IOC Report
z1Quotation.scr.exe

loading gif

Files

File Path
Type
Category
Malicious
z1Quotation.scr.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_z1Quotation.scr._0c583a83ca27c495721c8da0965d5fefb99bec_319e390f_6e567999-aeed-41e3-83e4-b4604fbf4901\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE267.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Sep 30 10:09:20 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE343.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE373.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\LocalLow\Intel\ShaderCache\55ef227cc1d1c888edc3af337e019091d8c0eafc546d066b0a6a76da081ea88f
data
dropped
C:\Users\user\AppData\LocalLow\Intel\ShaderCache\57bf52f84f9bbfff2af5f5bd73dee023aeb97bd173672fd615cdf006f13c5099
data
dropped
C:\Users\user\AppData\Local\D3DSCache\c6e1bc7b336e2cfe\6F75932F-7DFC-4FB0-B4B8-12DE1AC415DA_VEN_8086&DEV_3E98&SUBSYS_3E98&REV_2.idx
data
dropped
C:\Users\user\AppData\Local\D3DSCache\c6e1bc7b336e2cfe\6F75932F-7DFC-4FB0-B4B8-12DE1AC415DA_VEN_8086&DEV_3E98&SUBSYS_3E98&REV_2.lock
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\D3DSCache\c6e1bc7b336e2cfe\6F75932F-7DFC-4FB0-B4B8-12DE1AC415DA_VEN_8086&DEV_3E98&SUBSYS_3E98&REV_2.val
Matlab v4 mat-file (little endian) (, numeric, rows 0, columns 16, imaginary
dropped
C:\Users\user\AppData\Local\D3DSCache\c6e1bc7b336e2cfe\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx
data
dropped
C:\Users\user\AppData\Local\D3DSCache\c6e1bc7b336e2cfe\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\D3DSCache\c6e1bc7b336e2cfe\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val
Matlab v4 mat-file (little endian) (, numeric, rows 0, columns 16, imaginary
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B0ZBZFKQ\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\azdzamjeqinayzgxunqjk
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhv73BF.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x96dfe6b7, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\bhvB84A.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x96dfe6b7, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\bhvF803.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x96dfe6b7, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\jcokhfyxinncnfcgtxknzv
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsi8284.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsi8284.tmp\nsExec.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsx8070.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\sysinfo.txt
ISO-8859 text, with very long lines (1240), with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\xadmhfv
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Profilere55\Fodterapeut.Bew
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Profilere55\Jolines\spirographin.sur
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Profilere55\Jolines\talpatate.luk
DIY-Thermocam raw data (Lepton 2.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 33554432.000000
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Profilere55\Overtakes.fly
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Profilere55\Perichord.str
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Profilere55\Septifragal.fla
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Profilere55\Sesquihydrated12.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Profilere55\Siskenernes.Mom105
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Profilere55\Terpe.dat
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\places.sqlite-shm
data
dropped
There are 24 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\z1Quotation.scr.exe
"C:\Users\user\Desktop\z1Quotation.scr.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "250^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "244^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "227^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "255^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "244^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "253^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "130^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "131^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "139^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "139^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "242^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "195^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "212^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "208^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "197^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "212^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "247^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "216^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "221^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "212^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "240^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "153^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "220^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "145^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "195^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "133^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "145^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "157^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "145^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "216^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "145^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "129^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "201^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "137^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "129^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "129^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "129^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "129^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "129^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "129^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "129^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "157^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "145^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "216^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "145^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "129^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "157^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "145^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "193^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "145^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "129^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "157^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "145^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "216^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "145^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "133^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "157^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "145^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "216^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "145^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "129^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "201^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "137^177"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /a "129^177"
malicious
C:\Users\user\Desktop\z1Quotation.scr.exe
"C:\Users\user\Desktop\z1Quotation.scr.exe"
malicious
C:\Windows\SysWOW64\dxdiag.exe
"C:\Windows\System32\dxdiag.exe" /t C:\Users\user\AppData\Local\Temp\sysinfo.txt
malicious
C:\Users\user\Desktop\z1Quotation.scr.exe
C:\Users\user\Desktop\z1Quotation.scr.exe /stext "C:\Users\user\AppData\Local\Temp\jcokhfyxinncnfcgtxknzv"
malicious
C:\Users\user\Desktop\z1Quotation.scr.exe
C:\Users\user\Desktop\z1Quotation.scr.exe /stext "C:\Users\user\AppData\Local\Temp\hhsvynxt"
malicious
C:\Users\user\Desktop\z1Quotation.scr.exe
C:\Users\user\Desktop\z1Quotation.scr.exe /stext "C:\Users\user\AppData\Local\Temp\pqvxpoqshoxjfvzq"
malicious
C:\Users\user\Desktop\z1Quotation.scr.exe
C:\Users\user\Desktop\z1Quotation.scr.exe /sort "Visit Time" /stext "C:\Users\user\AppData\Local\Temp\azdzamjeqinayzgxunqjk"
malicious
C:\Users\user\Desktop\z1Quotation.scr.exe
C:\Users\user\Desktop\z1Quotation.scr.exe /stext "C:\Users\user\AppData\Local\Temp\xadmhfv"
malicious
C:\Users\user\Desktop\z1Quotation.scr.exe
C:\Users\user\Desktop\z1Quotation.scr.exe /stext "C:\Users\user\AppData\Local\Temp\xpsjxjoeplzrro"
malicious
C:\Users\user\Desktop\z1Quotation.scr.exe
C:\Users\user\Desktop\z1Quotation.scr.exe /stext "C:\Users\user\AppData\Local\Temp\gymlnlyltcmojzwgtmnvsm"
malicious
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\drivers\mstee.sys
C:\Windows\System32\drivers\mskssrv.sys
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1412 -s 2348
There are 131 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://telesavers.co.za/-4062-986e-6b0fce555694s
unknown
malicious
https://telesavers.co.za/FrKSUMZ203.binc
unknown
malicious
https://telesavers.co.za/)
unknown
malicious
https://telesavers.co.za/(
unknown
malicious
https://telesavers.co.za/Tt
unknown
malicious
https://telesavers.co.za/FrKSUMZ203.binrasadhlp.dll
unknown
malicious
https://telesavers.co.za/-4062-986e-6b0fce555694
unknown
malicious
https://telesavers.co.za/bo
unknown
malicious
https://telesavers.co.za/-4062-986e-6b0fce555694sDN
unknown
malicious
https://telesavers.co.za/FrKSUMZ203.binAppData
unknown
malicious
https://telesavers.co.za/FrKSUMZ203.binI
unknown
malicious
https://telesavers.co.za/telesavers.co.za5
unknown
malicious
https://telesavers.co.za/Jo
unknown
malicious
https://telesavers.co.za/
unknown
malicious
https://telesavers.co.za/telesavers.co.za
unknown
malicious
https://telesavers.co.za/FrKSUMZ203.bin
102.65.21.26
malicious
https://telesavers.co.za/Bo
unknown
malicious
http://geoplugin.net/json.gpB_
unknown
http://geoplugin.net/json.gpH_
unknown
http://ocsp.quovadisglobal.com0O
unknown
http://geoplugin.net/json.gpsg
unknown
http://geoplugin.net/json.gpo_
unknown
http://crl.quovadisglobal.com/qvicag4.crl0
unknown
http://www.imvu.com
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://trust.quovadisglobal.com/qvrca.crt0
unknown
http://pki.intel.com/crt/IntelCA7B.crt0
unknown
http://www.quovadisglobal.com/repository0
unknown
http://pki.intel.com/crl/IntelCA7B.crl0f
unknown
http://trust.quovadisglobal.com/qvicag4.crt0
unknown
http://geoplugin.net/json.gp
178.237.33.50
http://ocsp.quovadisglobal.com05
unknown
https://www.google.com
unknown
http://crl.quovadisglobal.com/qvrca.crl0
unknown
http://geoplugin.net/json.gpn.net/json.gp
unknown
http://nsis.sf.net/NSIS_Error
unknown
http://geoplugin.net/
unknown
http://geoplugin.net/json.gpM
unknown
http://www.quovadis.bm0
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
http://www.nirsoft.net/
unknown
https://ocsp.quovadisoffshore.com0
unknown
http://geoplugin.net/json.gpV_0
unknown
http://OCSP.intel.com/0
unknown
http://www.ebuddy.com
unknown
There are 36 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
subddfg.lol
23.106.238.209
malicious
telesavers.co.za
102.65.21.26
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
23.106.238.209
subddfg.lol
United Kingdom
malicious
102.65.21.26
telesavers.co.za
South Africa
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-ZLUOGZ
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-ZLUOGZ
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-ZLUOGZ
time
malicious
HKEY_CURRENT_USER\sheds\Uninstall\udfrdige\Psychoanalyzer90
boatheader
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject.1\CLSID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CLSID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\DxDiag.DxDiagClassObject\CurVer
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\VersionIndependentProgID
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\ForceRemove
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32
ThreadingModel
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
DxDiag In SystemInfo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
DxDiag In DirectDraw
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
DxDiag In DirectSound
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
DxDiag In VideoCapture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
DxDiag In Diagnostics
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
DxDiag In Media Foundation
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
DxDiag In USB Display
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
DxDiag In Holographic
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
DxDiag In DirectDraw
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
DxDiag In DirectDraw
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DirectDraw\MostRecentApplication
Name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\DirectDraw\MostRecentApplication
ID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
DxDiag In SystemInfo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
DxDiag In DirectSound
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
DxDiag In DirectSound
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MediaResources\DirectSound\Speaker Configuration
Speaker Configuration
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
DxDiag In DirectInput
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectInput\DXDIAG.EXEA39C632900036600
Name
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectInput\DXDIAG.EXEA39C632900036600
UsesMapper
