IOC Report

loading gif

Files

File Path
Type
Category
Malicious
hFGZpat9Mf.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_319baef4101f2973dda1833cdb25524ddf68727_82810a17_11720b30\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER410A.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Jan 27 01:03:17 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5399.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6656.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\hFGZpat9Mf.dll"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\hFGZpat9Mf.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\hFGZpat9Mf.dll",#1
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 684

URLs

Name
IP
Malicious
http://31.214.157.187/drew/n9Q8SXORQfxecr/MW5_2Fu9_2Bgocr6670ju/D1JJTVEHrWL1TxqL/xGoJ_2FQlD36_2B/GkPBzrjzE3l7JBLY9O/1EFPlHsMW/m5HxfuFe9CAmeE3Sv9mV/WruJ_2B6bq6RWMaARg5/48WJvcYD9cWVaImnFjKYnp/qqfI438hlaFuV/Cz10Llo3/y28DCtREPMb5OZnUZKj2hAx/fvbD6E0k2X/xMHWSCI5symguz2Bp/FnCO_2F0QOq8/vwhEVJIxW/5.jlk
31.214.157.187
malicious
http://habpfans.at/drew/AvYfyTR_2B2G3/_2F4h5ah/TJ34ZXtaMR1Oc3_2BPI0hI4/GdwumcM9XU/qAwknuMeebVU2QdSF/VN2ToaIYsZPU/kI1do_2B9jW/Q9gfyv85CoHPvT/SnqcLw3TTcQW61PNrLWiv/_2BkKhdRaMJkT9HD/82Fg3tERnOrn6Yg/fT2SNRr4ih8M1B9lEq/WIX8riitn/8yNrCBKJNgpm3khA4gSx/B8X3zDAJaQCYV1F4k99/jQHMcxYL/Il8wT6lWu/Ih.jlk
61.36.14.230
malicious
http://giporedtrip.at/drew/vDXEGqf4EaI6e/GBZCusNA/wGFZ17UZEew5_2F3lztpfux/SlqAMrP7W1/XBD36Fnf1Eq7wA6HD/bZQhlGWv2oMx/02wZPYg1S9_/2FsBPVVzIGiliu/ZgesoO3_2BU1Itp9mWBBQ/zS9Fa06G7Ifi1Qdi/yVB_2BRlu8Zp_2B/LJtKQv4YtcqH6IAzxR/L6Ho0ZvfB/evXUKtmzU_2B4Fe1cs5B/1wJA25jdSjnKCVAyqP7/xAdhGKLVvM/CvkvXIJYGs/9.jlk
181.129.180.251
malicious
http://194.76.226.200/drew/ozC7eSUmzahvYkYKrp/EnTXsLZQu/ZxwfzvyOea6Ms_2FcWiK/QVPuXmRecwMBmPtS2pP/K1YuqB0TTP3PJ7dc3csdFA/1Ac_2BGJ3ahfL/ClNkrX58/ZDofYbeDbIVvrUisO8PwbQv/pc3vAH6GWF/x_2B4_2BbH_2B0wxz/YCHkmZmDbaCX/aMf9JRtYupc/_2Ben2gyoQcqJb/gP1jDokjfsnRCuX4LwXIc/R6CnFb_2FUwS1dKT/G7Z9QUvFXshW5HS/y.jlk
194.76.226.200
malicious
http://194.76.226.200/drew/t4UXVVFvbg_2F3LXo8gXBT/1icGJdsG14mTA/YOVrBwZF/xARqsNBXczJePkKt2X6ww_2/BWmoPwSUrF/dMkwNYvCaezjn8JBl/H0ytvGxBbW3l/zR2N_2BHrz_/2FvsAN_2FRzTTC/lSSKBusA2w75D7HkZKGJs/DACOMqt0XK0wSfc5/bo0iFsZeiFg2i2l/JDzyY2V7hheHpK0ocJ/ZgcshLwb0/jlOmaQmjqFbHJJo3m7Pt/o4K7mLse1jm/1K47Z.jlk
194.76.226.200
malicious
http://habpfans.at/
unknown
malicious
http://habpfans.at/drew/5tHE_2Fl/pXBoYLIb7sXj6_2FbgEdP7S/1g8RiyhGmo/7FzHWL9Gm5Pao_2Bw/5oh73gE4juwn/w
unknown
malicious
http://31.214.157.187/drew/XdSo6qg_2FEgYysST/WOvXNJFccrJx/zVwG0bEZwA1/FgOrwJqVq8qQMt/gJKBdkHK_2BRbM8cGXljg/dR5mjLhLFYJj3437/sCPrzkqYN8vu4UK/Lv8bHqBMBEjz1n4JUX/xuOm6McxD/U7cQGMW7Bxk_2BVYpR1Y/2dwD1RGZgWHtptGZcjA/6KkSFpd8oqg4xHg9j8CKKi/XQJvRiHHSuj0_/2BwWvoV7/60l_2BahFJ3qIHK1CvN87c7/jOCSFwu.jlk
31.214.157.187
malicious
http://giporedtrip.at/drew/CNAO_2FMqt2bQnnFTS9A/gZCx4lwGHYQjpKz_2Bo/eC3Q_2B6RQnBEorg_2FJk6/uEN67LHG_2FS5/_2BBd1X9/aVPauq0optO45rzbpdCQm0T/aYIRRNsEBo/KjgLaOYvR_2BgwzfQ/25S5OlQYXnss/XWKrlvnyLdL/zvJbW2nKGtMp_2/BhAqVJaOXmJzkoWYA4_2B/1sUQfL4pghiYPQ_2/Bk4zNXCpOm9uy6W/_2FwvvWoJCQywtXfuj/zSz8jbk7z4_2FaKsy/ujc.jlk
211.119.84.112
malicious
http://habpfans.at/drew/5tHE_2Fl/pXBoYLIb7sXj6_2FbgEdP7S/1g8RiyhGmo/7FzHWL9Gm5Pao_2Bw/5oh73gE4juwn/wLkUkA7sRnm/cso3yuTSujNtgI/CMmvYVa7e4KaoltzEmBTc/sgUl10rzE9jSORq1/rqqMvEmtzS52b3S/MwqSqUIn0qJ41lN07l/ltNVceIDT/qjCtCMmp_2FbkkqAoDDI/2nZPBTOmmpjaMrj1ust/QMCPjE0wKPGXBQrFS0WE_2/B3SVbiens/K.jlk
41.41.255.235
malicious
http://habpfans.at/drew/AvYfyTR_2B2G3/_2F4h5ah/TJ34ZXtaMR1Oc3_2BPI0hI4/GdwumcM9XU/qAwknuMeebVU2QdSF/
unknown
malicious
http://habpfans.at/g
unknown
malicious
http://www.dhtmlcentral.com/forums/forum.asp?FORUM_ID=2&CAT_ID=1&Forum_Title=CoolMenus
unknown
http://upx.sf.net
unknown
http://31.214.157.187/drew/XdSo6qg_2FEgYysST/WOvXNJFccrJx/zVwG0bEZwA1/FgOrwJqVq8qQMt/gJKBdkHK_2BRbM8
unknown
http://31.214.157.187/
unknown
http://194214.157.187/
unknown
http://www.dhtmlcentral.com/tutorial.asp
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
giporedtrip.at
211.119.84.112
malicious
habpfans.at
41.41.255.235
malicious

IPs

IP
Domain
Country
Malicious
181.129.180.251
unknown
Colombia
malicious
41.41.255.235
habpfans.at
Egypt
malicious
211.119.84.112
giporedtrip.at
Korea Republic of
malicious
31.214.157.187
unknown
Germany
malicious
61.36.14.230
unknown
Korea Republic of
malicious
194.76.226.200
unknown
Germany
malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProgramId
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
FileId
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LowerCaseLongPath
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LongPathHash
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Name
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Publisher
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Version
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinFileVersion
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinaryType
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProductName
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
ProductVersion
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
LinkDate
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
BinProductVersion
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Size
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
Language
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
IsPeFile
\REGISTRY\A\{919ad80f-9566-20d0-914d-aff360ea9431}\Root\InventoryApplicationFile\rundll32.exe|ab97b57a
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
001880053FEEE7CA
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2A09000
heap
page read and write
malicious
1080000
trusted library allocation
page execute and read and write
malicious
2FD8000
heap
page read and write
malicious
1080000
trusted library allocation
page execute and read and write
malicious
2FD8000
heap
page read and write
malicious
2FD8000
heap
page read and write
malicious
ED0000
trusted library allocation
page execute and read and write
malicious
ED0000
trusted library allocation
page execute and read and write
malicious
2FD8000
heap
page read and write
malicious
2FD8000
heap
page read and write
malicious
9E0000
trusted library allocation
page execute and read and write
malicious
8A0000
trusted library allocation
page execute and read and write
malicious
EE0000
trusted library allocation
page execute and read and write
malicious
ED0000
trusted library allocation
page execute and read and write
malicious
890000
trusted library allocation
page execute and read and write
malicious
2FD8000
heap
page read and write
malicious
EE0000
trusted library allocation
page execute and read and write
malicious
2FD8000
heap
page read and write
malicious
2FD8000
heap
page read and write
malicious
1080000
trusted library allocation
page execute and read and write
malicious
2FD8000
heap
page read and write
malicious
EE0000
trusted library allocation
page execute and read and write
malicious
2FD8000
heap
page read and write
malicious
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
1DE2021F000
unkown
page read and write
1E2BBB6D000
unkown
page read and write
2BF9000
heap
page read and write
2AE7000
heap
page read and write
1FAA15B0000
heap
page read and write
21EDC702000
unkown
page read and write
2C78000
heap
page read and write
AC0000
heap
page read and write
EF0000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2EDA000
heap
page read and write
1120000
trusted library allocation
page read and write
28D29410000
heap
page read and write
A40000
trusted library allocation
page read and write
2AE7000
heap
page read and write
1E2BBC12000
unkown
page read and write
28F0A660000
trusted library allocation
page read and write
1FAA1F9F000
unkown
page read and write
18CFB822000
unkown
page read and write
2AE7000
heap
page read and write
28F05DA0000
trusted library allocation
page read and write
2AE7000
heap
page read and write
2501000
unclassified section
page execute read
907EF6F000
stack
page read and write
A40000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
