IOC Report

loading gif

Files

File Path
Type
Category
Malicious
smphost.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\6\5507.ocx
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_regsvr32.exe_e8da9d9d47a999f039c77c46f5a596d8854d75e_7a325c51_195cb6b3\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1E8B.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2AB2.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFBA1.tmp.dmp
Mini DuMP crash report, 14 streams, Sun Jan 30 21:31:02 2022, 0x1205a4 type
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\smphost.dll",#1
malicious
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /i /s C:\Users\user\Desktop\smphost.dll
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\smphost.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\smphost.dll,DllInstall
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\smphost.dll,DllRegisterServer
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\smphost.dll,DllUnregisterServer
malicious
C:\Windows\SysWOW64\schtasks.exe
C:\Windows\system32\schtasks.exe" /Create /SC MINUTE /MO 3 /TN 5507 /TR "%windir%\system32\regsvr32.exe -e C:\ProgramData\6\5507.ocx
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe -e C:\ProgramData\6\5507.ocx
malicious
C:\Windows\SysWOW64\regsvr32.exe
-e C:\ProgramData\6\5507.ocx
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe -e C:\ProgramData\6\5507.ocx
malicious
C:\Windows\SysWOW64\regsvr32.exe
-e C:\ProgramData\6\5507.ocx
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\smphost.dll"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 2064
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://manageintel.com/WUzZRUBQje/Auth.php
185.14.31.158
malicious
https://manageintel.com/RKyiihqXQiyE/xukYadevoVow/QXms.xml
185.14.31.158
malicious
https://manageintel.com/WUzZRUBQje/vAtVEC.xml
185.14.31.158
malicious
https://manageintel.com/RKyiihqXQiyE/xukYadevoVow/BhJM.xml
185.14.31.158
malicious
https://manageintel.com/
unknown

Domains

Name
IP
Malicious
manageintel.com
185.14.31.158
malicious

IPs

IP
Domain
Country
Malicious
185.14.31.158
manageintel.com
Ukraine
malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
ProgramId
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
FileId
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
LowerCaseLongPath
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
LongPathHash
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
Name
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
Publisher
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
Version
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
BinFileVersion
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
BinaryType
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
ProductName
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
ProductVersion
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
LinkDate
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
BinProductVersion
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
Size
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
Language
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
IsPeFile
\REGISTRY\A\{96f73a6f-55d1-b227-2a92-ec805a3e824a}\Root\InventoryApplicationFile\regsvr32.exe|f4ddfe6b
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018800453F4626F
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2E4E000
heap
page read and write
2116F3B0000
unkown
page read and write
2E4E000
heap
page read and write
4C8B000
trusted library allocation
page read and write
2E47000
heap
page read and write
3043000
heap
page read and write
2E4E000
heap
page read and write
4EF2000
trusted library allocation
page read and write
5C4000
heap
page read and write
1C09EB6A000
unkown
page read and write
4BB0000
trusted library allocation
page read and write
4FC000
stack
page read and write
2E4E000
heap
page read and write
4E69000
trusted library allocation
page read and write
2E47000
heap
page read and write
25E87037000
unkown
page read and write
8ABAC7E000
stack
page read and write
18451010000
heap
page read and write
2E4E000
heap
page read and write
538000
stack
page read and write
2E47000
heap
page read and write
1C09F100000
unkown
page read and write
4341000
heap
page read and write
1C09EB73000
unkown
page read and write
4FB6000
trusted library allocation
page read and write
4FB7000
trusted library allocation
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
2B66000
heap
page read and write
4341000
heap
page read and write
2116F508000
unkown
page read and write
1845127A000
unkown
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
3020000
heap
page read and write
6E9E1000
unkown
page execute read
15D521F0000
remote allocation
page read and write
2E47000
heap
page read and write
2B67000
heap
page read and write
3043000
heap
page read and write
3043000
heap
page read and write
2E4E000
heap
page read and write
4C54000
trusted library allocation
page read and write
2E4E000
heap
page read and write
5300000
trusted library allocation
page read and write
2F72000
heap
page read and write
4F91000
trusted library allocation
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
1C09EB93000
unkown
page read and write
3012000
heap
page read and write
5C6497E000
stack
page read and write
2FBD000
heap
page read and write
2E47000
heap
page read and write
8ABB07B000
stack
page read and write
2857000
heap
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
4EF7000
trusted library allocation
page read and write
15D52A02000
unkown
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
3160000
trusted library allocation
page read and write
1845126D000
unkown
page read and write
1C09E44D000
unkown
page read and write
2FDC000
heap
page read and write
2E4E000
heap
page read and write
2BDABF90000
unkown
page read and write
4341000
heap
page read and write
4A90000
trusted library allocation
page read and write
8ABB177000
stack
page read and write
4FB6000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
1C09EB75000
unkown
page read and write
1834D43E000
unkown
page read and write
EE0000
unkown
page read and write
236A43A0000
trusted library allocation
page read and write
C631BFC000
stack
page read and write
4F70000
heap
page read and write
1C09EBA0000
unkown
page read and write
2B98000
heap
page read and write
1C09EBB1000
unkown
page read and write
2CE0000
unkown
page readonly
2AAA000
heap
page read and write
2E47000
heap
page read and write
54A0000
remote allocation
page read and write
7FC00000
trusted library allocation
page execute and read and write
236A36E5000
heap
page read and write
54E1000
heap
page read and write
4E7A000
trusted library allocation
page read and write
4F91000
trusted library allocation
page read and write
5091000
trusted library allocation
page read and write
5091000
trusted library allocation
page read and write
4341000
heap
page read and write
2E4E000
heap
page read and write
5C4000
heap
page read and write
3012000
heap
page read and write
1C09EB74000
unkown
page read and write
2FD0000
heap
page read and write
1C09EBA0000
unkown
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
5C4000
heap
page read and write
C53087F000
stack
page read and write
4341000
heap
page read and write
4FDE000
trusted library allocation
page read and write
236A36A9000
heap
page read and write
4E27000
trusted library allocation
page read and write
5184000
trusted library allocation
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
3043000
heap
page read and write
2E4E000
heap
page read and write
3043000
heap
page read and write
481F000
stack
page read and write
236A36B1000
heap
page read and write
33D0000
trusted library allocation
page read and write
1C09EBB1000
unkown
page read and write
1C09EBD2000
unkown
page read and write
4FB6000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
4D11000
heap
page read and write
1845126B000
unkown
page read and write
2E47000
heap
page read and write
2B28000
stack
page read and write
3011000
heap
page read and write
2E47000
heap
page read and write
3043000
heap
page read and write
510000
trusted library allocation
page read and write
864E57E000
stack
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
1C09EBBC000
unkown
page read and write
4FDE000
trusted library allocation
page read and write
6A757C000
stack
page read and write
2E4E000
heap
page read and write
2FCA000
heap
page read and write
2FF9000
heap
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
3043000
heap
page read and write
406F000
stack
page read and write
4F90000
remote allocation
page read and write
3043000
heap
page read and write
1C09EBBC000
unkown
page read and write
2E47000
heap
page read and write
2E40000
heap
page read and write
2E4E000
heap
page read and write
4341000
heap
page read and write
2116F44E000
unkown
page read and write
FDE000
stack
page read and write
5330000
trusted library allocation
page read and write
2E47000
heap
page read and write
4CB0000
trusted library allocation
page read and write
EC0000
unkown
page readonly
2B98000
heap
page read and write
2116F448000
unkown
page read and write
15D521C0000
unkown
page read and write
2E4E000
heap
page read and write
3043000
heap
page read and write
5C4000
heap
page read and write
4F91000
trusted library allocation
page read and write
4341000
heap
page read and write
199D7E8A000
unkown
page read and write
864E07E000
stack
page read and write
4F91000
trusted library allocation
page read and write
4FDE000
trusted library allocation
page read and write
1C09EB93000
unkown
page read and write
56AAA7C000
stack
page read and write
4F60000
trusted library allocation
page read and write
2E4E000
heap
page read and write
240000
heap
page read and write
4F91000
trusted library allocation
page read and write
29AD000
stack
page read and write
2F67000
heap
page read and write
2CD0000
unkown
page readonly
2E4E000
heap
page read and write
2E47000
heap
page read and write
6E9E0000
unkown
page readonly
1C09E477000
