IOC Report
nZNmWqwnpr.dll

loading gif

Files

File Path
Type
Category
Malicious
nZNmWqwnpr.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x9faf6271, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_nZN_29f1be1dcd9f4bc1837575d6948c7fc98cc15f_56ac50ec_19e9ffb8\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_nZN_29f1be1dcd9f4bc1837575d6948c7fc98cc15f_56ac50ec_19fdfbef\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREDB7.tmp.dmp
Mini DuMP crash report, 15 streams, Mon May 23 05:48:21 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF0E3.tmp.dmp
Mini DuMP crash report, 15 streams, Mon May 23 05:48:22 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF22C.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF4BE.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF653.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF819.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 61480 bytes, 1 file
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
modified
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_nZN_5c40899ed0f0541acc9ab16798f8d17fcf421773_56ac50ec_074e79e0\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_nZN_5c40899ed0f0541acc9ab16798f8d17fcf421773_56ac50ec_0d7e7db9\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER64B3.tmp.dmp
Mini DuMP crash report, 15 streams, Mon May 23 05:36:50 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER658D.tmp.dmp
Mini DuMP crash report, 15 streams, Mon May 23 05:36:51 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6996.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6A70.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6BC9.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6D02.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\nZNmWqwnpr.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,AddIn_FileTime
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,AddIn_SystemTime
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NhxQyxUKKifP\KOsPrJ.dll"
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\nZNmWqwnpr.dll,DllRegisterServer
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\PDQmdReNwGSs\ZxyxzMoIe.dll"
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nZNmWqwnpr.dll",#1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6392 -s 324
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6400 -s 316
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7080 -s 336
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7088 -s 328
There are 16 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://165.22.73.229/
unknown
malicious
https://dev.ditu.live.com/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
unknown
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
unknown
https://t0.tiles.ditu.live.com/tiles/gen
unknown
https://dev.virtualearth.net/REST/v1/Routes/Walking
unknown
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
unknown
https://dev.ditu.live.com/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
unknown
https://165.22.73.229:8080/tem
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
http://www.bingmapsportal.com
unknown
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
unknown
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
unknown
https://165.22.73.229:8080/Kr#
unknown
https://dev.ditu.live.com/REST/v1/Transit/Stops/
unknown
https://dev.virtualearth.net/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
unknown
http://crl.ver)
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
unknown
https://www.tiktok.com/legal/report/feedback
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
unknown
https://165.22.73.229:8080/MF
unknown
https://%s.xboxlive.com
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://dev.virtualearth.net/mapcontrol/logging.ashx
unknown
https://support.hotspotshield.com/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.t
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
https://165.22.73.229:8080/
unknown
https://disneyplus.com/legal.
unknown
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
unknown
https://165.22.73.229/eF
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
unknown
https://activity.windows.com
unknown
https://dev.ditu.live.com/REST/v1/Locations
unknown
http://help.disneyplus.com.
unknown
https://165.22.73.229/iF
unknown
https://%s.dnet.xboxlive.com
unknown
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
There are 42 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
165.22.73.229
unknown
United States
malicious
192.168.2.1
unknown
unknown
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsPeFile
\REGISTRY\A\{d5da1c81-dbb6-4ba4-3133-79497ed1c8b0}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018800453F4626F
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018800453F4626F
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
MonthID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsPeFile
\REGISTRY\A\{c4271e08-0b55-73c3-e3ee-c7f66c5eabf6}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018C005C62C4D85
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018C005C62C4D85
There are 45 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
171DB6C0000
direct allocation
