IOC Report
SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Auriculariae5.Reo2
data
dropped
C:\Users\user\AppData\Local\Temp\Bluetooth Suite help_ITA.chm
MS Windows HtmlHelp Data
dropped
C:\Users\user\AppData\Local\Temp\CDMDataEventHandler.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Forynget2.Mir
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\gspawn-win64-helper.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\libLerc.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\libenchant-2.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\msvcr100.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsy8A61.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\system-shutdown.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\zoom-out-symbolic.svg
SVG Scalable Vector Graphics image
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
ftp://ftp.solucionest.com.ar/office
unknown
malicious
http://donaldtrumpverse.com/kO4_tiMHM116.bin
103.211.219.10
malicious
http://donaldtrumpverse.com/kO4_tiMHM116.bin2
unknown
http://127.0.0.1:HTTP/1.1
unknown
https://us1.api.ws-hp.com/clienttelemetry
unknown
http://42ScOTnxUv4XWwo.net
unknown
http://jGgoxh.com
unknown
https://pie-us1.api.ws-hp.com/clienttelemetry
unknown
https://schemaregistry.analysis.ext.hp.com/cdm/gun/com.hp.cdm.platform.software.domain.eventing.reso
unknown
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
unknown
http://DynDns.comDynDNSnamejidpasswordPsi/Psi
unknown
https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/sysInfoBase.schema.json
unknown
https://stage-us1.api.ws-hp.com/clienttelemetry
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/originatorDetail.schema.json
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
donaldtrumpverse.com
103.211.219.10
malicious
dual-a-0001.a-msedge.net
13.107.21.200
e-0009.e-msedge.net
13.107.5.88
solucionest.com.ar
192.185.112.181
ftp.solucionest.com.ar
unknown

IPs

IP
Domain
Country
Malicious
103.211.219.10
donaldtrumpverse.com
Seychelles
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\HAAND\Benfisken85
detaljeprojektets
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PARANTHRACENE
INTERPELLATION
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Valeward72\esc
Transfixation98
HKEY_CURRENT_USER\SOFTWARE\DOMMERASPIRANTER\ETHERIIDAE
internalising
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
FileDirectory
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1D4B1000
trusted library allocation
page read and write
malicious
2B00000
direct allocation
page execute and read and write
malicious
F00000
remote allocation
page execute and read and write
malicious
1C411000
heap
page read and write
203C0000
trusted library allocation
page read and write
1C411000
heap
page read and write
20428A85000
heap
page read and write
1FBB0000
trusted library allocation
page read and write
141E000
stack
page read and write
1F645000
trusted library allocation
page read and write
1407CF30000
heap
page read and write
2A40000
trusted library allocation
page read and write
EBB9AF9000
stack
page read and write
EE1000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
20E353E8000
heap
page read and write
1C411000
heap
page read and write
EE0000
trusted library allocation
page read and write
1C411000
heap
page read and write
20E355F0000
heap
page read and write
191A2314000
heap
page read and write
20E356C0000
heap
page read and write
27EAA245000
heap
page read and write
203F0000
trusted library allocation
page read and write
440000
unkown
page read and write
275136CB000
heap
page read and write
20380000
trusted library allocation
page read and write
227C3E4F000
heap
page read and write
290F000
stack
page read and write
1C411000
heap
page read and write
20428A94000
heap
page read and write
20429078000
heap
page read and write
227C3E4B000
heap
page read and write
20428A47000
heap
page read and write
20385000
trusted library allocation
page read and write
1F5F18F0000
trusted library allocation
page read and write
1C411000
heap
page read and write
20428B3B000
heap
page read and write
1C411000
heap
page read and write
20428A0D000
heap
page read and write
20428198000
heap
page read and write
1F5EC002000
heap
page read and write
2C01000
trusted library allocation
page read and write
20428A93000
heap
page read and write
203C1000
trusted library allocation
page read and write
275135B0000
unclassified section
page readonly
203C1000
trusted library allocation
page read and write
20428A7A000
heap
page read and write
207C0000
trusted library allocation
page read and write
275136C4000
heap
page read and write
191A2E85000
heap
page read and write
EF0000
trusted library allocation
page read and write
27EA933C000
heap
page read and write
1C411000
heap
page read and write
2751414F000
heap
page read and write
140B4613000
heap
page read and write
1FB90000
trusted library allocation
page read and write
203B0000
trusted library allocation
page read and write
203C0000
trusted library allocation
page read and write
1C411000
heap
page read and write
203C0000
trusted library allocation
page read and write
27EA9D0E000
heap
page read and write
1F9D0000
trusted library allocation
page read and write
11D0000
unclassified section
page readonly
1F9D0000
trusted library allocation
page read and write
2751414D000
heap
page read and write
1F5ED310000
trusted library allocation
page read and write
140B4550000
heap
page read and write
20750000
trusted library allocation
page read and write
275141B1000
heap
page read and write
EF0000
trusted library allocation
page read and write
1F5F16CF000
trusted library allocation
page read and write
1C411000
heap
page read and write
20428B3C000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
203C0000
trusted library allocation
page read and write
20429070000
heap
page read and write
1F690000
trusted library allocation
page read and write
B50000
remote allocation
page read and write
203C0000
trusted library allocation
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
20428AF3000
heap
page read and write
204289D1000
heap
page read and write
204283DC000
heap
page read and write
20428AC3000
heap
page read and write
1C411000
heap
page read and write
12F9000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
20428AEC000
heap
page read and write
1C411000
heap
page read and write
EE1000
trusted library allocation
page read and write
20428B44000
heap
page read and write
1407CE17000
heap
page read and write
1C411000
heap
page read and write
1C06A69C000
heap
page read and write
20428AE4000
heap
page read and write
204290EC000
heap
page read and write
20428B36000
heap
page read and write
27EAA247000
heap
page read and write
227C3E86000
heap
page read and write
1FBC0000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
1F5F1661000
trusted library allocation
page read and write
1C411000
heap
page read and write
1FB90000
trusted library allocation
page read and write
27EA9D2D000
heap
page read and write
27EA9D3B000
heap
page read and write
1C5AE272000
heap
page read and write
20D16876000
heap
page read and write
204289D4000
heap
page read and write
1F5ED350000
trusted library allocation
page read and write
1407D60D000
heap
page read and write
1C5AE248000
heap
page read and write
1C411000
heap
page read and write
1F834000
trusted library allocation
page read and write
1F5EB65C000
heap
page read and write
20428AD7000
heap
page read and write
20380000
trusted library allocation
page read and write
20E353ED000
heap
page read and write
1F9C0000
trusted library allocation
page read and write
203C0000
trusted library allocation
page read and write
1C411000
heap
page read and write
203C0000
trusted library allocation
page read and write
1F9C4000
trusted library allocation
page read and write
1F85F000
trusted library allocation
page read and write
1A59FE15000
heap
page read and write
227C3EB1000
heap
page read and write
1E31B7F000
stack
page read and write
20428B3F000
heap
page read and write
203C0000
trusted library allocation
page read and write
191A2DB4000
heap
page read and write
140B5002000
trusted library allocation
page read and write
203C0000
trusted library allocation
page read and write
1C411000
heap
page read and write
20428198000
heap
page read and write
20428AC3000
heap
page read and write
EE1000
trusted library allocation
page read and write
191A2DB0000
heap
page read and write
27EA922A000
heap
page read and write
20D1686B000
heap
page read and write
203C0000
trusted library allocation
page read and write
1C411000
heap
page read and write
1A59F67E000
heap
page read and write
191A22C7000
heap
page read and write
191A2DD1000
heap
page read and write
20428AC4000
heap
page read and write
1C411000
heap
page read and write
20428A9B000
heap
page read and write
E56AAFF000
stack
page read and write
2C91000
heap
page read and write
20385000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
203F0000
trusted library allocation
page read and write
203C0000
trusted library allocation
page read and write
34C807E000
stack
page read and write
27EA9D2D000
heap
page read and write
1D2D0000
trusted library allocation
page execute and read and write
204289D4000
heap
page read and write
654000
heap
page read and write
203B0000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
97B2FE000
stack
page read and write
2042908D000
heap
page read and write
204281C8000
heap
page read and write
20428AB2000
heap
page read and write
EF0000
trusted library allocation
page read and write
1F680000
trusted library allocation
page read and write
20428A7A000
heap
page read and write
E56ABFF000
stack
page read and write
1C411000
heap
page read and write
204289EE000
heap
page read and write
EF0000
trusted library allocation
page read and write
1F9D0000
trusted library allocation
page read and write
20428AA0000
heap
page read and write
204290D8000
heap
page read and write
20428AD1000
heap
page read and write
227C3DB0000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1F640000
trusted library allocation
page read and write
27EA9298000
heap
page read and write
1C411000
heap
page read and write
191A2319000
heap
page read and write
209C0000
heap
page read and write
EF0000
trusted library allocation
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
275136AD000
heap
page read and write
1C411000
heap
page read and write
227C3E86000
heap
page read and write
1FBA0000
trusted library allocation
page read and write
20380000
trusted library allocation
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1D214000
trusted library allocation
page read and write
27EAA2A5000
heap
page read and write
20428AB0000
heap
page read and write
203D0000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
20428AED000
heap
page read and write
203D0000
trusted library allocation
page read and write
1F680000
trusted library allocation
page read and write
20428993000
heap
page read and write
31068FE000
stack
page read and write
191A2D85000
heap
page read and write
1E31BFF000
stack
page read and write
20428A18000
heap
page read and write
20428A6B000
heap
page read and write
1C411000
heap
page read and write
1A59F613000
heap
page read and write
EE1000
trusted library allocation
page read and write
1C411000
heap
page read and write
1F5ED53F000
heap
page read and write
1F9C0000
trusted library allocation
page execute and read and write
20428A8D000
heap
page read and write
20428A94000
heap
page read and write
1C411000
heap
page read and write
1F690000
trusted library allocation
page read and write
1C411000
heap
page read and write
20392000
trusted library allocation
page read and write
27EA9291000
heap
page read and write
401000
unkown
page execute read
1F640000
trusted library allocation
page read and write
1C06A646000
heap
page read and write
1C411000
heap
page read and write
EF0000
trusted library allocation
page read and write
204289D1000
heap
page read and write
1C06A695000
heap
page read and write
140B48D0000
heap
page read and write
20429157000
heap
page read and write
EE1000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
1407CE28000
heap
page read and write
1F5ED4E4000
heap
page read and write
20385000
trusted library allocation
page read and write
1F5EB600000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
191A2DB9000
heap
page read and write
1F834000
trusted library allocation
page read and write
203C0000
trusted library allocation
page read and write
1F814000
trusted library allocation
page read and write
203C0000
trusted library allocation
page read and write
2042824D000
heap
page read and write
27EA9D2F000
heap
page read and write
1F645000
trusted library allocation
page read and write
1F5ED360000
trusted library allocation
page read and write
2B128C27000
heap
page read and write
EF0000
trusted library allocation
page read and write
27EA9D29000
heap
page read and write
1C411000
heap
page read and write
79E000
stack
page read and write
EE1000
trusted library allocation
page read and write
204289D4000
heap
page read and write
EF0000
trusted library allocation
page read and write
20428229000
heap
page read and write
275141E5000
heap
page read and write
204289D4000
heap
page read and write
1C411000
heap
page read and write
20428A7A000
heap
page read and write
878000
heap
page read and write
20750000
trusted library allocation
page read and write
204290CE000
heap
page read and write
27EAA266000
heap
page read and write
1C411000
heap
page read and write
20429132000
heap
page read and write
140B46A0000
heap
page read and write
1C411000
heap
page read and write
EE0000
trusted library allocation
page read and write
1C411000
heap
page read and write
DB8B5FE000
stack
page read and write
20428178000
heap
page read and write
227C3E50000
heap
page read and write
30000
heap
page read and write
20429383000
heap
page read and write
203C0000
trusted library allocation
page read and write
1D240000
trusted library allocation
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
3106AFE000
stack
page read and write
191A2D97000
heap
page read and write
1C411000
heap
page read and write
191A3048000
heap
page read and write
1F9C0000
trusted library allocation
page read and write
227C3E00000
