IOC Report
3vYbe1bYFd

loading gif

Files

File Path
Type
Category
Malicious
3vYbe1bYFd.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x1bb4a119, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_3vY_f2377edc972ec1548b57729b7c19e6e09b2f3f_e0906090_051c2651\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_3vY_f2377edc972ec1548b57729b7c19e6e09b2f3f_e0906090_0f5825e4\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA615.tmp.dmp
Mini DuMP crash report, 15 streams, Sun May 22 21:31:21 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA72E.tmp.dmp
Mini DuMP crash report, 15 streams, Sun May 22 21:31:21 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA933.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAA8C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAB17.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERACDD.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 61480 bytes, 1 file
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
modified
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\3vYbe1bYFd.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\3vYbe1bYFd.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\3vYbe1bYFd.dll,AddIn_FileTime
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZhCaZiQILulll\dyxOJP.dll"
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\3vYbe1bYFd.dll,AddIn_SystemTime
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\3vYbe1bYFd.dll,DllRegisterServer
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k unistacksvcgroup
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\3vYbe1bYFd.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\3vYbe1bYFd.dll",#1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 404 -s 336
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 4584 -s 328
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 14 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://165.22.73.229/X)
unknown
malicious
https://165.22.73.229/
unknown
malicious
https://dev.ditu.live.com/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
unknown
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
unknown
https://t0.tiles.ditu.live.com/tiles/gen
unknown
https://dev.virtualearth.net/REST/v1/Routes/Walking
unknown
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
unknown
https://dev.ditu.live.com/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
https://www.tiktok.com/legal/report
unknown
http://www.bingmapsportal.com
unknown
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
unknown
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
unknown
https://dev.ditu.live.com/REST/v1/Transit/Stops/
unknown
https://dev.virtualearth.net/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
unknown
https://www.tiktok.com/legal/report/feedback
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
unknown
https://%s.xboxlive.com
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://dev.virtualearth.net/mapcontrol/logging.ashx
unknown
https://support.hotspotshield.com/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.t
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
https://165.22.73.229:8080/
unknown
https://disneyplus.com/legal.
unknown
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
unknown
https://165.22.73.229:8080/Num
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
unknown
https://activity.windows.com
unknown
https://dev.ditu.live.com/REST/v1/Locations
unknown
http://help.disneyplus.com.
unknown
https://%s.dnet.xboxlive.com
unknown
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
There are 39 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
165.22.73.229
unknown
United States
malicious
192.168.2.1
unknown
unknown
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsPeFile
\REGISTRY\A\{fda3240c-d1cc-5f2b-a779-3b62ecae2519}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f1\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
MonthID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 20 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
180001000
direct allocation
page execute read
malicious
17C4A5C0000
direct allocation
page execute and read and write
malicious
17C4A5C0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