700000
unkown
page readonly
CAFBEBB000
stack
page read and write
1140000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2B88000
heap
page read and write
17E59113000
unkown
page read and write
2AE7000
heap
page read and write
28F04EFF000
unkown
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
AE7000
heap
page read and write
4D90000
trusted library allocation
page read and write
E0B03F9000
stack
page read and write
252BCF4C000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
539E000
stack
page read and write
18CFB913000
unkown
page read and write
AE3000
heap
page read and write
252BD130000
heap
page read and write
2C6D000
heap
page read and write
1DE20060000
heap
page read and write
2AE7000
heap
page read and write
2C79000
heap
page read and write
2B9AAD40000
heap
page read and write
3AA817C000
stack
page read and write
1E2BB254000
unkown
page read and write
1DE20513000
unkown
page read and write
18CFB84B000
unkown
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
1FAA1850000
unkown
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
1E2BB1C0000
trusted library allocation
page read and write
1D4D7249000
unkown
page read and write
2C55000
heap
page read and write
2C03000
heap
page read and write
2AE7000
heap
page read and write
1120000
trusted library allocation
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2C78000
heap
page read and write
1FAA1F86000
unkown
page read and write
1AC71BD0000
unkown
page read and write
2AEE000
heap
page read and write
14DCCC40000
unkown
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
28F04E29000
unkown
page read and write
18CFB908000
unkown
page read and write
252BCF4F000
heap
page read and write
2AC0000
trusted library allocation
page read and write
28F0A680000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2C79000
heap
page read and write
A40000
trusted library allocation
page read and write
2C05000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
28F0A390000
trusted library allocation
page read and write
250C000
unclassified section
page readonly
21EDC600000
unkown
page read and write
2AEE000
heap
page read and write
1AC71C63000
unkown
page read and write
1FAA1F87000
unkown
page read and write
A40000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2C14000
heap
page read and write
28F0A350000
trusted library allocation
page read and write
1FAA1F73000
unkown
page read and write
14DCCC13000
unkown
page read and write
1FAA184F000
unkown
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
1120000
trusted library allocation
page read and write
1E2BB3C4000
unkown
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2FDB000
heap
page read and write
1FAA1FAC000
unkown
page read and write
2AEE000
heap
page read and write
28F0A620000
trusted library allocation
page read and write
ADD000
heap
page read and write
2AEE000
heap
page read and write
2B9AB920000
trusted library allocation
page read and write
2AE7000
heap
page read and write
1120000
trusted library allocation
page read and write
2AEE000
heap
page read and write
1E2BBC02000
unkown
page read and write
49EC000
trusted library allocation
page read and write
A40000
trusted library allocation
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
18CFB853000
unkown
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
480000
unkown
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
4820000
trusted library allocation
page read and write
265C000
stack
page read and write
14DCCD02000
unkown
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
18CFB83C000
unkown
page read and write
2C78000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
5D2000
stack
page read and write
2AE7000
heap
page read and write
E11000
unkown
page execute read
2B9ABBF0000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
1E2BB38E000
unkown
page read and write
2AEE000
heap
page read and write
47FB477000
stack
page read and write
2AE7000
heap
page read and write
2B47000
heap
page read and write
2AEE000
heap
page read and write
570C2F9000
stack
page read and write
2AE7000
heap
page read and write
A40000
trusted library allocation
page read and write
4C90000
trusted library allocation
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
1FAA1F77000
unkown
page read and write
1E2BBC0A000
unkown
page read and write
107F000
stack
page read and write
2C6D000
heap
page read and write
2C0C000
heap
page read and write
2C0F000
heap
page read and write
2C11000
heap
page read and write
1090000
trusted library allocation
page execute and read and write
252BCF20000
heap
page read and write
2AEE000
heap
page read and write
ADD000
heap
page read and write
2AE7000
heap
page read and write
18CFB881000
unkown
page read and write
1FAA1800000
unkown
page read and write
3840000
remote allocation
page read and write
2AEE000
heap
page read and write
E0F000
stack
page read and write
28F04CF0000
heap
page read and write
2AEE000
heap
page read and write
8EA000
heap
page read and write
480000
heap
page read and write
14DCD1D0000
remote allocation
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
1FAA1902000
unkown
page read and write
F00000
trusted library allocation
page read and write
17E5908A000
unkown
page read and write
1E2BB3FE000
unkown
page read and write
2AE7000
heap
page read and write
49C55FE000
stack
page read and write
242427E000
stack
page read and write
14DCC9E0000
heap
page read and write
E0B037B000
stack
page read and write
2AEE000
heap
page read and write
1DE20502000
unkown
page read and write
2AE7000
heap
page read and write
2B9AAD8D000
heap
page read and write
2AEE000
heap
page read and write
28F0A422000
unkown
page read and write
907F2F7000
stack
page read and write
1ED74FC000
stack
page read and write
1ED77FE000
stack
page read and write
907F7FB000
stack
page read and write
ACD000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
1FAA1813000
unkown
page read and write
4A69000
trusted library allocation
page read and write
701000
unkown
page execute read
1FAA2402000
unkown
page read and write
28F0A374000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2FDB000
heap
page read and write
2423F2C000
stack
page read and write
A40000
trusted library allocation
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
E0B027F000
stack
page read and write
2C6D000
heap
page read and write
2C14000
heap
page read and write
2AE7000
heap
page read and write
1BC8EA5B000
unkown
page read and write
2AEE000
heap
page read and write
4C90000
trusted library allocation
page read and write
AC0000
heap
page read and write
2B9AB910000
trusted library allocation
page read and write
2AE7000
heap
page read and write
A40000
trusted library allocation
page read and write
1FAA1F8A000
unkown
page read and write
261E000
stack
page read and write
28F05700000
unkown
page read and write
1AC71C5C000
unkown
page read and write
3A4D000
stack
page read and write
14DCCC29000
unkown
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
1FAA1F82000
unkown
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
1AC71C5A000
unkown
page read and write
1150000
remote allocation
page read and write
1DE200D0000
heap
page read and write
2AE7000
heap
page read and write
1FAA1F8C000
unkown
page read and write
2AEE000
heap
page read and write
1D4D71A0000
heap
page read and write
2AE7000
heap
page read and write
9E0000
heap
page read and write
2AEE000
heap
page read and write
A9F000
heap
page read and write
1D4D7130000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
1FAA1F77000
unkown
page read and write
2C67000
heap
page read and write
96742FE000
stack
page read and write
7B0000
trusted library allocation
page read and write
2AEE000
heap
page read and write
36D0000
heap
page read and write
A40000
trusted library allocation
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2B9AAF40000
heap
page read and write
1E2BB23C000
unkown
page read and write
2C4E000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
4EC000
stack
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
17E59013000
unkown
page read and write
1FAA1FB1000
unkown