heap
page read and write
204290A3000
heap
page read and write
20428B3B000
heap
page read and write
EF0000
trusted library allocation
page read and write
20428A7E000
heap
page read and write
20400000
trusted library allocation
page execute and read and write
EE1000
trusted library allocation
page read and write
20428A94000
heap
page read and write
EE0000
trusted library allocation
page read and write
20760000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
1407D60F000
heap
page read and write
EF0000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
191A2E83000
heap
page read and write
204289D4000
heap
page read and write
20428A94000
heap
page read and write
204289F5000
heap
page read and write
203DE000
trusted library allocation
page read and write
20428244000
heap
page read and write
EF5000
trusted library allocation
page read and write
E40000
trusted library allocation
page read and write
2042936B000
heap
page read and write
20428AD4000
heap
page read and write
20428AA7000
heap
page read and write
20428AA4000
heap
page read and write
191A2D7D000
heap
page read and write
1C411000
heap
page read and write
227C3E8C000
heap
page read and write
2B128C51000
heap
page read and write
EF0000
trusted library allocation
page read and write
1C411000
heap
page read and write
EF1000
trusted library allocation
page read and write
20428B10000
heap
page read and write
203C8000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
27EA9D76000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
27EA9D2B000
heap
page read and write
204290CF000
heap
page read and write
20D16842000
heap
page read and write
83DA5BE000
stack
page read and write
20E35300000
heap
page read and write
1F680000
trusted library allocation
page read and write
20428AC3000
heap
page read and write
EE1000
trusted library allocation
page read and write
1C411000
heap
page read and write
EBB9D7C000
stack
page read and write
204290C8000
heap
page read and write
EE1000
trusted library allocation
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
EE1000
trusted library allocation
page read and write
1A59F64D000
heap
page read and write
20390000
trusted library allocation
page execute and read and write
27EA9D7C000
heap
page read and write
275141C8000
heap
page read and write
EE1000
trusted library allocation
page read and write
20428A9E000
heap
page read and write
1C411000
heap
page read and write
191A2DA8000
heap
page read and write
1C411000
heap
page read and write
1407D05D000
heap
page read and write
1F5ED454000
heap
page read and write
20D16836000
heap
page read and write
204289AE000
heap
page read and write
20D16829000
heap
page read and write
20E356D1000
heap
page read and write
1C411000
heap
page read and write
27EA9C02000
heap
page read and write
20429082000
heap
page read and write
20428210000
heap
page read and write
20428B12000
heap
page read and write
191A2070000
heap
page read and write
27EA9D79000
heap
page read and write
20428AAC000
heap
page read and write
20380000
trusted library allocation
page read and write
20428A93000
heap
page read and write
1F9D0000
trusted library allocation
page read and write
14A0000
trusted library allocation
page read and write
1407D05E000
heap
page read and write
204289F7000
heap
page read and write
203C0000
trusted library allocation
page read and write
275141A8000
heap
page read and write
20429145000
heap
page read and write
1F9D0000
trusted library allocation
page read and write
EF1000
trusted library allocation
page read and write
1C411000
heap
page read and write
203D0000
trusted library allocation
page read and write
2042908D000
heap
page read and write
204290EC000
heap
page read and write
20E356D8000
heap
page read and write
20428B05000
heap
page read and write
20428B36000
heap
page read and write
2B128C88000
heap
page read and write
203E0000
trusted library allocation
page read and write
1F5E1000
trusted library allocation
page read and write
E3E000
unkown
page read and write
AF0000
trusted library allocation
page read and write
20428AC5000
heap
page read and write
203C0000
trusted library allocation
page read and write
204290EC000
heap
page read and write
20D17002000
trusted library allocation
page read and write
191A2DD6000
heap
page read and write
1F83E000
trusted library allocation
page read and write
20428A18000
heap
page read and write
1C411000
heap
page read and write
191A2D40000
heap
page read and write
20428B3B000
heap
page read and write
20428B23000
heap
page read and write
1F5EB665000
heap
page read and write
227C3E9C000
heap
page read and write
20428A0D000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
203C0000
trusted library allocation
page read and write
227C3E13000
heap
page read and write
27513641000
heap
page read and write
20428A5B000
heap
page read and write
204289EE000
heap
page read and write
1F690000
trusted library allocation
page read and write
204283D5000
heap
page read and write
191A2319000
heap
page read and write
20D16867000
heap
page read and write
191A22FF000
heap
page read and write
227C3E71000
heap
page read and write
20D16750000
unclassified section
page readonly
2751369F000
heap
page read and write
1F5EC100000
heap
page read and write
191A2319000
heap
page read and write
1407CC60000
heap
page read and write
27EAA263000
heap
page read and write
27EA9302000
heap
page read and write
EF5000
trusted library allocation
page read and write
1F640000
trusted library allocation
page read and write
20428A18000
heap
page read and write
1C411000
heap
page read and write
20D16876000
heap
page read and write
27EAA287000
heap
page read and write
97A09B000
stack
page read and write
EE1000
trusted library allocation
page read and write
1F680000
trusted library allocation
page read and write
20428A6B000
heap
page read and write
1F5EB4E0000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1F5EC000000
heap
page read and write
87C000
heap
page read and write
27EAA292000
heap
page read and write
83DAA7D000
stack
page read and write
1FBB0000
trusted library allocation
page read and write
191A2D68000
heap
page read and write
1FBA0000
trusted library allocation
page read and write
20428A81000
heap
page read and write
204290C9000
heap
page read and write
1C411000
heap
page read and write
1F5ED502000
heap
page read and write
191A230A000
heap
page read and write
1C411000
heap
page read and write
191A2376000
heap
page read and write
EA0000
trusted library allocation
page read and write
1C411000
heap
page read and write
1E774370000
heap
page read and write
207B0000
trusted library allocation
page read and write
1F5EB6DF000
heap
page read and write
EF0000
trusted library allocation
page read and write
20428A3F000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
203D0000
trusted library allocation
page read and write
191A230A000
heap
page read and write
207E0000
trusted library allocation
page read and write
1C411000
heap
page read and write
2B128C4F000
heap
page read and write
1FBB0000
trusted library allocation
page read and write
20428A47000
heap
page read and write
1C411000
heap
page read and write
191A2376000
heap
page read and write
1FBB0000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
191A2D94000
heap
page read and write
1FBC0000
trusted library allocation
page read and write
27EA9190000
unclassified section
page readonly
1C411000
heap
page read and write
20750000
trusted library allocation
page read and write
203C0000
trusted library allocation
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1FB90000
trusted library section
page read and write
EE1000
trusted library allocation
page read and write
191A2D96000
heap
page read and write
20428242000
heap
page read and write
1A59FE02000
heap
page read and write
20428AC7000
heap
page read and write
20428AC4000
heap
page read and write
140B4693000
heap
page read and write
1F855000
trusted library allocation
page read and write
204289D4000
heap
page read and write
1C411000
heap
page read and write
1F690000
trusted library allocation
page read and write
20428AF3000
heap
page read and write
20428B38000
heap
page read and write
191A2D84000
heap
page read and write
1F5EB6EF000
heap
page read and write
1C411000
heap
page read and write
20428A81000
heap
page read and write
408000
unkown
page readonly
140B463D000
heap
page read and write
EF1000
trusted library allocation
page read and write
191A2D97000
heap
page read and write
EE0000
trusted library allocation
page read and write
1F5EB6D0000
heap
page read and write
1C411000
heap
page read and write
20428B1F000
heap
page read and write
1D242000
trusted library allocation
page read and write
1C411000
heap
page read and write
EF0000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1304000
heap
page read and write
1F5ECE30000
trusted library allocation
page read and write
1C411000
heap
page read and write
20428980000
heap
page read and write
1F5F165E000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
1C06A69F000
heap
page read and write
27EA9D70000
heap
page read and write
1F7CD000
trusted library allocation
page read and write
1FB90000
trusted library allocation
page read and write
20428AE7000
heap
page read and write
EF0000
trusted library allocation
page read and write
20428AE8000
heap
page read and write
1F5ED3F0000
trusted library allocation
page read and write
1C411000
heap
page read and write
EF1000
trusted library allocation
page read and write
2B129602000
trusted library allocation
page read and write
27513613000
heap
page read and write
275141BF000
heap
page read and write
1C411000
heap
page read and write
204290D8000
heap
page read and write
20D16880000
heap
page read and write
1C06A713000
heap
page read and write
20428A12000
heap
page read and write
1F690000
trusted library allocation
page read and write
1C411000
heap
page read and write
20428AC3000
heap
page read and write
EE0000
trusted library allocation
page read and write
1E317CA000
stack
page read and write
1C411000
heap
page read and write
2B128C40000
heap
page read and write
DB8B57B000
stack
page read and write
1C411000
heap
page read and write
191A2E8E000
heap
page read and write
EF0000
trusted library allocation
page read and write
20429330000
heap
page read and write
1F5EC119000
heap
page read and write
1C411000
heap
page read and write
EE0000
trusted library allocation
page read and write
1F650000
trusted library allocation
page read and write
1C411000
heap
page read and write
204290CF000
heap
page read and write
203C0000
trusted library allocation
page read and write
1C411000
heap
page read and write
6D691CB000
stack
page read and write
1F690000
trusted library allocation
page read and write
1C411000
heap
page read and write
20428AA2000
heap
page read and write
27EA9D7D000
heap
page read and write
1C411000
heap
page read and write
1F5C0000
trusted library allocation
page read and write
20428AB1000
heap
page read and write
34C827C000
stack
page read and write
EF0000
trusted library allocation
page read and write
1C411000
heap
page read and write
20428A8F000
heap
page read and write
130B000
heap
page read and write
203C0000
trusted library allocation
page read and write
310659E000
stack
page read and write
191A2288000
heap
page read and write
203C0000
trusted library allocation
page read and write
1D220000
trusted library allocation
page read and write
191A2E80000
heap
page read and write
20428A88000
heap
page read and write
27EA9200000
heap
page read and write
20ACE000
stack
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1F5EB5F0000
unclassified section
page readonly
20428B38000
heap
page read and write
EF0000
trusted library allocation
page read and write
DB8B8FF000
unkown
page read and write
191A22E8000
heap
page read and write
27EA9D0E000
heap
page read and write
5EE000
stack
page read and write
EF0000
trusted library allocation
page read and write
204290EC000
heap
page read and write
20428B34000
heap
page read and write
EE0000
trusted library allocation
page read and write
1D5D1000
trusted library allocation
page read and write
204289C6000
heap
page read and write
20428A18000
heap
page read and write
140B45B0000
heap
page read and write
204289C9000
heap
page read and write
191A2DAE000
heap
page read and write
E80000
trusted library allocation
page read and write
2B128C13000
heap
page read and write
203D0000
trusted library allocation
page read and write
1C411000
heap
page read and write
227C3E82000
heap
page read and write
20428253000
heap
page read and write
20D1685A000
heap
page read and write
1F5EB635000
heap
page read and write
20428A5B000
heap
page read and write
1C411000
heap
page read and write
27EA92D7000
heap
page read and write
20428ADB000
heap
page read and write
1D22D000
trusted library allocation
page execute and read and write
20428A98000
heap
page read and write
EF5000
trusted library allocation
page read and write
20428A98000
heap
page read and write
1C411000
heap
page read and write
1F680000
trusted library allocation
page read and write
E60000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
1C411000
heap
page read and write
20428B1C000
heap
page read and write
203C0000
trusted library allocation
page read and write
204281C8000
heap
page read and write
20E356DD000
heap
page read and write
1E774136000
heap
page read and write
1F5EB6BB000
heap
page read and write
1C5AEB20000
trusted library allocation
page read and write
1C5AEB00000
trusted library allocation
page read and write
1C411000
heap
page read and write
20428AF0000
heap
page read and write
1C411000
heap
page read and write
1F5F16E0000
remote allocation
page read and write
20428210000
heap
page read and write
46C000
unkown
page readonly
EF5000
trusted library allocation
page read and write
1C411000
heap
page read and write
20428A86000
heap
page read and write
2042899C000
heap
page read and write
14A0000
trusted library allocation
page read and write
1F640000
trusted library allocation
page read and write
1C411000
heap
page read and write
1C06A800000
heap
page read and write
27EA9C00000
heap
page read and write
204290DF000
heap
page read and write
1C411000
heap
page read and write
191A2DBB000
heap
page read and write
3106A7F000
stack
page read and write
20428251000
heap
