IOC Report
g2m.dll

loading gif

Files

File Path
Type
Category
Malicious
g2m.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Ak9C7Tsu2K\7zxa.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Ak9C7Tsu2K\bb1308.zip
data
dropped
C:\Ak9C7Tsu2K\bb1308_decrypted.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Ak9C7Tsu2K\unrar.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_3f8c31e3562221418a6d26d066d748d43d364_7522e4b5_2f387f1d-1f08-47d2-b789-8653ca4a7303\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_3f8c31e3562221418a6d26d066d748d43d364_7522e4b5_a4efb60e-92ed-402f-91c4-ed1e2046dec4\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_3f8c31e3562221418a6d26d066d748d43d364_7522e4b5_b4e4be33-8a27-4863-986d-09914cdcbe0e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_5080fa819e61b36dbd2b7e7e74bdf5c819fed0_7522e4b5_cae0112c-f81c-42f4-9b50-40960affa2ff\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_c1d756b83cd83ada8dfe11775affd7ce637fbf_7522e4b5_0838dc4a-4a91-4c6d-8a03-664911d8ef26\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2369.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Aug 28 11:58:03 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER23A8.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Aug 28 11:58:03 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER24A3.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER24C2.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER24F2.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER25FB.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2E75.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Aug 28 11:58:06 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2F22.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2F62.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3BF2.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Aug 28 11:58:09 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3C90.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3CEE.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5CE3.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Aug 28 13:19:20 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5E8A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5ECA.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\eRu3EEtq4z\7zxa.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\eRu3EEtq4z\bb1308.zip
data
dropped
C:\eRu3EEtq4z\bb1308_decrypted.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\eRu3EEtq4z\unrar.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
There are 20 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\g2m.dll,DllMain
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\g2m.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\g2m.dll,bz_internal_error
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\g2m.dll,g2mcomm_winmain
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\g2m.dll",DllMain
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\g2m.dll",bz_internal_error
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\g2m.dll",g2mcomm_winmain
malicious
C:\eRu3EEtq4z\INNOTEP.exe
"C:\eRu3EEtq4z\INNOTEP.exe"
malicious
C:\Ak9C7Tsu2K\INNOTEP.exe
"C:\Ak9C7Tsu2K\INNOTEP.exe"
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\g2m.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\g2m.dll",#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3652 -s 612
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2412 -s 616
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7284 -s 684
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7732 -s 608
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7880 -s 732
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.ghisler.com/plugins.htm
unknown
http://www.scootersoftware.com. 
unknown
http://206.183.128.95/index.phpmw)b
unknown
http://www.scootersoftware.com/checkupdates.php?product=bc3&minor=
unknown
http://www.embarcadero.com/products/delphi
unknown
http://www.scootersoftware.com/bugRepMailer.php
unknown
http://code.google.com/p/swfobject/
unknown
http://www.esegece.com
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
http://tools.ietf.org/html/rfc6455
unknown
http://206.183.128.95/index.php?user-PC
unknown
https://github.com/Yaffle/EventSource/
unknown
http://www.totalcmd.net/directory/packer.html
unknown
http://www.indyproject.org/
unknown
http://www.scootersoftware.com/buynow?bld=%dS
unknown
http://206.183.128.95/index.php?user-PCJ=
unknown
http://206.183.128.95/bb1308.zipw
unknown
http://206.183.128.95/index.php?user-PCm
unknown
http://www.scootersoftware.com/upgrade
unknown
http://206.183.128.95/bb1308.zip_)Z
unknown
http://www.scootersoftware.com/
unknown
https://fontawesome.com/license/free
unknown
http://206.183.128.95/index.php?user-PCl
unknown
http://dev.w3.org/html5/websockets/
unknown
http://www.scootersoftware.com/buynow?bld=%d
unknown
https://fontawesome.com
unknown
http://www.scootersoftware.com/support.php
unknown
http://javascript.crockford.com/jsmin.html
unknown
http://...
unknown
http://www.opensource.org/licenses/mit-license.php
unknown
http://www.scootersoftware.com/upgradeM?rV
unknown
http://www.scootersoftware.com/download.phpS
unknown
http://206.183.128.95/index.php?user-PC3
unknown
http://www.scootersoftware.com/download.php
unknown
http://206.183.128.95/index.php?user-PCt
unknown
http://206.183.128.95/bb1308.zipg
unknown
https://github.com/muaz-khan/RecordRTC
unknown
http://www.scootersoftware.com/v3formats
unknown
http://206.183.128.95/bb1308.zip
unknown
http://www.scootersoftware.com/upgradeite
unknown
http://gimite.net/en/
unknown
http://206.183.128.95/index.php
unknown
https://github.com/muaz-khan/RTCMultiConnection
unknown
http://www.secureblackbox.com
unknown
http://www.scootersoftware.com/upgradeb?KV
unknown
There are 35 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
206.183.128.95
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
\REGISTRY\A\{00fa383f-f748-2e49-cb2c-7c67917e9d28}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProgramId
\REGISTRY\A\{00fa383f-f748-2e49-cb2c-7c67917e9d28}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
FileId
\REGISTRY\A\{00fa383f-f748-2e49-cb2c-7c67917e9d28}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LowerCaseLongPath
\REGISTRY\A\{00fa383f-f748-2e49-cb2c-7c67917e9d28}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LongPathHash
\REGISTRY\A\{00fa383f-f748-2e49-cb2c-7c67917e9d28}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Name
\REGISTRY\A\{00fa383f-f748-2e49-cb2c-7c67917e9d28}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
OriginalFileName
\REGISTRY\A\{00fa383f-f748-2e49-cb2c-7c67917e9d28}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Publisher
\REGISTRY\A\{00fa383f-f748-2e49-cb2c-7c67917e9d28}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Version
\REGISTRY\A\{00fa383f-f748-2e49-cb2c-7c67917e9d28}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinFileVersion
\REGISTRY\A\{00fa383f-f748-2e49-cb2c-7c67917e9d28}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinaryType
\REGISTRY\A\{00fa383f-f748-2e49-cb2c-7c67917e9d28}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductName
\REGISTRY\A\{00fa383f-f748-2e49-cb2c-7c67917e9d28}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductVersion
\REGISTRY\A\{00fa383f-f748-2e49-cb2c-7c67917e9d28}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LinkDate
\REGISTRY\A\{00fa383f-f748-2e49-cb2c-7c67917e9d28}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinProductVersion
\REGISTRY\A\{00fa383f-f748-2e49-cb2c-7c67917e9d28}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageFullName
\REGISTRY\A\{00fa383f-f748-2e49-cb2c-7c67917e9d28}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageRelativeId
\REGISTRY\A\{00fa383f-f748-2e49-cb2c-7c67917e9d28}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Size
\REGISTRY\A\{00fa383f-f748-2e49-cb2c-7c67917e9d28}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Language
\REGISTRY\A\{00fa383f-f748-2e49-cb2c-7c67917e9d28}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
IsOsComponent
\REGISTRY\A\{00fa383f-f748-2e49-cb2c-7c67917e9d28}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Usn
HKEY_CURRENT_USER\SOFTWARE\Scooter Software\Beyond Compare 3
CacheID
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
yEdwiule
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018001064301D6A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 17 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7C34000
direct allocation
page read and write
77AE000
unkown
page readonly
940D000
heap
page read and write
706B000
unkown
page read and write
401000
unkown
page execute read
2C51000
heap
page read and write
ACB000
unkown
page write copy
2C51000
heap
page read and write
7767000
unkown
page readonly
309E000
heap
page read and write
2C51000
heap
page read and write
2A89000
direct allocation
page read and write
74B1000
unkown
page readonly
FB6000
heap
page read and write
2C51000
heap
page read and write
5D1E000
unkown
page execute read
6D08F000
unkown
page write copy
5CB6000
unkown
page execute read
5CD7000
unkown
page execute read
A80A000
direct allocation
page read and write
78BD000
unkown
page readonly
AD12000
direct allocation
page read and write
A56C000
heap
page read and write
E60000
heap
page read and write
A529000
heap
page read and write
2BE1000
heap
page read and write
4EF0000
heap
page read and write
2CD0000
heap
page read and write
7802000
unkown
page readonly
7336000
unkown
page readonly
30AC000
heap
page read and write
2C51000
heap
page read and write
A7B9000
direct allocation
page read and write
74F0000
unkown
page readonly
30A7000
heap
page read and write
FFC30000
direct allocation
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
7618000
unkown
page readonly
5CAB000
unkown
page execute read
336C000
heap
page read and write
75D2000
unkown
page readonly
30AB000
heap
page read and write
30C7000
heap
page read and write
A023000
direct allocation
page read and write
76EC000
unkown
page readonly
59C0000
unkown
page execute read
A78F000
trusted library allocation
page read and write
B0A000
unkown
page read and write
7258000
unkown
page readonly
2A14000
direct allocation
page read and write
71CC000
unkown
page readonly
3359000
heap
page read and write
30AB000
heap
page read and write
30A7000
heap
page read and write
2BE1000
heap
page read and write
335C000
heap
page read and write
77EE000
unkown
page readonly
7889000
unkown
page readonly
738D000
unkown
page readonly
739A000
unkown
page readonly
78B5000
unkown
page readonly
5BB3000
unkown
page execute read
7BD1000
direct allocation
page read and write
30A0000
heap
page read and write
2CFB000
stack
page read and write
7690000
unkown
page readonly
5EAC000
unkown
page execute read
4FF9000
heap
page read and write
93F0000
heap
page read and write
2BE1000
heap
page read and write
A672000
trusted library allocation
page read and write
771E000
unkown
page readonly
A536000
heap
page read and write
1155000
heap
page read and write
5A55000
unkown
page execute read
2B5E000
stack
page read and write
783C000
unkown
page readonly
7629000
unkown
page readonly
2C51000
heap
page read and write
74A6000
unkown
page readonly
318F000
stack
page read and write
3300000
heap
page read and write
7466000
unkown
page readonly
335C000
heap
page read and write
99AC000
stack
page read and write
10D8000
heap
page read and write
738C000
unkown
page readonly
2D4B000
stack
page read and write
5CB3000
unkown
page execute read
752E000
unkown
page readonly
A2DF000
stack
page read and write
A670000
direct allocation
page read and write
2B90000
direct allocation
page execute and read and write
