IOC Report
SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\install.vbs
data
modified
malicious
C:\Users\user\AppData\Roaming\ios.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\ios.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_ios.exe_32bff45bee1557a39d49c4ca2c5bff414e93ae12_bcb1b634_99970dd0-5d80-4a04-b43a-60dbb6c644b1\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER57D8.tmp.dmp
Mini DuMP crash report, 14 streams, Mon May 23 18:02:41 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5A5A.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5AF7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\DiFxAPI.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Forbudenes2.MON
data
dropped
C:\Users\user\AppData\Local\Temp\MEMORABLENESS.lnk
MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
dropped
C:\Users\user\AppData\Local\Temp\Standardiserede7.sma
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\document-open-recent-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\nsdAA93.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified
C:\Users\user\AppData\Local\Temp\nsqE5D6.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified
C:\Users\user\AppData\Local\Temp\nssA056.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified
C:\Users\user\AppData\Local\Temp\portaudio_x64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\vm3ddevapi64-release.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\logs.dat
data
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe
"C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe
"C:\Users\user\Desktop\SecuriteInfo.com.UDS.Trojan-Downloader.Win32.GuLoader.gen.1305.exe"
malicious
C:\Users\user\AppData\Roaming\ios.exe
C:\Users\user\AppData\Roaming\ios.exe
malicious
C:\Users\user\AppData\Roaming\ios.exe
"C:\Users\user\AppData\Roaming\ios.exe"
malicious
C:\Users\user\AppData\Roaming\ios.exe
C:\Users\user\AppData\Roaming\ios.exe
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\install.vbs"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\System32\cmd.exe" /c "C:\Users\user\AppData\Roaming\ios.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 8688 -s 1072

URLs

Name
IP
Malicious
dwilsonson23.sytes.net
malicious
http://crl.certum.pl/ctsca2021.crl0o
unknown
https://doc-0o-68-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/kdqkjtpbbdq1ma5od724n4arlrasmcfv/1653325275000/16125903511617426447/*/16-ZmAFjeTzH9DAbqoP0u2zSq7p2C4wzm?e=download
142.250.185.129
http://repository.certum.pl/ctnca.cer09
unknown
http://www.vmware.com/0
unknown
https://drive.google.com/9
unknown
http://crl.certum.pl/ctnca.crl0k
unknown
https://doc-0o-68-docs.googleusercontent.com/G9
unknown
http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.
unknown
http://www.vmware.com/0/
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD
unknown
http://www.gopher.ftp://ftp.
unknown
http://www.symauth.com/cps0(
unknown
https://doc-0o-68-docs.googleusercontent.com/#
unknown
http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
unknown
https://doc-0o-68-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/kdqkjtpb
unknown
http://repository.certum.pl/ctsca2021.cer0
unknown
http://subca.ocsp-certum.com05
unknown
http://www.symauth.com/rpa00
unknown
https://drive.google.com/
unknown
https://doc-0o-68-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/cf8qgqli
unknown
http://subca.ocsp-certum.com02
unknown
http://subca.ocsp-certum.com01
unknown
https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
unknown
https://csp.withgoogle.com/csp/report-to/DriveUntrustedContentHttp/external
unknown
http://crl.certum.pl/ctnca2.crl0l
unknown
http://repository.certum.pl/ctnca2.cer09
unknown
http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
unknown
https://doc-0o-68-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/cf8qgqli4rihm7727e1v30p2jqpcricp/1653325350000/16125903511617426447/*/16-ZmAFjeTzH9DAbqoP0u2zSq7p2C4wzm?e=download
142.250.185.129
https://doc-0o-68-docs.googleusercontent.com/uR
unknown
http://www.certum.pl/CPS0
unknown
https://doc-0o-68-docs.googleusercontent.com/
unknown
https://doc-0o-68-docs.googleusercontent.com/%%doc-0o-68-docs.googleusercontent.com
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
dwilsonson23.sytes.net
185.20.186.103
malicious
dual-a-0001.a-msedge.net
204.79.197.200
drive.google.com
142.250.186.142
e-0009.e-msedge.net
13.107.5.88
googlehosted.l.googleusercontent.com
142.250.185.129
doc-0o-68-docs.googleusercontent.com
unknown

IPs

IP
Domain
Country
Malicious
185.20.186.103
dwilsonson23.sytes.net
Ukraine
malicious
142.250.185.129
googlehosted.l.googleusercontent.com
United States
142.250.186.142
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ABSCISSAS\Unpauperised
Hjlpeskrmen
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Moringaceous\Forladegevrer193
Expand String Value
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Celioncus\POLEYNE
Expand String Value
HKEY_CURRENT_USER\SOFTWARE\dbenavnet\rehearhearing
Duping181
HKEY_CURRENT_USER\SOFTWARE\Unvamped92\Universitetsdirektrernes60
Idyls
HKEY_CURRENT_USER\SOFTWARE\Counterbrace57\monaxon
Expand String Value
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Kollapsen117\Margygr
dorsicolumn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ahw
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
00184005D30E727A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Remcos-V27VY7
exepath
HKEY_CURRENT_USER\SOFTWARE\Remcos-V27VY7
licence
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1660000
remote allocation
page execute and read and write
malicious
19A9000
heap
page read and write
malicious
1660000
remote allocation
page execute and read and write
malicious
32F0000
direct allocation
page execute and read and write
malicious
1847000
heap
page read and write
malicious
1660000
remote allocation
page execute and read and write
malicious
32C0000
direct allocation
page execute and read and write
malicious
19A4000
heap
page read and write
malicious
1D2FE414000
heap
page read and write
401000
unkown
page execute read
1847000
heap
page read and write
201E8E8E000
heap
page read and write
1996000
heap
page read and write
2366256A000
heap
page read and write
2AD2037B000
heap
page read and write
28B8F08C000
heap
page read and write
7B0000
heap
page read and write
28790400000
trusted library allocation
page read and write
7C16B7F000
stack
page read and write
462000
unkown
page readonly
3381000
heap
page read and write
236634C3000
heap
page read and write
1592C021000
heap
page read and write
23663339000
heap
page read and write
236634E3000
heap
page read and write
2878C329000
heap
page read and write
375F000
stack
page read and write
201E8E85000
heap
page read and write
17D0000
heap
page read and write
2366322F000
heap
page read and write
1ACC5C13000
unkown
page read and write
23662C8D000
heap
page read and write
422000
unkown
page read and write
2879041F000
trusted library allocation
page read and write
1DA521E0000
heap
page read and write
28790510000
trusted library allocation
page read and write
400000
unkown
page readonly
25AF000
stack
page read and write
23662C46000
heap
page read and write
2878A4CE000
heap
page read and write
462000
unkown
page readonly
23662BEA000
heap
page read and write
385E000
stack
page read and write
23662544000
heap
page read and write
7B0000
heap
page read and write
201E8E3C000
heap
page read and write
23662C73000
heap
page read and write
8D8F7E000
stack
page read and write
201E8984000
heap
page read and write
2366326A000
heap
page read and write
537000
heap
page read and write
23662BE4000
heap
page read and write
23663203000
heap
page read and write
2542788A000
heap
page read and write
236634E3000
heap
page read and write
214C367D000
heap
page read and write
40A000
unkown
page write copy
20AD345A000
heap
page read and write
1592C01E000
heap
page read and write
21538C8F000
heap
page read and write
20AD3434000
heap
page read and write
7B0000
heap
page read and write
23662BF5000
heap
page read and write
9D4D47A000
stack
page read and write
2366255E000
heap
page read and write
28B8F031000
heap
page read and write
23662C94000
heap
page read and write
25427813000
heap
page read and write
1FE437E000
stack
page read and write
2366256E000
heap
page read and write
21538CE3000
heap
page read and write
7D9D477000
stack
page read and write
1D2BF000
stack
page read and write
1F1D3E00000
heap
page read and write
23662BE0000
heap
page read and write
5EC000
unkown
page execute read
7B0000
heap
page read and write
400000
unkown
page readonly
400000
unkown
page readonly
57AF000
stack
page read and write
7B0000
heap
page read and write
287904F0000
remote allocation
page read and write
1D3D0000
trusted library allocation
page read and write
236625EB000
heap
page read and write
23662BD5000
heap
page read and write
23663201000
heap
page read and write
1DA521EF000
heap
page read and write
1592C047000
heap
page read and write
7B0000
heap
page read and write
BB5000
heap
page read and write
408000
unkown
page readonly
236625C0000
heap
page read and write
246F000
stack
page read and write
2366333E000
heap
page read and write
BAE000
stack
page read and write
1DA521ED000
heap
page read and write
23662C20000
heap
page read and write
23662C41000
heap
page read and write
2670000
heap
page read and write
21538CE3000
heap
page read and write
23662C0C000
heap
page read and write
1F1D40E0000
unclassified section
page readonly
530000
heap
page read and write
58D000
heap
page read and write
5F2000
unkown
page execute read
23662C6A000
heap
page read and write
2AD20280000
heap
page read and write
40A000
unkown
page write copy
620000
trusted library allocation
page read and write
1DA51AF0000
heap
page read and write
21538C80000
heap
page read and write
214C364C000
heap
page read and write
21538C79000
heap
page read and write
7B0000
heap
page read and write
20AD32B0000
heap
page read and write
1F1D3E5E000
heap
page read and write
6F1000
unkown
page write copy
2AD20DD0000
heap
page read and write
7B0000
heap
page read and write
215381E2000
heap
page read and write
21538CB1000
heap
page read and write
1D2FE413000
heap
page read and write
23662C85000
heap
page read and write
23662C94000
heap
page read and write
7B0000
heap
page read and write
28790419000
trusted library allocation
page read and write
437000
unkown
page read and write
287904F8000
trusted library allocation
page read and write
23662C0A000
heap
page read and write
28790402000
trusted library allocation
page read and write
1F1D3E90000
heap
page read and write
2AD209F0000
trusted library allocation
page read and write
1ACC5C02000
unkown
page read and write
26E95AE5000
heap
page read and write
23662C60000
heap
page read and write
215381FC000
heap
page read and write
23662C93000
heap
page read and write
236625E3000
heap
page read and write
BBB857E000
stack
page read and write
287904F0000
remote allocation
page read and write
23662C6C000
heap
page read and write
BC5000
heap
page read and write
1F1D3E89000
heap
page read and write
1592C016000
heap