page read and write
27513799000
heap
page read and write
DB8B9FC000
stack
page read and write
1D210000
trusted library allocation
page read and write
20429144000
heap
page read and write
2B128C00000
heap
page read and write
1C411000
heap
page read and write
204281BC000
heap
page read and write
20428A94000
heap
page read and write
19A000
stack
page read and write
1E5000
heap
page read and write
20428AA2000
heap
page read and write
1C411000
heap
page read and write
204289E1000
heap
page read and write
1F640000
trusted library allocation
page read and write
1C411000
heap
page read and write
20428AE7000
heap
page read and write
191A2D7A000
heap
page read and write
1AC887B000
stack
page read and write
204290EC000
heap
page read and write
20428240000
heap
page read and write
1430000
trusted library allocation
page read and write
1F5ED512000
heap
page read and write
191A2D9C000
heap
page read and write
EF0000
trusted library allocation
page read and write
DB8B07B000
stack
page read and write
20428AC5000
heap
page read and write
20428A9E000
heap
page read and write
2400000
heap
page read and write
27EA9D76000
heap
page read and write
42C000
unkown
page read and write
20428AAC000
heap
page read and write
1F5F1646000
trusted library allocation
page read and write
204290C1000
heap
page read and write
20428A96000
heap
page read and write
1C411000
heap
page read and write
ED0000
trusted library allocation
page execute and read and write
EF0000
trusted library allocation
page read and write
20428A18000
heap
page read and write
27514237000
heap
page read and write
203C0000
trusted library allocation
page read and write
20428A47000
heap
page read and write
203A0000
trusted library allocation
page read and write
83DA87E000
stack
page read and write
1A59F687000
heap
page read and write
1080000
trusted library allocation
page read and write
EF1000
trusted library allocation
page read and write
227C3EB5000
heap
page read and write
1C5AE231000
heap
page read and write
191A22EA000
heap
page read and write
2050D000
stack
page read and write
1D5E7000
trusted library allocation
page read and write
204289F8000
heap
page read and write
1C06C580000
remote allocation
page read and write
20428A89000
heap
page read and write
20428B1C000
heap
page read and write
20428AF3000
heap
page read and write
1C411000
heap
page read and write
34C7B6F000
stack
page read and write
1C411000
heap
page read and write
140B4640000
heap
page read and write
20428A18000
heap
page read and write
1C411000
heap
page read and write
20428AF1000
heap
page read and write
1FBB0000
trusted library allocation
page read and write
204289D1000
heap
page read and write
2042819A000
heap
page read and write
B3E000
stack
page read and write
1F645000
trusted library allocation
page read and write
20385000
trusted library allocation
page read and write
27EA9D6B000
heap
page read and write
EF0000
trusted library allocation
page read and write
27EA931B000
heap
page read and write
203F0000
trusted library allocation
page read and write
20428985000
heap
page read and write
20428AA5000
heap
page read and write
1FB90000
trusted library allocation
page read and write
1E0000
heap
page read and write
1C5AE100000
heap
page read and write
1F690000
trusted library allocation
page read and write
20428AC2000
heap
page read and write
2042911E000
heap
page read and write
1F802000
trusted library allocation
page read and write
203D0000
trusted library allocation
page read and write
1C411000
heap
page read and write
275141C4000
heap
page read and write
1C411000
heap
page read and write
1FB93000
trusted library allocation
page read and write
2042899C000
heap
page read and write
204289F6000
heap
page read and write
203C0000
trusted library allocation
page read and write
2B128C31000
heap
page read and write
1C411000
heap
page read and write
20428B44000
heap
page read and write
227C3E4D000
heap
page read and write
1C411000
heap
page read and write
20428A9A000
heap
page read and write
6D6977E000
stack
page read and write
275141F2000
heap
page read and write
203C1000
trusted library allocation
page read and write
1C411000
heap
page read and write
20428AE6000
heap
page read and write
20428A8D000
heap
page read and write
1C411000
heap
page read and write
20428987000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1407D605000
heap
page read and write
1F84A000
trusted library allocation
page read and write
20428AB3000
heap
page read and write
EE1000
trusted library allocation
page read and write
1C411000
heap
page read and write
1407CFA0000
trusted library allocation
page read and write
1A59F702000
heap
page read and write
191A2DA8000
heap
page read and write
203D0000
trusted library allocation
page read and write
191A2DC7000
heap
page read and write
1F9C0000
trusted library allocation
page read and write
27EA90E0000
heap
page read and write
1D230000
trusted library allocation
page read and write
1C411000
heap
page read and write
1F640000
trusted library allocation
page read and write
20429369000
heap
page read and write
1C411000
heap
page read and write
1FBB0000
trusted library allocation
page read and write
140B469C000
heap
page read and write
98000
stack
page read and write
EE1000
trusted library allocation
page read and write
204289DC000
heap
page read and write
20429078000
heap
page read and write
204283DE000
heap
page read and write
204289D1000
heap
page read and write
20E353ED000
heap
page read and write
EE0000
trusted library allocation
page read and write
27EAA28E000
heap
page read and write
204290DC000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1E7740E0000
heap
page read and write
204289C9000
heap
page read and write
191A2DB9000
heap
page read and write
EE0000
trusted library allocation
page read and write
1F5EB729000
heap
page read and write
27EA91A0000
heap
page read and write
1C411000
heap
page read and write
EF0000
trusted library allocation
page read and write
203C0000
trusted library allocation
page read and write
1F80E000
trusted library allocation
page read and write
1A59F500000
heap
page read and write
203F0000
trusted library allocation
page read and write
191A2DB9000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
20429094000
heap
page read and write
20428A8D000
heap
page read and write
20428248000
heap
page read and write
332C000
stack
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
13B087F000
stack
page read and write
1C411000
heap
page read and write
1C06A689000
heap
page read and write
20428260000
heap
page read and write
1C411000
heap
page read and write
204289EE000
heap
page read and write
204D0000
trusted library allocation
page read and write
1C411000
heap
page read and write
2042908C000
heap
page read and write
EE0000
trusted library allocation
page read and write
EF1000
trusted library allocation
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
20428A81000
heap
page read and write
1F5F164E000
trusted library allocation
page read and write
2037D000
stack
page read and write
20428AB1000
heap
page read and write
1F680000
trusted library allocation
page read and write
1F600000
trusted library allocation
page read and write
27513679000
heap
page read and write
20D1686C000
heap
page read and write
EE1000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
1C411000
heap
page read and write
20D16902000
heap
page read and write
1FBB0000
trusted library allocation
page read and write
203C0000
trusted library allocation
page read and write
227C3F13000
heap
page read and write
1D24B000
trusted library allocation
page execute and read and write
1C411000
heap
page read and write
203D0000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
20D1684C000
heap
page read and write
203C0000
trusted library allocation
page read and write
27EA9D6D000
heap
page read and write
20428A6F000
heap
page read and write
10C4000
heap
page read and write
1C5AEB60000
trusted library allocation
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
20428A18000
heap
page read and write
1F5F161C000
trusted library allocation
page read and write
20428A65000
heap
page read and write
191A2376000
heap
page read and write
191A2DB9000
heap
page read and write
2042899C000
heap
page read and write
40D000
unkown
page read and write
EF0000
trusted library allocation
page read and write
6D694FE000
stack
page read and write
1F5F1687000
trusted library allocation
page read and write
227C3E61000
heap
page read and write
83DABFD000
stack
page read and write
27EA9D94000
heap
page read and write
1C411000
heap
page read and write
E3A50FC000
stack
page read and write
203C0000
trusted library allocation
page read and write
EE1000
trusted library allocation
page read and write
1C411000
heap
page read and write
27EA9289000
heap
page read and write
20428B06000
heap
page read and write
B50000
remote allocation
page read and write
1C5AE282000
heap
page read and write
EF0000
trusted library allocation
page read and write
1C411000
heap
page read and write
20429362000
heap
page read and write
20397000
trusted library allocation
page read and write
20428AE8000
heap
page read and write
1F5F16E0000
remote allocation
page read and write
400000
unkown
page readonly
1C411000
heap
page read and write
27513600000
heap
page read and write
20D1689F000
heap
page read and write
1C411000
heap
page read and write
EE1000
trusted library allocation
page read and write
1F5F167A000
trusted library allocation
page read and write
1F5F1667000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
191A2D67000
heap
page read and write
1C5AEAF0000
trusted library allocation
page read and write
1C411000
heap
page read and write
1F5F168D000
trusted library allocation
page read and write
20429090000
heap
page read and write
12C1000
heap
page read and write
20428AB1000
heap
page read and write
1F5F168A000
trusted library allocation
page read and write
1F680000
trusted library allocation
page read and write
1C5AE200000
heap
page read and write
27EA9241000
heap
page read and write
EE0000
trusted library allocation
page read and write
1C5AE302000
heap
page read and write
EE1000
trusted library allocation
page read and write
20428A2E000
heap
page read and write
1C411000
heap
page read and write
20D16893000
heap
page read and write
1FBB0000
trusted library allocation
page read and write
20429094000
heap
page read and write
20E353D2000
heap
page read and write
1C411000
heap
page read and write
204290D9000
heap
page read and write
1F5F1627000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
EE1000
trusted library allocation
page read and write
1C411000
heap
page read and write
20428A91000
heap
page read and write
204289C9000
heap
page read and write
27513EB0000
trusted library allocation
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1F5EB6D5000
heap
page read and write
1C411000
heap
page read and write
F00000
remote allocation
page execute and read and write
1C411000
heap
page read and write
27EAA2A3000
heap
page read and write
1FBB6000
trusted library allocation
page read and write
1C411000
heap
page read and write
EF1000
trusted library allocation
page read and write
E3A4B6C000
stack
page read and write
1C411000
heap
page read and write
203D0000
trusted library allocation
page read and write
1C411000
heap
page read and write
20428981000
heap
page read and write
20428A94000
heap
page read and write
20428A99000
heap
page read and write
191A305C000
heap
page read and write
1C411000
heap
page read and write
EE1000
trusted library allocation
page read and write
191A2DB7000
heap
page read and write
1C650000
heap
page read and write
27EA9297000
heap
page read and write
1C06A651000
heap
page read and write
20428AA5000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
204290A3000
heap
page read and write
1E77415F000
heap
page read and write
20428AE8000
heap
page read and write
1299000
heap
page read and write
20428B34000
heap
page read and write
191A2E8B000
heap
page read and write
1C411000
heap
page read and write
EF0000
trusted library allocation
page read and write
1C411000
heap
page read and write
227C3E86000
heap
page read and write
20D16885000
heap
page read and write
203C0000
trusted library allocation
page read and write
204289D1000
heap
page read and write
20428B03000
heap
page read and write
71084000
unkown
page readonly
1C411000
heap
page read and write
20428A7A000
heap
page read and write
1407D606000
heap
page read and write
1C5AE24A000
heap
page read and write
891000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
204290C9000
heap
page read and write
1F5ECD01000
trusted library allocation
page read and write
1F690000
trusted library allocation
page read and write
20D16866000
heap
page read and write
191A2D90000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
20428AC7000
heap
page read and write
20428A6B000
heap
page read and write
1F5EB67D000
heap
page read and write
20428A81000
heap
page read and write
1F770000
heap
page execute and read and write
EF0000
trusted library allocation
page read and write
1C5AE313000
heap
page read and write
1C411000
heap
page read and write
1C5AE255000
heap
page read and write
1C411000
heap
page read and write
191A2DC3000
heap
page read and write
1F5ED460000
heap
page read and write
1F5AE000
stack
page read and write
1F645000
trusted library allocation
page read and write
1450000
heap
page read and write
1C411000
heap
page read and write
20428B44000
heap
page read and write
140B4688000
heap
page read and write
204289C8000
heap
page read and write
204290DF000
heap
page read and write
EF0000
trusted library allocation
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
20429108000
heap
page read and write
350000
remote allocation
page read and write
1A59F370000
heap
page read and write
1C06A5D0000
unclassified section
page readonly
20428ACC000
heap
page read and write
20428A0D000
heap
page read and write
27EAA280000
heap
page read and write
20428AE7000
heap
page read and write
1C411000
heap
page read and write
1C06A450000
heap
page read and write
EE1000
trusted library allocation
page read and write
191A2376000
heap
page read and write
20428234000
heap
page read and write
1F9E0000
trusted library allocation
page read and write
27EA9C15000
heap