unkown
page read and write
2E4E000
heap
page read and write
3043000
heap
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
2FA7000
heap
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
199D7E29000
unkown
page read and write
2A57000
heap
page read and write
3043000
heap
page read and write
2E4E000
heap
page read and write
54A0000
trusted library allocation
page read and write
15D52190000
heap
page read and write
2E4E000
heap
page read and write
1C09EB91000
unkown
page read and write
2A2E000
stack
page read and write
536E000
stack
page read and write
3043000
heap
page read and write
540000
heap
page read and write
56AB0FB000
stack
page read and write
54E0000
heap
page read and write
440000
heap
page read and write
A9B000
stack
page read and write
2CE0000
unkown
page readonly
3043000
heap
page read and write
4ED0000
remote allocation
page read and write
4F91000
trusted library allocation
page read and write
1C09EB94000
unkown
page read and write
2EFF000
heap
page read and write
2F0E000
stack
page read and write
2E47000
heap
page read and write
2FD0000
heap
page read and write
4F91000
trusted library allocation
page read and write
4341000
heap
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
236A43C0000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
4FDE000
trusted library allocation
page read and write
3043000
heap
page read and write
2E47000
heap
page read and write
322B000
heap
page read and write
4FB6000
trusted library allocation
page read and write
1C09EBCC000
unkown
page read and write
3012000
heap
page read and write
94E000
stack
page read and write
96B000
heap
page read and write
3012000
heap
page read and write
3043000
heap
page read and write
2E47000
heap
page read and write
4EF2000
trusted library allocation
page read and write
2E47000
heap
page read and write
4EF2000
trusted library allocation
page read and write
2BDAC002000
unkown
page read and write
2843000
heap
page read and write
2E47000
heap
page read and write
2116F43C000
unkown
page read and write
18451246000
unkown
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
60B6679000
stack
page read and write
3012000
heap
page read and write
2E4E000
heap
page read and write
3043000
heap
page read and write
53B7000
trusted library allocation
page read and write
4A8F000
stack
page read and write
4FDE000
trusted library allocation
page read and write
3120000
heap
page read and write
2E4E000
heap
page read and write
4A4E000
stack
page read and write
2E47000
heap
page read and write
3043000
heap
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
31F0000
trusted library allocation
page read and write
2E47000
heap
page read and write
3012000
heap
page read and write
4F91000
trusted library allocation
page read and write
2E4E000
heap
page read and write
4F91000
trusted library allocation
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
6E9FE000
unkown
page readonly
199D7C40000
heap
page read and write
4E42000
trusted library allocation
page read and write
2848000
heap
page read and write
5290000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
2E4E000
heap
page read and write
2116F44C000
unkown
page read and write
90D000
stack
page read and write
C631AFF000
stack
page read and write
1845125E000
unkown
page read and write
2E47000
heap
page read and write
2AAA000
heap
page read and write
8ABB3FD000
stack
page read and write
2E4E000
heap
page read and write
4C8B000
trusted library allocation
page read and write
1834D502000
unkown
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
2116F492000
unkown
page read and write
4E25000
trusted library allocation
page read and write
3043000
heap
page read and write
2E47000
heap
page read and write
3012000
heap
page read and write
3012000
heap
page read and write
3012000
heap
page read and write
236A43D0000
trusted library allocation
page read and write
5091000
trusted library allocation
page read and write
54F0000
heap
page read and write
302E000
heap
page read and write
4A90000
trusted library allocation
page read and write
4C21000
trusted library allocation
page read and write
3043000
heap
page read and write
4AB000
stack
page read and write
57B0000
heap
page read and write
6A708B000
stack
page read and write
2E4E000
heap
page read and write
1C09EBA0000
unkown
page read and write
5290000
trusted library allocation
page read and write
800000
heap
page read and write
2E4E000
heap
page read and write
1C09E513000
unkown
page read and write
7FC00000
trusted library allocation
page execute and read and write
3043000
heap
page read and write
4F91000
trusted library allocation
page read and write
5091000
trusted library allocation
page read and write
4FDE000
trusted library allocation
page read and write
2820000
heap
page read and write
2E47000
heap
page read and write
4341000
heap
page read and write
1EF7E910000
heap
page read and write
2116F453000
unkown
page read and write
5180000
trusted library allocation
page read and write
263E000
stack
page read and write
2E4E000
heap
page read and write
56AB3FC000
stack
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
2BDABA3C000
unkown
page read and write
2BDABA60000
unkown
page read and write
C40000
heap
page read and write
3043000
heap
page read and write
3043000
heap
page read and write
2B69000
heap
page read and write
1834D4BB000
unkown
page read and write
2ED0000
trusted library allocation
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
10BE000
stack
page read and write
6E9E0000
unkown
page readonly
4E25000
trusted library allocation
page read and write
2BDAB830000
heap
page read and write
447E000
stack
page read and write
8ABABFB000
stack
page read and write
DBBCBBB000
stack
page read and write
2E4E000
heap
page read and write
3012000
heap
page read and write
DBBD37F000
stack
page read and write
2AA7000
heap
page read and write
2E4E000
heap
page read and write
3043000
heap
page read and write
3043000
heap
page read and write
3043000
heap
page read and write
EED657F000
stack
page read and write
4F91000
trusted library allocation
page read and write
90D000
stack
page read and write
2B67000
heap
page read and write
4CEF000
stack
page read and write
4FDE000
trusted library allocation
page read and write
1C09EB6E000
unkown
page read and write
2E4E000
heap
page read and write
4E1B000
trusted library allocation
page read and write
2E47000
heap
page read and write
4E35000
trusted library allocation
page read and write
4F91000
trusted library allocation
page read and write
2FD6000
heap
page read and write
2A80000
heap
page read and write
2E4E000
heap
page read and write
3228000
heap
page read and write
106F000
stack
page read and write
C631CFF000
stack
page read and write
2FBD000
heap
page read and write
3043000
heap
page read and write
49CE000
stack
page read and write
1070000
trusted library allocation
page read and write
1C09EB64000
unkown
page read and write
4E4E000
stack
page read and write
10FF000
stack
page read and write
4FDE000
trusted library allocation
page read and write
1C09F03C000
unkown
page read and write
4F0D000
trusted library allocation
page read and write
3012000
heap
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
4E15000
trusted library allocation
page read and write
2BDAB7C0000
heap
page read and write
2AAA000
heap
page read and write
4DA8000
trusted library allocation
page read and write
FD5E32B000
stack
page read and write
3012000
heap
page read and write
EED65F9000
stack
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
60B5F6D000
stack
page read and write
FD5EAFE000
stack
page read and write
4EF2000
trusted library allocation
page read and write
25E87302000
unkown
page read and write
2116F400000
unkown
page read and write
4BB0000
trusted library allocation
page read and write
3043000
heap
page read and write
4E42000
trusted library allocation
page read and write
494E000
stack
page read and write
5C4000
heap
page read and write
307C000
stack
page read and write
29AD000
stack
page read and write
4E12000
trusted library allocation
page read and write
2E4E000
heap
page read and write
1C09F000000
unkown
page read and write
1834DD00000
unkown
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
3012000
heap
page read and write
505F000
trusted library allocation
page read and write
2FC4000
heap
page read and write
2E47000
heap
page read and write
3043000
heap
page read and write
5C6487E000
stack
page read and write
2FD0000
heap
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
1C09E449000
unkown
page read and write
4FFB000
trusted library allocation
page read and write
4F91000
trusted library allocation
page read and write
22A0DD20000
heap
page read and write
103B000
heap
page read and write
2E47000
heap
page read and write
236A3940000
trusted library allocation
page read and write
518A000
trusted library allocation
page read and write
2E47000
heap
page read and write
4E7A000
trusted library allocation
page read and write
4FB6000
trusted library allocation
page read and write
2A50000
heap
page read and write
490E000
stack
page read and write
3043000
heap
page read and write
5350000
trusted library allocation
page read and write
2E4E000
heap
page read and write
2116F451000
unkown
page read and write
2E4E000
heap
page read and write
5091000
trusted library allocation
page read and write
236A36A0000
heap
page read and write
3043000
heap
page read and write
2E47000
heap
page read and write
1C09EB72000
unkown
page read and write
FD5EBFF000
stack
page read and write
2E4E000
heap
page read and write
3012000
heap
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
18451240000
unkown
page read and write
2E47000
heap
page read and write
236A36ED000
heap
page read and write
4FDE000
trusted library allocation
page read and write
2A57000
heap
page read and write
2E47000
heap
page read and write
2ECE000
stack
page read and write
2FD6000
heap
page read and write
3032000
heap
page read and write
2116F500000
unkown
page read and write
1C09F03C000
unkown
page read and write
2E4E000
heap