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2C05000
heap
page read and write
50DD000
stack
page read and write
2AE7000
heap
page read and write
28F04E73000
unkown
page read and write
A40000
trusted library allocation
page read and write
2AE7000
heap
page read and write
1FAA1F5E000
unkown
page read and write
1AC71C85000
unkown
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
1FAA1F6C000
unkown
page read and write
A40000
trusted library allocation
page read and write
A9D000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
1120000
trusted library allocation
page read and write
2AEE000
heap
page read and write
1AC71B30000
heap
page read and write
47FB0FE000
stack
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2C6D000
heap
page read and write
4810000
heap
page read and write
18CFC002000
unkown
page read and write
A40000
trusted library allocation
page read and write
931EFFB000
stack
page read and write
800000
unkown
page read and write
28F04F07000
unkown
page read and write
1AC71B40000
heap
page read and write
2AEE000
heap
page read and write
49A0000
trusted library allocation
page read and write
2AE5000
heap
page read and write
2AEE000
heap
page read and write
17E59900000
unkown
page read and write
2AEE000
heap
page read and write
49A7000
trusted library allocation
page read and write
2AEE000
heap
page read and write
28D29602000
unkown
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
28F0A4E0000
unkown
page read and write
1DE20500000
unkown
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
E11000
unkown
page execute read
2B80000
heap
page read and write
3F0000
trusted library allocation
page read and write
A40000
trusted library allocation
page read and write
28F0A690000
trusted library allocation
page read and write
2AEE000
heap
page read and write
AE1000
heap
page read and write
E0B077F000
stack
page read and write
2B9ABC00000
trusted library allocation
page read and write
1BC8E9E0000
unkown
page read and write
2AE7000
heap
page read and write
AA3000
heap
page read and write
2AEE000
heap
page read and write
1FAA1F7A000
unkown
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
A40000
trusted library allocation
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
252BCF5E000
heap
page read and write
1FAA1FCD000
unkown
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
800000
unkown
page read and write
AD8000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2C79000
heap
page read and write
2AEE000
heap
page read and write
1E2BBB08000
unkown
page read and write
A8E000
heap
page read and write
28F04EFF000
unkown
page read and write
59C000
stack
page read and write
28F0A440000
unkown
page read and write
2AE7000
heap
page read and write
2C07000
heap
page read and write
2AEE000
heap
page read and write
1FAA1F74000
unkown
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
3990000
trusted library allocation
page read and write
2AE7000
heap
page read and write
1140000
trusted library allocation
page read and write
17E59044000
unkown
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
14DCD1D0000
remote allocation
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
4A62000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
907FC7C000
stack
page read and write
2BA1000
heap
page read and write
8D4FF6E000
stack
page read and write
28F04E90000
unkown
page read and write
2AEE000
heap
page read and write
1FAA1853000
unkown
page read and write
2AE7000
heap
page read and write
1AC71C62000
unkown
page read and write
252BCF48000
heap
page read and write
1AC71C31000
unkown
page read and write
252BCF5D000
heap
page read and write
2AE7000
heap
page read and write
111F000
stack
page read and write
1FAA1F00000
unkown
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
9673EFD000
stack
page read and write
AB2000
heap
page read and write
28D29713000
unkown
page read and write
1DE20202000
unkown
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
1FAA1FAF000
unkown
page read and write
EC0000
trusted library allocation
page execute and read and write
1140000
trusted library allocation
page read and write
1D4D7302000
unkown
page read and write
17E59102000
unkown
page read and write
2AEE000
heap
page read and write
B80000
heap
page read and write
1FAA1F7C000
unkown
page read and write
49C52FE000
stack
page read and write
240000
heap
page read and write
2AE7000
heap
page read and write
4A68000
trusted library allocation
page read and write
2AEE000
heap
page read and write
E0F000
stack
page read and write
2AE7000
heap
page read and write
4A06000
trusted library allocation
page read and write
EC0000
trusted library allocation
page execute and read and write
2AE7000
heap
page read and write
8D4FFEE000
stack
page read and write
CAFC279000
stack
page read and write
1FAA1FDB000
unkown
page read and write
2AE7000
heap
page read and write
1FAA1E02000
unkown
page read and write
570BB7D000
stack
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2FDA000
heap
page read and write
2AEE000
heap
page read and write
2B9F000
heap
page read and write
2AEE000
heap
page read and write
4DD0000
heap
page read and write
2AEE000
heap
page read and write
52CD000
stack
page read and write
252BCF4F000
heap
page read and write
28F04EA2000
unkown
page read and write
1FAA1F86000
unkown
page read and write
2AE7000
heap
page read and write
1D4D7247000
unkown
page read and write
1FAA1F4B000
unkown
page read and write
28F05615000
unkown
page read and write
2AE7000
heap
page read and write
931EB2E000
stack
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
8E0000
heap
page read and write
1FAA1856000
unkown
page read and write
1BC8EA7D000
unkown
page read and write
A40000
trusted library allocation
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2B60000
trusted library allocation
page read and write
2AEE000
heap
page read and write
28F04E8C000
unkown
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2B20000
heap
page read and write
103E000
stack
page read and write
2AEE000
heap
page read and write
28D29637000
unkown
page read and write
28D29570000
unkown
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
1D4D7300000
unkown
page read and write
2C5B000
heap
page read and write
E83000
unkown
page readonly
2C42000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2C48000
heap
page read and write
2AEE000
heap
page read and write
1BC8E870000
heap
page read and write
2B9AACF0000
heap
page read and write
A40000
trusted library allocation
page read and write
2AE7000
heap
page read and write
4A0E000
trusted library allocation
page read and write
1E2BB28A000
unkown
page read and write
1FAA1F73000
unkown
page read and write
4A62000
trusted library allocation
page read and write
1FAA15C0000
heap
page read and write
2AE7000
heap
page read and write
65438FE000
stack
page read and write
1FAA1F8F000
unkown
page read and write
1FAA18DE000
unkown
page read and write
2CFE000
stack
page read and write
1AC71C13000
unkown
page read and write
18CFB6C0000
heap
page read and write
1AC71C5F000
unkown
page read and write
2C5B000
heap
page read and write
2AEE000
heap
page read and write
1AC71BA0000
heap
page read and write
252BCF2B000
heap
page read and write
2C67000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
28F04E78000
unkown
page read and write
1E2BB243000
unkown
page read and write
2AE7000
heap
page read and write
AC0000
heap
page read and write
2AE7000
heap
page read and write
E10000
unkown
page readonly
2AEE000
heap
page read and write
1DE20402000
unkown
page read and write
1E2BBB54000
unkown
page read and write
2AEE000
heap
page read and write
1AC71C7F000
unkown
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
518B000
stack
page read and write
2AE7000
heap
page read and write
5E0000
unkown
page readonly
4A7E000
trusted library allocation
page read and write
2AEE000
heap
page read and write
252BCF32000
heap
page read and write
2AEE000
heap
page read and write
ADF000
heap
page read and write
1E2BBB43000
unkown
page read and write
28D29626000
unkown
page read and write
E11000
unkown
page execute read
