IOC Report
1Klocu2k7B

loading gif

Files

File Path
Type
Category
Malicious
1Klocu2k7B.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x7970229a, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_1Kl_a1541ba52dc63323fed23d3e53a9a9cb75f9b_81420264_12a83c82\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER188F.tmp.dmp
Mini DuMP crash report, 15 streams, Sat May 14 12:09:41 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER28CC.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER33E9.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\1Klocu2k7B.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\1Klocu2k7B.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\1Klocu2k7B.dll,DllRegisterServer
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\1Klocu2k7B.dll,DllUnregisterServer
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\JRkpZLNCkFz\TYmfFCbFTVEkATZ.dll"
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\1Klocu2k7B.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\1Klocu2k7B.dll",#1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 992 -s 316
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://23.239.0.12/&
unknown
malicious
https://23.239.0.12/
23.239.0.12
malicious
https://dev.ditu.live.com/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
unknown
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
unknown
https://t0.tiles.ditu.live.com/tiles/gen
unknown
https://dev.virtualearth.net/REST/v1/Routes/Walking
unknown
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
unknown
https://dev.ditu.live.com/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
http://www.bingmapsportal.com
unknown
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
unknown
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
unknown
https://dev.ditu.live.com/REST/v1/Transit/Stops/
unknown
https://dev.virtualearth.net/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
unknown
http://crl.ver)
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
unknown
https://www.tiktok.com/legal/report/feedback
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
unknown
https://%s.xboxlive.com
unknown
https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://dev.virtualearth.net/mapcontrol/logging.ashx
unknown
https://support.hotspotshield.com/
unknown
http://schemas.xmlsoap.org/ws/2
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.t
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
https://disneyplus.com/legal.
unknown
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
unknown
https://activity.windows.com
unknown
https://dev.ditu.live.com/REST/v1/Locations
unknown
http://help.disneyplus.com.
unknown
https://%s.dnet.xboxlive.com
unknown
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
There are 39 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
23.239.0.12
unknown
United States
malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
MonthID
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsPeFile
\REGISTRY\A\{5e5f5260-ba2f-4d33-38aa-dbdee9fbd54f}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018800453F4626F
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\TaskStore
Schedule Scan
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\State
BlockUntilTimeStatus
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\Configuration
refreshAfter
There are 27 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1F1CBE10000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
2490000
direct allocation
page execute and read and write
malicious
1FDEC700000
direct allocation
page execute and read and write
malicious
1E219BE0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
1F1CBE10000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
1F1CBE10000
direct allocation
page execute and read and write
malicious
6E0000
direct allocation
page execute and read and write
malicious
23D98862000
heap
page read and write
25BB5D70000
heap
page read and write
1F77CA02000
heap
page read and write
1CDC9880000
remote allocation
page read and write
180000000
direct allocation
page read and write
1C02E981000
heap
page read and write
23B577F000
unkown
page read and write
C14EE7A000
stack
page read and write
1A4EA75000
stack
page read and write
206B1570000
heap
page read and write
141E0055000
heap
page read and write
50297B000
stack
page read and write
1C02E99C000
heap
page read and write
1C02E05A000
heap
page read and write
1AD97402000
trusted library allocation
page read and write
1AD96E5E000
heap
page read and write
206B1D21000
heap
page read and write
1C02E0E5000
heap
page read and write
24D29F60000
heap
page read and write
25BB6A20000
trusted library allocation
page read and write
1CDC9840000
trusted library allocation
page read and write
23D98750000
heap
page read and write
1C02E986000
heap
page read and write
23B52FE000
stack
page read and write
23D988B2000
heap
page read and write
206B1482000
heap
page read and write
1C02E9A3000
heap
page read and write
1E219D94000
heap
page read and write
206B1433000
heap
page read and write
