
heap
page read and write
15D0000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
59EB000
trusted library allocation
page read and write
644000
heap
page read and write
3518000
trusted library allocation
page read and write
285000
unkown
page execute and read and write
4AF1000
heap
page read and write
6F30000
trusted library allocation
page read and write
4761000
heap
page read and write
7E2000
heap
page read and write
143E000
stack
page read and write
45F1000
heap
page read and write
448F000
stack
page read and write
148B000
heap
page read and write
46AE000
stack
page read and write
326E000
stack
page read and write
436E000
stack
page read and write
4AF1000
heap
page read and write
13F0000
heap
page read and write
4AF1000
heap
page read and write
4A00000
heap
page read and write
4631000
heap
page read and write
29DE000
stack
page read and write
45F1000
heap
page read and write
428B000
trusted library allocation
page read and write
D54000
heap
page read and write
127E000
heap
page read and write
BD7000
unkown
page execute and write copy
44D1000
heap
page read and write
404F000
stack
page read and write
140E000
heap
page read and write
2FB0000
heap
page read and write
3A3E000
stack
page read and write
17EE000
stack
page read and write
312F000
stack
page read and write
4A30000
direct allocation
page read and write
2B17000
heap
page read and write
6ED000
unkown
page execute and read and write
33DF000
stack
page read and write
5CF000
unkown
page execute and read and write
720000
direct allocation
page read and write
622000
unkown
page execute and read and write
45F1000
heap
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
4FEE000
stack
page read and write
120F000
stack
page read and write
EC0000
heap
page read and write
4E31000
heap
page read and write
E74000
heap
page read and write
372E000
stack
page read and write
4AF1000
heap
page read and write
486F000
stack
page read and write
1268000
unkown
page execute and read and write
5DE0000
heap
page read and write
4761000
heap
page read and write
E74000
heap
page read and write
DB4000
heap
page read and write
E54000
heap
page read and write
FF4000
heap
page read and write
362E000
stack
page read and write
4861000
heap
page read and write
588F000
stack
page read and write
30DF000
stack
page read and write
13C0000
trusted library allocation
page read and write
3ADF000
stack
page read and write
320E000
stack
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
49E1000
heap
page read and write
389E000
stack
page read and write
1084000
heap
page read and write
12BE000
stack
page read and write
35DF000
stack
page read and write
1084000
heap
page read and write
30B6000
trusted library allocation
page read and write
3C0E000
stack
page read and write
2EF0000
trusted library allocation
page read and write
5500000
direct allocation
page execute and read and write
13B0000
trusted library allocation
page read and write
4AAB000
stack
page read and write
4A71000
heap
page read and write
68ED000
stack
page read and write
45F1000
heap
page read and write
1084000
heap
page read and write
3D5000
unkown
page execute and read and write
4AF1000
heap
page read and write
55DB000
trusted library allocation
page read and write
1CF9F000
stack
page read and write
720000
direct allocation
page read and write
4C40000
direct allocation
page execute and read and write
4861000
heap
page read and write
49E1000
heap
page read and write
5180000
direct allocation
page execute and read and write
458E000
stack
page read and write
4761000
heap
page read and write
688C000
stack
page read and write
FF4000
heap
page read and write
C94000
heap
page read and write
3771000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page execute and read and write
5110000
direct allocation
page execute and read and write
4AF1000
heap
page read and write
EE0000
direct allocation
page read and write
4FB0000
direct allocation
page execute and read and write
4ED0000
direct allocation
page read and write
44D1000
heap
page read and write
1D5AC000
stack
page read and write
37F9000
trusted library allocation
page read and write
371F000
stack
page read and write
4631000
heap
page read and write
2773000
trusted library allocation
page read and write
3A2E000
stack
page read and write
1084000
heap
page read and write
540000
unkown
page read and write
290F000
stack
page read and write
2E48000
trusted library allocation
page read and write
C94000
heap
page read and write
1084000
heap
page read and write
13F5000
heap
page read and write
45F1000
heap
page read and write
E54000
heap
page read and write
4861000
heap
page read and write
E54000
heap
page read and write
3FAF000
stack
page read and write
4AF1000
heap
page read and write
4A30000
direct allocation
page read and write
3644000
trusted library allocation
page read and write
5140000
direct allocation
page execute and read and write
49E1000
heap
page read and write
5EED000
stack
page read and write
4E20000
direct allocation
page read and write
435E000
stack
page read and write
332F000
stack
page read and write
3C6F000
stack
page read and write
FB6000
heap
page read and write
4A40000
heap
page read and write
35EE000
stack
page read and write
34DE000
stack
page read and write
4876000
heap
page read and write
7959000
heap
page read and write
200000
unkown
page read and write
4631000
heap
page read and write
644000
heap
page read and write
5341000
direct allocation
page read and write
2B97000
heap
page read and write
E54000
heap
page read and write
332F000
stack
page read and write
45F1000
heap
page read and write
44D1000
heap
page read and write
6FE0000
trusted library allocation
page read and write
3769000
trusted library allocation
page read and write
4D5E000
stack
page read and write
14D4000
heap
page read and write
E74000
heap
page read and write
3812000
trusted library allocation
page read and write
1084000
heap
page read and write
1489000
heap
page read and write
10D1000
unkown
page execute and read and write
4DEE000
stack
page read and write
9FE000
heap
page read and write
13D7000
trusted library allocation
page execute and read and write
4850000
direct allocation
page read and write
45CF000
stack
page read and write
4E10000
direct allocation
page execute and read and write
1710000
direct allocation
page read and write
C94000
heap
page read and write
6FC000
unkown
page execute and read and write
42DF000
stack
page read and write
44D1000
heap
page read and write
5010000
direct allocation
page execute and read and write
4761000
heap
page read and write
EE0000
direct allocation
page read and write
E82000
heap
page read and write
4861000
heap
page read and write
C94000
heap
page read and write
7335D000
unkown
page read and write
8D7000
unkown
page execute and read and write
1449000
heap
page read and write
2D4E000
stack
page read and write
6D60000
trusted library allocation
page read and write
4A90000
direct allocation
page execute and read and write
2D0E000
stack
page read and write
5C8E000
stack
page read and write
52D0000
direct allocation
page read and write
C94000
heap
page read and write
6F80000
trusted library allocation
page read and write
611E000
stack
page read and write
4F7C000
stack
page read and write
2E9F000
stack
page read and write
3C5E000
stack
page read and write
63C9000
heap
page read and write
4E3F000
stack
page read and write
FCB000
heap
page read and write
44D1000
heap
page read and write
45F1000
heap
page read and write
52BC000
stack
page read and write
44D1000
heap
page read and write
1020000
direct allocation
page read and write
644000
heap
page read and write
78A000
unkown
page execute and read and write
D54000
heap
page read and write
4A71000
heap
page read and write
4AF1000
heap
page read and write
162C000
heap
page read and write
1D654000
heap
page read and write
4631000
heap
page read and write
2AF0000
direct allocation
page read and write
9B3000
unkown
page execute and read and write
6200000
heap
page read and write
126E000
stack
page read and write
4E31000
heap
page read and write
4A71000
heap
page read and write
1038000
heap
page read and write
6D32000
trusted library allocation
page read and write
37DE000
stack
page read and write
5CC0000
trusted library allocation
page read and write
721E000
stack
page read and write
3EE000
unkown
page execute and write copy
6EA5000
trusted library allocation
page read and write
45F1000
heap
page read and write
3AAF000
stack
page read and write
5450000
direct allocation
page execute and read and write
4861000
heap
page read and write
1AEF000
stack
page read and write
428E000
stack
page read and write
4E31000
heap
page read and write
42FE000
stack
page read and write
CDE000
stack
page read and write
6FC000
unkown
page execute and write copy
32DE000
stack
page read and write
30EF000
stack
page read and write
F20000
direct allocation
page read and write
DB4000
heap
page read and write
2FAE000
stack
page read and write
4A71000
heap
page read and write
644000
heap
page read and write
57FF000
stack
page read and write
412D000
stack
page read and write
200000
unkown
page readonly
44D1000
heap
page read and write
40CF000
stack
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
CDE000
stack
page read and write
1D657000
heap
page read and write
1084000
heap
page read and write
644000
heap
page read and write
4631000
heap
page read and write
821000
heap
page read and write
1020000
direct allocation
page read and write
163D000
heap
page read and write
5490000
direct allocation
page execute and read and write