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectInput\MostRecentApplication
Name
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectInput\MostRecentApplication
Id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectInput\MostRecentApplication
Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectInput\MostRecentApplication
MostRecentStart
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
DxDiag In DirectShow
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum
Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\cvid
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\cvid
CLSID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\cvid
FilterData
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\cvid
FccHandler
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\cvid
ClassManagerFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\i420
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\i420
CLSID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\i420
FilterData
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\i420
FccHandler
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\i420
ClassManagerFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\iyuv
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\iyuv
CLSID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\iyuv
FilterData
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\iyuv
FccHandler
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\iyuv
ClassManagerFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\mrle
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\mrle
CLSID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\mrle
FilterData
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\mrle
FccHandler
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\mrle
ClassManagerFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\msvc
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\msvc
CLSID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\msvc
FilterData
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\msvc
FccHandler
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\msvc
ClassManagerFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\uyvy
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\uyvy
FilterData
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\uyvy
FccHandler
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\uyvy
ClassManagerFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yuy2
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yuy2
CLSID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yuy2
FilterData
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yuy2
FccHandler
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yuy2
ClassManagerFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yvu9
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yvu9
CLSID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yvu9
FilterData
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yvu9
FccHandler
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yvu9
ClassManagerFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yvyu
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yvyu
CLSID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yvyu
FilterData
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yvyu
FccHandler
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\yvyu
ClassManagerFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\x264
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\x264
FilterData
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\x264
FccHandler
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A760-90C8-11D0-BD43-00A0C911CE86}\x264
ClassManagerFlags
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.imaadpcm
fdwSupport
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.imaadpcm
cFormatTags
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.imaadpcm
aFormatTagCache
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.imaadpcm
cFilterTags
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.msadpcm
fdwSupport
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.msadpcm
cFormatTags
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.msadpcm
aFormatTagCache
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.msadpcm
cFilterTags
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.msg711
fdwSupport
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.msg711
cFormatTags
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.msg711
aFormatTagCache
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.msg711
cFilterTags
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.msgsm610
fdwSupport
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.msgsm610
cFormatTags
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.msgsm610
aFormatTagCache
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.msgsm610
cFilterTags
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.l3acm
cFormatTags
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\AudioCompressionManager\DriverCache\msacm.l3acm
aFormatTagCache
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\1PCM
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\1PCM
CLSID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\1PCM
FilterData
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\1PCM
AcmId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\17IMA ADPCM
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\17IMA ADPCM
CLSID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\17IMA ADPCM
FilterData
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\17IMA ADPCM
AcmId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\2Microsoft ADPCM
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\2Microsoft ADPCM
CLSID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\2Microsoft ADPCM
FilterData
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\2Microsoft ADPCM
AcmId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\6CCITT A-Law
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\6CCITT A-Law
FilterData
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\6CCITT A-Law
AcmId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\7CCITT u-Law
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\7CCITT u-Law
FilterData
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\7CCITT u-Law
AcmId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\49GSM 6.10
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\49GSM 6.10
FilterData
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\49GSM 6.10
AcmId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\85MPEG Layer-3
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\85MPEG Layer-3
FilterData
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{33D9A761-90C8-11D0-BD43-00A0C911CE86}\85MPEG Layer-3
AcmId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Microsoft GS Wavetable Synth
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Microsoft GS Wavetable Synth
CLSID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Microsoft GS Wavetable Synth
FilterData
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Microsoft GS Wavetable Synth
MidiOutId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device
CLSID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device
FilterData
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device
MidiOutId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\wave:{DD1CD538-0F7B-4472-BA12-59FE8F4DA23C}
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\wave:{DD1CD538-0F7B-4472-BA12-59FE8F4DA23C}
CLSID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\wave:{DD1CD538-0F7B-4472-BA12-59FE8F4DA23C}
FilterData
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\wave:{DD1CD538-0F7B-4472-BA12-59FE8F4DA23C}
EndpointId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\wave:{DD1CD538-0F7B-4472-BA12-59FE8F4DA23C}
EndpointGuid
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\wave:{DD1CD538-0F7B-4472-BA12-59FE8F4DA23C}
WaveOutId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\wave:{DD1CD538-0F7B-4472-BA12-59FE8F4DA23C}
ClassManagerFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\wave:{97EBAA44-1707-43BD-A28C-E120218DAACF}
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\wave:{97EBAA44-1707-43BD-A28C-E120218DAACF}
CLSID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\wave:{97EBAA44-1707-43BD-A28C-E120218DAACF}
FilterData
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\wave:{97EBAA44-1707-43BD-A28C-E120218DAACF}
EndpointId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\wave:{97EBAA44-1707-43BD-A28C-E120218DAACF}
EndpointGuid
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\wave:{97EBAA44-1707-43BD-A28C-E120218DAACF}
WaveOutId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default WaveOut Device
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default WaveOut Device
WaveOutId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\DirectSound:{DD1CD538-0F7B-4472-BA12-59FE8F4DA23C}
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\DirectSound:{DD1CD538-0F7B-4472-BA12-59FE8F4DA23C}
CLSID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\DirectSound:{DD1CD538-0F7B-4472-BA12-59FE8F4DA23C}
FilterData
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\DirectSound:{DD1CD538-0F7B-4472-BA12-59FE8F4DA23C}
DSGuid
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\DirectSound:{97EBAA44-1707-43BD-A28C-E120218DAACF}
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\DirectSound:{97EBAA44-1707-43BD-A28C-E120218DAACF}
CLSID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\DirectSound:{97EBAA44-1707-43BD-A28C-E120218DAACF}
FilterData
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\DirectSound:{97EBAA44-1707-43BD-A28C-E120218DAACF}
DSGuid
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device
FriendlyName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device
CLSID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device
FilterData
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device
DSGuid
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
DxDiag In SystemInfo
HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
DxDiag In SystemInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\DxDiag.DxDiagProvider\CurVer
NULL
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
ProgramId
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
FileId
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
LowerCaseLongPath
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
LongPathHash
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
Name
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
OriginalFileName
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
Publisher
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
Version
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
BinFileVersion
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
BinaryType
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
ProductName
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
ProductVersion
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
LinkDate
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
BinProductVersion
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
AppxPackageFullName
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
AppxPackageRelativeId
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
Size
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
Language
\REGISTRY\A\{d6edd099-fd5a-1276-2393-94649651f252}\Root\InventoryApplicationFile\z1quotation.scr.|36f1a110fc5e0e02
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00E24D2A1F0
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 182 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7431000
heap
page read and write
malicious
7431000
heap
page read and write
malicious
7431000
heap
page read and write
malicious
7431000
heap
page read and write
malicious
742E000
heap
page read and write
malicious
637000
heap
page read and write
malicious
6463000
direct allocation
page execute and read and write
malicious
685000
heap
page read and write
malicious
742C000
heap
page read and write
malicious
7431000
heap
page read and write
malicious
7431000
heap
page read and write
malicious
400000
system
page execute and read and write
malicious
698000
heap
page read and write
malicious
7422000
heap
page read and write
malicious
7431000
heap
page read and write
malicious
7431000
heap
page read and write
malicious
5381000
heap
page read and write
5383000
heap
page read and write
6153000
heap
page read and write
AF3000
heap
page read and write
2371000
heap
page read and write
2B53000
heap
page read and write
73DF000
heap
page read and write
235C000
heap
page read and write
2C31000
heap
page read and write
2B2E000
heap
page read and write
612C000
heap
page read and write
74A1000
heap
page read and write
60E6000
heap
page read and write
60DE000
heap
page read and write
22DD000
heap
page read and write
2B8F000
heap
page read and write
7489000
heap
page read and write
7474000
heap
page read and write
2B2E000
heap
page read and write
29F6000
heap
page read and write
3030000
trusted library allocation
page read and write
60F6000
heap
page read and write
473000
system
page execute and read and write
6198000
heap
page read and write
504000
heap
page read and write
538F000
heap
page read and write
6282000
heap
page read and write
54A000
heap
page read and write
5462000
heap
page read and write
60FE000
heap
page read and write
73DD000
heap
page read and write
