IOC Report
wE1inOhJA5.msi

loading gif

Files

File Path
Type
Category
Malicious
wE1inOhJA5.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: 7-Zip 24.01 (x64) 24.1.0.0, Subject: 7-Zip 24.01 (x64), Author: Igor Pavlov, Keywords: Installer, Template: x64;1033, Revision Number: {5131F5EE-04FE-4DDC-B86B-F721A2EEC0E9}, Create Time/Date: Thu Jan 11 14:59:38 2024, Last Saved Time/Date: Thu Jan 11 14:59:38 2024, Number of Pages: 200, Number of Words: 12, Name of Creating Application: MSI Wrapper (11.0.53.0), Security: 2
initial sample
malicious
C:\Users\user\AppData\Local\Temp\MW-70394d6c-f51f-472d-a6f7-915654cf9b1e\files\775b62a938f64659aead6abedaf63071$dpx$.tmp\67a1ae3c4a36f34f89fd14e4fff5e74c.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\MW-70394d6c-f51f-472d-a6f7-915654cf9b1e\files\775b62a938f64659aead6abedaf63071$dpx$.tmp\75aedfde5bde214c9f1dda9d9e9a381f.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\MW-70394d6c-f51f-472d-a6f7-915654cf9b1e\files\775b62a938f64659aead6abedaf63071$dpx$.tmp\87377860be1e204a95d069480a67ac12.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\MW-70394d6c-f51f-472d-a6f7-915654cf9b1e\files\775b62a938f64659aead6abedaf63071$dpx$.tmp\bce5c9c7fb0eb5498f5eb0ff4df1bd89.tmp
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\MW-70394d6c-f51f-472d-a6f7-915654cf9b1e\files\g2m.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\MW-70394d6c-f51f-472d-a6f7-915654cf9b1e\files\task.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\MW-70394d6c-f51f-472d-a6f7-915654cf9b1e\files\your_package_name.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\apps.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\g2m.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\task.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI509A.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_task.exe_dca940beb5ac1855d24aeb3d9b5a56fbdf8779b_355c3592_19be0b05-7ace-4d33-8611-c7043441e604\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6A0E.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Nov 21 10:26:40 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6DB9.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6DE8.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\TokenBroker\Cache\e8ddd4cbd9c0504aace6ef7a13fa20d04fd52408.tbres
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\MW-70394d6c-f51f-472d-a6f7-915654cf9b1e\files.cab
Microsoft Cabinet archive data, many, 1458311 bytes, 6 files, at 0x2c +A "data.bin" +A "g2m.dll", ID 46085, number 1, 102 datablocks, 0x1503 compression
dropped
C:\Users\user\AppData\Local\Temp\MW-70394d6c-f51f-472d-a6f7-915654cf9b1e\files\775b62a938f64659aead6abedaf63071$dpx$.tmp\46024ecf2bfdea4bb37ae547628d1f53.tmp
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: GoToMeeting 5.4.0.1082, Subject: GoToMeeting, Author: Citrix Online, a division of Citrix Systems, Inc., Keywords: Installer, Template: x64;1033, Revision Number: {0477C971-7364-4C60-9D84-EFF0F290A852}, Create Time/Date: Thu Jan 11 14:59:38 2024, Last Saved Time/Date: Thu Jan 11 14:59:38 2024, Number of Pages: 200, Number of Words: 12, Name of Creating Application: MSI Wrapper (11.0.53.0), Security: 2
dropped
C:\Users\user\AppData\Local\Temp\MW-70394d6c-f51f-472d-a6f7-915654cf9b1e\files\775b62a938f64659aead6abedaf63071$dpx$.tmp\58f7e5e087b28e4e911e91b4d3b16d6e.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\MW-70394d6c-f51f-472d-a6f7-915654cf9b1e\files\data.bin (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\MW-70394d6c-f51f-472d-a6f7-915654cf9b1e\files\run.bat (copy)
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\MW-70394d6c-f51f-472d-a6f7-915654cf9b1e\files\task22.msi (copy)
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: GoToMeeting 5.4.0.1082, Subject: GoToMeeting, Author: Citrix Online, a division of Citrix Systems, Inc., Keywords: Installer, Template: x64;1033, Revision Number: {0477C971-7364-4C60-9D84-EFF0F290A852}, Create Time/Date: Thu Jan 11 14:59:38 2024, Last Saved Time/Date: Thu Jan 11 14:59:38 2024, Number of Pages: 200, Number of Words: 12, Name of Creating Application: MSI Wrapper (11.0.53.0), Security: 2
dropped
C:\Users\user\AppData\Local\Temp\MW-70394d6c-f51f-472d-a6f7-915654cf9b1e\msiwrapper.ini
data
dropped
C:\Users\user\AppData\Local\Temp\bhvAED7.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x53c051b8, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\09084311-6101-4307-8042-692387250400.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\40467ba0-1653-4c89-85b8-2b44867f47f0.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\BrowserMetrics\BrowserMetrics-673F0B08-1074.pma
DIY-Thermocam raw data (Lepton 3.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 33554432.000000, slope 293373858522878600971173199085568.000000
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Crashpad\throttle_store.dat
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\1d0e1950-c91c-4fdd-afd6-8af39cfd64c4.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Cache\Cache_Data\data_0
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Cache\Cache_Data\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Cache\Cache_Data\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Cache\Cache_Data\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Cache\Cache_Data\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Code Cache\js\index
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Code Cache\js\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Code Cache\js\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Code Cache\wasm\index
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Code Cache\wasm\index-dir\temp-index
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Code Cache\wasm\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\DawnCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\DawnCache\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\DawnCache\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\DawnCache\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\DawnCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\EdgeCoupons\coupons_data.db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\EdgeCoupons\coupons_data.db\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\EdgeCoupons\coupons_data.db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\EdgeCoupons\coupons_data.db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\EdgeCoupons\coupons_data.db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Extension Rules\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Extension Rules\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Extension Rules\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Extension Rules\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Extension Rules\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Extension Scripts\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Extension Scripts\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Extension Scripts\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Extension Scripts\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Extension Scripts\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Favicons
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 10, cookie 0x8, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\GPUCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\GPUCache\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\GPUCache\data_3
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\GPUCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\History
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\HubApps Icons
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Local Storage\leveldb\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Local Storage\leveldb\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Local Storage\leveldb\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Login Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Network\61923a97-38bf-4031-88d2-1b7fb3bb403a.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Network\Reporting and NEL
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Network\Reporting and NEL-journal
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Network\SCT Auditing Pending Reports (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Network\SCT Auditing Pending Reports~RF2e67e.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Network\Trust Tokens
SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Network\fb567f2b-288f-4830-8540-4dccbaa7249d.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\README
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Session Storage\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Session Storage\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Session Storage\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Site Characteristics Database\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Site Characteristics Database\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Site Characteristics Database\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Site Characteristics Database\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Site Characteristics Database\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Sync Data\LevelDB\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Sync Data\LevelDB\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Sync Data\LevelDB\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Sync Data\LevelDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Sync Data\LevelDB\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Top Sites
SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Visited Links
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Web Data
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 87, cookie 0x36, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\Web Data-journal
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\arbitration_service_config.json
ASCII text, with very long lines (3852), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\b41b11d1-833a-41cd-aeef-18d0b252f4d3.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\shared_proto_db\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\shared_proto_db\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\shared_proto_db\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\shared_proto_db\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\shared_proto_db\metadata\000001.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\shared_proto_db\metadata\000003.log
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\shared_proto_db\metadata\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\shared_proto_db\metadata\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Default\shared_proto_db\metadata\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Local State~RF2e17c.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Local State~RF2e1cb.TMP (copy)
JSON data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Nurturing\campaign_history
SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\ShaderCache\data_0
FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\ShaderCache\data_1
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\ShaderCache\data_2
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\ShaderCache\data_3
data
modified
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\ShaderCache\index
FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\SmartScreen\RemoteData\customSynchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\SmartScreen\RemoteData\customSynchronousLookupUris_0
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\SmartScreen\RemoteData\edgeSettings
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\SmartScreen\RemoteData\edgeSettings_2.0-0
JSON data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\SmartScreen\RemoteData\synchronousLookupUris
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\SmartScreen\RemoteData\synchronousLookupUris_636976985063396749.rel.v2
data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\Variations
JSON data
dropped
C:\Users\user\AppData\Local\Temp\chr6BC.tmp\ba7cbed2-d23d-4fba-9328-ab5bc55c5d3f.tmp
JSON data
dropped
C:\Users\user\AppData\Local\Temp\gifwhgt
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\data.bin
data
dropped
C:\Windows\Installer\434f23.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: 7-Zip 24.01 (x64) 24.1.0.0, Subject: 7-Zip 24.01 (x64), Author: Igor Pavlov, Keywords: Installer, Template: x64;1033, Revision Number: {5131F5EE-04FE-4DDC-B86B-F721A2EEC0E9}, Create Time/Date: Thu Jan 11 14:59:38 2024, Last Saved Time/Date: Thu Jan 11 14:59:38 2024, Number of Pages: 200, Number of Words: 12, Name of Creating Application: MSI Wrapper (11.0.53.0), Security: 2
dropped
C:\Windows\Installer\SourceHash{0028494D-9E28-4DD9-A336-17E8D634DF88}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Logs\DPX\setupact.log
CSV text
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\~DF1333532D6698F888.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF218C22ED6F4C8576.TMP
data
dropped
C:\Windows\Temp\~DF5F9E9BE5BF5CDDEB.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFADFAA71AA704D598.TMP
data
dropped
C:\Windows\Temp\~DFC20ED811495708D5.TMP
data
dropped
C:\Windows\Temp\~DFD848A46AF3D0AB12.TMP
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\ConDrv
ASCII text, with CRLF, CR, LF line terminators
dropped
There are 139 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Local\Temp\MW-70394d6c-f51f-472d-a6f7-915654cf9b1e\files\task.exe
"C:\Users\user\AppData\Local\Temp\MW-70394d6c-f51f-472d-a6f7-915654cf9b1e\files\task.exe"
malicious
C:\Users\user\task.exe
"task.exe"
malicious
C:\Users\user\task.exe
C:\Users\user\task.exe /stext "C:\Users\user\AppData\Local\Temp\gifwhgt"
malicious
C:\Users\user\task.exe
C:\Users\user\task.exe
malicious
C:\Users\user\task.exe
C:\Users\user\task.exe /stext "C:\Users\user\AppData\Local\Temp\jckohyeeyyu"
malicious
C:\Users\user\task.exe
C:\Users\user\task.exe /stext "C:\Users\user\AppData\Local\Temp\tfphirpfmgmayj"
malicious
C:\Users\user\task.exe
"task.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Windows\System32\svchost.exe"
malicious
C:\Windows\System32\svchost.exe
"C:\Windows\System32\svchost.exe"
malicious
C:\Program Files\Windows Media Player\wmplayer.exe
"C:\Program Files\Windows Media Player\wmplayer.exe"
malicious
C:\Windows\System32\dllhost.exe
"C:\Windows\system32\dllhost.exe"
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\wE1inOhJA5.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding E1280F90D0867DD413F7EEEF5D19EFB6
C:\Windows\SysWOW64\icacls.exe
"C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-70394d6c-f51f-472d-a6f7-915654cf9b1e\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\expand.exe
"C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\apps.bat" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7880 -s 976
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\user\AppData\Local\Temp\MW-70394d6c-f51f-472d-a6f7-915654cf9b1e\files"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\apps.bat" "
C:\Windows\SysWOW64\icacls.exe
"C:\Windows\system32\ICACLS.EXE" "C:\Users\user\AppData\Local\Temp\MW-70394d6c-f51f-472d-a6f7-915654cf9b1e\." /SETINTEGRITYLEVEL (CI)(OI)LOW
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\apps.bat" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
--user-data-dir="C:\Users\user\AppData\Local\Temp\chrFE01.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/10d9defc/6c77fc35"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2480 --field-trial-handle=2376,i,16818295695986717264,7118115118329945779,262144 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
--user-data-dir="C:\Users\user\AppData\Local\Temp\chr6BC.tmp" --explicitly-allowed-ports=8000 --disable-gpu --new-window "http://127.0.0.1:8000/10d9defc/32916e99"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2640 --field-trial-handle=2100,i,4541570122865520646,14461282582081406380,262144 /prefetch:3
There are 23 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://179.43.171.196:5982/c329ffe03228fab8/o0tr85tn.5txna
malicious
rm.anonbaba.net
malicious
http://geoplugin.net/json.gp$
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://179.43.171.196:5982/c329ffe03228fab8/o0tr85tn.5txnas
unknown
http://www.imvu.comr
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://179.43.171.196:5982/c329ffe03228fab8/o0tr85tn.5txnax
unknown
http://geoplugin.net/json.gphy
unknown
http://www.imvu.com
unknown
https://cloudflare-dns.com/dns-query
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://179.43.171.196:5982/c329ffe03228fab8/o0tr85tn.5txnaymb
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.imvu.coma
unknown
http://www.nirsoft.net
unknown
https://cloudflare-dns.com/dns-queryPOSTContent-TypeContent-LengthHostapplication/dns-message%dMachi
unknown
http://geoplugin.net/json.gp6
unknown
https://www.ecosia.org/newtab/
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://127.01:
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com
unknown
https://www.catcert.net/verarrel
unknown
http://geoplugin.net/json.gp/C
unknown
http://127.0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://geoplugin.net/json.gpN
unknown
https://179.43.171.196:5982/c329ffe03228fab8/o0tr85tn.5txnakernelbasentdllkernel32GetProcessMitigati
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
http://www.nirsoft.net/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.ebuddy.com
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
rm.anonbaba.net
179.43.171.197
malicious
ntp.nict.jp
61.205.120.130
chrome.cloudflare-dns.com
172.64.41.3
geoplugin.net
178.237.33.50
ntp1.net.berkeley.edu
169.229.128.134
ntp.time.in.ua
62.149.0.30
time-a-g.nist.gov
129.6.15.28
ts1.aco.net
193.171.23.163
time.windows.com
unknown

IPs

IP
Domain
Country
Malicious
179.43.171.196
unknown
Panama
malicious
179.43.171.197
rm.anonbaba.net
Panama
malicious
62.149.0.30
ntp.time.in.ua
Ukraine
169.229.128.134
ntp1.net.berkeley.edu
United States
129.6.15.28
time-a-g.nist.gov
United States
193.171.23.163
ts1.aco.net
Austria
162.159.61.3
unknown
United States
61.205.120.130
ntp.nict.jp
Japan
239.255.255.250
unknown
Reserved
178.237.33.50
geoplugin.net
Netherlands
127.0.0.1
unknown
unknown
172.64.41.3
chrome.cloudflare-dns.com
United States
There are 2 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
apps
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\System32\ndfapi.dll,-40001
\REGISTRY\A\{71e4a7a2-9d87-74ca-ff20-b99282d88ca3}\Root\InventoryApplicationFile\task.exe|3e5dd5a29bf2018c
ProgramId
\REGISTRY\A\{71e4a7a2-9d87-74ca-ff20-b99282d88ca3}\Root\InventoryApplicationFile\task.exe|3e5dd5a29bf2018c
FileId
\REGISTRY\A\{71e4a7a2-9d87-74ca-ff20-b99282d88ca3}\Root\InventoryApplicationFile\task.exe|3e5dd5a29bf2018c
LowerCaseLongPath
\REGISTRY\A\{71e4a7a2-9d87-74ca-ff20-b99282d88ca3}\Root\InventoryApplicationFile\task.exe|3e5dd5a29bf2018c
LongPathHash
\REGISTRY\A\{71e4a7a2-9d87-74ca-ff20-b99282d88ca3}\Root\InventoryApplicationFile\task.exe|3e5dd5a29bf2018c
Name
\REGISTRY\A\{71e4a7a2-9d87-74ca-ff20-b99282d88ca3}\Root\InventoryApplicationFile\task.exe|3e5dd5a29bf2018c
OriginalFileName
\REGISTRY\A\{71e4a7a2-9d87-74ca-ff20-b99282d88ca3}\Root\InventoryApplicationFile\task.exe|3e5dd5a29bf2018c
Publisher
\REGISTRY\A\{71e4a7a2-9d87-74ca-ff20-b99282d88ca3}\Root\InventoryApplicationFile\task.exe|3e5dd5a29bf2018c
Version
\REGISTRY\A\{71e4a7a2-9d87-74ca-ff20-b99282d88ca3}\Root\InventoryApplicationFile\task.exe|3e5dd5a29bf2018c
BinFileVersion
\REGISTRY\A\{71e4a7a2-9d87-74ca-ff20-b99282d88ca3}\Root\InventoryApplicationFile\task.exe|3e5dd5a29bf2018c
BinaryType
\REGISTRY\A\{71e4a7a2-9d87-74ca-ff20-b99282d88ca3}\Root\InventoryApplicationFile\task.exe|3e5dd5a29bf2018c
ProductName
\REGISTRY\A\{71e4a7a2-9d87-74ca-ff20-b99282d88ca3}\Root\InventoryApplicationFile\task.exe|3e5dd5a29bf2018c
ProductVersion
\REGISTRY\A\{71e4a7a2-9d87-74ca-ff20-b99282d88ca3}\Root\InventoryApplicationFile\task.exe|3e5dd5a29bf2018c
LinkDate
\REGISTRY\A\{71e4a7a2-9d87-74ca-ff20-b99282d88ca3}\Root\InventoryApplicationFile\task.exe|3e5dd5a29bf2018c
BinProductVersion
\REGISTRY\A\{71e4a7a2-9d87-74ca-ff20-b99282d88ca3}\Root\InventoryApplicationFile\task.exe|3e5dd5a29bf2018c
AppxPackageFullName
\REGISTRY\A\{71e4a7a2-9d87-74ca-ff20-b99282d88ca3}\Root\InventoryApplicationFile\task.exe|3e5dd5a29bf2018c
AppxPackageRelativeId
\REGISTRY\A\{71e4a7a2-9d87-74ca-ff20-b99282d88ca3}\Root\InventoryApplicationFile\task.exe|3e5dd5a29bf2018c
Size
\REGISTRY\A\{71e4a7a2-9d87-74ca-ff20-b99282d88ca3}\Root\InventoryApplicationFile\task.exe|3e5dd5a29bf2018c
Language
\REGISTRY\A\{71e4a7a2-9d87-74ca-ff20-b99282d88ca3}\Root\InventoryApplicationFile\task.exe|3e5dd5a29bf2018c
Usn
HKEY_CURRENT_USER\SOFTWARE\Rmc-RNN6CM
licence
HKEY_CURRENT_USER\SOFTWARE\Rmc-RNN6CM
time
HKEY_CURRENT_USER\SOFTWARE\SibCode
sn3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PrefsLightweight
lw_5678848403d737a72fc42e50f0f0ebe1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseenversion
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
freseen
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_dse_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Defaults
is_startup_page_recommended
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
metricsid
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
metricsid_installdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_username
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
edge.services.last_account_id
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
lastrun
There are 51 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
B6000
direct allocation
page read and write
malicious
8F0000
direct allocation
page execute and read and write
malicious
60000
direct allocation
page execute and read and write
malicious
3480000
direct allocation
page read and write
malicious
7BE000
heap
page read and write
malicious
2550000
direct allocation
page execute and read and write
malicious
176000
direct allocation
page read and write
malicious
580000
direct allocation
page read and write
malicious
3490000
direct allocation
page execute and read and write
malicious
2741000
heap
page read and write
51D0000
trusted library allocation
page read and write
1ECF2720000
unkown
page execute and read and write
1C0003170000
trusted library allocation
page read and write
3660000
heap
page read and write
1BE862C0000
heap
page read and write
1C0002D84000
trusted library allocation
page read and write
4444002E4000
direct allocation
page read and write
36BE000
heap
page read and write
5430000
unkown
page read and write
6290002FC000