page read and write
19F1000
heap
page read and write
3480000
heap
page read and write
201E890F000
heap
page read and write
408000
unkown
page readonly
236625BD000
heap
page read and write
7B0000
heap
page read and write
1D3D1000
trusted library allocation
page read and write
2878C0B0000
trusted library allocation
page read and write
2366253A000
heap
page read and write
17F4000
heap
page read and write
25427881000
heap
page read and write
1F1D3EAF000
heap
page read and write
214C3702000
heap
page read and write
26E95776000
heap
page read and write
4CE000
stack
page read and write
236625D4000
heap
page read and write
1DA51A4F000
heap
page read and write
201E895B000
heap
page read and write
23663206000
heap
page read and write
401000
unkown
page execute read
25427780000
unclassified section
page readonly
23662C6C000
heap
page read and write
30000
unkown
page read and write
23662C93000
heap
page read and write
1D7F0000
heap
page read and write
23662C02000
heap
page read and write
17E4000
heap
page read and write
7B0000
heap
page read and write
21538CBC000
heap
page read and write
2879046A000
trusted library allocation
page read and write
2878AF02000
heap
page read and write
17CA000
heap
page read and write
400000
unkown
page readonly
201E8800000
heap
page read and write
236632CC000
heap
page read and write
23662BE4000
heap
page read and write
23675C30000
heap
page read and write
23663201000
heap
page read and write
57D000
heap
page read and write
1D8FD000
stack
page read and write
23662BFE000
heap
page read and write
765000
heap
page read and write
236625F9000
heap
page read and write
2366336A000
heap
page read and write
20AD3464000
heap
page read and write
19A9000
heap
page read and write
23662C04000
heap
page read and write
23662BFC000
heap
page read and write
23662BD0000
heap
page read and write
236625EB000
heap
page read and write
33F1000
trusted library allocation
page read and write
2AD2039A000
heap
page read and write
245F000
stack
page read and write
7B0000
heap
page read and write
23662C8F000
heap
page read and write
201E890F000
heap
page read and write
214C364E000
heap
page read and write
2AD203F3000
heap
page read and write
236625D7000
heap
page read and write
5600000
heap
page read and write
236625FB000
heap
page read and write
1840000
heap
page read and write
2AD20DE7000
heap
page read and write
26E95747000
heap
page read and write
17D0000
heap
page read and write
97E000
stack
page read and write
19A000
stack
page read and write
236624F7000
heap
page read and write
2366322F000
heap
page read and write
23662C17000
heap
page read and write
23662C71000
heap
page read and write
2878C302000
heap
page read and write
12339D60000
heap
page read and write
201E8E1A000
heap
page read and write
2878C243000
heap
page read and write
1592C023000
heap
page read and write
23675F02000
heap
page read and write
23662C54000
heap
page read and write
236625EC000
heap
page read and write
28790430000
trusted library allocation
page read and write
61D28AB000
stack
page read and write
1F1D3F02000
heap
page read and write
2434000
heap
page read and write
98000
stack
page read and write
5BEE000
stack
page read and write
2366256E000
heap
page read and write
2430000
heap
page read and write
3451000
heap
page read and write
2878A484000
heap
page read and write
236632CC000
heap
page read and write
40A000
unkown
page write copy
23663256000
heap
page read and write
22F0000
heap
page read and write
7B0000
heap
page read and write
21539010000
heap
page read and write
462000
unkown
page readonly
7B0000
heap
page read and write
8D90FE000
stack
page read and write
2879045E000
trusted library allocation
page read and write
1F1D3E7C000
heap
page read and write
201E8E7B000
heap
page read and write
1DA521E1000
heap
page read and write
236632CC000
heap
page read and write
1C70000
heap
page read and write
21537F60000
heap
page read and write
23663203000
heap
page read and write
23662C8F000
heap
page read and write
236624FD000
heap
page read and write
215381C8000
heap
page read and write
1D10F000
stack
page read and write
2366258E000
heap
page read and write
9D4D67B000
stack
page read and write
3B6C000
stack
page read and write
23662C94000
heap
page read and write
7B0000
heap
page read and write
2878A433000
heap
page read and write
1832000
heap
page read and write
4F5000
heap
page read and write
70FC1000
unkown
page execute read
23662C17000
heap
page read and write
21538CE6000
heap
page read and write
21538C6F000
heap
page read and write
12339E00000
heap
page read and write
B40000
heap
page read and write
422000
unkown
page read and write
2AD20070000
heap
page read and write
201E897F000
heap
page read and write
2878C120000
trusted library allocation
page read and write
3A20000
heap
page read and write
23663222000
heap
page read and write
2366336C000
heap
page read and write
98000
stack
page read and write
2878C34A000
heap
page read and write
21538C8F000
heap
page read and write
23662BF5000
heap
page read and write
2AD2028A000
heap
page read and write
23662BF0000
heap
page read and write
1592C006000
heap
page read and write
7B0000
heap
page read and write
236625FD000
heap
page read and write
23662BE6000
heap
page read and write
254277F0000
trusted library allocation
page read and write
5C1D3FB000
stack
page read and write
23662504000
heap
page read and write
26E95910000
heap
page read and write
7C16A7F000
stack
page read and write
236625A3000
heap
page read and write
2878C160000
trusted library allocation
page read and write
1F1D40F0000
heap
page read and write
2153820E000
heap
page read and write
23663216000
heap
page read and write
236632F9000
heap
page read and write
AE3D87E000
stack
page read and write
2366231B000
heap
page read and write
1DA7F000
stack
page read and write
2878A482000
heap
page read and write
1D2FED60000
trusted library allocation
page read and write
23662C2E000
heap
page read and write
1D7B0000
trusted library allocation
page read and write
21538CFD000
heap
page read and write
1814000
heap
page read and write
401000
unkown
page execute read
7B0000
heap
page read and write
1D2FE470000
heap
page read and write
2AD20313000
heap
page read and write
23675E00000
heap
page read and write
2878A46F000
heap
page read and write
2153821A000
heap
page read and write
2878C2CE000
heap
page read and write
2542780B000
heap
page read and write
236631E9000
heap
page read and write
2AD20DC9000
heap
page read and write
17E4000
heap
page read and write
201E8970000
heap
page read and write
23662BEB000
heap
page read and write
408000
unkown
page readonly
2AD20DB9000
heap
page read and write
462000
unkown
page readonly
28B8F06F000
heap
page read and write
23662BE6000
heap
page read and write
9E000
stack
page read and write
7B0000
heap
page read and write
427000
unkown
page read and write
21538CBC000
heap
page read and write
1DA51A41000
heap
page read and write
21538CE6000
heap
page read and write
1592BFE8000
heap
page read and write
1F1D3E53000
heap
page read and write
1D300000
remote allocation
page read and write
23662BD1000
heap
page read and write
19F3000
heap
page read and write
20AD3466000
heap
page read and write
941CA7F000
stack
page read and write
23662BD1000
heap
page read and write
1D2FEDA0000
trusted library allocation
page read and write
23662C23000
heap
page read and write
1DA51A11000
heap
page read and write
23662C32000
heap
page read and write
23675E13000
heap
page read and write
23662C14000
heap
page read and write
215381A8000
heap
page read and write
400000
unkown
page readonly
2878C130000
trusted library allocation
page read and write
BBB88FA000
stack
page read and write
2366348C000
heap
page read and write
28B8F02A000
heap
page read and write
2AD20387000
heap
page read and write
401000
unkown
page execute read
23662536000
heap
page read and write
23662BF2000
heap
page read and write
21538CAD000
heap
page read and write
1C0000
remote allocation
page read and write
201E8976000
heap
page read and write
595000
heap
page read and write
287906C0000
trusted library allocation
page read and write
1D7AC000
stack
page read and write
400000
unkown
page readonly
435000
unkown
page read and write
23663242000
heap
page read and write
7D9D57E000
stack
page read and write
23662BF5000
heap
page read and write
514000
heap
page read and write
201E892C000
heap
page read and write
2153820C000
heap
page read and write
1CFEE000
stack
page read and write
23663229000
heap
page read and write
B1E000
stack
page read and write
1D2FF340000
trusted library allocation
page read and write
435000
unkown
page read and write
28B8F7A0000
trusted library allocation
page read and write
23662C00000
heap
page read and write
236625E3000
heap
page read and write
21538260000
heap
page read and write
AFE000
stack
page read and write
12339EA5000
heap
page read and write
23663222000
heap
page read and write
1FE427A000
stack
page read and write
21538DCB000
heap
page read and write
23675DC0000
heap
page read and write
1C0000
remote allocation
page read and write
530000
heap
page read and write
21538C30000
heap
page read and write
236631EB000
heap
page read and write
1810000
heap
page read and write
23663234000
heap
page read and write
591000
heap
page read and write
185B000
heap
page read and write
DE000
stack
page read and write
20AD3413000
heap
page read and write
1DA51A43000
heap
page read and write
20AD3485000
heap
page read and write
23662C33000
heap
page read and write
408000
unkown
page readonly
20AD3480000
heap
page read and write
3389000
heap
page read and write
23662BF2000
heap
page read and write
1ACC6102000
heap
page read and write
21538C92000
heap
page read and write
201E7CC0000
heap
page read and write
23662317000
heap
page read and write
23662333000
heap
page read and write
97E000
stack
page read and write
462000
unkown
page readonly
23662C28000
heap
page read and write
185B000
heap
page read and write
1B2F000
stack
page read and write
23662C94000
heap
page read and write
23662C8B000
heap
page read and write
2878A443000
heap
page read and write
236625BD000
heap
page read and write
7B0000
heap
page read and write
1DA51880000
heap
page read and write
21538CE3000
heap
page read and write
236625F9000
heap
page read and write
1DA51A58000
heap
page read and write
19B1000
heap
page read and write
23662C37000
heap
page read and write
23662C6A000
heap
page read and write
28B8F081000
heap
page read and write
460000
unkown
page read and write
1592C1B1000
heap
page read and write
236625A4000
heap
page read and write
12339F02000
heap
page read and write
1F1D3E13000
heap
page read and write
23662BF4000
heap
page read and write
2366327F000
heap
page read and write
236625EB000
heap
page read and write
23663232000
heap
page read and write
26E9576E000
heap
page read and write
23663270000
heap
page read and write
23662BD8000
heap
page read and write
2366336C000
heap
page read and write
1814000
heap
page read and write
21538DC5000
heap
page read and write
23662BD5000
heap
page read and write
236625D0000
heap
page read and write
408000
unkown
page readonly
400000
unkown
page readonly
4F5000
heap
page read and write
