IOC Report

loading gif

Files

File Path
Type
Category
Malicious
G.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x52f2e4c5, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 61414 bytes, 1 file
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
modified
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\Logs\dosvc.20220129_060738_769.etl
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\G.dll"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\G.dll",#1
malicious
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\G.dll
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\G.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\G.dll,DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\G.dll",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\G.dll",DllRegisterServer
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\G.dll",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Hqelimm\rmkavwi.ypm",YOtq
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Hqelimm\rmkavwi.ypm",DllRegisterServer
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 13 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
unknown
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
unknown
https://dev.ditu.live.com/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
unknown
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
unknown
https://dev.ditu.live.com/REST/v1/Transit/Stops/
unknown
https://t0.tiles.ditu.live.com/tiles/gen
unknown
https://dev.virtualearth.net/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Routes/Walking
unknown
https://dev.virtualearth.net/REST/v1/Transit/Stops/
unknown
http://crl.ver)
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
unknown
https://www.tiktok.com/legal/report/feedback
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
unknown
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
unknown
https://%s.xboxlive.com
unknown
https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://dev.virtualearth.net/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?entry=
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
unknown
https://dynamic.t
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
https://disneyplus.com/legal.
unknown
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
unknown
https://ecn.dev.virtualearth.net/mapcontrol/roadshield.ashx?bucket=
unknown
https://activity.windows.com
unknown
http://www.bingmapsportal.com
unknown
https://dev.ditu.live.com/REST/v1/Locations
unknown
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
http://help.disneyplus.com.
unknown
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://%s.dnet.xboxlive.com
unknown
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
There are 37 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
195.154.133.20
unknown
France
malicious
185.157.82.211
unknown
Poland
malicious
212.237.17.99
unknown
Italy
malicious
79.172.212.216
unknown
Hungary
malicious
110.232.117.186
unknown
Australia
malicious
173.214.173.220
unknown
United States
malicious
212.24.98.99
unknown
Lithuania
malicious
138.185.72.26
unknown
Brazil
malicious
178.63.25.185
unknown
Germany
malicious
160.16.102.168
unknown
Japan
malicious
81.0.236.90
unknown
Czech Republic
malicious
103.75.201.2
unknown
Thailand
malicious
216.158.226.206
unknown
United States
malicious
45.118.115.99
unknown
Indonesia
malicious
51.15.4.22
unknown
France
malicious
159.89.230.105
unknown
United States
malicious
162.214.50.39
unknown
United States
malicious
200.17.134.35
unknown
Brazil
malicious
217.182.143.207
unknown
France
malicious
107.182.225.142
unknown
United States
malicious
51.38.71.0
unknown
France
malicious
45.118.135.203
unknown
Japan
malicious
50.116.54.215
unknown
United States
malicious
131.100.24.231
unknown
Brazil
malicious
46.55.222.11
unknown
Bulgaria
malicious
41.76.108.46
unknown
South Africa
malicious
173.212.193.249
unknown
Germany
malicious
45.176.232.124
unknown
Colombia
malicious
178.79.147.66
unknown
United Kingdom
malicious
212.237.5.209
unknown
Italy
malicious
162.243.175.63
unknown
United States
malicious
176.104.106.96
unknown
Serbia
malicious
207.38.84.195
unknown
United States
malicious
164.68.99.3
unknown
Germany
malicious
192.254.71.210
unknown
United States
malicious
212.237.56.116
unknown
Italy
malicious
104.168.155.129
unknown
United States
malicious
45.142.114.231
unknown
Germany
malicious
203.114.109.124
unknown
Thailand
malicious
209.59.138.75
unknown
United States
malicious
159.8.59.82
unknown
United States
malicious
129.232.188.93
unknown
South Africa
malicious
58.227.42.236
unknown
Korea Republic of
malicious
158.69.222.101
unknown
Canada
malicious
104.251.214.46
unknown
United States
malicious
127.0.0.1
unknown
unknown
There are 36 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
MonthID
There are 2 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
44D1000
trusted library allocation
page execute read
malicious
4681000
trusted library allocation
page execute read
malicious
4EB1000
trusted library allocation
page execute read
malicious
32A0000
trusted library allocation
page execute and read and write
malicious
4B41000
trusted library allocation
page execute read
malicious
4FC0000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
5341000
trusted library allocation
page execute read
malicious
53C0000
trusted library allocation
page execute and read and write
malicious
4161000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
5391000
trusted library allocation
page execute read
malicious
49F1000
trusted library allocation
page execute read
malicious
52E1000
trusted library allocation
page execute read
malicious
5861000
trusted library allocation
page execute read
malicious
54B1000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
5360000
trusted library allocation
page execute and read and write
malicious
5310000
trusted library allocation
page execute and read and write
malicious
54F0000
trusted library allocation
page execute and read and write
malicious
5621000
trusted library allocation
page execute read
malicious
5A00000
trusted library allocation
page execute and read and write
malicious
52B0000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
53E0000
trusted library allocation
page execute and read and write
malicious
5830000
trusted library allocation
page execute and read and write
malicious
5480000
trusted library allocation
page execute and read and write
malicious
2D80000
trusted library allocation
page execute and read and write
malicious
4BC0000
