IOC Report
T8TY28UxiT.dll

loading gif

Files

File Path
Type
Category
Malicious
T8TY28UxiT.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_5080fa819e61b36dbd2b7e7e74bdf5c819fed0_7522e4b5_74818217-22c5-42ce-899a-bcb08de4d8f0\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_5080fa819e61b36dbd2b7e7e74bdf5c819fed0_7522e4b5_75dffb69-1a82-4980-a5db-ce9131bf24b7\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_c1d756b83cd83ada8dfe11775affd7ce637fbf_7522e4b5_00197563-5a69-4158-9f6e-3a1ccb43392e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_c1d756b83cd83ada8dfe11775affd7ce637fbf_7522e4b5_26f3d910-2051-4880-bd51-43d22280fd44\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_fcdd551db92618d3725e94eeb7507dfc72111acd_7522e4b5_17fea6c8-cf23-47b2-9980-606d9795cdc0\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_fcdd551db92618d3725e94eeb7507dfc72111acd_7522e4b5_46437c3f-5aaf-4a65-a08d-004fbbab95c4\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_fcdd551db92618d3725e94eeb7507dfc72111acd_7522e4b5_525b7648-dbff-4ce4-ae33-ba140b501c2c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_fcdd551db92618d3725e94eeb7507dfc72111acd_7522e4b5_b5951025-51df-40c5-b637-ef2fe51f054d\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_fcdd551db92618d3725e94eeb7507dfc72111acd_7522e4b5_c5205c7c-acbc-4fb5-ac9d-ba3299c90495\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER159F.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Oct 7 21:24:48 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER165C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER168C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER29E3.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Oct 7 21:24:53 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2A90.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2AB0.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5AEB.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Oct 7 21:24:00 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5AFA.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Oct 7 21:24:00 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5BB7.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5BB8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5C06.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5C15.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6626.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Oct 7 21:24:03 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6694.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER66C4.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER71AF.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Oct 7 21:24:06 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER723C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER726C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7E9F.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Oct 7 21:24:09 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7EDE.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Oct 7 21:24:10 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7FA9.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Oct 7 21:24:10 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8094.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER81BD.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER81DD.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8289.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER82C7.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8345.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\iDQiPwFWUp\0101a.zip
data
dropped
C:\iDQiPwFWUp\0101a_decrypted.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\iDQiPwFWUp\7zxa.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\pnVcakKiqh\0101a.zip
data
dropped
C:\pnVcakKiqh\0101a_decrypted.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\pnVcakKiqh\7zxa.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 35 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\T8TY28UxiT.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\T8TY28UxiT.dll,DllMain
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\T8TY28UxiT.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\T8TY28UxiT.dll,bz_internal_error
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\T8TY28UxiT.dll,g2mcomm_winmain
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\T8TY28UxiT.dll",DllMain
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\T8TY28UxiT.dll",bz_internal_error
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\T8TY28UxiT.dll",g2mcomm_winmain
malicious
C:\iDQiPwFWUp\ybtrrus.exe
"C:\iDQiPwFWUp\ybtrrus.exe"
malicious
C:\pnVcakKiqh\ybtrrus.exe
"C:\pnVcakKiqh\ybtrrus.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
SCHTASKS /Query /TN "Boomer"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C SCHTASKS /Create /F /RL HIGHEST /TN "Boomer" /TR "C:\iDQiPwFWUp\ybtrrus.exe" /SC ONLOGON /DELAY 0001:00
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C netsh advfirewall firewall add rule name="ybtrrus" dir=in action=allow program="C:\iDQiPwFWUp\ybtrrus.exe" enable=yes profile=any
malicious
C:\Windows\SysWOW64\schtasks.exe
SCHTASKS /Create /F /RL HIGHEST /TN "Boomer" /TR "C:\iDQiPwFWUp\ybtrrus.exe" /SC ONLOGON /DELAY 0001:00
malicious
C:\Windows\SysWOW64\netsh.exe
netsh advfirewall firewall add rule name="ybtrrus" dir=in action=allow program="C:\iDQiPwFWUp\ybtrrus.exe" enable=yes profile=any
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c ipconfig /flushdns
malicious
C:\Windows\SysWOW64\ipconfig.exe
ipconfig /flushdns
malicious
C:\iDQiPwFWUp\ybtrrus.exe
C:\iDQiPwFWUp\ybtrrus.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
SCHTASKS /Query /TN "Boomer"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /C netsh advfirewall firewall add rule name="ybtrrus" dir=in action=allow program="C:\pnVcakKiqh\ybtrrus.exe" enable=yes profile=any
malicious
C:\Windows\SysWOW64\netsh.exe
netsh advfirewall firewall add rule name="ybtrrus" dir=in action=allow program="C:\pnVcakKiqh\ybtrrus.exe" enable=yes profile=any
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c ipconfig /flushdns
malicious
C:\Windows\SysWOW64\ipconfig.exe
ipconfig /flushdns
malicious
C:\Windows\SysWOW64\schtasks.exe
SCHTASKS /Query /TN "Boomer"
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\T8TY28UxiT.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7620 -s 616
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7604 -s 544
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7924 -s 660
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 8036 -s 608
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7204 -s 656
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7188 -s 608
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7208 -s 616
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7924 -s 672
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7204 -s 684
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 33 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.ghisler.com/plugins.htm
unknown
http://fontawesome.io
unknown
http://www.scootersoftware.com. 
unknown
http://www.scootersoftware.com/checkupdates.php?product=bc3&minor=
unknown
http://147.45.116.5/index.phpxU_
unknown
http://fontawesome.iohttp://fontawesome.iohttp://fontawesome.io/license/http://fontawesome.io/licens
unknown
http://www.scootersoftware.com/upgrade6%
unknown
http://www.embarcadero.com/products/delphi
unknown
http://www.scootersoftware.com/bugRepMailer.php
unknown
http://147.45.116.5/index.php
unknown
http://www.scootersoftware.com/bugRepMailer.phpiE
unknown
http://147.45.116.5/FANTASMA/0101.zipc
unknown
http://code.google.com/p/swfobject/
unknown
http://www.esegece.com
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
http://tools.ietf.org/html/rfc6455
unknown
https://github.com/Yaffle/EventSource/
unknown
http://www.totalcmd.net/directory/packer.html
unknown
http://www.indyproject.org/
unknown
http://www.scootersoftware.com/buynow?bld=%dS
unknown
http://www.secureblackbox.com1)
unknown
http://www.scootersoftware.com/upgrade
unknown
http://www.scootersoftware.com/
unknown
https://fontawesome.com/license/free
unknown
http://dev.w3.org/html5/websockets/
unknown
http://www.scootersoftware.com/buynow?bld=%d
unknown
http://147.45.116.5/FANTASMA/0101.zip
unknown
https://fontawesome.com
unknown
http://www.scootersoftware.com/support.php
unknown
http://fontawesome.io/license/
unknown
http://javascript.crockford.com/jsmin.html
unknown
http://www.opensource.org/licenses/mit-license.php
unknown
http://www.scootersoftware.com/upgradeeow.a
unknown
http://www.scootersoftware.com/download.phpS
unknown
http://www.scootersoftware.com/download.php
unknown
http://147.45.116.5/index.php?user-PC
unknown
https://github.com/muaz-khan/RecordRTC
unknown
http://www.scootersoftware.com/bugRepMailer.php(E~
unknown
https://github.com/muaz-khan/RTCMultiConnection/issues/778#issuecomment-524853468
unknown
http://www.scootersoftware.com/v3formats
unknown
http://www.scootersoftware.com/upgradeite
unknown
http://gimite.net/en/
unknown
https://github.com/muaz-khan/RTCMultiConnection
unknown
http://www.secureblackbox.com
unknown
http://www.scootersoftware.com/upgrade0
unknown
There are 35 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
147.45.116.5
unknown
Russian Federation
malicious
213.188.196.246
unknown
Italy
128.138.140.44
unknown
United States
208.76.221.217
unknown
United States
132.163.96.1
unknown
United States
132.163.96.2
unknown
United States
20.42.65.92
unknown
United States
20.189.173.21
unknown
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{3c478b6c-83fe-cc41-af16-a11bd2b51ab6}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProgramId
\REGISTRY\A\{3c478b6c-83fe-cc41-af16-a11bd2b51ab6}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
FileId
\REGISTRY\A\{3c478b6c-83fe-cc41-af16-a11bd2b51ab6}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LowerCaseLongPath
\REGISTRY\A\{3c478b6c-83fe-cc41-af16-a11bd2b51ab6}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LongPathHash
\REGISTRY\A\{3c478b6c-83fe-cc41-af16-a11bd2b51ab6}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Name