23662C6C000
heap
page read and write
594000
heap
page read and write
201E8E45000
heap
page read and write
1814000
heap
page read and write
26E95756000
heap
page read and write
2366228E000
heap
page read and write
7B0000
heap
page read and write
21538CE3000
heap
page read and write
1D60B000
stack
page read and write
236625FD000
heap
page read and write
2878C170000
trusted library allocation
page read and write
201E890F000
heap
page read and write
7AF000
heap
page read and write
23662BFD000
heap
page read and write
23662338000
heap
page read and write
408000
unkown
page readonly
3395000
heap
page read and write
23663237000
heap
page read and write
23663234000
heap
page read and write
401000
unkown
page execute read
28B8F085000
heap
page read and write
23663200000
heap
page read and write
23662C93000
heap
page read and write
23662544000
heap
page read and write
408000
unkown
page readonly
28790410000
trusted library allocation
page read and write
1C0000
remote allocation
page read and write
74F000
heap
page read and write
435000
unkown
page read and write
7D9D4FE000
stack
page read and write
2153821A000
heap
page read and write
23663480000
heap
page read and write
8D8EFE000
stack
page read and write
201E8815000
heap
page read and write
23675E51000
heap
page read and write
185E000
heap
page read and write
236631F2000
heap
page read and write
201E8929000
heap
page read and write
23662C32000
heap
page read and write
2366256D000
heap
page read and write
2366228A000
heap
page read and write
1DA51A57000
heap
page read and write
401000
unkown
page execute read
23663242000
heap
page read and write
236631E2000
heap
page read and write
2AD20D8A000
heap
page read and write
2AD20240000
heap
page read and write
23662C01000
heap
page read and write
236634C2000
heap
page read and write
1F1D3E96000
heap
page read and write
19A9000
heap
page read and write
2879044E000
trusted library allocation
page read and write
28B8F102000
heap
page read and write
28790446000
trusted library allocation
page read and write
33A0000
remote allocation
page read and write
1DA51A2F000
heap
page read and write
1592C001000
heap
page read and write
23663235000
heap
page read and write
17E8000
heap
page read and write
1D2FE47E000
heap
page read and write
1ACC6113000
heap
page read and write
20AD3502000
heap
page read and write
61D29AE000
stack
page read and write
23663270000
heap
page read and write
1D2FE419000
heap
page read and write
9867979000
stack
page read and write
5F0000
unkown
page execute read
2AD20C02000
heap
page read and write
7D9D77D000
stack
page read and write
1D2FE424000
heap
page read and write
23662C01000
heap
page read and write
23662C87000
heap
page read and write
214C3665000
heap
page read and write
23663200000
heap
page read and write
2AD20377000
heap
page read and write
2878A4E1000
heap
page read and write
28790461000
trusted library allocation
page read and write
70FD0000
unkown
page readonly
23662BD1000
heap
page read and write
201E7EBC000
heap
page read and write
1DA51C3E000
heap
page read and write
7B0000
heap
page read and write
1F1D3E9E000
heap
page read and write
594000
heap
page read and write
2878C170000
trusted library allocation
page read and write
8D907E000
stack
page read and write
408000
unkown
page readonly
201E7F3B000
heap
page read and write
23662C6C000
heap
page read and write
2AD20DD4000
heap
page read and write
23663234000
heap
page read and write
7B0000
heap
page read and write
1ACC5AD0000
heap
page read and write
23662CAC000
heap
page read and write
1D2FECB0000
trusted library allocation
page read and write
33C2000
heap
page read and write
23663498000
heap
page read and write
19A000
stack
page read and write
7B0000
heap
page read and write
1592C01E000
heap
page read and write
1592C1AE000
heap
page read and write
236622BC000
heap
page read and write
594000
heap
page read and write
17DE000
stack
page read and write
226038E000
stack
page read and write
460000
unkown
page read and write
21538F1C000
heap
page read and write
21538160000
heap
page read and write
2878C2FC000
heap
page read and write
201E7E5E000
heap
page read and write
21538F2C000
heap
page read and write
201E8900000
heap
page read and write
201E8E43000
heap
page read and write
201E897C000
heap
page read and write
594000
heap
page read and write
33AA000
heap
page read and write
214C3800000
unclassified section
page readonly
2AD20283000
heap
page read and write
23662BF3000
heap
page read and write
23662C54000
heap
page read and write
201E8929000
heap
page read and write
23662C17000
heap
page read and write
1D2FEDE0000
trusted library allocation
page read and write
23662BE4000
heap
page read and write
2366326A000
heap
page read and write
23662514000
heap
page read and write
594000
heap
page read and write
21538C8D000
heap
page read and write
1D2FED50000
trusted library allocation
page read and write
6F7C0000
unkown
page readonly
2366256A000
heap
page read and write
201E8E09000
heap
page read and write
514000
heap
page read and write
6E0000
heap
page read and write
2879043A000
trusted library allocation
page read and write
21538DC3000
heap
page read and write
23662BE8000
heap
page read and write
594000
heap
page read and write
21538F26000
heap
page read and write
3398000
heap
page read and write
23662C2F000
heap
page read and write
30000
unkown
page read and write
2AD20D00000
heap
page read and write
23663314000
heap
page read and write
236632D4000
heap
page read and write
1D6FC000
stack
page read and write
7B0000
heap
page read and write
2AD20388000
heap
page read and write
2440000
trusted library allocation
page read and write
2AD20E12000
heap
page read and write
236625C0000
heap
page read and write
23662544000
heap
page read and write
AA20D9B000
stack
page read and write
437000
unkown
page read and write
1F1D3E40000
heap
page read and write
29C6000
trusted library allocation
page read and write
7B0000
heap
page read and write
7B0000
heap
page read and write
21538C96000
heap
page read and write
201E8981000
heap
page read and write
1930000
heap
page read and write
21538F17000
heap
page read and write
23662C94000
heap
page read and write
201E7F13000
heap
page read and write
23663237000
heap
page read and write
408000
unkown
page readonly
615000
heap
page read and write
1D93F000
stack
page read and write
23662C02000
heap
page read and write
201E895B000
heap
page read and write
23662288000
heap
page read and write
236632CC000
heap
page read and write
201E890E000
heap
page read and write
1592C1B8000
heap
page read and write
21538DC7000
heap
page read and write
23662BF4000
heap
page read and write
23663237000
heap
page read and write
201E8E20000
heap
page read and write
2878C254000
heap
page read and write
2878C0A0000
trusted library allocation
page read and write
1DA521F5000
heap
page read and write
23662C86000
heap
page read and write
1D10F000
stack
page read and write
201E8932000
heap
page read and write
610000
heap
page read and write
21538C8F000
heap
page read and write
1ACC5C41000
heap
page read and write
1814000
heap
page read and write
28EF000
stack
page read and write
201E7EE8000
heap
page read and write
2878AE02000
heap
page read and write
594000
heap
page read and write
785000
heap
page read and write
3AB0000
trusted library allocation
page read and write
BBB847E000
stack
page read and write
1F1D4815000
heap
page read and write
23663226000
heap
page read and write
236625EB000
heap
page read and write
3C2B000
stack
page read and write
3AE0000
trusted library allocation
page read and write
23662C91000
heap
page read and write
B3E000
stack
page read and write
2878A4BA000
heap
page read and write
23663229000
heap
page read and write
7B0000
heap
page read and write
2AD20213000
heap
page read and write
23663234000
heap
page read and write
21538CAF000
heap
page read and write
2878C2EC000
heap
page read and write
201E8940000
heap
page read and write
9D4D37F000
stack
page read and write
462000
unkown
page readonly
23662BF4000
heap
page read and write
23663270000
heap
page read and write
23663252000
heap
page read and write
1592BF30000
heap
page read and write
236631E2000
heap
page read and write
20AD3442000
heap
page read and write
2366322C000
heap
page read and write
201E8EB6000
heap
page read and write
61D307E000
stack
page read and write
23662544000
heap
page read and write
23662C65000
heap
page read and write
2878A4D6000
heap
page read and write
2878A610000
heap
page read and write
20AD345C000
heap
page read and write
4F10000
trusted library allocation
page read and write
333E000
stack
page read and write
83E000
stack
page read and write
23662C93000
heap
page read and write
21538C73000
heap
page read and write
25427800000
heap
page read and write
24D0000
heap
page read and write
2878A502000
heap
page read and write
24D0000
heap
page read and write
1D200000
remote allocation
page read and write
23663229000
heap
page read and write
7D9D5FE000
stack
page read and write
7D9D97F000
stack
page read and write
1814000
heap
page read and write
201E897A000
heap
page read and write
21538228000
heap
page read and write
201E894B000
heap
page read and write
201E8930000
heap
page read and write
23662420000
heap
page read and write
215381C9000
heap
page read and write
21538DCA000
heap
page read and write
23662C1C000
heap
page read and write
2366331D000
heap
page read and write
748000
heap
page read and write
236631E2000
heap
page read and write
20AD346F000
heap
page read and write
B6E000
stack
page read and write
236624F5000
heap
page read and write
28B8F082000
heap
page read and write
1ACC6013000
heap
page read and write
1938000
heap
page read and write
2AD20280000
heap
page read and write
7B0000
heap
page read and write
1592C001000
heap
page read and write
236625D7000
heap
page read and write
1D3CD000
stack
page read and write
40A000
unkown
page write copy
2879045B000
trusted library allocation
page read and write
236631F0000
heap
page read and write
23663206000
heap
page read and write
8D8BAA000
stack
page read and write
2366256A000
heap
page read and write
23662317000
heap
page read and write
1D2FE48B000
heap
page read and write
192E000
stack
page read and write
236624F0000
heap
page read and write
236625A3000
heap
page read and write
23675E27000
heap
page read and write
214C3713000
heap
page read and write
236631F0000
heap
page read and write
23662BE4000
heap
page read and write
40A000
unkown
page write copy
1FE3B0F000
stack
page read and write
23662BE1000
heap
page read and write
20AD3457000
heap
page read and write
427000
unkown
page read and write
201E8932000
heap
page read and write
201E8E94000
heap
page read and write
20AD344D000
heap
page read and write
28790420000
trusted library allocation
page read and write
23663237000
heap
page read and write
2878A45F000
heap
page read and write
23662C07000
heap
page read and write
236632CC000
heap
page read and write
23662C0F000
heap
page read and write
28B8F088000
heap
page read and write
93F000
stack
page read and write
23662517000
heap
page read and write
20AD34A3000
heap
page read and write
2AD202AF000
heap
page read and write
1D33C000
stack
page read and write