802AC7B000
stack
page read and write
1FD5EFF000
stack
page read and write
2CFF000
stack
page read and write
23D988CE000
heap
page read and write
1CDC4913000
heap
page read and write
206B1437000
heap
page read and write
187E6702000
heap
page read and write
1C02E9AB000
heap
page read and write
18002D000
direct allocation
page readonly
1F1CA7C0000
heap
page readonly
213F2416000
heap
page read and write
213F2406000
heap
page read and write
1E218410000
heap
page read and write
1C02E9B2000
heap
page read and write
C2D000
heap
page read and write
C78B7FE000
stack
page read and write
206B1454000
heap
page read and write
206B1437000
heap
page read and write
1C02E99A000
heap
page read and write
1C02E900000
heap
page read and write
C78B8FC000
stack
page read and write
1FDEC490000
heap
page read and write
C2D000
heap
page read and write
1430AC63000
heap
page read and write
23D9882E000
heap
page read and write
7C3000
heap
page read and write
7FFC66D59000
unkown
page readonly
EC304FB000
stack
page read and write
1F77CA29000
heap
page read and write
1F1CA490000
heap
page read and write
18002D000
direct allocation
page readonly
1C02E9AD000
heap
page read and write
206B1D22000
heap
page read and write
782000
heap
page read and write
1F1CBE80000
remote allocation
page read and write
338347F000
stack
page read and write
66A5BFC000
stack
page read and write
C60000
heap
page read and write
26249813000
heap
page read and write
26249842000
heap
page read and write
1C02E981000
heap
page read and write
266C2068000
heap
page read and write
206B1422000
heap
page read and write
7FFC66D59000
unkown
page readonly
213F2413000
heap
page read and write
1430AC39000
heap
page read and write
266C1F50000
heap
page read and write
23B517E000
stack
page read and write
380000
heap
page read and write
23D986F0000
heap
page read and write
22130BD0000
heap
page read and write
1C02E0DF000
heap
page read and write
266C2064000
heap
page read and write
A9AAF7B000
stack
page read and write
206B1433000
heap
page read and write
BB757F000
stack
page read and write
1C02E056000
heap
page read and write
1F1CA350000
unkown
page read and write
213F2413000
heap
page read and write
1430AC13000
heap
page read and write
7FFC66D52000
unkown
page readonly
1A6FFD60000
heap
page read and write
1CDC4E20000
trusted library allocation
page read and write
23D9884F000
heap
page read and write
EC3057F000
stack
page read and write
24D2A060000
heap
page read and write
1A4EC7E000
stack
page read and write
3382FAA000
stack
page read and write
29DF000
stack
page read and write
66A51FC000
stack
page read and write
1430AC29000
heap
page read and write
1CDC409D000
heap
page read and write
23B507B000
stack
page read and write
C78B5FC000
stack
page read and write
A9AB7FE000
stack
page read and write
3AA478D000
stack
page read and write
206B1482000
heap
page read and write
1C02E9AB000
heap
page read and write
213F23F6000
heap
page read and write
BEB000
heap
page read and write
25BB6CB0000
trusted library allocation
page read and write
1C02DE90000
heap
page read and write
5027FE000
stack
page read and write
1F1CA7B0000
direct allocation
page execute and read and write
1CDC9880000
remote allocation
page read and write
1CDC9850000
trusted library allocation
page read and write
18002F000
direct allocation
page readonly
1FD5F7E000
stack
page read and write
23D98995000
heap
page read and write
BB75FE000
stack
page read and write
141E0063000
heap
page read and write
141E0000000
heap
page read and write
1C02E97B000
heap
page read and write
23D9883C000
heap
page read and write
25BB6C50000
trusted library allocation
page read and write
1C02E992000
heap
page read and write
18002F000
direct allocation
page readonly
EDD1BFD000
stack
page read and write
BD1000
heap
page read and write
1E218415000
heap
page read and write
BB7475000
stack
page read and write
1C02E99C000
heap
page read and write
213F2404000
heap
page read and write
EDD1DFF000
stack
page read and write
7FFC66D59000
unkown
page readonly
B68000
heap
page read and write
1CDC4815000
heap
page read and write
1C02E9B1000
heap
page read and write
1F1CBF00000
heap
page read and write
1AD96F00000
heap
page read and write
1AD96E3C000
heap
page read and write
1C02E921000
heap
page read and write
BF3000
heap
page read and write
1C02E97E000
heap
page read and write
1AD96E53000
heap
page read and write
BCE000
heap
page read and write
1CDC5465000
heap
page read and write
1E219BC0000
heap
page read and write
23D9981D000
heap
page read and write
C14F07B000
stack
page read and write
B60000
heap
page read and write
25BB5DB7000
heap
page read and write
91FACFB000
stack
page read and write
BFD000
heap
page read and write
1C02E04B000
heap
page read and write
1C02E0AA000
heap
page read and write
A9AAB7D000
stack
page read and write
1C02E989000
heap
page read and write
1CDC5502000
heap
page read and write
1430AAC0000
heap
page read and write
23D99913000
heap
page read and write
1AD96E79000
heap
page read and write
502675000
stack
page read and write
1F77CA5C000
heap
page read and write
206B1510000
remote allocation
page read and write