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
A40000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
4A62000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
28F04EAB000
unkown
page read and write
3AA827E000
stack
page read and write
2AE7000
heap
page read and write
250A000
unclassified section
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
910000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
4A62000
trusted library allocation
page read and write
AF5000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
17E59000000
unkown
page read and write
2AEE000
heap
page read and write
1FAA1FA1000
unkown
page read and write
2AE7000
heap
page read and write
1D4D7200000
unkown
page read and write
2AE7000
heap
page read and write
28D29470000
heap
page read and write
2AE7000
heap
page read and write
28F0A44D000
unkown
page read and write
1AC71C6A000
unkown
page read and write
2510000
heap
page read and write
1FAA1F90000
unkown
page read and write
2AE7000
heap
page read and write
2C0C000
heap
page read and write
4810000
heap
page read and write
28F0A506000
unkown
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
E7C000
unkown
page read and write
96746FF000
stack
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
49C53FE000
stack
page read and write
2AEE000
heap
page read and write
2B9AAD51000
heap
page read and write
AC0000
heap
page read and write
2C4E000
heap
page read and write
2AE7000
heap
page read and write
1AC71C6E000
unkown
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2C0F000
heap
page read and write
2AE7000
heap
page read and write
28F0A240000
trusted library allocation
page read and write
2AE7000
heap
page read and write
1E2BBA02000
unkown
page read and write
2AE7000
heap
page read and write
28F0A42E000
unkown
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
1FAA2402000
unkown
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
1FAA1F8A000
unkown
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
1FAA1F8E000
unkown
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
509D000
stack
page read and write
2AEE000
heap
page read and write
800000
unkown
page read and write
2C6D000
heap
page read and write
4A69000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2C6D000
heap
page read and write
E83000
unkown
page readonly
1FAA1916000
unkown
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
1E2BB313000
unkown
page read and write
17E59802000
unkown
page read and write
520F000
stack
page read and write
931F37F000
stack
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
28F04DF0000
unkown
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
3AC000
stack
page read and write
2AEE000
heap
page read and write
8D503FF000
stack
page read and write
3AA837D000
stack
page read and write
2C5B000
heap
page read and write
17E59100000
unkown
page read and write
1FAA1F88000
unkown
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
1D4D71D0000
unkown
page read and write
AB6000
heap
page read and write
2AE7000
heap
page read and write
49EC000
trusted library allocation
page read and write
2AEE000
heap
page read and write
1D4D7251000
unkown
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
1FAA1F87000
unkown
page read and write
8E0000
heap
page read and write
1AC71C7C000
unkown
page read and write
1E2BB293000
unkown
page read and write
76C000
unkown
page read and write
1E2BBB19000
unkown
page read and write
2AEE000
heap
page read and write
2C67000
heap
page read and write
2AE7000
heap
page read and write
49AB000
trusted library allocation
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
1FAA1F70000
unkown
page read and write
2AEE000
heap
page read and write
3AA770B000
stack
page read and write
9673D7B000
stack
page read and write
6542ECC000
stack
page read and write
2AEE000
heap
page read and write
18CFB824000
unkown
page read and write
1FAA1FCD000
unkown
page read and write
AEE000
heap
page read and write
6542F4E000
stack
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
1140000
trusted library allocation
page read and write
21EDC613000
unkown
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
28F0A6B0000
remote allocation
page read and write
2AEE000
heap
page read and write
1FAA18EB000
unkown
page read and write
69FA0AB000
stack
page read and write
5F0000
unkown
page readonly
2AE7000
heap
page read and write
1D4D7308000
unkown
page read and write
28F0A4A3000
unkown
page read and write
3AA7D7F000
stack
page read and write
2AEE000
heap
page read and write
931F177000
stack
page read and write
AE7000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2C67000
heap
page read and write
CAFC47F000
stack
page read and write
14DCD1D0000
remote allocation
page read and write
2AE7000
heap
page read and write
14DCCC58000
unkown
page read and write
17E58F20000
heap
page read and write
28F04E58000
unkown
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
3100000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
1AC71C6C000
unkown
page read and write
2AEE000
heap
page read and write
1FAA1FB2000
unkown
page read and write
2AE7000
heap
page read and write
1FAA1F70000
unkown
page read and write
1FAA1DF0000
remote allocation
page read and write
2B9AAD49000
heap
page read and write
2AE7000
heap
page read and write
E0AFD3B000
stack
page read and write
49AB000
trusted library allocation
page read and write
AD1000
heap
page read and write
1FAA1FCE000
unkown
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
A40000
trusted library allocation
page read and write
2AEE000
heap
page read and write
47FB67F000
stack
page read and write
A40000
trusted library allocation
page read and write
242447B000
stack
page read and write
18CFB84D000
unkown
page read and write
2AE7000
heap
page read and write
24246FF000
stack
page read and write
2AEE000
heap
page read and write
AB4000
heap
page read and write
2AEE000
heap
page read and write
A50000
heap
page read and write
28F04E3F000
unkown
page read and write
2AE7000
heap
page read and write
18CFB865000
unkown
page read and write
1D4D7140000
heap
page read and write
2AE7000
heap
page read and write
1FAA18C3000
unkown
page read and write
28F05600000
unkown
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
DCE000
stack
page read and write
AE4000
heap
page read and write
907F3FA000
stack
page read and write
18CFB6B0000
heap
page read and write
4A62000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
AE8000
heap
page read and write
2AE7000
heap
page read and write
B80000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
28D29E02000
unkown
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
1E2BBC00000
unkown
page read and write
E10000
unkown
page readonly
2AE7000
heap
page read and write
1FAA1FAD000
unkown
page read and write
2AE7000
heap
page read and write
931F07F000
stack
page read and write
1FAA1F88000
unkown
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
590000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
A40000
trusted library allocation
page read and write
2AE7000
heap
page read and write
A40000
trusted library allocation
page read and write
A40000
trusted library allocation
page read and write
AF5000
heap
page read and write
96741FD000
stack
page read and write
9F0000
trusted library allocation
page execute and read and write
4FDF000
stack
page read and write
2AE7000
heap
page read and write
1AC71C29000
unkown
page read and write
1FAA2400000
unkown
page read and write
1D4D7248000
unkown
page read and write
28F055E3000
trusted library allocation
page read and write
28F0A370000
trusted library allocation
page read and write
21EDC460000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
EC0000
trusted library allocation
page execute and read and write
28F0A358000
trusted library allocation
page read and write
1E2BB269000
unkown
page read and write
1AC71C47000
unkown
page read and write
2AE7000
heap
page read and write
1FAA1F73000
unkown
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
1BC8EA00000
unkown
page read and write
96745FF000
stack
page read and write
1FAA18EB000
unkown
page read and write
