IOC Report
olPUTAxpzu.exe

loading gif

Files

File Path
Type
Category
Malicious
olPUTAxpzu.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_olPUTAxpzu.exe_e22b91f83659b5e64951010ad9cc6d1b32c47_5da1df81_19ca88f8\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_olPUTAxpzu.exe_e22b91f83659b5e64951010ad9cc6d1b32c47_5da1df81_19bd84ad\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7448.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Apr 20 13:17:08 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7E6A.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8030.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6D9B.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Apr 20 22:09:27 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER759B.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7732.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\olPUTAxpzu.exe
"C:\Users\user\Desktop\olPUTAxpzu.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6200 -s 1280
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6200 -s 1280
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 1240
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 1240

URLs

Name
IP
Malicious
https://api.brutalhax.net/
unknown
malicious
https://api.brutal-hax.net/notification.txt
unknown
https://api.brutal-hax.net/Online/get_online_users.php?username=
unknown
https://api.brutal-hax.net/loader_authentification_new.php?username=
unknown
https://api.brutal-hax.net/loader_statut_new.php
unknown
https://help.ea.com/en/help/faq/how-to-clean-boot-your-pc/
unknown
http://pki-ocsp.symauth.com0
unknown
https://api.brutal-hax.net/Driver/Driver1.8_x64.sys
unknown
https://discord.gg/brutal-hax
unknown
http://foo/bhicon.png
unknown
http://defaultcontainer/Login.xaml
unknown
https://api.brutal-hax.net/loader_cheat_info_ex.php?index=
unknown
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr
unknown
https://api.brutal-hax.net/loader_get_cheats.php?username=
unknown
https://brutal-hax.net/
unknown
http://defaultcontainer/bhicon.png
unknown
http://foo/bar/bhicon.png
unknown
https://api.brutal-hax.net/loader_version.php
unknown
http://foo/bar/login.baml
unknown
https://api.brutal-hax.net/Online/set_online_status.php?username=
unknown
https://api.brutal-hax.net/info/cheat_status.php?hack_id=
unknown
http://foo/Login.xaml
unknown
http://pki-crl.symauth.com/ca_d409a5cb737dc0768fd08ed5256f3633/LatestCRL.crl07
unknown
There are 13 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
ProgramId
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
FileId
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
LowerCaseLongPath
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
LongPathHash
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
Name
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
Publisher
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
Version
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
BinFileVersion
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
BinaryType
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
ProductName
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
ProductVersion
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
LinkDate
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
BinProductVersion
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
Size
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
Language
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
IsPeFile
\REGISTRY\A\{55d8a386-c4e9-2f1a-845e-b220d04f6cde}\Root\InventoryApplicationFile\olputaxpzu.exe|7a697635
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
00184006417502B9
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
ProgramId
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
FileId
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
LowerCaseLongPath
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
LongPathHash
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
Name
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
Publisher
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
Version
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
BinFileVersion
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
BinaryType
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
ProductName
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
ProductVersion
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
LinkDate
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
BinProductVersion
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
Size
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
Language
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
IsPeFile
\REGISTRY\A\{241b8a8c-f1a0-b382-2900-a541fb473845}\Root\InventoryApplicationFile\olputaxpzu.exe|2e9c9b89
IsOsComponent
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
00180008F3870B0F
There are 32 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
27559B6A000
heap
page read and write
282262AB000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
ED2000
trusted library allocation
page read and write
27559BA6000
heap
page read and write
27559A89000
heap
page read and write
27559B43000
heap
page read and write
34F1000
heap
page read and write
2755A36E000
heap
page read and write
34F1000
heap
page read and write
1DBFE040000
heap
page read and write
481607C000
stack
page read and write
34F1000
heap
page read and write
1DBFDE70000
heap
page read and write
27559ADC000
heap
page read and write
28227002000
heap
page read and write
27559ACB000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
201B7E57000
heap
page read and write
2755A330000
heap
page read and write
34F1000
heap
page read and write
27559BD9000
heap
page read and write
282262D1000
heap
page read and write
201BD480000
trusted library allocation
page read and write
27559ADA000
heap
page read and write
2755A36B000
heap
page read and write
34F1000
heap
page read and write
AE4000
heap
page read and write
27559B3D000
heap
page read and write
34F1000
heap
page read and write
1C02BD18000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27559B93000
heap
page read and write
27559B77000
heap
page read and write
33C8FE000
stack
page read and write
3A5E000
stack
page read and write
27559BDA000
heap
page read and write
AE4000
heap
page read and write
2755A705000
heap
page read and write
27559B8D000
heap
page read and write
34F1000
heap
page read and write
27559B63000
heap
page read and write
27559B9B000
heap
page read and write
1CD6EC4A000
heap
page read and write
5E70000
trusted library allocation
page read and write
34F1000
heap
page read and write
8D803FF000
stack
page read and write
A61252E000
stack
page read and write
1C02D6C0000
trusted library allocation
page read and write
34F1000
heap
page read and write
27559A77000
heap
page read and write
AE4000
heap
page read and write
34F1000
heap
page read and write
B45C67F000
stack
page read and write
706437E000
stack
page read and write
18A1000
unkown
page execute and read and write
27559A72000
heap
page read and write
48156BB000
stack
page read and write
F10000
heap
page read and write
27559B51000
heap
page read and write
2755A3FA000
heap
page read and write
34F1000
heap
page read and write
F00000
heap
page execute and read and write
28226090000
heap
page read and write
3CDC000
trusted library allocation
page read and write
1CD6EC69000
heap
page read and write
1DBFE06D000
heap
page read and write
1B0F8E36000
heap
page read and write
201B7BA0000
heap
page read and write
B45BD7B000
stack
page read and write
ECA000
trusted library allocation
page execute and read and write
296C5C6F000
heap
page read and write
1CD6EBC0000
heap
page read and write
1C0942F0000
heap
page read and write
ED5000
trusted library allocation
page execute and read and write
27559B71000
heap
page read and write
34F1000
heap
page read and write
2755A333000
heap
page read and write
AE4000
heap
page read and write
34F1000
heap
page read and write
1E8CE657000
heap
page read and write
34F1000
heap
page read and write
27559AE1000
heap
page read and write
34F1000
heap
page read and write
1884000
unkown
page execute and read and write
27559AC5000
heap
page read and write
2755A373000
heap
page read and write
C8D000
heap
page read and write
296C5D08000
heap
page read and write
34F1000
heap
page read and write
1EF00F52000
heap
page read and write
2755A1E0000
remote allocation
page read and write
1C02BBE0000
trusted library allocation
page read and write
35F0000
trusted library allocation
page execute and read and write
27559BAD000
heap
page read and write
27559B4D000
heap
page read and write
1CD6EC68000
heap
page read and write
34F1000
heap
page read and write
27559AEB000
heap
page read and write
1CD6EC54000
heap
page read and write
1CD6EC6B000
heap
page read and write
AD0000
direct allocation
page read and write
27559B8D000
heap
page read and write
28226B79000
heap
page read and write
1122000
unkown
page execute and read and write
5DB4000
heap
page read and write
1CD6EC45000
heap
page read and write
1E8CE68C000
heap
page read and write
27559B28000
heap
page read and write
27559A82000
heap
page read and write