1F77CA74000
heap
page read and write
1C02E981000
heap
page read and write
1CDC9741000
trusted library allocation
page read and write
23D988C8000
heap
page read and write
1CDC4102000
heap
page read and write
23D988A7000
heap
page read and write
C14F27D000
stack
page read and write
91FB1FE000
stack
page read and write
1E2181EC000
heap
page read and write
23D98837000
heap
page read and write
206B1454000
heap
page read and write
1F77D002000
trusted library allocation
page read and write
15F3D7F000
stack
page read and write
7E4000
heap
page read and write
1CC26A80000
remote allocation
page read and write
2624A002000
heap
page read and write
3AA4DF7000
stack
page read and write
23D98848000
heap
page read and write
23D99800000
heap
page read and write
1CDC5400000
heap
page read and write
23D9885E000
heap
page read and write
1C02E97B000
heap
page read and write
25BB5CE0000
heap
page read and write
1C02E0C0000
heap
page read and write
206B14E9000
heap
page read and write
1C02EE02000
heap
page read and write
1C02E0CF000
heap
page read and write
23D99900000
heap
page read and write
20DF000
stack
page read and write
141E0050000
heap
page read and write
1FDEC500000
heap
page read and write
23D98886000
heap
page read and write
1CC262F0000
heap
page read and write
1FDEC420000
heap
page read and write
23D99854000
heap
page read and write
18002F000
direct allocation
page readonly
1C02E919000
heap
page read and write
26249913000
heap
page read and write
1C02E0C7000
heap
page read and write
A9AAD7E000
stack
page read and write
1C02E9AE000
heap
page read and write
1C02EE21000
heap
page read and write
206B1380000
heap
page read and write
1E2181C0000
heap
page read and write
1A6FFE68000
heap
page read and write
1430AC44000
heap
page read and write
1F77CA69000
heap
page read and write
206B14EE000
heap
page read and write
26249902000
heap
page read and write
1C02E97C000
heap
page read and write
1F1CA7B0000
direct allocation
page execute and read and write
1F1CA520000
heap
page read and write
18002D000
direct allocation
page readonly
23D98853000
heap
page read and write
22130BDD000
heap
page read and write
1E2183B0000
heap
page read and write
1430AC7A000
heap
page read and write
266C2113000
heap
page read and write
1C02E9AC000
heap
page read and write
7E0000
heap
page read and write
18002F000
direct allocation
page readonly
23D98700000
heap
page read and write
1AD96E78000
heap
page read and write
23B55F7000
stack
page read and write
1CDC5447000
heap
page read and write
187E667B000
heap
page read and write
32FD3FF000
stack
page read and write
3AA4A7E000
stack
page read and write
266C203C000
heap
page read and write
1CDC4904000
heap
page read and write
BF3000
heap
page read and write
1AD96E00000
heap
page read and write
25BB5DDD000
heap
page read and write
1C02E9C7000
heap
page read and write
66A57FB000
stack
page read and write
1F1CA4B0000
heap
page read and write
7FFC66D59000
unkown
page readonly
2EB4DFE000
stack
page read and write
1430AC47000
heap
page read and write
1CDC9610000
trusted library allocation
page read and write
685467C000
stack
page read and write
802A73C000
stack
page read and write
1CDC40A4000
heap
page read and write
A9AAE7B000
stack
page read and write
338337E000
stack
page read and write
7FFC66D00000
unkown
page readonly
141E0071000
heap
page read and write
C78B0FF000
stack
page read and write
1CDC4F20000
trusted library allocation
page read and write
1CDC9720000
trusted library allocation
page read and write
C14F1FF000
stack
page read and write
1C02E6B0000
remote allocation
page read and write
2D10000
remote allocation
page read and write
141DFFA0000
trusted library allocation
page read and write
1FD607E000
stack
page read and write
1C02E9A6000
heap
page read and write
1CC26440000
heap
page read and write
23D99802000
heap
page read and write
1C02E96F000
heap
page read and write
EDD18FF000
stack
page read and write
1A4EB7F000
stack
page read and write
1C02E975000
heap
page read and write
1C02EE03000
heap
page read and write
187E6613000
heap
page read and write
187E6713000
heap
page read and write
1C02E057000
heap
page read and write
1F77C790000
heap
page read and write
1AD96BD0000
heap
page read and write
266C2100000
heap
page read and write
3AA4CFF000
stack
page read and write
32FD2FF000
stack
page read and write
1CDC5454000
heap
page read and write
EDD1EFF000
stack
page read and write
1C02E052000
heap
page read and write
1F1CA7D0000
heap
page read and write
1C02E976000
heap
page read and write
1CDC9728000
trusted library allocation
page read and write
213F2423000
heap
page read and write
1C02E973000
heap
page read and write
205F000
stack
page read and write
1C02EE02000
heap
page read and write
26249829000
heap
page read and write
18002D000
direct allocation
page readonly
6D0000
direct allocation
page execute and read and write
1F1CA490000
heap
page read and write
1CDC4E30000
trusted library allocation
page read and write
1C02E102000
heap
page read and write
7FFC66D59000
unkown
page readonly
1C02E981000
heap
page read and write
1F1CA500000
heap
page read and write