trusted library allocation
page execute and read and write
malicious
4F11000
trusted library allocation
page execute read
malicious
4FA1000
trusted library allocation
page execute read
malicious
50C1000
trusted library allocation
page execute read
malicious
4FF1000
trusted library allocation
page execute read
malicious
5801000
trusted library allocation
page execute read
malicious
5281000
trusted library allocation
page execute read
malicious
4EC0000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
5411000
trusted library allocation
page execute read
malicious
4EE0000
trusted library allocation
page execute and read and write
malicious
5250000
trusted library allocation
page execute and read and write
malicious
2A30000
trusted library allocation
page execute and read and write
malicious
44A0000
trusted library allocation
page execute and read and write
malicious
4CF1000
trusted library allocation
page execute read
malicious
4130000
trusted library allocation
page execute and read and write
malicious
49A1000
trusted library allocation
page execute read
malicious
4F70000
trusted library allocation
page execute and read and write
malicious
5441000
trusted library allocation
page execute read
malicious
4EF1000
trusted library allocation
page execute read
malicious
49C0000
trusted library allocation
page execute and read and write
malicious
57D0000
trusted library allocation
page execute and read and write
malicious
4AF0000
trusted library allocation
page execute and read and write
malicious
4E80000
trusted library allocation
page execute and read and write
malicious
2DB1000
trusted library allocation
page execute read
malicious
5A31000
trusted library allocation
page execute read
malicious
58C1000
trusted library allocation
page execute read
malicious
4E20000
trusted library allocation
page execute and read and write
malicious
51A1000
trusted library allocation
page execute read
malicious
5080000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
2A61000
trusted library allocation
page execute read
malicious
4650000
trusted library allocation
page execute and read and write
malicious
5170000
trusted library allocation
page execute and read and write
malicious
4E51000
trusted library allocation
page execute read
malicious
5890000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
288529F3000
trusted library allocation
page read and write
2DFD6F10000
trusted library allocation
page read and write
1CDD0470000
unkown
page read and write
238D1620000
heap
page read and write
10000000
unkown
page readonly
29E4000
heap
page read and write
28857A70000
trusted library allocation
page read and write
2DFD7330000
trusted library allocation
page read and write
5520000
trusted library allocation
page read and write
32B0000
heap
page read and write
20CDDF13000
unkown
page read and write
20CDDF85000
unkown
page read and write
2C18542C000
unkown
page read and write
29E4000
heap
page read and write
9D1E9FE000
stack
page read and write
20CDDFB4000
unkown
page read and write
1F987EA0000
heap
page read and write
28852140000
heap
page read and write
6C334FE000
stack
page read and write
4A41000
heap
page read and write
29B0AE90000
heap
page read and write
20CDE402000
unkown
page read and write
4FA0000
trusted library allocation
page read and write
2BE0000
heap
page read and write
6C331FF000
stack
page read and write
4F7E000
stack
page read and write
4A41000
heap
page read and write
10053000
unkown
page read and write
238D15C0000
heap
page read and write
10053000
unkown
page read and write
29E4000
heap
page read and write
214B7F14000
heap
page read and write
9840FCD000
stack
page read and write
9D1E87E000
stack
page read and write
323D000
stack
page read and write
20CDD64D000
unkown
page read and write
1F865380000
heap
page read and write
1CDD0513000
unkown
page read and write
20CDDF83000
unkown
page read and write
29E4000
heap
page read and write
28852276000
unkown
page read and write
B020000
remote allocation
page read and write
EA12AFE000
stack
page read and write
50B0000
remote allocation
page read and write
28857680000
trusted library allocation
page read and write
10046000
unkown
page readonly
2C185476000
unkown
page read and write
2B35000
heap
page read and write
20CDE402000
unkown
page read and write
40A0000
heap
page read and write
29E4000
heap
page read and write
574F000
stack
page read and write
1F865482000
unkown
page read and write
5247000
trusted library allocation
page read and write
5463000
trusted library allocation
page read and write
2D3A000
heap
page read and write
6C32DFF000
stack
page read and write
1F865464000
unkown
page read and write
29E4000
heap
page read and write
288521E1000
trusted library allocation
page read and write
4A50000
heap
page read and write
20CDE402000
unkown
page read and write
20CDD63A000
unkown
page read and write
4A41000
heap
page read and write
143F000
stack
page read and write
28857AB0000
trusted library allocation
page read and write
20CDD658000
unkown
page read and write
E3084FB000
stack
page read and write
29B0B660000
unkown
page read and write
29E4000
heap
page read and write
4ED4000
trusted library allocation
page read and write
1CDD0502000
unkown
page read and write
2DFD718E000
heap
page read and write
4A41000
heap
page read and write
1005A000
unkown
page readonly
51C4000
trusted library allocation
page read and write
1D664060000
remote allocation
page read and write
FFB787E000
stack
page read and write
2C18543A000
unkown
page read and write
51E1000
trusted library allocation
page read and write
2106FDA0000
heap
page read and write
2DFD718E000
heap
page read and write
20CDDF85000
unkown
page read and write
28D0000
remote allocation
page read and write
20CDDFA7000
unkown
page read and write
20CDDF78000
unkown
page read and write
2C185452000
unkown
page read and write
53BE000
stack
page read and write
DCBA677000
stack
page read and write
28852222000
unkown
page read and write
10053000
unkown
page read and write
238D1902000
unkown
page read and write
3490000
trusted library allocation
page read and write
238D1829000
unkown
page read and write
B44E000
trusted library allocation
page read and write
2C185438000
unkown
page read and write
20CDD656000
unkown
page read and write
4A41000
heap
page read and write
15FEE000
trusted library allocation
page read and write
21070067000
unkown
page read and write
288577E4000
trusted library allocation
page read and write
2BC0000
trusted library allocation
page read and write
9D1E97C000
stack
page read and write
29E4000
heap
page read and write
