IOC Report
DPR602859651100125001V1100125154830E 3-2-2023#U00b7pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
DPR602859651100125001V1100125154830E 3-2-2023#U00b7pdf.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\subfolder1\Windowss.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp673D.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\run.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Deskriptiv155\Hjertere\Hynde.Una
ASCII text, with very long lines (34794), with no line terminators
dropped
C:\Users\user\AppData\Local\Deskriptiv155\Hjertere\Rouleredes.coe
data
dropped
C:\Users\user\AppData\Local\Deskriptiv155\Hjertere\checkbox_checked.png
PNG image data, 32 x 32, 2-bit colormap, non-interlaced
dropped
C:\Users\user\AppData\Local\Deskriptiv155\Hjertere\multimedia-volume-control-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Deskriptiv155\Hjertere\phone-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\caspol.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\nssE334.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsxE304.tmp
data
dropped
C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\catalog.dat
data
dropped
C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\settings.bin
data
dropped
C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\storage.dat
data
dropped
C:\Users\user\AppData\Roaming\11389406-0377-47ED-98C7-D564E683C6EB\task.dat
ASCII text, with no line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DPR602859651100125001V1100125154830E 3-2-2023#U00b7pdf.exe
C:\Users\user\Desktop\DPR602859651100125001V1100125154830E 3-2-2023#U00b7pdf.exe
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
C:\Users\user\Desktop\DPR602859651100125001V1100125154830E 3-2-2023#U00b7pdf.exe
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
C:\Users\user\Desktop\DPR602859651100125001V1100125154830E 3-2-2023#U00b7pdf.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks.exe" /create /f /tn "DSL Monitor" /xml "C:\Users\user\AppData\Local\Temp\tmp673D.tmp
malicious
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CasPol.exe
C:\Windows\Microsoft.NET\Framework\v2.0.50727\caspol.exe 0
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://doc-0c-b0-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/gop7ht5qt6iu260mrr5822id2hevfvup/1675479375000/07900185898442636486/*/1GWkPMapRdWHnFBq8NG4QBMUUzbTsJcvy?e=download&uuid=5cfb3928-a799-4c74-b6f0-f4c0849b8739
142.250.186.161
https://doc-0c-b0-docs.googleusercontent.com/
unknown
https://doc-0c-b0-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/gop7ht5q
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://google.com
unknown
https://drive.google.com/
unknown
https://doc-0c-b0-docs.googleusercontent.com/H
unknown

Domains

Name
IP
Malicious
masterpat0nms672ns.duckdns.org
91.193.75.146
malicious
drive.google.com
142.250.185.110
googlehosted.l.googleusercontent.com
142.250.186.161
doc-0c-b0-docs.googleusercontent.com
unknown

IPs

IP
Domain
Country
Malicious
91.193.75.146
masterpat0nms672ns.duckdns.org
Serbia
malicious
142.250.186.161
googlehosted.l.googleusercontent.com
United States
142.250.185.110
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Sansebeskrivelsers\Vandsamling197\Hybridnettets\Energimaengde52
Orientalises
HKEY_CURRENT_USER\SOFTWARE\carboxylsyren\Fluer172\Amortisationerne
Sociometr
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\weighers
Lunefuldest
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Startup key

Memdumps

Base Address
Regiontype
Protect
Malicious
8C46000
direct allocation
page execute and read and write
malicious
367D1000
heap
page read and write
367D5000
heap
page read and write
3A025000
heap
page read and write
367FE000
heap
page read and write
A046000
direct allocation
page execute and read and write
1BA32920000
trusted library allocation
page read and write
3A040000
trusted library allocation
page read and write
3B233000
heap
page read and write
2350000
heap
page read and write
367D1000
heap
page read and write
3B221000
heap
page read and write
3A2B6000
trusted library allocation
page read and write
367EA000
heap
page read and write
3B235000
heap
page read and write
3A025000
heap
page read and write
39FE7000
heap
page read and write
1210000
heap
page read and write
36821000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
156ABA48000
heap
page read and write
39FE7000
heap
page read and write
367D1000
heap
page read and write
367E5000
heap
page read and write
3A810000
unkown
page read and write
39FE6000
heap
page read and write
367EA000
heap
page read and write
1BA2D513000
heap
page read and write
71ED000
heap
page read and write
156ABA54000
heap
page read and write
367EA000
heap
page read and write
3B221000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
3B221000
heap
page read and write
367E5000
heap
page read and write
367E5000
heap
page read and write
1BA328AC000
trusted library allocation
page read and write
367D5000
heap
page read and write
39FEB000
heap
page read and write
3682F000
heap
page read and write
3B221000
heap
page read and write
3B221000
heap
page read and write
367D1000
heap
page read and write
36801000
heap
page read and write
367EF000
heap
page read and write
367EA000
heap
page read and write
1BA32C11000
heap
page read and write
367FF000
heap
page read and write
DBC000
stack
page read and write
367F2000
heap
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
3B221000
heap
page read and write
367E5000
heap
page read and write
78F3AFB000
stack
page read and write
367E5000
heap
page read and write
3B221000
heap
page read and write
10059000
trusted library allocation
page read and write
367D1000
heap
page read and write
1BA2CC9D000
heap
page read and write
367EA000
heap
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
367ED000
heap
page read and write
367D5000
heap
page read and write
367EF000
heap
page read and write
1BA2CD13000
heap
page read and write
367EF000
heap
page read and write
3B221000
heap
page read and write
39213000
trusted library allocation
page read and write
39FF4000
heap
page read and write
367F4000
heap
page read and write
39FE0000
heap
page read and write
156ABA27000
heap
page read and write
367D1000
heap
page read and write
39FF8000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
3B24E000
heap
page read and write
39FF8000
heap
page read and write
367ED000
heap
page read and write
3B221000
heap
page read and write
39FE7000
heap
page read and write
367EA000
heap
page read and write
4A0000
heap
page read and write
367D1000
heap
page read and write
1BA328AF000
trusted library allocation
page read and write
3A200000
trusted library allocation
page read and write
391C1000
trusted library allocation
page read and write
3A800000
trusted library allocation
page read and write
367EF000
heap
page read and write
39263000
trusted library allocation
page read and write
367EA000
heap
page read and write
367D5000
heap
page read and write
367EA000
heap
page read and write
1000000
trusted library allocation
page read and write
3B221000
heap
page read and write
367D1000
heap
page read and write
36802000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
156ABA13000
heap
page read and write
367E5000
heap
page read and write
39FEB000
heap
page read and write
39F8C000
heap
page read and write
167C000
trusted library allocation
page execute and read and write
3A025000
heap
page read and write
367D5000
heap
page read and write
367E5000
heap
page read and write
367D5000
heap
page read and write
367EF000
heap
page read and write
367DA000
heap
page read and write
367D1000
heap
page read and write
39FE7000
heap
page read and write
78F44FE000
stack
page read and write
367D5000
heap
page read and write
367EF000
heap
page read and write
1BA328EA000
trusted library allocation
page read and write
367EA000
heap
page read and write
3B221000
heap
page read and write
367D1000
heap
page read and write
3B221000
heap
page read and write
367D1000
heap
page read and write
1BA2CB90000
heap
page read and write
3B221000
heap
page read and write
367EA000
heap
page read and write
39FE6000
heap
page read and write
367EA000
heap
page read and write
42D000
unkown
page read and write
367EF000
heap
page read and write
367E5000
heap
page read and write
3A025000
heap
page read and write
367EA000
heap
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
367FE000
heap
page read and write
367D1000
heap
page read and write
367EF000
heap
page read and write
391C1000
trusted library allocation
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
3B221000
heap
page read and write
367D5000
heap
page read and write
36813000
heap
page read and write
36801000
heap
page read and write
3B221000
heap
page read and write
39FF8000
heap
page read and write
367EA000
heap
page read and write
367EF000
heap
page read and write
367D1000
heap
page read and write
1BA2D531000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
39281000
trusted library allocation
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
367FE000
heap
page read and write
367F4000
heap
page read and write
367EA000
heap
page read and write
367E5000
heap
page read and write
39FF8000
heap
page read and write
56F000
heap
page read and write
367E5000
heap
page read and write
392B1000
trusted library allocation
page read and write
401000
unkown
page execute read
1070000
trusted library allocation
page read and write
367D5000
heap
page read and write
367E5000
heap
page read and write
156ABA7E000
heap
page read and write
367D5000
heap
page read and write
39FED000
heap
page read and write
367F4000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
367E5000
heap
page read and write
367F4000
heap
page read and write
39FEB000
heap
page read and write
367EF000
heap
page read and write
39FF7000
heap
page read and write
39171000
trusted library allocation
page read and write
3B221000
heap
page read and write
367D1000