page read and write
102E000
stack
page read and write
236A3460000
trusted library allocation
page read and write
23EE000
stack
page read and write
3043000
heap
page read and write
2F71000
heap
page read and write
5C4000
heap
page read and write
22A0DF13000
unkown
page read and write
4FDE000
trusted library allocation
page read and write
2F01000
heap
page read and write
1834D400000
unkown
page read and write
3043000
heap
page read and write
4EFB000
trusted library allocation
page read and write
6E9FC000
unkown
page read and write
2116F413000
unkown
page read and write
2FDC000
heap
page read and write
2E47000
heap
page read and write
5C4000
heap
page read and write
7D0000
heap
page read and write
53B7000
trusted library allocation
page read and write
1C09EB51000
unkown
page read and write
2FCA000
heap
page read and write
4FB6000
trusted library allocation
page read and write
2FDC000
heap
page read and write
4A10000
remote allocation
page read and write
4FB6000
trusted library allocation
page read and write
54E5000
heap
page read and write
EFC000
stack
page read and write
2E4E000
heap
page read and write
2AA0000
heap
page read and write
1C09E482000
unkown
page read and write
4F60000
trusted library allocation
page read and write
2F8D000
heap
page read and write
2E4E000
heap
page read and write
5090000
trusted library allocation
page read and write
DBBCEFE000
stack
page read and write
1C09EFA0000
remote allocation
page read and write
2E47000
heap
page read and write
4E35000
trusted library allocation
page read and write
2B0B000
heap
page read and write
1C09E4ED000
unkown
page read and write
1C09EFA0000
remote allocation
page read and write
2E4E000
heap
page read and write
2F9F000
heap
page read and write
1C09E479000
unkown
page read and write
4D96000
trusted library allocation
page read and write
2FA5000
heap
page read and write
2E47000
heap
page read and write
2F71000
heap
page read and write
5C6467E000
stack
page read and write
3043000
heap
page read and write
2E4E000
heap
page read and write
4F10000
trusted library allocation
page read and write
3043000
heap
page read and write
4FB6000
trusted library allocation
page read and write
2E4E000
heap
page read and write
5C4000
heap
page read and write
3043000
heap
page read and write
4A8F000
stack
page read and write
1C09E458000
unkown
page read and write
3043000
heap
page read and write
2E47000
heap
page read and write
29AD000
stack
page read and write
4F91000
trusted library allocation
page read and write
2E4E000
heap
page read and write
4F91000
trusted library allocation
page read and write
2E47000
heap
page read and write
3110000
trusted library allocation
page read and write
4FDE000
trusted library allocation
page read and write
1C09EB94000
unkown
page read and write
3012000
heap
page read and write
3012000
heap
page read and write
2F00000
heap
page read and write
2FBD000
heap
page read and write
4A4E000
stack
page read and write
2116FC02000
unkown
page read and write
3043000
heap
page read and write
2E4E000
heap
page read and write
25E87123000
heap
page read and write
2E4E000
heap
page read and write
4F91000
trusted library allocation
page read and write
2FBD000
heap
page read and write
4FB6000
trusted library allocation
page read and write
4F80000
trusted library allocation
page read and write
2116F2B0000
heap
page read and write
2E4E000
heap
page read and write
3012000
heap
page read and write
4FB6000
trusted library allocation
page read and write
56AB1FF000
stack
page read and write
2E47000
heap
page read and write
2FB8000
heap
page read and write
236A3620000
trusted library allocation
page read and write
1C09EB60000
unkown
page read and write
2F62000
heap
page read and write
6E9FE000
unkown
page readonly
3043000
heap
page read and write
4CB1000
trusted library allocation
page read and write
4FDE000
trusted library allocation
page read and write
4FC000
stack
page read and write
4FB6000
trusted library allocation
page read and write
2BDABA29000
unkown
page read and write
4341000
heap
page read and write
C52FFFB000
stack
page read and write
4FB6000
trusted library allocation
page read and write
1C09E400000
unkown
page read and write
199D7E6F000
unkown
page read and write
4FB6000
trusted library allocation
page read and write
2842000
heap
page read and write
2E47000
heap
page read and write
4FB6000
trusted library allocation
page read and write
48A0000
heap
page read and write
3043000
heap
page read and write
2A2E000
stack
page read and write
4D8E000
stack
page read and write
2C90000
heap
page read and write
4AB0000
trusted library allocation
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
4DA4000
trusted library allocation
page read and write
25E87115000
unkown
page read and write
1C09EBD2000
unkown
page read and write
4FB6000
trusted library allocation
page read and write
5340000
trusted library allocation
page read and write
3012000
heap
page read and write
4FB6000
trusted library allocation
page read and write
C53017F000
stack
page read and write
302A000
heap
page read and write
572E000
stack
page read and write
2E47000
heap
page read and write
4E27000
trusted library allocation
page read and write
2E4E000
heap
page read and write
301E000
stack
page read and write
2A9E000
stack
page read and write
5330000
trusted library allocation
page read and write
2F15000
heap
page read and write
3012000
heap
page read and write
34CE000
stack
page read and write
4D10000
heap
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
236A3939000
heap
page read and write
2F60000
heap
page read and write
236A3930000
heap
page read and write
2E4E000
heap
page read and write
1C09E4B0000
unkown
page read and write
236A4160000
trusted library allocation
page read and write
4E2D000
trusted library allocation
page read and write
4FDE000
trusted library allocation
page read and write
2E47000
heap
page read and write
4D9E000
trusted library allocation
page read and write
8ABAE77000
stack
page read and write
576F000
stack
page read and write
598D000
stack
page read and write
4BB1000
trusted library allocation
page read and write
2E4E000
heap
page read and write
2FBE000
heap
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
3520000
heap
page read and write
2E4E000
heap
page read and write
4D94000
trusted library allocation
page read and write
2E4E000
heap
page read and write
5091000
trusted library allocation
page read and write
2E47000
heap
page read and write
3043000
heap
page read and write
2FDC000
heap
page read and write
2E47000
heap
page read and write
4FB6000
trusted library allocation
page read and write
4341000
heap
page read and write
3043000
heap
page read and write
234C000
stack
page read and write
2FCA000
heap
page read and write
3043000
heap
page read and write
3027000
heap
page read and write
1834D513000
unkown
page read and write
2FB8000
heap
page read and write
2FC4000
heap
page read and write
1C09EB84000
unkown
page read and write
2E4E000
heap
page read and write
199D7E4B000
unkown
page read and write
3012000
heap
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
ED0000
unkown
page readonly
4FB6000
trusted library allocation
page read and write
4E27000
trusted library allocation
page read and write
2E47000
heap
page read and write
2B13000
heap
page read and write
25E87002000
unkown
page read and write
3043000
heap
page read and write
2E4E000
heap
page read and write
1834D470000
unkown
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
1C09E44A000
unkown
page read and write
3043000
heap
page read and write
C6317FA000
stack
page read and write
2EFC000
heap
page read and write
2E4E000
heap
page read and write
2AA0000
heap
page read and write
2E47000
heap
page read and write
4F0B000
trusted library allocation
page read and write
1834DA60000
unkown
page read and write
EED647D000
stack
page read and write
2E47000
heap
page read and write
3043000
heap
page read and write
582E000
stack
page read and write
236A3690000
trusted library allocation
page read and write
54E8000
heap
page read and write
2E47000
heap
page read and write
3043000
heap
page read and write
6E9F5000
unkown
page readonly
4F91000
trusted library allocation
page read and write
49CE000
stack
page read and write
2FD0000
heap
page read and write
2FDC000
heap
page read and write
3043000
heap
page read and write
3012000
heap
page read and write
4CB1000
trusted library allocation
page read and write
2E47000
heap
page read and write
3043000
heap
page read and write
199D7E48000
unkown
page read and write
1C09EB7E000
unkown
page read and write
4CB0000
trusted library allocation
page read and write
2FD6000
heap
page read and write
517E000
trusted library allocation
page read and write
18451262000
unkown
page read and write
29ED000
stack
page read and write
4F91000
trusted library allocation
page read and write
18451242000
unkown
page read and write
2E47000
heap
page read and write
2BDAB7D0000
heap
page read and write
4F91000
trusted library allocation
page read and write
2FD0000
heap
page read and write
4F91000
trusted library allocation
page read and write
2E47000
heap
page read and write
4F91000
trusted library allocation
page read and write
2B5C000
heap
page read and write
56AAEFF000
stack
page read and write
15D521F0000
remote allocation
page read and write
EED6679000
stack
page read and write
3043000
heap
page read and write
2CD0000
unkown
page readonly
2E4E000
heap
page read and write
2E4E000
heap
page read and write
4F91000
trusted library allocation
page read and write
2FC4000
heap
page read and write
8ABAD7B000
stack
page read and write
3012000
heap
page read and write
2E4E000
heap
page read and write
5C6432B000
stack
page read and write
2FBD000
heap
page read and write
1C09EBD2000
unkown
page read and write
58C0000
heap
page read and write
2E47000
heap
page read and write
27D0000
trusted library allocation
page read and write
5091000
trusted library allocation
page read and write
22A0DE02000
unkown
page read and write
2116F480000
unkown
page read and write
18451230000
unkown