531B000
stack
page read and write
55FD000
trusted library allocation
page read and write
4E20000
direct allocation
page read and write
7FDA0000
trusted library allocation
page execute and read and write
3D6E000
stack
page read and write
4A71000
heap
page read and write
44D1000
heap
page read and write
4E31000
heap
page read and write
3BCF000
stack
page read and write
4FCC000
stack
page read and write
4AF1000
heap
page read and write
4FC0000
heap
page read and write
4E80000
direct allocation
page execute and read and write
BD7000
unkown
page execute and write copy
4B30000
direct allocation
page execute and read and write
EC4000
unkown
page readonly
3D2F000
stack
page read and write
4BF0000
direct allocation
page execute and read and write
4F9F000
stack
page read and write
4FC1000
heap
page read and write
44D1000
heap
page read and write
4761000
heap
page read and write
4861000
heap
page read and write
4800000
heap
page read and write
E74000
heap
page read and write
4E31000
heap
page read and write
170000
heap
page read and write
4C00000
direct allocation
page execute and read and write
33CF000
stack
page read and write
30EB000
trusted library allocation
page read and write
34DE000
stack
page read and write
7C6F000
stack
page read and write
E55000
heap
page read and write
1342000
heap
page read and write
45F1000
heap
page read and write
318E000
stack
page read and write
A23000
unkown
page execute and read and write
45F1000
heap
page read and write
1200000
direct allocation
page read and write
2771000
trusted library allocation
page read and write
386E000
stack
page read and write
439F000
trusted library allocation
page read and write
431E000
stack
page read and write
3E6E000
stack
page read and write
1084000
heap
page read and write
4861000
heap
page read and write
2F00000
heap
page execute and read and write
45F1000
heap
page read and write
63E8000
heap
page read and write
44D1000
heap
page read and write
1200000
direct allocation
page read and write
4A2F000
stack
page read and write
4761000
heap
page read and write
E54000
heap
page read and write
1084000
heap
page read and write
E54000
heap
page read and write
52BB000
stack
page read and write
DA0000
direct allocation
page read and write
45F1000
heap
page read and write
E09000
unkown
page read and write
4EA0000
direct allocation
page execute and read and write
44DF000
stack
page read and write
6E46000
trusted library allocation
page read and write
E74000
heap
page read and write
45F1000
heap
page read and write
4E31000
heap
page read and write
14BA000
heap
page read and write
9B0000
trusted library allocation
page read and write
E75000
heap
page read and write
7C04000
heap
page read and write
103B000
heap
page read and write
4761000
heap
page read and write
6F1000
unkown
page execute and write copy
402E000
stack
page read and write
4FDB000
stack
page read and write
10D0000
heap
page read and write
2B1000
unkown
page execute and read and write
549E000
stack
page read and write
38EE000
stack
page read and write
1710000
direct allocation
page read and write
EE0000
direct allocation
page read and write
44D1000
heap
page read and write
2F8F000
stack
page read and write
4E31000
heap
page read and write
348F000
stack
page read and write
6210000
heap
page read and write
2F9F000
stack
page read and write
4BE0000
heap
page read and write
4850000
direct allocation
page read and write
DB4000
heap
page read and write
1440000
heap
page read and write
635F000
stack
page read and write
752000
unkown
page execute and read and write
415E000
stack
page read and write
4A71000
heap
page read and write
7C2E000
stack
page read and write
67FD000
stack
page read and write
E87000
heap
page read and write
78A000
unkown
page execute and read and write
1820000
heap
page read and write
2EDF000
stack
page read and write
E60000
heap
page read and write
644000
heap
page read and write
4B40000
trusted library allocation
page read and write
44D1000
heap
page read and write
DA0000
direct allocation
page read and write
332F000
stack
page read and write
637C000
heap
page read and write
25A000
unkown
page execute and read and write
1084000
heap
page read and write
5D4E000
stack
page read and write
E54000
heap
page read and write
896000
unkown
page execute and read and write
44A000
unkown
page execute and read and write
4F5000
stack
page read and write
3AAF000
stack
page read and write
631D000
stack
page read and write
E54000
heap
page read and write
4E31000
heap
page read and write
54C0000
direct allocation
page execute and read and write
4AF1000
heap
page read and write
4861000
heap
page read and write
1D19F000
stack
page read and write
4AF1000
heap
page read and write
4A71000
heap
page read and write
4E31000
heap
page read and write
39FF000
stack
page read and write
4761000
heap
page read and write
720000
direct allocation
page read and write
4761000
heap
page read and write
2C0F000
stack
page read and write
144B000
heap
page read and write
1D1AE000
stack
page read and write
41CE000
stack
page read and write
4A71000
heap
page read and write
403F000
stack
page read and write
1CDAF000
stack
page read and write
C94000
heap
page read and write
4631000
heap
page read and write
44D1000
heap
page read and write
720000
direct allocation
page read and write
37CE000
stack
page read and write
4861000
heap
page read and write
4E31000
heap
page read and write
2D4B000
heap
page read and write
4AF1000
heap
page read and write
896000
unkown
page execute and read and write
472E000
stack
page read and write
644000
heap
page read and write
13BC000
stack
page read and write
3B3F000
stack
page read and write
1084000
heap
page read and write
644000
heap
page read and write
54A0000
direct allocation
page execute and read and write
D5A000
stack
page read and write
759000
unkown
page write copy
4761000
heap
page read and write
E0000
unkown
page readonly
29D0000
direct allocation
page execute and read and write
4861000
heap
page read and write
4A71000
heap
page read and write
45F1000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
F20000
direct allocation
page read and write
4CF0000
direct allocation
page read and write
41BE000
stack
page read and write
622F000
stack
page read and write
2870000
direct allocation
page read and write
5150000
direct allocation
page execute and read and write
4D1F000
stack
page read and write
4861000
heap
page read and write
4A71000
heap
page read and write
6ABA000
trusted library allocation
page read and write
7CF000
stack
page read and write
C94000
heap
page read and write
4A70000
direct allocation
page read and write
45F1000
heap
page read and write
3F4E000
stack
page read and write
2AF0000
direct allocation
page read and write
1084000
heap
page read and write
372E000
trusted library allocation
page read and write
4A71000
heap
page read and write
3B1E000
stack
page read and write
1D1C0000
heap
page read and write
4E31000
heap
page read and write
361E000
stack
page read and write
31EF000
stack
page read and write
1440000
trusted library allocation
page read and write
4880000
heap
page read and write
7C00000
heap
page read and write
C94000
heap
page read and write
44D1000
heap
page read and write
5A50000
heap
page read and write
4B11000
heap
page read and write
10C3000
unkown
page execute and read and write
1D3AF000
stack
page read and write
1659000
heap
page read and write
55F0000
direct allocation
page execute and read and write
1084000
heap
page read and write
DB0000
heap
page read and write
E0000
unkown
page read and write
6F0000
unkown
page readonly
2EE0000
trusted library allocation
page read and write
1084000
heap
page read and write
47CF000
stack
page read and write
5A1E000
stack
page read and write
13FE000
stack
page read and write
A23000
unkown
page execute and read and write
4AF1000
heap
page read and write
E54000
heap
page read and write
1710000
direct allocation
page read and write
475F000
stack
page read and write
5080000
direct allocation
page execute and read and write
759000
unkown
page write copy
4861000
heap
page read and write
1084000
heap
page read and write
346F000
stack
page read and write
E54000
heap
page read and write
49B1000
heap
page read and write
10D1000
unkown
page execute and read and write
F90000
heap
page read and write
2DDE000
stack
page read and write
1D00E000
stack
page read and write
51A0000
direct allocation
page execute and read and write
584000
unkown
page execute and read and write
49E1000
heap
page read and write
44D1000
heap
page read and write
106F000
heap
page read and write
44D1000
heap
page read and write
E74000
heap
page read and write
4761000
heap
page read and write
73341000
unkown
page execute read
4761000
heap
page read and write
E19000
unkown
page read and write
37BE000
stack
page read and write
1084000
heap
page read and write
7190000
trusted library allocation
page read and write
5110000
direct allocation
page execute and read and write
CF5000
stack
page read and write
7FD000
heap
page read and write
E74000
heap
page read and write
1278000
unkown
page execute and read and write
14A1000
heap
page read and write
9FF000
unkown
page execute and read and write
45F1000
heap
page read and write
4E31000
heap
page read and write
5060000
direct allocation
page execute and read and write
3EAE000
stack
page read and write
E54000
heap
page read and write
644000
heap
page read and write
67B0000
heap
page read and write
1084000
heap
page read and write
1D3CD000
stack
page read and write
4E20000
direct allocation