page read and write
275141D4000
heap
page read and write
204289F5000
heap
page read and write
EF0000
trusted library allocation
page read and write
203A0000
trusted library allocation
page read and write
20E353B8000
heap
page read and write
1F5F1610000
trusted library allocation
page read and write
27EA9D6B000
heap
page read and write
275137C0000
heap
page read and write
1A59F621000
heap
page read and write
2751414F000
heap
page read and write
EE0000
trusted library allocation
page read and write
1F5EB6C8000
heap
page read and write
1407CDEB000
heap
page read and write
2751369F000
heap
page read and write
1F690000
trusted library allocation
page read and write
20E35380000
trusted library allocation
page read and write
203F0000
trusted library allocation
page read and write
1407CDE1000
heap
page read and write
204D0000
trusted library allocation
page read and write
20428210000
heap
page read and write
1C411000
heap
page read and write
1FBB0000
trusted library allocation
page read and write
1F5F1643000
trusted library allocation
page read and write
140B468A000
heap
page read and write
227C3F00000
heap
page read and write
1C411000
heap
page read and write
2751366A000
heap
page read and write
2B128C77000
heap
page read and write
1C411000
heap
page read and write
20380000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
191A2D8F000
heap
page read and write
20428A82000
heap
page read and write
20428AB2000
heap
page read and write
EF1000
trusted library allocation
page read and write
20428A18000
heap
page read and write
1F6A0000
trusted library allocation
page read and write
83DA4B7000
stack
page read and write
EBB9B7F000
stack
page read and write
1F5F1637000
trusted library allocation
page read and write
227C3EAF000
heap
page read and write
1C411000
heap
page read and write
1D5A5000
trusted library allocation
page read and write
1D0000
unclassified section
page readonly
27EAA264000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
27EA9D37000
heap
page read and write
1F690000
trusted library allocation
page read and write
7F180000
trusted library allocation
page execute and read and write
1C411000
heap
page read and write
EF0000
trusted library allocation
page read and write
1C411000
heap
page read and write
204290DF000
heap
page read and write
27EA9D76000
heap
page read and write
12C4000
heap
page read and write
20D16869000
heap
page read and write
27514100000
heap
page read and write
27514171000
heap
page read and write
191A2DAE000
heap
page read and write
27EAA266000
heap
page read and write
27EA9D62000
heap
page read and write
1C411000
heap
page read and write
20428A47000
heap
page read and write
20750000
trusted library allocation
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
12FE000
heap
page read and write
1C411000
heap
page read and write
191A2302000
heap
page read and write
203D0000
trusted library allocation
page read and write
20428A7A000
heap
page read and write
20428A47000
heap
page read and write
1E4B1000
trusted library allocation
page read and write
1C411000
heap
page read and write
1F9C0000
trusted library allocation
page read and write
20428244000
heap
page read and write
140B46A5000
heap
page read and write
20428A6B000
heap
page read and write
203C0000
trusted library allocation
page read and write
203C0000
trusted library allocation
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
203F0000
trusted library allocation
page read and write
20D1686F000
heap
page read and write
1C411000
heap
page read and write
EE0000
trusted library allocation
page read and write
20428AD4000
heap
page read and write
EF0000
trusted library allocation
page read and write
1FBC0000
trusted library allocation
page read and write
204E0000
trusted library allocation
page read and write
191A2DCE000
heap
page read and write
848000
heap
page read and write
191A230A000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
20E353DD000
heap
page read and write
1C411000
heap
page read and write
1F5EB713000
heap
page read and write
2751379C000
heap
page read and write
1C411000
heap
page read and write
20E353ED000
heap
page read and write
191A2319000
heap
page read and write
EF0000
trusted library allocation
page read and write
203C0000
trusted library allocation
page read and write
71081000
unkown
page execute read
1FB50000
trusted library allocation
page read and write
20429145000
heap
page read and write
20428AE8000
heap
page read and write
1FBB0000
trusted library allocation
page read and write
DB8B177000
unkown
page read and write
20428B36000
heap
page read and write
EE1000
trusted library allocation
page read and write
204290E1000
heap
page read and write
140B4702000
heap
page read and write
20428B1C000
heap
page read and write
204290D8000
heap
page read and write
204289A3000
heap
page read and write
20428ACC000
heap
page read and write
2404000
heap
page read and write
140B463B000
heap
page read and write
204283DD000
heap
page read and write
20428B3B000
heap
page read and write
1C411000
heap
page read and write
191A2DB0000
heap
page read and write
1C411000
heap
page read and write
20380000
trusted library allocation
page read and write
EF5000
trusted library allocation
page read and write
1D2F0000
heap
page execute and read and write
27514202000
heap
page read and write
2B2AB9B000
stack
page read and write
27513659000
heap
page read and write
20429116000
heap
page read and write
1F5EC015000
heap
page read and write
203C0000
trusted library allocation
page read and write
20428A65000
heap
page read and write
20428B15000
heap
page read and write
EF0000
trusted library allocation
page read and write
1C411000
heap
page read and write
1A59F700000
heap
page read and write
203C0000
trusted library allocation
page read and write
408000
unkown
page readonly
204289EF000
heap
page read and write
20385000
trusted library allocation
page read and write
20428AD7000
heap
page read and write
1F7C2000
trusted library allocation
page read and write
275137D1000
heap
page read and write
EF5000
trusted library allocation
page read and write
1C411000
heap
page read and write
275137A7000
heap
page read and write
20428B3B000
heap
page read and write
1C5AE240000
heap
page read and write
191A2D72000
heap
page read and write
1C411000
heap
page read and write
27EA9D2E000
heap
page read and write
EF1000
trusted library allocation
page read and write
203A0000
trusted library allocation
page read and write
204289E5000
heap
page read and write
1C06A702000
heap
page read and write
27513E80000
trusted library allocation
page read and write
EF1000
trusted library allocation
page read and write
1C411000
heap
page read and write
227C3DF0000
unclassified section
page readonly
EE1000
trusted library allocation
page read and write
1F9D0000
trusted library allocation
page read and write
20428AA5000
heap
page read and write
1FBC0000
trusted library allocation
page read and write
1407D615000
heap
page read and write
20428A9A000
heap
page read and write
20428A75000
heap
page read and write
2B128B70000
heap
page read and write
20428B20000
heap
page read and write
20428A1C000
heap
page read and write
1C411000
heap
page read and write
204290A1000
heap
page read and write
244E000
stack
page read and write
227C3E7D000
heap
page read and write
1F5ED3F0000
trusted library allocation
page read and write
23DF000
stack
page read and write
20428B06000
heap
page read and write
20428B36000
heap
page read and write
204290E3000
heap
page read and write
191A2380000
heap
page read and write
20428A6B000
heap
page read and write
1C411000
heap
page read and write
275136BF000
heap
page read and write
1F5F1620000
trusted library allocation
page read and write
1C411000
heap
page read and write
20428A8A000
heap
page read and write
1C411000
heap
page read and write
140B4657000
heap
page read and write
1F680000
trusted library allocation
page read and write
204289EE000
heap
page read and write
207C0000
trusted library allocation
page read and write
1F640000
trusted library allocation
page read and write
2751422E000
heap
page read and write
1F640000
trusted library allocation
page read and write
107C000
stack
page read and write
191A2314000
heap
page read and write
1C411000
heap
page read and write
227C3E68000
heap
page read and write
204281C8000
heap
page read and write
140B467A000
heap
page read and write
1C411000
heap
page read and write
EE0000
trusted library allocation
page read and write
1C411000
heap
page read and write
191A2319000
heap
page read and write
EE0000
trusted library allocation
page read and write
1F5ED52D000
heap
page read and write
1407CDC0000
heap
page read and write
204289DC000
heap
page read and write
191A2DC7000
heap
page read and write
EF5000
trusted library allocation
page read and write
1FB90000
trusted library allocation
page read and write
1C411000
heap
page read and write
227C3D50000
heap
page read and write
207B0000
trusted library allocation
page read and write
27EA92E1000
heap
page read and write
1F640000
trusted library allocation
page read and write
2B128C4B000
heap
page read and write
1F5F1600000
trusted library allocation
page read and write
1C411000
heap
page read and write
EE0000
trusted library allocation
page read and write
1D2E0000
trusted library allocation
page read and write
1C06A640000
heap
page read and write
275141B0000
heap
page read and write
1D5CD000
trusted library allocation
page read and write
654000
heap
page read and write
EF1000
trusted library allocation
page read and write
1C411000
heap
page read and write
140B469C000
heap
page read and write
1C411000
heap
page read and write
191A2D96000
heap
page read and write
40A000
unkown
page write copy
20428A9C000
heap
page read and write
207B0000
trusted library allocation
page execute and read and write
20D1684E000
heap
page read and write
1C411000
heap
page read and write
20428AAC000
heap
page read and write
EE0000
trusted library allocation
page read and write
1C411000
heap
page read and write
EF1000
trusted library allocation
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
EF0000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
1F5EB6D9000
heap
page read and write
1D23A000
trusted library allocation
page execute and read and write
20E356CE000
heap
page read and write
20E353FF000
heap
page read and write
1F5CE000
trusted library allocation
page read and write
1287000
heap
page read and write
34C85FF000
stack
page read and write
207E0000
trusted library allocation
page read and write
1F5ECD23000
trusted library allocation
page read and write
27EA9D56000
heap
page read and write
1FBB0000
trusted library allocation
page read and write
20380000
trusted library allocation
page read and write
1D5E9000
trusted library allocation
page read and write
203C0000
trusted library allocation
page read and write
191A2376000
heap
page read and write
DB8B77F000
stack
page read and write
1F6A0000
trusted library allocation
page read and write
20D1686A000
heap
page read and write
191A2DCA000
heap
page read and write
20428197000
heap
page read and write
20428ABC000
heap
page read and write
EF0000
trusted library allocation
page read and write
227C4800000
heap
page read and write
227C3E8D000
heap
page read and write
EFA000
trusted library allocation
page read and write
20428A6B000
heap
page read and write
1F690000
trusted library allocation
page read and write
20428B1A000
heap
page read and write
1C5AE266000
heap
page read and write
1AC8A7D000
stack
page read and write
227C3E27000
heap
page read and write
1D5DF000
trusted library allocation
page read and write
83DA8FC000
stack
page read and write
204290D8000
heap
page read and write
20380000
trusted library allocation
page read and write
191A2D94000
heap
page read and write
EF5000
trusted library allocation
page read and write
20428AAD000
heap
page read and write
1F83E000
trusted library allocation
page read and write
20428AFA000
heap
page read and write
140B462B000
heap
page read and write
20428A75000
heap
page read and write
20428AA4000
heap
page read and write
203D0000
trusted library allocation
page read and write
46C000
unkown
page readonly
EF0000
trusted library allocation
page read and write
13B00FD000
stack
page read and write
27EA9D7B000
heap
page read and write
1F5ED600000
trusted library allocation
page read and write
204290D9000
heap
page read and write
191A2D9C000
heap
page read and write
204289A2000
heap
page read and write
1C411000
heap
page read and write
191A2302000
heap
page read and write
97A67E000
stack
page read and write
191A2DA1000
heap
page read and write
1C411000
heap
page read and write
83DAB7F000
stack
page read and write
20428B3A000
heap
page read and write
27EA92D4000
heap
page read and write
20381000
trusted library allocation
page read and write
1F5EB6B2000
heap
page read and write
71080000
unkown
page readonly
1C411000
heap
page read and write
20428AA8000
heap
page read and write
1C411000
heap
page read and write
20D16864000
heap
page read and write
20428248000
heap
page read and write
203A0000
trusted library allocation
page read and write
20428A15000
heap
page read and write
27EAA283000
heap
page read and write
1C411000
heap
page read and write
204289D4000
heap
page read and write
20750000
trusted library allocation
page read and write
1F5E6000
trusted library allocation
page read and write
20E353B0000
heap
page read and write
EE1000
trusted library allocation
page read and write
1C411000
heap
page read and write
27EA9313000
heap
page read and write
EAEECFE000
stack
page read and write
1FB90000
trusted library allocation
page read and write
B60000
unclassified section
page readonly
20428A0C000
heap
page read and write
1C411000
heap
page read and write
20E3540F000
heap
page read and write
1C411000
heap
page read and write
1F5ED320000
trusted library allocation
page read and write
EE1000
trusted library allocation
page read and write
20428A81000
heap
page read and write
20380000
trusted library allocation
page read and write
20429040000
remote allocation
page read and write
1C411000
heap
page read and write
204283D9000
heap
page read and write
1F690000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
1F5EB706000
heap
page read and write
840000
heap
