IOC Report
vFjfAgq5PM.msi

loading gif

Files

File Path
Type
Category
Malicious
vFjfAgq5PM.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {4203B04D-806D-4EBE-BCFF-E19C0C1E195F}, Number of Words: 2, Subject: Windows Service Association, Author: Microsoft, Name of Creating Application: Windows Service Association, Template: ;1033, Comments: This installer database contains the logic and data required to install Windows Service Association., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
initial sample
malicious
C:\Program Files (x86)\Dropbox\Update\dropbox.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Dropbox\Update\goopdate.dll (copy)
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\Public\Documents\CapCut_installer.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\pssFDDB.ps1
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\scrFDCA.ps1
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Config.Msi\45f7a1.rbs
data
modified
C:\Users\Public\Documents\Dropbox.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\Public\Documents\goopdate.dll
PE32 executable (DLL) (console) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\ProFDDC.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bsbsdnpr.qrd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ir210rvi.3gp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oy0gebsq.42r.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_row5q4et.xmt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t24wbe40.abe.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wbsc002t.u1q.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\automatic_scaling_en.png
PNG image data, 1280 x 720, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\chroma_keying_en.png
PNG image data, 1280 x 720, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\installer_downloader.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\intelligent_subtitles_en.png
PNG image data, 1280 x 720, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\keyframe_en.png
PNG image data, 1280 x 720, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\nVr5.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\nsv77E.tmp\BgWorker.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsv77E.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsv77E.tmp\deviceregister_shared.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsv77E.tmp\downloader_nsis_plugin.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsv77E.tmp\res.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\nsv77E.tmp\shell_downloader.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\speech_synthesis_en.png
PNG image data, 1280 x 720, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\text_style_en.png
PNG image data, 1280 x 720, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\visual_effects_en.png
PNG image data, 1280 x 720, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\water_world_en.png
PNG image data, 1280 x 720, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\app_shell_cache_562354\app_package_6f432258ca.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\45f79f.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {4203B04D-806D-4EBE-BCFF-E19C0C1E195F}, Number of Words: 2, Subject: Windows Service Association, Author: Microsoft, Name of Creating Application: Windows Service Association, Template: ;1033, Comments: This installer database contains the logic and data required to install Windows Service Association., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
dropped
C:\Windows\Installer\MSIFBC5.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIFC43.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIFC73.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIFC93.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIFCD3.tmp
data
dropped
C:\Windows\Installer\MSIFD80.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\SourceHash{082E188A-67FA-4D67-920E-C850215DB6EC}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\~DF16D12FB74D8F415D.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF17033EB26EE1F739.TMP
data
dropped
C:\Windows\Temp\~DF19852D83031204CA.TMP
data
dropped
C:\Windows\Temp\~DF1AD5B1073908CCBD.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF1FCAAD1E1A835F32.TMP
data
dropped
C:\Windows\Temp\~DF2721960501F9B14D.TMP
data
dropped
C:\Windows\Temp\~DF2C44DEC0CAFD61B5.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF827849708F15B534.TMP
data
dropped
C:\Windows\Temp\~DF8995C8B5E81826BF.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFA44C032BD4F2FEA3.TMP
data
dropped
C:\Windows\Temp\~DFEAF9207C6207C7AD.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFFAD2D32415C8B744.TMP
data
dropped
There are 48 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\vFjfAgq5PM.msi"
malicious
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 9342AE7FC298454AC0E2B46CA904726C
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 84080775417F402876A00B89D1C4E077 E Global\MSI0000
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\pssFDDB.ps1" -propFile "C:\Users\user\AppData\Local\Temp\msiFDC9.txt" -scriptFile "C:\Users\user\AppData\Local\Temp\scrFDCA.ps1" -scriptArgsFile "C:\Users\user\AppData\Local\Temp\scrFDCB.txt" -propSep " :<->: " -testPrefix "_testValue."
malicious
C:\Users\Public\Documents\CapCut_installer.exe
"C:\Users\Public\Documents\capcut_installer.exe"
malicious
C:\Program Files (x86)\Dropbox\Update\dropbox.exe
"C:\Program Files (x86)\Dropbox\Update\dropbox.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -Command "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Program Files (x86)\Dropbox\Update\Dropbox.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'GoogleUpdateTaskMachineUA'"
malicious
C:\Program Files (x86)\Dropbox\Update\dropbox.exe
"C:\Program Files (x86)\Dropbox\Update\Dropbox.exe"
malicious
C:\Program Files (x86)\Dropbox\Update\dropbox.exe
"C:\Program Files (x86)\Dropbox\Update\Dropbox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\SysWOW64\cmd.exe" /c "C:\Program Files (x86)\Dropbox\Update\dropbox.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://45.202.35.101/pLQvfD4d/index.phpv
unknown
http://45.202.35.101/pLQvfD4d/index.phps
unknown
http://45.202.35.101/pLQvfD4d/index.phpI-CA
unknown
https://mcs.byteoversea.net/v1/json_test
unknown
http://45.202.35.101/pLQvfD4d/index.phpz
unknown
https://contoso.com/License
unknown
https://sgali-mcs.byteoversea.com/v1/jsonV
unknown
https://imagemagick.org
unknown
https://maliva-mcs.byteoversea.com
unknown
https://editor-api-sg.capcut.com/service/2/app_alert_check/
unknown
https://curl.se/docs/hsts.html
unknown
https://www.capcut.net/clause/user-agreementhttps://www.capcut.net/clause/privacyusD
unknown
http://45.202.35.101/pLQvfD4d/index.phpParameters
unknown
https://editor-api-sg.capcut.com
unknown
https://sf16-va.tiktokcdn.com/obj/eden-va2/JW-abJwhJ/ljhwZthlaukjlkulzlp/installer/pic/v1/water_worl
unknown
http://45.202.35.101/pLQvfD4d/index.php
unknown
http://45.202.35.101/pLQvfD4d/index.phpft
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://sf16-va.tiktokcdn.com/obj/eden-va2/JW-abJwhJ/ljhwZthlaukjlkulzlp/installer/pic/v1/automatic_
unknown
http://45.202.35.101/pLQvfD4d/index.php&
unknown
https://maliva-mcs.byteoversea.com/v1/json
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://45.202.35.101/pLQvfD4d/index.php4
unknown
http://45.202.35.101/pLQvfD4d/index.php6
unknown
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://45.202.35.101/pLQvfD4d/index.php7
unknown
https://sgali-mcs.byteoversea.com
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://curl.se/docs/http-cookies.html
unknown
http://45.202.35.101/pLQvfD4d/index.phpindows
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://sf16-va.tiktokcdn.com/obj/eden-va2/JW-abJwhJ/ljhwZthlaukjlkulzlp/installer/pic/v1/visual_eff
unknown
https://contoso.com/Icon
unknown
https://sgali-mcs.byteoversea.com/v1/jsonhttps://mcs.byteoversea.net/v1/json_testInstallerDownloader
unknown
https://aka.ms/pscore6lBkq
unknown
http://45.202.35.101/pLQvfD4d/index.php7-
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://curl.se/docs/alt-svc.html
unknown
https://editor-api-sg.capcut.com/service/2/desktop/device_register/https://editor-api-sg.capcut.com/
unknown
https://lf16-capcut.faceulv.com/obj/capcutpc-packages-us/packages/CapCut_2_6_0_814_capcutpc_0_creato
unknown
https://github.com/Pester/Pester
unknown
https://lf16-capcut.faceulv.com/obj/capcutpc-packages-us/packages/CapCut_4_6_0_1754_capcutpc_0_creat
unknown
https://sf16-va.tiktokcdn.com/obj/eden-va2/JW-abJwhJ/ljhwZthlaukjlkulzlp/installer/pic/v1/intelligen
unknown
http://45.202.35.101/pLQvfD4d/index.phpV
unknown
https://sf16-va.tiktokcdn.com/obj/eden-va2/JW-abJwhJ/ljhwZthlau
unknown
http://45.202.35.101/pLQvfD4d/index.phpQ
unknown
http://crl.micro
unknown
https://www.thawte.com/cps0/
unknown
https://sgali-mcs.byteoversea.com/v1/json
unknown
https://www.thawte.com/repository0W
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://editor-api-sg.capcut.comhttps://editor-api-sg.capcut.comhttps://sgali-mcs.byteoversea.comhtt
unknown
https://sf16-va.tiktokcdn.com/obj/eden-va2/JW-abJwhJ/ljhwZthlaukjlkulzlp/installer/pic/v1/keyframe/k
unknown
https://sf16-va.tiktokcdn.com/obj/eden-va2/JW-abJwhJ/ljhwZthlaukjlkulzlp/installer/pic/v1/speech_syn
unknown
https://www.advancedinstaller.com
unknown
http://45.202.35.101/pLQvfD4d/index.phpf
unknown
http://45.202.35.101/pLQvfD4d/index.phpg
unknown
https://aka.ms/pscore68
unknown
http://45.202.35.101/pLQvfD4d/index.phpb
unknown
https://editor-api-sg.capcut.com/service/2/desktop/device_register/
unknown
https://sf16-va.tiktokcdn.com/obj/eden-va2/JW-abJwhJ/ljhwZthlaukjlkulzlp/installer/pic/v1/chroma_key
unknown
http://45.202.35.101/pLQvfD4d/index.phpn
unknown
https://sf16-va.tiktokcdn.com/obj/eden-va2/JW-abJwhJ/ljhwZthlaud
unknown
https://sf16-va.tiktokcdn.com/obj/eden-va2/JW-abJwhJ/ljhwZthlaukjlkulzlp/installer/pic/v1/text_style
unknown
http://45.202.35.101/pLQvfD4d/index.phpi
unknown
There are 59 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
45.202.35.101
unknown
Seychelles
malicious
2.16.202.65
unknown
European Union
2.16.202.97
unknown
European Union
2.18.64.35
unknown
European Union
2.16.62.200
unknown
European Union
87.248.202.1
unknown
United Kingdom
127.0.0.1
unknown
unknown
2.19.126.136
unknown
European Union

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\45f7a1.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\45f7a1.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2D208A7AC4793F146B25264174A9500B
A881E280AF7676D429E08C0512D56BCE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6A803C3591405434F9108DE8AA427B1F
A881E280AF7676D429E08C0512D56BCE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\348656E90AF6BE54485486DEE1BCB3A1
