IOC Report
SD 2477.exe

loading gif

Files

File Path
Type
Category
Malicious
SD 2477.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\install.vbs
data
modified
malicious
C:\Users\user\AppData\Roaming\ios.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\ios.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\Meniscotherium1.Sch7
data
dropped
C:\Users\user\AppData\Local\Temp\bhvE86E.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x03d82694, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\emblem-default-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\lang-1026.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\llgguleakcnppfakdibd
Little-endian UTF-16 Unicode text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\network-cellular-hardware-disabled-symbolic.svg
SVG Scalable Vector Graphics image
modified
C:\Users\user\AppData\Local\Temp\nseF43E.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified
C:\Users\user\AppData\Local\Temp\nsg85A6.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\logs.dat
data
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SD 2477.exe
"C:\Users\user\Desktop\SD 2477.exe"
malicious
C:\Users\user\Desktop\SD 2477.exe
"C:\Users\user\Desktop\SD 2477.exe"
malicious
C:\Users\user\AppData\Roaming\ios.exe
C:\Users\user\AppData\Roaming\ios.exe
malicious
C:\Users\user\AppData\Roaming\ios.exe
C:\Users\user\AppData\Roaming\ios.exe
malicious
C:\Users\user\AppData\Roaming\ios.exe
C:\Users\user\AppData\Roaming\ios.exe /stext "C:\Users\user\AppData\Local\Temp\llgguleakcnppfakdibd"
malicious
C:\Users\user\AppData\Roaming\ios.exe
C:\Users\user\AppData\Roaming\ios.exe /stext "C:\Users\user\AppData\Local\Temp\volzvwpcxkfuztwomtwfiio"
malicious
C:\Users\user\AppData\Roaming\ios.exe
C:\Users\user\AppData\Roaming\ios.exe /stext "C:\Users\user\AppData\Local\Temp\giyjvozvlsxzczkadeigtvjrgu"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\System32\cmd.exe" /c "C:\Users\user\AppData\Roaming\ios.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://cdnjs.cloudflare.com/ajax/libs/gsap/3.5.1/gsap.min.js
unknown
http://www.imvu.comr
unknown
https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/k3.jpg
unknown
https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/footer.png
unknown
https://ajax.aspnetcdn.com/ajax/jquery/jquery-3.3.1.min.js
unknown
https://csp.withgoogle.com/csp/ads-programmable
unknown
http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.
unknown
http://www.nirsoft.net
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC0ee8c30f496b428a91d7f3289a2b8a2
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC784fc6783b2f45a09cb8efa184cc684
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
http://www.gopher.ftp://ftp.
unknown
https://www.google.com/chrome/
unknown
http://cdp.thawte.com/ThawteRSACA2018.crl0L
unknown
https://cxcs.microsoft.net/static/public/tips/neutral/6c6740da-0bfe-48a6-83fc-c98d1919b060/3addf02b7
unknown
https://csp.withgoogle.com/csp/botguard-scs
unknown
https://csp.withgoogle.com/csp/report-to/active-view-scs-read-write-acl
unknown
https://s1.adform.net/Banners/Elements/Files/2070608/10170131/10170131.js?ADFassetID=10170131&bv=258
unknown
http://crls.pki.goog/gts1c3/QOvJ0N1sT2A.crl0
unknown
https://www.msn.com
unknown
https://sync-t1.taboola.com/sg/criteortb-network/1/rtb-h/?taboola_hm=b2df1cf6-0873-4430-916b-9612e80
unknown
https://static2.sharepointonline.com/files/fabric/assets/fonts/segoeui-westeuropean/segoeui-light.wo
unknown
https://btloader.com/tag?o=6208086025961472&upapi=true
unknown
http://www.imvu.comata
unknown
https://use.typekit.net/af/eaf09c/000000000000000000017703/27/d?subset_id=2&fvd=n7&v=3
unknown
https://assets.msn.com/weathermapdata/1/static/svg/72/MostlySunnyDay.svg
unknown
https://eb2.3lift.com/synccompletion/adm/exitcode=0&type=install&workflow=323739368433491;gtm=2wg8g0
unknown
https://b1sync.zemanta.com/usersync/msn/?puid=101156F9176C6E98058F466E16B36FAC
unknown
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ce_sharpen%2Ch_311%2Cw_207%2Cc_pad%2
unknown
http://www.imvu.com/
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCe691e5baee9945259179326d0658843
unknown
http://ocsp.sca1b.amazontrust.com06
unknown
https://77243bf109fbfd4c6540dfa32ce43b7d.clo.footprintdns.com/apc/trans.gif?acea25fcc08da24d4d717452
unknown
http://certs.godaddy.com/repository/1301
unknown
http://www.imvu.com
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://certs.godaddy.com/repository/0
unknown
https://pki.goog/repository/0
unknown
https://www.msn.com/
unknown
https://doc-10-20-docs.googleusercontent.com/
unknown
https://contextual.media.net/checksync.php&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCd01d50cad19649bf857a22be5995480
unknown
http://cacerts.thawte.com/ThawteRSACA2018.crt0
unknown
http://crl.godaddy.com/gdroot-g2.crl0F
unknown
http://crl.rootg2.amazontrust.com/rootg2.crl0
unknown
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=2542116;cat=chrom0;ord=8672137916610;
unknown
https://fp-afd.azurefd.net/apc/trans.gif?cc0090b1d4f11396dcefd3282bde5f89
unknown
https://www.msn.com/?ocid=iehp
unknown
https://cvision.media.net/new/300x300/2/45/221/3/7d5dc6a9-5325-442d-926e-f2c668b8e65e.jpg?v=9
unknown
https://contextual.media.net/medianet.phpcid=8CU157172&crid=858412214&size=306x271&https=1id=77%2C18
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC8cd6be4f72cf4da1aa891e7da23d144
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://www.google.com/accounts/servicelogin
unknown
http://trc.taboola.com/p3p.xml
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RC028e72ad6b944b8183346fecb32a729
unknown
https://cxcs.microsoft.net/api/settings/en-US/xml/settings-tipset?release=20h1&sku=Professional&plat
unknown
https://ow1.res.office365.com/apc/trans.gif?6ddaa1fdedee1687470f054f781e5afc
unknown
http://crl.pki.goog/gsr1/gsr1.crl0;
unknown
https://s1.adform.net/Banners/Elements/Files/2070608/10170131/bvpath_258/pics/k2.jpg
unknown
http://crl.godaddy.com/gdig2s1-2558.crl0
unknown
http://ocsp.sectigo.com0
unknown
https://csp.withgoogle.com/csp/report-to/botguard-scs
unknown
https://doc-10-20-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/4kt6kj4d0084526l7js9den2kr3jfv0g/1652355675000/13609515036127870368/*/15o_MQXwhHi1q2hB6HCot5QkKY25MLVec?e=download
142.251.36.65
http://certificates.godaddy.com/repository/0
unknown
https://www.msn.com/spartan/ientplo
unknown
https://s1.adform.net/banners/scripts/rmb/Adform.DHTML.js?bv=626
unknown
https://eb2.3lift.com/sync?
unknown
https://acdn.adnxs.com/dmp/async_usersync.html
unknown
http://www.avast.com0/
unknown
https://assets.adobedtm.com/launch-EN7b3d710ac67a4a1195648458258f97dd.min.js
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://crls.pki.goog/gts1c3/zdATt0Ex_Fk.crl0
unknown
https://csp.withgoogle.com/csp/report-to/adspam-signals-scs
unknown
http://pki.goog/repo/certs/gts1c3.der07
unknown
http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
unknown
https://2542116.fls.doubleclick.net/activityi;src=2542116;type=clien612;cat=chromx;ord=1;num=7209567
unknown
https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2
unknown
https://srtb.msn.com/auction?a=de-ch&b=bba24733ba4a487f8f8706bf3811269e&c=MSN&d=https%3A%2F%2Fwww.ms
unknown
https://use.typekit.net/af/cb695f/000000000000000000017701/27/d?subset_id=2&fvd=n4&v=3
unknown
https://www.msn.com/de-ch/?ocid=iehp
unknown
https://www.google.com/chrome/thank-you.html?statcb=0&installdataindex=empty&defaultbrowser=0
unknown
https://cdn.taboola.com/TaboolaCookieSyncScript.js
unknown
https://www.googletagservices.com/activeview/js/current/rx_lidar.js?cache=r20110914
unknown
https://static.doubleclick.net/dynamic/5/283983386/11928812572019506176_2845462151855228713.jpeg
unknown
https://www.msn.com/_h/9c38ab9f/webcore/externalscripts/oneTrustV2/scripttemplates/otSDKStub.js
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCefb91313fdae420ebbea45d8f044894
unknown
https://adservice.google.com/ddm/fls/i/src=2542116;type=chrom322;cat=chrom01g;ord=3739368433491;gtm=
unknown
https://www.google.com/pagead/drt/ui
unknown
https://www.msn.com/de-ch/ocid=iehpappid=0&re=0&cs=1&hb=1&cv=37&ndec=1&cid=8HBI57XIG&prvid=77%2C184%
unknown
https://s1.adform.net/stoat/626/s1.adform.net/bootstrap.js
unknown
https://sb.scorecardresearch.com/beacon.js
unknown
http://pki.goog/gsr1/gsr1.crt02
unknown
http://pki.goog/repo/certs/gts1c3.der0$
unknown
https://doc-10-20-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/rdk8vcmh
unknown
https://sb.scorecardresearch.com/b2?c1=2&c2=3000001&cs_ucfr=1&rn=1632306836522&c7=https%3A%2F%2Fwww.
