IOC Report
Original Shipment_Document.PDF.exe

loading gif

Files

File Path
Type
Category
Malicious
Original Shipment_Document.PDF.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp6DD1.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\run.dat
Non-ISO extended-ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\caspol.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\nsaB9E2.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsaB9E2.tmp\nsExec.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\subfolder1\windows.exe
data
dropped
C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\catalog.dat
data
dropped
C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\settings.bin
data
dropped
C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\storage.dat
data
dropped
C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\task.dat
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\timelrer\Tdlen\Integrationsprvens.Adg72
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\timelrer\Tdlen\format-text-bold-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\timelrer\Tdlen\location-services-disabled-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\timelrer\Tdlen\uforfrdetheden.Rid
data
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Original Shipment_Document.PDF.exe
"C:\Users\user\Desktop\Original Shipment_Document.PDF.exe"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x721C070B^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x7C156677^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x03631637^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x5C382120^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x7F303920^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x78713865^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x4B6D7569^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x19307575^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x41616575^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x09696575^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x0975752C^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x19697965^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x49796569^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x19307571^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x15793C65^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x09216D75^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x15793C65^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x09703C6B^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x4B6C7578^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x721C070B^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x7C156677^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x0363032C^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x4B2D2024^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x55183929^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x563A7D2C^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x09753C65^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x09216475^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x09696575^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x15793C65^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x09216675^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x09697965^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x5079653D^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x0D697C35^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x172B6478^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x721C070B^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x7C156677^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x03630620^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x4D1F3C29^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x5C093A2C^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x572D3037^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x11307537^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x0C75752C^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x19686375^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x09697569^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x19307575^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x15307575^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x10307B37^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x0A64721C^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x721C070B^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x7C156677^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x03630720^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x583D132C^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x553C7D2C^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x4B6C7965^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x50792774^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x15793C65^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x09216475^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x09696575^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x15733C65^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x0975752C^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x19697C2C^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x172B6678^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x4C2A3037^962155845"
malicious
C:\Windows\SysWOW64\cmd.eXe
cmd.eXe /c SeT /a "0x0A6B6F7F^962155845"
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
"C:\Users\user\Desktop\Original Shipment_Document.PDF.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks.exe" /create /f /tn "DSL Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp6DD1.tmp
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe 0
malicious
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 125 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://doc-14-70-docs.googleusercontent.com/
unknown
https://doc-14-70-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/bcmtj5ie
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://google.com
unknown
https://doc-14-70-docs.googleusercontent.com/%%doc-14-70-docs.googleusercontent.com
unknown
https://drive.google.com/
unknown
https://doc-14-70-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/bcmtj5ie1disn24fvm7mb2d8jibr4j1v/1659691950000/06422039211485589527/*/1RTjXzM3oLxMQRuQuQg9TR4kX_hPJtp2r?e=download&uuid=fa4270ed-3082-4e6e-8e77-e38f9ee0c1fd
142.250.181.225
https://drive.google.com/x~
unknown
https://csp.withgoogle.com/csp/report-to/DriveUntrustedContentHttp/external
unknown

Domains

Name
IP
Malicious
drive.google.com
142.250.179.174
tuk.linkpc.net
188.127.230.176
googlehosted.l.googleusercontent.com
142.250.181.225
doc-14-70-docs.googleusercontent.com
unknown

IPs

IP
Domain
Country
Malicious
142.250.181.225
googlehosted.l.googleusercontent.com
United States
188.127.230.176
tuk.linkpc.net
Russian Federation
142.250.179.174
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Startup key

Memdumps

Base Address
Regiontype
Protect
Malicious
E30000
remote allocation
page execute and read and write
malicious
3280000
direct allocation
page execute and read and write
malicious
12CF000
stack
page read and write
1C476000
heap
page read and write
1FA4F000
trusted library allocation
page read and write
1C405000
heap
page read and write
1C436000
heap
page read and write
427000
unkown
page read and write
1C43B000
heap
page read and write
20B99000
trusted library allocation
page read and write
20B83000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1C42B000
heap
page read and write
1C421000
heap
page read and write
20BB5000
trusted library allocation
page read and write
1C440000
heap
page read and write
1FA76000
trusted library allocation
page read and write
1214000
heap
page read and write
1FA87000
trusted library allocation
page read and write
1C44F000
heap
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1C43D000
heap
page read and write
1C422000
heap
page read and write
125F000
heap
page read and write
1C472000
heap
page read and write
1C405000
heap
page read and write
1EDF2000
trusted library allocation
page read and write
AE0000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C43D000
heap
page read and write
1241000
heap
page read and write
1C44F000
heap
page read and write
1C436000
heap
page read and write
11D3000
heap
page read and write
1FC90000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C438000
heap
page read and write
1C450000
heap
page read and write
20B99000
trusted library allocation
page read and write
20B84000
trusted library allocation
page read and write
1C440000
heap
page read and write
1C425000
heap
page read and write
1C43E000
heap
page read and write
1C43B000
heap
page read and write
250CA079000
heap
page read and write
B90000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
109F000
stack
page read and write
98000
stack
page read and write
1FA76000
trusted library allocation
page read and write
20B99000
trusted library allocation
page read and write
250CA929000
heap
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
1FA76000
trusted library allocation
page read and write
1400000
heap
page read and write
1FA76000
trusted library allocation
page read and write
1C44F000
heap
page read and write
1C425000
heap
page read and write
123B000
heap
page read and write
1C44C000
heap
page read and write
250CA913000
heap
page read and write
1C422000
heap
page read and write
1C425000
heap
page read and write
1FA62000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C425000
heap
page read and write
1C46F000
heap
page read and write
1FA68000
trusted library allocation
page read and write
1C42B000
heap
page read and write
3410000
heap
page read and write
1C440000
heap
page read and write
126B000
heap
page read and write
1C43B000
heap
page read and write
1C425000
heap
page read and write
1FA76000
trusted library allocation
page read and write
1C42B000
heap
page read and write
202C8000
trusted library allocation
page read and write
20B84000
trusted library allocation
page read and write
1FA4E000
trusted library allocation
page read and write
20B84000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1FA2D000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C425000
heap
page read and write
1C425000
heap
page read and write
250CA079000
heap
page read and write
1C43D000
heap
page read and write
E20000
remote allocation
page read and write
1C452000
heap
page read and write
563000
heap
page read and write
1C43D000
heap
page read and write
1FA6E000
trusted library allocation
page read and write
20B99000
trusted library allocation
page read and write
20B95000
trusted library allocation
page read and write
250CA970000
heap
page read and write
1C43B000
heap
page read and write
1C446000
heap
page read and write
1C422000
heap
page read and write
1C44C000
heap
page read and write
20B51000
trusted library allocation
page read and write
1FC97000
trusted library allocation
page read and write
250CA976000
heap
page read and write
1C43B000
heap
page read and write
1C447000
heap
page read and write
1C401000
heap
page read and write
1C43D000
heap
page read and write
1C43B000
heap
page read and write
20B99000
trusted library allocation
page read and write
55F000
heap
page read and write
1C440000
heap
page read and write
BF0000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
20400000
trusted library allocation
page read and write
20BA4000
trusted library allocation
page read and write
250CA102000
heap
page read and write
1C425000
heap
page read and write
1C425000
heap
page read and write
1C442000
heap
page read and write
294A000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