7561000
unkown
page readonly
2F4E000
stack
page read and write
A774000
direct allocation
page read and write
5AAA000
unkown
page execute read
7305000
unkown
page readonly
E5E000
stack
page read and write
2BE1000
heap
page read and write
ABC000
unkown
page read and write
780D000
unkown
page readonly
7659000
unkown
page readonly
3060000
heap
page read and write
725E000
unkown
page readonly
7A9D000
direct allocation
page read and write
779D000
unkown
page readonly
5B6B000
unkown
page execute read
4FF1000
heap
page read and write
7225000
unkown
page readonly
77A4000
unkown
page readonly
5531000
unkown
page execute read
FF840000
direct allocation
page read and write
A770000
trusted library allocation
page read and write
7847000
unkown
page readonly
2A5E000
direct allocation
page read and write
2C51000
heap
page read and write
7227000
unkown
page readonly
4FF8000
heap
page read and write
2BE1000
heap
page read and write
76DD000
unkown
page readonly
FFD24000
direct allocation
page read and write
74A9000
unkown
page readonly
74B6000
unkown
page readonly
75F1000
unkown
page readonly
782D000
unkown
page readonly
2C3C000
stack
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
FFDA3000
direct allocation
page read and write
FFD11000
direct allocation
page read and write
9FDF000
direct allocation
page read and write
72E4000
unkown
page readonly
2BE1000
heap
page read and write
30EF000
heap
page read and write
7497000
unkown
page readonly
71FE000
unkown
page readonly
E00000
heap
page read and write
5B51000
unkown
page execute read
2BE1000
heap
page read and write
5CB9000
unkown
page execute read
5990000
unkown
page execute read
A026000
direct allocation
page read and write
7703000
unkown
page readonly
7896000
unkown
page readonly
A80A000
direct allocation
page read and write
73F2000
unkown
page readonly
7656000
unkown
page readonly
71A1000
unkown
page readonly
2A91000
direct allocation
page read and write
2BE1000
heap
page read and write
25D0000
heap
page read and write
5000000
heap
page read and write
30AC000
heap
page read and write
5BFD000
unkown
page execute read
2BE1000
heap
page read and write
414000
unkown
page execute read
782B000
unkown
page readonly
785D000
unkown
page readonly
7859000
unkown
page readonly
A1DE000
stack
page read and write
737E000
unkown
page readonly
596E000
unkown
page execute read
796F000
heap
page read and write
958E000
direct allocation
page read and write
71D6000
unkown
page readonly
5BD8000
unkown
page execute read
96EC000
trusted library allocation
page read and write
775F000
unkown
page readonly
7A2B000
direct allocation
page read and write
727F000
unkown
page readonly
FFC30000
direct allocation
page read and write
766E000
unkown
page readonly
2C51000
heap
page read and write
9484000
heap
page read and write
7722000
unkown
page readonly
7280000
unkown
page readonly
A780000
direct allocation
page read and write
FFD78000
direct allocation
page read and write
9E6E000
direct allocation
page read and write
FFDC9000
direct allocation
page read and write
7B9C000
direct allocation
page read and write
2C51000
heap
page read and write
306E000
stack
page read and write
5B4F000
unkown
page execute read
2C51000
heap
page read and write
2C51000
heap
page read and write
5001000
heap
page read and write
71DD000
unkown
page readonly
FFD89000
direct allocation
page read and write
3090000
heap
page read and write
F1A000
heap
page read and write
4FF1000
heap
page read and write
5000000
heap
page read and write
7373000
unkown
page readonly
AFD000
unkown
page read and write
A910000
direct allocation
page read and write
2C51000
heap
page read and write
2BE1000
heap
page read and write
7311000
unkown
page readonly
30E4000
heap
page read and write
2BE1000
heap
page read and write
5B80000
unkown
page execute read
A78F000
trusted library allocation
page read and write
955E000
stack
page read and write
ABA000
unkown
page read and write
7571000
unkown
page readonly
F41000
heap
page read and write
2BE1000
heap
page read and write
30C3000
heap
page read and write
F49000
heap
page read and write
7868000
unkown
page readonly
2BE0000
heap
page read and write
5B91000
unkown
page execute read
ADF000
unkown
page write copy
30B3000
heap
page read and write
7435000
unkown
page readonly
A80B000
direct allocation
page read and write
A80A000
direct allocation
page read and write
FFD76000
direct allocation
page read and write
2BE1000
heap
page read and write
FFD9C000
direct allocation
page read and write
4FF1000
heap
page read and write
30A7000
heap
page read and write
A683000
trusted library allocation
page read and write
7865000
unkown
page readonly
FFCE0000
direct allocation
page read and write
72FA000
unkown
page readonly
FD2000
heap
page read and write
4FF9000
heap
page read and write
7758000
unkown
page readonly
27AA000
heap
page read and write
FFDC4000
direct allocation
page read and write
6B890000
unkown
page readonly
A009000
direct allocation
page read and write
70F8000
unkown
page read and write
FFE02000
direct allocation
page read and write
74C1000
unkown
page readonly
5520000
heap
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
9E6E000
direct allocation
page read and write
767C000
unkown
page readonly
9FED000
direct allocation
page read and write
78C1000
unkown
page readonly
7049000
unkown
page read and write
2F60000
heap
page read and write
30F3000
heap
page read and write
30A0000
heap
page read and write
77B8000
unkown
page readonly
A89E000
direct allocation
page read and write
958E000
direct allocation
page read and write
FFB000
heap
page read and write
A706000
direct allocation
page execute and read and write
42C000
unkown
page execute read
FFDBA000
direct allocation
page read and write
75F7000
unkown
page readonly
309C000
heap
page read and write
7546000
unkown
page readonly
5C94000
unkown
page execute read
2BE1000
heap
page read and write
2C60000
heap
page read and write
7805000
unkown
page readonly
75D6000
unkown
page readonly
71D8000
unkown
page readonly
773E000
unkown
page readonly
19D000
stack
page read and write
7567000
unkown
page readonly
335C000
heap
page read and write
2C51000
heap
page read and write
7396000
unkown
page readonly
30A0000
heap
page read and write
2C51000
heap
page read and write
2A6C000
direct allocation
page read and write
FFDA5000
direct allocation
page read and write
5CBE000
unkown
page execute read
777E000
unkown
page readonly
105F000
heap
page read and write
A670000
trusted library allocation
page read and write
739B000
unkown
page readonly
2A57000
direct allocation
page read and write
5B76000
unkown
page execute read
A910000
direct allocation
page read and write
AD2000
unkown
page read and write
5CA2000
unkown
page execute read
A776000
direct allocation
page read and write
5001000
heap
page read and write
73BB000
unkown
page readonly
7C21000
direct allocation
page read and write
30B9000
heap
page read and write
7635000
unkown
page readonly
76A7000
unkown
page readonly
FFDBF000
direct allocation
page read and write
A04A000
direct allocation
page read and write
7A7D000
direct allocation
page read and write
7736000
unkown
page readonly
751A000
unkown
page readonly
FFCF1000
direct allocation
page read and write
7595000
unkown
page readonly
4FFC000
heap
page read and write
2B15000
heap
page read and write
7A66000
direct allocation
page read and write
5000000
heap
page read and write
30EB000
heap
page read and write
B1C000
unkown
page read and write
2C51000
heap
page read and write
30F3000
heap
page read and write
A80B000
direct allocation
page read and write
5BE0000
unkown
page execute read
580D000
unkown
page execute read
A912000
direct allocation
page read and write
6E2F000
unkown
page execute read
30DB000
heap
page read and write
7393000
unkown
page readonly
30A3000
heap
page read and write
2BE1000
heap
page read and write
4FF8000
heap
page read and write
5D12000
unkown
page execute read
750D000
unkown
page readonly
7659000
unkown
page readonly
2BE1000
heap
page read and write
74CB000
unkown
page readonly
5BB1000
unkown
page execute read
3350000
heap
page read and write
73EA000
unkown
page readonly
2BE1000
heap
page read and write
7384000
unkown
page readonly
4FF1000
heap
page read and write
555B000
unkown
page execute and read and write
750F000
unkown
page readonly
30B7000
heap
page read and write
7322000
unkown
page readonly
2F0E000
stack
page read and write
5C2A000
unkown
page execute read
671E000
unkown
page execute read
4FF1000
heap
page read and write
975E000
stack
page read and write
30A0000
heap
page read and write
6CE21000
unkown
page execute read
4FFE000
heap
page read and write
2A3E000
direct allocation
page read and write
30E3000
heap
page read and write
6CB0000
unkown
page execute read
9DD8000
direct allocation
page read and write
7500000
unkown
page readonly
7868000
unkown
page readonly
7C31000
direct allocation
page read and write
2B80000
heap
page read and write
7669000
unkown
page readonly
2C51000
heap
page read and write
2C51000
heap
page read and write
30F3000
heap
page read and write
FFD5E000
direct allocation
page read and write
A670000
direct allocation
page read and write
5830000
unkown
page execute read
A670000
direct allocation
page read and write
7A0D000
direct allocation
page read and write
7577000
unkown
page readonly
7335000
unkown
page readonly
784C000
unkown
page readonly
1050000
heap
page read and write
2C51000
heap
page read and write
76E8000
unkown
page readonly
4FF9000
heap
page read and write
2C51000
heap
page read and write
75A7000
unkown
page readonly
73AB000
unkown
page readonly
30F3000
heap
page read and write
73A7000
unkown
page readonly
72AB000
unkown
page readonly
AAE0000
heap
page read and write
A770000
direct allocation
page read and write
30AC000
heap
page read and write
7A74000
direct allocation
page read and write
2C51000
heap
page read and write
A78B000
direct allocation
page read and write
2BE1000
heap
page read and write
718C000
unkown
page readonly
A80B000
direct allocation
page read and write
2D0B000
stack
page read and write
EAE000
stack
page read and write
2DC0000
heap
page read and write
755A000
unkown
page readonly
48A000
unkown
page execute read
4FF1000
heap
page read and write
7041000
unkown
page read and write
5036000
heap
page read and write
95B0000
trusted library allocation
page read and write
2C51000
heap
page read and write
2BE1000
heap
page read and write
2A5D000
direct allocation
page read and write
2C51000
heap
page read and write
2AD4000
direct allocation
page read and write
7BE1000
direct allocation
page read and write
30A1000
heap
page read and write
7489000
unkown
page readonly
309C000
heap
page read and write
9C8E000
stack
page read and write
30BB000
heap
page read and write
75CD000
unkown
page readonly
4FF1000
heap
page read and write
7355000
unkown
page readonly
71DA000
unkown
page readonly
774E000
unkown
page readonly
5B97000
unkown
page execute read
A78F000
trusted library allocation
page read and write
2C4E000
stack
page read and write
79E0000
direct allocation
page read and write
E64000
heap
page read and write
1120000
heap
page read and write
2C51000
heap
page read and write
5CA8000
unkown
page execute read
717B000
unkown
page readonly
2C51000
heap
page read and write
2BE1000
heap
page read and write
5BAF000
unkown
page execute read
776D000
unkown
page readonly
A4EA000
heap
page read and write
5420000
heap
page read and write
7BF2000
direct allocation
page read and write
93EA000
trusted library allocation
page read and write
773E000
unkown
page readonly
958E000
direct allocation
page read and write
7C5F000
direct allocation
page read and write
7051000
unkown
page write copy
776D000
unkown
page readonly
7A75000
direct allocation
page read and write
721B000
unkown