A881E280AF7676D429E08C0512D56BCE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A893E4A58599D724D8D2CB9EA85EF280
A881E280AF7676D429E08C0512D56BCE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C7C7001D79778F845A4ECF15E6C08BA2
A881E280AF7676D429E08C0512D56BCE
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\Microsoft\Windows Service Association\
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Service Association
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Service Association
Path
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings
JITDebug
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\25\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\25\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2CE1000
unclassified section
page execute read
malicious
1000000
direct allocation
page read and write
malicious
2AA0000
heap
page execute and read and write
malicious
10A8000
heap
page read and write
malicious
61C9000
heap
page read and write
72A8000
heap
page read and write
56DE0000
direct allocation
page read and write
2FA4000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
536C000
heap
page read and write
61CE000
heap
page read and write
7FFD9B2E4000
trusted library allocation
page read and write
75C2000
heap
page read and write
2FFC000
heap
page read and write
2FDE000
heap
page read and write
1380000
heap
page read and write
53AD000
heap
page read and write
3C75000
heap
page read and write
5ADD000
heap
page read and write
56DE0000
direct allocation
page read and write
6FE0000
heap
page execute and read and write
7BF8000
heap
page read and write
1199000
heap
page read and write
6736000
heap
page read and write
63B0000
heap
page read and write
620000
heap
page read and write
52D3000
heap
page read and write
56DE0000
direct allocation
page read and write
6781000
heap
page read and write
71CE000
heap
page read and write
20804B40000
heap
page read and write
56DE0000
direct allocation
page read and write
728F000
heap
page read and write
208065F0000
heap
page execute and read and write
3C98000
heap
page read and write
56DC8000
direct allocation
page read and write
5F05000
heap
page read and write
20804D0E000
heap
page read and write
7603000
heap
page read and write
7FFD9B630000
trusted library allocation
page read and write
543F000
heap
page read and write
208065F7000
heap
page execute and read and write
6B1A000
heap
page read and write
7FFD9B530000
trusted library allocation
page read and write
67EF000
heap
page read and write
2FE3000
heap
page read and write
3C43000
heap
page read and write
6704000
heap
page read and write
401000
unkown
page execute read
2FA1000
heap
page read and write
5AF1000
heap
page read and write
5C4000
heap
page read and write
71F6000
heap
page read and write
5AFD000
heap
page read and write
3217000
heap
page read and write
567000
unkown
page readonly
63AB000
heap
page read and write
56DE0000
direct allocation
page read and write
56D10000
direct allocation
page read and write
700D000
heap
page read and write
65E4000
heap
page read and write
779E000
stack
page read and write
5305000
heap
page read and write
5C4000
heap
page read and write
98000
stack
page read and write
56D3C000
direct allocation
page read and write
3CA0000
heap
page read and write
7958000
heap
page read and write
6790000
heap
page read and write
6C4B000
heap
page read and write
7FFD9B3C6000
trusted library allocation
page execute and read and write
5F14000
heap
page read and write
2081EE27000
heap
page read and write
2FD9000
heap
page read and write
56D2E000
direct allocation
page read and write
5C4000
heap
page read and write
56C06000
direct allocation
page read and write
6FF9000
heap
page read and write
73A4000
heap
page read and write
2F90000
trusted library allocation
page read and write
F9A6AFF000
stack
page read and write
5AEC000
heap
page read and write
580E000
trusted library allocation
page read and write
3CA8000
heap
page read and write
7FFD9B620000
trusted library allocation
page read and write
F9A6A7E000
stack
page read and write
727B000
heap
page read and write
56DE0000
direct allocation
page read and write
56C0A000
direct allocation
page read and write
3C3C000
heap
page read and write
726E000
heap
page read and write
667000
heap
page read and write
58B9000
trusted library allocation
page read and write
56CEE000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
637E000
heap
page read and write
61BF000
heap
page read and write
5C4000
heap
page read and write
6423000
heap
page read and write
2FDE000
heap
page read and write
52B5000
heap
page read and write
3CAF000
heap
page read and write
2370000
heap
page read and write
3F2D000
stack
page read and write
7810000
trusted library allocation
page read and write
2FD4000
heap
page read and write
F9A65FE000
stack
page read and write
6E504000
unkown
page readonly
6EE7000
heap
page read and write
6A9D000
heap
page read and write
3C5C000
heap
page read and write
56DE0000
direct allocation
page read and write
790E000
stack
page read and write
5839000
trusted library allocation
page read and write
7B0000
heap
page read and write
78B0000
trusted library allocation
page read and write
3C37000
heap
page read and write
6BB16000
unkown
page readonly
2FBF000
heap
page read and write
2081F060000
heap
page read and write
3CAA000
heap
page read and write
7850000
trusted library allocation
page read and write
2FA1000
heap
page read and write
716D000
stack
page read and write
56DE0000
direct allocation
page read and write
2FFC000
heap
page read and write
3C8E000
heap
page read and write
56DE0000
direct allocation
page read and write
5F69000
heap
page read and write
7FFD9B5D0000
trusted library allocation
page read and write
56DE0000
direct allocation
page read and write
6AB1000
heap
page read and write
6BB9000
heap
page read and write
3C7D000
heap
page read and write
68EB000
heap
page read and write
7FFD9B5F0000
trusted library allocation
page read and write
C60000
heap
page read and write
65DF000
heap
page read and write
4A4E000
stack
page read and write
71EE000
stack
page read and write
2F50000
heap
page read and write
5C4000
heap
page read and write
56DE0000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
362F000
stack
page read and write
3C8C000
heap
page read and write
52A6000
heap
page read and write
3C61000
heap
page read and write
6790000
heap
page read and write
674A000
heap
page read and write
5B25000
heap
page read and write
3C6B000
heap
page read and write
4B50000
heap
page read and write
84E4000
heap
page read and write
734A000
heap
page read and write
2F8C000
heap
page read and write
66A5000
heap
page read and write
6218000
heap
page read and write
56DE0000
direct allocation
page read and write
7249000
heap
page read and write
3010000
heap
page read and write
5818000
trusted library allocation
page read and write
3032000
heap
page read and write
6E88000
heap
page read and write
2D45000
unclassified section
page read and write
56DE0000
direct allocation
page read and write
6B91000
heap
page read and write
3C3A000
heap
page read and write
19D000
stack
page read and write
532B000
heap
page read and write
705D000
heap
page read and write
7631000
heap
page read and write
60A9000
heap
page read and write
5CF2000
heap
page read and write
56CD4000
direct allocation
page read and write
5CF7000
heap
page read and write
6EB0000
heap
page read and write
6E6A000
heap
page read and write
56D00000
direct allocation
page read and write
5F0A000
heap
page read and write
3C3F000
heap
page read and write
723A000
heap
page read and write
2F80000
heap
page read and write
56DC4000
direct allocation
page read and write
7294000
heap
page read and write
5C4000
heap
page read and write
76E2000
heap
page read and write
52BF000
heap
page read and write
77E0000
trusted library allocation
page read and write
6772000
heap
page read and write
7572000
heap
page read and write
56D00000
direct allocation
page read and write
2FC5000
heap
page read and write
5D38000
heap
page read and write
F9A6FBB000
stack
page read and write
4B2B000
stack
page read and write
63A1000
heap
page read and write
6C73000
heap
page read and write
68BE000
heap
page read and write
20804CCD000
heap
page read and write
2FED000
heap
page read and write
3CA5000
heap
page read and write
3200000
trusted library allocation
page read and write
84E8000
heap
page read and write
6F14000
heap
page read and write
56DE0000
direct allocation
page read and write
20804F65000
heap
page read and write
2FFC000
heap
page read and write
71B5000
heap
page read and write
841E000
stack
page read and write
3C85000
heap
page read and write
5B0F000
heap
page read and write
56DE0000
direct allocation
page read and write
56D70000
direct allocation
page read and write
3630000
heap
page read and write
2FCA000
heap
page read and write
6ED3000
heap
page read and write
5CD9000
heap
page read and write
6B78000
heap
page read and write
67E9000
heap
page read and write
8440000
trusted library allocation
page read and write
7890000
trusted library allocation
page read and write
7FFD9B33C000
trusted library allocation
page execute and read and write
6214000
heap
page read and write
6FFE000
heap
page read and write
650000
heap
page read and write
5CCA000
heap
page read and write
7871000
heap
page read and write
7590000
heap
page read and write
7660000
heap
page read and write
3C98000
heap
page read and write
7230000
heap
page read and write
7267000
heap
page read and write
3C34000
heap
page read and write
2FCA000
heap
page read and write
6763000
heap
page read and write
2E4E000
stack
page read and write
6BAF000
heap
page read and write
56C01000
direct allocation
page read and write
2FC2000
heap
page read and write
6B3C000
heap
page read and write
6245000
heap
page read and write
5B43000
heap
page read and write
3C75000
heap
page read and write
74EC000
heap
page read and write
56C12000
direct allocation
page read and write
6545000
heap
page read and write
76E7000
heap
page read and write
D0B000
unkown
page readonly
6E4C000
heap
page read and write
853C000
heap
page read and write
56DE0000
direct allocation
page read and write
2FE3000
heap
page read and write
674F000
heap
page read and write
6DCA000
heap
page read and write
64FF000
heap
page read and write
63F3000
heap
page read and write
56DDC000
direct allocation
page read and write
667000
heap
page read and write
8900000
trusted library allocation
page read and write
3C70000
heap
page read and write
773C000
heap
page read and write
7820000
trusted library allocation
page read and write
75B0000
heap
page read and write
791C000
heap
page read and write
6D5000
heap
page read and write
88F0000
trusted library allocation
page read and write
724B000
heap
page read and write
611B000
heap
page read and write
7FFD9B300000
trusted library allocation
page read and write
20808812000
trusted library allocation
page read and write
64CE000
heap