unknown
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_368%2Cw_622%2Cc_fill%2Cg_faces:au
unknown
https://fp-afd.azureedge.us/apc/trans.gif?edd9ae41b7970a265a6dfb9c4956f1d7
unknown
https://assets.adobedtm.com/5ef092d1efb5/4d1d9f749fd3/2b6d8bd51279/RCacc6c4ed30494f9fad065afe638a7ca
unknown
https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
unknown
https://cvision.media.net/new/300x300/2/75/165/127/fefc2984-60ee-407b-a704-0db527f30f53.jpg?v=9
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
dwilsonson23.sytes.net
185.20.186.103
malicious
dual-a-0001.dc-msedge.net
131.253.33.200
drive.google.com
142.250.184.206
e-0009.e-msedge.net
13.107.5.88
googlehosted.l.googleusercontent.com
142.251.36.65
doc-10-20-docs.googleusercontent.com
unknown

IPs

IP
Domain
Country
Malicious
185.20.186.103
dwilsonson23.sytes.net
Ukraine
malicious
142.251.36.65
googlehosted.l.googleusercontent.com
United States
142.250.184.206
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ahw
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Remcos-V27VY7
exepath
HKEY_CURRENT_USER\SOFTWARE\Remcos-V27VY7
licence

Memdumps

Base Address
Regiontype
Protect
Malicious
19FD000
heap
page read and write
malicious
3330000
direct allocation
page execute and read and write
malicious
3330000
direct allocation
page execute and read and write
malicious
18C9000
heap
page read and write
malicious
1660000
remote allocation
page execute and read and write
malicious
1660000
remote allocation
page execute and read and write
malicious
1660000
remote allocation
page execute and read and write
malicious
23FF000
trusted library allocation
page read and write
254DA2FB000
heap
page read and write
C2B000
heap
page read and write
254D9CC2000
heap
page read and write
443000
unkown
page readonly
19A89330000
trusted library allocation
page read and write
21CCDC00000
heap
page read and write
630000
heap
page read and write
1A624E57000
heap
page read and write
40A000
unkown
page write copy
254D9D49000
heap
page read and write
1A61A8B4000
heap
page read and write
23F9000
trusted library allocation
page read and write
262406B0000
heap
page read and write
2400000
trusted library allocation
page read and write
254D9CA8000
heap
page read and write
1F0000
heap
page read and write
240E000
trusted library allocation
page read and write
626000
unkown
page write copy
1111E713000
heap
page read and write
2DEE000
stack
page read and write
21CD32FD000
heap
page read and write
1111E6A2000
heap
page read and write
23F1000
trusted library allocation
page read and write
401000
unkown
page execute read
1DBC1000
trusted library allocation
page read and write
254D9C1A000
heap
page read and write
23F9000
trusted library allocation
page read and write
464000
heap
page read and write
254D9CFB000
heap
page read and write
23F1000
trusted library allocation
page read and write
254D948F000
heap
page read and write
408000
unkown
page readonly
254D9CCE000
heap
page read and write
23F9000
trusted library allocation
page read and write
254D9CFC000
heap
page read and write
2401000
trusted library allocation
page read and write
19A892D0000
trusted library allocation
page read and write
1A61A12D000
heap
page read and write
293F000
stack
page read and write
254D9CE7000
heap
page read and write
1D940000
trusted library allocation
page read and write
2401000
trusted library allocation
page read and write
254D9D29000
heap
page read and write
254D9CB6000
heap
page read and write
1D6FC000
stack
page read and write
19A889F0000
unclassified section
page readonly
464000
heap
page read and write
1854000
heap
page read and write
21CD326B000
heap
page read and write
1D43D000
stack
page read and write
1A61A17C000
heap
page read and write
23F9000
trusted library allocation
page read and write
459000
remote allocation
page execute and read and write
2524000
heap
page read and write
1A619899000
heap
page read and write
1A61A12E000
heap
page read and write
5A4E000
stack
page read and write
254D9D22000
heap
page read and write
1944000
heap
page read and write
32EF000
heap
page read and write
18ED9867000
heap
page read and write
2400000
trusted library allocation
page read and write
C6F3277000
stack
page read and write
19A89320000
trusted library allocation
page read and write
1E23F610000
heap
page read and write
C6F347C000
stack
page read and write
21CCD506000
heap
page read and write
21CCD400000
heap
page read and write
464000
heap
page read and write
254D9CB2000
heap
page read and write
21CD336E000
heap
page read and write
1D57B000
stack
page read and write
254D9D56000
heap
page read and write
401000
unkown
page execute read
F7150F9000
stack
page read and write
21CD3610000
trusted library allocation
page read and write
5DC000
heap
page read and write
2413000
trusted library allocation
page read and write
1111E69E000
heap
page read and write
254D948D000
heap
page read and write
21CA5940000
heap
page read and write
1A61A174000
heap
page read and write
262406B8000
heap
page read and write
1A624E28000
heap
page read and write
32F1000
heap
page read and write
1AA0000
trusted library allocation
page read and write
21CD3440000
remote allocation
page read and write
254D9BBC000
heap
page read and write
67BDF79000
stack
page read and write
30000
heap
page read and write
254D9D84000
heap
page read and write
247F000
stack
page read and write
1E23F8C5000
heap
page read and write
1FC000
heap
page read and write
2400000
trusted library allocation
page read and write
32FA000
heap
page read and write
254D9C0F000
heap
page read and write
254DA235000
heap
page read and write
5EC000
unkown
page execute read
1A17000
heap
page read and write
23FB000
trusted library allocation
page read and write
241E000
trusted library allocation
page read and write
45EF3FE000
stack
page read and write
2624D910000
heap
page read and write
254D9C1A000
heap
page read and write
254D9B91000
heap
page read and write
665000
heap
page read and write
194C000
heap
page read and write
1D0000
unclassified section
page readonly
23FF000
trusted library allocation
page read and write
2400000
trusted library allocation
page read and write
24C0000
trusted library allocation
page read and write
254DA2C8000
heap
page read and write
1C0000
remote allocation
page read and write
5D2B000
stack
page read and write
23F9000
trusted library allocation
page read and write
254D9D2D000
heap
page read and write
254D9C90000
heap
page read and write
5640000
trusted library allocation
page read and write
21CCD502000
heap
page read and write
21CCDD19000
heap
page read and write
254D9CC6000
heap
page read and write
246F000
trusted library allocation
page read and write
254D9C2B000
heap
page read and write
254D9CD2000
heap
page read and write
254D9BE1000
heap
page read and write
1E23F6CC000
heap
page read and write
1A27000
heap
page read and write
254D9D56000
heap
page read and write
464000
heap
page read and write
32EB000
heap
page read and write
400000
unkown
page readonly
464000
heap
page read and write
254D9CBD000
heap
page read and write
2406000
trusted library allocation
page read and write
3431000
trusted library allocation
page read and write
1A61A8B1000
heap
page read and write
194D000
heap
page read and write
1A624E67000
heap
page read and write
23F8000
trusted library allocation
page read and write
1E240220000
heap
page read and write
C2712FE000
stack
page read and write
254D9CB9000
heap
page read and write
449C59E000
stack
page read and write
2426000
trusted library allocation
page read and write
21CCD42A000
heap
page read and write
54CF000
stack
page read and write
254D9CFD000
heap
page read and write
26240600000
heap
page read and write
254DA503000
heap
page read and write
23B0000
heap
page read and write
21CD31B0000
trusted library allocation
page read and write
2405000
trusted library allocation
page read and write
1A61A161000
heap
page read and write
21CD324D000
heap
page read and write
1E2403AA000
heap
page read and write
23F0000
trusted library allocation
page read and write
2400000
trusted library allocation
page read and write
254DA23D000
heap
page read and write
23FF000
trusted library allocation
page read and write
2427000
trusted library allocation
page read and write
254D9CAC000
heap
page read and write
BD0000
heap
page read and write
19A88A84000
heap
page read and write
1A61A12C000
heap
page read and write
3355000
heap
page read and write
664000
heap
page read and write
1A61A132000
heap
page read and write
254DA54F000
heap
page read and write
254D9D30000
heap
page read and write
196F000
stack
page read and write
254D9C39000
heap
page read and write
2400000
trusted library allocation
page read and write
21CCD513000
heap
page read and write
254D948D000
heap
page read and write
23F9000
trusted library allocation
page read and write
254DA235000
heap
page read and write
254D95EB000
heap
page read and write
254D9CFB000
heap
page read and write
254D9BB4000
heap
page read and write
254D9D32000
heap
page read and write
242B000
trusted library allocation
page read and write
1111E684000
heap
page read and write
82F000
stack
page read and write
23F9000
trusted library allocation
page read and write
254D9BF1000
heap
page read and write
23F9000
trusted library allocation
page read and write
254D9CC8000
heap
page read and write
1A624E64000
heap
page read and write
21CCD431000
heap
page read and write
29F9000
trusted library allocation
page read and write
1111E691000
heap
page read and write
1D47E000
stack
page read and write
254D9BF1000
heap
page read and write
3509000
trusted library allocation
page read and write
1A61987B000
heap
page read and write
437000
unkown
page read and write
1E2401E3000
heap
page read and write
1A61A015000
heap
page read and write
88F000
stack
page read and write
1A27000
heap
page read and write
1111E702000
heap
page read and write
254D9CF3000
heap
page read and write
195A000
heap
page read and write
1A61A17C000
heap
page read and write
254D949E000
heap
page read and write
23F7000
trusted library allocation
page read and write
254D9C2F000
heap
page read and write
23FF000
trusted library allocation
page read and write
254D9CA1000
heap
page read and write
254DA261000
heap
page read and write
19A88A13000
heap
page read and write
67BE17A000
stack
page read and write
240BDEC000
stack
page read and write
254D9BE9000
heap
page read and write
AB8000
trusted library allocation
page read and write
254D9CC8000
heap
page read and write
254D9BF1000
heap
page read and write
254D9CDB000
heap
page read and write
1D270000
remote allocation
page read and write
1931000
heap
page read and write
254D9BD8000
heap
page read and write
254D9D46000
heap
page read and write
1D83D000
stack
page read and write
23FF000
trusted library allocation
page read and write
26240654000
heap
page read and write
1A61A16B000
heap
page read and write
254D9C38000
heap
page read and write
2401000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
21CCEB80000
trusted library allocation
page read and write
1A624E6C000
heap
page read and write
254D9BA2000
heap
page read and write
254DA287000
heap
page read and write
240C000
trusted library allocation
page read and write
240C000
trusted library allocation
page read and write
254DA31A000
heap
page read and write
193E000
heap
page read and write
254D95EB000
heap
page read and write
246F000
trusted library allocation
page read and write
32F3000
heap
page read and write
254D9350000
trusted library allocation
page read and write
1A624E36000
heap
page read and write
3332000
heap
page read and write
B25000
heap
page read and write
2406000
trusted library allocation
page read and write
254D9489000
heap
page read and write
254D9CD0000
heap
page read and write
690000
heap
page read and write
2AE2000
trusted library allocation
page read and write
53CE000
stack
page read and write
254D9CF8000
heap
page read and write
2444000
trusted library allocation
page read and write
29F9000
trusted library allocation
page read and write
1E24023A000
heap
page read and write
254D9C40000
heap
page read and write
1E240231000
heap
page read and write
698000
heap
page read and write
23FF000
trusted library allocation
page read and write
23FE000
trusted library allocation
page read and write
26240680000
heap
page read and write
1A624E41000
heap
page read and write
C2A000
heap
page read and write
1944000
heap
page read and write
38C34DB000
stack
page read and write
1CAF1000
heap
page read and write
21CA5930000
unclassified section
page readonly
21CCD49B000
heap
page read and write
1A95000
heap
page read and write
664000
heap
page read and write
19B000
stack
page read and write
254DA240000
heap
page read and write
19E000
stack
page read and write
254D9C2B000
heap
page read and write
254D9D51000
heap
page read and write
254D95EA000
heap
page read and write
464000
heap
page read and write
254DA241000
heap
page read and write
1A624E52000
heap
page read and write
1E24050C000
heap
page read and write
254D9406000
heap
page read and write
1E24020B000
heap
page read and write
254D95B0000
remote allocation
page read and write
19A89310000
trusted library allocation
page read and write
23F9000
trusted library allocation
page read and write
254D9B97000
heap
page read and write
80CB4FF000
stack
page read and write
3303000
heap
page read and write
23F9000
trusted library allocation
page read and write
1DC55000
trusted library allocation
page read and write
254DA2DB000
heap
page read and write
1C0000
remote allocation
page read and write
21CCD413000
heap
page read and write
2408000
trusted library allocation
page read and write
254D9C40000
heap
page read and write
254D9CA5000
heap
page read and write
1E240237000
heap
page read and write
1E2403A4000
heap
page read and write