1C42B000
heap
page read and write
1C401000
heap
page read and write
1C454000
heap
page read and write
1C422000
heap
page read and write
1FC60000
trusted library allocation
page read and write
578000
heap
page read and write
1C436000
heap
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
250CA92F000
heap
page read and write
1C43D000
heap
page read and write
1C422000
heap
page read and write
1C436000
heap
page read and write
1C451000
heap
page read and write
123F000
heap
page read and write
1C43D000
heap
page read and write
1C42B000
heap
page read and write
1C446000
heap
page read and write
1C438000
heap
page read and write
1FA87000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1FA76000
trusted library allocation
page read and write
5250000
trusted library allocation
page read and write
1C43B000
heap
page read and write
1D2FB251000
heap
page read and write
1FA3E000
trusted library allocation
page read and write
250CA09D000
heap
page read and write
1C425000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C40C000
heap
page read and write
1C456000
heap
page read and write
1C425000
heap
page read and write
250CA94B000
heap
page read and write
1C425000
heap
page read and write
250C9FC0000
unclassified section
page readonly
1C422000
heap
page read and write
1C425000
heap
page read and write
20B95000
trusted library allocation
page read and write
20B84000
trusted library allocation
page read and write
1C422000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C42B000
heap
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1C425000
heap
page read and write
20BA4000
trusted library allocation
page read and write
1C425000
heap
page read and write
B90000
trusted library allocation
page read and write
1FA76000
trusted library allocation
page read and write
1C440000
heap
page read and write
1252000
heap
page read and write
1C422000
heap
page read and write
1C440000
heap
page read and write
1FA76000
trusted library allocation
page read and write
1110000
heap
page read and write
1FA87000
trusted library allocation
page read and write
1FA48000
trusted library allocation
page read and write
1C425000
heap
page read and write
20BB4000
trusted library allocation
page read and write
1C43D000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C43B000
heap
page read and write
1C422000
heap
page read and write
1C454000
heap
page read and write
1C422000
heap
page read and write
42D000
unkown
page read and write
56C000
heap
page read and write
22A0000
heap
page read and write
1C422000
heap
page read and write
1C425000
heap
page read and write
1C433000
heap
page read and write
1C422000
heap
page read and write
20B51000
trusted library allocation
page read and write
1C438000
heap
page read and write
1FC70000
trusted library allocation
page read and write
1C42B000
heap
page read and write
1C453000
heap
page read and write
20B84000
trusted library allocation
page read and write
20B99000
trusted library allocation
page read and write
1C425000
heap
page read and write
20B83000
trusted library allocation
page read and write
1C438000
heap
page read and write
20B83000
trusted library allocation
page read and write
1C421000
heap
page read and write
1C454000
heap
page read and write
1C42B000
heap
page read and write
1FA76000
trusted library allocation
page read and write
250CA0AC000
heap
page read and write
20570000
trusted library allocation
page read and write
1C43D000
heap
page read and write
1C425000
heap
page read and write
1C425000
heap
page read and write
1C436000
heap
page read and write
1C43D000
heap
page read and write
563000
heap
page read and write
1C447000
heap
page read and write
1C43B000
heap
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1C436000
heap
page read and write
1C477000
heap
page read and write
1C422000
heap
page read and write
1FA6E000
trusted library allocation
page read and write
1C436000
heap
page read and write
1C4C6000
heap
page read and write
1C452000
heap
page read and write
1C43B000
heap
page read and write
1C46C000
heap
page read and write
1C425000
heap
page read and write
20B84000
trusted library allocation
page read and write
1FC50000
trusted library allocation
page read and write
1C43D000
heap
page read and write
1C422000
heap
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1C471000
heap
page read and write
20B83000
trusted library allocation
page read and write
1C42B000
heap
page read and write
20BB7000
trusted library allocation
page read and write
1C422000
heap
page read and write
250CA07C000
heap
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
20B84000
trusted library allocation
page read and write
1FA70000
trusted library allocation
page read and write
1C46C000
heap
page read and write
1FA73000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C42B000
heap
page read and write
1FA87000
trusted library allocation
page read and write
1C446000
heap
page read and write
250C9FD0000
heap
page read and write
1C440000
heap
page read and write
1C447000
heap
page read and write
1C43D000
heap
page read and write
1C425000
heap
page read and write
1C43B000
heap
page read and write
20B99000
trusted library allocation
page read and write
250CA02A000
heap
page read and write
1FA8B000
trusted library allocation
page read and write
1D2FB26C000
heap
page read and write
1275000
heap
page read and write
1C456000
heap
page read and write
1C401000
heap
page read and write
1C422000
heap
page read and write
11E7000
heap
page read and write
1C422000
heap
page read and write
1202000
heap
page read and write
1FA76000
trusted library allocation
page read and write
1FC96000
trusted library allocation
page read and write
1C425000
heap
page read and write
202C0000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
294B000
trusted library allocation
page read and write
20B97000
trusted library allocation
page read and write
1C436000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C43B000
heap
page read and write
1C458000
heap
page read and write
1C425000
heap
page read and write
1C425000
heap
page read and write
125A000
heap
page read and write
1FA89000
trusted library allocation
page read and write
1C415000
heap
page read and write
20BA4000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
1C469000
heap
page read and write
20B99000
trusted library allocation
page read and write
1C401000
heap
page read and write
1C422000
heap
page read and write
1FA76000
trusted library allocation
page read and write
F4BF179000
stack
page read and write
1FAA8000
trusted library allocation
page read and write
1C44C000
heap
page read and write
20B51000
trusted library allocation
page read and write
AD0000
trusted library allocation
page read and write
20B7E000
trusted library allocation
page read and write
20B83000
trusted library allocation
page read and write
1EDC5000
trusted library allocation
page read and write
40A000
unkown
page read and write
1FA76000
trusted library allocation
page read and write
1C425000
heap
page read and write
1FA76000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1C425000
heap
page read and write
1C474000
heap
page read and write
2B8E000
stack
page read and write
1C443000
heap
page read and write
20B86000
trusted library allocation
page read and write
1FA76000
trusted library allocation
page read and write
1C43E000
heap
page read and write
250CA05D000
heap
page read and write
19A000
stack
page read and write
20B5F000
trusted library allocation
page read and write
3C6C000
stack
page read and write
1D2FB286000
heap
page read and write
1C425000
heap
page read and write
1D700000
trusted library allocation
page read and write
1ED49000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C455000
heap
page read and write
55A000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C422000
heap
page read and write
1267000
heap
page read and write
1C425000
heap
page read and write
1FCC0000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C43B000
heap
page read and write
1FA76000
trusted library allocation
page read and write
1C43B000
heap
page read and write
1C425000
heap
page read and write
1C425000
heap
page read and write
1C436000
heap
page read and write
1C422000
heap
page read and write
1208000
heap
page read and write
1C425000
heap
page read and write
1C44C000
heap
page read and write
1FA76000
trusted library allocation
page read and write
1225000
heap
page read and write
1FA89000
trusted library allocation
page read and write
1C440000
heap
page read and write
1C425000
heap
page read and write
1ED9D000
trusted library allocation
page read and write
1FA59000
trusted library allocation
page read and write
55F000
heap
page read and write
20B62000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C44C000
heap
page read and write
123B000
heap
page read and write
1C436000
heap
page read and write
20410000
trusted library allocation
page read and write
20B84000
trusted library allocation
page read and write
250CA96B000
heap
page read and write
11DE000
heap
page read and write
20B57000
trusted library allocation
page read and write
1C405000
heap
page read and write
1C440000
heap
page read and write
1C456000
heap
page read and write
1C440000
heap
page read and write
F9F000
stack
page read and write
1C425000
heap
page read and write
1C442000
heap
page read and write
20B83000
trusted library allocation
page read and write
1C436000
heap
page read and write
1FA45000
trusted library allocation
page read and write
1C451000
heap
page read and write
250CA07B000
heap
page read and write
1C401000
heap
page read and write
1C436000
heap
page read and write
1FC90000
trusted library allocation
page read and write
1C425000
heap
page read and write
20B83000
trusted library allocation
page read and write
11CD000
heap
page read and write
250CA040000
heap
page read and write
1C44D000
heap
page read and write
1C440000
heap
page read and write
1FAA8000
trusted library allocation
page read and write
1FA70000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C43D000
heap
page read and write
1C440000
heap
page read and write
1C43B000
heap
page read and write
718D1000
unkown
page execute read
20B84000
trusted library allocation
page read and write
1239000
heap
page read and write
20B83000
trusted library allocation
page read and write
20B85000
trusted library allocation
page read and write
11DE000
heap
page read and write
20B99000
trusted library allocation
page read and write
12FB000
trusted library allocation
page execute and read and write
1C43E000
heap
page read and write
1C442000
heap
page read and write
20B84000
trusted library allocation
page read and write
30000
heap
page read and write
1FA76000
trusted library allocation
page read and write
1C422000
heap
page read and write
20405000
trusted library allocation
page read and write
1C425000
heap
page read and write
1208000
heap
page read and write
1C43D000
heap
page read and write
B95000
trusted library allocation
page read and write
250CA900000
heap
page read and write
213A0000
unkown
page read and write
20B81000
trusted library allocation
page read and write
1C436000
heap
page read and write
1C43D000
heap
page read and write
1C451000
heap
page read and write
1C422000
heap
page read and write
1C425000
heap
page read and write
20B5A000
trusted library allocation
page read and write
20BB5000
trusted library allocation
page read and write
1C436000
heap
page read and write
1FA62000
trusted library allocation
page read and write
1C436000
heap
page read and write
1C425000
heap
page read and write
1C43B000
heap
page read and write
20BB5000
trusted library allocation
page read and write
202C0000
trusted library allocation
page read and write
56C000
