IOC Report
360total.dll.exe

loading gif

Files

File Path
Type
Category
Malicious
360total.dll.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Custom_update\Update_27361bf8.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_360_886edd4b87b9ecd618b1e464327a85149d5ee8c2_9cecb875_a6f8bd53-9d4e-49b1-a9c1-44db6d88d736\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_360_f6ce5fb8c554a1c5617cb52ea4bda5a5f52864d1_9cecb875_f4e6ccbc-37d4-4f28-84bd-7203eb51c087\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA484.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Apr 26 21:15:07 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA531.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA551.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF9C8.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Apr 26 21:15:29 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFA94.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFAC4.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 20:15:15 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 20:15:15 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 20:15:15 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 20:15:15 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Apr 26 20:15:14 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\360total.dll.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\360total.dll.dll,CreateObject
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\360total.dll.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_27361bf8.dll", #1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\360total.dll.dll,homq
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\360total.dll.dll,RegisterInstallTime
malicious
C:\Windows\System32\cmd.exe
/c ipconfig /all
malicious
C:\Windows\System32\ipconfig.exe
ipconfig /all
malicious
C:\Windows\System32\cmd.exe
/c systeminfo
malicious
C:\Windows\System32\systeminfo.exe
systeminfo
malicious
C:\Windows\System32\cmd.exe
/c nltest /domain_trusts
malicious
C:\Windows\System32\cmd.exe
/c nltest /domain_trusts /all_trusts
malicious
C:\Windows\System32\cmd.exe
/c net view /all /domain
malicious
C:\Windows\System32\net.exe
net view /all /domain
malicious
C:\Windows\System32\cmd.exe
/c net view /all
malicious
C:\Windows\System32\net.exe
net view /all
malicious
C:\Windows\System32\cmd.exe
/c net group "Domain Admins" /domain
malicious
C:\Windows\System32\net.exe
net group "Domain Admins" /domain
malicious
C:\Windows\System32\cmd.exe
/c net config workstation
malicious
C:\Windows\System32\net.exe
net config workstation
malicious
C:\Windows\System32\cmd.exe
/c wmic.exe /node:localhost /namespace:\\root\SecurityCenter2 path AntiVirusProduct Get DisplayName | findstr /V /B /C:displayName || echo No Antivirus installed
malicious
C:\Windows\System32\cmd.exe
/c whoami /groups
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\360total.dll.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6200 -s 456
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=1996,i,16797134848863919888,4031310649045437557,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6200 -s 456
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\nltest.exe
nltest /domain_trusts
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\nltest.exe
nltest /domain_trusts /all_trusts
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\net1.exe
C:\Windows\system32\net1 group "Domain Admins" /domain
C:\Windows\System32\wbem\WMIC.exe
/Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get * /Format:List
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\net1.exe
C:\Windows\system32\net1 config workstation
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WMIC.exe
wmic.exe /node:localhost /namespace:\\root\SecurityCenter2 path AntiVirusProduct Get DisplayName
C:\Windows\System32\findstr.exe
findstr /V /B /C:displayName
C:\Windows\System32\conhost.exe
There are 37 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://startmast.shop/live/
malicious
https://jarinamaers.shop/files/stkm.bin
104.21.46.75
malicious
https://pewwhranet.com/live/
104.21.84.207
malicious
https://jarinamaers.shop/
unknown
malicious
https://grizmotras.com/live/
172.67.219.28
malicious
https://jarinamaers.shop/live/
104.21.46.75
malicious
https://grizmotras.com/c
unknown
https://jarinamaers.shop/ive/dOIDInfo
unknown
https://pewwhranet.com/
unknown
http://pconf.f.360.cn/safe_update.php
unknown
ftp://ftp%2desktop.ini
unknown
https://grizmotras.com/live/My
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgRmgZjcGOKysLEGIjDP9RPIyWXG6yqz56jt32vlp9eant7g-v2niK8akWf-XW5L6XSYUi8PVE7hkJBYZJgyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.250.217.228
https://grizmotras.com/
unknown
https://www.google.com/async/newtab_promos
142.250.217.228
http://upx.sf.net
unknown
https://pewwhranet.com/live/)
unknown
https://grizmotras.com/live/ras.com/live/
unknown
https://grizmotras.com/p
unknown
https://grizmotras.com/live/URLS1https://pewwhranet.com/live/
unknown
https://pewwhranet.com/live/ll
unknown
https://jarinamaers.shop/V%
unknown
https://grizmotras.com/x
unknown
https://grizmotras.com/live/1-0
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.250.217.228
http://pscan.f.360.cn/safe_update.php
unknown
https://grizmotras.com/live/e
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.217.228
http://dr.f.360.cn/scanlist
unknown
https://grizmotras.com/live/d
unknown
https://grizmotras.com/live/3
unknown
http://pscan.f.360.cn/safe_update.phphttp://pconf.f.360.cn/safe_update.phphttp://sconf.f.360.cn/clie
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgRmgZjcGOKysLEGIjCpcmGUPeBLMAxrx6A3m-HmimiV3M4DW_xd1u12h5Ub_NV02_HrDnvzsp-9u9svldcyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.250.217.228