20CDDFAB000
unkown
page read and write
28857800000
unkown
page read and write
133E000
stack
page read and write
4A41000
heap
page read and write
5BCADFE000
stack
page read and write
4530000
heap
page read and write
20CDDF8A000
unkown
page read and write
4AFE000
stack
page read and write
20CDD6EB000
unkown
page read and write
4A41000
heap
page read and write
20CDDF72000
unkown
page read and write
238D1800000
unkown
page read and write
29B0B06A000
unkown
page read and write
1D6639D0000
unkown
page read and write
288577B0000
trusted library allocation
page read and write
29E4000
heap
page read and write
6C327BB000
stack
page read and write
21070082000
unkown
page read and write
29E4000
heap
page read and write
2C185453000
unkown
page read and write
1F988013000
unkown
page read and write
4940000
trusted library allocation
page read and write
2EBB000
stack
page read and write
30F3000
heap
page read and write
4900000
trusted library allocation
page read and write
288577D0000
trusted library allocation
page read and write
214B7F11000
heap
page read and write
5BCA30C000
stack
page read and write
E308777000
stack
page read and write
50E4000
trusted library allocation
page read and write
214B7EF6000
heap
page read and write
20CDD6D8000
unkown
page read and write
3F9F000
stack
page read and write
2870000
heap
page read and write
28852307000
unkown
page read and write
2B3A977000
stack
page read and write
3590000
heap
page read and write
1F988000000
unkown
page read and write
29B0B07A000
unkown
page read and write
28857899000
unkown
page read and write
28857B00000
remote allocation
page read and write
DCBAA7B000
stack
page read and write
10057000
unkown
page read and write
20CDDFBE000
unkown
page read and write
1F988102000
unkown
page read and write
2885783C000
unkown
page read and write
2C18547C000
unkown
page read and write
5468000
trusted library allocation
page read and write
2F20000
trusted library allocation
page read and write
CC0000
heap
page read and write
2FFA000
heap
page read and write
9841877000
stack
page read and write
21070100000
unkown
page read and write
10046000
unkown
page readonly
20CDD66B000
unkown
page read and write
550000
trusted library allocation
page read and write
288578E1000
unkown
page read and write
2DFD7149000
heap
page read and write
FFB752A000
stack
page read and write
29E4000
heap
page read and write
4184000
trusted library allocation
page read and write
984167F000
stack
page read and write
DEE000
stack
page read and write
1F988113000
unkown
page read and write
DCBA879000
stack
page read and write
28853600000
trusted library allocation
page read and write
20CDDF91000
unkown
page read and write
2B80000
remote allocation
page read and write
3FC0000
heap
page read and write
29B0AEA0000
heap
page read and write
238D15B0000
heap
page read and write
28852271000
unkown
page read and write
54B0000
trusted library allocation
page read and write
28857902000
unkown
page read and write
2885228F000
unkown
page read and write
4FE0000
heap
page read and write
4A40000
heap
page read and write
20CDDFCB000
unkown
page read and write
2A58000
heap
page read and write
1005A000
unkown
page readonly
5340000
trusted library allocation
page read and write
5204000
trusted library allocation
page read and write
29E4000
heap
page read and write
4D13000
trusted library allocation
page read and write
29B0B029000
unkown
page read and write
1F988044000
unkown
page read and write
33A0000
heap
page read and write
2C185429000
unkown
page read and write
1F865456000
unkown
page read and write
288578ED000
unkown
page read and write
29E4000
heap
page read and write
51A0000
trusted library allocation
page read and write
4F73000
heap
page read and write
214B7EF6000
heap
page read and write
DCBAF7B000
stack
page read and write
10057000
unkown
page read and write
214B7F0F000
heap
page read and write
49C3000
trusted library allocation
page read and write
2C185447000
unkown
page read and write
20CDE402000
unkown
page read and write
28852B02000
unkown
page read and write
28852302000
unkown
page read and write
2EE0000
remote allocation
page read and write
21070102000
unkown
page read and write
2B63000
heap
page read and write
29E4000
heap
page read and write
28852221000
unkown
page read and write
4A3F000
stack
page read and write
20CDDF6D000
unkown
page read and write
4E50000
trusted library allocation
page read and write
1D663A2A000
unkown
page read and write
3480000
heap
page read and write
4A41000
heap
page read and write
2DFD7E80000
trusted library allocation
page read and write
4A41000
heap
page read and write
46A3000
trusted library allocation
page read and write
1F9880C5000
unkown
page read and write
2C185502000
unkown
page read and write
2B3A7FB000
stack
page read and write
2C185478000
unkown
page read and write
20CDD66B000
unkown
page read and write
28857A80000
trusted library allocation
page read and write
2C18544F000
unkown
page read and write
3660000
trusted library allocation
page read and write
27A0000
heap
page read and write
3031000
heap
page read and write
5212000
trusted library allocation
page read and write
2C185485000
unkown
page read and write
29E4000
heap
page read and write
20CDDF87000
unkown
page read and write
29E4000
heap
page read and write
1CDD043C000
unkown
page read and write
36F0000
heap
page read and write
2FF0000
heap
page read and write
1005A000
unkown
page readonly
1F865502000
unkown
page read and write
20CDDF7D000
unkown
page read and write
4A41000
heap
page read and write
20CDDF8A000
unkown
page read and write
2885780D000
unkown
page read and write
2DFD7E60000
heap
page readonly
20CDDF9A000
unkown
page read and write
21070108000
unkown
page read and write
214B7D70000
heap
page read and write
20CDDC60000
unkown
page read and write
21070000000
unkown
page read and write
29E4000
heap
page read and write
3200000
heap
page read and write
53B3000
trusted library allocation
page read and write
28852B18000
unkown
page read and write
2EB0000
heap
page read and write
1CDD0413000
unkown
page read and write
2DD4000
trusted library allocation
page read and write
DCBA47B000
stack
page read and write
4A13000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
1CDD03E0000
unkown
page read and write
29E4000
heap
page read and write
2E7C000
stack
page read and write
29E4000
heap
page read and write
29E4000
heap
page read and write
2C18546A000
unkown
page read and write
4A41000
heap
page read and write
AECE000
trusted library allocation
page read and write
FFB7A7A000
stack
page read and write
ADDE000