\REGISTRY\A\{3c478b6c-83fe-cc41-af16-a11bd2b51ab6}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
OriginalFileName
\REGISTRY\A\{3c478b6c-83fe-cc41-af16-a11bd2b51ab6}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Publisher
\REGISTRY\A\{3c478b6c-83fe-cc41-af16-a11bd2b51ab6}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Version
\REGISTRY\A\{3c478b6c-83fe-cc41-af16-a11bd2b51ab6}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinFileVersion
\REGISTRY\A\{3c478b6c-83fe-cc41-af16-a11bd2b51ab6}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinaryType
\REGISTRY\A\{3c478b6c-83fe-cc41-af16-a11bd2b51ab6}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductName
\REGISTRY\A\{3c478b6c-83fe-cc41-af16-a11bd2b51ab6}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductVersion
\REGISTRY\A\{3c478b6c-83fe-cc41-af16-a11bd2b51ab6}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LinkDate
\REGISTRY\A\{3c478b6c-83fe-cc41-af16-a11bd2b51ab6}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinProductVersion
\REGISTRY\A\{3c478b6c-83fe-cc41-af16-a11bd2b51ab6}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageFullName
\REGISTRY\A\{3c478b6c-83fe-cc41-af16-a11bd2b51ab6}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageRelativeId
\REGISTRY\A\{3c478b6c-83fe-cc41-af16-a11bd2b51ab6}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Size
\REGISTRY\A\{3c478b6c-83fe-cc41-af16-a11bd2b51ab6}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Language
\REGISTRY\A\{3c478b6c-83fe-cc41-af16-a11bd2b51ab6}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
IsOsComponent
\REGISTRY\A\{3c478b6c-83fe-cc41-af16-a11bd2b51ab6}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00B8F8B0D2B
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Scooter Software\Beyond Compare 3
CacheID
There are 17 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2B11000
heap
page read and write
3083000
heap
page read and write
3079000
heap
page read and write
3128000
heap
page read and write
6CA9000
unkown
page read and write
9140000
direct allocation
page read and write
2BD1000
heap
page read and write
E24000
heap
page read and write
31AC000
heap
page read and write
2B21000
heap
page read and write
2B11000
heap
page read and write
EBE000
heap
page read and write
5B1C000
unkown
page execute read
2BD1000
heap
page read and write
306C000
heap
page read and write
55A6000
unkown
page execute read
306C000
heap
page read and write
4D00000
heap
page read and write
5D2C000
unkown
page execute read
2AE6000
direct allocation
page read and write
2B11000
heap
page read and write
3211000
heap
page read and write
5DF9000
unkown
page execute read
E24000
heap
page read and write
3116000
heap
page read and write
2B11000
heap
page read and write
3087000
heap
page read and write
2B20000
heap
page read and write
92B8000
direct allocation
page read and write
4F10000
heap
page read and write
7820000
direct allocation
page execute and read and write
2B21000
heap
page read and write
B13000
unkown
page read and write
2ADD000
direct allocation
page read and write
A970000
direct allocation
page read and write
2BD1000
heap
page read and write
ECF000
heap
page read and write
2B11000
heap
page read and write
3143000
heap
page read and write
6C9A000
unkown
page read and write
6C96000
unkown
page read and write
A0E000
unkown
page read and write
2BD1000
heap
page read and write
2B21000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
306E000
heap
page read and write
306E000
heap
page read and write
9EF000
unkown
page read and write
B27000
unkown
page read and write
306E000
heap
page read and write
34E5000
heap
page read and write
306C000
heap
page read and write
306C000
heap
page read and write
ACA000
heap
page read and write
2B11000
heap
page read and write
2BD1000
heap
page read and write
B13000
unkown
page read and write
E87000
heap
page read and write
2B21000
heap
page read and write
6D35000
unkown
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
2FB0000
heap
page read and write
602A000
unkown
page execute read
2AB9000
direct allocation
page read and write
2BD1000
heap
page read and write
B1A000
unkown
page read and write
610E000
unkown
page execute read
30E3000
heap
page read and write
30E3000
heap
page read and write
2B11000
heap
page read and write
2B5B000
direct allocation
page read and write
2A27000
direct allocation
page read and write
2BD1000
heap
page read and write
2B10000
direct allocation
page read and write
BF0000
heap
page read and write
2B11000
heap
page read and write
306E000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
2B21000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
5E3C000
unkown
page execute read
780C000
direct allocation
page read and write
2B21000
heap
page read and write
2B21000
heap
page read and write
31BC000
heap
page read and write
2BD1000
heap
page read and write
2ADE000
unkown
page read and write
9A2E000
heap
page read and write
E94000
heap
page read and write
30F0000
heap
page read and write
6B99000
unkown
page read and write
31AC000
heap
page read and write
30E3000
heap
page read and write
76C6000
direct allocation
page read and write
6088000
unkown
page execute read
2A52000
direct allocation
page read and write
29FB000
direct allocation
page read and write
4D99000
heap
page read and write
2B21000
heap
page read and write
2FFE000
stack
page read and write
37CF000
stack
page read and write
30B0000
heap
page read and write
2B21000
heap
page read and write
57B000
heap
page read and write
6C8FF000
unkown
page read and write
2B9C000
direct allocation
page read and write
B0B000
stack
page read and write
30E3000
heap
page read and write
31AC000
heap
page read and write
306C000
heap
page read and write
2997000
direct allocation
page read and write
5451000
unkown
page execute read
306F000
heap
page read and write
AF8000
unkown
page read and write
5C2C000
unkown
page execute read
B18000
unkown
page read and write
2B21000
heap
page read and write
2B21000
heap
page read and write
6434000
unkown
page execute read
2A5A000
direct allocation
page read and write
A77A000
trusted library allocation
page read and write
31D1000
heap
page read and write
AB3000
unkown
page write copy
2B21000
heap
page read and write
316E000
heap
page read and write
AFD000
unkown
page read and write
6FE41000
unkown
page execute read
E6F000
heap
page read and write
7738000
direct allocation
page read and write
6A46000
unkown
page execute read
2B21000
heap
page read and write
6948000
unkown
page execute read
4CFF000
stack
page read and write
2AC7000
direct allocation
page read and write
5B23000
unkown
page execute read
2B21000
heap
page read and write
2990000
direct allocation
page read and write
2B21000
heap
page read and write
4E09000
heap
page read and write
5F61000
unkown
page execute read
EDF000
heap
page read and write
2B10000
heap
page read and write
2A7F000
direct allocation
page read and write
2B21000
heap
page read and write
7811000
direct allocation
page read and write
2B11000
heap
page read and write
306C000
heap
page read and write
6758000
unkown
page execute read
5B4B000
unkown
page execute read
4D8F000
heap
page read and write
2DAC000
heap
page read and write
5572000
unkown
page execute read
2D90000
heap
page read and write
5EC6000
unkown
page execute read
3080000
heap
page read and write
2BD1000
heap
page read and write
ABA000
unkown
page read and write
5948000
unkown
page execute read
95E7000
direct allocation
page read and write
661F000
unkown
page execute read
77D2000
direct allocation
page read and write
85B000
stack
page read and write
2B21000
heap
page read and write
2BD1000
heap
page read and write
2BD1000
heap
page read and write
31AC000
heap
page read and write
3450000
heap
page read and write
2B21000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
7775000
direct allocation
page read and write
2B54000
direct allocation
page read and write
94F000
unkown
page read and write
2D45000
heap
page read and write
9473000
direct allocation
page read and write
3180000
heap
page read and write
B26000
unkown
page read and write
77B0000
direct allocation
page read and write
2BD1000
heap
page read and write
2B21000
heap
page read and write
6869000
unkown
page execute read
2BD1000
heap
page read and write
2B11000
heap
page read and write
31BC000
heap
page read and write
3079000
heap
page read and write
76C7000
unkown
page readonly
2B11000
heap
page read and write
2A7F000
direct allocation
page read and write
30D000
stack
page read and write
2BD1000
heap
page read and write
6CC9000
unkown
page read and write
2B36000
heap
page read and write
2B11000
heap
page read and write
D40000
heap
page read and write
76D1000
direct allocation
page read and write
3097000
heap
page read and write
3087000
heap
page read and write
76F0000
direct allocation
page read and write
77D0000
direct allocation
page read and write
2BD1000
heap
page read and write
30E3000
heap
page read and write
2B21000
heap
page read and write
2B11000
heap
page read and write
2D60000
heap
page read and write
15CF000
stack
page read and write
77FC000
direct allocation
page read and write
9700000
trusted library allocation
page read and write
2BD1000
heap
page read and write
2B11000
heap
page read and write
ED7000
heap
page read and write
A780000
heap
page read and write
2B11000
heap
page read and write
3143000
heap
page read and write
2BD1000
heap
page read and write
2B11000
heap
page read and write
29D7000
direct allocation
page read and write
2BD1000
heap
page read and write
2B21000
heap
page read and write
8F27000
stack
page read and write
306C000
heap
page read and write
31AC000
heap
page read and write
2A28000
direct allocation
page read and write
2DDE000
stack
page read and write
3BE000
unkown
page read and write
2B7C000
heap
page read and write
3430000
heap
page read and write
2ADE000
direct allocation
page read and write
2B21000
heap
page read and write
2B11000
heap
page read and write
4BD0000
heap
page read and write
6356000
unkown
page execute read
2BD1000
heap
page read and write
2B11000
heap
page read and write
2AF3000
direct allocation
page read and write
2BD1000
heap
page read and write
621A000
unkown
page execute read
638D000
unkown
page execute read
2B11000
heap
page read and write
2B11000
heap
page read and write
6CC1000
unkown
page write copy