https://grizmotras.com/live/o
unknown
http://sconf.f.360.cn/client_security_conf
unknown
https://pewwhranet.com/l
unknown
http://dr.f.360.cn/scan
unknown
https://jarinamaers.shop/$
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.217.228
https://jarinamaers.shop/files/stkm.binZ&XRr
unknown
https://grizmotras.com/live/6
unknown
There are 31 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
jarinamaers.shop
104.21.46.75
malicious
pewwhranet.com
104.21.84.207
malicious
grizmotras.com
172.67.219.28
malicious
www.google.com
142.250.217.228

IPs

IP
Domain
Country
Malicious
104.21.46.75
jarinamaers.shop
United States
malicious
172.67.219.28
grizmotras.com
United States
malicious
104.21.84.207
pewwhranet.com
United States
malicious
142.250.217.228
www.google.com
United States
192.168.2.4
unknown
unknown
192.168.2.5
unknown
unknown
239.255.255.250
unknown
Reserved

Registry

Path
Value
Malicious
\REGISTRY\A\{54d6a6c9-44b8-de07-578d-768d1f152ecf}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{54d6a6c9-44b8-de07-578d-768d1f152ecf}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{54d6a6c9-44b8-de07-578d-768d1f152ecf}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{54d6a6c9-44b8-de07-578d-768d1f152ecf}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{54d6a6c9-44b8-de07-578d-768d1f152ecf}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{54d6a6c9-44b8-de07-578d-768d1f152ecf}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
OriginalFileName
\REGISTRY\A\{54d6a6c9-44b8-de07-578d-768d1f152ecf}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{54d6a6c9-44b8-de07-578d-768d1f152ecf}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{54d6a6c9-44b8-de07-578d-768d1f152ecf}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{54d6a6c9-44b8-de07-578d-768d1f152ecf}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{54d6a6c9-44b8-de07-578d-768d1f152ecf}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{54d6a6c9-44b8-de07-578d-768d1f152ecf}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{54d6a6c9-44b8-de07-578d-768d1f152ecf}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{54d6a6c9-44b8-de07-578d-768d1f152ecf}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{54d6a6c9-44b8-de07-578d-768d1f152ecf}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
AppxPackageFullName
\REGISTRY\A\{54d6a6c9-44b8-de07-578d-768d1f152ecf}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
AppxPackageRelativeId
\REGISTRY\A\{54d6a6c9-44b8-de07-578d-768d1f152ecf}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{54d6a6c9-44b8-de07-578d-768d1f152ecf}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{54d6a6c9-44b8-de07-578d-768d1f152ecf}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
\REGISTRY\A\{54d6a6c9-44b8-de07-578d-768d1f152ecf}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018400E1FADC7D4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\mlang.dll,-4387
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\mlang.dll,-4407
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
146142F0000
direct allocation
page read and write
malicious
1E3B5500000
direct allocation
page execute and read and write
malicious
1E3B5500000
direct allocation
page execute and read and write
malicious
1E3B5500000
direct allocation
page execute and read and write
malicious
1E3B5500000
direct allocation
page execute and read and write
malicious
237C16B0000
direct allocation
page read and write
malicious
1E3B5130000
direct allocation
page execute and read and write
malicious
1E3B56E0000
direct allocation
page execute and read and write
malicious
1E3B5500000
direct allocation
page execute and read and write
malicious
1E3B5130000
direct allocation
page execute and read and write
malicious
14614300000
direct allocation
page execute and read and write
malicious
1E3B5130000
direct allocation
page execute and read and write
malicious
237C16C0000
direct allocation
page execute and read and write
malicious
14612A05000
heap
page read and write
11D369A6000
heap
page read and write
2056CAF0000
heap
page read and write
1E3B5626000
heap
page read and write
25C163A0000
heap
page read and write
237C16F0000
heap
page read and write
21A87975000
heap
page read and write
2BBB6DBA000
heap
page read and write
2BBB6DB0000
heap
page read and write
1F5FDD97000
heap
page read and write
1E3B5649000
heap
page read and write
21283E4A000
heap
page read and write
18016C000
unkown
page readonly
1BC90B40000
heap
page read and write
2100B6D0000
heap
page read and write
1F5FDB5A000
heap
page read and write
1E3B57C0000
direct allocation
page execute and read and write
1E3B58E0000
direct allocation
page execute and read and write
21283E38000
heap
page read and write
1ABBC4D4000
heap
page read and write
1E3B5940000
direct allocation
page execute and read and write
212840C0000
heap
page read and write
2100B5F0000
heap
page read and write
1F5FE33E000
heap
page read and write
1E3B5780000
direct allocation
page execute and read and write
1F5FDE90000
heap
page read and write
1F5FFBCD000
heap
page read and write
852FE7F000
stack
page read and write
14612A40000
heap
page read and write
26E78950000
heap
page read and write
4E715FF000
unkown
page read and write
1E3B3739000
heap
page read and write
1E3B564F000
heap
page read and write
22AEF8F9000
heap
page read and write
1ABBBFAA000
heap
page read and write
1E3B57A0000
direct allocation
page execute and read and write
1E3B3753000
heap
page read and write
1E3B5CA1000
heap
page read and write
1E3B5609000
heap
page read and write
1BA5F236000
heap
page read and write
1ABBC493000
heap
page read and write