page readonly
78A0000
unkown
page readonly
6CE21000
unkown
page execute read
63D7000
unkown
page execute read
591F000
unkown
page execute read
A39E000
stack
page read and write
29B7000
direct allocation
page read and write
6AD1000
unkown
page execute read
30B7000
heap
page read and write
2C51000
heap
page read and write
4FF8000
heap
page read and write
A672000
trusted library allocation
page read and write
7399000
unkown
page readonly
4FF1000
heap
page read and write
3367000
heap
page read and write
9489000
heap
page read and write
71BE000
unkown
page readonly
10A0000
heap
page read and write
32A0000
heap
page read and write
748F000
unkown
page readonly
5542000
unkown
page execute read
2E20000
heap
page read and write
FFD77000
direct allocation
page read and write
A8C3000
direct allocation
page read and write
FFDEA000
direct allocation
page read and write
A990000
direct allocation
page read and write
73AA000
unkown
page readonly
7388000
unkown
page readonly
5B3E000
unkown
page execute read
2C51000
heap
page read and write
2C51000
heap
page read and write
69D1000
unkown
page execute read
76AF000
unkown
page readonly
2A22000
direct allocation
page read and write
A68F000
trusted library allocation
page read and write
7290000
unkown
page readonly
334E000
heap
page read and write
B1A000
unkown
page read and write
5B97000
unkown
page execute read
762B000
unkown
page readonly
764C000
unkown
page readonly
4FF1000
heap
page read and write
2A7B000
direct allocation
page read and write
7828000
unkown
page readonly
30AC000
heap
page read and write
784A000
unkown
page readonly
30A3000
heap
page read and write
2BE1000
heap
page read and write
5001000
heap
page read and write
30A9000
heap
page read and write
30B0000
heap
page read and write
73D2000
unkown
page readonly
7C15000
direct allocation
page read and write
A077000
direct allocation
page read and write
4FF1000
heap
page read and write
73AC000
unkown
page readonly
6618000
unkown
page execute read
706D000
unkown
page read and write
7654000
unkown
page readonly
A790000
trusted library allocation
page read and write
30BB000
heap
page read and write
A683000
trusted library allocation
page read and write
10DC000
heap
page read and write
7820000
unkown
page readonly
A870000
direct allocation
page read and write
735B000
unkown
page readonly
720A000
unkown
page readonly
782F000
unkown
page readonly
336B000
heap
page read and write
7D5E000
stack
page read and write
5B88000
unkown
page execute read
7029000
unkown
page read and write
FFDAE000
direct allocation
page read and write
7425000
unkown
page readonly
7881000
unkown
page readonly
773C000
unkown
page readonly
30B7000
heap
page read and write
2FE0000
heap
page read and write
724E000
unkown
page readonly
2BD3000
heap
page read and write
2B7B000
stack
page read and write
77D7000
unkown
page readonly
7798000
unkown
page readonly
A6C0000
direct allocation
page execute and read and write
2C51000
heap
page read and write
3373000
heap
page read and write
31B5000
heap
page read and write
B29000
unkown
page read and write
3320000
heap
page read and write
30B7000
heap
page read and write
6B8C2000
unkown
page readonly
740E000
unkown
page readonly
5000000
heap
page read and write
5C7B000
unkown
page execute read
9DD4000
direct allocation
page read and write
2BE1000
heap
page read and write
2A05000
heap
page read and write
5B8A000
unkown
page execute read
A0CC000
direct allocation
page read and write
3383000
heap
page read and write
719C000
unkown
page readonly
5430000
direct allocation
page execute and read and write
2C51000
heap
page read and write
73D7000
unkown
page readonly
79FB000
direct allocation
page read and write
2C51000
heap
page read and write
30B7000
heap
page read and write
2C51000
heap
page read and write
789C000
unkown
page readonly
7812000
unkown
page readonly
735C000
unkown
page readonly
A910000
direct allocation
page read and write
5008000
heap
page read and write
7B0E000
direct allocation
page read and write
2BE1000
heap
page read and write
5CBB000
unkown
page execute read
310E000
stack
page read and write
30A3000
heap
page read and write
A090000
direct allocation
page read and write
A8A1000
direct allocation
page read and write
76BD000
unkown
page readonly
718E000
unkown
page readonly
2C51000
heap
page read and write
7871000
unkown
page readonly
722F000
unkown
page readonly
2BE1000
heap
page read and write
2BE1000
heap
page read and write
268E000
stack
page read and write
FBF000
heap
page read and write
4AD000
unkown
page execute read
740E000
unkown
page readonly
2C51000
heap
page read and write
7863000
unkown
page readonly
7063000
unkown
page read and write
A670000
direct allocation
page read and write
770C000
unkown
page readonly
309C000
heap
page read and write
2BE1000
heap
page read and write
2D39000
stack
page read and write
6CA21000
unkown
page execute read
30E3000
heap
page read and write
F8C000
heap
page read and write
7B6E000
direct allocation
page read and write
54FE000
stack
page read and write
30F3000
heap
page read and write
70B1000
unkown
page read and write
FBC000
heap
page read and write
5CA6000
unkown
page execute read
2BE1000
heap
page read and write
2D4C000
stack
page read and write
7B0A000
direct allocation
page read and write
7592000
unkown
page readonly
FFD35000
direct allocation
page read and write
A659000
direct allocation
page execute and read and write
7221000
unkown
page readonly
7536000
unkown
page readonly
2C51000
heap
page read and write
75C9000
unkown
page readonly
2BE1000
heap
page read and write
2BE1000
heap
page read and write
2BE1000
heap
page read and write
75F9000
unkown
page readonly
405000
unkown
page execute read
5000000
heap
page read and write
7607000
unkown
page readonly
2BE1000
heap
page read and write
9FB0000
direct allocation
page read and write
9D69000
direct allocation
page read and write
720F000
unkown
page readonly
5C5A000
unkown
page execute read
2BE1000
heap
page read and write
FFD6A000
direct allocation
page read and write
6CE20000
unkown
page readonly
3085000
heap
page read and write
FFE21000
direct allocation
page read and write
4FF9000
heap
page read and write
5896000
unkown
page execute read
6CA45000
unkown
page readonly
5540000
heap
page read and write
4FF9000
heap
page read and write
7AA4000
direct allocation
page read and write
2C51000
heap
page read and write
77D9000
unkown
page readonly
7655000
unkown
page readonly
74DC000
unkown
page readonly
A914000
direct allocation
page read and write
2A66000
direct allocation
page read and write
2A10000
direct allocation
page read and write
A708000
direct allocation
page execute and read and write
2C51000
heap
page read and write
30F3000
heap
page read and write
A910000
direct allocation
page read and write
5008000
heap
page read and write
309C000
heap
page read and write
A065000
direct allocation
page read and write
320F000
stack
page read and write
73C6000
unkown
page readonly
7403000
unkown
page readonly
5001000
heap
page read and write
308F000
stack
page read and write
FFCC0000
direct allocation
page read and write
2BE1000
heap
page read and write
E20000
heap
page read and write
7834000
unkown
page readonly
FFBFE000
direct allocation
page read and write
7641000
unkown
page readonly
FFDB1000
direct allocation
page read and write
A910000
direct allocation
page read and write
4FF1000
heap
page read and write
FFE03000
direct allocation
page read and write
656F000
heap
page read and write
5BB9000
unkown
page execute read
2C50000
heap
page read and write
752A000
unkown
page readonly
7645000
unkown
page readonly
71A4000
unkown
page readonly
5BA3000
unkown
page execute read
5F1B000
unkown
page execute read
736B000
unkown
page readonly
7838000
unkown
page readonly
77E3000
unkown
page readonly
5C55000
unkown
page execute read
FFDBE000
direct allocation
page read and write
2BE1000
heap
page read and write
B16000
unkown
page read and write
1180000
heap
page read and write
F1E000
heap
page read and write
335C000
heap
page read and write
A80E000
direct allocation
page read and write
30B7000
heap
page read and write
7458000
unkown
page readonly
73C21000
unkown
page execute read
330A000
heap
page read and write
5BAD000
unkown
page execute read
750B000
unkown
page readonly
A670000
trusted library allocation
page read and write
30BC000
heap
page read and write
2C51000
heap
page read and write
7806000
unkown
page readonly
A80A000
direct allocation
page read and write
FFD2D000
direct allocation
page read and write
2C51000
heap
page read and write
74BD000
unkown
page readonly
74EF000
unkown
page readonly
A523000
heap
page read and write
30F3000
heap
page read and write
93FF000
heap
page read and write
A039000
direct allocation
page read and write
FFE0E000
direct allocation
page read and write
2BE1000
heap
page read and write
A035000
direct allocation
page read and write
71E6000
unkown
page readonly
7AAB000
direct allocation
page read and write
A6DF000
stack
page read and write
7853000
unkown
page readonly
4A60000
heap
page read and write
FFDE9000
direct allocation
page read and write
6D5A000
unkown
page execute read
3373000
heap
page read and write
75D7000
unkown
page readonly
5BA1000
unkown
page execute read
4EEF000
stack
page read and write
EDE000
stack
page read and write
5D1C000
unkown
page execute read
5CF7000
unkown
page execute read
779D000
unkown
page readonly
A077000
direct allocation
page read and write
72C3000
unkown
page readonly
30A0000
heap
page read and write
765B000
unkown
page readonly
4FF8000
heap
page read and write
9434000
heap
page read and write
7823000
unkown
page readonly
30F3000
heap
page read and write
9DD8000
direct allocation
page read and write
3363000
heap
page read and write
30E9000
heap
page read and write
787C000
unkown
page readonly
A670000
trusted library allocation
page read and write
FFE0D000
direct allocation
page read and write
739F000
unkown
page readonly
77FE000
unkown
page readonly
5EA4000
unkown
page execute read
A059000
direct allocation
page read and write
77C4000
unkown
page readonly
AB6000
unkown
page read and write
5E36000
unkown
page execute read
A910000
direct allocation
page read and write
4FF0000
heap
page read and write
2C51000
heap
page read and write
7188000
unkown
page readonly
5BFF000
unkown
page execute read
7676000
unkown
page readonly
780E000
unkown
page readonly
2C51000
heap
page read and write
309E000
heap
page read and write
6D090000
unkown
page read and write
FEE000
stack
page read and write
2DA0000
heap
page read and write
7347000
unkown
page readonly
7365000
unkown
page readonly
A043000
direct allocation
page read and write
336C000
heap
page read and write
A01D000
direct allocation
page read and write
2F60000
heap
page read and write
30B3000
heap
page read and write
A4E5000
heap
page read and write
7707000
unkown
page readonly
737A000
unkown
page readonly
30E4000
heap
page read and write
FFDFE000
direct allocation
page read and write
79D5000
unkown
page readonly
30B7000
heap
page read and write
786E000
unkown
page readonly
309C000
heap
page read and write
703B000
unkown
page read and write
30A0000
heap
page read and write
2C51000
heap
page read and write
6F68000
heap
page read and write
2C51000
heap
page read and write
71F9000
unkown
page readonly
30A0000
heap
page read and write
5B02000
heap
page read and write
2CF0000
heap
page read and write
30C3000
heap
page read and write
2C51000
heap
page read and write
A80F000
direct allocation
page read and write
30B3000
heap
page read and write
6B891000
unkown
page execute read
30B7000
heap
page read and write
7202000
unkown
page readonly
A01E000
direct allocation
page read and write
73DC000
unkown
page readonly
7827000
unkown
page readonly
2BE1000
heap
page read and write
7779000
unkown
page readonly