21CD30C6000
trusted library allocation
page read and write
1A61A178000
heap
page read and write
23F9000
trusted library allocation
page read and write
254DA238000
heap
page read and write
19A88C00000
heap
page read and write
2496000
trusted library allocation
page read and write
21CCD45A000
heap
page read and write
1E2401EB000
heap
page read and write
254DA221000
heap
page read and write
1C0000
remote allocation
page read and write
254DA36C000
heap
page read and write
1A61A179000
heap
page read and write
3280000
trusted library allocation
page read and write
254D9D03000
heap
page read and write
254D9D22000
heap
page read and write
34D0000
trusted library allocation
page read and write
254D9BBC000
heap
page read and write
18ED9902000
heap
page read and write
254D9478000
heap
page read and write
1A61A10E000
heap
page read and write
23F9000
trusted library allocation
page read and write
254DA2FB000
heap
page read and write
C6F337E000
stack
page read and write
2624DA60000
heap
page read and write
2401000
trusted library allocation
page read and write
254D9CC8000
heap
page read and write
1E240269000
heap
page read and write
254D9C2B000
heap
page read and write
254D9D13000
heap
page read and write
1049000
unkown
page write copy
1A624E94000
heap
page read and write
18ED9780000
heap
page read and write
254D9BA1000
heap
page read and write
254D9BE9000
heap
page read and write
2400000
trusted library allocation
page read and write
254DA2A5000
heap
page read and write
C27137F000
stack
page read and write
175B9494000
heap
page read and write
1D04E000
stack
page read and write
1C0000
remote allocation
page read and write
254D9D56000
heap
page read and write
1A625602000
trusted library allocation
page read and write
1E24023A000
heap
page read and write
19A88A75000
heap
page read and write
1E240226000
heap
page read and write
1A61A13B000
heap
page read and write
1E240212000
heap
page read and write
1A61A129000
heap
page read and write
C2A000
heap
page read and write
254D9BBD000
heap
page read and write
254D9BF1000
heap
page read and write
254D9CE7000
heap
page read and write
254D95B0000
remote allocation
page read and write
254D944F000
heap
page read and write
254D9D2D000
heap
page read and write
1A61A195000
heap
page read and write
254D9CB8000
heap
page read and write
23F0000
trusted library allocation
page read and write
254D9BA1000
heap
page read and write
254D9CB7000
heap
page read and write
1A624D00000
unclassified section
page readonly
1E23F6A2000
heap
page read and write
5507BFA000
stack
page read and write
2401000
trusted library allocation
page read and write
254DA237000
heap
page read and write
40A000
unkown
page read and write
B8D000
heap
page read and write
1DC2D000
trusted library allocation
page read and write
401000
unkown
page execute read
1E2404FF000
heap
page read and write
254D9C9D000
heap
page read and write
40A000
unkown
page write copy
464000
heap
page read and write
1CF8F000
stack
page read and write
21CCD4FB000
heap
page read and write
19E9000
heap
page read and write
21CCDD00000
heap
page read and write
254D9D2D000
heap
page read and write
254D9C2B000
heap
page read and write
254D9CFB000
heap
page read and write
5EA000
unkown
page execute read
21CD3060000
trusted library allocation
page read and write
1939000
heap
page read and write
1111E69C000
heap
page read and write
A2F000
stack
page read and write
1111E67D000
heap
page read and write
1C0000
remote allocation
page read and write
21CCDD02000
heap
page read and write
23F6000
trusted library allocation
page read and write
21CA5A40000
heap
page read and write
254D9406000
heap
page read and write
23FF000
trusted library allocation
page read and write
C20000
heap
page read and write
254D9CD9000
heap
page read and write
19A88A96000
heap
page read and write
23FF000
trusted library allocation
page read and write
23F9000
trusted library allocation
page read and write
254D9CD6000
heap
page read and write
21CD323D000
heap
page read and write
254D95EE000
heap
page read and write
1E240243000
heap
page read and write
254DA261000
heap
page read and write
254D9CFB000
heap
page read and write
254D95EE000
heap
page read and write
21CD3107000
trusted library allocation
page read and write
19A89290000
trusted library allocation
page read and write
26240675000
heap
page read and write
1A624E6D000
heap
page read and write
80CB18B000
stack
page read and write
1A624E6B000
heap
page read and write
254D9D02000
heap
page read and write
580D000
stack
page read and write
254D9C39000
heap
page read and write
19A88A00000
heap
page read and write
246F000
trusted library allocation
page read and write
254DA503000
heap
page read and write
1A619902000
heap
page read and write
254DA26B000
heap
page read and write
254D9468000
heap
page read and write
2410000
trusted library allocation
page read and write
2A0B000
trusted library allocation
page read and write
21CD30DE000
trusted library allocation
page read and write
67BEBFF000
stack
page read and write
1E23F69B000
heap
page read and write
2400000
trusted library allocation
page read and write
1E24026A000
heap
page read and write
1E23F710000
heap
page read and write
B5E000
trusted library allocation
page read and write
8BD000
stack
page read and write
254D92C0000
heap
page read and write
1E23F707000
heap
page read and write
9C000
stack
page read and write
240D000
trusted library allocation
page read and write
254D9C78000
heap
page read and write
1E23F520000
heap
page read and write
254DA2A7000
heap
page read and write
408000
unkown
page readonly
67BE07E000
stack
page read and write
1D2EF000
stack
page read and write
29F4000
trusted library allocation
page read and write
5EC000
unkown
page write copy
175B9440000
heap
page read and write
254D9C2D000
heap
page read and write
1E240234000
heap
page read and write
464000
heap
page read and write
254D9D2A000
heap
page read and write
23FF000
trusted library allocation
page read and write
1A624E4E000
heap
page read and write
254D9BA2000
heap
page read and write
45EF5FE000
stack
page read and write
1A61A12F000
heap
page read and write
254DA246000
heap
page read and write
21CCDC02000
heap
page read and write
1E2404F8000
heap
page read and write
1E24027C000
heap
page read and write
175B9475000
heap
page read and write
294F000
trusted library allocation
page read and write
21CD334A000
heap
page read and write
427000
unkown
page read and write
254D9CCC000
heap
page read and write
254DA304000
heap
page read and write
5BEE000
stack
page read and write
254D9BD8000
heap
page read and write
23F9000
trusted library allocation
page read and write
175B9488000
heap
page read and write
1A624E59000
heap
page read and write
254D9C39000
heap
page read and write
23F9000
trusted library allocation
page read and write
61E000
stack
page read and write
1A624E5A000
heap
page read and write
240E000
trusted library allocation
page read and write
254D9CA9000
heap
page read and write
2401000
trusted library allocation
page read and write
19A89280000
trusted library allocation
page read and write
21CD313B000
trusted library allocation
page read and write
254D9BB4000
heap
page read and write
23F9000
trusted library allocation
page read and write
254D9BEE000
heap
page read and write
254D9D13000
heap
page read and write
23F9000
trusted library allocation
page read and write
29F9000
trusted library allocation
page read and write
1939000
heap
page read and write
B5C000
trusted library allocation
page read and write
336F000
heap
page read and write
21CD3207000
heap
page read and write
23FF000
trusted library allocation
page read and write
1E240215000
heap
page read and write
254D9BE1000
heap
page read and write
1E240205000
heap
page read and write
254D9D56000
heap
page read and write
1A619630000
heap
page read and write
19A88A2A000
heap
page read and write
1A624EA0000
heap
page read and write
254D9C1A000
heap
page read and write
28F0000
heap
page read and write
18ED992A000
heap
page read and write
6F6000
heap
page read and write
44F000
remote allocation
page execute and read and write
254D9BBC000
heap
page read and write
254D9CA0000
heap
page read and write
241A000
trusted library allocation
page read and write
254D9466000
heap
page read and write
254DA241000
heap
page read and write
443000
unkown
page readonly
254D9D03000
heap
page read and write
254D948D000
heap
page read and write
247A000
trusted library allocation
page read and write
2624069F000
heap
page read and write
1A61A856000
heap
page read and write
254D9CAC000
heap
page read and write
443000
unkown
page readonly
23FE000
trusted library allocation
page read and write
2624067C000
heap
page read and write
254D9C40000
heap
page read and write
21CD3180000
trusted library allocation
page read and write
254DA2EA000
heap
page read and write
443000
unkown
page readonly
21CD3313000
heap
page read and write
1E23F69E000
heap
page read and write
254D9CEB000
heap
page read and write
594D000
stack
page read and write
254DA2B7000
heap
page read and write
1D20F000
stack
page read and write
254D9CBE000
heap
page read and write
B40000
heap
page read and write
1111E5A0000
heap
page read and write
192D000
heap
page read and write
1D6BF000
stack
page read and write
254D9D00000
heap
page read and write
1E240231000
heap
page read and write
25E6D677000
heap
page read and write
19A88A32000
heap
page read and write
AAF000
stack
page read and write
7B8000
heap
page read and write
21CCF000000
trusted library allocation
page read and write
21CCD350000
unclassified section
page readonly
443000
unkown
page readonly
23FE000
trusted library allocation
page read and write
23FF000
trusted library allocation
page read and write
254D9D48000
heap
page read and write
254DA28A000
heap
page read and write
1E240506000
heap
page read and write
1A2C000
heap
page read and write
21CCD4AE000
heap
page read and write
254D9C40000
heap
page read and write
254D9499000
heap
page read and write
3130000
heap
page read and write
7E2000
heap
page read and write
400000
remote allocation
page execute and read and write
1A624E6A000
heap
page read and write
21CD3178000
trusted library allocation
page read and write
1E240272000
heap
page read and write
2424000
trusted library allocation
page read and write
1A61989E000
heap
page read and write
1E240269000
heap
page read and write
1A61A002000
heap
page read and write
254D9CBE000
heap
page read and write
C2B000
heap
page read and write
1CBD1000
heap
page read and write
254D9C39000
heap
page read and write
1A624EA8000
heap
page read and write
B5C000
trusted library allocation
page read and write
19A88A46000
heap
page read and write
21CA5AA6000
heap
page read and write
254DA23D000
heap
page read and write
BFF177000
stack
page read and write
449C51B000
stack
page read and write
1A20000
heap
page read and write
254D9CB3000
heap
page read and write
1E23F692000
heap
page read and write
1E2404F7000
heap
page read and write
408000
unkown
page readonly
23FF000
trusted library allocation
page read and write
254D944F000
heap
page read and write
1CAF0000
heap
page read and write
254D9CE7000
heap
page read and write
400000
unkown
page readonly
254D95EB000
heap
page read and write
21CCD440000
heap
page read and write
254DA26B000
heap
page read and write
42D000
unkown
page read and write
1D0000
unclassified section
page readonly
254D9BEA000
heap
page read and write
1E240508000
heap
page read and write
42D000
unkown
page read and write
254D9CC6000
heap
page read and write
19A88A7D000
heap
page read and write
254D9BBD000
heap
page read and write
246F000
trusted library allocation
page read and write
30000
heap
page read and write
241E000
trusted library allocation
page read and write
25E6D740000
heap
page read and write
254D9478000
heap
page read and write
1E2403AA000
heap
page read and write
254DA31B000
heap
page read and write
23F8000
trusted library allocation
page read and write
3332000
heap
page read and write
1E240208000
heap
page read and write
1E240217000
heap
page read and write
19A89402000
trusted library allocation
page read and write
23F8000
trusted library allocation
page read and write
21CD334E000
heap
page read and write
254D9C38000
heap
page read and write
254D9BBB000
heap
page read and write
254D9BB2000
heap
page read and write
443000
unkown
page readonly
254D9C78000
heap
page read and write
23FF000
trusted library allocation
page read and write
23F9000
trusted library allocation
page read and write
45EF6FB000
stack
page read and write
19A891F0000
trusted library allocation
page read and write
29F1000
trusted library allocation
page read and write
254DA246000
heap
page read and write
1D00E000
stack
page read and write
240E000
trusted library allocation
page read and write
1A61A15E000
heap
page read and write
21CA5A56000
heap
page read and write
18ED9913000
heap
page read and write
1DC2D000
trusted library allocation
page read and write
2987000
trusted library allocation
page read and write
254D9C2B000
heap
page read and write
254D9C98000
heap
page read and write
254D9D2B000
heap
page read and write
254DA2C8000
heap
page read and write
254D9CDB000
heap
page read and write
254D9C46000
heap
page read and write
1E23F8C0000
heap
page read and write
254DA2B6000
heap
page read and write
23FF000
trusted library allocation
page read and write
254D9D6C000
heap
page read and write
BFEB8B000
stack
page read and write
23F9000
trusted library allocation
page read and write
1E240251000
heap
page read and write
254D9CA4000
heap
page read and write
1D0000
unclassified section
page readonly
254DA2FB000
heap
page read and write
254D9CBE000
heap
page read and write
23F9000
trusted library allocation
page read and write
23F9000
trusted library allocation
page read and write
80CB77F000
stack