5F57000
unkown
page execute read
5B06000
unkown
page execute read
EF0000
heap
page read and write
6075000
unkown
page execute read
2B11000
heap
page read and write
2B11000
heap
page read and write
2BD1000
heap
page read and write
5571000
unkown
page execute and read and write
2B21000
heap
page read and write
4D01000
heap
page read and write
2B11000
heap
page read and write
A2E000
stack
page read and write
EB7D000
trusted library allocation
page read and write
83F000
stack
page read and write
90A000
heap
page read and write
31AC000
heap
page read and write
5461000
unkown
page execute and read and write
3074000
heap
page read and write
2BD1000
heap
page read and write
31AC000
heap
page read and write
306E000
heap
page read and write
7795000
direct allocation
page read and write
53E000
stack
page read and write
5C18000
unkown
page execute read
2B9F000
stack
page read and write
2B21000
heap
page read and write
3093000
heap
page read and write
2B32000
heap
page read and write
2BD1000
heap
page read and write
6D5C000
unkown
page read and write
60A5000
unkown
page execute read
3290000
heap
page read and write
2B11000
heap
page read and write
F25000
heap
page read and write
306C000
heap
page read and write
6916000
unkown
page execute read
2B11000
heap
page read and write
306C000
heap
page read and write
31BC000
heap
page read and write
94C0000
trusted library allocation
page read and write
4DB6000
heap
page read and write
2B21000
heap
page read and write
30DB000
heap
page read and write
2B21000
heap
page read and write
6533000
unkown
page execute read
2B21000
heap
page read and write
2B21000
heap
page read and write
3076000
heap
page read and write
9B000
stack
page read and write
2B21000
heap
page read and write
29ED000
direct allocation
page read and write
2BD1000
heap
page read and write
306E000
heap
page read and write
558A000
unkown
page execute read
31CF000
heap
page read and write
2BD1000
heap
page read and write
2F8E000
stack
page read and write
2F60000
heap
page read and write
2BD1000
heap
page read and write
2B11000
heap
page read and write
31BC000
heap
page read and write
A9FE000
heap
page read and write
2BD1000
heap
page read and write
5F09000
unkown
page execute read
2B2F000
direct allocation
page read and write
2BD1000
heap
page read and write
2BD1000
heap
page read and write
30E3000
heap
page read and write
2B11000
heap
page read and write
2B21000
heap
page read and write
7747000
direct allocation
page read and write
306C000
heap
page read and write
2B7F000
direct allocation
page read and write
618D000
unkown
page execute read
63E4000
unkown
page execute read
2B11000
heap
page read and write
C20000
heap
page read and write
7713000
direct allocation
page read and write
306E000
heap
page read and write
2E1F000
stack
page read and write
613B000
unkown
page execute read
771D000
direct allocation
page read and write
312C000
heap
page read and write
5AD000
stack
page read and write
329A000
heap
page read and write
2B19000
direct allocation
page read and write
2BD1000
heap
page read and write
ABC000
unkown
page read and write
2B21000
heap
page read and write
558A000
unkown
page execute read
2BD1000
heap
page read and write
62FB000
unkown
page execute read
2B21000
heap
page read and write
8EE8000
direct allocation
page read and write
2E30000
heap
page read and write
77A9000
direct allocation
page read and write
77B4000
direct allocation
page read and write
30E3000
heap
page read and write
2AF4000
direct allocation
page read and write
2BD1000
heap
page read and write
2BD1000
heap
page read and write
2B11000
heap
page read and write
B70000
heap
page read and write
2B21000
heap
page read and write
DB4000
heap
page read and write
A938000
direct allocation
page read and write
77ED000
direct allocation
page read and write
31BB000
heap
page read and write
2C80000
heap
page read and write
3010000
heap
page read and write
2B11000
heap
page read and write
6359000
unkown
page execute read
E60000
heap
page read and write
65D2000
unkown
page execute read
610A000
unkown
page execute read
2B21000
heap
page read and write
8EC2000
direct allocation
page read and write
31BB000
heap
page read and write
2BD1000
heap
page read and write
5CD5000
unkown
page execute read
60D5000
unkown
page execute read
2BD1000
heap
page read and write
5D9E000
unkown
page execute read
2B11000
heap
page read and write
2B21000
heap
page read and write
2BD1000
heap
page read and write
5983000
unkown
page execute read
A9F0000
trusted library allocation
page read and write
5581000
unkown
page execute read
A921000
direct allocation
page read and write
A965000
direct allocation
page read and write
2B21000
heap
page read and write
5BF7000
unkown
page execute read
2BD1000
heap
page read and write
2AA3000
direct allocation
page read and write
5E06000
unkown
page execute read
9B4E000
stack
page read and write
6538000
unkown
page execute read
6838000
unkown
page execute read
2BD1000
heap
page read and write
2F9F000
stack
page read and write
306E000
heap
page read and write
5877000
unkown
page execute read
745000
heap
page read and write
7FB000
stack
page read and write
31AE000
heap
page read and write
34F2000
heap
page read and write
97FA000
trusted library allocation
page read and write
490F000
stack
page read and write
76F1000
direct allocation
page read and write
5D5F000
unkown
page execute read
2BD1000
heap
page read and write
6C23000
unkown
page execute read
5E47000
unkown
page execute read
2BD1000
heap
page read and write
2B11000
heap
page read and write
6D19000
unkown
page read and write
60B7000
unkown
page execute read
2B21000
heap
page read and write
9800000
trusted library allocation
page read and write
2BD1000
heap
page read and write
7726000
direct allocation
page read and write
D8E000
stack
page read and write
E77000
heap
page read and write
66AB000
unkown
page execute read
400000
unkown
page readonly
6C80000
unkown
page read and write
ED8000
heap
page read and write
5F7A000
unkown
page execute read
2B11000
heap
page read and write
2F00000
heap
page read and write
689F000
unkown
page execute read
3116000
heap
page read and write
58B6000
unkown
page execute read
31C3000
heap
page read and write
2A45000
direct allocation
page read and write
64F4000
unkown
page execute read
698C000
unkown
page execute read
2AAB000
direct allocation
page read and write
306F000
heap
page read and write
2B21000
heap
page read and write
2BD1000
heap
page read and write
773C000
direct allocation
page read and write
547A000
unkown
page execute read
2B11000
heap
page read and write
6CD2000
unkown
page read and write
2BD1000
heap
page read and write
30E3000
heap
page read and write
A9C1000
heap
page read and write
1E4000
heap
page read and write
5F78000
unkown
page execute read
334E000
unkown
page read and write
2BD1000
heap
page read and write
5FAA000
unkown
page execute read
5E01000
unkown
page execute read
6209000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
5C88000
unkown
page execute read
2BD1000
heap
page read and write
2BD1000
heap
page read and write
5E42000
unkown
page execute read
2BD1000
heap
page read and write
2B21000
heap
page read and write
2B21000
heap
page read and write
5C4D000
unkown
page execute read
2B11000
heap
page read and write
306C000
heap
page read and write
3300000
heap
page read and write
1C0000
heap
page read and write
31BC000
heap
page read and write
2B00000
heap
page read and write
544E000
stack
page read and write
6D3F000
unkown
page read and write
2A61000
direct allocation
page read and write
6308000
unkown
page execute read
2B11000
direct allocation
page read and write
3D0000
heap
page read and write
4D87000
heap
page read and write
950000
heap
page read and write
31C3000
heap
page read and write
2A5B000
direct allocation
page read and write
2BD1000
heap
page read and write
5F76000
unkown
page execute read
2B21000
heap
page read and write
3099000
heap
page read and write
31FB000
heap
page read and write
5D0E000
unkown
page execute read
2B11000
heap
page read and write
69DA000
unkown
page execute read
5570000
heap
page read and write
2B21000
heap
page read and write
8EAD000
direct allocation
page read and write
959E000
direct allocation
page read and write
900000
heap
page read and write
E9A000
heap
page read and write
2BD1000
heap
page read and write
2BD1000
heap
page read and write
3089000
heap
page read and write
2B21000
heap
page read and write
ACB000
unkown
page read and write
624B000
unkown
page execute read
2B11000
heap
page read and write
31BA000
heap
page read and write
3072000
heap
page read and write
2ABE000
direct allocation
page read and write
77F1000
direct allocation
page read and write
649D000
unkown
page execute read
952E000
direct allocation
page read and write
2BD1000
heap
page read and write
2B21000
heap
page read and write
2B95000
direct allocation
page read and write
2B45000
direct allocation
page read and write
2BD1000
heap
page read and write
97E000
stack
page read and write
6CBC000
unkown
page read and write
77EF000
direct allocation
page read and write
B18000
unkown
page read and write
3072000
heap
page read and write
672B000
unkown
page execute read
60E3000
unkown
page execute read
E7F000
heap
page read and write
8F0000
heap
page read and write
780A000
direct allocation
page read and write
43B0000
heap
page read and write
67AD000
unkown
page execute read
30E3000
heap
page read and write
77BB000
direct allocation
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
778E000
direct allocation
page read and write
2B21000
heap
page read and write
2BD1000
heap
page read and write
8EC9000
direct allocation
page read and write
6544000
unkown
page execute read
2B21000
heap
page read and write
2B11000
heap
page read and write
2BD1000
heap
page read and write
8FD000
stack
page read and write
5F52000
unkown
page execute read
627000
heap
page read and write
2F10000
heap
page read and write
180000
heap
page read and write
2B21000
heap
page read and write
306E000
heap
page read and write
3077000
heap
page read and write
3072000
heap
page read and write
2A21000
direct allocation
page read and write
31AC000
heap
page read and write
9FAF000
stack
page read and write
6ACF000
unkown
page execute read
405000
unkown
page execute read
72B000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