525BEFE000
stack
page read and write
34F1000
heap
page read and write
27559B29000
heap
page read and write
27559AC0000
heap
page read and write
ED0000
trusted library allocation
page read and write
DDC9CFE000
stack
page read and write
27559B83000
heap
page read and write
2ABF7C13000
heap
page read and write
27559AEA000
heap
page read and write
4BA1000
trusted library allocation
page read and write
1CD6EC48000
heap
page read and write
34F1000
heap
page read and write
27559B26000
heap
page read and write
16EA000
unkown
page execute and read and write
1C30000
unkown
page execute read
201B7E13000
heap
page read and write
201B7E00000
heap
page read and write
1C574113000
heap
page read and write
525B77B000
stack
page read and write
34F1000
heap
page read and write
282262C0000
heap
page read and write
27559B6B000
heap
page read and write
1E8CE68C000
heap
page read and write
27559B0F000
heap
page read and write
34F1000
heap
page read and write
27559BAC000
heap
page read and write
28226253000
heap
page read and write
15E8000
unkown
page execute and read and write
201BD703000
heap
page read and write
1E8CE68C000
heap
page read and write
28226B74000
heap
page read and write
34F1000
heap
page read and write
201BD3B0000
trusted library allocation
page read and write
92202F9000
stack
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
2822701B000
heap
page read and write
1DBFE057000
heap
page read and write
34F1000
heap
page read and write
1C0943EF000
heap
page read and write
2755A713000
heap
page read and write
2755A383000
heap
page read and write
1C574002000
heap
page read and write
296C5C4B000
heap
page read and write
28226BA0000
heap
page read and write
201BD705000
heap
page read and write
28226B7E000
heap
page read and write
1CD6EC4C000
heap
page read and write
A6124AC000
stack
page read and write
AD0000
direct allocation
page read and write
ED7000
trusted library allocation
page execute and read and write
27559BC9000
heap
page read and write
1C02BD02000
heap
page read and write
296C5D13000
heap
page read and write
28226BAB000
heap
page read and write
201B8700000
heap
page read and write
34F1000
heap
page read and write
28226B96000
heap
page read and write
1EF00F47000
heap
page read and write
34F1000
heap
page read and write
1C02BC63000
heap
page read and write
34F1000
heap
page read and write
AE3297B000
stack
page read and write
27559B27000
heap
page read and write
ABE000
stack
page read and write
1C02D680000
trusted library allocation
page read and write
34F1000
heap
page read and write
28226B5D000
heap
page read and write
1C094370000
trusted library allocation
page read and write
AE4000
heap
page read and write
34F1000
heap
page read and write
1E8CEE02000
trusted library allocation
page read and write
1CD6EC13000
heap
page read and write
ED7000
trusted library allocation
page execute and read and write
34F1000
heap
page read and write
2755A34C000
heap
page read and write
B0E38FD000
stack
page read and write
27559B91000
heap
page read and write
34F1000
heap
page read and write
C8D000
heap
page read and write
2755A600000
heap
page read and write
1C57407A000
heap
page read and write
1CD6EC51000
heap
page read and write
7077AF8000
stack
page read and write
AE32DFA000
stack
page read and write
28226B87000
heap
page read and write
B90000
trusted library allocation
page read and write
3A5E000
stack
page read and write
2755A602000
heap
page read and write
27559AA1000
heap
page read and write
34F1000
heap
page read and write
201BD510000
trusted library allocation
page read and write
C8A000
heap
page read and write
34F1000
heap
page read and write
2755A371000
heap
page read and write
1E8CE654000
heap
page read and write
C92000
heap
page read and write
1C0943ED000
heap
page read and write
34F1000
heap
page read and write
27559BDF000
heap
page read and write
C70000
heap
page read and write
C8D000
heap
page read and write
525BBFF000
stack
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27559AB5000
heap
page read and write
1F4CA0D0000
heap
page read and write
1C02D740000
remote allocation
page read and write
201BD60F000
heap
page read and write
28227021000
heap
page read and write
34F1000
heap
page read and write
15E8000
unkown
page execute and read and write
3B9E000
stack
page read and write
27559AD9000
heap
page read and write
2755A71B000
heap
page read and write
34F1000
heap
page read and write
525BCFD000
stack
page read and write
279761E0000
heap
page read and write
1C095210000
trusted library allocation
page read and write
1EF00F20000
heap
page read and write
34F1000
heap
page read and write
1E8CE613000
heap
page read and write
27559B4F000
heap
page read and write
525C1FE000
stack
page read and write
27559BA5000
heap
page read and write
34F1000
heap
page read and write
35F0000
trusted library allocation
page execute and read and write
2755A389000
heap
page read and write
28226030000
heap
page read and write
922007F000
stack
page read and write
34F1000
heap
page read and write
28226B8B000
heap
page read and write
27559BC0000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
16C0000
unkown
page readonly
27559A13000
heap
page read and write
27559BA3000
heap
page read and write
AE4000
heap
page read and write
27559B5F000
heap
page read and write
28226B8F000
heap
page read and write
201BD290000
trusted library allocation
page read and write
AD0000
direct allocation
page read and write
1C574041000
heap
page read and write
90B0CDC000
stack
page read and write
34F0000
heap
page read and write
BB8000
trusted library allocation
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
AD0000
direct allocation
page read and write
201BD3F4000
trusted library allocation
page read and write
2755A39C000
heap
page read and write
27559B40000
heap
page read and write
34F1000
heap
page read and write
B6D000
stack
page read and write
16CE000
unkown
page readonly
34F1000
heap
page read and write
1E8CE680000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
F10000
heap
page read and write
1C094380000
trusted library allocation
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
201BD6FA000
heap
page read and write
2755A713000
heap
page read and write
EBE000
stack
page read and write
27559B15000
heap
page read and write
34F1000
heap
page read and write
1C574076000
heap
page read and write
1C02D802000
trusted library allocation
page read and write
27559AB2000
heap
page read and write
61B0000
trusted library allocation
page read and write
27559BA3000
heap
page read and write
1C095220000
heap
page readonly
27559B6F000
heap
page read and write
201B7E8C000
heap
page read and write
34F1000
heap
page read and write
18D0000
unkown
page execute and read and write
28226B8B000
heap
page read and write
DDC9AFE000
stack
page read and write
BCA000
heap
page read and write
28226B8F000
heap
page read and write
201BD6F6000
heap
page read and write
1B0F8DF5000
heap
page read and write
AE4000
heap
page read and write
34F1000
heap
page read and write
34F0000
heap
page read and write
2ABF7B80000
trusted library allocation
page read and write
18C4000
unkown
page execute and read and write
2755A32B000
heap
page read and write
27559A90000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
201B7E29000
heap
page read and write
2755A3FB000
heap
page read and write
28226BB2000
heap
page read and write
28227002000
heap
page read and write
1B0F8D50000
heap
page read and write
201BD6A4000
heap
page read and write
34F1000
heap
page read and write
27559B44000
heap
page read and write
18DC000
unkown
page execute and read and write
201B7F07000
heap
page read and write
34F1000
heap
page read and write
2755A60B000
heap
page read and write
1F4CA2CD000
heap
page read and write
2ABF7C4D000
heap
page read and write
1E8CE68C000
heap
page read and write
27559AB0000
heap
page read and write
28226B93000
heap
page read and write
28226BB3000
heap
page read and write
2755A70E000
heap
page read and write
27559B4F000
heap
page read and write
18C4000
unkown
page execute and read and write
16B2000
unkown
page readonly
34F1000
heap
page read and write
34F1000
heap
page read and write
28226B8E000
heap
page read and write
28227062000
heap
page read and write
27559BBE000
heap
page read and write
1DBFE000000
heap
page read and write
27559BC2000
heap
page read and write
27559AF6000
heap
page read and write
AE4000
heap
page read and write
34F1000
heap
page read and write
28226B81000
heap
page read and write
7077BFA000
stack
page read and write
70786FE000
stack
page read and write
2755A341000
heap
page read and write
707768B000
stack
page read and write
BA3000
trusted library allocation
page execute and read and write
279761D0000
heap
page read and write
18A3000
unkown
page execute and read and write
34F1000
heap
page read and write
28226B85000
heap
page read and write
BAD000
trusted library allocation
page execute and read and write
27559B50000
heap
page read and write
15E8000
unkown
page execute and read and write
27559B88000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
7077CFB000
stack
page read and write
2755A37B000
heap
page read and write
2ABF7D08000
heap
page read and write
27559A98000
heap
page read and write
7077EFB000
stack
page read and write
2755A337000