trusted library allocation
page read and write
1BE8562A000
heap
page read and write
1C0002F30000
trusted library allocation
page read and write
1C000235C000
trusted library allocation
page read and write
36C2000
heap
page read and write
1937C72B000
heap
page read and write
1BE85D02000
heap
page read and write
3342000
heap
page read and write
3D30000
heap
page read and write
1BE85C43000
heap
page read and write
3332000
heap
page read and write
60A00000C000
trusted library allocation
page read and write
444400220000
direct allocation
page read and write
51D0000
trusted library allocation
page read and write
35C19FE000
unkown
page readonly
3332000
heap
page read and write
3332000
heap
page read and write
1BE85C43000
heap
page read and write
60A000A0C000
trusted library allocation
page read and write
1BE85C02000
heap
page read and write
3332000
heap
page read and write
1C00038DC000
trusted library allocation
page read and write
177000
stack
page read and write
1BE82760000
unkown
page execute and read and write
19305457000
heap
page read and write
721800418000
trusted library allocation
page read and write
1C0003924000
trusted library allocation
page read and write
60A000C60000
trusted library allocation
page read and write
3D31000
heap
page read and write
3B31000
heap
page read and write
405000
unkown
page readonly
3BA8000
heap
page read and write
60A0006E8000
trusted library allocation
page read and write
3E9C000
heap
page read and write
3342000
heap
page read and write
8A3000
heap
page read and write
1C0002DE1000
trusted library allocation
page read and write
60A000834000
trusted library allocation
page read and write
FE06FFE000
unkown
page readonly
294E000
stack
page read and write
721800210000
trusted library allocation
page read and write
1C0002758000
trusted library allocation
page read and write
1C0002D2C000
trusted library allocation
page read and write
1BE85C64000
heap
page read and write
2148000
heap
page read and write
1BE86230000
heap
page read and write
367D000
heap
page read and write
890000
heap
page read and write
55B0000
unkown
page read and write
120000
direct allocation
page read and write
216A000
heap
page read and write
1C0003770000
trusted library allocation
page read and write
1ECF48E7000
heap
page read and write
451C00248000
trusted library allocation
page read and write
28183099000
heap
page read and write
1ECF45CF000
heap
page read and write
3332000
heap
page read and write
400000
system
page execute and read and write
35B19FE000
unkown
page readonly
1937C750000
heap
page read and write
20A308F0000
remote allocation
page execute and read and write
366E000
heap
page read and write
2930000
trusted library allocation
page read and write
1BE82913000
heap
page read and write
1C0003B64000
trusted library allocation
page read and write
1BE85624000
heap
page read and write
28183624000
heap
page read and write
3BA9000
heap
page read and write
35B21FC000
stack
page read and write
1C0002928000
trusted library allocation
page read and write
2A70000
trusted library allocation
page read and write
1BE85D6C000
heap
page read and write
366E000
heap
page read and write
1C0002CE8000
trusted library allocation
page read and write
3332000
heap
page read and write
5786000
unkown
page read and write
51D0000
trusted library allocation
page read and write
1937E530000
heap
page read and write
60A000D8C000
trusted library allocation
page read and write
7218002A8000
trusted library allocation
page read and write
1BE85CA6000
heap
page read and write
2930000
trusted library allocation
page read and write
6450002E4000
trusted library allocation
page read and write
1ECF4607000
heap
page read and write
3629000
heap
page read and write
1F0000
heap
page read and write
1C0002DE8000
trusted library allocation
page read and write
2731000
heap
page read and write
3BA9000
heap
page read and write
1937C732000
heap
page read and write
3332000
heap
page read and write
5EB000
heap
page read and write
A2400220000
direct allocation
page read and write
1BE856D7000
heap
page read and write
28187332000
trusted library allocation
page read and write
1C00028F8000
trusted library allocation
page read and write
51D1000
trusted library allocation
page read and write
1C00032B8000
trusted library allocation
page read and write
60A00016C000
trusted library allocation
page read and write
281830BB000
heap
page read and write
6FEBE000
unkown
page write copy
1BE85C6C000
heap
page read and write
2A69000
heap
page read and write
5160000
trusted library allocation
page read and write
365B000
heap
page read and write
3BA8000
heap
page read and write
6290002B8000
trusted library allocation
page read and write
401000
unkown
page execute read
1C0003944000
trusted library allocation
page read and write
281FC810000
heap
page read and write
60A000304000
trusted library allocation
page read and write
1ECF29C0000
unkown
page read and write
4C4000
heap
page read and write
35C61FE000
stack
page read and write
366E000
heap
page read and write
2139000
heap
page read and write
2796000
heap
page read and write
3BA8000
heap
page read and write
29FC000
heap
page read and write
4444002C0000
direct allocation
page read and write
3650000
heap
page read and write
1BE8561D000
heap
page read and write
1BE85C85000
heap
page read and write
35A69FE000
unkown
page readonly
1BE85602000
heap
page read and write
2731000
heap
page read and write
3660000
heap
page read and write
1BE85C64000
heap
page read and write
213D000
heap
page read and write
1BE829DE000
heap
page read and write
1BE85D64000
heap
page read and write
304D000
unclassified section
page execute and read and write
55A000
heap
page read and write
1BE85DA6000
heap
page read and write
1BE85C85000
heap
page read and write
3657000
heap
page read and write
1BE85702000
heap
page read and write
3BA8000
heap
page read and write
367D000
heap
page read and write
1ECF48E7000
heap
page read and write
3342000
heap
page read and write
3BA8000
heap
page read and write
1BE85CC7000
heap
page read and write
2A61000
heap
page read and write
1937C736000
heap
page read and write
7DF479B02000
unkown
page read and write
2148000
heap
page read and write
1ECF28B5000
heap
page read and write
35AB1FE000
stack
page read and write
405000
unkown
page readonly
1C0002BAC000
trusted library allocation
page read and write
3342000
heap
page read and write
2738000
heap
page read and write
339F000
heap
page read and write
35B09FE000
unkown
page readonly
1937C613000
heap
page read and write
890000
heap
page read and write
281830B6000
heap
page read and write
1C0002601000
trusted library allocation
page read and write
2818309E000
heap
page read and write
3660000
heap
page read and write
1BE85C43000
heap
page read and write
1BE85D6C000
heap
page read and write
3BA8000
heap
page read and write
2818309E000
heap
page read and write
1ECF2990000
trusted library allocation
page read and write
1C0002598000
trusted library allocation
page read and write
35B31FC000
stack
page read and write
451C0033C000
trusted library allocation
page read and write
2145000
heap
page read and write
721800201000
trusted library allocation
page read and write
1BE8562A000
heap
page read and write
1BE85C6C000
heap
page read and write
1C0003294000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
1C0002390000
trusted library allocation
page read and write
444400240000
direct allocation
page read and write
36EF000
heap
page read and write
19305416000
heap
page read and write
1ECF45D0000
heap
page read and write
371B000
heap
page read and write
2D70000
unkown
page read and write
60A00068C000
trusted library allocation
page read and write
721800254000
trusted library allocation
page read and write
FE7C9FE000
unkown
page readonly
838000
heap
page read and write
1ECF4607000
heap
page read and write
1937C746000
heap
page read and write
2A50000
heap
page read and write
35B41FA000
stack
page read and write
451C00201000
trusted library allocation
page read and write
281830B6000
heap
page read and write
3BA9000
heap
page read and write
1BE85C85000
heap
page read and write
1BE85CA6000
heap
page read and write
1C0002B34000
trusted library allocation
page read and write
290E000
stack
page read and write
1BE85C37000
heap
page read and write
1BE85C64000
heap
page read and write
51D0000
trusted library allocation
page read and write
3013000
heap
page read and write
365E000
heap
page read and write
366E000
heap
page read and write
60A000C34000
trusted library allocation
page read and write
281830B0000
heap
page read and write
1BE85C43000
heap
page read and write
3013000
heap
page read and write
281830AB000
heap
page read and write
1C0002840000
trusted library allocation
page read and write
AFE000
heap
page read and write
19305400000
heap
page read and write
3332000
heap
page read and write
54C2000
unkown
page read and write
A2400310000
direct allocation
page read and write
60A000E40000
trusted library allocation
page read and write
1BE85617000
heap
page read and write
60A000210000
trusted library allocation
page read and write
1BE85C43000
heap
page read and write
3342000
heap
page read and write
3639000
heap
page read and write
1C000294C000
trusted library allocation
page read and write
3332000
heap
page read and write
460000
heap
page read and write
28189CB0000
trusted library section
page read and write
2120000
heap
page read and write
5160000
trusted library allocation
page read and write
2796000
heap
page read and write
451C00220000
trusted library allocation
page read and write
890000
heap
page read and write
3332000
heap
page read and write
1937C732000
heap
page read and write
1C0003030000
trusted library allocation
page read and write
1BE85CCF000
heap
page read and write
1937C732000
heap
page read and write
644000
heap
page read and write
60A00013C000
trusted library allocation
page read and write
3660000
heap
page read and write
1BE85623000
heap
page read and write
366E000
heap
page read and write
402000
unkown
page readonly
281830A2000
heap
page read and write
60A0000C0000
trusted library allocation
page read and write
1937C74C000
heap
page read and write
8A3000
heap
page read and write
A240034C000
direct allocation
page read and write
62900028C000
trusted library allocation
page read and write
1C0003910000
trusted library allocation
page read and write
8A3000
heap
page read and write
8A3000
heap
page read and write
1BE82851000
heap
page read and write
35C59FE000
unkown
page readonly
35BF9FE000
unkown
page readonly
3CC1000
heap
page read and write
3660000
heap
page read and write
2818361B000
heap
page read and write
1BE829CE000
heap
page read and write
402000
unkown
page readonly
4C4000
heap
page read and write
3F39000
heap
page read and write
60A00089C000
trusted library allocation
page read and write
60A000D20000
trusted library allocation
page read and write
10000000
direct allocation
page read and write
1BE85D22000
heap
page read and write
645000
heap
page read and write
2796000
heap
page read and write
3342000
heap
page read and write
1BE85C8D000
heap
page read and write
1BE85C8D000
heap
page read and write
2796000
heap
page read and write
456000
system
page execute and read and write
60A0001B4000
trusted library allocation
page read and write
890000
heap
page read and write
3342000
heap
page read and write
6FEA6000
unkown
page readonly
1BE829D6000
heap
page read and write
6C8A1000
unkown
page execute read
1BE85C64000
heap
page read and write
5160000
trusted library allocation
page read and write
1ECF270A000
unkown
page read and write
28189057000
unclassified section
page read and write
A9E000
stack
page read and write
1C0003AC4000
trusted library allocation
page read and write
1BE85C64000
heap
page read and write
890000
heap
page read and write
60A000AB8000
trusted library allocation
page read and write
2148000
heap
page read and write
A2400280000
direct allocation
page read and write
281830B0000
heap
page read and write
1BE85C6C000
heap
page read and write
2C00000
unkown
page read and write
2BF0000
unkown
page read and write
2A51000
heap
page read and write
1BE85C4B000
heap
page read and write
2131000
heap
page read and write
36A3000
heap
page read and write
60A000B5C000
trusted library allocation
page read and write
1ECF48E6000
heap
page read and write
339F000
heap
page read and write
60A000AA8000
trusted library allocation
page read and write
3657000
heap
page read and write
1C0002668000
trusted library allocation
page read and write
2198000
heap
page read and write
5E0000
heap
page read and write
60A000C8C000
trusted library allocation
page read and write
2145000
heap
page read and write
60A000284000
trusted library allocation
page read and write
28183611000
heap
page read and write
1BE82960000
heap
page read and write
1ECF2A88000
heap
page read and write
35AF9FE000
unkown
page readonly
20DF000
stack
page read and write
BF697E000
stack
page read and write
362B000
heap
page read and write
3342000
heap
page read and write
3C53000
heap
page read and write
1BE85CC7000
heap
page read and write
7DF4799C0000
unkown
page read and write
2796000
heap
page read and write
1BE85D00000
heap
page read and write
366E000
heap
page read and write
3B31000
heap
page read and write
1BE829DE000
heap
page read and write
1ECF4762000
heap
page read and write
1BE85C43000
heap
page read and write
5160000
trusted library allocation
page read and write
193000
stack
page read and write
2CB31FC000
stack
page read and write
3657000
heap
page read and write
1C0002801000
trusted library allocation
page read and write
3C0B000
heap
page read and write
1BE85602000
heap
page read and write
7218002C0000
trusted library allocation
page read and write
1BE829DE000
heap
page read and write
78E000
stack
page read and write
451C00430000
trusted library allocation
page read and write
1C00031F0000
trusted library allocation
page read and write
3342000
heap
page read and write
480000
heap
page read and write
644000
heap
page read and write
2131000
heap
page read and write
644000
heap
page read and write
A24002DC000
direct allocation
page read and write
2749000
heap
page read and write
3BA8000
heap
page read and write
A2400316000
direct allocation
page read and write
1BE85C22000
heap
page read and write
2741000
heap
page read and write
A24002B4000
direct allocation
page read and write
1BE85CC7000
heap
page read and write
60A000C30000
trusted library allocation
page read and write
1BE85C85000
heap
page read and write
879000
heap
page read and write
1C0003138000
trusted library allocation
page read and write
28183622000
heap
page read and write
1BE856C9000
heap
page read and write
275F000
heap
page read and write
1BE829D6000
heap
page read and write
85F000
heap
page read and write
1BE85C2A000
heap
page read and write
1BE85CC7000
heap
page read and write
1C0003158000
trusted library allocation
page read and write
451C00424000
trusted library allocation
page read and write
3342000
heap
page read and write
28185820000
trusted library allocation
page read and write
2796000
heap
page read and write
1BE85CC7000
heap
page read and write
4130000
unclassified section
page execute and read and write
1ECF479C000
heap
page read and write
60A000334000
trusted library allocation
page read and write
3612000
heap
page read and write
51D0000
trusted library allocation
page read and write
1C00033DC000
trusted library allocation
page read and write
3312000
heap
page read and write
2EB2000
unkown
page read and write
A240021C000
direct allocation
page read and write
6FED3000
unkown
page read and write
FE799FE000
unkown
page readonly
451C002D8000
trusted library allocation
page read and write
359A9FE000
unkown
page readonly
47E000
stack
page read and write
1BE85623000
heap
page read and write
8A3000
heap
page read and write
36B0000
heap
page read and write
366E000
heap
page read and write
3B31000
heap
page read and write
281FC5B6000
heap
page read and write
A2400308000
direct allocation
page read and write
451C0028C000
trusted library allocation
page read and write
3688000
heap
page read and write
19305416000
heap
page read and write
3B31000
heap
page read and write
1C0003704000
trusted library allocation
page read and write
3332000
heap
page read and write
60A0009B0000
trusted library allocation
page read and write
645000
heap
page read and write
3332000
heap
page read and write
684000
heap
page read and write
1C0000A01000
trusted library allocation
page read and write
1BE85C8D000
heap
page read and write
359E1FE000
stack
page read and write
1C0002C6C000
trusted library allocation
page read and write
869000
heap
page read and write
4CCE000
stack
page read and write
35A49FE000
unkown
page readonly
1BE85C8D000
heap
page read and write
2145000
heap
page read and write
4C0000
heap
page read and write
1BE85CC7000
heap
page read and write
3660000
heap
page read and write
5A0000
heap
page read and write
20A30A50000
heap
page read and write
366E000
heap
page read and write
2CB2E7F000
stack
page read and write
6C906000
unkown
page readonly
1C0002C1C000
trusted library allocation
page read and write
273F000
heap
page read and write
2931000
heap
page read and write
1C000240C000
trusted library allocation
page read and write
6290002D8000
trusted library allocation
page read and write
1C0002438000
trusted library allocation
page read and write
281830AB000
heap
page read and write
55A0000
unkown
page read and write
1BE85C12000
heap
page read and write
1C0002201000
trusted library allocation
page read and write
645000298000
trusted library allocation
page read and write
1937E531000
heap
page read and write
3BA8000
heap
page read and write
FE0AFFE000
unkown
page readonly
1BE85C8D000
heap
page read and write
2148000
heap
page read and write
5817000
unkown
page read and write
2CB307C000
stack
page read and write
281835E8000
heap
page read and write
35C49FE000
unkown
page readonly
1BE85CCF000
heap
page read and write
401000
unkown
page execute read
400000
system
page execute and read and write
3332000
heap
page read and write
1C0002918000
trusted library allocation
page read and write
281830AB000
heap
page read and write
368E000
heap
page read and write
FE719FE000
unkown
page readonly
1BE85C2A000
heap
page read and write
3643000
heap
page read and write
3342000
heap
page read and write
3691000
heap
page read and write
1937C72C000
heap
page read and write
8E3000
heap
page read and write
1C00024BA000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
308E000
stack
page read and write
1BE82962000
heap
page read and write
FE749FE000
unkown
page readonly
1BE85CA6000
heap
page read and write
52B0000
trusted library allocation
page read and write
6450002B4000
trusted library allocation
page read and write
1BE829DE000
heap
page read and write
44440024C000
direct allocation
page read and write
1BE85C85000
heap
page read and write
3212000
heap
page read and write
550E000
stack
page read and write
213D000
heap
page read and write
3B31000
heap
page read and write
330C000
heap
page read and write
51D0000
trusted library allocation
page read and write
275E000
heap
page read and write
2887000
stack
page read and write
28183300000
heap
page read and write
273E000
heap
page read and write
51D0000
trusted library allocation
page read and write
2A60000
trusted library allocation
page read and write
3342000
heap
page read and write
4AE000
heap
page read and write
1C000260C000
trusted library allocation
page read and write
1BE85C02000
heap
page read and write
1BE85C85000
heap
page read and write
281830B6000
heap
page read and write
3676000
heap
page read and write
444400217000
direct allocation
page read and write
1BE85C4B000
heap
page read and write
1BE85C4B000
heap
page read and write
1C0002974000
trusted library allocation
page read and write
1BE856DE000
heap
page read and write
451C00364000
trusted library allocation
page read and write
1C0003760000
trusted library allocation
page read and write
1BE827D0000
heap
page read and write
1C0002598000
trusted library allocation
page read and write
1BE85D1F000
heap
page read and write
1C00039E4000
trusted library allocation
page read and write
3BA9000
heap
page read and write
5E00000
heap
page read and write
2796000
heap
page read and write
550000
heap
page read and write
451C00240000
trusted library allocation
page read and write
2CE0000
heap
page read and write
FE1B7FE000
stack
page read and write
1C00027E8000
trusted library allocation
page read and write
19307282000
unclassified section
page read and write
FE1AFFE000
unkown
page readonly
60A0008D4000
trusted library allocation
page read and write
1937E502000
heap
page read and write
51D0000
trusted library allocation
page read and write
60A00058C000
trusted library allocation
page read and write
3332000
heap
page read and write
281835F9000
heap
page read and write
60A000CA4000
trusted library allocation
page read and write
28188F20000
unkown
page readonly
366E000
heap
page read and write
1BE85D6B000
heap
page read and write
1BE85D02000
heap
page read and write
890000
heap
page read and write
FE137FD000
stack
page read and write
1C000294C000
trusted library allocation
page read and write
1BE86000000
heap
page read and write
8A3000
heap
page read and write
19305416000
heap
page read and write
281872F0000
trusted library section
page read and write
721800330000
trusted library allocation
page read and write
1BE829D6000
heap
page read and write
498000
heap
page read and write
28183618000
heap
page read and write
35BC1FE000
stack
page read and write
1C0002974000
trusted library allocation
page read and write
FE067FD000
stack
page read and write
1BE85C4B000
heap
page read and write
1BE829D6000
heap
page read and write
1C000360C000
trusted library allocation
page read and write
29C0000
heap
page read and write
1BE829D6000
heap
page read and write
2148000
heap
page read and write
60A000D40000
trusted library allocation
page read and write
721800264000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
3342000
heap
page read and write
5160000
trusted library allocation
page read and write
3B31000
heap
page read and write
1C0002928000
trusted library allocation
page read and write
212D000
heap
page read and write
281830AF000
heap
page read and write
51D0000
trusted library allocation
page read and write
684000
heap
page read and write
2F70000
heap
page read and write
1BE85C3C000
heap
page read and write
60A000E60000
trusted library allocation
page read and write
281890A0000
heap
page read and write
2F50000
heap
page read and write
3658000
heap
page read and write
1BE8563B000
heap
page read and write
1C0002B44000
trusted library allocation
page read and write
1BE85612000
heap
page read and write
6450002F4000
trusted library allocation
page read and write
1BE829DE000
heap
page read and write
1BE85E02000
heap
page read and write
60A000D20000
trusted library allocation
page read and write
2B50000
unkown
page read and write
3342000
heap
page read and write
2554000
heap
page read and write
359C1FE000
stack