page read and write
1A61A100000
heap
page read and write
254DA210000
heap
page read and write
1A61A000000
heap
page read and write
1E23F800000
heap
page read and write
23F9000
trusted library allocation
page read and write
1A624B80000
heap
page read and write
1E2403AE000
heap
page read and write
1A69000
heap
page read and write
297C000
trusted library allocation
page read and write
254D9BE9000
heap
page read and write
665000
heap
page read and write
5F2000
unkown
page execute read
254D9CE7000
heap
page read and write
1A61A834000
heap
page read and write
23FF000
trusted library allocation
page read and write
23F9000
trusted library allocation
page read and write
254D9BE1000
heap
page read and write
665000
heap
page read and write
23F3000
trusted library allocation
page read and write
240D000
trusted library allocation
page read and write
254D9C1A000
heap
page read and write
254D9BEE000
heap
page read and write
254D940A000
heap
page read and write
254D9CB5000
heap
page read and write
51A000
heap
page read and write
333B000
heap
page read and write
1CBD0000
heap
page read and write
2433000
trusted library allocation
page read and write
21CA5A13000
heap
page read and write
254D9CBE000
heap
page read and write
254D9C40000
heap
page read and write
193000
stack
page read and write
4DE000
stack
page read and write
19A88A4B000
heap
page read and write
550777E000
stack
page read and write
254D944F000
heap
page read and write
2624069F000
heap
page read and write
254D9CD7000
heap
page read and write
5F0000
unkown
page execute read
1A6198B5000
heap
page read and write
B5D000
trusted library allocation
page read and write
F714BFF000
stack
page read and write
1E240237000
heap
page read and write
664000
heap
page read and write
194D000
heap
page read and write
254D9BEF000
heap
page read and write
21CD32EA000
heap
page read and write
1E24022C000
heap
page read and write
175B9400000
heap
page read and write
1A619800000
heap
page read and write
5E8000
unkown
page execute read
18ED9710000
heap
page read and write
1E2403A5000
heap
page read and write
C6F377D000
stack
page read and write
254DA2C4000
heap
page read and write
F715079000
stack
page read and write
254D9C39000
heap
page read and write
254DA237000
heap
page read and write
1A61A140000
heap
page read and write
1A624F02000
heap
page read and write
254D9CE0000
heap
page read and write
30000
heap
page read and write
26240DC0000
trusted library allocation
page read and write
1D300000
remote allocation
page read and write
254D9CC9000
heap
page read and write
58E000
stack
page read and write
5C4B97D000
stack
page read and write
254D9CB6000
heap
page read and write
21CD3150000
trusted library allocation
page read and write
1E240212000
heap
page read and write
254D9D35000
heap
page read and write
2400000
trusted library allocation
page read and write
254D9D01000
heap
page read and write
2400000
trusted library allocation
page read and write
33E0000
trusted library allocation
page read and write
23F1000
trusted library allocation
page read and write
21CCDD04000
heap
page read and write
1E23F69E000
heap
page read and write
40A000
unkown
page write copy
254D9CA9000
heap
page read and write
23F9000
trusted library allocation
page read and write
254D9CE0000
heap
page read and write
29F5000
trusted library allocation
page read and write
1E240226000
heap
page read and write
1C0000
remote allocation
page read and write
23F9000
trusted library allocation
page read and write
1E240220000
heap
page read and write
21CD3000000
trusted library allocation
page read and write
1A6198BE000
heap
page read and write
664000
heap
page read and write
1DCC0000
trusted library allocation
page read and write
175B9350000
heap
page read and write
23FF000
trusted library allocation
page read and write
1D0000
unclassified section
page readonly
254DA241000
heap
page read and write
254DA2A7000
heap
page read and write
29F1000
trusted library allocation
page read and write
23F3000
trusted library allocation
page read and write
32D8000
heap
page read and write
254DA26B000
heap
page read and write
19A892B0000
trusted library allocation
page read and write
262406AA000
heap
page read and write
254D9C78000
heap
page read and write
1A61A680000
remote allocation
page read and write
1E240212000
heap
page read and write
254D9CD6000
heap
page read and write
5C8000
heap
page read and write
246F000
trusted library allocation
page read and write
21CD332B000
heap
page read and write
2624069D000
heap
page read and write
21CD3070000
trusted library allocation
page read and write
1E240251000
heap
page read and write
254D9CE5000
heap
page read and write
3307000
heap
page read and write
254D9C96000
heap
page read and write
2330000
heap
page read and write
254D9C16000
heap
page read and write
254D95EE000
heap
page read and write
1A619890000
heap
page read and write
254D95E0000
heap
page read and write
254D9D0A000
heap
page read and write
23F9000
trusted library allocation
page read and write
254D9C95000
heap
page read and write
30000
heap
page read and write
254D9CE3000
heap
page read and write
254D9D21000
heap
page read and write
C6F367E000
stack
page read and write
2400000
trusted library allocation
page read and write
96E000
stack
page read and write
1DE39000
trusted library allocation
page read and write
401000
unkown
page execute read
1A61A8C4000
heap
page read and write
21CD3160000
trusted library allocation
page read and write
23FE000
trusted library allocation
page read and write
1E23F69E000
heap
page read and write
254D9BE1000
heap
page read and write
29F8000
trusted library allocation
page read and write
590E000
stack
page read and write
23F0000
trusted library allocation
page read and write
254D9C1A000
heap
page read and write
449C87E000
stack
page read and write
2410000
trusted library allocation
page read and write
254D948F000
heap
page read and write
21CD3170000
trusted library allocation
page read and write
32EF000
heap
page read and write
735E1000
unkown
page execute read
443000
unkown
page readonly
254D9BE1000
heap
page read and write
1D2BF000
stack
page read and write
1D0CE000
stack
page read and write
23FF000
trusted library allocation
page read and write
254D9CB5000
heap
page read and write
23FF000
trusted library allocation
page read and write
254D9CBD000
heap
page read and write
C2A000
heap
page read and write
254D9B93000
heap
page read and write
55079FF000
stack
page read and write
1E23F679000
heap
page read and write
408000
unkown
page readonly
1D73C000
stack
page read and write
23F9000
trusted library allocation
page read and write
254D9D14000
heap
page read and write
2400000
trusted library allocation
page read and write
23FE000
trusted library allocation
page read and write
21CD3440000
remote allocation
page read and write
1A624EA3000
heap
page read and write
76F000
stack
page read and write
2400000
trusted library allocation
page read and write
23F9000
trusted library allocation
page read and write
333D000
heap
page read and write
24BF000
stack
page read and write
254D95ED000
heap
page read and write
26240713000
heap
page read and write
18AE000
stack
page read and write
23F9000
trusted library allocation
page read and write
254D9BED000
heap
page read and write
1E240211000
heap
page read and write
21CD30FA000
trusted library allocation
page read and write
254DA503000
heap
page read and write
254DA21D000
heap
page read and write
665000
heap
page read and write
6F8000
heap
page read and write
21CA5A98000
heap
page read and write
1D27E000
stack
page read and write
1111E700000
heap
page read and write
254D9CA6000
heap
page read and write
254DA509000
heap
page read and write
254D95ED000
heap
page read and write
1CFCE000
stack
page read and write
254D9D29000
heap
page read and write
3300000
heap
page read and write
254D9C3B000
heap
page read and write
254D95E9000
heap
page read and write
23FF000
trusted library allocation
page read and write
32EA000
heap
page read and write
254D9CFB000
heap
page read and write
23F9000
trusted library allocation
page read and write
254D9C43000
heap
page read and write
254D9461000
heap
page read and write
254D9CC1000
heap
page read and write
1E23F400000
heap
page read and write
21CD32DC000
heap
page read and write
192A000
heap
page read and write
254D9CF6000
heap
page read and write
C2A000
heap
page read and write
254D9C92000
heap
page read and write
400000
unkown
page readonly
401000
unkown
page execute read
1DE09000
trusted library allocation
page read and write
19A88880000
heap
page read and write
254D9CE7000
heap
page read and write
254D9D46000
heap
page read and write
1E240247000
heap
page read and write
21CD310D000
trusted library allocation
page read and write
1111E590000
unclassified section
page readonly
175B942A000
heap
page read and write
254DA2C8000
heap
page read and write
254D9BF1000
heap
page read and write
92E000
stack
page read and write
240E000
trusted library allocation
page read and write
254D93A0000
heap
page read and write
23FF000
trusted library allocation
page read and write
246F000
trusted library allocation
page read and write
1E23F6A7000
heap
page read and write
23F9000
trusted library allocation
page read and write
254D9BD8000
heap
page read and write
254D9BF1000
heap
page read and write
254D9CE3000
heap
page read and write
26240E02000
heap
page read and write
21CD310A000
trusted library allocation
page read and write
65799DB000
stack
page read and write
638000
heap
page read and write
1A6197A0000
trusted library allocation
page read and write
254D9493000
heap
page read and write
21CA5A96000
heap
page read and write
23F9000
trusted library allocation
page read and write
6AE000
stack
page read and write
175B9502000
heap
page read and write
2624061B000
heap
page read and write
2400000
trusted library allocation
page read and write
1CBD1000
heap
page read and write
254D9C38000
heap
page read and write
254D9D35000
heap
page read and write
2401000
trusted library allocation
page read and write
241C000
trusted library allocation
page read and write
400000
unkown
page readonly
19A892C0000
trusted library allocation
page read and write
2624DBD0000
heap
page read and write
3308000
heap
page read and write
254DA23D000
heap
page read and write
1DF50000
trusted library allocation
page read and write
254D9CB2000
heap
page read and write
F714CFE000
stack
page read and write
A30000
trusted library allocation
page read and write
23F9000
trusted library allocation
page read and write
6DA000
heap
page read and write
23F9000
trusted library allocation
page read and write
254D9CD6000
heap
page read and write
80CBDFE000
stack
page read and write
1A6198B8000
heap
page read and write
254D9D56000
heap
page read and write
1A624E6F000
heap
page read and write
254D9CA5000
heap
page read and write
246F000
trusted library allocation
page read and write
401000
unkown
page execute read
2410000
trusted library allocation
page read and write
18ED97C0000
unclassified section
page readonly
23F9000
trusted library allocation
page read and write
2414000
trusted library allocation
page read and write
2428000
trusted library allocation
page read and write
254DA4D0000
heap
page read and write
254D9D06000
heap
page read and write
1D30000
heap
page read and write
254D9C04000
heap
page read and write
C2A000
heap
page read and write
21CD3213000
heap
page read and write
21CA5990000
trusted library allocation
page read and write
21CD335B000
heap
page read and write
443000
unkown
page readonly
254D9CEA000
heap
page read and write
23F3000
trusted library allocation
page read and write
1A6B000
heap
page read and write
23FF000
trusted library allocation
page read and write
1A61A680000
remote allocation
page read and write
21CD30AA000
trusted library allocation
page read and write
254DA2FB000
heap
page read and write
7B0000
heap
page read and write
1A91000
heap
page read and write
2411000
trusted library allocation
page read and write
1A61A176000
heap
page read and write
2400000
trusted library allocation
page read and write
3332000
heap
page read and write
401000
unkown
page execute read
655000
heap
page read and write
B6E000
stack
page read and write
241A000
trusted library allocation
page read and write
29F8000
trusted library allocation
page read and write
2400000
trusted library allocation
page read and write
254D9CB5000
heap
page read and write
2400000
trusted library allocation
page read and write
1A624E62000
heap
page read and write
1C0000
remote allocation
page read and write
5EE000
unkown
page write copy
401000
unkown
page execute read
23FF000
trusted library allocation
page read and write
57E000
stack
page read and write
408000
unkown
page readonly
242B000
trusted library allocation
page read and write
23F0000
trusted library allocation
page read and write
1D7FF000
stack
page read and write
473000
remote allocation
page execute and read and write
1111EE15000
heap
page read and write
1E240209000
heap
page read and write
23F0000
trusted library allocation
page read and write
1A61A174000
heap
page read and write
19A88A70000
heap
page read and write
254D9C1A000
heap
page read and write
21CA5AB2000
heap
page read and write
254D9467000
heap
page read and write
1A6F000
heap
page read and write
40A000
unkown
page write copy
1A624E49000
heap
page read and write
21CD309C000
trusted library allocation
page read and write
19BE000
stack
page read and write
254D95B0000
remote allocation
page read and write
254D9D01000
heap
page read and write
254D9464000
heap
page read and write
1C0000
remote allocation
page read and write
254D9D55000
heap
page read and write
21CD3099000
trusted library allocation
page read and write
1A61982A000
heap
page read and write
18EDB300000
remote allocation
page read and write