heap
page read and write
296C5C51000
heap
page read and write
27559B46000
heap
page read and write
2ABF7C70000
heap
page read and write
6350000
remote allocation
page read and write
201BD4D0000
trusted library allocation
page read and write
27559AB7000
heap
page read and write
27559B40000
heap
page read and write
1E8CE655000
heap
page read and write
34F1000
heap
page read and write
27559B38000
heap
page read and write
BB0000
trusted library allocation
page read and write
DDC9EF7000
stack
page read and write
1B0F8E50000
heap
page read and write
27559B74000
heap
page read and write
C83000
heap
page read and write
296C5C66000
heap
page read and write
28226B21000
heap
page read and write
1E8CE67E000
heap
page read and write
AE32CFF000
stack
page read and write
34F1000
heap
page read and write
F10000
heap
page read and write
201B8759000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
AD0000
direct allocation
page read and write
201B7F14000
heap
page read and write
DDC9B7E000
stack
page read and write
1CD6EBF0000
trusted library allocation
page read and write
EBE000
stack
page read and write
34F1000
heap
page read and write
BBD000
trusted library allocation
page execute and read and write
34F1000
heap
page read and write
2ABF7B50000
heap
page read and write
5E90000
heap
page execute and read and write
27559B52000
heap
page read and write
28226B76000
heap
page read and write
1B0F8E44000
heap
page read and write
34F1000
heap
page read and write
27559B4C000
heap
page read and write
34F1000
heap
page read and write
27559A63000
heap
page read and write
BAD000
trusted library allocation
page execute and read and write
AE4000
heap
page read and write
27559B86000
heap
page read and write
16CE000
unkown
page readonly
EC0000
trusted library allocation
page read and write
35F0000
trusted library allocation
page execute and read and write
34F1000
heap
page read and write
27559BC1000
heap
page read and write
34F1000
heap
page read and write
27559AA3000
heap
page read and write
201B9210000
trusted library allocation
page read and write
27559B1C000
heap
page read and write
C7F000
heap
page read and write
525B8FF000
stack
page read and write
34F1000
heap
page read and write
1CD6EC6F000
heap
page read and write
27559B6C000
heap
page read and write
34F1000
heap
page read and write
1C574013000
heap
page read and write
27976370000
remote allocation
page read and write
201BD6DF000
heap
page read and write
27559A84000
heap
page read and write
AE4000
heap
page read and write
27559BDB000
heap
page read and write
1C02BC47000
heap
page read and write
34F1000
heap
page read and write
27559BC1000
heap
page read and write
34F1000
heap
page read and write
AE0000
heap
page read and write
201B7F02000
heap
page read and write
27559B9D000
heap
page read and write
2ABF7D13000
heap
page read and write
16D2000
unkown
page readonly
34F1000
heap
page read and write
34F1000
heap
page read and write
AE4000
heap
page read and write
5D80000
heap
page read and write
201B8704000
heap
page read and write
1E8CE64F000
heap
page read and write
525BFFF000
stack
page read and write
B45BF7F000
stack
page read and write
1C0942F9000
heap
page read and write
34F1000
heap
page read and write
B70000
direct allocation
page read and write
27559A6F000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
C92000
heap
page read and write
1122000
unkown
page execute read
1C094490000
trusted library allocation
page read and write
201BD3BE000
trusted library allocation
page read and write
1CD6EC66000
heap
page read and write
27559A89000
heap
page read and write
1CD6EC6D000
heap
page read and write
34F1000
heap
page read and write
8DFFFFF000
stack
page read and write
5C7D000
stack
page read and write
34F1000
heap
page read and write
27559AB5000
heap
page read and write
27559BB3000
heap
page read and write
34F1000
heap
page read and write
28227003000
heap
page read and write
2ABF7C8A000
heap
page read and write
AD0000
direct allocation
page read and write
27559B98000
heap
page read and write
28226B7B000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27559A86000
heap
page read and write
296C5A60000
heap
page read and write
27559A29000
heap
page read and write
DBE000
stack
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
18C4000
unkown
page execute and read and write
BA3000
trusted library allocation
page execute and read and write
B70000
unclassified section
page read and write
2755A353000
heap
page read and write
2755A397000
heap
page read and write
34F1000
heap
page read and write
2755A702000
heap
page read and write
B0E39FE000
stack
page read and write
F12307F000
stack
page read and write
1F4CA313000
heap
page read and write
1DBFE113000
heap
page read and write
28226B8C000
heap
page read and write
27559B37000
heap
page read and write
27559AD3000
heap
page read and write
1F4CA2C4000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
201B8615000
heap
page read and write
27559ABB000
heap
page read and write
2755A37D000
heap
page read and write
27559B5D000
heap
page read and write
34F1000
heap
page read and write
28226BAC000
heap
page read and write
27559B8F000
heap
page read and write
2ABF7D00000
heap
page read and write
28226B88000
heap
page read and write
34F1000
heap
page read and write
C70000
heap
page read and write
34F1000
heap
page read and write
28226B89000
heap
page read and write
1E8CE68C000
heap
page read and write
5E80000
trusted library allocation
page execute and read and write
5E93000
heap
page execute and read and write
34F1000
heap
page read and write
27559B21000
heap
page read and write
275598C0000
heap
page read and write
2ABF7C47000
heap
page read and write
AE4000
heap
page read and write
2755A3F1000
heap
page read and write
BB8000
trusted library allocation
page read and write
2ABF7AE0000
heap
page read and write
5D80000
heap
page read and write
F00000
heap
page execute and read and write
1F4CAC02000
heap
page read and write
2755A319000
heap
page read and write
C7F000
heap
page read and write
1DBFE102000
heap
page read and write
27559B66000
heap
page read and write
EC6000
trusted library allocation
page execute and read and write
A6129FB000
stack
page read and write
27559BD6000
heap
page read and write
3610000
heap
page read and write
EBE000
stack
page read and write
27559AEE000
heap
page read and write
34F1000
heap
page read and write
2755A334000
heap
page read and write
B90000
trusted library allocation
page read and write
282262EA000
heap
page read and write
1CD6EC43000
heap
page read and write
1DBFDE60000
heap
page read and write
27559B59000
heap
page read and write
BAD000
trusted library allocation
page execute and read and write
481617E000
stack
page read and write
60A0000
trusted library allocation
page read and write
16D2000
unkown
page readonly
34F1000
heap
page read and write
921FDEA000
stack
page read and write
2755A35C000
heap
page read and write
34F1000
heap
page read and write
F122E7E000
stack
page read and write
1E8CE700000
heap
page read and write
34F1000
heap
page read and write
B2E000
stack
page read and write
1C095240000
trusted library allocation
page read and write
1C02D740000
remote allocation
page read and write
3BA1000
trusted library allocation
page read and write
201BD6FD000
heap
page read and write
27559BD3000
heap
page read and write
1E8CE600000
heap
page read and write
1CD6EC29000
heap
page read and write
18A9000
unkown
page execute and read and write
1E8CE68C000
heap
page read and write
28226B93000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27559B4E000
heap
page read and write
27559860000
heap
page read and write
34F1000
heap
page read and write
28226B91000
heap
page read and write
28226020000
heap
page read and write
2755A3F8000
heap
page read and write
1C30000
unkown
page execute read
1E8CE68C000
heap
page read and write
70784FA000
stack
page read and write
27559BB8000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
2755A72C000
heap
page read and write
34F1000
heap
page read and write
2755A3F0000
heap
page read and write
27559BA1000
heap
page read and write
3B9E000
stack
page read and write
BA0000
trusted library allocation
page read and write
27559B33000
heap
page read and write
6330000
trusted library allocation
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
5C7D000
stack
page read and write
1B0F8E48000
heap
page read and write
34F1000
heap
page read and write
28226B9F000
heap
page read and write
ECA000
trusted library allocation
page execute and read and write
28226B8B000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
282262C7000
heap
page read and write
27559B78000
heap
page read and write
27559BCE000
heap
page read and write
1C02BC2A000
heap
page read and write
201BD6AA000
heap
page read and write
28226B85000
heap
page read and write
27559B54000
heap
page read and write
1C574050000
heap
page read and write
5F9C000
stack
page read and write
27559ABC000
heap
page read and write
1E8CE652000
heap
page read and write
5A0000
unkown
page read and write
201B8718000
heap
page read and write
27559BD9000
heap
page read and write
16AF000
unkown
page readonly
2755A702000
heap
page read and write
201B8602000
heap
page read and write
B0E37FC000
stack
page read and write