heap
page read and write
1210000
heap
page read and write
1C442000
heap
page read and write
1C421000
heap
page read and write
1C44C000
heap
page read and write
1C425000
heap
page read and write
250CA12A000
heap
page read and write
56A000
heap
page read and write
1C42B000
heap
page read and write
1C422000
heap
page read and write
1C440000
heap
page read and write
1C422000
heap
page read and write
1C43D000
heap
page read and write
1C401000
heap
page read and write
1C43D000
heap
page read and write
1C422000
heap
page read and write
1C440000
heap
page read and write
1C422000
heap
page read and write
1C438000
heap
page read and write
1C447000
heap
page read and write
1C44D000
heap
page read and write
1C425000
heap
page read and write
1C42B000
heap
page read and write
1C43D000
heap
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
1C42B000
heap
page read and write
581000
heap
page read and write
DC0000
heap
page read and write
1C43B000
heap
page read and write
1C420000
heap
page read and write
123E000
heap
page read and write
1C422000
heap
page read and write
1FA8B000
trusted library allocation
page read and write
1C44C000
heap
page read and write
1FA76000
trusted library allocation
page read and write
3B6C000
stack
page read and write
30AE000
stack
page read and write
1C436000
heap
page read and write
1FAA8000
trusted library allocation
page read and write
1C425000
heap
page read and write
D0E000
stack
page read and write
1C43D000
heap
page read and write
1C425000
heap
page read and write
1C42B000
heap
page read and write
1C422000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C440000
heap
page read and write
1C422000
heap
page read and write
1C440000
heap
page read and write
1FC96000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C472000
heap
page read and write
1FA6C000
trusted library allocation
page read and write
1C442000
heap
page read and write
1C401000
heap
page read and write
1FCA8000
trusted library allocation
page read and write
20B84000
trusted library allocation
page read and write
1D1D0000
remote allocation
page read and write
1C446000
heap
page read and write
126E000
heap
page read and write
20B83000
trusted library allocation
page read and write
1C43B000
heap
page read and write
1C422000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C422000
heap
page read and write
20BA4000
trusted library allocation
page read and write
20B83000
trusted library allocation
page read and write
1FC90000
trusted library allocation
page read and write
1C43D000
heap
page read and write
1C425000
heap
page read and write
1C43B000
heap
page read and write
1D700000
trusted library allocation
page read and write
1C44C000
heap
page read and write
BF5000
heap
page read and write
1C436000
heap
page read and write
1C436000
heap
page read and write
8EF000
stack
page read and write
1FA76000
trusted library allocation
page read and write
250CA0A9000
heap
page read and write
125D000
heap
page read and write
1C422000
heap
page read and write
1223000
heap
page read and write
1C42B000
heap
page read and write
1C422000
heap
page read and write
1C440000
heap
page read and write
1C422000
heap
page read and write
1D1D0000
remote allocation
page read and write
20B84000
trusted library allocation
page read and write
250CA910000
heap
page read and write
1C425000
heap
page read and write
1C425000
heap
page read and write
1C452000
heap
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
1C43E000
heap
page read and write
1C44F000
heap
page read and write
1C401000
heap
page read and write
1C43D000
heap
page read and write
1C43E000
heap
page read and write
250CA084000
heap
page read and write
1C43B000
heap
page read and write
1C436000
heap
page read and write
56E000
heap
page read and write
1C401000
heap
page read and write
1C401000
heap
page read and write
1C421000
heap
page read and write
1C425000
heap
page read and write
20BB5000
trusted library allocation
page read and write
1FC90000
trusted library allocation
page read and write
1C43B000
heap
page read and write
1C43B000
heap
page read and write
1C43B000
heap
page read and write
1C425000
heap
page read and write
123B000
heap
page read and write
1C422000
heap
page read and write
1228000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C422000
heap
page read and write
20B99000
trusted library allocation
page read and write
250CA06E000
heap
page read and write
578000
heap
page read and write
1C46C000
heap
page read and write
1FA62000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C425000
heap
page read and write
1FA6D000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C401000
heap
page read and write
250CA09F000
heap
page read and write
1C43D000
heap
page read and write
1C422000
heap
page read and write
520000
heap
page read and write
1C425000
heap
page read and write
56C000
heap
page read and write
B99000
trusted library allocation
page read and write
20B95000
trusted library allocation
page read and write
1FA89000
trusted library allocation
page read and write
1C43D000
heap
page read and write
1C43D000
heap
page read and write
1F0000
heap
page read and write
1C42B000
heap
page read and write
250CA074000
heap
page read and write
1C442000
heap
page read and write
11EC000
heap
page read and write
1C401000
heap
page read and write
1C42B000
heap
page read and write
11E3000
heap
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1C446000
heap
page read and write
1C43D000
heap
page read and write
1C436000
heap
page read and write
1C440000
heap
page read and write
1FA76000
trusted library allocation
page read and write
1D2FAFA0000
heap
page read and write
1C43B000
heap
page read and write
5150000
trusted library allocation
page execute and read and write
20B95000
trusted library allocation
page read and write
400000
unkown
page readonly
1C472000
heap
page read and write
1C422000
heap
page read and write
1C43D000
heap
page read and write
1225000
heap
page read and write
20400000
trusted library allocation
page read and write
1FC90000
trusted library allocation
page read and write
1C425000
heap
page read and write
235E000
stack
page read and write
1FA89000
trusted library allocation
page read and write
1C440000
heap
page read and write
1C447000
heap
page read and write
250CA0AC000
heap
page read and write
250CA902000
heap
page read and write
57E000
heap
page read and write
1C436000
heap
page read and write
5200000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C42B000
heap
page read and write
1C450000
heap
page read and write
1277000
heap
page read and write
1FA70000
trusted library allocation
page read and write
563000
heap
page read and write
1C422000
heap
page read and write
3160000
heap
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
1C405000
heap
page read and write
1C425000
heap
page read and write
1C456000
heap
page read and write
1FC54000
trusted library allocation
page read and write
1FC90000
trusted library allocation
page read and write
1FA76000
trusted library allocation
page read and write
1C425000
heap
page read and write
1FC96000
trusted library allocation
page read and write
1C46F000
heap
page read and write
1C43B000
heap
page read and write
1C47A000
heap
page read and write
1FA3C000
trusted library allocation
page read and write
1C43D000
heap
page read and write
1C421000
heap
page read and write
1C42B000
heap
page read and write
1FA6E000
trusted library allocation
page read and write
20B83000
trusted library allocation
page read and write
250CA940000
heap
page read and write
12F0000
trusted library allocation
page read and write
1FC90000
trusted library allocation
page read and write
581000
heap
page read and write
5220000
trusted library allocation
page read and write
1C43B000
heap
page read and write
1C42B000
heap
page read and write
1C425000
heap
page read and write
2B10000
unkown
page readonly
1C436000
heap
page read and write
1C44C000
heap
page read and write
1C43D000
heap
page read and write
1C440000
heap
page read and write
1C438000
heap
page read and write
1C422000
heap
page read and write
1C451000
heap
page read and write
1C440000
heap
page read and write
11C4000
heap
page read and write
1C422000
heap
page read and write
20B51000
trusted library allocation
page read and write
1C422000
heap
page read and write
1FA55000
trusted library allocation
page read and write
3381000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
250CA974000
heap
page read and write
213A0000
trusted library allocation
page read and write
20B9B000
trusted library allocation
page read and write
3240000
trusted library allocation
page read and write
F4BF3FC000
stack
page read and write
1FA63000
trusted library allocation
page read and write
20BA4000
trusted library allocation
page read and write
1FCA0000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1C436000
heap
page read and write
55A000
heap
page read and write
1C4A0000
heap
page read and write
12F7000
trusted library allocation
page execute and read and write
20B83000
trusted library allocation
page read and write
213A6000
trusted library allocation
page read and write
1C42B000
heap
page read and write
1214000
heap
page read and write
1C440000
heap
page read and write
1C42B000
heap
page read and write
1C43D000
heap
page read and write
213A0000
unkown
page read and write
1C405000
heap
page read and write
1C422000
heap
page read and write
250CA06D000
heap
page read and write
1C425000
heap
page read and write
20B79000
trusted library allocation
page read and write
1C44C000
heap
page read and write
1C43D000
heap
page read and write
578000
heap
page read and write
213A5000
trusted library allocation
page read and write
1FA76000
trusted library allocation
page read and write
1219000
heap
page read and write
718D6000
unkown
page readonly
1C440000
heap
page read and write
250CA958000
heap
page read and write
1FC50000
trusted library allocation
page read and write
1C422000
heap
page read and write
AE0000
trusted library allocation
page read and write
1C44C000
heap
page read and write
1C42B000
heap
page read and write
20BA4000
trusted library allocation
page read and write
1C438000
heap
page read and write
1C440000
heap
page read and write
1FA43000
trusted library allocation
page read and write
20BA4000
trusted library allocation
page read and write
21120000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C425000
heap
page read and write
1FA89000
trusted library allocation
page read and write
1C44F000
heap
page read and write
20B77000
trusted library allocation
page read and write
20B99000
trusted library allocation
page read and write
20B57000
trusted library allocation
page read and write
20BB5000
trusted library allocation
page read and write
1C401000
heap
page read and write
1C42B000
heap
page read and write
1C440000
heap
page read and write
20BA4000
trusted library allocation
page read and write
250CA970000
heap
page read and write
1C46E000
heap
page read and write
1FA68000
trusted library allocation
page read and write
1C450000
heap
page read and write
1FA76000
trusted library allocation
page read and write
213A0000
trusted library allocation
page read and write
1C43B000
heap
page read and write
20B84000
trusted library allocation
page read and write
11DE000
heap
page read and write
20B83000
trusted library allocation
page read and write
11C0000
heap
page read and write
55A000
heap
page read and write
20B79000
trusted library allocation
page read and write
3FF1000
trusted library allocation
page read and write
1C443000
heap
page read and write
20B84000
trusted library allocation
page read and write
1FC90000
trusted library allocation
page read and write
1C44C000
heap
page read and write
1FC97000
trusted library allocation