trusted library allocation
page read and write
28857BF0000
trusted library allocation
page read and write
4A41000
heap
page read and write
29B0B113000
unkown
page read and write
E30867E000
stack
page read and write
5884000
trusted library allocation
page read and write
1CDD0453000
unkown
page read and write
4A41000
heap
page read and write
4B64000
trusted library allocation
page read and write
4A41000
heap
page read and write
46A4000
trusted library allocation
page read and write
5BCAEFC000
stack
page read and write
5BCABFC000
stack
page read and write
29E4000
heap
page read and write
1D6638D0000
heap
page read and write
20CDD702000
unkown
page read and write
288577E0000
trusted library allocation
page read and write
20CDDFAC000
unkown
page read and write
2D30000
heap
page read and write
2C185442000
unkown
page read and write
20CDD653000
unkown
page read and write
20CDD64F000
unkown
page read and write
214B7F11000
heap
page read and write
2885228D000
unkown
page read and write
20CDDF9D000
unkown
page read and write
29E4000
heap
page read and write
5222000
trusted library allocation
page read and write
1CDD0400000
unkown
page read and write
552BEFC000
stack
page read and write
288578E9000
unkown
page read and write
1F9880CC000
unkown
page read and write
4BBB000
stack
page read and write
29E4000
heap
page read and write
AB9FE7E000
stack
page read and write
20CDDF73000
unkown
page read and write
2EE0000
remote allocation
page read and write
20CDDF87000
unkown
page read and write
238D183D000
unkown
page read and write
29E4000
heap
page read and write
6C32BFB000
stack
page read and write
630000
heap
page read and write
4A41000
heap
page read and write
516E000
stack
page read and write
20CDE402000
unkown
page read and write
6C332FF000
stack
page read and write
10057000
unkown
page read and write
20CDDFC6000
unkown
page read and write
2C18547F000
unkown
page read and write
238D186B000
unkown
page read and write
20CDDF95000
unkown
page read and write
5800000
trusted library allocation
page read and write
5470000
trusted library allocation
page read and write
288520E0000
heap
page read and write
288522AC000
unkown
page read and write
5280000
trusted library allocation
page read and write
2BAB000
heap
page read and write
20CDD649000
unkown
page read and write
29E4000
heap
page read and write
29E4000
heap
page read and write
2B79000
heap
page read and write
50C0000
trusted library allocation
page read and write
2C185C02000
unkown
page read and write
2C18543E000
unkown
page read and write
4A41000
heap
page read and write
2510000
remote allocation
page read and write
288577B0000
trusted library allocation
page read and write
552C0FD000
stack
page read and write
20CDD6E3000
unkown
page read and write
20CDDF6F000
unkown
page read and write
6C333FE000
stack
page read and write
29E4000
heap
page read and write
29E4000
heap
page read and write
288531E0000
trusted library allocation
page read and write
2DFD7C10000
trusted library allocation
page read and write
20CDDF9C000
unkown
page read and write
4A41000
heap
page read and write
24EB000
stack
page read and write
2107004A000
unkown
page read and write
28D0000
remote allocation
page read and write
214B7EEB000
heap
page read and write
5363000
trusted library allocation
page read and write
2DFD7186000
heap
page read and write
288577A0000
trusted library allocation
page read and write
29B0B108000
unkown
page read and write
5A54000
trusted library allocation
page read and write
1450000
heap
page read and write
2B63000
heap
page read and write
2B1C000
stack
page read and write
29E4000
heap
page read and write
40B0000
trusted library allocation
page read and write
2C18546C000
unkown
page read and write
20CDDFA7000
unkown
page read and write
238D1860000
unkown
page read and write
29E4000
heap
page read and write
1F988932000
unkown
page read and write
10046000
unkown
page readonly
20CDD64B000
unkown
page read and write
40A3000
heap
page read and write
1005A000
unkown
page readonly
EA1267E000
stack
page read and write
9D1EDFE000
stack
page read and write
4F2E000
stack
page read and write
44D0000
trusted library allocation
page read and write
1005A000
unkown
page readonly
33B0000
heap
page read and write
503D000
stack
page read and write
2C185430000
unkown
page read and write
29E4000
heap
page read and write
E02487E000
stack
page read and write
4A41000
heap
page read and write
1D663A34000
unkown
page read and write
3F5E000
stack
page read and write
2B73000
heap
page read and write
3510000
heap
page read and write
21070056000
unkown
page read and write
20CDDF72000
unkown
page read and write
12F0000
heap
page read and write
54AE000
stack
page read and write
29E4000
heap
page read and write
58E3000
trusted library allocation
page read and write
9D1ECFE000
stack
page read and write
2DFD7310000
trusted library allocation
page read and write
1F86542A000
unkown
page read and write
20CDD6EB000
unkown
page read and write
20CDD69A000
unkown
page read and write
20CDDF83000
unkown
page read and write
4F13000
trusted library allocation
page read and write
29E4000
heap
page read and write
28852213000
unkown
page read and write
365E000
stack
page read and write
5237000
trusted library allocation
page read and write
20CDDFC6000
unkown
page read and write
28857900000
unkown
page read and write
28857B00000
remote allocation
page read and write
2A55000
heap
page read and write
28852278000
unkown
page read and write
20CDDF89000
unkown
page read and write
1D663A02000
unkown
page read and write
29B0B000000
unkown
page read and write
238D185B000
unkown
page read and write
20CDDD20000
remote allocation
page read and write
5BCAB7C000
stack
page read and write
2AB0000
heap
page read and write
1F988023000
unkown
page read and write
2A3C000
stack
page read and write
1CDD0500000
unkown
page read and write
20CDE403000
unkown
page read and write
2FF0000
remote allocation
page read and write
29E4000
heap
page read and write
9D1EBF7000
stack
page read and write
28857A0E000
trusted library allocation
page read and write
2C185459000
unkown
page read and write
20CDD6AB000
unkown
page read and write
238D1E02000
unkown
page read and write
1F988070000
unkown
page read and write
1F9880BB000
unkown
page read and write
4A41000
heap
page read and write
214B7F06000
heap
page read and write
20CDDF9A000
unkown
page read and write
2DFD70D0000
trusted library allocation
page read and write
5014000
trusted library allocation
page read and write
EA128FE000
stack
page read and write
2C185350000
heap
page read and write
20CDDF94000
unkown
page read and write