1A61A160000
heap
page read and write
AB0000
trusted library allocation
page read and write
1A61A12D000
heap
page read and write
45EEF8B000
stack
page read and write
254D9BF1000
heap
page read and write
23F9000
trusted library allocation
page read and write
254D945F000
heap
page read and write
2400000
trusted library allocation
page read and write
254D9CC1000
heap
page read and write
254D9CC2000
heap
page read and write
1A61A898000
heap
page read and write
254DA240000
heap
page read and write
21CA6202000
trusted library allocation
page read and write
18ED9840000
heap
page read and write
21CD32D0000
heap
page read and write
240C1FE000
stack
page read and write
254D9D49000
heap
page read and write
21CD309F000
trusted library allocation
page read and write
2400000
trusted library allocation
page read and write
1D08D000
stack
page read and write
254D9D34000
heap
page read and write
240E000
trusted library allocation
page read and write
1A624E85000
heap
page read and write
25E6D640000
heap
page read and write
254DA2EA000
heap
page read and write
3790000
heap
page read and write
23D0000
trusted library allocation
page read and write
192E000
stack
page read and write
2817000
trusted library allocation
page read and write
330B000
heap
page read and write
5320000
heap
page read and write
175B9413000
heap
page read and write
1111E68B000
heap
page read and write
254D9D46000
heap
page read and write
23F9000
trusted library allocation
page read and write
1A61A12F000
heap
page read and write
80CB57F000
stack
page read and write
21CA5B02000
heap
page read and write
408000
unkown
page readonly
1DC56000
trusted library allocation
page read and write
254D93D6000
heap
page read and write
1A624E60000
heap
page read and write
254D9C40000
heap
page read and write
1A624E66000
heap
page read and write
1A61A800000
heap
page read and write
246F000
trusted library allocation
page read and write
1D2AE000
stack
page read and write
1E240220000
heap
page read and write
254D9BFE000
heap
page read and write
254D9C9D000
heap
page read and write
2BF5000
trusted library allocation
page read and write
254DA502000
heap
page read and write
254DA503000
heap
page read and write
23F3000
trusted library allocation
page read and write
254D9CB9000
heap
page read and write
32B8000
heap
page read and write
254DA503000
heap
page read and write
254D9CFB000
heap
page read and write
21CA5A2B000
heap
page read and write
664000
heap
page read and write
18F000
stack
page read and write
254D9BE9000
heap
page read and write
230E000
stack
page read and write
21CCEA61000
trusted library allocation
page read and write
1D270000
remote allocation
page read and write
735E0000
unkown
page readonly
254D9D22000
heap
page read and write
1E240234000
heap
page read and write
500000
heap
page read and write
2401000
trusted library allocation
page read and write
21CD3190000
trusted library allocation
page read and write
23FF000
trusted library allocation
page read and write
19A000
stack
page read and write
1111E648000
heap
page read and write
AAE000
stack
page read and write
1A68000
heap
page read and write
2DAE000
stack
page read and write
254D9CD3000
heap
page read and write
2624064F000
heap
page read and write
401000
unkown
page execute read
4A0000
heap
page read and write
254D9BB2000
heap
page read and write
1A61A17C000
heap
page read and write
1A61A132000
heap
page read and write
254DA2DB000
heap
page read and write
240C000
trusted library allocation
page read and write
5C4BC7E000
stack
page read and write
5E7000
heap
page read and write
1E2401FD000
heap
page read and write
21CD31C0000
trusted library allocation
page read and write
649000
unkown
page execute read
254D9BE9000
heap
page read and write
21CCD4B2000
heap
page read and write
254D9C97000
heap
page read and write
23FF000
trusted library allocation
page read and write
23F9000
trusted library allocation
page read and write
23FF000
trusted library allocation
page read and write
2401000
trusted library allocation
page read and write
C29000
heap
page read and write
1B61000
trusted library allocation
page read and write
254D9BEC000
heap
page read and write
23F9000
trusted library allocation
page read and write
29F8000
trusted library allocation
page read and write
5C4BEFE000
stack
page read and write
1A619886000
heap
page read and write
1E2403A3000
heap
page read and write
25E6D590000
heap
page read and write
254D9C17000
heap
page read and write
409000
unkown
page write copy
C2A000
heap
page read and write
8F0000
trusted library allocation
page read and write
23FF000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
254D9CE7000
heap
page read and write
1A6198CF000
heap
page read and write
1E23F707000
heap
page read and write
29F8000
trusted library allocation
page read and write
70901000
unkown
page execute read
40A000
unkown
page write copy
464000
heap
page read and write
254D9BEE000
heap
page read and write
254D9BF1000
heap
page read and write
254D9C2B000
heap
page read and write
29F1000
trusted library allocation
page read and write
23F9000
trusted library allocation
page read and write
254D9BE6000
heap
page read and write
1D10F000
stack
page read and write
23F9000
trusted library allocation
page read and write
4F6000
heap
page read and write
1111E63B000
heap
page read and write
254DA2DA000
heap
page read and write
1A619750000
heap
page read and write
1A61A16E000
heap
page read and write
1A6198F1000
heap
page read and write
40A000
unkown
page write copy
3355000
heap
page read and write
665000
heap
page read and write
2400000
trusted library allocation
page read and write
23FF000
trusted library allocation
page read and write
21CA5AAD000
heap
page read and write
464000
heap
page read and write
5C4BD7D000
stack
page read and write
333E000
heap
page read and write
29F3000
trusted library allocation
page read and write
649000
unkown
page write copy
254DA2C8000
heap
page read and write
5C4BDFF000
stack
page read and write
F714E79000
stack
page read and write
1A6B000
heap
page read and write
246F000
trusted library allocation
page read and write
401000
unkown
page execute read
C30000
unclassified section
page readonly
2400000
trusted library allocation
page read and write
1A61A176000
heap
page read and write
1A624BF0000
heap
page read and write
1860000
heap
page read and write
254D9BF1000
heap
page read and write
B90000
heap
page read and write
254D9CB8000
heap
page read and write
21CD31A7000
trusted library allocation
page read and write
1A624E42000
heap
page read and write
1A61985F000
heap
page read and write
23F9000
trusted library allocation
page read and write
21CCD360000
heap
page read and write
23FF000
trusted library allocation
page read and write
254DA23D000
heap
page read and write
401000
unkown
page execute read
1E240231000
heap
page read and write
254D9CE0000
heap
page read and write
1A624E2B000
heap
page read and write
19A000
stack
page read and write
67BE37C000
stack
page read and write
254DA509000
heap
page read and write
401000
unkown
page execute read
400000
unkown
page readonly
1A6198A6000
heap
page read and write
30000
heap
page read and write
254D9D03000
heap
page read and write
254D9D46000
heap
page read and write
38C3AFC000
stack
page read and write
23FF000
trusted library allocation
page read and write
1A61A10E000
heap
page read and write
1E240247000
heap
page read and write
21CD3440000
remote allocation
page read and write
254D9C29000
heap
page read and write
1D43C000
stack
page read and write
2401000
trusted library allocation
page read and write
254D9CA1000
heap
page read and write
254D9CC2000
heap
page read and write
254D9CFB000
heap
page read and write
4EB000
heap
page read and write
2400000
trusted library allocation
page read and write
254DA26B000
heap
page read and write
175B9457000
heap
page read and write
21CD31AA000
trusted library allocation
page read and write
254D9C1A000
heap
page read and write
1111E62A000
heap
page read and write
254D9C16000
heap
page read and write
254D9C30000
heap
page read and write
1111E662000
heap
page read and write
254DA255000
heap
page read and write
40A000
unkown
page write copy
254D95E9000
heap
page read and write
254D9CDB000
heap
page read and write
21CCD529000
heap
page read and write
1111E480000
heap
page read and write
3509000
trusted library allocation
page read and write
254D9BC0000
heap
page read and write
32FE000
heap
page read and write
18ED9917000
heap
page read and write
21CD30E1000
trusted library allocation
page read and write
6BA000
heap
page read and write
2331000
heap
page read and write
1A61A174000
heap
page read and write
254D9D21000
heap
page read and write
9AD000
stack
page read and write
254D9C39000
heap
page read and write
7AF000
stack
page read and write
254D9BE1000
heap
page read and write
192D000
heap
page read and write
254D9D16000
heap
page read and write
18ED9877000
heap
page read and write
21CD3080000
trusted library allocation
page read and write
29F8000
trusted library allocation
page read and write
23F9000
trusted library allocation
page read and write
333B000
heap
page read and write
400000
unkown
page readonly
195B000
heap
page read and write
246F000
trusted library allocation
page read and write
254DA2A5000
heap
page read and write
735E6000
unkown
page readonly
1A624E93000
heap
page read and write
1A624E40000
heap
page read and write
254D9CD2000
heap
page read and write
21CCEA90000
trusted library allocation
page read and write
1A624E58000
heap
page read and write
1E23F618000
heap
page read and write
1DF51000
trusted library allocation
page read and write
2520000
heap
page read and write
254DA304000
heap
page read and write
254D9B98000
heap
page read and write
254DA256000
heap
page read and write
21CA5AA1000
heap
page read and write
2624065E000
heap
page read and write
1DBC1000
trusted library allocation
page read and write
21CCDD5A000
heap
page read and write
21CD3302000
heap
page read and write
254D9CFB000
heap
page read and write
194D000
heap
page read and write
5C0000
heap
page read and write
241E000
trusted library allocation
page read and write
1E2401B7000
heap
page read and write
23FF000
trusted library allocation
page read and write
408000
unkown
page readonly
1A61A845000
heap
page read and write
21CD3292000
heap
page read and write
254D9D35000
heap
page read and write
1A61993B000
heap
page read and write
50D000
heap
page read and write
A58000
trusted library allocation
page read and write
2331000
heap
page read and write
254D9D55000
heap
page read and write
23F9000
trusted library allocation
page read and write
C6F357D000
stack
page read and write
23F9000
trusted library allocation
page read and write
32D1000
heap
page read and write
1A61A113000
heap
page read and write
664000
heap
page read and write
175B96E0000
heap
page read and write
1E240230000
heap
page read and write
21CA5A00000
heap
page read and write
254DA31B000
heap
page read and write
254DA57A000
heap
page read and write
21CCD432000
heap
page read and write
254D947D000
heap
page read and write
254D9C40000
heap
page read and write
254D9C2F000
heap
page read and write
26240689000
heap
page read and write
21CA5AAD000
heap
page read and write
2BF0000
trusted library allocation
page read and write
23F9000
trusted library allocation
page read and write
1A61A885000
heap
page read and write
64D000
heap
page read and write
664000
heap
page read and write
254D93DE000
heap
page read and write
23F9000
trusted library allocation
page read and write
1A619880000
heap
page read and write
401000
unkown
page execute read
1A61A16F000
heap
page read and write
2400000
trusted library allocation
page read and write
551E000
stack
page read and write
1A61A14B000
heap
page read and write
254D9C38000
heap
page read and write
664000
heap
page read and write
1A61A170000
heap
page read and write
254DA4C0000
heap
page read and write
254D9D01000
heap
page read and write
1D300000
remote allocation
page read and write
23F9000
trusted library allocation
page read and write
254D9CAD000
heap
page read and write
254D9CA5000
heap
page read and write
175B96D0000
unclassified section
page readonly
1A624E00000
heap
page read and write
408000
unkown
page readonly
21CD320D000
heap
page read and write
1A6198A8000
heap
page read and write
254D9CD9000
heap
page read and write
18EDB290000
trusted library allocation
page read and write
254D9C2F000
heap
page read and write
1E240243000
heap
page read and write
2460000
trusted library allocation
page read and write
379B000
heap
page read and write
F714EFE000
stack
page read and write
1A61986D000
heap
page read and write
254D9CA4000
heap
page read and write
443000
unkown
page readonly
18ED9813000
heap
page read and write
1880000
heap
page read and write
2400000
trusted library allocation
page read and write
400000
unkown
page readonly
2BF5000
trusted library allocation
page read and write
26240702000
heap
page read and write
254D9CFB000
heap
page read and write
26240678000
heap
page read and write
A3F000
stack
page read and write
29F8000
trusted library allocation
page read and write
23F6000
trusted library allocation
page read and write
254D9C38000
heap
page read and write
18EDB402000
trusted library allocation
page read and write
2624DD85000
heap
page read and write
49E000
stack
page read and write
254D9C38000
heap
page read and write
40A000
unkown
page write copy
254D9BEC000
heap
page read and write
21CD32ED000
heap
page read and write
29F8000
trusted library allocation
page read and write
A90000
heap
page read and write
1D840000
trusted library allocation
page read and write
464000
heap
page read and write
254D9BEA000
heap
page read and write
1E240235000
heap
page read and write
23F9000
trusted library allocation
page read and write
254DA258000