A80000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
A70000
direct allocation
page execute and read and write
malicious
1B1EE280000
direct allocation
page execute and read and write
malicious
1B1EE280000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
17C4A5C0000
direct allocation
page execute and read and write
malicious
1B1EE280000
direct allocation
page execute and read and write
malicious
2D34000
heap
page read and write
1D624E1A000
heap
page read and write
D3A0E9B000
stack
page read and write
262962D6000
heap
page read and write
CE4000
heap
page read and write
6D5C07C000
stack
page read and write
1E4F4413000
heap
page read and write
18002E000
direct allocation
page readonly
6D5BF7E000
stack
page read and write
147C8A7E000
heap
page read and write
221D283A000
heap
page read and write
147C9321000
heap
page read and write
1C64CE20000
trusted library allocation
page read and write
147C939F000
heap
page read and write
1B1EDFC0000
heap
page read and write
9085E7F000
stack
page read and write
29A2A05A000
heap
page read and write
147C938D000
heap
page read and write
2436D700000
remote allocation
page read and write
180030000
direct allocation
page readonly
2436D5AE000
trusted library allocation
page read and write
AD0000
heap
page read and write
2D8A000
heap
page read and write
CE3000
heap
page read and write
189CF8D000
stack
page read and write
1B1EDFC0000
unkown
page read and write
ACB000
heap
page read and write
2D75000
heap
page read and write
147C93AF000
heap
page read and write
29A29F20000
heap
page read and write
29A2A102000
heap
page read and write
2D68000
heap
page read and write
199B7E81000
heap
page read and write
1BA975F0000
heap
page read and write
26296297000
heap
page read and write
3366A7B000
stack
page read and write
2D70000
heap
page read and write
2290343C000
heap
page read and write
262962B7000
heap
page read and write
2D65000
heap
page read and write
D80597B000
stack
page read and write
147C97B0000
remote allocation
page read and write
262962BE000
heap
page read and write
CED000
heap
page read and write
221D285C000
heap
page read and write
17C4A5F0000
heap
page read and write
147C9396000
heap
page read and write
2436D5E0000
trusted library allocation
page read and write
24368802000
heap
page read and write
262961F5000
heap
page read and write
147C937F000
heap
page read and write
2436D902000
heap
page read and write
221D2800000
heap
page read and write
7FFFF6D32000
unkown
page readonly
17C4A5F0000
heap
page read and write
29A2A063000
heap
page read and write
1D625060000
heap
page read and write
1BA97913000
heap
page read and write
147C8AE7000
heap
page read and write
2D70000
heap
page read and write
147C9300000
heap
page read and write
23DE000
stack
page read and write
2FDAD250000
heap
page read and write
17C4A8A0000
heap
page read and write
147C8AE4000
heap
page read and write
199B7C60000
heap
page read and write
147C938C000
heap
page read and write
1B1EE330000
heap
page read and write
147C88B0000
heap
page read and write
1E4F4513000
heap
page read and write
29A7C160000
heap
page read and write
474DDF9000
stack
page read and write
2D9BCAA0000
heap
page read and write
2D9BD402000
trusted library allocation
page read and write
AE5000
heap
page read and write
2436D670000
trusted library allocation
page read and write
2436D6E0000
trusted library allocation
page read and write
25078272000
heap
page read and write
2432E413000
heap
page read and write
18002E000
direct allocation
page readonly
18002F000
direct allocation
page read and write
C25B9FB000
stack
page read and write
1C64CF08000
heap
page read and write
DFEEAFC000
stack
page read and write
33671FE000
stack
page read and write
1C64D1C0000
trusted library allocation
page read and write
D04107A000
stack
page read and write
24368074000
heap
page read and write
17C4A880000
heap
page readonly
24367F00000
trusted library allocation
page read and write
1E4F43F0000
remote allocation
page read and write
29A78F5D000
heap
page read and write
C5A000
heap
page read and write
29A7C2B0000
heap
page read and write
199B7DD0000
trusted library allocation
page read and write
1B1EE120000
heap
page read and write
17C4A5F8000
heap
page read and write
A30218E000
stack