page execute and read and write
malicious
1D0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
171DB6C0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
18D2A510000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
171DB6C0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
18D2A510000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
18D2A510000
direct allocation
page execute and read and write
malicious
E70000
direct allocation
page execute and read and write
malicious
227CCC3D000
heap
page read and write
27D0000
heap
page read and write
22A43DE4000
heap
page read and write
1DA9E4EE000
heap
page read and write
1FF80F72000
heap
page read and write
23F72500000
heap
page read and write
816797E000
stack
page read and write
CD1E7F8000
stack
page read and write
1DA9E4B2000
heap
page read and write
215BEB20000
heap
page read and write
1AF947F000
stack
page read and write
7FFC66ACF000
unkown
page readonly
CA0807E000
stack
page read and write
1DA99502000
heap
page read and write
23F72702000
heap
page read and write
1FF80F8E000
heap
page read and write
22FAEE50000
heap
page read and write
4F1000
heap
page read and write
7FFC66ACF000
unkown
page readonly
D986FF000
stack
page read and write
217E6237000
heap
page read and write
18AB4130000
heap
page read and write
18D2BEB0000
heap
page read and write
1FF80F18000
heap
page read and write
1FF80F74000
heap
page read and write
25354862000
heap
page read and write
18D2A540000
heap
page readonly
2FCEF4B000
stack
page read and write
1FF81420000
heap
page read and write
1DA9E4F9000
heap
page read and write
180030000
direct allocation
page readonly
1FF80648000
heap
page read and write
227CCC6A000
heap
page read and write
1FF80F9B000
heap
page read and write
217E7170000
trusted library allocation
page read and write
2FCF27E000
stack
page read and write
18002E000
direct allocation
page readonly
2B40000
heap
page read and write
2FC7BFB000
stack
page read and write
23E4325C000
heap
page read and write
16A25602000
heap
page read and write
18D2BEB0000
heap
page read and write
18D2A397000
heap
page read and write
227CCC68000
heap
page read and write
2FCF37C000
stack
page read and write
18D2A580000
heap
page read and write
1DA9A090000
trusted library allocation
page read and write
25354900000
heap
page read and write
1FF8064B000
heap
page read and write
1DA9E4E4000
heap
page read and write
2816000
heap
page read and write
1FF806AA000
heap
page read and write
F2F000
stack
page read and write
A30000
heap
page read and write
18D2A500000
direct allocation
page execute and read and write
1FF80716000
heap
page read and write
1FF80F71000
heap
page read and write
1AF927E000
stack
page read and write
E00000
heap
page read and write
1450AF00000
heap
page read and write
410000
heap
page read and write
1450AE13000
heap
page read and write
22A43DDC000
heap
page read and write
A5A907C000
stack
page read and write
18002E000
direct allocation
page readonly
1DA99C10000
trusted library allocation
page read and write
1DA9E4E4000
heap
page read and write
1DA9E4F9000
heap
page read and write
23F72656000
heap
page read and write
7FFC66AC2000
unkown
page readonly
CD1EC7B000
stack
page read and write
AC767C000
stack
page read and write
217E64C9000
heap
page read and write
18AB4253000
heap
page read and write
215BF512000
heap
page read and write
70E6FFA000
stack
page read and write
18002E000
direct allocation
page readonly
2535483C000
heap
page read and write
274E000
heap
page read and write
1AF8E7E000
stack
page read and write
1FF80F73000
heap
page read and write
70E71FE000
stack
page read and write
22A43DDC000
heap
page read and write
171D9DD8000
heap
page read and write
171D9C50000
heap
page read and write
1DA99B10000
trusted library allocation
page read and write
227CCC48000
heap
page read and write
227CCB50000
heap
page read and write
1AF917C000
stack
page read and write
25354F40000
trusted library allocation
page read and write
227CCC47000
heap
page read and write
25354813000
heap
page read and write
227CCC13000
heap
page read and write
180000000
direct allocation
page read and write
1FF80F72000
heap
page read and write
1AF8EFC000
stack
page read and write
451000
heap
page read and write
D983FD000
stack
page read and write
227CCC40000
heap
page read and write
171D9C50000
unkown
page read and write
18AB4A02000
trusted library allocation
page read and write
22A43DF9000
heap
page read and write
16A25702000
heap
page read and write
217E6490000
trusted library allocation
page read and write
18D2A397000
heap
page read and write
22FB2040000
heap
page read and write
217E627D000
heap
page read and write
1FF80F9F000
heap
page read and write
23E43970000
remote allocation
page read and write
D987FF000
stack
page read and write
1FF80F84000
heap
page read and write
23F7264F000
heap
page read and write
2FCF6FF000
stack
page read and write
23E43202000
heap
page read and write
1450AF24000
heap
page read and write
1DA98D02000
heap
page read and write
7FFC66AA1000
unkown
page execute read
18AB4313000
heap
page read and write
7FFC66ACF000
unkown
page readonly
180000000
direct allocation
page read and write
1FF806C0000
heap
page read and write
652A7DF000
stack
page read and write
217E627D000
heap