1D663870000
heap
page read and write
2C185340000
heap
page read and write
52E0000
trusted library allocation
page read and write
2FA0000
heap
page read and write
29B0B100000
unkown
page read and write
1D663A58000
unkown
page read and write
29E4000
heap
page read and write
1F988900000
unkown
page read and write
4A41000
heap
page read and write
10057000
unkown
page read and write
1F865413000
unkown
page read and write
214B7F1C000
heap
page read and write
E3081AE000
stack
page read and write
29E5000
heap
page read and write
54D4000
trusted library allocation
page read and write
288522AA000
unkown
page read and write
ABA00FB000
stack
page read and write
20CDDF86000
unkown
page read and write
2B3A33E000
stack
page read and write
29E4000
heap
page read and write
4A41000
heap
page read and write
1CDD044B000
unkown
page read and write
29E4000
heap
page read and write
28AB000
stack
page read and write
D2C000
stack
page read and write
4EB0000
trusted library allocation
page read and write
552BE7E000
stack
page read and write
5643000
trusted library allocation
page read and write
1F98808A000
unkown
page read and write
20CDD69A000
unkown
page read and write
214B7EE0000
heap
page read and write
28D0000
remote allocation
page read and write
32E7000
heap
page read and write
214B7F20000
heap
page read and write
2F4F000
stack
page read and write
29E4000
heap
page read and write
29E4000
heap
page read and write
238D1813000
unkown
page read and write
20CDDF98000
unkown
page read and write
2E20000
heap
page read and write
20CDDF84000
unkown
page read and write
50C0000
heap
page read and write
29E4000
heap
page read and write
29E4000
heap
page read and write
2C185475000
unkown
page read and write
5440000
trusted library allocation
page read and write
AB9FEFE000
stack
page read and write
4160000
trusted library allocation
page read and write
51C3000
trusted library allocation
page read and write
2DFD7E70000
trusted library allocation
page read and write
29E4000
heap
page read and write
29E4000
heap
page read and write
2FAE000
stack
page read and write
2B73000
heap
page read and write
4A41000
heap
page read and write
4F14000
trusted library allocation
page read and write
20CDDFA5000
unkown
page read and write
1D664060000
remote allocation
page read and write
5BCA8FF000
stack
page read and write
29B0B03C000
unkown
page read and write
2A1A000
heap
page read and write
21070059000
unkown
page read and write
5221000
trusted library allocation
page read and write
20CDD600000
unkown
page read and write
1F86545E000
unkown
page read and write
9841577000
stack
page read and write
5227000
trusted library allocation
page read and write
29E4000
heap
page read and write
28852302000
unkown
page read and write
29E4000
heap
page read and write
4B90000
heap
page read and write
5254000
trusted library allocation
page read and write
45D0000
trusted library allocation
page read and write
2510000
remote allocation
page read and write
5A53000
trusted library allocation
page read and write
29E4000
heap
page read and write
10053000
unkown
page read and write
2EE0000
remote allocation
page read and write
4FF0000
trusted library allocation
page read and write
28852B04000
unkown
page read and write
214B7F1C000
heap
page read and write
10053000
unkown
page read and write
20CDE402000
unkown
page read and write
4A41000
heap
page read and write
2FEF000
stack
page read and write
2C8F000
stack
page read and write
2F55000
heap
page read and write
2885227B000
unkown
page read and write
20CDE402000
unkown
page read and write
30B0000
heap
page read and write
4E80000
trusted library allocation
page read and write
28852257000
unkown
page read and write
B1FE000
stack
page read and write
4A30000
heap
page read and write
326C000
stack
page read and write
4A41000
heap
page read and write
29E4000
heap
page read and write
29E4000
heap
page read and write
1F865390000
heap
page read and write
58E4000
trusted library allocation
page read and write
20CDDF87000
unkown
page read and write
984127E000
stack
page read and write
1D664202000
unkown
page read and write
20CDDF84000
unkown
page read and write
2B3A87E000
stack
page read and write
2DFD6F00000
heap
page read and write
5BCA77C000
stack
page read and write
20CDDF68000
unkown
page read and write
2C185446000
unkown
page read and write
214B8130000
heap
page read and write
2B3E000
stack
page read and write
2107005A000
unkown
page read and write
2B23000
heap
page read and write
28852B58000
unkown
page read and write
20CDDF70000
unkown
page read and write
304C000
heap
page read and write
5237000
trusted library allocation
page read and write
1CDD047D000
unkown
page read and write
20CDD652000
unkown
page read and write
29E4000
heap
page read and write
5433000
trusted library allocation
page read and write
28852200000
unkown
page read and write
28857AD0000
trusted library allocation
page read and write
FFB7979000
stack
page read and write
287A000
heap
page read and write
2B3A2BC000
stack
page read and write
5A0000
heap
page read and write
32BA000
heap
page read and write
29E4000
heap
page read and write
1CDD0350000
heap
page read and write
2B3AA7E000
stack
page read and write
28852170000
unkown
page read and write
5468000
trusted library allocation
page read and write
337F000
stack
page read and write
2DD3000
trusted library allocation
page read and write
ABA01F7000
stack
page read and write
20CDDF80000
unkown
page read and write
2B80000
remote allocation
page read and write
29B0B802000
unkown
page read and write
A49E000
trusted library allocation
page read and write
4F70000
heap
page read and write
20CDDF76000
unkown
page read and write
2FF0000
remote allocation
page read and write
520E000
stack
page read and write
4CF0000
trusted library allocation
page read and write
5303000
trusted library allocation
page read and write
4A41000
heap
page read and write
352A000
heap
page read and write
288522FF000
unkown
page read and write
2C185450000
unkown
page read and write
1F987E40000
heap
page read and write
1CDD049B000
unkown
page read and write
20CDDF83000
unkown
page read and write
52A4000
trusted library allocation
page read and write
2A10000
heap
page read and write
28857610000
trusted library allocation
page read and write
2DFD7E50000
trusted library allocation
page read and write
21070113000
unkown
page read and write
1CDD0340000
heap
page read and write
29E4000
heap
page read and write
4A41000
heap
page read and write
288578AA000
unkown
page read and write
2A7B000
stack
page read and write
2510000
remote allocation
page read and write