23662BF4000
heap
page read and write
BBB83FF000
stack
page read and write
1F1D3E81000
heap
page read and write
1DA51A50000
heap
page read and write
23662326000
heap
page read and write
23663239000
heap
page read and write
21538CE3000
heap
page read and write
408000
unkown
page readonly
23662C32000
heap
page read and write
98000
stack
page read and write
AE3DB7E000
unkown
page read and write
2927000
trusted library allocation
page read and write
649000
unkown
page execute read
23662C41000
heap
page read and write
23663270000
heap
page read and write
1814000
heap
page read and write
25427600000
heap
page read and write
12339E13000
heap
page read and write
23662BDA000
heap
page read and write
2878C243000
heap
page read and write
1F1D46E0000
trusted library allocation
page read and write
2366231B000
heap
page read and write
1832000
heap
page read and write
21538C7F000
heap
page read and write
236625DC000
heap
page read and write
23663242000
heap
page read and write
2878A4FC000
heap
page read and write
236634C3000
heap
page read and write
2878C296000
heap
page read and write
12339DB0000
trusted library allocation
page read and write
236625C0000
heap
page read and write
23662C32000
heap
page read and write
17F4000
heap
page read and write
1D50C000
stack
page read and write
26E95783000
heap
page read and write
3420000
trusted library allocation
page read and write
201E7EAB000
heap
page read and write
2878C254000
heap
page read and write
236624F8000
heap
page read and write
28B8EF90000
heap
page read and write
7B0000
heap
page read and write
1D04E000
stack
page read and write
236625EB000
heap
page read and write
2366336A000
heap
page read and write
7B0000
heap
page read and write
23663237000
heap
page read and write
23663314000
heap
page read and write
1814000
heap
page read and write
2366327F000
heap
page read and write
23663286000
heap
page read and write
2AD202AD000
heap
page read and write
23662BF3000
heap
page read and write
236625BD000
heap
page read and write
BC0000
heap
page read and write
7B0000
heap
page read and write
3240000
trusted library allocation
page read and write
21538CB1000
heap
page read and write
23662BF8000
heap
page read and write
201E893B000
heap
page read and write
23662BF5000
heap
page read and write
2878A517000
heap
page read and write
2AD201F0000
unclassified section
page readonly
40A000
unkown
page write copy
4F5000
heap
page read and write
236625C0000
heap
page read and write
23662C32000
heap
page read and write
7D9D7FB000
stack
page read and write
1F1D3E2B000
heap
page read and write
201E8E29000
heap
page read and write
26E956D0000
heap
page read and write
23662C55000
heap
page read and write
23662BE4000
heap
page read and write
12339E76000
heap
page read and write
28B8F051000
heap
page read and write
2878A4EF000
heap
page read and write
201E7E8B000
heap
page read and write
1ACC5B40000
heap
page read and write
23662BD1000
heap
page read and write
23663270000
heap
page read and write
23662BDD000
heap
page read and write
7B0000
heap
page read and write
23663239000
heap
page read and write
12339EBC000
heap
page read and write
236632F1000
heap
page read and write
23663270000
heap
page read and write
236632CC000
heap
page read and write
7FF000
stack
page read and write
1C0000
remote allocation
page read and write
17D4000
heap
page read and write
7FF000
stack
page read and write
201E7D80000
heap
page read and write
28B8EE70000
heap
page read and write
236624FE000
heap
page read and write
460000
unkown
page read and write
2878A4D9000
heap
page read and write
1592C017000
heap
page read and write
427000
unkown
page read and write
1C0000
remote allocation
page read and write
2366322F000
heap
page read and write
1D23E000
stack
page read and write
17E4000
heap
page read and write
83E000
stack
page read and write
236625D0000
heap
page read and write
7B0000
heap
page read and write
236625BD000
heap
page read and write
201E7E80000
heap
page read and write
23662BE4000
heap
page read and write
7C16BFF000
stack
page read and write
23662584000
heap
page read and write
236624F1000
heap
page read and write
2366231A000
heap
page read and write
20AD3462000
heap
page read and write
941C4EB000
stack
page read and write
21538C98000
heap
page read and write
236625C0000
heap
page read and write
422000
unkown
page read and write
1814000
heap
page read and write
28B8F013000
heap
page read and write
1F1D3E20000
heap
page read and write
17EC000
heap
page read and write
17E8000
heap
page read and write
40A000
unkown
page write copy
1F1D3D70000
heap
page read and write
408000
unkown
page readonly
2366331D000
heap
page read and write
23662C54000
heap
page read and write
236632CC000
heap
page read and write
20AD3240000
heap
page read and write
7B0000
heap
page read and write
8D917E000
stack
page read and write
2878AF19000
heap
page read and write
23663239000
heap
page read and write
23662536000
heap
page read and write
23662BE0000
heap
page read and write
23662C1C000
heap
page read and write
2878A2F0000
heap
page read and write
595000
heap
page read and write
236625D0000
heap
page read and write
25427670000
heap
page read and write
2927000
trusted library allocation
page read and write
239E000
stack
page read and write
740000
heap
page read and write
33A0000
remote allocation
page read and write
23662BD1000
heap
page read and write
201E7E90000
heap
page read and write
7B0000
heap
page read and write
23662CAC000
heap
page read and write
7FF000
stack
page read and write
254291F0000
remote allocation
page read and write
23662C93000
heap
page read and write
594000
heap
page read and write
1D0000
unclassified section
page readonly
1FE447D000
stack
page read and write
20AD346B000
heap
page read and write
2366331D000
heap
page read and write
23663252000
heap
page read and write
7B0000
heap
page read and write
20AD33C0000
unclassified section
page readonly
21538C95000
heap
page read and write
594000
heap
page read and write
23662317000
heap
page read and write
462000
unkown
page readonly
17CE000
heap
page read and write
287904F0000
remote allocation
page read and write
1ACC5C49000
heap
page read and write
236632D8000
heap
page read and write
23662BF4000
heap
page read and write
236625DC000
heap
page read and write
23662C8F000
heap
page read and write
1D15E000
stack
page read and write
40A000
unkown
page read and write
1866000
heap
page read and write
12339EA0000
heap
page read and write
510000
heap
page read and write
2366338A000
heap
page read and write
23663239000
heap
page read and write
1D2FE340000
heap
page read and write
2AD2022A000
heap
page read and write
1F1D3E82000
heap
page read and write
5EA000
unkown
page execute read
2878A451000
heap
page read and write
23662C93000
heap
page read and write
236625A4000
heap
page read and write
23662310000
heap
page read and write
28790487000
trusted library allocation
page read and write
610C000
stack
page read and write
5AB000
heap
page read and write
755000
heap
page read and write
236625FC000
heap
page read and write
23662BE0000
heap
page read and write
23662BFD000
heap
page read and write
595000
heap
page read and write
21538D50000
heap
page read and write
184C000
heap
page read and write
23663235000
heap
page read and write
201E8910000
heap
page read and write
21538DC0000
heap
page read and write
25F0000
trusted library allocation
page read and write
400000
unkown
page readonly
1ACC5D15000
trusted library allocation
page read and write
21538C8F000
heap
page read and write
33CE000
heap
page read and write
23662BFC000
heap
page read and write
2366322F000
heap
page read and write
2366325A000
heap
page read and write
201E7E24000
heap
page read and write
2878C160000
trusted library allocation
page read and write
197E000
heap
page read and write
2366336A000
heap
page read and write
1592C1AD000
heap
page read and write
236631E9000
heap
page read and write
2366322F000
heap
page read and write
192D1FC000
stack
page read and write
7B0000
heap
page read and write
26E95783000
heap
page read and write
23662BF4000
heap
page read and write
70FC4000
unkown
page readonly
A7E000
stack
page read and write
236625ED000
heap
page read and write
23662292000
heap
page read and write
23663239000
heap
page read and write
23663221000
heap
page read and write
26E95740000
heap
page read and write
1D2FEDF0000
trusted library allocation
page read and write
21538F18000
heap
page read and write
AE3D9FE000
stack
page read and write
23662BF5000
heap
page read and write
1ACC5D40000
heap
page read and write
236631F2000
heap
page read and write
1D2FED30000
trusted library allocation
page read and write
23662C02000
heap
page read and write
28790464000
trusted library allocation
page read and write
C8D159C000
stack
page read and write
201E7E38000
heap
page read and write
408000
unkown
page readonly
236625C0000
heap
page read and write
201E8E6A000
heap
page read and write
40A000
unkown
page read and write
40A000
unkown
page write copy
236631D0000
heap
page read and write
23662C17000
heap
page read and write
23663282000
heap
page read and write
3481000
heap
page read and write
20AD346D000
heap
page read and write
23662C6A000
heap
page read and write
23662BFE000
heap
page read and write
28B8F073000
heap
page read and write
201E8913000
heap
page read and write
23662C8F000
heap
page read and write
21538CA5000
heap
page read and write
AA2157A000
stack
page read and write
23663201000
heap
page read and write
2674000
heap
page read and write
21538CEF000
heap
page read and write
33C1000
trusted library allocation
page read and write
23662347000
heap
page read and write
28B8F07E000
heap
page read and write
21538213000
heap
page read and write
23662C27000
heap
page read and write
20AD342B000
heap
page read and write
1D200000
remote allocation
page read and write
A7E000
stack
page read and write
19B1000
heap
page read and write
30000
heap
page read and write
2AD2026B000
heap
page read and write
7B0000
heap
page read and write
28B8F049000
heap
page read and write
1592C1A5000
heap
page read and write
3367000
heap
page read and write
214C34F0000
heap
page read and write
23662337000
heap
page read and write
85FD2FE000
stack
page read and write
2AD20200000
heap
page read and write
23662C86000
heap
page read and write
2AD203AB000
heap
page read and write
236625BD000
heap
page read and write
BB0000
heap
page read and write
1592C1BF000
heap
page read and write
23663234000
heap
page read and write
2878A445000
heap
page read and write
21538C80000
heap
page read and write
2878A4A8000
heap
page read and write
201E8D80000
remote allocation
page read and write
20AD3469000
heap
page read and write
2366250C000
heap
page read and write
1814000
heap
page read and write
236625D4000
heap
page read and write
214C4000000
heap
page read and write
2366233A000
heap
page read and write
236625EB000
heap
page read and write
23663252000
heap
page read and write
23662C8A000
heap
page read and write
23662BF3000
heap
page read and write
23662325000
heap
page read and write
401000
unkown
page execute read
7B0000
heap
page read and write
1F1D3E5D000
heap
page read and write
28B8F07D000
heap