page read and write
18D2A250000
heap
page read and write
227CCC45000
heap
page read and write
1FF80E02000
heap
page read and write
18002F000
direct allocation
page read and write
7FFC66AA1000
unkown
page execute read
7FFC66ACB000
unkown
page read and write
22FAEC30000
heap
page read and write
22FAEE4C000
heap
page read and write
285E000
heap
page read and write
23F72700000
heap
page read and write
1FF80F72000
heap
page read and write
1450AE28000
heap
page read and write
23F72613000
heap
page read and write
19EED4C0000
heap
page read and write
CA07EFE000
stack
page read and write
7FFC66AA0000
unkown
page readonly
1FF81400000
heap
page read and write
253547E0000
heap
page read and write
2FCF5F7000
stack
page read and write
18D2A585000
heap
page read and write
18AB4200000
heap
page read and write
CD1ED7D000
stack
page read and write
1450AE7A000
heap
page read and write
1FF80FB1000
heap
page read and write
1FF80F7A000
heap
page read and write
1FF80F7A000
heap
page read and write
1FF80FBE000
heap
page read and write
400000
heap
page readonly
27F0000
heap
page read and write
A5A937B000
stack
page read and write
CA0827D000
stack
page read and write
180000000
direct allocation
page read and write
D988FE000
stack
page read and write
19EED230000
heap
page read and write
A3BDCAB000
stack
page read and write
CA07F7F000
stack
page read and write
7FFC66AA1000
unkown
page execute read
462000
heap
page read and write
22A43DB0000
heap
page read and write
50CB0FE000
stack
page read and write
22A43DD6000
heap
page read and write
1FF80F9B000
heap
page read and write
1450AE5F000
heap
page read and write
1C0000
direct allocation
page execute and read and write
215BEC29000
heap
page read and write
18AB4308000
heap
page read and write
23E43229000
heap
page read and write
70E66F7000
stack
page read and write
CA0817E000
stack
page read and write
171D9F00000
heap
page read and write
1450AC30000
heap
page read and write
816787A000
stack
page read and write
2990000
heap
page read and write
23E43970000
remote allocation
page read and write
2746000
heap
page read and write
1FF80F0A000
heap
page read and write
23F72675000
heap
page read and write
22FAEC4B000
heap
page read and write
23E43170000
heap
page read and write
25354860000
heap
page read and write
217E7120000
trusted library allocation
page read and write
1FF80713000
heap
page read and write
17DE5B20000
heap
page read and write
2764000
heap
page read and write
1F7F000
stack
page read and write
2535485F000
heap
page read and write
227CCC4E000
heap
page read and write
23F72600000
heap
page read and write
2EE8EF9000
stack
page read and write
1DA98BE0000
trusted library allocation
page read and write
1FF80F86000
heap
page read and write
171D9C50000
unkown
page read and write
22FAEE3E000
heap
page read and write
227CCC00000
heap
page read and write
4FB000
heap
page read and write
18D2A585000
heap
page read and write
18D2A500000
direct allocation
page execute and read and write
18002E000
direct allocation
page readonly
1FF806E8000
heap
page read and write
A5A917E000
stack
page read and write
22A44060000
heap
page read and write
1DA98C90000
heap
page read and write
22FB2950000
heap
page read and write
1F80000
heap
page read and write
18AB423C000
heap
page read and write
16A25600000
heap
page read and write
215BF539000
heap
page read and write
23F7268E000
heap
page read and write
25354829000
heap
page read and write
1DA98CFA000
heap
page read and write
17DE5980000
heap
page read and write
22A43DD2000
heap
page read and write
11A000
stack
page read and write
1FF80F72000
heap
page read and write
1FF80F00000
heap
page read and write
283E000
heap
page read and write
22A43DC6000
heap
page read and write
2769000
heap
page read and write
1FF80F9B000
heap
page read and write
23E43213000
heap
page read and write
18D2A540000
heap
page readonly
2764000
heap
page read and write
22A43DC6000
heap
page read and write
2FCF47B000
stack
page read and write
1FF80647000
heap
page read and write
1043000
heap
page read and write
1FF80F89000
heap
page read and write
EA0000
heap
page readonly
1FF80F80000
heap
page read and write
50CACFE000
stack
page read and write
18002E000
direct allocation
page readonly
171D9F05000
heap
page read and write
18D2A490000
heap
page read and write
105C000
heap
page read and write
2EE8B8D000
stack
page read and write
227CCBC0000
heap
page read and write
1FF80FAE000
heap
page read and write
2FCF4FF000
stack
page read and write
1FF80F87000
heap
page read and write
217E6275000
heap
page read and write
18D2A397000
heap
page read and write
171D9D90000
heap
page read and write
507000
heap
page read and write
19EED238000
heap
page read and write
1DA99500000
heap
page read and write
227CCC60000
heap
page read and write
FEB000
heap
page read and write
23F72708000
heap
page read and write
1450AC40000
heap
page read and write
2EE8FFE000
stack
page read and write
1DA9E300000
trusted library allocation
page read and write
70E68FB000
stack
page read and write
60000
heap
page read and write
70E62CC000
stack
page read and write
16A25E02000
trusted library allocation
page read and write
1DA9E670000
trusted library allocation
page read and write
1AF8FFC000
stack
page read and write
217E6400000
heap