page read and write
1B1EE270000
direct allocation
page execute and read and write
2432E43D000
heap
page read and write
147C8B16000
heap
page read and write
147C91B0000
trusted library allocation
page read and write
29A2A05B000
heap
page read and write
24368023000
heap
page read and write
147C9386000
heap
page read and write
24368918000
heap
page read and write
25078100000
trusted library allocation
page read and write
147C8A49000
heap
page read and write
2D68000
heap
page read and write
1B1EE129000
heap
page read and write
147C937E000
heap
page read and write
147C937D000
heap
page read and write
2D83000
heap
page read and write
1BA97813000
heap
page read and write
8B7F8FF000
stack
page read and write
2D68000
heap
page read and write
1E4F443F000
heap
page read and write
1E4F5DA0000
trusted library allocation
page read and write
147C939F000
heap
page read and write
199B7F00000
heap
page read and write
2436D81F000
heap
page read and write
147C938C000
heap
page read and write
180030000
direct allocation
page readonly
180000000
direct allocation
page read and write
1BA97800000
heap
page read and write
29A79125000
heap
page read and write
2E17000
heap
page read and write
7FFFF6D3B000
unkown
page read and write
221D2862000
heap
page read and write
3366D7A000
stack
page read and write
7FFFF6D3F000
unkown
page readonly
262962D2000
heap
page read and write
221D285F000
heap
page read and write
147C9319000
heap
page read and write
24368918000
heap
page read and write
1E4F42A0000
heap
page read and write
29A78F6C000
heap
page read and write
250782CD000
heap
page read and write
7FFFF6D11000
unkown
page execute read
221D2760000
trusted library allocation
page read and write
1D624E20000
heap
page read and write
147C93AF000
heap
page read and write
147C9803000
heap
page read and write
D04147B000
stack
page read and write
29A2A05D000
heap
page read and write
18002E000
direct allocation
page readonly
147C8AAC000
heap
page read and write
22903400000
heap
page read and write
2436D480000
trusted library allocation
page read and write
24368902000
heap
page read and write
C8F000
heap
page read and write
C31000
heap
page read and write
262962D4000
heap
page read and write
2432E2E0000
heap
page read and write
6B2547B000
stack
page read and write
29A2A000000
heap
page read and write
147C935E000
heap
page read and write
221D286A000
heap
page read and write
147C9819000
heap
page read and write
474DD7F000
stack
page read and write
199B7CD0000
heap
page read and write
147C9375000
heap
page read and write
1B1EE100000
heap
page read and write
147C8B13000
heap
page read and write
9085E7F000
stack
page read and write
1E4F4230000
heap
page read and write
147C9202000
heap
page read and write
147C8A26000
heap
page read and write
1E4F4459000
heap
page read and write
147C93B1000
heap
page read and write
2DCE000
heap
page read and write
1BA97877000
heap
page read and write
2D70000
heap
page read and write
147C938D000
heap
page read and write
147C9387000
heap
page read and write
25078302000
heap
page read and write
7FFFF6D3F000
unkown
page readonly
2436D887000
heap
page read and write
147C9386000
heap
page read and write
147C938C000
heap
page read and write
7FFFF6D10000
unkown
page readonly
2507828B000
heap
page read and write
262962B6000
heap
page read and write
2432E3E0000
trusted library allocation
page read and write
2D4E000
heap
page read and write
1C64CEA0000
heap
page read and write
1C64D225000
heap
page read and write
17C4A8A0000
heap
page read and write
1BA97600000
heap
page read and write
199B7F13000
heap
page read and write
17C4A8A5000
heap
page read and write
1C64D229000
heap
page read and write
D04127E000
stack
page read and write
2D9BCBA0000
trusted library allocation
page read and write
1B1EFC40000
heap
page read and write
2D8C000
heap
page read and write
1C64CF11000
heap
page read and write
C25B6FE000
stack
page read and write
24367E00000
heap
page read and write
9085B6C000
stack
page read and write
22903402000
heap
page read and write
2D12000
heap
page read and write
7FFFF6D3F000
unkown
page readonly
2D9BCC29000
heap
page read and write
147C938D000
heap
page read and write
250782CA000
heap
page read and write
2C4E000
stack
page read and write
1C64DD20000
trusted library allocation