page read and write
794E000
heap
page read and write
399B000
heap
page read and write
6C518000
unkown
page readonly
5855000
trusted library allocation
page read and write
56DE0000
direct allocation
page read and write
2FF2000
heap
page read and write
6E2E000
heap
page read and write
7723000
heap
page read and write
56DE0000
direct allocation
page read and write
3C89000
heap
page read and write
56DE0000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
6E60000
heap
page read and write
2FE8000
heap
page read and write
71F1000
heap
page read and write
6CC3000
heap
page read and write
20806D92000
trusted library allocation
page read and write
56D70000
direct allocation
page read and write
6E506000
unkown
page readonly
56DE0000
direct allocation
page read and write
6709000
heap
page read and write
D0B000
unkown
page readonly
641B000
heap
page read and write
D0B000
unkown
page readonly
770F000
heap
page read and write
56DE0000
direct allocation
page read and write
D0B000
unkown
page readonly
3C80000
heap
page read and write
33BF000
stack
page read and write
6DBF000
heap
page read and write
6DD4000
heap
page read and write
7613000
heap
page read and write
6077000
heap
page read and write
20804C20000
heap
page read and write
6EC4000
heap
page read and write
6EA6000
heap
page read and write
56DE0000
direct allocation
page read and write
53A3000
heap
page read and write
F9A6E3E000
stack
page read and write
5F82000
heap
page read and write
67E0000
heap
page read and write
3C76000
heap
page read and write
EB5000
heap
page read and write
2F70000
trusted library section
page read and write
5EEC000
heap
page read and write
7984000
heap
page read and write
5C4000
heap
page read and write
5B32000
heap
page read and write
72AD000
heap
page read and write
2FA1000
heap
page read and write
7FFD9B491000
trusted library allocation
page read and write
310D000
heap
page read and write
56DE0000
direct allocation
page read and write
689B000
heap
page read and write
66F000
heap
page read and write
6C93C000
unkown
page read and write
6411000
heap
page read and write
5B2D000
heap
page read and write
57BB000
trusted library allocation
page read and write
6B23000
heap
page read and write
34FD000
stack
page read and write
720A000
heap
page read and write
2F80000
trusted library section
page read and write
790D000
heap
page read and write
2FA1000
heap
page read and write
56DC8000
direct allocation
page read and write
75EC000
heap
page read and write
6FE5000
heap
page read and write
6C37000
heap
page read and write
6B69000
heap
page read and write
7563000
heap
page read and write
3C82000
heap
page read and write
6EF6000
heap
page read and write
56C7C000
direct allocation
page read and write
5F2D000
heap
page read and write
7649000
heap
page read and write
20804C40000
heap
page read and write
7967000
heap
page read and write
75A4000
heap
page read and write
56DE0000
direct allocation
page read and write
4AE0000
heap
page execute and read and write
793A000
heap
page read and write
6C82000
heap
page read and write
2FA1000
heap
page read and write
702B000
stack
page read and write
5358000
heap
page read and write
8A00000
trusted library allocation
page execute and read and write
D11000
unkown
page readonly
56DE0000
direct allocation
page read and write
680D000
heap
page read and write
7363000
heap
page read and write
6FDB000
heap
page read and write
772D000
heap
page read and write
56D38000
direct allocation
page read and write
3001000
heap
page read and write
6718000
heap
page read and write
8470000
trusted library allocation
page read and write
5C4000
heap
page read and write
5814000
trusted library allocation
page read and write
7559000
heap
page read and write
59EB000
trusted library allocation
page read and write
5C4000
heap
page read and write
2F9C000
heap
page read and write
F9A68FE000
stack
page read and write
3CAF000
heap
page read and write
CF1000
unkown
page execute read
60CC000
heap
page read and write
53D0000
heap
page read and write
7381000
heap
page read and write
20808793000
trusted library allocation
page read and write
3032000
heap
page read and write
74E7000
heap
page read and write
3F35000
heap
page read and write
2FCF000
heap
page read and write
7235000
heap
page read and write
2E4B000
stack
page read and write
3C71000
heap
page read and write
6063000
heap
page read and write
5F19000
heap
page read and write
6072000
heap
page read and write
56C54000
direct allocation
page read and write
5F32000
heap
page read and write
2FDE000
heap
page read and write
56DE0000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
2C7C000
stack
page read and write
3C7A000
heap
page read and write
3C69000
heap
page read and write
5321000
heap
page read and write
5CE3000
heap
page read and write
68B4000
heap
page read and write
2C60000
heap
page read and write
56D80000
direct allocation
page read and write
2D81000
heap
page read and write
2D30000
unclassified section
page readonly
3032000
heap
page read and write
6107000
heap
page read and write
6236000
heap
page read and write
56C94000
direct allocation
page read and write
6C94E000
unkown
page read and write
6777000
heap
page read and write
6B82000
heap
page read and write
56D90000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
533A000
heap
page read and write
7003000
heap
page read and write
67B7000
heap
page read and write
2CB8000
stack
page read and write
2081EE77000
heap
page read and write
61D3000
heap
page read and write
56DE0000
direct allocation
page read and write
5C4000
heap
page read and write
D01000
unkown
page readonly
68AA000
heap
page read and write
31EC000
stack
page read and write
3C93000
heap
page read and write
6830000
heap
page read and write
56CF0000
direct allocation
page read and write
6407000
heap
page read and write
56DE0000
direct allocation
page read and write
56D41000
direct allocation
page read and write
72D5000
heap
page read and write
2FA5000
heap
page read and write
2081ECF0000
heap
page read and write
6896000
heap
page read and write
701C000
heap
page read and write
7586000
heap
page read and write
60D6000
heap
page read and write
2FCA000
trusted library allocation
page execute and read and write
6BA50000
unkown
page readonly
2FF7000
heap
page read and write
6EF1000
heap
page read and write
2081EBA6000
heap
page read and write
5C4000
heap
page read and write
56CF0000
direct allocation
page read and write
6E92000
heap
page read and write
56DE0000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
2D49000
unclassified section
page readonly
5330000
heap
page read and write
56DA4000
direct allocation
page read and write
2EA0000
heap
page read and write
71BA000
heap
page read and write
20804D62000
heap
page read and write
70F000
heap
page read and write
5C4000
heap
page read and write
56DE0000
direct allocation
page read and write
57CC000
trusted library allocation
page read and write
CF1000
unkown
page execute read
6E500000
unkown
page readonly
56DE0000
direct allocation
page read and write
5F4B000
heap
page read and write
6C64000
heap
page read and write
6FA4000
heap
page read and write
3C4B000
heap
page read and write
6C96000
heap
page read and write
469000
unkown
page read and write
6918000
heap
page read and write
6B01000
heap
page read and write
56DE0000
direct allocation
page read and write
68B9000
heap
page read and write
68AF000
heap
page read and write
70ED000
stack
page read and write
67B3000
heap
page read and write
56DE0000
direct allocation
page read and write
5C4000
heap
page read and write
73C7000
heap
page read and write
6448000
heap
page read and write
56DE0000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
F9A6C37000
stack
page read and write
8556000
heap
page read and write
5F0F000
heap
page read and write
56DE0000
direct allocation
page read and write
6F4B000
heap
page read and write
71D8000
heap
page read and write
3C8E000
heap
page read and write
757C000
heap
page read and write
7FFD9B480000
trusted library allocation
page read and write
7881000
heap
page read and write
2E9E000
stack
page read and write
6F28000
heap
page read and write
4A8E000
stack
page read and write
7FFD9B396000
trusted library allocation
page read and write
654F000
heap
page read and write
88ED000
stack
page read and write
56C90000
direct allocation
page read and write
20804F50000
trusted library allocation
page read and write
63CE000
heap
page read and write
3B0000
heap
page read and write
5EF6000
heap
page read and write
7917000
heap
page read and write
56DE0000
direct allocation
page read and write
73E0000
heap
page read and write
792B000
heap
page read and write
68F0000
heap
page read and write
7781000
heap
page read and write
56DE0000
direct allocation
page read and write
5B0C000
heap
page read and write
7737000
heap
page read and write
208065B0000
trusted library allocation
page read and write
56DE0000
direct allocation
page read and write
4B30000
heap
page read and write
3C87000
heap
page read and write
77DD000
stack
page read and write
71C4000
heap
page read and write
63E2000
heap
page read and write
7635000
heap
page read and write
6B1E000
heap
page read and write
5C4000
heap
page read and write
2FD4000
heap
page read and write
5F3C000
heap
page read and write
2FE8000
heap
page read and write
7608000
heap
page read and write
3C3F000
heap
page read and write
5CFC000
heap
page read and write
56F000
unkown
page readonly
56DE0000
direct allocation
page read and write
640A000
heap
page read and write
56CC4000
direct allocation
page read and write
6E47000
heap
page read and write
7880000
trusted library allocation
page read and write
7228000
heap
page read and write
720F000
heap
page read and write
1240000
heap
page read and write
5D10000
heap
page read and write
5C4000
heap
page read and write
8597000
heap
page read and write
7705000
heap
page read and write
73F4000
heap
page read and write
6F1E000
stack
page read and write
2310000
trusted library allocation
page read and write
6C7D000
heap
page read and write
56D29000
direct allocation
page read and write
7FFD9B520000
trusted library allocation
page read and write
208084DE000
trusted library allocation
page read and write
6E33000
heap
page read and write
56DE0000
direct allocation
page read and write
2F96000
heap
page read and write
78F4000
heap
page read and write
755E000
heap
page read and write
739F000
heap
page read and write
580000
heap
page read and write
82BD000
trusted library allocation
page read and write
5C4000
heap
page read and write
7617000
heap
page read and write
32BE000
stack
page read and write
759F000
heap
page read and write
78EA000
heap
page read and write
208069F0000
trusted library allocation
page read and write
CFE000
unkown
page write copy
6188000
heap
page read and write
3C9D000
heap
page read and write
2C8E000
stack
page read and write
7728000
heap
page read and write
2FF2000
heap
page read and write
3C5F000
heap
page read and write