page read and write
5060000
direct allocation
page execute and read and write
4AF1000
heap
page read and write
14F9000
heap
page read and write
1200000
direct allocation
page read and write
12EE000
stack
page read and write
44D1000
heap
page read and write
374E000
stack
page read and write
1084000
heap
page read and write
401F000
trusted library allocation
page read and write
5080000
direct allocation
page execute and read and write
644000
heap
page read and write
3800000
trusted library allocation
page read and write
EC4000
unkown
page readonly
5440000
direct allocation
page execute and read and write
4D6E000
stack
page read and write
4E20000
trusted library allocation
page read and write
E5E000
stack
page read and write
E74000
heap
page read and write
9B3000
unkown
page execute and read and write
4AD0000
direct allocation
page execute and read and write
F6E000
stack
page read and write
4AF1000
heap
page read and write
4AF1000
heap
page read and write
5460000
direct allocation
page execute and read and write
4BBC000
stack
page read and write
4631000
heap
page read and write
2B90000
heap
page read and write
3EAE000
stack
page read and write
7EF000
stack
page read and write
43AF000
stack
page read and write
510000
heap
page read and write
4861000
heap
page read and write
4A71000
heap
page read and write
479E000
stack
page read and write
5470000
direct allocation
page execute and read and write
73340000
unkown
page readonly
540000
unkown
page readonly
F40000
heap
page read and write
2AF0000
direct allocation
page read and write
4E9B000
stack
page read and write
5A6A000
heap
page read and write
49E1000
heap
page read and write
499E000
stack
page read and write
792000
heap
page read and write
409E000
stack
page read and write
4E31000
heap
page read and write
5B1F000
stack
page read and write
4AF0000
heap
page read and write
3DCF000
stack
page read and write
4861000
heap
page read and write
42EE000
stack
page read and write
4F00000
direct allocation
page read and write
1084000
heap
page read and write
4A71000
heap
page read and write
1CA3F000
stack
page read and write
6F34000
trusted library allocation
page read and write
460E000
stack
page read and write
E54000
heap
page read and write
4F80000
direct allocation
page read and write
5620000
trusted library allocation
page read and write
4A71000
heap
page read and write
55E0000
direct allocation
page execute and read and write
5050000
direct allocation
page execute and read and write
31EF000
stack
page read and write
583E000
stack
page read and write
4A71000
heap
page read and write
44AF000
stack
page read and write
6EC9000
heap
page read and write
4861000
heap
page read and write
E74000
heap
page read and write
E9D000
heap
page read and write
8D7000
unkown
page execute and read and write
1710000
direct allocation
page read and write
E54000
heap
page read and write
9B3000
unkown
page execute and read and write
E54000
heap
page read and write
1CBBE000
stack
page read and write
35CE000
stack
page read and write
451E000
stack
page read and write
42CF000
stack
page read and write
E74000
heap
page read and write
E74000
heap
page read and write
6BF000
unkown
page execute and read and write
1084000
heap
page read and write
1190000
heap
page read and write
2AF0000
direct allocation
page read and write
9FD000
unkown
page execute and read and write
48DE000
stack
page read and write
3E1E000
stack
page read and write
44D1000
heap
page read and write
443E000
stack
page read and write
45F1000
heap
page read and write
4860000
heap
page read and write
25A000
unkown
page execute and read and write
71B0000
heap
page execute and read and write
145A000
heap
page read and write
5630000
direct allocation
page execute and read and write
E74000
heap
page read and write
71A0000
trusted library allocation
page read and write
4E31000
heap
page read and write
438F000
stack
page read and write
44D1000
heap
page read and write
D54000
heap
page read and write
D54000
heap
page read and write
49E1000
heap
page read and write
4FA0000
direct allocation
page execute and read and write
9FD000
unkown
page execute and write copy
3ECE000
stack
page read and write
545F000
stack
page read and write
31CF000
stack
page read and write
6FC000
unkown
page execute and write copy
6FD0000
trusted library allocation
page read and write
4AF1000
heap
page read and write
4E31000
heap
page read and write
E74000
heap
page read and write
4AAF000
stack
page read and write
E21000
heap
page read and write
326F000
stack
page read and write
DBA000
heap
page read and write
54A0000
direct allocation
page execute and read and write
A2D000
unkown
page execute and read and write
14F3000
heap
page read and write
4861000
heap
page read and write
5DE5000
heap
page read and write
1084000
heap
page read and write
45F1000
heap
page read and write
6368000
heap
page read and write
644000
heap
page read and write
4E31000
heap
page read and write
36FE000
trusted library allocation
page read and write
4A71000
heap
page read and write
DF0000
unkown
page readonly
4861000
heap
page read and write
1D14E000
stack
page read and write
5060000
direct allocation
page execute and read and write
1084000
heap
page read and write
319E000
stack
page read and write
3DFE000
stack
page read and write
F65000
stack
page read and write
2AF0000
direct allocation
page read and write
2D30000
direct allocation
page read and write
4E31000
heap
page read and write
481F000
stack
page read and write
496F000
stack
page read and write
4FC0000
direct allocation
page execute and read and write
4A30000
direct allocation
page read and write
2EDF000
stack
page read and write
44D1000
heap
page read and write
79F4000
heap
page read and write
7940000
heap
page read and write
C94000
heap
page read and write
5110000
direct allocation
page execute and read and write
1710000
direct allocation
page read and write
311C000
trusted library allocation
page read and write
44D1000
heap
page read and write
4850000
direct allocation
page read and write
1D350000
trusted library allocation
page read and write
5480000
direct allocation
page execute and read and write
352B000
trusted library allocation
page read and write
2AE0000
heap
page read and write
DB4000
heap
page read and write
46DF000
stack
page read and write
3D5F000
stack
page read and write
FF4000
heap
page read and write
E09000
unkown
page write copy
1507000
heap
page read and write
1084000
heap
page read and write
3751000
trusted library allocation
page read and write
2C9E000
stack
page read and write
DB4000
heap
page read and write
E54000
heap
page read and write
136D000
stack
page read and write
4631000
heap
page read and write
759000
unkown
page read and write
4E31000
heap
page read and write
E54000
heap
page read and write
4C10000
direct allocation
page execute and read and write
45F1000
heap
page read and write
E54000
heap
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
4AF1000
heap
page read and write
1D3B4000
heap
page read and write
38CF000
stack
page read and write
336E000
stack
page read and write
44D1000
heap
page read and write
E74000
heap
page read and write
4861000
heap
page read and write
644000
heap
page read and write
E96000
heap
page read and write
2870000
direct allocation
page read and write
2F8E000
stack
page read and write
DF0000
unkown
page readonly
1019000
heap
page read and write
DB4000
heap
page read and write
149000
unkown
page read and write
DA0000
heap
page read and write
F20000
direct allocation
page read and write
C94000
heap
page read and write
4A71000
heap
page read and write
148A000
heap
page read and write
49E1000
heap
page read and write
13DB000
trusted library allocation
page execute and read and write
45F1000
heap
page read and write
644000
heap
page read and write
E7A000
heap
page read and write
C40000
trusted library allocation
page read and write
10C1000
unkown
page execute and write copy
14ED000
heap
page read and write
E1000
unkown
page execute and write copy
5090000
direct allocation
page execute and read and write
C94000
heap
page read and write
4761000
heap
page read and write
E54000
heap
page read and write
2B9B000
heap
page read and write
1084000
heap
page read and write
564E000
stack
page read and write
5DF0000
heap
page read and write
374C000
trusted library allocation
page read and write
176E000
stack
page read and write
4DF0000
direct allocation
page execute and read and write
480E000
stack
page read and write
E74000
heap
page read and write
301F000
stack
page read and write
6D1C000
stack
page read and write
44D1000
heap
page read and write
2CEF000
stack
page read and write
720000
direct allocation
page read and write
E74000
heap
page read and write
FDA000
heap
page read and write
50A0000
direct allocation
page execute and read and write
44D1000
heap
page read and write
1084000
heap
page read and write
4631000
heap
page read and write
4861000
heap
page read and write
A3D000
unkown
page execute and write copy
EBC000
unkown
page write copy
43AE000
stack
page read and write
4861000
heap
page read and write
317D000
trusted library allocation
page read and write
30EE000
stack
page read and write
6D4F000
trusted library allocation
page read and write
4850000
direct allocation
page read and write
58CE000
stack
page read and write
DB4000
heap
page read and write
1CBEE000
stack
page read and write
13A4000
trusted library allocation
page read and write
4A30000
direct allocation
page read and write
1516000
heap
page read and write
3CBE000
stack
page read and write
5530000