B45B92C000
stack
page read and write
B82000
direct allocation
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
2755A736000
heap
page read and write
27559B58000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27976458000
heap
page read and write
201BD480000
trusted library allocation
page read and write
9220179000
stack
page read and write
201BD61D000
heap
page read and write
27559B2F000
heap
page read and write
28226271000
heap
page read and write
34F1000
heap
page read and write
27559BE6000
heap
page read and write
34F1000
heap
page read and write
27559BAD000
heap
page read and write
AD0000
direct allocation
page read and write
28227002000
heap
page read and write
2755A70C000
heap
page read and write
201BD3D1000
trusted library allocation
page read and write
27559B70000
heap
page read and write
70642FF000
stack
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
90B12FE000
stack
page read and write
16E0000
unkown
page readonly
F12289C000
stack
page read and write
34F0000
heap
page read and write
3A9E000
stack
page read and write
BA4000
trusted library allocation
page read and write
AD0000
direct allocation
page read and write
27559BFC000
heap
page read and write
34F1000
heap
page read and write
2822624B000
heap
page read and write
27559A94000
heap
page read and write
34F1000
heap
page read and write
201BD3D0000
trusted library allocation
page read and write
EC6000
trusted library allocation
page execute and read and write
27559BD8000
heap
page read and write
34F1000
heap
page read and write
8DFFF7E000
stack
page read and write
34F1000
heap
page read and write
1C0943D4000
heap
page read and write
201BD220000
trusted library allocation
page read and write
27559B95000
heap
page read and write
27559A6F000
heap
page read and write
1CD6EC41000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27559AD6000
heap
page read and write
34F1000
heap
page read and write
1F4CA140000
heap
page read and write
34F1000
heap
page read and write
DDC9C7B000
stack
page read and write
27559B45000
heap
page read and write
2755A36D000
heap
page read and write
61B0000
trusted library allocation
page read and write
28226BB3000
heap
page read and write
16D2000
unkown
page readonly
27559B6A000
heap
page read and write
27559BA8000
heap
page read and write
BC0000
heap
page read and write
62B0000
trusted library allocation
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
28226261000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
28226BA0000
heap
page read and write
27559B6B000
heap
page read and write
5B0000
trusted library allocation
page read and write
34F1000
heap
page read and write
27559BD1000
heap
page read and write
201BD4C0000
trusted library allocation
page read and write
34F1000
heap
page read and write
1E8CE63C000
heap
page read and write
27559B25000
heap
page read and write
1B0F8E31000
heap
page read and write
AE32AFA000
stack
page read and write
16EA000
unkown
page execute and read and write
AE4000
heap
page read and write
27559B2D000
heap
page read and write
1F4CA170000
trusted library allocation
page read and write
CA4000
heap
page read and write
2755A391000
heap
page read and write
2755A37F000
heap
page read and write
BA4000
trusted library allocation
page read and write
4815F7C000
stack
page read and write
3610000
heap
page read and write
34F1000
heap
page read and write
AE4000
heap
page read and write
27559ACD000
heap
page read and write
B45C0FC000
stack
page read and write
27559B6E000
heap
page read and write
27559B64000
heap
page read and write
18A5000
unkown
page execute and read and write
C15000
heap
page read and write
34F1000
heap
page read and write
4BA1000
trusted library allocation
page read and write
AD0000
direct allocation
page read and write
1DBFDFD0000
trusted library allocation
page read and write
34F1000
heap
page read and write
1120000
unkown
page readonly
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27559B31000
heap
page read and write
27559B8B000
heap
page read and write
27559B56000
heap
page read and write
34F1000
heap
page read and write
1CD6EC42000
heap
page read and write
27559AE8000
heap
page read and write
2755A360000
heap
page read and write
27559ADE000
heap
page read and write
ED0000
trusted library allocation
page read and write
ECA000
trusted library allocation
page execute and read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
BCA000
heap
page read and write
34F1000
heap
page read and write
C8A000
heap
page read and write
28226B8A000
heap
page read and write
27559B9F000
heap
page read and write
34F1000
heap
page read and write
27559B35000
heap
page read and write
1E8CE490000
heap
page read and write
27559A80000
heap
page read and write
27559B19000
heap
page read and write
1C094360000
trusted library allocation
page read and write
BE0000
heap
page read and write
27559B4B000
heap
page read and write
201BD500000
trusted library allocation
page read and write
34F1000
heap
page read and write
F122DFB000
stack
page read and write
201BD63C000
heap
page read and write
1122000
unkown
page execute and read and write
EC0000
trusted library allocation
page read and write
34F1000
heap
page read and write
3609000
heap
page read and write
27559B69000
heap
page read and write
1C574102000
heap
page read and write
27559B34000
heap
page read and write
296C5D00000
heap
page read and write
5E80000
trusted library allocation
page execute and read and write
98A3D7B000
stack
page read and write
6330000
trusted library allocation
page read and write
34F1000
heap
page read and write
1E8CE64C000
heap
page read and write
2755A375000
heap
page read and write
201B9200000
trusted library allocation
page read and write
27559BC2000
heap
page read and write
AE0000
heap
page read and write
27559A00000
heap
page read and write
1C02BC13000
heap
page read and write
90B107E000
stack
page read and write
27559B54000
heap
page read and write
27559B96000
heap
page read and write
ED7000
trusted library allocation
page execute and read and write
AD0000
direct allocation
page read and write
3BA1000
trusted library allocation
page read and write
201BD600000
heap
page read and write
1EF010E0000
heap
page read and write
201B8713000
heap
page read and write
34F1000
heap
page read and write
5E90000
heap
page execute and read and write
AE4000
heap
page read and write
2755A334000
heap
page read and write
C70000
heap
page read and write
1B0F8E46000
heap
page read and write
27559B73000
heap
page read and write
1CD6EC7D000
heap
page read and write
C7F000
heap
page read and write
2755A3F5000
heap
page read and write
28226A02000
heap
page read and write
B90000
trusted library allocation
page read and write
EDB000
trusted library allocation
page execute and read and write
34F1000
heap
page read and write
16B2000
unkown
page readonly
B0E34F9000
stack
page read and write
60B0000
trusted library allocation
page read and write
28226BA1000
heap
page read and write
34F1000
heap
page read and write
1CD6EC86000
heap
page read and write
34F1000
heap
page read and write
27559AA0000
heap
page read and write
5A0000
unkown
page read and write
201B7EA5000
heap
page read and write
27559ACD000
heap
page read and write
83B000
stack
page read and write
1B0F8E20000
heap
page read and write
201B7C10000
heap
page read and write
28227002000
heap
page read and write
3CDC000
trusted library allocation
page read and write
1C095290000
trusted library allocation
page read and write
98A387B000
stack
page read and write
60A0000
trusted library allocation
page read and write
5F9C000
stack
page read and write
201BD510000
remote allocation
page read and write
27559A71000
heap
page read and write
27559B61000
heap
page read and write
201BD3F0000
trusted library allocation
page read and write
70640FD000
stack
page read and write
BC0000
heap
page read and write
34F1000
heap
page read and write
3610000
heap
page read and write
34F1000
heap
page read and write
AE4000
heap
page read and write
34F1000
heap
page read and write
27559BFB000
heap
page read and write
34F1000
heap
page read and write
1C095230000
trusted library allocation
page read and write
1E8CE708000
heap
page read and write
27559A83000
heap
page read and write
296C5C8C000
heap
page read and write
CA4000
heap
page read and write
1C0942F5000
heap
page read and write
28226BB1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
8D802FF000
stack
page read and write
34F1000
heap
page read and write
1B0F8DF0000
heap
page read and write
34F1000
heap
page read and write
2822623C000
heap
page read and write
27559BE9000
heap
page read and write
201B8718000
heap
page read and write
34F1000
heap
page read and write
1CD6ED02000
heap
page read and write
98A3E7F000
stack
page read and write
27559B3A000
heap
page read and write
1C57405B000
heap
page read and write
27559BCE000
heap
page read and write
27976240000
heap
page read and write
201B9203000
trusted library allocation
page read and write
34F1000
heap
page read and write
5E93000
heap
page execute and read and write
525B9FD000
stack
page read and write
2797643D000
heap
page read and write
938000
stack
page read and write
27559A8C000
heap
page read and write
1F4CA23E000
heap
page read and write
1C02BC00000
heap
page read and write