5390000
heap
page read and write
4FE000
stack
page read and write
66D000
heap
page read and write
74A1000
heap
page read and write
6153000
heap
page read and write
2B80000
heap
page read and write
60D7000
heap
page read and write
611E000
heap
page read and write
2361000
heap
page read and write
22D0000
heap
page read and write
2F8C000
heap
page read and write
38BBB000
heap
page read and write
7415000
heap
page read and write
2CA2000
heap
page read and write
613B000
heap
page read and write
6229000
heap
page read and write
230A000
heap
page read and write
2CA2000
heap
page read and write
803000
heap
page read and write
2B08000
heap
page read and write
5452000
heap
page read and write
6221000
heap
page read and write
66F000
heap
page read and write
237D000
heap
page read and write
2AC6000
heap
page read and write
7431000
heap
page read and write
25AE000
stack
page read and write
29F7000
heap
page read and write
2C48000
heap
page read and write
6223000
heap
page read and write
5452000
heap
page read and write
4B6C000
heap
page read and write
401000
unkown
page execute read
625A000
heap
page read and write
2B87000
heap
page read and write
6241000
heap
page read and write
627E000
heap
page read and write
6138000
heap
page read and write
742C000
heap
page read and write
4B69000
heap
page read and write
5457000
heap
page read and write
2B5C000
heap
page read and write
437000
unkown
page readonly
23B0000
heap
page read and write
4B71000
heap
page read and write
622B000
heap
page read and write
22BC000
heap
page read and write
6153000
heap
page read and write
613B000
heap
page read and write
61E0000
heap
page read and write
2B2E000
heap
page read and write
60DB000
heap
page read and write
4830000
trusted library allocation
page read and write
60D4000
heap
page read and write
612E000
heap
page read and write
5391000
heap
page read and write
613D000
heap
page read and write
60A5000
heap
page read and write
53C6000
heap
page read and write
5455000
heap
page read and write
400000
system
page execute and read and write
2F8F000
heap
page read and write
32D0000
direct allocation
page read and write
4B5F000
heap
page read and write
5EE000
stack
page read and write
611F000
heap
page read and write
4C61000
heap
page read and write
408000
unkown
page readonly
2B2A000
heap
page read and write
7485000
heap
page read and write
61BC000
heap
page read and write
742C000
heap
page read and write
2931000
heap
page read and write
2B86000
heap
page read and write
2C31000
heap
page read and write
2377000
heap
page read and write
2BF2000
heap
page read and write
C5C000
heap
page read and write
53CA000
heap
page read and write
2A31000
heap
page read and write
6115000
heap
page read and write
60D6000
heap
page read and write
B9E000
heap
page read and write
6FF11000
unkown
page execute read
6FF10000
unkown
page readonly
61E0000
heap
page read and write
22C1000
heap
page read and write
50B0000
trusted library allocation
page read and write
4B6D000
heap
page read and write
4B71000
heap
page read and write
22D0000
heap
page read and write
670000
heap
page read and write
613B000
heap
page read and write
6121000
heap
page read and write
2A5B000
heap
page read and write
27C0000
heap
page read and write
6167000
heap
page read and write
4830000
trusted library allocation
page read and write
60FE000
heap
page read and write
6125000
heap
page read and write
2C33000
heap
page read and write
6198000
heap
page read and write
2B43000
heap
page read and write
2B81000
heap
page read and write
287E000
stack
page read and write
2A8B000
heap
page read and write
4C33000
heap
page read and write
22D5000
heap
page read and write
2323000
heap
page read and write
2B47000
heap
page read and write
60D6000
heap
page read and write
2B1C000
heap
page read and write
61F3000
heap
page read and write
22DD000
heap
page read and write
4B71000
heap
page read and write
5403000
heap
page read and write
2369000
heap
page read and write
4B5B000
heap
page read and write
544D000
heap
page read and write
2B86000
heap
page read and write
22DD000
heap
page read and write
5468000
heap
page read and write
5462000
heap
page read and write
3053000
heap
page read and write
624000
heap
page read and write
564000
heap
page read and write
437000
unkown
page readonly
22BC000
heap
page read and write
22DE000
heap
page read and write
2361000
heap
page read and write
2AC3000
heap
page read and write
7422000
heap
page read and write
524000
heap
page read and write
634000
heap
page read and write
A50000
heap
page read and write
60FA000
heap
page read and write
2450000
heap
page read and write
394BA000
heap
page read and write
19A000
stack
page read and write
53C4000
heap
page read and write
2C47000
heap
page read and write
23D4000
heap
page read and write
2BF2000
heap
page read and write
6153000
heap
page read and write
546E000
heap
page read and write
5465000
heap
page read and write
22B0000
heap
page read and write
304F000
heap
page read and write
4A8E000
stack
page read and write
2366000
heap
page read and write
4B56000
heap
page read and write
546D000
heap
page read and write
A063000
direct allocation
page execute and read and write
38BB1000
heap
page read and write
4B6C000
heap
page read and write
4B73000
heap
page read and write
400000
system
page execute and read and write
22CD000
heap
page read and write
29FE000
stack
page read and write
5372000
heap
page read and write
61A3000
heap
page read and write
6266000
heap
page read and write
7488000
heap
page read and write
2B2E000
heap
page read and write
6269000
heap
page read and write
9C000
stack
page read and write
6D436000
unkown
page readonly
7415000
heap
page read and write
2B47000
heap
page read and write
2C31000
heap
page read and write
504000
heap
page read and write
61F4000
heap
page read and write
742C000
heap
page read and write
38CB5000
heap
page read and write
541D000
heap
page read and write
5467000
heap
page read and write
2B08000
heap
page read and write
6130000
heap
page read and write
541D000
heap
page read and write
53D6000
heap
page read and write
2B57000
heap
page read and write
6223000
heap
page read and write
4960000
trusted library allocation
page read and write
7483000
heap
page read and write
27C1000
heap
page read and write
2BF2000
heap
page read and write
741B000
heap
page read and write
2C31000
heap
page read and write
525000
heap
page read and write
6221000
heap
page read and write
546B000
heap
page read and write
22CC000
heap
page read and write
A7F000
stack
page read and write
5447000
heap
page read and write
23A0000
trusted library allocation
page read and write
6221000
heap
page read and write
80D000
stack
page read and write
2AB3000
heap
page read and write
6127000
heap
page read and write
73DF000
heap
page read and write
61C8000
heap
page read and write
60D4000
heap
page read and write
6130000
heap
page read and write
543E000
heap
page read and write
2B81000
heap
page read and write
624000
heap
page read and write
564000
heap
page read and write
6148000
heap
page read and write
2C36000
heap
page read and write
5447000
heap
page read and write
6137000
heap
page read and write
5451000
heap
page read and write
3224000
heap
page read and write
22A0000
heap
page read and write
60A9000
heap
page read and write
38AB1000
heap
page read and write
5454000
heap
page read and write
742F000
heap
page read and write
6138000
heap
page read and write
2F0A000
heap
page read and write
50B0000
trusted library allocation
page read and write
2B81000
heap
page read and write
677000
heap
page read and write
546D000
heap
page read and write
6114000
heap
page read and write
504000
heap
page read and write
5467000
heap
page read and write
4830000
trusted library allocation
page read and write
22C4000
heap
page read and write
2C31000
heap
page read and write
60DD000
heap
page read and write
23C9000
heap
page read and write
6131000
heap
page read and write
61D0000
heap
page read and write
2C40000
heap
page read and write
61D8000
heap
page read and write
60FF000
heap
page read and write
546E000
heap
page read and write
611E000
heap
page read and write
4BFF000
heap
page read and write
2358000
heap
page read and write
2AB2000
heap
page read and write
401000
unkown
page execute read
65B000
heap
page read and write
4BE4000
heap
page read and write
60FA000
heap
page read and write
60F9000
heap
page read and write
6221000
heap
page read and write
38CB7000
heap
page read and write
C50000
heap
page read and write
4B57000
heap
page read and write
2B81000
heap
page read and write
2361000
heap
page read and write
22A0000
heap
page read and write
2B08000
heap
page read and write
4B51000
heap
page read and write
7200000
remote allocation
page read and write
4970000
heap
page read and write
2B3F000
heap
page read and write
5452000
heap
page read and write
6125000
heap
page read and write
5CA9000
heap
page read and write
60C7000
heap
page read and write
60FE000
heap
page read and write
73F7000
heap
page read and write
6198000
heap
page read and write
AD3000
heap
page read and write
544E000
heap
page read and write
546D000
heap
page read and write
32B0000
direct allocation
page read and write
30000
heap
page read and write
60DB000
heap
page read and write
2361000
heap
page read and write
237E000
heap
page read and write
7489000
heap
page read and write
4C02000
heap
page read and write
2B4F000
heap
page read and write
22C8000
heap
page read and write
237C000
heap
page read and write
564000
heap
page read and write
5389000
heap
page read and write
28CE000
heap
page read and write
ADF000
heap
page read and write
2323000
heap
page read and write
53AB000
heap
page read and write
60E5000
heap
page read and write
508000
heap
page read and write
748E000
heap
page read and write
611F000
heap
page read and write
6269000
heap
page read and write
22A0000
heap
page read and write
60E9000
heap
page read and write
613B000
heap
page read and write
2B53000
heap
page read and write
2F80000
trusted library allocation
page read and write
7D0000
heap
page read and write
6227000
heap
page read and write
6231000
heap
page read and write
648000
heap
page read and write
4BFF000
heap
page read and write
30000
heap
page read and write
6137000
heap
page read and write
22D8000
heap
page read and write
22C4000
heap
page read and write
2C36000
heap
page read and write
7483000
heap
page read and write
53C6000
heap
page read and write
4BD2000
heap
page read and write
5453000
heap
page read and write
2B2E000
heap
page read and write
2B2E000
heap
page read and write
74A1000
heap
page read and write
4B6D000
heap
page read and write
564000
heap
page read and write
30000
heap
page read and write
6172000
heap
page read and write
61A3000
heap
page read and write
28CB000
heap
page read and write
525000
heap
page read and write
2F80000
trusted library allocation
page read and write
447000
unkown
page readonly
2AB7000
heap
page read and write
22C5000
heap
page read and write
504000
heap
page read and write
6139000
heap
page read and write
616C000
heap
page read and write
6100000
heap
page read and write
6223000
heap
page read and write
401000
unkown
page execute read
22CC000
heap
page read and write
5390000
heap
page read and write
6115000
heap
page read and write
53C7000
heap
page read and write
624000
heap
page read and write
60EC000
heap
page read and write
5AE000
stack
page read and write
22BC000
heap
page read and write
2ACD000
heap
page read and write
61D6000
heap
page read and write
2B81000
heap
page read and write
39269000
heap
page read and write
4B71000
heap
page read and write
22C1000
heap
page read and write
2BF2000
heap
page read and write
60EC000
heap
page read and write
8C63000
direct allocation
page execute and read and write
237C000
heap
page read and write
546D000
heap
page read and write
22C9000
heap
page read and write
2C31000
heap
page read and write
28C2000
heap
page read and write
5454000
heap
page read and write
2A30000
heap
page read and write
2362000
heap
page read and write
4830000
heap
page read and write
4C5A000
heap
page read and write
546A000
heap
page read and write
92E000
stack
page read and write
5455000
heap
page read and write
6153000
heap
page read and write
22B0000
heap
page read and write
610B000
heap
page read and write
61E7000
heap
page read and write
2B82000
heap
page read and write
5383000
heap
page read and write
350000
heap
page read and write
237D000
heap
page read and write
4B74000
heap
page read and write
2BF2000
heap
page read and write
6242000
heap
page read and write
6198000
heap
page read and write
2A7B000
heap
page read and write
22DD000
heap
page read and write
6153000
heap
page read and write
671000
heap
page read and write
612E000
heap
page read and write
2B89000
heap
page read and write
2BB8000
heap
page read and write
2B86000
heap
page read and write
61EB000
heap
page read and write
2260000
heap
page read and write
2B2E000
heap
page read and write
2B1E000
heap
page read and write
60DF000
heap
page read and write
6153000
heap
page read and write
2470000
heap
page read and write
2ABA000
heap
page read and write
622D000
heap
page read and write
53C6000
heap
page read and write
2B11000
heap
page read and write
74A1000
heap
page read and write
5CA5000
heap
page read and write
61E5000
heap
page read and write
6137000
heap
page read and write
2CA2000
heap
page read and write
2CA2000
heap
page read and write
22D5000
heap
page read and write
741B000
heap
page read and write
524000
heap
page read and write
6153000
heap
page read and write
5457000
heap
page read and write
564000
heap
page read and write
2B97000
heap
page read and write
AFC000
heap
page read and write
321D000
heap
page read and write