page read and write
1F9D0000
trusted library allocation
page read and write
1407D050000
heap
page read and write
1F5EB6DE000
heap
page read and write
20428AA3000
heap
page read and write
EF0000
trusted library allocation
page read and write
20428AB1000
heap
page read and write
1C5AE227000
heap
page read and write
20428B36000
heap
page read and write
20429096000
heap
page read and write
1C5AE246000
heap
page read and write
20428AC7000
heap
page read and write
20750000
trusted library allocation
page read and write
EEC000
trusted library allocation
page read and write
20429040000
remote allocation
page read and write
20428A6B000
heap
page read and write
1F5EB6FC000
heap
page read and write
2B128C20000
heap
page read and write
1F9C0000
trusted library allocation
page read and write
191A2335000
heap
page read and write
20D16860000
heap
page read and write
20428B44000
heap
page read and write
27514190000
heap
page read and write
1F5DA000
trusted library allocation
page read and write
1C06A672000
heap
page read and write
1C411000
heap
page read and write
191A230A000
heap
page read and write
1F5F166A000
trusted library allocation
page read and write
6D6957E000
stack
page read and write
191A2376000
heap
page read and write
203A0000
trusted library allocation
page read and write
EE1000
trusted library allocation
page read and write
227C3E61000
heap
page read and write
20428AA2000
heap
page read and write
1FB90000
trusted library allocation
page read and write
191A2376000
heap
page read and write
191A2DAE000
heap
page read and write
EF0000
trusted library allocation
page read and write
191A230A000
heap
page read and write
1C411000
heap
page read and write
191A2DBE000
heap
page read and write
1F858000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
1C411000
heap
page read and write
204289A2000
heap
page read and write
1C06BFD0000
trusted library allocation
page read and write
EF5000
trusted library allocation
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
20428160000
heap
page read and write
20D16858000
heap
page read and write
1F5EC15A000
heap
page read and write
204290C0000
heap
page read and write
204290CF000
heap
page read and write
27EA92D0000
heap
page read and write
1C411000
heap
page read and write
20770000
trusted library allocation
page read and write
1A59F640000
heap
page read and write
20428AF1000
heap
page read and write
191A3051000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1C5AEBB0000
trusted library allocation
page read and write
203D0000
trusted library allocation
page read and write
1C06C580000
remote allocation
page read and write
204290E1000
heap
page read and write
20428A98000
heap
page read and write
20428AFD000
heap
page read and write
6D6987E000
stack
page read and write
204290CF000
heap
page read and write
20428A47000
heap
page read and write
1C411000
heap
page read and write
EE1000
trusted library allocation
page read and write
20D1685E000
heap
page read and write
1C411000
heap
page read and write
20428AF1000
heap
page read and write
203C0000
trusted library allocation
page read and write
20428AB4000
heap
page read and write
1C06A613000
heap
page read and write
20380000
trusted library allocation
page read and write
20428B43000
heap
page read and write
27EA9D6F000
heap
page read and write
20428AF3000
heap
page read and write
1F5EB685000
heap
page read and write
EF0000
trusted library allocation
page read and write
204289D1000
heap
page read and write
204290B7000
heap
page read and write
EE0000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
1F5ECD30000
trusted library allocation
page read and write
20428B5D000
heap
page read and write
20428B34000
heap
page read and write
1C411000
heap
page read and write
2751367B000
heap
page read and write
27EA9D29000
heap
page read and write
27EA9D50000
heap
page read and write
20428B12000
heap
page read and write
1C411000
heap
page read and write
20428B05000
heap
page read and write
1C411000
heap
page read and write
20428B3B000
heap
page read and write
8AB000
heap
page read and write
20428A47000
heap
page read and write
27514200000
heap
page read and write
20428A8B000
heap
page read and write
B50000
remote allocation
page read and write
20428AA2000
heap
page read and write
20428A01000
heap
page read and write
20D16862000
heap
page read and write
20428AE3000
heap
page read and write
2B128BB0000
unclassified section
page readonly
1F5ED360000
trusted library allocation
page read and write
2751362A000
heap
page read and write
204290C9000
heap
page read and write
1C411000
heap
page read and write
1C60E000
stack
page read and write
1FB0D000
stack
page read and write
204290A1000
heap
page read and write
20429116000
heap
page read and write
20E353D8000
heap
page read and write
204289EE000
heap
page read and write
20428AB7000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
204290A3000
heap
page read and write
1C5AE1B0000
heap
page read and write
27EA92A5000
heap
page read and write
20428A7A000
heap
page read and write
AF1000
trusted library allocation
page read and write
191A2DB6000
heap
page read and write
1C411000
heap
page read and write
20428A9E000
heap
page read and write
27EA92CC000
heap
page read and write
EE0000
trusted library allocation
page read and write
20428AA5000
heap
page read and write
27EA9287000
heap
page read and write
1F81A000
trusted library allocation
page read and write
191A2D9C000
heap
page read and write
1F9D0000
trusted library allocation
page read and write
1C411000
heap
page read and write
EF5000
trusted library allocation
page read and write
75F000
stack
page read and write
1C06C002000
trusted library allocation
page read and write
EE1000
trusted library allocation
page read and write
20427FF0000
heap
page read and write
1F5F1660000
trusted library allocation
page read and write
275135C0000
heap
page read and write
1C411000
heap
page read and write
1F630000
trusted library allocation
page read and write
20428A95000
heap
page read and write
EE1000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
1C411000
heap
page read and write
1F5ED548000
heap
page read and write
227C3E53000
heap
page read and write
E56A9FE000
stack
page read and write
204283D9000
heap
page read and write
204290CF000
heap
page read and write
191A2D97000
heap
page read and write
1F5F1677000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
EE1000
trusted library allocation
page read and write
191A2D44000
heap
page read and write
E3A4EFE000
stack
page read and write
1F5F16E0000
remote allocation
page read and write
203A0000
trusted library allocation
page read and write
20428B1A000
heap
page read and write
310687E000
stack
page read and write
27EA9D00000
heap
page read and write
EE0000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
1C411000
heap
page read and write
191A305C000
heap
page read and write
204290AF000
heap
page read and write
207B0000
trusted library allocation
page read and write
1F5DE000
trusted library allocation
page read and write
20428B20000
heap
page read and write
EE0000
trusted library allocation
page read and write
1C411000
heap
page read and write
203D0000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
103E000
stack
page read and write
1C411000
heap
page read and write
20428A6F000
heap
page read and write
204289F8000
heap
page read and write
20E353E7000
heap
page read and write
1F834000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
1C411000
heap
page read and write
EE1000
trusted library allocation
page read and write
204289EE000
heap
page read and write
27EA9286000
heap
page read and write
20428A8F000
heap
page read and write
20E356CD000
heap
page read and write
1D232000
trusted library allocation
page read and write
1D4AF000
stack
page read and write
1F5ED330000
trusted library allocation
page read and write
203C0000
trusted library allocation
page read and write
20429145000
heap
page read and write
EE0000
trusted library allocation
page read and write
203C0000
trusted library allocation
page read and write
2042908D000
heap
page read and write
342D000
stack
page read and write
20428A47000
heap
page read and write
2751413C000
heap
page read and write
1C411000
heap
page read and write
227C3E7C000
heap
page read and write
EE1000
trusted library allocation
page read and write
1C411000
heap
page read and write
191A2D87000
heap
page read and write
1F5EB702000
heap
page read and write
27513698000
heap
page read and write
203C0000
trusted library allocation
page read and write
227C40D0000
heap
page read and write
EF0000
trusted library allocation
page read and write
20D16760000
heap
page read and write
1A59F666000
heap
page read and write
27EAA1A0000
remote allocation
page read and write
191A2376000
heap
page read and write
1C411000
heap
page read and write
20428A1C000
heap
page read and write
1C5AEC02000
trusted library allocation
page read and write
203C0000
trusted library allocation
page read and write
27514002000
heap
page read and write
20428AC2000
heap
page read and write
20E356D0000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
27EA9D78000
heap
page read and write
1C411000
heap
page read and write
27EA9D2A000
heap
page read and write
27513683000
heap
page read and write
1C411000
heap
page read and write
20429156000
heap
page read and write
20428B20000
heap
page read and write
D5AD6B000
stack
page read and write
204289C8000
heap
page read and write
227C3E38000
heap
page read and write
20428A0E000
heap
page read and write
2D49000
trusted library allocation
page read and write
191A2E8A000
heap
page read and write
20428987000
heap
page read and write
20428A18000
heap
page read and write
27514160000
heap
page read and write
1F5ED4BA000
heap
page read and write
1C411000
heap
page read and write
2042824D000
heap
page read and write
129C000
heap
page read and write
20428B3B000
heap
page read and write
2B128C8F000
heap
page read and write
1F9C2000
trusted library allocation
page read and write
1C411000
heap
page read and write
203D0000
trusted library allocation
page read and write
1C411000
heap
page read and write
EF5000
trusted library allocation
page read and write
2042909C000
heap
page read and write
AC0000
heap
page read and write
97A579000
stack
page read and write
1407D055000
heap
page read and write
203F0000
trusted library allocation
page read and write
1F5F1727000
trusted library allocation
page read and write
20428B35000
heap
page read and write
20428B1A000
heap
page read and write
EF0000
trusted library allocation
page read and write
1A59F682000
heap
page read and write
20E353D3000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
191A3047000
heap
page read and write
10C0000
heap
page read and write
20428ABF000
heap
page read and write
20980000
trusted library allocation
page read and write
34C817F000
stack
page read and write
EF5000
trusted library allocation
page read and write
2042824D000
heap
page read and write
20428AD9000
heap
page read and write
1C411000
heap
page read and write
EF0000
trusted library allocation
page read and write
13B007B000
stack
page read and write
27EA9223000
heap
page read and write
191A2E87000
heap
page read and write
83DAAFE000
stack
page read and write
227C3E7F000
heap
page read and write
20E3540B000
heap
page read and write
20428A3F000
heap
page read and write
20428B36000
heap
page read and write
20D16857000
heap
page read and write
191A2DBB000
heap
page read and write
203D0000
trusted library allocation
page read and write
1C411000
heap
page read and write
20D16800000
heap
page read and write
1F5ED460000
heap
page read and write
EF1000
trusted library allocation
page read and write
191A2280000
heap
page read and write
1F5EBDF0000
trusted library allocation
page read and write
1F5EB62A000
heap
page read and write
1C411000
heap
page read and write
1F5EB670000
heap
page read and write
1C411000
heap
page read and write
20428ACE000
heap
page read and write
1F9C0000
trusted library allocation
page read and write
204290A4000
heap
page read and write
1C411000
heap
page read and write
1C06C210000
trusted library allocation
page read and write
27EA92BF000
heap
page read and write
1C411000
heap
page read and write
20428AF1000
heap
page read and write
191A2D97000
heap
page read and write
EF0000
trusted library allocation
page read and write
1F5F165B000
trusted library allocation
page read and write
13B07FD000
stack
page read and write
20428AF3000
heap
page read and write
140B4EC0000
trusted library allocation
page read and write
71086000
unkown
page readonly
20428210000
heap
page read and write
20428ACF000
heap
page read and write
20428A8D000
heap
page read and write
EF0000
trusted library allocation
page read and write
1C06C580000
remote allocation
page read and write
1C411000
heap
page read and write
20428A7A000
heap
page read and write
27513789000
heap
page read and write
1C411000
heap
page read and write
2751368C000
heap
page read and write
20E356E4000
heap
page read and write
191A2DB4000
heap
page read and write
6D6947E000
stack
page read and write
1F5ED516000
heap
page read and write
EE1000
trusted library allocation
page read and write
27EA9D5A000
heap
page read and write
191A2190000
heap
page read and write
20428197000
heap
page read and write
191A3058000
heap
page read and write
191A2425000
heap
page read and write
EE0000
trusted library allocation
page read and write
1C411000
heap
page read and write
2751412C000
heap
page read and write
227C3EAD000
heap
page read and write
27EA9291000
heap
page read and write
EF0000
trusted library allocation
page read and write
227C3E1C000
heap
page read and write
1C411000
heap
page read and write
31069FE000
stack
page read and write
191A2D97000
heap
page read and write
227C4802000
heap
page read and write
1F5ED320000
trusted library allocation
page read and write
227C3E39000
heap
page read and write
1F6B0000
trusted library allocation
page read and write
1C411000
heap
page read and write
EF0000
trusted library allocation
page read and write
13B03FD000
stack
page read and write
20D16813000
heap
page read and write
20428AAE000
heap
page read and write
1F5EB717000
heap
page read and write
20428140000
trusted library allocation
page read and write
1C411000
heap
page read and write