heap
page read and write
367EF000
heap
page read and write
367D5000
heap
page read and write
36800000
heap
page read and write
367E5000
heap
page read and write
71B0000
heap
page read and write
1BA2D502000
heap
page read and write
367EF000
heap
page read and write
367D5000
heap
page read and write
78F40FE000
stack
page read and write
1BA2CB70000
unclassified section
page readonly
367EF000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
4521000
trusted library allocation
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
367E5000
heap
page read and write
39211000
trusted library allocation
page read and write
367EA000
heap
page read and write
367D5000
heap
page read and write
3A206000
trusted library allocation
page read and write
1BA2E2A0000
trusted library section
page readonly
1BA32914000
trusted library allocation
page read and write
1BA2D500000
heap
page read and write
367EF000
heap
page read and write
71E0000
heap
page read and write
39FF8000
heap
page read and write
367EF000
heap
page read and write
367ED000
heap
page read and write
3B221000
heap
page read and write
367FE000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
39211000
trusted library allocation
page read and write
39FF8000
heap
page read and write
30000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
367E5000
heap
page read and write
3B221000
heap
page read and write
367ED000
heap
page read and write
39FE0000
heap
page read and write
39FF8000
heap
page read and write
367D5000
heap
page read and write
1BA32911000
trusted library allocation
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
3B221000
heap
page read and write
3A205000
trusted library allocation
page read and write
A40000
heap
page read and write
367D1000
heap
page read and write
3A025000
heap
page read and write
367D1000
heap
page read and write
39FF8000
heap
page read and write
367D1000
heap
page read and write
367E5000
heap
page read and write
367D5000
heap
page read and write
367E5000
heap
page read and write
1BA32918000
trusted library allocation
page read and write
3A200000
trusted library allocation
page read and write
391C3000
trusted library allocation
page read and write
39FF8000
heap
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
3B235000
heap
page read and write
367E5000
heap
page read and write
367D5000
heap
page read and write
1BA32908000
trusted library allocation
page read and write
367EA000
heap
page read and write
36803000
heap
page read and write
3681A000
heap
page read and write
427000
unkown
page read and write
367D1000
heap
page read and write
367FE000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
309A000
stack
page read and write
3B224000
heap
page read and write
367ED000
heap
page read and write
1BA2CC13000
heap
page read and write
40A000
unkown
page write copy
367FE000
heap
page read and write
367D5000
heap
page read and write
3B221000
heap
page read and write
503000
heap
page read and write
367E5000
heap
page read and write
367D5000
heap
page read and write
71A9000
heap
page read and write
36818000
heap
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
3A810000
trusted library allocation
page read and write
39FF8000
heap
page read and write
39FE4000
heap
page read and write
3A800000
trusted library allocation
page read and write
367ED000
heap
page read and write
39FF8000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
1090000
trusted library allocation
page read and write
367EA000
heap
page read and write
367E5000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
3B221000
heap
page read and write
367D1000
heap
page read and write
367E5000
heap
page read and write
7149000
heap
page read and write
39FE7000
heap
page read and write
367E5000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
71A9000
heap
page read and write
3A1F0000
trusted library allocation
page read and write
36803000
heap
page read and write
1BA32C37000
heap
page read and write
2250000
heap
page read and write
367EA000
heap
page read and write
3B221000
heap
page read and write
156ABA45000
heap
page read and write
39FE7000
heap
page read and write
36801000
heap
page read and write
3A025000
heap
page read and write
78F3F7F000
stack
page read and write
1BA2E260000
trusted library section
page readonly
367F4000
heap
page read and write
36801000
heap
page read and write
367EA000
heap
page read and write
3681E000
heap
page read and write
367D5000
heap
page read and write
156ABA4C000
heap
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
39212000
trusted library allocation
page read and write
367EF000
heap
page read and write
367EF000
heap
page read and write
367D5000
heap
page read and write
3A200000
trusted library allocation
page read and write
367D5000
heap
page read and write
39FEF000
heap
page read and write
367D1000
heap
page read and write
5770000
trusted library allocation
page read and write
1662000
trusted library allocation
page execute and read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
367EA000
heap
page read and write
367EF000
heap
page read and write
39FEB000
heap
page read and write
1BA2CC93000
heap
page read and write
367F4000
heap
page read and write
367EA000
heap
page read and write
3681F000
heap
page read and write
367D1000
heap
page read and write
39FF7000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
3B24E000
heap
page read and write
156AC290000
trusted library allocation
page read and write
3B221000
heap
page read and write
5760000
trusted library allocation
page read and write
367EA000
heap
page read and write
1BA329C0000
trusted library allocation
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
367EA000
heap
page read and write
367D5000
heap
page read and write
78F41FE000
stack
page read and write
367D5000
heap
page read and write
367E5000
heap
page read and write
4A8000
heap
page read and write
135E000
stack
page read and write
39261000
trusted library allocation
page read and write
1E59EAB000
stack
page read and write
3B221000
heap
page read and write
3A1C0000
trusted library allocation
page read and write
367EA000
heap
page read and write
1BA328BF000
trusted library allocation
page read and write
3AE30000
trusted library allocation
page read and write
367F4000
heap
page read and write
367F5000
heap
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
367E5000
heap
page read and write
3681B000
heap
page read and write
1BA32926000
trusted library allocation
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
367E5000
heap
page read and write
367D5000
heap
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
367E5000
heap
page read and write
367D5000
heap
page read and write
39FE0000
heap
page read and write
57A0000
trusted library allocation
page read and write
3B221000
heap
page read and write
367F4000
heap
page read and write
367D5000
heap
page read and write
367EA000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
7200000
heap
page read and write
367EA000
heap
page read and write
3A025000
heap
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
367EA000
heap
page read and write
39262000
trusted library allocation
page read and write
39FF7000
heap
page read and write
3A1C0000
trusted library allocation
page read and write
39FE4000
heap
page read and write
367D5000
heap
page read and write
3B221000
heap
page read and write
468000
unkown
page readonly
367D5000
heap
page read and write
367EA000
heap
page read and write
367EA000
heap
page read and write
367EF000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
37740000
remote allocation
page read and write
367E5000
heap
page read and write
3A007000
heap
page read and write
367D1000
heap
page read and write
39FE6000
heap
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
3A207000
trusted library allocation
page read and write
39263000
trusted library allocation
page read and write
3B221000
heap
page read and write
1BA2D535000
heap
page read and write
367D1000
heap
page read and write
367E5000
heap
page read and write
367F4000
heap
page read and write
3A2B0000
trusted library allocation
page read and write
3A025000
heap
page read and write
39FF8000
heap
page read and write
367D5000
heap
page read and write
39FBD000
heap
page read and write
367EA000
heap
page read and write
367EF000
heap
page read and write
3B0C0000
trusted library allocation
page read and write
17CB000
trusted library allocation
page execute and read and write
1BA328A2000
trusted library allocation
page read and write
39FF8000
heap
page read and write
367D1000
heap
page read and write
3B24D000
heap
page read and write
3A808000
trusted library allocation
page read and write
367ED000
heap
page read and write
367D5000
heap
page read and write
367EF000
heap
page read and write
3402000
heap
page read and write
367EA000
heap
page read and write
3A200000
trusted library allocation
page read and write
156ABA2A000
heap
page read and write
367EA000
heap
page read and write
367D5000
heap
page read and write
391C2000
trusted library allocation
page read and write
36820000
heap
page read and write
39261000
trusted library allocation
page read and write
367D5000
heap
page read and write
367EA000
heap
page read and write
3B221000
heap
page read and write
1BA3292A000
trusted library allocation
page read and write
39FF8000
heap
page read and write
56E0000
trusted library allocation
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
367EA000
heap
page read and write
367EA000
heap
page read and write
39FF8000
heap
page read and write
367EA000
heap
page read and write
1820000
heap
page read and write
367EA000
heap
page read and write
3A200000
trusted library allocation
page read and write
367E5000
heap
page read and write
367D1000
heap
page read and write
367EF000
heap
page read and write
367E5000
heap
page read and write
367E5000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
367ED000
heap
page read and write
367EF000
heap
page read and write
367D5000
heap
page read and write