32FD1F7000
stack
page read and write
18002E000
direct allocation
page read and write
23D988E3000
heap
page read and write
3AA4C7B000
stack
page read and write
7FFC66D01000
unkown
page execute read
23D988D8000
heap
page read and write
1FDEC58C000
heap
page read and write
1C02E9CF000
heap
page read and write
1CDC9880000
trusted library allocation
page read and write
1CDC4902000
heap
page read and write
1F77CA6F000
heap
page read and write
1C02E116000
heap
page read and write
23D988FD000
heap
page read and write
1CDC9750000
trusted library allocation
page read and write
266C1EF0000
heap
page read and write
23D991F0000
heap
page read and write
24D2A080000
heap
page read and write
1CDC40B9000
heap
page read and write
1C02E04F000
heap
page read and write
1CC26290000
heap
page read and write
1C02E992000
heap
page read and write
1430AC68000
heap
page read and write
206B1510000
remote allocation
page read and write
7FFC66D52000
unkown
page readonly
2C6E000
stack
page read and write
1C02E99C000
heap
page read and write
25BB60A0000
trusted library allocation
page read and write
91FB0F9000
stack
page read and write
25BB5D78000
heap
page read and write
770000
heap
page read and write
1FDEC805000
heap
page read and write
1CDC4000000
heap
page read and write
1CDC9880000
remote allocation
page read and write
23D9887E000
heap
page read and write
C78B47F000
stack
page read and write
2D8F000
stack
page read and write
7FFC66D56000
unkown
page read and write
1C02E971000
heap
page read and write
6854A7E000
stack
page read and write
1C02E9A0000
heap
page read and write
206B1433000
heap
page read and write
1C02E980000
heap
page read and write
1F1CA7D0000
heap
page read and write
6854B7E000
stack
page read and write
26249800000
heap
page read and write
206B14E7000
heap
page read and write
2EB4AFC000
stack
page read and write
BB757F000
stack
page read and write
1C02E04C000
heap
page read and write
1CDC9990000
trusted library allocation
page read and write
1C02E9A0000
heap
page read and write
1430AC75000
heap
page read and write
1AD96E70000
heap
page read and write
1CDC4126000
heap
page read and write
1430B280000
trusted library allocation
page read and write
1C02E054000
heap
page read and write
1C02E03C000
heap
page read and write
23D991D3000
heap
page read and write
206B146D000
heap
page read and write
802A7BE000
stack
page read and write
1AD96C30000
heap
page read and write
EDD17FB000
stack
page read and write
213F23F6000
heap
page read and write
1F1CA7F5000
heap
page read and write
3F4000
heap
page read and write
EC3047F000
stack
page read and write
C14F17D000
stack
page read and write
213F2402000
heap
page read and write
A9AA8FF000
stack
page read and write
262498C3000
heap
page read and write
25E0000
trusted library allocation
page read and write
E25000
heap
page read and write
23D98780000
trusted library allocation
page read and write
685497B000
stack
page read and write
1E218201000
heap
page read and write
22130AF0000
heap
page read and write
1C02E99E000
heap
page read and write
141E0090000
heap
page read and write
206B146D000
heap
page read and write
1CDC9870000
trusted library allocation
page read and write
BB74FF000
stack
page read and write
1C02E97E000
heap
page read and write
1430AC6A000
heap
page read and write
25BB5DBF000
heap
page read and write
206B1240000
heap
page read and write
1CDC47F0000
trusted library allocation
page read and write
1430AC64000
heap
page read and write
187E6600000
heap
page read and write
206B1437000
heap
page read and write
BB74FF000
stack
page read and write
23D98893000
heap
page read and write
1AD96E5E000
heap
page read and write
216C000
stack
page read and write
213F23E0000
heap
page read and write
1CDC9600000
trusted library allocation
page read and write
1CDC9760000
trusted library allocation
page read and write
1C02E0B5000
heap
page read and write
3AA4EFE000
stack
page read and write
26249660000
heap
page read and write
7FFC66D01000
unkown
page execute read
7FFC66D00000
unkown
page readonly
1C02E9AF000
heap
page read and write
1430AC4C000
heap
page read and write
206B14EE000
heap
page read and write
7FFC66D01000
unkown
page execute read
2EB4EFD000
stack
page read and write
EC305FF000
stack
page read and write
141E004E000
heap
page read and write
1CDC5600000
trusted library allocation
page read and write
213F2424000
heap
page read and write
141E008C000
heap
page read and write
1430AC40000
heap
page read and write
740000
heap
page read and write
5028FF000
stack
page read and write
1E219F40000
heap
page read and write
1CDC40CA000
heap
page read and write
2DA0000
heap
page read and write
187E665B000
heap
page read and write
2480000
direct allocation
page execute and read and write
1430AC48000
heap
page read and write
25BB5DBF000
heap
page read and write
1C02E97B000
heap
page read and write
213F25B0000
heap
page read and write
7FFC66D59000
unkown
page readonly
1C02E97B000
heap
page read and write
1CC26C02000
trusted library allocation
page read and write
1F1CBF00000
heap
page read and write
213F2405000
heap
page read and write
1C02E113000
heap
page read and write