2BD1000
heap
page read and write
3072000
heap
page read and write
2BD1000
heap
page read and write
312A000
heap
page read and write
3072000
heap
page read and write
6C9F000
unkown
page write copy
2B21000
heap
page read and write
31CB000
heap
page read and write
2B21000
heap
page read and write
5E6F000
unkown
page execute read
2B91000
heap
page read and write
B90000
heap
page read and write
8B2E000
stack
page read and write
3380000
heap
page read and write
2B21000
heap
page read and write
60D2000
unkown
page execute read
6C8F000
unkown
page read and write
5F88000
unkown
page execute read
316E000
heap
page read and write
2B21000
heap
page read and write
96000
stack
page read and write
2B21000
heap
page read and write
2B21000
heap
page read and write
2BD1000
heap
page read and write
2BD1000
heap
page read and write
A9A6000
direct allocation
page read and write
2B11000
heap
page read and write
4FC000
stack
page read and write
30E3000
heap
page read and write
2B21000
heap
page read and write
2B11000
heap
page read and write
2BD1000
heap
page read and write
EC6000
heap
page read and write
A958000
direct allocation
page read and write
2BD1000
heap
page read and write
E5E000
heap
page read and write
2B11000
heap
page read and write
6428000
unkown
page execute read
2B21000
heap
page read and write
305C000
heap
page read and write
59C6000
unkown
page execute read
ACF000
unkown
page read and write
31AC000
heap
page read and write
2BD1000
heap
page read and write
5582000
unkown
page execute read
2B28000
direct allocation
page read and write
2B11000
heap
page read and write
9A3D000
heap
page read and write
E50000
heap
page read and write
683B000
unkown
page execute read
7793000
direct allocation
page read and write
2BD1000
heap
page read and write
2B21000
heap
page read and write
5DB6000
unkown
page execute read
3077000
heap
page read and write
29F4000
direct allocation
page read and write
2BD1000
heap
page read and write
306E000
heap
page read and write
95FE000
stack
page read and write
5AB3000
unkown
page execute read
2B21000
heap
page read and write
62CD000
unkown
page execute read
A9B4000
heap
page read and write
B0A000
unkown
page read and write
2A11000
direct allocation
page read and write
2B21000
heap
page read and write
68BD000
unkown
page execute read
AC0000
heap
page read and write
31B0000
heap
page read and write
6C902000
unkown
page write copy
7818000
direct allocation
page read and write
98BE000
stack
page read and write
2B11000
heap
page read and write
2BD1000
heap
page read and write
5969000
unkown
page execute read
2BD1000
heap
page read and write
5561000
unkown
page execute read
76DE000
direct allocation
page read and write
31D1000
heap
page read and write
E4A000
heap
page read and write
77BF000
direct allocation
page read and write
2B21000
heap
page read and write
2A19000
direct allocation
page read and write
2BD1000
heap
page read and write
9566000
direct allocation
page read and write
7787000
direct allocation
page read and write
EAE000
heap
page read and write
2B21000
heap
page read and write
2B11000
heap
page read and write
2BD1000
heap
page read and write
330F000
stack
page read and write
2B21000
heap
page read and write
2B21000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
2BD1000
heap
page read and write
2BD1000
heap
page read and write
773A000
direct allocation
page read and write
6CB6000
unkown
page read and write
312C000
heap
page read and write
E8B000
heap
page read and write
7821000
direct allocation
page read and write
31A0000
heap
page read and write
E90000
heap
page read and write
7733000
direct allocation
page read and write
5A90000
unkown
page execute read
3215000
heap
page read and write
2A97000
direct allocation
page read and write
9B50000
heap
page read and write
2B21000
heap
page read and write
EAB000
heap
page read and write
2B11000
heap
page read and write
306E000
heap
page read and write
779E000
direct allocation
page read and write
2B11000
heap
page read and write
7804000
direct allocation
page read and write
2C50000
heap
page read and write
2D6F000
unkown
page read and write
9623000
direct allocation
page read and write
31BB000
heap
page read and write
31AE000
heap
page read and write
950B000
direct allocation
page read and write
306C000
heap
page read and write
2BD1000
heap
page read and write
6702000
unkown
page execute read
9C5F000
stack
page read and write
94FC000
direct allocation
page read and write
64DB000
unkown
page execute read
3069000
heap
page read and write
31AC000
heap
page read and write
2B11000
heap
page read and write
2B21000
heap
page read and write
9178000
direct allocation
page read and write
99E3000
heap
page read and write
8F77000
stack
page read and write
2B11000
heap
page read and write
2A17000
direct allocation
page read and write
31B5000
heap
page read and write
2B21000
heap
page read and write
779C000
direct allocation
page read and write
2B21000
heap
page read and write
C0E000
stack
page read and write
A9B8000
heap
page read and write
6B95000
unkown
page read and write
2A78000
direct allocation
page read and write
2B21000
heap
page read and write
2B11000
heap
page read and write
ACB000
unkown
page read and write
48A000
unkown
page execute read
7701000
direct allocation
page read and write
2A69000
direct allocation
page read and write
31AC000
heap
page read and write
4D86000
heap
page read and write
43D0000
direct allocation
page execute and read and write
AFD000
unkown
page read and write
8E0000
heap
page read and write
2BD1000
heap
page read and write
19D000
stack
page read and write
2B21000
heap
page read and write
2B21000
heap
page read and write
2B21000
heap
page read and write
9631000
direct allocation
page read and write
2B11000
heap
page read and write
5A13000
unkown
page execute read
A949000
direct allocation
page read and write
3072000
heap
page read and write
96FF000
stack
page read and write
6466000
unkown
page execute read
2BD1000
heap
page read and write
5F16000
unkown
page execute read
306C000
heap
page read and write
6BA2000
unkown
page read and write
77DC000
direct allocation
page read and write
6185000
unkown
page execute read
44A0000
heap
page read and write
E40000
heap
page read and write
306E000
heap
page read and write
2B21000
heap
page read and write
77E6000
direct allocation
page read and write
2B21000
heap
page read and write
5DCC000
unkown
page execute read
769D000
heap
page read and write
5462000
unkown
page execute read
DB4000
heap
page read and write
2B11000
heap
page read and write
5D28000
unkown
page execute read
311E000
heap
page read and write
AB2F000
stack
page read and write
18D000
stack
page read and write
6678000
unkown
page execute read
6A74000
unkown
page execute read
6098000
unkown
page execute read
6EA2F000
unkown
page read and write
2B11000
heap
page read and write
2DC2000
heap
page read and write
9159000
direct allocation
page read and write
2B11000
heap
page read and write
2AE0000
heap
page read and write
2BD1000
heap
page read and write
654C000
unkown
page execute read
7767000
direct allocation
page read and write
3070000
heap
page read and write
2B21000
heap
page read and write
ED8000
heap
page read and write
2B11000
heap
page read and write
2B21000
heap
page read and write
2B21000
heap
page read and write
2B21000
heap
page read and write
2A3D000
direct allocation
page read and write
9E0000
heap
page read and write
5E4E000
unkown
page execute read
7721000
direct allocation
page read and write
E77000
heap
page read and write
6C9D000
heap
page read and write
6C690000
unkown
page readonly
2B11000
heap
page read and write
9520000
direct allocation
page read and write
2B11000
heap
page read and write
3060000
heap
page read and write
783D000
heap
page read and write
3116000
heap
page read and write
30E3000
heap
page read and write
2AB2000
direct allocation
page read and write
2BD1000
heap
page read and write
2B21000
heap
page read and write
2BD1000
heap
page read and write
2B11000
heap
page read and write
4D87000
heap
page read and write
2BD1000
heap
page read and write
31B4000
heap
page read and write
2B21000
heap
page read and write
7770000
direct allocation
page read and write
9E80000
trusted library allocation
page read and write
2BD1000
heap
page read and write
31AF000
heap
page read and write
2B21000
heap
page read and write
2B11000
heap
page read and write
2A71000
direct allocation
page read and write
2B11000
heap
page read and write
3116000
heap
page read and write
2B11000
heap
page read and write
2BD1000
heap
page read and write
5FA7000
unkown
page execute read
2BD1000
heap
page read and write
63CB000
unkown
page execute read
7784000
direct allocation
page read and write
6C901000
unkown
page read and write
9A1E000
heap
page read and write
3072000
heap
page read and write
2B21000
heap
page read and write
2BD1000
heap
page read and write
2BD1000
heap
page read and write
305E000
heap
page read and write
309B000
heap
page read and write
2B21000
heap
page read and write
2A3D000
direct allocation
page read and write
2B11000
heap
page read and write
AA2E000
stack
page read and write
30E3000
heap
page read and write
4AC0000
heap
page read and write
2BD1000
heap
page read and write
31BD000
heap
page read and write
2BD1000
heap
page read and write
2B21000
heap
page read and write
A9D0000
heap
page read and write
55AA000
unkown
page execute read
6CC8000
unkown
page write copy
E8B000
heap
page read and write
2B21000
heap
page read and write
B0A000
unkown
page read and write
2B21000
heap
page read and write
4B4F000
stack
page read and write
6EA00000
unkown
page readonly
2A85000
heap
page read and write
31AC000
heap
page read and write
5BC3000
unkown
page execute read
2BD1000
heap
page read and write
2BD1000
heap
page read and write
2B21000
heap
page read and write
5C68000
unkown
page execute read
61EB000
unkown
page execute read
2BD1000
heap
page read and write
113E000
stack
page read and write
2A2F000
direct allocation
page read and write
2B21000
heap
page read and write
620000
heap
page read and write
AB3000
unkown
page read and write
2EAB000
stack
page read and write
7768000
direct allocation
page read and write
2B58000
heap
page read and write
2B11000
heap
page read and write
2B21000
heap
page read and write
2BD1000
heap
page read and write
306E000
heap