391C2000
trusted library allocation
page read and write
5E0000
heap
page read and write
367F4000
heap
page read and write
3B24D000
heap
page read and write
9646000
direct allocation
page execute and read and write
367F4000
heap
page read and write
367E5000
heap
page read and write
400000
unkown
page readonly
39FF7000
heap
page read and write
1920000
trusted library allocation
page read and write
39FE6000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
3B221000
heap
page read and write
39FF8000
heap
page read and write
367EA000
heap
page read and write
367E5000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
39FF8000
heap
page read and write
39FF8000
heap
page read and write
367D5000
heap
page read and write
367E5000
heap
page read and write
3681B000
heap
page read and write
367D1000
heap
page read and write
1BA328D8000
trusted library allocation
page read and write
3A828000
trusted library allocation
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
1000000
trusted library allocation
page read and write
39FE6000
heap
page read and write
39FF8000
heap
page read and write
3681E000
heap
page read and write
367D1000
heap
page read and write
39FF8000
heap
page read and write
36802000
heap
page read and write
3A200000
trusted library allocation
page read and write
367E5000
heap
page read and write
367D5000
heap
page read and write
367EA000
heap
page read and write
367EA000
heap
page read and write
1BA328D4000
trusted library allocation
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
39FF8000
heap
page read and write
1BA32924000
trusted library allocation
page read and write
367D5000
heap
page read and write
367EA000
heap
page read and write
1BA2D57E000
heap
page read and write
367D5000
heap
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
3B221000
heap
page read and write
1890000
heap
page read and write
367EF000
heap
page read and write
1BA328BD000
trusted library allocation
page read and write
39FFB000
heap
page read and write
D40000
unclassified section
page readonly
367D1000
heap
page read and write
367E5000
heap
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
3A2B0000
trusted library allocation
page read and write
367FE000
heap
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
347F000
stack
page read and write
39FE7000
heap
page read and write
39FF8000
heap
page read and write
367EA000
heap
page read and write
367D5000
heap
page read and write
1030000
trusted library allocation
page read and write
39263000
trusted library allocation
page read and write
39F37000
heap
page read and write
39FF8000
heap
page read and write
367EA000
heap
page read and write
5046000
direct allocation
page execute and read and write
156AB9C0000
unclassified section
page readonly
1BA2CC5E000
heap
page read and write
367E5000
heap
page read and write
3B233000
heap
page read and write
367D5000
heap
page read and write
3A025000
heap
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
367EF000
heap
page read and write
1900000
trusted library allocation
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
367EA000
heap
page read and write
39FF8000
heap
page read and write
1BA32933000
trusted library allocation
page read and write
1BA32960000
trusted library allocation
page read and write
1D0000
unclassified section
page readonly
367ED000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
367EF000
heap
page read and write
3A200000
trusted library allocation
page read and write
367EF000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
156ABA40000
heap
page read and write
3B221000
heap
page read and write
367EF000
heap
page read and write
367EF000
heap
page read and write
1BA328E0000
trusted library allocation
page read and write
391C2000
trusted library allocation
page read and write
1BA2E3A0000
trusted library allocation
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
367D5000
heap
page read and write
39FE0000
heap
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
1BA32904000
trusted library allocation
page read and write
367D1000
heap
page read and write
367EF000
heap
page read and write
39FEB000
heap
page read and write
1BA32910000
trusted library allocation
page read and write
3A025000
heap
page read and write
39213000
trusted library allocation
page read and write
39305000
trusted library allocation
page read and write
367D1000
heap
page read and write
3A007000
heap
page read and write
367FE000
heap
page read and write
39FF8000
heap
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
39FF8000
heap
page read and write
39FBE000
heap
page read and write
367F4000
heap
page read and write
3B221000
heap
page read and write
367D1000
heap
page read and write
367E5000
heap
page read and write
367EA000
heap
page read and write
367EA000
heap
page read and write
367E5000
heap
page read and write
367D1000
heap
page read and write
39F20000
trusted library allocation
page read and write
39FF8000
heap
page read and write
367D5000
heap
page read and write
3B221000
heap
page read and write
367D1000
heap
page read and write
17C7000
trusted library allocation
page execute and read and write
367EA000
heap
page read and write
78F397D000
stack
page read and write
5769000
trusted library allocation
page read and write
367D1000
heap
page read and write
367E5000
heap
page read and write
3A206000
trusted library allocation
page read and write
33C0000
heap
page read and write
367E5000
heap
page read and write
367EA000
heap
page read and write
3B0C0000
trusted library allocation
page read and write
39FE7000
heap
page read and write
1BA2CC00000
heap
page read and write
367DA000
heap
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
10005000
unkown
page readonly
367D5000
heap
page read and write
39FE0000
heap
page read and write
367EF000
heap
page read and write
39FE6000
heap
page read and write
367D5000
heap
page read and write
36801000
heap
page read and write
3A025000
heap
page read and write
39FF0000
heap
page read and write
391C1000
trusted library allocation
page read and write
367E5000
heap
page read and write
3B24E000
heap
page read and write
39F80000
heap
page read and write
1BA2D415000
heap
page read and write
20000
unclassified section
page readonly
10000000
unkown
page readonly
39FF8000
heap
page read and write
367D1000
heap
page read and write
367EF000
heap
page read and write
391E2000
trusted library allocation
page read and write
156ABA6D000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
367D5000
heap
page read and write
367E5000
heap
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
33A0000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
78F43FA000
stack
page read and write
367E5000
heap
page read and write
3B221000
heap
page read and write
367D1000
heap
page read and write
3B0D0000
trusted library allocation
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
367F4000
heap
page read and write
3B221000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
39FF8000
heap
page read and write
36802000
heap
page read and write
39FCD000
heap
page read and write
367EA000
heap
page read and write
39FF8000
heap
page read and write
367D5000
heap
page read and write
1BA2CC63000
heap
page read and write
3B560000
trusted library allocation
page read and write
3B221000
heap
page read and write
367D1000
heap
page read and write
36818000
heap
page read and write
367ED000
heap
page read and write
367EF000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
39FEF000
heap
page read and write
3A200000
trusted library allocation
page read and write
367F2000
heap
page read and write
3B0D5000
trusted library allocation
page read and write
39FEB000
heap
page read and write
367D1000
heap
page read and write
36802000
heap
page read and write
367D1000
heap
page read and write
311E000
unkown
page read and write
3A825000
trusted library allocation
page read and write
367EA000
heap
page read and write
39FE6000
heap
page read and write
1BA327E0000
trusted library allocation
page read and write
3A206000
trusted library allocation
page read and write
39FF8000
heap
page read and write
36812000
heap
page read and write
5E7000
heap
page read and write
3A007000
heap
page read and write
1BA328D6000
trusted library allocation
page read and write
367D5000
heap
page read and write
367EA000
heap
page read and write
367EF000
heap
page read and write
1BA3291A000
trusted library allocation
page read and write
39FF8000
heap
page read and write
367D1000
heap
page read and write
367EF000
heap
page read and write
39FF8000
heap
page read and write
3A1E0000
trusted library allocation
page read and write
367EF000
heap
page read and write
39FBE000
heap
page read and write
367D1000
heap
page read and write
367FE000
heap
page read and write
39FEB000
heap
page read and write
367D1000
heap
page read and write
39FE7000
heap
page read and write
367D5000
heap
page read and write
1BA2CCF9000
heap
page read and write
39FF8000
heap
page read and write
367D5000
heap
page read and write
39FF7000
heap
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
391C2000
trusted library allocation
page read and write
39FE6000
heap
page read and write
367EF000
heap
page read and write
367D1000
heap
page read and write
39212000
trusted library allocation
page read and write
367D1000
heap
page read and write
1BA328C3000
trusted library allocation
page read and write
3A2A0000
trusted library allocation
page read and write
3B25D000
heap
page read and write
10020000
trusted library allocation
page read and write
367E5000
heap
page read and write
367D1000
heap
page read and write
39FF8000
heap
page read and write
367ED000
heap
page read and write
1BA32C46000
heap
page read and write
367F4000
heap
page read and write
367EA000
heap
page read and write
367F2000
heap
page read and write
367EA000
heap
page read and write
330A000
heap
page read and write
39FF8000
heap
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
3A210000
trusted library allocation