49B2000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
28F0A412000
unkown
page read and write
4A7E000
trusted library allocation
page read and write
1AC71C57000
unkown
page read and write
2AE7000
heap
page read and write
1E2BB1A0000
unkown
page read and write
907F5FF000
stack
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2C03000
heap
page read and write
2690000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
1E2BB25B000
unkown
page read and write
2FDA000
heap
page read and write
2AE7000
heap
page read and write
AA3000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
17E590BC000
unkown
page read and write
8EA000
heap
page read and write
2AE7000
heap
page read and write
21EDC713000
unkown
page read and write
4EC000
stack
page read and write
1DE20213000
unkown
page read and write
A9F000
heap
page read and write
2AEE000
heap
page read and write
1FAA1FCF000
unkown
page read and write
E83000
unkown
page readonly
2AE7000
heap
page read and write
CAFC2F9000
stack
page read and write
111F000
stack
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
4A62000
trusted library allocation
page read and write
2AEE000
heap
page read and write
252BCED0000
heap
page read and write
1FAA1F9B000
unkown
page read and write
49A3000
trusted library allocation
page read and write
1D4D727D000
unkown
page read and write
2FDA000
heap
page read and write
252BCF4C000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
28F0A1C0000
trusted library allocation
page read and write
2AE7000
heap
page read and write
1BC8EB02000
unkown
page read and write
53DF000
stack
page read and write
B80000
heap
page read and write
9E5000
trusted library allocation
page execute and read and write
1FAA1FAA000
unkown
page read and write
1AC71C4E000
unkown
page read and write
2AE7000
heap
page read and write
1ED727C000
stack
page read and write
49FA000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
252BCF37000
heap
page read and write
1FAA186F000
unkown
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
AB2000
heap
page read and write
2B9AAD8D000
heap
page read and write
3B4D000
stack
page read and write
A40000
trusted library allocation
page read and write
69FA87F000
stack
page read and write
2AEE000
heap
page read and write
4DA0000
remote allocation
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
1FAA1F86000
unkown
page read and write
2AEE000
heap
page read and write
501E000
stack
page read and write
28F04F02000
unkown
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
3AA847F000
stack
page read and write
1FAA1884000
unkown
page read and write
AF0000
heap
page read and write
2AEE000
heap
page read and write
E0F000
stack
page read and write
14DCCC00000
unkown
page read and write
1120000
trusted library allocation
page read and write
2C79000
heap
page read and write
907F4FA000
stack
page read and write
6543479000
stack
page read and write
2AE7000
heap
page read and write
1ED757E000
stack
page read and write
1FAA1F9A000
unkown
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
1FAA1F89000
unkown
page read and write
2AEE000
heap
page read and write
1D4D7288000
unkown
page read and write
1E2BB292000
unkown
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
1FAA18F3000
unkown
page read and write
A40000
trusted library allocation
page read and write
28F055F0000
trusted library allocation
page read and write
AD8000
heap
page read and write
1BC8EB08000
unkown
page read and write
1AC71C67000
unkown
page read and write
2AE7000
heap
page read and write
1D4D7313000
unkown
page read and write
21EDC450000
heap
page read and write
14DCCA40000
heap
page read and write
49C517E000
stack
page read and write
49FA000
trusted library allocation
page read and write
A40000
trusted library allocation
page read and write
1DE20315000
unkown
page read and write
2AE7000
heap
page read and write
1BC8EA13000
unkown
page read and write
1BC8EA61000
unkown
page read and write
2AE7000
heap
page read and write
E10000
unkown
page readonly
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
28F0A670000
trusted library allocation
page read and write
8E0000
heap
page read and write
EF0000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
28F04C80000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
A40000
trusted library allocation
page read and write
2AE7000
heap
page read and write
372D000
stack
page read and write
2AE7000
heap
page read and write
1FAA1FB7000
unkown
page read and write
2AE7000
heap
page read and write
A40000
trusted library allocation
page read and write
69FA5FB000
stack
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2FDA000
heap
page read and write
931F27F000
stack
page read and write
2AEE000
heap
page read and write
1FAA1F84000
unkown
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
28F061C0000
trusted library allocation
page read and write
2FDB000
heap
page read and write
1FAA1FCF000
unkown
page read and write
2AEE000
heap
page read and write
14DCC9D0000
heap
page read and write
2AE7000
heap
page read and write
907EEEB000
stack
page read and write
2AEE000
heap
page read and write
28F04E92000
unkown
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2CDE000
heap
page read and write
21EDC4C0000
heap
page read and write
2AEE000
heap
page read and write
14DCD202000
unkown
page read and write
2AEE000
heap
page read and write
2C79000
heap
page read and write
48A1000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2C6D000
heap
page read and write
A40000
trusted library allocation
page read and write
2AE7000
heap
page read and write
2AC000
stack
page read and write
2C61000
heap
page read and write
1E2BBB19000
unkown
page read and write
2AE7000
heap
page read and write
28F0A620000
trusted library allocation
page read and write
1AC71C7B000
unkown
page read and write
2B9AB990000
trusted library allocation
page read and write
397D000
stack
page read and write
2AEE000
heap
page read and write
A9F000
heap
page read and write
2B9C000
heap
page read and write
17E590CD000
unkown
page read and write
5140000
heap
page read and write
49FA000
trusted library allocation
page read and write
2AE7000
heap
page read and write
18CFB847000
unkown
page read and write
1DE20228000
unkown
page read and write
A40000
trusted library allocation
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
49C9000
trusted library allocation
page read and write
4A64000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
1AC71C3A000
unkown
page read and write
2AEE000
heap
page read and write
4DA0000
trusted library allocation
page read and write
8D0000
trusted library allocation
page execute and read and write
1FAA1F84000
unkown
page read and write
1FAA1DF0000
remote allocation
page read and write
9E0000
heap
page read and write
49B1000
trusted library allocation
page read and write
69FA67E000
stack
page read and write
10DE000
stack
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
8EA000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
17E590C4000
unkown
page read and write
2C6D000
heap
page read and write
E0B017A000
stack
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
1FAA1FDC000
unkown
page read and write
E7C000
unkown
page read and write
2BDE000
stack
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
252BCEB0000
heap
page read and write
A40000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
252BCF37000
heap
page read and write
4A62000
trusted library allocation
page read and write
ADD000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
931EBAE000
stack
page read and write
28F0A45E000
unkown
page read and write
E0B05FE000
stack
page read and write
28F04E00000
unkown
page read and write
28F05702000
unkown
page read and write
530E000
stack
page read and write
ADF000
heap
page read and write
4A62000
trusted library allocation
page read and write
28D29629000
unkown
page read and write
2AEE000
heap
page read and write
21EDC68A000
unkown
page read and write
2B10000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
1FAA1F6C000
unkown
page read and write
AF0000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2C61000
heap