7376000
unkown
page readonly
7565000
unkown
page readonly
760D000
unkown
page readonly
2BE1000
heap
page read and write
9F40000
direct allocation
page execute and read and write
A7D7000
direct allocation
page read and write
749A000
unkown
page readonly
30AB000
heap
page read and write
9DD0000
direct allocation
page read and write
77EA000
unkown
page readonly
30E3000
heap
page read and write
4FF8000
heap
page read and write
A1DE000
stack
page read and write
309C000
heap
page read and write
72B1000
unkown
page readonly
2C51000
heap
page read and write
A00C000
direct allocation
page read and write
6E37000
unkown
page execute read
9DD4000
direct allocation
page read and write
110E000
stack
page read and write
30F3000
heap
page read and write
9E3E000
stack
page read and write
FFD0F000
direct allocation
page read and write
7210000
unkown
page readonly
332A000
heap
page read and write
2BE1000
heap
page read and write
10AA000
heap
page read and write
2BE1000
heap
page read and write
309C000
heap
page read and write
FFCFC000
direct allocation
page read and write
A553000
heap
page read and write
318F000
stack
page read and write
73E7000
unkown
page readonly
9D07000
stack
page read and write
2C51000
heap
page read and write
A80F000
direct allocation
page read and write
7621000
unkown
page readonly
7729000
unkown
page readonly
4FF9000
heap
page read and write
A778000
direct allocation
page read and write
A910000
direct allocation
page read and write
75D4000
unkown
page readonly
2BE1000
heap
page read and write
753E000
unkown
page readonly
A910000
direct allocation
page read and write
6D08E000
unkown
page read and write
750E000
unkown
page readonly
249C000
stack
page read and write
30A0000
heap
page read and write
2BE1000
heap
page read and write
7A2D000
direct allocation
page read and write
29F0000
heap
page read and write
3290000
heap
page read and write
4FF9000
heap
page read and write
5551000
unkown
page execute read
2A56000
direct allocation
page read and write
2BE1000
heap
page read and write
75EE000
unkown
page readonly
2C51000
heap
page read and write
784B000
unkown
page readonly
335C000
heap
page read and write
7533000
unkown
page readonly
2C51000
heap
page read and write
77BE000
unkown
page readonly
308D000
heap
page read and write
3140000
heap
page read and write
10AE000
heap
page read and write
309C000
heap
page read and write
77BA000
unkown
page readonly
27A0000
heap
page read and write
7300000
unkown
page readonly
75D5000
unkown
page readonly
7B59000
direct allocation
page read and write
5B1B000
unkown
page execute read
30E4000
heap
page read and write
721F000
unkown
page readonly
728D000
unkown
page readonly
FFD12000
direct allocation
page read and write
7A16000
direct allocation
page read and write
7B4B000
direct allocation
page read and write
7761000
unkown
page readonly
30A0000
heap
page read and write
722B000
unkown
page readonly
77EC000
unkown
page readonly
9DD8000
direct allocation
page read and write
2C51000
heap
page read and write
705A000
unkown
page write copy
7221000
unkown
page readonly
6AE2000
unkown
page execute read
4FF5000
heap
page read and write
4FF9000
heap
page read and write
94F4000
direct allocation
page read and write
FF9C0000
direct allocation
page read and write
309C000
heap
page read and write
336C000
heap
page read and write
FFCFE000
direct allocation
page read and write
A4E0000
heap
page read and write
505E000
heap
page read and write
2C51000
heap
page read and write
7817000
unkown
page readonly
5000000
heap
page read and write
2BE1000
heap
page read and write
7329000
unkown
page readonly
309F000
heap
page read and write
7B42000
direct allocation
page read and write
775D000
unkown
page readonly
2BE1000
heap
page read and write
77DD000
unkown
page readonly
A78F000
trusted library allocation
page read and write
A8B0000
heap
page read and write
A910000
direct allocation
page read and write
7374000
unkown
page readonly
9FF7000
direct allocation
page read and write
30B7000
heap
page read and write
737C000
unkown
page readonly
7887000
unkown
page readonly
2BE1000
heap
page read and write
2C51000
heap
page read and write
7389000
unkown
page readonly
336B000
heap
page read and write
30F3000
heap
page read and write
A770000
trusted library allocation
page read and write
76A2000
unkown
page readonly
2B90000
heap
page read and write
74FA000
unkown
page readonly
742B000
unkown
page readonly
744B000
unkown
page readonly
30F3000
heap
page read and write
7666000
unkown
page readonly
79A9000
unkown
page readonly
69C1000
unkown
page execute read
2A31000
direct allocation
page read and write
2BE1000
heap
page read and write
AEC000
unkown
page write copy
745B000
unkown
page readonly
29E0000
heap
page read and write
2C51000
heap
page read and write
7839000
unkown
page readonly
5DA8000
unkown
page execute read
2AB5000
direct allocation
page read and write
7473000
unkown
page readonly
2BE1000
heap
page read and write
74F9000
unkown
page readonly
30CD000
heap
page read and write
7579000
unkown
page readonly
E10000
heap
page read and write
2CB0000
heap
page read and write
2C51000
heap
page read and write
5680000
unkown
page execute read
73A3000
unkown
page readonly
2BE1000
heap
page read and write
30AB000
heap
page read and write
A770000
trusted library allocation
page read and write
2BE1000
heap
page read and write
5008000
heap
page read and write
4AC000
unkown
page execute read
7A1C000
direct allocation
page read and write
A910000
direct allocation
page read and write
336C000
heap
page read and write
7804000
unkown
page readonly
4FF1000
heap
page read and write
75F3000
unkown
page readonly
50FE000
heap
page read and write
2BE1000
heap
page read and write
778A000
unkown
page readonly
776B000
unkown
page readonly
135E000
stack
page read and write
75E0000
unkown
page readonly
717E000
unkown
page readonly
2F2E000
stack
page read and write
2BE1000
heap
page read and write
7395000
unkown
page readonly
5BB8000
unkown
page execute read
2C51000
heap
page read and write
2BE1000
heap
page read and write
1172000
heap
page read and write
306A000
heap
page read and write
2BE1000
heap
page read and write
2BE1000
heap
page read and write
703E000
unkown
page read and write
9E4E000
stack
page read and write
7809000
unkown
page readonly
A912000
direct allocation
page read and write
2C51000
heap
page read and write
74A2000
unkown
page readonly
2C51000
heap
page read and write
770E000
unkown
page readonly
2C51000
heap
page read and write
7372000
unkown
page readonly
7B5D000
direct allocation
page read and write
78A3000
unkown
page readonly
2C51000
heap
page read and write
2BE1000
heap
page read and write
5AD0000
unkown
page execute read
6708000
unkown
page execute read
733C000
unkown
page readonly
4FF1000
heap
page read and write
77D4000
unkown
page readonly
5CCE000
unkown
page execute read
5000000
heap
page read and write
30F3000
heap
page read and write
768E000
unkown
page readonly
67C5000
unkown
page execute read
FFCDF000
direct allocation
page read and write
9E6E000
direct allocation
page read and write
A670000
direct allocation
page read and write
5B94000
unkown
page execute read
A910000
direct allocation
page read and write
A770000
trusted library allocation
page read and write
2BE1000
heap
page read and write
A80A000
direct allocation
page read and write
7A8D000
direct allocation
page read and write
74FE000
unkown
page readonly
30F3000
heap
page read and write
79ED000
direct allocation
page read and write
75B8000
unkown
page readonly
A648000
direct allocation
page execute and read and write
7C12000
direct allocation
page read and write
4FF9000
heap
page read and write
2C51000
heap
page read and write
F3F000
heap
page read and write
FFD37000
direct allocation
page read and write
782E000
unkown
page readonly
2C51000
heap
page read and write
30DF000
heap
page read and write
7356000
unkown
page readonly
A017000
direct allocation
page read and write
555C000
unkown
page execute read
7C02000
direct allocation
page read and write
2FD0000
heap
page read and write
2BE1000
heap
page read and write
75C6000
unkown
page readonly
71AB000
unkown
page readonly
2CA0000
heap
page read and write
309E000
heap
page read and write
7B9E000
direct allocation
page read and write
7043000
unkown
page read and write
7255000
unkown
page readonly
7325000
unkown
page readonly
30B7000
heap
page read and write
6D091000
unkown
page write copy
69F6000
unkown
page execute read
FFCE1000
direct allocation
page read and write
30F3000
heap
page read and write
5B1F000
unkown
page execute read
739D000
unkown
page readonly
A870000
direct allocation
page read and write
A80E000
direct allocation
page read and write
336B000
heap
page read and write
73CC000
unkown
page readonly
73F1000
unkown
page readonly
73BE000
unkown
page readonly
30DF000
heap
page read and write
30F3000
heap
page read and write
30B7000
heap
page read and write
6D0A4000
unkown
page readonly
76C1000
unkown
page readonly
AB6000
unkown
page read and write
752D000
unkown
page readonly
5000000
heap
page read and write
A670000
direct allocation
page read and write
A80B000
direct allocation
page read and write
A670000
direct allocation
page read and write
30B3000
heap
page read and write
10DB000
heap
page read and write
FFD9B000
direct allocation
page read and write
7890000
unkown
page readonly
9FD0000
direct allocation
page read and write
70D1000
unkown
page read and write
74E6000
unkown
page readonly
784F000
unkown
page readonly
6CFEC000
unkown
page readonly
4FF1000
heap
page read and write
7B6B000
direct allocation
page read and write
7303000
unkown
page readonly
30A1000
heap
page read and write
272F000
stack
page read and write
7A8B000
direct allocation
page read and write
2A74000
direct allocation
page read and write
30B3000
heap
page read and write
FF840000
direct allocation
page read and write
A3E2000
heap
page read and write
30F3000
heap
page read and write
75FF000
unkown
page readonly
2AA1000
direct allocation
page read and write
7844000
unkown
page readonly
7B52000
direct allocation
page read and write
5854000
unkown
page execute read
114D000
heap
page read and write
2C51000
heap
page read and write
7757000
unkown
page readonly
302F000
stack
page read and write
7370000
unkown
page readonly
A670000
trusted library allocation
page read and write
7AC2000
direct allocation
page read and write
5C60000
unkown
page execute read
78BF000
unkown
page readonly
734B000
unkown
page readonly
2A65000
direct allocation
page read and write
A670000
trusted library allocation
page read and write
2D20000
heap
page read and write
4FF1000
heap
page read and write
30F3000
heap
page read and write
2D3D000
stack
page read and write
B0A000
unkown
page read and write
723A000
unkown
page readonly
A01C000
direct allocation
page read and write
4FF1000
heap
page read and write
3085000
heap
page read and write
FFDFD000
direct allocation
page read and write
7A34000
direct allocation
page read and write
30A7000
heap
page read and write
7386000
unkown
page readonly
AAE3000
heap
page read and write
704D000
unkown
page read and write
783F000
unkown
page readonly
71ED000
unkown
page readonly
309C000
heap
page read and write
780A000
unkown
page readonly
2B1C000
direct allocation
page read and write
748D000
unkown
page readonly
FFCD2000
direct allocation
page read and write
7382000
unkown
page readonly
A80B000
direct allocation
page read and write
7B2E000
direct allocation
page read and write
7342000
unkown
page readonly
2BE1000
heap
page read and write
5A58000
unkown
page execute read
A910000
direct allocation
page read and write
30AB000
heap
page read and write
7890000
unkown
page readonly
A80F000
direct allocation
page read and write
7842000
unkown
page readonly
A770000
trusted library allocation