page read and write
31CB000
heap
page read and write
5987000
unkown
page execute read
77C9000
direct allocation
page read and write
316E000
stack
page read and write
77A4000
direct allocation
page read and write
2B11000
heap
page read and write
306C000
heap
page read and write
31B3000
heap
page read and write
2B11000
heap
page read and write
6CA8000
unkown
page write copy
2BD1000
heap
page read and write
F41000
heap
page read and write
2A8D000
direct allocation
page read and write
9A33000
heap
page read and write
30BF000
heap
page read and write
7757000
direct allocation
page read and write
2BD1000
heap
page read and write
31CF000
stack
page read and write
E78000
heap
page read and write
2B21000
heap
page read and write
76FE000
direct allocation
page read and write
64F6000
unkown
page execute read
85D000
stack
page read and write
77E0000
direct allocation
page read and write
306B000
heap
page read and write
306E000
heap
page read and write
15C000
stack
page read and write
2A95000
direct allocation
page read and write
308E000
unkown
page read and write
2B21000
heap
page read and write
8C0000
heap
page read and write
99E000
stack
page read and write
2BD1000
heap
page read and write
94BF000
stack
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
6C71000
unkown
page read and write
5550000
heap
page read and write
31AC000
heap
page read and write
6783000
unkown
page execute read
697B000
unkown
page execute read
2A4B000
direct allocation
page read and write
9BA0000
heap
page read and write
77F6000
direct allocation
page read and write
3030000
heap
page read and write
2B01000
direct allocation
page read and write
2F3D000
stack
page read and write
6D4A000
unkown
page read and write
6648000
unkown
page execute read
2B11000
heap
page read and write
6CBA000
unkown
page write copy
2BD1000
heap
page read and write
2BD1000
heap
page read and write
306E000
heap
page read and write
E80000
heap
page read and write
8EAF000
direct allocation
page read and write
1D0000
heap
page read and write
7718000
direct allocation
page read and write
A70000
heap
page read and write
6443000
unkown
page execute read
2B11000
heap
page read and write
56B6000
unkown
page execute read
9152000
direct allocation
page read and write
31F0000
heap
page read and write
31BB000
heap
page read and write
6EA29000
unkown
page read and write
9BB000
stack
page read and write
2BD1000
heap
page read and write
29E7000
direct allocation
page read and write
6C914000
unkown
page read and write
E7B000
heap
page read and write
31B1000
heap
page read and write
6D50000
unkown
page read and write
643C000
unkown
page execute read
AB3000
unkown
page read and write
32B5000
heap
page read and write
306C000
heap
page read and write
3059000
heap
page read and write
2B21000
heap
page read and write
771F000
direct allocation
page read and write
2AED000
direct allocation
page read and write
6C7A000
unkown
page read and write
2B11000
heap
page read and write
306E000
heap
page read and write
31BC000
heap
page read and write
720000
heap
page read and write
312C000
heap
page read and write
94F7000
direct allocation
page read and write
90E000
unkown
page read and write
3116000
heap
page read and write
96000
stack
page read and write
2B11000
heap
page read and write
4D76000
heap
page read and write
F20000
heap
page read and write
2B21000
heap
page read and write
2BD1000
heap
page read and write
2B21000
heap
page read and write
8ED9000
direct allocation
page read and write
5AD6000
unkown
page execute read
5AD1000
unkown
page execute read
2BD1000
heap
page read and write
31AC000
heap
page read and write
29F4000
direct allocation
page read and write
3070000
heap
page read and write
2D60000
heap
page read and write
2B21000
heap
page read and write
5410000
heap
page read and write
2B11000
heap
page read and write
99B4000
heap
page read and write
2B21000
heap
page read and write
2B21000
heap
page read and write
AA0A000
heap
page read and write
2B21000
heap
page read and write
5F5E000
unkown
page execute read
480000
heap
page read and write
6C9C000
unkown
page read and write
2B11000
heap
page read and write
99D6000
heap
page read and write
5AAE000
unkown
page execute read
2B11000
heap
page read and write
2B21000
heap
page read and write
31AC000
heap
page read and write
599E000
unkown
page execute read
2BD1000
heap
page read and write
2BD1000
heap
page read and write
2BD1000
heap
page read and write
3076000
heap
page read and write
5D07000
unkown
page execute read
31BC000
heap
page read and write
3129000
heap
page read and write
2F9F000
stack
page read and write
B29000
unkown
page read and write
31B3000
heap
page read and write
2B1E000
stack
page read and write
3072000
heap
page read and write
4D87000
heap
page read and write
31C0000
heap
page read and write
5D5D000
unkown
page execute read
850000
heap
page read and write
2B11000
heap
page read and write
2BD1000
heap
page read and write
E98000
heap
page read and write
94F1000
direct allocation
page read and write
2BD1000
heap
page read and write
2B21000
heap
page read and write
2B21000
heap
page read and write
2B21000
heap
page read and write
2B21000
heap
page read and write
2BD1000
heap
page read and write
2B11000
heap
page read and write
2EDF000
stack
page read and write
2B21000
heap
page read and write
E30000
heap
page read and write
34CA000
heap
page read and write
2E20000
heap
page read and write
99BF000
stack
page read and write
9700000
trusted library allocation
page read and write
43B0000
heap
page read and write
5B55000
unkown
page execute read
2B21000
heap
page read and write
31BF000
stack
page read and write
2B21000
heap
page read and write
6053000
unkown
page execute read
77EA000
direct allocation
page read and write
2B21000
direct allocation
page read and write
311E000
heap
page read and write
2B11000
heap
page read and write
2A95000
direct allocation
page read and write
30E3000
heap
page read and write
6C85D000
unkown
page readonly
2DAC000
stack
page read and write
400000
unkown
page readonly
312C000
heap
page read and write
AB3000
unkown
page read and write
2BD1000
heap
page read and write
3087000
heap
page read and write
31CB000
heap
page read and write
2AE5000
direct allocation
page read and write
31BB000
heap
page read and write
2BD1000
heap
page read and write
7777000
direct allocation
page read and write
7796000
direct allocation
page read and write
2BD1000
heap
page read and write
B9B000
stack
page read and write
2B30000
heap
page read and write
955B000
direct allocation
page read and write
5DFE000
unkown
page execute read
AD2000
unkown
page read and write
2BD1000
heap
page read and write
AA22000
heap
page read and write
64C9000
unkown
page execute read
2AC1000
direct allocation
page read and write
30E3000
heap
page read and write
642A000
unkown
page execute read
307B000
heap
page read and write
2A78000
direct allocation
page read and write
2B21000
heap
page read and write
306C000
heap
page read and write
2C33000
heap
page read and write
3127000
heap
page read and write
1E4000
heap
page read and write
F2A000
heap
page read and write
2BD1000
heap
page read and write
941B000
stack
page read and write
31AC000
heap
page read and write
75F000
stack
page read and write
776E000
direct allocation
page read and write
3087000
heap
page read and write
31EE000
stack
page read and write
5DDB000
unkown
page execute read
49C0000
heap
page read and write
76C0000
direct allocation
page read and write
5580000
unkown
page execute read
77D8000
direct allocation
page read and write
3072000
heap
page read and write
2A4C000
direct allocation
page read and write
30E3000
heap
page read and write
659D000
unkown
page execute read
312C000
heap
page read and write
ABC000
unkown
page read and write
EC7000
heap
page read and write
2B21000
heap
page read and write
2DD0000
heap
page read and write
77B4000
direct allocation
page read and write
3089000
heap
page read and write
7743000
direct allocation
page read and write
6D59000
unkown
page write copy
5440000
heap
page read and write
77E3000
direct allocation
page read and write
306E000
heap
page read and write
306E000
heap
page read and write
31B2000
heap
page read and write
62B3000
unkown
page execute read
B6F000
stack
page read and write
306C000
heap
page read and write
5BC5000
unkown
page execute read
2BD1000
heap
page read and write
30E3000
heap
page read and write
954E000
direct allocation
page read and write
2B71000
direct allocation
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
2B21000
heap
page read and write
2EEC000
stack
page read and write
B16000
unkown
page read and write
2BD1000
heap
page read and write
EBE000
heap
page read and write
2A0A000
direct allocation
page read and write
2B20000
heap
page read and write
29DE000
stack
page read and write
5B72000
unkown
page execute read
31BB000
heap
page read and write
306C000
heap
page read and write
A10000
heap
page read and write
5592000
unkown
page execute read
29A4000
direct allocation
page read and write
EC1000
heap
page read and write
5592000
unkown
page execute read
5E66000
unkown
page execute read
2FBE000
stack
page read and write
2A90000
direct allocation
page read and write
AF8000
unkown
page read and write
6B57000
unkown
page execute read
68CA000
unkown
page execute read
779B000
direct allocation
page read and write
5C7E000
unkown
page execute read
30E3000
heap
page read and write
2B11000
heap
page read and write
2B21000
heap
page read and write
58C000
stack
page read and write
30E3000
heap
page read and write
29FF000
direct allocation
page read and write
31C3000
heap
page read and write
6D5E000
unkown
page readonly
30F0000
heap
page read and write
2B40000
heap
page read and write
2DDE000
stack
page read and write
2BD1000
heap
page read and write
770C000
direct allocation
page read and write
E87000
heap
page read and write
8EA6000
direct allocation
page read and write
2BD1000
heap
page read and write
7803000
direct allocation
page read and write
5591000
unkown
page execute and read and write
920000
heap
page read and write
2B70000
heap
page read and write
2B11000
heap
page read and write
6C91000
unkown
page read and write
2B11000
heap
page read and write
EF6000
heap
page read and write
C0E000
stack
page read and write
BA0000
heap
page read and write
6CB2000
unkown
page read and write
2B21000