56DE0000
direct allocation
page read and write
770A000
heap
page read and write
8430000
trusted library allocation
page read and write
2FBF000
heap
page read and write
303C000
heap
page read and write
61D8000
heap
page read and write
619C000
heap
page read and write
6554000
heap
page read and write
680000
heap
page read and write
7FFD9B2E3000
trusted library allocation
page execute and read and write
60BD000
heap
page read and write
2081EC25000
heap
page read and write
CFE000
unkown
page read and write
7773000
heap
page read and write
5B07000
heap
page read and write
763F000
heap
page read and write
5B05000
heap
page read and write
6086000
heap
page read and write
2D4C000
stack
page read and write
7670000
heap
page read and write
7FFD9B4C2000
trusted library allocation
page read and write
7653000
heap
page read and write
659F000
heap
page read and write
66F000
heap
page read and write
5C4000
heap
page read and write
3C32000
heap
page read and write
560E000
stack
page read and write
75D1000
heap
page read and write
56DE0000
direct allocation
page read and write
6590000
heap
page read and write
56DE0000
direct allocation
page read and write
6E7000
heap
page read and write
530A000
heap
page read and write
75B8000
heap
page read and write
56CB0000
direct allocation
page read and write
6058000
trusted library allocation
page read and write
56DE0000
direct allocation
page read and write
7345000
heap
page read and write
56DE0000
direct allocation
page read and write
72BC000
heap
page read and write
2FCF000
heap
page read and write
6FF000
heap
page read and write
CF0000
unkown
page readonly
5B39000
heap
page read and write
3C3E000
heap
page read and write
655E000
heap
page read and write
C70000
heap
page read and write
6E3D000
heap
page read and write
5D7E000
heap
page read and write
703A000
heap
page read and write
56DE0000
direct allocation
page read and write
5F55000
heap
page read and write
6C55000
heap
page read and write
6786000
heap
page read and write
352E000
stack
page read and write
3C37000
heap
page read and write
681C000
heap
page read and write
3F3B000
heap
page read and write
6826000
heap
page read and write
6754000
heap
page read and write
6A40000
heap
page read and write
6EAB000
heap
page read and write
61E7000
heap
page read and write
67FE000
heap
page read and write
5B2F000
heap
page read and write
20804D08000
heap
page read and write
3018000
heap
page read and write
5EE7000
heap
page read and write
56CE7000
direct allocation
page read and write
2FA1000
heap
page read and write
56DE0000
direct allocation
page read and write
3C4E000
heap
page read and write
7719000
heap
page read and write
52F1000
heap
page read and write
56DE0000
direct allocation
page read and write
2F92000
heap
page read and write
6E74000
heap
page read and write
6522000
heap
page read and write
7017000
heap
page read and write
679A000
heap
page read and write
7FFD9B4D0000
trusted library allocation
page execute and read and write
61B5000
heap
page read and write
2FC2000
heap
page read and write
7BCF000
stack
page read and write
732E000
stack
page read and write
5CBD000
stack
page read and write
6BAAF000
unkown
page readonly
6E6F000
heap
page read and write
652C000
heap
page read and write
5B19000
heap
page read and write
5CED000
heap
page read and write
2F8E000
heap
page read and write
56DE0000
direct allocation
page read and write
642D000
heap
page read and write
6452000
heap
page read and write
736D000
heap
page read and write
7630000
heap
page read and write
56DE0000
direct allocation
page read and write
610D000
heap
page read and write
20806BEA000
trusted library allocation
page read and write
85FF000
heap
page read and write
7395000
heap
page read and write
6A36000
heap
page read and write
84F0000
heap
page read and write
3C6B000
heap
page read and write
68F5000
heap
page read and write
6B28000
heap
page read and write
763D000
heap
page read and write
670E000
heap
page read and write
6BB0A000
unkown
page readonly
68A5000
heap
page read and write
6EFB000
heap
page read and write
7F4B8000
trusted library allocation
page execute and read and write
400000
unkown
page readonly
85EE000
heap
page read and write
2FE8000
heap
page read and write
5C4000
heap
page read and write
82BB000
trusted library allocation
page read and write
6205000
heap
page read and write
6392000
heap
page read and write
3CA7000
heap
page read and write
2FD9000
heap
page read and write
40E000
unkown
page read and write
40A000
unkown
page write copy
6B50000
heap
page read and write
6AFC000
heap
page read and write
6777000
heap
page read and write
34EE000
stack
page read and write
56DE0000
direct allocation
page read and write
68D2000
heap
page read and write
56D90000
direct allocation
page read and write
2320000
heap
page read and write
3C91000
heap
page read and write
56DB4000
direct allocation
page read and write
56DDC000
direct allocation
page read and write
2FC5000
heap
page read and write
6518000
heap
page read and write
6C69000
heap
page read and write
F9A6D3A000
stack
page read and write
6038000
trusted library allocation
page read and write
6EEC000
heap
page read and write
68C3000
heap
page read and write
7200000
heap
page read and write
7903000
heap
page read and write
7280000
heap
page read and write
56D00000
direct allocation
page read and write
7340000
heap
page read and write
6EDE000
stack
page read and write
5371000
heap
page read and write
5F64000
heap
page read and write
712A000
stack
page read and write
7935000
heap
page read and write
CC0000
heap
page read and write
386E000
stack
page read and write
5C4000
heap
page read and write
D11000
unkown
page readonly
7FFD9B600000
trusted library allocation
page read and write
5EC9000
trusted library allocation
page read and write
52F000
unkown
page readonly
6EB5000
heap
page read and write
2FF7000
heap
page read and write
3C3E000
heap
page read and write
543C000
heap
page read and write
CB0000
heap
page read and write
C20000
heap
page read and write
2FD5000
trusted library allocation
page execute and read and write
65C1000
heap
page read and write
6219000
heap
page read and write
35FD000
stack
page read and write
6768000
heap
page read and write
2F8E000
heap
page read and write
5F28000
heap
page read and write
68D7000
heap
page read and write
5EF1000
heap
page read and write
56DC4000
direct allocation
page read and write
3C9B000
heap
page read and write
673B000
heap
page read and write
6B8C000
heap
page read and write
53C1000
heap
page read and write
794E000
stack
page read and write
537B000
heap
page read and write
6B3D000
heap
page read and write
3C73000
heap
page read and write
768E000
heap
page read and write
7886000
heap
page read and write
56DE0000
direct allocation
page read and write
56CBC000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
78A0000
trusted library allocation
page read and write
AEE000
stack
page read and write
37AE000
stack
page read and write
2D42000
unclassified section
page read and write
6400000
heap
page read and write
2FF2000
heap
page read and write
6CAA000
heap
page read and write
5C4000
heap
page read and write
759A000
heap
page read and write
67F3000
heap
page read and write
75A9000
heap
page read and write
197000
stack
page read and write
56DE0000
direct allocation
page read and write
7219000
heap
page read and write
538A000
heap
page read and write
5F00000
heap
page read and write
56DE0000
direct allocation
page read and write
2FCA000
heap
page read and write
71E000
heap
page read and write
726C000
heap
page read and write
56DE0000
direct allocation
page read and write
820000
heap
page read and write
6C50000
heap
page read and write
5EFB000
heap
page read and write
653B000
heap
page read and write
3CAC000
heap
page read and write
6909000
heap
page read and write
7830000
trusted library allocation
page read and write
56DE0000
direct allocation
page read and write
3FD000
stack
page read and write
56DC8000
direct allocation
page read and write
639C000
heap
page read and write
3C96000
heap
page read and write
2E55000
heap
page read and write
66B5000
heap
page read and write
77F0000
trusted library allocation
page execute and read and write
56DC4000
direct allocation
page read and write
86E2000
trusted library allocation
page read and write
6AF7000
heap
page read and write
6B32000
heap
page read and write
2FA0000
trusted library allocation
page read and write
63BA000
heap
page read and write
5B16000
heap
page read and write
7049000
heap
page read and write
75F9000
heap
page read and write
7FFD9B49A000
trusted library allocation
page read and write
56DE0000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
7C03000
heap
page read and write
5C4000
heap
page read and write
7FFD9B610000
trusted library allocation
page read and write
20806590000
trusted library allocation
page read and write
60F9000
heap
page read and write
5ACE000
heap
page read and write
3C3C000
heap
page read and write
6EE7000
heap
page read and write
56DE0000
direct allocation
page read and write
CF0000
unkown
page readonly
53C1000
heap
page read and write
2FA1000
heap
page read and write
2E60000
heap
page read and write
7226000
heap
page read and write
5C4000
heap
page read and write
F9A697D000
stack
page read and write
6B0B000
heap
page read and write
7012000
heap
page read and write
2F9B000
heap
page read and write
5AF3000
heap
page read and write
56D80000
direct allocation
page read and write
56C1C000
direct allocation
page read and write
56DC4000
direct allocation
page read and write
4B57000
heap
page read and write
7976000
heap
page read and write
76D3000
heap
page read and write
40A000
unkown
page read and write
20804F10000
heap
page read and write
56CE8000
direct allocation
page read and write
758B000
heap
page read and write
67DB000
heap
page read and write
75C7000
heap
page read and write
726E000
stack
page read and write
3CB1000
heap
page read and write
7FFD9B570000
trusted library allocation
page read and write
6FC7000
heap
page read and write
8390000
trusted library allocation
page execute and read and write
67E5000
heap
page read and write
56DE0000
direct allocation
page read and write
725A000
heap
page read and write
73A9000
heap
page read and write
3C5C000
heap
page read and write
75E0000
heap
page read and write
2CBD000
stack
page read and write
327C000
stack
page read and write
620F000
heap
page read and write
771E000
stack
page read and write
7FFD9B390000
trusted library allocation
page read and write
F9A6CB9000
stack
page read and write
2F96000
heap
page read and write
793F000
heap
page read and write
56DE0000
direct allocation
page read and write
763A000
heap
page read and write
533F000
heap
page read and write
75F9000
heap
page read and write
75DB000
heap
page read and write
3C69000
heap
page read and write
5C4000
heap
page read and write
56DE0000
direct allocation
page read and write
2F2E000
stack
page read and write
676D000