1C02BC40000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27559A73000
heap
page read and write
27559BB1000
heap
page read and write
16E0000
unkown
page readonly
2755A1E0000
remote allocation
page read and write
27559AC0000
heap
page read and write
34F1000
heap
page read and write
27559A93000
heap
page read and write
27559B7C000
heap
page read and write
1B0F8E50000
heap
page read and write
27559BBA000
heap
page read and write
1DBFDED0000
heap
page read and write
27559BE3000
heap
page read and write
1120000
unkown
page readonly
34F1000
heap
page read and write
2755A385000
heap
page read and write
C01000
heap
page read and write
28226B89000
heap
page read and write
34F1000
heap
page read and write
90B157D000
stack
page read and write
2ABF7C7D000
heap
page read and write
B45C27B000
stack
page read and write
18DC000
unkown
page execute and read and write
A612DFE000
stack
page read and write
34F1000
heap
page read and write
2755A738000
heap
page read and write
1F4CA229000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
70783FA000
stack
page read and write
27559A99000
heap
page read and write
15DA000
unkown
page execute and read and write
1DBFE013000
heap
page read and write
296C5A50000
heap
page read and write
282269F0000
remote allocation
page read and write
27559B57000
heap
page read and write
27559AD4000
heap
page read and write
2755A33B000
heap
page read and write
34F1000
heap
page read and write
1C574073000
heap
page read and write
1DBFE075000
heap
page read and write
34F1000
heap
page read and write
28226B9F000
heap
page read and write
34F1000
heap
page read and write
27559B99000
heap
page read and write
2755A202000
heap
page read and write
1EF00F28000
heap
page read and write
2755A70A000
heap
page read and write
28226B7A000
heap
page read and write
34F1000
heap
page read and write
27559BA9000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
201BD68B000
heap
page read and write
34F1000
heap
page read and write
296C5C02000
heap
page read and write
1C02BC48000
heap
page read and write
707770F000
stack
page read and write
27559B36000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
C15000
heap
page read and write
34F1000
heap
page read and write
AE4000
heap
page read and write
27559B23000
heap
page read and write
28226BB1000
heap
page read and write
34F1000
heap
page read and write
27559AE3000
heap
page read and write
27559BC5000
heap
page read and write
1CD6EC76000
heap
page read and write
1C02BB90000
heap
page read and write
16D2000
unkown
page readonly
34F1000
heap
page read and write
1EF00F51000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
282269F0000
remote allocation
page read and write
525C0FE000
stack
page read and write
2755A71C000
heap
page read and write
1CD6EC53000
heap
page read and write
28226B87000
heap
page read and write
201BD510000
remote allocation
page read and write
2755A72F000
heap
page read and write
A612AF7000
stack
page read and write
AE4000
heap
page read and write
27559A9B000
heap
page read and write
1B0F8DB0000
heap
page read and write
16B2000
unkown
page readonly
34F1000
heap
page read and write
1E8CE68A000
heap
page read and write
18D0000
unkown
page execute and read and write
27559B7B000
heap
page read and write
1EF010E5000
heap
page read and write
1DBFE002000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
EDB000
trusted library allocation
page execute and read and write
27559B1E000
heap
page read and write
201BD700000
heap
page read and write
62B0000
trusted library allocation
page read and write
1E8CE68C000
heap
page read and write
2ABF7C68000
heap
page read and write
201BD5F0000
trusted library allocation
page read and write
AE4000
heap
page read and write
34F1000
heap
page read and write
B45C07E000
stack
page read and write
4815E7E000
stack
page read and write
34F1000
heap
page read and write
1CD6EC4F000
heap
page read and write
27559AE5000
heap
page read and write
18A9000
unkown
page execute and read and write
3B9E000
stack
page read and write
27559BBC000
heap
page read and write
34F1000
heap
page read and write
27559B52000
heap
page read and write
2755A344000
heap
page read and write
201BD490000
trusted library allocation
page read and write
2755A3A2000
heap
page read and write
2ABF7C4A000
heap
page read and write
C01000
heap
page read and write
34F1000
heap
page read and write
27559B42000
heap
page read and write
27559B84000
heap
page read and write
27559A92000
heap
page read and write
27559B65000
heap
page read and write
201B7E8E000
heap
page read and write
1CD6EC5C000
heap
page read and write
5DB4000
heap
page read and write
34F1000
heap
page read and write
27559ADE000
heap
page read and write
34F1000
heap
page read and write
201B7E27000
heap
page read and write
5DD0000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
201BD3B8000
trusted library allocation
page read and write
27559A73000
heap
page read and write
5E80000
trusted library allocation
page execute and read and write
28226B89000
heap
page read and write
33C6FD000
stack
page read and write
28226B52000
heap
page read and write
28226BA0000
heap
page read and write
28226B5B000
heap
page read and write
34F1000
heap
page read and write
DDC9FFE000
stack
page read and write
27559BAF000
heap
page read and write
27559B61000
heap
page read and write
2ABF7C68000
heap
page read and write
1C09440D000
heap
page read and write
27976413000
heap
page read and write
5DD0000
trusted library allocation
page read and write
201BD6DA000
heap
page read and write
27559BBE000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
B0E33FF000
stack
page read and write
28226B7F000
heap
page read and write
2755A3E2000
heap
page read and write
27559B5A000
heap
page read and write
27559A24000
heap
page read and write
27559AC8000
heap
page read and write
1C573DA0000
heap
page read and write
27559B2F000
heap
page read and write
296C5C80000
heap
page read and write
27559B55000
heap
page read and write
90B11FC000
stack
page read and write
2755A339000
heap
page read and write
201BD4F0000
trusted library allocation
page read and write
AE4000
heap
page read and write
1120000
unkown
page readonly
27559B29000
heap
page read and write
ED2000
trusted library allocation
page read and write
1CD6EC30000
heap
page read and write
201BD6F3000
heap
page read and write
34F1000
heap
page read and write
2755A315000
heap
page read and write
27559BA7000
heap
page read and write
1C094190000
trusted library allocation
page read and write
1C574802000
trusted library allocation
page read and write
28226B8F000
heap
page read and write
34F1000
heap
page read and write
28226B7C000
heap
page read and write
201B7E6F000
heap
page read and write
BA0000
trusted library allocation
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
8DFFEFE000
stack
page read and write
34F1000
heap
page read and write
28226B87000
heap
page read and write
1F4CA302000
heap
page read and write
34F1000
heap
page read and write
2755A355000
heap
page read and write
34F1000
heap
page read and write
28226B88000
heap
page read and write
AE3255C000
stack
page read and write
27559BDC000
heap
page read and write
1C02BD00000
heap
page read and write
5B0000
trusted library allocation
page read and write
201BD510000
remote allocation
page read and write
27559A6C000
heap
page read and write
2755A700000
heap
page read and write
15DA000
unkown
page execute and read and write
34F1000
heap
page read and write
27559B24000
heap
page read and write
27559B39000
heap
page read and write
18D9000
unkown
page execute and read and write
1EF00F42000
heap
page read and write
34F1000
heap
page read and write
28226B8F000
heap
page read and write
90B147E000
stack
page read and write
5DB4000
heap
page read and write
34F1000
heap
page read and write
AE4000
heap
page read and write
201B7E93000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27559BAC000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27559AC2000
heap
page read and write
1CD6EC5C000
heap
page read and write
AD0000
direct allocation
page read and write
34F1000
heap
page read and write
1884000
unkown
page execute and read and write
1F4CA213000
heap
page read and write
B45C57C000
stack
page read and write
34F1000
heap
page read and write
4815D7E000
stack
page read and write
34F1000
heap
page read and write
27559BE1000
heap
page read and write
2755A3B8000
heap
page read and write
275599C0000
trusted library allocation
page read and write
1C094180000
heap
page read and write
27559850000
heap
page read and write
5DC0000
trusted library allocation
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
AD0000
direct allocation
page read and write
28226B96000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
2755A39A000
heap
page read and write
1B0F8E63000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27559BCC000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27559A62000
heap
page read and write
28226B87000
heap
page read and write
3A9E000
stack
page read and write
201BD3E0000
trusted library allocation
page read and write
34F1000
heap
page read and write
2822624F000
heap
page read and write
1DBFE100000
heap
page read and write
3A9E000
stack
page read and write
27559BD0000
heap
page read and write
