IOC Report

loading gif

Files

File Path
Type
Category
Malicious
Bg6DyC7lDh.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x0f7c94ec, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 61414 bytes, 1 file
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
modified
C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\Logs\dosvc.20220129_062134_900.etl
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\Bg6DyC7lDh.dll"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Bg6DyC7lDh.dll",#1
malicious
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\Bg6DyC7lDh.dll
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\Bg6DyC7lDh.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\Bg6DyC7lDh.dll,DllRegisterServer
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\Bg6DyC7lDh.dll",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\Bg6DyC7lDh.dll",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Users\user\Desktop\Bg6DyC7lDh.dll",DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Lvetlyszixrl\grmpeubxplti.rrq",FloWMCkThX
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
malicious
C:\Windows\SysWOW64\rundll32.exe
C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Lvetlyszixrl\grmpeubxplti.rrq",DllRegisterServer
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Windows\System32\BackgroundTransferHost.exe
"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
unknown
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
unknown
https://dev.ditu.live.com/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
unknown
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
unknown
https://dev.ditu.live.com/REST/v1/Transit/Stops/
unknown
https://t0.tiles.ditu.live.com/tiles/gen
unknown
https://dev.virtualearth.net/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Routes/Walking
unknown
http://crl.ver)
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
unknown
https://www.tiktok.com/legal/report/feedback
unknown
https://activity.windows.comr
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
unknown
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
unknown
https://%s.xboxlive.com
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://dev.virtualearth.net/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
unknown
https://dynamic.t
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
https://disneyplus.com/legal.
unknown
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
unknown
https://activity.windows.com
unknown
http://www.bingmapsportal.com
unknown
https://dev.ditu.live.com/REST/v1/Locations
unknown
http://help.disneyplus.com.
unknown
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://%s.dnet.xboxlive.com
unknown
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
There are 33 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
207.148.81.119
unknown
United States
malicious
104.131.62.48
unknown
United States
malicious
198.199.98.78
unknown
United States
malicious
194.9.172.107
unknown
unknown
malicious
59.148.253.194
unknown
Hong Kong
malicious
74.207.230.120
unknown
United States
malicious
103.41.204.169
unknown
Indonesia
malicious
85.214.67.203
unknown
Germany
malicious
191.252.103.16
unknown
Brazil
malicious
168.197.250.14
unknown
Argentina
malicious
185.148.168.15
unknown
Germany
malicious
66.42.57.149
unknown
United States
malicious
139.196.72.155
unknown
China
malicious
217.182.143.207
unknown
France
malicious
203.153.216.46
unknown
Indonesia
malicious
159.69.237.188
unknown
Germany
malicious
116.124.128.206
unknown
Korea Republic of
malicious
37.59.209.141
unknown
France
malicious
78.46.73.125
unknown
Germany
malicious
210.57.209.142
unknown
Indonesia
malicious
185.148.168.220
unknown
Germany
malicious
54.37.228.122
unknown
France
malicious
185.168.130.138
unknown
Ukraine
malicious
190.90.233.66
unknown
Colombia
malicious
142.4.219.173
unknown
Canada
malicious
54.38.242.185
unknown
France
malicious
195.154.146.35
unknown
France
malicious
195.77.239.39
unknown
Spain
malicious
78.47.204.80
unknown
Germany
malicious
118.98.72.86
unknown
Indonesia
malicious
37.44.244.177
unknown
Germany
malicious
62.171.178.147
unknown
United Kingdom
malicious
128.199.192.135
unknown
United Kingdom
malicious
127.0.0.1
unknown
unknown
There are 24 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
MonthID
There are 2 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5381000
trusted library allocation
page execute read
malicious
4F71000
trusted library allocation
page execute read
malicious
5701000
trusted library allocation
page execute read
malicious
5491000
trusted library allocation
page execute read
malicious
DE0000
trusted library allocation
page execute and read and write
malicious
4E11000
trusted library allocation
page execute read
malicious
4870000
trusted library allocation
page execute and read and write
malicious
1501000
trusted library allocation
page execute read
malicious
5541000
trusted library allocation
page execute read
malicious
1180000
trusted library allocation
page execute and read and write
malicious
4DC0000
trusted library allocation
page execute and read and write
malicious
E51000
trusted library allocation
page execute read
malicious
4D11000
trusted library allocation
page execute read
malicious
5131000
trusted library allocation
page execute read
malicious
4CD0000
trusted library allocation
page execute and read and write
malicious
5170000
trusted library allocation
page execute and read and write
malicious
5000000
trusted library allocation
page execute and read and write
malicious
C40000
trusted library allocation
page execute and read and write
malicious
51A1000
trusted library allocation
page execute read
malicious
48A1000
trusted library allocation
page execute read
malicious
4DF1000
trusted library allocation
page execute read
malicious
5070000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
5281000
trusted library allocation
page execute read
malicious
4FA0000
trusted library allocation
page execute and read and write
malicious
4ED1000
trusted library allocation
page execute read
malicious
5460000
trusted library allocation