1F5FDB74000
heap
page read and write
21A875B0000
heap
page read and write
1F5FDB5A000
heap
page read and write
1BA5F4C0000
heap
page read and write
1E3B5663000
heap
page read and write
21283E53000
heap
page read and write
22AEF9F0000
heap
page read and write
421777C000
stack
page read and write
1E3B5790000
direct allocation
page execute and read and write
1ABBBDA4000
heap
page read and write
1E3B5657000
heap
page read and write
1E3B5626000
heap
page read and write
852FBDD000
stack
page read and write
23277035000
heap
page read and write
237C31E0000
direct allocation
page execute and read and write
5BE2EFE000
stack
page read and write
16B00730000
heap
page read and write
1E3B5643000
heap
page read and write
237C30B0000
heap
page read and write
CF4E8FE000
stack
page read and write
1ABBBDAC000
heap
page read and write
1E3B565F000
heap
page read and write
25C163A6000
heap
page read and write
1E3B564A000
heap
page read and write
1ABBBE90000
trusted library allocation
page read and write
1E3B5510000
direct allocation
page execute and read and write
1E3B5667000
heap
page read and write
1E3B565B000
heap
page read and write
2B2E0D80000
heap
page read and write
1E3B5653000
heap
page read and write
1E3B5663000
heap
page read and write
1ABBBE90000
trusted library allocation
page read and write
1E3B565B000
heap
page read and write
21A87680000
heap
page read and write
1E3B5663000
heap
page read and write
2A648FD0000
heap
page read and write
237C1540000
heap
page read and write
2100B6F0000
heap
page read and write
1ABBC4D9000
heap
page read and write
21283E4A000
heap
page read and write
1E3B5609000
heap
page read and write
883DB7E000
stack
page read and write
1E3B564F000
heap
page read and write
1E3B5639000
heap
page read and write
1F5FDB09000
heap
page read and write
21A8765D000
heap
page read and write
E1E04FF000
stack
page read and write
1813BAE0000
heap
page read and write
21A87665000
heap
page read and write
1ABBC4CC000
heap
page read and write
1F5FDD9E000
heap
page read and write
1827FBC5000
heap
page read and write
2100B6F5000
heap
page read and write
1E3B3704000
heap
page read and write
2BBB6CF0000
heap
page read and write
1E3B5626000
heap
page read and write
21A87653000
heap
page read and write
237C3150000
direct allocation
page execute and read and write
1E3B5609000
heap
page read and write
B75887F000
stack
page read and write
1E3B5667000
heap
page read and write
1ABBBEB0000
heap
page read and write
1ABBC497000
heap
page read and write
1E3B5628000
heap
page read and write
1ABBC49E000
heap
page read and write
1ABBC4B1000
heap
page read and write
1E3B5740000
direct allocation
page execute and read and write
1F5FDB00000
heap
page read and write
237C1655000
heap
page read and write
1E3B5090000
trusted library allocation
page read and write
1E3B3751000
heap
page read and write
1E3B36FF000
heap
page read and write
1E3B5649000
heap
page read and write
23276DBC000
heap
page read and write
1ABBC4D6000
heap
page read and write
237C30C0000
trusted library allocation
page read and write
1E3B3737000
heap
page read and write
1E3B5601000
heap
page read and write
2056C748000
heap
page read and write
2BBB6DAA000
heap
page read and write
1ABBC4BB000
heap
page read and write
1F5FDB18000
heap
page read and write
1E3B56E0000
direct allocation
page execute and read and write
1F5FE33E000
heap
page read and write
1E3B54F0000
direct allocation
page execute and read and write
1F5FE352000
heap
page read and write
1E3B55E4000
heap
page read and write
1ABBC4D4000
heap
page read and write
1F5FDD9B000
heap
page read and write
1BC90A60000
heap
page read and write
241C67B000
stack
page read and write
1E3B566C000
heap
page read and write
1F5FDD97000
heap
page read and write
1ABBC4BB000
heap
page read and write
E1E02FC000
stack
page read and write
1E3B563F000
heap
page read and write
1E3B3702000
heap
page read and write
1F5FDD93000
heap
page read and write
1F5FDB3B000
heap
page read and write
1ABBBDA7000
heap
page read and write
1ABBC4D0000
heap
page read and write
16E1AFF000
unkown
page read and write
1F5FDB70000
heap
page read and write
1ABBBDA7000
heap
page read and write
1E3B5628000
heap
page read and write
16A39D40000
heap
page read and write
1800C6000
unkown
page write copy
5BE2E7E000
stack
page read and write
1E3B5663000
heap
page read and write
28CACFF000
stack
page read and write
1E3B5628000
heap
page read and write
2BBB6D9E000
heap
page read and write
1E3B565B000
heap
page read and write
16A39B70000
heap
page read and write
1E3B5601000
heap
page read and write
1F5FE354000
heap
page read and write
212840CB000
heap
page read and write
1F5FDB70000
heap
page read and write
E1E03FE000
unkown
page read and write
2BBB6DB4000
heap
page read and write
A03CCFC000
stack
page read and write
1E3B57A0000
direct allocation
page execute and read and write
1E3B5657000
heap
page read and write
1F5FE34C000
heap
page read and write
1E3B3705000
heap
page read and write
2534A6F3000
heap
page read and write
1E3B5190000
direct allocation
page execute and read and write
1F5FFBCE000
heap
page read and write
1E3B563F000
heap
page read and write
1E3B5667000
heap
page read and write
2056C740000
heap
page read and write
B09F9FE000
unkown
page read and write
21A87659000
heap
page read and write
2100B700000
heap
page read and write
6899FBD000
stack
page read and write
1F5FDB61000
heap
page read and write
237C16F8000
heap
page read and write
1E3B55E0000
heap
page read and write
23276CA0000
heap
page read and write
1F5FDB5A000
heap
page read and write
1E526A20000
heap
page read and write
1E3B3702000
heap
page read and write
1E3B55F8000
heap
page read and write
1F5FDB39000
heap
page read and write
1F5FE32C000
heap
page read and write
1E3B36C9000