page read and write
367E5000
heap
page read and write
367D5000
heap
page read and write
1BA32906000
trusted library allocation
page read and write
367D1000
heap
page read and write
39FF7000
heap
page read and write
3B221000
heap
page read and write
367EA000
heap
page read and write
1E5A47F000
stack
page read and write
39FE0000
heap
page read and write
3B570000
trusted library allocation
page read and write
39264000
trusted library allocation
page read and write
367D5000
heap
page read and write
3A025000
heap
page read and write
367F6000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
1BA32940000
trusted library allocation
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
367EF000
heap
page read and write
1BA32916000
trusted library allocation
page read and write
3B221000
heap
page read and write
39242000
trusted library allocation
page read and write
367D5000
heap
page read and write
3A200000
trusted library allocation
page read and write
367D1000
heap
page read and write
3A830000
trusted library allocation
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
39261000
trusted library allocation
page read and write
39FF8000
heap
page read and write
464000
unkown
page read and write
39FF8000
heap
page read and write
39FF7000
heap
page read and write
36801000
heap
page read and write
367D1000
heap
page read and write
156AB980000
heap
page read and write
367E5000
heap
page read and write
3A220000
trusted library allocation
page read and write
71B6000
heap
page read and write
367D5000
heap
page read and write
3B224000
heap
page read and write
1BA328CC000
trusted library allocation
page read and write
3B0D2000
unkown
page read and write
367D5000
heap
page read and write
367E5000
heap
page read and write
3681E000
heap
page read and write
1BA2CC5B000
heap
page read and write
3682B000
heap
page read and write
367D5000
heap
page read and write
3B0C0000
trusted library allocation
page read and write
1098000
trusted library allocation
page read and write
3B221000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
36813000
heap
page read and write
367D1000
heap
page read and write
156ABB02000
heap
page read and write
367E5000
heap
page read and write
3B221000
heap
page read and write
3B0C6000
trusted library allocation
page read and write
39FF8000
heap
page read and write
17A0000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
39FE0000
heap
page read and write
367D1000
heap
page read and write
3A025000
heap
page read and write
6F44000
heap
page read and write
39FF6000
heap
page read and write
367E5000
heap
page read and write
367E5000
heap
page read and write
367E5000
heap
page read and write
367EA000
heap
page read and write
367FE000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
3A860000
trusted library allocation
page read and write
39172000
trusted library allocation
page read and write
367EA000
heap
page read and write
367E5000
heap
page read and write
3A007000
heap
page read and write
3A025000
heap
page read and write
5790000
trusted library allocation
page read and write
3A820000
trusted library allocation
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
1BA328B7000
trusted library allocation
page read and write
3B221000
heap
page read and write
367EA000
heap
page read and write
367E5000
heap
page read and write
6D0000
heap
page read and write
367E5000
heap
page read and write
1BA2CC57000
heap
page read and write
367E5000
heap
page read and write
367FE000
heap
page read and write
3B221000
heap
page read and write
1BA328DC000
trusted library allocation
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
367FE000
heap
page read and write
39FF8000
heap
page read and write
3B221000
heap
page read and write
39FE0000
heap
page read and write
3B235000
heap
page read and write
367D5000
heap
page read and write
39FF8000
heap
page read and write
4FF000
heap
page read and write
367EA000
heap
page read and write
39FE7000
heap
page read and write
23B5000
heap
page read and write
39FE6000
heap
page read and write
367D1000
heap
page read and write
39FE6000
heap
page read and write
39FF7000
heap
page read and write
3B24D000
heap
page read and write
367EA000
heap
page read and write
391C1000
trusted library allocation
page read and write
367D1000
heap
page read and write
39F8D000
heap
page read and write
3B221000
heap
page read and write
156AC402000
trusted library allocation
page read and write
367EF000
heap
page read and write
3B0C0000
trusted library allocation
page read and write
367D5000
heap
page read and write
367ED000
heap
page read and write
367D1000
heap
page read and write
36801000
heap
page read and write
367D5000
heap
page read and write
39FF8000
heap
page read and write
39FF8000
heap
page read and write
39FEB000
heap
page read and write
367EF000
heap
page read and write
367EA000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
435000
unkown
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
39FED000
heap
page read and write
39FF6000
heap
page read and write
367D1000
heap
page read and write
1650000
trusted library allocation
page read and write
367D1000
heap
page read and write
367FE000
heap
page read and write
367D5000
heap
page read and write
3A200000
trusted library allocation
page read and write
71CB000
heap
page read and write
367D5000
heap
page read and write
3A218000
trusted library allocation
page read and write
39FF8000
heap
page read and write
367E5000
heap
page read and write
367D5000
heap
page read and write
367EA000
heap
page read and write
3B221000
heap
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
1BA328FC000
trusted library allocation
page read and write
1040000
trusted library allocation
page read and write
367EA000
heap
page read and write
367D5000
heap
page read and write
367ED000
heap
page read and write
850000
direct allocation
page read and write
39FF8000
heap
page read and write
367EA000
heap
page read and write
39F20000
trusted library allocation
page read and write
367D5000
heap
page read and write
367F4000
heap
page read and write
367D5000
heap
page read and write
3AE40000
trusted library allocation
page read and write
39FE8000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
1BA328A9000
trusted library allocation
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
3A025000
heap
page read and write
3A200000
trusted library allocation
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
367EA000
heap
page read and write
3B221000
heap
page read and write
367EF000
heap
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
10003000
unkown
page readonly
39FE7000
heap
page read and write
39FEB000
heap
page read and write
1BA328F2000
trusted library allocation
page read and write
367D1000
heap
page read and write
367EF000
heap
page read and write
367D1000
heap
page read and write
1BA328B1000
trusted library allocation
page read and write
367EA000
heap
page read and write
36801000
heap
page read and write
1BA329B0000
trusted library allocation
page read and write
367EA000
heap
page read and write
39FF6000
heap
page read and write
3A200000
trusted library allocation
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
3B221000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
39FE0000
heap
page read and write
367D1000
heap
page read and write
39FF8000
heap
page read and write
367D5000
heap
page read and write
6446000
direct allocation
page execute and read and write
3B221000
heap
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
717A000
heap
page read and write
367E5000
heap
page read and write
1BA32C5C000
heap
page read and write
3521000
trusted library allocation
page read and write
39172000
trusted library allocation
page read and write
3B57B000
trusted library allocation
page read and write
367EA000
heap
page read and write
3A206000
trusted library allocation
page read and write
367EF000
heap
page read and write
39263000
trusted library allocation
page read and write
3B233000
heap
page read and write
367EA000
heap
page read and write
367EF000
heap
page read and write
39FF8000
heap
page read and write
3B221000
heap
page read and write
3681F000
heap
page read and write
367D5000
heap
page read and write
1930000
heap
page execute and read and write
367D1000
heap
page read and write
1BA2D54F000
heap
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
367D5000
heap
page read and write
36812000
heap
page read and write
39172000
trusted library allocation
page read and write
1215000
heap
page read and write
3B235000
heap
page read and write
367D5000
heap
page read and write
71B4000
heap
page read and write
3B24D000
heap
page read and write
39FF6000
heap
page read and write
30D0000
unclassified section
page readonly
3A820000
trusted library allocation
page read and write
36802000
heap
page read and write
367EA000
heap
page read and write
367EF000
heap
page read and write
367D5000
heap
page read and write
39FF8000
heap
page read and write
367D5000
heap
page read and write
1BA32970000
trusted library allocation
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
DF0000
unclassified section
page readonly
367D5000
heap
page read and write
39FF8000
heap
page read and write
39FF8000
heap
page read and write
3B221000
heap
page read and write
367E5000
heap
page read and write
1BA2CCA1000
heap
page read and write
37740000
remote allocation
page read and write
3681F000
heap
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
1BA3290D000
trusted library allocation
page read and write
56BE000
stack
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
39171000
trusted library allocation
page read and write
36801000
heap
page read and write
156ABA65000
heap
page read and write
367D1000
heap
page read and write
39FBD000
heap
page read and write
1000000
trusted library allocation
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
1BA32890000
trusted library allocation
page read and write
367D1000
heap
page read and write
3A025000
heap
page read and write
367E5000
heap