page execute and read and write
malicious
4C00000
trusted library allocation
page execute and read and write
malicious
1280000
trusted library allocation
page execute and read and write
malicious
5350000
trusted library allocation
page execute and read and write
malicious
4FD1000
trusted library allocation
page execute read
malicious
5031000
trusted library allocation
page execute read
malicious
4731000
trusted library allocation
page execute read
malicious
50C1000
trusted library allocation
page execute read
malicious
4B21000
trusted library allocation
page execute read
malicious
5681000
trusted library allocation
page execute read
malicious
4AF1000
trusted library allocation
page execute read
malicious
E11000
trusted library allocation
page execute read
malicious
5191000
trusted library allocation
page execute read
malicious
5100000
trusted library allocation
page execute and read and write
malicious
14D0000
trusted library allocation
page execute and read and write
malicious
5370000
trusted library allocation
page execute and read and write
malicious
4AF0000
trusted library allocation
page execute and read and write
malicious
53B0000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
4DE0000
trusted library allocation
page execute and read and write
malicious
46F0000
trusted library allocation
page execute and read and write
malicious
53A1000
trusted library allocation
page execute read
malicious
5650000
trusted library allocation
page execute and read and write
malicious
5510000
trusted library allocation
page execute and read and write
malicious
54E1000
trusted library allocation
page execute read
malicious
4EA0000
trusted library allocation
page execute and read and write
malicious
5060000
trusted library allocation
page execute and read and write
malicious
5250000
trusted library allocation
page execute and read and write
malicious
4E40000
trusted library allocation
page execute and read and write
malicious
10001000
unkown
page execute read
malicious
56D0000
trusted library allocation
page execute and read and write
malicious
4C31000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
10001000
unkown
page execute read
malicious
5670000
trusted library allocation
page execute and read and write
malicious
11C1000
trusted library allocation
page execute read
malicious
56A1000
trusted library allocation
page execute read
malicious
10001000
unkown
page execute read
malicious
10001000
unkown
page execute read
malicious
2DEDA648000
unkown
page read and write
D1FBEFF000
stack
page read and write
1A9C1462000
unkown
page read and write
2DEDAFBC000
unkown
page read and write
C34000
heap
page read and write
2FA943E3000
trusted library allocation
page read and write
2FA93CA4000
unkown
page read and write
4CC1000
heap
page read and write
B00000
heap
page read and write
2ABF0080000
heap
page read and write
E60000
remote allocation
page read and write
10A3000
heap
page read and write
2DEDA64E000
unkown
page read and write
4CC1000
heap
page read and write
2FA98FF0000
trusted library allocation
page read and write
2559BE8D000
heap
page read and write
520E000
stack
page read and write
2ABF02A5000
heap
page read and write
5130000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
22C90F02000
unkown
page read and write
FACB37E000
stack
page read and write
2352F513000
unkown
page read and write
4DF0000
trusted library allocation
page read and write
4C20000
heap
page read and write
146E000
stack
page read and write
2352F3E0000
unkown
page read and write
C34000
heap
page read and write
9E175FE000
stack
page read and write
1A9C146E000
unkown
page read and write
4CC1000
heap
page read and write
1FEA5013000
unkown
page read and write
C34000
heap
page read and write
1A9C1380000
unkown
page read and write
9E176FF000
stack
page read and write
2352F402000
unkown
page read and write
577E000
trusted library allocation
page read and write
4CC1000
heap
page read and write
10057000
unkown
page read and write
FACB2F9000
stack
page read and write
4CC1000
heap
page read and write
4CC1000
heap
page read and write
2FA99000000
unkown
page read and write
10057000
unkown
page read and write
D1FBBFE000
stack
page read and write
2559CCF0000
trusted library allocation
page read and write
2FA99100000
unkown
page read and write
10000000
unkown
page readonly
2FA99540000
trusted library allocation
page read and write
2FA94402000
unkown
page read and write
2DEDAFD1000
unkown
page read and write
4CC1000
heap
page read and write
1A9C143E000
unkown
page read and write
E76000
trusted library allocation
page read and write
C34000
heap
page read and write
4FF5000
trusted library allocation
page read and write
E50000
heap
page read and write
4CC1000
heap
page read and write
BC0000
heap
page read and write
22C90C20000
heap
page read and write
11E6000
trusted library allocation
page read and write
2FA93C92000
unkown
page read and write
4CC1000
heap
page read and write
4AF0000
trusted library allocation
page read and write
2B012BE0000
heap
page read and write
2FA99580000
trusted library allocation
page read and write
2DEDA4E0000
heap
page read and write
4B8D000
stack
page read and write
7CE000
stack
page read and write
2DEDAF6F000
unkown
page read and write
C34000
heap
page read and write
2DEDA6BE000
unkown
page read and write
4D10000
trusted library allocation
page read and write
4CC1000
heap
page read and write
2559CAA0000
trusted library allocation
page read and write
DDACA8C000
stack
page read and write
ED0000
remote allocation
page read and write
2DEDA64A000
unkown
page read and write
D1FB9FD000
stack
page read and write
DC36479000
stack
page read and write
4CC1000
heap
page read and write
2DEDA708000
unkown
page read and write
552D000
trusted library allocation
page read and write
2FA93D02000
unkown
page read and write
AF0000
remote allocation
page read and write
C34000
heap
page read and write
C34000
heap
page read and write
54F2000
trusted library allocation
page read and write
4A40000
heap
page read and write
C34000
heap
page read and write
550F000
trusted library allocation
page read and write
2FA99330000
trusted library allocation
page read and write
D17000
heap
page read and write