page read and write
1BE85602000
heap
page read and write
3342000
heap
page read and write
1BE829D6000
heap
page read and write
281830B6000
heap
page read and write
2CC0000
unkown
page read and write
3332000
heap
page read and write
51D0000
trusted library allocation
page read and write
879000
heap
page read and write
1BE85D1B000
heap
page read and write
1BE85C64000
heap
page read and write
451C00348000
trusted library allocation
page read and write
2131000
heap
page read and write
193077D0000
trusted library allocation
page read and write
871000
heap
page read and write
1BE8565D000
heap
page read and write
60A000E01000
trusted library allocation
page read and write
1BE85C6C000
heap
page read and write
1C0003A68000
trusted library allocation
page read and write
60A00032C000
trusted library allocation
page read and write
1C000240C000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
60A0005A8000
trusted library allocation
page read and write
3676000
heap
page read and write
402000
unkown
page readonly
35A91FE000
stack
page read and write
9DC000
heap
page read and write
721800344000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
2131000
heap
page read and write
1C0002E0C000
trusted library allocation
page read and write
3611000
heap
page read and write
35961F4000
stack
page read and write
60A000A6C000
trusted library allocation
page read and write
721800220000
trusted library allocation
page read and write
3332000
heap
page read and write
7DF492761000
unkown
page execute read
2148000
heap
page read and write
9E9000
heap
page read and write
629000220000
trusted library allocation
page read and write
3691000
heap
page read and write
1C00030C4000
trusted library allocation
page read and write
1BE85613000
heap
page read and write
1BE829D6000
heap
page read and write
1ECF2980000
heap
page readonly
3342000
heap
page read and write
1C00039B0000
trusted library allocation
page read and write
451C0030C000
trusted library allocation
page read and write
1BE856F3000
heap
page read and write
3610000
heap
page read and write
1C0002B58000
trusted library allocation
page read and write
1BE85612000
heap
page read and write
1BE85C4B000
heap
page read and write
60A000CE0000
trusted library allocation
page read and write
19306522000
unclassified section
page read and write
1C0002E24000
trusted library allocation
page read and write
684000
heap
page read and write
281830A4000
heap
page read and write
FE1BFFE000
unkown
page readonly
890000
heap
page read and write
1ECF4590000
heap
page read and write
60A000624000
trusted library allocation
page read and write
A24002C0000
direct allocation
page read and write
51D0000
trusted library allocation
page read and write
1C0003A94000
trusted library allocation
page read and write
1C0002550000
trusted library allocation
page read and write
1930542C000
heap
page read and write
2818309E000
heap
page read and write
6C933000
unkown
page read and write
50E000
stack
page read and write
1BE856B8000
heap
page read and write
FE6E1FE000
stack
page read and write
1BE829B1000
heap
page read and write
3342000
heap
page read and write
1BE85C02000
heap
page read and write
1BE85602000
heap
page read and write
6290002A8000
trusted library allocation
page read and write
721800334000
trusted library allocation
page read and write
3342000
heap
page read and write
1C0003718000
trusted library allocation
page read and write
1BE85C64000
heap
page read and write
3C53000
heap
page read and write
1ECF4630000
heap
page read and write
A240028C000
direct allocation
page read and write
1BE85C64000
heap
page read and write
1C000287C000
trusted library allocation
page read and write
1C00029C4000
trusted library allocation
page read and write
1C0003AA4000
trusted library allocation
page read and write
1BE85CCF000
heap
page read and write
1937E51A000
heap
page read and write
1ECF4571000
heap
page read and write
3CB0000
heap
page read and write
3332000
heap
page read and write
3332000
heap
page read and write
1C0002224000
trusted library allocation
page read and write
1C0003B20000
trusted library allocation
page read and write
721800240000
trusted library allocation
page read and write
1C0003401000
trusted library allocation
page read and write
2110000
heap
page read and write
3BA9000
heap
page read and write
3332000
heap
page read and write
A2400318000
direct allocation
page read and write
1C0000C01000
trusted library allocation
page read and write
1BE829D6000
heap
page read and write
2738000
heap
page read and write
1C0002414000
trusted library allocation
page read and write
2796000
heap
page read and write
193072C0000
trusted library section
page read and write
2F0E000
stack
page read and write
9D3000
heap
page read and write
35A59FE000
unkown
page readonly
281830CC000
heap
page read and write
9C000
stack
page read and write
2131000
heap
page read and write
1BE828D0000
heap
page read and write
51D0000
trusted library allocation
page read and write
60A0001F8000
trusted library allocation
page read and write
60A000AD0000
trusted library allocation
page read and write
60A000384000
trusted library allocation
page read and write
FE197FB000
stack
page read and write
890000
heap
page read and write
8A3000
heap
page read and write
35C79FE000
unkown
page readonly
1937E528000
heap
page read and write
1ECF2990000
unkown
page read and write
2145000
heap
page read and write
5160000
trusted library allocation
page read and write
1BE85C85000
heap
page read and write
1BE85C43000
heap
page read and write
20A30A30000
heap
page read and write
1C0002938000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
1BE829D6000
heap
page read and write
3342000
heap
page read and write
8A3000
heap
page read and write
1BE85612000
heap
page read and write
3332000
heap
page read and write
890000
heap
page read and write
1C0002598000
trusted library allocation
page read and write
1BE83390000
heap
page read and write
1C000258C000
trusted library allocation
page read and write
FE7D9FE000
unkown
page readonly
281830B6000
heap
page read and write
5160000
trusted library allocation
page read and write
1937C72C000
heap
page read and write
1BE85CA6000
heap
page read and write
3660000
heap
page read and write
1C0003330000
trusted library allocation
page read and write
2731000
heap
page read and write
35BB9FE000
unkown
page readonly
A2400240000
direct allocation
page read and write
FE721FD000
stack
page read and write
1BE85617000
heap
page read and write
366E000
heap
page read and write
1ECF4570000
heap
page read and write
3332000
heap
page read and write
3BA9000
heap
page read and write
3332000
heap
page read and write
1C0002B70000
trusted library allocation
page read and write
3342000
heap
page read and write
1937C732000
heap
page read and write
5AAF000
stack
page read and write
281878A1000
heap
page read and write
3332000
heap
page read and write
1BE85C85000
heap
page read and write
3332000
heap
page read and write
35BA9FE000
unkown
page readonly
2B50000
unkown
page read and write
8A3000
heap
page read and write
6290002A8000
trusted library allocation
page read and write
1C0003444000
trusted library allocation
page read and write
281830B3000
heap
page read and write
1937C736000
heap
page read and write
3332000
heap
page read and write
3332000
heap
page read and write
38B0000
direct allocation
page read and write
6290002E4000
trusted library allocation
page read and write
281830B6000
heap
page read and write
281830B0000
heap
page read and write
281830A5000
heap
page read and write
FE6C1EF000
stack
page read and write
35B79FE000
unkown
page readonly
281830A5000
heap
page read and write
1C00025E4000
trusted library allocation
page read and write
1C0003864000
trusted library allocation
page read and write
1ECF48E6000
heap
page read and write
9DB000
heap
page read and write
3342000
heap
page read and write
890000
heap
page read and write
60A00047C000
trusted library allocation
page read and write
60A000E8C000
trusted library allocation
page read and write
1C0003890000
trusted library allocation
page read and write
6290002A8000
trusted library allocation
page read and write
1BE85C6C000
heap
page read and write
1BE856CA000
heap
page read and write
400000
unkown
page readonly
459000
system
page execute and read and write
1C000312C000
trusted library allocation
page read and write
7218002E4000
trusted library allocation
page read and write
451C00230000
trusted library allocation
page read and write
1937E51A000
heap
page read and write
3D23000
heap
page read and write
1937C76D000
heap
page read and write
5170000
trusted library allocation
page read and write
60A0002AC000
trusted library allocation
page read and write
1BE85C00000
heap
page read and write
2F51000
unkown
page read and write
3342000
heap
page read and write
1937E551000
heap
page read and write
1BE82770000
heap
page readonly
3332000
heap
page read and write
3660000
heap
page read and write
5180000
trusted library allocation
page read and write
212C000
heap
page read and write
3C53000
heap
page read and write
1BE86010000
heap
page read and write
2631000
heap
page read and write
1C0003750000
trusted library allocation
page read and write
1C0003018000
trusted library allocation
page read and write
1BE85C4B000
heap
page read and write
1C000321C000
trusted library allocation
page read and write
1BE85D04000
heap
page read and write
54D0000
unkown
page read and write
890000
heap
page read and write
2818309E000
heap
page read and write
3342000
heap
page read and write
60A000BAC000
trusted library allocation
page read and write
2A0F000
stack
page read and write
1BE85C4B000
heap
page read and write
51D0000
trusted library allocation
page read and write
1ECF479C000
heap
page read and write
281895E0000
trusted library section
page read and write
1BE85CAE000
heap
page read and write
3342000
heap
page read and write
9C000
stack
page read and write
2148000
heap
page read and write
FE729FE000
unkown
page readonly
1C00026F8000
trusted library allocation
page read and write
35BD1FA000
stack
page read and write
1BE85D19000
heap
page read and write
41B000
system
page execute and read and write
24BF000
stack
page read and write
1ECF45A7000
heap
page read and write
3B31000
heap
page read and write
28A0000
trusted library allocation
page read and write
721800401000
trusted library allocation
page read and write
1BE829DE000
heap
page read and write
FE6D9FE000
unkown
page readonly
1C0002504000
trusted library allocation
page read and write
2FF0000
unclassified section
page execute and read and write
1C0002538000
trusted library allocation
page read and write
60A0009C4000
trusted library allocation
page read and write
3CB0000
heap
page read and write
7DF4927A1000
unkown
page execute read
645000235000
trusted library allocation
page read and write
60A000C3C000
trusted library allocation
page read and write
1BE85CAE000
heap
page read and write
1BE85CC7000
heap
page read and write
60A000741000
trusted library allocation
page read and write
60A000B54000
trusted library allocation
page read and write
1BE8295E000
heap
page read and write
1BE829DE000
heap
page read and write
5E6C000
stack
page read and write
193033F0000
trusted library allocation
page read and write
3657000
heap
page read and write
1930545B000
heap
page read and write
1BE85CC7000
heap
page read and write
6FED5000
unkown
page readonly
1C0002D38000
trusted library allocation
page read and write
629000235000
trusted library allocation
page read and write
366E000
heap
page read and write
6C935000
unkown
page readonly
4C4000
heap
page read and write
FE04FFE000
unkown
page readonly
2738000
heap
page read and write
1C00030C0000
trusted library allocation
page read and write
1BE85D1E000
heap
page read and write
3660000
heap
page read and write
2148000
heap
page read and write
1BE829D6000
heap
page read and write
3342000
heap
page read and write
51D0000
trusted library allocation
page read and write
60A000218000
trusted library allocation
page read and write
1E0000
heap
page read and write
482F000
heap
page read and write
1C0002434000
trusted library allocation
page read and write
1BE85C8D000
heap
page read and write
1BE85CCF000
heap
page read and write
3332000
heap
page read and write
2141000
heap
page read and write
6450002B4000
trusted library allocation
page read and write
1BE85C22000
heap
page read and write
1BE85C8D000
heap
page read and write
60A000D48000
trusted library allocation
page read and write
1BE856DD000
heap
page read and write
51D0000
trusted library allocation
page read and write
28183609000
heap
page read and write
875000
heap
page read and write
1BE856D5000
heap
page read and write
1BE85CC7000
heap
page read and write
44440028C000
direct allocation
page read and write
2BE2000
unkown
page read and write
FE16FFE000
unkown
page readonly
879000
heap
page read and write
281830AB000
heap
page read and write
1C0002C98000
trusted library allocation
page read and write
8A3000
heap
page read and write
3CAF000
heap
page read and write
400000
unkown
page readonly
1C0002974000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
3342000
heap
page read and write
900000
trusted library allocation
page read and write
60A00034C000
trusted library allocation
page read and write
1BE85C6C000
heap
page read and write
FE0C7FD000
stack
page read and write
2736000
heap
page read and write
C7C000
stack
page read and write
55FF000
stack
page read and write
70E000
stack
page read and write
3B31000
heap
page read and write
367A000
heap
page read and write
A2400330000
direct allocation
page read and write
721800430000
trusted library allocation
page read and write
35A89FE000
unkown
page readonly
1C0002BB8000
trusted library allocation
page read and write
1937C732000
heap
page read and write
405000
unkown
page readonly
1BE85CCF000
heap
page read and write
3651000
heap
page read and write
1BE82800000
heap
page read and write
1937E528000
heap
page read and write
1C0002FE0000
trusted library allocation
page read and write
6290002C8000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
FE037FD000
stack
page read and write
60A00042C000
trusted library allocation
page read and write
1BE85DCF000
heap
page read and write
405000
unkown
page readonly
28189AA0000
trusted library section
page read and write
28187270000
trusted library section
page read and write
2149000
heap
page read and write
1BE85CA6000
heap
page read and write
1BE856FF000
heap
page read and write
1C00036F0000
trusted library allocation
page read and write
3332000
heap
page read and write
3CF2000
heap
page read and write
1BE85CCF000
heap
page read and write
1C0002430000
trusted library allocation
page read and write
871000
heap
page read and write
3332000
heap
page read and write
874000
heap
page read and write
7B0000
heap
page read and write
60A000360000
trusted library allocation
page read and write
7218002FC000
trusted library allocation
page read and write
8C0000
heap
page read and write
1BE85C6C000
heap
page read and write
60A0001D8000
trusted library allocation
page read and write
1C0003164000
trusted library allocation
page read and write
60A0001DC000
trusted library allocation
page read and write
60A000BC8000
trusted library allocation
page read and write
1BE85C8D000
heap
page read and write
1C0003848000
trusted library allocation
page read and write
4444002B4000
direct allocation
page read and write
1BE85C23000
heap
page read and write
FE10FFE000
unkown
page readonly
3332000
heap
page read and write
1937C73B000
heap
page read and write
3C0C000
heap
page read and write
1BE829DF000
heap
page read and write
6290002A8000
trusted library allocation
page read and write
3B31000
heap
page read and write
3660000
heap
page read and write
3332000
heap
page read and write
1BE85C8D000
heap
page read and write
1C00026CC000
trusted library allocation
page read and write
3342000
heap
page read and write
870000
heap
page read and write
1937C780000
heap
page read and write
60A00029C000
trusted library allocation
page read and write
3652000
heap
page read and write
366E000
heap
page read and write
3332000
heap
page read and write
281830B6000
heap
page read and write
2818309E000
heap
page read and write
1BE85C2A000
heap
page read and write
3631000
heap
page read and write
60A0001E4000
trusted library allocation
page read and write
9FC000
heap
page read and write
1BE85C43000
heap
page read and write
3C16000
heap
page read and write
1C0002AFC000
trusted library allocation
page read and write
2148000
heap
page read and write
1C0003300000
trusted library allocation
page read and write
35C09FE000
unkown
page readonly
3C53000
heap
page read and write
FE709FE000
unkown
page readonly
869000
heap
page read and write
401000
unkown
page execute read
3660000
heap
page read and write
1BE85CC7000
heap
page read and write
1C0003A34000
trusted library allocation
page read and write
3342000
heap
page read and write
1BE85C4B000
heap
page read and write
366E000
heap
page read and write
1BE829D6000
heap
page read and write
1BE856CE000
heap
page read and write
3660000
heap
page read and write
51D0000
trusted library allocation
page read and write
6290002B8000
trusted library allocation
page read and write
FE117FE000
stack
page read and write
2134000
heap
page read and write
2796000
heap
page read and write
402000
unkown
page readonly
6C0000
heap
page read and write
1BE829E2000
heap
page read and write
216A000
heap
page read and write
1BE85658000
heap
page read and write
2818309E000
heap
page read and write
9E0000
heap
page read and write
1BE829BD000
heap
page read and write
1C0002C7C000
trusted library allocation
page read and write
1937C732000
heap
page read and write
1C0002330000
trusted library allocation
page read and write
A2400234000
direct allocation
page read and write
1C0002504000
trusted library allocation
page read and write
FE7E1FE000
stack
page read and write
4444002FF000
direct allocation
page read and write
9DB000
heap
page read and write
1937C72C000
heap
page read and write
3640000
heap
page read and write
2731000
heap
page read and write
1C0003918000
trusted library allocation
page read and write
684000
heap
page read and write
3639000
heap
page read and write
1BE85D19000
heap
page read and write
60A000888000
trusted library allocation
page read and write
1BE85C3C000
heap
page read and write
3BA9000
heap
page read and write
2A87000
heap
page read and write
1BE85C8D000
heap
page read and write
1BE85613000
heap
page read and write
1C0002B80000
trusted library allocation
page read and write
35A79FE000
unkown
page readonly
3332000
heap
page read and write
451C00290000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
6290002B5000
trusted library allocation
page read and write
19305402000
heap
page read and write
9EC000
heap
page read and write
1BE85C3E000
heap
page read and write
52B0000
trusted library allocation
page read and write
1BE85CC7000
heap
page read and write
1C0003340000
trusted library allocation
page read and write
60A00053C000
trusted library allocation
page read and write
1BE85C8D000
heap
page read and write
1BE85D27000
heap
page read and write
45C000
system
page execute and read and write
1BE85C3C000
heap
page read and write
7218002F8000
trusted library allocation
page read and write
1BE82750000
heap
page read and write
8A3000
heap
page read and write
35B29FE000
unkown
page readonly
2148000
heap
page read and write
7FF000
stack
page read and write
60A000E74000
trusted library allocation
page read and write
1C0002560000
trusted library allocation
page read and write
28B3000
trusted library allocation
page execute and read and write
60A0006A8000
trusted library allocation
page read and write
20A30D00000
heap
page read and write
3660000
heap
page read and write
5170000
trusted library allocation
page read and write
1BE85CAE000
heap
page read and write
2CE0000
heap
page read and write
51D0000
trusted library allocation
page read and write
7218002D4000
trusted library allocation
page read and write
1BE85C4B000
heap
page read and write
1BE8561C000
heap
page read and write
1BE85C43000
heap
page read and write
60A0003A6000
trusted library allocation
page read and write
629000298000
trusted library allocation
page read and write
4C4000
heap
page read and write
1BE85D09000
heap
page read and write
8A3000
heap
page read and write
52B0000
trusted library allocation
page read and write
451C0031C000
trusted library allocation
page read and write
281836B0000
trusted library section
page read and write
1C0002BEC000
trusted library allocation
page read and write
60A000940000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
890000
heap
page read and write
2F4F000
stack
page read and write
1BE85CC7000
heap
page read and write
60A000C7C000
trusted library allocation
page read and write
60A000498000
trusted library allocation
page read and write
3BA9000
heap
page read and write
1C0002918000
trusted library allocation
page read and write
2B90000
trusted library allocation
page read and write
644000
heap
page read and write
1BE829DE000
heap
page read and write
1BE856DD000
heap
page read and write
51D0000
trusted library allocation
page read and write
FE771FB000
stack
page read and write
5870000
heap
page read and write
2CD0000
unkown
page read and write
35C41FD000
stack
page read and write
60A0001E0000
trusted library allocation
page read and write
60A000264000
trusted library allocation
page read and write
1C0003870000
trusted library allocation
page read and write
19303100000
trusted library section
page read and write
2737000
heap
page read and write
5160000
trusted library allocation
page read and write
3332000
heap
page read and write
1C0002C01000
trusted library allocation
page read and write
1C0003984000
trusted library allocation
page read and write
FE18FFE000
unkown
page readonly
1BE829DE000
heap
page read and write
60A0002D8000
trusted library allocation
page read and write
54E0000
unkown
page read and write
35B01FC000
stack
page read and write
1ECF4607000
heap
page read and write
A2400364000
direct allocation
page read and write
281830B0000
heap
page read and write
1C0003A74000
trusted library allocation
page read and write
1BE85D90000
heap
page read and write
2DC0000
heap
page read and write
A240031F000
direct allocation
page read and write
83D000
stack
page read and write
60A000A9C000
trusted library allocation
page read and write
343E000
stack
page read and write
28183677000
heap
page read and write
51D0000
trusted library allocation
page read and write
1BE85618000
heap
page read and write
872000
heap
page read and write
3676000
heap
page read and write
1BE85CCF000
heap
page read and write
451C002F4000
trusted library allocation
page read and write
2755000
heap
page read and write
213C000
heap
page read and write
3638000
heap
page read and write
1BE85C64000
heap
page read and write
2EC0000
heap
page read and write
5B00000
heap
page read and write
6450002B8000
trusted library allocation
page read and write
1BE82900000
heap