page read and write
7B40000
direct allocation
page read and write
A683000
trusted library allocation
page read and write
2A39000
direct allocation
page read and write
2BE1000
heap
page read and write
741B000
unkown
page readonly
4FF1000
heap
page read and write
2C51000
heap
page read and write
A608000
direct allocation
page execute and read and write
9FEB000
direct allocation
page read and write
2C51000
heap
page read and write
4FF8000
heap
page read and write
2BE1000
heap
page read and write
5CC6000
unkown
page execute read
2C51000
heap
page read and write
741F000
unkown
page readonly
A770000
trusted library allocation
page read and write
7826000
unkown
page readonly
76C6000
unkown
page readonly
4FF9000
heap
page read and write
30AD000
heap
page read and write
7C51000
direct allocation
page read and write
7324000
unkown
page readonly
A6FF000
direct allocation
page execute and read and write
7BAE000
direct allocation
page read and write
5102000
heap
page read and write
7368000
unkown
page readonly
FB9000
heap
page read and write
786C000
unkown
page readonly
7A94000
direct allocation
page read and write
77DD000
unkown
page readonly
A870000
direct allocation
page read and write
2A74000
direct allocation
page read and write
FFC60000
direct allocation
page read and write
2C51000
heap
page read and write
2C51000
heap
page read and write
F92000
heap
page read and write
5AAC000
unkown
page execute read
74CA000
unkown
page readonly
B18000
unkown
page read and write
336C000
heap
page read and write
5B2E000
unkown
page execute read
7515000
unkown
page readonly
3080000
heap
page read and write
2BE1000
heap
page read and write
30A4000
heap
page read and write
71AB000
unkown
page readonly
30F3000
heap
page read and write
A670000
trusted library allocation
page read and write
2C51000
heap
page read and write
7810000
unkown
page readonly
5816000
unkown
page execute read
1070000
heap
page read and write
2BE1000
heap
page read and write
71E8000
unkown
page readonly
A00D000
direct allocation
page read and write
30F3000
heap
page read and write
78B1000
unkown
page readonly
A007000
direct allocation
page read and write
7366000
unkown
page readonly
3050000
heap
page read and write
5CED000
unkown
page execute read
D40000
heap
page read and write
7678000
unkown
page readonly
3364000
heap
page read and write
2BE1000
heap
page read and write
736A000
unkown
page readonly
73F8000
unkown
page readonly
30A0000
heap
page read and write
A89A000
direct allocation
page read and write
A870000
direct allocation
page read and write
757B000
unkown
page readonly
FFDC2000
direct allocation
page read and write
76FD000
unkown
page readonly
7122000
unkown
page write copy
7534000
unkown
page readonly
2F6F000
stack
page read and write
6E6D000
unkown
page execute read
2BD0000
heap
page read and write
75E4000
unkown
page readonly
30EB000
heap
page read and write
74F7000
unkown
page readonly
7422000
unkown
page readonly
30B7000
heap
page read and write
74FE000
unkown
page readonly
7475000
unkown
page readonly
7637000
unkown
page readonly
4FF9000
heap
page read and write
ABC000
unkown
page read and write
30A1000
heap
page read and write
3367000
heap
page read and write
5BD2000
unkown
page execute read
30F3000
heap
page read and write
FFDB5000
direct allocation
page read and write
6CA4F000
unkown
page read and write
10FE000
heap
page read and write
79B6000
unkown
page readonly
A4F2000
heap
page read and write
A6E0000
trusted library allocation
page read and write
338B000
heap
page read and write
7A35000
direct allocation
page read and write
4FF1000
heap
page read and write
6D08F000
unkown
page write copy
AB3000
unkown
page write copy
63E3000
unkown
page execute read
77DB000
unkown
page readonly
70E6000
unkown
page read and write
7A94000
direct allocation
page read and write
E64000
heap
page read and write
9FB0000
direct allocation
page read and write
A7BC000
direct allocation
page read and write
E64000
heap
page read and write
A9DC000
trusted library allocation
page read and write
FEF000
stack
page read and write
4FF1000
heap
page read and write
71F4000
unkown
page readonly
9409000
heap
page read and write
7724000
unkown
page readonly
2BE1000
heap
page read and write
73A5000
unkown
page readonly
5B32000
unkown
page execute read
29E7000
direct allocation
page read and write
5008000
heap
page read and write
5008000
heap
page read and write
A78F000
trusted library allocation
page read and write
75F5000
unkown
page readonly
2C51000
heap
page read and write
2BE1000
heap
page read and write
30B7000
heap
page read and write
9469000
heap
page read and write
7BE2000
direct allocation
page read and write
A68F000
trusted library allocation
page read and write
2BE1000
heap
page read and write
7552000
unkown
page readonly
71FC000
unkown
page readonly
30F3000
heap
page read and write
2BE1000
heap
page read and write
79F6000
direct allocation
page read and write
FFD25000
direct allocation
page read and write
72D3000
unkown
page readonly
30B4000
heap
page read and write
5B30000
unkown
page execute read
7206000
unkown
page readonly
309C000
heap
page read and write
5B38000
unkown
page execute read
2C51000
heap
page read and write
A916000
direct allocation
page read and write
26EE000
stack
page read and write
2BE1000
heap
page read and write
503E000
heap
page read and write
941D000
heap
page read and write
2C51000
heap
page read and write
7316000
unkown
page readonly
74FB000
unkown
page readonly
7587000
unkown
page readonly
2C51000
heap
page read and write
736C000
unkown
page readonly
A670000
direct allocation
page read and write
2BE1000
heap
page read and write
5BD7000
unkown
page execute read
751F000
unkown
page readonly
A670000
direct allocation
page read and write
71FC000
unkown
page readonly
4FF1000
heap
page read and write
A68F000
trusted library allocation
page read and write
746D000
unkown
page readonly
72E1000
unkown
page readonly
FFDB9000
direct allocation
page read and write
7378000
unkown
page readonly
71D1000
unkown
page readonly
5057000
heap
page read and write
9F00000
direct allocation
page execute and read and write
76FC000
unkown
page readonly
2A99000
direct allocation
page read and write
FFDF2000
direct allocation
page read and write
2A9F000
direct allocation
page read and write
7B16000
direct allocation
page read and write
2C51000
heap
page read and write
A3E0000
heap
page read and write
733E000
unkown
page readonly
30F3000
heap
page read and write
5A32000
unkown
page execute read
A916000
direct allocation
page read and write
FFDC5000
direct allocation
page read and write
4FF8000
heap
page read and write
5D01000
unkown
page execute read
24F0000
heap
page read and write
2C51000
heap
page read and write
6CA49000
unkown
page read and write
2BE1000
heap
page read and write
2C51000
heap
page read and write
A0C1000
direct allocation
page read and write
336B000
heap
page read and write
74A5000
unkown
page readonly
71AD000
unkown
page readonly
7536000
unkown
page readonly
FFDB8000
direct allocation
page read and write
75EE000
unkown
page readonly
4C10000
heap
page read and write
7777000
unkown
page readonly
5CFD000
unkown
page execute read
2C51000
heap
page read and write
7866000
unkown
page readonly
E20000
heap
page read and write
7AB4000
direct allocation
page read and write
7201000
unkown
page readonly
FFE20000
direct allocation
page read and write
764D000
unkown
page readonly
74C1000
unkown
page readonly
71E1000
unkown
page readonly
5BCC000
unkown
page execute read
77B7000
unkown
page readonly
6D0A3000
unkown
page read and write
A0CC000
direct allocation
page read and write
5B34000
unkown
page execute read
FFD10000
direct allocation
page read and write
2AA8000
direct allocation
page read and write
5B95000
unkown
page execute read
78B9000
unkown
page readonly
7860000
unkown
page readonly
A80A000
direct allocation
page read and write
7052000
unkown
page read and write
2BE1000
heap
page read and write
73C3D000
unkown
page read and write
AB3000
unkown
page read and write
69E2000
unkown
page execute read
90000
stack
page read and write
5571000
unkown
page execute read
30AB000
heap
page read and write
A80C000
direct allocation
page read and write
2A4F000
direct allocation
page read and write
2D2A000
heap
page read and write
6B8B9000
unkown
page read and write
2A7B000
direct allocation
page read and write
2C51000
heap
page read and write
7648000
unkown
page readonly
B13000
unkown
page read and write
70DD000
unkown
page read and write
7728000
unkown
page readonly
30A0000
heap
page read and write
A670000
direct allocation
page read and write
66EF000
unkown
page execute read
7836000
unkown
page readonly
5CB7000
unkown
page execute read
2A1B000
direct allocation
page read and write
29B0000
direct allocation
page read and write
A50F000
heap
page read and write
30F3000
heap
page read and write
2BE1000
heap
page read and write
7514000
unkown
page readonly
3000000
heap
page read and write
29DE000
direct allocation
page read and write
A025000
direct allocation
page read and write
2C51000
heap
page read and write
3190000
heap
page read and write
2A91000
direct allocation
page read and write
722F000
unkown
page readonly
2C51000
heap
page read and write
3040000
heap
page read and write
7821000
unkown
page readonly
FFD36000
direct allocation
page read and write
2C51000
heap
page read and write
3085000
heap
page read and write
71E2000
unkown
page readonly
79D4000
direct allocation
page read and write
A501000
heap
page read and write
A80E000
direct allocation
page read and write
6D08E000
unkown
page read and write
72AE000
unkown
page readonly
5AF7000
unkown
page execute read
5B53000
unkown
page execute read
7829000
unkown
page readonly
2C51000
heap
page read and write
4790000
remote allocation
page read and write
30F3000
heap
page read and write
F6D000
heap
page read and write
735D000
unkown
page readonly
6D0A3000
unkown
page read and write
A775000
direct allocation
page read and write
4EBE000
stack
page read and write
A80A000
direct allocation
page read and write
77F3000
unkown
page readonly
7815000
unkown
page readonly
2BE1000
heap
page read and write
400000
unkown
page readonly
7A01000
direct allocation
page read and write
5B55000
unkown
page execute read
2C51000
heap
page read and write
59C4000
unkown
page execute read
5B36000
unkown
page execute read
7A23000
direct allocation
page read and write
AF8000
unkown
page read and write
73C20000
unkown
page readonly
2A2F000
direct allocation
page read and write
5B5A000
unkown
page execute read
FFDF1000
direct allocation
page read and write
2B06000
direct allocation
page read and write
30C7000
heap
page read and write
2A06000
direct allocation
page read and write
78B7000
unkown
page readonly
FFD9A000
direct allocation
page read and write
A4EE000
heap
page read and write
6CFEC000
unkown
page readonly
7845000
unkown
page readonly
2A82000
direct allocation
page read and write
781E000
unkown
page readonly
76CD000
unkown
page readonly
309C000
heap
page read and write
30F3000
heap
page read and write
7C3F000
direct allocation
page read and write
75E8000
unkown
page readonly
4FF1000
heap
page read and write
2BE1000
heap
page read and write
74B5000
unkown
page readonly
2BBC000
stack
page read and write
63EA000
unkown
page execute read
7C36000
direct allocation
page read and write
9FBE000
direct allocation
page read and write
A80A000
direct allocation
page read and write
76C9000
unkown
page readonly
A794000
direct allocation
page read and write
5430000
direct allocation
page execute and read and write
335C000
heap
page read and write
7A55000
direct allocation
page read and write
7032000
unkown
page read and write
718A000
unkown
page readonly
30F3000
heap
page read and write
A670000
direct allocation