page read and write
CE7000
heap
page read and write
147C8A51000
heap
page read and write
147C8AC3000
heap
page read and write
FF722FD000
stack
page read and write
24368013000
heap
page read and write
1D628240000
trusted library allocation
page read and write
2290345F000
heap
page read and write
BFB000
heap
page read and write
FC2CBFF000
stack
page read and write
147C93AA000
heap
page read and write
1C64D150000
trusted library allocation
page read and write
221D286E000
heap
page read and write
180030000
direct allocation
page readonly
221D284D000
heap
page read and write
147C9802000
heap
page read and write
1E4F4518000
heap
page read and write
C25BAF7000
stack
page read and write
24368102000
heap
page read and write
D040F78000
stack
page read and write
3366E77000
stack
page read and write
FC2CA7A000
stack
page read and write
A60000
heap
page readonly
17C4A5F8000
heap
page read and write
1B1EE2B0000
heap
page readonly
29A79120000
heap
page read and write
1D624E32000
heap
page read and write
2436D6D0000
trusted library allocation
page read and write
221D2902000
heap
page read and write
1D624E23000
heap
page read and write
1D624E2D000
heap
page read and write
147C9394000
heap
page read and write
29A2A03C000
heap
page read and write
24368076000
heap
page read and write
147C9802000
heap
page read and write
17C4BEF0000
heap
page read and write
221D2875000
heap
page read and write
147C9317000
heap
page read and write
C31000
heap
page read and write
147C938D000
heap
page read and write
2D56000
heap
page read and write
1B1EE220000
heap
page read and write
7FFFF6D32000
unkown
page readonly
29A78F71000
heap
page read and write
262962B4000
heap
page read and write
25078000000
heap
page read and write
1B1EE310000
remote allocation
page read and write
7FFFF6D11000
unkown
page execute read
24368092000
heap
page read and write
22903481000
heap
page read and write
221D2860000
heap
page read and write
2436D690000
trusted library allocation
page read and write
221D2841000
heap
page read and write
2436D8FF000
heap
page read and write
769FD9F000
stack
page read and write
1E4F451C000
heap
page read and write
17C4A540000
heap
page read and write
1E4F43C0000
trusted library allocation
page read and write
D0419FA000
stack
page read and write
D040B6B000
stack
page read and write
1B1EDFC0000
unkown
page read and write
2290347B000
heap
page read and write
17C4BEF0000
heap
page read and write
147C8B02000
heap
page read and write
A30287F000
stack
page read and write
9085EFF000
stack
page read and write
6B2527E000
stack
page read and write
147C9371000
heap
page read and write
243680AC000
heap
page read and write
1E4F4240000
heap
page read and write
D041BFF000
stack
page read and write
147C9387000
heap
page read and write
147C9371000
heap
page read and write
1C64CF50000
heap
page read and write
7FFFF6D3B000
unkown
page read and write
199B7F02000
heap
page read and write
147C8AB6000
heap
page read and write
221D2831000
heap
page read and write
FC2CC78000
stack
page read and write
22903502000
heap
page read and write
1E4F43F0000
remote allocation
page read and write
29A78F59000
heap
page read and write
199B7E29000
heap
page read and write
8B7FBFF000
stack
page read and write
2D62000
heap
page read and write
199B8602000
trusted library allocation
page read and write
1D6280A0000
heap
page read and write
2D70000
heap
page read and write
221D2865000
heap
page read and write
17C4A400000
unkown
page read and write
29A78F62000
heap
page read and write
147C9397000
heap
page read and write
147C8B08000
heap
page read and write
2E16000
heap
page read and write
6B252FC000
stack
page read and write
147C9802000
heap
page read and write
262962D2000
heap
page read and write
250782BC000
heap
page read and write
147C8A89000
heap
page read and write
262962D2000
heap
page read and write
CED000
heap
page read and write
221D2845000
heap
page read and write
2460000
heap
page read and write
7FFFF6D3F000
unkown
page readonly
24368900000
heap
page read and write
147C938D000
heap
page read and write
7FFFF6D3F000
unkown
page readonly
2436D6F0000
trusted library allocation
page read and write
221D2840000
heap
page read and write
C9D000
heap
page read and write
25078213000
heap
page read and write
7FFFF6D11000