page read and write
367D1000
heap
page read and write
367F4000
heap
page read and write
3250000
heap
page read and write
3B24D000
heap
page read and write
3B560000
unkown
page read and write
3B0C5000
trusted library allocation
page read and write
367D1000
heap
page read and write
3A200000
trusted library allocation
page read and write
3A2B7000
trusted library allocation
page read and write
3B0C0000
trusted library allocation
page read and write
40A000
unkown
page read and write
39FF8000
heap
page read and write
7846000
direct allocation
page execute and read and write
367E5000
heap
page read and write
1BA328A0000
trusted library allocation
page read and write
367E5000
heap
page read and write
367ED000
heap
page read and write
3A025000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
1BA328A4000
trusted library allocation
page read and write
3682E000
heap
page read and write
367D5000
heap
page read and write
156ABA3C000
heap
page read and write
39FE7000
heap
page read and write
367D1000
heap
page read and write
3A820000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
367DA000
heap
page read and write
36811000
heap
page read and write
3B221000
heap
page read and write
367D5000
heap
page read and write
367ED000
heap
page read and write
1BA2CC4F000
heap
page read and write
367D1000
heap
page read and write
367F2000
heap
page read and write
367F2000
heap
page read and write
367E5000
heap
page read and write
39FE0000
heap
page read and write
39FF8000
heap
page read and write
367E5000
heap
page read and write
39FEB000
heap
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
367E5000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
367EF000
heap
page read and write
367EF000
heap
page read and write
50C000
heap
page read and write
1BA328D2000
trusted library allocation
page read and write
156ABA00000
heap
page read and write
367ED000
heap
page read and write
367E5000
heap
page read and write
39FF7000
heap
page read and write
367E5000
heap
page read and write
3A1C0000
trusted library allocation
page read and write
1BA328DA000
trusted library allocation
page read and write
39213000
trusted library allocation
page read and write
367D1000
heap
page read and write
17BA000
trusted library allocation
page execute and read and write
3A20C000
trusted library allocation
page read and write
367EA000
heap
page read and write
367D5000
heap
page read and write
37740000
remote allocation
page read and write
1BA32980000
trusted library allocation
page read and write
3681F000
heap
page read and write
39FE7000
heap
page read and write
391C2000
trusted library allocation
page read and write
1BA2E270000
trusted library section
page readonly
71BE000
heap
page read and write
367D1000
heap
page read and write
51D000
heap
page read and write
367F2000
heap
page read and write
3682F000
heap
page read and write
3B0C7000
trusted library allocation
page read and write
367EA000
heap
page read and write
1BA3291E000
trusted library allocation
page read and write
3B221000
heap
page read and write
1BA2D3A0000
trusted library allocation
page read and write
367D5000
heap
page read and write
78F3FFE000
stack
page read and write
367E5000
heap
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
39FEB000
heap
page read and write
3A025000
heap
page read and write
367D5000
heap
page read and write
13ED000
heap
page read and write
3A200000
trusted library allocation
page read and write
1BA328EE000
trusted library allocation
page read and write
391E2000
trusted library allocation
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
3B221000
heap
page read and write
367EA000
heap
page read and write
367EA000
heap
page read and write
367EF000
heap
page read and write
39FED000
heap
page read and write
367E5000
heap
page read and write
367EA000
heap
page read and write
39FF8000
heap
page read and write
3A1C4000
trusted library allocation
page read and write
39FF8000
heap
page read and write
3B223000
heap
page read and write
367ED000
heap
page read and write
3B0D0000
unkown
page read and write
39172000
trusted library allocation
page read and write
367E5000
heap
page read and write
71F5000
heap
page read and write
5740000
trusted library allocation
page read and write
367D1000
heap
page read and write
367EF000
heap
page read and write
39FF8000
heap
page read and write
367E5000
heap
page read and write
39FED000
heap
page read and write
367D1000
heap
page read and write
78F42FE000
stack
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
367EA000
heap
page read and write
367E5000
heap
page read and write
3A200000
trusted library allocation
page read and write
367D1000
heap
page read and write
367E5000
heap
page read and write
367D5000
heap
page read and write
3A007000
heap
page read and write
39FE7000
heap
page read and write
1BA328D0000
trusted library allocation
page read and write
3B221000
heap
page read and write
1070000
trusted library allocation
page read and write
71BB000
heap
page read and write
39FDF000
heap
page read and write
39FE7000
heap
page read and write
367D1000
heap
page read and write
3A025000
heap
page read and write
367F4000
heap
page read and write
1BA3292C000
trusted library allocation
page read and write
3A025000
heap
page read and write
3B221000
heap
page read and write
39FF8000
heap
page read and write
3B235000
heap
page read and write
3B0C8000
trusted library allocation
page read and write
1BA32840000
trusted library allocation
page read and write
367E5000
heap
page read and write
39F20000
trusted library allocation
page read and write
367D1000
heap
page read and write
1038000
trusted library allocation
page read and write
367E5000
heap
page read and write
1BA328AB000
trusted library allocation
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
367EF000
heap
page read and write
367EA000
heap
page read and write
367E5000
heap
page read and write
1BA2CC41000
heap
page read and write
367D1000
heap
page read and write
161E000
stack
page read and write
367D1000
heap
page read and write
3681F000
heap
page read and write
39212000
trusted library allocation
page read and write
39172000
trusted library allocation
page read and write
39FF8000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
367E5000
heap
page read and write
3B0E0000
trusted library allocation
page read and write
367F2000
heap
page read and write
39F25000
trusted library allocation
page read and write
408000
unkown
page readonly
3A2A0000
trusted library allocation
page read and write
367EF000
heap
page read and write
367EF000
heap
page read and write
367D1000
heap
page read and write
3681F000
heap
page read and write
367D5000
heap
page read and write
367E5000
heap
page read and write
367D5000
heap
page read and write
1BA2CCAC000
heap
page read and write
367D1000
heap
page read and write
78F387B000
stack
page read and write
367E2000
heap
page read and write
367EA000
heap
page read and write
367E5000
heap
page read and write
3B221000
heap
page read and write
367E5000
heap
page read and write
367D1000
heap
page read and write
39FF8000
heap
page read and write
367D5000
heap
page read and write
39FF8000
heap
page read and write
39FE6000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
1BA327D0000
trusted library allocation
page read and write
71A6000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
4E0000
heap
page read and write
367D1000
heap
page read and write
1BA328F6000
trusted library allocation
page read and write
1BA32C59000
heap
page read and write
39142000
trusted library allocation
page read and write
367F4000
heap
page read and write
367E5000
heap
page read and write
39211000
trusted library allocation
page read and write
3A200000
trusted library allocation
page read and write
39171000
trusted library allocation
page read and write
3A820000
trusted library allocation
page read and write
39F88000
heap
page read and write
367EF000
heap
page read and write
AA46000
direct allocation
page execute and read and write
3B0C8000
unkown
page read and write
367D5000
heap
page read and write
367DA000
heap
page read and write
3681E000
heap
page read and write
1670000
trusted library allocation
page read and write
3A2B0000
trusted library allocation
page read and write
3A007000
heap
page read and write
367EF000
heap
page read and write
3681F000
heap
page read and write
39FF8000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
39FE6000
heap
page read and write
367D5000
heap
page read and write
3B221000
heap
page read and write
1BA2CB80000
unclassified section
page readonly
367EA000
heap
page read and write
3A2B5000
trusted library allocation
page read and write
39FF7000
heap
page read and write
367E5000
heap
page read and write
367EA000
heap
page read and write
120E000
stack
page read and write
1BA2E2B0000
trusted library section
page readonly
39212000
trusted library allocation
page read and write
1BA32C00000
heap
page read and write
367E5000
heap
page read and write
367D1000
heap
page read and write
1BA2D542000
heap
page read and write
367D1000
heap
page read and write
367E5000
heap
page read and write
3B233000
heap
page read and write
39FE7000
heap
page read and write
3A025000
heap
page read and write
17B2000
trusted library allocation
page execute and read and write
367D5000
heap
page read and write
3B221000
heap
page read and write
367D5000
heap
page read and write
367E5000
heap
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
367E5000
heap
page read and write
3B221000
heap
page read and write
5A46000
direct allocation
page execute and read and write
1BA32C5A000
heap
page read and write
367EA000
heap
page read and write
3A200000
trusted library allocation
page read and write
39F8F000
heap
page read and write
39FF8000
heap
page read and write
367EA000
heap
page read and write
39FF8000
heap
page read and write
367EA000
heap
page read and write
39172000
trusted library allocation
page read and write
367D5000
heap
page read and write
4E9000
heap