direct allocation
page execute and read and write
2B0F000
stack
page read and write
E54000
heap
page read and write
540000
unkown
page read and write
4631000
heap
page read and write
504C000
stack
page read and write
47E1000
heap
page read and write
81E000
heap
page read and write
E74000
heap
page read and write
E74000
heap
page read and write
4AF1000
heap
page read and write
2B8B000
stack
page read and write
17FA000
heap
page read and write
5F6D000
stack
page read and write
3EEF000
stack
page read and write
40AF000
stack
page read and write
4AF6000
heap
page read and write
6E75000
trusted library allocation
page read and write
F8E000
stack
page read and write
45F1000
heap
page read and write
E54000
heap
page read and write
49E1000
heap
page read and write
4861000
heap
page read and write
5650000
direct allocation
page execute and read and write
E54000
heap
page read and write
7335F000
unkown
page readonly
9D0000
trusted library allocation
page read and write
9FF000
unkown
page execute and read and write
1200000
direct allocation
page read and write
DE7000
heap
page read and write
E74000
heap
page read and write
4631000
heap
page read and write
3663000
trusted library allocation
page read and write
4E31000
heap
page read and write
FD2000
heap
page read and write
3011000
trusted library allocation
page read and write
4A81000
heap
page read and write
C94000
heap
page read and write
3708000
trusted library allocation
page read and write
F3D000
stack
page read and write
36AF000
stack
page read and write
5650000
trusted library allocation
page read and write
399F000
stack
page read and write
45F1000
heap
page read and write
45F1000
heap
page read and write
360C000
trusted library allocation
page read and write
DB1000
unkown
page execute and write copy
6E3000
unkown
page execute and read and write
4E80000
direct allocation
page execute and read and write
4E31000
heap
page read and write
9FE000
unkown
page execute and write copy
4E70000
direct allocation
page read and write
346F000
stack
page read and write
E74000
heap
page read and write
9AE000
stack
page read and write
29AF000
stack
page read and write
14EF000
heap
page read and write
E74000
heap
page read and write
4631000
heap
page read and write
E74000
heap
page read and write
2FEE000
stack
page read and write
485E000
stack
page read and write
4AF0000
direct allocation
page execute and read and write
1030000
heap
page read and write
4AF1000
heap
page read and write
45F1000
heap
page read and write
3CDF000
stack
page read and write
541000
unkown
page execute and write copy
49E1000
heap
page read and write
DB4000
heap
page read and write
F8E000
stack
page read and write
2B70000
direct allocation
page execute and read and write
4850000
direct allocation
page read and write
1084000
heap
page read and write
5930000
trusted library allocation
page read and write
6EB6000
heap
page read and write
B90000
heap
page read and write
4E31000
heap
page read and write
332E000
stack
page read and write
49E1000
heap
page read and write
4861000
heap
page read and write
4FE0000
direct allocation
page execute and read and write
7930000
heap
page read and write
61DE000
stack
page read and write
4861000
heap
page read and write
4E31000
heap
page read and write
4AF1000
heap
page read and write
E74000
heap
page read and write
1D302000
heap
page read and write
5030000
direct allocation
page execute and read and write
5000000
direct allocation
page execute and read and write
4BDF000
stack
page read and write
409F000
stack
page read and write
44D1000
heap
page read and write
4861000
heap
page read and write
4631000
heap
page read and write
3E8D000
stack
page read and write
3854000
trusted library allocation
page read and write
5793000
heap
page read and write
E54000
heap
page read and write
D54000
heap
page read and write
9EF000
unkown
page execute and read and write
1084000
heap
page read and write
D54000
heap
page read and write
19EF000
stack
page read and write
7E2C000
stack
page read and write
A1C000
heap
page read and write
44D1000
heap
page read and write
349F000
stack
page read and write
51B0000
direct allocation
page execute and read and write
7E6000
heap
page read and write
2E4F000
stack
page read and write
E19000
unkown
page write copy
E74000
heap
page read and write
3A0F000
stack
page read and write
9FE000
stack
page read and write
1410000
heap
page read and write
2EEE000
stack
page read and write
490F000
stack
page read and write
334F000
stack
page read and write
45EF000
stack
page read and write
78E000
heap
page read and write
2F6E000
stack
page read and write
3524000
trusted library allocation
page read and write
10A0000
heap
page read and write
E74000
heap
page read and write
4AF1000
heap
page read and write
47E1000
heap
page read and write
396E000
stack
page read and write
5BDE000
stack
page read and write
37EE000
trusted library allocation
page read and write
44D1000
heap
page read and write
48EF000
stack
page read and write
4861000
heap
page read and write
6AB5000
trusted library allocation
page read and write
1CB6E000
stack
page read and write
4F80000
trusted library allocation
page read and write
6E30000
trusted library allocation
page read and write
2E30000
heap
page read and write
5060000
direct allocation
page execute and read and write
4E31000
heap
page read and write
13C2000
trusted library allocation
page read and write
79D5000
heap
page read and write
1220000
heap
page read and write
6F1000
unkown
page execute and write copy
A34000
heap
page read and write
36EF000
stack
page read and write
45F1000
heap
page read and write
471E000
stack
page read and write
578E000
stack
page read and write
462E000
stack
page read and write
1084000
heap
page read and write
E54000
heap
page read and write
3EAE000
stack
page read and write
2D30000
direct allocation
page read and write
EB2000
unkown
page readonly
53E000
stack
page read and write
E54000
heap
page read and write
4E70000
direct allocation
page read and write
4BE4000
heap
page read and write
E74000
heap
page read and write
37CC000
trusted library allocation
page read and write
47E1000
heap
page read and write
E54000
heap
page read and write
45F1000
heap
page read and write
1390000
trusted library allocation
page read and write
1305000
heap
page read and write
346E000
stack
page read and write
DCE000
heap
page read and write
511C000
stack
page read and write
E3C000
stack
page read and write
3615000
trusted library allocation
page read and write
4AF1000
heap
page read and write
45EF000
stack
page read and write
3FEE000
stack
page read and write
45F1000
heap
page read and write
4AA0000
direct allocation
page execute and read and write
4A71000
heap
page read and write
4861000
heap
page read and write
1440000
heap
page read and write
34FF000
stack
page read and write
E54000
heap
page read and write
45F1000
heap
page read and write
396F000
stack
page read and write
4A71000
heap
page read and write
4FE000
stack
page read and write
4A41000
heap
page read and write
49E1000
heap
page read and write
425F000
stack
page read and write
D70000
heap
page read and write
3A6F000
stack
page read and write
40EF000
stack
page read and write
7D00000
heap
page read and write
F10000
heap
page read and write
5ADD000
stack
page read and write
4861000
heap
page read and write
4E31000
heap
page read and write
445F000
stack
page read and write
45F1000
heap
page read and write
E54000
heap
page read and write
2E2F000
stack
page read and write
644000
heap
page read and write
7DAE000
stack
page read and write
4FE1000
direct allocation
page read and write
4D2F000
stack
page read and write
47E1000
heap
page read and write
6F70000
trusted library allocation
page read and write
1084000
heap
page read and write
1CCBE000
stack
page read and write
4861000
heap
page read and write
1CECE000
stack
page read and write
327F000
stack
page read and write
54F0000
direct allocation
page execute and read and write
49E1000
heap
page read and write
1379000
heap
page read and write
644000
heap
page read and write
30EF000
stack
page read and write
3D9E000
stack
page read and write
312E000
stack
page read and write
1D300000
heap
page read and write
4A71000
heap
page read and write
311E000
stack
page read and write
2BA0000
heap
page read and write
2D2F000
stack
page read and write
45F1000
heap
page read and write
4861000
heap
page read and write
E73000
heap
page read and write
47E1000
heap
page read and write
45F1000
heap
page read and write
2D30000
direct allocation
page read and write
9E5000
unkown
page execute and read and write
4E31000
heap
page read and write
4861000
heap
page read and write
3E6F000
stack
page read and write
671E000
stack
page read and write
E54000
heap
page read and write
33EE000
stack
page read and write
4A30000
direct allocation
page read and write
28A7000
heap
page read and write
4AEF000
stack
page read and write
5760000
trusted library allocation
page execute and read and write
D50000
heap
page read and write
F37000
heap
page read and write
5C5000
unkown
page execute and read and write
3BDE000
stack
page read and write
4A71000
heap
page read and write
644000
heap
page read and write
50F0000
direct allocation
page execute and read and write
494E000
stack
page read and write
4E31000
heap
page read and write
E74000
heap
page read and write
416E000
stack
page read and write
37AE000
stack
page read and write
D0E000
stack
page read and write
1D5C0000
heap
page read and write
4E40000
direct allocation
page read and write
68FE000
stack
page read and write