4B3F000
stack
page read and write
288529F0000
trusted library allocation
page read and write
20CDDF87000
unkown
page read and write
214B7F0F000
heap
page read and write
570E000
stack
page read and write
28857900000
unkown
page read and write
4A41000
heap
page read and write
5883000
trusted library allocation
page read and write
4A41000
heap
page read and write
20CDDF00000
unkown
page read and write
3046000
heap
page read and write
28857C30000
trusted library allocation
page read and write
10000000
unkown
page readonly
2D0F000
stack
page read and write
543E000
stack
page read and write
29E4000
heap
page read and write
4480000
heap
page read and write
3060000
heap
page read and write
20CDDF77000
unkown
page read and write
28852B00000
unkown
page read and write
2A83000
trusted library allocation
page read and write
3FA0000
trusted library allocation
page read and write
1F987E30000
heap
page read and write
10057000
unkown
page read and write
2B63000
heap
page read and write
EA1236B000
stack
page read and write
20CDDE02000
unkown
page read and write
2F40000
heap
page read and write
29E4000
heap
page read and write
5364000
trusted library allocation
page read and write
21070029000
unkown
page read and write
32A8000
stack
page read and write
20CDD6A4000
unkown
page read and write
20CDDFBC000
unkown
page read and write
288578F5000
unkown
page read and write
2B35000
heap
page read and write
1F865400000
unkown
page read and write
28857600000
trusted library allocation
page read and write
20CDDF86000
unkown
page read and write
6C330FE000
stack
page read and write
32E0000
heap
page read and write
29B0B087000
unkown
page read and write
238D17F0000
unkown
page read and write
5644000
trusted library allocation
page read and write
20CDD613000
unkown
page read and write
20CDDF84000
unkown
page read and write
10000000
unkown
page readonly
2106FFD0000
unkown
page read and write
2CF0000
trusted library allocation
page read and write
1F9880E2000
unkown
page read and write
1005A000
unkown
page readonly
552C17F000
stack
page read and write
30BA000
heap
page read and write
EA127FE000
stack
page read and write
2CCE000
stack
page read and write
2B58000
stack
page read and write
1CDD044E000
unkown
page read and write
20CDDF98000
unkown
page read and write
28852A15000
unkown
page read and write
497E000
stack
page read and write
28852A02000
unkown
page read and write
29E4000
heap
page read and write
170000
heap
page read and write
29E4000
heap
page read and write
2DFD7040000
heap
page read and write
2C185449000
unkown
page read and write
20CDD64A000
unkown
page read and write
28857B00000
remote allocation
page read and write
2106FD90000
heap
page read and write
4A41000
heap
page read and write
28852A00000
unkown
page read and write
B020000
remote allocation
page read and write
20CDDF9C000
unkown
page read and write
4A41000
heap
page read and write
20CDDFAD000
unkown
page read and write
21070013000
unkown
page read and write
10000000
unkown
page readonly
2DFD70E0000
trusted library allocation
page read and write
1DC000
stack
page read and write
2107003C000
unkown
page read and write
10053000
unkown
page read and write
E02477A000
stack
page read and write
10046000
unkown
page readonly
54D3000
trusted library allocation
page read and write
28852B13000
unkown
page read and write
1005A000
unkown
page readonly
3710000
heap
page read and write
DCBA77D000
stack
page read and write
4ED3000
trusted library allocation
page read and write
5304000
trusted library allocation
page read and write
2DFD71AD000
heap
page read and write
49A0000
trusted library allocation
page read and write
B23C000
stack
page read and write
20CDE402000
unkown
page read and write
214B7F15000
heap
page read and write
E02497F000
stack
page read and write
58C0000
trusted library allocation
page read and write
4A14000
trusted library allocation
page read and write
49C4000
trusted library allocation
page read and write
28857690000
trusted library allocation
page read and write
10057000
unkown
page read and write
43A000
stack
page read and write
28852294000
unkown
page read and write
507D000
stack
page read and write
29E4000
heap
page read and write
50D0000
trusted library allocation
page read and write
20CDD6F6000
unkown
page read and write
20CDD708000
unkown
page read and write
29E4000
heap
page read and write
5237000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
145B000
heap
page read and write
62E000
stack
page read and write
214B7F1F000
heap
page read and write
4FC4000
trusted library allocation
page read and write
2C185438000
unkown
page read and write
29E4000
heap
page read and write
4A41000
heap
page read and write
2B73000
heap
page read and write
1D663B02000
unkown
page read and write
2B3A3BE000
stack
page read and write
10090000
trusted library allocation
page read and write
1F865500000
unkown
page read and write
2D73000
heap
page read and write
528A000
trusted library allocation
page read and write
29B0AF00000
heap
page read and write
29E4000
heap
page read and write
29E4000
heap
page read and write
2D70000
heap
page read and write
5262000
trusted library allocation
page read and write
2885229F000
unkown
page read and write
20CDDF99000
unkown
page read and write
2DFD7320000
heap
page read and write
4D9C000
stack
page read and write
AB9FB8B000
stack
page read and write
20CDD63C000
unkown
page read and write
2C18547A000
unkown
page read and write
5237000
trusted library allocation
page read and write
3520000
heap
page read and write
20CDDF87000
unkown
page read and write
49BF000
stack
page read and write
288577A0000
trusted library allocation
page read and write
1CDD042A000
unkown
page read and write
578E000
stack
page read and write
288520D0000
heap
page read and write
21070063000
unkown
page read and write
10057000
unkown
page read and write
4A41000
heap
page read and write
2800000
heap
page read and write
AB9FFFC000
stack
page read and write
4A60000
heap
page read and write
20CDDF71000
unkown
page read and write
21070062000
unkown
page read and write
2AE0000
heap
page read and write
552C3FE000
stack
page read and write
1D663A13000
unkown
page read and write
29F0000
trusted library allocation
page read and write
350E000
stack
page read and write
46D3000
heap
page read and write
5221000
trusted library allocation
page read and write
20CDDF83000
unkown
page read and write
4B93000
heap
page read and write
29E4000
heap
page read and write
2D71000
heap
page read and write
3FC3000
heap
page read and write
D90000
trusted library allocation
page read and write
2F0E000