538000
heap
page read and write
22C7000
heap
page read and write
2C40000
heap
page read and write
61F3000
heap
page read and write
6241000
heap
page read and write
6362000
heap
page read and write
4C4B000
heap
page read and write
B2C0000
trusted library allocation
page read and write
2B53000
heap
page read and write
27C1000
heap
page read and write
53E000
stack
page read and write
197000
stack
page read and write
61F2000
heap
page read and write
613B000
heap
page read and write
2AC6000
heap
page read and write
61E0000
heap
page read and write
60D6000
heap
page read and write
6225000
heap
page read and write
650000
heap
page read and write
C5C000
heap
page read and write
23D4000
heap
page read and write
4F9D000
heap
page read and write
2CA2000
heap
page read and write
2880000
heap
page read and write
6121000
heap
page read and write
2C48000
heap
page read and write
627E000
heap
page read and write
22D1000
heap
page read and write
2B81000
heap
page read and write
6081000
heap
page read and write
2B81000
heap
page read and write
7489000
heap
page read and write
2378000
heap
page read and write
53EA000
heap
page read and write
2B2A000
heap
page read and write
2334000
heap
page read and write
4C2B000
heap
page read and write
61CD000
heap
page read and write
7483000
heap
page read and write
2B81000
heap
page read and write
53D4000
heap
page read and write
6225000
heap
page read and write
22D1000
heap
page read and write
2B1C000
heap
page read and write
2B4F000
heap
page read and write
6153000
heap
page read and write
61A4000
heap
page read and write
235C000
heap
page read and write
5455000
heap
page read and write
5452000
heap
page read and write
495000
heap
page read and write
613B000
heap
page read and write
2935000
heap
page read and write
2B53000
heap
page read and write
2CA2000
heap
page read and write
2B86000
heap
page read and write
742C000
heap
page read and write
61A3000
heap
page read and write
546A000
heap
page read and write
237D000
heap
page read and write
6127000
heap
page read and write
4B56000
heap
page read and write
2C31000
heap
page read and write
2BF2000
heap
page read and write
2CA2000
heap
page read and write
61E0000
heap
page read and write
612C000
heap
page read and write
617B000
heap
page read and write
28EE000
heap
page read and write
437000
unkown
page readonly
A85000
heap
page read and write
4B5B000
heap
page read and write
23AA000
heap
page read and write
53A6000
heap
page read and write
22BF000
heap
page read and write
546D000
heap
page read and write
621B000
heap
page read and write
60C4000
heap
page read and write
2B53000
heap
page read and write
2B1C000
heap
page read and write
2AC3000
heap
page read and write
2B2A000
heap
page read and write
6229000
heap
page read and write
60FE000
heap
page read and write
2880000
heap
page read and write
459000
system
page execute and read and write
2317000
heap
page read and write
2377000
heap
page read and write
53E7000
heap
page read and write
3F7000
stack
page read and write
612A000
heap
page read and write
ADE000
heap
page read and write
7200000
remote allocation
page read and write
61F3000
heap
page read and write
2A79000
heap
page read and write
60E6000
heap
page read and write
61E2000
heap
page read and write
22D1000
heap
page read and write
2369000
heap
page read and write
60C5000
heap
page read and write
2CA2000
heap
page read and write
490000
heap
page read and write
5C9C000
heap
page read and write
4830000
trusted library allocation
page read and write
60D7000
heap
page read and write
546D000
heap
page read and write
622D000
heap
page read and write
2323000
heap
page read and write
4BD1000
heap
page read and write
53F6000
heap
page read and write
61F3000
heap
page read and write
437000
unkown
page readonly
6153000
heap
page read and write
22E8000
heap
page read and write
60C6000
heap
page read and write
622B000
heap
page read and write
2B59000
heap
page read and write
2C36000
heap
page read and write
2ACC000
heap
page read and write
611D000
heap
page read and write
2B49000
heap
page read and write
74A1000
heap
page read and write
50B0000
trusted library allocation
page read and write
2C4A000
heap
page read and write
6137000
heap
page read and write
546D000
heap
page read and write
2303000
heap
page read and write
5C99000
heap
page read and write
6131000
heap
page read and write
4830000
trusted library allocation
page read and write
5434000
heap
page read and write
612C000
heap
page read and write
546D000
heap
page read and write
2B2A000
heap
page read and write
6153000
heap
page read and write
6221000
heap
page read and write
546D000
heap
page read and write
2B53000
heap
page read and write
60CE000
heap
page read and write
622F000
heap
page read and write
2B53000
heap
page read and write
2CA2000
heap
page read and write
60F6000
heap
page read and write
544D000
heap
page read and write
2B2E000
heap
page read and write
2361000
heap
page read and write
2F00000
trusted library allocation
page read and write
2B9B000
heap
page read and write
38BBB000
heap
page read and write
5447000
heap
page read and write
98000
stack
page read and write
53E8000
heap
page read and write
4B5F000
heap
page read and write
5457000
heap
page read and write
60DB000
heap
page read and write
525000
heap
page read and write
4C5E000
heap
page read and write
73E000
heap
page read and write
2B0B000
heap
page read and write
73DF000
heap
page read and write
4B7E000
heap
page read and write
2369000
heap
page read and write
5072000
heap
page read and write
22BB000
heap
page read and write
4B56000
heap
page read and write
5468000
heap
page read and write
2F8B000
heap
page read and write
546A000
heap
page read and write
2B11000
heap
page read and write
524000
heap
page read and write
2323000
heap
page read and write
447000
unkown
page readonly
524000
heap
page read and write
30000
heap
page read and write
4840000
heap
page read and write
B80000
heap
page read and write
61B1000
heap
page read and write
C8E000
heap
page read and write
613B000
heap
page read and write
6115000
heap
page read and write
60DE000
heap
page read and write
7483000
heap
page read and write
546E000
heap
page read and write
2FA8000
heap
page read and write
2A5B000
heap
page read and write
236D000
heap
page read and write
2B2E000
heap
page read and write
2BF2000
heap
page read and write
5A63000
direct allocation
page execute and read and write
6C8000
heap
page read and write
3030000
trusted library allocation
page read and write
546A000
heap
page read and write
5455000
heap
page read and write
2C37000
heap
page read and write
635000
heap
page read and write
18F000
stack
page read and write
613B000
heap
page read and write
504000
heap
page read and write
61CD000
heap
page read and write
2CA2000
heap
page read and write
22D0000
heap
page read and write
6227000
heap
page read and write
4430000
heap
page read and write
61F3000
heap
page read and write
40A000
unkown
page write copy
2F96000
heap
page read and write
2CA2000
heap
page read and write
60FE000
heap
page read and write
61E0000
heap
page read and write
74A1000
heap
page read and write
546D000
heap
page read and write
2B2E000
heap
page read and write
2EC0000
heap
page read and write
74A1000
heap
page read and write
74A1000
heap
page read and write
6FF2F000
unkown
page readonly
2F00000
trusted library allocation
page read and write
622F000
heap
page read and write
2B2E000
heap
page read and write
564000
heap
page read and write
60DB000
heap
page read and write
22DE000
heap
page read and write
400000
unkown
page readonly
2CA2000
heap
page read and write
2B9B000
heap
page read and write
7422000
heap
page read and write
634000
heap
page read and write
611F000
heap
page read and write
4FCD000
stack
page read and write
609B000
heap
page read and write
7488000
heap
page read and write
60E6000
heap
page read and write
613B000
heap
page read and write
61D0000
heap
page read and write
6131000
heap
page read and write
4C4B000
heap
page read and write
2364000
heap
page read and write
2B42000
heap
page read and write
22D1000
heap
page read and write
627A000
heap
page read and write
6137000
heap
page read and write
622B000
heap
page read and write
611E000
heap
page read and write
4C5C000
heap
page read and write
5CA7000
heap
page read and write
6138000
heap
page read and write
4B8E000
heap
page read and write
4BF2000
heap
page read and write
53F6000
heap
page read and write
60D7000
heap
page read and write
2A9D000
heap
page read and write
2B8A000
heap
page read and write
2B50000
heap
page read and write
C86000
heap
page read and write
60FD000
heap
page read and write
2C63000
heap
page read and write
2B53000
heap
page read and write
6130000
heap
page read and write
4C5C000
heap
page read and write
613B000
heap
page read and write
6153000
heap
page read and write
525000
heap
page read and write
60C2000
heap
page read and write
541E000
heap
page read and write
235C000
heap
page read and write
22C8000
heap
page read and write
61E0000
heap
page read and write
60E000
stack
page read and write
22D1000
heap
page read and write
5447000
heap
page read and write
2859000
heap
page read and write
6127000
heap
page read and write
5447000
heap
page read and write
546D000
heap
page read and write
2B2E000
heap
page read and write
5063000
direct allocation
page execute and read and write
32C0000
direct allocation
page read and write
5459000
heap
page read and write
543E000
heap
page read and write
7422000
heap
page read and write
4B71000
heap
page read and write
613B000
heap
page read and write
4BF2000
heap
page read and write
2365000
heap
page read and write
95E000
stack
page read and write
2BF2000
heap
page read and write
53D4000
heap
page read and write
5CA5000
heap
page read and write
447000
unkown
page readonly
4831000
heap
page read and write
5467000
heap
page read and write
2A31000
heap
page read and write
6101000
heap
page read and write
7415000
heap
page read and write
2C36000
heap
page read and write
4B56000
heap
page read and write
60FD000
heap
page read and write
546D000
heap
page read and write
2881000
heap
page read and write
524000
heap
page read and write
674000
heap
page read and write
2F80000
trusted library allocation
page read and write
60EC000
heap
page read and write
22BC000
heap
page read and write
613B000
heap
page read and write
613D000
heap
page read and write
613B000
heap
page read and write
2C31000
heap
page read and write
60D6000
heap
page read and write
40A000
unkown
page write copy
6113000
heap
page read and write
447000
unkown
page readonly
538C000
heap
page read and write
291E000
heap
page read and write
7488000
heap
page read and write
2BC4000
heap
page read and write
6221000
heap
page read and write
235C000
heap
page read and write
2B2A000
heap
page read and write
4B75000
heap
page read and write
61F7000
heap
page read and write
30000
heap
page read and write
237D000
heap
page read and write
2BF2000
heap
page read and write
630000
heap
page read and write
4C33000
heap
page read and write
2A5A000
heap
page read and write
2366000
heap
page read and write
741B000
heap
page read and write
2FA1000
heap
page read and write
2B1C000
heap
page read and write
3C2C000
stack
page read and write
2B2E000
heap
page read and write
7483000
heap
page read and write
2B86000
heap
page read and write
2B81000
heap
page read and write
524000
heap
page read and write
22DD000
heap
page read and write
6185000
heap
page read and write
546D000
heap
page read and write
60E6000
heap
page read and write
624000
heap
page read and write
2791000
heap
page read and write
2369000
heap
page read and write
4C02000
heap
page read and write
60C2000
heap
page read and write
627B000
heap
page read and write
2B0D000
heap
page read and write
5AE000
stack
page read and write
4C63000
heap
page read and write
4C10000
heap
page read and write
2B81000
heap
page read and write
2ACD000
heap
page read and write
624000
heap
page read and write
473000
system
page execute and read and write
6D434000
unkown
page readonly
7415000
heap
page read and write
2CA2000
heap
page read and write
22DD000
heap
page read and write
4B7C000
heap
page read and write
613B000
heap
page read and write
54F000
heap
page read and write
504000
heap
page read and write
6266000
heap
page read and write
2371000
heap
page read and write
540D000
heap
page read and write
4B5B000
heap
page read and write
613B000
heap
page read and write
564000
heap
page read and write
612C000
heap
page read and write
447000
unkown
page readonly
22C8000
heap
page read and write
4BE4000
heap
page read and write
4E90000
direct allocation
page execute and read and write
401000
unkown
page execute read
612E000
heap
page read and write
60C3000
heap
page read and write
5452000
heap
page read and write
520000
heap
page read and write
61EB000
heap
page read and write
61CD000
heap
page read and write
4B5B000
heap
page read and write
742C000
heap
page read and write
61F3000
heap
page read and write
6121000
heap
page read and write
525000
heap
page read and write
2B81000
heap
page read and write
2B59000
heap
page read and write
A4F000
stack
page read and write
4BD2000
heap
page read and write
4979000
heap
page read and write
741B000
heap
page read and write
2886000
heap
page read and write
2C31000
heap
page read and write
4B7C000
heap
page read and write
2B2E000
heap
page read and write
6153000
heap
page read and write
60D6000
heap
page read and write
4F96000
heap
page read and write
4A1E000
stack
page read and write
5467000
heap
page read and write
6080000
heap
page read and write
613B000
heap
page read and write
5381000
heap
page read and write
622B000
heap
page read and write
546D000
heap
page read and write
2B9B000
heap