2559BE10000
heap
page read and write
C3D000
stack
page read and write
C34000
heap
page read and write
2559BE8C000
heap
page read and write
2DEDAF6D000
unkown
page read and write
2559BDB0000
trusted library allocation
page read and write
5517000
trusted library allocation
page read and write
2DEDAF44000
unkown
page read and write
F75000
heap
page read and write
8C0000
heap
page read and write
800000
heap
page read and write
1FEA50E1000
unkown
page read and write
2ABF0080000
heap
page read and write
2352F477000
unkown
page read and write
D71000
heap
page read and write
FDAF37E000
stack
page read and write
2DEDB402000
unkown
page read and write
6E0000
heap
page read and write
4F96000
trusted library allocation
page read and write
2FA990F8000
unkown
page read and write
A90000
heap
page read and write
2ABEFFF0000
heap
page read and write
157D000
heap
page read and write
52C0000
heap
page read and write
5506000
trusted library allocation
page read and write
1A9C1463000
unkown
page read and write
1548000
heap
page read and write
4D35000
trusted library allocation
page read and write
48C5000
trusted library allocation
page read and write
2A4B79E000
stack
page read and write
10053000
unkown
page read and write
2FA993C0000
trusted library allocation
page read and write
10046000
unkown
page readonly
2DEDAFC2000
unkown
page read and write
550F000
trusted library allocation
page read and write
2FA94559000
unkown
page read and write
2DEDA613000
unkown
page read and write
2ABF0077000
heap
page read and write
DDACEFC000
stack
page read and write
C34000
heap
page read and write
2FA990F8000
unkown
page read and write
1FEA4EA0000
heap
page read and write
3060000
heap
page read and write
4D03000
heap
page read and write
AF0000
remote allocation
page read and write
1FEA50CD000
unkown
page read and write
2DEDAFB4000
unkown
page read and write
2028B530000
unkown
page read and write
2FA93D02000
unkown
page read and write
2DEDB402000
unkown
page read and write
1FEA5102000
unkown
page read and write
B27B6FD000
stack
page read and write
E6D000
stack
page read and write
1A9C1449000
unkown
page read and write
2FA993C0000
trusted library allocation
page read and write
1A9C12F0000
heap
page read and write
2559BE96000
heap
page read and write
1A9C1502000
unkown
page read and write
1A9C12E0000
heap
page read and write
D43000
heap
page read and write
FDAF478000
stack
page read and write
4CC1000
heap
page read and write
2DEDA6FC000
unkown
page read and write
2DEDAE02000
unkown
page read and write
1A9C1475000
unkown
page read and write
2559BE85000
heap
page read and write
2FA99334000
trusted library allocation
page read and write
2ABF02A0000
heap
page read and write
2DEDA653000
unkown
page read and write
5055000
trusted library allocation
page read and write
C34000
heap
page read and write
2DEDAF90000
unkown
page read and write
D1E000
stack
page read and write
2559CD00000
heap
page readonly
2DEDAFB0000
unkown
page read and write
2FA990F2000
unkown
page read and write
2DEDAFBD000
unkown
page read and write
22C90E3C000
unkown
page read and write
C34000
heap
page read and write
4B15000
trusted library allocation
page read and write
2DEDA657000
unkown
page read and write
FDAF4FF000
stack
page read and write
2DEDAF6D000
unkown
page read and write
2DEDAF93000
unkown
page read and write
50E6000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
DDAD17E000
stack
page read and write
1FEA5029000
unkown
page read and write
2FA990F0000
unkown
page read and write
10057000
unkown
page read and write
2559BE89000
heap
page read and write
331E000
stack
page read and write
4CC1000
heap
page read and write
C34000
heap
page read and write
2FA93C8E000
unkown
page read and write
2352F466000
unkown
page read and write
545E000
stack
page read and write
C34000
heap
page read and write
9A0000
heap
page read and write
2FA99420000
trusted library allocation
page read and write
1A9C142F000
unkown
page read and write
E60000
remote allocation
page read and write
2DEDAF6F000
unkown
page read and write
C35000
heap
page read and write
4BF0000
heap
page read and write
2A4B71E000
stack
page read and write
4770000
trusted library allocation
page read and write
C8A000
heap
page read and write
2DFA000
stack
page read and write
22C90E70000
unkown
page read and write
2A4BE7F000
stack
page read and write
339C0FF000
stack
page read and write
1FEA506C000
unkown
page read and write
22C90E63000
unkown
page read and write
2DEDA716000
unkown
page read and write
843000
heap
page read and write
31E3000
heap
page read and write
4A10000
heap
page read and write
C34000
heap
page read and write
30A6000
heap
page read and write
4756000
trusted library allocation
page read and write
DDACB0E000
stack
page read and write
4FEE000
stack
page read and write
E90000
heap
page read and write
2B012D80000
remote allocation
page read and write
2DEDA6E1000
unkown
page read and write
2B012BF0000
heap
page read and write
5506000
trusted library allocation
page read and write
512E000
stack
page read and write
2FA94518000
unkown
page read and write
4CC1000
heap
page read and write
2559CA30000
trusted library allocation
page read and write
CF1000
heap
page read and write
1A9C1476000
unkown
page read and write
10046000
unkown
page readonly
DB0000
trusted library allocation
page read and write
2559CD70000
trusted library allocation
page read and write
4C56000
trusted library allocation
page read and write
C34000
heap
page read and write
53D0000
remote allocation
page read and write
577E000
trusted library allocation
page read and write
3200000
heap
page read and write
2DEDAF90000
unkown
page read and write
2DEDAF79000
unkown
page read and write
4CC1000
heap
page read and write
53A0000
trusted library allocation
page read and write
2DEDAF9A000
unkown
page read and write
E70000
heap
page read and write
C34000
heap
page read and write
AB5E000
trusted library allocation
page read and write
2DEDA67E000
unkown
page read and write
2DEDAF7E000
unkown
page read and write
B27B47C000
stack
page read and write
2FA93C94000
unkown
page read and write
2FA990E8000
unkown
page read and write
2DEDAFA4000
unkown
page read and write
2FA99321000