page read and write
2E4E000
heap
page read and write
490000
heap
page read and write
1C09EBA0000
unkown
page read and write
2FDE000
heap
page read and write
2E4E000
heap
page read and write
4D0E000
stack
page read and write
199D7E00000
unkown
page read and write
2E4E000
heap
page read and write
2B00000
heap
page read and write
1C09E429000
unkown
page read and write
4EB0000
trusted library allocation
page read and write
18451261000
unkown
page read and write
236A3935000
heap
page read and write
5C4000
heap
page read and write
4F0B000
trusted library allocation
page read and write
2FDC000
heap
page read and write
4A10000
remote allocation
page read and write
2E47000
heap
page read and write
8ABAA7E000
stack
page read and write
2FDC000
heap
page read and write
18450FB0000
heap
page read and write
2E47000
heap
page read and write
4F0C000
trusted library allocation
page read and write
4350000
heap
page read and write
4F0B000
trusted library allocation
page read and write
2AA0000
heap
page read and write
2FD0000
heap
page read and write
1C09EBB1000
unkown
page read and write
4341000
heap
page read and write
1000000
heap
page read and write
1C09E502000
unkown
page read and write
4FDE000
trusted library allocation
page read and write
2F5B000
heap
page read and write
4DCF000
stack
page read and write
2E4E000
heap
page read and write
31A7000
heap
page read and write
22A0DE5B000
unkown
page read and write
2E4E000
heap
page read and write
4F91000
trusted library allocation
page read and write
199D7E4E000
unkown
page read and write
199D7E80000
unkown
page read and write
2E4E000
heap
page read and write
4FB6000
trusted library allocation
page read and write
4FB6000
trusted library allocation
page read and write
4F90000
remote allocation
page read and write
2FC4000
heap
page read and write
3043000
heap
page read and write
4FDE000
trusted library allocation
page read and write
3043000
heap
page read and write
2E4E000
heap
page read and write
352A000
heap
page read and write
1C09EB84000
unkown
page read and write
3012000
heap
page read and write
2F67000
heap
page read and write
199D7E53000
unkown
page read and write
2E4E000
heap
page read and write
4EB0000
trusted library allocation
page read and write
1C09EBB0000
unkown
page read and write
2E47000
heap
page read and write
4D20000
heap
page read and write
3012000
heap
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
485E000
stack
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
18451269000
unkown
page read and write
3012000
heap
page read and write
2E4E000
heap
page read and write
3012000
heap
page read and write
4D4F000
stack
page read and write
3157000
heap
page read and write
4F91000
trusted library allocation
page read and write
2E4E000
heap
page read and write
2FD6000
heap
page read and write
4341000
heap
page read and write
1250000
heap
page read and write
2E47000
heap
page read and write
2A50000
heap
page read and write
2E4E000
heap
page read and write
4FB6000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
199D7E13000
unkown
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
4CB1000
trusted library allocation
page read and write
2E47000
heap
page read and write
4FDE000
trusted library allocation
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
236A43B0000
heap
page readonly
18451302000
unkown
page read and write
4F90000
trusted library allocation
page read and write
4AB0000
trusted library allocation
page read and write
25E87313000
unkown
page read and write
2E4E000
heap
page read and write
4F80000
trusted library allocation
page read and write
15D5223D000
unkown
page read and write
2E4E000
heap
page read and write
2FC4000
heap
page read and write
5091000
trusted library allocation
page read and write
57AD000
stack
page read and write
56AB07D000
stack
page read and write
4E69000
trusted library allocation
page read and write
2E4E000
heap
page read and write
236A36ED000
heap
page read and write
7FD40000
trusted library allocation
page execute and read and write
1C09E4C5000
unkown
page read and write
4FDE000
trusted library allocation
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
4350000
heap
page read and write
18451802000
unkown
page read and write
2BDABA66000
unkown
page read and write
4FB6000
trusted library allocation
page read and write
3028000
heap
page read and write
2E4E000
heap
page read and write
2116F470000
unkown
page read and write
DBBD47F000
stack
page read and write
4EF2000
trusted library allocation
page read and write
2DF0000
heap
page read and write
2390000
heap
page read and write
2E4E000
heap
page read and write
3043000
heap
page read and write
6E0000
heap
page read and write
1EF7E6DF000
heap
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
4FB6000
trusted library allocation
page read and write
2B00000
heap
page read and write
4341000
heap
page read and write
2E47000
heap
page read and write
1C09EBB1000
unkown
page read and write
485E000
stack
page read and write
2E47000
heap
page read and write
1C09EBCC000
unkown
page read and write
2E4E000
heap
page read and write
3026000
heap
page read and write
4FB6000
trusted library allocation
page read and write
960000
heap
page read and write
586F000
stack
page read and write
8ABB4FA000
stack
page read and write
4E27000
trusted library allocation
page read and write
4FDE000
trusted library allocation
page read and write
2CC2000
stack
page read and write
4FDE000
trusted library allocation
page read and write
3043000
heap
page read and write
2E4E000
heap
page read and write
4FDE000
trusted library allocation
page read and write
6E9E0000
unkown
page readonly
2E47000
heap
page read and write
2E47000
heap
page read and write
29ED000
stack
page read and write
2E4E000
heap
page read and write
3012000
heap
page read and write
56AB2FE000
stack
page read and write
3031000
heap
page read and write
490000
unkown
page read and write
4FDE000
trusted library allocation
page read and write
2FCA000
heap
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
494E000
stack
page read and write
4FB6000
trusted library allocation
page read and write
2E4E000
heap
page read and write
2B00000
heap
page read and write
3043000
heap
page read and write
2E4E000
heap
page read and write
4150000
heap
page read and write
4341000
heap
page read and write
2E4E000
heap
page read and write
4FDE000
trusted library allocation
page read and write
3012000
heap
page read and write
301F000
heap
page read and write
2E47000
heap
page read and write
341A000
heap
page read and write
2E4E000
heap
page read and write
18451200000
unkown
page read and write
2E4E000
heap
page read and write
4F91000
trusted library allocation
page read and write
2E4E000
heap
page read and write
3043000
heap
page read and write
4F91000
trusted library allocation
page read and write
4FB6000
trusted library allocation
page read and write
2865000
heap
page read and write
3043000
heap
page read and write
2E4E000
heap
page read and write
4F91000
trusted library allocation
page read and write
2E47000
heap
page read and write
4FB6000
trusted library allocation
page read and write
4FDE000
trusted library allocation
page read and write
2E47000
heap
page read and write
4FB6000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
C53057D000
stack
page read and write
EC0000
unkown
page readonly
22A0DD10000
heap
page read and write
2E4E000
heap
page read and write
4FB6000
trusted library allocation
page read and write
2E4E000
heap
page read and write
1C09EBB7000
unkown
page read and write
2B1A000
heap
page read and write
EED60CB000
stack
page read and write
2E47000
heap
page read and write
5A5F000
stack
page read and write
3012000
heap
page read and write
4FB6000
trusted library allocation
page read and write
2E47000
heap
page read and write
2E8E000
stack
page read and write
329B000
stack
page read and write
4E21000
trusted library allocation
page read and write
FD5E87B000
stack
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
4FDE000
trusted library allocation
page read and write
4341000
heap
page read and write
6F841000
unkown
page execute read
6E9FC000
unkown
page read and write
BF0000
heap
page read and write
2116F240000
heap
page read and write
2E4E000
heap
page read and write
2FDE000
heap
page read and write
2E47000
heap
page read and write
2E45000
heap
page read and write
2E47000
heap
page read and write
C40000
heap
page read and write
4DA0000
trusted library allocation
page read and write
5186000
trusted library allocation
page read and write
4DAC000
trusted library allocation
page read and write
344E000
stack
page read and write
3043000
heap
page read and write
FD5E77C000
stack
page read and write
5091000
trusted library allocation
page read and write
2E4E000
heap
page read and write
1C09F002000
unkown
page read and write
3043000
heap
page read and write
2B1A000
heap
page read and write
2FCA000
heap
page read and write
481F000
stack
page read and write
6E9FC000
unkown
page read and write
4FDE000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
4341000
heap
page read and write
2FD0000
heap
page read and write
2E4E000
heap
page read and write
4FB6000
trusted library allocation
page read and write
2E4E000
heap
page read and write
1834D2A0000
heap
page read and write
3021000
heap
page read and write
1C09EBB4000
unkown
page read and write
502B000
trusted library allocation
page read and write
4F91000
trusted library allocation
page read and write
4341000
heap
page read and write
2FDC000
heap
page read and write
2F99000
heap
page read and write
22A0DE37000
unkown
page read and write
2851000
heap
page read and write
4C54000
trusted library allocation
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
2854000
heap
page read and write
4341000
heap
page read and write
4FDE000
trusted library allocation
page read and write
2E47000
heap
page read and write
489F000
stack
page read and write
2640000
heap
page read and write
5091000
trusted library allocation
page read and write
3022000
heap
page read and write
3012000
heap