heap
page read and write
93E000
stack
page read and write
1A624E13000
heap
page read and write
254D9C30000
heap
page read and write
23FF000
trusted library allocation
page read and write
254D9CCC000
heap
page read and write
AB0000
heap
page read and write
254D9C2B000
heap
page read and write
1E2404F0000
heap
page read and write
1A624E31000
heap
page read and write
254D9BEC000
heap
page read and write
254D9CCE000
heap
page read and write
2426000
trusted library allocation
page read and write
19A89270000
trusted library allocation
page read and write
1E24050C000
heap
page read and write
254D9BEE000
heap
page read and write
2400000
trusted library allocation
page read and write
1A61A12A000
heap
page read and write
464000
heap
page read and write
1A9E000
heap
page read and write
254D9B99000
heap
page read and write
23F9000
trusted library allocation
page read and write
246F000
trusted library allocation
page read and write
254D9BF1000
heap
page read and write
B20000
heap
page read and write
254D9D4C000
heap
page read and write
254D9D29000
heap
page read and write
254D9BE1000
heap
page read and write
3270000
trusted library allocation
page read and write
1D120000
heap
page read and write
254DA237000
heap
page read and write
254D9BBC000
heap
page read and write
1A61A176000
heap
page read and write
254D9C38000
heap
page read and write
464000
heap
page read and write
6E3000
heap
page read and write
1C10000
heap
page read and write
400000
unkown
page readonly
254D945C000
heap
page read and write
1A619844000
heap
page read and write
19A88A8D000
heap
page read and write
2424000
trusted library allocation
page read and write
254D9BEC000
heap
page read and write
254D9BB2000
heap
page read and write
254DA288000
heap
page read and write
254D9BBC000
heap
page read and write
254D945C000
heap
page read and write
254D9BE3000
heap
page read and write
2406000
trusted library allocation
page read and write
254D9CC2000
heap
page read and write
2401000
trusted library allocation
page read and write
254D9BBD000
heap
page read and write
2624069C000
heap
page read and write
254D9BEE000
heap
page read and write
254D9B95000
heap
page read and write
1D1CE000
stack
page read and write
175B9484000
heap
page read and write
254D9BE1000
heap
page read and write
1C0000
remote allocation
page read and write
21CCD468000
heap
page read and write
B83000
heap
page read and write
2401000
trusted library allocation
page read and write
1111E69E000
heap
page read and write
665000
heap
page read and write
254D9C13000
heap
page read and write
254D9BB2000
heap
page read and write
23F3000
trusted library allocation
page read and write
246F000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
21CCD1D0000
heap
page read and write
254D9472000
heap
page read and write
1CBD0000
heap
page read and write
254D9BE1000
heap
page read and write
1A61A15B000
heap
page read and write
487000
heap
page read and write
23F8000
trusted library allocation
page read and write
254D9BF1000
heap
page read and write
408000
unkown
page readonly
246F000
trusted library allocation
page read and write
254D9CD3000
heap
page read and write
35AE000
stack
page read and write
254D9BE7000
heap
page read and write
29F8000
trusted library allocation
page read and write
1D0CE000
stack
page read and write
5E8000
unkown
page write copy
408000
unkown
page readonly
254D9D01000
heap
page read and write
254D9C1A000
heap
page read and write
23F9000
trusted library allocation
page read and write
7E4000
heap
page read and write
C27147F000
stack
page read and write
175B9513000
heap
page read and write
23F9000
trusted library allocation
page read and write
254D9CDB000
heap
page read and write
2400000
trusted library allocation
page read and write
195B000
heap
page read and write
561F000
stack
page read and write
664000
heap
page read and write
23F9000
trusted library allocation
page read and write
1DE66000
trusted library allocation
page read and write
254D9C1A000
heap
page read and write
254D9BBB000
heap
page read and write
254D9CFA000
heap
page read and write
23FF000
trusted library allocation
page read and write
23F9000
trusted library allocation
page read and write
2423000
trusted library allocation
page read and write
254DA2A1000
heap
page read and write
32FD000
heap
page read and write
254D9C46000
heap
page read and write
3332000
heap
page read and write
452000
remote allocation
page execute and read and write
25E6D7F5000
heap
page read and write
80CB97C000
stack
page read and write
23FF000
trusted library allocation
page read and write
21CD30B7000
trusted library allocation
page read and write
6579E7E000
stack
page read and write
1A61A129000
heap
page read and write
23FE000
trusted library allocation
page read and write
2406000
trusted library allocation
page read and write
505000
heap
page read and write
464000
heap
page read and write
17C000
stack
page read and write
254D9BBD000
heap
page read and write
23F9000
trusted library allocation
page read and write
2401000
trusted library allocation
page read and write
254D9BF1000
heap
page read and write
23FE000
trusted library allocation
page read and write
254D9C30000
heap
page read and write
254D9C30000
heap
page read and write
18EDB300000
remote allocation
page read and write
664000
heap
page read and write
2401000
trusted library allocation
page read and write
21CD3294000
heap
page read and write
21CD3650000
trusted library allocation
page read and write
1E2403A0000
heap
page read and write
254D9CA4000
heap
page read and write
254D9BDF000
heap
page read and write
23F9000
trusted library allocation
page read and write
254D9CA7000
heap
page read and write
1864000
heap
page read and write
254D9CDB000
heap
page read and write
254DA2EA000
heap
page read and write
B80000
heap
page read and write
254D9CD0000
heap
page read and write
443000
unkown
page readonly
45EF7FE000
stack
page read and write
21CD30C0000
trusted library allocation
page read and write
401000
unkown
page execute read
1A61983A000
heap
page read and write
1A61A895000
heap
page read and write
254D9D4E000
heap
page read and write
45EF4FE000
stack
page read and write
254D9CD0000
heap
page read and write
2BFE000
trusted library allocation
page read and write
1A23000
heap
page read and write
254D9D01000
heap
page read and write
2412000
trusted library allocation
page read and write
1A19000
heap
page read and write
1A61A129000
heap
page read and write
34D0000
trusted library allocation
page read and write
1A61989E000
heap
page read and write
254D9D16000
heap
page read and write
254D9CD2000
heap
page read and write
23F9000
trusted library allocation
page read and write
1E23F656000
heap
page read and write
464000
heap
page read and write
2400000
trusted library allocation
page read and write
2BF5000
trusted library allocation
page read and write
254D948F000
heap
page read and write
480000
heap
page read and write
1A6195C0000
heap
page read and write
23FF000
trusted library allocation
page read and write
254D9BEA000
heap
page read and write
34AF000
stack
page read and write
254D9C2D000
heap
page read and write
40D000
unkown
page read and write
664000
heap
page read and write
23FF000
trusted library allocation
page read and write
3308000
heap
page read and write
2624069F000
heap
page read and write
254D9C09000
heap
page read and write
1A6198B7000
heap
page read and write
254DA241000
heap
page read and write
21CA5A3C000
heap
page read and write
262406A8000
heap
page read and write
23F9000
trusted library allocation
page read and write
254D9BB4000
heap
page read and write
1850000
heap
page read and write
6579EFF000
stack
page read and write
246F000
trusted library allocation
page read and write
1A0C000
heap
page read and write
21CD3150000
trusted library allocation
page read and write
254D9BE9000
heap
page read and write
60E000
stack
page read and write
23FB000
trusted library allocation
page read and write
F714A7C000
stack
page read and write
21CA5A51000
heap
page read and write
1A61A808000
heap
page read and write
449C8FE000
stack
page read and write
3431000
trusted library allocation
page read and write
1DC2D000
trusted library allocation
page read and write
C2A000
heap
page read and write
254D93D6000
heap
page read and write
254D9CC5000
heap
page read and write
195A000
heap
page read and write
246F000
trusted library allocation
page read and write
8EE000
stack
page read and write
21CCD494000
heap
page read and write
1D33C000
stack
page read and write
1111EDA0000
trusted library allocation
page read and write
32B0000
trusted library allocation
page read and write
175B9D00000
trusted library allocation
page read and write
254D9CC1000
heap
page read and write
254D93A8000
heap
page read and write
70900000
unkown
page readonly
2BF0000
trusted library allocation
page read and write
1E240284000
heap
page read and write
248C000
trusted library allocation
page read and write
254DA237000
heap
page read and write
2400000
trusted library allocation
page read and write
254D9C40000
heap
page read and write
19A88A98000
heap
page read and write
19C000
stack
page read and write
310E000
stack
page read and write
254D9D2C000
heap
page read and write
254DA261000
heap
page read and write
67BDAFB000
stack
page read and write
19A8000
heap
page read and write
254D9CB8000
heap
page read and write
C2714FE000
stack
page read and write
21CA5A9E000
heap
page read and write
254DA2E3000
heap
page read and write
254D9C39000
heap
page read and write
7C4000
heap
page read and write
2415000
trusted library allocation
page read and write
1A61A156000
heap
page read and write
254D9BB2000
heap
page read and write
246F000
trusted library allocation
page read and write
254D9CE7000
heap
page read and write
240D000
trusted library allocation
page read and write
254D9CB8000
heap
page read and write
1E2403AA000
heap
page read and write
2624062B000
heap
page read and write
3135000
heap
page read and write
254D9B90000
heap
page read and write
1D10F000
stack
page read and write
323F000
stack
page read and write
254D9CB2000
heap
page read and write
26240642000
heap
page read and write
1D270000
remote allocation
page read and write
2400000
trusted library allocation
page read and write
1E23F679000
heap
page read and write
254D9BE3000
heap
page read and write
246F000
trusted library allocation
page read and write
21CD314F000
trusted library allocation
page read and write
1A624E50000
heap
page read and write
45EF8FF000
stack
page read and write
B8E000
heap
page read and write
18ED985E000
heap
page read and write
254D9D2B000
heap
page read and write
254D9BE6000
heap
page read and write
254D95E5000
heap
page read and write
2D6B000
stack
page read and write
1A6198C6000
heap
page read and write
21CD30CE000
trusted library allocation
page read and write
254D93F3000
heap
page read and write
1A61A17E000
heap
page read and write
254D9CB6000
heap
page read and write
2624065F000
heap
page read and write
254D9CA5000
heap
page read and write
23FF000
trusted library allocation
page read and write
21CD320B000
heap
page read and write
1A619889000
heap
page read and write
254D9CE0000
heap
page read and write
175B9494000
heap
page read and write
262406A3000
heap
page read and write
254D9C2F000
heap
page read and write
254D9BF1000
heap
page read and write
254D9BA4000
heap
page read and write
254DA51B000
heap
page read and write
254DA28A000
heap
page read and write
1111E651000
heap
page read and write
400000
unkown
page readonly
1A61A16B000
heap
page read and write
23F9000
trusted library allocation
page read and write
254D9CE7000
heap
page read and write
254DA261000
heap
page read and write
C6F33FE000
stack
page read and write
464000
heap
page read and write
254D9BEA000
heap
page read and write
1A61A16C000
heap
page read and write
254D9CBE000
heap
page read and write
1A624E4C000
heap
page read and write
254D93F3000
heap
page read and write
464000
heap
page read and write
254D9D16000
heap
page read and write
21CD30E7000
trusted library allocation
page read and write
254D9BEC000
heap
page read and write
254D95EE000
heap
page read and write
254DA255000
heap
page read and write
1E2401FA000
heap
page read and write
1E240215000
heap
page read and write
21CCDD19000
heap
page read and write
254D9CB6000
heap
page read and write
2400000
trusted library allocation
page read and write
29F8000
trusted library allocation
page read and write
262406A0000
heap
page read and write
254D94A0000
heap
page read and write
254D9C40000
heap
page read and write
443000
unkown
page readonly
254D9CBC000
heap
page read and write
254D9CC9000
heap
page read and write
254D9C3B000
heap
page read and write
254D9CC1000
heap
page read and write
48E000
stack
page read and write
254D9D30000
heap
page read and write
1E240251000
heap
page read and write
2BF0000
trusted library allocation
page read and write
1A619813000
heap
page read and write
23F9000
trusted library allocation
page read and write
26240689000
heap
page read and write
254D9CC2000
heap
page read and write
254D9CAA000
heap
page read and write
19A88A3B000
heap
page read and write
2A1D000
trusted library allocation
page read and write
254DA31B000
heap
page read and write
254D9BEA000
heap
page read and write
254D9C3B000
heap
page read and write
23F9000
trusted library allocation
page read and write
1E2403AE000
heap
page read and write
26240645000
heap
page read and write
21CCD3B0000
trusted library allocation
page read and write
408000
unkown
page readonly
23F9000
trusted library allocation
page read and write
23F9000
trusted library allocation
page read and write
626000
unkown
page execute read
449CAFE000
stack
page read and write
30000
heap
page read and write
1E24020B000
heap
page read and write
240C0FD000
stack
page read and write