page read and write
AE0000
trusted library allocation
page read and write
20A10000
trusted library allocation
page read and write
1C440000
heap
page read and write
1C425000
heap
page read and write
1C43B000
heap
page read and write
5219000
trusted library allocation
page read and write
B66000
stack
page read and write
1C425000
heap
page read and write
1C46C000
heap
page read and write
20BB5000
trusted library allocation
page read and write
1C442000
heap
page read and write
1C452000
heap
page read and write
1C44F000
heap
page read and write
22B0000
heap
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
20400000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C43D000
heap
page read and write
1C44E000
heap
page read and write
250CA097000
heap
page read and write
1D700000
trusted library allocation
page read and write
1C425000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C451000
heap
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
1FA4B000
trusted library allocation
page read and write
1C452000
heap
page read and write
1C448000
heap
page read and write
20BB5000
trusted library allocation
page read and write
1FA87000
trusted library allocation
page read and write
1FA76000
trusted library allocation
page read and write
1FC90000
trusted library allocation
page read and write
1C411000
heap
page read and write
718D4000
unkown
page readonly
125D000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C440000
heap
page read and write
1C46F000
heap
page read and write
1252000
heap
page read and write
1C401000
heap
page read and write
1FEC7000
trusted library allocation
page read and write
1C4B2000
heap
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1C42B000
heap
page read and write
1D2FB200000
heap
page read and write
1C422000
heap
page read and write
1D2FB27D000
heap
page read and write
294C000
trusted library allocation
page read and write
11D2000
heap
page read and write
1C422000
heap
page read and write
1C43D000
heap
page read and write
DD7000
heap
page read and write
1FA76000
trusted library allocation
page read and write
202A0000
trusted library allocation
page read and write
1274000
heap
page read and write
56C000
heap
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1C44F000
heap
page read and write
1C450000
heap
page read and write
1EE48000
trusted library allocation
page read and write
1C44F000
heap
page read and write
1C43B000
heap
page read and write
2B40000
unclassified section
page readonly
1FAA8000
trusted library allocation
page read and write
1C425000
heap
page read and write
1FA3E000
trusted library allocation
page read and write
1C422000
heap
page read and write
20BA4000
trusted library allocation
page read and write
1C440000
heap
page read and write
1ED13000
trusted library allocation
page read and write
1C436000
heap
page read and write
1C440000
heap
page read and write
2E8B000
heap
page read and write
250CA12D000
heap
page read and write
1FA76000
trusted library allocation
page read and write
20B99000
trusted library allocation
page read and write
11E1000
heap
page read and write
250CA92C000
heap
page read and write
1C425000
heap
page read and write
3A70000
trusted library allocation
page read and write
1C438000
heap
page read and write
1C42B000
heap
page read and write
56A000
heap
page read and write
1C43B000
heap
page read and write
1C425000
heap
page read and write
1D2FB23B000
heap
page read and write
1201000
heap
page read and write
1C436000
heap
page read and write
5260000
trusted library allocation
page read and write
1FAA8000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C480000
heap
page read and write
250CA093000
heap
page read and write
1C44F000
heap
page read and write
1D700000
trusted library allocation
page read and write
20B84000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1C43D000
heap
page read and write
11B2000
trusted library allocation
page execute and read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1FA70000
trusted library allocation
page read and write
1FA76000
trusted library allocation
page read and write
1C447000
heap
page read and write
1FA76000
trusted library allocation
page read and write
1C440000
heap
page read and write
20B62000
trusted library allocation
page read and write
20400000
trusted library allocation
page read and write
1FA55000
trusted library allocation
page read and write
125D000
heap
page read and write
1C425000
heap
page read and write
1C436000
heap
page read and write
1C442000
heap
page read and write
1FC96000
trusted library allocation
page read and write
1C43D000
heap
page read and write
1C453000
heap
page read and write
5230000
trusted library allocation
page read and write
1C44C000
heap
page read and write
20B84000
trusted library allocation
page read and write
54E000
heap
page read and write
250CA97C000
heap
page read and write
20B60000
trusted library allocation
page read and write
1C447000
heap
page read and write
1214000
heap
page read and write
1FA76000
trusted library allocation
page read and write
20000
unclassified section
page readonly
20BA4000
trusted library allocation
page read and write
20B83000
trusted library allocation
page read and write
1C425000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C425000
heap
page read and write
1EF48000
trusted library allocation
page read and write
250CA97C000
heap
page read and write
1C425000
heap
page read and write
1D2FB170000
trusted library allocation
page read and write
20B84000
trusted library allocation
page read and write
1C442000
heap
page read and write
1C42B000
heap
page read and write
40A000
unkown
page write copy
1C438000
heap
page read and write
A6F000
stack
page read and write
1C442000
heap
page read and write
1C4D2000
heap
page read and write
AE0000
unkown
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
1277000
heap
page read and write
1C438000
heap
page read and write
1C44C000
heap
page read and write
20B99000
trusted library allocation
page read and write
1C43D000
heap
page read and write
1C422000
heap
page read and write
1C420000
heap
page read and write
20B5A000
trusted library allocation
page read and write
20B99000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C442000
heap
page read and write
1C422000
heap
page read and write
1C4A3000
heap
page read and write
250CA113000
heap
page read and write
126B000
heap
page read and write
1C425000
heap
page read and write
1C436000
heap
page read and write
1FA76000
trusted library allocation
page read and write
1C425000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C440000
heap
page read and write
20B83000
trusted library allocation
page read and write
1C43D000
heap
page read and write
1C425000
heap
page read and write
20B81000
trusted library allocation
page read and write
1C47D000
heap
page read and write
1FA76000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
1C401000
heap
page read and write
56C000
heap
page read and write
20BA4000
trusted library allocation
page read and write
20B58000
trusted library allocation
page read and write
1FA3E000
trusted library allocation
page read and write
1C442000
heap
page read and write
1C43D000
heap
page read and write
20A20000
trusted library allocation
page read and write
1C436000
heap
page read and write
250C9E40000
heap
page read and write
20BB7000
trusted library allocation
page read and write
1C436000
heap
page read and write
1C42B000
heap
page read and write
1C425000
heap
page read and write
1FA74000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
1C447000
heap
page read and write
20BA4000
trusted library allocation
page read and write
1C422000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C42B000
heap
page read and write
1C401000
heap
page read and write
1C425000
heap
page read and write
1C436000
heap
page read and write
1C425000
heap
page read and write
1C42B000
heap
page read and write
563000
heap
page read and write
202B0000
trusted library allocation
page read and write
1C422000
heap
page read and write
20B81000
trusted library allocation
page read and write
1C425000
heap
page read and write
250CA08B000
heap
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
1C436000
heap
page read and write
435000
unkown
page read and write
1C422000
heap
page read and write
1FC90000
trusted library allocation
page read and write
1FA76000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C42B000
heap
page read and write
1D7000
heap
page read and write
50E000
stack
page read and write
1FA4F000
trusted library allocation
page read and write
1C43B000
heap
page read and write
1C447000
heap
page read and write
1C43D000
heap
page read and write
1FE50000
trusted library allocation
page read and write
1FA76000
trusted library allocation
page read and write
AE5000
trusted library allocation
page read and write
250CA075000
heap
page read and write
56A000
heap
page read and write
1FA76000
trusted library allocation
page read and write
20B83000
trusted library allocation
page read and write
20B84000
trusted library allocation
page read and write
11BC000
trusted library allocation
page execute and read and write
1D2FB100000
unclassified section
page readonly
1C43D000
heap
page read and write
1C43B000
heap
page read and write
20B83000
trusted library allocation
page read and write
20B84000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C425000
heap
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C43B000
heap
page read and write
250CA974000
heap
page read and write
20B84000
trusted library allocation
page read and write
1D2FB28F000
heap
page read and write
1C459000
heap
page read and write
1C440000
heap
page read and write
1C436000
heap
page read and write
1100000
heap
page execute and read and write
20B99000
trusted library allocation
page read and write
54E000
heap
page read and write
1C442000
heap
page read and write
20B84000
trusted library allocation
page read and write
20BA4000
trusted library allocation
page read and write
316707A000
stack
page read and write
1C43B000
heap
page read and write
1C422000
heap
page read and write
1249000
heap
page read and write
1C422000
heap
page read and write
1236000
heap
page read and write
1C422000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C42B000
heap
page read and write
202A0000
unkown
page read and write
1C43D000
heap
page read and write
213B0000
trusted library allocation
page read and write
20B84000
trusted library allocation
page read and write
1C422000
heap
page read and write
1FAA8000
trusted library allocation
page read and write
D50000
trusted library allocation
page read and write
512E000
stack
page read and write
1C461000
heap
page read and write
1230000
heap
page read and write
1FA76000
trusted library allocation
page read and write
54E000
heap
page read and write
1C401000
heap
page read and write
1C44F000
heap
page read and write
250CA079000
heap
page read and write
1FA71000
trusted library allocation
page read and write
1FA87000
trusted library allocation
page read and write
1C422000
heap
page read and write
250CA92C000
heap
page read and write
1C421000
heap
page read and write
1C440000
heap
page read and write
20B83000
trusted library allocation
page read and write
1FA70000
trusted library allocation
page read and write
1C43B000
heap
page read and write
1C405000
heap
page read and write
1C44F000
heap
page read and write
1C425000
heap
page read and write
1C425000
heap
page read and write
1C44C000
heap
page read and write
250CA013000
heap
page read and write
1C447000
heap
page read and write
1C452000
heap
page read and write
1C433000
heap
page read and write
2F90000
heap
page read and write
1C422000
heap
page read and write
1C440000
heap
page read and write