page read and write
22DC000
heap
page read and write
612C000
heap
page read and write
40A000
unkown
page write copy
2443000
heap
page read and write
23D4000
heap
page read and write
2ACD000
heap
page read and write
4B75000
heap
page read and write
6130000
heap
page read and write
4830000
trusted library allocation
page read and write
6137000
heap
page read and write
6229000
heap
page read and write
2371000
heap
page read and write
5C96000
heap
page read and write
546E000
heap
page read and write
60EE000
heap
page read and write
4C39000
heap
page read and write
2B56000
heap
page read and write
2F80000
trusted library allocation
page read and write
6227000
heap
page read and write
3280000
direct allocation
page read and write
84F000
stack
page read and write
2366000
heap
page read and write
613B000
heap
page read and write
2BF2000
heap
page read and write
5467000
heap
page read and write
7477000
heap
page read and write
3200000
heap
page read and write
2AC5000
heap
page read and write
611E000
heap
page read and write
74A1000
heap
page read and write
60FE000
heap
page read and write
437000
unkown
page readonly
429000
unkown
page read and write
302A000
heap
page read and write
2CA2000
heap
page read and write
7485000
heap
page read and write
401000
unkown
page execute read
610C000
heap
page read and write
22C3000
heap
page read and write
2270000
heap
page read and write
2370000
heap
page read and write
2C39000
heap
page read and write
4C22000
heap
page read and write
447000
unkown
page readonly
5447000
heap
page read and write
22FE000
heap
page read and write
97E000
stack
page read and write
2C38000
heap
page read and write
22CF000
heap
page read and write
6153000
heap
page read and write
2AEF000
heap
page read and write
456000
system
page execute and read and write
2C31000
heap
page read and write
2323000
heap
page read and write
612A000
heap
page read and write
7488000
heap
page read and write
447000
unkown
page readonly
4B7C000
heap
page read and write
2370000
trusted library allocation
page read and write
6121000
heap
page read and write
50E3000
heap
page read and write
6153000
heap
page read and write
2CA2000
heap
page read and write
4B0E000
stack
page read and write
6153000
heap
page read and write
60D1000
heap
page read and write
2B81000
heap
page read and write
524000
heap
page read and write
2323000
heap
page read and write
401000
unkown
page execute read
613B000
heap
page read and write
237D000
heap
page read and write
C30000
trusted library allocation
page read and write
6198000
heap
page read and write
539E000
heap
page read and write
546D000
heap
page read and write
4C07000
heap
page read and write
32E0000
direct allocation
page read and write
5402000
heap
page read and write
22EA000
heap
page read and write
2B81000
heap
page read and write
2378000
heap
page read and write
2AB2000
heap
page read and write
6153000
heap
page read and write
6F1000
heap
page read and write
3B2C000
stack
page read and write
613E000
heap
page read and write
23D4000
heap
page read and write
22BF000
heap
page read and write
6198000
heap
page read and write
6227000
heap
page read and write
9B000
stack
page read and write
2334000
heap
page read and write
5CE000
stack
page read and write
7483000
heap
page read and write
22BC000
heap
page read and write
6241000
heap
page read and write
610000
heap
page read and write
2B2E000
heap
page read and write
61F3000
heap
page read and write
53ED000
heap
page read and write
400000
system
page execute and read and write
22D8000
heap
page read and write
2BB8000
heap
page read and write
504000
heap
page read and write
4B6D000
heap
page read and write
22A0000
heap
page read and write
60C7000
heap
page read and write
94E000
stack
page read and write
4B7E000
heap
page read and write
2AC6000
heap
page read and write
2370000
heap
page read and write
6153000
heap
page read and write
22D1000
heap
page read and write
2371000
heap
page read and write
ACF000
stack
page read and write
4830000
trusted library allocation
page read and write
7435000
heap
page read and write
624000
heap
page read and write
23A3000
heap
page read and write
2980000
heap
page read and write
2AC1000
heap
page read and write
6238000
heap
page read and write
2375000
heap
page read and write
B8C000
heap
page read and write
9663000
direct allocation
page execute and read and write
610F000
heap
page read and write
624000
heap
page read and write
6153000
heap
page read and write
504000
heap
page read and write
6129000
heap
page read and write
6153000
heap
page read and write
2B9B000
heap
page read and write
61E2000
heap
page read and write
613B000
heap
page read and write
5451000
heap
page read and write
7435000
heap
page read and write
8263000
direct allocation
page execute and read and write
60F9000
heap
page read and write
622F000
heap
page read and write
22DC000
heap
page read and write
6153000
heap
page read and write
9C000
stack
page read and write
612C000
heap
page read and write
90F000
stack
page read and write
238E000
heap
page read and write
541D000
heap
page read and write
28C0000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
6153000
heap
page read and write
40A000
unkown
page read and write
22A0000
heap
page read and write
611E000
heap
page read and write
426000
unkown
page read and write
53EF000
heap
page read and write
60D7000
heap
page read and write
6153000
heap
page read and write
6153000
heap
page read and write
2CA2000
heap
page read and write
2A56000
heap
page read and write
61E2000
heap
page read and write
2BF2000
heap
page read and write
237E000
heap
page read and write
38BBB000
heap
page read and write
504000
heap
page read and write
73F7000
heap
page read and write
60FF000
heap
page read and write
73F7000
heap
page read and write
4C93000
heap
page read and write
60A6000
heap
page read and write
2AB4000
heap
page read and write
60FD000
heap
page read and write
422000
unkown
page read and write
45C000
system
page execute and read and write
2440000
heap
page read and write
8AF000
stack
page read and write
2C31000
heap
page read and write
2B97000
heap
page read and write
560000
heap
page read and write
6248000
heap
page read and write
6115000
heap
page read and write
73DD000
heap
page read and write
2369000
heap
page read and write
4B82000
heap
page read and write
2B82000
heap
page read and write
6271000
heap
page read and write
22C8000
heap
page read and write
2BA0000
heap
page read and write
2FBA000
heap
page read and write
60D6000
heap
page read and write
622D000
heap
page read and write
6137000
heap
page read and write
2B2E000
heap
page read and write
60AE000
heap
page read and write
2881000
heap
page read and write
91F000
stack
page read and write
613C000
heap
page read and write
8B0000
heap
page read and write
564000
heap
page read and write
7200000
remote allocation
page read and write
22BD000
heap
page read and write
544D000
heap
page read and write
60FE000
heap
page read and write
61E2000
heap
page read and write
612A000
heap
page read and write
400000
unkown
page readonly
6121000
heap
page read and write
5447000
heap
page read and write
5373000
heap
page read and write
728000
heap
page read and write
504000
heap
page read and write
60EC000
heap
page read and write
30000
heap
page read and write
6137000
heap
page read and write
9C000
stack
page read and write
7415000
heap
page read and write
400000
unkown
page readonly
610A000
heap
page read and write
6115000
heap
page read and write
22BC000
heap
page read and write
2AB4000
heap
page read and write
22BC000
heap
page read and write
272F000
stack
page read and write
506E000
heap
page read and write
6137000
heap
page read and write
4B71000
heap
page read and write
60AF000
heap
page read and write
2B86000
heap
page read and write
60E6000
heap
page read and write
4C1F000
heap
page read and write
50B0000
trusted library allocation
page read and write
60E5000
heap
page read and write
4C07000
heap
page read and write
ABF000
stack
page read and write
6153000
heap
page read and write
2981000
heap
page read and write
545F000
heap
page read and write
53E7000
heap
page read and write
60F9000
heap
page read and write
6153000
heap
page read and write
447000
unkown
page readonly
2323000
heap
page read and write
2C97000
heap
page read and write
612C000
heap
page read and write
73DF000
heap
page read and write
4B73000
heap
page read and write
748F000
heap
page read and write
2C6F000
heap
page read and write
236C000
heap
page read and write
612E000
heap
page read and write
60E6000
heap
page read and write
2F87000
heap
page read and write
60FD000
heap
page read and write
A4F000
stack
page read and write
2C31000
heap
page read and write
4C10000
heap
page read and write
A5F000
stack
page read and write
AD1000
heap
page read and write
23AB000
heap
page read and write
4B50000
heap
page read and write
6124000
heap
page read and write
4C10000
heap
page read and write
22CD000
heap
page read and write
555000
heap
page read and write
4830000
trusted library allocation
page read and write
60E5000
heap
page read and write
408000
unkown
page readonly
60F0000
heap
page read and write
2B98000
heap
page read and write
2B88000
heap
page read and write
612C000
heap
page read and write
61E0000
heap
page read and write
408000
unkown
page readonly
6131000
heap
page read and write
6241000
heap
page read and write
2970000
heap
page read and write
2A8B000
heap
page read and write
2881000
heap
page read and write
6175000
heap
page read and write
60E6000
heap
page read and write
624000
heap
page read and write
2B57000
heap
page read and write
5455000
heap
page read and write
2F04000
heap
page read and write
2381000
heap
page read and write
4C07000
heap
page read and write
AD9000
heap
page read and write
5CA5000
heap
page read and write
2CA2000
heap
page read and write
2370000
heap
page read and write
231E000
heap
page read and write
612E000
heap
page read and write
2B90000
heap
page read and write
7488000
heap
page read and write
22BC000
heap
page read and write
53F5000
heap
page read and write
612A000
heap
page read and write
53F5000
heap
page read and write
61B0000
heap
page read and write
61E0000
heap
page read and write
60E6000
heap
page read and write
2B0D000
heap
page read and write
22C8000
heap
page read and write
2BF2000
heap
page read and write
546D000
heap
page read and write
6121000
heap
page read and write
74A1000
heap
page read and write
2F00000
trusted library allocation
page read and write
5454000
heap
page read and write
5447000
heap
page read and write
4C61000
heap
page read and write
613B000
heap
page read and write
5455000
heap
page read and write
22C1000
heap
page read and write
2370000
heap
page read and write
22BF000
heap
page read and write
740B000
heap
page read and write
2A9D000
heap
page read and write
544F000
heap
page read and write
61F3000
heap
page read and write
49E000
stack
page read and write
500000
heap
page read and write
546D000
heap
page read and write
612C000
heap
page read and write
22C8000
heap
page read and write
2B2A000
heap
page read and write
7AE000
stack
page read and write
2BF2000
heap
page read and write
4B6C000
heap
page read and write
611F000
heap
page read and write
5467000
heap
page read and write
2BF2000
heap
page read and write
4C5A000
heap
page read and write
179000
stack
page read and write
60E6000
heap
page read and write
22DD000
heap
page read and write
22DE000
heap
page read and write
3030000
trusted library allocation
page read and write
2B2A000
heap
page read and write
2500000
heap
page read and write
546E000
heap
page read and write
4830000
trusted library allocation
page read and write
6271000
heap
page read and write
2C31000
heap
page read and write
60BD000
heap
page read and write
94E000
stack
page read and write
60F6000
heap
page read and write
546E000
heap
page read and write
60EE000
heap
page read and write
6229000
heap
page read and write
2B53000
heap
page read and write
283E000
stack
page read and write
38AC0000
heap
page read and write
2369000
heap
page read and write
5F14000
heap
page read and write
2B2E000
heap
page read and write
611F000
heap
page read and write
6115000
heap
page read and write
748F000
heap
page read and write
60A2000
heap
page read and write
6153000
heap
page read and write
6153000
heap
page read and write
2370000
heap
page read and write
60E6000
heap
page read and write
4BD2000
heap
page read and write
22D0000
heap
page read and write
53C6000
heap
page read and write
23AF000
heap
page read and write
5457000
heap
page read and write
539A000
heap
page read and write
4B82000
heap
page read and write
C30000
heap
page read and write
5C92000
heap
page read and write
2B97000
heap
page read and write
69E000
heap
page read and write
22DD000
heap
page read and write
53CA000
heap
page read and write
2A9D000
heap
page read and write
622F000
heap
page read and write
613C000
heap
page read and write
2350000
heap
page read and write
61A3000
heap
page read and write
6225000
heap
page read and write
60BF000
heap
page read and write
6269000
heap
page read and write
620000
heap
page read and write
6153000
heap
page read and write
60D7000
heap
page read and write
6FD000
stack
page read and write
611E000
heap
page read and write
6130000
heap
page read and write
22C9000
heap
page read and write
73F7000
heap
page read and write
22DD000
heap
page read and write
611E000
heap
page read and write
2C35000
heap
page read and write
742C000
heap
page read and write
504000
heap
page read and write
237D000
heap
page read and write
2C35000
heap
page read and write
22F8000
heap
page read and write
627A000
heap
page read and write
28CF000
heap
page read and write
610B000
heap
page read and write