352E000
stack
page read and write
D54000
heap
page read and write
2FEF000
stack
page read and write
33FE000
stack
page read and write
201000
unkown
page execute and write copy
2D30000
heap
page read and write
1200000
direct allocation
page read and write
342F000
stack
page read and write
1200000
direct allocation
page read and write
2F4F000
stack
page read and write
E54000
heap
page read and write
3C2D000
stack
page read and write
A2D000
unkown
page execute and read and write
BD6000
unkown
page execute and read and write
67B8000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
E54000
heap
page read and write
3E4F000
stack
page read and write
420F000
stack
page read and write
4B20000
direct allocation
page execute and read and write
45E000
unkown
page execute and read and write
44D1000
heap
page read and write
4E70000
direct allocation
page read and write
7F5000
heap
page read and write
59CF000
stack
page read and write
E74000
heap
page read and write
1405000
heap
page read and write
46BE000
stack
page read and write
1D0AE000
stack
page read and write
4FC1000
heap
page read and write
3EDE000
stack
page read and write
44D1000
heap
page read and write
6F40000
heap
page read and write
1D2EF000
stack
page read and write
4D20000
direct allocation
page execute and read and write
DA0000
unkown
page read and write
771000
heap
page read and write
462F000
stack
page read and write
1084000
heap
page read and write
4631000
heap
page read and write
4E31000
heap
page read and write
10AB000
unkown
page execute and read and write
1D62F000
stack
page read and write
4E70000
direct allocation
page read and write
4AF1000
heap
page read and write
44D1000
heap
page read and write
E54000
heap
page read and write
1450000
heap
page read and write
110E000
stack
page read and write
49E1000
heap
page read and write
39AE000
stack
page read and write
4861000
heap
page read and write
D3F000
stack
page read and write
9FD000
unkown
page execute and read and write
5190000
direct allocation
page execute and read and write
422F000
stack
page read and write
314C000
trusted library allocation
page read and write
459E000
stack
page read and write
3B4F000
stack
page read and write
1CE9E000
stack
page read and write
1CF2E000
stack
page read and write
D54000
heap
page read and write
1080000
heap
page read and write
FBD000
heap
page read and write
69B0000
trusted library allocation
page execute and read and write
A3C000
unkown
page execute and read and write
4761000
heap
page read and write
30AF000
stack
page read and write
126A000
unkown
page execute and write copy
644000
heap
page read and write
262000
unkown
page execute and read and write
2AF0000
direct allocation
page read and write
644000
heap
page read and write
6BF000
unkown
page execute and read and write
44AF000
stack
page read and write
142000
unkown
page execute and read and write
31EF000
stack
page read and write
1AB000
stack
page read and write
2E9F000
stack
page read and write
4850000
direct allocation
page read and write
43EE000
stack
page read and write
E02000
unkown
page execute and read and write
69EE000
stack
page read and write
1C9EF000
stack
page read and write
55E0000
direct allocation
page execute and read and write
1084000
heap
page read and write
56B0000
trusted library allocation
page read and write
44D1000
heap
page read and write
35CF000
stack
page read and write
E1B000
unkown
page execute and read and write
1D08C000
stack
page read and write
6E41000
trusted library allocation
page read and write
4861000
heap
page read and write
4861000
heap
page read and write
412F000
stack
page read and write
4631000
heap
page read and write
5040000
direct allocation
page execute and read and write
13BD000
trusted library allocation
page execute and read and write
13EF000
stack
page read and write
4C50000
direct allocation
page execute and read and write
165B000
heap
page read and write
44AF000
stack
page read and write
41DE000
stack
page read and write
4A71000
heap
page read and write
45F1000
heap
page read and write
E74000
heap
page read and write
4631000
heap
page read and write
928000
unkown
page execute and read and write
1084000
heap
page read and write
376F000
stack
page read and write
4E20000
direct allocation
page read and write
99F000
stack
page read and write
8E0000
heap
page read and write
59CE000
stack
page read and write
1084000
heap
page read and write
127A000
unkown
page execute and write copy
6D55000
trusted library allocation
page read and write
1084000
heap
page read and write
6F0000
unkown
page readonly
4A71000
heap
page read and write
44D1000
heap
page read and write
E74000
heap
page read and write
49E1000
heap
page read and write
FF0000
heap
page read and write
E74000
heap
page read and write
2F9F000
stack
page read and write
44D1000
heap
page read and write
7F5000
heap
page read and write
6908000
trusted library allocation
page read and write
44D1000
heap
page read and write
49E1000
heap
page read and write
4BC0000
direct allocation
page execute and read and write
45F1000
heap
page read and write
32EF000
stack
page read and write
4C1E000
stack
page read and write
E54000
heap
page read and write
2FAE000
stack
page read and write
3B1E000
stack
page read and write
4850000
direct allocation
page read and write
381E000
stack
page read and write
44D1000
heap
page read and write
4E31000
heap
page read and write
BD7000
unkown
page execute and write copy
401D000
stack
page read and write
6DFD000
stack
page read and write
4861000
heap
page read and write
6F0000
unkown
page read and write
3CAE000
stack
page read and write
4ED0000
direct allocation
page read and write
2B4F000
stack
page read and write
4D30000
direct allocation
page execute and read and write
DA0000
direct allocation
page read and write
4861000
heap
page read and write
1010000
heap
page read and write
DB0000
unkown
page read and write
E74000
heap
page read and write
10FE000
stack
page read and write
31EF000
stack
page read and write
959E000
stack
page read and write
49E1000
heap
page read and write
44D1000
heap
page read and write
44D1000
heap
page read and write
EE0000
direct allocation
page read and write
462E000
stack
page read and write
3241000
trusted library allocation
page read and write
3BEF000
stack
page read and write
486F000
stack
page read and write
4A90000
direct allocation
page execute and read and write
4780000
heap
page read and write
2FE7000
heap
page read and write
4AE0000
direct allocation
page execute and read and write
3668000
trusted library allocation
page read and write
9C4000
trusted library allocation
page read and write
44D1000
heap
page read and write
1710000
direct allocation
page read and write
3858000
trusted library allocation
page read and write
108F000
unkown
page execute and read and write
1084000
heap
page read and write
9E5000
unkown
page execute and read and write
636E000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
E74000
heap
page read and write
45F1000
heap
page read and write
3C0E000
stack
page read and write
44AD000
stack
page read and write
459F000
stack
page read and write
4C20000
trusted library allocation
page read and write
7E2000
heap
page read and write
3DDF000
stack
page read and write
4861000
heap
page read and write
47E1000
heap
page read and write
3BAF000
stack
page read and write
7DEE000
stack
page read and write
5480000
direct allocation
page execute and read and write
402F000
stack
page read and write
44D1000
heap
page read and write
5670000
direct allocation
page execute and read and write
4E20000
direct allocation
page read and write
49E1000
heap
page read and write
4631000
heap
page read and write
574E000
stack
page read and write
2D30000
direct allocation
page read and write
4E31000
heap
page read and write
E74000
heap
page read and write
4FF4000
heap
page read and write
3B0000
unkown
page readonly
1459000
heap
page read and write
1312000
heap
page read and write
2C5F000
stack
page read and write
45F1000
heap
page read and write
388E000
stack
page read and write
4E20000
direct allocation
page read and write
27AF000
stack
page read and write
4E20000
direct allocation
page read and write
D54000
heap
page read and write
3FDE000
stack
page read and write
D54000
heap
page read and write
CF5000
stack
page read and write
E74000
heap
page read and write
E54000
heap
page read and write
47E1000
heap
page read and write
DB4000
heap
page read and write
DB4000
heap
page read and write
DB4000
heap
page read and write
2B90000
heap
page read and write
DFF000
stack
page read and write
DAF000
stack
page read and write
75B000
unkown
page execute and read and write
6670000
heap
page read and write
47E1000
heap
page read and write
2F70000
heap
page read and write
FED000
heap
page read and write
F00000
direct allocation
page read and write
4E31000
heap
page read and write
4631000
heap
page read and write
4A71000
heap
page read and write
4A30000
direct allocation
page read and write
1CDEE000
stack
page read and write
2FDE000
stack
page read and write
E54000
heap
page read and write
45F1000
heap
page read and write
47E1000
heap
page read and write
3F5E000
stack
page read and write
3B2000
unkown
page readonly
4861000
heap
page read and write
44D1000
heap
page read and write
6D5B000
stack
page read and write
DB4000
heap
page read and write
362F000
stack
page read and write
44A000
unkown
page execute and read and write
425F000
stack
page read and write
786000
heap
page read and write
49E1000
heap
page read and write
1CBAF000
stack
page read and write