page read and write
39FF8000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
1BA328CE000
trusted library allocation
page read and write
3A200000
trusted library allocation
page read and write
1BA32850000
trusted library allocation
page read and write
3B221000
heap
page read and write
367EA000
heap
page read and write
3B221000
heap
page read and write
39212000
trusted library allocation
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
39212000
trusted library allocation
page read and write
367D5000
heap
page read and write
10001000
unkown
page execute read
1BA2E290000
trusted library section
page readonly
3A80000
heap
page read and write
3B221000
heap
page read and write
367E5000
heap
page read and write
367FF000
heap
page read and write
367EA000
heap
page read and write
39FF8000
heap
page read and write
3681E000
heap
page read and write
3A820000
trusted library allocation
page read and write
367EA000
heap
page read and write
367EA000
heap
page read and write
36803000
heap
page read and write
3A2A0000
trusted library allocation
page read and write
3B221000
heap
page read and write
367D1000
heap
page read and write
1BA328BA000
trusted library allocation
page read and write
3B221000
heap
page read and write
367D1000
heap
page read and write
39FF8000
heap
page read and write
367EA000
heap
page read and write
367D5000
heap
page read and write
13D0000
heap
page read and write
39172000
trusted library allocation
page read and write
367D5000
heap
page read and write
1BA328F0000
trusted library allocation
page read and write
367D1000
heap
page read and write
3A025000
heap
page read and write
367D5000
heap
page read and write
5740000
trusted library allocation
page read and write
367D5000
heap
page read and write
39FF8000
heap
page read and write
367D5000
heap
page read and write
1BA2CA70000
heap
page read and write
367D5000
heap
page read and write
367EF000
heap
page read and write
590000
heap
page read and write
367EF000
heap
page read and write
367FF000
heap
page read and write
3A200000
trusted library allocation
page read and write
367EF000
heap
page read and write
39FF8000
heap
page read and write
39FF8000
heap
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
39FE0000
heap
page read and write
367ED000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
367F5000
heap
page read and write
367FE000
heap
page read and write
367ED000
heap
page read and write
367D5000
heap
page read and write
367EA000
heap
page read and write
3A025000
heap
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
39F9B000
heap
page read and write
367D5000
heap
page read and write
3B221000
heap
page read and write
1910000
trusted library allocation
page execute and read and write
367FF000
heap
page read and write
367EF000
heap
page read and write
367D5000
heap
page read and write
391C2000
trusted library allocation
page read and write
367EF000
heap
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
39FF8000
heap
page read and write
180E000
stack
page read and write
367EF000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
367F4000
heap
page read and write
367EF000
heap
page read and write
367D5000
heap
page read and write
39F20000
trusted library allocation
page read and write
367FE000
heap
page read and write
78F3BFD000
stack
page read and write
3A210000
trusted library allocation
page read and write
367EA000
heap
page read and write
1E5A57E000
stack
page read and write
367D1000
heap
page read and write
36817000
heap
page read and write
3681E000
heap
page read and write
39FF4000
heap
page read and write
367D1000
heap
page read and write
3A200000
trusted library allocation
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
7194000
heap
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
1BA328CA000
trusted library allocation
page read and write
39FAD000
heap
page read and write
367E5000
heap
page read and write
367EA000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
36801000
heap
page read and write
3B221000
heap
page read and write
3681F000
heap
page read and write
367E5000
heap
page read and write
367EF000
heap
page read and write
367EA000
heap
page read and write
367E5000
heap
page read and write
367EA000
heap
page read and write
367EA000
heap
page read and write
367EA000
heap
page read and write
3B0C0000
trusted library allocation
page read and write
3681B000
heap
page read and write
3B560000
trusted library allocation
page read and write
367FE000
heap
page read and write
367D5000
heap
page read and write
3B221000
heap
page read and write
3A025000
heap
page read and write
1BA3291C000
trusted library allocation
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
367E5000
heap
page read and write
367D1000
heap
page read and write
3B0D0000
trusted library allocation
page read and write
3B221000
heap
page read and write
3A007000
heap
page read and write
367D1000
heap
page read and write
367ED000
heap
page read and write
367D5000
heap
page read and write
3A025000
heap
page read and write
810000
direct allocation
page read and write
367EA000
heap
page read and write
39232000
trusted library allocation
page read and write
367D1000
heap
page read and write
367EF000
heap
page read and write
166A000
trusted library allocation
page execute and read and write
367D5000
heap
page read and write
367FE000
heap
page read and write
367D5000
heap
page read and write
367EA000
heap
page read and write
1BA32C43000
heap
page read and write
367D5000
heap
page read and write
3A025000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
39264000
trusted library allocation
page read and write
367D1000
heap
page read and write
367F4000
heap
page read and write
367D5000
heap
page read and write
367EA000
heap
page read and write
1BA2CD02000
heap
page read and write
367EF000
heap
page read and write
367D1000
heap
page read and write
39FF7000
heap
page read and write
367D1000
heap
page read and write
367EF000
heap
page read and write
1BA328C8000
trusted library allocation
page read and write
39FF7000
heap
page read and write
3A200000
trusted library allocation
page read and write
98000
stack
page read and write
39F20000
trusted library allocation
page read and write
367D1000
heap
page read and write
3A025000
heap
page read and write
367FE000
heap
page read and write
3681F000
heap
page read and write
367F2000
heap
page read and write
367D5000
heap
page read and write
3A800000
unkown
page read and write
367E5000
heap
page read and write
367E5000
heap
page read and write
1005000
trusted library allocation
page read and write
367EA000
heap
page read and write
3B221000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
391C3000
trusted library allocation
page read and write
3B0C0000
trusted library allocation
page read and write
39212000
trusted library allocation
page read and write
367EA000
heap
page read and write
367EF000
heap
page read and write
7162000
heap
page read and write
367EA000
heap
page read and write
367D5000
heap
page read and write
367F2000
heap
page read and write
367D5000
heap
page read and write
367EA000
heap
page read and write
367D5000
heap
page read and write
36801000
heap
page read and write
1BA2CA00000
heap
page read and write
367D1000
heap
page read and write
1BA328EC000
trusted library allocation
page read and write
3A1C0000
trusted library allocation
page read and write
367D1000
heap
page read and write
39FE7000
heap
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
39FEB000
heap
page read and write
367D5000
heap
page read and write
8246000
direct allocation
page execute and read and write
367E5000
heap
page read and write
3B221000
heap
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
1BA32902000
trusted library allocation
page read and write
39FF7000
heap
page read and write
3A200000
trusted library allocation
page read and write
39233000
trusted library allocation
page read and write
1BA32C60000
heap
page read and write
39FF8000
heap
page read and write
367D5000
heap
page read and write
4FC000
heap
page read and write
39FE0000
heap
page read and write
367E5000
heap
page read and write
367D5000
heap
page read and write
3A205000
trusted library allocation
page read and write
367D1000
heap
page read and write
39211000
trusted library allocation
page read and write
367D1000
heap
page read and write
5750000
trusted library allocation
page read and write
367D5000
heap
page read and write
17C0000
trusted library allocation
page read and write
367EF000
heap
page read and write
367D5000
heap
page read and write
3A025000
heap
page read and write
367EA000
heap
page read and write
1BA32928000
trusted library allocation
page read and write
367ED000
heap
page read and write
D50000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
367E5000
heap
page read and write
36808000
heap
page read and write
367D5000
heap
page read and write
3B221000
heap
page read and write
367E5000
heap
page read and write
367F2000
heap
page read and write
367D1000
heap
page read and write
1BA32880000
trusted library allocation
page read and write
131F000
stack
page read and write
3A025000
heap
page read and write
39FF7000
heap
page read and write
367EA000
heap
page read and write
367F5000
heap
page read and write
367D5000
heap
page read and write
1BA32C0F000
heap
page read and write
39FE7000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
367E5000
heap
page read and write
367E5000
heap
page read and write
367D1000
heap
page read and write
71A3000
heap
page read and write
39FE7000
heap
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
3B0C0000
trusted library allocation
page read and write
31DE000
stack
page read and write
39172000
trusted library allocation
page read and write
367D1000
heap
page read and write
3B0D0000
trusted library allocation
page read and write
39FF8000
heap
page read and write
367D5000
heap
page read and write
71FC000
heap
page read and write
3B221000
heap
page read and write
367D5000
heap
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