trusted library allocation
page read and write
1A9C1445000
unkown
page read and write
4CC1000
heap
page read and write
2FA94400000
unkown
page read and write
2DEDAF90000
unkown
page read and write
11E5000
trusted library allocation
page read and write
2DEDAFA2000
unkown
page read and write
C34000
heap
page read and write
C34000
heap
page read and write
4C23000
heap
page read and write
22C90C80000
heap
page read and write
2DEDAFB4000
unkown
page read and write
2FA99054000
unkown
page read and write
C34000
heap
page read and write
4EF6000
trusted library allocation
page read and write
541E000
stack
page read and write
10053000
unkown
page read and write
4953000
heap
page read and write
2028AE8E000
unkown
page read and write
51C6000
trusted library allocation
page read and write
ED0000
remote allocation
page read and write
2DEDA647000
unkown
page read and write
2559C010000
heap
page read and write
C34000
heap
page read and write
4950000
heap
page read and write
2DEDA686000
unkown
page read and write
E2E000
stack
page read and write
2FA94500000
unkown
page read and write
2ABF0080000
heap
page read and write
C34000
heap
page read and write
1005A000
unkown
page readonly
9E179FE000
stack
page read and write
53C6000
trusted library allocation
page read and write
2FA93A90000
heap
page read and write
2ABF0067000
heap
page read and write
C34000
heap
page read and write
4760000
heap
page read and write
B90000
heap
page read and write
2FA93C00000
unkown
page read and write
7F0000
trusted library allocation
page read and write
EBC000
stack
page read and write
788000
stack
page read and write
1060000
heap
page read and write
516E000
stack
page read and write
2DEDAFA1000
unkown
page read and write
122E000
stack
page read and write
2FA99320000
trusted library allocation
page read and write
2352F429000
unkown
page read and write
CF9000
heap
page read and write
1FEA50BC000
unkown
page read and write
2DEDA6B0000
unkown
page read and write
FA9917B000
stack
page read and write
B27B9FF000
stack
page read and write
C34000
heap
page read and write
CD6000
heap
page read and write
C34000
heap
page read and write
C34000
heap
page read and write
FA98C77000
stack
page read and write
2FA93C99000
unkown
page read and write
2ABF0062000
heap
page read and write
4CC1000
heap
page read and write
15FEE000
trusted library allocation
page read and write
2DBC000
stack
page read and write
DA2000
heap
page read and write
A63E000
trusted library allocation
page read and write
2DEDA658000
unkown
page read and write
2DEDAF4A000
unkown
page read and write
339BEFB000
stack
page read and write
2FA94558000
unkown
page read and write
2DEDAF00000
unkown
page read and write
2DEDAF1B000
unkown
page read and write
4CC1000
heap
page read and write
4C55000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
2DEDAFA4000
unkown
page read and write
CE3000
heap
page read and write
5506000
trusted library allocation
page read and write
2FA93B90000
unkown
page read and write
C34000
heap
page read and write
2DEDB463000
unkown
page read and write
4CC1000
heap
page read and write
14C0000
heap
page read and write
4EF5000
trusted library allocation
page read and write
52A6000
trusted library allocation
page read and write
10BE000
stack
page read and write
4E36000
trusted library allocation
page read and write
5030000
trusted library allocation
page read and write
4C30000
heap
page read and write
10053000
unkown
page read and write
C34000
heap
page read and write
306A000
heap
page read and write
2FA93D07000
unkown
page read and write
2DEDAFBC000
unkown
page read and write
FA98F7F000
stack
page read and write
C34000
heap
page read and write
FDAEE7E000
stack
page read and write
4F7D000
stack
page read and write
4B16000
trusted library allocation
page read and write
10000000
unkown
page readonly
2DEDA600000
unkown
page read and write
DDACB8E000
stack
page read and write
2DEDAFD0000
unkown
page read and write
C34000
heap
page read and write
C34000
heap
page read and write
4C9C000
stack
page read and write
2B012C50000
heap
page read and write
1A9C146C000
unkown
page read and write
C34000
heap
page read and write
2352F43E000
unkown
page read and write
2FA99012000
unkown
page read and write
5517000
trusted library allocation
page read and write
1A9C1460000
unkown
page read and write
2FA99102000
unkown
page read and write
1005A000
unkown
page readonly
4C8E000
stack
page read and write
2028AF02000
unkown
page read and write
339BCFE000
stack
page read and write
2DEDB402000
unkown
page read and write
FDF000
stack
page read and write
D72000
heap
page read and write
56C6000
trusted library allocation
page read and write
4E16000
trusted library allocation
page read and write
CBA000
heap
page read and write
48A0000
trusted library allocation
page read and write
C34000
heap
page read and write
BFC000
stack
page read and write
1A9C1465000
unkown
page read and write
9E178FF000
stack
page read and write
ACB000
stack
page read and write
2DEDAF71000
unkown
page read and write
1180000
heap
page read and write
4CC1000
heap
page read and write
54D0000
trusted library allocation
page read and write
4A70000
trusted library allocation
page read and write
FACB3F9000
stack
page read and write
54B5000
trusted library allocation
page read and write
5056000
trusted library allocation
page read and write
C34000
heap
page read and write
C34000
heap
page read and write
4B20000
trusted library allocation
page read and write
2DEDA5F0000
remote allocation
page read and write
2FA94504000
unkown
page read and write
A20000
heap
page read and write
DC3608A000
stack
page read and write
DDACFFB000
stack
page read and write
C34000
heap
page read and write
1A9C143C000
unkown
page read and write
51C5000
trusted library allocation
page read and write
2DEDA651000
unkown
page read and write
1FEA593A000
unkown
page read and write
22C90E4A000
unkown
page read and write
E36000
trusted library allocation
page read and write
2FA93C58000
unkown
page read and write
1005A000
unkown
page readonly
22C90D80000
unkown
page read and write
1A9C1432000
unkown
page read and write
104E000
stack
page read and write
4C60000
heap
page read and write
2352F441000