page read and write
28189B40000
trusted library section
page read and write
1C00029C4000
trusted library allocation
page read and write
1C0003AD4000
trusted library allocation
page read and write
1ECF286A000
heap
page read and write
3332000
heap
page read and write
FE01FFE000
unkown
page readonly
51D0000
trusted library allocation
page read and write
3BA8000
heap
page read and write
9FB000
heap
page read and write
60A000AC4000
trusted library allocation
page read and write
2CA0000
unkown
page read and write
2148000
heap
page read and write
3660000
heap
page read and write
504E000
stack
page read and write
2CF0000
unkown
page read and write
51D0000
trusted library allocation
page read and write
FE11FFE000
unkown
page readonly
1BE829DE000
heap
page read and write
36C2000
heap
page read and write
26E0000
heap
page read and write
5160000
trusted library allocation
page read and write
281830B6000
heap
page read and write
1ECF4750000
heap
page read and write
2B9C000
trusted library allocation
page execute and read and write
1BE85CA6000
heap
page read and write
A24002EC000
direct allocation
page read and write
1BE8565D000
heap
page read and write
3B31000
heap
page read and write
60A0007B8000
trusted library allocation
page read and write
610000
heap
page read and write
3BA9000
heap
page read and write
58A000
heap
page read and write
3643000
heap
page read and write
1C0002A91000
trusted library allocation
page read and write
1C0002444000
trusted library allocation
page read and write
FE077FA000
stack
page read and write
1C0000801000
trusted library allocation
page read and write
3660000
heap
page read and write
9C000
stack
page read and write
281830A2000
heap
page read and write
60A000BF0000
trusted library allocation
page read and write
60A00032C000
trusted library allocation
page read and write
3676000
heap
page read and write
3660000
heap
page read and write
55BE000
stack
page read and write
3332000
heap
page read and write
1BE85C6C000
heap
page read and write
51D0000
trusted library allocation
page read and write
1C0002B80000
trusted library allocation
page read and write
60A000310000
trusted library allocation
page read and write
1C0002380000
trusted library allocation
page read and write
A2400290000
direct allocation
page read and write
869000
heap
page read and write
1C0002918000
trusted library allocation
page read and write
451C00334000
trusted library allocation
page read and write
3657000
heap
page read and write
1C0003A01000
trusted library allocation
page read and write
3629000
heap
page read and write
629000254000
trusted library allocation
page read and write
684000
heap
page read and write
2141000
heap
page read and write
28183098000
heap
page read and write
1ECF4590000
heap
page read and write
1937C732000
heap
page read and write
366E000
heap
page read and write
217E000
stack
page read and write
3342000
heap
page read and write
8ED000
heap
page read and write
1BE829D6000
heap
page read and write
86D000
heap
page read and write
3332000
heap
page read and write
2CB337E000
stack
page read and write
3BA8000
heap
page read and write
874000
heap
page read and write
29A0000
heap
page read and write
1BE85CC7000
heap
page read and write
3342000
heap
page read and write
2749000
heap
page read and write
890000
heap
page read and write
3629000
heap
page read and write
2796000
heap
page read and write
366E000
heap
page read and write
36A3000
heap
page read and write
7DF4927A0000
unkown
page read and write
C3B000
stack
page read and write
281830A2000
heap
page read and write
35BA1FC000
stack
page read and write
51D0000
trusted library allocation
page read and write
60A000C70000
trusted library allocation
page read and write
8A3000
heap
page read and write
1BE85C64000
heap
page read and write
281830AB000
heap
page read and write
2590000
direct allocation
page execute and read and write
33A0000
heap
page read and write
1BE856D8000
heap
page read and write
1C0003AE0000
trusted library allocation
page read and write
281835FE000
heap
page read and write
9DB000
heap
page read and write
60A000214000
trusted library allocation
page read and write
3332000
heap
page read and write
193030B0000
trusted library section
page read and write
1ECF4590000
heap
page read and write
1C000244C000
trusted library allocation
page read and write
60A0001C8000
trusted library allocation
page read and write
3332000
heap
page read and write
1C0002401000
trusted library allocation
page read and write
41C0000
unclassified section
page execute and read and write
19304F44000
trusted library allocation
page read and write
35B89FE000
unkown
page readonly
1BE829DE000
heap
page read and write
1937C665000
heap
page read and write
273E000
heap
page read and write
28187AA0000
unkown
page readonly
60A00060C000
trusted library allocation
page read and write
9B7000
heap
page read and write
1BE85CAE000
heap
page read and write
366E000
heap
page read and write
1937C733000
heap
page read and write
8AD000
heap
page read and write
64500020D000
trusted library allocation
page read and write
AF6000
heap
page read and write
1C0002500000
trusted library allocation
page read and write
1C0002B08000
trusted library allocation
page read and write
451C00404000
trusted library allocation
page read and write
1ECF4608000
heap
page read and write
3332000
heap
page read and write
213C000
heap
page read and write
216A000
heap
page read and write
FE761FB000
stack
page read and write
3C16000
heap
page read and write
1C00038E0000
trusted library allocation
page read and write
281830B3000
heap
page read and write
1C0002230000
trusted library allocation
page read and write
28189CBE000
trusted library section
page read and write
3660000
heap
page read and write
3641000
heap
page read and write
60A000768000
trusted library allocation
page read and write
5C00000
heap
page read and write
28B4000
trusted library allocation
page read and write
3332000
heap
page read and write
1BE85CC7000
heap
page read and write
60A000401000
trusted library allocation
page read and write
2134000
heap
page read and write
3660000
heap
page read and write
3342000
heap
page read and write
365B000
heap
page read and write
3B31000
heap
page read and write
1BE85CCF000
heap
page read and write
FE15FFE000
unkown
page readonly
1BE85D43000
heap
page read and write
1C00022E8000
trusted library allocation
page read and write
3B31000
heap
page read and write
1C0002B44000
trusted library allocation
page read and write
629000230000
trusted library allocation
page read and write
1C00023E8000
trusted library allocation
page read and write
405000
unkown
page readonly
60A000C4C000
trusted library allocation
page read and write
1BE856D9000
heap
page read and write
3688000
heap
page read and write
35AF1FD000
stack
page read and write
3332000
heap
page read and write
1937C743000
heap
page read and write
35BE1FE000
stack
page read and write
60A000DB8000
trusted library allocation
page read and write
1BE85603000
heap
page read and write
3342000
heap
page read and write
1BE85D02000
heap
page read and write
400000
unkown
page readonly
3655000
heap
page read and write
1937C72C000
heap
page read and write
1BE85C43000
heap
page read and write
3332000
heap
page read and write
1C00030E4000
trusted library allocation
page read and write
60A000DC8000
trusted library allocation
page read and write
6450002A8000
trusted library allocation
page read and write
1BE85C43000
heap
page read and write
1C0002530000
trusted library allocation
page read and write
36BE000
heap
page read and write
1BE85702000
heap
page read and write
191000
direct allocation
page read and write
60A000318000
trusted library allocation
page read and write
3E23000
heap
page read and write
60A000370000
trusted library allocation
page read and write
1C000225C000
trusted library allocation
page read and write
1BE85D85000
heap
page read and write
365E000
heap
page read and write
1C0003968000
trusted library allocation
page read and write
51D1000
trusted library allocation
page read and write
1BE85C43000
heap
page read and write
1BE827A0000
heap
page read and write
2131000
heap
page read and write
25D1000
heap
page read and write
1BE85C6C000
heap
page read and write
1C0002674000
trusted library allocation
page read and write
36EA000
heap
page read and write
3BA9000
heap
page read and write
359B9FE000
unkown
page readonly
1937C72C000
heap
page read and write
1937C820000
heap
page read and write
2CB30FC000
stack
page read and write
2968000
trusted library allocation
page read and write
1C0003324000
trusted library allocation
page read and write
1BE85C4B000
heap
page read and write
5550000
unkown
page read and write
5160000
trusted library allocation
page read and write
3656000
heap
page read and write
1BE82962000
heap
page read and write
1C0003B38000
trusted library allocation
page read and write
1C00024B4000
trusted library allocation
page read and write
281830B6000
heap
page read and write
3332000
heap
page read and write
1937C72C000
heap
page read and write
60A000A58000
trusted library allocation
page read and write
AC0000
heap
page read and write
28187861000
unkown
page readonly
1BE85CCF000
heap
page read and write
5430000
unkown
page read and write
3657000
heap
page read and write
60A0005D8000
trusted library allocation
page read and write
1BE85624000
heap
page read and write
268C000
stack
page read and write
3B30000
heap
page read and write
1BE85C43000
heap
page read and write
FE07FFE000
unkown
page readonly
44440027C000
direct allocation
page read and write
60A000E18000
trusted library allocation
page read and write
281FC520000
heap
page read and write
1BE85C43000
heap
page read and write
1C0002424000
trusted library allocation
page read and write
3616000
heap
page read and write
1BE85C02000
heap
page read and write
3660000
heap
page read and write
3657000
heap
page read and write
36BA000
heap
page read and write
1C00038F8000
trusted library allocation
page read and write
3332000
heap
page read and write
212C000
heap
page read and write
6290002B4000
trusted library allocation
page read and write
1ECF4590000
heap
page read and write
FE7B1FE000
stack
page read and write
5160000
trusted library allocation
page read and write
1BE85CA6000
heap
page read and write
451C00358000
trusted library allocation
page read and write
1937C72C000
heap
page read and write
60A000D54000
trusted library allocation
page read and write
3332000
heap
page read and write
600000
heap
page read and write
51E0000
heap
page execute and read and write
5160000
trusted library allocation
page read and write
281830A2000
heap
page read and write
3332000
heap
page read and write
1937C77D000
heap
page read and write
3342000
heap
page read and write
1BE829DE000
heap
page read and write
2A40000
trusted library allocation
page execute and read and write
1BE85C85000
heap
page read and write
1BE85C4B000
heap
page read and write
1937C74B000
heap
page read and write
1BE85C6C000
heap
page read and write
645000220000
trusted library allocation
page read and write
3332000
heap
page read and write
1BE85C43000
heap
page read and write
3660000
heap
page read and write
2AD0000
heap
page read and write
7DF492760000
unkown
page read and write
62900027C000
trusted library allocation
page read and write
1C0002CDC000
trusted library allocation
page read and write
3342000
heap
page read and write
5170000
trusted library allocation
page read and write
3342000
heap
page read and write
8A3000
heap
page read and write
3660000
heap
page read and write
1C0002C54000
trusted library allocation
page read and write
1937E52D000
heap
page read and write
721800408000
trusted library allocation
page read and write
890000
heap
page read and write
35C11FC000
stack
page read and write
2BA0000
trusted library allocation
page read and write
2B84000
heap
page read and write
2738000
heap
page read and write
2737000
heap
page read and write
35C71FD000
stack
page read and write
629000238000
trusted library allocation
page read and write
1937C62B000
heap
page read and write
28EB000
trusted library allocation
page execute and read and write
1BE85C85000
heap
page read and write
1ECF2990000
trusted library allocation
page read and write
1C00025AC000
trusted library allocation
page read and write
60A000C8C000
trusted library allocation
page read and write
2796000
heap
page read and write
629000298000
trusted library allocation
page read and write
193053F0000
unkown
page readonly
1BE85C64000
heap
page read and write
1937C72C000
heap
page read and write
1ECF476A000
heap
page read and write
3000000
heap
page read and write
3B31000
heap
page read and write
1ECF2820000
heap
page read and write
1BE85C64000
heap
page read and write
1BE829D6000
heap
page read and write
2768000
heap
page read and write
3C16000
heap
page read and write
281FC528000
heap
page read and write
5160000
trusted library allocation
page read and write
1BE83550000
heap
page read and write
1BE85629000
heap
page read and write
1BE85602000
heap
page read and write
60A00059E000
trusted library allocation
page read and write
170000
heap
page read and write
2C97000
heap
page read and write
1BE85CAE000
heap
page read and write
629000258000
trusted library allocation
page read and write
60A000904000
trusted library allocation
page read and write
1BE85C85000
heap
page read and write
1C0000601000
trusted library allocation
page read and write
3342000
heap
page read and write
1C0001001000
trusted library allocation
page read and write
1BE85C2B000
heap
page read and write
3ECC000
heap
page read and write
28183663000
heap
page read and write
36A3000
heap
page read and write
1BE829D6000
heap
page read and write
5170000
trusted library allocation
page read and write
1BE85C6C000
heap
page read and write
1BE829D6000
heap
page read and write
1BE829DE000
heap
page read and write
5430000
unkown
page read and write
1C0003818000
trusted library allocation
page read and write
FE779FE000
unkown
page readonly
1BE829DE000
heap
page read and write
444400230000
direct allocation
page read and write
281830CE000
heap
page read and write
3332000
heap
page read and write
1937C737000
heap
page read and write
1BE85612000
heap
page read and write
FE739FE000
unkown
page readonly
A2400328000
direct allocation
page read and write
5160000
trusted library allocation
page read and write
879000
heap
page read and write
347E000
stack
page read and write
212F000
heap
page read and write
3648000
heap
page read and write
FE03FFE000
unkown
page readonly
60A000E34000
trusted library allocation
page read and write
60A00084C000
trusted library allocation
page read and write
A24002E4000
direct allocation
page read and write
55A8000
unkown
page read and write
1BE829DE000
heap
page read and write
FE759FE000
unkown
page readonly
1C0002908000
trusted library allocation
page read and write
405000
unkown
page readonly
10001000
direct allocation
page execute and read and write
60A000DD4000
trusted library allocation
page read and write
1C00022AE000
trusted library allocation
page read and write
19305A63000
unkown
page readonly
3332000
heap
page read and write
28183645000
heap
page read and write
629000248000
trusted library allocation
page read and write
1937C72C000
heap
page read and write
1BE829D6000
heap
page read and write
7218002ED000
trusted library allocation
page read and write
2145000
heap
page read and write
3658000
heap
page read and write
2E3D000
stack
page read and write
60A000C94000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
721800230000
trusted library allocation
page read and write
1BE85CAE000
heap
page read and write
6FE41000
unkown
page execute read
1BE8564D000
heap
page read and write
35A21FA000
stack
page read and write
1BE829DE000
heap
page read and write
51D0000
trusted library allocation
page read and write
1C0002F9C000
trusted library allocation
page read and write
3660000
heap
page read and write
7DF492766000
unkown
page read and write
A2400212000
direct allocation
page read and write
1BE856CE000
heap
page read and write
60A000E98000
trusted library allocation
page read and write
2A6D000
heap
page read and write
19305A47000
unkown
page readonly
1C0002304000
trusted library allocation
page read and write
366E000
heap
page read and write
5160000
trusted library allocation
page read and write
2818309E000
heap
page read and write
2796000
heap
page read and write
6FEBD000
unkown
page read and write
190000
trusted library section
page read and write
28183655000
heap
page read and write
1BE85D80000
heap
page read and write
1C000300C000
trusted library allocation
page read and write
400000
unkown
page readonly
359E9FE000
unkown
page readonly
1C00038B0000
trusted library allocation
page read and write
3342000
heap
page read and write
1C0003354000
trusted library allocation
page read and write
19305B12000
unclassified section
page read and write
451C0020C000
trusted library allocation
page read and write
1C000280C000
trusted library allocation
page read and write
1BE829DE000
heap
page read and write
91F000
stack
page read and write
3BA8000
heap
page read and write
6CF000
stack
page read and write
87F000
heap
page read and write
1C000220C000
trusted library allocation
page read and write
1BE82730000
heap
page read and write
60A000681000
trusted library allocation
page read and write
6290002B4000
trusted library allocation
page read and write
3655000
heap
page read and write
19303539000
unclassified section
page read and write
1BE85C43000
heap
page read and write
1BE85C8D000
heap
page read and write
1C000397C000
trusted library allocation
page read and write
1BE829DE000
heap
page read and write
7DF492770000
unkown
page read and write
1ECF4607000
heap
page read and write
60A000C50000
trusted library allocation
page read and write
62900028C000
trusted library allocation
page read and write
2773000
heap
page read and write
1BE856E4000
heap
page read and write
3BD5000
trusted library allocation
page read and write
1BE829D6000
heap
page read and write
6290002B4000
trusted library allocation
page read and write
60A0008B8000
trusted library allocation
page read and write
52B0000
trusted library allocation
page read and write
1937C732000
heap
page read and write
FE097FB000
stack
page read and write
1BE85C6C000
heap
page read and write
1C0002BA8000
trusted library allocation
page read and write
36A3000
heap
page read and write
1C0002938000
trusted library allocation
page read and write
1BE85C64000
heap
page read and write
359F9FE000
unkown
page readonly
3CAF000
heap
page read and write
1C0002504000
trusted library allocation
page read and write
60A0002E8000
trusted library allocation
page read and write
1C00037C0000
trusted library allocation
page read and write
1ECF45C1000
heap
page read and write
213D000
heap
page read and write
1BE85C12000
heap
page read and write
60A0002EC000
trusted library allocation
page read and write
3332000
heap
page read and write
5170000
trusted library allocation
page read and write
281830B6000
heap
page read and write
1BE85C8D000
heap
page read and write
1937C72C000
heap
page read and write
645000258000
trusted library allocation
page read and write
193033F0000
trusted library allocation
page read and write
645000
heap
page read and write
FE741FA000
stack
page read and write
1C0003A0C000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
FE7F9FE000
unkown
page readonly
19305410000
heap
page read and write
60A0002B2000
trusted library allocation
page read and write
3332000
heap
page read and write
1BE85D4B000
heap
page read and write
281830B0000
heap
page read and write
2BF4000
trusted library allocation
page read and write
2741000
heap
page read and write
400000
unkown
page readonly
1BE85CC7000
heap
page read and write
401000
unkown
page execute read
3332000
heap
page read and write
3269000
heap
page read and write
2148000
heap
page read and write
60A000320000
trusted library allocation
page read and write
8E0000
heap
page read and write
3342000
heap
page read and write
3C16000
heap
page read and write
1ECF48E5000
heap
page read and write
28B0000
trusted library allocation
page read and write
645000
heap
page read and write
9B0000
heap
page read and write
451C00401000
trusted library allocation
page read and write
3332000
heap
page read and write
1C00022C0000
trusted library allocation
page read and write
2739000
heap
page read and write
1BE85C3C000
heap
page read and write
277B000
heap
page read and write
402000
unkown
page readonly
3332000
heap
page read and write
FE0EFFE000
unkown
page readonly
1BE82760000
heap
page read and write
3657000
heap
page read and write
3C16000
heap
page read and write
325C000
heap
page read and write
1BE85C64000
heap
page read and write
1BE82864000
heap
page read and write
3342000
heap
page read and write
2149000
heap
page read and write
2148000
heap
page read and write
19305513000
heap
page read and write
2BEB000
trusted library allocation
page read and write
1BE85CAE000
heap
page read and write
1BE85C7C000
heap
page read and write
1C00037E4000
trusted library allocation
page read and write
19305A20000
unkown
page readonly
721800320000
trusted library allocation
page read and write
1BE85C1E000
heap
page read and write
1C00034C4000
trusted library allocation
page read and write
1BE85602000
heap
page read and write
1BE85C6C000
heap
page read and write
3660000
heap
page read and write
1BE85C6C000
heap
page read and write
60A0001D0000
trusted library allocation
page read and write
60A000CC4000
trusted library allocation
page read and write
FE1A7FE000
stack
page read and write
255A000
heap
page read and write
1BE85D24000
heap
page read and write
60A0000F8000
trusted library allocation
page read and write
1ECF4761000
heap
page read and write
60A000528000
trusted library allocation
page read and write
FE177FB000
stack
page read and write
2796000
heap
page read and write
51D0000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
879000
heap
page read and write
1BE85D2B000
heap
page read and write
35A01FE000
stack
page read and write
629000264000
trusted library allocation
page read and write
3B9D000
heap
page read and write
36EB000
heap
page read and write
224F000
stack
page read and write
444400280000
direct allocation
page read and write
2148000
heap
page read and write
1C0002320000
trusted library allocation
page read and write
1C000286C000
trusted library allocation
page read and write
3342000
heap
page read and write
1C0002F10000
trusted library allocation
page read and write
60A000D60000
trusted library allocation
page read and write
1ECF26C0000
unkown
page read and write
1BE85CAE000
heap
page read and write
A240025C000
direct allocation
page read and write
1BE85C64000
heap
page read and write
35C69FE000
unkown
page readonly
19C000
stack
page read and write
281830B3000
heap
page read and write
2143000
heap
page read and write
1C00034C0000
trusted library allocation
page read and write
1BE85C8D000
heap
page read and write
3332000
heap
page read and write
35C89FE000