page read and write
28F0A502000
unkown
page read and write
2C78000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2C11000
heap
page read and write
CAFC37F000
stack
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
1FAA1FA1000
unkown
page read and write
52B000
stack
page read and write
2AEE000
heap
page read and write
AE7000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
ADD000
heap
page read and write
2AEE000
heap
page read and write
A40000
trusted library allocation
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2C48000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2C79000
heap
page read and write
4B90000
trusted library allocation
page read and write
2C61000
heap
page read and write
2AE7000
heap
page read and write
28F0A394000
trusted library allocation
page read and write
30EF000
stack
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
28F0A4F9000
unkown
page read and write
8D0000
trusted library allocation
page execute and read and write
96743FF000
stack
page read and write
49AB000
trusted library allocation
page read and write
14DCCC02000
unkown
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
1E2BB265000
unkown
page read and write
2A1E000
stack
page read and write
1D4D7229000
unkown
page read and write
3840000
remote allocation
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
18CFBE80000
unkown
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
47FB37B000
stack
page read and write
2AEE000
heap
page read and write
1085000
trusted library allocation
page execute and read and write
252BCD80000
heap
page read and write
49FA000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
A40000
trusted library allocation
page read and write
1FAA183C000
unkown
page read and write
2AEE000
heap
page read and write
49C50FE000
stack
page read and write
48A0000
heap
page read and write
1DE20200000
unkown
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
28F0A400000
unkown
page read and write
21EDC68E000
unkown
page read and write
2C0A000
heap
page read and write
F00000
trusted library allocation
page read and write
1120000
trusted library allocation
page read and write
111F000
stack
page read and write
E0B087E000
stack
page read and write
2B9ABBE0000
heap
page readonly
2AE7000
heap
page read and write
2B9AAC80000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2B40000
heap
page read and write
880000
trusted library allocation
page execute and read and write
2C78000
heap
page read and write
28F0A461000
unkown
page read and write
9E0000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
DCE000
stack
page read and write
2C07000
heap
page read and write
2AE7000
heap
page read and write
590000
trusted library allocation
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
1BC8EA02000
unkown
page read and write
2AEE000
heap
page read and write
6543777000
stack
page read and write
2AE7000
heap
page read and write
511D000
stack
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2C14000
heap
page read and write
2AEE000
heap
page read and write
1FAA1F8A000
unkown
page read and write
21EDC680000
unkown
page read and write
A3D000
stack
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
1E2BBB16000
unkown
page read and write
2AEE000
heap
page read and write
2B9B000
stack
page read and write
1BC8EB00000
unkown
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
3AA7FFD000
stack
page read and write
2B9B000
heap
page read and write
1ED7A7E000
stack
page read and write
1E2BB040000
heap
page read and write
1090000
trusted library allocation
page execute and read and write
4CA1000
trusted library allocation
page read and write
1FAA1F90000
unkown
page read and write
2C55000
heap
page read and write
1E2BBB8E000
unkown
page read and write
2B9AAD8D000
heap
page read and write
387D000
stack
page read and write
1FAA1F7D000
unkown
page read and write
2AEE000
heap
page read and write
28F0A35E000
trusted library allocation
page read and write
A5B000
heap
page read and write
1FAA18AF000
unkown
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
1FAA1F90000
unkown
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
A40000
trusted library allocation
page read and write
2AEE000
heap
page read and write
1BC8EA89000
unkown
page read and write
2AEE000
heap
page read and write
1DE20230000
unkown
page read and write
2B50000
trusted library allocation
page read and write
28F04E97000
unkown
page read and write
28F0A630000
trusted library allocation
page read and write
1DE20323000
heap
page read and write
1FAA1F89000
unkown
page read and write
2AE7000
heap
page read and write
2C78000
heap
page read and write
21EDC5C0000
unkown
page read and write
28F05713000
unkown
page read and write
28F05704000
unkown
page read and write
96744FF000
stack
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
1E2BB0A0000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
18CFB870000
unkown
page read and write
28D29664000
unkown
page read and write
1D4D7213000
unkown
page read and write
2AE7000
heap
page read and write
28F0A4A0000
unkown
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2C61000
heap
page read and write
52B000
stack
page read and write
2AE7000
heap
page read and write
2B9F000
heap
page read and write
1140000
trusted library allocation
page read and write
28F04C90000
heap
page read and write
28F0A620000
trusted library allocation
page read and write
2B4B000
heap
page read and write
1FAA1F90000
unkown
page read and write
2AE7000
heap
page read and write
1150000
remote allocation
page read and write
18CFB720000
heap
page read and write
2AE7000
heap
page read and write
24244FF000
stack
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
1FAA1F99000
unkown
page read and write
1DE2022E000
unkown
page read and write
4FE0000
heap
page read and write
1FAA18E8000
unkown
page read and write
49C8000
trusted library allocation
page read and write
2AEE000
heap
page read and write
69FA4FB000
stack
page read and write
1BC8E8E0000
heap
page read and write
2BA1000
heap
page read and write
2AEE000
heap
page read and write
21EDC653000
unkown
page read and write
2AE7000
heap
page read and write
103E000
stack
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
1E2BB229000
unkown
page read and write
1FAA1F87000
unkown
page read and write
18CFB900000
unkown
page read and write
47FB17E000
stack
page read and write
2AE7000
heap
page read and write
1FAA1620000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
E7C000
unkown
page read and write
2AE7000
heap
page read and write
28F04E13000
unkown
page read and write
4A7E000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
28D29613000
unkown
page read and write
2AE7000
heap
page read and write
A40000
trusted library allocation
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
1FAA1F70000
unkown
page read and write
1AC71C46000
unkown
page read and write
2AEE000
heap
page read and write
1FAA1F6F000
unkown
page read and write
1FAA1F10000
unkown
page read and write
1FAA2402000
unkown
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
5F0000
unkown
page readonly
2AEE000
heap
page read and write
1FAA18A7000
unkown
page read and write
10DE000
stack
page read and write
1E2BB27A000
unkown
page read and write
28F04F14000
unkown
page read and write
1FAA1F7B000
unkown
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
10DE000
stack
page read and write
2C3D000
heap
page read and write
AE3000
heap
page read and write
49FA000
trusted library allocation
page read and write
49C54FE000
stack
page read and write
2AE7000
heap
page read and write
654337E000
stack
page read and write
28D2966B000
unkown
page read and write
2AEE000
heap
page read and write
480000
unkown
page read and write
1E2BBB02000
unkown
page read and write
2AE7000
heap
page read and write
28F0A4AA000
unkown
page read and write
252BCF4C000
heap
page read and write
21EDC64B000
unkown
page read and write
2509000
unclassified section
page readonly
2AE7000
heap
page read and write
52B000
stack
page read and write
2C67000
heap
page read and write
2AE7000
heap
page read and write
1085000
trusted library allocation