26249670000
heap
page read and write
1430AC3D000
heap
page read and write
1C02EE02000
heap
page read and write
1CC26280000
heap
page read and write
7FFC66D01000
unkown
page execute read
1F77C9D0000
trusted library allocation
page read and write
3AA4B7B000
stack
page read and write
262498CC000
heap
page read and write
1C02E917000
heap
page read and write
141E0067000
heap
page read and write
7FFC66D52000
unkown
page readonly
7FFC66D56000
unkown
page read and write
66A5AFB000
stack
page read and write
24D29F40000
heap
page read and write
23D989B8000
heap
page read and write
7E4000
heap
page read and write
1E219C10000
heap
page readonly
1FDEC730000
heap
page readonly
802AD77000
stack
page read and write
2454000
heap
page read and write
1430AC49000
heap
page read and write
1F1CA7D4000
heap
page read and write
1AD96E13000
heap
page read and write
1CDC9830000
trusted library allocation
page read and write
1C02E04A000
heap
page read and write
A9AB4F9000
stack
page read and write
C78B6FF000
stack
page read and write
206B147D000
heap
page read and write
18002E000
direct allocation
page read and write
18002F000
direct allocation
page readonly
1CC26A80000
remote allocation
page read and write
3AA470B000
stack
page read and write
1CDC3E60000
heap
page read and write
1CDC4918000
heap
page read and write
C14EFFE000
stack
page read and write
2BDE000
stack
page read and write
1430AC4D000
heap
page read and write
141E0063000
heap
page read and write
1C02E6B0000
remote allocation
page read and write
1FD5FF9000
stack
page read and write
32FD0FB000
stack
page read and write
1430AAB0000
heap
page read and write
1C02E9B2000
heap
page read and write
66A56F9000
stack
page read and write
1430AC4B000
heap
page read and write
1C02E9A0000
heap
page read and write
2EB507C000
stack
page read and write
1AD96E83000
heap
page read and write
1430AC62000
heap
page read and write
1F77CA00000
heap
page read and write
1430AC30000
heap
page read and write
1430AC45000
heap
page read and write
15F3B7E000
stack
page read and write
206B1510000
remote allocation
page read and write
1F77C7A0000
heap
page read and write
18002E000
direct allocation
page read and write
1FDEC520000
direct allocation
page execute and read and write
7FFC66D00000
unkown
page readonly
66A5C7F000
stack
page read and write
1C02E981000
heap
page read and write
15F3A7E000
stack
page read and write
1F1CA7B0000
direct allocation
page execute and read and write
1C02E973000
heap
page read and write
1CC26458000
heap
page read and write
1C02E9B6000
heap
page read and write
187E6700000
heap
page read and write
1CDC54FE000
heap
page read and write
5EFD75D000
stack
page read and write
1CDC54E7000
heap
page read and write
23D99802000
heap
page read and write
1CDC4058000
heap
page read and write
206B148A000
heap
page read and write
1430AC65000
heap
page read and write
1C02E802000
heap
page read and write
2624A100000
heap
page read and write
1C02EE02000
heap
page read and write
1CDC4099000
heap
page read and write
32FCE7E000
stack
page read and write
1C02E04E000
heap
page read and write
1CDC5502000
heap
page read and write
206B1D20000
heap
page read and write
21C0000
heap
page read and write
23D9915B000
heap
page read and write
A9AAA78000
stack
page read and write
1F1CA7F5000
heap
page read and write
25BB6090000
trusted library allocation
page read and write
266C207C000
heap
page read and write
710000
heap
page readonly
206B141E000
heap
page read and write
23D99100000
heap
page read and write
1F1CA7F0000
heap
page read and write
206B145C000
heap
page read and write
2A5C000
stack
page read and write
1AD96BC0000
heap
page read and write
206B1433000
heap
page read and write
23D99806000
heap
page read and write
1C02EE19000
heap
page read and write
18002D000
direct allocation
page readonly
1FDEC800000
heap
page read and write
213F23F1000
heap
page read and write
1430AC53000
heap
page read and write
266C1F80000
trusted library allocation
page read and write
23D9991B000
heap
page read and write
1C02DF90000
trusted library allocation
page read and write
C2D000
heap
page read and write
1F77CB13000
heap
page read and write
1C02EE03000
heap
page read and write
1430AC7F000
heap
page read and write
2610000
heap
page read and write
C14F0FC000
stack
page read and write
1F1CA528000
heap
page read and write
1C02E9AB000
heap
page read and write
1FDEC4B0000
heap
page read and write
1430AC5E000
heap
page read and write
1430AC4E000
heap
page read and write
1C02EE02000
heap
page read and write
1CDC97F0000
trusted library allocation
page read and write
A9AA87B000
stack
page read and write
EDD1FFF000
stack
page read and write
15F358B000
stack
page read and write
350000
heap
page read and write
180000000
direct allocation
page read and write
2624986F000
heap
page read and write
1FD60FE000
stack
page read and write
23D98913000
heap
page read and write
7D0000
remote allocation
page read and write
1C02E981000
heap
page read and write
18002F000
direct allocation
page readonly
1430AC7C000
heap
page read and write
7FFC66D00000
unkown
page readonly
23D988B6000
heap
page read and write