468000
unkown
page readonly
367EF000
heap
page read and write
3A007000
heap
page read and write
3A025000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
367D5000
heap
page read and write
3A025000
heap
page read and write
367EA000
heap
page read and write
367FF000
heap
page read and write
367D1000
heap
page read and write
367ED000
heap
page read and write
367EF000
heap
page read and write
39FF8000
heap
page read and write
3684D000
heap
page read and write
343E000
stack
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
3B0C7000
trusted library allocation
page read and write
3B24E000
heap
page read and write
367E5000
heap
page read and write
3B221000
heap
page read and write
39FE6000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
367EA000
heap
page read and write
367EF000
heap
page read and write
3A206000
trusted library allocation
page read and write
367D1000
heap
page read and write
39FE0000
heap
page read and write
1BA32930000
trusted library allocation
page read and write
3B0C0000
unkown
page read and write
367EA000
heap
page read and write
367EF000
heap
page read and write
57B0000
trusted library allocation
page read and write
39213000
trusted library allocation
page read and write
367EA000
heap
page read and write
3B0C0000
trusted library allocation
page read and write
367D5000
heap
page read and write
1BA2CC8B000
heap
page read and write
3480000
heap
page read and write
39FE7000
heap
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
39FF8000
heap
page read and write
156ABA32000
heap
page read and write
324F000
unkown
page read and write
367D1000
heap
page read and write
39FF4000
heap
page read and write
156ABA02000
heap
page read and write
3684F000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
39FE6000
heap
page read and write
408000
unkown
page readonly
367E5000
heap
page read and write
367E5000
heap
page read and write
71D5000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
1BA32900000
trusted library allocation
page read and write
39FF8000
heap
page read and write
3B224000
heap
page read and write
367E5000
heap
page read and write
367EF000
heap
page read and write
367EA000
heap
page read and write
392B4000
trusted library allocation
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
36822000
heap
page read and write
39263000
trusted library allocation
page read and write
3B221000
heap
page read and write
1080000
trusted library allocation
page read and write
367EA000
heap
page read and write
39FF8000
heap
page read and write
39FF8000
heap
page read and write
39FE6000
heap
page read and write
367D1000
heap
page read and write
39172000
trusted library allocation
page read and write
39172000
trusted library allocation
page read and write
367E5000
heap
page read and write
367D1000
heap
page read and write
39FF8000
heap
page read and write
367D5000
heap
page read and write
3A025000
heap
page read and write
367D5000
heap
page read and write
367EA000
heap
page read and write
1BA2CCB7000
heap
page read and write
3B221000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
367FF000
heap
page read and write
39FE6000
heap
page read and write
3B24E000
heap
page read and write
39171000
trusted library allocation
page read and write
78F3EFE000
stack
page read and write
3B221000
heap
page read and write
367EF000
heap
page read and write
39FF8000
heap
page read and write
367E5000
heap
page read and write
39FE6000
heap
page read and write
367D5000
heap
page read and write
1BA32C3F000
heap
page read and write
1BA328F8000
trusted library allocation
page read and write
367D1000
heap
page read and write
1BA2D577000
heap
page read and write
78F3E7F000
stack
page read and write
39FE6000
heap
page read and write
367EA000
heap
page read and write
39FF8000
heap
page read and write
367ED000
heap
page read and write
1BA32C71000
heap
page read and write
1BA3289F000
trusted library allocation
page read and write
328E000
stack
page read and write
3B221000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
367EF000
heap
page read and write
3550000
heap
page read and write
39FF8000
heap
page read and write
367E5000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
367ED000
heap
page read and write
367D5000
heap
page read and write
1BA2E7D0000
trusted library allocation
page read and write
367D5000
heap
page read and write
367DA000
heap
page read and write
3A1D0000
trusted library allocation
page read and write
23B0000
heap
page read and write
1BA2D402000
heap
page read and write
367EF000
heap
page read and write
36818000
heap
page read and write
367E5000
heap
page read and write
3B7C000
stack
page read and write
367FE000
heap
page read and write
574C000
trusted library allocation
page read and write
367EF000
heap
page read and write
39FE0000
heap
page read and write
367E5000
heap
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
367E5000
heap
page read and write
367D1000
heap
page read and write
367EF000
heap
page read and write
1BA2D55B000
heap
page read and write
39172000
trusted library allocation
page read and write
367E5000
heap
page read and write
367EF000
heap
page read and write
3130000
heap
page read and write
39FF8000
heap
page read and write
1BA32860000
trusted library allocation
page read and write
1BA2E280000
trusted library section
page readonly
367D1000
heap
page read and write
367FE000
heap
page read and write
1BA32C48000
heap
page read and write
39FF8000
heap
page read and write
367FE000
heap
page read and write
367D5000
heap
page read and write
1BA328DE000
trusted library allocation
page read and write
367F2000
heap
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
3B221000
heap
page read and write
3AF90000
trusted library allocation
page read and write
367D1000
heap
page read and write
178F000
stack
page read and write
367D5000
heap
page read and write
39FEB000
heap
page read and write
367F4000
heap
page read and write
367EA000
heap
page read and write
10E0000
trusted library allocation
page read and write
367D5000
heap
page read and write
367E5000
heap
page read and write
5780000
trusted library allocation
page read and write
367EF000
heap
page read and write
1BA32922000
trusted library allocation
page read and write
367D1000
heap
page read and write
367E5000
heap
page read and write
367D5000
heap
page read and write
33F0000
heap
page read and write
39FF8000
heap
page read and write
367D1000
heap
page read and write
367E5000
heap
page read and write
39262000
trusted library allocation
page read and write
3B233000
heap
page read and write
3A200000
trusted library allocation
page read and write
367EA000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
3A2A5000
trusted library allocation
page read and write
367EA000
heap
page read and write
367F4000
heap
page read and write
367D1000
heap
page read and write
39232000
trusted library allocation
page read and write
3684F000
heap
page read and write
367EF000
heap
page read and write
367D1000
heap
page read and write
3B24D000
heap
page read and write
367ED000
heap
page read and write
367D5000
heap
page read and write
39FF7000
heap
page read and write
367E5000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
3AE30000
trusted library allocation
page read and write
367EF000
heap
page read and write
367FE000
heap
page read and write
367D5000
heap
page read and write
367EA000
heap
page read and write
367ED000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
19A000
stack
page read and write
367D1000
heap
page read and write
367ED000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
367E5000
heap
page read and write
367D5000
heap
page read and write
367EF000
heap
page read and write
4E5000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
3B24D000
heap
page read and write
59C000
heap
page read and write
367EF000
heap
page read and write
367D5000
heap
page read and write
367F4000
heap
page read and write
39FF8000
heap
page read and write
367D1000
heap
page read and write
367EF000
heap
page read and write
367D5000
heap
page read and write
367E5000
heap
page read and write
367EA000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
367E5000
heap
page read and write
39FE7000
heap
page read and write
367E5000
heap
page read and write
156AB9B0000
unclassified section
page readonly
367D1000
heap
page read and write
367D1000
heap
page read and write
3B221000
heap
page read and write
3B221000
heap
page read and write
367EF000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
391C2000
trusted library allocation
page read and write
39FF8000
heap
page read and write
367EA000
heap
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
3A800000
trusted library allocation
page read and write
367D1000
heap
page read and write
1BA2D571000
heap
page read and write
367D5000
heap
page read and write
36814000
heap
page read and write
3B233000
heap
page read and write
367D5000
heap
page read and write
1086000
trusted library allocation
page read and write
3B24D000
heap
page read and write
3B221000
heap
page read and write
391E2000
trusted library allocation
page read and write
367EA000
heap
page read and write
1405000
heap
page read and write
39FE0000
heap
page read and write
3A827000
trusted library allocation
page read and write
3B0C0000
trusted library allocation
page read and write
367EA000
heap
page read and write
3B24D000
heap
page read and write
3B221000
heap
page read and write
3A826000
trusted library allocation
page read and write
3A025000
heap
page read and write
3681F000
heap
page read and write
367D1000
heap
page read and write
39FEB000
heap
page read and write
367D5000
heap
page read and write
1BA32890000
trusted library allocation
page read and write
422000
unkown
page read and write
367EA000
heap
page read and write
367EA000
heap
page read and write
3B0C0000
trusted library allocation
page read and write
3A025000
heap
page read and write
367DA000
heap
page read and write
71A2000
heap
page read and write