heap
page read and write
2B11000
heap
page read and write
6C691000
unkown
page execute read
2B21000
heap
page read and write
5430000
direct allocation
page execute and read and write
2B11000
heap
page read and write
2B21000
heap
page read and write
6448000
unkown
page execute read
B80000
heap
page read and write
5410000
heap
page read and write
2B21000
heap
page read and write
6C25000
unkown
page read and write
2AAF000
direct allocation
page read and write
2B23000
heap
page read and write
2B11000
heap
page read and write
33B0000
heap
page read and write
3072000
heap
page read and write
30AC000
heap
page read and write
2B8D000
direct allocation
page read and write
5550000
heap
page read and write
43D0000
direct allocation
page execute and read and write
2B21000
heap
page read and write
2BD1000
heap
page read and write
AEC000
unkown
page write copy
2B11000
heap
page read and write
3089000
heap
page read and write
554F000
stack
page read and write
306C000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
2B21000
heap
page read and write
60A0000
unkown
page execute read
76F6000
direct allocation
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
9FC000
stack
page read and write
2D8E000
stack
page read and write
77CD000
direct allocation
page read and write
AB0000
heap
page read and write
99F7000
heap
page read and write
2B21000
heap
page read and write
3090000
heap
page read and write
34DC000
heap
page read and write
6193000
unkown
page execute read
306C000
heap
page read and write
2B21000
heap
page read and write
31C3000
heap
page read and write
5EAE000
unkown
page execute read
2B11000
heap
page read and write
EDF000
heap
page read and write
3060000
heap
page read and write
2BD1000
heap
page read and write
9CFD000
trusted library allocation
page read and write
2B11000
heap
page read and write
2B3D000
direct allocation
page read and write
61B5000
unkown
page execute read
2BD1000
heap
page read and write
2E3D000
stack
page read and write
2BD1000
heap
page read and write
3350000
heap
page read and write
5A45000
unkown
page execute read
3074000
heap
page read and write
778E000
direct allocation
page read and write
4D96000
heap
page read and write
5873000
unkown
page execute read
7828000
direct allocation
page read and write
9D00000
trusted library allocation
page read and write
6C691000
unkown
page execute read
2BD1000
heap
page read and write
7780000
direct allocation
page read and write
76FD000
direct allocation
page read and write
2B11000
heap
page read and write
5CBC000
unkown
page execute read
2B21000
heap
page read and write
8C2E000
stack
page read and write
770A000
direct allocation
page read and write
2B21000
heap
page read and write
2BD1000
heap
page read and write
6568000
unkown
page execute read
2B11000
heap
page read and write
48A0000
heap
page read and write
77B8000
direct allocation
page read and write
2BD1000
heap
page read and write
9AFC000
stack
page read and write
E87000
heap
page read and write
31B3000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
31AC000
heap
page read and write
5DE000
stack
page read and write
77DF000
direct allocation
page read and write
2B21000
heap
page read and write
5E8E000
unkown
page execute read
2B11000
heap
page read and write
2B21000
heap
page read and write
2BAE000
stack
page read and write
A5E000
stack
page read and write
2BD1000
heap
page read and write
65D2000
unkown
page execute read
6EA32000
unkown
page readonly
311F000
heap
page read and write
6FE6F000
unkown
page read and write
6B86000
unkown
page read and write
2F0A000
heap
page read and write
306B000
heap
page read and write
608A000
unkown
page execute read
2B11000
heap
page read and write
2B11000
heap
page read and write
2C60000
heap
page read and write
2B21000
heap
page read and write
2D73000
heap
page read and write
76E0000
direct allocation
page read and write
2B21000
heap
page read and write
3072000
heap
page read and write
5580000
unkown
page readonly
2BD1000
heap
page read and write
E9C000
heap
page read and write
A10000
heap
page read and write
7750000
direct allocation
page read and write
30E3000
heap
page read and write
B2E000
stack
page read and write
3120000
heap
page read and write
2BD1000
heap
page read and write
2BD1000
heap
page read and write
2F5E000
stack
page read and write
2BD1000
heap
page read and write
2B21000
heap
page read and write
31B3000
heap
page read and write
63B9000
unkown
page execute read
29DE000
direct allocation
page read and write
DB4000
heap
page read and write
6B6A000
unkown
page read and write
2BD1000
heap
page read and write
B28000
unkown
page write copy
305A000
heap
page read and write
741000
heap
page read and write
2B21000
heap
page read and write
34C0000
heap
page read and write
2BD1000
heap
page read and write
2B69000
direct allocation
page read and write
6E3F000
unkown
page readonly
30E3000
heap
page read and write
2BD1000
heap
page read and write
587F000
unkown
page execute read
A967000
direct allocation
page read and write
2B21000
heap
page read and write
2BD1000
heap
page read and write
2B11000
heap
page read and write
8EE7000
stack
page read and write
31AC000
heap
page read and write
2BD1000
heap
page read and write
2BD1000
heap
page read and write
3120000
heap
page read and write
DFE000
stack
page read and write
2A8D000
direct allocation
page read and write
30E3000
heap
page read and write
31AC000
heap
page read and write
2AEC000
direct allocation
page read and write
307F000
heap
page read and write
2B21000
heap
page read and write
4D87000
heap
page read and write
9465000
direct allocation
page read and write
58D000
heap
page read and write
31B4000
heap
page read and write
2AEB000
heap
page read and write
30E3000
heap
page read and write
8EAA000
direct allocation
page read and write
2BD1000
heap
page read and write
42C000
unkown
page execute read
2B11000
heap
page read and write
2BD1000
heap
page read and write
3077000
heap
page read and write
E98000
heap
page read and write
3C0000
heap
page read and write
29E6000
direct allocation
page read and write
2B21000
heap
page read and write
31AC000
heap
page read and write
76E8000
direct allocation
page read and write
945E000
direct allocation
page read and write
66AD000
unkown
page execute read
772A000
direct allocation
page read and write
4C6F000
stack
page read and write
2A02000
direct allocation
page read and write
2BD1000
heap
page read and write
2BD1000
heap
page read and write
77AC000
direct allocation
page read and write
2B11000
heap
page read and write
A9BF000
heap
page read and write
2A36000
direct allocation
page read and write
2B21000
heap
page read and write
2B11000
heap
page read and write
608F000
unkown
page execute read
6CA5000
unkown
page read and write
6677000
unkown
page execute read
61E2000
unkown
page execute read
2ACF000
direct allocation
page read and write
B29000
unkown
page read and write
6EA25000
unkown
page readonly
9169000
direct allocation
page read and write
8ED1000
direct allocation
page read and write
316D000
heap
page read and write
2B21000
heap
page read and write
ECD000
heap
page read and write
2B11000
heap
page read and write
2B21000
heap
page read and write
2BD0000
heap
page read and write
30E3000
heap
page read and write
2BD1000
heap
page read and write
3070000
heap
page read and write
31BB000
heap
page read and write
ECD000
heap
page read and write
3120000
heap
page read and write
3060000
heap
page read and write
2C30000
heap
page read and write
2B11000
heap
page read and write
77E8000
direct allocation
page read and write
2B11000
heap
page read and write
77FD000
direct allocation
page read and write
F37000
heap
page read and write
2B11000
heap
page read and write
2BD1000
heap
page read and write
2B21000
heap
page read and write
5589000
unkown
page execute and read and write
E98000
heap
page read and write
2B21000
heap
page read and write
306C000
heap
page read and write
29C7000
direct allocation
page read and write
2A71000
direct allocation
page read and write
93BD000
stack
page read and write
2B21000
heap
page read and write
2B11000
heap
page read and write
EDB000
heap
page read and write
2B11000
heap
page read and write
6B61000
unkown
page read and write
3116000
heap
page read and write
2BD1000
heap
page read and write
2BD1000
heap
page read and write
2BD1000
heap
page read and write
2B21000
heap
page read and write
3072000
heap
page read and write
2B11000
heap
page read and write
2AC8000
direct allocation
page read and write
303A000
heap
page read and write
2BD1000
heap
page read and write
6D35000
unkown
page read and write
3097000
heap
page read and write
900000
heap
page read and write
B31000
unkown
page readonly
B1C000
unkown
page read and write
306C000
heap
page read and write
43C0000
heap
page read and write
99C5000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
570000
heap
page read and write
36CF000
unkown
page read and write
2A9C000
direct allocation
page read and write
6902000
unkown
page execute read
ACB000
unkown
page write copy
30B0000
heap
page read and write
2B21000
heap
page read and write
2B21000
heap
page read and write
2B11000
heap
page read and write
309B000
heap
page read and write
2B11000
heap
page read and write
77D9000
direct allocation
page read and write
2BD1000
heap
page read and write
A784000
heap
page read and write
2B11000
heap
page read and write
ACB000
unkown
page read and write
2D95000
heap
page read and write
6643000
unkown
page execute read
ED5000
heap
page read and write
306E000
heap
page read and write
2B11000
heap
page read and write
31B3000
heap
page read and write
B13000
unkown
page read and write
498E000
stack
page read and write
306F000
heap
page read and write
5EEB000
unkown
page execute read
E4E000
heap
page read and write
B0E000
unkown
page read and write
6964000
unkown
page execute read
EA2000
heap
page read and write
94E3000
direct allocation
page read and write
2B02000
direct allocation
page read and write
937F000
stack
page read and write
2B11000
heap
page read and write
338F000
stack
page read and write
E65000
heap
page read and write
AB6000
unkown
page read and write
2B21000
heap
page read and write
31AC000
heap
page read and write
306C000
heap
page read and write
772D000
direct allocation
page read and write
DB4000
heap
page read and write
2E2A000
heap