unkown
page read and write
2DEDAFB0000
unkown
page read and write
50C0000
trusted library allocation
page read and write
B27B3FE000
stack
page read and write
F70000
heap
page read and write
EAB000
stack
page read and write
CD2000
heap
page read and write
2FA99041000
unkown
page read and write
4CC1000
heap
page read and write
5155000
trusted library allocation
page read and write
10057000
unkown
page read and write
C34000
heap
page read and write
4D36000
trusted library allocation
page read and write
51B6000
trusted library allocation
page read and write
2DEDAF6B000
unkown
page read and write
5490000
trusted library allocation
page read and write
AD1E000
trusted library allocation
page read and write
2352F413000
unkown
page read and write
990000
remote allocation
page read and write
2559BE86000
heap
page read and write
10057000
unkown
page read and write
339BDFB000
stack
page read and write
2FA93C7C000
unkown
page read and write
BA0000
heap
page read and write
C34000
heap
page read and write
2028AE00000
unkown
page read and write
2352F437000
unkown
page read and write
126F000
stack
page read and write
2B012E00000
unkown
page read and write
2DEDA67E000
unkown
page read and write
2FA94A00000
trusted library allocation
page read and write
2FA93D00000
unkown
page read and write
1A9C144D000
unkown
page read and write
C34000
heap
page read and write
C34000
heap
page read and write
2FA99480000
remote allocation
page read and write
C34000
heap
page read and write
3440000
heap
page read and write
D60000
trusted library allocation
page read and write
2DEDAF8F000
unkown
page read and write
710000
trusted library allocation
page read and write
2DEDAF26000
unkown
page read and write
5660000
trusted library allocation
page read and write
10057000
unkown
page read and write
2FA98FF0000
trusted library allocation
page read and write
2DEDAF73000
unkown
page read and write
CE0000
heap
page read and write
E10000
trusted library allocation
page read and write
5587000
trusted library allocation
page read and write
2DEDB400000
unkown
page read and write
2FA93C90000
unkown
page read and write
4CC1000
heap
page read and write
C34000
heap
page read and write
107F000
stack
page read and write
9E177FF000
stack
page read and write
134E000
stack
page read and write
2FA99400000
trusted library allocation
page read and write
10000000
unkown
page readonly
10000000
unkown
page readonly
5680000
trusted library allocation
page read and write
4755000
trusted library allocation
page read and write
DC3657F000
stack
page read and write
339BFF7000
stack
page read and write
1FEA5066000
unkown
page read and write
2DEDAF58000
unkown
page read and write
2DEDAFC2000
unkown
page read and write
2FA93C13000
unkown
page read and write
1FEA5912000
unkown
page read and write
2FA93C29000
unkown
page read and write
3070000
heap
page read and write
502F000
stack
page read and write
DDAD277000
stack
page read and write
339B98B000
stack
page read and write
22C90E88000
unkown
page read and write
1FEA5000000
unkown
page read and write
CF8000
heap
page read and write
D1FB4DC000
stack
page read and write
2FA99300000
trusted library allocation
page read and write
2FA9902E000
unkown
page read and write
C34000
heap
page read and write
2DEDA6E9000
unkown
page read and write
2DEDAF6D000
unkown
page read and write
10D1000
heap
page read and write
1005A000
unkown
page readonly
4CC1000
heap
page read and write
BCA000
heap
page read and write
2FA993C0000
trusted library allocation
page read and write
1A9C147F000
unkown
page read and write
5525000
trusted library allocation
page read and write
C34000
heap
page read and write
4DDC000
stack
page read and write
B27B2FF000
stack
page read and write
22C90E27000
unkown
page read and write
FC0000
heap
page read and write
2FA99480000
remote allocation
page read and write
22C90E49000
unkown
page read and write
2DEDAF90000
unkown
page read and write
9E172FD000
stack
page read and write
10046000
unkown
page readonly
22C90E63000
unkown
page read and write
C34000
heap
page read and write
4CC1000
heap
page read and write
1530000
heap
page read and write
2FA9904E000
unkown
page read and write
D1FBD7D000
stack
page read and write
22C90E69000
unkown
page read and write
2DEDA6A6000
unkown
page read and write
2559C140000
heap
page read and write
55AD000
trusted library allocation
page read and write
4F70000
trusted library allocation
page read and write
FDAF7FF000
stack
page read and write
22C90E4D000
unkown
page read and write
2DEDAFAC000
unkown
page read and write
4D00000
heap
page read and write
2028AF08000
unkown
page read and write
773000
heap
page read and write
2DEDAF90000
unkown
page read and write
5506000
trusted library allocation
page read and write
2559C150000
trusted library allocation
page read and write
54D1000
trusted library allocation
page read and write
2FA94F90000
trusted library allocation
page read and write
FBB000
stack
page read and write
22C90E4C000
unkown
page read and write
2559CAB0000
trusted library allocation
page read and write
2DEDAF4C000
unkown
page read and write
2DEDAFB2000
unkown
page read and write
4E5D000
stack
page read and write
4CC1000
heap
page read and write
10053000
unkown
page read and write
4723000
heap
page read and write
2DEDAF83000
unkown
page read and write
B30000
trusted library allocation
page read and write
5280000
trusted library allocation
page read and write
C80000
heap
page read and write
D00000
heap
page read and write
2A4BC7E000
stack
page read and write
22C90E69000
unkown
page read and write
10090000
trusted library allocation
page read and write
2559C145000
heap
page read and write
552C000
trusted library allocation
page read and write
1005A000
unkown
page readonly
2DEDAFA2000
unkown
page read and write
2DEDB402000
unkown
page read and write
536C000
stack
page read and write
2DEDAF90000
unkown
page read and write
2FA943E0000
trusted library allocation
page read and write
4F95000
trusted library allocation
page read and write
2FA94B10000
trusted library allocation
page read and write
2B013602000
unkown
page read and write
53D0000
remote allocation
page read and write
2FA94415000
unkown
page read and write