44D1000
heap
page read and write
454F000
stack
page read and write
E54000
heap
page read and write
2BFE000
stack
page read and write
E74000
heap
page read and write
4A90000
direct allocation
page execute and read and write
E54000
heap
page read and write
5680000
heap
page execute and read and write
554F000
stack
page read and write
5D4B000
stack
page read and write
44D1000
heap
page read and write
6D5F000
trusted library allocation
page read and write
E54000
heap
page read and write
40EF000
stack
page read and write
79F000
heap
page read and write
35EE000
stack
page read and write
44CF000
stack
page read and write
A25000
heap
page read and write
4A30000
direct allocation
page read and write
2AEE000
stack
page read and write
D54000
heap
page read and write
1084000
heap
page read and write
809000
heap
page read and write
79E000
unkown
page execute and read and write
13F0000
trusted library allocation
page read and write
503F000
stack
page read and write
4FA0000
heap
page read and write
4AB0000
trusted library allocation
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
896000
unkown
page execute and read and write
1CB2E000
stack
page read and write
3BEF000
stack
page read and write
5460000
direct allocation
page execute and read and write
4AB0000
direct allocation
page read and write
3AEF000
stack
page read and write
45DE000
stack
page read and write
4631000
heap
page read and write
10D5000
heap
page read and write
E74000
heap
page read and write
5070000
direct allocation
page execute and read and write
45F1000
heap
page read and write
E74000
heap
page read and write
5C8000
unkown
page execute and read and write
4631000
heap
page read and write
47E1000
heap
page read and write
47EE000
stack
page read and write
4861000
heap
page read and write
5000000
direct allocation
page execute and read and write
EE0000
heap
page read and write
10C3000
unkown
page execute and read and write
361E000
stack
page read and write
2BEF000
stack
page read and write
1D52E000
stack
page read and write
995000
stack
page read and write
5470000
direct allocation
page execute and read and write
355E000
stack
page read and write
1084000
heap
page read and write
6C2C000
stack
page read and write
4861000
heap
page read and write
362A000
trusted library allocation
page read and write
3FCE000
stack
page read and write
2ED0000
remote allocation
page read and write
6F0000
unkown
page read and write
4D40000
direct allocation
page execute and read and write
4A71000
heap
page read and write
4AF1000
heap
page read and write
4631000
heap
page read and write
1084000
heap
page read and write
C20000
heap
page execute and read and write
1084000
heap
page read and write
414E000
stack
page read and write
3845000
trusted library allocation
page read and write
3C8F000
stack
page read and write
3E6E000
stack
page read and write
4AF1000
heap
page read and write
D80000
direct allocation
page read and write
5F1000
unkown
page execute and read and write
10C1000
unkown
page execute and read and write
9FD000
unkown
page execute and write copy
4E31000
heap
page read and write
797A000
heap
page read and write
5030000
direct allocation
page execute and read and write
1656000
heap
page read and write
1020000
direct allocation
page read and write
4ADE000
stack
page read and write
FF4000
heap
page read and write
759000
unkown
page read and write
E8F000
heap
page read and write
4F80000
direct allocation
page read and write
4B7F000
stack
page read and write
44D1000
heap
page read and write
74A000
heap
page read and write
390E000
stack
page read and write
4AF1000
heap
page read and write
C94000
heap
page read and write
47E1000
heap
page read and write
720000
direct allocation
page read and write
383C000
trusted library allocation
page read and write
269E000
stack
page read and write
47E1000
heap
page read and write
4C60000
direct allocation
page read and write
720000
direct allocation
page read and write
55D0000
direct allocation
page execute and read and write
4E31000
heap
page read and write
63D2000
heap
page read and write
2D30000
direct allocation
page read and write
752000
unkown
page execute and read and write
321F000
stack
page read and write
F35000
stack
page read and write
350F000
stack
page read and write
3AEE000
stack
page read and write
44D1000
heap
page read and write
E9A000
stack
page read and write
E74000
heap
page read and write
597D000
stack
page read and write
13D0000
heap
page read and write
D54000
heap
page read and write
3C1F000
stack
page read and write
4761000
heap
page read and write
759000
unkown
page write copy
1D204000
heap
page read and write
C94000
heap
page read and write
3C2F000
stack
page read and write
C94000
heap
page read and write
4E60000
direct allocation
page read and write
4AF1000
heap
page read and write
C50000
heap
page read and write
1084000
heap
page read and write
4A71000
heap
page read and write
43AB000
trusted library allocation
page read and write
5110000
direct allocation
page execute and read and write
79E000
unkown
page execute and read and write
C94000
heap
page read and write
6680000
heap
page read and write
5B8E000
stack
page read and write
45AE000
stack
page read and write
410F000
stack
page read and write
4960000
trusted library allocation
page read and write
461F000
stack
page read and write
47FE000
stack
page read and write
1020000
direct allocation
page read and write
2AAF000
stack
page read and write
375E000
stack
page read and write
F20000
heap
page read and write
369F000
stack
page read and write
6D2C000
stack
page read and write
10D1000
unkown
page execute and write copy
EE5000
heap
page read and write
4E31000
heap
page read and write
4761000
heap
page read and write
2F4F000
stack
page read and write
2E2000
unkown
page execute and read and write
1CA2E000
stack
page read and write
4E31000
heap
page read and write
4E46000
heap
page read and write
4AF1000
heap
page read and write
D80000
direct allocation
page read and write
54A0000
direct allocation
page execute and read and write
137D000
stack
page read and write
49E1000
heap
page read and write
110E000
stack
page read and write
325E000
stack
page read and write
108F000
unkown
page execute and read and write
59E8000
trusted library allocation
page read and write
7946000
heap
page read and write
4A71000
heap
page read and write
1710000
direct allocation
page read and write
4631000
heap
page read and write
4861000
heap
page read and write
4761000
heap
page read and write
6E77000
trusted library allocation
page read and write
4FD0000
direct allocation
page execute and read and write
47E1000
heap
page read and write
4AEE000
stack
page read and write
4761000
heap
page read and write
E74000
heap
page read and write
E74000
heap
page read and write
1D10D000
stack
page read and write
2870000
direct allocation
page read and write
44D1000
heap
page read and write
55B0000
direct allocation
page execute and read and write
44D1000
heap
page read and write
CFE000
stack
page read and write
45F1000
heap
page read and write
4A71000
heap
page read and write
759000
unkown
page read and write
4861000
heap
page read and write
45F1000
heap
page read and write
4E31000
heap
page read and write
F5A000
heap
page read and write
4F1E000
stack
page read and write
4631000
heap
page read and write
49E1000
heap
page read and write
1C0000
heap
page read and write
1D1B0000
heap
page read and write
5A2000
unkown
page execute and read and write
1084000
heap
page read and write
540000
unkown
page read and write
44D1000
heap
page read and write
E54000
heap
page read and write
2E6F000
stack
page read and write
3D6E000
stack
page read and write
F20000
direct allocation
page read and write
15F9000
heap
page read and write
132E000
heap
page read and write
1084000
heap
page read and write
412E000
stack
page read and write
4E20000
direct allocation
page read and write
492E000
stack
page read and write
4C60000
direct allocation
page execute and read and write
4E31000
heap
page read and write
44D1000
heap
page read and write
C94000
heap
page read and write
400E000
stack
page read and write
41AE000
stack
page read and write
4E50000
heap
page read and write
E74000
heap
page read and write
7FC000
heap
page read and write
DB4000
heap
page read and write
E86000
heap
page read and write
44D1000
heap
page read and write
E54000
heap
page read and write
D54000
heap
page read and write
1487000
heap
page read and write
1D2AE000
stack
page read and write
52D0000
direct allocation
page read and write
1CD8E000
stack
page read and write
3735000
trusted library allocation
page read and write
49E1000
heap
page read and write
544D000
stack
page read and write
1720000
heap
page read and write
1269000
heap
page read and write
2D30000
direct allocation
page read and write
50E0000
direct allocation
page execute and read and write
45F1000
heap
page read and write
336E000
stack
page read and write
3515000
trusted library allocation
page read and write
75B000
unkown
page execute and read and write
4861000
heap
page read and write
6AA0000
trusted library allocation
page read and write
1CE4D000
stack
page read and write
436F000
stack
page read and write
5CB0000
heap
page read and write
1084000
heap
page read and write
445E000
stack
page read and write
FF4000
heap
page read and write
114E000
stack
page read and write
36DE000
stack
page read and write
4861000
heap
page read and write
4E20000
direct allocation
page read and write
4AF1000
heap
page read and write
5310000
direct allocation
page read and write
E74000
heap