page read and write
31AC000
heap
page read and write
61E000
stack
page read and write
2BA3000
direct allocation
page read and write
997F000
stack
page read and write
59F6000
unkown
page execute read
6C85D000
unkown
page readonly
602D000
unkown
page execute read
2B11000
heap
page read and write
2B11000
heap
page read and write
1E4000
heap
page read and write
4D87000
heap
page read and write
34D0000
heap
page read and write
2B21000
heap
page read and write
306B000
heap
page read and write
6759000
unkown
page execute read
3076000
heap
page read and write
569A000
unkown
page execute read
2F70000
heap
page read and write
619F000
unkown
page execute read
93E0000
direct allocation
page read and write
370000
heap
page read and write
2B21000
heap
page read and write
307B000
heap
page read and write
4AC000
unkown
page execute read
31BB000
heap
page read and write
2BD1000
heap
page read and write
4C72000
heap
page read and write
2A9C000
direct allocation
page read and write
2B21000
heap
page read and write
3070000
heap
page read and write
30E3000
heap
page read and write
91BE000
stack
page read and write
2B21000
heap
page read and write
2B11000
heap
page read and write
A9B0000
heap
page read and write
31AB000
heap
page read and write
4D66000
heap
page read and write
77C2000
direct allocation
page read and write
2B21000
heap
page read and write
6072000
heap
page read and write
31AC000
heap
page read and write
2B21000
heap
page read and write
AD2000
unkown
page read and write
9C0000
heap
page read and write
2B11000
heap
page read and write
C0E000
stack
page read and write
2BD1000
heap
page read and write
ECE000
heap
page read and write
5DEB000
unkown
page execute read
320E000
stack
page read and write
2B11000
heap
page read and write
EC7000
heap
page read and write
6B56000
unkown
page execute read
77C3000
direct allocation
page read and write
6FE69000
unkown
page read and write
598F000
unkown
page execute read
401000
unkown
page execute read
2B11000
heap
page read and write
6B8C000
unkown
page read and write
ACF000
unkown
page read and write
31AC000
heap
page read and write
6D54000
unkown
page read and write
B16000
unkown
page read and write
2B27000
heap
page read and write
2D40000
heap
page read and write
6A9C000
unkown
page execute read
7731000
direct allocation
page read and write
2B11000
heap
page read and write
AD2000
unkown
page read and write
2B21000
heap
page read and write
2B11000
heap
page read and write
8FBE000
stack
page read and write
2B11000
heap
page read and write
2B21000
heap
page read and write
1D0000
heap
page read and write
2BD1000
heap
page read and write
3120000
heap
page read and write
29BE000
direct allocation
page read and write
2BD1000
heap
page read and write
306E000
heap
page read and write
AB6000
unkown
page read and write
A0EC000
stack
page read and write
2A86000
direct allocation
page read and write
2DA0000
heap
page read and write
2B11000
heap
page read and write
2B21000
heap
page read and write
6C915000
unkown
page readonly
69AF000
unkown
page execute read
6CF9000
unkown
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
67DD000
unkown
page execute read
B1A000
unkown
page read and write
EA3000
heap
page read and write
2B21000
heap
page read and write
A1EF000
stack
page read and write
5CDB000
unkown
page execute read
2B11000
heap
page read and write
F36000
heap
page read and write
2B4C000
direct allocation
page read and write
62ED000
unkown
page execute read
2BD1000
heap
page read and write
43A0000
heap
page read and write
306E000
heap
page read and write
31B4000
heap
page read and write
BCA000
heap
page read and write
89C000
stack
page read and write
3070000
heap
page read and write
6342000
unkown
page execute read
2B78000
direct allocation
page read and write
2B21000
heap
page read and write
62A3000
unkown
page execute read
5BA0000
unkown
page execute read
7751000
direct allocation
page read and write
2B86000
direct allocation
page read and write
2BD1000
heap
page read and write
7777000
direct allocation
page read and write
303F000
stack
page read and write
5A58000
unkown
page execute read
57F000
heap
page read and write
7813000
direct allocation
page read and write
2B21000
heap
page read and write
2BD1000
heap
page read and write
927B000
stack
page read and write
653A000
unkown
page execute read
306C000
heap
page read and write
2A69000
direct allocation
page read and write
4D87000
heap
page read and write
2C20000
heap
page read and write
5479000
unkown
page execute and read and write
6365000
unkown
page execute read
5F0E000
unkown
page execute read
5B6E000
unkown
page execute read
306C000
heap
page read and write
306C000
heap
page read and write
77BB000
direct allocation
page read and write
43D0000
direct allocation
page execute and read and write
312C000
heap
page read and write
6C8FF000
unkown
page read and write
30F0000
heap
page read and write
2BD1000
heap
page read and write
63C3000
unkown
page execute read
3079000
heap
page read and write
2B21000
heap
page read and write
308F000
stack
page read and write
2BD1000
heap
page read and write
E5A000
heap
page read and write
6C67000
unkown
page execute read
2AA4000
direct allocation
page read and write
6D0A000
unkown
page read and write
ACB000
stack
page read and write
6C98000
unkown
page write copy
31B3000
heap
page read and write
2B11000
heap
page read and write
89E000
unkown
page read and write
7758000
direct allocation
page read and write
2B21000
heap
page read and write
3120000
heap
page read and write
BDA000
stack
page read and write
2E1F000
stack
page read and write
30E3000
heap
page read and write
2B11000
heap
page read and write
777E000
direct allocation
page read and write
2E44000
heap
page read and write
31AB000
heap
page read and write
2BD1000
heap
page read and write
2B11000
heap
page read and write
2BD1000
heap
page read and write
2B36000
direct allocation
page read and write
2E9E000
stack
page read and write
2BD1000
heap
page read and write
2B11000
heap
page read and write
ACF000
unkown
page read and write
31AC000
heap
page read and write
5430000
direct allocation
page execute and read and write
8B9E000
stack
page read and write
2B11000
heap
page read and write
A9F000
stack
page read and write
5A79000
unkown
page execute read
1E0000
heap
page read and write
29AF000
direct allocation
page read and write
68ED000
unkown
page execute read
8DF000
unkown
page read and write
9299000
direct allocation
page read and write
328F000
stack
page read and write
2BD1000
heap
page read and write
31BB000
heap
page read and write
2B21000
heap
page read and write
E70000
heap
page read and write
770E000
direct allocation
page read and write
7786000
direct allocation
page read and write
9A36000
heap
page read and write
77AB000
direct allocation
page read and write
334E000
stack
page read and write
6787000
unkown
page execute read
3074000
heap
page read and write
32FD000
stack
page read and write
2BD1000
heap
page read and write
2B21000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
2B21000
heap
page read and write
6C690000
unkown
page readonly
2B11000
heap
page read and write
2BD1000
heap
page read and write
55A9000
unkown
page execute and read and write
3079000
heap
page read and write
2BD1000
heap
page read and write
3070000
heap
page read and write
2F50000
heap
page read and write
A9C7000
heap
page read and write
2A54000
direct allocation
page read and write
2A44000
direct allocation
page read and write
30A3000
heap
page read and write
5F1D000
unkown
page execute read
2B11000
heap
page read and write
2B21000
heap
page read and write
92A1000
direct allocation
page read and write
2B21000
heap
page read and write
2B21000
heap
page read and write
B16000
unkown
page read and write
2B21000
heap
page read and write
316E000
heap
page read and write
77D4000
direct allocation
page read and write
6418000
unkown
page execute read
7761000
direct allocation
page read and write
2BD1000
heap
page read and write
3074000
heap
page read and write
E30000
heap
page read and write
30BB000
heap
page read and write
31BC000
heap
page read and write
613A000
unkown
page execute read
9456000
direct allocation
page read and write
305F000
heap
page read and write
306E000
heap
page read and write
69BF000
unkown
page execute read
349E000
stack
page read and write
99CB000
heap
page read and write
2BD1000
heap
page read and write
2B11000
heap
page read and write
2BD1000
heap
page read and write
67E7000
unkown
page execute read
77A5000
direct allocation
page read and write
6CC5000
unkown
page read and write
6493000
unkown
page execute read
AA1F000
heap
page read and write
5692000
unkown
page execute read
2BD1000
heap
page read and write
5470000
unkown
page execute read
2B21000
heap
page read and write
6C900000
unkown
page write copy
306B000
heap
page read and write
F1C000
heap
page read and write
BC0000
heap
page read and write
306C000
heap
page read and write
2BD1000
heap
page read and write
66E2000
unkown
page execute read
31AC000
heap
page read and write
99B0000
heap
page read and write
955D000
direct allocation
page read and write
94A7000
direct allocation
page read and write
2B21000
heap
page read and write
2B21000
heap
page read and write
AB6000
unkown
page read and write
31BB000
heap
page read and write
306C000
heap
page read and write
306C000
heap
page read and write
5C11000
unkown
page execute read
4D87000
heap
page read and write
54D000
stack
page read and write
307E000
stack
page read and write
31AF000
heap
page read and write
31B9000
heap
page read and write
316E000
heap
page read and write
6806000
unkown
page execute read
5A62000
unkown
page execute read
31BB000
heap
page read and write
64F5000
unkown
page execute read
30E3000
heap
page read and write
7716000
direct allocation
page read and write
ABC000
unkown
page read and write
95A5000
direct allocation
page read and write
2B11000
heap
page read and write
66D7000
unkown
page execute read
3070000
heap
page read and write
3072000
heap
page read and write
2BD1000
heap
page read and write
3175000
heap
page read and write
2BD1000
heap
page read and write
2B11000
heap
page read and write
DB0000
heap
page read and write
2B21000
heap
page read and write
AFD000
unkown
page read and write
30A0000
heap
page read and write
2B11000
heap
page read and write
306B000
heap
page read and write