F9E000
stack
page read and write
C34000
heap
page read and write
2DEDB402000
unkown
page read and write
2DEDA713000
unkown
page read and write
4A9E000
stack
page read and write
770000
heap
page read and write
2FA99450000
trusted library allocation
page read and write
2DEDAF6D000
unkown
page read and write
E38000
stack
page read and write
52A5000
trusted library allocation
page read and write
C34000
heap
page read and write
4B45000
trusted library allocation
page read and write
10046000
unkown
page readonly
DDAD37E000
stack
page read and write
2FA943F0000
trusted library allocation
page read and write
550F000
trusted library allocation
page read and write
2DEDAF47000
unkown
page read and write
4B9E000
stack
page read and write
2B012D80000
remote allocation
page read and write
2352F45A000
unkown
page read and write
96B000
stack
page read and write
1FEA5113000
unkown
page read and write
11EE000
stack
page read and write
2FA990D1000
unkown
page read and write
C34000
heap
page read and write
2DEDA64F000
unkown
page read and write
C34000
heap
page read and write
FDAF279000
stack
page read and write
4CC1000
heap
page read and write
53C5000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
4D1E000
stack
page read and write
B27B17C000
stack
page read and write
552D000
trusted library allocation
page read and write
2DEDA655000
unkown
page read and write
E50000
trusted library allocation
page read and write
E6F000
stack
page read and write
56C5000
trusted library allocation
page read and write
2028AE29000
unkown
page read and write
10000000
unkown
page readonly
11AE000
stack
page read and write
4E35000
trusted library allocation
page read and write
2559BDA0000
heap
page read and write
FACB27D000
stack
page read and write
9F0000
remote allocation
page read and write
2DEDA580000
unkown
page read and write
2559BE40000
heap
page read and write
2FA94518000
unkown
page read and write
2DEDA550000
heap
page read and write
2B012D80000
remote allocation
page read and write
2028AE13000
unkown
page read and write
D1FBC7F000
stack
page read and write
2FA99410000
trusted library allocation
page read and write
4E15000
trusted library allocation
page read and write
1A9C1431000
unkown
page read and write
2352F2E0000
heap
page read and write
C34000
heap
page read and write
D1D000
heap
page read and write
2028AD70000
heap
page read and write
5517000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
2F93000
heap
page read and write
2FA99320000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
2352F270000
heap
page read and write
E97000
heap
page read and write
2A4BB7E000
stack
page read and write
D17000
heap
page read and write
C34000
heap
page read and write
C34000
heap
page read and write
2028AE3C000
unkown
page read and write
55AD000
trusted library allocation
page read and write
FA9967F000
stack
page read and write
4E9B000
stack
page read and write
92C000
stack
page read and write
C34000
heap
page read and write
3360000
trusted library allocation
page read and write
2559CD10000
trusted library allocation
page read and write
22C90E13000
unkown
page read and write
1A9C1447000
unkown
page read and write
39C000
stack
page read and write
1100000
trusted library allocation
page read and write
2FA94513000
unkown
page read and write
4CDD000
stack
page read and write
B05000
heap
page read and write
552D000
trusted library allocation
page read and write
520E000
stack
page read and write
2B012E13000
unkown
page read and write
9E171FF000
stack
page read and write
10053000
unkown
page read and write
C34000
heap
page read and write
C34000
heap
page read and write
2DEDAF8A000
unkown
page read and write
2DEDA6ED000
unkown
page read and write
2559C149000
heap
page read and write
C34000
heap
page read and write
2028AE56000
unkown
page read and write
2FA9930E000
trusted library allocation
page read and write
2ABF0078000
heap
page read and write
2B012E02000
unkown
page read and write
FDAF177000
stack
page read and write
2DEDAF79000
unkown
page read and write
335F000
stack
page read and write
C34000
heap
page read and write
2352F280000
heap
page read and write
54E0000
trusted library allocation
page read and write
4D9E000
stack
page read and write
56A5000
trusted library allocation
page read and write
11C0000
trusted library allocation
page read and write
2DEDA6A5000
unkown
page read and write
2B012F02000
unkown
page read and write
9E16C9B000
stack
page read and write
5090000
trusted library allocation
page read and write
2FA99308000
trusted library allocation
page read and write
B27B5FB000
stack
page read and write
330000
heap
page read and write
2DEDAFAC000
unkown
page read and write
1A9C1429000
unkown
page read and write
2FA93D00000
unkown
page read and write
1A9C1350000
heap
page read and write
530E000
stack
page read and write
C30000
heap
page read and write
990000
remote allocation
page read and write
48C6000
trusted library allocation
page read and write
C34000
heap
page read and write
D7E000
heap
page read and write
5731000
trusted library allocation
page read and write
4CC1000
heap
page read and write
2028AE5E000
unkown
page read and write
C34000
heap
page read and write
FF0000
trusted library allocation
page read and write
22C90E47000
unkown
page read and write
FE0000
heap
page read and write
4CC1000
heap
page read and write
22C90C10000
heap
page read and write
D66000
heap
page read and write
2DEDA5F0000
remote allocation
page read and write
5517000
trusted library allocation
page read and write
2ABEFEC0000
heap
page read and write
C34000
heap
page read and write
5541000
trusted library allocation
page read and write
54F2000
trusted library allocation
page read and write
C34000
heap
page read and write
22C90E29000
unkown
page read and write
C34000
heap
page read and write
10000000
unkown
page readonly
2FA99060000
unkown
page read and write
4B46000
trusted library allocation
page read and write
5156000
trusted library allocation
page read and write
2DEDA63C000
unkown
page read and write
1FEA5900000
unkown
page read and write
2352FC02000
unkown
page read and write
2FA99480000
remote allocation
page read and write
4ED0000
trusted library allocation