6127000
heap
page read and write
60FD000
heap
page read and write
546D000
heap
page read and write
237E000
heap
page read and write
2AC0000
heap
page read and write
61A3000
heap
page read and write
7488000
heap
page read and write
4B71000
heap
page read and write
2377000
heap
page read and write
4B5B000
heap
page read and write
546D000
heap
page read and write
38280000
heap
page read and write
60EC000
heap
page read and write
2B11000
heap
page read and write
546D000
heap
page read and write
22D1000
heap
page read and write
2290000
heap
page read and write
2BF2000
heap
page read and write
6241000
heap
page read and write
7489000
heap
page read and write
400000
system
page execute and read and write
6223000
heap
page read and write
613B000
heap
page read and write
2A9D000
heap
page read and write
6271000
heap
page read and write
60FE000
heap
page read and write
61E7000
heap
page read and write
401000
unkown
page execute read
6129000
heap
page read and write
400000
unkown
page readonly
613B000
heap
page read and write
2AC6000
heap
page read and write
22D3000
heap
page read and write
2B2E000
heap
page read and write
2C47000
heap
page read and write
4830000
trusted library allocation
page read and write
73DF000
heap
page read and write
2323000
heap
page read and write
5BE000
stack
page read and write
53B2000
heap
page read and write
5C94000
heap
page read and write
61E2000
heap
page read and write
2364000
heap
page read and write
61F3000
heap
page read and write
60E9000
heap
page read and write
5FC6000
heap
page read and write
22C5000
heap
page read and write
7483000
heap
page read and write
60F7000
heap
page read and write
7422000
heap
page read and write
612D000
heap
page read and write
741B000
heap
page read and write
60FD000
heap
page read and write
19C000
stack
page read and write
6153000
heap
page read and write
2B49000
heap
page read and write
2B4F000
heap
page read and write
6227000
heap
page read and write
6269000
heap
page read and write
2B50000
heap
page read and write
61F3000
heap
page read and write
6153000
heap
page read and write
38AC0000
heap
page read and write
6174000
heap
page read and write
524000
heap
page read and write
6125000
heap
page read and write
22EE000
heap
page read and write
2370000
heap
page read and write
622F000
heap
page read and write
2375000
heap
page read and write
4830000
trusted library allocation
page read and write
4B5C000
heap
page read and write
6131000
heap
page read and write
22BC000
heap
page read and write
530000
heap
page read and write
2B08000
heap
page read and write
6153000
heap
page read and write
60E3000
heap
page read and write
60FE000
heap
page read and write
2C31000
heap
page read and write
4BE000
stack
page read and write
22C7000
heap
page read and write
5457000
heap
page read and write
60E9000
heap
page read and write
5447000
heap
page read and write
60D6000
heap
page read and write
2C31000
heap
page read and write
6115000
heap
page read and write
61E7000
heap
page read and write
2B98000
heap
page read and write
2334000
heap
page read and write
2C31000
heap
page read and write
60E6000
heap
page read and write
748E000
heap
page read and write
730000
heap
page read and write
611E000
heap
page read and write
2B08000
heap
page read and write
2B11000
heap
page read and write
2B9B000
heap
page read and write
3030000
trusted library allocation
page read and write
17C000
stack
page read and write
5455000
heap
page read and write
546D000
heap
page read and write
27C6000
heap
page read and write
237D000
heap
page read and write
7415000
heap
page read and write
6229000
heap
page read and write
634000
heap
page read and write
2B57000
heap
page read and write
64C5000
heap
page read and write
22A0000
heap
page read and write
2371000
heap
page read and write
2B81000
heap
page read and write
2AB3000
heap
page read and write
2BF2000
heap
page read and write
6115000
heap
page read and write
61F3000
heap
page read and write
2B97000
heap
page read and write
6E63000
direct allocation
page execute and read and write
5CAC000
heap
page read and write
61EA000
heap
page read and write
5454000
heap
page read and write
5D9C000
heap
page read and write
5C91000
heap
page read and write
37822000
heap
page read and write
2C31000
heap
page read and write
2B0D000
heap
page read and write
60D6000
heap
page read and write
627E000
heap
page read and write
2364000
heap
page read and write
73DF000
heap
page read and write
6271000
heap
page read and write
2370000
trusted library allocation
page read and write
2334000
heap
page read and write
546A000
heap
page read and write
22D0000
heap
page read and write
2B50000
heap
page read and write
38BB1000
heap
page read and write
4BD2000
heap
page read and write
6153000
heap
page read and write
37822000
heap
page read and write
2AB4000
heap
page read and write
22C5000
heap
page read and write
4B8A000
heap
page read and write
291E000
stack
page read and write
237E000
heap
page read and write
613B000
heap
page read and write
60AB000
heap
page read and write
546D000
heap
page read and write
6C0000
heap
page read and write
60F9000
heap
page read and write
6121000
heap
page read and write
6153000
heap
page read and write
2B2B000
heap
page read and write
612C000
heap
page read and write
3270000
direct allocation
page read and write
17C000
stack
page read and write
5434000
heap
page read and write
60F4000
heap
page read and write
2B1C000
heap
page read and write
610B000
heap
page read and write
4B5F000
heap
page read and write
6129000
heap
page read and write
6229000
heap
page read and write
3030000
trusted library allocation
page read and write
5CA8000
heap
page read and write
4C1F000
heap
page read and write
2981000
heap
page read and write
6198000
heap
page read and write
2BF2000
heap
page read and write
19A000
stack
page read and write
60EE000
heap
page read and write
525000
heap
page read and write
4B6D000
heap
page read and write
53BF000
heap
page read and write
613B000
heap
page read and write
60C5000
heap
page read and write
611E000
heap
page read and write
400000
unkown
page readonly
612A000
heap
page read and write
640000
heap
page read and write
2340000
heap
page read and write
40A000
unkown
page write copy
6211000
heap
page read and write
401000
unkown
page execute read
2BF2000
heap
page read and write
610B000
heap
page read and write
2B81000
heap
page read and write
2B2E000
heap
page read and write
673000
heap
page read and write
22BC000
heap
page read and write
2BF2000
heap
page read and write
5455000
heap
page read and write
5449000
heap
page read and write
193000
stack
page read and write
5C94000
heap
page read and write
612E000
heap
page read and write
53AA000
heap
page read and write
6153000
heap
page read and write
60D6000
heap
page read and write
408000
unkown
page readonly
6137000
heap
page read and write
66E000
stack
page read and write
22C1000
heap
page read and write
2ACD000
heap
page read and write
2B8A000
heap
page read and write
4B6C000
heap
page read and write
53F6000
heap
page read and write
60D4000
heap
page read and write
22FE000
heap
page read and write
610B000
heap
page read and write
22BC000
heap
page read and write
5457000
heap
page read and write
B8C000
heap
page read and write
546E000
heap
page read and write
4B5B000
heap
page read and write
22E1000
heap
page read and write
61CD000
heap
page read and write
4B8E000
heap
page read and write
18F000
stack
page read and write
6111000
heap
page read and write
5F0000
heap
page read and write
22C9000
heap
page read and write
612C000
heap
page read and write
612C000
heap
page read and write
748F000
heap
page read and write
22C7000
heap
page read and write
6175000
heap
page read and write
2BA0000
heap
page read and write
60D6000
heap
page read and write
6109000
heap
page read and write
2931000
heap
page read and write
60F6000
heap
page read and write
612C000
heap
page read and write
2C36000
heap
page read and write
539F000
heap
page read and write
612A000
heap
page read and write
6115000
heap
page read and write
6227000
heap
page read and write
AD0000
heap
page read and write
4BE4000
heap
page read and write
2CA2000
heap
page read and write
612C000
heap
page read and write
4830000
trusted library allocation
page read and write
2A68000
heap
page read and write
9BE000
stack
page read and write
2BF2000
heap
page read and write
B96000
heap
page read and write
2F03000
heap
page read and write
2CA2000
heap
page read and write
400000
unkown
page readonly
564000
heap
page read and write
ADE000
heap
page read and write
4BF2000
heap
page read and write
2B08000
heap
page read and write
244D000
heap
page read and write
60D7000
heap
page read and write
564000
heap
page read and write
546D000
heap
page read and write
2371000
heap
page read and write
61C6000
heap
page read and write
2350000
heap
page read and write
60F6000
heap
page read and write
ADD000
heap
page read and write
2731000
heap
page read and write
4ACF000
stack
page read and write
50B0000
trusted library allocation
page read and write
546E000
heap
page read and write
613C000
heap
page read and write
394A5000
heap
page read and write
60D4000
heap
page read and write
73FC000
heap
page read and write
61E0000
heap
page read and write
613B000
heap
page read and write
53A6000
heap
page read and write
38BBB000
heap
page read and write
177000
stack
page read and write
2B2E000
heap
page read and write
61E2000
heap
page read and write
22C3000
heap
page read and write
5C9D000
heap
page read and write
C13000
heap
page read and write
2B38000
heap
page read and write
2B89000
heap
page read and write
6112000
heap
page read and write
4B64000
heap
page read and write
546D000
heap
page read and write
A2F000
stack
page read and write
2ACD000
heap
page read and write
53F5000
heap
page read and write
22C5000
heap
page read and write
3290000
direct allocation
page read and write
22D1000
heap
page read and write
5EE000
stack
page read and write
5CA0000
heap
page read and write
6130000
heap
page read and write
613B000
heap
page read and write
43BF000
stack
page read and write
22BC000
heap
page read and write
4B82000
heap
page read and write
22D5000
heap
page read and write
2BF2000
heap
page read and write
546D000
heap
page read and write
60EC000
heap
page read and write
5370000
heap
page read and write
4C5E000
heap
page read and write
622D000
heap
page read and write
60D7000
heap
page read and write
53A3000
heap
page read and write
53A6000
heap
page read and write
5455000
heap
page read and write
60C6000
heap
page read and write
60C0000
heap
page read and write
6109000
heap
page read and write
2CA2000
heap
page read and write
624000
heap
page read and write
2B86000
heap
page read and write
611E000
heap
page read and write
6201000
heap
page read and write
544F000
heap
page read and write
2C4B000
heap
page read and write
2CA2000
heap
page read and write
6153000
heap
page read and write
60AB000
heap
page read and write
60F2000
heap
page read and write
60F9000
heap
page read and write
7422000
heap
page read and write
2BF2000
heap
page read and write
4B7C000
heap
page read and write
7483000
heap
page read and write
53BF000
heap
page read and write
40A000
unkown
page write copy
5447000
heap
page read and write
2B97000
heap
page read and write
17C000
stack
page read and write
6D430000
unkown
page readonly
5455000
heap
page read and write
76D000
stack
page read and write
5C96000
heap
page read and write
27A9000
heap
page read and write
4F93000
heap
page read and write
40A000
unkown
page write copy
635000
heap
page read and write
612C000
heap
page read and write
61F3000
heap
page read and write
3A30000
heap
page read and write
68B000
heap
page read and write
546D000
heap
page read and write
60DE000
heap
page read and write
748F000
heap
page read and write
3250000
direct allocation
page read and write
6121000
heap
page read and write
53E7000
heap
page read and write
73F7000
heap
page read and write
22D0000
heap
page read and write
C8E000
heap
page read and write
60F9000
heap
page read and write
2CA2000
heap
page read and write
4F54000
heap
page read and write
A80000
heap
page read and write
22CF000
heap
page read and write
6100000
heap
page read and write
625A000
heap
page read and write
2F00000
trusted library allocation
page read and write
4830000
trusted library allocation
page read and write
22C1000
heap
page read and write
22DD000
heap
page read and write
5451000
heap
page read and write
6153000
heap
page read and write
19C000
stack
page read and write
2B36000
heap
page read and write
612C000
heap
page read and write
41B000
system
page execute and read and write
2930000
heap
page read and write
83E000
stack
page read and write
2323000
heap
page read and write
53D6000
heap
page read and write
C1E000
heap
page read and write
2B39000
heap
page read and write
5455000
heap
page read and write
C80000
heap
page read and write
2C31000
heap
page read and write
2C41000
heap
page read and write
610B000
heap
page read and write
6266000
heap
page read and write
4B56000
heap
page read and write
22A4000
heap
page read and write
2F09000
heap
page read and write
5E5D000
heap
page read and write
30000
heap
page read and write
2ACE000
heap
page read and write
5459000
heap
page read and write
4B56000
heap
page read and write
22C3000
heap
page read and write
38AB1000
heap
page read and write
4C07000
heap
page read and write
27C1000
heap
page read and write
C1D000
heap
page read and write
22D0000
heap
page read and write
53C4000
heap
page read and write
624000
heap
page read and write
524000
heap
page read and write
546D000
heap
page read and write
2F00000
trusted library allocation
page read and write
4F90000
trusted library allocation