page read and write
23662CAC000
heap
page read and write
7B0000
heap
page read and write
23662336000
heap
page read and write
2153821A000
heap
page read and write
23663259000
heap
page read and write
236625F9000
heap
page read and write
23663228000
heap
page read and write
29F6000
trusted library allocation
page read and write
3A70000
trusted library allocation
page read and write
1CFCD000
stack
page read and write
2366327F000
heap
page read and write
2878A46D000
heap
page read and write
12339E40000
heap
page read and write
291F000
stack
page read and write
462000
unkown
page readonly
591000
heap
page read and write
5C1D1FF000
stack
page read and write
236631EC000
heap
page read and write
2878A506000
heap
page read and write
400000
unkown
page readonly
2AD2029B000
heap
page read and write
2153820E000
heap
page read and write
28B8F084000
heap
page read and write
23E0000
trusted library allocation
page read and write
23662BFE000
heap
page read and write
12339E50000
heap
page read and write
2AD20D69000
heap
page read and write
2366231B000
heap
page read and write
23662C8F000
heap
page read and write
1C0E000
stack
page read and write
408000
unkown
page readonly
236632CC000
heap
page read and write
21538CB3000
heap
page read and write
2878C29C000
heap
page read and write
23675CA0000
heap
page read and write
23663259000
heap
page read and write
BAE000
stack
page read and write
2AD20D92000
heap
page read and write
5EE000
unkown
page execute read
19F5000
heap
page read and write
462000
unkown
page readonly
1DA51A38000
heap
page read and write
23663237000
heap
page read and write
236632CC000
heap
page read and write
201E7EAC000
heap
page read and write
2366322F000
heap
page read and write
201E8937000
heap
page read and write
17EC000
heap
page read and write
28B8F08D000
heap
page read and write
23662C0D000
heap
page read and write
236632CC000
heap
page read and write
5D2E000
stack
page read and write
236625DC000
heap
page read and write
7B0000
heap
page read and write
21538CAE000
heap
page read and write
23662553000
heap
page read and write
7D9D67C000
stack
page read and write
1592BFE0000
heap
page read and write
30000
heap
page read and write
20AD345B000
heap
page read and write
254291F0000
remote allocation
page read and write
23662333000
heap
page read and write
26E95776000
heap
page read and write
201E8929000
heap
page read and write
1D0000
unclassified section
page readonly
1D2FE493000
heap
page read and write
236625FC000
heap
page read and write
23662BFA000
heap
page read and write
1592C1BD000
heap
page read and write
23662C6A000
heap
page read and write
70FC4000
unkown
page readonly
19F6000
heap
page read and write
201E7EA9000
heap
page read and write
23662538000
heap
page read and write
236625D4000
heap
page read and write
462000
unkown
page readonly
61D2E7E000
stack
page read and write
201E897F000
heap
page read and write
23662562000
heap
page read and write
1F1D3E1B000
heap
page read and write
28B8F802000
trusted library allocation
page read and write
422000
unkown
page read and write
1D00E000
stack
page read and write
30000
heap
page read and write
236634C3000
heap
page read and write
1814000
heap
page read and write
21538CAD000
heap
page read and write
1ACC6000000
heap
page read and write
23662BF7000
heap
page read and write
23662517000
heap
page read and write
1CB30000
heap
page read and write
AE3DC7B000
stack
page read and write
3C9B000
stack
page read and write
1F1D3E5A000
heap
page read and write
2878AE00000
heap
page read and write
9D4CD9B000
stack
page read and write
2366322F000
heap
page read and write
23663200000
heap
page read and write
1DA51C30000
heap
page read and write
435000
unkown
page read and write
1D2FE46D000
heap
page read and write
BBB85F9000
stack
page read and write
236625A3000
heap
page read and write
1814000
heap
page read and write
201E892D000
heap
page read and write
28790420000
trusted library allocation
page read and write
23662325000
heap
page read and write
201E8802000
heap
page read and write
2878C174000
trusted library allocation
page read and write
1ACC6100000
heap
page read and write
4F0000
heap
page read and write
21538C8F000
heap
page read and write
23675E71000
heap
page read and write
23662BE1000
heap
page read and write
7B0000
heap
page read and write
201E8E92000
heap
page read and write
1D43C000
stack
page read and write
23662C49000
heap
page read and write
21538DCE000
heap
page read and write
23662514000
heap
page read and write
2878C352000
heap
page read and write
2878A4C6000
heap
page read and write
201E7E92000
heap
page read and write
23675E40000
heap
page read and write
7B0000
heap
page read and write
20AD3440000
heap
page read and write
7B0000
heap
page read and write
23663314000
heap
page read and write
266C000
stack
page read and write
7B0000
heap
page read and write
2878A4C2000
heap
page read and write
23662BD8000
heap
page read and write
19A000
stack
page read and write
7C166DC000
stack
page read and write
23662C93000
heap
page read and write
1FE3A8B000
stack
page read and write
201E7E38000
heap
page read and write
1DA51A40000
heap
page read and write
B45000
heap
page read and write
2366327F000
heap
page read and write
1ACC6100000
heap
page read and write
2878C140000
trusted library allocation
page read and write
23662BE2000
heap
page read and write
1ACC6102000
heap
page read and write
2F8E000
stack
page read and write
21538C73000
heap
page read and write
201E8E13000
heap
page read and write
20AD3493000
heap
page read and write
AC0000
heap
page read and write
23663270000
heap
page read and write
2878A440000
heap
page read and write
23662C8C000
heap
page read and write
3A2B000
heap
page read and write
56AE000
stack
page read and write
26E95755000
heap
page read and write
2AD20DC1000
heap
page read and write
A80000
trusted library allocation
page read and write
7B0000
heap
page read and write
23662C01000
heap
page read and write
986719D000
stack
page read and write
192CC7B000
stack
page read and write
20AD3459000
heap
page read and write
AE3D7FB000
stack
page read and write
941CC7B000
stack
page read and write
1D2FED80000
trusted library allocation
page read and write
7B0000
heap
page read and write
23662302000
heap
page read and write
21538DC7000
heap
page read and write
2AD20DF6000
heap
page read and write
201E7E13000
heap
page read and write
236634F3000
heap
page read and write
1592C1C4000
heap
page read and write
7B0000
heap
page read and write
23662C60000
heap
page read and write
23662C8A000
heap
page read and write
6F7C6000
unkown
page readonly
7B0000
heap
page read and write
1FE45FD000
stack
page read and write
3B6C000
stack
page read and write
3485000
heap
page read and write
201E8E9F000
heap
page read and write
1D0000
unclassified section
page readonly
20AD34A0000
heap
page read and write
83E000
stack
page read and write
26E95783000
heap
page read and write
4F49000
trusted library allocation
page read and write
23662C8F000
heap
page read and write
1ACC5D02000
trusted library allocation
page read and write
2878C35B000
heap
page read and write
2366331D000
heap
page read and write
214C362A000
heap
page read and write
23662312000
heap
page read and write
23662C12000
heap
page read and write
12339E6B000
heap
page read and write
400000
unkown
page readonly
23663253000
heap
page read and write
201E8E1E000
heap
page read and write
1DA51A2B000
heap
page read and write
1F1D3E77000
heap
page read and write
BC0000
heap
page read and write
3A70000
trusted library allocation
page read and write
17CE000
heap
page read and write
20AD345E000
heap
page read and write
2878C304000
heap
page read and write
2878C341000
heap
page read and write
462000
unkown
page readonly
23662539000
heap
page read and write
BBB86F5000
stack
page read and write
2879048A000
trusted library allocation
page read and write
408000
unkown
page readonly
201E7E88000
heap
page read and write
57D000
heap
page read and write
21538CA7000
heap
page read and write
2542792A000
heap
page read and write
23663314000
heap
page read and write
21538CC4000
heap
page read and write
23662C01000
heap
page read and write
2AD20D32000
heap
page read and write
3480000
heap
page read and write
6F7C1000
unkown
page execute read
1DA521E5000
heap
page read and write
236625BD000
heap
page read and write
4E92000
trusted library allocation
page read and write
201E892F000
heap
page read and write
192CCFF000
stack
page read and write
23662C17000
heap
page read and write
25427900000
heap
page read and write
23662BE1000
heap
page read and write
7B0000
heap
page read and write
236622B8000
heap
page read and write
23662336000
heap
page read and write
28790437000
trusted library allocation
page read and write
23662BE6000
heap
page read and write
28790400000
trusted library allocation
page read and write
1853000
heap
page read and write
23662C17000
heap
page read and write
23662BFB000
heap
page read and write
1F1D3E4C000
heap
page read and write
21538CF5000
heap
page read and write
1D27E000
stack
page read and write
1A70000
trusted library allocation
page read and write
5AB000
heap
page read and write
23662C93000
heap
page read and write
2F0B000
stack
page read and write
7B0000
heap
page read and write
23662C84000
heap
page read and write
236625BD000
heap
page read and write
20AD3487000
heap
page read and write
20AD3494000
heap
page read and write
2927000
trusted library allocation
page read and write
594000
heap
page read and write
2879052A000
trusted library allocation
page read and write
3400000
trusted library allocation
page read and write
23662C38000
heap
page read and write
2878BC10000
trusted library allocation
page read and write
201E897C000
heap
page read and write
23662584000
heap
page read and write
236631E2000
heap
page read and write
1836000
heap
page read and write
1D2FEDC0000
trusted library allocation
page read and write
400000
unkown
page readonly
12339E2B000
heap
page read and write
3C6B000
stack
page read and write
236625D0000
heap
page read and write
1D2FE3A0000
heap
page read and write
1592C021000
heap
page read and write
28B8F000000
heap
page read and write
201E7E44000
heap
page read and write
1CB11000
heap
page read and write
1ACC5B70000
trusted library allocation
page read and write
201E8D80000
remote allocation
page read and write
23662C03000
heap
page read and write
2878A4A2000
heap
page read and write
23662BFD000
heap
page read and write
19F1000
heap
page read and write
23663237000
heap
page read and write
7B0000
heap
page read and write
462000
unkown
page readonly
7B0000
heap
page read and write
401000
unkown
page execute read
7B0000
heap
page read and write
23662BDA000
heap
page read and write
1CB31000
heap
page read and write
2260878000
stack
page read and write
236625D7000
heap
page read and write
3C6B000
stack
page read and write
1F1D3DD0000
heap
page read and write
236625D7000
heap
page read and write
21538C7A000
heap
page read and write
7B0000
heap
page read and write
1592C04E000
heap
page read and write
236631F2000
heap
page read and write
2AD20378000
heap
page read and write
7B0000
heap
page read and write
21538DCA000
heap
page read and write