heap
page read and write
4EA1000
trusted library allocation
page read and write
56DE0000
direct allocation
page read and write
3C58000
heap
page read and write
208065A0000
heap
page readonly
CF1000
unkown
page execute read
2081EC4B000
heap
page read and write
8880000
trusted library allocation
page read and write
56D00000
direct allocation
page read and write
774B000
heap
page read and write
7944000
heap
page read and write
6C8C000
heap
page read and write
2D30000
heap
page read and write
7C08000
heap
page read and write
416000
unkown
page read and write
7656000
heap
page read and write
2FD4000
heap
page read and write
58FE000
trusted library allocation
page read and write
71AB000
stack
page read and write
3CAD000
heap
page read and write
688C000
heap
page read and write
3C5A000
heap
page read and write
53A8000
heap
page read and write
33AC000
stack
page read and write
56CA0000
direct allocation
page read and write
60B3000
heap
page read and write
41E000
unkown
page read and write
56C8C000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
6FC2000
heap
page read and write
56DE0000
direct allocation
page read and write
71E2000
heap
page read and write
56DE0000
direct allocation
page read and write
761E000
heap
page read and write
6B1E000
heap
page read and write
68E1000
heap
page read and write
75D6000
heap
page read and write
5C4000
heap
page read and write
408000
unkown
page readonly
71C9000
heap
page read and write
3C87000
heap
page read and write
56DD8000
direct allocation
page read and write
63C9000
heap
page read and write
56DE0000
direct allocation
page read and write
2FCF000
heap
page read and write
20804C80000
heap
page read and write
67EE000
heap
page read and write
63BF000
heap
page read and write
6B6E000
heap
page read and write
6E97000
heap
page read and write
5D1A000
heap
page read and write
7FFD9B510000
trusted library allocation
page read and write
3033000
heap
page read and write
6214000
heap
page read and write
76D0000
heap
page execute and read and write
6EA6000
heap
page read and write
6434000
heap
page read and write
61FB000
heap
page read and write
5AF6000
heap
page read and write
56C64000
direct allocation
page read and write
2FAD000
trusted library allocation
page execute and read and write
5362000
heap
page read and write
3C94000
heap
page read and write
2D0E000
stack
page read and write
7FFD9B5A0000
trusted library allocation
page read and write
53C6000
heap
page read and write
728A000
heap
page read and write
56DE0000
direct allocation
page read and write
6439000
heap
page read and write
56DE0000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
D0B000
unkown
page readonly
2FF7000
heap
page read and write
5D06000
heap
page read and write
20816BD5000
trusted library allocation
page read and write
7359000
heap
page read and write
56DE0000
direct allocation
page read and write
4FF0000
trusted library allocation
page read and write
5ADA000
heap
page read and write
56DE0000
direct allocation
page read and write
754F000
heap
page read and write
529C000
heap
page read and write
3C55000
heap
page read and write
56DE0000
direct allocation
page read and write
771E000
heap
page read and write
61AB000
heap
page read and write
20804CCF000
heap
page read and write
56DC4000
direct allocation
page read and write
7FFD9B580000
trusted library allocation
page read and write
8A8B000
stack
page read and write
67A9000
heap
page read and write
723C000
heap
page read and write
6904000
heap
page read and write
56DE0000
direct allocation
page read and write
7C0D000
heap
page read and write
529B000
heap
page read and write
56DC8000
direct allocation
page read and write
76F1000
heap
page read and write
6416000
heap
page read and write
20807792000
trusted library allocation
page read and write
693B000
heap
page read and write
6AE8000
heap
page read and write
7612000
heap
page read and write
78DB000
heap
page read and write
52A1000
heap
page read and write
5D51000
heap
page read and write
3C6C000
heap
page read and write
7621000
heap
page read and write
622C000
heap
page read and write
60C7000
heap
page read and write
5B00000
heap
page read and write
84E0000
heap
page read and write
56DE0000
direct allocation
page read and write
678B000
heap
page read and write
3032000
heap
page read and write
7223000
heap
page read and write
66F000
heap
page read and write
7693000
heap
page read and write
6F41000
heap
page read and write
56D10000
direct allocation
page read and write
68FA000
heap
page read and write
6B7D000
heap
page read and write
618D000
heap
page read and write
2FBF000
heap
page read and write
3C4B000
heap
page read and write
6A98000
heap
page read and write
56DE0000
direct allocation
page read and write
6470000
heap
page read and write
799D000
heap
page read and write
400000
unkown
page readonly
6AE3000
heap
page read and write
714000
heap
page read and write
836E000
stack
page read and write
78D6000
heap
page read and write
5C4000
heap
page read and write
7FFD9B2FB000
trusted library allocation
page read and write
6FF000
heap
page read and write
5D3D000
heap
page read and write
65BD000
heap
page read and write
5AEE000
heap
page read and write
7165000
heap
page read and write
6EA8000
heap
page read and write
5C4000
heap
page read and write
2FC2000
heap
page read and write
6EE2000
heap
page read and write
779F000
heap
page read and write
3C49000
heap
page read and write
56DE0000
direct allocation
page read and write
52F6000
heap
page read and write
3CA0000
heap
page read and write
5B3C000
heap
page read and write
6C91000
heap
page read and write
667000
heap
page read and write
6C1E000
heap
page read and write
67D1000
heap
page read and write
2FA3000
heap
page read and write
76F6000
heap
page read and write
75D6000
heap
page read and write
63DD000
heap
page read and write
5B23000
heap
page read and write
6443000
heap
page read and write
31F0000
trusted library allocation
page execute and read and write
72CB000
heap
page read and write
2081EC15000
heap
page read and write
6B73000
heap
page read and write
3C44000
heap
page read and write
6504000
heap
page read and write
6B47000
heap
page read and write
75EF000
heap
page read and write
7CE6000
heap
page read and write
722B000
heap
page read and write
6C3C000
heap
page read and write
761C000
heap
page read and write
6540000
heap
page read and write
6E51000
heap
page read and write
671D000
heap
page read and write
6FBD000
heap
page read and write
74F1000
heap
page read and write
5B2A000
heap
page read and write
2D70000
heap
page read and write
3C5F000
heap
page read and write
649C000
heap
page read and write
2334000
heap
page read and write
56DE0000
direct allocation
page read and write
66F000
heap
page read and write
2FD9000
heap
page read and write
60E5000
heap
page read and write
7258000
heap
page read and write
54FE000
trusted library allocation
page read and write
5C5000
heap
page read and write
56DE0000
direct allocation
page read and write
6B96000
heap
page read and write
56DE0000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
5F0D000
trusted library allocation
page read and write
5C4000
heap
page read and write
5AE9000
heap
page read and write
56D90000
direct allocation
page read and write
8FC000
stack
page read and write
56DE0000
direct allocation
page read and write
6ACA000
heap
page read and write
5B14000
heap
page read and write
7271000
heap
page read and write
6B55000
heap
page read and write
667000
heap
page read and write
78EF000
heap
page read and write
7214000
heap
page read and write
6EBA000
heap
page read and write
56DE0000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
317F000
stack
page read and write
75E5000
heap
page read and write
6B5A000
heap
page read and write
56DE0000
direct allocation
page read and write
75F4000
heap
page read and write
775F000
stack
page read and write
7026000
heap
page read and write
3CAA000
heap
page read and write
530F000
heap
page read and write
2FE3000
heap
page read and write
56DE0000
direct allocation
page read and write
74DC000
heap
page read and write
56DE0000
direct allocation
page read and write
7908000
heap
page read and write
61F6000
heap
page read and write
609A000
heap
page read and write
3C6E000
heap
page read and write
640C000
heap
page read and write
2F97000
heap
page read and write
56D10000
direct allocation
page read and write
5C4000
heap
page read and write
3C9B000
heap
page read and write
5B1B000
heap
page read and write
7FFD9B5B0000
trusted library allocation
page read and write
667000
heap
page read and write
6CD7000
heap
page read and write
2FF7000
heap
page read and write
56DE0000
direct allocation
page read and write
7700000
heap
page read and write
2081EC54000
heap
page read and write
52CE000
heap
page read and write
6795000
heap
page read and write
75FE000
heap
page read and write
3C50000
heap
page read and write
716A000
heap
page read and write
677C000
heap
page read and write
56DE0000
direct allocation
page read and write
2FA3000
heap
page read and write
6C431000
unkown
page execute read
363E000
stack
page read and write
56DE0000
direct allocation
page read and write
722E000
stack
page read and write
78E5000
heap
page read and write
82A0000
trusted library allocation
page execute and read and write
56DE0000
direct allocation
page read and write
61DD000
heap
page read and write
402E000
stack
page read and write
6789000
heap
page read and write
6FF4000
heap
page read and write
63E9000
heap
page read and write
6427000
heap
page read and write
6722000
heap
page read and write
8380000
heap
page read and write
6EB5000
heap
page read and write
CF0000
unkown
page readonly
7926000
heap
page read and write
78D1000
heap
page read and write
56C3C000
direct allocation
page read and write
2FA3000
heap
page read and write
5B48000
heap
page read and write
2FF2000
heap
page read and write
567000
unkown
page readonly
706E000
stack
page read and write
3CA7000
heap
page read and write
7FFD9B640000
trusted library allocation
page read and write
52B0000
heap
page read and write
3C41000
heap
page read and write
6A2B000
heap
page read and write
CFE000
unkown
page read and write
643E000
heap
page read and write
75EA000
heap
page read and write
7FFD9B560000
trusted library allocation
page read and write
2D80000
heap
page read and write
74C1000
heap
page read and write
6AF2000
heap
page read and write
2FC2000
heap
page read and write
56CF0000
direct allocation
page read and write
6CA5000
heap
page read and write
3CA3000
heap
page read and write
7377000
heap
page read and write
7603000
heap
page read and write
8490000
trusted library allocation
page read and write
738B000
heap
page read and write
376D000
stack
page read and write
3C52000
heap
page read and write
75EF000
heap
page read and write
7670000
heap
page read and write
723F000
heap
page read and write
56DE0000
direct allocation
page read and write
5EA1000
trusted library allocation
page read and write