heap
page read and write
1ABBC4D1000
heap
page read and write
21283F30000
heap
page read and write
1CD48B30000
heap
page read and write
1E3B5790000
direct allocation
page execute and read and write
1E3B566B000
heap
page read and write
1ABBBDA7000
heap
page read and write
DB6E1FE000
stack
page read and write
1BC90B60000
heap
page read and write
1E3B564F000
heap
page read and write
2BBB6D90000
heap
page read and write
16B00530000
heap
page read and write
2534A910000
heap
page read and write
25C165B0000
heap
page read and write
21283E4E000
heap
page read and write
28CAAFC000
stack
page read and write
1F5FE320000
heap
page read and write
1E3B5609000
heap
page read and write
16A39F60000
heap
page read and write
CF4E87F000
stack
page read and write
1F5FDD90000
heap
page read and write
F343AFF000
stack
page read and write
1E3B564C000
heap
page read and write
23276DD0000
heap
page read and write
16E176C000
stack
page read and write
1800C5000
unkown
page read and write
1F5FDB6A000
heap
page read and write
2BBB703B000
heap
page read and write
1F5FDD95000
heap
page read and write
1E3B565B000
heap
page read and write
1E3B36F6000
heap
page read and write
1E3B5621000
heap
page read and write
1E3B55E0000
heap
page read and write
22AEFAD0000
heap
page read and write
1F5FDB52000
heap
page read and write
1E3B5667000
heap
page read and write
5BE2BFC000
stack
page read and write
1E3B3752000
heap
page read and write
1E3B3752000
heap
page read and write
180000000
unkown
page readonly
1E3B564F000
heap
page read and write
1E3B55D0000
remote allocation
page read and write
2B2E0AB0000
heap
page read and write
F3439FF000
unkown
page read and write
23276ED0000
heap
page read and write
1E3B5667000
heap
page read and write
1E3B5130000
direct allocation
page execute and read and write
1E3B5643000
heap
page read and write
2BBBA1D0000
heap
page read and write
1E3B5621000
heap
page read and write
1E3B370B000
heap
page read and write
1ABBBDA4000
heap
page read and write
1ABBC4D4000
heap
page read and write
146144A0000
heap
page read and write
1E3B5780000
direct allocation
page execute and read and write
1E3B5653000
heap
page read and write
1E3B5970000
direct allocation
page execute and read and write
CF4E7FE000
stack
page read and write
B43FA7E000
stack
page read and write
1E3B373D000
heap
page read and write
1E3B57C0000
direct allocation
page execute and read and write
1E3B5930000
direct allocation
page execute and read and write
1F5FE32F000
heap
page read and write
1E3B565F000
heap
page read and write
CF4E6FD000
stack
page read and write
237C1620000
heap
page read and write
2BBBA620000
trusted library allocation
page read and write
1E3B565F000
heap
page read and write
1ABBC4B3000
heap
page read and write
1ABBC4BB000
heap
page read and write
852FEFE000
stack
page read and write
1F5FE328000
heap
page read and write
241C6FE000
stack
page read and write
1BC90DC0000
heap
page read and write
1F5FDB56000
heap
page read and write
2BBB6CD0000
heap
page read and write
1F5FDAC0000
trusted library allocation
page read and write
1E3B5609000
heap
page read and write
1E3B5667000
heap
page read and write
1E3B57C0000
direct allocation
page execute and read and write
21A87580000
heap
page read and write
909A4FF000
stack
page read and write
2A648FD7000
heap
page read and write
5F8F37C000
stack
page read and write
1E3B5631000
heap
page read and write
1827F7F0000
heap
page read and write
DB6E0FE000
stack
page read and write
1E3B5885000
direct allocation
page execute and read and write
1F5FFBC6000
heap
page read and write
21A8767A000
heap
page read and write
237C30A0000
trusted library allocation
page read and write
1F5FDB54000
heap
page read and write
2AADA2D0000
heap
page read and write
1F5FDB7A000
heap
page read and write
1E3B5653000
heap
page read and write
1E3B5653000
heap
page read and write
1F5FDD94000
heap
page read and write
2A648DF0000
heap
page read and write
1F5FDCD0000
heap
page read and write
1ABBC4CD000
heap
page read and write
1ABBC4B0000
heap
page read and write
1E3B5130000
direct allocation
page execute and read and write
1ABBBDB6000
heap
page read and write
23276D90000
heap
page read and write
1827F8F0000
heap
page read and write
1F5FE338000
heap
page read and write
21283D40000
heap
page read and write
21A87654000
heap
page read and write
25C163C7000
heap
page read and write
23276DB7000
heap
page read and write
1E3B5649000
heap
page read and write
1E3B5637000
heap
page read and write
1E3B57C0000
direct allocation
page execute and read and write
1E3B5609000
heap
page read and write
1E3B5667000
heap
page read and write
237C30C0000
trusted library allocation
page read and write
1BC90C60000
heap
page read and write
1E3B5667000
heap
page read and write
16B00830000
heap
page read and write
1F5FDD9E000
heap
page read and write
1E3B5780000
direct allocation
page execute and read and write
1E3B374D000
heap
page read and write
1813B810000
heap
page read and write
1F5FDA70000
heap
page read and write
1ABBC4BB000
heap
page read and write
237C172F000
heap
page read and write
1E3B3737000
heap
page read and write
1BA5F100000
heap
page read and write
3ED3B0C000
stack
page read and write
1BA5F310000
heap
page read and write
1E3B3702000
heap
page read and write
883DBFE000
stack
page read and write
1F5FDB38000
heap
page read and write
11D36980000
heap
page read and write
1E3B563F000
heap
page read and write
1E3B5628000
heap
page read and write
2AADA388000
heap
page read and write
11D3698B000
heap
page read and write
800E67E000
stack
page read and write
21285890000
heap
page read and write
1E3B5657000
heap
page read and write
1ABBC49E000
heap
page read and write
1E3B5667000
heap
page read and write
1E3B5657000
heap
page read and write