408000
unkown
page readonly
1F1D4800000
heap
page read and write
12339EAD000
heap
page read and write
2366322F000
heap
page read and write
201E892C000
heap
page read and write
1D2FE44D000
heap
page read and write
23662C17000
heap
page read and write
2878C400000
trusted library allocation
page read and write
1DA521E6000
heap
page read and write
1CFAE000
stack
page read and write
762000
heap
page read and write
23662C88000
heap
page read and write
226028B000
stack
page read and write
201E8EA5000
heap
page read and write
23663242000
heap
page read and write
23662C89000
heap
page read and write
61D2F7E000
stack
page read and write
23662337000
heap
page read and write
2878C2A2000
heap
page read and write
7B0000
heap
page read and write
7B0000
heap
page read and write
215381FC000
heap
page read and write
23663221000
heap
page read and write
2AD20DE0000
heap
page read and write
617000
heap
page read and write
2366322F000
heap
page read and write
A7E000
stack
page read and write
3451000
heap
page read and write
C8D1B7E000
stack
page read and write
7B0000
heap
page read and write
2366228B000
heap
page read and write
941CB7D000
stack
page read and write
21538C74000
heap
page read and write
2878C261000
heap
page read and write
21538D01000
heap
page read and write
12339EC1000
heap
page read and write
5AB000
heap
page read and write
214C3638000
heap
page read and write
739000
heap
page read and write
70FD6000
unkown
page readonly
201E8956000
heap
page read and write
1AEE000
stack
page read and write
24D0000
heap
page read and write
2366256B000
heap
page read and write
236625C0000
heap
page read and write
1865000
heap
page read and write
23662BF4000
heap
page read and write
12339E57000
heap
page read and write
28790443000
trusted library allocation
page read and write
246F000
stack
page read and write
23663286000
heap
page read and write
23662C27000
heap
page read and write
401000
unkown
page execute read
201E7ED7000
heap
page read and write
7B0000
heap
page read and write
460000
unkown
page read and write
25427873000
heap
page read and write
201E7E92000
heap
page read and write
201E8970000
heap
page read and write
192CFFE000
stack
page read and write
236632CC000
heap
page read and write
2878BB01000
trusted library allocation
page read and write
2366336A000
heap
page read and write
28790427000
trusted library allocation
page read and write
5C1D6FC000
stack
page read and write
3240000
trusted library allocation
page read and write
1C56000
heap
page read and write
7B0000
heap
page read and write
626000
unkown
page execute read
AE3D5FE000
stack
page read and write
201E7ED9000
heap
page read and write
1788000
heap
page read and write
594000
heap
page read and write
23662302000
heap
page read and write
23662BF4000
heap
page read and write
236632AF000
heap
page read and write
514000
heap
page read and write
2AD20257000
heap
page read and write
2AD20288000
heap
page read and write
1592C023000
heap
page read and write
287904CF000
trusted library allocation
page read and write
201E7E90000
heap
page read and write
79D000
heap
page read and write
201E8974000
heap
page read and write
23662BED000
heap
page read and write
28790470000
trusted library allocation
page read and write
70FC4000
unkown
page readonly
23662BE5000
heap
page read and write
7D9D8FF000
stack
page read and write
2366322F000
heap
page read and write
25427913000
heap
page read and write
2366322F000
heap
page read and write
23663237000
heap
page read and write
1592C1B7000
heap
page read and write
2878A48D000
heap
page read and write
25429202000
trusted library allocation
page read and write
BAE000
stack
page read and write
254291A0000
trusted library allocation
page read and write
236625D4000
heap
page read and write
2366336E000
heap
page read and write
201E7F02000
heap
page read and write
1F1D3EAF000
heap
page read and write
5C1CCCC000
stack
page read and write
365F000
stack
page read and write
23662C4E000
heap
page read and write
3347000
heap
page read and write
771000
heap
page read and write
7B0000
heap
page read and write
21538F10000
heap
page read and write
337F000
heap
page read and write
8D8E7E000
stack
page read and write
236632CC000
heap
page read and write
510000
heap
page read and write
2366229E000
heap
page read and write
70FC0000
unkown
page readonly
23662BDA000
heap
page read and write
28B8F055000
heap
page read and write
2878A446000
heap
page read and write
23662C1F000
heap
page read and write
2878C140000
trusted library allocation
page read and write
1D19F000
stack
page read and write
9D4DCFC000
stack
page read and write
20AD3458000
heap
page read and write
2EA0000
heap
page read and write
BC5000
heap
page read and write
7B0000
heap
page read and write
236624FB000
heap
page read and write
3384000
heap
page read and write
28790700000
trusted library allocation
page read and write
23662C26000
heap
page read and write
28790477000
trusted library allocation
page read and write
7B0000
heap
page read and write
1D2FEDB0000
trusted library allocation
page read and write
23662C48000
heap
page read and write
7B0000
heap
page read and write
23662C01000
heap
page read and write
2878A4A5000
heap
page read and write
7B0000
heap
page read and write
BC0000
heap
page read and write
2878AF00000
heap
page read and write
20AD3460000
heap
page read and write
400000
unkown
page readonly
23662BEF000
heap
page read and write
21538CEB000
heap
page read and write
1FE407D000
stack
page read and write
21538CBC000
heap
page read and write
201E892B000
heap
page read and write
2366331D000
heap
page read and write
2F40000
unclassified section
page readonly
AE3D4F7000
stack
page read and write
1592C0E0000
heap
page read and write
23663270000
heap
page read and write
21538F2C000
heap
page read and write
23663226000
heap
page read and write
23662BE1000
heap
page read and write
23662C94000
heap
page read and write
21538CAD000
heap
page read and write
24A0000
heap
page read and write
3AB0000
trusted library allocation
page read and write
7B0000
heap
page read and write
5E8000
unkown
page execute read
201E8E18000
heap
page read and write
40A000
unkown
page read and write
23675DB0000
unclassified section
page readonly
23662C0C000
heap
page read and write
21538C73000
heap
page read and write
7B0000
heap
page read and write
1DA51A40000
heap
page read and write
23662490000
trusted library allocation
page read and write
30000
heap
page read and write
7AF000
heap
page read and write
20AD3431000
heap
page read and write
3B6C000
stack
page read and write
7B0000
heap
page read and write
2AD20E23000
heap
page read and write
97E000
stack
page read and write
AC0000
heap
page read and write
400000
unkown
page readonly
C8D18FF000
stack
page read and write
23662BD8000
heap
page read and write
61D292E000
stack
page read and write
12339D50000
unclassified section
page readonly
23662C46000
heap
page read and write
21538CA3000
heap
page read and write
21538CAD000
heap
page read and write
3A70000
trusted library allocation
page read and write
23662BF3000
heap
page read and write
26E95660000
heap
page read and write
462000
unkown
page readonly
401000
unkown
page execute read
26E9576F000
heap
page read and write
7C1675E000
stack
page read and write
400000
unkown
page readonly
236625FE000
heap
page read and write
85FCF3A000
stack
page read and write
537000
heap
page read and write
20AD345D000
heap
page read and write
236625EC000
heap
page read and write
12339C40000
heap
page read and write
40A000
unkown
page write copy
1592C021000
heap
page read and write
23662C6C000
heap
page read and write
26E95776000
heap
page read and write
1DA51A45000
heap
page read and write
23662BD2000
heap
page read and write
33E9000
heap
page read and write
23662257000
heap
page read and write
28B8F090000
heap
page read and write
7B0000
heap
page read and write
3AB0000
trusted library allocation
page read and write
427000
unkown
page read and write
30000
heap
page read and write
201E892D000
heap
page read and write
236625F0000
heap
page read and write
1ACC5C11000
unkown
page read and write
21538C96000
heap
page read and write
23662C94000
heap
page read and write
1D83E000
stack
page read and write
20AD3461000
heap
page read and write
236634E5000
heap
page read and write
23662BE3000
heap
page read and write
20AD3400000
heap
page read and write
1D2FE48F000
heap
page read and write
23663259000
heap
page read and write
7B0000
heap
page read and write
1884000
heap
page read and write
236625D1000
heap
page read and write
21538C6F000
heap
page read and write
1DA521F6000
heap
page read and write
20AD3467000
heap
page read and write
25427917000
heap
page read and write
236625D0000
heap
page read and write
7B0000
heap
page read and write
201E8932000
heap
page read and write
1F1D3E94000
heap
page read and write
594000
heap
page read and write
215381FC000
heap
page read and write
28790467000
trusted library allocation
page read and write
20AD3441000
heap
page read and write
2AD20D32000
heap
page read and write
23663239000
heap
page read and write
23662BF4000
heap
page read and write
236765B0000
trusted library allocation
page read and write
437000
unkown
page read and write
23662BF7000
heap
page read and write
201E890E000
heap
page read and write
594000
heap
page read and write
236625DC000
heap
page read and write
462000
unkown
page readonly
23663235000
heap
page read and write
236625FB000
heap
page read and write
23662577000
heap
page read and write
236632CC000
heap
page read and write
19A000
stack
page read and write
23663245000
heap
page read and write
21538300000
heap
page read and write
5920000
trusted library allocation
page read and write
5C2E000
stack
page read and write
7B0000
heap
page read and write
23662C2B000
heap
page read and write
AE3D0CB000
stack
page read and write
23663229000
heap
page read and write
28B8F040000
heap
page read and write
23662C30000
heap
page read and write
2878A280000
heap
page read and write
1D2CC000
stack
page read and write
2AD2036E000
heap
page read and write
57FE000
stack
page read and write
201E8962000
heap
page read and write
21538CAE000
heap
page read and write
3B9C000
stack
page read and write
23663322000
heap
page read and write
25427790000
heap
page read and write
23662C15000
heap
page read and write
23662BFD000
heap
page read and write
1ACC6113000
heap
page read and write
12339BE0000
heap
page read and write
1DA51A42000
heap
page read and write
23663239000
heap
page read and write
2AD20400000
heap
page read and write
23662C8F000
heap
page read and write
1FE44FF000
stack
page read and write
23662338000
heap
page read and write
460000
unkown
page read and write
28B8F03B000
heap
page read and write
236631ED000
heap
page read and write
741000
heap
page read and write
201E890E000
heap
page read and write
25427895000
heap
page read and write
3361000
heap
page read and write
23662CAC000
heap
page read and write
23662C69000
heap
page read and write
1D0000
unclassified section
page readonly
201E8E34000
heap
page read and write
214C368C000
heap
page read and write
7B0000
heap
page read and write
1D2FED40000
trusted library allocation
page read and write