page read and write
22DD000
heap
page read and write
6167000
heap
page read and write
2B2A000
heap
page read and write
61F3000
heap
page read and write
61F2000
heap
page read and write
22D1000
heap
page read and write
22BF000
heap
page read and write
4830000
trusted library allocation
page read and write
22C9000
heap
page read and write
2C31000
heap
page read and write
38BB1000
heap
page read and write
9C000
stack
page read and write
2CA2000
heap
page read and write
2B2A000
heap
page read and write
2361000
heap
page read and write
22D0000
heap
page read and write
2B82000
heap
page read and write
437000
unkown
page readonly
6153000
heap
page read and write
435000
unkown
page read and write
6185000
heap
page read and write
544B000
heap
page read and write
5C0000
heap
page read and write
616C000
heap
page read and write
61E2000
heap
page read and write
2367000
heap
page read and write
61B0000
heap
page read and write
5CA5000
heap
page read and write
4BF2000
heap
page read and write
22D0000
heap
page read and write
60FE000
heap
page read and write
625A000
heap
page read and write
2C41000
heap
page read and write
612C000
heap
page read and write
4400000
trusted library allocation
page read and write
22C1000
heap
page read and write
2BEC000
heap
page read and write
6E4000
heap
page read and write
38AC0000
heap
page read and write
53D6000
heap
page read and write
4B7E000
heap
page read and write
3030000
trusted library allocation
page read and write
22C7000
heap
page read and write
658000
heap
page read and write
6112000
heap
page read and write
23D2000
heap
page read and write
2C31000
heap
page read and write
6241000
heap
page read and write
2C36000
heap
page read and write
504000
heap
page read and write
500E000
stack
page read and write
622B000
heap
page read and write
2C31000
heap
page read and write
537B000
heap
page read and write
2BF2000
heap
page read and write
6130000
heap
page read and write
5467000
heap
page read and write
73F7000
heap
page read and write
2B50000
heap
page read and write
613F000
heap
page read and write
5451000
heap
page read and write
2323000
heap
page read and write
93F000
stack
page read and write
611E000
heap
page read and write
60FE000
heap
page read and write
22D5000
heap
page read and write
7D8000
heap
page read and write
7488000
heap
page read and write
546D000
heap
page read and write
546D000
heap
page read and write
524000
heap
page read and write
22C4000
heap
page read and write
60D4000
heap
page read and write
60E000
stack
page read and write
58E000
stack
page read and write
613B000
heap
page read and write
4B56000
heap
page read and write
742C000
heap
page read and write
C1D000
heap
page read and write
38CB9000
heap
page read and write
5447000
heap
page read and write
4BFF000
heap
page read and write
22C7000
heap
page read and write
2442000
heap
page read and write
6137000
heap
page read and write
2375000
heap
page read and write
53B1000
heap
page read and write
44B0000
heap
page read and write
2BF2000
heap
page read and write
2AC6000
heap
page read and write
2370000
heap
page read and write
408000
unkown
page readonly
564000
heap
page read and write
612A000
heap
page read and write
53F5000
heap
page read and write
2B53000
heap
page read and write
7415000
heap
page read and write
4830000
trusted library allocation
page read and write
4B8E000
heap
page read and write
2B4A000
heap
page read and write
2931000
heap
page read and write
790000
trusted library allocation
page read and write
6153000
heap
page read and write
60EE000
heap
page read and write
7483000
heap
page read and write
5447000
heap
page read and write
7489000
heap
page read and write
22C7000
heap
page read and write
447000
unkown
page readonly
4B6E000
heap
page read and write
C10000
heap
page read and write
2361000
heap
page read and write
7485000
heap
page read and write
7487000
heap
page read and write
6137000
heap
page read and write
2AC6000
heap
page read and write
60F9000
heap
page read and write
4C02000
heap
page read and write
2290000
heap
page read and write
5457000
heap
page read and write
546D000
heap
page read and write
613C000
heap
page read and write
2BF2000
heap
page read and write
2CA2000
heap
page read and write
38AB1000
heap
page read and write
610B000
heap
page read and write
546A000
heap
page read and write
2281000
heap
page read and write
66F000
heap
page read and write
61E0000
heap
page read and write
6137000
heap
page read and write
613C000
heap
page read and write
2B9D000
heap
page read and write
8BF000
stack
page read and write
4C11000
heap
page read and write
49D0000
trusted library allocation
page read and write
29DC000
heap
page read and write
5452000
heap
page read and write
60EC000
heap
page read and write
2BF2000
heap
page read and write
2B87000
heap
page read and write
40A000
unkown
page write copy
2F00000
trusted library allocation
page read and write
237D000
heap
page read and write
3BB000
stack
page read and write
7489000
heap
page read and write
5387000
heap
page read and write
4B5C000
heap
page read and write
627A000
heap
page read and write
2AD7000
heap
page read and write
612A000
heap
page read and write
2C47000
heap
page read and write
613C000
heap
page read and write
61F3000
heap
page read and write
73FF000
heap
page read and write
22DC000
heap
page read and write
22D1000
heap
page read and write
2CA2000
heap
page read and write
60F9000
heap
page read and write
2730000
heap
page read and write
2AB3000
heap
page read and write
61B0000
heap
page read and write
61F3000
heap
page read and write
2C47000
heap
page read and write
61CF000
heap
page read and write
5455000
heap
page read and write
6153000
heap
page read and write
2B2E000
heap
page read and write
22BC000
heap
page read and write
622B000
heap
page read and write
5390000
heap
page read and write
6100000
heap
page read and write
627A000
heap
page read and write
2B86000
heap
page read and write
5410000
heap
page read and write
6225000
heap
page read and write
9C000
stack
page read and write
5457000
heap
page read and write
38AC0000
heap
page read and write
60B7000
heap
page read and write
7488000
heap
page read and write
61E0000
heap
page read and write
6225000
heap
page read and write
61F3000
heap
page read and write
7474000
heap
page read and write
22D1000
heap
page read and write
5419000
heap
page read and write
2323000
heap
page read and write
5459000
heap
page read and write
22D1000
heap
page read and write
6127000
heap
page read and write
408000
unkown
page readonly
2B2E000
heap
page read and write
7485000
heap
page read and write
610C000
heap
page read and write
53CA000
heap
page read and write
7487000
heap
page read and write
748E000
heap
page read and write
2B8A000
heap
page read and write
61E0000
heap
page read and write
60D6000
heap
page read and write
6153000
heap
page read and write
6121000
heap
page read and write
564000
heap
page read and write
609A000
heap
page read and write
2CA2000
heap
page read and write
24C0000
heap
page read and write
2B53000
heap
page read and write
23A3000
heap
page read and write
60A5000
heap
page read and write
2C31000
heap
page read and write
61E5000
heap
page read and write
238A000
heap
page read and write
5455000
heap
page read and write
2A3F000
stack
page read and write
2B2E000
heap
page read and write
5385000
heap
page read and write
2B2E000
heap
page read and write
2731000
heap
page read and write
537D000
heap
page read and write
2B0D000
heap
page read and write
4B5B000
heap
page read and write
262E000
stack
page read and write
53D4000
heap
page read and write
546E000
heap
page read and write
6115000
heap
page read and write
237D000
heap
page read and write
2361000
heap
page read and write
6153000
heap
page read and write
612C000
heap
page read and write
546D000
heap
page read and write
6153000
heap
page read and write
2290000
heap
page read and write
612C000
heap
page read and write
613B000
heap
page read and write
37822000
heap
page read and write
22BC000
heap
page read and write
53C4000
heap
page read and write
2B87000
heap
page read and write
6231000
heap
page read and write
4C65000
heap
page read and write
613C000
heap
page read and write
53E8000
heap
page read and write
22C1000
heap
page read and write
2C40000
heap
page read and write
3215000
heap
page read and write
6417000
heap
page read and write
748E000
heap
page read and write
437000
unkown
page readonly
2B2E000
heap
page read and write
4C1F000
heap
page read and write
2C3A000
heap
page read and write
53B2000
heap
page read and write
612C000
heap
page read and write
2B81000
heap
page read and write
400000
system
page execute and read and write
74A1000
heap
page read and write
73DF000
heap
page read and write
19A000
stack
page read and write
2790000
heap
page read and write
23D3000
heap
page read and write
2375000
heap
page read and write
546D000
heap
page read and write
752000
heap
page read and write
2B97000
heap
page read and write
41B000
system
page execute and read and write
544D000
heap
page read and write
6153000
heap
page read and write
2C39000
heap
page read and write
564000
heap
page read and write
2B09000
heap
page read and write
2A9B000
heap
page read and write
28C3000
heap
page read and write
28C1000
heap
page read and write
2C41000
heap
page read and write
2B2E000
heap
page read and write
613B000
heap
page read and write
4F9C000
heap
page read and write
73E0000
heap
page read and write
6153000
heap
page read and write
4C2E000
heap
page read and write
4B75000
heap
page read and write
22C1000
heap
page read and write
2B1C000
heap
page read and write
28CE000
heap
page read and write
73F7000
heap
page read and write
2364000
heap
page read and write
60A5000
heap
page read and write
2B2A000
heap
page read and write
23AE000
heap
page read and write
2BF2000
heap
page read and write
4F8E000
stack
page read and write
22D1000
heap
page read and write
4830000
trusted library allocation
page read and write
53F5000
heap
page read and write
612C000
heap
page read and write
B83000
heap
page read and write
5467000
heap
page read and write
60BC000
heap
page read and write
5404000
heap
page read and write
37A94000
heap
page read and write
4830000
trusted library allocation
page read and write
4B7E000
heap
page read and write
2B0D000
heap
page read and write
60FD000
heap
page read and write
22F1000
heap
page read and write
C8E000
heap
page read and write
2371000
heap
page read and write
2370000
trusted library allocation
page read and write
624000
heap
page read and write
6D431000
unkown
page execute read
291E000
heap
page read and write
2C36000
heap
page read and write
459000
system
page execute and read and write
740F000
heap
page read and write
2B81000
heap
page read and write
60FA000
heap
page read and write
546D000
heap
page read and write
6130000
heap
page read and write
2CA2000
heap
page read and write
2B1C000
heap
page read and write
394B1000
heap
page read and write
7474000
heap
page read and write
235F000
heap
page read and write
4C65000
heap
page read and write
193000
stack
page read and write
7476000
heap
page read and write
4B6D000
heap
page read and write
39CAD000
heap
page read and write
2AB3000
heap
page read and write
612E000
heap
page read and write
622F000
heap
page read and write
61AC000
heap
page read and write
612E000
heap
page read and write
6153000
heap
page read and write
38283000
heap
page read and write
53F5000
heap
page read and write
50B0000
trusted library allocation
page read and write
447000
unkown
page readonly
9C000
stack
page read and write
400000
system
page execute and read and write
5468000
heap
page read and write
612C000
heap
page read and write
2A60000
heap
page read and write
22DD000
heap
page read and write
6167000
heap
page read and write
2CA2000
heap
page read and write
7489000
heap
page read and write
4B6C000
heap
page read and write
2CA2000
heap
page read and write
3240000
direct allocation
page read and write
4B5B000
heap
page read and write
622D000
heap
page read and write
22BC000
heap
page read and write
7415000
heap
page read and write
22E0000
heap
page read and write
6100000
heap
page read and write
6115000
heap
page read and write
6153000
heap
page read and write
610B000
heap
page read and write
22CC000
heap
page read and write
2975000
heap
page read and write
22C1000
heap
page read and write
7428000
heap
page read and write
2B2B000
heap
page read and write
612A000
heap
page read and write
525000
heap
page read and write
2B3B000
heap
page read and write
4831000
heap
page read and write
60D6000
heap
page read and write
22D0000
heap
page read and write
6241000
heap
page read and write
7400000
heap
page read and write
546A000
heap
page read and write
AD0000
trusted library allocation
page read and write
2370000
heap
page read and write
22D0000
heap
page read and write
22DD000
heap
page read and write
2332000
heap
page read and write
61F3000
heap
page read and write
32F0000
direct allocation
page read and write
546D000
heap
page read and write
2CA2000
heap
page read and write
625A000
heap
page read and write
2B08000
heap
page read and write
613B000
heap
page read and write
22C8000
heap
page read and write
546D000
heap
page read and write
5462000
heap
page read and write
6137000
heap
page read and write
2C31000
heap
page read and write
2C31000
heap
page read and write
61E0000
heap
page read and write
2BF2000
heap
page read and write
612C000
heap
page read and write
524000
heap
page read and write
546D000
heap
page read and write
235C000
heap
page read and write
5455000
heap
page read and write
2B97000
heap
page read and write
6153000
heap
page read and write
7474000
heap
page read and write
613B000
heap
page read and write
6225000
heap