21287180000
heap
page read and write
1E526A99000
heap
page read and write
909A2FC000
stack
page read and write
237C3220000
direct allocation
page execute and read and write
2056C690000
heap
page read and write
30EB67E000
stack
page read and write
1ABBC4B4000
heap
page read and write
1827F8D0000
heap
page read and write
237C30A0000
direct allocation
page execute and read and write
1F5FE35A000
heap
page read and write
1E3B51A0000
direct allocation
page execute and read and write
1F5FE349000
heap
page read and write
1E3B5920000
trusted library allocation
page read and write
21A8768D000
heap
page read and write
1ABBC49A000
heap
page read and write
1ABBC4B9000
heap
page read and write
33E5D5D000
stack
page read and write
1ABBBDAE000
heap
page read and write
22AEFB90000
heap
page read and write
1ABBC4C9000
heap
page read and write
D7DBCFF000
unkown
page read and write
1E3B5657000
heap
page read and write
25C16660000
heap
page read and write
1BA5F21B000
heap
page read and write
1E3B57C0000
direct allocation
page execute and read and write
1ABBBD86000
heap
page read and write
180001000
unkown
page execute read
21A87653000
heap
page read and write
1E3B5626000
heap
page read and write
1F5FE33E000
heap
page read and write
2AADA383000
heap
page read and write
2BBB6DD0000
heap
page read and write
11D3698D000
heap
page read and write
16B00653000
heap
page read and write
3276C8D000
stack
page read and write
1F5FDB36000
heap
page read and write
1E3B565F000
heap
page read and write
1F5FE349000
heap
page read and write
1E3B55E4000
heap
page read and write
2534A900000
heap
page read and write
1E3B5654000
heap
page read and write
A03CDFF000
unkown
page read and write
1ABBBDA4000
heap
page read and write
1E3B5657000
heap
page read and write
1E3B5628000
heap
page read and write
180000000
unkown
page readonly
26E78D45000
heap
page read and write
4217A7E000
stack
page read and write
1ABBBDA4000
heap
page read and write
16B0063D000
heap
page read and write
25C163C4000
heap
page read and write
16A39C70000
heap
page read and write
1E3B5621000
heap
page read and write
2A6491B5000
heap
page read and write
6899EBB000
stack
page read and write
146129C0000
heap
page read and write
1E3B51A0000
direct allocation
page execute and read and write
1F5FDB68000
heap
page read and write
1E3B5667000
heap
page read and write
2BBB8920000
heap
page read and write
1E3B564F000
heap
page read and write
1E3B565B000
heap
page read and write
D7DBDFF000
stack
page read and write
1F5FDD92000
heap
page read and write
1CD48A2B000
heap
page read and write
1F5FE32F000
heap
page read and write
30EB34C000
stack
page read and write
1E3B5636000
heap
page read and write
1F5FE335000
heap
page read and write
3ED3B8E000
stack
page read and write
25C164B0000
heap
page read and write
1E3B564A000
heap
page read and write
21A87970000
heap
page read and write
1E3B5631000
heap
page read and write
1E3B5990000
direct allocation
page execute and read and write
2B2E0A30000
heap
page read and write
146128E0000
heap
page read and write
1E3B565B000
heap
page read and write
1E3B5C99000
heap
page read and write
1E3B56E0000
direct allocation
page execute and read and write
1E3B5657000
heap
page read and write
1E3B5970000
direct allocation
page execute and read and write
1E3B5780000
direct allocation
page execute and read and write
1E3B563F000
heap
page read and write
2B2E0A60000
heap
page read and write
1ABBBD59000
heap
page read and write
1F5FFBC1000
heap
page read and write
1F5FE330000
heap
page read and write
1ABBC4DC000
heap
page read and write
1E3B5628000
heap
page read and write
16B00630000
heap
page read and write
1F5FDE9D000
heap
page read and write
237C30A0000
trusted library allocation
page read and write
16A39D50000
heap
page read and write
1E3B56E0000
direct allocation
page execute and read and write
241C87F000
stack
page read and write
1F5FE349000
heap
page read and write
1827FBC0000
heap
page read and write
1E3B5601000
heap
page read and write
1E526A10000
heap
page read and write
1F5FDB5A000
heap
page read and write
1ABBBD89000
heap
page read and write
1F5FDB60000
heap
page read and write
5F8F7FE000
stack
page read and write
1E3B56F0000
direct allocation
page execute and read and write
1E3B5910000
direct allocation
page execute and read and write
A03CEFF000
stack
page read and write
1E3B3737000
heap
page read and write
1E3B565B000
heap
page read and write
1ABBC4C9000
heap
page read and write
1E3B5657000
heap
page read and write
1E3B3737000
heap
page read and write
14612A48000
heap
page read and write
1E3B5657000
heap
page read and write
1E3B5631000
heap
page read and write
1E3B5601000
heap
page read and write
1E3B563F000
heap
page read and write
1E3B5653000
heap
page read and write
1E3B55FD000
heap
page read and write
1E3B563F000
heap
page read and write
241C8FE000
stack
page read and write
2BBBA1D3000
heap
page read and write
1ABBC4B7000
heap
page read and write
26E78A17000
heap
page read and write
2BBB6D70000
heap
page read and write
2534A8D0000
heap
page read and write
14614312000
direct allocation
page execute and read and write
1E3B55F0000
heap
page read and write
1E3B375A000
heap
page read and write
1ABBC495000
heap
page read and write
1E3B5621000
heap
page read and write
1E3B5657000
heap
page read and write
1E3B36B0000
heap
page read and write
1F5FDB5A000
heap
page read and write
1E3B5920000
trusted library allocation
page read and write
22AEF900000
heap
page read and write
1F5FDB63000
heap
page read and write
3ED3E7F000
stack
page read and write
1E3B55F0000
heap
page read and write
2BBB6DBB000
heap
page read and write
1F5FDB52000
heap
page read and write
2534A6DB000
heap
page read and write
1F5FDE9A000
heap
page read and write
1E3B54F0000