28B8F066000
heap
page read and write
1D2FE400000
heap
page read and write
530000
heap
page read and write
23662C00000
heap
page read and write
17D4000
heap
page read and write
23663235000
heap
page read and write
1836000
heap
page read and write
1592C1A0000
heap
page read and write
1A6F000
stack
page read and write
462000
unkown
page readonly
19AE000
heap
page read and write
AC0000
heap
page read and write
2AD20E02000
heap
page read and write
1979000
heap
page read and write
AE3D6FF000
stack
page read and write
215381BB000
heap
page read and write
201E890E000
heap
page read and write
236625A4000
heap
page read and write
7B0000
heap
page read and write
7B0000
heap
page read and write
28B8F075000
heap
page read and write
17E8000
heap
page read and write
201E8E45000
heap
page read and write
3340000
heap
page read and write
23662C1C000
heap
page read and write
20AD3C02000
trusted library allocation
page read and write
23662C6A000
heap
page read and write
1D6BF000
stack
page read and write
2879047A000
trusted library allocation
page read and write
1D0CE000
stack
page read and write
23662C1C000
heap
page read and write
23663290000
heap
page read and write
2366251B000
heap
page read and write
2AD20E00000
heap
page read and write
1814000
heap
page read and write
20AD3496000
heap
page read and write
7B0000
heap
page read and write
20AD346A000
heap
page read and write
1592BFC0000
trusted library allocation
page read and write
2AD20287000
heap
page read and write
23662C94000
heap
page read and write
940000
trusted library allocation
page read and write
201E8E6C000
heap
page read and write
23663286000
heap
page read and write
2AD20D73000
heap
page read and write
1D0000
unclassified section
page readonly
2AD20D9C000
heap
page read and write
1F1D3E9D000
heap
page read and write
1880000
heap
page read and write
236632F1000
heap
page read and write
7B0000
heap
page read and write
236625F9000
heap
page read and write
28B8F08B000
heap
page read and write
7B0000
heap
page read and write
21538305000
heap
page read and write
347E000
stack
page read and write
23662C94000
heap
page read and write
70FC1000
unkown
page execute read
1814000
heap
page read and write
2366321B000
heap
page read and write
1DA51C3D000
heap
page read and write
7B0000
heap
page read and write
B6E000
stack
page read and write
72A000
heap
page read and write
236631EA000
heap
page read and write
1F1D3E55000
heap
page read and write
23662C6C000
heap
page read and write
85FD37F000
stack
page read and write
17EC000
heap
page read and write
2366322F000
heap
page read and write
19A000
stack
page read and write
23663248000
heap
page read and write
23662C52000
heap
page read and write
214C3621000
heap
page read and write
1D2FE43B000
heap
page read and write
1D2FE464000
heap
page read and write
594000
heap
page read and write
1DA521F4000
heap
page read and write
201E7E90000
heap
page read and write
201E8976000
heap
page read and write
23662580000
heap
page read and write
7B0000
heap
page read and write
1A60000
trusted library allocation
page read and write
2AD20DB5000
heap
page read and write
23662C84000
heap
page read and write
21538C59000
heap
page read and write
1CB11000
heap
page read and write
201E8E00000
heap
page read and write
214C3600000
heap
page read and write
1233A602000
trusted library allocation
page read and write
1858000
heap
page read and write
2878AF04000
heap
page read and write
2879041C000
trusted library allocation
page read and write
21538F21000
heap
page read and write
422000
unkown
page read and write
21538C74000
heap
page read and write
591000
heap
page read and write
85FD3FF000
stack
page read and write
1F1D3F13000
heap
page read and write
21538DCE000
heap
page read and write
17F5000
heap
page read and write
23662C1C000
heap
page read and write
23662BD1000
heap
page read and write
23663228000
heap
page read and write
61D2C7E000
stack
page read and write
2AD200E0000
heap
page read and write
1D7FF000
stack
page read and write
7B0000
heap
page read and write
236625A4000
heap
page read and write
23662C01000
heap
page read and write
1DA51A2E000
heap
page read and write
236632F0000
heap
page read and write
1D57F000
stack
page read and write
780000
heap
page read and write
28B8F046000
heap
page read and write
5AEE000
stack
page read and write
7B0000
heap
page read and write
17D4000
heap
page read and write
236625EB000
heap
page read and write
23662C26000
heap
page read and write
26E95AE0000
heap
page read and write
2AD20E02000
heap
page read and write
23663270000
heap
page read and write
21538CC8000
heap
page read and write
201E890F000
heap
page read and write
23663235000
heap
page read and write
23663242000
heap
page read and write
1B31000
trusted library allocation
page read and write
2878A600000
unclassified section
page readonly
1D2FE446000
heap
page read and write
214C3700000
heap
page read and write
201E7E7E000
heap
page read and write
3240000
trusted library allocation
page read and write
201E8E26000
heap
page read and write
236625A3000
heap
page read and write
2AD203C4000
heap
page read and write
58D000
heap
page read and write
23662C55000
heap
page read and write
254291F0000
remote allocation
page read and write
7B0000
heap
page read and write
236634D2000
heap
page read and write
236625FC000
heap
page read and write
23663239000
heap
page read and write
21538C88000
heap
page read and write
23662C01000
heap
page read and write
70FC6000
unkown
page readonly
23662C08000
heap
page read and write
1DA519F0000
heap
page read and write
70FC6000
unkown
page readonly
2AD20E27000
heap
page read and write
2879042A000
trusted library allocation
page read and write
70FC0000
unkown
page readonly
236625FA000
heap
page read and write
8B96E9B000
stack
page read and write
7D9D6FE000
stack
page read and write
A80000
trusted library allocation
page read and write
21538C7E000
heap
page read and write
BBB82F9000
stack
page read and write
AA2137E000
stack
page read and write
23662250000
heap
page read and write
2878A49D000
heap
page read and write
21538C99000
heap
page read and write
23662BF4000
heap
page read and write
201E8984000
heap
page read and write
2878C264000
heap
page read and write
7B0000
heap
page read and write
236624F3000
heap
page read and write
1D2FEDD0000
trusted library allocation
page read and write
537000
heap
page read and write
21538DCA000
heap
page read and write
23675E3E000
heap
page read and write
28B8F020000
heap
page read and write
1ACC5D00000
trusted library allocation
page read and write
400000
unkown
page readonly
201E8976000
heap
page read and write
2366233B000
heap
page read and write
236625FE000
heap
page read and write
23663206000
heap
page read and write
400000
unkown
page readonly
2AD20E0A000
heap
page read and write
70FC0000
unkown
page readonly
26E95783000
heap
page read and write
6F7C4000
unkown
page readonly
236622BC000
heap
page read and write
23662C33000
heap
page read and write
19B000
stack
page read and write
1D2FE466000
heap
page read and write
23662C27000
heap
page read and write
2878C285000
heap
page read and write
1ACC5C00000
unkown
page read and write
23662C6A000
heap
page read and write
2878A4DC000
heap
page read and write
23662C23000
heap
page read and write
23675E2A000
heap
page read and write
21538CB1000
heap
page read and write
236634CB000
heap
page read and write
236625D7000
heap
page read and write
23662C13000
heap
page read and write
215381E5000
heap
page read and write
1D2FE3E0000
unclassified section
page readonly
590000
heap
page read and write
201E7EDF000
heap
page read and write
201E8974000
heap
page read and write
23663245000
heap
page read and write
2AD20DD2000
heap
page read and write
1D2FE454000
heap
page read and write
2878AF19000
heap
page read and write
BBB7F8C000
stack
page read and write
58FF000
stack
page read and write
401000
unkown
page execute read
184F000
heap
page read and write
7B0000
heap
page read and write
201E7F1A000
heap
page read and write
1840000
heap
page read and write
7B0000
heap
page read and write
3AB0000
trusted library allocation
page read and write
401000
unkown
page execute read
23662C07000
heap
page read and write
21538C74000
heap
page read and write
3390000
heap
page read and write
1D300000
remote allocation
page read and write
1592C1C5000
heap
page read and write
236631E9000
heap
page read and write
1592C1C6000
heap
page read and write
462000
unkown
page readonly
23663237000
heap
page read and write
236621B0000
heap
page read and write
1854000
heap
page read and write
201E8974000
heap
page read and write
23663237000
heap
page read and write
236625D4000
heap
page read and write
21538F28000
heap
page read and write
23662C46000
heap
page read and write
58D000
heap
page read and write
2AD20D54000
heap
page read and write
1D2FE502000
heap
page read and write
1D0CE000
stack
page read and write
1D0000
unclassified section
page readonly
214C4002000
heap
page read and write
1C0000
remote allocation
page read and write
236631A0000
remote allocation
page read and write
236625D4000
heap
page read and write
2153819B000
heap
page read and write
201E8994000
heap
page read and write
236632CC000
heap
page read and write
2878C110000
trusted library allocation
page read and write
214C3480000
heap
page read and write
70FD1000
unkown
page execute read
2366322F000
heap
page read and write
23662C3C000
heap
page read and write
201E8D80000
remote allocation
page read and write
510000
heap
page read and write
21538C38000
heap
page read and write
24A0000
heap
page read and write
20AD343E000
heap
page read and write
3C6B000
stack
page read and write
19A2000
heap
page read and write
3450000
heap
page read and write
98000
stack
page read and write
5C1D4FE000
stack
page read and write
236625C0000
heap
page read and write
20AD3BC0000
trusted library allocation
page read and write
21538CBD000
heap
page read and write
23662BFD000
heap
page read and write
20AD3451000
heap
page read and write
25427841000
heap
page read and write
12339EB8000
heap
page read and write
7C16C7C000
stack
page read and write
4CE000
stack
page read and write
23663252000
heap
page read and write
25427821000
heap
page read and write
2AD2028D000
heap
page read and write
7D9D87F000
stack
page read and write
23663235000
heap
page read and write
29EF000
stack
page read and write
1DA51C35000
heap
page read and write
23662C73000
heap
page read and write
2AD20DB5000
heap
page read and write
201E897C000
heap
page read and write
7B0000
heap
page read and write
2542782A000
heap
page read and write
23663237000
heap
page read and write
1660000
remote allocation
page execute and read and write
21538C6C000
heap
page read and write
23662312000
heap
page read and write
236625BD000
heap
page read and write
23663216000
heap
page read and write
246F000
stack
page read and write
1C0000
remote allocation
page read and write
23662C36000
heap
page read and write
BC5000
heap
page read and write
28B8EE10000
heap
page read and write
184F000
heap
page read and write
21538C96000
heap
page read and write
1D2FEE02000
trusted library allocation
page read and write
2878AF13000
heap
page read and write