13B097E000
stack
page read and write
20D16850000
heap
page read and write
20428B1A000
heap
page read and write
1F841000
trusted library allocation
page read and write
20428984000
heap
page read and write
27EA92DE000
heap
page read and write
1FB50000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
191A3056000
heap
page read and write
20428A9B000
heap
page read and write
EF0000
trusted library allocation
page read and write
1C411000
heap
page read and write
1F5ED454000
heap
page read and write
20428A47000
heap
page read and write
1C410000
heap
page read and write
6D6997E000
stack
page read and write
203C0000
trusted library allocation
page read and write
20428240000
heap
page read and write
EE0000
trusted library allocation
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
204290D8000
heap
page read and write
20428B36000
heap
page read and write
EF0000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
207C0000
trusted library allocation
page read and write
1F9D0000
trusted library allocation
page read and write
EF1000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
2B128C3B000
heap
page read and write
20428B23000
heap
page read and write
140B4698000
heap
page read and write
20428AE7000
heap
page read and write
2042824A000
heap
page read and write
20428A7A000
heap
page read and write
20428AB1000
heap
page read and write
2751377D000
heap
page read and write
20380000
trusted library allocation
page read and write
2042908D000
heap
page read and write
2D00000
trusted library allocation
page read and write
20428B3B000
heap
page read and write
1C411000
heap
page read and write
140B4600000
heap
page read and write
1C5AEB90000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
20385000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
A3F000
stack
page read and write
310651A000
stack
page read and write
1F5ED400000
heap
page read and write
1D0DA000
stack
page read and write
275137A7000
heap
page read and write
20428A7A000
heap
page read and write
D5B3FE000
stack
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
EE0000
trusted library allocation
page read and write
191A2DA8000
heap
page read and write
20428AB1000
heap
page read and write
1D2CC000
stack
page read and write
97ABFA000
stack
page read and write
1C411000
heap
page read and write
EE1000
trusted library allocation
page read and write
DB8B47E000
stack
page read and write
20428A94000
heap
page read and write
1C411000
heap
page read and write
1407D614000
heap
page read and write
204289C6000
heap
page read and write
20428AE9000
heap
page read and write
1C5AE213000
heap
page read and write
20428A47000
heap
page read and write
1F690000
trusted library allocation
page read and write
20428A65000
heap
page read and write
227C3E40000
heap
page read and write
204289C9000
heap
page read and write
204289EE000
heap
page read and write
20428B5C000
heap
page read and write
1C411000
heap
page read and write
1CF2F000
stack
page read and write
20428A73000
heap
page read and write
203C0000
trusted library allocation
page read and write
20380000
trusted library allocation
page read and write
20429132000
heap
page read and write
191A2D99000
heap
page read and write
204289D4000
heap
page read and write
20428ABB000
heap
page read and write
1C411000
heap
page read and write
204290CE000
heap
page read and write
20D1685C000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1F5EC102000
heap
page read and write
1457000
heap
page read and write
191A3040000
heap
page read and write
20428244000
heap
page read and write
20428AB7000
heap
page read and write
1C411000
heap
page read and write
203C0000
trusted library allocation
page read and write
20380000
trusted library allocation
page read and write
1F680000
trusted library allocation
page read and write
20428ADA000
heap
page read and write
20428258000
heap
page read and write
EE0000
trusted library allocation
page read and write
20428AB1000
heap
page read and write
EF1000
trusted library allocation
page read and write
1D236000
trusted library allocation
page execute and read and write
20428B34000
heap
page read and write
203A0000
trusted library allocation
page read and write
203D6000
trusted library allocation
page read and write
227C46C0000
trusted library allocation
page read and write
EBB9F7A000
stack
page read and write
20E356E6000
heap
page read and write
27513570000
heap
page read and write
275136A1000
heap
page read and write
EE1000
trusted library allocation
page read and write
1E774300000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1F5EC113000
heap
page read and write
20E356E5000
heap
page read and write
203C0000
trusted library allocation
page read and write
191A2314000
heap
page read and write
20980000
trusted library allocation
page read and write
275141CE000
heap
page read and write
20390000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
1C411000
heap
page read and write
204289D1000
heap
page read and write
1C411000
heap
page read and write
203C0000
trusted library allocation
page read and write
20428A0C000
heap
page read and write
20428A73000
heap
page read and write
1C5AE22A000
heap
page read and write
20428AE7000
heap
page read and write
203C0000
trusted library allocation
page read and write
E3A4BEE000
stack
page read and write
1C411000
heap
page read and write
20429372000
heap
page read and write
191A304F000
heap
page read and write
20E3540D000
heap
page read and write
1F5F1710000
trusted library allocation
page read and write
1F680000
trusted library allocation
page read and write
27EAA2B5000
heap
page read and write
EBB9E7E000
stack
page read and write
191A2DBE000
heap
page read and write
191A304C000
heap
page read and write
20D167B0000
trusted library allocation
page read and write
1C726000
heap
page read and write
20D16855000
heap
page read and write
20D165D0000
heap
page read and write
20428AE7000
heap
page read and write
2042899C000
heap
page read and write
20428AD1000
heap
page read and write
207C0000
trusted library allocation
page read and write
1C411000
heap
page read and write
EF0000
trusted library allocation
page read and write
1F5EB6AA000
heap
page read and write
191A2D67000
heap
page read and write
27EAA1A0000
remote allocation
page read and write
20429116000
heap
page read and write
20E356DF000
heap
page read and write
EE1000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
203C0000
trusted library allocation
page read and write
204289EE000
heap
page read and write
1C411000
heap
page read and write
DB8B67E000
stack
page read and write
191A2DA1000
heap
page read and write
EF5000
trusted library allocation
page read and write
191A2D56000
heap
page read and write
27EA9D13000
heap
page read and write
2B128D02000
heap
page read and write
20428A47000
heap
page read and write
20428A47000
heap
page read and write
191A2E84000
heap
page read and write
191A2319000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
2B128C7D000
heap
page read and write
1F680000
trusted library allocation
page read and write
1F680000
trusted library allocation
page read and write
1C411000
heap
page read and write
1C06A62A000
heap
page read and write
1F825000
trusted library allocation
page read and write
27EA9D90000
heap
page read and write
27513724000
heap
page read and write
1F690000
trusted library allocation
page read and write
27EA9D51000
heap
page read and write
2042899C000
heap
page read and write
191A2DC6000
heap
page read and write
20428A07000
heap
page read and write
1407D600000
heap
page read and write
1FBB0000
trusted library allocation
page read and write
20D16849000
heap
page read and write
1C411000
heap
page read and write
EF1000
trusted library allocation
page read and write
27EA92B2000
heap
page read and write
1C411000
heap
page read and write
204289E5000
heap
page read and write
EE0000
trusted library allocation
page read and write
20D168A4000
heap
page read and write
EF1000
trusted library allocation
page read and write
2042899C000
heap
page read and write
20428A8A000
heap
page read and write
1F5EB800000
heap
page read and write
1A59F691000
heap
page read and write
227C3E33000
heap
page read and write
1C06A717000
heap
page read and write
1C411000
heap
page read and write
2B128B10000
heap
page read and write
203B0000
trusted library allocation
page read and write
20428A6B000
heap
page read and write
D5B2FE000
stack
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
20428A7A000
heap
page read and write
1C411000
heap
page read and write
27EA9D74000
heap
page read and write
1C06A4C0000
heap
page read and write
204289C8000
heap
page read and write
27514214000
heap
page read and write
1C411000
heap
page read and write
EF0000
trusted library allocation
page read and write
EE1000
trusted library allocation
page read and write
EE1000
trusted library allocation
page read and write
204289F6000
heap
page read and write
204283D0000
heap
page read and write
1C5AEB80000
trusted library allocation
page read and write
20428A6F000
heap
page read and write
2042911E000
heap
page read and write
20429116000
heap
page read and write
1F645000
trusted library allocation
page read and write
20428A65000
heap
page read and write
20428A5B000
heap
page read and write
EF1000
trusted library allocation
page read and write
1C411000
heap
page read and write
204283DD000
heap
page read and write
20428AE7000
heap
page read and write
204289D1000
heap
page read and write
204289EE000
heap
page read and write
1F5EB613000
heap
page read and write
191A2D8C000
heap
page read and write
20428A94000
heap
page read and write
1F6C0000
trusted library allocation
page execute and read and write
204290DF000
heap
page read and write
8A7000
heap
page read and write
203C0000
trusted library allocation
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
97A97B000
stack
page read and write
1F843000
trusted library allocation
page read and write
1C411000
heap
page read and write
203A0000
trusted library allocation
page read and write
2042824D000
heap
page read and write
20428AF1000
heap
page read and write
2B128C27000
heap
page read and write
1E774060000
heap
page read and write
1C411000
heap
page read and write
27EA9A70000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
20D168A8000
heap
page read and write
203C0000
trusted library allocation
page read and write
203D0000
trusted library allocation
page read and write
27EA9D2F000
heap
page read and write
1C411000
heap
page read and write
209BE000
stack
page read and write
203C0000
trusted library allocation
page read and write
1F7E3000
trusted library allocation
page read and write
191A2E8A000
heap
page read and write
20380000
trusted library allocation
page read and write
1C411000
heap
page read and write
E50000
trusted library allocation
page read and write
203C0000
trusted library allocation
page read and write
1F640000
trusted library allocation
page read and write
1C411000
heap
page read and write
20428B34000
heap
page read and write
EF0000
trusted library allocation
page read and write
20429078000
heap
page read and write
2B128C6C000
heap
page read and write
EF1000
trusted library allocation
page read and write
191A2D9C000
heap
page read and write
E56AB79000
stack
page read and write
204289E5000
heap
page read and write
20428AE8000
heap
page read and write
1F5ECD40000
trusted library allocation
page read and write
1C411000
heap
page read and write
EF1000
trusted library allocation
page read and write
191A2DA1000
heap
page read and write
2042909B000
heap
page read and write
1C5AE160000
heap
page read and write
EF1000
trusted library allocation
page read and write
20428229000
heap
page read and write
1F645000
trusted library allocation
page read and write
27513798000
heap
page read and write
203A0000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
27514202000
heap
page read and write
20428AD7000
heap
page read and write
203A0000
trusted library allocation
page read and write
191A2E87000
heap
page read and write
204290C0000
heap
page read and write
20428AA9000
heap
page read and write
27EA9D7C000
heap
page read and write
20D1685D000
heap
page read and write
1C411000
heap
page read and write
204290D8000
heap
page read and write
227C3E4C000
heap
page read and write
20428A7A000
heap
page read and write
20428B10000
heap
page read and write
20428AC5000
heap
page read and write
1C411000
heap
page read and write
EE0000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
1F5EB6C4000
heap
page read and write
203C7000
trusted library allocation
page read and write
E97000
trusted library allocation
page read and write
20428B34000
heap
page read and write
204290A4000
heap
page read and write
1FBB0000
trusted library allocation
page read and write
203C0000
trusted library allocation
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1E774130000
heap
page read and write
E3A4FFF000
stack
page read and write
20429094000
heap
page read and write
1C411000
heap
page read and write
350000
remote allocation
page read and write
1F83E000
trusted library allocation
page read and write
1FB90000
trusted library allocation
page read and write
1F5EC15A000
heap
page read and write
20428A18000
heap
page read and write
431000
unkown
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
204283D9000
heap
page read and write
204290EC000
heap
page read and write
191A2DBB000
heap
page read and write
20429383000
heap
page read and write
203A0000
trusted library allocation
page read and write
207E0000
trusted library allocation
page read and write
20428A68000
heap
page read and write
EF0000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
204289D4000
heap
page read and write
1C5AE25B000
heap
page read and write
275141D7000
heap
page read and write
20428B36000
heap
page read and write
20428B3B000
heap
page read and write
2064E000
stack
page read and write
20428B3B000
heap
page read and write
2B2B177000
stack
page read and write
E56A879000
stack
page read and write
1C5AE1A0000
unclassified section
page readonly
1F9D0000
trusted library allocation
page read and write
20380000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
1E31AFF000
stack
page read and write
20428A2E000
heap
page read and write
1C411000
heap
page read and write
227C3E81000
heap