unkown
page execute read
199B7C70000
heap
page read and write
1BA97858000
heap
page read and write
221D287F000
heap
page read and write
199B7E3C000
heap
page read and write
221D2842000
heap
page read and write
147C93D9000
heap
page read and write
9085B6C000
stack
page read and write
29A2A108000
heap
page read and write
2436806F000
heap
page read and write
29A2A02A000
heap
page read and write
7FFFF6D10000
unkown
page readonly
C25B67B000
stack
page read and write
2436D700000
remote allocation
page read and write
147C8A55000
heap
page read and write
1D624E3E000
heap
page read and write
221D2847000
heap
page read and write
147C9382000
heap
page read and write
22903413000
heap
page read and write
147C8A71000
heap
page read and write
C25B87B000
stack
page read and write
2D9BCC33000
heap
page read and write
243680FD000
heap
page read and write
262962D2000
heap
page read and write
221D2832000
heap
page read and write
C9D000
heap
page read and write
147C939E000
heap
page read and write
2D9BCA30000
heap
page read and write
147C9386000
heap
page read and write
2432E402000
heap
page read and write
9085EFF000
stack
page read and write
2436D5C1000
trusted library allocation
page read and write
22903452000
heap
page read and write
2D62000
heap
page read and write
147C9377000
heap
page read and write
1B1EE335000
heap
page read and write
29A78F5E000
heap
page read and write
28CE000
stack
page read and write
24368959000
heap
page read and write
7FFFF6D3B000
unkown
page read and write
147C9383000
heap
page read and write
147C9387000
heap
page read and write
A10000
heap
page read and write
1D628233000
heap
page read and write
17C4A5B0000
direct allocation
page execute and read and write
2436D812000
heap
page read and write
24368913000
heap
page read and write
147C9377000
heap
page read and write
2D65000
heap
page read and write
7FFFF6D3B000
unkown
page read and write
2DCE000
heap
page read and write
24368059000
heap
page read and write
2436D700000
trusted library allocation
page read and write
2DCE000
heap
page read and write
2629629E000
heap
page read and write
2432E467000
heap
page read and write
1E4F5E02000
trusted library allocation
page read and write
2D68000
heap
page read and write
1B1EE330000
heap
page read and write
1C64D230000
trusted library allocation
page read and write
C75000
heap
page read and write
2432E400000
heap
page read and write
AC0000
heap
page read and write
2D9BCC25000
heap
page read and write
199B7E5F000
heap
page read and write
1BA97760000
trusted library allocation
page read and write
25078229000
heap
page read and write
336727F000
unkown
page read and write
29A7C2B3000
heap
page read and write
24369400000
trusted library allocation
page read and write
2436D6B0000
trusted library allocation
page read and write
B49000
heap
page read and write
2D9BCC02000
heap
page read and write
24368102000
heap
page read and write
D0417FD000
stack
page read and write
7FFFF6D3B000
unkown
page read and write
2D62000
heap
page read and write
29A78F48000
heap
page read and write
147C8ACA000
heap
page read and write
BC0000
remote allocation
page read and write
147C93AE000
heap
page read and write
2D70000
heap
page read and write
2D68000
heap
page read and write
245F000
stack
page read and write
147C9377000
heap
page read and write
9451FB000
stack
page read and write
2D9BCBD0000
remote allocation
page read and write
2D56000
heap
page read and write
147C9350000
heap
page read and write
1D625065000
heap
page read and write
147C9386000
heap
page read and write
2BCB000
stack
page read and write
1D624E46000
heap
page read and write
199B7E00000
heap
page read and write
180000000
direct allocation
page read and write
2436D400000
trusted library allocation
page read and write
2436D8E0000
heap
page read and write
147C9385000
heap
page read and write
221D287B000
heap
page read and write
769FD1F000
stack
page read and write
147C9387000
heap
page read and write
A20000
heap
page read and write
7FFFF6D32000
unkown
page readonly
1E4F4449000
heap
page read and write
221D2829000
heap
page read and write
2355AFF000
stack
page read and write
24367D90000
heap
page read and write
199B7E65000
heap
page read and write
221D2813000
heap
page read and write
7FFFF6D32000
unkown
page readonly