34F1000
heap
page read and write
BBD000
trusted library allocation
page execute and read and write
27559B82000
heap
page read and write
27559BFB000
heap
page read and write
C99000
heap
page read and write
34F1000
heap
page read and write
27559B13000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
1F4CA0E0000
heap
page read and write
27559B6D000
heap
page read and write
AD0000
direct allocation
page read and write
27559B06000
heap
page read and write
706407B000
stack
page read and write
3600000
heap
page read and write
5E70000
trusted library allocation
page read and write
1E8CE702000
heap
page read and write
27559AA9000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27559AAE000
heap
page read and write
28226255000
heap
page read and write
1E8CE713000
heap
page read and write
BA4000
trusted library allocation
page read and write
201BD3F0000
trusted library allocation
page read and write
34F1000
heap
page read and write
B74000
direct allocation
page read and write
27559BDD000
heap
page read and write
34F1000
heap
page read and write
AE3287E000
stack
page read and write
27559BCD000
heap
page read and write
201BD6E7000
heap
page read and write
525B33B000
stack
page read and write
27559A8D000
heap
page read and write
1C02BB20000
heap
page read and write
34F1000
heap
page read and write
60B0000
trusted library allocation
page read and write
201BD704000
heap
page read and write
27559BB6000
heap
page read and write
1F4CA2E1000
heap
page read and write
34F1000
heap
page read and write
28226BC4000
heap
page read and write
34F1000
heap
page read and write
AE32F78000
stack
page read and write
27559BB9000
heap
page read and write
1EF00F33000
heap
page read and write
34F1000
heap
page read and write
27559B11000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27559BFF000
heap
page read and write
ABE000
stack
page read and write
34F1000
heap
page read and write
1E8CE68C000
heap
page read and write
33C67E000
stack
page read and write
B70000
unclassified section
page read and write
1F4CA269000
heap
page read and write
2755A602000
heap
page read and write
EC2000
trusted library allocation
page read and write
CA4000
heap
page read and write
27559BAA000
heap
page read and write
34F1000
heap
page read and write
27559B62000
heap
page read and write
34F1000
heap
page read and write
27559BE3000
heap
page read and write
27559B47000
heap
page read and write
28226B7C000
heap
page read and write
F12291E000
stack
page read and write
34F1000
heap
page read and write
27559B9D000
heap
page read and write
28226256000
heap
page read and write
28226313000
heap
page read and write
28226B63000
heap
page read and write
ED0000
trusted library allocation
page read and write
2755A1E0000
remote allocation
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
1C573F10000
trusted library allocation
page read and write
16AF000
unkown
page readonly
1E8CE672000
heap
page read and write
34F1000
heap
page read and write
27559ACB000
heap
page read and write
296C5C2A000
heap
page read and write
27559BAF000
heap
page read and write
AE4000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27559BA4000
heap
page read and write
1C02D740000
remote allocation
page read and write
27559AD0000
heap
page read and write
DDCA0FF000
stack
page read and write
27559B48000
heap
page read and write
28227002000
heap
page read and write
2755A359000
heap
page read and write
27559BD4000
heap
page read and write
C01000
heap
page read and write
28226213000
heap
page read and write
27559BA1000
heap
page read and write
2ABF7AF0000
heap
page read and write
34F1000
heap
page read and write
2ABF7C3C000
heap
page read and write
2755A337000
heap
page read and write
2755A3A1000
heap
page read and write
F122F77000
stack
page read and write
F12317E000
stack
page read and write
28226B76000
heap
page read and write
34F1000
heap
page read and write
2755A35C000
heap
page read and write
1E8CE68C000
heap
page read and write
34F1000
heap
page read and write
EC2000
trusted library allocation
page read and write
27559B96000
heap
page read and write
2ABF8602000
trusted library allocation
page read and write
1DBFE028000
heap
page read and write
27559B93000
heap
page read and write
5DD0000
trusted library allocation
page read and write
27559BB6000
heap
page read and write
BB0000
trusted library allocation
page read and write
2755A325000
heap
page read and write
2755A72E000
heap
page read and write
27559B1B000
heap
page read and write
1C574000000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
3609000
heap
page read and write
34F1000
heap
page read and write
27559B68000
heap
page read and write
1DBFE802000
trusted library allocation
page read and write
201B7BB0000
heap
page read and write
18B7000
unkown
page execute and read and write
27559ACB000
heap
page read and write
27559AA7000
heap
page read and write
27559B74000
heap
page read and write
27559B17000
heap
page read and write
1C094300000
heap
page read and write
28226B89000
heap
page read and write
28226B87000
heap
page read and write
34F1000
heap
page read and write
AE325DE000
stack
page read and write
28226B7E000
heap
page read and write
706427F000
stack
page read and write
2755A332000
heap
page read and write
201BD810000
trusted library allocation
page read and write
525BDFE000
stack
page read and write
938000
stack
page read and write
2755A336000
heap
page read and write
201BD3B0000
trusted library allocation
page read and write
34F1000
heap
page read and write
7077DFF000
stack
page read and write
4BB1000
trusted library allocation
page read and write
34F1000
heap
page read and write
28227000000
heap
page read and write
27559A6D000
heap
page read and write
28226B8F000
heap
page read and write
34F1000
heap
page read and write
1C02BB30000
heap
page read and write
27559AF3000
heap
page read and write
282262EC000
heap
page read and write
34F1000
heap
page read and write
16AF000
unkown
page readonly
61A0000
trusted library allocation
page read and write
83B000
stack
page read and write
EC2000
trusted library allocation
page read and write
27559B2B000
heap
page read and write
BA3000
trusted library allocation
page execute and read and write
AE32E7F000
unkown
page read and write
AE4000
heap
page read and write
2755A39E000
heap
page read and write
1C02BBC0000
trusted library allocation
page read and write
34F1000
heap
page read and write
27559BE8000
heap
page read and write
27559A96000
heap
page read and write
481627C000
stack
page read and write
296C5AC0000
heap
page read and write
2755A300000
heap
page read and write
282269F0000
remote allocation
page read and write
27559B79000
heap
page read and write
2ABF7C48000
heap
page read and write
27559BCB000
heap
page read and write
27559BD9000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
6350000
remote allocation
page read and write
27559BCA000
heap
page read and write
34F1000
heap
page read and write
2755A32F000
heap
page read and write
BBD000
trusted library allocation
page execute and read and write
28226B8E000
heap
page read and write
34F1000
heap
page read and write
27559B17000
heap
page read and write
27559B8F000
heap
page read and write
28226B7D000
heap
page read and write
34F1000
heap
page read and write
33C3CB000
stack
page read and write
609C000
stack
page read and write
34F1000
heap
page read and write
27559BFD000
heap
page read and write
27559A94000
heap
page read and write
28226B89000
heap
page read and write
2ABF7C00000
heap
page read and write
AD0000
direct allocation
page read and write
34F1000
heap
page read and write
2ABF7D02000
heap
page read and write
34F1000
heap
page read and write
28226B89000
heap
page read and write
34F1000
heap
page read and write
28226B76000
heap
page read and write
1F4CA270000
heap
page read and write
C83000
heap
page read and write
282262FA000
heap
page read and write
201BD2A0000
trusted library allocation
page read and write
28226B78000
heap
page read and write
34F1000
heap
page read and write
F12299E000
stack
page read and write
DBE000
stack
page read and write
2755A393000
heap
page read and write
27559B5E000
heap
page read and write
27559A7A000
heap
page read and write
34F1000
heap
page read and write
27559B72000
heap
page read and write
AE4000
heap
page read and write
34F1000
heap
page read and write
B6D000
stack
page read and write
EC0000
trusted library allocation
page read and write
27559AF3000
heap
page read and write
27559A8E000
heap
page read and write
1CD6EC49000
heap
page read and write
201B8759000
heap
page read and write
5D7E000
stack
page read and write
1C573DB0000
heap
page read and write
5DB0000
heap
page read and write
A612CFF000
stack
page read and write
2755A32F000
heap
page read and write
B0E35FB000
stack
page read and write
34F1000
heap
page read and write
296C5C66000
heap
page read and write
16E0000
unkown
page readonly
27559AA4000
heap
page read and write
2755A368000
heap
page read and write
27559A7F000
heap
page read and write
2755A319000
heap
page read and write
1C094399000
heap
page read and write
8DFFE7C000
stack
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27559B89000
heap
page read and write
27976340000
trusted library allocation
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