unkown
page readonly
3BA9000
heap
page read and write
1937C500000
heap
page read and write
2B50000
unkown
page read and write
3480000
heap
page read and write
890000
heap
page read and write
6290002A8000
trusted library allocation
page read and write
60A000878000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
2141000
heap
page read and write
1C0003114000
trusted library allocation
page read and write
1C0000E01000
trusted library allocation
page read and write
60A000054000
trusted library allocation
page read and write
721800350000
trusted library allocation
page read and write
368E000
heap
page read and write
1ECF4578000
heap
page read and write
1BE85CC7000
heap
page read and write
2A80000
heap
page read and write
598000
heap
page read and write
FE0A7FC000
stack
page read and write
2BE9000
trusted library allocation
page read and write
2148000
heap
page read and write
60A0000E8000
trusted library allocation
page read and write
213C000
heap
page read and write
1BE85D8D000
heap
page read and write
644000
heap
page read and write
2737000
heap
page read and write
3380000
heap
page read and write
1C0002BD4000
trusted library allocation
page read and write
1C0002578000
trusted library allocation
page read and write
451C002B8000
trusted library allocation
page read and write
1ECF2940000
heap
page read and write
FE017FE000
stack
page read and write
1930729A000
unclassified section
page read and write
1BE85C8D000
heap
page read and write
51D0000
trusted library allocation
page read and write
1C0002CA4000
trusted library allocation
page read and write
1C0002C3C000
trusted library allocation
page read and write
401000
unkown
page execute read
645000238000
trusted library allocation
page read and write
420000
heap
page read and write
1C0002A8D000
trusted library allocation
page read and write
2139000
heap
page read and write
1C00028BC000
trusted library allocation
page read and write
8A3000
heap
page read and write
51D0000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
1C0002D6C000
trusted library allocation
page read and write
2796000
heap
page read and write
1C0002448000
trusted library allocation
page read and write
3332000
heap
page read and write
6FEBD000
unkown
page read and write
1ECF45B6000
heap
page read and write
3342000
heap
page read and write
5170000
trusted library allocation
page read and write
60A00001C000
trusted library allocation
page read and write
1ECF4590000
heap
page read and write
61000
direct allocation
page execute and read and write
6FE40000
unkown
page readonly
28187A95000
unkown
page readonly
1BE829DE000
heap
page read and write
6290002A8000
trusted library allocation
page read and write
28187855000
unkown
page readonly
1BE85617000
heap
page read and write
2CC0000
unkown
page execute and read and write
1C0002F88000
trusted library allocation
page read and write
FE731FB000
stack
page read and write
1C0003884000
trusted library allocation
page read and write
366E000
heap
page read and write
366E000
heap
page read and write
3332000
heap
page read and write
451C00304000
trusted library allocation
page read and write
1BE829DE000
heap
page read and write
3660000
heap
page read and write
1C00031C0000
trusted library allocation
page read and write
2141000
heap
page read and write
A5F000
unkown
page read and write
1ECF48A1000
heap
page read and write
35C31FE000
stack
page read and write
28189B97000
unclassified section
page read and write
402000
unkown
page readonly
60A000820000
trusted library allocation
page read and write
366E000
heap
page read and write
405000
unkown
page readonly
1C0003904000
trusted library allocation
page read and write
1BE86390000
heap
page read and write
64A000
heap
page read and write
60A0001EC000
trusted library allocation
page read and write
1C0003564000
trusted library allocation
page read and write
8A3000
heap
page read and write
36A3000
heap
page read and write
451C00310000
trusted library allocation
page read and write
3638000
heap
page read and write
1C0002504000
trusted library allocation
page read and write
281830B6000
heap
page read and write
277B000
heap
page read and write
684000
heap
page read and write
3676000
heap
page read and write
1937C702000
heap
page read and write
1BE85C8D000
heap
page read and write
1BE85C3C000
heap
page read and write
1BE829D6000
heap
page read and write
3BA8000
heap
page read and write
1BE85C6B000
heap
page read and write
5AEE000
stack
page read and write
1BE829D6000
heap
page read and write
3629000
heap
page read and write
721800308000
trusted library allocation
page read and write
3342000
heap
page read and write
366E000
heap
page read and write
2A51000
heap
page read and write
1BE85618000
heap
page read and write
2148000
heap
page read and write
2550000
trusted library allocation
page read and write
1BE829E2000
heap
page read and write
402000
unkown
page readonly
2145000
heap
page read and write
1ECF4760000
heap
page read and write
9E0000
heap
page read and write
7BA000
heap
page read and write
3342000
heap
page read and write
35A29FE000
unkown
page readonly
3C16000
heap
page read and write
60A000650000
trusted library allocation
page read and write
3656000
heap
page read and write
28189A0E000
trusted library section
page read and write
19305A31000
unkown
page readonly
2C15000
trusted library allocation
page read and write
1C0002E54000
trusted library allocation
page read and write
6C91D000
unkown
page read and write
1C0003268000
trusted library allocation
page read and write
3676000
heap
page read and write
3332000
heap
page read and write
60A000B24000
trusted library allocation
page read and write
366E000
heap
page read and write
890000
heap
page read and write
3660000
heap
page read and write
1BE82E60000
trusted library allocation
page read and write
1BE85C6C000
heap
page read and write
35A71FA000
stack
page read and write
3332000
heap
page read and write
1BE85C4B000
heap
page read and write
890000
heap
page read and write
1BE829BD000
heap
page read and write
1BE829DC000
heap
page read and write
281835BD000
heap
page read and write
1ECF479C000
heap
page read and write
1BE85602000
heap
page read and write
3654000
heap
page read and write
60A000988000
trusted library allocation
page read and write
1C0003824000
trusted library allocation
page read and write
3342000
heap
page read and write
401000
unkown
page execute read
1BE85C85000
heap
page read and write
1C00027F0000
trusted library allocation
page read and write
A2400318000
direct allocation
page read and write
721800274000
trusted library allocation
page read and write
3342000
heap
page read and write
2631000
heap
page read and write
1BE829DE000
heap
page read and write
339F000
heap
page read and write
721800314000
trusted library allocation
page read and write
1C00030A0000
trusted library allocation
page read and write
19305428000
heap
page read and write
1C0002E48000
trusted library allocation
page read and write
879000
heap
page read and write
281830B3000
heap
page read and write
3342000
heap
page read and write
1BE85617000
heap
page read and write
2BC0000
heap
page read and write
451C00298000
trusted library allocation
page read and write
60A000320000
trusted library allocation
page read and write
3658000
heap
page read and write
3342000
heap
page read and write
1ECF4761000
heap
page read and write
60A000130000
trusted library allocation
page read and write
36BE000
heap
page read and write
402000
unkown
page readonly
366E000
heap
page read and write
444400248000
direct allocation
page read and write
35BF1FD000
stack
page read and write
9E0000
heap
page read and write
3332000
heap
page read and write
E0000
heap
page read and write
8A3000
heap
page read and write
60A00080C000
trusted library allocation
page read and write
890000
heap
page read and write
2148000
heap
page read and write
1C0002E69000
trusted library allocation
page read and write
7DF4927AE000
unkown
page read and write
2768000
heap
page read and write
FE17FFE000
unkown
page readonly
2CB327C000
stack
page read and write
645000248000
trusted library allocation
page read and write
3342000
heap
page read and write
60A00015C000
trusted library allocation
page read and write
20A30D0E000
heap
page read and write
1937E413000
heap
page read and write
51D0000
trusted library allocation
page read and write
3332000
heap
page read and write
1937E340000
trusted library allocation
page read and write
3B31000
heap
page read and write
3660000
heap
page read and write
890000
heap
page read and write
1BE829CE000
heap
page read and write
1937E500000
heap
page read and write
3C53000
heap
page read and write
3660000
heap
page read and write
1BE85613000
heap
page read and write
1ECF2740000
heap
page read and write
281830A2000
heap
page read and write
60A000B8C000
trusted library allocation
page read and write
281835E8000
heap
page read and write
A240031A000
direct allocation
page read and write
2149000
heap
page read and write
5553000
unkown
page read and write
1BE82833000
heap
page read and write
2739000
heap
page read and write
459000
system
page execute and read and write
1ECF45E6000
heap
page read and write
36C2000
heap
page read and write
1ECF2840000
heap
page read and write
9FB000
heap
page read and write
35A51FC000
stack
page read and write
3629000
heap
page read and write
1C00031DC000
trusted library allocation
page read and write
1BE829DE000
heap
page read and write
8A3000
heap
page read and write
8A3000
heap
page read and write
60A000A40000
trusted library allocation
page read and write
64F000
heap
page read and write
FE6F1FE000
stack
page read and write
A2400210000
direct allocation
page read and write
74E000
unkown
page read and write
517B000
trusted library allocation
page read and write
410000
heap
page read and write
FE157FD000
stack
page read and write
1ECF2A80000
heap
page read and write
1C0002B8C000
trusted library allocation
page read and write
1BE82904000
heap
page read and write
216A000
heap
page read and write
451C00310000
trusted library allocation
page read and write
193053E0000
unkown
page readonly
7DF479AC3000
unkown
page read and write
1BE85C64000
heap
page read and write
3342000
heap
page read and write
2730000
heap
page read and write
62900020C000
trusted library allocation
page read and write
1BE85C6C000
heap
page read and write
281822E0000
unkown
page read and write
52B0000
trusted library allocation
page read and write
6450002C8000
trusted library allocation
page read and write
1BE85613000
heap
page read and write
2148000
heap
page read and write
3332000
heap
page read and write
1937C6C6000
heap
page read and write
1BE829DE000
heap
page read and write
1BE829D6000
heap
page read and write
638000
heap
page read and write
1BE85CC7000
heap
page read and write
E60000
heap
page read and write
405000
unkown
page readonly
60A00029E000
trusted library allocation
page read and write
2818363C000
heap
page read and write
2130000
heap
page read and write
366E000
heap
page read and write
26D0000
heap
page read and write
62900028C000
trusted library allocation
page read and write
3342000
heap
page read and write
FE701FE000
stack
page read and write
875000
heap
page read and write
3332000
heap
page read and write
1C000394C000
trusted library allocation
page read and write
1C0002D78000
trusted library allocation
page read and write
1BE829DE000
heap
page read and write
51D0000
trusted library allocation
page read and write
3657000
heap
page read and write
3150000
heap
page read and write
1937C659000
heap
page read and write
281830A2000
heap
page read and write
3660000
heap
page read and write
28183080000
heap
page read and write
1ECF4591000
heap
page read and write
2148000
heap
page read and write
1C00038B4000
trusted library allocation
page read and write
1BE85C85000
heap
page read and write
3C55000
heap
page read and write
5170000
trusted library allocation
page read and write
879000
heap
page read and write
1C0003601000
trusted library allocation
page read and write
3640000
heap
page read and write
366E000
heap
page read and write
1937C732000
heap
page read and write
60A0002EC000
trusted library allocation
page read and write
3693000
heap
page read and write
1BE85D02000
heap
page read and write
35C39FE000
unkown
page readonly
3B31000
heap
page read and write
1BE85CAE000
heap
page read and write
60A000C20000
trusted library allocation
page read and write
1C000336C000
trusted library allocation
page read and write
60A000670000
trusted library allocation
page read and write
1BE8561D000
heap
page read and write
879000
heap
page read and write
3BA8000
heap
page read and write
1BE829DE000
heap
page read and write
3C16000
heap
page read and write
87D000
stack
page read and write
366E000
heap
page read and write
1ECF477D000
heap
page read and write
86C000
heap
page read and write
1C0002F54000
trusted library allocation
page read and write
563C000
stack
page read and write
3490000
direct allocation
page read and write
366E000
heap
page read and write
60A0002DB000
trusted library allocation
page read and write
281830B6000
heap
page read and write
3342000
heap
page read and write
1C0002B82000
trusted library allocation
page read and write
365E000
heap
page read and write
281830AB000
heap
page read and write
5150000
trusted library allocation
page read and write
879000
heap
page read and write
1BE829D6000
heap
page read and write
60A0006FC000
trusted library allocation
page read and write
56BE000
stack
page read and write
1C0002E94000
trusted library allocation
page read and write
60A0001F0000
trusted library allocation
page read and write
3DA9000
heap
page read and write
366E000
heap
page read and write
281830B6000
heap
page read and write
AFE000
heap
page read and write
1C0002EC8000
trusted library allocation
page read and write
1C00034BC000
trusted library allocation
page read and write
3332000
heap
page read and write
3342000
heap
page read and write
3342000
heap
page read and write
5160000
trusted library allocation
page read and write
1BE85D02000
heap
page read and write
86D000
heap
page read and write
3332000
heap
page read and write
405000
unkown
page readonly
1BE85C4B000
heap
page read and write
1BE856DD000
heap
page read and write
2900000
trusted library allocation
page read and write
3BF9000
trusted library allocation
page read and write
890000
heap
page read and write
60A0003A0000
trusted library allocation
page read and write
3332000
heap
page read and write
1C0002224000
trusted library allocation
page read and write
19A000
stack
page read and write
1C0003AB4000
trusted library allocation
page read and write
4F0000
heap
page read and write
1BE85C38000
heap
page read and write
2796000
heap
page read and write
1C00032E4000
trusted library allocation
page read and write
60A000270000
trusted library allocation
page read and write
500000
heap
page read and write
890000
heap
page read and write
1C0002C2C000
trusted library allocation
page read and write
5430000
unkown
page read and write
451C0040C000
trusted library allocation
page read and write
366E000
heap
page read and write
3654000
heap
page read and write
1C0002E84000
trusted library allocation
page read and write
1C0002898000
trusted library allocation
page read and write
60A00074C000
trusted library allocation
page read and write
1BE829DE000
heap
page read and write
1BE85C4B000
heap
page read and write
35C21F9000
stack
page read and write
684000
heap
page read and write
3660000
heap
page read and write
BF64BC000
stack
page read and write
1BE85C6C000
heap
page read and write
28189B0D000
trusted library section
page read and write
281830B0000
heap
page read and write
51D0000
trusted library allocation
page read and write
35C81FE000
stack
page read and write
281830B3000
heap
page read and write
51D0000
trusted library allocation
page read and write
60A00048C000
trusted library allocation
page read and write
9D3000
heap
page read and write
3676000
heap
page read and write
3660000
heap
page read and write
9D3000
heap
page read and write
1937C732000
heap
page read and write
721800424000
trusted library allocation
page read and write
5801000
heap
page read and write
8A3000
heap
page read and write
3660000
heap
page read and write
244F000
stack
page read and write
3332000
heap
page read and write
2156000
heap
page read and write
401000
unkown
page execute read
6450002B4000
trusted library allocation
page read and write
41DB000
unclassified section
page execute and read and write
1937E51A000
heap
page read and write
1937E51A000
heap
page read and write
35989FE000
unkown
page readonly
684000
heap
page read and write
281830AB000
heap
page read and write
3342000
heap
page read and write
2A63000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
60A000924000
trusted library allocation
page read and write
721800404000
trusted library allocation
page read and write
9FB000
heap
page read and write
3688000
heap
page read and write
1BE829D6000
heap
page read and write
2631000
heap
page read and write
459000
system
page execute and read and write
60A0006D8000
trusted library allocation
page read and write
1937C732000
heap
page read and write
35A39FE000
unkown
page readonly
3B31000
heap
page read and write
1C00029C4000
trusted library allocation
page read and write
1C0002418000
trusted library allocation
page read and write
1BE85CCF000
heap
page read and write
1C0002EE0000
trusted library allocation
page read and write
1937C72B000
heap
page read and write
1BE864E0000
heap
page read and write
890000
heap
page read and write
1C0002854000
trusted library allocation
page read and write
1BE85C91000
heap
page read and write
644000
heap
page read and write
9E8000
heap
page read and write
60A000564000
trusted library allocation
page read and write
1ECF4571000
heap
page read and write
60A0006BB000
trusted library allocation
page read and write
1C0003108000
trusted library allocation
page read and write
3342000
heap
page read and write
2741000
heap
page read and write
3BA9000
heap
page read and write
28189070000
unkown
page readonly
1BE85C64000
heap
page read and write
1BE829D6000
heap
page read and write
60A000E32000
trusted library allocation
page read and write
1C0002A01000
trusted library allocation
page read and write
1BE856C1000
heap
page read and write
3342000
heap
page read and write
890000
heap
page read and write
60A000298000
trusted library allocation
page read and write
3648000
heap
page read and write
3BA8000
heap
page read and write
FE0FFFE000
unkown
page readonly
2B50000
unkown
page read and write
1BE8561D000
heap
page read and write
60A000A50000
trusted library allocation
page read and write
2730000
trusted library allocation
page read and write
2739000
heap
page read and write
1ECF45F5000
heap
page read and write
1BE85602000
heap
page read and write
1BE85603000
heap
page read and write
FE14FFE000
unkown
page readonly
3342000
heap
page read and write
5160000
trusted library allocation
page read and write
451C0027C000
trusted library allocation
page read and write
1BE829D6000
heap
page read and write
363C000
heap
page read and write
2141000
heap
page read and write
1C00029C4000
trusted library allocation
page read and write
8A3000
heap
page read and write
2738000
heap
page read and write
2796000
heap
page read and write
1BE85CC7000
heap
page read and write
8A3000
heap
page read and write
A2400201000
direct allocation
page read and write
62900028C000
trusted library allocation
page read and write
281830B6000
heap
page read and write
3660000
heap
page read and write
FE0F7FE000
stack
page read and write
2145000
heap
page read and write
1C00029C4000
trusted library allocation
page read and write
2930000
trusted library allocation
page read and write
7FDF0000
trusted library allocation
page execute and read and write
FE057FD000
stack
page read and write
9E8000
heap
page read and write
2A68000
heap
page read and write
7218002FC000
trusted library allocation
page read and write
879000
heap
page read and write
8AC000
heap
page read and write
51D0000
trusted library allocation
page read and write
1C0002928000
trusted library allocation
page read and write
3342000
heap
page read and write
19303522000
unclassified section
page read and write
3342000
heap
page read and write
3688000
heap
page read and write
2950000
heap
page read and write
869000
heap
page read and write
1C00037B0000
trusted library allocation
page read and write
7218002FC000
trusted library allocation
page read and write
51A0000
trusted library allocation
page read and write
121000
direct allocation
page execute and read and write
1C0003468000
trusted library allocation
page read and write
1BE83000000
heap
page read and write
60A000D9C000
trusted library allocation
page read and write
1BE829E2000
heap
page read and write
3343000
heap
page read and write
FE107FD000
stack
page read and write
1BE856E4000
heap
page read and write
2796000
heap
page read and write
281830AB000
heap
page read and write
2796000
heap
page read and write
3CB0000
heap
page read and write
1C000263C000
trusted library allocation
page read and write
1BE860B0000
heap
page read and write
2131000
heap
page read and write
1BE829DE000
heap
page read and write
3660000
heap
page read and write
1C0002F70000
trusted library allocation
page read and write
629000300000
trusted library allocation
page read and write
281FC61C000
heap
page read and write
51D0000
trusted library allocation
page read and write
1C0002538000
trusted library allocation
page read and write
1BE85613000
heap
page read and write
3B31000
heap
page read and write
1BE85643000
heap
page read and write
1ECF45CF000
heap
page read and write
3638000
heap
page read and write
51D0000
trusted library allocation
page read and write
5170000
trusted library allocation
page read and write
FE6D1FE000
unkown
page read and write
1C00023E4000
trusted library allocation
page read and write
3BA8000
heap
page read and write
3090000
unclassified section
page execute and read and write
FE789FE000
unkown
page readonly
28187A90000
unkown
page readonly
60A0006B4000
trusted library allocation
page read and write
3342000
heap
page read and write
5831000
unkown
page read and write
3342000
heap
page read and write
5090000
trusted library allocation
page execute and read and write
193066A0000
trusted library section
page read and write
1BE85C43000
heap
page read and write
890000
heap
page read and write
2818309E000
heap
page read and write
FE187FE000
stack
page read and write
51D0000
trusted library allocation
page read and write
1BE85D2A000
heap
page read and write
1BE85C85000
heap
page read and write
1BE827E0000
trusted library allocation
page read and write
67C000
stack
page read and write
82F000
stack
page read and write
3342000
heap
page read and write
5160000
trusted library allocation
page read and write
28E7000
trusted library allocation
page execute and read and write
FE781FC000
stack
page read and write
281830B6000
heap
page read and write
1BE8284B000
heap
page read and write
576E000
stack