page read and write
2AAF000
stack
page read and write
370E000
stack
page read and write
E74000
heap
page read and write
72FE000
stack
page read and write
2F1E000
stack
page read and write
644000
heap
page read and write
5D0E000
stack
page read and write
45F1000
heap
page read and write
1084000
heap
page read and write
4A71000
heap
page read and write
424F000
stack
page read and write
7D01000
heap
page read and write
45F1000
heap
page read and write
368E000
stack
page read and write
DB4000
heap
page read and write
45F1000
heap
page read and write
6FC000
unkown
page execute and write copy
1CDAE000
stack
page read and write
262000
unkown
page execute and read and write
32FA000
trusted library allocation
page read and write
1020000
direct allocation
page read and write
45F1000
heap
page read and write
4761000
heap
page read and write
1516000
heap
page read and write
1084000
heap
page read and write
170E000
stack
page read and write
4FD0000
direct allocation
page execute and read and write
9FD000
unkown
page execute and write copy
39EE000
stack
page read and write
1300000
heap
page read and write
372E000
stack
page read and write
8D7000
unkown
page execute and read and write
960000
heap
page read and write
720000
direct allocation
page read and write
321F000
stack
page read and write
DB4000
heap
page read and write
3E2F000
stack
page read and write
D54000
heap
page read and write
4761000
heap
page read and write
C94000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
50FB000
stack
page read and write
44EE000
stack
page read and write
44D1000
heap
page read and write
47E1000
heap
page read and write
6D4A000
trusted library allocation
page read and write
4861000
heap
page read and write
45F1000
heap
page read and write
C94000
heap
page read and write
4C00000
direct allocation
page execute and read and write
F4C000
heap
page read and write
9EC000
stack
page read and write
47E1000
heap
page read and write
4AB0000
direct allocation
page read and write
37E7000
trusted library allocation
page read and write
2B6E000
stack
page read and write
4630000
heap
page read and write
4CEB000
stack
page read and write
2870000
direct allocation
page read and write
CDC000
stack
page read and write
45F1000
heap
page read and write
44D1000
heap
page read and write
379F000
stack
page read and write
799F000
heap
page read and write
DB4000
heap
page read and write
644000
heap
page read and write
4631000
heap
page read and write
4861000
heap
page read and write
6F0000
unkown
page readonly
47E0000
heap
page read and write
3B5F000
stack
page read and write
4861000
heap
page read and write
4850000
direct allocation
page read and write
E54000
heap
page read and write
1CEEF000
stack
page read and write
D54000
heap
page read and write
4AF1000
heap
page read and write
71D0000
trusted library allocation
page read and write
C94000
heap
page read and write
4861000
heap
page read and write
1020000
direct allocation
page read and write
E54000
heap
page read and write
36EF000
stack
page read and write
4A71000
heap
page read and write
5A61000
heap
page read and write
6F0000
unkown
page read and write
621F000
stack
page read and write
45F1000
heap
page read and write
644000
heap
page read and write
1084000
heap
page read and write
E11000
heap
page read and write
14CF000
heap
page read and write
D54000
heap
page read and write
D54000
heap
page read and write
E15000
heap
page read and write
354E000
stack
page read and write
928000
unkown
page execute and read and write
7B8000
heap
page read and write
E74000
heap
page read and write
151A000
heap
page read and write
E74000
heap
page read and write
2A4E000
stack
page read and write
925000
heap
page read and write
4761000
heap
page read and write
6080000
heap
page read and write
49E1000
heap
page read and write
1710000
direct allocation
page read and write
334E000
stack
page read and write
4E80000
direct allocation
page execute and read and write
376E000
stack
page read and write
1200000
direct allocation
page read and write
64DC000
stack
page read and write
4FD0000
direct allocation
page execute and read and write
302E000
stack
page read and write
4AF1000
heap
page read and write
4A71000
heap
page read and write
E9E000
stack
page read and write
47E1000
heap
page read and write
14D4000
heap
page read and write
DC0000
heap
page read and write
EE0000
direct allocation
page read and write
4E00000
heap
page read and write
44D1000
heap
page read and write
44DF000
stack
page read and write
2ED0000
remote allocation
page read and write
54CE000
stack
page read and write
DB4000
heap
page read and write
9FE000
unkown
page execute and write copy
4761000
heap
page read and write
4631000
heap
page read and write
10D2000
unkown
page execute and write copy
1D200000
heap
page read and write
4AF1000
heap
page read and write
339E000
stack
page read and write
55F1000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
45F1000
heap
page read and write
2D47000
heap
page read and write
45F1000
heap
page read and write
4A71000
heap
page read and write
E74000
heap
page read and write
4E70000
direct allocation
page read and write
3E6F000
stack
page read and write
2870000
direct allocation
page read and write
29CE000
stack
page read and write
36EE000
stack
page read and write
4E31000
heap
page read and write
133C000
stack
page read and write
45F1000
heap
page read and write
5620000
direct allocation
page execute and read and write
1084000
heap
page read and write
38FE000
stack
page read and write
430E000
stack
page read and write
1020000
direct allocation
page read and write
45F1000
heap
page read and write
4F8F000
stack
page read and write
4E70000
direct allocation
page read and write
DB4000
heap
page read and write
4C30000
direct allocation
page execute and read and write
4E70000
direct allocation
page read and write
928000
unkown
page execute and read and write
1084000
heap
page read and write
1084000
heap
page read and write
6D5A000
trusted library allocation
page read and write
1710000
direct allocation
page read and write
615E000
stack
page read and write
5450000
direct allocation
page read and write
44D1000
heap
page read and write
1544000
heap
page read and write
FF4000
heap
page read and write
D54000
heap
page read and write
6E3B000
trusted library allocation
page read and write
7060000
trusted library allocation
page execute and read and write
E74000
heap
page read and write
DB4000
heap
page read and write
1084000
heap
page read and write
7BF000
stack
page read and write
541000
unkown
page execute and write copy
E54000
heap
page read and write
4C30000
direct allocation
page execute and read and write
79B9000
heap
page read and write
28F000
unkown
page execute and read and write
E54000
heap
page read and write
2740000
heap
page read and write
1297000
heap
page read and write
3A5F000
stack
page read and write
44D1000
heap
page read and write
DA0000
direct allocation
page read and write
1CF4D000
stack
page read and write
4861000
heap
page read and write
E74000
heap
page read and write
14FB000
heap
page read and write
46EF000
stack
page read and write
29E0000
direct allocation
page execute and read and write
4A71000
heap
page read and write
540000
unkown
page readonly
5600000
direct allocation
page execute and read and write
F6D000
heap
page read and write
4850000
direct allocation
page read and write
1D1EE000
stack
page read and write
3397000
heap
page read and write
E54000
heap
page read and write
E54000
heap
page read and write
40DE000
stack
page read and write
5460000
direct allocation
page execute and read and write
1020000
direct allocation
page read and write
800000
heap
page read and write
E54000
heap
page read and write
2FEF000
stack
page read and write
644000
heap
page read and write
429E000
stack
page read and write
2C2E000
stack
page read and write
396F000
stack
page read and write
B94000
unkown
page execute and read and write
4850000
direct allocation
page read and write
1D14D000
stack
page read and write
1D20E000
stack
page read and write
4AF1000
heap
page read and write
661E000
stack
page read and write
41DF000
stack
page read and write
5610000
trusted library allocation
page read and write
49E1000
heap
page read and write
4CFE000
stack
page read and write
44D1000
heap
page read and write
1696000
heap
page read and write
4E81000
heap
page read and write
4861000
heap
page read and write
E8F000
heap
page read and write
13D2000
trusted library allocation
page read and write
37BF000
trusted library allocation
page read and write
3F5F000
stack
page read and write
4AF1000
heap
page read and write
E74000
heap
page read and write
1084000
heap
page read and write
4FC1000
heap
page read and write
E74000
heap
page read and write
1084000
heap
page read and write
1D450000
trusted library allocation
page read and write
6D64000
trusted library allocation
page read and write
4A71000
heap
page read and write
E74000
heap
page read and write
2FDE000
stack
page read and write
5FEF000
stack
page read and write
E9D000
heap
page read and write
1400000
heap
page read and write
33AF000
stack
page read and write
644000
heap
page read and write
2870000
direct allocation
page read and write
E54000
heap
page read and write
1084000
heap
page read and write
47E2000
heap
page read and write
6FC000
unkown
page execute and read and write
339E000
stack
page read and write
356F000
stack
page read and write
4AF1000
heap
page read and write
4861000
heap
page read and write
598C000
stack
page read and write
384F000
stack
page read and write