6C2C000
unkown
page read and write
77CB000
direct allocation
page read and write
6B13000
unkown
page execute read
2BD1000
heap
page read and write
5BE1000
unkown
page execute read
31BB000
heap
page read and write
8F2E000
stack
page read and write
775E000
direct allocation
page read and write
77A2000
direct allocation
page read and write
3120000
heap
page read and write
7741000
direct allocation
page read and write
2B21000
heap
page read and write
2B11000
heap
page read and write
2BB0000
heap
page read and write
306B000
heap
page read and write
31B1000
heap
page read and write
92BE000
stack
page read and write
5E1E000
unkown
page execute read
2B11000
heap
page read and write
63E6000
unkown
page execute read
2B21000
heap
page read and write
2B11000
heap
page read and write
ADF000
unkown
page write copy
2AFB000
direct allocation
page read and write
D90000
heap
page read and write
F3C000
heap
page read and write
2B11000
heap
page read and write
5BD000
stack
page read and write
3240000
heap
page read and write
D50000
heap
page read and write
6CA3000
unkown
page write copy
47F000
unkown
page read and write
30FA000
heap
page read and write
5FFE000
unkown
page execute read
2BD1000
heap
page read and write
5B01000
unkown
page execute read
E8E000
heap
page read and write
F2D000
heap
page read and write
414000
unkown
page execute read
306E000
heap
page read and write
E20000
heap
page read and write
59C6000
unkown
page execute read
ED7000
heap
page read and write
41C000
unkown
page execute read
19A000
stack
page read and write
9A11000
heap
page read and write
99DA000
heap
page read and write
6D60000
unkown
page readonly
3070000
heap
page read and write
5EC000
stack
page read and write
EBF000
heap
page read and write
312C000
heap
page read and write
2BD1000
heap
page read and write
31AF000
unkown
page read and write
2D6B000
stack
page read and write
2B21000
heap
page read and write
2A86000
direct allocation
page read and write
2B21000
heap
page read and write
99B8000
heap
page read and write
8A9E000
stack
page read and write
11D000
stack
page read and write
5672000
heap
page read and write
F4E000
heap
page read and write
6936000
unkown
page execute read
99C2000
heap
page read and write
2B11000
heap
page read and write
2BD1000
heap
page read and write
2B11000
heap
page read and write
2B11000
heap
page read and write
2B09000
direct allocation
page read and write
2B21000
heap
page read and write
3093000
heap
page read and write
4D76000
heap
page read and write
3099000
heap
page read and write
2DCE000
stack
page read and write
5809000
heap
page read and write
6452000
unkown
page execute read
5CAF000
unkown
page execute read
190000
heap
page read and write
3128000
heap
page read and write
6A46000
unkown
page execute read
2B11000
heap
page read and write
2AD6000
direct allocation
page read and write
2BD1000
heap
page read and write
305E000
heap
page read and write
2B03000
heap
page read and write
2B21000
heap
page read and write
686B000
unkown
page execute read
56A2000
unkown
page execute read
11C000
stack
page read and write
306C000
heap
page read and write
840000
heap
page read and write
3072000
heap
page read and write
6CA0000
unkown
page read and write
6FE65000
unkown
page readonly
5F11000
unkown
page execute read
2BD1000
heap
page read and write
6E3D000
heap
page read and write
9161000
direct allocation
page read and write
951F000
stack
page read and write
2B11000
heap
page read and write
B08000
unkown
page read and write
5C5B000
unkown
page execute read
6C6F000
unkown
page read and write
2B23000
heap
page read and write
3097000
heap
page read and write
2B11000
heap
page read and write
6B70000
unkown
page read and write
2A36000
direct allocation
page read and write
953F000
direct allocation
page read and write
30E3000
heap
page read and write
660A000
unkown
page execute read
306C000
heap
page read and write
E9D000
heap
page read and write
778B000
direct allocation
page read and write
31AF000
heap
page read and write
2B21000
heap
page read and write
2E10000
heap
page read and write
4D96000
heap
page read and write
2AE5000
heap
page read and write
76EF000
direct allocation
page read and write
930000
heap
page read and write
3060000
heap
page read and write
2A80000
heap
page read and write
2A2E000
direct allocation
page read and write
6EA01000
unkown
page execute read
2BD1000
heap
page read and write
B1C000
unkown
page read and write
7766000
direct allocation
page read and write
2B21000
heap
page read and write
EC6000
heap
page read and write
6D2A000
unkown
page read and write
31BB000
heap
page read and write
3143000
heap
page read and write
2B11000
heap
page read and write
7708000
direct allocation
page read and write
6D3C000
unkown
page read and write
2AD7000
direct allocation
page read and write
1E4000
heap
page read and write
6605000
unkown
page execute read
ABA000
unkown
page read and write
5D98000
unkown
page execute read
9F0000
heap
page read and write
2BD1000
heap
page read and write
2B21000
heap
page read and write
2B11000
heap
page read and write
2BD1000
heap
page read and write
6C900000
unkown
page write copy
2B21000
heap
page read and write
B1C000
unkown
page read and write
31C1000
heap
page read and write
61B0000
unkown
page execute read
2BD1000
heap
page read and write
2A06000
direct allocation
page read and write
2B11000
heap
page read and write
4D87000
heap
page read and write
2FC0000
heap
page read and write
305E000
heap
page read and write
77F8000
direct allocation
page read and write
2B21000
heap
page read and write
6D15000
unkown
page read and write
5FD3000
unkown
page execute read
2B11000
heap
page read and write
A9E4000
heap
page read and write
2B11000
heap
page read and write
2B21000
heap
page read and write
A3C000
stack
page read and write
30C3000
heap
page read and write
97FA000
trusted library allocation
page read and write
7751000
direct allocation
page read and write
77C6000
direct allocation
page read and write
2E6F000
stack
page read and write
5F0000
heap
page read and write
307F000
heap
page read and write
2B11000
heap
page read and write
59D000
stack
page read and write
EDD000
heap
page read and write
2BE1000
heap
page read and write
5D78000
unkown
page execute read
64C2000
unkown
page execute read
6C915000
unkown
page readonly
63FD000
unkown
page execute read
3070000
heap
page read and write
2AA4000
direct allocation
page read and write
306E000
heap
page read and write
6893000
unkown
page execute read
2B11000
heap
page read and write
2B0A000
direct allocation
page read and write
5B9F000
unkown
page execute read
314B000
heap
page read and write
E24000
heap
page read and write
95D000
stack
page read and write
77F4000
direct allocation
page read and write
6558000
unkown
page execute read
2B21000
heap
page read and write
2D40000
heap
page read and write
6163000
unkown
page execute read
987E000
stack
page read and write
2B21000
heap
page read and write
2B11000
heap
page read and write
671A000
unkown
page execute read
348F000
stack
page read and write
76BE000
unkown
page readonly
2D5F000
unkown
page read and write
2B21000
heap
page read and write
2B11000
heap
page read and write
6C90000
unkown
page write copy
316E000
heap
page read and write
30BF000
stack
page read and write
6C914000
unkown
page read and write
2F9D000
stack
page read and write
9DF000
stack
page read and write
777C000
direct allocation
page read and write
6249000
unkown
page execute read
309B000
heap
page read and write
C00000
heap
page read and write
6C901000
unkown
page read and write
2B11000
heap
page read and write
76F6000
direct allocation
page read and write
5FC5000
unkown
page execute read
6A12000
unkown
page execute read
2B11000
heap
page read and write
2B11000
heap
page read and write
31BC000
heap
page read and write
6FE40000
unkown
page readonly
2BD1000
heap
page read and write
944E000
direct allocation
page read and write
2B95000
heap
page read and write
2BD1000
heap
page read and write
2BE2000
heap
page read and write
31B9000
heap
page read and write
8F6E000
stack
page read and write
3076000
heap
page read and write
92A9000
direct allocation
page read and write
2B21000
heap
page read and write
2B21000
heap
page read and write
2B11000
heap
page read and write
30E3000
heap
page read and write
31B0000
heap
page read and write
30E3000
heap
page read and write
30E3000
heap
page read and write
65A3000
unkown
page execute read
2B11000
heap
page read and write
306C000
heap
page read and write
6C902000
unkown
page write copy
ED5000
heap
page read and write
2E5F000
stack
page read and write
6553000
unkown
page execute read
63DD000
unkown
page execute read
31BC000
heap
page read and write
2BD1000
heap
page read and write
87D000
stack
page read and write
31BB000
heap
page read and write
5E51000
unkown
page execute read
2BD1000
heap
page read and write
306E000
heap
page read and write
2B11000
heap
page read and write
2B21000
heap
page read and write
AF8000
unkown
page read and write
6FD000
stack
page read and write
2B21000
heap
page read and write
2B21000
heap
page read and write
76E6000
direct allocation
page read and write
18D000
stack
page read and write
2BD1000
heap
page read and write
781A000
direct allocation
page read and write
629D000
heap
page read and write
607D000
unkown
page execute read
2BD1000
heap
page read and write
67BB000
unkown
page execute read
2BD1000
heap
page read and write
422000
unkown
page execute read
2A0E000
direct allocation
page read and write
5D7E000
unkown
page execute read
2BD1000
heap
page read and write
2B21000
heap
page read and write
3120000
heap
page read and write
6812000
unkown
page execute read
2B11000
heap
page read and write
2D70000
heap
page read and write
2BD1000
heap
page read and write
31BB000
heap
page read and write
E24000
heap
page read and write
9E72000
direct allocation
page read and write
D40000
heap
page read and write
4B0E000
stack
page read and write
2DC5000
heap
page read and write
3077000
heap
page read and write
643D000
heap
page read and write
2B11000
heap
page read and write
2B21000
heap
page read and write
3090000
heap
page read and write
2B22000
heap
page read and write
43E000
unkown
page read and write
6B5F000
unkown
page read and write
2BD1000
heap
page read and write
There are 2005 hidden memdumps, click here to show them.