page read and write
4FF8000
heap
page read and write
FFD28000
direct allocation
page read and write
77B0000
unkown
page readonly
719F000
unkown
page readonly
69F9000
unkown
page execute read
1000000
heap
page read and write
77EF000
unkown
page readonly
58D8000
unkown
page execute read
737B000
unkown
page readonly
5000000
heap
page read and write
30EF000
heap
page read and write
2BE1000
heap
page read and write
2C51000
heap
page read and write
29F3000
heap
page read and write
A80A000
direct allocation
page read and write
FFD27000
direct allocation
page read and write
7C22000
direct allocation
page read and write
7581000
unkown
page readonly
769E000
unkown
page readonly
7836000
unkown
page readonly
5AF5000
unkown
page execute read
2C51000
heap
page read and write
30A0000
heap
page read and write
709F000
unkown
page read and write
2C51000
heap
page read and write
90000
stack
page read and write
2AF8000
direct allocation
page read and write
3099000
heap
page read and write
7857000
unkown
page readonly
2C51000
heap
page read and write
A904000
direct allocation
page read and write
7574000
unkown
page readonly
773C000
unkown
page readonly
735A000
unkown
page readonly
746D000
unkown
page readonly
A79B000
direct allocation
page read and write
7700000
unkown
page readonly
A910000
direct allocation
page read and write
33E0000
heap
page read and write
5CDF000
unkown
page execute read
A670000
direct allocation
page read and write
30F3000
heap
page read and write
74EA000
unkown
page readonly
FFDE8000
direct allocation
page read and write
2BE1000
heap
page read and write
7043000
unkown
page read and write
30F3000
heap
page read and write
73B8000
unkown
page readonly
73B3000
unkown
page readonly
70F1000
unkown
page read and write
93F1000
heap
page read and write
2C51000
heap
page read and write
30A5000
heap
page read and write
7A0C000
direct allocation
page read and write
73A3000
unkown
page readonly
7603000
unkown
page readonly
787F000
unkown
page readonly
495F000
stack
page read and write
A683000
trusted library allocation
page read and write
5BCE000
unkown
page execute read
2BE1000
heap
page read and write
FFB0E000
direct allocation
page read and write
7A86000
direct allocation
page read and write
2BE1000
heap
page read and write
780B000
unkown
page readonly
A910000
direct allocation
page read and write
30F3000
heap
page read and write
2FAE000
stack
page read and write
2C51000
heap
page read and write
7A69000
direct allocation
page read and write
71CF000
unkown
page readonly
A670000
trusted library allocation
page read and write
723C000
unkown
page readonly
30A0000
heap
page read and write
30F3000
heap
page read and write
2BE1000
heap
page read and write
308D000
heap
page read and write
335C000
heap
page read and write
5DC7000
unkown
page execute read
A683000
trusted library allocation
page read and write
FFB70000
direct allocation
page read and write
30C9000
heap
page read and write
7108000
unkown
page read and write
7523000
unkown
page readonly
A910000
direct allocation
page read and write
311F000
stack
page read and write
FFD79000
direct allocation
page read and write
7834000
unkown
page readonly
749F000
unkown
page readonly
2A41000
direct allocation
page read and write
5056000
heap
page read and write
2BE1000
heap
page read and write
7814000
unkown
page readonly
30A0000
heap
page read and write
29C4000
direct allocation
page read and write
A579000
direct allocation
page read and write
335C000
heap
page read and write
30A1000
heap
page read and write
7348000
unkown
page readonly
A60F000
direct allocation
page execute and read and write
FFDB2000
direct allocation
page read and write
30B7000
heap
page read and write
7740000
unkown
page readonly
786B000
unkown
page readonly
2C51000
heap
page read and write
2BE1000
heap
page read and write
A770000
trusted library allocation
page read and write
30CB000
heap
page read and write
4FF8000
heap
page read and write
FAC000
stack
page read and write
75F9000
unkown
page readonly
71B0000
unkown
page readonly
771F000
unkown
page readonly
2BE1000
heap
page read and write
105B000
heap
page read and write
782A000
unkown
page readonly
712C000
unkown
page readonly
705A000
unkown
page read and write
30F3000
heap
page read and write
30F3000
heap
page read and write
7847000
unkown
page readonly
30B7000
heap
page read and write
71F9000
unkown
page readonly
30A0000
heap
page read and write
71A7000
unkown
page readonly
A01A000
direct allocation
page read and write
73EF000
unkown
page readonly
2BE1000
heap
page read and write
7344000
unkown
page readonly
A80A000
direct allocation
page read and write
A793000
direct allocation
page read and write
7408000
unkown
page readonly
705D000
unkown
page write copy
7B60000
direct allocation
page read and write
18D000
stack
page read and write
A7AC000
direct allocation
page read and write
2A47000
direct allocation
page read and write
A912000
direct allocation
page read and write
7855000
unkown
page readonly
30AB000
heap
page read and write
77E8000
unkown
page readonly
EE4000
heap
page read and write
7384000
unkown
page readonly
336F000
heap
page read and write
4FF1000
heap
page read and write
76EF000
unkown
page readonly
78AA000
unkown
page readonly
6CC1000
unkown
page execute read
30AD000
heap
page read and write
71CC000
unkown
page readonly
2B0D000
direct allocation
page read and write
5FDB000
unkown
page execute read
7756000
unkown
page readonly
A80E000
direct allocation
page read and write
2BE1000
heap
page read and write
FFD9D000
direct allocation
page read and write
A0EA000
direct allocation
page read and write
5CBC000
unkown
page execute read
2A98000
direct allocation
page read and write
B31000
unkown
page readonly
A8BC000
direct allocation
page read and write
7450000
unkown
page readonly
76D7000
unkown
page readonly
7351000
unkown
page readonly
9717000
stack
page read and write
FFCD1000
direct allocation
page read and write
A09C000
direct allocation
page read and write
706A000
unkown
page write copy
7200000
unkown
page readonly
A8B3000
direct allocation
page read and write
EE0000
heap
page read and write
7807000
unkown
page readonly
6B22000
unkown
page execute read
7231000
unkown
page readonly
2BE1000
heap
page read and write
783A000
unkown
page readonly
B28000
unkown
page write copy
30B7000
heap
page read and write
7215000
unkown
page readonly
9FDE000
direct allocation
page read and write
5A83000
unkown
page execute read
1090000
heap
page read and write
705E000
unkown
page read and write
1172000
heap
page read and write
76F5000
unkown
page readonly
A019000
direct allocation
page read and write
5CDD000
unkown
page execute read
636C000
unkown
page execute read
A008000
direct allocation
page read and write
4FF1000
heap
page read and write
30A0000
heap
page read and write
2C51000
heap
page read and write
789A000
unkown
page readonly
5BA2000
unkown
page execute read
71C7000
unkown
page readonly
7208000
unkown
page readonly
9E0C000
stack
page read and write
2ABD000
direct allocation
page read and write
30F3000
heap
page read and write
5001000
heap
page read and write
30F3000
heap
page read and write
FFD0E000
direct allocation
page read and write
77C2000
unkown
page readonly
9432000
heap
page read and write
7AD8000
direct allocation
page read and write
73B0000
unkown
page readonly
30F3000
heap
page read and write
FFD8A000
direct allocation
page read and write
2AC3000
direct allocation
page read and write
10DB000
heap
page read and write
72A2000
unkown
page readonly
334E000
heap
page read and write
4FF1000
heap
page read and write
722D000
unkown
page readonly
5000000
heap
page read and write
2BE1000
heap
page read and write
4FFC000
heap
page read and write
2C51000
heap
page read and write
A80E000
direct allocation
page read and write
A02F000
direct allocation
page read and write
A80A000
direct allocation
page read and write
FFDD7000
direct allocation
page read and write
3070000
remote allocation
page read and write
30A4000
heap
page read and write
7560000
unkown
page readonly
2BE1000
heap
page read and write
7618000
unkown
page readonly
A08B000
direct allocation
page read and write
720E000
unkown
page readonly
7638000
unkown
page readonly
5562000
unkown
page execute read
7525000
unkown
page readonly
7463000
unkown
page readonly
2C51000
heap
page read and write
A778000
direct allocation
page read and write
ACB000
unkown
page read and write
A0B3000
direct allocation
page read and write
2BE1000
heap
page read and write
30AB000
heap
page read and write
768A000
unkown
page readonly
2AB6000
direct allocation
page read and write
6BDF000
unkown
page execute read
A80A000
direct allocation
page read and write
2C51000
heap
page read and write
557B000
unkown
page execute and read and write
771D000
unkown
page readonly
7A9B000
direct allocation
page read and write
754C000
unkown
page readonly
73CA000
unkown
page readonly
9DD6000
direct allocation
page read and write
775A000
unkown
page readonly
944F000
heap
page read and write
2C51000
heap
page read and write
7BB1000
direct allocation
page read and write
69CD000
unkown
page execute read
6568000
heap
page read and write
2AE9000
direct allocation
page read and write
7AA2000
direct allocation
page read and write
7C31000
direct allocation
page read and write
7371000
unkown
page readonly
73C3D000
unkown
page read and write
2B23000
direct allocation
page read and write
7021000
unkown
page read and write
2D8B000
stack
page read and write
A78F000
trusted library allocation
page read and write
FFDBC000
direct allocation
page read and write
2BE1000
heap
page read and write
2A0D000
direct allocation
page read and write
2C51000
heap
page read and write
A568000
heap
page read and write
2BE1000
heap
page read and write
75DA000
unkown
page readonly
FFDB7000
direct allocation
page read and write
79CD000
direct allocation
page read and write
7123000
unkown
page read and write
A80A000
direct allocation
page read and write
29F7000
direct allocation
page read and write
5CF4000
unkown
page execute read
9DD0000
direct allocation
page read and write
4FF9000
heap
page read and write
5057000
heap
page read and write
5BDA000
unkown
page execute read
73C0000
unkown
page readonly
A683000
trusted library allocation
page read and write
4FF1000
heap
page read and write
7223000
unkown
page readonly
4FF8000
heap
page read and write
71BC000
unkown
page readonly
2C51000
heap
page read and write
4FF1000
heap
page read and write
725B000
unkown
page readonly
2C51000
heap
page read and write
A781000
direct allocation
page read and write
4FF1000
heap
page read and write
2BF0000
heap
page read and write
2BE1000
heap
page read and write
2A2A000
direct allocation
page read and write
F80000
heap
page read and write
309A000
heap
page read and write
309C000
heap
page read and write
5B42000
unkown
page execute read
2C51000
heap
page read and write
7462000
unkown
page readonly
2A00000
heap
page read and write
9B8E000
stack
page read and write
FFCA0000
direct allocation
page read and write
72D6000
unkown
page readonly
5C38000
unkown
page execute read
2C51000
heap
page read and write
79C0000
direct allocation
page read and write
4FF1000
heap
page read and write
7380000
unkown
page readonly
7A7C000
direct allocation
page read and write
2B60000
heap
page read and write
9DD6000
direct allocation
page read and write
338B000
heap
page read and write
A80A000
direct allocation
page read and write
335C000
heap
page read and write
71D3000
unkown
page readonly
7832000
unkown
page readonly
2BE1000
heap
page read and write
721D000
unkown
page readonly
A778000
direct allocation
page read and write
7AB8000
direct allocation
page read and write
7480000
unkown
page readonly
767A000
unkown
page readonly
7509000
unkown
page readonly
AD2000
unkown