5B02000
heap
page read and write
3C8F000
heap
page read and write
8437000
trusted library allocation
page read and write
CFE000
unkown
page write copy
63A6000
heap
page read and write
5AD8000
heap
page read and write
6BC3000
heap
page read and write
7F4A0000
trusted library allocation
page execute and read and write
3001000
heap
page read and write
5B28000
heap
page read and write
6B0F000
heap
page read and write
F58000
heap
page read and write
84FC000
heap
page read and write
79A2000
heap
page read and write
7644000
heap
page read and write
6103000
heap
page read and write
2FE8000
heap
page read and write
2F8C000
heap
page read and write
63D3000
heap
page read and write
6C8F1000
unkown
page readonly
2FED000
heap
page read and write
73AE000
heap
page read and write
56DE0000
direct allocation
page read and write
645C000
heap
page read and write
5434000
heap
page read and write
56DE0000
direct allocation
page read and write
61F1000
heap
page read and write
6231000
heap
page read and write
F9A6B78000
stack
page read and write
8564000
heap
page read and write
8580000
heap
page read and write
5665000
trusted library allocation
page read and write
6B4B000
heap
page read and write
535000
unkown
page readonly
75C2000
heap
page read and write
71D000
heap
page read and write
56DE0000
direct allocation
page read and write
5CCF000
heap
page read and write
56D22000
direct allocation
page read and write
5D01000
heap
page read and write
6FA9000
heap
page read and write
CB0000
heap
page read and write
6803000
heap
page read and write
677C000
heap
page read and write
3C70000
heap
page read and write
5ADF000
heap
page read and write
5C4000
heap
page read and write
3C78000
heap
page read and write
56DC8000
direct allocation
page read and write
2081EDF0000
heap
page execute and read and write
6461000
heap
page read and write
56DE0000
direct allocation
page read and write
39EE000
stack
page read and write
6C559000
unkown
page read and write
7581000
heap
page read and write
67B8000
heap
page read and write
6ACF000
heap
page read and write
89FC000
stack
page read and write
3C84000
heap
page read and write
7253000
heap
page read and write
56DC4000
direct allocation
page read and write
5C4000
heap
page read and write
5F46000
heap
page read and write
56D10000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
56DD8000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
6C564000
unkown
page readonly
5835000
trusted library allocation
page read and write
3C9E000
heap
page read and write
3C73000
heap
page read and write
6095000
heap
page read and write
76D8000
heap
page read and write
8420000
heap
page read and write
7008000
heap
page read and write
3C84000
heap
page read and write
6C953000
unkown
page readonly
5C4000
heap
page read and write
7053000
heap
page read and write
56DE0000
direct allocation
page read and write
52E2000
heap
page read and write
F9A6F3E000
stack
page read and write
68B000
heap
page read and write
7930000
heap
page read and write
56DE0000
direct allocation
page read and write
6B0A000
heap
page read and write
7FFD9B500000
trusted library allocation
page read and write
3CA2000
heap
page read and write
646B000
heap
page read and write
5D24000
heap
page read and write
724E000
heap
page read and write
61A6000
heap
page read and write
3C7B000
heap
page read and write
6134000
heap
page read and write
5829000
trusted library allocation
page read and write
5B0A000
heap
page read and write
6E79000
heap
page read and write
1115000
heap
page read and write
2081EE10000
heap
page read and write
621E000
heap
page read and write
7390000
heap
page read and write
52D8000
heap
page read and write
52C9000
heap
page read and write
208069F3000
trusted library allocation
page read and write
5C4000
heap
page read and write
2FED000
heap
page read and write
2FDE000
heap
page read and write
6AED000
heap
page read and write
56DE0000
direct allocation
page read and write
6419000
heap
page read and write
20806A33000
heap
page read and write
75CC000
heap
page read and write
642F000
heap
page read and write
604F000
trusted library allocation
page read and write
66F000
heap
page read and write
6EDD000
heap
page read and write
3C39000
heap
page read and write
6EBA000
heap
page read and write
6EA1000
heap
page read and write
CF0000
unkown
page readonly
56DE0000
direct allocation
page read and write
56D60000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
4F01000
trusted library allocation
page read and write
67BD000
heap
page read and write
56D4C000
direct allocation
page read and write
56D70000
direct allocation
page read and write
CF1000
unkown
page execute read
763A000
heap
page read and write
3640000
heap
page read and write
657C000
heap
page read and write
2FCF000
heap
page read and write
3C57000
heap
page read and write
6AC5000
heap
page read and write
53B7000
heap
page read and write
2F88000
heap
page read and write
7577000
heap
page read and write
535000
unkown
page readonly
6509000
heap
page read and write
2FED000
heap
page read and write
2FD9000
heap
page read and write
2F8C000
heap
page read and write
20804CC0000
heap
page read and write
67C7000
heap
page read and write
61A1000
heap
page read and write
6C78000
heap
page read and write
5D33000
heap
page read and write
56DE0000
direct allocation
page read and write
68CD000
heap
page read and write
71D3000
heap
page read and write
56DE0000
direct allocation
page read and write
3C46000
heap
page read and write
7949000
heap
page read and write
56DE0000
direct allocation
page read and write
56CD4000
direct allocation
page read and write
2FFC000
heap
page read and write
61C4000
heap
page read and write
85B4000
heap
page read and write
56DE0000
direct allocation
page read and write
6049000
trusted library allocation
page read and write
D11000
unkown
page readonly
73B3000
heap
page read and write
6183000
heap
page read and write
56DE0000
direct allocation
page read and write
6B2E000
heap
page read and write
7368000
heap
page read and write
67C7000
heap
page read and write
56DE0000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
68C8000
heap
page read and write
3C48000
heap
page read and write
5C4000
heap
page read and write
5D74000
heap
page read and write
7FFD9B400000
trusted library allocation
page execute and read and write
75B3000
heap
page read and write
5B34000
heap
page read and write
56DE0000
direct allocation
page read and write
679A000
heap
page read and write
3CB6000
heap
page read and write
56DE0000
direct allocation
page read and write
6CB4000
heap
page read and write
F9A69FE000
stack
page read and write
6FEF000
heap
page read and write
3CAC000
heap
page read and write
6C5F000
heap
page read and write
3190000
trusted library allocation
page read and write
7FFD9B650000
trusted library allocation
page read and write
2FF0000
trusted library allocation
page read and write
76EC000
heap
page read and write
3210000
heap
page read and write
72DF000
heap
page read and write
78FE000
heap
page read and write
5602000
trusted library allocation
page read and write
9BC000
stack
page read and write
5ABD000
stack
page read and write
2D81000
heap
page read and write
6C87000
heap
page read and write
5CE8000
heap
page read and write
56D35000
direct allocation
page read and write
73C2000
heap
page read and write
56DE0000
direct allocation
page read and write
6586000
heap
page read and write
5AC4000
heap
page read and write
5380000
heap
page read and write
667000
heap
page read and write
20816B70000
trusted library allocation
page read and write
6713000
heap
page read and write
20804CC7000
heap
page read and write
56DE0000
direct allocation
page read and write
2081EE3C000
heap
page read and write
656D000
heap
page read and write
2EEE000
stack
page read and write
5A20000
trusted library allocation
page read and write
6A3B000
heap
page read and write
83DE000
stack
page read and write
20804CE1000
heap
page read and write
5F23000
heap
page read and write
3C52000
heap
page read and write
56DE0000
direct allocation
page read and write
6AAC000
heap
page read and write
6513000
heap
page read and write
6931000
heap
page read and write
56DE0000
direct allocation
page read and write
76DD000
heap
page read and write
5C4000
heap
page read and write
38AF000
stack
page read and write
5C0000
heap
page read and write
3C48000
heap
page read and write
68DC000
heap
page read and write
52F000
unkown
page readonly
6C32000
heap
page read and write
5433000
heap
page read and write
63B5000
heap
page read and write
56DE0000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
7FFD9B2E2000
trusted library allocation
page read and write
6ED8000
heap
page read and write
2FF2000
heap
page read and write
5D1F000
heap
page read and write
8370000
heap
page read and write
20806675000
heap
page read and write
F9A6BBE000
stack
page read and write
647F000
heap
page read and write
7FFD9B4A0000
trusted library allocation
page execute and read and write
56DB4000
direct allocation
page read and write
6ECE000
heap
page read and write
67C2000
heap
page read and write
5D47000
heap
page read and write
6120000
heap
page read and write
672C000
heap
page read and write
79A7000
heap
page read and write
7299000
heap
page read and write
20808553000
trusted library allocation
page read and write
56DE0000
direct allocation
page read and write
53DF000
trusted library allocation
page read and write
733B000
heap
page read and write
2F9B000
heap
page read and write
73A0000
heap
page read and write
5B3E000
heap
page read and write
56DE0000
direct allocation
page read and write
6AD4000
heap
page read and write
64D8000
heap
page read and write
787C000
heap
page read and write
722D000
heap
page read and write
52AB000
heap
page read and write
7FFD9B2ED000
trusted library allocation
page execute and read and write
6C710000
unkown
page readonly
78F9000
heap
page read and write
6E97000
heap
page read and write
3C78000
heap
page read and write
6B19000
heap
page read and write
6C6E000
heap
page read and write
2FC0000
trusted library allocation
page read and write
5CD4000
heap
page read and write
5B37000
heap
page read and write
E40000
heap
page execute and read and write
6454000
heap
page read and write
7155000
heap
page read and write
CF1000
unkown
page execute read
6EBF000
heap
page read and write
6E9C000
heap
page read and write
64B0000
heap
page read and write
72B2000
heap
page read and write
56D10000
direct allocation
page read and write
7030000
heap
page read and write
73E4000
heap
page read and write
56DE0000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
723F000
heap
page read and write
538F000
heap
page read and write
7840000
trusted library allocation
page read and write
56DE0000
direct allocation
page read and write
56DC4000
direct allocation
page read and write
3CA5000
heap
page read and write
7244000
heap
page read and write
2FA1000
heap
page read and write
7FFD9B4B0000