stack
page read and write
4A41000
heap
page read and write
20CDDFC3000
unkown
page read and write
286C000
stack
page read and write
FFB78FF000
stack
page read and write
5441000
trusted library allocation
page read and write
28857A24000
trusted library allocation
page read and write
28857A70000
trusted library allocation
page read and write
1F9880E8000
unkown
page read and write
29E4000
heap
page read and write
4D14000
trusted library allocation
page read and write
2B3A6FB000
stack
page read and write
214B7F1B000
heap
page read and write
2AD0000
heap
page read and write
1F865478000
unkown
page read and write
4B7D000
stack
page read and write
DCBB17E000
stack
page read and write
54EE000
stack
page read and write
1D663A3D000
unkown
page read and write
20CDDF90000
unkown
page read and write
521A000
trusted library allocation
page read and write
2C185455000
unkown
page read and write
238D1870000
unkown
page read and write
20CDD6A1000
unkown
page read and write
1D663A00000
unkown
page read and write
20CDDF81000
unkown
page read and write
20CDD655000
unkown
page read and write
4D5D000
stack
page read and write
49FE000
stack
page read and write
214B7F0F000
heap
page read and write
10000000
unkown
page readonly
33B5000
heap
page read and write
1CDD0448000
unkown
page read and write
4A41000
heap
page read and write
10000000
unkown
page readonly
29E4000
heap
page read and write
29E4000
heap
page read and write
5860000
trusted library allocation
page read and write
53F0000
heap
page read and write
5823000
trusted library allocation
page read and write
2C1853E0000
unkown
page read and write
20CDDF85000
unkown
page read and write
20CDDF9C000
unkown
page read and write
15FEE000
trusted library allocation
page read and write
20CDDF70000
unkown
page read and write
2BB1000
heap
page read and write
2AEA000
heap
page read and write
2C18544A000
unkown
page read and write
ABA03FE000
stack
page read and write
E3085FB000
stack
page read and write
2A84000
trusted library allocation
page read and write
4FBE000
stack
page read and write
4B33000
heap
page read and write
21070602000
unkown
page read and write
5EE000
stack
page read and write
28857AE0000
trusted library allocation
page read and write
2AD7000
heap
page read and write
214B7F11000
heap
page read and write
2440000
heap
page read and write
10046000
unkown
page readonly
10053000
unkown
page read and write
6C32FFE000
stack
page read and write
2DFD7ED0000
trusted library allocation
page read and write
4FC3000
trusted library allocation
page read and write
29B0B013000
unkown
page read and write
20CDDF77000
unkown
page read and write
238D1913000
unkown
page read and write
1F865508000
unkown
page read and write
25C0000
heap
page read and write
2550000
trusted library allocation
page read and write
568E000
stack
page read and write
29E4000
heap
page read and write
53B4000
trusted library allocation
page read and write
EA123EE000
stack
page read and write
24AD000
stack
page read and write
12CF000
stack
page read and write
4540000
trusted library allocation
page read and write
4B40000
trusted library allocation
page read and write
1F8653F0000
heap
page read and write
28857AC0000
trusted library allocation
page read and write
34CE000
stack
page read and write
FFB79FF000
stack
page read and write
1CDD0C02000
unkown
page read and write
1F865B50000
unkown
page read and write
5BCAFFE000
stack
page read and write
E30897F000
stack
page read and write
20CDD6BF000
unkown
page read and write
2BD4000
heap
page read and write
20CDDF6F000
unkown
page read and write
288578F3000
unkown
page read and write
57CC000
stack
page read and write
5237000
trusted library allocation
page read and write
4990000
heap
page read and write
29E4000
heap
page read and write
29E4000
heap
page read and write
3561000
heap
page read and write
29E4000
heap
page read and write
98418FE000
stack
page read and write
2C1853B0000
heap
page read and write
29E4000
heap
page read and write
4400000
trusted library allocation
page read and write
20CDDF1A000
unkown
page read and write
28857A21000
trusted library allocation
page read and write
28857A70000
trusted library allocation
page read and write
2F50000
heap
page read and write
20CDDFA9000
unkown
page read and write
4E73000
trusted library allocation
page read and write
2DFD718E000
heap
page read and write
5BCA9FF000
stack
page read and write
20CDDF8B000
unkown
page read and write
4BF0000
trusted library allocation
page read and write
20CDDF9A000
unkown
page read and write
2DFD7060000
heap
page read and write
20CDDF99000
unkown
page read and write
44F4000
trusted library allocation
page read and write
20CDDF87000
unkown
page read and write
28857849000
unkown
page read and write
20CDDD20000
remote allocation
page read and write
5A30000
trusted library allocation
page read and write
2C18544B000
unkown
page read and write
29E4000
heap
page read and write
DCBA97E000
stack
page read and write
984137B000
stack
page read and write
5BCAA7C000
stack
page read and write
20CDDD20000
remote allocation
page read and write
29E4000
heap
page read and write
29E4000
heap
page read and write
E30887F000
stack
page read and write
20CDDF9C000
unkown
page read and write
28852B18000
unkown
page read and write
552B9CC000
stack
page read and write
20CDDF84000
unkown
page read and write
50E3000
trusted library allocation
page read and write
29E4000
heap
page read and write
4B30000
heap
page read and write
29E4000
heap
page read and write
2C185444000
unkown
page read and write
2107005E000
unkown
page read and write
1D663860000
heap
page read and write
238D1876000
unkown
page read and write
5013000
trusted library allocation
page read and write
20CDDF96000
unkown
page read and write
56CE000
stack
page read and write
50B0000
trusted library allocation
page read and write
20CDDF72000
unkown
page read and write
1F865C02000
unkown
page read and write
20CDD671000
unkown
page read and write
29E4000
heap
page read and write
1CDD0508000
unkown
page read and write
29E4000
heap
page read and write
28852229000
unkown
page read and write
4A41000
heap
page read and write
2B80000
remote allocation
page read and write
5434000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
214B8135000
heap
page read and write
20CDE421000
unkown
page read and write
6C32CFB000
stack
page read and write
2C185465000
unkown
page read and write
5390000
trusted library allocation
page read and write
2885785F000
unkown
page read and write
2C185468000
unkown
page read and write
984197F000
stack
page read and write
2106FE00000
heap