page read and write
2E4E000
heap
page read and write
4341000
heap
page read and write
5091000
trusted library allocation
page read and write
2F60000
heap
page read and write
4F84000
trusted library allocation
page read and write
1C09EB84000
unkown
page read and write
2E47000
heap
page read and write
5188000
trusted library allocation
page read and write
22A0DE6D000
unkown
page read and write
15D5225C000
unkown
page read and write
4A8F000
stack
page read and write
1C09EB99000
unkown
page read and write
3140000
trusted library allocation
page read and write
22A0DF02000
unkown
page read and write
1C09EB7E000
unkown
page read and write
2E47000
heap
page read and write
2F6E000
heap
page read and write
4F0E000
trusted library allocation
page read and write
3012000
heap
page read and write
4FB6000
trusted library allocation
page read and write
3043000
heap
page read and write
2E47000
heap
page read and write
3043000
heap
page read and write
3012000
heap
page read and write
2B63000
heap
page read and write
1EF7E6EF000
heap
page read and write
1C09EBD3000
unkown
page read and write
3043000
heap
page read and write
199D7F02000
unkown
page read and write
1C09E459000
unkown
page read and write
22A0DD80000
heap
page read and write
538000
stack
page read and write
2E47000
heap
page read and write
4E69000
trusted library allocation
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
5091000
trusted library allocation
page read and write
490E000
stack
page read and write
3043000
heap
page read and write
4F60000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
4A4E000
stack
page read and write
4E69000
trusted library allocation
page read and write
4FB6000
trusted library allocation
page read and write
3043000
heap
page read and write
1845127E000
unkown
page read and write
5091000
trusted library allocation
page read and write
5C4000
heap
page read and write
15D5222A000
unkown
page read and write
4FB6000
trusted library allocation
page read and write
2FD6000
heap
page read and write
4EB0000
trusted library allocation
page read and write
2E4E000
heap
page read and write
2FCA000
heap
page read and write
4E8E000
stack
page read and write
3020000
heap
page read and write
2E47000
heap
page read and write
56AAC7C000
stack
page read and write
22A0E602000
unkown
page read and write
1845125F000
unkown
page read and write
1C09EBC0000
unkown
page read and write
4E27000
trusted library allocation
page read and write
3012000
heap
page read and write
5C0000
heap
page read and write
4F91000
trusted library allocation
page read and write
2E4E000
heap
page read and write
4F50000
trusted library allocation
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
1EF7E6C1000
heap
page read and write
1C09EB78000
unkown
page read and write
2E4E000
heap
page read and write
3043000
heap
page read and write
1C09E455000
unkown
page read and write
40AE000
stack
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
1C09E456000
unkown
page read and write
2E47000
heap
page read and write
7FC00000
trusted library allocation
page execute and read and write
1C09EB14000
unkown
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
4C21000
trusted library allocation
page read and write
E55000
heap
page read and write
1C09E413000
unkown
page read and write
5168000
trusted library allocation
page read and write
3007000
heap
page read and write
2FCA000
heap
page read and write
2E4E000
heap
page read and write
25E87102000
unkown
page read and write
48A0000
heap
page read and write
2FBD000
heap
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
4DAA000
trusted library allocation
page read and write
2E47000
heap
page read and write
FD5E9F7000
stack
page read and write
5C4000
heap
page read and write
5A0000
trusted library allocation
page read and write
4BE5000
trusted library allocation
page read and write
15D521F0000
remote allocation
page read and write
2E4E000
heap
page read and write
3012000
heap
page read and write
2116F48D000
unkown
page read and write
4341000
heap
page read and write
2E4E000
heap
page read and write
3410000
heap
page read and write
4FDE000
trusted library allocation
page read and write
5178000
trusted library allocation
page read and write
4FDE000
trusted library allocation
page read and write
2851000
heap
page read and write
2E4E000
heap
page read and write
2BDABA13000
unkown
page read and write
4FDE000
trusted library allocation
page read and write
2E4E000
heap
page read and write
4BE6000
trusted library allocation
page read and write
2E4E000
heap
page read and write
1834D4C4000
unkown
page read and write
2E47000
heap
page read and write
485E000
stack
page read and write
315B000
heap
page read and write
3029000
heap
page read and write
27B0000
heap
page read and write
3043000
heap
page read and write
2F59000
heap
page read and write
2F6E000
heap
page read and write
4340000
heap
page read and write
4E10000
trusted library allocation
page read and write
1C09EB9B000
unkown
page read and write
2E4E000
heap
page read and write
1C09E4F6000
unkown
page read and write
4F0B000
trusted library allocation
page read and write
3027000
heap
page read and write
4FB000
stack
page read and write
2E47000
heap
page read and write
4F91000
trusted library allocation
page read and write
2E4E000
heap
page read and write
4F91000
trusted library allocation
page read and write
2854000
heap
page read and write
2EE8000
heap
page read and write
4F91000
trusted library allocation
page read and write
2E47000
heap
page read and write
3043000
heap
page read and write
2E4E000
heap
page read and write
2FB8000
heap
page read and write
54E2000
heap
page read and write
2E4E000
heap
page read and write
B30000
heap
page read and write
2EFB000
heap
page read and write
6F85C000
unkown
page read and write
4E27000
trusted library allocation
page read and write
EE0000
unkown
page read and write
3043000
heap
page read and write
2E4E000
heap
page read and write
3480000
heap
page read and write
3043000
heap
page read and write
4F91000
trusted library allocation
page read and write
4341000
heap
page read and write
1EF7E6DF000
heap
page read and write
2E4E000
heap
page read and write
2AB000
stack
page read and write
2E4E000
heap
page read and write
1C09EB91000
unkown
page read and write
6F85E000
unkown
page readonly
3043000
heap
page read and write
5C4000
heap
page read and write
516C000
trusted library allocation
page read and write
4D11000
heap
page read and write
2E47000
heap
page read and write
4CB1000
trusted library allocation
page read and write
2F5A000
heap
page read and write
2E47000
heap
page read and write
C53097F000
stack
page read and write
2E4E000
heap
page read and write
516A000
trusted library allocation
page read and write
3043000
heap
page read and write
4FDE000
trusted library allocation
page read and write
2E47000
heap
page read and write
1C09EBA0000
unkown
page read and write
2E47000
heap
page read and write
4FB6000
trusted library allocation
page read and write
2CF0000
unkown
page read and write
5091000
trusted library allocation
page read and write
3012000
heap
page read and write
4FB6000
trusted library allocation
page read and write
2E4E000
heap
page read and write
2F10000
heap
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
1C09EB96000
unkown
page read and write
5C4000
heap
page read and write
3012000
heap
page read and write
2CD0000
unkown
page readonly
1C09EBB0000
unkown
page read and write
3043000
heap
page read and write
236A3707000
heap
page read and write
2E4E000
heap
page read and write
C53077F000
stack
page read and write
2E4E000
heap
page read and write
3012000
heap
page read and write
2116F447000
unkown
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
1845124D000
unkown
page read and write
236A3710000
heap
page read and write
2E4E000
heap
page read and write
4F0E000
trusted library allocation
page read and write
2E47000
heap
page read and write
3043000
heap
page read and write
15D52202000
unkown
page read and write
4FDE000
trusted library allocation
page read and write
4F91000
trusted library allocation
page read and write
30D0000
heap
page read and write
3043000
heap
page read and write
2E47000
heap
page read and write
18450FA0000
heap
page read and write
4CB1000
trusted library allocation
page read and write
1EF7E6C6000
heap
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
6E9E1000
unkown
page execute read
236A36ED000
heap
page read and write
2FA1000
heap
page read and write
56AAF7C000
stack
page read and write
2E47000
heap
page read and write
4341000
heap
page read and write
4A90000
trusted library allocation
page read and write
4341000
heap
page read and write
2FF7000
heap
page read and write
2E47000
heap
page read and write
4CB1000
trusted library allocation
page read and write
3012000
heap
page read and write
4F91000
trusted library allocation
page read and write
2E47000
heap
page read and write
3012000
heap
page read and write
2E47000
heap
page read and write
2B69000
heap
page read and write
6A747C000
stack
page read and write
2E47000
heap
page read and write
5C4000
heap
page read and write
56AB4FF000
stack
page read and write
1834D4E1000
unkown
page read and write
5C4000
heap
page read and write
4FB6000
trusted library allocation
page read and write
25E87202000
unkown
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
277E000
stack
page read and write
C631A7E000
stack
page read and write
2E4E000
heap
page read and write
238B000
stack
page read and write
2E4E000
heap
page read and write
3043000
heap
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
3012000
heap
page read and write
2E4E000
heap
page read and write
3012000
heap
page read and write
4F0E000
trusted library allocation
page read and write
1C09E447000
unkown
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
1C09EB72000
unkown
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
3012000
heap
page read and write
56EF000
stack
page read and write
53A1000
trusted library allocation
page read and write
2E47000
heap
page read and write