page read and write
1C411000
heap
page read and write
2751378B000
heap
page read and write
1C411000
heap
page read and write
191A2304000
heap
page read and write
2042908D000
heap
page read and write
20428B44000
heap
page read and write
5F0000
trusted library allocation
page read and write
1C411000
heap
page read and write
2042909C000
heap
page read and write
20380000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
227C3E6C000
heap
page read and write
20429090000
heap
page read and write
1F5F16F8000
trusted library allocation
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1F682000
trusted library allocation
page read and write
2A00000
trusted library allocation
page read and write
EE1000
trusted library allocation
page read and write
1E4D9000
trusted library allocation
page read and write
191A2DA0000
heap
page read and write
1D247000
trusted library allocation
page execute and read and write
1C411000
heap
page read and write
EE0000
trusted library allocation
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1C06A600000
heap
page read and write
EF0000
trusted library allocation
page read and write
20428AE7000
heap
page read and write
871000
heap
page read and write
204283DE000
heap
page read and write
1C411000
heap
page read and write
207D0000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
20428AA1000
heap
page read and write
1F9C0000
trusted library allocation
page read and write
1C411000
heap
page read and write
EE0000
trusted library allocation
page read and write
204289D4000
heap
page read and write
1C411000
heap
page read and write
5AE000
stack
page read and write
20429145000
heap
page read and write
203C0000
trusted library allocation
page read and write
97A87C000
stack
page read and write
20428B34000
heap
page read and write
191A230A000
heap
page read and write
1C411000
heap
page read and write
191A2D96000
heap
page read and write
1F5EB6A4000
heap
page read and write
20428AEF000
heap
page read and write
1FA0C000
stack
page read and write
20428AB8000
heap
page read and write
203C0000
trusted library allocation
page read and write
191A2420000
heap
page read and write
1F83E000
trusted library allocation
page read and write
E3A507F000
stack
page read and write
204289F5000
heap
page read and write
20428B12000
heap
page read and write
20428B02000
heap
page read and write
20760000
trusted library allocation
page read and write
40A000
unkown
page read and write
20428A47000
heap
page read and write
191A2331000
heap
page read and write
20429363000
heap
page read and write
650000
heap
page read and write
27EA92F2000
heap
page read and write
2C90000
heap
page read and write
204289EC000
heap
page read and write
20D1686D000
heap
page read and write
203C0000
trusted library allocation
page read and write
1C411000
heap
page read and write
EF0000
trusted library allocation
page read and write
204283DA000
heap
page read and write
203A0000
trusted library allocation
page read and write
20428ACF000
heap
page read and write
20428AE6000
heap
page read and write
1C411000
heap
page read and write
34C7AEB000
stack
page read and write
20428A18000
heap
page read and write
24C0000
heap
page read and write
1F5EC119000
heap
page read and write
203D0000
trusted library allocation
page read and write
191A2D88000
heap
page read and write
1C411000
heap
page read and write
EF0000
trusted library allocation
page read and write
1F5EB470000
heap
page read and write
1C411000
heap
page read and write
20429393000
heap
page read and write
EE0000
trusted library allocation
page read and write
204290DF000
heap
page read and write
1C411000
heap
page read and write
EAEEBFE000
stack
page read and write
20428B1A000
heap
page read and write
1F5ED300000
trusted library allocation
page read and write
27513662000
heap
page read and write
1F5F1619000
trusted library allocation
page read and write
1407CDFB000
heap
page read and write
20428245000
heap
page read and write
27EA9D74000
heap
page read and write
EF0000
trusted library allocation
page read and write
1F5ED000
trusted library allocation
page read and write
191A2D8F000
heap
page read and write
203F0000
trusted library allocation
page read and write
1D308000
trusted library allocation
page read and write
EE1000
trusted library allocation
page read and write
1C411000
heap
page read and write
1C06A72D000
heap
page read and write
20429040000
remote allocation
page read and write
20428AE7000
heap
page read and write
1C06A700000
heap
page read and write
1C411000
heap
page read and write
27EAA252000
heap
page read and write
1F5ED443000
heap
page read and write
46D9000
trusted library allocation
page read and write
1F5ED443000
heap
page read and write
204289C8000
heap
page read and write
1F620000
trusted library allocation
page read and write
20428229000
heap
page read and write
20380000
trusted library allocation
page read and write
191A2DBA000
heap
page read and write
27513713000
heap
page read and write
1C720000
heap
page read and write
203D0000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
20E356C5000
heap
page read and write
EBB987B000
stack
page read and write
1C411000
heap
page read and write
20428B44000
heap
page read and write
E90000
trusted library allocation
page read and write
20428A61000
heap
page read and write
1C411000
heap
page read and write
140B4690000
heap
page read and write
1A59F624000
heap
page read and write
EF0000
trusted library allocation
page read and write
1F613000
heap
page read and write
EF1000
trusted library allocation
page read and write
203C0000
trusted library allocation
page read and write
203C7000
trusted library allocation
page read and write
1F5F16BB000
trusted library allocation
page read and write
27EAA232000
heap
page read and write
27EA9213000
heap
page read and write
227C3E70000
heap
page read and write
1F5ED4B8000
heap
page read and write
27EA9D0E000
heap
page read and write
203F0000
trusted library allocation
page read and write
1F5F2000
trusted library allocation
page read and write
EE8000
trusted library allocation
page read and write
1C411000
heap
page read and write
27EA9D74000
heap
page read and write
20428A9A000
heap
page read and write
27EAA280000
heap
page read and write
EE1000
trusted library allocation
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1D213000
trusted library allocation
page execute and read and write
275137FF000
heap
page read and write
20428A98000
heap
page read and write
1C411000
heap
page read and write
2B128C1A000
heap
page read and write
27EA9295000
heap
page read and write
EF0000
trusted library allocation
page read and write
20428AA2000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1F5EB69F000
heap
page read and write
EE0000
trusted library allocation
page read and write
203F0000
trusted library allocation
page read and write
20D16896000
heap
page read and write
1D21D000
trusted library allocation
page execute and read and write
20429093000
heap
page read and write
E40000
trusted library allocation
page read and write
1F7E6000
trusted library allocation
page read and write
1E513000
trusted library allocation
page read and write
1F5B0000
trusted library allocation
page read and write
20428258000
heap
page read and write
1F9D0000
trusted library allocation
page read and write
275137AB000
heap
page read and write
1C411000
heap
page read and write
20E35580000
heap
page read and write
1F5F172A000
trusted library allocation
page read and write
20428B1A000
heap
page read and write
20428AE7000
heap
page read and write
46A000
unkown
page read and write
191A2DAE000
heap
page read and write
1F5F1610000
trusted library allocation
page read and write
1F690000
trusted library allocation
page read and write
1C5AEB30000
trusted library allocation
page read and write
204290DF000
heap
page read and write
E56A55C000
stack
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
20390000
trusted library allocation
page read and write
1C411000
heap
page read and write
12FF000
heap
page read and write
20428A7A000
heap
page read and write
203A0000
trusted library allocation
page read and write
1F645000
trusted library allocation
page read and write
1C411000
heap
page read and write
122B000
heap
page read and write
EF0000
trusted library allocation
page read and write
1F5ED485000
heap
page read and write
1F834000
trusted library allocation
page read and write
20428253000
heap
page read and write
191A2DB4000
heap
page read and write
1C411000
heap
page read and write
191A2319000
heap
page read and write
1C411000
heap
page read and write
203A0000
trusted library allocation
page read and write
1C411000
heap
page read and write
191A2D9C000
heap
page read and write
275141B8000
heap
page read and write
1F5C4000
trusted library allocation
page read and write
20428B3A000
heap
page read and write
1F690000
trusted library allocation
page read and write
203E0000
trusted library allocation
page read and write
1407CEC0000
heap
page read and write
1F9D0000
trusted library allocation
page read and write
203C0000
trusted library allocation
page read and write
27EAA283000
heap
page read and write
EF0000
trusted library allocation
page read and write
20428B06000
heap
page read and write
1D245000
trusted library allocation
page execute and read and write
191A2DBA000
heap
page read and write
20D16852000
heap
page read and write
1C411000
heap
page read and write
2042936B000
heap
page read and write
1F5ED330000
trusted library allocation
page read and write
203A0000
trusted library allocation
page read and write
191A2D78000
heap
page read and write
204289C8000
heap
page read and write
EF0000
trusted library allocation
page read and write
203D0000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
204281BB000
heap
page read and write
EF0000
trusted library allocation
page read and write
1F5F162A000
trusted library allocation
page read and write
203C0000
trusted library allocation
page read and write
20428AA9000
heap
page read and write
20D16831000
heap
page read and write
204289E5000
heap
page read and write
1F680000
trusted library allocation
page read and write
B50000
remote allocation
page read and write
20428AED000
heap
page read and write
20428B3C000
heap
page read and write
E56AA7F000
stack
page read and write
1F680000
trusted library allocation
page read and write
1F850000
trusted library allocation
page read and write
EE1000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
1F680000
trusted library allocation
page read and write
1A59F695000
heap
page read and write
EAEEDFA000
stack
page read and write
1C411000
heap
page read and write
204281C8000
heap
page read and write
20E3540F000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
E56AC75000
stack
page read and write
20428B1A000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1F5ED464000
heap
page read and write
20428AF1000
heap
page read and write
227C3E7A000
heap
page read and write
EE1000
trusted library allocation
page read and write
20D16841000
heap
page read and write
EF1000
trusted library allocation
page read and write
20429328000
heap
page read and write
83DA53E000
stack
page read and write
20380000
trusted library allocation
page read and write
204290BF000
heap
page read and write
227C3E8B000
heap
page read and write
1F9C0000
trusted library allocation
page read and write
1F690000
trusted library allocation
page read and write
20428B3B000
heap
page read and write
1C5AEB50000
trusted library allocation
page read and write
EE1000
trusted library allocation
page read and write
203A0000
trusted library allocation
page read and write
27EA9D40000
heap
page read and write
1F5ED350000
trusted library allocation
page read and write
1F690000
trusted library allocation
page read and write
203B5000
trusted library allocation
page read and write
1C411000
heap
page read and write
2074E000
stack
page read and write
1FBA0000
trusted library allocation
page read and write
191A2DDE000
heap
page read and write
1C06A6A1000
heap
page read and write
2B128C47000
heap
page read and write
1267000
heap
page read and write
204290A1000
heap
page read and write
1F5D2000
trusted library allocation
page read and write
1C411000
heap
page read and write
1F6A0000
trusted library allocation
page read and write
E56A97E000
stack
page read and write
400000
unkown
page readonly
1C411000
heap
page read and write
D5B4FA000
stack
page read and write
1F690000
trusted library allocation
page read and write
227C3EA4000
heap
page read and write
20428AB1000
heap
page read and write
203D0000
trusted library allocation
page read and write
20428A3F000
heap
page read and write
EF0000
trusted library allocation
page read and write
27EA933C000
heap
page read and write
1A59F63B000
heap
page read and write
203C0000
trusted library allocation
page read and write
20428AEE000
heap
page read and write
20380000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
1C411000
heap
page read and write
204290A1000
heap
page read and write
204290D8000
heap
page read and write
20428A9C000
heap
page read and write
20428AC5000
heap
page read and write
191A2E82000
heap
page read and write
227C3E6F000
heap
page read and write
191A2DE1000
heap
page read and write
20428254000
heap
page read and write
B50000
remote allocation
page read and write
1C411000
heap
page read and write
1F640000
trusted library allocation
page read and write
20760000
trusted library allocation
page read and write
1407CE07000
heap
page read and write
1220000
heap
page read and write
140B4682000
heap
page read and write
191A2376000
heap
page read and write
1CE2E000
stack
page read and write
191A3140000
heap
page read and write
1C5AEBC0000
trusted library allocation
page read and write
20750000
trusted library allocation
page read and write
1FB50000
trusted library allocation
page read and write
227C3EAD000
heap
page read and write
1C06A692000
heap
page read and write
227C4815000
heap
page read and write
227C3F02000
heap
page read and write
EF5000
trusted library allocation
page read and write
20E356D7000
heap
page read and write
1F5ED4A5000
heap
page read and write
EE0000
trusted library allocation
page read and write
20428B04000
heap
page read and write
227C3E7E000
heap
page read and write
203A0000
trusted library allocation