236625DC000
heap
page read and write
201E8998000
heap
page read and write
23662BE1000
heap
page read and write
236625BD000
heap
page read and write
5C1D179000
stack
page read and write
23662C20000
heap
page read and write
1D5BC000
stack
page read and write
23662BE4000
heap
page read and write
236632CC000
heap
page read and write
6E8000
heap
page read and write
93F000
stack
page read and write
23662C6A000
heap
page read and write
23662150000
heap
page read and write
427000
unkown
page read and write
2AD202A2000
heap
page read and write
23662520000
heap
page read and write
8B96F9E000
stack
page read and write
236634CE000
heap
page read and write
201E892E000
heap
page read and write
600C000
stack
page read and write
437000
unkown
page read and write
1DA519F8000
heap
page read and write
214C3683000
heap
page read and write
21538CAD000
heap
page read and write
7C167DE000
stack
page read and write
1D2FED90000
trusted library allocation
page read and write
236625C0000
heap
page read and write
5A8000
heap
page read and write
291F000
stack
page read and write
1592C023000
heap
page read and write
287904BB000
trusted library allocation
page read and write
23662BF8000
heap
page read and write
2878C281000
heap
page read and write
2AD203AB000
heap
page read and write
23662BFE000
heap
page read and write
1C0000
remote allocation
page read and write
25427902000
heap
page read and write
201E7F3B000
heap
page read and write
1C4F000
stack
page read and write
23662C14000
heap
page read and write
2AD20DD7000
heap
page read and write
23663286000
heap
page read and write
2AD2037D000
heap
page read and write
291F000
stack
page read and write
28790460000
trusted library allocation
page read and write
2F90000
trusted library allocation
page read and write
1CB10000
heap
page read and write
1592C1B0000
heap
page read and write
1D200000
remote allocation
page read and write
201E892A000
heap
page read and write
2878AC00000
trusted library allocation
page read and write
1F1D4802000
heap
page read and write
2878A513000
heap
page read and write
214C367B000
heap
page read and write
3393000
heap
page read and write
23662BFD000
heap
page read and write
214C3640000
heap
page read and write
2878A434000
heap
page read and write
21538C8F000
heap
page read and write
1ACC5C2A000
heap
page read and write
2878A400000
heap
page read and write
192CDFE000
stack
page read and write
1592BE00000
heap
page read and write
5FCF000
stack
page read and write
AA2147E000
stack
page read and write
1832000
heap
page read and write
B6E000
stack
page read and write
7B0000
heap
page read and write
1DA51A38000
heap
page read and write
2878AE15000
heap
page read and write
2878C261000
heap
page read and write
20AD346C000
heap
page read and write
23663216000
heap
page read and write
1DA51B60000
heap
page read and write
28B8EF80000
unclassified section
page readonly
21538DC4000
heap
page read and write
1DA519D0000
trusted library allocation
page read and write
4F0000
heap
page read and write
23662C86000
heap
page read and write
21538CB5000
heap
page read and write
28790527000
trusted library allocation
page read and write
23663237000
heap
page read and write
201E7E00000
heap
page read and write
23663290000
heap
page read and write
1D97E000
stack
page read and write
23662317000
heap
page read and write
236625A4000
heap
page read and write
2878A413000
heap
page read and write
23662C6C000
heap
page read and write
2AD20D43000
heap
page read and write
C8D19FE000
stack
page read and write
23662BFC000
heap
page read and write
236625FE000
heap
page read and write
7B0000
heap
page read and write
20AD3429000
heap
page read and write
21538C96000
heap
page read and write
85FD27F000
stack
page read and write
28B8F08F000
heap
page read and write
1D2FE448000
heap
page read and write
40A000
unkown
page write copy
1D47E000
stack
page read and write
40A000
unkown
page read and write
23663245000
heap
page read and write
23662BE6000
heap
page read and write
9D4D279000
stack
page read and write
23662C32000
heap
page read and write
23662553000
heap
page read and write
12339EA2000
heap
page read and write
28790400000
trusted library allocation
page read and write
201E8929000
heap
page read and write
236625D1000
heap
page read and write
2878A424000
heap
page read and write
2AD20D98000
heap
page read and write
201E8E3F000
heap
page read and write
179E000
stack
page read and write
236632F1000
heap
page read and write
1D120000
heap
page read and write
25B0000
trusted library allocation
page read and write
2878C130000
trusted library allocation
page read and write
4ED9000
trusted library allocation
page read and write
401000
unkown
page execute read
28B8F089000
heap
page read and write
21538C96000
heap
page read and write
70FC1000
unkown
page execute read
1D27F000
stack
page read and write
23675E3A000
heap
page read and write
70FD4000
unkown
page readonly
201E7E95000
heap
page read and write
214C3810000
heap
page read and write
98000
stack
page read and write
7B0000
heap
page read and write
1C0000
remote allocation
page read and write
1C50000
heap
page read and write
1D300000
remote allocation
page read and write
21538CBC000
heap
page read and write
7B0000
heap
page read and write
2AD20A20000
trusted library allocation
page read and write
201E892F000
heap
page read and write
23662C3D000
heap
page read and write
201E896C000
heap
page read and write
1D2FE6D0000
heap
page read and write
23662BDB000
heap
page read and write
20AD34A8000
heap
page read and write
BBB84FF000
stack
page read and write
23675E7E000
heap
page read and write
23662580000
heap
page read and write
1836000
heap
page read and write
201E896B000
heap
page read and write
236625FE000
heap
page read and write
201E8E9F000
heap
page read and write
201E7EAE000
heap
page read and write
236631E2000
heap
page read and write
23662BE8000
heap
page read and write
236625FE000
heap
page read and write
1C0000
remote allocation
page read and write
50A0000
heap
page read and write
236632CC000
heap
page read and write
BBB867F000
stack
page read and write
23662BE4000
heap
page read and write
4CE000
stack
page read and write
1D2FED70000
trusted library allocation
page read and write
236631A0000
remote allocation
page read and write
23662C28000
heap
page read and write
2366322F000
heap
page read and write
A80000
trusted library allocation
page read and write
40A000
unkown
page write copy
2542789D000
heap
page read and write
23662C84000
heap
page read and write
23662C6E000
heap
page read and write
1D2FE432000
heap
page read and write
236622B8000
heap
page read and write
19F3000
heap
page read and write
401000
unkown
page execute read
236631E2000
heap
page read and write
23662C16000
heap
page read and write
57D000
heap
page read and write
1780000
heap
page read and write
401000
unkown
page execute read
23662325000
heap
page read and write
23662C53000
heap
page read and write
789000
heap
page read and write
23662C88000
heap
page read and write
20AD33D0000
heap
page read and write
21538C8F000
heap
page read and write
4F0000
heap
page read and write
214C3E00000
trusted library allocation
page read and write
1D2FE513000
heap
page read and write
401000
unkown
page execute read
26E9575B000
heap
page read and write
7B0000
heap
page read and write
23663323000
heap
page read and write
5ECE000
stack
page read and write
1D2FE482000
heap
page read and write
214C4015000
heap
page read and write
9C000
stack
page read and write
201E7D30000
heap
page read and write
1C0000
remote allocation
page read and write
7B0000
heap
page read and write
7B0000
heap
page read and write
23676602000
trusted library allocation
page read and write
1CF8D000
stack
page read and write
2366327F000
heap
page read and write
23662577000
heap
page read and write
236625F9000
heap
page read and write
201E8929000
heap
page read and write
70FC6000
unkown
page readonly
201E7EF0000
heap
page read and write
215381E5000
heap
page read and write
21538080000
heap
page read and write
23662BD8000
heap
page read and write
23662C1F000
heap
page read and write
2878AF5A000
heap
page read and write
7B0000
heap
page read and write
23662BF5000
heap
page read and write
236634C9000
heap
page read and write
7B0000
heap
page read and write
7B0000
heap
page read and write
1D0000
unclassified section
page readonly
98675FE000
stack
page read and write
21538DC2000
heap
page read and write
1F1D3EBE000
heap
page read and write
7B0000
heap
page read and write
23662C20000
heap
page read and write
201E8929000
heap
page read and write
73D000
heap
page read and write
7B0000
heap
page read and write
23662C94000
heap
page read and write
236625A3000
heap
page read and write
8B972FD000
stack
page read and write
236625BD000
heap
page read and write
28B8F07F000
heap
page read and write
1D2FE486000
heap
page read and write
2AD2038C000
heap
page read and write
236631EB000
heap
page read and write
12339EB1000
heap
page read and write
23662C20000
heap
page read and write
7B0000
heap
page read and write
21538F1F000
heap
page read and write
23662BFE000
heap
page read and write
192D67E000
stack
page read and write
9D4DEFE000
stack
page read and write
28B8F086000
heap
page read and write
2AD20396000
heap
page read and write
2AD202A8000
heap
page read and write
23663242000
heap
page read and write
1F1D3E5F000
heap
page read and write
26E9575B000
heap
page read and write
2AD2038B000
heap
page read and write
23663239000
heap
page read and write
1814000
heap
page read and write
236625EB000
heap
page read and write
23662C01000
heap
page read and write
236631A0000
remote allocation
page read and write
4EA0000
trusted library allocation
page read and write
23662C88000
heap
page read and write
93F000
stack
page read and write
2878C200000
heap
page read and write
236632F1000
heap
page read and write
7BB000
heap
page read and write
2878A4B0000
heap
page read and write
32FB000
stack
page read and write
23662BE4000
heap
page read and write
1C0000
remote allocation
page read and write
23663239000
heap
page read and write
1D2FE440000
heap
page read and write
23662C86000
heap
page read and write
23662BF5000
heap
page read and write
21538C99000
heap
page read and write
201E7DD0000
trusted library allocation
page read and write
23662C0B000
heap
page read and write
236625F5000
heap
page read and write
20AD3455000
heap
page read and write
AE3D8FE000
stack
page read and write
23663237000
heap
page read and write
40A000
unkown
page read and write
23662C8C000
heap
page read and write
236625F9000
heap
page read and write
236625C0000
heap
page read and write
33FE000
heap
page read and write
23663290000
heap
page read and write
1ACC6002000
heap
page read and write
201E7D70000
unclassified section
page readonly
1D3FB000
trusted library allocation
page read and write
401000
unkown
page execute read
214C3613000
heap
page read and write
33D2000
heap
page read and write
23675E02000
heap
page read and write
408000
unkown
page readonly
2879048D000
trusted library allocation
page read and write
25427852000
heap
page read and write
2878AF59000
heap
page read and write
There are 2207 hidden memdumps, click here to show them.