BB0000
heap
page read and write
864DDCE000
stack
page read and write
2E4E000
heap
page read and write
6A787F000
stack
page read and write
2E4E000
heap
page read and write
1C09E4D7000
unkown
page read and write
308F000
stack
page read and write
5A1E000
stack
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
94E000
stack
page read and write
2FB8000
heap
page read and write
54A000
heap
page read and write
6F855000
unkown
page readonly
4EFD000
trusted library allocation
page read and write
4FB6000
trusted library allocation
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
2F62000
heap
page read and write
3012000
heap
page read and write
1C09EBA0000
unkown
page read and write
3043000
heap
page read and write
2E47000
heap
page read and write
3043000
heap
page read and write
4DA6000
trusted library allocation
page read and write
864E27B000
stack
page read and write
4FC3000
trusted library allocation
page read and write
ED0000
unkown
page readonly
1C09EB61000
unkown
page read and write
2E47000
heap
page read and write
2F57000
heap
page read and write
2E4E000
heap
page read and write
2F69000
heap
page read and write
1834D487000
unkown
page read and write
1C09EBE1000
unkown
page read and write
3043000
heap
page read and write
2851000
heap
page read and write
5C4000
heap
page read and write
2E4E000
heap
page read and write
4F91000
trusted library allocation
page read and write
518C000
trusted library allocation
page read and write
1C09E44C000
unkown
page read and write
3012000
heap
page read and write
2E4E000
heap
page read and write
31A0000
heap
page read and write
94E000
stack
page read and write
2B67000
heap
page read and write
C45000
heap
page read and write
2E47000
heap
page read and write
236A35B0000
heap
page read and write
1C09EB16000
unkown
page read and write
3012000
heap
page read and write
2E4E000
heap
page read and write
54E8000
heap
page read and write
46C000
stack
page read and write
2E4E000
heap
page read and write
2FC4000
heap
page read and write
3043000
heap
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
4FB6000
trusted library allocation
page read and write
2E4E000
heap
page read and write
2854000
heap
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
2FC4000
heap
page read and write
2E4E000
heap
page read and write
3043000
heap
page read and write
C52FBEB000
stack
page read and write
2E47000
heap
page read and write
236A3450000
heap
page read and write
318D000
stack
page read and write
6E9E1000
unkown
page execute read
4FB6000
trusted library allocation
page read and write
2E4E000
heap
page read and write
4FB6000
trusted library allocation
page read and write
2E4E000
heap
page read and write
305D000
stack
page read and write
3043000
heap
page read and write
2E47000
heap
page read and write
2F64000
heap
page read and write
3012000
heap
page read and write
2E4E000
heap
page read and write
3043000
heap
page read and write
5340000
trusted library allocation
page read and write
4340000
heap
page read and write
1C09E9A0000
unkown
page read and write
5C4000
heap
page read and write
5174000
trusted library allocation
page read and write
C631B79000
stack
page read and write
2E4E000
heap
page read and write
481F000
stack
page read and write
2FD6000
heap
page read and write
1C09E427000
unkown
page read and write
2FB8000
heap
page read and write
2E47000
heap
page read and write
3012000
heap
page read and write
2630000
heap
page read and write
4C8B000
trusted library allocation
page read and write
2BDABB13000
unkown
page read and write
286C000
heap
page read and write
FD5E67D000
stack
page read and write
32EF000
stack
page read and write
1EF7E680000
heap
page read and write
2E47000
heap
page read and write
1C09EB76000
unkown
page read and write
E50000
heap
page read and write
DBBD07E000
stack
page read and write
3043000
heap
page read and write
2FC4000
heap
page read and write
950000
heap
page read and write
5C64A7F000
stack
page read and write
1C09F09D000
unkown
page read and write
326E000
stack
page read and write
4FB6000
trusted library allocation
page read and write
1C09F002000
unkown
page read and write
27AF000
stack
page read and write
2AEC000
stack
page read and write
4F4F000
stack
page read and write
2FDC000
heap
page read and write
1C09E4DF000
unkown
page read and write
22A0DE2A000
unkown
page read and write
2E4E000
heap
page read and write
18451266000
unkown
page read and write
2E47000
heap
page read and write
447E000
stack
page read and write
4340000
heap
page read and write
3043000
heap
page read and write
4F91000
trusted library allocation
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
2B63000
heap
page read and write
22A0DE41000
unkown
page read and write
199D7CA0000
heap
page read and write
2FD6000
heap
page read and write
1C09EB98000
unkown
page read and write
2E47000
heap
page read and write
490E000
stack
page read and write
4D9A000
trusted library allocation
page read and write
5170000
trusted library allocation
page read and write
2FC4000
heap
page read and write
2E4E000
heap
page read and write
B9C000
stack
page read and write
3004000
heap
page read and write
3043000
heap
page read and write
4FDE000
trusted library allocation
page read and write
2B98000
heap
page read and write
3043000
heap
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
4E0E000
stack
page read and write
2F22000
heap
page read and write
3012000
heap
page read and write
2FA5000
heap
page read and write
864E377000
stack
page read and write
3043000
heap
page read and write
5C4000
heap
page read and write
3043000
heap
page read and write
C631C7F000
stack
page read and write
2E4E000
heap
page read and write
1C09E448000
unkown
page read and write
54E8000
heap
page read and write
4341000
heap
page read and write
2CF0000
unkown
page read and write
2E4E000
heap
page read and write
494E000
stack
page read and write
5A0000
trusted library allocation
page read and write
184511E0000
unkown
page read and write
3043000
heap
page read and write
E7D000
stack
page read and write
2E47000
heap
page read and write
22A0DE13000
unkown
page read and write
2E47000
heap
page read and write
1834D4CC000
unkown
page read and write
3043000
heap
page read and write
5C643AE000
stack
page read and write
C530A7F000
stack
page read and write
2BDABA8F000
unkown
page read and write
1C09E240000
heap
page read and write
4341000
heap
page read and write
4341000
heap
page read and write
4FB6000
trusted library allocation
page read and write
1EF7E6B0000
heap
page read and write
3290000
heap
page read and write
3043000
heap
page read and write
2E47000
heap
page read and write
4C21000
trusted library allocation
page read and write
4FB6000
trusted library allocation
page read and write
3043000
heap
page read and write
4341000
heap
page read and write
4EB0000
trusted library allocation
page read and write
2F9A000
heap
page read and write
1C09E508000
unkown
page read and write
3043000
heap
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
3025000
heap
page read and write
54A0000
remote allocation
page read and write
267D000
stack
page read and write
2E47000
heap
page read and write
236A3590000
heap
page read and write
2E4E000
heap
page read and write
1C09F09D000
unkown
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
3150000
heap
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
1C09E450000
unkown
page read and write
1EF7E915000
heap
page read and write
4430000
heap
page read and write
2B0000
heap
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
4F0B000
trusted library allocation
page read and write
54E8000
heap
page read and write
1C09EB00000
unkown
page read and write
2370000
trusted library allocation
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
864E17B000
stack
page read and write
3160000
trusted library allocation
page read and write
3043000
heap
page read and write
4F91000
trusted library allocation
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
2F94000
heap
page read and write
EED64F9000
stack
page read and write
2C8C000
stack
page read and write
25E86DE0000
unkown
page read and write
4F91000
trusted library allocation
page read and write
4FB6000
trusted library allocation
page read and write
4350000
heap
page read and write
2FBE000
heap
page read and write
2E47000
heap
page read and write
3043000
heap
page read and write
2E4E000
heap
page read and write
3012000
heap
page read and write
3043000
heap
page read and write
27A0000
heap
page read and write
2AA0000
heap
page read and write
4FB6000
trusted library allocation
page read and write
2E47000
heap
page read and write
4CB1000
trusted library allocation
page read and write
325C000
stack
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
4E1B000
trusted library allocation
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
4DA2000
trusted library allocation
page read and write
2E47000
heap
page read and write
3043000
heap
page read and write
4E2C000
trusted library allocation
page read and write
25E87100000
unkown
page read and write
2FDC000
heap
page read and write
2E47000
heap
page read and write
489F000
stack
page read and write
60B62FE000
stack
page read and write
2E47000
heap
page read and write
3012000
heap
page read and write
2E47000
heap
page read and write
3012000
heap
page read and write
4FB6000
trusted library allocation
page read and write
1845125A000
unkown
page read and write
3043000
heap
page read and write
1834D290000
heap
page read and write
4EF2000
trusted library allocation
page read and write
4341000
heap
page read and write
199D8602000
unkown
page read and write
1C09E4A6000
unkown
page read and write
3012000
heap
page read and write
2690000
heap
page read and write
3043000
heap
page read and write
2E47000
heap
page read and write
1C09E44F000
unkown
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
5C4000
heap
page read and write
5C0000
heap
page read and write
4F91000
trusted library allocation
page read and write
3043000
heap
page read and write
5C4000
heap
page read and write
2F69000
heap