16E0000
unkown
page readonly
28226B16000
heap
page read and write
1E8CE5F0000
trusted library allocation
page read and write
27559A9E000
heap
page read and write
2755A38E000
heap
page read and write
1CD6EC55000
heap
page read and write
27559A5E000
heap
page read and write
34F1000
heap
page read and write
98A3C7F000
stack
page read and write
201B7E55000
heap
page read and write
27559BBD000
heap
page read and write
BA0000
trusted library allocation
page read and write
27559AAB000
heap
page read and write
34F1000
heap
page read and write
28226258000
heap
page read and write
27559B87000
heap
page read and write
201B7E74000
heap
page read and write
AE4000
heap
page read and write
34F1000
heap
page read and write
98A3B7B000
stack
page read and write
4BA1000
trusted library allocation
page read and write
27559B33000
heap
page read and write
18B7000
unkown
page execute and read and write
27559B20000
heap
page read and write
706417E000
stack
page read and write
5E93000
heap
page execute and read and write
296C5BC0000
trusted library allocation
page read and write
201B7E3C000
heap
page read and write
27559B8A000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27559B4A000
heap
page read and write
1C02BC57000
heap
page read and write
92200FF000
stack
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
2755A33D000
heap
page read and write
27559B81000
heap
page read and write
201BD649000
heap
page read and write
1EF00F51000
heap
page read and write
92201FE000
stack
page read and write
2755A332000
heap
page read and write
27559AD7000
heap
page read and write
16CE000
unkown
page readonly
28226243000
heap
page read and write
201BD702000
heap
page read and write
27559B49000
heap
page read and write
AE4000
heap
page read and write
28226B87000
heap
page read and write
28227002000
heap
page read and write
34F1000
heap
page read and write
201BD661000
heap
page read and write
27559B2D000
heap
page read and write
27559BB9000
heap
page read and write
27559BD9000
heap
page read and write
2822624C000
heap
page read and write
28226B78000
heap
page read and write
2755A36A000
heap
page read and write
34F1000
heap
page read and write
28226261000
heap
page read and write
AD0000
direct allocation
page read and write
4BB1000
trusted library allocation
page read and write
2755A302000
heap
page read and write
27559BBB000
heap
page read and write
27559AE0000
heap
page read and write
201B7F02000
heap
page read and write
1E8CE68C000
heap
page read and write
27559AF9000
heap
page read and write
1EF01020000
heap
page read and write
34F1000
heap
page read and write
2755A3FE000
heap
page read and write
28226B96000
heap
page read and write
60B0000
trusted library allocation
page read and write
34F1000
heap
page read and write
27559A62000
heap
page read and write
201B8600000
heap
page read and write
27559AC4000
heap
page read and write
27559ACA000
heap
page read and write
922027E000
stack
page read and write
34F1000
heap
page read and write
27559B91000
heap
page read and write
ED5000
trusted library allocation
page execute and read and write
34F1000
heap
page read and write
28226B78000
heap
page read and write
5E70000
trusted library allocation
page read and write
27559B70000
heap
page read and write
27559B2B000
heap
page read and write
27559B97000
heap
page read and write
1C02BC58000
heap
page read and write
282262DC000
heap
page read and write
34F1000
heap
page read and write
28226B9C000
heap
page read and write
16C0000
unkown
page readonly
28226302000
heap
page read and write
34F1000
heap
page read and write
70782FB000
stack
page read and write
609C000
stack
page read and write
27559ACE000
heap
page read and write
27559A88000
heap
page read and write
27559B60000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
28226BB6000
heap
page read and write
DBE000
stack
page read and write
18A5000
unkown
page execute and read and write
27559A87000
heap
page read and write
5B0000
trusted library allocation
page read and write
18D9000
unkown
page execute and read and write
5DC0000
trusted library allocation
page read and write
27559B75000
heap
page read and write
34F1000
heap
page read and write
B0E36FF000
stack
page read and write
27559B76000
heap
page read and write
27559A9C000
heap
page read and write
1884000
unkown
page execute and read and write
28226200000
heap
page read and write
16C0000
unkown
page readonly
201B7E79000
heap
page read and write
27559B18000
heap
page read and write
27559B85000
heap
page read and write
34F1000
heap
page read and write
2755A335000
heap
page read and write
27976370000
remote allocation
page read and write
C99000
heap
page read and write
27559ABF000
heap
page read and write
62B0000
trusted library allocation
page read and write
609C000
stack
page read and write
5F9C000
stack
page read and write
1C57403F000
heap
page read and write
1EF00F00000
heap
page read and write
2822701B000
heap
page read and write
33C879000
stack
page read and write
28226B91000
heap
page read and write
1DBFE079000
heap
page read and write
296C5C3C000
heap
page read and write
27559BB7000
heap
page read and write
296C5D02000
heap
page read and write
5C7D000
stack
page read and write
1C574068000
heap
page read and write
2755A703000
heap
page read and write
1F4CA287000
heap
page read and write
2755A717000
heap
page read and write
34F1000
heap
page read and write
C99000
heap
page read and write
2755A38B000
heap
page read and write
27559A75000
heap
page read and write
34F1000
heap
page read and write
1EF00F47000
heap
page read and write
1CD6EC80000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27559B21000
heap
page read and write
27559AB9000
heap
page read and write
5A0000
heap
page read and write
1EF01060000
trusted library allocation
page read and write
2755A381000
heap
page read and write
34F1000
heap
page read and write
27559BB2000
heap
page read and write
34F1000
heap
page read and write
27559A53000
heap
page read and write
1CD6EC3E000
heap
page read and write
27559B9A000
heap
page read and write
BE0000
heap
page read and write
27559B8C000
heap
page read and write
34F1000
heap
page read and write
2ABF7C50000
heap
page read and write
34F1000
heap
page read and write
201BD6FF000
heap
page read and write
34F1000
heap
page read and write
27559BD6000
heap
page read and write
1E8CE4F0000
heap
page read and write
34F1000
heap
page read and write
AD0000
direct allocation
page read and write
2ABF7C49000
heap
page read and write
3BA1000
trusted library allocation
page read and write
1CD6EC7C000
heap
page read and write
B45C37C000
stack
page read and write
1CD6EC46000
heap
page read and write
34F1000
heap
page read and write
B45C1FE000
stack
page read and write
34F1000
heap
page read and write
B2E000
stack
page read and write
1C0943E0000
heap
page read and write
34F1000
heap
page read and write
27559B14000
heap
page read and write
201BD702000
heap
page read and write
28226281000
heap
page read and write
201BD210000
trusted library allocation
page read and write
1B0F8E50000
heap
page read and write
1CD6EC3A000
heap
page read and write
AD0000
direct allocation
page read and write
2ABF7C4C000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27559BDA000
heap
page read and write
28226B9A000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27559A97000
heap
page read and write
DDC9DFB000
stack
page read and write
27559B7B000
heap
page read and write
34F1000
heap
page read and write
27559B66000
heap
page read and write
27559B86000
heap
page read and write
201BD3D4000
trusted library allocation
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
1E8CE64A000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27559B51000
heap
page read and write
2755A35C000
heap
page read and write
1CD6EC79000
heap
page read and write
27559AAD000
heap
page read and write
2755A302000
heap
page read and write
1CD6EB50000
heap
page read and write
34F1000
heap
page read and write
201BD4E0000
trusted library allocation
page read and write
28226B8F000
heap
page read and write
18A1000
unkown
page execute and read and write
1C30000
unkown
page execute read
34F1000
heap
page read and write
34F1000
heap
page read and write
1C094390000
heap
page read and write
27559B08000
heap
page read and write
27976370000
remote allocation
page read and write
27559B7E000
heap
page read and write
27559A7C000
heap
page read and write
34F1000
heap
page read and write
3CDC000
trusted library allocation
page read and write
1C02BC58000
heap
page read and write
296C5C13000
heap
page read and write
27559B3E000
heap
page read and write
34F1000
heap
page read and write
28227002000
heap
page read and write
C92000
heap
page read and write
28226B8B000
heap
page read and write
1CD6EC47000
heap
page read and write
61B0000
trusted library allocation
page read and write
34F1000
heap
page read and write
2755A37C000
heap
page read and write
33C7FA000
stack
page read and write
18B7000
unkown
page execute and read and write
27976402000
heap
page read and write
2755A714000
heap
page read and write
34F1000
heap
page read and write
1C0943D2000
heap
page read and write
27559BA7000
heap
page read and write
28226B8E000
heap
page read and write
27559BC7000
heap
page read and write
1C02BC89000
heap