page read and write
1C0003AFC000
trusted library allocation
page read and write
3342000
heap
page read and write
3655000
heap
page read and write
3C16000
heap
page read and write
1C00038EC000
trusted library allocation
page read and write
1BE85D6C000
heap
page read and write
5160000
trusted library allocation
page read and write
2CB2BEC000
stack
page read and write
4C4000
heap
page read and write
1C00028F8000
trusted library allocation
page read and write
3BA9000
heap
page read and write
51D0000
trusted library allocation
page read and write
3643000
heap
page read and write
60A00069C000
trusted library allocation
page read and write
281830B3000
heap
page read and write
1C0002B98000
trusted library allocation
page read and write
60A00066A000
trusted library allocation
page read and write
237F000
stack
page read and write
1C0003314000
trusted library allocation
page read and write
28187260000
unkown
page readonly
29BF000
heap
page read and write
20A30B10000
heap
page read and write
6290002A8000
trusted library allocation
page read and write
19300BF3000
unkown
page read and write
3332000
heap
page read and write
1C000399C000
trusted library allocation
page read and write
1ECF459A000
heap
page read and write
60A0002F8000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
1ECF29A0000
direct allocation
page execute and read and write
2148000
heap
page read and write
2796000
heap
page read and write
557F000
stack
page read and write
1C0002E91000
trusted library allocation
page read and write
1BE829D6000
heap
page read and write
BF687D000
stack
page read and write
1BE85D03000
heap
page read and write
2960000
heap
page read and write
A24002CC000
direct allocation
page read and write
1BE85602000
heap
page read and write
1C000276C000
trusted library allocation
page read and write
1BE8563A000
heap
page read and write
6450002B8000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
3342000
heap
page read and write
1BE85C85000
heap
page read and write
4444002DC000
direct allocation
page read and write
1C0002268000
trusted library allocation
page read and write
FE7B9FE000
unkown
page readonly
5C0000
heap
page read and write
1BE85613000
heap
page read and write
3B31000
heap
page read and write
3B31000
heap
page read and write
1937C732000
heap
page read and write
7DF4927B0000
unkown
page read and write
5BE000
stack
page read and write
1BE85C3C000
heap
page read and write
51D0000
trusted library allocation
page read and write
60A0009DC000
trusted library allocation
page read and write
1BE85CC7000
heap
page read and write
19D000
stack
page read and write
7DE000
stack
page read and write
1C00023E0000
trusted library allocation
page read and write
3C53000
heap
page read and write
1C0003B0C000
trusted library allocation
page read and write
35AA9FE000
unkown
page readonly
19303360000
trusted library section
page read and write
1ECF4607000
heap
page read and write
890000
heap
page read and write
1937C75A000
heap
page read and write
52B0000
trusted library allocation
page read and write
3332000
heap
page read and write
6FED5000
unkown
page readonly
1BE85C4B000
heap
page read and write
8A3000
heap
page read and write
645000264000
trusted library allocation
page read and write
3C17000
heap
page read and write
19305A72000
unclassified section
page read and write
3655000
heap
page read and write
35AA1FD000
stack
page read and write
1BE829D6000
heap
page read and write
1ECF26C1000
unkown
page execute read
60A000E78000
trusted library allocation
page read and write
60A000BCC000
trusted library allocation
page read and write
1BE85600000
heap
page read and write
5C2E000
stack
page read and write
1BE85CC7000
heap
page read and write
620000
heap
page read and write
10016000
direct allocation
page execute and read and write
281830AB000
heap
page read and write
2557000
heap
page read and write
365B000
heap
page read and write
451C00300000
trusted library allocation
page read and write
1C000285C000
trusted library allocation
page read and write
FE0B7FC000
stack
page read and write
1ECF45CF000
heap
page read and write
5160000
trusted library allocation
page read and write
60A0001AC000
trusted library allocation
page read and write
400000
unkown
page readonly
361B000
heap
page read and write
1BE85623000
heap
page read and write
2738000
heap
page read and write
1BE85CA6000
heap
page read and write
60A000001000
trusted library allocation
page read and write
1937C732000
heap
page read and write
3676000
heap
page read and write
3C53000
heap
page read and write
3342000
heap
page read and write
1BE85C4B000
heap
page read and write
3332000
heap
page read and write
1ECF479C000
heap
page read and write
60A000A88000
trusted library allocation
page read and write
60A000C01000
trusted library allocation
page read and write
401000
unkown
page execute read
60A000680000
trusted library allocation
page read and write
28CC000
stack
page read and write
401000
unkown
page execute read
35B49FE000
unkown
page readonly
1BE829DE000
heap
page read and write
281830B3000
heap
page read and write
5160000
trusted library allocation
page read and write
1C00027B0000
trusted library allocation
page read and write
1BE8561A000
heap
page read and write
1C0002370000
trusted library allocation
page read and write
1C0002CC8000
trusted library allocation
page read and write
1BE827C0000
trusted library allocation
page read and write
2131000
heap
page read and write
9C000
stack
page read and write
1BE85D29000
heap
page read and write
60A00029C000
trusted library allocation
page read and write
29C1000
heap
page read and write
2796000
heap
page read and write
721800328000
trusted library allocation
page read and write
A2400325000
direct allocation
page read and write
281830B0000
heap
page read and write
60A0001F4000
trusted library allocation
page read and write
1937C732000
heap
page read and write
1BE829DE000
heap
page read and write
361A000
heap
page read and write
2AD8000
heap
page read and write
1ECF286A000
heap
page read and write
60A00020C000
trusted library allocation
page read and write
281830B0000
heap
page read and write
2141000
heap
page read and write
60000
direct allocation
page read and write
2145000
heap
page read and write
2796000
heap
page read and write
890000
heap
page read and write
1ECF48A5000
heap
page read and write
3013000
heap
page read and write
3660000
heap
page read and write
1BE85D8D000
heap
page read and write
28189A63000
trusted library section
page read and write
5900000
heap
page read and write
1ECF45C1000
heap
page read and write
1BE829C3000
heap
page read and write
1C0002D04000
trusted library allocation
page read and write
1937E51A000
heap
page read and write
28BD000
trusted library allocation
page execute and read and write
72180040C000
trusted library allocation
page read and write
1C00034AC000
trusted library allocation
page read and write
3342000
heap
page read and write
1BE85D25000
heap
page read and write
2737000
heap
page read and write
1BE85645000
heap
page read and write
60A000D70000
trusted library allocation
page read and write
3342000
heap
page read and write
30CF000
stack
page read and write
281835E0000
heap
page read and write
1ECF479C000
heap
page read and write
1C00022A3000
trusted library allocation
page read and write
35AB9FE000
unkown
page readonly
193033F0000
trusted library allocation
page read and write
28183710000
trusted library section
page read and write
9EB000
heap
page read and write
1BE85C64000
heap
page read and write
1BE8565C000
heap
page read and write
281830B6000
heap
page read and write
5710000
heap
page read and write
3342000
heap
page read and write
60A0009D0000
trusted library allocation
page read and write
1C0003A48000
trusted library allocation
page read and write
FE7F1FE000
stack
page read and write
5620000
unkown
page read and write
3BF9000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
882000
heap
page read and write
8A3000
heap
page read and write
60A000E24000
trusted library allocation
page read and write
29C0000
heap
page read and write
1BE85D43000
heap
page read and write
1BE85CCF000
heap
page read and write
2EA6000
unkown
page read and write
1ECF48A6000
heap
page read and write
1C0002974000
trusted library allocation
page read and write
44440026C000
direct allocation
page read and write
60A000070000
trusted library allocation
page read and write
5170000
trusted library allocation
page read and write
401000
unkown
page execute read
890000
heap
page read and write
1BE85C4E000
heap
page read and write
3660000
heap
page read and write
FE00FFE000
unkown
page readonly
FE007FE000
stack
page read and write
5580000
unkown
page read and write
1C00023AC000
trusted library allocation
page read and write
60A000640000
trusted library allocation
page read and write
1C0002918000
trusted library allocation
page read and write
36EA000
heap
page read and write
51D0000
trusted library allocation
page read and write
35BD9FE000
unkown
page readonly
281830B6000
heap
page read and write
1C0002500000
trusted library allocation
page read and write
721800238000
trusted library allocation
page read and write
1BE85CCF000
heap
page read and write
60A000E50000
trusted library allocation
page read and write
879000
heap
page read and write
9E0000
heap
page read and write
365B000
heap
page read and write
359B1FE000
stack
page read and write
1BE85C64000
heap
page read and write
60A00069D000
trusted library allocation
page read and write
1BE85C6C000
heap
page read and write
2738000
heap
page read and write
1ECF2A86000
heap
page read and write
281FC815000
heap
page read and write
1BE856E4000
heap
page read and write
366E000
heap
page read and write
1BE85C6C000
heap
page read and write
2131000
heap
page read and write
2141000
heap
page read and write
1BE85617000
heap
page read and write
281835FE000
heap
page read and write
1BE85602000
heap
page read and write
1BE829DE000
heap
page read and write
FE0CFFE000
unkown
page readonly
81F000
stack
page read and write
60A000BCC000
trusted library allocation
page read and write
281830A2000
heap
page read and write
3342000
heap
page read and write
444400215000
direct allocation
page read and write
364C000
heap
page read and write
400000
unkown
page readonly
60A000B18000
trusted library allocation
page read and write
1BE829D6000
heap
page read and write
51D0000
trusted library allocation
page read and write
470000
heap
page read and write
3BF9000
trusted library allocation
page read and write
60A0001E8000
trusted library allocation
page read and write
5C0000
heap
page read and write
1C0002FA8000
trusted library allocation
page read and write
400000
unkown
page readonly
1BE85C4C000
heap
page read and write
1BE85C85000
heap
page read and write
1BE85C4B000
heap
page read and write
1BE856D7000
heap
page read and write
5170000
trusted library allocation
page read and write
7DF4927B6000
unkown
page read and write
1C0003380000
trusted library allocation
page read and write
2138000
heap
page read and write
2A50000
heap
page execute and read and write
3CF3000
heap
page read and write
281830BB000
heap
page read and write
1BE856D8000
heap
page read and write
1BE85CCF000
heap
page read and write
1937C643000
heap
page read and write
60A0008EC000
trusted library allocation
page read and write
60A0009BC000
trusted library allocation
page read and write
1BE85624000
heap
page read and write
1C00033EC000
trusted library allocation
page read and write
3342000
heap
page read and write
359D9FE000
unkown
page readonly
1BE83010000
heap
page read and write
1C0003564000
trusted library allocation
page read and write
64500026C000
trusted library allocation
page read and write
1C0000201000
trusted library allocation
page read and write
35A11FB000
stack
page read and write
3CB0000
heap
page read and write
19300BD0000
unkown
page read and write
3332000
heap
page read and write
28189EB7000
unclassified section
page read and write
51D0000
trusted library allocation
page read and write
1BE856DD000
heap
page read and write
1C00036F0000
trusted library allocation
page read and write
875000
heap
page read and write
1BE8561C000
heap
page read and write
1ECF45F5000
heap
page read and write
19305A10000
unkown
page readonly
3342000
heap
page read and write
1BE829DE000
heap
page read and write
1C00027A0000
trusted library allocation
page read and write
1937C729000
heap
page read and write
1BE8561C000
heap
page read and write
3BA9000
heap
page read and write
1C00026DC000
trusted library allocation
page read and write
A2400270000
direct allocation
page read and write
28189047000
unclassified section
page read and write
2A3E000
stack
page read and write
8A3000
heap
page read and write
430000
heap
page read and write
2741000
heap
page read and write
2CB2BDE000
stack
page read and write
3B31000
heap
page read and write
1BE85612000
heap
page read and write
D5000
direct allocation
page read and write
281830AB000
heap
page read and write
213C000
heap
page read and write
890000
heap
page read and write
1BE85CCF000
heap
page read and write
281830A4000
heap
page read and write
17C000
stack
page read and write
1BE85612000
heap
page read and write
869000
heap
page read and write
2B7E000
heap
page read and write
51D0000
trusted library allocation
page read and write
28189063000
heap
page read and write
872000
heap
page read and write
629000201000
trusted library allocation
page read and write
63C000
stack
page read and write
281830A2000
heap
page read and write
405000
unkown
page readonly
1ECF29A0000
direct allocation
page execute and read and write
1BE85D02000
heap
page read and write
2741000
heap
page read and write
1BE829DE000
heap
page read and write
830000
heap
page read and write
449000
system
page execute and read and write
1BE8282F000
heap
page read and write
30EC000
unclassified section
page execute and read and write
684000
heap
page read and write
2777000
heap
page read and write
281830A4000
heap
page read and write
FE711FE000
stack
page read and write
879000
heap
page read and write
3BA9000
heap
page read and write
1C0003834000
trusted library allocation
page read and write
1BE85C6C000
heap
page read and write
480000
heap
page read and write
8AB000
heap
page read and write
1BE85CC7000
heap
page read and write
51D0000
trusted library allocation
page read and write
72180035C000
trusted library allocation
page read and write
78C000
heap
page read and write
58E000
stack
page read and write
1937C800000
heap
page readonly
1ECF45CD000
heap
page read and write
1BE85C02000
heap
page read and write
1BE85C64000
heap
page read and write
60A0001B0000
trusted library allocation
page read and write
2796000
heap
page read and write
1ECF286A000
heap
page read and write
365B000
heap
page read and write
60E000
stack
page read and write
281830B0000
heap
page read and write
1BE829D6000
heap
page read and write
3C16000
heap
page read and write
1BE829D6000
heap
page read and write
400000
unkown
page readonly
2C73000
unkown
page read and write
1C0002CBF000
trusted library allocation
page read and write
8A3000
heap
page read and write
281830A4000
heap
page read and write
59E000
stack
page read and write
750000
heap
page read and write
1BE85602000
heap
page read and write
52D0000
trusted library allocation
page read and write
451C00308000
trusted library allocation
page read and write
52B0000
trusted library allocation
page read and write
2145000
heap
page read and write
62900026C000
trusted library allocation
page read and write
3F3A000
heap
page read and write
3648000
heap
page read and write
2141000
heap
page read and write
60A00044C000
trusted library allocation
page read and write
1BE85C6B000
heap
page read and write
1C000383C000
trusted library allocation
page read and write
281830B0000
heap
page read and write
2630000
heap
page read and write
1BE85CA6000
heap
page read and write
366E000
heap
page read and write
35AE9FE000
unkown
page readonly
1BE85C43000
heap
page read and write
1BE85CCF000
heap
page read and write
1C00022F4000
trusted library allocation
page read and write
1BE85C4B000
heap
page read and write
1C00023F0000
trusted library allocation
page read and write
3652000
heap
page read and write
FE047FB000
stack
page read and write
2773000
heap
page read and write
1BE85C43000
heap
page read and write
780000
heap
page read and write
3615000
heap
page read and write
3332000
heap
page read and write
444400234000
direct allocation
page read and write
3629000
heap
page read and write
2738000
heap
page read and write
2796000
heap
page read and write
51D0000
trusted library allocation
page read and write
2B99000
trusted library allocation
page execute and read and write
1C0002CD8000
trusted library allocation
page read and write
1BE85613000
heap
page read and write
39D000
stack
page read and write
72180027C000
trusted library allocation
page read and write
A240024C000
direct allocation
page read and write
1BE85D2D000
heap
page read and write
367F000
heap
page read and write
FE127FE000
stack
page read and write
281830B6000
heap
page read and write
2148000
heap
page read and write
60A000CB0000
trusted library allocation
page read and write
1BE856C1000
heap
page read and write
3BA8000
heap
page read and write
2930000
trusted library allocation
page read and write
1ECF458D000
heap
page read and write
400000
system
page execute and read and write
35BB1FE000
stack
page read and write
3332000
heap
page read and write
1BE86010000
heap
page read and write
1937C733000
heap
page read and write
281830B0000
heap
page read and write
3660000
heap
page read and write
1937C744000
heap
page read and write
1F3E000
stack
page read and write
645000240000
trusted library allocation
page read and write
837000
heap
page read and write
2735000
heap
page read and write
1ECF45CF000
heap
page read and write
2796000
heap
page read and write
1BE8561A000
heap
page read and write
8A3000
heap
page read and write
1C00028E8000
trusted library allocation
page read and write
1BE85C43000
heap
page read and write
35A41FE000
stack
page read and write
2930000
trusted library allocation
page read and write
6290002B8000
trusted library allocation
page read and write
1C0002450000
trusted library allocation
page read and write
FE02FFE000
unkown
page readonly
1BE85602000
heap
page read and write
1BE85C43000
heap
page read and write
1BE85C91000
heap
page read and write
1ECF45C1000
heap
page read and write
3342000
heap
page read and write
35C51FC000
stack
page read and write
1C0002E74000
trusted library allocation
page read and write
1BE85643000
heap
page read and write
2796000
heap
page read and write
1BE85D12000
heap
page read and write
366E000
heap
page read and write
51D0000
trusted library allocation
page read and write
FE0D7FE000
stack
page read and write
1BE85603000
heap
page read and write
60A0002C8000
trusted library allocation
page read and write
644000
heap
page read and write
1C0002928000
trusted library allocation
page read and write
1ECF45CF000
heap
page read and write
1C00024D8000
trusted library allocation
page read and write
1C0002E9C000
trusted library allocation
page read and write
FE751FE000
stack
page read and write
645000268000
trusted library allocation
page read and write
451C00264000
trusted library allocation
page read and write
28189A40000
trusted library section
page read and write
5170000
trusted library allocation
page read and write
1C00024C0000
trusted library allocation
page read and write
60A0002B8000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
1ECF45F7000
heap
page read and write
51D0000
trusted library allocation
page read and write
1BE85C6C000
heap
page read and write
1ECF4783000
heap
page read and write
2DFB000
heap
page read and write
1C0002974000
trusted library allocation
page read and write
193059F0000
unkown
page readonly
238F000
stack
page read and write
35A09FE000
unkown
page readonly
3629000
heap
page read and write
64500028C000
trusted library allocation
page read and write
281830A2000
heap
page read and write
1937C72B000
heap
page read and write
28181870000
trusted library section
page readonly
3BA8000
heap
page read and write
645000298000
trusted library allocation
page read and write
1C000396C000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
3342000
heap
page read and write
1937E513000
heap
page read and write
721800290000
trusted library allocation
page read and write
1BE85624000
heap
page read and write
1BE8561D000
heap
page read and write
1BE85D43000
heap
page read and write
59AE000
stack
page read and write
366E000
heap
page read and write
3332000
heap
page read and write
A24002DC000
direct allocation
page read and write
1BE829DE000
heap
page read and write
4444002EC000
direct allocation
page read and write
A2400248000
direct allocation
page read and write
2818309E000
heap
page read and write
6FEBE000
unkown
page write copy
54E000
stack
page read and write
51D0000
trusted library allocation
page read and write
1C000266A000
trusted library allocation
page read and write
1BE85C4B000
heap
page read and write
3332000
heap
page read and write
1BE85CCF000
heap
page read and write
19305416000
heap
page read and write
2148000
heap
page read and write
1BE85C43000
heap
page read and write
1BE85C8D000
heap
page read and write
20A30D06000
heap
page read and write
1BE85618000
heap
page read and write
3629000
heap
page read and write
5510000
heap
page read and write
1ECF2A30000
heap
page read and write
9E0000
heap
page read and write
35971FE000
unkown
page read and write
19305416000
heap
page read and write
35A99FE000
unkown
page readonly
2BF2000
trusted library allocation
page read and write
3332000
heap
page read and write
FE1CFFE000
unkown
page readonly
645000201000
trusted library allocation
page read and write
405000
unkown
page readonly
451C00210000
trusted library allocation
page read and write
451C00334000
trusted library allocation
page read and write
218F000
stack
page read and write
1BE86110000
heap
page read and write
51D0000
trusted library allocation
page read and write
1BE856E4000
heap
page read and write
1ECF29A0000
direct allocation
page execute and read and write
60A000340000
trusted library allocation
page read and write
A2400303000
direct allocation
page read and write
2796000
heap
page read and write
60A000C7C000
trusted library allocation
page read and write
1937C737000
heap
page read and write
5160000
trusted library allocation
page read and write
1BE82813000
heap
page read and write
1BE85D90000
heap
page read and write
5650000
unkown
page read and write
28187850000
unkown
page readonly
644000
heap
page read and write
60A000DAC000
trusted library allocation
page read and write
451C00418000
trusted library allocation
page read and write
451C0028C000
trusted library allocation
page read and write
28E0000
trusted library allocation
page read and write
5DE000
stack
page read and write
1BE85C6C000
heap
page read and write
2131000
heap
page read and write
3688000
heap
page read and write
28187878000
unkown
page readonly
890000
heap