page read and write
507000
heap
page read and write
18AB4140000
heap
page read and write
18D2A490000
heap
page read and write
1FF80F69000
heap
page read and write
1450AE80000
heap
page read and write
1FF80580000
heap
page read and write
1DA9E100000
trusted library allocation
page read and write
227CCC4F000
heap
page read and write
1DA99513000
heap
page read and write
1450AE65000
heap
page read and write
2FCF7FD000
stack
page read and write
1FF80650000
heap
page read and write
274E000
heap
page read and write
27B0000
heap
page read and write
1FF80F77000
heap
page read and write
22A43D90000
heap
page read and write
171DB6F0000
heap
page read and write
215BED13000
heap
page read and write
1FF80F23000
heap
page read and write
17DE5B2D000
heap
page read and write
171DB6F0000
heap
page read and write
D989FE000
stack
page read and write
652A7DF000
stack
page read and write
22A43DC1000
heap
page read and write
1DA98CA4000
heap
page read and write
2EE90FF000
stack
page read and write
1DA9E210000
trusted library allocation
page read and write
50B000
heap
page read and write
363DEFF000
stack
page read and write
1FF806EB000
heap
page read and write
264B000
stack
page read and write
1FF806B4000
heap
page read and write
1FF80708000
heap
page read and write
217E6210000
heap
page read and write
BF0207F000
stack
page read and write
7FFC66AA0000
unkown
page readonly
19EED25D000
heap
page read and write
1450AE69000
heap
page read and write
227CCC39000
heap
page read and write
1F90000
remote allocation
page read and write
1FF80F7F000
heap
page read and write
171D9D90000
heap
page read and write
1FF81402000
heap
page read and write
227CCC6C000
heap
page read and write
1450AE02000
heap
page read and write
A3BE07F000
stack
page read and write
7FFC66AC2000
unkown
page readonly
22A44065000
heap
page read and write
217E64B0000
trusted library allocation
page read and write
1FF80F48000
heap
page read and write
1DA9E370000
remote allocation
page read and write
18AB4260000
heap
page read and write
22FAEE37000
heap
page read and write
482000
heap
page read and write
4FB000
heap
page read and write
2764000
heap
page read and write
171DB7C0000
heap
page read and write
4F0000
heap
page read and write
F30000
heap
page read and write
2764000
heap
page read and write
217E61A0000
heap
page read and write
215BECCE000
heap
page read and write
171D9F05000
heap
page read and write
26CE000
stack
page read and write
1F90000
remote allocation
page read and write
16A2565A000
heap
page read and write
2764000
heap
page read and write
103F000
heap
page read and write
652AA7F000
stack
page read and write
CD1E6FE000
stack
page read and write
2535485C000
heap
page read and write
1FF80F97000
heap
page read and write
23F72E02000
trusted library allocation
page read and write
1FF80600000
heap
page read and write
2FC76EC000
stack
page read and write
CD1EB7F000
unkown
page read and write
2787000
heap
page read and write
81678FF000
stack
page read and write
2535485A000
heap
page read and write
1FF80688000
heap
page read and write
227CCC42000
heap
page read and write
180030000
direct allocation
page readonly
49E000
heap
page read and write
A5A957F000
stack
page read and write
7FFC66AC2000
unkown
page readonly
7FFC66AA0000
unkown
page readonly
1DA98C73000
heap
page read and write
D982FD000
stack
page read and write
22A43DF3000
heap
page read and write
1DA9E43E000
heap
page read and write
7FFC66AA1000
unkown
page execute read
462000
heap
page read and write
7FFC66ACF000
unkown
page readonly
7FFC66ACB000
unkown
page read and write
1FF80510000
heap
page read and write
227CCC49000
heap
page read and write
CD1E4FE000
stack
page read and write
1FF80667000
heap
page read and write
7FFC66ACF000
unkown
page readonly
215BEC13000
heap
page read and write
1FF80FAC000
heap
page read and write
A5A967F000
stack
page read and write
171D9DD0000
heap
page read and write
16A25629000
heap
page read and write
1DA98CA7000
heap
page read and write
1DA98D16000
heap
page read and write
22FB2150000
trusted library allocation
page read and write
1DA99B20000
trusted library allocation
page read and write
16A2566B000
heap
page read and write
217E627D000
heap
page read and write
1FF80F76000
heap
page read and write
1DA98B40000
heap
page read and write
1DA9E370000
remote allocation
page read and write
1DA99400000
heap
page read and write
CD1E57F000
stack
page read and write
4FB000
heap
page read and write
19EED150000
heap
page read and write
1FF80520000
heap
page read and write
1DA98C76000
heap
page read and write
298C000
stack
page read and write
1FF80F73000
heap
page read and write
1FF80F9D000
heap
page read and write
1DA9E462000
heap
page read and write
22A43D30000
heap
page read and write
7FFC66AA1000
unkown
page execute read
217E6ED0000
trusted library allocation
page read and write
1FF80F84000
heap
page read and write
2770000
heap
page read and write
1FF80F78000
heap
page read and write
1DA98C9B000
heap
page read and write
290E000
stack
page read and write
7FFC66AA0000
unkown
page readonly
1FF80F7A000
heap
page read and write
18D2A250000
unkown
page read and write
4AC000
heap
page read and write
451000
heap
page read and write
1DA9E370000
remote allocation
page read and write
1FF806ED000