page read and write
8D801FE000
stack
page read and write
BB0000
trusted library allocation
page read and write
27559B3D000
heap
page read and write
18DC000
unkown
page execute and read and write
4BB1000
trusted library allocation
page read and write
27559B7F000
heap
page read and write
5E80000
trusted library allocation
page read and write
28226BAD000
heap
page read and write
1CD6EC50000
heap
page read and write
5D7E000
stack
page read and write
2755A399000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
B0E2F8B000
stack
page read and write
27559BA2000
heap
page read and write
34F1000
heap
page read and write
27559BC9000
heap
page read and write
34F1000
heap
page read and write
27559BE5000
heap
page read and write
27559AF7000
heap
page read and write
34F1000
heap
page read and write
90B117E000
stack
page read and write
2755A331000
heap
page read and write
34F1000
heap
page read and write
28226B96000
heap
page read and write
33C979000
stack
page read and write
201B8702000
heap
page read and write
28226B8B000
heap
page read and write
2755A3F6000
heap
page read and write
16AE000
unkown
page readonly
1C573E10000
heap
page read and write
90B13FD000
stack
page read and write
34F1000
heap
page read and write
18D0000
unkown
page execute and read and write
AD0000
direct allocation
page read and write
34F1000
heap
page read and write
28226316000
heap
page read and write
27559AF5000
heap
page read and write
34F1000
heap
page read and write
BCA000
heap
page read and write
18A3000
unkown
page execute and read and write
28226B7A000
heap
page read and write
296C5C00000
heap
page read and write
F00000
heap
page execute and read and write
2ABF7C24000
heap
page read and write
2755A723000
heap
page read and write
1CD6EC52000
heap
page read and write
34F1000
heap
page read and write
28226B78000
heap
page read and write
27559B97000
heap
page read and write
201B7EFD000
heap
page read and write
34F1000
heap
page read and write
296C5C4E000
heap
page read and write
27559B5F000
heap
page read and write
A612BFF000
stack
page read and write
1B0F8E47000
heap
page read and write
27976502000
heap
page read and write
27559AB7000
heap
page read and write
27976C02000
trusted library allocation
page read and write
1B0F8DD0000
heap
page read and write
34F1000
heap
page read and write
201BD62B000
heap
page read and write
DDC9A7B000
stack
page read and write
1C0943ED000
heap
page read and write
34F1000
heap
page read and write
2755A386000
heap
page read and write
2ABF7C4E000
heap
page read and write
AE32BF7000
stack
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27559BB1000
heap
page read and write
15DA000
unkown
page execute and read and write
1CD6EC00000
heap
page read and write
4815C7F000
stack
page read and write
34F1000
heap
page read and write
27559A81000
heap
page read and write
27559B3B000
heap
page read and write
938000
stack
page read and write
C8A000
heap
page read and write
34F1000
heap
page read and write
AE329FE000
stack
page read and write
27559B13000
heap
page read and write
1B0F8E64000
heap
page read and write
ED5000
trusted library allocation
page execute and read and write
28226229000
heap
page read and write
BE0000
heap
page read and write
3A5E000
stack
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27559B5B000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
3600000
heap
page read and write
2755A365000
heap
page read and write
34F1000
heap
page read and write
27559BB5000
heap
page read and write
27559AC7000
heap
page read and write
B2E000
stack
page read and write
27559B8A000
heap
page read and write
1C02BC48000
heap
page read and write
27559B7D000
heap
page read and write
34F1000
heap
page read and write
1E8CE629000
heap
page read and write
34F1000
heap
page read and write
201B7EFD000
heap
page read and write
27559BAB000
heap
page read and write
28226BA2000
heap
page read and write
2755A35C000
heap
page read and write
201BD3E0000
trusted library allocation
page read and write
27559B1D000
heap
page read and write
1C094FD0000
trusted library allocation
page read and write
34F1000
heap
page read and write
B6D000
stack
page read and write
27559B6F000
heap
page read and write
201B8DE0000
trusted library allocation
page read and write
5DB0000
heap
page read and write
C15000
heap
page read and write
27559AFB000
heap
page read and write
34F1000
heap
page read and write
C83000
heap
page read and write
27559ABE000
heap
page read and write
282262A4000
heap
page read and write
16EA000
unkown
page execute and read and write
1C30000
unkown
page execute read
2755A35D000
heap
page read and write
27559BE1000
heap
page read and write
28226BBE000
heap
page read and write
34F1000
heap
page read and write
1CD6EC77000
heap
page read and write
27559B83000
heap
page read and write
27559B23000
heap
page read and write
ED2000
trusted library allocation
page read and write
2755A72E000
heap
page read and write
1120000
unkown
page readonly
60A0000
trusted library allocation
page read and write
2755A3A1000
heap
page read and write
3600000
heap
page read and write
1C0942C0000
heap
page read and write
27559A99000
heap
page read and write
1122000
unkown
page execute and read and write
BC0000
heap
page read and write
27559AF2000
heap
page read and write
34F1000
heap
page read and write
B45C47F000
stack
page read and write
2755A373000
heap
page read and write
1F4CA200000
heap
page read and write
27559B3C000
heap
page read and write
1CD6EB60000
heap
page read and write
34F1000
heap
page read and write
EDB000
trusted library allocation
page execute and read and write
B70000
unclassified section
page read and write
201B7D10000
trusted library allocation
page read and write
28226190000
trusted library allocation
page read and write
1E8CE480000
heap
page read and write
27559B55000
heap
page read and write
2755A3FF000
heap
page read and write
2822624E000
heap
page read and write
1CD6F602000
trusted library allocation
page read and write
34F1000
heap
page read and write
27559A70000
heap
page read and write
5E90000
heap
page execute and read and write
34F1000
heap
page read and write
2755A343000
heap
page read and write
A6128FB000
stack
page read and write
34F1000
heap
page read and write
18A1000
unkown
page execute and read and write
EC6000
trusted library allocation
page execute and read and write
27559BDD000
heap
page read and write
ABE000
stack
page read and write
61A0000
trusted library allocation
page read and write
27559BA0000
heap
page read and write
18A5000
unkown
page execute and read and write
2755A3EE000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27559B80000
heap
page read and write
1C02BD13000
heap
page read and write
83B000
stack
page read and write
34F1000
heap
page read and write
AE0000
heap
page read and write
34F1000
heap
page read and write
201BD480000
trusted library allocation
page read and write
1F4CA2BC000
heap
page read and write
27559B1F000
heap
page read and write
2822624A000
heap
page read and write
1C02BC02000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27976429000
heap
page read and write
2755A357000
heap
page read and write
2822628B000
heap
page read and write
28226B00000
heap
page read and write
34F1000
heap
page read and write
BB8000
trusted library allocation
page read and write
5D80000
heap
page read and write
282262E9000
heap
page read and write
28226B8B000
heap
page read and write
1C0943ED000
heap
page read and write
18D9000
unkown
page execute and read and write
5DC0000
trusted library allocation
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27559AA5000
heap
page read and write
5D7E000
stack
page read and write
27559A5E000
heap
page read and write
16CE000
unkown
page readonly
34F1000
heap
page read and write
1C574029000
heap
page read and write
28226308000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27559B31000
heap
page read and write
2755A317000
heap
page read and write
28226BB6000
heap
page read and write
2755A3E7000
heap
page read and write
A6125AE000
stack
page read and write
1F4CAD00000
heap
page read and write
1EF00F52000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
27559BD9000
heap
page read and write
28226B84000
heap
page read and write
27559A8B000
heap
page read and write
3609000
heap
page read and write
28226244000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
33C77E000
stack
page read and write
27559AB9000
heap
page read and write
2755A312000
heap
page read and write
27559AC3000
heap
page read and write
27559A65000
heap
page read and write
27559A3D000
heap
page read and write
27976400000
heap
page read and write
1EF00DC0000
heap
page read and write
34F1000
heap
page read and write
34F1000
heap
page read and write
1C57406A000
heap
page read and write
27559AF0000
heap
page read and write
201B7E9E000
heap
page read and write
28226B76000
heap
page read and write
2755A33F000
heap
page read and write
296C6402000
trusted library allocation
page read and write
18A3000
unkown
page execute and read and write
27559AFF000
heap
page read and write
18A9000
unkown
page execute and read and write
34F1000
heap
page read and write
5DB0000
heap
page read and write
34F1000
heap
page read and write
There are 1874 hidden memdumps, click here to show them.