page execute and read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
1E2BB3F4000
unkown
page read and write
4A68000
trusted library allocation
page read and write
28D29702000
unkown
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2423FAE000
stack
page read and write
A40000
trusted library allocation
page read and write
1FAA1F7D000
unkown
page read and write
A40000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
28F0A4A8000
unkown
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
ADD000
heap
page read and write
1FAA1F97000
unkown
page read and write
18CFB902000
unkown
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2C79000
heap
page read and write
1FAA1F8E000
unkown
page read and write
6F0000
heap
page read and write
931EEFB000
stack
page read and write
2AEE000
heap
page read and write
1D4D7270000
unkown
page read and write
2AE7000
heap
page read and write
103E000
stack
page read and write
654387C000
stack
page read and write
21EDC708000
unkown
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
28F0A7A0000
trusted library allocation
page read and write
931EAAB000
stack
page read and write
48A1000
heap
page read and write
49B4000
trusted library allocation
page read and write
2AEE000
heap
page read and write
A40000
trusted library allocation
page read and write
2AEE000
heap
page read and write
17E58EC0000
heap
page read and write
3AA7EFC000
stack
page read and write
69FA1AE000
stack
page read and write
2B9AAC90000
trusted library allocation
page read and write
18CFB865000
unkown
page read and write
1BC8EA56000
unkown
page read and write
1DE20413000
unkown
page read and write
1FAA1F95000
unkown
page read and write
AE8000
heap
page read and write
2AEE000
heap
page read and write
1D4D723C000
unkown
page read and write
2BFC000
heap
page read and write
2AE7000
heap
page read and write
A40000
trusted library allocation
page read and write
107F000
stack
page read and write
6F5000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2C49000
heap
page read and write
1BC8EB13000
unkown
page read and write
2AE7000
heap
page read and write
1E2BBB00000
unkown
page read and write
1D4D724C000
unkown
page read and write
1150000
remote allocation
page read and write
48B0000
heap
page read and write
A9D000
heap
page read and write
590000
trusted library allocation
page read and write
2AE7000
heap
page read and write
28F0A350000
trusted library allocation
page read and write
1BC8EA27000
unkown
page read and write
A40000
trusted library allocation
page read and write
2AE7000
heap
page read and write
2C5B000
heap
page read and write
5F0000
unkown
page readonly
2B9AAF49000
heap
page read and write
A40000
trusted library allocation
page read and write
2AEE000
heap
page read and write
17E58EB0000
heap
page read and write
1DE20070000
unkown
page read and write
2AEE000
heap
page read and write
1D4D7A02000
unkown
page read and write
2AEE000
heap
page read and write
28D29600000
unkown
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
28F04E8E000
unkown
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
49C5000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
1AC71C65000
unkown
page read and write
2B9ABC50000
trusted library allocation
page read and write
2BE0000
heap
page read and write
1FAA18A5000
unkown
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2C78000
heap
page read and write
2AEE000
heap
page read and write
18CFB849000
unkown
page read and write
1BC8E880000
heap
page read and write
1FAA1F9A000
unkown
page read and write
570BF7F000
stack
page read and write
2AE7000
heap
page read and write
6542FCE000
stack
page read and write
1FAA1F78000
unkown
page read and write
1FAA1F88000
unkown
page read and write
252BCF4F000
heap
page read and write
2AEE000
heap
page read and write
1DE20300000
unkown
page read and write
2AEE000
heap
page read and write
21EDC63C000
unkown
page read and write
4A62000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
1ED78FD000
stack
page read and write
2DDC000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
28D2963D000
unkown
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
49A7000
trusted library allocation
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
AA3000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
17E59680000
unkown
page read and write
1ED777D000
stack
page read and write
4810000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
28F0A380000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
8D5027E000
stack
page read and write
28F0A6B0000
remote allocation
page read and write
2FDD000
heap
page read and write
2AE7000
heap
page read and write
ADE000
heap
page read and write
2D3B000
heap
page read and write
28F0A230000
trusted library allocation
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
382D000
stack
page read and write
2B9ABBD0000
trusted library allocation
page read and write
28F05759000
unkown
page read and write
2AEE000
heap
page read and write
3840000
remote allocation
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
4A6A000
trusted library allocation
page read and write
28D29675000
unkown
page read and write
2AEE000
heap
page read and write
1120000
trusted library allocation
page read and write
2AEE000
heap
page read and write
1085000
trusted library allocation
page execute and read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
51CE000
stack
page read and write
28F0A6B0000
remote allocation
page read and write
1E2BB213000
unkown
page read and write
907F6FB000
stack
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
28F0A4A0000
trusted library allocation
page read and write
2AEE000
heap
page read and write
1AC71C32000
unkown
page read and write
1FAA1849000
unkown
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
1D4D727C000
unkown
page read and write
2AE7000
heap
page read and write
24245F7000
stack
page read and write
28F04EA8000
unkown
page read and write
21EDC700000
unkown
page read and write
2AEE000
heap
page read and write
21EDC629000
unkown
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
28F0A380000
trusted library allocation
page read and write
2FDB000
heap
page read and write
1FAA1F70000
unkown
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
A40000
trusted library allocation
page read and write
2D30000
heap
page read and write
358F000
stack
page read and write
1AC72402000
unkown
page read and write
28F055E0000
trusted library allocation
page read and write
252BCF46000
heap
page read and write
2AE7000
heap
page read and write
28F05602000
unkown
page read and write
1FAA2463000
unkown
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
AE5000
heap
page read and write
4A62000
trusted library allocation
page read and write
2AEE000
heap
page read and write
1FAA184C000
unkown
page read and write
A40000
trusted library allocation
page read and write
2AEE000
heap
page read and write
49A7000
trusted library allocation
page read and write
2AEE000
heap
page read and write
49C507B000
stack
page read and write
1FAA1F91000
unkown
page read and write
28D29400000
heap
page read and write
2C0D000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
28F04EBD000
unkown
page read and write
2B9AAF50000
trusted library allocation
page read and write
2AEE000
heap
page read and write
A40000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2C0A000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
1FAA1F99000
unkown
page read and write
1FAA1908000
unkown
page read and write
17E59029000
unkown
page read and write
1FAA1FB7000
unkown
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
3AA7B7C000
stack
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
6543577000
stack
page read and write
14DCD1A0000
unkown
page read and write
2AEE000
heap
page read and write
1BC8EA3C000
unkown
page read and write
1AC71C42000
unkown
page read and write
2AEE000
heap
page read and write
1AC71C78000
unkown
page read and write
1090000
trusted library allocation
page execute and read and write
1FAA1F79000
unkown
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
1FAA1FB1000
unkown
page read and write