page read and write
1ECF29A0000
direct allocation
page execute and read and write
8AE000
stack
page read and write
1BE85C85000
heap
page read and write
FE769FE000
unkown
page readonly
FE1C7FB000
stack
page read and write
2120000
heap
page read and write
444400201000
direct allocation
page read and write
1BE85C43000
heap
page read and write
1BE85C8D000
heap
page read and write
1BE8561D000
heap
page read and write
1BE85C24000
heap
page read and write
1937E402000
heap
page read and write
1BE85C85000
heap
page read and write
281830D0000
heap
page read and write
281835FC000
heap
page read and write
366E000
heap
page read and write
1BE85C8D000
heap
page read and write
3332000
heap
page read and write
3342000
heap
page read and write
18F000
stack
page read and write
890000
heap
page read and write
2145000
heap
page read and write
1C0003801000
trusted library allocation
page read and write
35981FE000
stack
page read and write
35AD9FE000
unkown
page readonly
402000
unkown
page readonly
1BE829B3000
heap
page read and write
20A30950000
heap
page read and write
1C00032F4000
trusted library allocation
page read and write
1BE85C21000
heap
page read and write
3332000
heap
page read and write
60A000598000
trusted library allocation
page read and write
3660000
heap
page read and write
2145000
heap
page read and write
1ECF29DC000
unkown
page read and write
1ECF457E000
heap
page read and write
1BE82913000
heap
page read and write
1ECF29CF000
unkown
page read and write
1FDE000
stack
page read and write
490000
heap
page read and write
1ECF45CF000
heap
page read and write
A240031C000
direct allocation
page read and write
60A0009F0000
trusted library allocation
page read and write
1BE856E0000
heap
page read and write
5160000
trusted library allocation
page read and write
369F000
heap
page read and write
60A00075D000
trusted library allocation
page read and write
1BE85D65000
heap
page read and write
1C0003954000
trusted library allocation
page read and write
1C0002250000
trusted library allocation
page read and write
890000
heap
page read and write
60A000C40000
trusted library allocation
page read and write
1BE85C43000
heap
page read and write
2755000
heap
page read and write
50AE000
stack
page read and write
45D000
system
page execute and read and write
1C00039BC000
trusted library allocation
page read and write
890000
heap
page read and write
35B59FE000
unkown
page readonly
3332000
heap
page read and write
4C4000
heap
page read and write
35991FE000
stack
page read and write
3655000
heap
page read and write
1C0002B80000
trusted library allocation
page read and write
3E9C000
heap
page read and write
3332000
heap
page read and write
1BE85D0A000
heap
page read and write
60A0001CC000
trusted library allocation
page read and write
78F000
stack
page read and write
3342000
heap
page read and write
24CE000
heap
page read and write
3660000
heap
page read and write
362D000
heap
page read and write
33A0000
heap
page read and write
721800248000
trusted library allocation
page read and write
872000
heap
page read and write
60A000DE0000
trusted library allocation
page read and write
8A3000
heap
page read and write
1BE85CAE000
heap
page read and write
869000
heap
page read and write
35B91FD000
stack
page read and write
D1000
direct allocation
page read and write
213D000
heap
page read and write
5160000
trusted library allocation
page read and write
2CC8000
unkown
page read and write
56D0000
direct allocation
page read and write
20A30D0A000
heap
page read and write
850000
heap
page read and write
680000
heap
page read and write
60A000394000
trusted library allocation
page read and write
640000
heap
page read and write
19302ED0000
trusted library section
page readonly
2D20000
heap
page read and write
1ECF4579000
heap
page read and write
1ECF4607000
heap
page read and write
366E000
heap
page read and write
1930542B000
heap
page read and write
1BE829DE000
heap
page read and write
1BE829DF000
heap
page read and write
1C0003040000
trusted library allocation
page read and write
3342000
heap
page read and write
86D000
heap
page read and write
2796000
heap
page read and write
35B71FD000
stack
page read and write
1C0003A84000
trusted library allocation
page read and write
60A000C94000
trusted library allocation
page read and write
3332000
heap
page read and write
364C000
heap
page read and write
281FC5D9000
heap
page read and write
1C00028B0000
trusted library allocation
page read and write
5880000
heap
page read and write
3BA8000
heap
page read and write
60A0001A0000
trusted library allocation
page read and write
46D4000
heap
page read and write
2B96000
trusted library allocation
page execute and read and write
281897E0000
trusted library section
page read and write
3332000
heap
page read and write
644000
heap
page read and write
366E000
heap
page read and write
FE13FFE000
unkown
page readonly
1BE85C64000
heap
page read and write
19305A89000
unclassified section
page read and write
1C00037F8000
trusted library allocation
page read and write
1C0002EAC000
trusted library allocation
page read and write
3300000
heap
page read and write
20A30931000
remote allocation
page execute and read and write
1937E523000
heap
page read and write
19305B2A000
unclassified section
page read and write
60A0002A8000
trusted library allocation
page read and write
1BE85C3C000
heap
page read and write
3676000
heap
page read and write
19306562000
unclassified section
page read and write
4C4000
heap
page read and write
9DB000
heap
page read and write
1C0003AF0000
trusted library allocation
page read and write
2E8E000
unkown
page read and write
3BA8000
heap
page read and write
3676000
heap
page read and write
451C00238000
trusted library allocation
page read and write
AF6000
heap
page read and write
1BE85C43000
heap
page read and write
AFD000
heap
page read and write
FE7C1FE000
stack
page read and write
60A0007D8000
trusted library allocation
page read and write
1C000369C000
trusted library allocation
page read and write
1937C732000
heap
page read and write
5160000
trusted library allocation
page read and write
1937C6AB000
heap
page read and write
451C00408000
trusted library allocation
page read and write
5792000
unkown
page read and write
1C0002DDD000
trusted library allocation
page read and write
1C00038C4000
trusted library allocation
page read and write
480000
heap
page read and write
35AC1FE000
stack
page read and write
400000
unkown
page readonly
1BE85C4B000
heap
page read and write
1ECF4768000
heap
page read and write
1BE85C64000
heap
page read and write
3002000
heap
page read and write
5936000
heap
page read and write
2144000
heap
page read and write
608000
heap
page read and write
576E000
unkown
page read and write
1BE85617000
heap
page read and write
1C0002D94000
trusted library allocation
page read and write
1BE85D43000
heap
page read and write
FE0BFFE000
unkown
page readonly
281830A2000
heap
page read and write
26CF000
unkown
page read and write
3332000
heap
page read and write
4C4000
heap
page read and write
8A3000
heap
page read and write
281830A5000
heap
page read and write
1937C732000
heap
page read and write
1C00033CC000
trusted library allocation
page read and write
3640000
heap
page read and write
1C0002DC0000
trusted library allocation
page read and write
44440020C000
direct allocation
page read and write
7218002F0000
trusted library allocation
page read and write
55D0000
unkown
page read and write
3C55000
heap
page read and write
3342000
heap
page read and write
1C000344C000
trusted library allocation
page read and write
6450002B5000
trusted library allocation
page read and write
1BE85CA6000
heap
page read and write
3342000
heap
page read and write
60A000B18000
trusted library allocation
page read and write
1930653A000
unclassified section
page read and write
1BE8562A000
heap
page read and write
1937C732000
heap
page read and write
35AE1F9000
stack
page read and write
366E000
heap
page read and write
2796000
heap
page read and write
3332000
heap
page read and write
51D0000
trusted library allocation
page read and write
2796000
heap
page read and write
2737000
heap
page read and write
60E000
stack
page read and write
281830A5000
heap
page read and write
3C16000
heap
page read and write
FE027FB000
stack
page read and write
1BE85C6C000
heap
page read and write
2755000
heap
page read and write
2735000
heap
page read and write
4C4000
heap
page read and write
281836A0000
heap
page read and write
57A6000
unkown
page read and write
1BE85C3C000
heap
page read and write
3310000
heap
page read and write
5D2F000
stack
page read and write
60A0002E3000
trusted library allocation
page read and write
DEF000
stack
page read and write
35C29FE000
unkown
page readonly
3654000
heap
page read and write
1BE85C3C000
heap
page read and write
2E7D000
stack
page read and write
A2400308000
direct allocation
page read and write
1BE85C4B000
heap
page read and write
1C000278C000
trusted library allocation
page read and write
721800320000
trusted library allocation
page read and write
1BE829D6000
heap
page read and write
35B11FC000
stack
page read and write
3C55000
heap
page read and write
2B8F000
stack
page read and write
1C000294C000
trusted library allocation
page read and write
6C8A0000
unkown
page readonly
1930657A000
unclassified section
page read and write
645000
heap
page read and write
275E000
heap
page read and write
60A000E7C000
trusted library allocation
page read and write
359D1FE000
stack
page read and write
1C00036F0000
trusted library allocation
page read and write
366E000
heap
page read and write
36C2000
heap
page read and write
1C000340C000
trusted library allocation
page read and write
401000
unkown
page execute read
195000
direct allocation
page read and write
3688000
heap
page read and write
60A000BA8000
trusted library allocation
page read and write
7DF492771000
unkown
page execute read
1BE85CCF000
heap
page read and write
3698000
heap
page read and write
60A0001D4000
trusted library allocation
page read and write
2145000
heap
page read and write
60A00020C000
trusted library allocation
page read and write
3342000
heap
page read and write
263B000
heap
page read and write
52B0000
trusted library allocation
page read and write
3BA8000
heap
page read and write
51D0000
trusted library allocation
page read and write
1C00029C4000
trusted library allocation
page read and write
644000
heap
page read and write
366E000
heap
page read and write
3CB0000
heap
page read and write
3158000
heap
page read and write
52C0000
trusted library allocation
page read and write
1ECF2848000
heap
page read and write
1BE829D6000
heap
page read and write
7FE08000
trusted library allocation
page execute and read and write
60A000B48000
trusted library allocation
page read and write
3342000
heap
page read and write
4444002A0000
direct allocation
page read and write
4C4000
heap
page read and write
1C000342C000
trusted library allocation
page read and write
1BE85DC7000
heap
page read and write
281830A5000
heap
page read and write
3C16000
heap
page read and write
60A00009F000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
213D000
heap
page read and write
3200000
heap
page read and write
335C51C000
stack
page read and write
1BE8562A000
heap
page read and write
3332000
heap
page read and write
60A000318000
trusted library allocation
page read and write
3353000
heap
page read and write
2138000
heap
page read and write
1937C732000
heap
page read and write
473000
system
page execute and read and write
2148000
heap
page read and write
5160000
trusted library allocation
page read and write
60A000658000
trusted library allocation
page read and write
2737000
heap
page read and write
1BE85C4B000
heap
page read and write
1C000383C000
trusted library allocation
page read and write
1BE85C02000
heap
page read and write
1BE85C8D000
heap
page read and write
451C00274000
trusted library allocation
page read and write
1C0002230000
trusted library allocation
page read and write
281830B0000
heap
page read and write
1BE85632000
heap
page read and write
281830A2000
heap
page read and write
1C0002510000
trusted library allocation
page read and write
3B31000
heap
page read and write
1BE829DE000
heap
page read and write
1C0002548000
trusted library allocation
page read and write
A240020C000
direct allocation
page read and write
1BE85D02000
heap
page read and write
2CB317B000
stack
page read and write
281830A2000
heap
page read and write
5EC000
heap
page read and write
2CB2FFC000
stack
page read and write
410000
system
page execute and read and write
60A00021C000
trusted library allocation
page read and write
281830B3000
heap
page read and write
1BE85C64000
heap
page read and write
6450002B4000
trusted library allocation
page read and write
7DF479AC1000
unkown
page readonly
60A00032C000
trusted library allocation
page read and write
1BE85C85000
heap
page read and write
60A000190000
trusted library allocation
page read and write
1C000317C000
trusted library allocation
page read and write
5901000
heap
page read and write
6450002D8000
trusted library allocation
page read and write
3634000
heap
page read and write
213D000
heap
page read and write
213D000
heap
page read and write
3CC1000
heap
page read and write
1BE85CCF000
heap
page read and write
871000
heap
page read and write
281830A2000
heap
page read and write
9E9000
heap
page read and write
645000230000
trusted library allocation
page read and write
1BE86010000
heap
page read and write
1C000221C000
trusted library allocation
page read and write
366E000
heap
page read and write
2CD0000
heap
page read and write
35B99FE000
unkown
page readonly
1C000241C000
trusted library allocation
page read and write
281830AB000
heap
page read and write
1BE85612000
heap
page read and write
6450002F0000
trusted library allocation
page read and write
35B39FE000
unkown
page readonly
35B69FE000
unkown
page readonly
281830B0000
heap
page read and write
6290002F8000
trusted library allocation
page read and write
5C00000
heap
page read and write
1BE856CC000
heap
page read and write
1BE829D6000
heap
page read and write
586F000
stack
page read and write
19300BFA000
unkown
page read and write
1937C732000
heap
page read and write
2731000
heap
page read and write
FE08FFE000
unkown
page readonly
1C00037D4000
trusted library allocation
page read and write
72180020C000
trusted library allocation
page read and write
60A00041C000
trusted library allocation
page read and write
1ECF4761000
heap
page read and write
1BE85C64000
heap
page read and write
60A0009A0000
trusted library allocation
page read and write
60A000DD8000
trusted library allocation
page read and write
402000
unkown
page readonly
1BE829B5000
heap
page read and write
3660000
heap
page read and write
281FC510000
trusted library allocation
page read and write
6290002B4000
trusted library allocation
page read and write
281830B6000
heap
page read and write
1BE85C34000
heap
page read and write
1BE829DE000
heap
page read and write
879000
heap
page read and write
1BE85C4B000
heap
page read and write
1BE85D85000
heap
page read and write
1C0002D50000
trusted library allocation
page read and write
1C0003868000
trusted library allocation
page read and write
2818309E000
heap
page read and write
1BE85C64000
heap
page read and write
1BE85602000
heap
page read and write
444400210000
direct allocation
page read and write
6FD000
stack
page read and write
3660000
heap
page read and write
1937C73B000
heap
page read and write
1BE85CA6000
heap
page read and write
281FC5BA000
heap
page read and write
1C0000401000
trusted library allocation
page read and write
86D000
heap
page read and write
2CF0000
heap
page read and write
1ECF4860000
heap
page read and write
1BE85CCF000
heap
page read and write
1C0003484000
trusted library allocation
page read and write
3C0C000
heap
page read and write
2141000
heap
page read and write
6FED3000
unkown
page read and write
FE19FFE000
unkown
page readonly
1C0003B58000
trusted library allocation
page read and write
281830AB000
heap
page read and write
60A000B70000
trusted library allocation
page read and write
3342000
heap
page read and write
FE147FE000
stack
page read and write
1C0002974000
trusted library allocation
page read and write
193077D0000
trusted library allocation
page read and write
2145000
heap
page read and write
2760000
heap
page read and write
3676000
heap
page read and write
3342000
heap
page read and write
281830CC000
heap
page read and write
1BE85D2A000
heap
page read and write
1C00023B8000
trusted library allocation
page read and write
3342000
heap
page read and write
1BE85CA6000
heap
page read and write
1BE85603000
heap
page read and write
1BE85C85000
heap
page read and write
645000
heap
page read and write
60A000708000
trusted library allocation
page read and write
60A000C8C000
trusted library allocation
page read and write
366E000
heap
page read and write
1ECF478C000
heap
page read and write
1BE85C4B000
heap
page read and write
3342000
heap
page read and write
1BE85C43000
heap
page read and write
1C0003B00000
trusted library allocation
page read and write
5BEF000
stack
page read and write
1C00023F4000
trusted library allocation
page read and write
28183691000
heap
page read and write
1937C732000
heap
page read and write
1C0002420000
trusted library allocation
page read and write
1C00022D8000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
3342000
heap
page read and write
281830A5000
heap
page read and write
1ECF4607000
heap
page read and write
60A0000B8000
trusted library allocation
page read and write
1BE829CE000
heap
page read and write
60A000E68000
trusted library allocation
page read and write
1C00023C4000
trusted library allocation
page read and write
1BE8561D000
heap
page read and write
53E000
stack
page read and write
875000
heap
page read and write
60A000354000
trusted library allocation
page read and write
2818309E000
heap
page read and write
2138000
heap
page read and write
359A1FB000
stack
page read and write
2131000
heap
page read and write
1BE8561C000
heap
page read and write
1937C72C000
heap
page read and write
2138000
heap
page read and write
1C0002B8C000
trusted library allocation
page read and write
366E000
heap
page read and write
5160000
trusted library allocation
page read and write
3BA9000
heap
page read and write
3049000
unclassified section
page execute and read and write
1937C67B000
heap
page read and write
281830B6000
heap
page read and write
56FD000
unkown
page read and write
3332000
heap
page read and write
5160000
trusted library allocation
page read and write
281835D5000
heap
page read and write
366E000
heap
page read and write
465000
heap
page read and write
35B81FE000
stack
page read and write
35AD1FD000
stack
page read and write
28189A02000
trusted library section
page read and write
1C0002E48000
trusted library allocation
page read and write
1BE8295E000
heap
page read and write
281830A5000
heap
page read and write
A24002E4000
direct allocation
page read and write
212C000
heap
page read and write
2D40000
unkown
page read and write
9E8000
heap
page read and write
1BE828D4000
heap
page read and write
385F000
stack
page read and write
1BE829D7000
heap
page read and write
3C53000
heap
page read and write
1BE829D6000
heap
page read and write
870000
heap
page read and write
1C0003564000
trusted library allocation
page read and write
B9F000
stack
page read and write
1BE829DA000
heap
page read and write
60A000A01000
trusted library allocation
page read and write
2796000
heap
page read and write
2860000
heap
page read and write
7DF4927BA000
unkown
page read and write
880000
heap
page read and write
1BE85D16000
heap
page read and write
5D6C000
stack
page read and write
1C00027D4000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
7DF49278D000
unkown
page read and write
7FF9080E0000
direct allocation
page execute and read and write
644000
heap
page read and write
1937E50E000
heap
page read and write
1C00031CC000
trusted library allocation
page read and write
1BE85C4B000
heap
page read and write
402000
unkown
page readonly
1BE82720000
unkown
page execute and read and write
1930541E000
heap
page read and write
1BE8285E000
heap
page read and write
60A00040C000
trusted library allocation
page read and write
A2400347000
direct allocation
page read and write
3332000
heap
page read and write
28183070000
heap
page read and write
366E000
heap
page read and write
1BE85C4B000
heap
page read and write
60A000180000
trusted library allocation
page read and write
1BE85C23000
heap
page read and write
4C4000
heap
page read and write
2CB32FB000
stack
page read and write
3693000
heap
page read and write
2950000
heap
page read and write
6290002B4000
trusted library allocation
page read and write
FE167FE000
stack
page read and write
60A000198000
trusted library allocation
page read and write
2796000
heap
page read and write
366E000
heap
page read and write
1BE85CCF000
heap
page read and write
28189060000
heap
page read and write
1BE85C43000
heap
page read and write
3342000
heap
page read and write
4015000
heap
page read and write
1BE85602000
heap
page read and write
60A000C3C000
trusted library allocation
page read and write
FE7A9FE000
unkown
page readonly
A240030A000
direct allocation
page read and write
3342000
heap
page read and write
3332000
heap
page read and write
51D0000
trusted library allocation
page read and write
1C0002A0C000
trusted library allocation
page read and write
1BE831D0000
heap
page read and write
1C000370C000
trusted library allocation
page read and write
3628000
heap
page read and write
879000
heap
page read and write
1BE85C3C000
heap
page read and write
3655000
heap
page read and write
1BE829DE000
heap
page read and write
FE6F9FE000
unkown
page readonly
1BE85CCF000
heap
page read and write
1BE85623000
heap
page read and write
3C55000
heap
page read and write
281830A3000
heap
page read and write
3342000
heap
page read and write
1BE85602000
heap
page read and write
2818309E000
heap
page read and write
1ECF28EB000
heap
page read and write
AF0000
heap
page read and write
1BE86130000
heap
page read and write
51D0000
trusted library allocation
page read and write
1C0003B2C000
trusted library allocation
page read and write
28189B02000
trusted library section
page read and write
274E000
heap
page read and write
2145000
heap
page read and write
193033F0000
trusted library allocation
page read and write
6290002B4000
trusted library allocation
page read and write
60A000B30000
trusted library allocation
page read and write
3332000
heap
page read and write
375E000
stack
page read and write
4A0000
heap
page read and write
3342000
heap
page read and write
1C0002F1C000
trusted library allocation
page read and write
875000
heap
page read and write
51D0000
trusted library allocation
page read and write
281830AA000
heap
page read and write
1BE856B8000
heap
page read and write
3332000
heap
page read and write
2818A0E0000
trusted library section
page read and write
1ECF45CF000
heap
page read and write