18ED9800000
heap
page read and write
664000
heap
page read and write
1E23F692000
heap
page read and write
1DC2D000
trusted library allocation
page read and write
254D9C40000
heap
page read and write
665000
heap
page read and write
500000
heap
page read and write
C6F34FF000
stack
page read and write
23F9000
trusted library allocation
page read and write
254D949D000
heap
page read and write
8C0000
trusted library allocation
page read and write
29F8000
trusted library allocation
page read and write
408000
unkown
page readonly
254D95E9000
heap
page read and write
665000
heap
page read and write
254D9C46000
heap
page read and write
1A61A15A000
heap
page read and write
61E000
stack
page read and write
1D33C000
stack
page read and write
21CD30EA000
trusted library allocation
page read and write
2400000
trusted library allocation
page read and write
21CD3200000
heap
page read and write
18ED97D0000
heap
page read and write
254D9C40000
heap
page read and write
2400000
trusted library allocation
page read and write
19A892A0000
trusted library allocation
page read and write
21CCDD13000
heap
page read and write
254D9CE7000
heap
page read and write
38C3BFA000
stack
page read and write
32FD000
heap
page read and write
1E2401DD000
heap
page read and write
175B9500000
heap
page read and write
254D9D16000
heap
page read and write
1888000
heap
page read and write
1A619838000
heap
page read and write
23F9000
trusted library allocation
page read and write
401000
unkown
page execute read
23F9000
trusted library allocation
page read and write
BFB000
stack
page read and write
1F3000
heap
page read and write
1CF4E000
stack
page read and write
2624DD80000
heap
page read and write
400000
unkown
page readonly
2500000
heap
page read and write
2400000
trusted library allocation
page read and write
1A61A181000
heap
page read and write
2400000
trusted library allocation
page read and write
1969000
heap
page read and write
F714D7E000
stack
page read and write
1A61A150000
heap
page read and write
1A624E5E000
heap
page read and write
33C0000
trusted library allocation
page read and write
2441000
trusted library allocation
page read and write
21CCDC15000
heap
page read and write
7BF000
stack
page read and write
1A624E5B000
heap
page read and write
6579DFE000
stack
page read and write
254D9CD9000
heap
page read and write
254D9D0D000
heap
page read and write
21CD30E4000
trusted library allocation
page read and write
3355000
heap
page read and write
254D9C16000
heap
page read and write
19A88A85000
heap
page read and write
1D120000
heap
page read and write
B54000
trusted library allocation
page read and write
3240000
trusted library allocation
page read and write
2BF4000
trusted library allocation
page read and write
254D9C1A000
heap
page read and write
254D9C1A000
heap
page read and write
254D9CB0000
heap
page read and write
24B0000
trusted library allocation
page read and write
19A89340000
trusted library allocation
page read and write
1E240501000
heap
page read and write
254D9C1A000
heap
page read and write
25E6D7F0000
heap
page read and write
254D9CCB000
heap
page read and write
7EE000
stack
page read and write
333B000
heap
page read and write
23F9000
trusted library allocation
page read and write
254D9C98000
heap
page read and write
21CD326E000
heap
page read and write
254D9BD8000
heap
page read and write
254D9CE2000
heap
page read and write
254D9CE0000
heap
page read and write
1E240220000
heap
page read and write
18ED9900000
heap
page read and write
1660000
remote allocation
page execute and read and write
254D9CCE000
heap
page read and write
254D9D04000
heap
page read and write
3301000
heap
page read and write
21CCD502000
heap
page read and write
247B000
trusted library allocation
page read and write
1E23F707000
heap
page read and write
1A624E69000
heap
page read and write
28F1000
heap
page read and write
175B94A7000
heap
page read and write
460000
heap
page read and write
1E24026C000
heap
page read and write
254DA236000
heap
page read and write
5EA000
unkown
page write copy
254D9CC0000
heap
page read and write
21CA5820000
heap
page read and write
1C0000
remote allocation
page read and write
408000
unkown
page readonly
26240613000
heap
page read and write
254D9CDA000
heap
page read and write
1DBC0000
trusted library allocation
page read and write
1A619889000
heap
page read and write
1E2403A2000
heap
page read and write
40A000
unkown
page write copy
735E4000
unkown
page readonly
18ED98A0000
heap
page read and write
BD5000
heap
page read and write
400000
remote allocation
page execute and read and write
18ED981B000
heap
page read and write
408000
unkown
page readonly
240E000
trusted library allocation
page read and write
4EE0000
heap
page read and write
254D9C2B000
heap
page read and write
23FF000
trusted library allocation
page read and write
1E240269000
heap
page read and write
254D9C30000
heap
page read and write
26240693000
heap
page read and write
246F000
trusted library allocation
page read and write
5F2000
unkown
page write copy
1A624E87000
heap
page read and write
21CA5AA4000
heap
page read and write
1931000
heap
page read and write
2BF0000
trusted library allocation
page read and write
254D9D2D000
heap
page read and write
29F0000
trusted library allocation
page read and write
177000
stack
page read and write
254D945C000
heap
page read and write
1A61A137000
heap
page read and write
40A000
unkown
page read and write
6CC000
heap
page read and write
23F1000
trusted library allocation
page read and write
254DA304000
heap
page read and write
3305000
heap
page read and write
254D9CB6000
heap
page read and write
254D9C91000
heap
page read and write
254D9C3B000
heap
page read and write
254DA23D000
heap
page read and write
664000
heap
page read and write
C27157C000
stack
page read and write
242B000
trusted library allocation
page read and write
254D9CDA000
heap
page read and write
26240E00000
heap
page read and write
19A888E0000
heap
page read and write
254D940A000
heap
page read and write
21CCDD59000
heap
page read and write
F714C7E000
stack
page read and write
254D9BBD000
heap
page read and write
2290000
heap
page read and write
254D9CB1000
heap
page read and write
1E2405F0000
heap
page read and write
254DA2EA000
heap
page read and write
23FF000
trusted library allocation
page read and write
23F9000
trusted library allocation
page read and write
25E6D66E000
heap
page read and write
21CD3170000
trusted library allocation
page read and write
2426000
trusted library allocation
page read and write
2400000
trusted library allocation
page read and write
4A8000
heap
page read and write
254D9BB7000
heap
page read and write
3240000
trusted library allocation
page read and write
21CA5A92000
heap
page read and write
254DA503000
heap
page read and write
254D9CC3000
heap
page read and write
28F1000
heap
page read and write
254D9406000
heap
page read and write
21CD3230000
heap
page read and write
443000
unkown
page readonly
2400000
trusted library allocation
page read and write
23F9000
trusted library allocation
page read and write
21CD326F000
heap
page read and write
19A892F0000
trusted library allocation
page read and write
254DA51B000
heap
page read and write
21CD3353000
heap
page read and write
1A61A838000
heap
page read and write
23FF000
trusted library allocation
page read and write
262406A6000
heap
page read and write
254D9190000
heap
page read and write
38C3979000
stack
page read and write
23F9000
trusted library allocation
page read and write
254D9D26000
heap
page read and write
254D9CC9000
heap
page read and write
400000
remote allocation
page execute and read and write
254DA2EA000
heap
page read and write
1FC000
heap
page read and write
23FF000
trusted library allocation
page read and write
175B9451000
heap
page read and write
254D9D01000
heap
page read and write
254D9D35000
heap
page read and write
21CD30C3000
trusted library allocation
page read and write
1A61993B000
heap
page read and write
254D9C2D000
heap
page read and write
1E2401B0000
heap
page read and write
18ED9897000
heap
page read and write
5E2C000
stack
page read and write
1A61A12C000
heap
page read and write
23F9000
trusted library allocation
page read and write
254D9CC2000
heap
page read and write
41B000
remote allocation
page execute and read and write
21CD3275000
heap
page read and write
1A619740000
unclassified section
page readonly
254DA28A000
heap
page read and write
23F9000
trusted library allocation
page read and write
1A61A680000
remote allocation
page read and write
246F000
trusted library allocation
page read and write
29F8000
trusted library allocation
page read and write
1DEC1000
trusted library allocation
page read and write
67BE5FB000
stack
page read and write
21CD3080000
trusted library allocation
page read and write
254D9CC9000
heap
page read and write
26240E15000
heap
page read and write
175B9CD0000
trusted library allocation
page read and write
30000
heap
page read and write
2400000
trusted library allocation
page read and write
1E2401F6000
heap
page read and write
1A61A191000
heap
page read and write
32D8000
heap
page read and write
32D0000
heap
page read and write
449CBFE000
stack
page read and write
254D9CB2000
heap
page read and write
254D9C39000
heap
page read and write
254D9CA5000
heap
page read and write
5CE000
stack
page read and write
195A000
heap
page read and write
26240700000
heap
page read and write
234E000
stack
page read and write
254D9BE6000
heap
page read and write
195A000
heap
page read and write
408000
unkown
page readonly
2624DB60000
heap
page read and write
464000
heap
page read and write
254D9D2D000
heap
page read and write
1A624E5D000
heap
page read and write
254D9461000
heap
page read and write
262404B0000
heap
page read and write
2400000
trusted library allocation
page read and write
254D9CAD000
heap
page read and write
464000
heap
page read and write
23F9000
trusted library allocation
page read and write
19A88B02000
heap
page read and write
5507CFE000
stack
page read and write
BFEEFF000
stack
page read and write
254D9CE9000
heap
page read and write
1E2401E9000
heap
page read and write
21CCD48D000
heap
page read and write
246F000
trusted library allocation
page read and write
254D9BF3000
heap
page read and write
254D9C30000
heap
page read and write
1D5BC000
stack
page read and write
C6F35FB000
stack
page read and write
254D9CB5000
heap
page read and write
29F8000
trusted library allocation
page read and write
254D9495000
heap
page read and write
5C4B3BB000
stack
page read and write
23FF000
trusted library allocation
page read and write
21CA5A67000
heap
page read and write
98F000
stack
page read and write
21CCD4B5000
heap
page read and write
254D9C30000
heap
page read and write
194D000
heap
page read and write
254DA31A000
heap
page read and write
400000
unkown
page readonly
254D9BE6000
heap
page read and write
254D9CA3000
heap
page read and write
1E240243000
heap
page read and write
254D9D2E000
heap
page read and write
1A619913000
heap
page read and write
23F9000
trusted library allocation
page read and write
1A61991A000
heap
page read and write
24F0000
heap
page read and write
175B9E02000
trusted library allocation
page read and write
C27127F000
stack
page read and write
427000
unkown
page read and write
1E2401DA000
heap
page read and write
2624064E000
heap
page read and write
254D9CB8000
heap
page read and write
29F5000
trusted library allocation
page read and write
AB4000
heap
page read and write
664000
heap
page read and write
1A6198A0000
heap
page read and write
254D9BE1000
heap
page read and write
AC0000
heap
page read and write
254D9BBE000
heap
page read and write
19B000
stack
page read and write
254D9CBC000
heap
page read and write
254D9BF1000
heap
page read and write
1D93F000
stack
page read and write
1111EE00000
heap
page read and write
443000
unkown
page readonly
1DBC1000
trusted library allocation
page read and write
1CAD0000
heap
page read and write
1E2401D9000
heap
page read and write
21CD31E0000
trusted library allocation
page read and write
254D9D35000
heap
page read and write
254D948F000
heap
page read and write
21CA57C0000
heap
page read and write
21CCD240000
heap
page read and write
40A000
unkown
page write copy
246F000
trusted library allocation
page read and write
21CD30B0000
trusted library allocation
page read and write
21CD30A0000
trusted library allocation
page read and write
254DA246000
heap
page read and write
40A000
unkown
page write copy
1D47C000
stack
page read and write
254D9BEC000
heap
page read and write
296F000
stack
page read and write
21CD30C4000
trusted library allocation
page read and write
23FF000
trusted library allocation
page read and write
23FF000
trusted library allocation
page read and write
45EF77F000
stack
page read and write
1931000
heap
page read and write
254D940A000
heap
page read and write
254D9BF1000
heap
page read and write
29F8000
trusted library allocation
page read and write
1DA7F000
stack
page read and write
38C3CFF000
stack
page read and write
5DF000
heap
page read and write
96000
stack
page read and write
23F9000
trusted library allocation
page read and write
23FF000
trusted library allocation
page read and write
1D0000
unclassified section
page readonly
1111E68D000
heap
page read and write
254D9CE6000
heap
page read and write
254D9CAC000
heap
page read and write
175B947F000
heap
page read and write
254DA237000
heap
page read and write
254D9CBE000
heap
page read and write
23FF000
trusted library allocation
page read and write
2444000
trusted library allocation
page read and write
1A624E5C000
heap
page read and write
254D9BEE000
heap
page read and write
1A619838000
heap
page read and write
2401000
trusted library allocation
page read and write
254D9D2D000
heap
page read and write