page read and write
4A70000
trusted library allocation
page read and write
524F000
stack
page read and write
5824000
trusted library allocation
page read and write
1F988029000
unkown
page read and write
E02434B000
stack
page read and write
984147B000
stack
page read and write
2B3AB7F000
stack
page read and write
20CDD6C6000
unkown
page read and write
20CDDF6D000
unkown
page read and write
29B0B102000
unkown
page read and write
10046000
unkown
page readonly
29E4000
heap
page read and write
1F86543C000
unkown
page read and write
2885225A000
unkown
page read and write
521A000
trusted library allocation
page read and write
2C185413000
unkown
page read and write
28852B59000
unkown
page read and write
20CDD716000
unkown
page read and write
214B7EF1000
heap
page read and write
28852314000
unkown
page read and write
44F3000
trusted library allocation
page read and write
29E4000
heap
page read and write
2885782C000
unkown
page read and write
20CDDF85000
unkown
page read and write
20CDD4A0000
heap
page read and write
4680000
trusted library allocation
page read and write
29E4000
heap
page read and write
509D000
stack
page read and write
2DFD7325000
heap
page read and write
2C18544D000
unkown
page read and write
4533000
heap
page read and write
10FB000
stack
page read and write
2BF0000
heap
page read and write
4F6E000
stack
page read and write
E3080AC000
stack
page read and write
5BCACFD000
stack
page read and write
EA129FE000
stack
page read and write
308C000
heap
page read and write
4F30000
heap
page read and write
4A41000
heap
page read and write
288577D0000
trusted library allocation
page read and write
9D1E5EE000
stack
page read and write
20CDDF81000
unkown
page read and write
49F0000
trusted library allocation
page read and write
29E4000
heap
page read and write
4EF0000
trusted library allocation
page read and write
29E4000
heap
page read and write
20CDDF5D000
unkown
page read and write
1F987FA0000
unkown
page read and write
288578B3000
unkown
page read and write
214B7EC0000
heap
page read and write
4A41000
heap
page read and write
29E4000
heap
page read and write
29E4000
heap
page read and write
2885781E000
unkown
page read and write
4A41000
heap
page read and write
2B70000
heap
page read and write
5410000
trusted library allocation
page read and write
29B0B04C000
unkown
page read and write
2FF0000
remote allocation
page read and write
20CDDF98000
unkown
page read and write
4A41000
heap
page read and write
20CDDF9A000
unkown
page read and write
29E4000
heap
page read and write
327B000
stack
page read and write
29E4000
heap
page read and write
29E4000
heap
page read and write
28857A08000
trusted library allocation
page read and write
20CDD713000
unkown
page read and write
1D664060000
remote allocation
page read and write
20CDE463000
unkown
page read and write
4F34000
trusted library allocation
page read and write
4F33000
trusted library allocation
page read and write
2C18544E000
unkown
page read and write
2C18546E000
unkown
page read and write
2C18542D000
unkown
page read and write
4A41000
heap
page read and write
47A0000
heap
page read and write
20CDDF71000
unkown
page read and write
5620000
trusted library allocation
page read and write
3071000
heap
page read and write
29E4000
heap
page read and write
29E4000
heap
page read and write
ABA02FF000
stack
page read and write
20CDD64E000
unkown
page read and write
29E4000
heap
page read and write
5221000
trusted library allocation
page read and write
29E4000
heap
page read and write
3310000
trusted library allocation
page read and write
2C185445000
unkown
page read and write
20CDDF73000
unkown
page read and write
5464000
trusted library allocation
page read and write
2B79000
heap
page read and write
29B0B053000
unkown
page read and write
29E4000
heap
page read and write
512E000
stack
page read and write
2AB0000
trusted library allocation
page read and write
288522FF000
unkown
page read and write
2C185441000
unkown
page read and write
5252000
trusted library allocation
page read and write
29E4000
heap
page read and write
9D1EAFB000
stack
page read and write
E30812E000
stack
page read and write
2DB0000
trusted library allocation
page read and write
46D0000
heap
page read and write
29B0B08E000
unkown
page read and write
29E4000
heap
page read and write
20CDDFAC000
unkown
page read and write
29E4000
heap
page read and write
4A41000
heap
page read and write
2C185451000
unkown
page read and write
29E4000
heap
page read and write
20CDDF91000
unkown
page read and write
9D1E56B000
stack
page read and write
10046000
unkown
page readonly
2C18547B000
unkown
page read and write
9841778000
stack
page read and write
288578EB000
unkown
page read and write
20CDD500000
heap
page read and write
2C185400000
unkown
page read and write
2C185464000
unkown
page read and write
4B63000
trusted library allocation
page read and write
29E0000
heap
page read and write
4AA0000
heap
page read and write
20CDDF89000
unkown
page read and write
28857A00000
trusted library allocation
page read and write
214B7F07000
heap
page read and write
20CDE400000
unkown
page read and write
1F988802000
unkown
page read and write
29E4000
heap
page read and write
29E4000
heap
page read and write
2AD0000
heap
page read and write
4E74000
trusted library allocation
page read and write
1CDD03B0000
heap
page read and write
29E4000
heap
page read and write
238D1802000
unkown
page read and write
1F865513000
unkown
page read and write
10090000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
2885223E000
unkown
page read and write
29E4000
heap
page read and write
552C27D000
stack
page read and write
214B7EA0000
heap
page read and write
20CDDFA9000
unkown
page read and write
20CDDF4D000
unkown
page read and write
9840F4C000
stack
page read and write
505C000
stack
page read and write
20CDD629000
unkown
page read and write
521A000
trusted library allocation
page read and write
FFB75AF000
stack
page read and write
52A3000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
20CDD490000
heap
page read and write
149C000
heap
page read and write
DCBAE7B000
stack
page read and write
4183000
trusted library allocation
page read and write
2DFD7140000
heap
page read and write
10000000
unkown
page readonly
338E000
stack
page read and write
E0248F9000
stack
page read and write
2A60000
trusted library allocation
page read and write
4F70000
trusted library allocation
page read and write
E0247F9000
stack
page read and write
2DFD7329000
heap
page read and write
307E000
stack
page read and write
There are 1147 hidden memdumps, click here to show them.