trusted library allocation
page execute and read and write
D01000
unkown
page readonly
23D0000
heap
page read and write
694000
heap
page read and write
6FCC000
heap
page read and write
5B20000
heap
page read and write
56D54000
direct allocation
page read and write
65AD000
heap
page read and write
20808192000
trusted library allocation
page read and write
6BA51000
unkown
page execute read
6731000
heap
page read and write
75BD000
heap
page read and write
67CC000
heap
page read and write
3C43000
heap
page read and write
5AE7000
heap
page read and write
2F97000
heap
page read and write
651D000
heap
page read and write
6BAAE000
unkown
page read and write
56DE0000
direct allocation
page read and write
56DA4000
direct allocation
page read and write
7FFD9B2F0000
trusted library allocation
page read and write
62E9000
heap
page read and write
63FD000
heap
page read and write
762B000
heap
page read and write
739A000
heap
page read and write
5F96000
heap
page read and write
3F3F000
heap
page read and write
6B06000
heap
page read and write
853A000
heap
page read and write
6C1000
heap
page read and write
5C4000
heap
page read and write
7689000
heap
page read and write
5F1E000
heap
page read and write
6081000
heap
page read and write
56DE0000
direct allocation
page read and write
6EA1000
heap
page read and write
2FA1000
heap
page read and write
3C8C000
heap
page read and write
7160000
heap
page read and write
735E000
heap
page read and write
71E7000
heap
page read and write
67F9000
heap
page read and write
7746000
heap
page read and write
56DE0000
direct allocation
page read and write
3C57000
heap
page read and write
6C41000
heap
page read and write
5C4000
heap
page read and write
60A4000
heap
page read and write
7764000
heap
page read and write
6ABB000
heap
page read and write
56DE0000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
56C2C000
direct allocation
page read and write
D01000
unkown
page readonly
56DC8000
direct allocation
page read and write
2081ED10000
heap
page read and write
5314000
heap
page read and write
56DE0000
direct allocation
page read and write
6440000
heap
page read and write
6B1F000
heap
page read and write
73D1000
heap
page read and write
5385000
heap
page read and write
3C50000
heap
page read and write
67AE000
heap
page read and write
854E000
heap
page read and write
56D00000
direct allocation
page read and write
8A4D000
stack
page read and write
687000
heap
page read and write
6090000
heap
page read and write
6457000
heap
page read and write
5C4000
heap
page read and write
6445000
heap
page read and write
760D000
heap
page read and write
56DC8000
direct allocation
page read and write
2FFC000
heap
page read and write
56DE0000
direct allocation
page read and write
60AE000
heap
page read and write
6ADE000
heap
page read and write
75E0000
heap
page read and write
6C711000
unkown
page execute read
2F3E000
unkown
page read and write
5CDE000
heap
page read and write
6536000
heap
page read and write
52DD000
heap
page read and write
3C96000
heap
page read and write
63C4000
heap
page read and write
2FD4000
heap
page read and write
3C9D000
heap
page read and write
63F8000
heap
page read and write
5D2E000
heap
page read and write
56D58000
direct allocation
page read and write
6B5F000
heap
page read and write
2FF9000
heap
page read and write
6C55B000
unkown
page write copy
795B000
heap
page read and write
3C4D000
heap
page read and write
78E0000
heap
page read and write
56DE0000
direct allocation
page read and write
2FC5000
heap
page read and write
71BF000
heap
page read and write
7FFD9B39C000
trusted library allocation
page execute and read and write
679F000
heap
page read and write
6192000
heap
page read and write
56DE0000
direct allocation
page read and write
6475000
heap
page read and write
667000
heap
page read and write
5F8C000
heap
page read and write
56DE0000
direct allocation
page read and write
136E000
stack
page read and write
56D20000
direct allocation
page read and write
D01000
unkown
page readonly
5326000
heap
page read and write
5C4000
heap
page read and write
5AF8000
heap
page read and write
5D5B000
heap
page read and write
EB0000
heap
page read and write
67D6000
heap
page read and write
38BD000
heap
page read and write
7FFD9B5E0000
trusted library allocation
page read and write
56DE0000
direct allocation
page read and write
8BC000
stack
page read and write
6E5B000
heap
page read and write
56CE4000
direct allocation
page read and write
76FB000
heap
page read and write
71EC000
heap
page read and write
56D80000
direct allocation
page read and write
20806B50000
heap
page read and write
7386000
heap
page read and write
3C66000
heap
page read and write
E2C000
stack
page read and write
3C67000
heap
page read and write
CFE000
unkown
page read and write
5F73000
heap
page read and write
3034000
heap
page read and write
6EC9000
heap
page read and write
6E9C000
heap
page read and write
56DE0000
direct allocation
page read and write
2FA5000
heap
page read and write
33ED000
stack
page read and write
702B000
heap
page read and write
2FED000
heap
page read and write
2F91000
heap
page read and write
6FEA000
heap
page read and write
60C2000
heap
page read and write
2F92000
heap
page read and write
5D6A000
heap
page read and write
56CF0000
direct allocation
page read and write
6402000
heap
page read and write
2FE8000
heap
page read and write
70AE000
stack
page read and write
7714000
heap
page read and write
5CC5000
heap
page read and write
5C4000
heap
page read and write
2081EB60000
heap
page read and write
7FFD9B4F0000
trusted library allocation
page read and write
56DE0000
direct allocation
page read and write
3C3F000
heap
page read and write
3C62000
heap
page read and write
56DE0000
direct allocation
page read and write
2FB0000
trusted library allocation
page read and write
7921000
heap
page read and write
5C4000
heap
page read and write
56DE0000
direct allocation
page read and write
5C4000
heap
page read and write
56DE0000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
654A000
heap
page read and write
737C000
heap
page read and write
7595000
heap
page read and write
608B000
heap
page read and write
56DE0000
direct allocation
page read and write
6786000
heap
page read and write
2F92000
heap
page read and write
3C91000
heap
page read and write
56DE0000
direct allocation
page read and write
6B37000
heap
page read and write
6B46000
heap
page read and write
75D1000
heap
page read and write
609F000
heap
page read and write
6B64000
heap
page read and write
6FF000
heap
page read and write
D01000
unkown
page readonly
6FAE000
heap
page read and write
843A000
trusted library allocation
page read and write
63F1000
heap
page read and write
56CDE000
direct allocation
page read and write
6174000
heap
page read and write
56DE0000
direct allocation
page read and write
6ED3000
heap
page read and write
6E7000
heap
page read and write
72AE000
stack
page read and write
5399000
heap
page read and write
6882000
heap
page read and write
3C66000
heap
page read and write
6068000
heap
page read and write
3032000
heap
page read and write
6C55C000
unkown
page read and write
5C4000
heap
page read and write
63D8000
heap
page read and write
71DD000
heap
page read and write
20804F60000
heap
page read and write
642A000
heap
page read and write
65E9000
heap
page read and write
7ACE000
stack
page read and write
5F5F000
heap
page read and write
76CE000
heap
page read and write
71FB000
heap
page read and write
F50000
heap
page read and write
2FD0000
trusted library allocation
page read and write
7372000
heap
page read and write
6AA2000
heap
page read and write
CF1000
unkown
page execute read
6F00000
heap
page read and write
53C1000
heap
page read and write
7205000
heap
page read and write
628000
heap
page read and write
779A000
heap
page read and write
6727000
heap
page read and write
2330000
heap
page read and write
616F000
heap
page read and write
6E56000
heap
page read and write
6745000
heap
page read and write
56DE0000
direct allocation
page read and write
2FE3000
heap
page read and write
6E92000
heap
page read and write
5376000
heap
page read and write
7750000
heap
page read and write
644D000
heap
page read and write
78C0000
trusted library allocation
page read and write
56DE0000
direct allocation
page read and write
5AC9000
heap
page read and write
2340000
trusted library allocation
page read and write
5F41000
heap
page read and write
56DE0000
direct allocation
page read and write
6EDD000
heap
page read and write
678B000
heap
page read and write
20806610000
heap
page execute and read and write
6563000
heap
page read and write
56DE0000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
6C5A000
heap
page read and write
63EE000
heap
page read and write
5300000
heap
page read and write
3032000
heap
page read and write
8522000
heap
page read and write
60D1000
heap
page read and write
73F4000
heap
page read and write
56DE0000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
6B24000
heap
page read and write
75C0000
heap
page read and write
6388000
heap
page read and write
6E65000
heap
page read and write
56DE0000
direct allocation
page read and write
6C28000
heap
page read and write
6891000
heap
page read and write
7755000
heap
page read and write
77A4000
heap
page read and write
3C32000
heap
page read and write
D01000
unkown
page readonly
2FF7000
heap
page read and write
2080880E000
trusted library allocation
page read and write
5C4000
heap
page read and write
8710000
trusted library allocation
page read and write
7912000
heap
page read and write
5335000
heap
page read and write
5AD0000
heap
page read and write
7354000
heap
page read and write
56D00000
direct allocation
page read and write
2200000
heap
page read and write
56DC4000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
2C90000
trusted library allocation
page read and write
53C1000
heap
page read and write
2FA3000
trusted library allocation
page execute and read and write
6FD1000
heap
page read and write
7870000
trusted library allocation
page read and write
7FFD9B550000
trusted library allocation
page read and write
5D15000
heap
page read and write
663000
heap
page read and write
6FE0000
heap
page read and write
6581000
heap
page read and write
5353000
heap
page read and write
754A000
heap
page read and write
56DE0000
direct allocation
page read and write
5820000
trusted library allocation
page read and write
52FB000
heap
page read and write
666000
heap
page read and write
49FC000
stack
page read and write
56D60000
direct allocation
page read and write
6FE5000
heap
page execute and read and write
5AD3000
heap
page read and write
365C000
heap
page read and write
F9A687E000
stack
page read and write
54F5000
trusted library allocation
page read and write
56DE0000
direct allocation
page read and write
7237000
heap
page read and write
56DE0000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
770000
heap
page read and write