2ACD000
stack
page read and write
1C440000
heap
page read and write
1C421000
heap
page read and write
1C401000
heap
page read and write
1C422000
heap
page read and write
1C440000
heap
page read and write
1C422000
heap
page read and write
1C440000
heap
page read and write
1FA62000
trusted library allocation
page read and write
1C440000
heap
page read and write
1C42B000
heap
page read and write
2FF1000
trusted library allocation
page read and write
1C469000
heap
page read and write
250CA0BC000
heap
page read and write
1F5000
heap
page read and write
1C453000
heap
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1C436000
heap
page read and write
11C4000
heap
page read and write
1C425000
heap
page read and write
1C436000
heap
page read and write
125F000
heap
page read and write
1C43D000
heap
page read and write
1D2FB000000
heap
page read and write
1C422000
heap
page read and write
1C43B000
heap
page read and write
1C422000
heap
page read and write
1C43D000
heap
page read and write
1C454000
heap
page read and write
1C42B000
heap
page read and write
202A0000
unkown
page read and write
1C436000
heap
page read and write
1FA76000
trusted library allocation
page read and write
12E2000
trusted library allocation
page execute and read and write
1C42B000
heap
page read and write
1268000
heap
page read and write
1C425000
heap
page read and write
1FA76000
trusted library allocation
page read and write
20B84000
trusted library allocation
page read and write
1C425000
heap
page read and write
10DE000
stack
page read and write
1C43B000
heap
page read and write
1C422000
heap
page read and write
1C433000
heap
page read and write
1C425000
heap
page read and write
20B99000
trusted library allocation
page read and write
121D000
heap
page read and write
1C421000
heap
page read and write
1FC80000
trusted library allocation
page read and write
1C440000
heap
page read and write
1FA76000
trusted library allocation
page read and write
250CA0BF000
heap
page read and write
1C425000
heap
page read and write
1EE9D000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C425000
heap
page read and write
5190000
trusted library allocation
page read and write
1C422000
heap
page read and write
20B51000
trusted library allocation
page read and write
1D2FB110000
unclassified section
page readonly
1C436000
heap
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1C43D000
heap
page read and write
1C422000
heap
page read and write
1C43B000
heap
page read and write
1FA70000
trusted library allocation
page read and write
20B83000
trusted library allocation
page read and write
1C422000
heap
page read and write
1E8F6000
trusted library allocation
page read and write
1FA76000
trusted library allocation
page read and write
1C440000
heap
page read and write
2B10000
unkown
page readonly
1C422000
heap
page read and write
1C447000
heap
page read and write
1C440000
heap
page read and write
1C422000
heap
page read and write
1C442000
heap
page read and write
1C440000
heap
page read and write
563000
heap
page read and write
1FA4B000
trusted library allocation
page read and write
1C440000
heap
page read and write
1C440000
heap
page read and write
1C482000
heap
page read and write
1C436000
heap
page read and write
1226000
heap
page read and write
1FA89000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C461000
heap
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
213A0000
trusted library allocation
page read and write
20B83000
trusted library allocation
page read and write
1C42B000
heap
page read and write
20B83000
trusted library allocation
page read and write
1C401000
heap
page read and write
1F9F3000
trusted library allocation
page read and write
20B84000
trusted library allocation
page read and write
1C471000
heap
page read and write
1FC96000
trusted library allocation
page read and write
1C401000
heap
page read and write
55F000
heap
page read and write
1FA76000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C440000
heap
page read and write
1C43B000
heap
page read and write
1C422000
heap
page read and write
1C42B000
heap
page read and write
1C434000
heap
page read and write
1C425000
heap
page read and write
1C440000
heap
page read and write
20B51000
trusted library allocation
page read and write
1C43D000
heap
page read and write
1C473000
heap
page read and write
1FC50000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C43B000
heap
page read and write
1C42B000
heap
page read and write
1C425000
heap
page read and write
1FA70000
trusted library allocation
page read and write
1FA62000
trusted library allocation
page read and write
1C46E000
heap
page read and write
250CA09C000
heap
page read and write
1C43B000
heap
page read and write
1FA89000
trusted library allocation
page read and write
1C422000
heap
page read and write
1FCA0000
trusted library allocation
page read and write
1C438000
heap
page read and write
AE0000
trusted library allocation
page read and write
1C42B000
heap
page read and write
1C422000
heap
page read and write
1C44C000
heap
page read and write
1C401000
heap
page read and write
1FA76000
trusted library allocation
page read and write
AD0000
trusted library allocation
page read and write
20B51000
trusted library allocation
page read and write
452000
unkown
page readonly
5210000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C425000
heap
page read and write
1C436000
heap
page read and write
1C43D000
heap
page read and write
DDC000
heap
page read and write
2B20000
unkown
page readonly
1FC90000
trusted library allocation
page read and write
1258000
heap
page read and write
2BCF000
stack
page read and write
1D2FB232000
heap
page read and write
1C425000
heap
page read and write
1C425000
heap
page read and write
1FA76000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C452000
heap
page read and write
502E000
stack
page read and write
1C436000
heap
page read and write
20BA4000
trusted library allocation
page read and write
1268000
heap
page read and write
250CA09D000
heap
page read and write
11C6000
heap
page read and write
1FE50000
trusted library allocation
page read and write
1FA55000
trusted library allocation
page read and write
1C448000
heap
page read and write
1C422000
heap
page read and write
1C440000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C438000
heap
page read and write
1C472000
heap
page read and write
FE4000
heap
page read and write
213A0000
trusted library allocation
page read and write
1C440000
heap
page read and write
1C44F000
heap
page read and write
1C405000
heap
page read and write
1C405000
heap
page read and write
20B99000
trusted library allocation
page read and write
250CA976000
heap
page read and write
1C447000
heap
page read and write
7EE000
stack
page read and write
1FA89000
trusted library allocation
page read and write
1C425000
heap
page read and write
1FA89000
trusted library allocation
page read and write
20B99000
trusted library allocation
page read and write
250CB002000
heap
page read and write
1C422000
heap
page read and write
1C42B000
heap
page read and write
1C440000
heap
page read and write
20B51000
trusted library allocation
page read and write
250CA091000
heap
page read and write
1C425000
heap
page read and write
1C425000
heap
page read and write
250CA815000
heap
page read and write
1C440000
heap
page read and write
1FA4F000
trusted library allocation
page read and write
1249000
heap
page read and write
578000
heap
page read and write
122F000
heap
page read and write
1C456000
heap
page read and write
1258000
heap
page read and write
2A60000
heap
page read and write
1FC90000
trusted library allocation
page read and write
1D2FB120000
heap
page read and write
20A19000
trusted library allocation
page read and write
20580000
trusted library allocation
page read and write
1C422000
heap
page read and write
250CA96D000
heap
page read and write
1FA76000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C452000
heap
page read and write
1C43D000
heap
page read and write
2B30000
unkown
page read and write
250CA0A4000
heap
page read and write
1C43D000
heap
page read and write
128A000
heap
page read and write
1C422000
heap
page read and write
20B83000
trusted library allocation
page read and write
1C438000
heap
page read and write
1FA76000
trusted library allocation
page read and write
1C401000
heap
page read and write
20B83000
trusted library allocation
page read and write
1C433000
heap
page read and write
400000
unkown
page readonly
1C442000
heap
page read and write
1C472000
heap
page read and write
1C438000
heap
page read and write
250CA082000
heap
page read and write
1C422000
heap
page read and write
1C441000
heap
page read and write
1C442000
heap
page read and write
1C422000
heap
page read and write
1C447000
heap
page read and write
1C425000
heap
page read and write
B90000
trusted library allocation
page read and write
20B99000
trusted library allocation
page read and write
1FE55000
trusted library allocation
page read and write
1C436000
heap
page read and write
AE0000
trusted library allocation
page read and write
1C442000
heap
page read and write
1C425000
heap
page read and write
1C458000
heap
page read and write
1C436000
heap
page read and write
20B99000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1C440000
heap
page read and write
250CA0A3000
heap
page read and write
1C422000
heap
page read and write
11AA000
trusted library allocation
page execute and read and write
133E000
stack
page read and write
1C416000
heap
page read and write
20B99000
trusted library allocation
page read and write
1C436000
heap
page read and write
1C447000
heap
page read and write
1C436000
heap
page read and write
1C405000
heap
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
11E3000
heap
page read and write
214F0000
trusted library allocation
page read and write
1C425000
heap
page read and write
1D5000
heap
page read and write
1FA59000
trusted library allocation
page read and write
1C422000
heap
page read and write
1FA62000
trusted library allocation
page read and write
1C422000
heap
page read and write
1FA76000
trusted library allocation
page read and write
250CA06B000
heap
page read and write
250CA0BE000
heap
page read and write
20B84000
trusted library allocation
page read and write
57E000
heap
page read and write
1C425000
heap
page read and write
AE8000
trusted library allocation
page read and write
20B84000
trusted library allocation
page read and write
1FA89000
trusted library allocation
page read and write
1C436000
heap
page read and write
1C454000
heap
page read and write
1C427000
heap
page read and write
1C422000
heap
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
1C401000
heap
page read and write
401000
unkown
page execute read
1C425000
heap
page read and write
2E80000
heap
page read and write
1FA76000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
1FA41000
trusted library allocation
page read and write
20B84000
trusted library allocation
page read and write
250CA929000
heap
page read and write
1C422000
heap
page read and write
1FAA8000
trusted library allocation
page read and write
1FA76000
trusted library allocation
page read and write
12EA000
trusted library allocation
page execute and read and write
B6A000
stack
page read and write
1C43B000
heap
page read and write
20B75000
trusted library allocation
page read and write
1C43D000
heap
page read and write
1FAA8000
trusted library allocation
page read and write
1C422000
heap
page read and write
3411000
heap
page read and write
1C401000
heap
page read and write
1C43B000
heap
page read and write
44F000
unkown
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1C425000
heap
page read and write
1FA89000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C43B000