page read and write
1C411000
heap
page read and write
191A2DAE000
heap
page read and write
203A0000
trusted library allocation
page read and write
20D16861000
heap
page read and write
191A2DC7000
heap
page read and write
1C411000
heap
page read and write
20380000
trusted library allocation
page read and write
203C0000
trusted library allocation
page read and write
27EA9D70000
heap
page read and write
204290A3000
heap
page read and write
204282D0000
heap
page read and write
27EAA279000
heap
page read and write
227C3E4E000
heap
page read and write
1C411000
heap
page read and write
204289C6000
heap
page read and write
1C411000
heap
page read and write
EF0000
trusted library allocation
page read and write
1C411000
heap
page read and write
12B6000
heap
page read and write
20429320000
heap
page read and write
1C411000
heap
page read and write
20428B36000
heap
page read and write
20428253000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1A59F713000
heap
page read and write
EF0000
trusted library allocation
page read and write
2042908D000
heap
page read and write
1F5F1650000
trusted library allocation
page read and write
27EAA1A0000
remote allocation
page read and write
1F5F1600000
trusted library allocation
page read and write
27513500000
heap
page read and write
1FBB0000
trusted library allocation
page read and write
20428A7A000
heap
page read and write
20428B05000
heap
page read and write
204289A2000
heap
page read and write
1C411000
heap
page read and write
1E7740E5000
heap
page read and write
27EA9150000
heap
page read and write
83DA9FB000
stack
page read and write
20428ABC000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
83DA97E000
stack
page read and write
1C411000
heap
page read and write
20428244000
heap
page read and write
1C411000
heap
page read and write
1F5EB6DB000
heap
page read and write
204290A3000
heap
page read and write
27EA9D29000
heap
page read and write
2751421D000
heap
page read and write
204290CF000
heap
page read and write
227C3EB7000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
EF0000
trusted library allocation
page read and write
1FB90000
trusted library allocation
page read and write
204289EE000
heap
page read and write
EF0000
trusted library allocation
page read and write
1F5EB634000
heap
page read and write
1C411000
heap
page read and write
1F9E0000
trusted library allocation
page read and write
204290C2000
heap
page read and write
80E000
stack
page read and write
EF1000
trusted library allocation
page read and write
20429372000
heap
page read and write
1F9E0000
trusted library allocation
page read and write
1C411000
heap
page read and write
1C06A686000
heap
page read and write
20428AE6000
heap
page read and write
20D16887000
heap
page read and write
1C411000
heap
page read and write
654000
heap
page read and write
20428AFB000
heap
page read and write
204283D9000
heap
page read and write
20429145000
heap
page read and write
20428A94000
heap
page read and write
1F640000
trusted library allocation
page read and write
2751369C000
heap
page read and write
2042819D000
heap
page read and write
2042909C000
heap
page read and write
204289D4000
heap
page read and write
27514186000
heap
page read and write
EE0000
trusted library allocation
page read and write
1F5EB66E000
heap
page read and write
191A2DA8000
heap
page read and write
207C0000
trusted library allocation
page read and write
1C411000
heap
page read and write
EF0000
trusted library allocation
page read and write
191A2E8E000
heap
page read and write
1F5EB674000
heap
page read and write
E3A4E7E000
stack
page read and write
203D0000
trusted library allocation
page read and write
20428A9C000
heap
page read and write
20D16640000
heap
page read and write
20428B36000
heap
page read and write
EE0000
trusted library allocation
page read and write
E8E000
stack
page read and write
EF0000
trusted library allocation
page read and write
191A2D84000
heap
page read and write
20428ACF000
heap
page read and write
2A80000
trusted library allocation
page read and write
27EA9D2C000
heap
page read and write
204290EC000
heap
page read and write
20428B06000
heap
page read and write
203C0000
trusted library allocation
page read and write
1C411000
heap
page read and write
20428AA8000
heap
page read and write
1C411000
heap
page read and write
EF0000
trusted library allocation
page read and write
1C411000
heap
page read and write
20380000
trusted library allocation
page read and write
20428B23000
heap
page read and write
EE0000
trusted library allocation
page read and write
20380000
trusted library allocation
page read and write
1C411000
heap
page read and write
EAEE87B000
stack
page read and write
227C3E97000
heap
page read and write
1C5AEB10000
trusted library allocation
page read and write
203A0000
trusted library allocation
page read and write
204290DF000
heap
page read and write
1F680000
trusted library allocation
page read and write
1C411000
heap
page read and write
1C5AEB70000
trusted library allocation
page read and write
2042899C000
heap
page read and write
1C411000
heap
page read and write
203B0000
trusted library allocation
page read and write
1F5F1602000
trusted library allocation
page read and write
20428A9A000
heap
page read and write
1C5AEBA0000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
1C411000
heap
page read and write
203A5000
trusted library allocation
page read and write
13B06FF000
stack
page read and write
20AD0000
trusted library allocation
page read and write
20D1682B000
heap
page read and write
1C411000
heap
page read and write
191A2D58000
heap
page read and write
1FBB0000
trusted library allocation
page read and write
1C411000
heap
page read and write
1FBB0000
trusted library allocation
page read and write
140B45F0000
unclassified section
page readonly
2B128C2A000
heap
page read and write
20428B20000
heap
page read and write
1407CDFD000
heap
page read and write
1F5EB641000
heap
page read and write
1AC897D000
stack
page read and write
27EA9261000
heap
page read and write
20428B5D000
heap
page read and write
1C411000
heap
page read and write
149E000
unkown
page read and write
EF0000
trusted library allocation
page read and write
27EA9D29000
heap
page read and write
191A2319000
heap
page read and write
1F610000
heap
page read and write
2B128C81000
heap
page read and write
1C411000
heap
page read and write
203C0000
trusted library allocation
page read and write
1A59F4F0000
unclassified section
page readonly
227C3EB9000
heap
page read and write
EAEE9FE000
stack
page read and write
20428AF4000
heap
page read and write
203C0000
trusted library allocation
page read and write
20428AD6000
heap
page read and write
1407D601000
heap
page read and write
1F5F1664000
trusted library allocation
page read and write
1C5AE23B000
heap
page read and write
1C411000
heap
page read and write
27EA9D7F000
heap
page read and write
1F9E0000
trusted library allocation
page read and write
27513792000
heap
page read and write
1F5F18B0000
trusted library allocation
page read and write
1C411000
heap
page read and write
EE1000
trusted library allocation
page read and write
20428B1C000
heap
page read and write
1C5AE293000
heap
page read and write
B2D000
stack
page read and write
1F9C0000
trusted library allocation
page read and write
191A2319000
heap
page read and write
20428B1A000
heap
page read and write
20428ACC000
heap
page read and write
20428ACC000
heap
page read and write
140B4650000
heap
page read and write
204290C8000
heap
page read and write
2B129480000
trusted library allocation
page read and write
EE1000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
191A2D8F000
heap
page read and write
204290EC000
heap
page read and write
20428B37000
heap
page read and write
EE0000
trusted library allocation
page read and write
191A2DA8000
heap
page read and write
20428AF3000
heap
page read and write
1C411000
heap
page read and write
1F841000
trusted library allocation
page read and write
20429157000
heap
page read and write
20429090000
heap
page read and write
1C411000
heap
page read and write
20428A80000
heap
page read and write
20428ACF000
heap
page read and write
191A2FD0000
heap
page read and write
1D28E000
stack
page read and write
27EA928E000
heap
page read and write
27EAA200000
heap
page read and write
203C0000
trusted library allocation
page read and write
20428AE3000
heap
page read and write
204289C8000
heap
page read and write
27513713000
heap
page read and write
20428A4B000
heap
page read and write
20428AA4000
heap
page read and write
227C3E17000
heap
page read and write
EE0000
trusted library allocation
page read and write
27EA9D30000
heap
page read and write
1F83F000
trusted library allocation
page read and write
1C411000
heap
page read and write
1A59F550000
trusted library allocation
page read and write
DB8B37E000
stack
page read and write
1F5EC104000
heap
page read and write
20428A61000
heap
page read and write
203D0000
trusted library allocation
page read and write
20428A94000
heap
page read and write
2042899C000
heap
page read and write
191A2302000
heap
page read and write
20E35423000
heap
page read and write
1C411000
heap
page read and write
1F83F000
trusted library allocation
page read and write
20428A9F000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1F5ED364000
trusted library allocation
page read and write
227C3E68000
heap
page read and write
401000
unkown
page execute read
350000
remote allocation
page read and write
20428167000
heap
page read and write
1C411000
heap
page read and write
27EA9D2C000
heap
page read and write
1D1D9000
stack
page read and write
191A2DC0000
heap
page read and write
2060E000
stack
page read and write
20428A98000
heap
page read and write
20428AA0000
heap
page read and write
1D3A0000
heap
page read and write
20D16859000
heap
page read and write
204290A1000
heap
page read and write
204F0000
trusted library allocation
page read and write
20750000
trusted library allocation
page read and write
1C5AEA70000
trusted library allocation
page read and write
227C3E65000
heap
page read and write
204289A3000
heap
page read and write
1C411000
heap
page read and write
EBB9C7B000
stack
page read and write
1C411000
heap
page read and write
20429363000
heap
page read and write
20428A81000
heap
page read and write
227C3E22000
heap
page read and write
20D1685B000
heap
page read and write
1A59FE00000
heap
page read and write
1C411000
heap
page read and write
203F0000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
1C411000
heap
page read and write
1F645000
trusted library allocation
page read and write
1C411000
heap
page read and write
2C91000
heap
page read and write
140B466D000
heap
page read and write
203E0000
trusted library allocation
page execute and read and write
2B128C55000
heap
page read and write
203A0000
trusted library allocation
page read and write
1F5CB000
trusted library allocation
page read and write
1FBC0000
trusted library allocation
page read and write
1F5F163A000
trusted library allocation
page read and write
1C06A72A000
heap
page read and write
20D16840000
heap
page read and write
1C411000
heap
page read and write
20428A75000
heap
page read and write
1FBB0000
trusted library allocation
page read and write
1D200000
trusted library allocation
page read and write
20385000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
20428B19000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
20429116000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
27EA9D7C000
heap
page read and write
20428B44000
heap
page read and write
1C411000
heap
page read and write
E40000
trusted library allocation
page read and write
191A2302000
heap
page read and write
20428AAC000
heap
page read and write
191A22BE000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
20428242000
heap
page read and write
1A59F600000
heap
page read and write
1C411000
heap
page read and write
191A2D77000
heap
page read and write
1C411000
heap
page read and write
20428A61000
heap
page read and write
1F5F161F000
trusted library allocation
page read and write
1C5AE28B000
heap
page read and write
2B128BC0000
heap
page read and write
27EA9D5B000
heap
page read and write
1F690000
trusted library allocation
page read and write
275136B5000
heap
page read and write
1C5AEB40000
trusted library allocation
page read and write
2B2AEFD000
stack
page read and write
20428B12000
heap
page read and write
27EAA224000
heap
page read and write
204289E1000
heap
page read and write
20428ADA000
heap
page read and write
1407D616000
heap
page read and write
1C411000
heap
page read and write
227C3E24000
heap
page read and write
191A2D7B000
heap
page read and write
EF1000
trusted library allocation
page read and write
1FB90000
trusted library allocation
page read and write
1F5ED4F4000
heap
page read and write
1C411000
heap
page read and write
20428A1C000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
20428A9E000
heap
page read and write
EF1000
trusted library allocation
page read and write
191A2E8A000
heap
page read and write
EF0000
trusted library allocation
page read and write
1C411000
heap
page read and write
204289C8000
heap
page read and write
20428A65000
heap
page read and write
2B128C70000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
20428A6B000
heap
page read and write
1C411000
heap
page read and write
1C411000
heap
page read and write
1E31C7E000
stack
page read and write
20428A81000
heap
page read and write
46A0000
trusted library allocation
page read and write
191A2D8C000
heap
page read and write
204290DF000
heap
page read and write
EE0000
trusted library allocation
page read and write
204290E3000
heap
page read and write
1F690000
trusted library allocation
page read and write
20428A18000
heap
page read and write
1C411000
heap
page read and write
203A0000
trusted library allocation
page read and write
20428AF1000
heap
page read and write
1C411000
heap
page read and write
1F5EB6E1000
heap
page read and write
1A59F3E0000
heap
page read and write
1C411000
heap
page read and write
204290E3000
heap
page read and write
ECE000
stack
page read and write
20428ACC000
heap
page read and write
20428989000
heap
page read and write
There are 2759 hidden memdumps, click here to show them.