C14EF7E000
stack
page read and write
1F1CA520000
heap
page read and write
1A6FFC30000
heap
page read and write
206B1454000
heap
page read and write
1F1CA490000
heap
page read and write
1CDC4013000
heap
page read and write
A75000
stack
page read and write
1CDC9860000
trusted library allocation
page read and write
1F1CA350000
unkown
page read and write
7FFC66D52000
unkown
page readonly
268B000
stack
page read and write
23D988D5000
heap
page read and write
206B146D000
heap
page read and write
25BB5F40000
heap
page read and write
266C2000000
heap
page read and write
1CDC40B0000
heap
page read and write
1F77C800000
heap
page read and write
25BB60F0000
trusted library allocation
page read and write
50277F000
stack
page read and write
1C02E6B0000
remote allocation
page read and write
1C02E973000
heap
page read and write
802AE7E000
stack
page read and write
EDD13FB000
stack
page read and write
91FB2FF000
stack
page read and write
1CDC40E0000
heap
page read and write
1F1CA7F0000
heap
page read and write
1CC263F0000
trusted library allocation
page read and write
266C2051000
heap
page read and write
213F23B0000
heap
page read and write
C78B17C000
stack
page read and write
1C02E975000
heap
page read and write
141E0802000
trusted library allocation
page read and write
187E6629000
heap
page read and write
187E665E000
heap
page read and write
25BB60E0000
heap
page read and write
141E0013000
heap
page read and write
213F2426000
heap
page read and write
7FFC66D52000
unkown
page readonly
23B56FE000
stack
page read and write
1C02E94E000
heap
page read and write
206B1454000
heap
page read and write
266C2002000
heap
page read and write
1430AC41000
heap
page read and write
1C02E049000
heap
page read and write
BA2000
heap
page read and write
266C2013000
heap
page read and write
2ADC000
stack
page read and write
1CDC40ED000
heap
page read and write
1430AC76000
heap
page read and write
260F000
stack
page read and write
262497D0000
trusted library allocation
page read and write
1C02DE20000
heap
page read and write
266C2102000
heap
page read and write
1430AC78000
heap
page read and write
141E0100000
heap
page read and write
1A4ECFF000
stack
page read and write
180000000
direct allocation
page read and write
187E6520000
heap
page read and write
1C02E9B3000
heap
page read and write
1CC26429000
heap
page read and write
180000000
direct allocation
page read and write
A9AB5FA000
stack
page read and write
5026FF000
stack
page read and write
141DFE40000
heap
page read and write
1CDC4107000
heap
page read and write
141E0067000
heap
page read and write
1F77CA40000
heap
page read and write
1FDEC57D000
heap
page read and write
314000
stack
page read and write
1C02E99A000
heap
page read and write
32FCB3B000
stack
page read and write
1E2181F1000
heap
page read and write
206B13A0000
heap
page read and write
213F2280000
heap
page read and write
187E6665000
heap
page read and write
1C02E9D1000
heap
page read and write
1CDC4114000
heap
page read and write
266C1EE0000
heap
page read and write
BB74FF000
stack
page read and write
25BB5DC0000
heap
page read and write
213F240F000
heap
page read and write
1A6FFE45000
heap
page read and write
7DD000
heap
page read and write
1F1CBE80000
remote allocation
page read and write
1AD96F08000
heap
page read and write
25BB6080000
trusted library allocation
page read and write
1C02E029000
heap
page read and write
23D98882000
heap
page read and write
23D99134000
heap
page read and write
66A59FB000
stack
page read and write
1F1CA7F0000
heap
page read and write
1CDC54A8000
heap
page read and write
1430AD02000
heap
page read and write
23D98876000
heap
page read and write
23D989E1000
heap
page read and write
1E218390000
heap
page read and write
23D98845000
heap
page read and write
1CDC47F3000
trusted library allocation
page read and write
1CDC54FE000
heap
page read and write
206B1480000
heap
page read and write
213F2417000
heap
page read and write
206B13F8000
heap
page read and write
1C02E9AE000
heap
page read and write
213F240F000
heap
page read and write
2D10000
remote allocation
page read and write
7FFC66D56000
unkown
page read and write
213F2423000
heap
page read and write
1FDEE130000
heap
page read and write
1CDC4080000
heap
page read and write
1F1CA4B0000
heap
page read and write
1CC26502000
heap
page read and write
23B50FE000
stack
page read and write
7FFC66D56000
unkown
page read and write
1430AC7B000
heap
page read and write
C14EEFE000
stack
page read and write
66A55FF000
stack
page read and write
1C02E053000
heap
page read and write
1C02E070000
heap
page read and write
1E218201000
heap
page read and write
262496D0000
heap
page read and write
7D0000
remote allocation
page read and write
1FDEC537000
heap
page read and write
2D10000
remote allocation
page read and write
BFD000
heap
page read and write
1CDC54A5000
heap
page read and write
7A0000
heap
page read and write
23D988E0000
heap
page read and write
18002F000
direct allocation
page readonly
206B1457000
heap
page read and write
23D989FD000
heap
page read and write
1CDC4900000
heap
page read and write
1FDEC530000
heap