heap
page read and write
1267000
heap
page read and write
1C401000
heap
page read and write
1C425000
heap
page read and write
1FA76000
trusted library allocation
page read and write
55A000
heap
page read and write
20B83000
trusted library allocation
page read and write
20B83000
trusted library allocation
page read and write
1C422000
heap
page read and write
401000
unkown
page execute read
408000
unkown
page readonly
1C422000
heap
page read and write
1C43D000
heap
page read and write
54E000
heap
page read and write
1C425000
heap
page read and write
1FE50000
trusted library allocation
page read and write
1C440000
heap
page read and write
250CA128000
heap
page read and write
20B83000
trusted library allocation
page read and write
56E000
heap
page read and write
1C454000
heap
page read and write
1FA87000
trusted library allocation
page read and write
56A000
heap
page read and write
20B9B000
trusted library allocation
page read and write
1C440000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C452000
heap
page read and write
1FAA8000
trusted library allocation
page read and write
1C401000
heap
page read and write
213B8000
trusted library allocation
page read and write
1FA76000
trusted library allocation
page read and write
1C451000
heap
page read and write
20B65000
trusted library allocation
page read and write
20B84000
trusted library allocation
page read and write
1FAA8000
trusted library allocation
page read and write
AE5000
unkown
page read and write
1C440000
heap
page read and write
1C47D000
heap
page read and write
1FAD0000
trusted library allocation
page read and write
294A000
trusted library allocation
page read and write
1C438000
heap
page read and write
1C422000
heap
page read and write
1C425000
heap
page read and write
1C436000
heap
page read and write
23F4000
heap
page read and write
1C425000
heap
page read and write
2B20000
unkown
page readonly
1C47A000
heap
page read and write
213A0000
trusted library allocation
page read and write
1C43D000
heap
page read and write
1C489000
heap
page read and write
1C440000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C42B000
heap
page read and write
1C422000
heap
page read and write
1C442000
heap
page read and write
1C422000
heap
page read and write
4CE000
stack
page read and write
1C425000
heap
page read and write
20B84000
trusted library allocation
page read and write
20B83000
trusted library allocation
page read and write
1FC90000
trusted library allocation
page read and write
1FC95000
trusted library allocation
page read and write
1C425000
heap
page read and write
124F000
heap
page read and write
1FA76000
trusted library allocation
page read and write
AD0000
trusted library allocation
page read and write
1C42B000
heap
page read and write
1C422000
heap
page read and write
250CA000000
heap
page read and write
20B84000
trusted library allocation
page read and write
20B83000
trusted library allocation
page read and write
250CA087000
heap
page read and write
1C44F000
heap
page read and write
294C000
trusted library allocation
page read and write
20B84000
trusted library allocation
page read and write
1FA8B000
trusted library allocation
page read and write
1C42B000
heap
page read and write
1C477000
heap
page read and write
1FA58000
trusted library allocation
page read and write
1C422000
heap
page read and write
20B84000
trusted library allocation
page read and write
1FA8B000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C42B000
heap
page read and write
56E000
heap
page read and write
20B51000
trusted library allocation
page read and write
1FA3E000
trusted library allocation
page read and write
1FA76000
trusted library allocation
page read and write
1C422000
heap
page read and write
1FC90000
trusted library allocation
page read and write
AE8000
trusted library allocation
page read and write
1C474000
heap
page read and write
1C422000
heap
page read and write
1C456000
heap
page read and write
293F000
stack
page read and write
1FA49000
trusted library allocation
page read and write
20B9B000
trusted library allocation
page read and write
1C42B000
heap
page read and write
1FA62000
trusted library allocation
page read and write
1C438000
heap
page read and write
20B84000
trusted library allocation
page read and write
1FA89000
trusted library allocation
page read and write
1C422000
heap
page read and write
1FA8B000
trusted library allocation
page read and write
1C440000
heap
page read and write
1C440000
heap
page read and write
1FC96000
trusted library allocation
page read and write
1C472000
heap
page read and write
1C42B000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C442000
heap
page read and write
1FC90000
trusted library allocation
page read and write
1FCA0000
trusted library allocation
page read and write
1FA76000
trusted library allocation
page read and write
1D2FB243000
heap
page read and write
1C422000
heap
page read and write
1C43D000
heap
page read and write
55F000
heap
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
DA0000
heap
page read and write
1FC90000
trusted library allocation
page read and write
3166F7E000
stack
page read and write
1C470000
heap
page read and write
1C422000
heap
page read and write
1FE55000
trusted library allocation
page read and write
1C43B000
heap
page read and write
1FAA8000
trusted library allocation
page read and write
250C9FB0000
unclassified section
page readonly
1FA66000
trusted library allocation
page read and write
AE6000
trusted library allocation
page read and write
250CA92C000
heap
page read and write
1FA76000
trusted library allocation
page read and write
1C452000
heap
page read and write
1C42B000
heap
page read and write
1D2FB240000
heap
page read and write
1FC9C000
trusted library allocation
page read and write
1241000
heap
page read and write
1C440000
heap
page read and write
1C446000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C42B000
heap
page read and write
1FA70000
trusted library allocation
page read and write
11CD000
heap
page read and write
1C452000
heap
page read and write
1FA4E000
trusted library allocation
page read and write
1C44F000
heap
page read and write
1FA76000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C42B000
heap
page read and write
3AB0000
trusted library allocation
page read and write
1FA4E000
trusted library allocation
page read and write
214F0000
unkown
page read and write
1C436000
heap
page read and write
F4BECEB000
stack
page read and write
1C425000
heap
page read and write
1C436000
heap
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1FA54000
trusted library allocation
page read and write
DA7000
heap
page read and write
1FC95000
trusted library allocation
page read and write
1C440000
heap
page read and write
1FA76000
trusted library allocation
page read and write
20B8B000
trusted library allocation
page read and write
20B9B000
trusted library allocation
page read and write
1C440000
heap
page read and write
1C425000
heap
page read and write
1C425000
heap
page read and write
1225000
heap
page read and write
56E000
heap
page read and write
1C425000
heap
page read and write
1214000
heap
page read and write
1C422000
heap
page read and write
1C43B000
heap
page read and write
1D2FB270000
heap
page read and write
11EC000
heap
page read and write
2B30000
unkown
page read and write
1C440000
heap
page read and write
588000
heap
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
55A000
heap
page read and write
1C440000
heap
page read and write
1FA76000
trusted library allocation
page read and write
20B51000
trusted library allocation
page read and write
1C422000
heap
page read and write
AE0000
trusted library allocation
page read and write
1C405000
heap
page read and write
20B95000
trusted library allocation
page read and write
1C421000
heap
page read and write
1C422000
heap
page read and write
1C451000
heap
page read and write
124B000
heap
page read and write
1C425000
heap
page read and write
1C43B000
heap
page read and write
1C401000
heap
page read and write
213A0000
trusted library allocation
page read and write
250CA976000
heap
page read and write
1C42B000
heap
page read and write
1C452000
heap
page read and write
20B95000
trusted library allocation
page read and write
250CA0AE000
heap
page read and write
20BA4000
trusted library allocation
page read and write
1C46E000
heap
page read and write
20B84000
trusted library allocation
page read and write
20B83000
trusted library allocation
page read and write
1C42B000
heap
page read and write
20BA4000
trusted library allocation
page read and write
1C43D000
heap
page read and write
20B9B000
trusted library allocation
page read and write
11A2000
trusted library allocation
page execute and read and write
1C451000
heap
page read and write
1C422000
heap
page read and write
20B85000
trusted library allocation
page read and write
1D0000
heap
page read and write
250CA093000
heap
page read and write
1C446000
heap
page read and write
229E000
stack
page read and write
1C442000
heap
page read and write
126B000
heap
page read and write
1C422000
heap
page read and write
202D0000
trusted library allocation
page read and write
20B83000
trusted library allocation
page read and write
1C43D000
heap
page read and write
1C43B000
heap
page read and write
1234000
heap
page read and write
1FA76000
trusted library allocation
page read and write
11D2000
heap
page read and write
56A000
heap
page read and write
5240000
trusted library allocation
page read and write
1C43B000
heap
page read and write
1C43B000
heap
page read and write
1C456000
heap
page read and write
250CA7C0000
trusted library allocation
page read and write
1C422000
heap
page read and write
1FC90000
trusted library allocation
page read and write
20BA4000
trusted library allocation
page read and write
1C433000
heap
page read and write
1C43B000
heap
page read and write
1C445000
heap
page read and write
1C446000
heap
page read and write
1C472000
heap
page read and write
1C425000
heap
page read and write
250CA90E000
heap
page read and write
54E000
heap
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C43B000
heap
page read and write
1C425000
heap
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
1C440000
heap
page read and write
1C44F000
heap
page read and write
250CA93B000
heap
page read and write
1FA4B000
trusted library allocation
page read and write
20B7B000
trusted library allocation
page read and write
1259000
heap
page read and write
1FA4B000
trusted library allocation
page read and write
31668DB000
stack
page read and write
1C43B000
heap
page read and write
124F000
heap
page read and write
1FAA8000
trusted library allocation
page read and write
1FA3D000
trusted library allocation
page read and write
1FA66000
trusted library allocation
page read and write
1FA5A000
trusted library allocation
page read and write
1C422000
heap
page read and write
20B51000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C440000
heap
page read and write
20407000
trusted library allocation
page read and write
1C440000
heap
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1FA58000
trusted library allocation
page read and write
250CA116000
heap
page read and write
1C425000
heap
page read and write
1C42B000
heap
page read and write
1C440000
heap
page read and write
1C401000
heap
page read and write
1C440000
heap
page read and write
20B83000
trusted library allocation
page read and write
1FA76000
trusted library allocation
page read and write
1C44F000
heap
page read and write
1FA76000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1C425000
heap
page read and write
213B0000
trusted library allocation
page read and write
213A0000
trusted library allocation