254D9CC6000
heap
page read and write
1C0000
remote allocation
page read and write
254D9CDA000
heap
page read and write
1A20000
heap
page read and write
254DA235000
heap
page read and write
254D9CB9000
heap
page read and write
1B5F000
stack
page read and write
21CD30A7000
trusted library allocation
page read and write
254D9D22000
heap
page read and write
21CD30DB000
trusted library allocation
page read and write
254D9D35000
heap
page read and write
1E23F6A7000
heap
page read and write
F714FF5000
stack
page read and write
241E000
trusted library allocation
page read and write
1E24023D000
heap
page read and write
C270F9C000
stack
page read and write
19A0000
heap
page read and write
1950000
heap
page read and write
254D9CE0000
heap
page read and write
1A2C000
heap
page read and write
23FF000
trusted library allocation
page read and write
1A61A17C000
heap
page read and write
1A6F000
heap
page read and write
23F9000
trusted library allocation
page read and write
254D9BEA000
heap
page read and write
1D83E000
stack
page read and write
2BF9000
trusted library allocation
page read and write
254D9C39000
heap
page read and write
254D9CE3000
heap
page read and write
254D9CFB000
heap
page read and write
1E2404FC000
heap
page read and write
262406C5000
heap
page read and write
254D9BE1000
heap
page read and write
1111E600000
heap
page read and write
45EF2FA000
stack
page read and write
1D0000
unclassified section
page readonly
21CCD4FB000
heap
page read and write
21CCD46B000
heap
page read and write
254D9D4C000
heap
page read and write
29F1000
trusted library allocation
page read and write
23F9000
trusted library allocation
page read and write
1E240240000
heap
page read and write
1A61A89B000
heap
page read and write
254D9D2C000
heap
page read and write
254D9BE1000
heap
page read and write
254D948F000
heap
page read and write
254D9BBD000
heap
page read and write
1A61A858000
heap
page read and write
28FA000
heap
page read and write
254D9CCF000
heap
page read and write
246F000
trusted library allocation
page read and write
96000
stack
page read and write
254D9C46000
heap
page read and write
26240450000
heap
page read and write
1B1E000
stack
page read and write
1A61A129000
heap
page read and write
23F9000
trusted library allocation
page read and write
1E240234000
heap
page read and write
1A27000
heap
page read and write
1A61A12C000
heap
page read and write
32B0000
heap
page read and write
254D9D46000
heap
page read and write
254D9CD2000
heap
page read and write
485000
heap
page read and write
32F2000
heap
page read and write
4CE000
stack
page read and write
550767C000
stack
page read and write
21CCD4A5000
heap
page read and write
70904000
unkown
page readonly
23FF000
trusted library allocation
page read and write
241C000
trusted library allocation
page read and write
18EDB300000
remote allocation
page read and write
254D9BE1000
heap
page read and write
1E2403A7000
heap
page read and write
1A61A863000
heap
page read and write
254D9CC6000
heap
page read and write
464000
heap
page read and write
254DA227000
heap
page read and write
23FF000
trusted library allocation
page read and write
195F000
heap
page read and write
3305000
heap
page read and write
2BF0000
trusted library allocation
page read and write
1A61A181000
heap
page read and write
21CD3316000
heap
page read and write
AB0000
trusted library allocation
page read and write
2624061F000
heap
page read and write
1E2403A7000
heap
page read and write
175B946E000
heap
page read and write
1921000
heap
page read and write
1E2401E2000
heap
page read and write
254DA234000
heap
page read and write
21CD321F000
heap
page read and write
254D9CC4000
heap
page read and write
254D9BED000
heap
page read and write
21CD3082000
trusted library allocation
page read and write
18ED989D000
heap
page read and write
254D9BE1000
heap
page read and write
1111E613000
heap
page read and write
254D9BEE000
heap
page read and write
23F9000
trusted library allocation
page read and write
1D57F000
stack
page read and write
1C0000
remote allocation
page read and write
1A6198B0000
heap
page read and write
23F9000
trusted library allocation
page read and write
254DA2EA000
heap
page read and write
254D9CA9000
heap
page read and write
23F1000
trusted library allocation
page read and write
23F6000
trusted library allocation
page read and write
254DA2A1000
heap
page read and write
241F000
trusted library allocation
page read and write
254D9CB4000
heap
page read and write
254D9D16000
heap
page read and write
254DA31A000
heap
page read and write
21CCD489000
heap
page read and write
254D9BBC000
heap
page read and write
21CD30BA000
trusted library allocation
page read and write
21CD327F000
heap
page read and write
C2A000
heap
page read and write
23F9000
trusted library allocation
page read and write
9C000
stack
page read and write
2400000
trusted library allocation
page read and write
18EDB2D0000
trusted library allocation
page read and write
254D9BEE000
heap
page read and write
254D9CE4000
heap
page read and write
1E240215000
heap
page read and write
330A000
heap
page read and write
254DA2C8000
heap
page read and write
240D000
trusted library allocation
page read and write
2400000
trusted library allocation
page read and write
5C4B6FE000
stack
page read and write
620000
trusted library allocation
page read and write
5C4B67C000
stack
page read and write
1A61A813000
heap
page read and write
2400000
trusted library allocation
page read and write
254D948D000
heap
page read and write
254D9CD2000
heap
page read and write
443000
unkown
page readonly
1A624E96000
heap
page read and write
23FF000
trusted library allocation
page read and write
254D9C40000
heap
page read and write
1E23F707000
heap
page read and write
254D9BF1000
heap
page read and write
B8D000
heap
page read and write
23F4000
trusted library allocation
page read and write
254D9BBC000
heap
page read and write
23FF000
trusted library allocation
page read and write
2460000
trusted library allocation
page read and write
400000
unkown
page readonly
23F9000
trusted library allocation
page read and write
254DA28A000
heap
page read and write
1CAE2000
heap
page read and write
254D9CB8000
heap
page read and write
18EE000
stack
page read and write
1D0000
unclassified section
page readonly
400000
unkown
page readonly
5CEF000
stack
page read and write
254D9C29000
heap
page read and write
1A80000
trusted library allocation
page read and write
660000
heap
page read and write
246F000
trusted library allocation
page read and write
254D940A000
heap
page read and write
254D9CDB000
heap
page read and write
262405D0000
heap
page read and write
254DA28A000
heap
page read and write
2BF0000
trusted library allocation
page read and write
23FF000
trusted library allocation
page read and write
254D9D16000
heap
page read and write
254D9BDF000
heap
page read and write
254D9C9B000
heap
page read and write
23FF000
trusted library allocation
page read and write
21CD3331000
heap
page read and write
400000
unkown
page readonly
1E240271000
heap
page read and write
23F9000
trusted library allocation
page read and write
9C000
stack
page read and write
242C000
trusted library allocation
page read and write
660000
heap
page read and write
254D9BEE000
heap
page read and write
254D9C2F000
heap
page read and write
254D9BF1000
heap
page read and write
23FF000
trusted library allocation
page read and write
21CCD517000
heap
page read and write
664000
heap
page read and write
254D9BE1000
heap
page read and write
620000
trusted library allocation
page read and write
254D9D16000
heap
page read and write
1DD9B000
trusted library allocation
page read and write
254D93D7000
heap
page read and write
29F1000
trusted library allocation
page read and write
254D9C16000
heap
page read and write
40A000
unkown
page write copy
18ED9884000
heap
page read and write
A6F000
stack
page read and write
254D9D21000
heap
page read and write
254D9C1A000
heap
page read and write
254D9C3B000
heap
page read and write
23FF000
trusted library allocation
page read and write
254D9CF3000
heap
page read and write
254DA504000
heap
page read and write
254D9BEC000
heap
page read and write
246F000
trusted library allocation
page read and write
28F1000
heap
page read and write
26240644000
heap
page read and write
1111EE02000
heap
page read and write
21CD30F7000
trusted library allocation
page read and write
254D9CA9000
heap
page read and write
400000
unkown
page readonly
1DC83000
trusted library allocation
page read and write
C6F32FE000
stack
page read and write
C2A000
heap
page read and write
254D9C40000
heap
page read and write
19A88A54000
heap
page read and write
1E240247000
heap
page read and write
1DC56000
trusted library allocation
page read and write
21CD324A000
heap
page read and write
254D9CF3000
heap
page read and write
254D9CC6000
heap
page read and write
19A89300000
trusted library allocation
page read and write
254D9BBC000
heap
page read and write
23FF000
trusted library allocation
page read and write
175B948A000
heap
page read and write
1E240226000
heap
page read and write
23FF000
trusted library allocation
page read and write
254DA237000
heap
page read and write
5BE000
stack
page read and write
70906000
unkown
page readonly
254DA255000
heap
page read and write
254D9CB4000
heap
page read and write
1E23F68F000
heap
page read and write
1979000
heap
page read and write
254D9C75000
heap
page read and write
1936000
heap
page read and write
1A624D10000
heap
page read and write
1A61A12B000
heap
page read and write
B5F000
trusted library allocation
page read and write
401000
unkown
page execute read
175B93C0000
heap
page read and write
1E2401E8000
heap
page read and write
1DCC1000
trusted library allocation
page read and write
9C000
stack
page read and write
23FE000
trusted library allocation
page read and write
2400000
trusted library allocation
page read and write
1E2401FD000
heap
page read and write
23F9000
trusted library allocation
page read and write
246F000
trusted library allocation
page read and write
254D9CB1000
heap
page read and write
254D9CA1000
heap
page read and write
254DA255000
heap
page read and write
254D944F000
heap
page read and write
664000
heap
page read and write
1E23F6A7000
heap
page read and write
254DA237000
heap
page read and write
262406A8000
heap
page read and write
1E240237000
heap
page read and write
1A61A170000
heap
page read and write
19A000
stack
page read and write
1A624E61000
heap
page read and write
5EE000
unkown
page execute read
25E6D647000
heap
page read and write
1A624D60000
trusted library allocation
page read and write
254D9BE9000
heap
page read and write
21CD30B0000
trusted library allocation
page read and write
254D9D31000
heap
page read and write
507000
heap
page read and write
1D6F0000
heap
page read and write
2400000
trusted library allocation
page read and write
19A88B13000
heap
page read and write
247A000
trusted library allocation
page read and write
1CAD1000
heap
page read and write
2624066D000
heap
page read and write
2447000
trusted library allocation
page read and write
254DA2DB000
heap
page read and write
23F9000
trusted library allocation
page read and write
254D9D2C000
heap
page read and write
21CD31D0000
trusted library allocation
page read and write
18ED9824000
heap
page read and write
26240660000
heap
page read and write
1D97E000
stack
page read and write
2400000
trusted library allocation
page read and write
254DA2EA000
heap
page read and write
2944000
trusted library allocation
page read and write
254D9C2B000
heap
page read and write
1C16000
heap
page read and write
1111E410000
heap
page read and write
242B000
trusted library allocation
page read and write
254D9C40000
heap
page read and write
F714AFD000
stack
page read and write
1A61A151000
heap
page read and write
254D9BED000
heap
page read and write
1A624E54000
heap
page read and write
40A000
unkown
page write copy
23F9000
trusted library allocation
page read and write
443000
unkown
page readonly
262405C0000
unclassified section
page readonly
2624DA69000
heap
page read and write
254D9CBE000
heap
page read and write
1E2401D6000
heap
page read and write
1A61A8A0000
heap
page read and write
18B8000
heap
page read and write
1A61988C000
heap
page read and write
1D300000
remote allocation
page read and write
254D9CC3000
heap
page read and write
19A88A65000
heap
page read and write
23F9000
trusted library allocation
page read and write
254DA2A1000
heap
page read and write
254D9406000
heap
page read and write
1A624E80000
heap
page read and write
38C39FF000
stack
page read and write
254D9C1C000
heap
page read and write
175B9478000
heap
page read and write
254D9D03000
heap
page read and write
254D9C1A000
heap
page read and write
262406A4000
heap
page read and write
254D9BEE000
heap
page read and write
240E000
trusted library allocation
page read and write
C6F36FE000
stack
page read and write
5F0000
unkown
page write copy
437000
unkown
page read and write
254D9D0B000
heap
page read and write
1E24023A000
heap
page read and write
19A88A40000
heap
page read and write
1DCC1000
trusted library allocation
page read and write
25E6D450000
heap
page read and write
A8E000
stack
page read and write
1E2403AB000
heap
page read and write
254DA2DB000
heap
page read and write
AF0000
trusted library allocation
page read and write
254D93F0000
heap
page read and write
333B000
heap
page read and write
1DF51000
trusted library allocation
page read and write
254D9BB2000
heap
page read and write
254D9D16000
heap
page read and write
19A892E0000
trusted library allocation
page read and write
449CCFE000
stack
page read and write
254D9499000
heap
page read and write
254D9CCB000
heap
page read and write
There are 2325 hidden memdumps, click here to show them.