page read and write
15F3C7F000
stack
page read and write
141E004B000
heap
page read and write
206B14EE000
heap
page read and write
206B1D24000
heap
page read and write
78C000
heap
page read and write
1430AC70000
heap
page read and write
1C02E977000
heap
page read and write
187E663C000
heap
page read and write
187E6590000
heap
page read and write
23D9886A000
heap
page read and write
18002E000
direct allocation
page read and write
7FFC66D56000
unkown
page read and write
1C02E059000
heap
page read and write
1CDC9810000
trusted library allocation
page read and write
A9AAC7B000
stack
page read and write
EDD19FB000
stack
page read and write
187E6708000
heap
page read and write
7FFC66D52000
unkown
page readonly
23D98897000
heap
page read and write
266C2802000
trusted library allocation
page read and write
23D988CD000
heap
page read and write
1C02E99A000
heap
page read and write
1F77CB02000
heap
page read and write
1CDC40BF000
heap
page read and write
213F240F000
heap
page read and write
1AD96F13000
heap
page read and write
1430AB20000
heap
page read and write
1430AC61000
heap
page read and write
BB7475000
stack
page read and write
1430AC31000
heap
page read and write
1AD96E2A000
heap
page read and write
1C02E973000
heap
page read and write
32FCFFF000
stack
page read and write
1CDC3E50000
heap
page read and write
1C02E0E8000
heap
page read and write
7FFC66D01000
unkown
page execute read
BD1000
heap
page read and write
91FB17C000
stack
page read and write
1430AC46000
heap
page read and write
1F1CA7D0000
heap
page read and write
141E0102000
heap
page read and write
1C02E0F9000
heap
page read and write
1430B402000
trusted library allocation
page read and write
25BB5CF0000
trusted library allocation
page read and write
1CDC5502000
heap
page read and write
213F2423000
heap
page read and write
BA2000
heap
page read and write
1CDC4089000
heap
page read and write
1F1CA7C0000
heap
page readonly
C14F2FE000
stack
page read and write
802AA7E000
stack
page read and write
23D9887A000
heap
page read and write
7FFC66D56000
unkown
page read and write
206B1480000
heap
page read and write
1C02E981000
heap
page read and write
141E0108000
heap
page read and write
BB75FE000
stack
page read and write
66A58FF000
stack
page read and write
1C02E0E9000
heap
page read and write
7FFC66D01000
unkown
page execute read
23D98900000
heap
page read and write
23D99002000
heap
page read and write
1C02E000000
heap
page read and write
1C02EE02000
heap
page read and write
23D98829000
heap
page read and write
206B13F0000
heap
page read and write
1C02E0AB000
heap
page read and write
23D987D0000
trusted library allocation
page read and write
1430AC00000
heap
page read and write
1E219D90000
heap
page read and write
141E003C000
heap
page read and write
1C02DE30000
heap
page read and write
213F2423000
heap
page read and write
1F1CA528000
heap
page read and write
25BB6C40000
heap
page readonly
B9C000
heap
page read and write
1A6FFD80000
heap
page read and write
206B147D000
heap
page read and write
262498CA000
heap
page read and write
1F1CA528000
heap
page read and write
1E218150000
heap
page read and write
1C02E97B000
heap
page read and write
1F1CA350000
heap
page read and write
206B1482000
heap
page read and write
BB757F000
stack
page read and write
BB75FE000
stack
page read and write
23D98800000
heap
page read and write
1CDC4959000
heap
page read and write
141DFE30000
heap
page read and write
206B1480000
heap
page read and write
1CDC4802000
heap
page read and write
1CDC54F8000
heap
page read and write
141E0002000
heap
page read and write
25BB60E9000
heap
page read and write
EDD20FE000
stack
page read and write
25BB5DBE000
heap
page read and write
1CDC9764000
trusted library allocation
page read and write
1AD97390000
trusted library allocation
page read and write
1C02E981000
heap
page read and write
1C02E981000
heap
page read and write
3D0000
heap
page read and write
25BB60E5000
heap
page read and write
187E6684000
heap
page read and write
2EB4B7E000
stack
page read and write
206B148A000
heap
page read and write
23D99902000
heap
page read and write
C78B57D000
stack
page read and write
187E6646000
heap
page read and write
1C02E9A1000
heap
page read and write
1CDC4959000
heap
page read and write
1C02E99A000
heap
page read and write
2EB4D7D000
stack
page read and write
1CDC9740000
trusted library allocation
page read and write
1CDC5447000
heap
page read and write
24D29DF0000
heap
page read and write
262498BB000
heap
page read and write
206B1437000
heap
page read and write
32FCBBE000
stack
page read and write
1CDC97F0000
trusted library allocation
page read and write
3F0000
heap
page read and write
7FFC66D00000
unkown
page readonly
206B1431000
heap
page read and write
BFD000
heap
page read and write
7FFC66D01000
unkown
page execute read
1CDC40D2000
heap
page read and write
385000
heap
page read and write
1C02E9AC000
heap
page read and write
2EB487B000
stack
page read and write
206B14EC000
heap
page read and write
1E218400000
direct allocation
page execute and read and write
50287E000
stack
page read and write
260000
heap