page read and write
785D000
unkown
page readonly
2A24000
direct allocation
page read and write
72C2000
unkown
page readonly
2BE1000
heap
page read and write
958E000
direct allocation
page read and write
30F3000
heap
page read and write
2B15000
direct allocation
page read and write
7548000
unkown
page readonly
6E2B000
unkown
page execute read
A68F000
trusted library allocation
page read and write
2C51000
heap
page read and write
71FF000
unkown
page readonly
A88B000
direct allocation
page read and write
29FE000
direct allocation
page read and write
4FFC000
heap
page read and write
A50D000
heap
page read and write
706C000
unkown
page write copy
5C13000
unkown
page execute read
30E4000
heap
page read and write
772D000
unkown
page readonly
A083000
direct allocation
page read and write
A68F000
trusted library allocation
page read and write
18D000
stack
page read and write
72B2000
unkown
page readonly
6B8BF000
unkown
page read and write
7516000
unkown
page readonly
FFD75000
direct allocation
page read and write
5CFB000
unkown
page execute read
7A84000
direct allocation
page read and write
A4E0000
direct allocation
page execute and read and write
FFDB4000
direct allocation
page read and write
7740000
unkown
page readonly
29FB000
stack
page read and write
A80F000
direct allocation
page read and write
2B80000
heap
page read and write
2ACC000
direct allocation
page read and write
A0AB000
direct allocation
page read and write
3346000
heap
page read and write
7792000
unkown
page readonly
75F7000
unkown
page readonly
A80A000
direct allocation
page read and write
5850000
unkown
page execute read
5420000
heap
page read and write
78BB000
unkown
page readonly
3346000
heap
page read and write
7693000
unkown
page readonly
2C51000
heap
page read and write
A094000
direct allocation
page read and write
5BD0000
unkown
page execute read
30E7000
heap
page read and write
72F5000
unkown
page readonly
7682000
unkown
page readonly
30AB000
heap
page read and write
336C000
heap
page read and write
5057000
heap
page read and write
4FF1000
heap
page read and write
7BBE000
direct allocation
page read and write
A00A000
direct allocation
page read and write
4FFC000
heap
page read and write
FFDE7000
direct allocation
page read and write
61B2000
unkown
page execute read
9E6E000
direct allocation
page read and write
A860000
heap
page read and write
FFDC6000
direct allocation
page read and write
AF8000
unkown
page read and write
AB3000
unkown
page read and write
5561000
unkown
page execute and read and write
A670000
trusted library allocation
page read and write
A5E0000
direct allocation
page execute and read and write
778C000
unkown
page readonly
7415000
unkown
page readonly
77C3000
unkown
page readonly
308A000
heap
page read and write
79D2000
unkown
page readonly
7349000
unkown
page readonly
720C000
unkown
page readonly
61BD000
unkown
page execute read
2BE1000
heap
page read and write
30A2000
heap
page read and write
5CC9000
unkown
page execute read
5B82000
unkown
page execute read
30F3000
heap
page read and write
A670000
trusted library allocation
page read and write
1113000
heap
page read and write
2BE1000
heap
page read and write
EEE000
stack
page read and write
A910000
direct allocation
page read and write
7BC1000
direct allocation
page read and write
7062000
unkown
page write copy
5530000
unkown
page readonly
FFE0F000
direct allocation
page read and write
9DD4000
direct allocation
page read and write
A78F000
trusted library allocation
page read and write
75D0000
unkown
page readonly
A80A000
direct allocation
page read and write
7242000
unkown
page readonly
500C000
heap
page read and write
751D000
unkown
page readonly
FFE01000
direct allocation
page read and write
7508000
unkown
page readonly
A80A000
direct allocation
page read and write
A778000
direct allocation
page read and write
A910000
direct allocation
page read and write
FCF000
heap
page read and write
2C51000
heap
page read and write
3363000
heap
page read and write
4FF8000
heap
page read and write
77BC000
unkown
page readonly
30A4000
heap
page read and write
30F3000
heap
page read and write
5001000
heap
page read and write
2AFF000
direct allocation
page read and write
2F00000
heap
page read and write
A793000
trusted library allocation
page read and write
6B8B5000
unkown
page readonly
73CF000
unkown
page readonly
2BE1000
heap
page read and write
2C51000
heap
page read and write
2ADB000
direct allocation
page read and write
A89A000
direct allocation
page read and write
70FE000
unkown
page read and write
75EC000
unkown
page readonly
54FE000
stack
page read and write
B27000
unkown
page read and write
7442000
unkown
page readonly
786A000
unkown
page readonly
2BE1000
heap
page read and write
7379000
unkown
page readonly
FFCC0000
direct allocation
page read and write
5BB5000
unkown
page execute read
762D000
unkown
page readonly
B1C000
unkown
page read and write
783C000
unkown
page readonly
2BE1000
heap
page read and write
30A7000
heap
page read and write
7716000
unkown
page readonly
7014000
unkown
page execute read
10D8000
heap
page read and write
7626000
unkown
page readonly
7898000
unkown
page readonly
2C51000
heap
page read and write
7C02000
direct allocation
page read and write
7128000
unkown
page read and write
2DB0000
heap
page read and write
7746000
unkown
page readonly
A01F000
direct allocation
page read and write
FFD22000
direct allocation
page read and write
74C7000
unkown
page readonly
A2DF000
stack
page read and write
6D0A4000
unkown
page readonly
A513000
heap
page read and write
30B9000
heap
page read and write
30F3000
heap
page read and write
774A000
unkown
page readonly
FFD38000
direct allocation
page read and write
2BE1000
heap
page read and write
9FF6000
direct allocation
page read and write
2BE1000
heap
page read and write
7B20000
direct allocation
page read and write
335C000
heap
page read and write
722B000
unkown
page readonly
2BE1000
heap
page read and write
7A3C000
direct allocation
page read and write
A670000
direct allocation
page read and write
30F3000
heap
page read and write
73A1000
unkown
page readonly
2BE1000
heap
page read and write
7851000
unkown
page readonly
76B2000
unkown
page readonly
9441000
heap
page read and write
7185000
unkown
page readonly
309C000
heap
page read and write
2BE1000
heap
page read and write
A70A000
direct allocation
page execute and read and write
7AEA000
direct allocation
page read and write
103E000
stack
page read and write
336B000
heap
page read and write
2B1C000
stack
page read and write
A910000
direct allocation
page read and write
73E1000
unkown
page readonly
30E4000
heap
page read and write
309C000
heap
page read and write
4A5F000
stack
page read and write
5C9A000
unkown
page execute read
7701000
unkown
page readonly
2FEF000
stack
page read and write
73D4000
unkown
page readonly
2BE1000
heap
page read and write
728A000
unkown
page readonly
A022000
direct allocation
page read and write
79EC000
direct allocation
page read and write
742F000
unkown
page readonly
2C51000
heap
page read and write
2C51000
heap
page read and write
9AAF000
stack
page read and write
30EB000
heap
page read and write
120F000
stack
page read and write
2C51000
heap
page read and write
309C000
heap
page read and write
9730000
direct allocation
page execute and read and write
2DF0000
heap
page read and write
79DB000
direct allocation
page read and write
3346000
heap
page read and write
7A15000
direct allocation
page read and write
9E6C000
direct allocation
page read and write
4FF8000
heap
page read and write
7AB2000
direct allocation
page read and write
B16000
unkown
page read and write
2BE1000
heap
page read and write
A670000
direct allocation
page read and write
A808000
direct allocation
page read and write
7B39000
direct allocation
page read and write
5042000
heap
page read and write
30B7000
heap
page read and write
A910000
direct allocation
page read and write
7129000
unkown
page write copy
2DB0000
heap
page read and write
2AAD000
direct allocation
page read and write
7521000
unkown
page readonly
2BE1000
heap
page read and write
77FA000
unkown
page readonly
78AF000
unkown
page readonly
74CF000
unkown
page readonly
264D000
stack
page read and write
2BE1000
heap
page read and write
2C51000
heap
page read and write
6348000
unkown
page execute read
FFD3C000
direct allocation
page read and write
72A1000
unkown
page readonly
30A4000
heap
page read and write
145F000
stack
page read and write
76A9000
unkown
page readonly
5B6B000
unkown
page execute read
A07E000
direct allocation
page read and write
7323000
unkown
page readonly
9F4F000
stack
page read and write
EE4000
heap
page read and write
2BE1000
heap
page read and write
2BE1000
heap
page read and write
309E000
heap
page read and write
A670000
direct allocation
page read and write
5001000
heap
page read and write
2C51000
heap
page read and write
77BC000
unkown
page readonly
7A54000
direct allocation
page read and write
6CA20000
unkown
page readonly
7510000
unkown
page readonly
6CC8000
unkown
page execute read
78C4000
unkown
page readonly
2BE1000
heap
page read and write
A915000
direct allocation
page read and write
A80C000
direct allocation
page read and write
943B000
heap
page read and write
765E000
unkown
page readonly
5000000
heap
page read and write
A80A000
direct allocation
page read and write
A018000
direct allocation
page read and write
2CA0000
heap
page read and write
30B9000
heap
page read and write
30F3000
heap
page read and write
7558000
unkown
page readonly
63BE000
unkown
page execute read
770F000
unkown
page readonly
2C51000
heap
page read and write
7391000
unkown
page readonly
7182000
unkown
page readonly
7544000
unkown
page readonly
4FF1000
heap
page read and write
7894000
unkown
page readonly
FFD5D000
direct allocation
page read and write
2BE1000
heap
page read and write
766B000
unkown
page readonly
73C2000
unkown
page readonly
30F3000
heap
page read and write
71AD000
unkown
page readonly
309C000
heap
page read and write
5B1D000
unkown
page execute read
7ABB000
direct allocation
page read and write
6CE20000
unkown
page readonly
7204000
unkown
page readonly
7751000
unkown
page readonly
788D000
unkown
page readonly
2BE1000
heap
page read and write
72DB000
unkown
page readonly
76B8000
unkown
page readonly
A770000
trusted library allocation
page read and write
7C19000
direct allocation
page read and write
63F8000
unkown
page execute read
705B000
unkown
page read and write
4FF9000
heap
page read and write
A8C0000
direct allocation
page read and write
6F6F000
heap
page read and write
30A4000
heap
page read and write
7368000
unkown
page readonly
725D000
unkown
page readonly
2A6D000
direct allocation
page read and write
77FC000
unkown
page readonly
7AFC000
direct allocation
page read and write
7601000
unkown
page readonly
7352000
unkown
page readonly
77E0000
unkown
page readonly
7350000
unkown
page readonly
789E000
unkown
page readonly
A80E000
direct allocation
page read and write
2BE1000
heap
page read and write
2C51000
heap
page read and write
5C96000
unkown
page execute read
30A4000
heap
page read and write
A910000
direct allocation
page read and write
A0B3000
direct allocation
page read and write
77B5000
unkown
page readonly
3055000
heap
page read and write
738B000
unkown
page readonly
A683000
trusted library allocation
page read and write
7B7D000
direct allocation
page read and write
30B7000
heap
page read and write
75EA000
unkown
page readonly
77ED000
unkown
page readonly
FFD6B000
direct allocation
page read and write
7889000
unkown
page readonly
7812000
unkown
page readonly
7496000
unkown
page readonly
A68F000
trusted library allocation
page read and write
A992000
direct allocation
page read and write
A68F000
trusted library allocation
page read and write
422000
unkown