6F90000
trusted library allocation
page read and write
6E3000
unkown
page execute and read and write
349F000
stack
page read and write
1084000
heap
page read and write
4C2E000
stack
page read and write
E54000
heap
page read and write
45F1000
heap
page read and write
44D1000
heap
page read and write
4AF1000
heap
page read and write
6D30000
trusted library allocation
page read and write
FA8000
unkown
page execute and read and write
4EC0000
direct allocation
page execute and read and write
1CA2E000
stack
page read and write
2D30000
direct allocation
page read and write
408D000
stack
page read and write
1CE0E000
stack
page read and write
1020000
direct allocation
page read and write
4A71000
heap
page read and write
4E80000
direct allocation
page execute and read and write
4861000
heap
page read and write
A3E000
stack
page read and write
559F000
stack
page read and write
710000
heap
page read and write
897000
unkown
page execute and write copy
4861000
heap
page read and write
4861000
heap
page read and write
E0E000
stack
page read and write
44D1000
heap
page read and write
486E000
stack
page read and write
1410000
heap
page read and write
49E1000
heap
page read and write
2BEE000
stack
page read and write
351B000
trusted library allocation
page read and write
D4E000
stack
page read and write
73356000
unkown
page readonly
39EF000
stack
page read and write
405F000
stack
page read and write
4631000
heap
page read and write
1200000
direct allocation
page read and write
CF0000
heap
page read and write
3657000
trusted library allocation
page read and write
4861000
heap
page read and write
5010000
direct allocation
page execute and read and write
4861000
heap
page read and write
398E000
stack
page read and write
3B2E000
stack
page read and write
4E31000
heap
page read and write
4FD0000
direct allocation
page execute and read and write
644000
heap
page read and write
D90000
heap
page read and write
56A0000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
200000
unkown
page readonly
DA0000
direct allocation
page read and write
4F20000
direct allocation
page execute and read and write
3E0E000
stack
page read and write
720000
direct allocation
page read and write
4A30000
direct allocation
page read and write
E54000
heap
page read and write
3B9F000
stack
page read and write
DA0000
direct allocation
page read and write
5940000
heap
page read and write
39DE000
stack
page read and write
E10000
heap
page read and write
9E5000
unkown
page execute and read and write
1519000
heap
page read and write
DB4000
heap
page read and write
644000
heap
page read and write
109000
stack
page read and write
4A71000
heap
page read and write
1084000
heap
page read and write
6300000
heap
page read and write
6BF000
unkown
page execute and read and write
E54000
heap
page read and write
E6C000
stack
page read and write
C94000
heap
page read and write
A3D000
unkown
page execute and write copy
35AF000
stack
page read and write
E54000
heap
page read and write
E74000
heap
page read and write
4F9F000
stack
page read and write
30AF000
stack
page read and write
E12000
unkown
page execute and read and write
2870000
direct allocation
page read and write
4AEC000
stack
page read and write
4E6F000
stack
page read and write
E54000
heap
page read and write
54D0000
direct allocation
page execute and read and write
4A30000
direct allocation
page read and write
565E000
trusted library allocation
page read and write
FA0000
heap
page read and write
4AF1000
heap
page read and write
33AE000
stack
page read and write
59E0000
trusted library allocation
page read and write
C94000
heap
page read and write
897000
unkown
page execute and write copy
6240000
heap
page read and write
2E2E000
stack
page read and write
47E1000
heap
page read and write
45D0000
trusted library allocation
page read and write
BD6000
unkown
page execute and read and write
E54000
heap
page read and write
38DF000
stack
page read and write
4CF0000
direct allocation
page read and write
E54000
heap
page read and write
DB4000
heap
page read and write
4AF1000
heap
page read and write
44D1000
heap
page read and write
4631000
heap
page read and write
36EF000
stack
page read and write
3706000
trusted library allocation
page read and write
1315000
heap
page read and write
934000
heap
page read and write
4A30000
direct allocation
page read and write
361D000
trusted library allocation
page read and write
4761000
heap
page read and write
200000
unkown
page readonly
465E000
stack
page read and write
C94000
heap
page read and write
6ED000
unkown
page execute and read and write
4CBF000
stack
page read and write
304F000
stack
page read and write
1200000
direct allocation
page read and write
44D1000
heap
page read and write
66BE000
stack
page read and write
2D60000
heap
page read and write
3B0E000
stack
page read and write
3A4E000
stack
page read and write
4A71000
heap
page read and write
4A71000
heap
page read and write
43AE000
stack
page read and write
382F000
stack
page read and write
47E1000
heap
page read and write
45F1000
heap
page read and write
EE0000
direct allocation
page read and write
3594000
trusted library allocation
page read and write
D54000
heap
page read and write
45F1000
heap
page read and write
E54000
heap
page read and write
D54000
heap
page read and write
50F0000
direct allocation
page execute and read and write
E74000
heap
page read and write
37B8000
trusted library allocation
page read and write
37DF000
stack
page read and write
322E000
stack
page read and write
FF4000
heap
page read and write
DB0000
unkown
page readonly
1084000
heap
page read and write
5F1000
unkown
page execute and read and write
4E31000
heap
page read and write
407E000
stack
page read and write
3D1E000
stack
page read and write
2AEF000
stack
page read and write
DB4000
heap
page read and write
FF4000
heap
page read and write
3210000
trusted library allocation
page read and write
8840000
trusted library allocation
page read and write
2D30000
direct allocation
page read and write
3AEE000
stack
page read and write
DC9000
heap
page read and write
3ED000
unkown
page execute and read and write
1725000
heap
page read and write
49E1000
heap
page read and write
651F000
stack
page read and write
470F000
stack
page read and write
4861000
heap
page read and write
4A30000
direct allocation
page read and write
4761000
heap
page read and write
E74000
heap
page read and write
6D39000
trusted library allocation
page read and write
1084000
heap
page read and write
F20000
direct allocation
page read and write
C94000
heap
page read and write
4A71000
heap
page read and write
1084000
heap
page read and write
13D5000
trusted library allocation
page execute and read and write
386F000
stack
page read and write
4AF1000
heap
page read and write
48AE000
stack
page read and write
1D44E000
stack
page read and write
149000
unkown
page write copy
2F2E000
stack
page read and write
364F000
stack
page read and write
4E5F000
stack
page read and write
E74000
heap
page read and write
7DB000
stack
page read and write
4861000
heap
page read and write
40EE000
stack
page read and write
161F000
stack
page read and write
E74000
heap
page read and write
4631000
heap
page read and write
D54000
heap
page read and write
E54000
heap
page read and write
5110000
direct allocation
page execute and read and write
540000
unkown
page readonly
4E31000
heap
page read and write
E54000
heap
page read and write
338E000
stack
page read and write
2D30000
direct allocation
page read and write
45F1000
heap
page read and write
55CF000
stack
page read and write
47E1000
heap
page read and write
794B000
heap
page read and write
13A3000
trusted library allocation
page execute and read and write
C94000
heap
page read and write
4A71000
heap
page read and write
5060000
direct allocation
page execute and read and write
2D30000
direct allocation
page read and write
422E000
stack
page read and write
5B6D000
stack
page read and write
3B9E000
stack
page read and write
39AE000
stack
page read and write
47E1000
heap
page read and write
47E1000
heap
page read and write
4631000
heap
page read and write
975F000
stack
page read and write
45E000
unkown
page execute and read and write
45EE000
stack
page read and write
3390000
heap
page read and write
4761000
heap
page read and write
4253000
trusted library allocation
page read and write
2AF0000
direct allocation
page read and write
6FD000
unkown
page execute and write copy
4AF1000
heap
page read and write
1710000
direct allocation
page read and write
C5B000
stack
page read and write
7180000
trusted library allocation
page read and write
4E31000
heap
page read and write
44D1000
heap
page read and write
4A71000
heap
page read and write
625E000
stack
page read and write
29EF000
stack
page read and write
6F5D000
trusted library allocation
page read and write
28F000
unkown
page execute and read and write
108E000
stack
page read and write
4645000
heap
page read and write
43FF000
stack
page read and write
4AF1000
heap
page read and write
644000
heap
page read and write
5450000
direct allocation
page read and write
12C0000
heap
page read and write
3C7F000
stack
page read and write
4631000
heap
page read and write
3AAE000
stack
page read and write
E74000
heap
page read and write
2ED0000
remote allocation
page read and write
4E31000
heap
page read and write
4E31000
heap
page read and write
759000
unkown
page write copy
501F000
stack
page read and write
5683000
heap
page execute and read and write
There are 3609 hidden memdumps, click here to show them.