page read and write
1C09E479000
unkown
page read and write
2BDABB02000
unkown
page read and write
4FB6000
trusted library allocation
page read and write
3043000
heap
page read and write
2E48000
heap
page read and write
2CE0000
unkown
page readonly
538000
stack
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
4490000
heap
page read and write
2FDC000
heap
page read and write
4FDE000
trusted library allocation
page read and write
5091000
trusted library allocation
page read and write
2F9B000
heap
page read and write
285B000
heap
page read and write
5C4000
heap
page read and write
2E4E000
heap
page read and write
3043000
heap
page read and write
3012000
heap
page read and write
2E47000
heap
page read and write
EE0000
unkown
page read and write
4FB6000
trusted library allocation
page read and write
32A0000
heap
page read and write
4F91000
trusted library allocation
page read and write
2F5E000
heap
page read and write
8ABA79B000
stack
page read and write
2E47000
heap
page read and write
1C09EBA0000
unkown
page read and write
15D52213000
unkown
page read and write
2FBD000
heap
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
5C4000
heap
page read and write
1EF7E530000
heap
page read and write
1C09E451000
unkown
page read and write
3043000
heap
page read and write
199D7F13000
unkown
page read and write
4F91000
trusted library allocation
page read and write
2E4E000
heap
page read and write
4C55000
trusted library allocation
page read and write
4F91000
trusted library allocation
page read and write
2FD6000
heap
page read and write
2FBD000
heap
page read and write
1C09E4BE000
unkown
page read and write
1C09E516000
unkown
page read and write
2FAB000
heap
page read and write
48A0000
heap
page read and write
2A9E000
stack
page read and write
1C09E46F000
unkown
page read and write
2E47000
heap
page read and write
3043000
heap
page read and write
2F02000
heap
page read and write
517C000
trusted library allocation
page read and write
40EF000
stack
page read and write
18451234000
unkown
page read and write
2E4E000
heap
page read and write
18451255000
unkown
page read and write
3012000
heap
page read and write
25E87000000
unkown
page read and write
4FDE000
trusted library allocation
page read and write
4F91000
trusted library allocation
page read and write
18451258000
unkown
page read and write
4F93000
trusted library allocation
page read and write
22A0DE00000
unkown
page read and write
18451213000
unkown
page read and write
1C09F002000
unkown
page read and write
2B90000
trusted library allocation
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
4341000
heap
page read and write
4E69000
trusted library allocation
page read and write
2A2E000
stack
page read and write
2F6E000
heap
page read and write
2E47000
heap
page read and write
1EF7E6D6000
heap
page read and write
2E47000
heap
page read and write
2FAB000
heap
page read and write
2E47000
heap
page read and write
5ED0000
trusted library allocation
page read and write
1C09EA02000
unkown
page read and write
4F91000
trusted library allocation
page read and write
DBBD277000
stack
page read and write
4FDE000
trusted library allocation
page read and write
4FB6000
trusted library allocation
page read and write
3024000
heap
page read and write
2B18000
heap
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
3043000
heap
page read and write
5C0000
heap
page read and write
6E9F5000
unkown
page readonly
1C09E1E0000
heap
page read and write
2848000
heap
page read and write
FD5E3AE000
stack
page read and write
2AAA000
heap
page read and write
4490000
heap
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
4F91000
trusted library allocation
page read and write
4F91000
trusted library allocation
page read and write
2E47000
heap
page read and write
B90000
heap
page read and write
5C4000
heap
page read and write
2E4E000
heap
page read and write
1845125C000
unkown
page read and write
5172000
trusted library allocation
page read and write
13FE000
stack
page read and write
4F91000
trusted library allocation
page read and write
5C4000
heap
page read and write
1C09F102000
unkown
page read and write
2E47000
heap
page read and write
FD5E8FE000
stack
page read and write
15D52130000
heap
page read and write
2E47000
heap
page read and write
3043000
heap
page read and write
23E0000
trusted library allocation
page read and write
4FB6000
trusted library allocation
page read and write
4FDE000
trusted library allocation
page read and write
1EF7E6EF000
heap
page read and write
4F91000
trusted library allocation
page read and write
25E8700D000
unkown
page read and write
3043000
heap
page read and write
4CB0000
trusted library allocation
page read and write
2FD0000
heap
page read and write
3022000
heap
page read and write
4341000
heap
page read and write
2B69000
heap
page read and write
3043000
heap
page read and write
2F64000
heap
page read and write
22A0DDB0000
unkown
page read and write
3043000
heap
page read and write
2E47000
heap
page read and write
4CB1000
trusted library allocation
page read and write
4E69000
trusted library allocation
page read and write
8ABAF7E000
stack
page read and write
284C000
heap
page read and write
2E47000
heap
page read and write
2FD6000
heap
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
4FA3000
trusted library allocation
page read and write
25E86E40000
heap
page read and write
4F91000
trusted library allocation
page read and write
489F000
stack
page read and write
2E4E000
heap
page read and write
3043000
heap
page read and write
4EB0000
trusted library allocation
page read and write
1268000
heap
page read and write
4F90000
remote allocation
page read and write
2E4E000
heap
page read and write
25E87028000
unkown
page read and write
1C09EFA0000
remote allocation
page read and write
1C09EB63000
unkown
page read and write
2E47000
heap
page read and write
57EB000
stack
page read and write
2E4E000
heap
page read and write
2BDABA81000
unkown
page read and write
33EE000
stack
page read and write
2F71000
heap
page read and write
2E47000
heap
page read and write
2CF0000
unkown
page read and write
2E47000
heap
page read and write
4FB6000
trusted library allocation
page read and write
2FB2000
heap
page read and write
2E47000
heap
page read and write
2800000
trusted library allocation
page read and write
4ECF000
stack
page read and write
2E4E000
heap
page read and write
3043000
heap
page read and write
4D11000
heap
page read and write
2FB8000
heap
page read and write
C53047F000
stack
page read and write
1260000
heap
page read and write
2116F48A000
unkown
page read and write
2BDABB00000
unkown
page read and write
4341000
heap
page read and write
2116F429000
unkown
page read and write
199D7E3C000
unkown
page read and write
15D52200000
unkown
page read and write
4CB1000
trusted library allocation
page read and write
1C09EB80000
unkown
page read and write
54F8000
heap
page read and write
2E4E000
heap
page read and write
1845123C000
unkown
page read and write
2E4E000
heap
page read and write
1110000
heap
page read and write
1845127B000
unkown
page read and write
2E47000
heap
page read and write
2FF0000
heap
page read and write
2E4E000
heap
page read and write
3012000
heap
page read and write
2C20000
heap
page read and write
2E47000
heap
page read and write
22A0DE66000
unkown
page read and write
4FB6000
trusted library allocation
page read and write
4C54000
trusted library allocation
page read and write
2BDABA51000
unkown
page read and write
2E4E000
heap
page read and write
2BDABB08000
unkown
page read and write
25E87300000
unkown
page read and write
3100000
heap
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
54A0000
remote allocation
page read and write
30BB000
stack
page read and write
5A0000
trusted library allocation
page read and write
1834DC02000
unkown
page read and write
4F91000
trusted library allocation
page read and write
4FB6000
trusted library allocation
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
4FC000
stack
page read and write
2E4E000
heap
page read and write
502C000
trusted library allocation
page read and write
3043000
heap
page read and write
1C09E4A6000
unkown
page read and write
2E4E000
heap
page read and write
302F000
heap
page read and write
232B000
stack
page read and write
5C4000
heap
page read and write
2116F250000
heap
page read and write
1C09EBB2000
unkown
page read and write
4FB6000
trusted library allocation
page read and write
864E47F000
stack
page read and write
4EB0000
trusted library allocation
page read and write
4CB1000
trusted library allocation
page read and write
1C09E43C000
unkown
page read and write
4ED0000
remote allocation
page read and write
2E47000
heap
page read and write
2FD6000
heap
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
18451277000
unkown
page read and write
4F91000
trusted library allocation
page read and write
4F0E000
stack
page read and write
5C4000
heap
page read and write
4F91000
trusted library allocation
page read and write
18451264000
unkown
page read and write
5091000
trusted library allocation
page read and write
54E5000
heap
page read and write
517A000
trusted library allocation
page read and write
2E4E000
heap
page read and write
4CB1000
trusted library allocation
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
4341000
heap
page read and write
4F91000
trusted library allocation
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
400000
heap
page read and write
3043000
heap
page read and write
3012000
heap
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
4FB6000
trusted library allocation
page read and write
F9E000
stack
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
3043000
heap
page read and write
3012000
heap
page read and write
1C09EBC0000
unkown
page read and write
2FCA000
heap
page read and write
4AB0000
trusted library allocation
page read and write
2F5E000
heap
page read and write
4F80000
trusted library allocation
page read and write
314D000
stack
page read and write
2E4E000
heap
page read and write
1C09EBB1000
unkown
page read and write