heap
page read and write
22FAED90000
heap
page read and write
16A25540000
heap
page read and write
105C000
heap
page read and write
22FAEE70000
heap
page read and write
1FF80F7A000
heap
page read and write
652AA7F000
stack
page read and write
227CCC2E000
heap
page read and write
274E000
heap
page read and write
1DA9E4FB000
heap
page read and write
1FF80F82000
heap
page read and write
AC76FE000
stack
page read and write
1FF81403000
heap
page read and write
1450AE40000
heap
page read and write
227CCC50000
heap
page read and write
171D9DB0000
heap
page read and write
171D9DD8000
heap
page read and write
1DA99402000
heap
page read and write
227CCC41000
heap
page read and write
227CCC85000
heap
page read and write
1DA9E4AB000
heap
page read and write
18D2BEB0000
heap
page read and write
27D1000
heap
page read and write
1FF80F8B000
heap
page read and write
26F7000
heap
page read and write
2816000
heap
page read and write
1DA99518000
heap
page read and write
1DA9E234000
trusted library allocation
page read and write
23F724A0000
heap
page read and write
22FAEE55000
heap
page read and write
227CCC56000
heap
page read and write
18002E000
direct allocation
page readonly
25355002000
trusted library allocation
page read and write
363DB0B000
stack
page read and write
2FC7EFE000
stack
page read and write
180000000
direct allocation
page read and write
227CCC64000
heap
page read and write
215BF500000
heap
page read and write
1FF80F90000
heap
page read and write
227CCC65000
heap
page read and write
1AF907B000
stack
page read and write
19EF0700000
trusted library allocation
page read and write
A5A90FE000
stack
page read and write
1FF80FAD000
heap
page read and write
215BEC74000
heap
page read and write
1FF80702000
heap
page read and write
17DE5B33000
heap
page read and write
25354865000
heap
page read and write
1FF80629000
heap
page read and write
1450ACA0000
heap
page read and write
1DA98C57000
heap
page read and write
22A43DD7000
heap
page read and write
1FF80F9C000
heap
page read and write
171D9DB0000
heap
page read and write
670000
trusted library allocation
page read and write
217E64D0000
trusted library allocation
page read and write
23F72653000
heap
page read and write
227CCC3A000
heap
page read and write
652A7DF000
stack
page read and write
215BEC7C000
heap
page read and write
1FF80F75000
heap
page read and write
1450AE58000
heap
page read and write
1FF80F72000
heap
page read and write
273D000
heap
page read and write
AC76FE000
stack
page read and write
22FAEC45000
heap
page read and write
1FF80FB0000
heap
page read and write
171D9F00000
heap
page read and write
1FF80DA0000
remote allocation
page read and write
227CCC6E000
heap
page read and write
227CCC30000
heap
page read and write
1FF80657000
heap
page read and write
16A25675000
heap
page read and write
1081000
heap
page read and write
2000000
heap
page read and write
227CCC62000
heap
page read and write
227CD402000
trusted library allocation
page read and write
363DE7F000
stack
page read and write
16A25650000
heap
page read and write
1DA9E3F0000
trusted library allocation
page read and write
652A75C000
stack
page read and write
16A25613000
heap
page read and write
BF017BB000
stack
page read and write
1FF80F89000
heap
page read and write
1067000
heap
page read and write
171DB7C0000
heap
page read and write
1FF81402000
heap
page read and write
26D1000
heap
page read and write
1DA9E2E0000
trusted library allocation
page read and write
1FF80F84000
heap
page read and write
F35000
heap
page read and write
1FF80FAD000
heap
page read and write
217E64C0000
heap
page read and write
2FCF8FE000
stack
page read and write
23E43180000
heap
page read and write
2FC7CFE000
stack
page read and write
2EE8F79000
stack
page read and write
23E43940000
trusted library allocation
page read and write
25354864000
heap
page read and write
22A43DF6000
heap
page read and write
2535485D000
heap
page read and write
1DA9E250000
trusted library allocation
page read and write
70E67F9000
stack
page read and write
18AB4202000
heap
page read and write
652AA7F000
stack
page read and write
1DA99415000
heap
page read and write
1DA98CA1000
heap
page read and write
215BEB90000
heap
page read and write
217E64C5000
heap
page read and write
1FF80F84000
heap
page read and write
22A43F80000
heap
page read and write
6D0000
heap
page read and write
1FF80F6E000
heap
page read and write
23F72629000
heap
page read and write
23F72649000
heap
page read and write
1DA9E231000
trusted library allocation
page read and write
1FF80649000
heap
page read and write
18D2A540000
heap
page readonly
1FF80651000
heap
page read and write
50CAD7E000
stack
page read and write
1FF80F18000
heap
page read and write
18AB4302000
heap
page read and write
1FF81402000
heap
page read and write
7FFC66AA0000
unkown
page readonly
7FFC66ACB000
unkown
page read and write
4FB000
heap
page read and write
2779000
heap
page read and write
488000
heap
page read and write
1FF80FAD000
heap
page read and write
481000
heap
page read and write
180030000
direct allocation
page readonly
227CCC7C000
heap
page read and write
1FF80F85000
heap
page read and write
1FF80F82000
heap
page read and write
652A75C000
stack
page read and write
19EED24A000
heap