direct allocation
page execute and read and write
1F5FE337000
heap
page read and write
1F5FFBC4000
heap
page read and write
2AADA530000
heap
page read and write
1ABBBFA0000
heap
page read and write
1E3B5790000
direct allocation
page execute and read and write
11D36B70000
heap
page read and write
1ABBBDB1000
heap
page read and write
DB6E17E000
stack
page read and write
21A8767A000
heap
page read and write
1E3B5653000
heap
page read and write
1E3B57C0000
direct allocation
page execute and read and write
1E3B5652000
heap
page read and write
CF4E678000
stack
page read and write
1E3B5600000
heap
page read and write
21283E53000
heap
page read and write
1E3B5510000
direct allocation
page execute and read and write
1E3B3737000
heap
page read and write
2056CAF5000
heap
page read and write
1F5FDD9A000
heap
page read and write
1E3B563F000
heap
page read and write
1E3B5885000
direct allocation
page execute and read and write
1F5FDB5E000
heap
page read and write
1E3B5160000
direct allocation
page execute and read and write
2BBB6DBA000
heap
page read and write
1E3B5990000
direct allocation
page execute and read and write
25C163A9000
heap
page read and write
1E3B5663000
heap
page read and write
4E714FB000
stack
page read and write
16A39D47000
heap
page read and write
1E3B5631000
heap
page read and write
23276D9B000
heap
page read and write
1F5FDB7F000
heap
page read and write
21A87630000
heap
page read and write
1E3B563F000
heap
page read and write
2AADA36B000
heap
page read and write
1E3B373A000
heap
page read and write
1E3B5650000
heap
page read and write
1F5FDB6B000
heap
page read and write
1E3B5631000
heap
page read and write
1E3B3737000
heap
page read and write
1E3B564F000
heap
page read and write
1CD48CE0000
heap
page read and write
1E3B3737000
heap
page read and write
1E3B5649000
heap
page read and write
1ABBBD86000
heap
page read and write
1E3B564F000
heap
page read and write
1E3B565B000
heap
page read and write
1ABBC49A000
heap
page read and write
1E3B564F000
heap
page read and write
1E3B5667000
heap
page read and write
1E3B5930000
direct allocation
page execute and read and write
1ABBC49B000
heap
page read and write
23277030000
heap
page read and write
23276DA6000
heap
page read and write
1ABBBD50000
heap
page read and write
1E3B5601000
heap
page read and write
1F5FDB46000
heap
page read and write
1F5FDD9A000
heap
page read and write
1ABBC4A9000
heap
page read and write
11D369A7000
heap
page read and write
1E3B5653000
heap
page read and write
1BA5F210000
heap
page read and write
1E3B566A000
heap
page read and write
B7588FE000
stack
page read and write
1F5FDE9E000
heap
page read and write
1CD48A42000
heap
page read and write
1BC90B82000
heap
page read and write
1E3B5645000
heap
page read and write
1E3B5657000
heap
page read and write
2BBB6DB4000
heap
page read and write
1E3B5631000
heap
page read and write
1F5FDAC0000
trusted library allocation
page read and write
1ABBC4C9000
heap
page read and write
B70F8FF000
stack
page read and write
B70F6FC000
stack
page read and write
1E3B565B000
heap
page read and write
1E3B3745000
heap
page read and write
1E3B5621000
heap
page read and write
1F5FDB38000
heap
page read and write
1F5FE349000
heap
page read and write
883DAFC000
stack
page read and write
1E526A90000
heap
page read and write
237C3230000
direct allocation
page execute and read and write
1ABBC497000
heap
page read and write
1ABBC4A7000
heap
page read and write
1ABBBE50000
heap
page read and write
14612A00000
heap
page read and write
1E3B370B000
heap
page read and write
33E5DDE000
stack
page read and write
1E3B5190000
direct allocation
page execute and read and write
2A6491B0000
heap
page read and write
1E3B55D0000
remote allocation
page read and write
26E78980000
heap
page read and write
1813BAE5000
heap
page read and write
1F5FDB7F000
heap
page read and write
1E3B5653000
heap
page read and write
1ABBC4AF000
heap
page read and write
1BC90B6D000
heap
page read and write
237C31A0000
direct allocation
page execute and read and write
1ABBC4AC000
heap
page read and write
1BA5F1E0000
heap
page read and write
21A87590000
heap
page read and write
11D36C10000
heap
page read and write
1ABBBD87000
heap
page read and write
1E3B5621000
heap
page read and write
1F5FE331000
heap
page read and write
237C3200000
direct allocation
page execute and read and write
1ABBC4BB000
heap
page read and write
1E3B5910000
direct allocation
page execute and read and write
237C1660000
heap
page read and write
1E3B3705000
heap
page read and write
1BC90C80000
heap
page read and write
2AADA36D000
heap
page read and write
1F5FDD9A000
heap
page read and write
1ABBC494000
heap
page read and write
1F5FDB45000
heap
page read and write
1E3B3737000
heap
page read and write
2534A6F7000
heap
page read and write
1813B820000
heap
page read and write
26E78D40000
heap
page read and write
237C3170000
direct allocation
page execute and read and write
1E3B36F9000
heap
page read and write
1827F987000
heap
page read and write
1ABBBD63000
heap
page read and write
1F5FFBCE000
heap
page read and write
1E3B3703000
heap
page read and write
1E3B5657000
heap
page read and write
2A648ED0000
heap
page read and write
1F5FE32C000
heap
page read and write
21283E53000
heap
page read and write
1E3B5640000
heap
page read and write
1F5FDB63000
heap
page read and write
1F5FE327000
heap
page read and write
1E3B5667000
heap
page read and write
16E1BFE000
stack
page read and write
1E3B564F000
heap
page read and write
1F5FDB73000
heap
page read and write
1ABBBDB4000
heap
page read and write
1E3B5631000
heap
page read and write
146129E0000
heap
page read and write
1E3B5649000
heap
page read and write
2056C750000
heap
page read and write
2BBB6DC5000
heap
page read and write