page read and write
C34000
heap
page read and write
C34000
heap
page read and write
2A4B69B000
stack
page read and write
554F000
trusted library allocation
page read and write
1A9C1478000
unkown
page read and write
DC365FD000
stack
page read and write
1FEA5064000
unkown
page read and write
D17000
heap
page read and write
4CC1000
heap
page read and write
2DEDA6C5000
unkown
page read and write
2DEDA670000
unkown
page read and write
4730000
trusted library allocation
page read and write
1A9C144B000
unkown
page read and write
FDAEBCE000
stack
page read and write
22C90E4E000
unkown
page read and write
33E0000
heap
page read and write
5517000
trusted library allocation
page read and write
FDAF5FB000
stack
page read and write
10FF000
stack
page read and write
528E000
stack
page read and write
12F0000
trusted library allocation
page read and write
4CC1000
heap
page read and write
4CC1000
heap
page read and write
2B012E40000
unkown
page read and write
2DEDAFB0000
unkown
page read and write
1A9C1467000
unkown
page read and write
C34000
heap
page read and write
1005A000
unkown
page readonly
1FEA5088000
unkown
page read and write
2FA93C73000
unkown
page read and write
10046000
unkown
page readonly
5577000
trusted library allocation
page read and write
2DEDAF1D000
unkown
page read and write
1FEA4F00000
heap
page read and write
2FA94502000
unkown
page read and write
10A0000
heap
page read and write
2559BE8C000
heap
page read and write
2028AE7D000
unkown
page read and write
4BF0000
heap
page read and write
2DEDAF90000
unkown
page read and write
C34000
heap
page read and write
532E000
stack
page read and write
53D0000
remote allocation
page read and write
80A000
heap
page read and write
ED0000
remote allocation
page read and write
C34000
heap
page read and write
53A6000
trusted library allocation
page read and write
D5F000
stack
page read and write
31E0000
heap
page read and write
5501000
trusted library allocation
page read and write
4720000
heap
page read and write
50B0000
heap
page read and write
2DEDAF90000
unkown
page read and write
1525000
trusted library allocation
page read and write
FA98A7C000
stack
page read and write
11B0000
heap
page read and write
2FA99021000
unkown
page read and write
4CCF000
stack
page read and write
B27B7FE000
stack
page read and write
AF0000
remote allocation
page read and write
2DEDA64C000
unkown
page read and write
2DEDAFA1000
unkown
page read and write
2F90000
heap
page read and write
C34000
heap
page read and write
2028AF00000
unkown
page read and write
4CC1000
heap
page read and write
5190000
trusted library allocation
page read and write
C34000
heap
page read and write
990000
remote allocation
page read and write
1FEA4E90000
heap
page read and write
2ABF0090000
heap
page read and write
2FA99324000
trusted library allocation
page read and write
C34000
heap
page read and write
4FF6000
trusted library allocation
page read and write
2559BE47000
heap
page read and write
C34000
heap
page read and write
2DEDAFC3000
unkown
page read and write
550F000
trusted library allocation
page read and write
2A4BD7E000
stack
page read and write
2B012E5C000
unkown
page read and write
B30000
heap
page read and write
22C90E00000
unkown
page read and write
2DEDA67A000
unkown
page read and write
4B60000
trusted library allocation
page read and write
E00000
heap
page read and write
2DEDAFA1000
unkown
page read and write
51B5000
trusted library allocation
page read and write
5566000
trusted library allocation
page read and write
9D0000
trusted library allocation
page read and write
E90000
heap
page read and write
FA98D7A000
stack
page read and write
10053000
unkown
page read and write
53E0000
trusted library allocation
page read and write
2ABF008F000
heap
page read and write
4CC1000
heap
page read and write
C34000
heap
page read and write
10046000
unkown
page readonly
C7B000
stack
page read and write
5565000
trusted library allocation
page read and write
2028AF13000
unkown
page read and write
1005A000
unkown
page readonly
2ABF0010000
heap
page read and write
2352F471000
unkown
page read and write
2028AE64000
unkown
page read and write
74C000
stack
page read and write
CC1000
heap
page read and write
1A9C1400000
unkown
page read and write
C34000
heap
page read and write
5505000
trusted library allocation
page read and write
10000000
unkown
page readonly
2FA98FE0000
trusted library allocation
page read and write
172F000
stack
page read and write
2DEDA4F0000
heap
page read and write
D1D000
heap
page read and write
2DEDAF70000
unkown
page read and write
52CE000
stack
page read and write
FDAF6F9000
stack
page read and write
C34000
heap
page read and write
1A9C143B000
unkown
page read and write
9E174FD000
stack
page read and write
1A9C1485000
unkown
page read and write
22C90F00000
unkown
page read and write
B27B8FC000
stack
page read and write
DC3610E000
stack
page read and write
CE0000
heap
page read and write
DC364FA000
stack
page read and write
5540000
trusted library allocation
page read and write
4CC1000
heap
page read and write
5757000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
C34000
heap
page read and write
FA9907B000
stack
page read and write
2DEDA702000
unkown
page read and write
10053000
unkown
page read and write
2DEDAF8C000
unkown
page read and write
2DEDAF7E000
unkown
page read and write
2FA990D7000
unkown
page read and write
2DEDAFC2000
unkown
page read and write
2DEDAF6D000
unkown
page read and write
552D000
trusted library allocation
page read and write
2559BE8C000
heap
page read and write
1360000
heap
page read and write
2FA990A1000
unkown
page read and write
E75000
trusted library allocation
page read and write
2DEDA629000
unkown
page read and write
5511000
trusted library allocation
page read and write
FA98E7A000
stack
page read and write
2DEDA646000
unkown
page read and write
C34000
heap
page read and write
2559CD20000
trusted library allocation
page read and write
4CC1000
heap
page read and write
2DEDAFA1000
unkown
page read and write
2B012E29000
unkown
page read and write
1526000
trusted library allocation
page read and write
C34000
heap
page read and write
A8D000
stack
page read and write
2DEDB402000
unkown