147C938D000
heap
page read and write
2290345C000
heap
page read and write
2432EC02000
trusted library allocation
page read and write
24367FF0000
trusted library allocation
page read and write
C5B000
heap
page read and write
2436D5E4000
trusted library allocation
page read and write
3366B7E000
stack
page read and write
2436808B000
heap
page read and write
2436D6C0000
trusted library allocation
page read and write
9085BEE000
stack
page read and write
2D9BCD02000
heap
page read and write
630000
heap
page read and write
221D2859000
heap
page read and write
7FFFF6D11000
unkown
page execute read
147C9324000
heap
page read and write
18002E000
direct allocation
page readonly
1E4F4449000
heap
page read and write
147C9377000
heap
page read and write
B47000
heap
page read and write
7FFFF6D11000
unkown
page execute read
2436D5C0000
trusted library allocation
page read and write
7FFFF6D11000
unkown
page execute read
147C938C000
heap
page read and write
147C8A80000
heap
page read and write
D80587B000
stack
page read and write
2436D5A0000
trusted library allocation
page read and write
29A2A05F000
heap
page read and write
1B1EE2B0000
heap
page readonly
17C4A560000
heap
page read and write
1D62506B000
heap
page read and write
189CF0E000
stack
page read and write
1B1EE330000
heap
page read and write
22903513000
heap
page read and write
B0A000
heap
page read and write
D80577E000
stack
page read and write
D80567B000
stack
page read and write
147C9371000
heap
page read and write
17C4BF90000
heap
page read and write
180000000
direct allocation
page read and write
CB4000
heap
page read and write
A00000
heap
page read and write
A30267E000
stack
page read and write
2432E477000
heap
page read and write
1B1EFC40000
heap
page read and write
29A7912B000
heap
page read and write
7FFFF6D10000
unkown
page readonly
6C5000
stack
page read and write
147C938C000
heap
page read and write
29A78DC0000
heap
page read and write
2CCE000
stack
page read and write
2A0B000
stack
page read and write
9085E7F000
stack
page read and write
1D624E08000
heap
page read and write
769FC9C000
stack
page read and write
1C64CF48000
heap
page read and write
1E4F4458000
heap
page read and write
22903489000
heap
page read and write
199B7E57000
heap
page read and write
29A2A07C000
heap
page read and write
147C9392000
heap
page read and write
147C938C000
heap
page read and write
A60000
direct allocation
page execute and read and write
18002E000
direct allocation
page readonly
25078313000
heap
page read and write
769FD1F000
stack
page read and write
17C4A880000
heap
page readonly
2DCE000
heap
page read and write
147C8AD7000
heap
page read and write
6B2557D000
stack
page read and write
147C9380000
heap
page read and write
2D4E000
heap
page read and write
147C9385000
heap
page read and write
262962B3000
heap
page read and write
1B1EE270000
direct allocation
page execute and read and write
7FFFF6D10000
unkown
page readonly
2D65000
heap
page read and write
2436D5A8000
trusted library allocation
page read and write
A30277F000
stack
page read and write
22903320000
trusted library allocation
page read and write
2436D8F5000
heap
page read and write
221D287A000
heap
page read and write
1B1EE310000
remote allocation
page read and write
1B1EFC40000
heap
page read and write
2DCE000
heap
page read and write
147C8AE9000
heap
page read and write
262962BE000
heap
page read and write
D8056FD000
stack
page read and write
221D2863000
heap
page read and write
8B7F37B000
stack
page read and write
1D626950000
heap
page read and write
2436D864000
heap
page read and write
1D624E47000
heap
page read and write
8B7F4FC000
stack
page read and write
94557E000
stack
page read and write
C5A000
heap
page read and write
221D2885000
heap
page read and write
D04117A000
stack
page read and write
6D5C4FE000
stack
page read and write
29A78F7D000
heap
page read and write
FC2CCFF000
stack
page read and write
147C8A29000
heap
page read and write
29A2A086000
heap
page read and write
147C9802000
heap
page read and write
147C93B4000
heap
page read and write
CED000
heap
page read and write
25078268000
heap
page read and write
147C8A4F000
heap
page read and write
243680FD000
heap
page read and write
1BA98002000
trusted library allocation
page read and write