25C16590000
heap
page read and write
1E3B5621000
heap
page read and write
22AEF8F0000
heap
page read and write
1E526AA8000
heap
page read and write
28CABFE000
unkown
page read and write
241C7FF000
stack
page read and write
16B0063B000
heap
page read and write
2BBB6DA7000
heap
page read and write
23276EB0000
heap
page read and write
2AADA2C0000
heap
page read and write
21A8765C000
heap
page read and write
21283E61000
heap
page read and write
23276E90000
heap
page read and write
2AADA360000
heap
page read and write
1E3B565B000
heap
page read and write
1E3B5510000
direct allocation
page execute and read and write
800E378000
stack
page read and write
2534A7D0000
heap
page read and write
2AADA6F0000
heap
page read and write
DB6E07A000
stack
page read and write
11D36C00000
heap
page read and write
1CD48A2D000
heap
page read and write
1E3B5648000
heap
page read and write
1E3B5626000
heap
page read and write
1F5FE33E000
heap
page read and write
1E3B57B0000
direct allocation
page execute and read and write
22AEFAF0000
heap
page read and write
1E3B5667000
heap
page read and write
1F5FE334000
heap
page read and write
1813B880000
heap
page read and write
1E3B5631000
heap
page read and write
1E3B5653000
heap
page read and write
1BA5F21D000
heap
page read and write
33E607E000
stack
page read and write
B75887B000
stack
page read and write
1E3B57C0000
direct allocation
page execute and read and write
1ABBBD40000
trusted library allocation
page read and write
1E3B55E8000
heap
page read and write
1ABBC4C9000
heap
page read and write
3276D0F000
stack
page read and write
800E3FE000
stack
page read and write
1E3B565F000
heap
page read and write
B75897F000
stack
page read and write
1E3B5650000
heap
page read and write
1F5FE333000
heap
page read and write
1E3B5730000
direct allocation
page execute and read and write
2BBB6D98000
heap
page read and write
1E3B5657000
heap
page read and write
1ABBC490000
heap
page read and write
2056C680000
heap
page read and write
1E3B57D0000
direct allocation
page execute and read and write
1ABBC4A0000
heap
page read and write
1F5FDB38000
heap
page read and write
1F5FE32E000
heap
page read and write
180001000
unkown
page execute read
2B2E0ABB000
heap
page read and write
1F5FE33E000
heap
page read and write
1800C6000
unkown
page write copy
1F5FDAC0000
trusted library allocation
page read and write
30EB3CE000
stack
page read and write
21A8768A000
heap
page read and write
237C3180000
direct allocation
page execute and read and write
11D36960000
heap
page read and write
1E3B5090000
trusted library allocation
page read and write
1E3B5653000
heap
page read and write
1E3B57E0000
direct allocation
page execute and read and write
21A8767E000
heap
page read and write
1E3B5621000
heap
page read and write
1E3B565F000
heap
page read and write
180086000
unkown
page readonly
1E3B563F000
heap
page read and write
1E3B565F000
heap
page read and write
2B2E0AD2000
heap
page read and write
2BBB7030000
heap
page read and write
3276D8F000
stack
page read and write
1ABBC4CF000
heap
page read and write
21283F50000
heap
page read and write
1E3B5090000
trusted library allocation
page read and write
21A87663000
heap
page read and write
26E78960000
heap
page read and write
1E3B36F9000
heap
page read and write
1ABBC4B7000
heap
page read and write
21A8767A000
heap
page read and write
1E3B3737000
heap
page read and write
CF4E77E000
stack
page read and write
1E3B5663000
heap
page read and write
1E3B5510000
direct allocation
page execute and read and write
1ABBBE70000
heap
page read and write
1E3B3757000
heap
page read and write
21A87655000
heap
page read and write
6899F3F000
stack
page read and write
1813B870000
heap
page read and write
1F5FDB68000
heap
page read and write
1E3B57D0000
direct allocation
page execute and read and write
1ABBC4D5000
heap
page read and write
1E3B565F000
heap
page read and write
1E3B5654000
heap
page read and write
2100B797000
heap
page read and write
1F5FDB52000
heap
page read and write
21287110000
heap
page read and write
1ABBDE60000
heap
page read and write
1E3B563C000
heap
page read and write
2056C6B0000
heap
page read and write
212875D0000
trusted library allocation
page read and write
1F5FFBCE000
heap
page read and write
1E3B5663000
heap
page read and write
1CD48C10000
heap
page read and write
1E3B5626000
heap
page read and write
1F5FFBC2000
heap
page read and write
1E3B5651000
heap
page read and write
1E3B56F0000
direct allocation
page execute and read and write
1ABBC49A000
heap
page read and write
23276DD1000
heap
page read and write
1E3B5190000
direct allocation
page execute and read and write
1E3B5090000
trusted library allocation
page read and write
1E3B564A000
heap
page read and write
1E3B565B000
heap
page read and write
21A8767A000
heap
page read and write
1CD48CD0000
heap
page read and write
1F5FFBD4000
heap
page read and write
1E3B564F000
heap
page read and write
B43F77D000
stack
page read and write
1F5FDB18000
heap
page read and write
18016C000
unkown
page readonly
21A8767A000
heap
page read and write
1E3B5780000
direct allocation
page execute and read and write
1E3B563F000
heap
page read and write
1F5FDE95000
heap
page read and write
800E7FF000
stack
page read and write
1CD48A20000
heap
page read and write
26E78A10000
heap
page read and write
21283E65000
heap
page read and write
2534A8B0000
heap
page read and write
21287183000
heap
page read and write
2B2E0A40000
heap
page read and write
1E3B5645000
heap
page read and write
1ABBC492000
heap
page read and write
1E3B55D0000
remote allocation
page read and write
1E3B565F000
heap
page read and write
1E3B564F000
heap
page read and write
1E3B5500000
direct allocation
page execute and read and write
23276DC0000
heap