1E5A67A000
stack
page read and write
6E46000
direct allocation
page execute and read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
39FED000
heap
page read and write
10F6000
stack
page read and write
2354000
heap
page read and write
367EA000
heap
page read and write
367E5000
heap
page read and write
1BA2D55E000
heap
page read and write
39FF8000
heap
page read and write
367E5000
heap
page read and write
367D5000
heap
page read and write
367FE000
heap
page read and write
367EA000
heap
page read and write
3B221000
heap
page read and write
1BA2CC52000
heap
page read and write
367F2000
heap
page read and write
39FF4000
heap
page read and write
3B0C0000
trusted library allocation
page read and write
156AB920000
heap
page read and write
3B221000
heap
page read and write
1672000
trusted library allocation
page execute and read and write
2390000
heap
page read and write
367FE000
heap
page read and write
156AB9D0000
heap
page read and write
367E5000
heap
page read and write
367F4000
heap
page read and write
3A200000
trusted library allocation
page read and write
3B221000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
3B221000
heap
page read and write
1BA328FA000
trusted library allocation
page read and write
3AE39000
trusted library allocation
page read and write
1BA328F4000
trusted library allocation
page read and write
367D1000
heap
page read and write
367E5000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
367E5000
heap
page read and write
5E6000
heap
page read and write
367D5000
heap
page read and write
367EF000
heap
page read and write
1BA329C0000
trusted library allocation
page read and write
39FF8000
heap
page read and write
3AF70000
trusted library allocation
page read and write
3681E000
heap
page read and write
367D1000
heap
page read and write
3B235000
heap
page read and write
3A200000
trusted library allocation
page read and write
367E5000
heap
page read and write
367E5000
heap
page read and write
3A206000
trusted library allocation
page read and write
3AF70000
trusted library allocation
page read and write
39FF8000
heap
page read and write
39172000
trusted library allocation
page read and write
367D1000
heap
page read and write
39172000
trusted library allocation
page read and write
367D1000
heap
page read and write
367E5000
heap
page read and write
39FF8000
heap
page read and write
367E5000
heap
page read and write
367D5000
heap
page read and write
3B0C0000
trusted library allocation
page read and write
1BA32C5E000
heap
page read and write
367D5000
heap
page read and write
367E5000
heap
page read and write
39FCD000
heap
page read and write
39FFB000
heap
page read and write
367F2000
heap
page read and write
367D1000
heap
page read and write
36821000
heap
page read and write
3B0C6000
trusted library allocation
page read and write
3B24D000
heap
page read and write
3681F000
heap
page read and write
2930000
heap
page read and write
367E5000
heap
page read and write
36800000
heap
page read and write
367D1000
heap
page read and write
367F4000
heap
page read and write
36820000
heap
page read and write
400000
unkown
page readonly
367E5000
heap
page read and write
2DF0000
heap
page read and write
36822000
heap
page read and write
367D1000
heap
page read and write
1BA2D400000
heap
page read and write
367D1000
heap
page read and write
367F2000
heap
page read and write
367E5000
heap
page read and write
32CF000
stack
page read and write
367D5000
heap
page read and write
391C2000
trusted library allocation
page read and write
3A207000
trusted library allocation
page read and write
367D1000
heap
page read and write
367EF000
heap
page read and write
367D5000
heap
page read and write
71C2000
heap
page read and write
1BA32C26000
heap
page read and write
1BA32C02000
heap
page read and write
1BA328A5000
trusted library allocation
page read and write
367D5000
heap
page read and write
3B0C0000
trusted library allocation
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
3B221000
heap
page read and write
367E5000
heap
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
367DA000
heap
page read and write
367E5000
heap
page read and write
367D5000
heap
page read and write
39FE7000
heap
page read and write
367D1000
heap
page read and write
13D8000
heap
page read and write
367EA000
heap
page read and write
39FE6000
heap
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
367E5000
heap
page read and write
3B0C5000
trusted library allocation
page read and write
367D1000
heap
page read and write
36800000
heap
page read and write
367EF000
heap
page read and write
3A200000
trusted library allocation
page read and write
3A007000
heap
page read and write
36824000
heap
page read and write
36803000
heap
page read and write
367E2000
heap
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
367D5000
heap
page read and write
367EA000
heap
page read and write
39FE0000
heap
page read and write
36801000
heap
page read and write
367D5000
heap
page read and write
3A850000
trusted library allocation
page read and write
367E5000
heap
page read and write
3B221000
heap
page read and write
367D5000
heap
page read and write
367E5000
heap
page read and write
367D5000
heap
page read and write
1BA2D3E1000
trusted library allocation
page read and write
4EE0000
direct allocation
page execute and read and write
156ABA75000
heap
page read and write
15CE000
stack
page read and write
367D1000
heap
page read and write
3B221000
heap
page read and write
39172000
trusted library allocation
page read and write
3300000
heap
page read and write
6D1000
heap
page read and write
39262000
trusted library allocation
page read and write
3A025000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
3C7C000
stack
page read and write
367E5000
heap
page read and write
71F4000
heap
page read and write
3B233000
heap
page read and write
367E5000
heap
page read and write
2DE0000
unclassified section
page readonly
3B221000
heap
page read and write
7204000
heap
page read and write
367D5000
heap
page read and write
367ED000
heap
page read and write
1BA328AD000
trusted library allocation
page read and write
367EA000
heap
page read and write
39171000
trusted library allocation
page read and write
10FA000
stack
page read and write
39FF6000
heap
page read and write
367FE000
heap
page read and write
367E5000
heap
page read and write
367EF000
heap
page read and write
367D5000
heap
page read and write
39FF8000
heap
page read and write
367EA000
heap
page read and write
367E5000
heap
page read and write
36822000
heap
page read and write
3B221000
heap
page read and write
1BA32C13000
heap
page read and write
367E5000
heap
page read and write
367ED000
heap
page read and write
1BA328AF000
trusted library allocation
page read and write
305D000
stack
page read and write
367EF000
heap
page read and write
1680000
heap
page read and write
3B224000
heap
page read and write
391C1000
trusted library allocation
page read and write
367D5000
heap
page read and write
39F20000
trusted library allocation
page read and write
367D1000
heap
page read and write
36801000
heap
page read and write
1BA32860000
trusted library allocation
page read and write
367ED000
heap
page read and write
367D1000
heap
page read and write
367E5000
heap
page read and write
3A820000
trusted library allocation
page read and write
3B0C5000
trusted library allocation
page read and write
367D5000
heap
page read and write
3B24E000
heap
page read and write
367ED000
heap
page read and write
39FF8000
heap
page read and write
367EF000
heap
page read and write
367EA000
heap
page read and write
367D5000
heap
page read and write
39213000
trusted library allocation
page read and write
3A025000
heap
page read and write
3B22F000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
71C5000
heap
page read and write
367D5000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
1BA328A7000
trusted library allocation
page read and write
367D5000
heap
page read and write
1BA2CC2A000
heap
page read and write
367E5000
heap
page read and write
367F4000
heap
page read and write
1BA32960000
trusted library allocation
page read and write
401000
unkown
page execute read
367EF000
heap
page read and write
3A430000
trusted library allocation
page read and write
367D1000
heap
page read and write
367FE000
heap
page read and write
3B221000
heap
page read and write
39FF6000
heap
page read and write
367D1000
heap
page read and write
367EA000
heap
page read and write
391C3000
trusted library allocation
page read and write
367EA000
heap
page read and write
39FE0000
heap
page read and write
367E5000
heap
page read and write
1BA328E5000
trusted library allocation
page read and write
3B0C5000
trusted library allocation
page read and write
3681E000
heap
page read and write
367EA000
heap
page read and write
39FF8000
heap
page read and write
367EA000
heap
page read and write
367D5000
heap
page read and write
367ED000
heap
page read and write
3B221000
heap
page read and write
3A1C6000
trusted library allocation
page read and write
39FE0000
heap
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
18DE000
stack
page read and write
1BA328FE000
trusted library allocation
page read and write
1360000
heap
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
367D5000
heap
page read and write
367FE000
heap
page read and write
367D5000
heap
page read and write
1BA32930000
trusted library allocation
page read and write
367D5000
heap
page read and write
39FF8000
heap
page read and write
367D1000
heap
page read and write
367FE000
heap
page read and write
367ED000
heap
page read and write
367D1000
heap
page read and write
39FE6000
heap
page read and write
367D1000
heap
page read and write
367D1000
heap
page read and write
367D5000
heap
page read and write
3B0C0000
trusted library allocation
page read and write
32C0000
heap
page read and write
367D1000
heap
page read and write
1BA2D57C000
heap
page read and write
There are 2186 hidden memdumps, click here to show them.