page read and write
1DA9E370000
trusted library allocation
page read and write
1FF80FDC000
heap
page read and write
22FAEE5F000
heap
page read and write
1FF80653000
heap
page read and write
1FF806AA000
heap
page read and write
BF01D7B000
stack
page read and write
19EED276000
heap
page read and write
140000
remote allocation
page read and write
CA083FD000
stack
page read and write
1FF80FDD000
heap
page read and write
227CCC44000
heap
page read and write
1DA9E4E7000
heap
page read and write
507000
heap
page read and write
22FAED70000
heap
page read and write
1AF8D7F000
stack
page read and write
180000000
direct allocation
page read and write
180030000
direct allocation
page readonly
1FF80F80000
heap
page read and write
217E7110000
trusted library allocation
page read and write
1DA9E4A1000
heap
page read and write
1FF80F6E000
heap
page read and write
18AB41D0000
trusted library allocation
page read and write
18D2BE80000
heap
page read and write
217E6230000
heap
page read and write
D97D2B000
stack
page read and write
446000
heap
page read and write
1DA98C3F000
heap
page read and write
4AC000
heap
page read and write
18D2A4B0000
heap
page read and write
227CCC4B000
heap
page read and write
1DA99559000
heap
page read and write
18D2A490000
heap
page read and write
1FF80654000
heap
page read and write
18002E000
direct allocation
page readonly
227CCC46000
heap
page read and write
171D9F00000
heap
page read and write
1FF80F78000
heap
page read and write
2816000
heap
page read and write
23E43A02000
trusted library allocation
page read and write
1DA9E360000
trusted library allocation
page read and write
22FAEE5B000
heap
page read and write
25354770000
heap
page read and write
50CB1FE000
stack
page read and write
CA07B2B000
stack
page read and write
AC767C000
stack
page read and write
171DB700000
heap
page readonly
274E000
heap
page read and write
23E43240000
heap
page read and write
22FAEE30000
heap
page read and write
1DA9E230000
trusted library allocation
page read and write
1DA98C6E000
heap
page read and write
171D9DD0000
heap
page read and write
22FB08D0000
heap
page read and write
1FF80F88000
heap
page read and write
22A43DDC000
heap
page read and write
217E6241000
heap
page read and write
670000
trusted library allocation
page read and write
652A75C000
stack
page read and write
18D2BE80000
heap
page read and write
A3BDD2E000
stack
page read and write
1FF80DA0000
remote allocation
page read and write
19EED4CB000
heap
page read and write
1DA9E4DE000
heap
page read and write
1FF80F8B000
heap
page read and write
2764000
heap
page read and write
227CCC61000
heap
page read and write
22A43DE4000
heap
page read and write
1FF80FA0000
heap
page read and write
1FF80F84000
heap
page read and write
1DA98C78000
heap
page read and write
227CCC7E000
heap
page read and write
19EED253000
heap
page read and write
1DA9E4D8000
heap
page read and write
D98AFE000
stack
page read and write
171D9DD8000
heap
page read and write
7FFC66ACB000
unkown
page read and write
1FF80F80000
heap
page read and write
2EE9079000
stack
page read and write
7FFC66AA1000
unkown
page execute read
18D2BE10000
remote allocation
page read and write
227CCC29000
heap
page read and write
1AF8BFC000
stack
page read and write
1DA99B03000
trusted library allocation
page read and write
50CAEFE000
stack
page read and write
481000
heap
page read and write
2535485B000
heap
page read and write
BF01C7F000
stack
page read and write
1FF80F8B000
heap
page read and write
23F72648000
heap
page read and write
150000
heap
page read and write
227CCC67000
heap
page read and write
19EED24F000
heap
page read and write
1DA9E320000
trusted library allocation
page read and write
227CCC31000
heap
page read and write
2EE8E7E000
stack
page read and write
23F7262C000
heap
page read and write
1FF80F86000
heap
page read and write
7FFC66AA1000
unkown
page execute read
171DB700000
heap
page readonly
171DB6B0000
direct allocation
page execute and read and write
22FAEE3A000
heap
page read and write
23E43970000
remote allocation
page read and write
19EED24A000
heap
page read and write
22FAEE55000
heap
page read and write
16A25713000
heap
page read and write
70E6EFA000
stack
page read and write
1FF8063C000
heap
page read and write
18AB4300000
heap
page read and write
1FF80F7F000
heap
page read and write
22FAEC40000
heap
page read and write
1FF80F8A000
heap
page read and write
217E6470000
trusted library allocation
page read and write
1026000
heap
page read and write
1FF81402000
heap
page read and write
16A25677000
heap
page read and write
16A255B0000
heap
page read and write
1DA98C13000
heap
page read and write
227CCC7B000
heap
page read and write
1DA9E400000
heap
page read and write
1DA98CFA000
heap
page read and write
25354800000
heap
page read and write
180030000
direct allocation
page readonly
70E6AFB000
stack
page read and write
7FFC66ACF000
unkown
page readonly
19EED259000
heap
page read and write
BF01BFB000
stack
page read and write
215BEC76000
heap
page read and write
1FF80FAC000
heap
page read and write
25354902000
heap
page read and write
1FF80F7A000
heap
page read and write
18D2A580000
heap
page read and write
23F72670000
heap
page read and write
1DA9E210000
trusted library allocation