page read and write
1FA63000
trusted library allocation
page read and write
1C460000
heap
page read and write
1C422000
heap
page read and write
1C405000
heap
page read and write
121C000
heap
page read and write
250CA12D000
heap
page read and write
1C422000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C42B000
heap
page read and write
1C446000
heap
page read and write
20BA4000
trusted library allocation
page read and write
1FA76000
trusted library allocation
page read and write
20B83000
trusted library allocation
page read and write
1225000
heap
page read and write
1C425000
heap
page read and write
250CA800000
heap
page read and write
213A0000
trusted library allocation
page read and write
1C440000
heap
page read and write
1C425000
heap
page read and write
1C438000
heap
page read and write
1FA6E000
trusted library allocation
page read and write
1C440000
heap
page read and write
1C464000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C43D000
heap
page read and write
1C425000
heap
page read and write
1C41D000
heap
page read and write
30EF000
stack
page read and write
1C425000
heap
page read and write
1FA87000
trusted library allocation
page read and write
1275000
heap
page read and write
1C432000
heap
page read and write
20B83000
trusted library allocation
page read and write
1C442000
heap
page read and write
1C422000
heap
page read and write
1FA76000
trusted library allocation
page read and write
1C43D000
heap
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1C425000
heap
page read and write
1D2FB24B000
heap
page read and write
51F0000
trusted library allocation
page read and write
20BA4000
trusted library allocation
page read and write
1C42B000
heap
page read and write
23F0000
heap
page read and write
20B99000
trusted library allocation
page read and write
1C420000
heap
page read and write
1C42B000
heap
page read and write
1C454000
heap
page read and write
20B83000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
1C44F000
heap
page read and write
1C43D000
heap
page read and write
20B83000
trusted library allocation
page read and write
20B83000
trusted library allocation
page read and write
1FA8B000
trusted library allocation
page read and write
1C44C000
heap
page read and write
250CA937000
heap
page read and write
1FC50000
trusted library allocation
page read and write
1244000
heap
page read and write
30F0000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C401000
heap
page read and write
1C43B000
heap
page read and write
1C425000
heap
page read and write
1C42B000
heap
page read and write
1C425000
heap
page read and write
1C440000
heap
page read and write
1C422000
heap
page read and write
1C451000
heap
page read and write
1C422000
heap
page read and write
581000
heap
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1C43D000
heap
page read and write
1C422000
heap
page read and write
1C425000
heap
page read and write
1C4A6000
heap
page read and write
1FA89000
trusted library allocation
page read and write
1C440000
heap
page read and write
1C440000
heap
page read and write
1C472000
heap
page read and write
1C438000
heap
page read and write
1C440000
heap
page read and write
1C42B000
heap
page read and write
1C440000
heap
page read and write
1FA73000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C42B000
heap
page read and write
250C9EB0000
heap
page read and write
578000
heap
page read and write
1C44F000
heap
page read and write
55F000
heap
page read and write
250CA12A000
heap
page read and write
1C451000
heap
page read and write
1C425000
heap
page read and write
1C401000
heap
page read and write
1D2FBA02000
trusted library allocation
page read and write
1C413000
heap
page read and write
250CA92B000
heap
page read and write
1C451000
heap
page read and write
1C472000
heap
page read and write
1C43D000
heap
page read and write
1C425000
heap
page read and write
1C469000
heap
page read and write
1FA4B000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C440000
heap
page read and write
1C460000
heap
page read and write
578000
heap
page read and write
1C452000
heap
page read and write
1C436000
heap
page read and write
1C43B000
heap
page read and write
1C44F000
heap
page read and write
1C422000
heap
page read and write
1C440000
heap
page read and write
1E0000
unclassified section
page readonly
1C43D000
heap
page read and write
1D700000
trusted library allocation
page read and write
20B95000
trusted library allocation
page read and write
20B84000
trusted library allocation
page read and write
1FC90000
trusted library allocation
page read and write
1C440000
heap
page read and write
1C422000
heap
page read and write
408000
unkown
page readonly
56E000
heap
page read and write
A00000
heap
page read and write
20B99000
trusted library allocation
page read and write
1C454000
heap
page read and write
1C42B000
heap
page read and write
1C42B000
heap
page read and write
1235000
heap
page read and write
20406000
trusted library allocation
page read and write
213A0000
unkown
page read and write
250CA12A000
heap
page read and write
1C436000
heap
page read and write
121B000
heap
page read and write
1C422000
heap
page read and write
20B57000
trusted library allocation
page read and write
1C43D000
heap
page read and write
1C422000
heap
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
1FA76000
trusted library allocation
page read and write
250CA0BD000
heap
page read and write
1C422000
heap
page read and write
1C425000
heap
page read and write
1FA4F000
trusted library allocation
page read and write
55F000
heap
page read and write
1C42B000
heap
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
124F000
heap
page read and write
1C425000
heap
page read and write
20B67000
trusted library allocation
page read and write
1C447000
heap
page read and write
2CAF000
stack
page read and write
20400000
trusted library allocation
page read and write
1C44C000
heap
page read and write
1D2FB302000
heap
page read and write
1C422000
heap
page read and write
1C411000
heap
page read and write
563000
heap
page read and write
213C2000
trusted library allocation
page read and write
1C42B000
heap
page read and write
1FA76000
trusted library allocation
page read and write
1FA70000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
1C43B000
heap
page read and write
1C43B000
heap
page read and write
1C43B000
heap
page read and write
1C405000
heap
page read and write
1C442000
heap
page read and write
214F9000
unkown
page read and write
20B95000
trusted library allocation
page read and write
1C436000
heap
page read and write
1C43D000
heap
page read and write
1C440000
heap
page read and write
1C425000
heap
page read and write
2E3E000
stack
page read and write
1C436000
heap
page read and write
1FA76000
trusted library allocation
page read and write
20B84000
trusted library allocation
page read and write
1FA76000
trusted library allocation
page read and write
20BA4000
trusted library allocation
page read and write
1FA4B000
trusted library allocation
page read and write
213A0000
trusted library allocation
page read and write
1C42B000
heap
page read and write
1C401000
heap
page read and write
1C42B000
heap
page read and write
213A8000
trusted library allocation
page read and write
1FED0000
trusted library allocation
page read and write
1FA76000
trusted library allocation
page read and write
213A0000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C440000
heap
page read and write
283F000
stack
page read and write
1C438000
heap
page read and write
1C46F000
heap
page read and write
F4BF1FF000
stack
page read and write
1C425000
heap
page read and write
1238000
heap
page read and write
1C43D000
heap
page read and write
1C440000
heap
page read and write
1C422000
heap
page read and write
1C4A2000
heap
page read and write
250CA097000
heap
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
11F3000
heap
page read and write
1C422000
heap
page read and write
124F000
heap
page read and write
1C405000
heap
page read and write
20B51000
trusted library allocation
page read and write
20B5F000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
1C451000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C405000
heap
page read and write
1C43D000
heap
page read and write
1C43D000
heap
page read and write
1C4A8000
heap
page read and write
1C438000
heap
page read and write
20B85000
trusted library allocation
page read and write
1C47A000
heap
page read and write
1D700000
trusted library allocation
page read and write
1D2FB213000
heap
page read and write
1C422000
heap
page read and write
1FA44000
trusted library allocation
page read and write
1C42B000
heap
page read and write
1221000
heap
page read and write
1C42B000
heap
page read and write
1C422000
heap
page read and write
1C42B000
heap
page read and write
1C422000
heap
page read and write
250CA92D000
heap
page read and write
452000
unkown
page readonly
1FA76000
trusted library allocation
page read and write
1C422000
heap
page read and write
1FA68000
trusted library allocation
page read and write
1C480000
heap
page read and write
122A000
heap
page read and write
D4E000
stack
page read and write
1C453000
heap
page read and write
20B99000
trusted library allocation
page read and write
1C401000
heap
page read and write
1C405000
heap
page read and write
120D000
heap
page read and write
1C425000
heap
page read and write
1212000
heap
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1C44F000
heap
page read and write
11C4000
heap
page read and write
1C425000
heap
page read and write
1C405000
heap
page read and write
1FA74000
trusted library allocation
page read and write
1C43B000
heap
page read and write
1C42B000
heap
page read and write
1C434000
heap
page read and write
1C438000
heap
page read and write
1C425000
heap
page read and write
1E8C1000
trusted library allocation
page read and write
1FC90000
trusted library allocation
page read and write
1C438000
heap
page read and write
1C438000
heap
page read and write
1C425000
heap
page read and write
1C425000
heap
page read and write
1C425000
heap
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
1C446000
heap
page read and write
250CA802000
heap
page read and write
4EE0000
trusted library allocation
page read and write
1C42B000
heap
page read and write
1C43B000
heap
page read and write
1C436000
heap
page read and write
11F3000
heap
page read and write
1C422000
heap
page read and write
1D2FB246000
heap
page read and write
1FA4B000
trusted library allocation
page read and write
20B83000
trusted library allocation
page read and write
1FA6D000
trusted library allocation
page read and write
1FA8B000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
202B0000
trusted library allocation
page read and write
1C422000
heap
page read and write
AC0000
trusted library allocation
page read and write
55A000
heap
page read and write
250CA956000
heap
page read and write
1C43B000
heap
page read and write
11B0000
trusted library allocation
page read and write
1C44C000
heap
page read and write
1C425000
heap
page read and write
20B83000
trusted library allocation
page read and write
250CA100000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C42B000
heap
page read and write
BF0000
heap
page read and write
20B84000
trusted library allocation
page read and write
127F000
heap
page read and write
1C422000
heap
page read and write
122B000
heap
page read and write
1C425000
heap
page read and write
1C43D000
heap
page read and write
11E1000
heap
page read and write
1261000
heap
page read and write
1C43E000
heap
page read and write
1C42B000
heap
page read and write
20B79000
trusted library allocation
page read and write
250CA95B000
heap
page read and write
5160000
trusted library allocation