62900028C000
trusted library allocation
page read and write
2CB2EFF000
stack
page read and write
1BE85618000
heap
page read and write
1C0003B48000
trusted library allocation
page read and write
19305416000
heap
page read and write
6290002F0000
trusted library allocation
page read and write
1BE85C12000
heap
page read and write
1937C6D4000
heap
page read and write
1C00026AC000
trusted library allocation
page read and write
20A30A70000
heap
page readonly
19305A49000
unkown
page readonly
3342000
heap
page read and write
60A000550000
trusted library allocation
page read and write
1BE861D0000
heap
page read and write
3332000
heap
page read and write
50EF000
stack
page read and write
547E000
stack
page read and write
2141000
heap
page read and write
7F0000
heap
page read and write
1ECF271D000
unkown
page read and write
3C55000
heap
page read and write
1BE85CAE000
heap
page read and write
35C01FE000
stack
page read and write
1BE85C6C000
heap
page read and write
1BE85C2A000
heap
page read and write
3E9B000
heap
page read and write
2737000
heap
page read and write
60A000DEC000
trusted library allocation
page read and write
1937C6E3000
heap
page read and write
2145000
heap
page read and write
3332000
heap
page read and write
1BE85C4B000
heap
page read and write
1ECF4607000
heap
page read and write
1937C6AD000
heap
page read and write
273E000
heap
page read and write
2148000
heap
page read and write
60A000088000
trusted library allocation
page read and write
4C4000
heap
page read and write
1C00032C0000
trusted library allocation
page read and write
6C91E000
unkown
page write copy
35B51FC000
stack
page read and write
60A000298000
trusted library allocation
page read and write
2796000
heap
page read and write
1C000242C000
trusted library allocation
page read and write
8A3000
heap
page read and write
8A3000
heap
page read and write
1C000326C000
trusted library allocation
page read and write
3BA8000
heap
page read and write
281830A2000
heap
page read and write
1BE86010000
heap
page read and write
1BE829D6000
heap
page read and write
629000240000
trusted library allocation
page read and write
3342000
heap
page read and write
1BE85C8D000
heap
page read and write
1BE85C43000
heap
page read and write
1C0002E01000
trusted library allocation
page read and write
1937C520000
heap
page read and write
1937C600000
heap
page read and write
1BE85612000
heap
page read and write
2BD1000
trusted library allocation
page read and write
1BE829D6000
heap
page read and write
51D0000
trusted library allocation
page read and write
1BE8290A000
heap
page read and write
1BE85D0F000
heap
page read and write
1BE85C4B000
heap
page read and write
60A0000A8000
trusted library allocation
page read and write
281FC4E0000
heap
page read and write
1C000243C000
trusted library allocation
page read and write
1BE85C02000
heap
page read and write
60A000864000
trusted library allocation
page read and write
20A30B1A000
heap
page read and write
A24002E4000
direct allocation
page read and write
644000
heap
page read and write
1C0002454000
trusted library allocation
page read and write
1BE85C2A000
heap
page read and write
1BE86390000
heap
page read and write
684000
heap
page read and write
19305502000
heap
page read and write
51D0000
trusted library allocation
page read and write
1BE85C6C000
heap
page read and write
1ECF458D000
heap
page read and write
1937E526000
heap
page read and write
60A0006C0000
trusted library allocation
page read and write
8A3000
heap
page read and write
2755000
heap
page read and write
1BE85CAE000
heap
page read and write
2796000
heap
page read and write
25D1000
heap
page read and write
1BE85D6B000
heap
page read and write
60A000CD8000
trusted library allocation
page read and write
890000
heap
page read and write
51D0000
trusted library allocation
page read and write
35C51FE000
stack
page read and write
1ECF45B6000
heap
page read and write
195000
stack
page read and write
60A000730000
trusted library allocation
page read and write
6FE40000
unkown
page readonly
A2400368000
direct allocation
page read and write
3332000
heap
page read and write
1937C732000
heap
page read and write
81F000
stack
page read and write
1BE85D12000
heap
page read and write
2F37000
unkown
page read and write
60A000664000
trusted library allocation
page read and write
1BE85CCF000
heap
page read and write
60A0001C4000
trusted library allocation
page read and write
2736000
heap
page read and write
339F000
heap
page read and write
410000
heap
page read and write
3620000
heap
page read and write
1BE8280B000
heap
page read and write
1BE829D6000
heap
page read and write
8A3000
heap
page read and write
3C59000
heap
page read and write
44440030C000
direct allocation
page read and write
1C0002500000
trusted library allocation
page read and write
60A000114000
trusted library allocation
page read and write
8AB000
heap
page read and write
3332000
heap
page read and write
62900028C000
trusted library allocation
page read and write
60A000A28000
trusted library allocation
page read and write
1C0003B10000
trusted library allocation
page read and write
1BE85C4B000
heap
page read and write
5160000
trusted library allocation
page read and write
19305A60000
unkown
page readonly
1BE85617000
heap
page read and write
60A0005F8000
trusted library allocation
page read and write
281830B3000
heap
page read and write
1ECF479C000
heap
page read and write
3342000
heap
page read and write
61C000
heap
page read and write
1937C72C000
heap
page read and write
645000298000
trusted library allocation
page read and write
193059F3000
unkown
page readonly
1C0003280000
trusted library allocation
page read and write
1C0002BBE000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
28181893000
heap
page read and write
5160000
trusted library allocation
page read and write
1BE85C43000
heap
page read and write
644000
heap
page read and write
281835D9000
heap
page read and write
6290002A8000
trusted library allocation
page read and write
60A000CF8000
trusted library allocation
page read and write
1C000294C000
trusted library allocation
page read and write
60A000370000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
4C4000
heap
page read and write
2E19000
unkown
page read and write
1BE831D0000
heap
page read and write
60A000578000
trusted library allocation
page read and write
60A000A8B000
trusted library allocation
page read and write
28183609000
heap
page read and write
2D5B000
heap
page read and write
1C000369C000
trusted library allocation
page read and write
1BE85603000
heap
page read and write
1BE85C4B000
heap
page read and write
3660000
heap
page read and write
582000
heap
page read and write
9D3000
heap
page read and write
55E000
heap
page read and write
51D0000
trusted library allocation
page read and write
28183609000
heap
page read and write
1BE85C6C000
heap
page read and write
60A0008C4000
trusted library allocation
page read and write
19307870000
trusted library allocation
page read and write
3B31000
heap
page read and write
28187890000
heap
page read and write
FE09FFE000
unkown
page readonly
1BE85CC7000
heap
page read and write
60A000BE0000
trusted library allocation
page read and write
1BE85C22000
heap
page read and write
51D0000
trusted library allocation
page read and write
3332000
heap
page read and write
1BE8561A000
heap
page read and write
281830A5000
heap
page read and write
1BE85C1A000
heap
page read and write
60A000C0C000
trusted library allocation
page read and write
1C000320C000
trusted library allocation
page read and write
3169000
heap
page read and write
1ECF45CF000
heap
page read and write
2773000
heap
page read and write
1BE85617000
heap
page read and write
51D0000
trusted library allocation
page read and write
1C0002CBC000
trusted library allocation
page read and write
2145000
heap
page read and write
5E3000
heap
page read and write
3CB0000
heap
page read and write
A2400217000
direct allocation
page read and write
2934000
heap
page read and write
1BE829E2000
heap
page read and write
FE7D1FA000
stack
page read and write
8EE000
stack
page read and write
1C0002298000
trusted library allocation
page read and write
1BE85C64000
heap
page read and write
89B000
heap
page read and write
2148000
heap
page read and write
3676000
heap
page read and write
1BE85D64000
heap
page read and write
892000
heap
page read and write
193077D0000
trusted library allocation
page read and write
60A000201000
trusted library allocation
page read and write
281830AB000
heap
page read and write
1C0003078000
trusted library allocation
page read and write
1C0002C0C000
trusted library allocation
page read and write
FE7A1FE000
stack
page read and write
1C0002FC8000
trusted library allocation
page read and write
3698000
heap
page read and write
1C00023D0000
trusted library allocation
page read and write
1E5000
heap
page read and write
1BE8564D000
heap
page read and write
1C0002934000
trusted library allocation
page read and write
1ECF45B1000
heap
page read and write
3BA9000
heap
page read and write
6450002F8000
trusted library allocation
page read and write
7218002B8000
trusted library allocation
page read and write
1BE85D43000
heap
page read and write
451C002AC000
trusted library allocation
page read and write
1BE827C0000
unkown
page read and write
1BE85C4B000
heap
page read and write
3342000
heap
page read and write
281FC5D4000
heap
page read and write
1C0002BC4000
trusted library allocation
page read and write
60A0007A8000
trusted library allocation
page read and write
281FC4B0000
heap
page read and write
1C0003470000
trusted library allocation
page read and write
7DF4799C1000
unkown
page execute read
60A00007C000
trusted library allocation
page read and write
1C0002AAC000
trusted library allocation
page read and write
1937C6CB000
heap
page read and write
1BE856C8000
heap
page read and write
281830B0000
heap
page read and write
3C3B000
heap
page read and write
359F1FE000
stack
page read and write
1C00023EC000
trusted library allocation
page read and write
890000
heap
page read and write
30E6000
unclassified section
page execute and read and write
2148000
heap
page read and write
1C00023F8000
trusted library allocation
page read and write
3332000
heap
page read and write
3342000
heap
page read and write
35A61FB000
stack
page read and write
3CC1000
heap
page read and write
2131000
heap
page read and write
567C000
stack
page read and write
2739000
heap
page read and write
FE197FE000
stack
page read and write
60A000778000
trusted library allocation
page read and write
645000
heap
page read and write
1C00034A0000
trusted library allocation
page read and write
36C2000
heap
page read and write
60A0002D8000
trusted library allocation
page read and write
193053EB000
unkown
page readonly
1BE829D6000
heap
page read and write
8A3000
heap
page read and write
1C0002C44000
trusted library allocation
page read and write
60A000CF0000
trusted library allocation
page read and write
366E000
heap
page read and write
1BE85C64000
heap
page read and write
3332000
heap
page read and write
6290002B4000
trusted library allocation
page read and write
1C0002340000
trusted library allocation
page read and write
213F000
stack
page read and write
1ECF4607000
heap
page read and write
520000
heap
page read and write
2141000
heap
page read and write
2CB2F7C000
stack
page read and write
3342000
heap
page read and write
451C00328000
trusted library allocation
page read and write
60A0004F0000
trusted library allocation
page read and write
444400290000
direct allocation
page read and write
281830B3000
heap
page read and write
A240030B000
direct allocation
page read and write
366E000
heap
page read and write
644000
heap
page read and write
451C00310000
trusted library allocation
page read and write
60A000784000
trusted library allocation
page read and write
1BE829DE000
heap
page read and write
1BE85C85000
heap
page read and write
1937C72C000
heap
page read and write
28183616000
heap
page read and write
A24002DC000
direct allocation
page read and write
FE0DFFE000
unkown
page readonly
A240027C000
direct allocation
page read and write
214A000
heap
page read and write
56F9000
unkown
page read and write
60A00029C000
trusted library allocation
page read and write
684000
heap
page read and write
9E8000
heap
page read and write
5C5000
heap
page read and write
60A000CBC000
trusted library allocation
page read and write
366E000
heap
page read and write
281830B3000
heap
page read and write
1C0003798000
trusted library allocation
page read and write
1C0003001000
trusted library allocation
page read and write
281830A2000
heap
page read and write
36A3000
heap
page read and write
3332000
heap
page read and write
2C97000
heap
page read and write
2818309E000
heap
page read and write
1C00022B0000
trusted library allocation
page read and write
1C0002908000
trusted library allocation
page read and write
4C4000
heap
page read and write
1C00029C4000
trusted library allocation
page read and write
1C0003744000
trusted library allocation
page read and write
35AC9FE000
unkown
page readonly
281830B6000
heap
page read and write
1BE85C4B000
heap
page read and write
1BE829E2000
heap
page read and write
FE087FC000
stack
page read and write
193053E5000
unkown
page readonly
1BE85C43000
heap
page read and write
25D0000
heap
page read and write
3BD1000
trusted library allocation
page read and write
8A3000
heap
page read and write
3B31000
heap
page read and write
2C70000
unkown
page read and write
51D0000
trusted library allocation
page read and write
3342000
heap
page read and write
1BE85612000
heap
page read and write
60A00014C000
trusted library allocation
page read and write
451C0029C000
trusted library allocation
page read and write
4C4000
heap
page read and write
644000
heap
page read and write
3342000
heap
page read and write
1937C72C000
heap
page read and write
FE12FFE000
unkown
page readonly
51D0000
trusted library allocation
page read and write
60A000801000
trusted library allocation
page read and write
1C0002480000
trusted library allocation
page read and write
3C55000
heap
page read and write
1ECF45CF000
heap
page read and write
19305416000
heap
page read and write
44440025C000
direct allocation
page read and write
1C0002410000
trusted library allocation
page read and write
451C002F1000
trusted library allocation
page read and write
1BE85C64000
heap
page read and write
1937C713000
heap
page read and write
51D0000
trusted library allocation
page read and write
60A000298000
trusted library allocation
page read and write
3660000
heap
page read and write
721800334000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
1BE85C64000
heap
page read and write
645000
heap
page read and write
6450002A8000
trusted library allocation
page read and write
216A000
heap
page read and write
5170000
trusted library allocation
page read and write
8A3000
heap
page read and write
1BE85C03000
heap
page read and write
1BE85C64000
heap
page read and write
1ECF479C000
heap
page read and write
1C0002658000
trusted library allocation
page read and write
74F000
stack
page read and write
1BE85D22000
heap
page read and write
35A81FB000
stack
page read and write
2140000
heap
page read and write
51D0000
trusted library allocation
page read and write
28181890000
heap
page read and write
3342000
heap
page read and write
1C0002E3D000
trusted library allocation
page read and write
7DF4927B1000
unkown
page execute read
23BE000
stack
page read and write
1C000267C000
trusted library allocation
page read and write
890000
heap
page read and write
281830B6000
heap
page read and write
35979FE000
unkown
page readonly
5160000
trusted library allocation
page read and write
2796000
heap
page read and write
281830A3000
heap
page read and write
60A000514000
trusted library allocation
page read and write
1BE85DAE000
heap
page read and write
5936000
heap
page read and write
1937C72C000
heap
page read and write
20A30D10000
heap
page read and write
630000
heap
page read and write
FE7E9FE000
unkown
page readonly
5CE000
stack
page read and write
1BE85D23000
heap
page read and write
2796000
heap
page read and write
2E1D000
unkown
page read and write
1C0002DD8000
trusted library allocation
page read and write
7DF492764000
unkown
page read and write
1BE85603000
heap
page read and write
1BE829DE000
heap
page read and write
281830B0000
heap
page read and write
19304F62000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
60A000304000
trusted library allocation
page read and write
1BE85C6C000
heap
page read and write
1BE82961000
heap
page read and write
2818309E000
heap
page read and write
60A000C18000
trusted library allocation
page read and write
60A000C7C000
trusted library allocation
page read and write
52B0000
trusted library allocation
page read and write
1C000348C000
trusted library allocation
page read and write
1C00038B0000
trusted library allocation
page read and write
9F3000
heap
page read and write
60A0003AC000
trusted library allocation
page read and write
1BE85CAE000
heap
page read and write
1BE85C43000
heap
page read and write
FE791FE000
stack
page read and write
1C0003974000
trusted library allocation
page read and write
871000
heap
page read and write
60A000718000
trusted library allocation
page read and write
820000
heap
page read and write
60A000EA0000
trusted library allocation
page read and write
1937E320000
heap
page read and write
339F000
heap
page read and write
6FEA6000
unkown
page readonly
869000
heap
page read and write
400000
unkown
page readonly
3B31000
heap
page read and write
2739000
heap
page read and write
86D000
heap
page read and write
1BE85CA6000
heap
page read and write
72180029C000
trusted library allocation
page read and write
19305AC0000
heap
page read and write
444400270000
direct allocation
page read and write
1BE85C6C000
heap
page read and write
281FC4A0000
heap
page readonly
7FF9080E0000
direct allocation
page execute and read and write
890000
heap
page read and write
51D0000
trusted library allocation
page read and write
1BE85CAE000
heap
page read and write
2796000
heap
page read and write
590000
direct allocation
page read and write
FE0E7FE000
stack
page read and write
1C0002BE9000
trusted library allocation
page read and write
60A000E44000
trusted library allocation
page read and write
2148000
heap
page read and write
700000
heap
page read and write
333D000
heap
page read and write
60A000E0C000
trusted library allocation
page read and write
3BA8000
heap
page read and write
35B61FC000
stack
page read and write
86D000
heap
page read and write
281830B3000
heap
page read and write
6FE41000
unkown
page execute read
281830B6000
heap
page read and write
35BC9FE000
unkown
page readonly
51D0000
trusted library allocation
page read and write
4179000
unclassified section
page execute and read and write
1BE85702000
heap
page read and write
281830B6000
heap
page read and write
890000
heap
page read and write
1BE85C6C000
heap
page read and write
8A3000
heap
page read and write
2CC0000
heap
page read and write
51D0000
trusted library allocation
page read and write
281830B0000
heap
page read and write
A240026C000
direct allocation
page read and write
3660000
heap
page read and write
1BE829D6000
heap
page read and write
366E000
heap
page read and write
1C0002E64000
trusted library allocation
page read and write
508E000
stack
page read and write
645000254000
trusted library allocation
page read and write
60A000601000
trusted library allocation
page read and write
4C4000
heap
page read and write
60A000C18000
trusted library allocation
page read and write
1ECF459A000
heap
page read and write
A24002A0000
direct allocation
page read and write
FE05FFE000
unkown
page readonly
E0000
heap
page read and write
35A19FE000
unkown
page readonly
629000268000
trusted library allocation
page read and write
2EC6000
unkown
page read and write
451C00344000
trusted library allocation
page read and write
1BE827C0000
trusted library allocation
page read and write
1C0003A1C000
trusted library allocation
page read and write
281830B3000
heap
page read and write
5160000
trusted library allocation
page read and write
1C0002C88000
trusted library allocation
page read and write
60A0002F8000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
3063000
unclassified section
page execute and read and write
3660000
heap
page read and write
60A000B40000
trusted library allocation
page read and write
3660000
heap
page read and write
60A0000AB000
trusted library allocation
page read and write
1BE856EA000
heap
page read and write
644000
heap
page read and write
527000
heap
page read and write
35A31FC000
stack
page read and write
281835B0000
heap
page read and write
1C0003108000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
19305416000
heap
page read and write
366E000
heap
page read and write
451C002CC000
trusted library allocation
page read and write
4C4000
heap
page read and write
1BE85C55000
heap
page read and write
3C16000
heap
page read and write
1BE829D6000
heap
page read and write
1BE85D4B000
heap
page read and write
5E80000
heap
page read and write
60A000D7C000
trusted library allocation
page read and write
A2400230000
direct allocation
page read and write
1C0002B1C000
trusted library allocation
page read and write
1BE85C43000
heap
page read and write
3660000
heap
page read and write
1BE85C6C000
heap
page read and write
281FC3C0000
heap
page read and write
451C00254000
trusted library allocation
page read and write
281FC500000
trusted library allocation
page read and write
1BE85C6C000
heap
page read and write
1BE856C9000
heap
page read and write
1BE85D64000
heap
page read and write
A2400311000
direct allocation
page read and write
1C0003201000
trusted library allocation
page read and write
1BE85C64000
heap
page read and write
60A000500000
trusted library allocation
page read and write
1BE85CA6000
heap
page read and write
281830A5000
heap
page read and write
875000
heap
page read and write
451C00348000
trusted library allocation
page read and write
359C9FE000
unkown
page readonly
1BE856FF000
heap
page read and write
52B0000
trusted library allocation
page read and write
64500027C000
trusted library allocation
page read and write
1BE85C04000
heap
page read and write
1C000380C000
trusted library allocation
page read and write
1C0003478000
trusted library allocation
page read and write
35BE9FE000
unkown
page readonly
72180028C000
trusted library allocation
page read and write
100000
heap
page read and write
2796000
heap
page read and write
1937E50F000
heap
page read and write
193074C0000
trusted library section
page read and write
1C0000001000
trusted library allocation
page read and write
1C0002428000
trusted library allocation
page read and write
1BE829D6000
heap
page read and write
1C0002E18000
trusted library allocation
page read and write
3332000
heap
page read and write
875000
heap
page read and write
1C0002440000
trusted library allocation
page read and write
There are 3846 hidden memdumps, click here to show them.