page read and write
227CCBF0000
trusted library allocation
page read and write
215BED02000
heap
page read and write
1FF806D3000
heap
page read and write
215BEC3E000
heap
page read and write
23F72490000
heap
page read and write
25354886000
heap
page read and write
1FF80613000
heap
page read and write
18D2A390000
heap
page read and write
18AB4262000
heap
page read and write
19EED253000
heap
page read and write
363DB8E000
stack
page read and write
25354913000
heap
page read and write
227CCC31000
heap
page read and write
BF01F7D000
stack
page read and write
1DA98D07000
heap
page read and write
1FF80F81000
heap
page read and write
1DA9E21E000
trusted library allocation
page read and write
49E000
heap
page read and write
CD1EAFE000
stack
page read and write
7FFC66ACB000
unkown
page read and write
22FB2043000
heap
page read and write
E20000
heap
page read and write
BF01E77000
stack
page read and write
19EED25D000
heap
page read and write
A3BDDAF000
stack
page read and write
1DA9E4E7000
heap
page read and write
1DA9E240000
trusted library allocation
page read and write
18D2A585000
heap
page read and write
1FF80F8A000
heap
page read and write
487000
heap
page read and write
50CAC7B000
stack
page read and write
217E6480000
trusted library allocation
page read and write
A5A927B000
stack
page read and write
18AB425E000
heap
page read and write
180030000
direct allocation
page readonly
AC767C000
stack
page read and write
1FF80F83000
heap
page read and write
18D2A580000
heap
page read and write
1450B602000
trusted library allocation
page read and write
1FF80F8A000
heap
page read and write
16A255E0000
trusted library allocation
page read and write
1FF80656000
heap
page read and write
18D2A390000
heap
page read and write
22FAEE64000
heap
page read and write
4AC000
heap
page read and write
AE6000
stack
page read and write
2FCEFCE000
stack
page read and write
1FF80FB0000
heap
page read and write
7FFC66ACB000
unkown
page read and write
18AB422A000
heap
page read and write
A5A9477000
stack
page read and write
1FF80F78000
heap
page read and write
1FF80F80000
heap
page read and write
180000000
direct allocation
page read and write
7FFC66AC2000
unkown
page readonly
171D9DD0000
heap
page read and write
1DA9E330000
trusted library allocation
page read and write
22FAEE77000
heap
page read and write
22FAEE4C000
heap
page read and write
1DA9E2E0000
trusted library allocation
page read and write
18D2A4B0000
heap
page read and write
24CD000
stack
page read and write
1FF80F91000
heap
page read and write
AC777F000
stack
page read and write
23F72C60000
trusted library allocation
page read and write
1F90000
remote allocation
page read and write
23F72713000
heap
page read and write
1FF80F8B000
heap
page read and write
23E43302000
heap
page read and write
1FF81403000
heap
page read and write
1DA99559000
heap
page read and write
50CAFFE000
stack
page read and write
1FF80F8A000
heap
page read and write
7FFC66AC2000
unkown
page readonly
CD1E8F7000
stack
page read and write
227CCC76000
heap
page read and write
22FAEE5F000
heap
page read and write
227CCC75000
heap
page read and write
1FF80F9C000
heap
page read and write
19EEEEC0000
heap
page read and write
215BECBD000
heap
page read and write
26F8000
heap
page read and write
81679F8000
stack
page read and write
1DA9E410000
heap
page read and write
227CCC63000
heap
page read and write
AC777F000
stack
page read and write
7FFC66ACF000
unkown
page readonly
2747000
heap
page read and write
44638FD000
stack
page read and write
2765000
heap
page read and write
AC76FE000
stack
page read and write
1DA9E340000
trusted library allocation
page read and write
8167AFE000
stack
page read and write
1DA9E42E000
heap
page read and write
1DA98D02000
heap
page read and write
23F7264C000
heap
page read and write
16A2563F000
heap
page read and write
215BEB30000
heap
page read and write
418000
heap
page read and write
1FF80667000
heap
page read and write
1FF806FD000
heap
page read and write
215BF402000
heap
page read and write
6D5000
heap
page read and write
2EE8B0E000
stack
page read and write
1AF87EC000
stack
page read and write
BF01AFF000
stack
page read and write
1AF937D000
stack
page read and write
18D2A500000
direct allocation
page execute and read and write
CD1E9FC000
stack
page read and write
1DA98BB0000
heap
page read and write
1DA9E4F0000
heap
page read and write
7FFC66AA1000
unkown
page execute read
22FAEE51000
heap
page read and write
1450AF02000
heap
page read and write
180030000
direct allocation
page readonly
215BEC00000
heap
page read and write
1DA9E2E0000
trusted library allocation
page read and write
1FF80F6E000
heap
page read and write
2817000
heap
page read and write
227CCC78000
heap
page read and write
7FFC66AC2000
unkown
page readonly
19EED010000
heap
page read and write
1450AE00000
heap
page read and write
25354780000
heap
page read and write
180000000
direct allocation
page read and write
227CCD02000
heap
page read and write
16A25550000
heap
page read and write
1FF80F4F000
heap
page read and write
2FC7DFB000
stack
page read and write
1DA98C8A000
heap
page read and write
1FF80F89000
heap
page read and write
19EED262000
heap
page read and write
17DE5AC0000
heap
page read and write
E60000
direct allocation