page read and write
564000
heap
page read and write
2C35000
heap
page read and write
61F3000
heap
page read and write
60EC000
heap
page read and write
2BF2000
heap
page read and write
433E000
stack
page read and write
400000
unkown
page readonly
624000
heap
page read and write
C86000
heap
page read and write
2B50000
heap
page read and write
2B2E000
heap
page read and write
720000
heap
page read and write
6269000
heap
page read and write
2B53000
heap
page read and write
2B81000
heap
page read and write
2CA2000
heap
page read and write
6241000
heap
page read and write
4B6C000
heap
page read and write
546C000
heap
page read and write
60A2000
heap
page read and write
60F9000
heap
page read and write
4BE4000
heap
page read and write
4B5C000
heap
page read and write
4C63000
heap
page read and write
53D6000
heap
page read and write
60C5000
heap
page read and write
22C7000
heap
page read and write
4B8A000
heap
page read and write
2C37000
heap
page read and write
38BB1000
heap
page read and write
504000
heap
page read and write
6153000
heap
page read and write
610B000
heap
page read and write
546A000
heap
page read and write
22DD000
heap
page read and write
60D1000
heap
page read and write
2B81000
heap
page read and write
61F3000
heap
page read and write
2B30000
heap
page read and write
37A93000
heap
page read and write
2C32000
heap
page read and write
6FF26000
unkown
page readonly
2B50000
heap
page read and write
22D0000
heap
page read and write
61F2000
heap
page read and write
53A6000
heap
page read and write
2B4A000
heap
page read and write
2B0D000
heap
page read and write
5C93000
heap
page read and write
2C4A000
heap
page read and write
2A3F000
heap
page read and write
61F3000
heap
page read and write
6115000
heap
page read and write
6123000
heap
page read and write
2B4D000
heap
page read and write
2B10000
heap
page read and write
437000
unkown
page readonly
6174000
heap
page read and write
6269000
heap
page read and write
53D4000
heap
page read and write
236D000
heap
page read and write
2B1D000
heap
page read and write
22C4000
heap
page read and write
504000
heap
page read and write
624000
heap
page read and write
2371000
heap
page read and write
2C37000
heap
page read and write
2371000
heap
page read and write
546E000
heap
page read and write
37822000
heap
page read and write
22C8000
heap
page read and write
2C35000
heap
page read and write
6137000
heap
page read and write
624000
heap
page read and write
2981000
heap
page read and write
6115000
heap
page read and write
2C31000
heap
page read and write
4830000
trusted library allocation
page read and write
38281000
heap
page read and write
6223000
heap
page read and write
504000
heap
page read and write
2323000
heap
page read and write
2ACE000
heap
page read and write
2323000
heap
page read and write
22CC000
heap
page read and write
2CA2000
heap
page read and write
60D1000
heap
page read and write
500000
heap
page read and write
28C0000
heap
page read and write
2CA2000
heap
page read and write
4B51000
heap
page read and write
612E000
heap
page read and write
6100000
heap
page read and write
6153000
heap
page read and write
564000
heap
page read and write
ADD000
heap
page read and write
60E9000
heap
page read and write
4C58000
heap
page read and write
61CD000
heap
page read and write
4B76000
heap
page read and write
22DD000
heap
page read and write
2BEC000
heap
page read and write
2A8C000
heap
page read and write
564000
heap
page read and write
2CA2000
heap
page read and write
5458000
heap
page read and write
B9E000
heap
page read and write
22DE000
heap
page read and write
22C7000
heap
page read and write
61B0000
heap
page read and write
5070000
heap
page read and write
60F9000
heap
page read and write
3260000
direct allocation
page read and write
560000
heap
page read and write
60FA000
heap
page read and write
2B81000
heap
page read and write
2B81000
heap
page read and write
2C48000
heap
page read and write
609B000
heap
page read and write
AD5000
heap
page read and write
2329000
heap
page read and write
2C40000
heap
page read and write
60EE000
heap
page read and write
7863000
direct allocation
page execute and read and write
2371000
heap
page read and write
2B53000
heap
page read and write
2F00000
heap
page read and write
6269000
heap
page read and write
630000
heap
page read and write
6137000
heap
page read and write
28C2000
heap
page read and write
546D000
heap
page read and write
6153000
heap
page read and write
6130000
heap
page read and write
613B000
heap
page read and write
22D8000
heap
page read and write
6249000
heap
page read and write
2B2A000
heap
page read and write
2B2E000
heap
page read and write
6167000
heap
page read and write
5452000
heap
page read and write
61BC000
heap
page read and write
6115000
heap
page read and write
546D000
heap
page read and write
400000
unkown
page readonly
627E000
heap
page read and write
2C31000
heap
page read and write
5467000
heap
page read and write
2BF2000
heap
page read and write
22BC000
heap
page read and write
A60000
heap
page read and write
613A000
heap
page read and write
6137000
heap
page read and write
61F3000
heap
page read and write
2362000
heap
page read and write
504000
heap
page read and write
53AA000
heap
page read and write
2B2E000
heap
page read and write
546D000
heap
page read and write
22C8000
heap
page read and write
73F7000
heap
page read and write
4C1F000
heap
page read and write
6100000
heap
page read and write
543E000
heap
page read and write
53CA000
heap
page read and write
6121000
heap
page read and write
6174000
heap
page read and write
23AB000
heap
page read and write
2375000
heap
page read and write
437E000
stack
page read and write
2361000
heap
page read and write
53F5000
heap
page read and write
53F3000
heap
page read and write
53B2000
heap
page read and write
2730000
heap
page read and write
57E000
stack
page read and write
40A000
unkown
page write copy
5CAB000
heap
page read and write
5398000
heap
page read and write
2B2A000
heap
page read and write
2370000
heap
page read and write
61E2000
heap
page read and write
2BF2000
heap
page read and write
60F9000
heap
page read and write
23AA000
heap
page read and write
408000
unkown
page readonly
546A000
heap
page read and write
408000
unkown
page readonly
612E000
heap
page read and write
2B59000
heap
page read and write
22C9000
heap
page read and write
2A5D000
heap
page read and write
546D000
heap
page read and write
236D000
heap
page read and write
53BF000
heap
page read and write
524000
heap
page read and write
AFC000
heap
page read and write
2370000
heap
page read and write
524000
heap
page read and write
60FD000
heap
page read and write
2BF2000
heap
page read and write
5457000
heap
page read and write
38A75000
heap
page read and write
624000
heap
page read and write
61D0000
heap
page read and write
2C30000
heap
page read and write
6225000
heap
page read and write
61E2000
heap
page read and write
2B81000
heap
page read and write
2333000
heap
page read and write
546B000
heap
page read and write
22D5000
heap
page read and write
61D0000
heap
page read and write
22C9000
heap
page read and write
6153000
heap
page read and write
504000
heap
page read and write
38280000
heap
page read and write
6133000
heap
page read and write
4830000
trusted library allocation
page read and write
6137000
heap
page read and write
6115000
heap
page read and write
19C000
stack
page read and write
2BF2000
heap
page read and write
2B9B000
heap
page read and write
2A50000
heap
page read and write
5F0000
heap
page read and write
B9D000
heap
page read and write
22C9000
heap
page read and write
613B000
heap
page read and write
400000
unkown
page readonly
6153000
heap
page read and write
61C6000
heap
page read and write
4C10000
heap
page read and write
2B0D000
heap
page read and write
2B2B000
heap
page read and write
237D000
heap
page read and write
60EC000
heap
page read and write
2C35000
heap
page read and write
611F000
heap
page read and write
60D4000
heap
page read and write
2366000
heap
page read and write
564000
heap
page read and write
6153000
heap
page read and write
5457000
heap
page read and write
612C000
heap
page read and write
61A4000
heap
page read and write
2B08000
heap
page read and write
611F000
heap
page read and write
2371000
heap
page read and write
4B4F000
stack
page read and write
40A000
unkown
page write copy
790000
heap
page read and write
741B000
heap
page read and write
5CA3000
heap
page read and write
2C31000
heap
page read and write
4C39000
heap
page read and write
612E000
heap
page read and write
4B56000
heap
page read and write
61A3000
heap
page read and write
2791000
heap
page read and write
237D000
heap
page read and write
38AB1000
heap
page read and write
2323000
heap
page read and write
53E7000
heap
page read and write
72F000
stack
page read and write
4C4C000
heap
page read and write
6131000
heap
page read and write
2B50000
heap
page read and write
408000
unkown
page readonly
6167000
heap
page read and write
60EE000
heap
page read and write
2BF2000
heap
page read and write
45C000
system
page execute and read and write
60E9000
heap
page read and write
74A1000
heap
page read and write
2CA2000
heap
page read and write
2323000
heap
page read and write
4440000
heap
page read and write
61A3000
heap
page read and write
600000
heap
page read and write
2C4B000
heap
page read and write
624000
heap
page read and write
53BF000
heap
page read and write
4DE000
stack
page read and write
524000
heap
page read and write
2340000
heap
page read and write
2445000
heap
page read and write
4B8A000
heap
page read and write
2B9B000
heap
page read and write
546A000
heap
page read and write
622D000
heap
page read and write
400000
unkown
page readonly
6223000
heap
page read and write
32A0000
direct allocation
page read and write
22BF000
heap
page read and write
524000
heap
page read and write
401000
unkown
page execute read
22D0000
heap
page read and write
6131000
heap
page read and write
2362000
heap
page read and write
2C4B000
heap
page read and write
742C000
heap
page read and write
5383000
heap
page read and write
2B53000
heap
page read and write
5B0000
heap
page read and write
2B8A000
heap
page read and write
613B000
heap
page read and write
237D000
heap
page read and write
22C1000
heap
page read and write
2BF2000
heap
page read and write
544C000
heap
page read and write
5CA5000
heap
page read and write
60F7000
heap
page read and write
456000
system
page execute and read and write
5CA5000
heap
page read and write
C5C000
heap
page read and write
6157000
heap
page read and write
5372000
heap
page read and write
524000
heap
page read and write
60E6000
heap
page read and write
2361000
heap
page read and write
4C02000
heap
page read and write
60F6000
heap
page read and write
22CD000
heap
page read and write
610A000
heap
page read and write
2C48000
heap
page read and write
611F000
heap
page read and write
525000
heap
page read and write
9CD000
stack
page read and write
754000
heap
page read and write
22C7000
heap
page read and write
6133000
heap
page read and write
6153000
heap
page read and write
6121000
heap
page read and write
4BFF000
heap
page read and write
230A000
heap
page read and write
B9E000
heap
page read and write
4B71000
heap
page read and write
2364000
heap
page read and write
53C6000
heap
page read and write
544F000
heap
page read and write
22D0000
heap
page read and write
22CF000
heap
page read and write
2BF2000
heap
page read and write
2B1C000
heap
page read and write
ADA000
heap
page read and write
2CA2000
heap
page read and write
22E4000
heap
page read and write
25EF000
stack
page read and write
60F7000
heap
page read and write
2378000
heap
page read and write
437000
unkown
page readonly
740F000
heap
page read and write
53C6000
heap
page read and write
2C63000
heap
page read and write
7485000
heap
page read and write
2AC1000
heap
page read and write
2BA0000
heap
page read and write
2F89000
heap
page read and write
60F9000
heap
page read and write
613B000
heap
page read and write
4B5D000
heap
page read and write
401000
unkown
page execute read
7474000
heap
page read and write
237D000
heap
page read and write
5455000
heap
page read and write
545E000
heap
page read and write
22C8000
heap
page read and write
2AC4000
heap
page read and write
37A98000
heap
page read and write
22D5000
heap
page read and write
5452000
heap
page read and write
236C000
heap
page read and write
4C58000
heap
page read and write
541D000
heap
page read and write
612D000
heap
page read and write
525000
heap
page read and write
4B5B000
heap
page read and write
612C000
heap
page read and write
437000
unkown
page readonly
2C48000
heap
page read and write
4C67000
heap
page read and write
6129000
heap
page read and write
4B74000
heap
page read and write
B90000
heap
page read and write
5455000
heap
page read and write
6234000
heap
page read and write
612C000
heap
page read and write
2A31000
heap
page read and write
2C63000
heap
page read and write
22C5000
heap
page read and write
177000
stack
page read and write
53F5000
heap
page read and write
6130000
heap
page read and write
6FF2D000
unkown
page read and write
6153000
heap
page read and write
6182000
heap
page read and write
2B90000
heap
page read and write
19C000
stack
page read and write
AF0000
heap
page read and write
2C48000
heap
page read and write
408000
unkown
page readonly
2B2E000
heap
page read and write
30000
heap
page read and write
5C90000
heap
page read and write
546D000
heap
page read and write
5452000
heap
page read and write
2B21000
heap
page read and write
5467000
heap
page read and write
611E000
heap
page read and write
There are 2473 hidden memdumps, click here to show them.