page read and write
180000000
direct allocation
page read and write
187E6660000
heap
page read and write
24D29F6B000
heap
page read and write
802AF7F000
stack
page read and write
1F77CA79000
heap
page read and write
1C02E989000
heap
page read and write
1CDC9750000
trusted library allocation
page read and write
26249889000
heap
page read and write
1CDC4918000
heap
page read and write
1CC26A80000
remote allocation
page read and write
1CDC4029000
heap
page read and write
23D99843000
heap
page read and write
25BB6C60000
trusted library allocation
page read and write
24D29F45000
heap
page read and write
1F1CA500000
heap
page read and write
1F1CA7F5000
heap
page read and write
141E0029000
heap
page read and write
187E6652000
heap
page read and write
1A6FFE60000
heap
page read and write
1F1CBF00000
heap
page read and write
180000000
direct allocation
page read and write
1CC26413000
heap
page read and write
1C02EE02000
heap
page read and write
141E0080000
heap
page read and write
23D98813000
heap
page read and write
23B54F7000
stack
page read and write
15F387E000
stack
page read and write
1C02EE00000
heap
page read and write
187E65C0000
trusted library allocation
page read and write
7FFC66D00000
unkown
page readonly
25E0000
trusted library allocation
page read and write
1E2181C8000
heap
page read and write
1F1CA500000
heap
page read and write
1CDC9720000
trusted library allocation
page read and write
1C02E98B000
heap
page read and write
390000
heap
page read and write
141DFEA0000
heap
page read and write
7FFC66D59000
unkown
page readonly
1C02E085000
heap
page read and write
1CC26400000
heap
page read and write
C43000
heap
page read and write
33833FF000
stack
page read and write
7FFC66D00000
unkown
page readonly
213F25B5000
heap
page read and write
1F1CA7D4000
heap
page read and write
206B148A000
heap
page read and write
1CDC4087000
heap
page read and write
A9AB2FC000
stack
page read and write
1C02E051000
heap
page read and write
1FD5E7A000
stack
page read and write
1CDC3FC0000
trusted library allocation
page read and write
7FFC66D56000
unkown
page read and write
258E000
stack
page read and write
1430AC42000
heap
page read and write
91FB279000
stack
page read and write
1FDEE134000
heap
page read and write
1CDC4800000
heap
page read and write
1FDEE2F0000
heap
page read and write
1F1CA7D4000
heap
page read and write
C78B37B000
stack
page read and write
1CDC403F000
heap
page read and write
1C02E95F000
heap
page read and write
187E6530000
heap
page read and write
1C02EE02000
heap
page read and write
22130B60000
heap
page read and write
1CDC5489000
heap
page read and write
266C2028000
heap
page read and write
1C02E986000
heap
page read and write
1C02E013000
heap
page read and write
1C02E98B000
heap
page read and write
1C02E95B000
heap
page read and write
1CDC97F0000
trusted library allocation
page read and write
187E6E02000
trusted library allocation
page read and write
BB7475000
stack
page read and write
23B53FB000
stack
page read and write
1A6FFE40000
heap
page read and write
25BB5D50000
heap
page read and write
141E0113000
heap
page read and write
1A4EAFF000
stack
page read and write
213F2413000
heap
page read and write
2450000
heap
page read and write
1AD96E4D000
heap
page read and write
206B147D000
heap
page read and write
25BB6C30000
trusted library allocation
page read and write
1FD617C000
stack
page read and write
1C02E9A1000
heap
page read and write
3AA4FFE000
stack
page read and write
1C02E9B1000
heap
page read and write
23D99136000
heap
page read and write
C78AD4C000
stack
page read and write
2460000
heap
page read and write
1C02EE02000
heap
page read and write
213F24E0000
heap
page read and write
EC3027C000
stack
page read and write
1CC26402000
heap
page read and write
1F1CA520000
heap
page read and write
24C0000
heap
page readonly
1A4EBFE000
stack
page read and write
1C02E99A000
heap
page read and write
18002D000
direct allocation
page readonly
1C02E0D2000
heap
page read and write
23B5878000
stack
page read and write
1CDC3EC0000
heap
page read and write
1F77CA13000
heap
page read and write
1CDC54FC000
heap
page read and write
1430AC84000
heap
page read and write
18002D000
direct allocation
page readonly
1CDC9970000
trusted library allocation
page read and write
180000000
direct allocation
page read and write
1C02E9A0000
heap
page read and write
1CDC54E2000
heap
page read and write
1CDC40BF000
heap
page read and write
1C02E108000
heap
page read and write
206B1575000
heap
page read and write
1C02E97B000
heap
page read and write
1C02E992000
heap
page read and write
7FFC66D52000
unkown
page readonly
1CDC972E000
trusted library allocation
page read and write
EDD1CFE000
stack
page read and write
1F1CA4B0000
heap
page read and write
1AD96F02000
heap
page read and write
15F38FE000
stack
page read and write
C78B9FE000
stack
page read and write
E20000
heap
page read and write
74B000
heap
page read and write
1CDC9744000
trusted library allocation
page read and write
1F1CA7C0000
heap
page readonly
1430AC6E000
heap
page read and write
There are 950 hidden memdumps, click here to show them.