page read and write
1FA76000
trusted library allocation
page read and write
1D1D0000
remote allocation
page read and write
20B99000
trusted library allocation
page read and write
20B81000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C422000
heap
page read and write
1FA3C000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C46F000
heap
page read and write
1C450000
heap
page read and write
1C422000
heap
page read and write
20B83000
trusted library allocation
page read and write
1FA76000
trusted library allocation
page read and write
1C440000
heap
page read and write
1C422000
heap
page read and write
1FA62000
trusted library allocation
page read and write
1C440000
heap
page read and write
1C440000
heap
page read and write
1C422000
heap
page read and write
1C45A000
heap
page read and write
1C436000
heap
page read and write
1FA76000
trusted library allocation
page read and write
20B9B000
trusted library allocation
page read and write
1C44F000
heap
page read and write
1C422000
heap
page read and write
1C472000
heap
page read and write
250CA90E000
heap
page read and write
1C422000
heap
page read and write
8F0000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C43B000
heap
page read and write
1C43B000
heap
page read and write
20B84000
trusted library allocation
page read and write
AE0000
trusted library allocation
page read and write
1C422000
heap
page read and write
20BA4000
trusted library allocation
page read and write
1C452000
heap
page read and write
20B99000
trusted library allocation
page read and write
1FC90000
trusted library allocation
page read and write
1C447000
heap
page read and write
528000
heap
page read and write
1C425000
heap
page read and write
1C425000
heap
page read and write
250CA974000
heap
page read and write
1FEC0000
trusted library allocation
page read and write
1C436000
heap
page read and write
1C401000
heap
page read and write
2A50000
unclassified section
page readonly
1C436000
heap
page read and write
20B84000
trusted library allocation
page read and write
20B51000
trusted library allocation
page read and write
20B83000
trusted library allocation
page read and write
1FA76000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C43D000
heap
page read and write
1C475000
heap
page read and write
1C422000
heap
page read and write
20A10000
trusted library allocation
page read and write
1FA76000
trusted library allocation
page read and write
1C425000
heap
page read and write
4F19000
trusted library allocation
page read and write
250CA0CD000
heap
page read and write
1C425000
heap
page read and write
1D705000
trusted library allocation
page read and write
1C440000
heap
page read and write
20B84000
trusted library allocation
page read and write
1FA76000
trusted library allocation
page read and write
BD0000
heap
page read and write
1C422000
heap
page read and write
11C4000
heap
page read and write
123B000
heap
page read and write
1FA44000
trusted library allocation
page read and write
1C436000
heap
page read and write
56A000
heap
page read and write
1C42B000
heap
page read and write
1C405000
heap
page read and write
1C422000
heap
page read and write
1FC90000
trusted library allocation
page read and write
1FC90000
trusted library allocation
page read and write
1C436000
heap
page read and write
1C438000
heap
page read and write
1FC90000
trusted library allocation
page read and write
1C43D000
heap
page read and write
250CA093000
heap
page read and write
1C425000
heap
page read and write
1C440000
heap
page read and write
1FA89000
trusted library allocation
page read and write
1C452000
heap
page read and write
1C425000
heap
page read and write
AE0000
unkown
page read and write
1D2FB22A000
heap
page read and write
1C42B000
heap
page read and write
1C447000
heap
page read and write
1C442000
heap
page read and write
1C43B000
heap
page read and write
1C425000
heap
page read and write
1C432000
heap
page read and write
2B10000
unkown
page readonly
1C43D000
heap
page read and write
1C425000
heap
page read and write
1C43B000
heap
page read and write
1C43D000
heap
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1C436000
heap
page read and write
121E000
heap
page read and write
1C422000
heap
page read and write
1C440000
heap
page read and write
F4BF4FF000
stack
page read and write
1C43D000
heap
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1C438000
heap
page read and write
20B84000
trusted library allocation
page read and write
3166E7E000
stack
page read and write
20B99000
trusted library allocation
page read and write
1C42B000
heap
page read and write
1C425000
heap
page read and write
1C425000
heap
page read and write
20B95000
trusted library allocation
page read and write
1C43B000
heap
page read and write
1C43D000
heap
page read and write
1C42B000
heap
page read and write
128A000
heap
page read and write
250CA027000
heap
page read and write
1C436000
heap
page read and write
202B8000
trusted library allocation
page read and write
1EEF2000
trusted library allocation
page read and write
1C422000
heap
page read and write
213A0000
trusted library allocation
page read and write
1F9D5000
trusted library allocation
page read and write
51FC000
trusted library allocation
page read and write
5140000
trusted library allocation
page read and write
11FD000
heap
page read and write
1C436000
heap
page read and write
1C459000
heap
page read and write
1C422000
heap
page read and write
2B30000
unkown
page read and write
1C422000
heap
page read and write
11DE000
heap
page read and write
1FA8B000
trusted library allocation
page read and write
20B99000
trusted library allocation
page read and write
1C401000
heap
page read and write
11E7000
heap
page read and write
1FC90000
trusted library allocation
page read and write
A6C000
stack
page read and write
1C422000
heap
page read and write
1C422000
heap
page read and write
1C425000
heap
page read and write
20B99000
trusted library allocation
page read and write
20BB5000
trusted library allocation
page read and write
1FA76000
trusted library allocation
page read and write
1C422000
heap
page read and write
1236000
heap
page read and write
1C425000
heap
page read and write
1C401000
heap
page read and write
1C440000
heap
page read and write
1C43D000
heap
page read and write
1C422000
heap
page read and write
1C440000
heap
page read and write
1C425000
heap
page read and write
20408000
trusted library allocation
page read and write
1C451000
heap
page read and write
56E000
heap
page read and write
1C425000
heap
page read and write
1C436000
heap
page read and write
1218000
heap
page read and write
1C425000
heap
page read and write
1C425000
heap
page read and write
1C454000
heap
page read and write
1C43D000
heap
page read and write
1FA6E000
trusted library allocation
page read and write
1FA8B000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C425000
heap
page read and write
20B95000
trusted library allocation
page read and write
1C440000
heap
page read and write
20B95000
trusted library allocation
page read and write
1FA76000
trusted library allocation
page read and write
1252000
heap
page read and write
20B83000
trusted library allocation
page read and write
1C43B000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C43B000
heap
page read and write
1C43B000
heap
page read and write
1C422000
heap
page read and write
20B84000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C42B000
heap
page read and write
127B000
heap
page read and write
20B95000
trusted library allocation
page read and write
1C425000
heap
page read and write
1FAA8000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
1C436000
heap
page read and write
1FAA8000
trusted library allocation
page read and write
20B95000
trusted library allocation
page read and write
1C436000
heap
page read and write
20B83000
trusted library allocation
page read and write
1190000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C43B000
heap
page read and write
1C421000
heap
page read and write
1C462000
heap
page read and write
1C440000
heap
page read and write
1C446000
heap
page read and write
1C440000
heap
page read and write
1C43D000
heap
page read and write
250CA12A000
heap
page read and write
20B83000
trusted library allocation
page read and write
202B0000
trusted library allocation
page read and write
1C425000
heap
page read and write
20B84000
trusted library allocation
page read and write
1FA76000
trusted library allocation
page read and write
1C425000
heap
page read and write
1FA76000
trusted library allocation
page read and write
1FA48000
trusted library allocation
page read and write
1C422000
heap
page read and write
2B20000
unkown
page readonly
1C43B000
heap
page read and write
1FA59000
trusted library allocation
page read and write
2B0A000
stack
page read and write
1C425000
heap
page read and write
1FA76000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C425000
heap
page read and write
1C44B000
heap
page read and write
1C425000
heap
page read and write
1C43E000
heap
page read and write
1C447000
heap
page read and write
1C422000
heap
page read and write
1FA62000
trusted library allocation
page read and write
2941000
trusted library allocation
page read and write
1C436000
heap
page read and write
1C401000
heap
page read and write
1C442000
heap
page read and write
1FA76000
trusted library allocation
page read and write
1C43B000
heap
page read and write
718D0000
unkown
page readonly
1C401000
heap
page read and write
1FA89000
trusted library allocation
page read and write
11E5000
heap
page read and write
1C44B000
heap
page read and write
96E000
stack
page read and write
20B84000
trusted library allocation
page read and write
1C425000
heap
page read and write
1C436000
heap
page read and write
1C425000
heap
page read and write
1C424000
heap
page read and write
1C436000
heap
page read and write
1C422000
heap
page read and write
1C436000
heap
page read and write
1C425000
heap
page read and write
20B99000
trusted library allocation
page read and write
1FA70000
trusted library allocation
page read and write
20B84000
trusted library allocation
page read and write
1C440000
heap
page read and write
1C43B000
heap
page read and write
422000
unkown
page read and write
1C422000
heap
page read and write
20B99000
trusted library allocation
page read and write
1C42B000
heap
page read and write
1C425000
heap
page read and write
127F000
heap
page read and write
1C436000
heap
page read and write
1FC90000
trusted library allocation
page read and write
1FA4B000
trusted library allocation
page read and write
1C422000
heap
page read and write
1C425000
heap
page read and write
1FA70000
trusted library allocation
page read and write
213C0000
trusted library allocation
page read and write
1FA76000
trusted library allocation
page read and write
1FA41000
trusted library allocation
page read and write
1C440000
heap
page read and write
1FC90000
trusted library allocation
page read and write
1C43D000
heap
page read and write
1C401000
heap
page read and write
1C425000
heap
page read and write
1C438000
heap
page read and write
1C440000
heap
page read and write
20B75000
trusted library allocation
page read and write
20B9B000
trusted library allocation
page read and write
125D000
heap
page read and write
2E7F000
stack
page read and write
1C44C000
heap
page read and write
250CA92F000
heap
page read and write
1FA70000
trusted library allocation
page read and write
1C422000
heap
page read and write
1FC56000
trusted library allocation
page read and write
1FAA8000
trusted library allocation
page read and write
20BB5000
trusted library allocation
page read and write
1C422000
heap
page read and write
There are 2253 hidden memdumps, click here to show them.