2E4E000
heap
page read and write
2A57000
heap
page read and write
4CCE000
stack
page read and write
4F50000
trusted library allocation
page read and write
4E1B000
trusted library allocation
page read and write
2E47000
heap
page read and write
2116F513000
unkown
page read and write
C4B000
heap
page read and write
2E4E000
heap
page read and write
5390000
trusted library allocation
page read and write
3043000
heap
page read and write
2E4E000
heap
page read and write
2F69000
heap
page read and write
498E000
stack
page read and write
4434000
heap
page read and write
2E47000
heap
page read and write
4F91000
trusted library allocation
page read and write
1EF7E6DF000
heap
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
870000
heap
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
2FB2000
heap
page read and write
15D52302000
unkown
page read and write
2E47000
heap
page read and write
18451284000
unkown
page read and write
2116F44B000
unkown
page read and write
2E4E000
heap
page read and write
49CE000
stack
page read and write
2E47000
heap
page read and write
4CB1000
trusted library allocation
page read and write
4341000
heap
page read and write
2E4E000
heap
page read and write
1834D300000
heap
page read and write
6E9F5000
unkown
page readonly
3012000
heap
page read and write
2E47000
heap
page read and write
3043000
heap
page read and write
1834D429000
unkown
page read and write
1C09EB70000
unkown
page read and write
6A77FD000
stack
page read and write
4341000
heap
page read and write
4A10000
remote allocation
page read and write
2E47000
heap
page read and write
4F70000
trusted library allocation
page read and write
594E000
stack
page read and write
54EB000
heap
page read and write
864DD4B000
stack
page read and write
12FF000
stack
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
EC0000
unkown
page readonly
199D7F08000
unkown
page read and write
4FB6000
trusted library allocation
page read and write
4341000
heap
page read and write
199D7DA0000
unkown
page read and write
2FD6000
heap
page read and write
30CD000
stack
page read and write
18451257000
unkown
page read and write
1C09E453000
unkown
page read and write
1834D413000
unkown
page read and write
3043000
heap
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
282A000
heap
page read and write
2E47000
heap
page read and write
6F840000
unkown
page readonly
1C09EBB1000
unkown
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
4341000
heap
page read and write
2FD0000
heap
page read and write
2F9F000
heap
page read and write
5C4000
heap
page read and write
2E47000
heap
page read and write
15D52120000
heap
page read and write
2E4E000
heap
page read and write
3043000
heap
page read and write
236A3630000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
2E47000
heap
page read and write
1C09EBA0000
unkown
page read and write
5C4000
heap
page read and write
2E4E000
heap
page read and write
1C09EB70000
unkown
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
3043000
heap
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
4F91000
trusted library allocation
page read and write
3043000
heap
page read and write
1030000
heap
page read and write
2E4E000
heap
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
2FCA000
heap
page read and write
284D000
heap
page read and write
56AADFF000
stack
page read and write
4E1C000
trusted library allocation
page read and write
199D7F00000
unkown
page read and write
4E42000
trusted library allocation
page read and write
33A0000
heap
page read and write
DBBCE7E000
stack
page read and write
2E4E000
heap
page read and write
C53067E000
stack
page read and write
4F91000
trusted library allocation
page read and write
2E47000
heap
page read and write
4F0E000
trusted library allocation
page read and write
4F91000
trusted library allocation
page read and write
2FDC000
heap
page read and write
2116F449000
unkown
page read and write
8ABB1FF000
stack
page read and write
3043000
heap
page read and write
2E47000
heap
page read and write
8ABB2F8000
stack
page read and write
2E4E000
heap
page read and write
1EF7E660000
heap
page read and write
5C4000
heap
page read and write
5182000
trusted library allocation
page read and write
5C4000
heap
page read and write
4341000
heap
page read and write
498E000
stack
page read and write
4FB6000
trusted library allocation
page read and write
4341000
heap
page read and write
2E4E000
heap
page read and write
2FDC000
heap
page read and write
2E4E000
heap
page read and write
820000
heap
page read and write
1C09EB94000
unkown
page read and write
2A50000
heap
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
29ED000
stack
page read and write
5200000
trusted library allocation
page read and write
5391000
trusted library allocation
page read and write
2E4E000
heap
page read and write
1C09F002000
unkown
page read and write
3043000
heap
page read and write
2E4E000
heap
page read and write
5C4000
heap
page read and write
C53027C000
stack
page read and write
3043000
heap
page read and write
2E4E000
heap
page read and write
3012000
heap
page read and write
2E47000
heap
page read and write
3012000
heap
page read and write
1C09F002000
unkown
page read and write
4BB1000
trusted library allocation
page read and write
2BDABA00000
unkown
page read and write
2B0B000
heap
page read and write
2E4E000
heap
page read and write
54E5000
heap
page read and write
3012000
heap
page read and write
DBBD17B000
stack
page read and write
2A9E000
stack
page read and write
4CB1000
trusted library allocation
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
1EF7E6EF000
heap
page read and write
4FB6000
trusted library allocation
page read and write
1C09E1D0000
heap
page read and write
25E87213000
unkown
page read and write
1C09EB18000
unkown
page read and write
4FDE000
trusted library allocation
page read and write
EBA000
stack
page read and write
2E47000
heap
page read and write
2E4E000
heap
page read and write
4FB6000
trusted library allocation
page read and write
490000
unkown
page read and write
2FA0000
heap
page read and write
2AC8000
heap
page read and write
447E000
stack
page read and write
4F91000
trusted library allocation
page read and write
5C4000
heap
page read and write
5091000
trusted library allocation
page read and write
2AFA000
heap
page read and write
3043000
heap
page read and write
2E47000
heap
page read and write
3043000
heap
page read and write
4FDE000
trusted library allocation
page read and write
2116F502000
unkown
page read and write
2E47000
heap
page read and write
3012000
heap
page read and write
4D98000
trusted library allocation
page read and write
2E47000
heap
page read and write
5490000
trusted library allocation
page read and write
6E9FE000
unkown
page readonly
4F91000
trusted library allocation
page read and write
2E47000
heap
page read and write
4ED0000
remote allocation
page read and write
2E4E000
heap
page read and write
1C09EB93000
unkown
page read and write
25E86DD0000
heap
page read and write
2EE0000
heap
page read and write
F00000
trusted library allocation
page read and write
3043000
heap
page read and write
ED0000
unkown
page readonly
2E47000
heap
page read and write
4FDE000
trusted library allocation
page read and write
5091000
trusted library allocation
page read and write
5C4000
heap
page read and write
4E7A000
trusted library allocation
page read and write
3012000
heap
page read and write
18451256000
unkown
page read and write
4490000
heap
page read and write
2E4E000
heap
page read and write
236A4420000
trusted library allocation
page read and write
4341000
heap
page read and write
4D9C000
trusted library allocation
page read and write
2E47000
heap
page read and write
90D000
stack
page read and write
2E4E000
heap
page read and write
199D7C30000
heap
page read and write
4FDE000
trusted library allocation
page read and write
5091000
trusted library allocation
page read and write
516E000
trusted library allocation
page read and write
3043000
heap
page read and write
264A000
heap
page read and write
18451229000
unkown
page read and write
2FDC000
heap
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
2E47000
heap
page read and write
4F91000
trusted library allocation
page read and write
2FB8000
heap
page read and write
3043000
heap
page read and write
5176000
trusted library allocation
page read and write
2E4E000
heap
page read and write
5390000
trusted library allocation
page read and write
2E47000
heap
page read and write
22A0DE76000
unkown
page read and write
2E4E000
heap
page read and write
2E47000
heap
page read and write
2B63000
heap
page read and write
2E47000
heap
page read and write
4F91000
trusted library allocation
page read and write
4FB6000
trusted library allocation
page read and write
8ABAAFE000
stack
page read and write
31A0000
trusted library allocation
page read and write
1C09EB72000
unkown
page read and write
6A75FE000
stack
page read and write
3012000
heap
page read and write
2E47000
heap
page read and write
4341000
heap
page read and write
4EF2000
trusted library allocation
page read and write
2E4E000
heap
page read and write
2F50000
heap
page read and write
3012000
heap
page read and write
498E000
stack
page read and write
2E4E000
heap
page read and write
53A7000
trusted library allocation
page read and write
25E87013000
unkown
page read and write
2E47000
heap
page read and write
3220000
heap
page read and write
4E27000
trusted library allocation
page read and write
3043000
heap
page read and write
2E3E000
stack
page read and write
5C4000
heap
page read and write
3043000
heap
page read and write
3043000
heap
page read and write
36B0000
heap
page read and write
1EF7E6D7000
heap
page read and write
2E4E000
heap
page read and write
4FB6000
trusted library allocation
page read and write
2E47000
heap
page read and write
4FDE000
trusted library allocation
page read and write
6A797D000
stack
page read and write
309E000
stack
page read and write
2E47000
heap
page read and write
There are 2101 hidden memdumps, click here to show them.