page read and write
14AE000
stack
page read and write
9F0000
remote allocation
page read and write
4FD0000
trusted library allocation
page read and write
50E5000
trusted library allocation
page read and write
D50000
heap
page read and write
2FA93C78000
unkown
page read and write
2DEDAF8B000
unkown
page read and write
2DEDAFAB000
unkown
page read and write
4CC1000
heap
page read and write
FDAEF7C000
stack
page read and write
2DEDAF6C000
unkown
page read and write
2028AE7D000
unkown
page read and write
2FA99430000
trusted library allocation
page read and write
4D5E000
stack
page read and write
1A9C1442000
unkown
page read and write
53D0000
trusted library allocation
page read and write
2DEDAF90000
unkown
page read and write
22C90E02000
unkown
page read and write
153B000
heap
page read and write
2D50000
heap
page read and write
2559CA40000
trusted library allocation
page read and write
1A9C143A000
unkown
page read and write
51A0000
trusted library allocation
page read and write
339C1FF000
stack
page read and write
22C91602000
unkown
page read and write
5380000
trusted library allocation
page read and write
C34000
heap
page read and write
CDF000
stack
page read and write
C34000
heap
page read and write
2FA93A30000
heap
page read and write
1A9C1446000
unkown
page read and write
2FA93D14000
unkown
page read and write
2FA9909E000
unkown
page read and write
2DEDAFC2000
unkown
page read and write
2DEDAF56000
unkown
page read and write
2DEDA67B000
unkown
page read and write
2028AD60000
heap
page read and write
22C90F08000
unkown
page read and write
5726000
trusted library allocation
page read and write
554F000
trusted library allocation
page read and write
1A9C146A000
unkown
page read and write
2FA993E0000
trusted library allocation
page read and write
C34000
heap
page read and write
C34000
heap
page read and write
10046000
unkown
page readonly
2FA990F4000
unkown
page read and write
1A9C147C000
unkown
page read and write
2DEDAF6D000
unkown
page read and write
C34000
heap
page read and write
4C00000
trusted library allocation
page read and write
2028AE80000
unkown
page read and write
2DEDA6EC000
unkown
page read and write
1A9C1432000
unkown
page read and write
4CC0000
heap
page read and write
22C90E5F000
unkown
page read and write
46E0000
trusted library allocation
page read and write
9F0000
remote allocation
page read and write
22C90E48000
unkown
page read and write
100E000
stack
page read and write
2B012D50000
unkown
page read and write
4BCF000
stack
page read and write
54B6000
trusted library allocation
page read and write
118A000
heap
page read and write
2DEDAF6B000
unkown
page read and write
2FA99300000
trusted library allocation
page read and write
22C90E5F000
unkown
page read and write
2DEDAFB3000
unkown
page read and write
2FA98FD0000
trusted library allocation
page read and write
FDAEB4C000
stack
page read and write
2352F400000
unkown
page read and write
780000
heap
page read and write
2FA93C3D000
unkown
page read and write
2FA943C1000
trusted library allocation
page read and write
CB0000
heap
page read and write
1FEA5802000
unkown
page read and write
5725000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
4BDF000
stack
page read and write
CD6000
heap
page read and write
D0A000
heap
page read and write
524E000
stack
page read and write
4C30000
trusted library allocation
page read and write
1A9C1444000
unkown
page read and write
2352F502000
unkown
page read and write
C34000
heap
page read and write
2DEDAFD0000
unkown
page read and write
2DEDAFD8000
unkown
page read and write
4ADF000
stack
page read and write
10057000
unkown
page read and write
103E000
stack
page read and write
4CC1000
heap
page read and write
1A9C1413000
unkown
page read and write
4CC1000
heap
page read and write
D87000
heap
page read and write
C34000
heap
page read and write
2FA93A20000
heap
page read and write
1500000
trusted library allocation
page read and write
339BC7D000
stack
page read and write
1FEA5042000
unkown
page read and write
E35000
trusted library allocation
page read and write
31F0000
trusted library allocation
page read and write
552D000
trusted library allocation
page read and write
B27AD1B000
stack
page read and write
56A6000
trusted library allocation
page read and write
2028ADD0000
heap
page read and write
D1FB97C000
stack
page read and write
2DEDAF6D000
unkown
page read and write
1A9C145F000
unkown
page read and write
2DEDAFAC000
unkown
page read and write
2559BEC1000
heap
page read and write
FDAF079000
stack
page read and write
2DEDA64B000
unkown
page read and write
2DEDAF6D000
unkown
page read and write
4CC1000
heap
page read and write
1A9C142E000
unkown
page read and write
2DEDA6D4000
unkown
page read and write
E60000
remote allocation
page read and write
4CC1000
heap
page read and write
2DEDA5F0000
remote allocation
page read and write
C34000
heap
page read and write
1A9C1C02000
unkown
page read and write
2DEDAF89000
unkown
page read and write
106A000
heap
page read and write
524E000
stack
page read and write
B27B57C000
stack
page read and write
4F3E000
stack
page read and write
2DEDAFC2000
unkown
page read and write
56A0000
trusted library allocation
page read and write
2ABF0050000
heap
page read and write
9E170FB000
stack
page read and write
534C000
stack
page read and write
5700000
trusted library allocation
page read and write
5506000
trusted library allocation
page read and write
2028AE8A000
unkown
page read and write
4CD1000
heap
page read and write
577F000
trusted library allocation
page read and write
2DEDAF57000
unkown
page read and write
2028B602000
unkown
page read and write
DC3618F000
stack
page read and write
2ABF005B000
heap
page read and write
1A9C1441000
unkown
page read and write
DDAD07E000
stack
page read and write
FACB07C000
stack
page read and write
C34000
heap
page read and write
1A9C147B000
unkown
page read and write
22C90F13000
unkown
page read and write
3DB000
stack
page read and write
2352F454000
unkown
page read and write
2DEDAF7E000
unkown
page read and write
F80000
trusted library allocation
page read and write
1FEA5660000
unkown
page read and write
There are 1075 hidden memdumps, click here to show them.