page execute read
3387000
heap
page read and write
2C51000
heap
page read and write
704B000
unkown
page read and write
5C83000
unkown
page execute read
4C30000
remote allocation
page read and write
73C3F000
unkown
page readonly
941A000
heap
page read and write
74F5000
unkown
page readonly
59E9000
unkown
page execute read
309C000
heap
page read and write
A80A000
direct allocation
page read and write
7555000
unkown
page readonly
30F3000
heap
page read and write
A670000
direct allocation
page read and write
7397000
unkown
page readonly
4FF4000
heap
page read and write
74E9000
unkown
page readonly
A910000
direct allocation
page read and write
7A49000
direct allocation
page read and write
2BE1000
heap
page read and write
75E2000
unkown
page readonly
2BE1000
heap
page read and write
79F4000
direct allocation
page read and write
9FCF000
direct allocation
page read and write
6D090000
unkown
page read and write
2BE1000
heap
page read and write
75D8000
unkown
page readonly
7730000
unkown
page readonly
7400000
unkown
page readonly
6502000
heap
page read and write
3383000
heap
page read and write
7229000
unkown
page readonly
A798000
direct allocation
page read and write
7A21000
direct allocation
page read and write
788B000
unkown
page readonly
2C51000
heap
page read and write
A80A000
direct allocation
page read and write
FFCDD000
direct allocation
page read and write
781B000
unkown
page readonly
A4FD000
heap
page read and write
A01B000
direct allocation
page read and write
30DF000
heap
page read and write
30F3000
heap
page read and write
76E1000
unkown
page readonly
76ED000
unkown
page readonly
77D0000
unkown
page readonly
71C2000
unkown
page readonly
5C98000
unkown
page execute read
9770000
direct allocation
page execute and read and write
A024000
direct allocation
page read and write
2BE1000
heap
page read and write
7C13000
direct allocation
page read and write
2C51000
heap
page read and write
726F000
unkown
page readonly
A02E000
direct allocation
page read and write
29CF000
direct allocation
page read and write
3346000
heap
page read and write
7661000
unkown
page readonly
7B32000
direct allocation
page read and write
2C51000
heap
page read and write
7801000
unkown
page readonly
FFDD6000
direct allocation
page read and write
73B1000
unkown
page readonly
30F3000
heap
page read and write
6867000
unkown
page execute read
EE4000
heap
page read and write
33F0000
heap
page read and write
7825000
unkown
page readonly
6A20000
unkown
page execute read
601A000
unkown
page execute read
77E6000
unkown
page readonly
FFDB6000
direct allocation
page read and write
7662000
unkown
page readonly
2BE1000
heap
page read and write
FFD4C000
direct allocation
page read and write
599D000
unkown
page execute read
7B23000
direct allocation
page read and write
41C000
unkown
page execute read
7A6D000
direct allocation
page read and write
3100000
heap
page read and write
9E6E000
direct allocation
page read and write
7808000
unkown
page readonly
774C000
unkown
page readonly
7124000
unkown
page write copy
ACF000
unkown
page read and write
26A0000
heap
page read and write
FFDA4000
direct allocation
page read and write
7892000
unkown
page readonly
FBC000
heap
page read and write
30E3000
heap
page read and write
FFDBB000
direct allocation
page read and write
A49E000
stack
page read and write
A3DA000
trusted library allocation
page read and write
309C000
heap
page read and write
5A0E000
unkown
page execute read
30F3000
heap
page read and write
75CB000
unkown
page readonly
2AF1000
direct allocation
page read and write
5541000
unkown
page execute and read and write
2C51000
heap
page read and write
FFCFD000
direct allocation
page read and write
7831000
unkown
page readonly
309C000
heap
page read and write
73C36000
unkown
page readonly
5AFE000
heap
page read and write
2AC5000
direct allocation
page read and write
F10000
heap
page read and write
A68F000
trusted library allocation
page read and write
7B7C000
direct allocation
page read and write
4930000
heap
page read and write
77F5000
unkown
page readonly
77CE000
unkown
page readonly
335C000
heap
page read and write
6D091000
unkown
page write copy
ACB000
unkown
page read and write
10D0000
heap
page read and write
30A0000
heap
page read and write
FFCDE000
direct allocation
page read and write
335C000
heap
page read and write
2BE1000
heap
page read and write
E6E000
stack
page read and write
32EE000
stack
page read and write
72A9000
unkown
page readonly
6AD3000
unkown
page execute read
764A000
unkown
page readonly
2BE1000
heap
page read and write
77E4000
unkown
page readonly
2C51000
heap
page read and write
FCF000
heap
page read and write
FFD4D000
direct allocation
page read and write
7446000
unkown
page readonly
A70A000
direct allocation
page execute and read and write
30AB000
heap
page read and write
A778000
trusted library allocation
page read and write
7290000
unkown
page readonly
309C000
heap
page read and write
3377000
heap
page read and write
D40000
heap
page read and write
768A000
unkown
page readonly
A060000
direct allocation
page read and write
4FF8000
heap
page read and write
77B3000
unkown
page readonly
2FAE000
stack
page read and write
5D1A000
unkown
page execute read
A888000
direct allocation
page read and write
7A5C000
direct allocation
page read and write
742D000
unkown
page readonly
A6DF000
stack
page read and write
5BBD000
unkown
page execute read
707A000
unkown
page read and write
5C07000
unkown
page execute read
77A2000
unkown
page readonly
70BD000
unkown
page read and write
30B7000
heap
page read and write
A670000
direct allocation
page read and write
FFDBD000
direct allocation
page read and write
2BE1000
heap
page read and write
4FF1000
heap
page read and write
A910000
direct allocation
page read and write
72D4000
unkown
page readonly
30F3000
heap
page read and write
7406000
unkown
page readonly
788E000
unkown
page readonly
71BF000
unkown
page readonly
783E000
unkown
page readonly
4FF9000
heap
page read and write
FFD23000
direct allocation
page read and write
4D30000
heap
page read and write
A0DB000
direct allocation
page read and write
9414000
heap
page read and write
5E04000
unkown
page execute read
772E000
unkown
page readonly
7819000
unkown
page readonly
A910000
direct allocation
page read and write
76AB000
unkown
page readonly
7237000
unkown
page readonly
74F1000
unkown
page readonly
942A000
heap
page read and write
5B72000
unkown
page execute read
7A4B000
direct allocation
page read and write
5B3B000
unkown
page execute read
29B0000
heap
page read and write
73C2000
unkown
page readonly
2C51000
heap
page read and write
71E0000
unkown
page readonly
FFDFF000
direct allocation
page read and write
245B000
stack
page read and write
FFDC8000
direct allocation
page read and write
958C000
direct allocation
page read and write
70FC000
unkown
page read and write
7794000
unkown
page readonly
309C000
heap
page read and write
A035000
direct allocation
page read and write
2ADB000
stack
page read and write
2BE1000
heap
page read and write
785F000
unkown
page readonly
747C000
unkown
page readonly
309C000
heap
page read and write
2BE1000
heap
page read and write
70C0000
unkown
page read and write
30A0000
heap
page read and write
30F3000
heap
page read and write
2FAE000
stack
page read and write
2AAF000
direct allocation
page read and write
6CB9000
unkown
page execute read
4FF4000
heap
page read and write
2BE1000
heap
page read and write
751D000
unkown
page readonly
78B3000
unkown
page readonly
7283000
unkown
page readonly
7502000
unkown
page readonly
77E2000
unkown
page readonly
2C51000
heap
page read and write
F42000
heap
page read and write
2A48000
direct allocation
page read and write
2B10000
heap
page read and write
2BE1000
heap
page read and write
7C41000
direct allocation
page read and write
7023000
unkown
page read and write
93F9000
heap
page read and write
2BE1000
heap
page read and write
770D000
unkown
page readonly
752C000
unkown
page readonly
A910000
direct allocation
page read and write
4FF8000
heap
page read and write
64FE000
heap
page read and write
93F1000
heap
page read and write
7542000
unkown
page readonly
7518000
unkown
page readonly
712A000
unkown
page readonly
7521000
unkown
page readonly
726E000
unkown
page readonly
A910000
direct allocation
page read and write
A0C1000
direct allocation
page read and write
A770000
trusted library allocation
page read and write
6758000
unkown
page execute read
A912000
direct allocation
page read and write
30A0000
heap
page read and write
2BE1000
heap
page read and write
335C000
heap
page read and write
5B5C000
unkown
page execute read
30EF000
heap
page read and write
2C51000
heap
page read and write
557C000
unkown
page execute read
5010000
heap
page read and write
7830000
unkown
page readonly
71F7000
unkown
page readonly
FFD26000
direct allocation
page read and write
2C51000
heap
page read and write
7B8E000
direct allocation
page read and write
AD20000
trusted library allocation
page read and write
71B2000
unkown
page readonly
AFD000
unkown
page read and write
400000
unkown
page readonly
2A17000
direct allocation
page read and write
F49000
heap
page read and write
7A92000
direct allocation
page read and write
71C2000
unkown
page readonly
2BE1000
heap
page read and write
2BE1000
heap
page read and write
FFE1F000
direct allocation
page read and write
30F3000
heap
page read and write
72F2000
unkown
page readonly
2AA6000
direct allocation
page read and write
7657000
unkown
page readonly
7048000
unkown
page write copy
780C000
unkown
page readonly
4EFF000
stack
page read and write
A683000
trusted library allocation
page read and write
71A9000
unkown
page readonly
ACF000
unkown
page read and write
5A81000
unkown
page execute read
2C51000
heap
page read and write
2C51000
heap
page read and write
75B6000
unkown
page readonly
31B0000
heap
page read and write
FFDC3000
direct allocation
page read and write
5CB5000
unkown
page execute read
7465000
unkown
page readonly
5000000
heap
page read and write
336C000
heap
page read and write
7803000
unkown
page readonly
1003000
heap
page read and write
A51B000
heap
page read and write
763D000
unkown
page readonly
719F000
unkown
page readonly
785B000
unkown
page readonly
7B38000
direct allocation
page read and write
7710000
unkown
page readonly
2C51000
heap
page read and write
719D000
unkown
page readonly
29C0000
direct allocation
page execute and read and write
4FF9000
heap
page read and write
302E000
stack
page read and write
2A8A000
direct allocation
page read and write
70DD000
unkown
page read and write
30A0000
heap
page read and write
74D8000
unkown
page readonly
9DE0000
direct allocation
page read and write
724D000
unkown
page readonly
4FF9000
heap
page read and write
31CE000
stack
page read and write
3085000
heap
page read and write
5001000
heap
page read and write
2BE1000
heap
page read and write
B9C000
stack
page read and write
778F000
unkown
page readonly
7B8E000
direct allocation
page read and write
5937000
unkown
page execute read
4AD0000
heap
page read and write
7332000
unkown
page readonly
7602000
unkown
page readonly
71C0000
unkown
page readonly
B13000
unkown
page read and write
9474000
heap
page read and write
5BA9000
unkown
page execute read
7042000
unkown
page write copy
7ADC000
direct allocation
page read and write
5B57000
unkown
page execute read
7D3E000
stack
page read and write
30F3000
heap
page read and write
5A34000
unkown
page execute read
3387000
heap
page read and write
A020000
direct allocation
page read and write
5C09000
unkown
page execute read
2ABC000
direct allocation
page read and write
79B3000
unkown
page readonly
7968000
heap
page read and write
760F000
unkown
page readonly
73D0000
unkown
page readonly
There are 2399 hidden memdumps, click here to show them.