page execute and read and write
1DA99518000
heap
page read and write
274B000
heap
page read and write
2764000
heap
page read and write
23F72681000
heap
page read and write
7FFC66ACB000
unkown
page read and write
1FF80670000
heap
page read and write
18D2A250000
unkown
page read and write
1DA99504000
heap
page read and write
23F7263C000
heap
page read and write
1DA98C00000
heap
page read and write
1FF80FAD000
heap
page read and write
171DB760000
remote allocation
page read and write
447000
heap
page read and write
1FF806E0000
heap
page read and write
180000000
direct allocation
page read and write
18002E000
direct allocation
page readonly
18AB425A000
heap
page read and write
1DA9E240000
trusted library allocation
page read and write
18AB41A0000
heap
page read and write
244E000
stack
page read and write
23CC000
stack
page read and write
1DA9E254000
trusted library allocation
page read and write
171D9DB0000
heap
page read and write
2A5E000
stack
page read and write
22FAEE77000
heap
page read and write
1FF806C7000
heap
page read and write
22A43DE4000
heap
page read and write
19EED26E000
heap
page read and write
171DB760000
remote allocation
page read and write
25CF000
stack
page read and write
8167A7E000
stack
page read and write
180030000
direct allocation
page readonly
1FF81402000
heap
page read and write
18D2A390000
heap
page read and write
1DA9E420000
heap
page read and write
1DA9E44B000
heap
page read and write
1DA9E0F0000
trusted library allocation
page read and write
7FFC66AA0000
unkown
page readonly
19EEECF3000
heap
page read and write
217E61B0000
trusted library allocation
page read and write
171DB7C0000
heap
page read and write
1FF80F72000
heap
page read and write
BF01A7F000
stack
page read and write
25354908000
heap
page read and write
D985FD000
stack
page read and write
7FFC66AA0000
unkown
page readonly
273D000
heap
page read and write
23E43200000
heap
page read and write
1FF805B0000
trusted library allocation
page read and write
171DB6B0000
direct allocation
page execute and read and write
140000
remote allocation
page read and write
18AB425C000
heap
page read and write
22A43DF7000
heap
page read and write
D9817A000
stack
page read and write
FE0000
heap
page read and write
22A43DBA000
heap
page read and write
1DA99B00000
trusted library allocation
page read and write
2717000
heap
page read and write
1DA98C29000
heap
page read and write
7FFC66AC2000
unkown
page readonly
1FF80F7A000
heap
page read and write
25354852000
heap
page read and write
1FF81419000
heap
page read and write
2EE8A8B000
stack
page read and write
171DB700000
heap
page readonly
274E000
heap
page read and write
19EED24E000
heap
page read and write
22A43DF9000
heap
page read and write
23E431E0000
heap
page read and write
CA082FF000
stack
page read and write
171DB6F0000
heap
page read and write
227CCB60000
heap
page read and write
1FF80F4B000
heap
page read and write
1FF80F09000
heap
page read and write
FBE000
stack
page read and write
8167B7C000
stack
page read and write
171DB6B0000
direct allocation
page execute and read and write
23F72651000
heap
page read and write
19EED170000
heap
page read and write
70E69FF000
stack
page read and write
CA07FFC000
stack
page read and write
CD1E47B000
stack
page read and write
215BECCB000
heap
page read and write
2777000
heap
page read and write
22A43DF4000
heap
page read and write
1FF80FAE000
heap
page read and write
1FF80F80000
heap
page read and write
CD1E67C000
stack
page read and write
18AB428C000
heap
page read and write
1FF80658000
heap
page read and write
1FF80F80000
heap
page read and write
217E7100000
heap
page readonly
7FFC66ACB000
unkown
page read and write
18AB4213000
heap
page read and write
2ADB000
stack
page read and write
171D9F05000
heap
page read and write
18D2A4B0000
heap
page read and write
25354868000
heap
page read and write
1DA9E350000
trusted library allocation
page read and write
26D0000
heap
page read and write
1FF8064E000
heap
page read and write
22FAEE52000
heap
page read and write
7FFC66AA0000
unkown
page readonly
507000
heap
page read and write
18D2BE80000
heap
page read and write
217E6275000
heap
page read and write
19EED4C5000
heap
page read and write
227CCC2D000
heap
page read and write
215BEBC0000
trusted library allocation
page read and write
25354879000
heap
page read and write
1DA98B50000
heap
page read and write
19EEECF0000
heap
page read and write
1DA9E218000
trusted library allocation
page read and write
2535484A000
heap
page read and write
1FF8064A000
heap
page read and write
19EED1E0000
heap
page read and write
18D2BE10000
remote allocation
page read and write
25354867000
heap
page read and write
7FFC66AC2000
unkown
page readonly
171D9D90000
heap
page read and write
AC777F000
stack
page read and write
170000
heap
page read and write
1FF8064D000
heap
page read and write
1FF80DA0000
remote allocation
page read and write
22A43DD4000
heap
page read and write
18002F000
direct allocation
page read and write
1450ADA0000
trusted library allocation
page read and write
1FF81402000
heap
page read and write
22A43DF9000
heap
page read and write
274E000
heap
page read and write
7FFC66ACF000
unkown
page readonly
There are 938 hidden memdumps, click here to show them.