6C430000
unkown
page readonly
6197000
heap
page read and write
64FA000
heap
page read and write
795D000
heap
page read and write
7285000
heap
page read and write
3C35000
heap
page read and write
33FC000
stack
page read and write
2FA3000
heap
page read and write
4ACE000
stack
page read and write
60F4000
heap
page read and write
72EE000
stack
page read and write
8720000
trusted library allocation
page read and write
6E42000
heap
page read and write
6425000
heap
page read and write
2FA1000
heap
page read and write
5C4000
heap
page read and write
CFE000
unkown
page write copy
6E8D000
heap
page read and write
5F37000
heap
page read and write
56DE0000
direct allocation
page read and write
5D4C000
heap
page read and write
CF0000
unkown
page readonly
3C53000
heap
page read and write
56DF0000
direct allocation
page read and write
53C1000
heap
page read and write
67EA000
heap
page read and write
56DE0000
direct allocation
page read and write
7FFD9B5C0000
trusted library allocation
page read and write
56DE0000
direct allocation
page read and write
314E000
stack
page read and write
2FC5000
heap
page read and write
5825000
trusted library allocation
page read and write
5977000
trusted library allocation
page read and write
6E7000
heap
page read and write
84F4000
heap
page read and write
6204000
heap
page read and write
67CB000
heap
page read and write
75AE000
heap
page read and write
53C0000
heap
page read and write
760E000
heap
page read and write
20816D18000
trusted library allocation
page read and write
5C4000
heap
page read and write
535D000
heap
page read and write
3001000
heap
page read and write
61B0000
heap
page read and write
5AE2000
heap
page read and write
6AA7000
heap
page read and write
8700000
trusted library allocation
page execute and read and write
2D44000
unclassified section
page write copy
6527000
heap
page read and write
56F000
unkown
page readonly
68E6000
heap
page read and write
DF1000
heap
page read and write
2FCA000
heap
page read and write
5AE4000
heap
page read and write
61E2000
heap
page read and write
6BB17000
unkown
page read and write
F9A6C3E000
stack
page read and write
3E2D000
stack
page read and write
3C8A000
heap
page read and write
6CCD000
heap
page read and write
BD0000
heap
page read and write
6740000
heap
page read and write
3C61000
heap
page read and write
56DE0000
direct allocation
page read and write
7DF43AC20000
trusted library allocation
page execute and read and write
756D000
heap
page read and write
56DE0000
direct allocation
page read and write
6F0A000
heap
page read and write
68A0000
heap
page read and write
5394000
heap
page read and write
CF0000
unkown
page readonly
7953000
heap
page read and write
6EB0000
heap
page read and write
6F37000
heap
page read and write
590000
heap
page read and write
6AB6000
heap
page read and write
D11000
unkown
page readonly
56DE0000
direct allocation
page read and write
67A4000
heap
page read and write
5349000
heap
page read and write
82C0000
trusted library allocation
page read and write
60B8000
heap
page read and write
52C4000
heap
page read and write
2081EE7E000
heap
page read and write
3CA2000
heap
page read and write
56C70000
direct allocation
page read and write
7568000
heap
page read and write
2FD2000
trusted library allocation
page read and write
6AD9000
heap
page read and write
56DE0000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
6531000
heap
page read and write
2FB9000
trusted library allocation
page read and write
6E83000
heap
page read and write
401000
unkown
page execute read
3C64000
heap
page read and write
3C99000
heap
page read and write
828000
heap
page read and write
6559000
heap
page read and write
6568000
heap
page read and write
82B0000
trusted library allocation
page read and write
5D0B000
heap
page read and write
534E000
heap
page read and write
3C6E000
heap
page read and write
63F6000
heap
page read and write
56DE0000
direct allocation
page read and write
7741000
heap
page read and write
6BA0000
heap
page read and write
56DE0000
direct allocation
page read and write
408000
unkown
page readonly
6383000
heap
page read and write
20804D0A000
heap
page read and write
3C5D000
heap
page read and write
6420000
heap
page read and write
775A000
heap
page read and write
6E501000
unkown
page execute read
3C41000
heap
page read and write
6E7E000
heap
page read and write
6F1E000
heap
page read and write
5EDD000
heap
page read and write
2080879B000
trusted library allocation
page read and write
3C7F000
heap
page read and write
6125000
heap
page read and write
5C4000
heap
page read and write
52E7000
heap
page read and write
620A000
heap
page read and write
9FC000
stack
page read and write
7860000
trusted library allocation
page read and write
3C4D000
heap
page read and write
73EA000
heap
page read and write
67A9000
heap
page read and write
56D5E000
direct allocation
page read and write
3001000
heap
page read and write
3C7F000
heap
page read and write
3C46000
heap
page read and write
56D70000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
6179000
heap
page read and write
54F3000
trusted library allocation
page read and write
650E000
heap
page read and write
7732000
heap
page read and write
6C2D000
heap
page read and write
23BC000
stack
page read and write
7241000
heap
page read and write
6DCF000
heap
page read and write
6FB8000
heap
page read and write
6C46000
heap
page read and write
7262000
heap
page read and write
5B11000
heap
page read and write
F9A6DBE000
stack
page read and write
56DE0000
direct allocation
page read and write
675E000
heap
page read and write
7276000
heap
page read and write
7264000
heap
page read and write
734F000
heap
page read and write
D11000
unkown
page readonly
5C4000
heap
page read and write
56DE0000
direct allocation
page read and write
6FB3000
heap
page read and write
56C60000
direct allocation
page read and write
60EA000
heap
page read and write
61BA000
heap
page read and write
8480000
trusted library allocation
page read and write
5F50000
heap
page read and write
6B10000
heap
page read and write
6C23000
heap
page read and write
60E0000
heap
page read and write
7FFD9B540000
trusted library allocation
page read and write
2FBF000
heap
page read and write
56DE0000
direct allocation
page read and write
20806B61000
trusted library allocation
page read and write
52EC000
heap
page read and write
63EC000
heap
page read and write
3C89000
heap
page read and write
5AFB000
heap
page read and write
75CC000
heap
page read and write
2FE3000
heap
page read and write
3C7D000
heap
page read and write
6CA0000
heap
page read and write
5C4000
heap
page read and write
605E000
heap
page read and write
56D94000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
6F19000
heap
page read and write
6B2D000
heap
page read and write
5EE2000
heap
page read and write
5AD5000
heap
page read and write
56DE0000
direct allocation
page read and write
6927000
heap
page read and write
56DE0000
direct allocation
page read and write
56C04000
direct allocation
page read and write
6759000
heap
page read and write
2081EC01000
heap
page read and write
6B41000
heap
page read and write
3000000
heap
page readonly
20808799000
trusted library allocation
page read and write
593A000
trusted library allocation
page read and write
3048000
heap
page read and write
7554000
heap
page read and write
6E38000
heap
page read and write
66BA000
heap
page read and write
6FD6000
heap
page read and write
56DE0000
direct allocation
page read and write
606D000
heap
page read and write
3198000
trusted library allocation
page read and write
75CC000
heap
page read and write
52BA000
heap
page read and write
2206000
heap
page read and write
73BD000
heap
page read and write
667000
heap
page read and write
20816B61000
trusted library allocation
page read and write
7800000
trusted library allocation
page read and write
53DA000
heap
page read and write
2F93000
heap
page read and write
6405000
heap
page read and write
617E000
heap
page read and write
64AC000
heap
page read and write
7FFD9B590000
trusted library allocation
page read and write
6FAD000
stack
page read and write
6B51000
heap
page read and write
56DE0000
direct allocation
page read and write
56C50000
direct allocation
page read and write
7654000
heap
page read and write
607C000
heap
page read and write
3C5A000
heap
page read and write
3001000
heap
page read and write
6414000
heap
page read and write
690E000
heap
page read and write
56DE0000
direct allocation
page read and write
F9A6573000
stack
page read and write
5367000
heap
page read and write
3032000
heap
page read and write
6F05000
heap
page read and write
318E000
stack
page read and write
D0B000
unkown
page readonly
7626000
heap
page read and write
3C7A000
heap
page read and write
638D000
heap
page read and write
56DE0000
direct allocation
page read and write
3C55000
heap
page read and write
2FC2000
heap
page read and write
6887000
heap
page read and write
2E50000
heap
page read and write
56DE0000
direct allocation
page read and write
7FFD9B3A0000
trusted library allocation
page execute and read and write
5B1E000
heap
page read and write
729E000
heap
page read and write
675000
heap
page read and write
56CD9000
direct allocation
page read and write
7626000
heap
page read and write
10A0000
heap
page read and write
5344000
heap
page read and write
5C4000
heap
page read and write
6572000
heap
page read and write
56CEE000
direct allocation
page read and write
3C93000
heap
page read and write
8730000
trusted library allocation
page read and write
7662000
heap
page read and write
56DE0000
direct allocation
page read and write
56DE0000
direct allocation
page read and write
700000
heap
page read and write
F9A798E000
stack
page read and write
725D000
heap
page read and write
6BB1B000
unkown
page readonly
5C4000
heap
page read and write
56DE0000
direct allocation
page read and write
56CD9000
direct allocation
page read and write
56C23000
direct allocation
page read and write
2F9C000
heap
page read and write
7FFD9B4E0000
trusted library allocation
page read and write
2F8D000
heap
page read and write
6B14000
heap
page read and write
75BD000
heap
page read and write
721E000
heap
page read and write
63E7000
heap
page read and write
643B000
heap
page read and write
56CE4000
direct allocation
page read and write
832D000
stack
page read and write
3C64000
heap
page read and write
6EC4000
heap
page read and write
3C82000
heap
page read and write
D11000
unkown
page readonly
E50000
heap
page read and write
56D90000
direct allocation
page read and write
5D29000
heap
page read and write
20806670000
heap
page read and write
6AC0000
heap
page read and write
66B0000
heap
page read and write
6397000
heap
page read and write
6C94B000
unkown
page read and write
648E000
heap
page read and write
64D3000
heap
page read and write
56DE0000
direct allocation
page read and write
There are 2050 hidden memdumps, click here to show them.