24247FE000
stack
page read and write
23F0000
trusted library allocation
page read and write
2AEE000
heap
page read and write
AD9000
heap
page read and write
1FAA1FAD000
unkown
page read and write
2AEE000
heap
page read and write
1DE20302000
unkown
page read and write
2AE7000
heap
page read and write
49C0000
trusted library allocation
page read and write
49FA000
trusted library allocation
page read and write
2AEE000
heap
page read and write
1FAA1F8E000
unkown
page read and write
A9F000
heap
page read and write
2AEE000
heap
page read and write
28F04F02000
unkown
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
DCE000
stack
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
AB2000
heap
page read and write
1FAA1F89000
unkown
page read and write
49A5000
trusted library allocation
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
8D4FEEA000
stack
page read and write
2C30000
heap
page read and write
2AEE000
heap
page read and write
21EDC602000
unkown
page read and write
8D502F9000
stack
page read and write
1DE2023D000
unkown
page read and write
2AE7000
heap
page read and write
1FAA1F8E000
unkown
page read and write
1E2BBB02000
unkown
page read and write
1FAA1829000
unkown
page read and write
252BD135000
heap
page read and write
1FAA1913000
unkown
page read and write
2C11000
heap
page read and write
1BC8EA5E000
unkown
page read and write
2A88000
heap
page read and write
1120000
trusted library allocation
page read and write
A40000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
A40000
trusted library allocation
page read and write
1AC71C00000
unkown
page read and write
2B9AAD86000
heap
page read and write
2B9AB980000
trusted library allocation
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
967392B000
stack
page read and write
28F0A7E0000
trusted library allocation
page read and write
1D4D724B000
unkown
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
AB2000
heap
page read and write
2AE7000
heap
page read and write
A40000
trusted library allocation
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
47FB57E000
stack
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
1BC8EA29000
unkown
page read and write
2AEE000
heap
page read and write
2AE8000
heap
page read and write
49C0000
trusted library allocation
page read and write
2AE7000
heap
page read and write
18CFB813000
unkown
page read and write
AB5000
heap
page read and write
2B9AAF45000
heap
page read and write
28F05758000
unkown
page read and write
21EDC66E000
unkown
page read and write
1AC71C45000
unkown
page read and write
4A6B000
trusted library allocation
page read and write
1FAA1F89000
unkown
page read and write
2AE7000
heap
page read and write
1E2BB287000
unkown
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
21EDCE02000
unkown
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
1FAA1F8B000
unkown
page read and write
E0B04FA000
stack
page read and write
69FA97F000
stack
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
49A2000
trusted library allocation
page read and write
2AE7000
heap
page read and write
EF0000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
4DA0000
remote allocation
page read and write
1E2BB277000
unkown
page read and write
48A1000
heap
page read and write
2AEE000
heap
page read and write
2C01000
heap
page read and write
2A5E000
stack
page read and write
2C4E000
heap
page read and write
18CFB800000
unkown
page read and write
17E5906E000
unkown
page read and write
47FB07B000
stack
page read and write
28F0A4F1000
unkown
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
69FA777000
stack
page read and write
4CB2000
trusted library allocation
page read and write
21EDC648000
unkown
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2C67000
heap
page read and write
18CFB850000
unkown
page read and write
2B50000
trusted library allocation
page read and write
28D2964E000
unkown
page read and write
2C67000
heap
page read and write
2C3D000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
AC0000
heap
page read and write
1AC71C40000
unkown
page read and write
1AC71C58000
unkown
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
3AA807B000
stack
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
47FB27B000
stack
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
A40000
trusted library allocation
page read and write
2AE0000
heap
page read and write
1E2BBB19000
unkown
page read and write
2D38000
heap
page read and write
505E000
stack
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AE7000
heap
page read and write
2C0F000
heap
page read and write
69FA12E000
stack
page read and write
1AC71C3D000
unkown
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
1140000
trusted library allocation
page read and write
1D4D7256000
unkown
page read and write
2AEE000
heap
page read and write
1AC71C3B000
unkown
page read and write
530000
heap
page read and write
2B9AAD10000
heap
page read and write
1AC71D02000
unkown
page read and write
2A9E000
stack
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
4DD7000
heap
page read and write
CAFC3F9000
stack
page read and write
773000
unkown
page readonly
2AE7000
heap
page read and write
860000
trusted library allocation
page execute and read and write
2AEE000
heap
page read and write
F00000
trusted library allocation
page read and write
1BC8F202000
unkown
page read and write
2AE7000
heap
page read and write
2CDE000
heap
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
28F0A4DB000
unkown
page read and write
3AA7E7E000
stack
page read and write
907FE7E000
stack
page read and write
107F000
stack
page read and write
2AEE000
heap
page read and write
348E000
stack
page read and write
1FAA18BC000
unkown
page read and write
1E2BB030000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2500000
unclassified section
page read and write
2AEE000
heap
page read and write
4DA0000
remote allocation
page read and write
49EC000
trusted library allocation
page read and write
2AE7000
heap
page read and write
28F05718000
unkown
page read and write
2AEE000
heap
page read and write
654367E000
stack
page read and write
1FAA2402000
unkown
page read and write
2AE7000
heap
page read and write
4A68000
trusted library allocation
page read and write
2AEE000
heap
page read and write
870000
heap
page read and write
4A6A000
trusted library allocation
page read and write
2AE7000
heap
page read and write
21EDC64E000
unkown
page read and write
2BFE000
heap
page read and write
5E0000
unkown
page readonly
2AE7000
heap
page read and write
5E0000
unkown
page readonly
1FAA18D6000
unkown
page read and write
1AC71C60000
unkown
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2AEE000
heap
page read and write
2C42000
heap
page read and write
A40000
trusted library allocation
page read and write
2C37000
heap
page read and write
9673FFD000
stack
page read and write
28F04EAD000
unkown
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
28F0A500000
unkown
page read and write
1E2BB200000
unkown
page read and write
1FAA1F8C000
unkown
page read and write
1FAA1DF0000
remote allocation
page read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
1FAA17F0000
unkown
page read and write
29DE000
stack
page read and write
8D0000
trusted library allocation
page execute and read and write
2AE7000
heap
page read and write
2AEE000
heap
page read and write
28F055C1000
trusted library allocation
page read and write
1FAA1F13000
unkown
page read and write
28F0A371000
trusted library allocation
page read and write
4EC000
stack
page read and write
2AE7000
heap
page read and write
2AE7000
heap
page read and write
28F05718000
unkown
page read and write
28F0A4B0000
trusted library allocation
page read and write
28F04E7C000
unkown
page read and write
AA3000
heap
page read and write
2AEE000
heap
page read and write
8D5037F000
stack
page read and write
2AEE000
heap
page read and write
A40000
trusted library allocation
page read and write
1FAA1F70000
unkown
page read and write
1FAA1F8E000
unkown
page read and write
2AEE000
heap
page read and write
There are 1862 hidden memdumps, click here to show them.