page read and write
21A87638000
heap
page read and write
2534A6DD000
heap
page read and write
1E3B5609000
heap
page read and write
1ABBC4AC000
heap
page read and write
1E3B5601000
heap
page read and write
1F5FDB38000
heap
page read and write
2BBB6DC0000
heap
page read and write
1F5FE349000
heap
page read and write
1E3B5C01000
heap
page read and write
21283E30000
heap
page read and write
1F5FDB79000
heap
page read and write
1E3B5609000
heap
page read and write
1F5FE349000
heap
page read and write
1F5FDA80000
heap
page read and write
1E3B5970000
direct allocation
page execute and read and write
22AEFB95000
heap
page read and write
1E3B5663000
heap
page read and write
1ABBC4D4000
heap
page read and write
2534A6D0000
heap
page read and write
1813B878000
heap
page read and write
1E3B5663000
heap
page read and write
1F5FFBC3000
heap
page read and write
909A3FF000
unkown
page read and write
1E3B5653000
heap
page read and write
1E3B5621000
heap
page read and write
1ABBC4B6000
heap
page read and write
1813B840000
heap
page read and write
1E3B374D000
heap
page read and write
1E3B55E4000
heap
page read and write
1E3B564A000
heap
page read and write
1E3B563F000
heap
page read and write
2B2E0ABD000
heap
page read and write
1F5FFBC0000
heap
page read and write
1BA5F330000
heap
page read and write
1E3B564F000
heap
page read and write
1ABBBDAB000
heap
page read and write
21283E58000
heap
page read and write
11D36B50000
heap
page read and write
2A648EF0000
heap
page read and write
1F5FDB6B000
heap
page read and write
1E3B564A000
heap
page read and write
1ABBBFAD000
heap
page read and write
1F5FDB52000
heap
page read and write
1ABBC4D4000
heap
page read and write
1E3B5910000
direct allocation
page execute and read and write
1E3B5649000
heap
page read and write
B43F7FE000
stack
page read and write
16B00550000
heap
page read and write
1ABBBD86000
heap
page read and write
1E3B5657000
heap
page read and write
16A39F65000
heap
page read and write
D7DB9AC000
stack
page read and write
1E3B3709000
heap
page read and write
1E3B5663000
heap
page read and write
180086000
unkown
page readonly
1ABBDD40000
heap
page read and write
1E3B564F000
heap
page read and write
B09F8FC000
stack
page read and write
16B00450000
heap
page read and write
1ABBC4B4000
heap
page read and write
1E3B5653000
heap
page read and write
1E3B5663000
heap
page read and write
30EB6FE000
stack
page read and write
1E3B57E0000
direct allocation
page execute and read and write
1ABBC4BB000
heap
page read and write
1E3B5C04000
heap
page read and write
1E3B5637000
heap
page read and write
1F5FE34A000
heap
page read and write
16A39C50000
heap
page read and write
5F8F6FF000
unkown
page read and write
1827F980000
heap
page read and write
1F5FDAA0000
heap
page read and write
2BBB6DD8000
heap
page read and write
21A87659000
heap
page read and write
1E3B5626000
heap
page read and write
1ABBC4C9000
heap
page read and write
2BBB6CC0000
heap
page read and write
2BBB7035000
heap
page read and write
237C1650000
heap
page read and write
11D369A2000
heap
page read and write
1E3B5663000
heap
page read and write
1E3B5600000
heap
page read and write
1CD48C30000
heap
page read and write
2BBB6DAA000
heap
page read and write
1E3B5990000
direct allocation
page execute and read and write
800E6FF000
stack
page read and write
1E3B5653000
heap
page read and write
F3438FC000
stack
page read and write
1E3B565F000
heap
page read and write
1ABBBC60000
heap
page read and write
1E3B55E8000
heap
page read and write
1E3B58E0000
direct allocation
page execute and read and write
42177FF000
stack
page read and write
1E3B5653000
heap
page read and write
1E3B565B000
heap
page read and write
1F5FDB38000
heap
page read and write
241C77E000
stack
page read and write
1F5FE338000
heap
page read and write
1F5FFBD4000
heap
page read and write
1F5FE352000
heap
page read and write
1F5FDAC0000
trusted library allocation
page read and write
2B2E0C80000
heap
page read and write
1F5FDB5A000
heap
page read and write
1E3B57C0000
direct allocation
page execute and read and write
212840C5000
heap
page read and write
1E3B5910000
direct allocation
page execute and read and write
1F5FE33E000
heap
page read and write
1E3B5780000
direct allocation
page execute and read and write
1F5FDB6C000
heap
page read and write
B09FAFF000
stack
page read and write
1ABBBD68000
heap
page read and write
1BA5F232000
heap
page read and write
1E3B50B0000
direct allocation
page execute and read and write
1E3B5663000
heap
page read and write
1BC90B6B000
heap
page read and write
1F5FDB52000
heap
page read and write
4E716FF000
stack
page read and write
1E3B5628000
heap
page read and write
1E3B565B000
heap
page read and write
B70F7FF000
stack
page read and write
1ABBBDA7000
heap
page read and write
2AADA2F0000
heap
page read and write
1E526A9D000
heap
page read and write
1E3B5631000
heap
page read and write
237C31C0000
direct allocation
page execute and read and write
1F5FDE30000
heap
page read and write
2BBB6DAE000
heap
page read and write
1ABBBD40000
trusted library allocation
page read and write
1ABBC4B9000
heap
page read and write
1E3B55E4000
heap
page read and write
1ABBBFA5000
heap
page read and write
1800C5000
unkown
page read and write
1E3B57B0000
direct allocation
page execute and read and write
1E3B5780000
direct allocation
page execute and read and write
1F5FDB13000
heap
page read and write
1ABBC4C9000
heap
page read and write
1E3B563F000
heap
page read and write
800E77E000
stack
page read and write
2100B790000
heap
page read and write
237C3150000
direct allocation
page execute and read and write
25C16670000
heap
page read and write
1F5FFBD4000
heap
page read and write
There are 904 hidden memdumps, click here to show them.