D805BFF000
stack
page read and write
2D9BCC58000
heap
page read and write
2432E48A000
heap
page read and write
CC6000
heap
page read and write
474DA7C000
stack
page read and write
2FDAD390000
heap
page read and write
147C937F000
heap
page read and write
7FFFF6D3F000
unkown
page readonly
1B1EE220000
heap
page read and write
29A29F30000
heap
page read and write
2436D8FB000
heap
page read and write
262962BE000
heap
page read and write
180000000
direct allocation
page read and write
DFEED7D000
stack
page read and write
17C4A540000
heap
page read and write
262962B1000
heap
page read and write
2432E280000
heap
page read and write
17C4BF90000
heap
page read and write
C25B77E000
stack
page read and write
147C938C000
heap
page read and write
3366AFE000
stack
page read and write
147C9379000
heap
page read and write
1E4F43A0000
trusted library allocation
page read and write
1BA9787B000
heap
page read and write
1B1EE335000
heap
page read and write
147C9380000
heap
page read and write
258F000
stack
page read and write
147C9324000
heap
page read and write
1E4F4502000
heap
page read and write
1B1EE120000
heap
page read and write
199B7E2C000
heap
page read and write
221D2867000
heap
page read and write
6D5C3FF000
stack
page read and write
2436D905000
heap
page read and write
180030000
direct allocation
page readonly
24368029000
heap
page read and write
1E4F4468000
heap
page read and write
1E4F4459000
heap
page read and write
C8F000
heap
page read and write
C75000
heap
page read and write
FC2CB7F000
stack
page read and write
221D285A000
heap
page read and write
29A2A068000
heap
page read and write
7FFFF6D32000
unkown
page readonly
1B1EFDF0000
heap
page read and write
147C8A3C000
heap
page read and write
2436D670000
trusted library allocation
page read and write
147C9802000
heap
page read and write
147C8A4E000
heap
page read and write
2D65000
heap
page read and write
7FFFF6D3F000
unkown
page readonly
29A29FC0000
trusted library allocation
page read and write
147C8A00000
heap
page read and write
A20000
heap
page read and write
7FFFF6D32000
unkown
page readonly
BC0000
remote allocation
page read and write
FC2CD7C000
stack
page read and write
24368125000
heap
page read and write
1D624E29000
heap
page read and write
17C4BF90000
heap
page read and write
7FFFF6D32000
unkown
page readonly
221D2844000
heap
page read and write
3366F77000
stack
page read and write
262962CC000
heap
page read and write
147C8A48000
heap
page read and write
147C9397000
heap
page read and write
24368079000
heap
page read and write
22903C02000
trusted library allocation
page read and write
24368114000
heap
page read and write
D805CFF000
stack
page read and write
AE0000
trusted library allocation
page read and write
147C937F000
heap
page read and write
CED000
heap
page read and write
A15000
heap
page read and write
147C938F000
heap
page read and write
147C9800000
heap
page read and write
221D287C000
heap
page read and write
B27000
heap
page read and write
610000
heap
page read and write
17C4A8A0000
heap
page read and write
147C9387000
heap
page read and write
147C8A58000
heap
page read and write
2436D900000
heap
page read and write
DFEEEFD000
stack
page read and write
29A78F6C000
heap
page read and write
1BA97802000
heap
page read and write
147C9383000
heap
page read and write
29A79090000
heap
page read and write
2D9BCC13000
heap
page read and write
221D283D000
heap
page read and write
6B2517E000
stack
page read and write
7FFFF6D10000
unkown
page readonly
94547F000
stack
page read and write
2DC3000
heap
page read and write
1E4F6000000
trusted library allocation
page read and write
147C9802000
heap
page read and write
2D56000
heap
page read and write
29A78F56000
heap
page read and write
29A78F20000
heap
page read and write
1C64D0E0000
trusted library allocation
page read and write
1E4F4448000
heap
page read and write
6B2577F000
stack
page read and write
7FFFF6D3F000
unkown
page readonly
FC2CAFE000
stack
page read and write
1B1EE2B0000
heap
page readonly
CC6000
heap
page read and write
147C9381000
heap
page read and write
17C4A5F0000
heap
page read and write
B4D000
heap
page read and write
221D2864000
heap
page read and write
147C8AA5000
heap
page read and write
1D624E1A000
heap
page read and write
1D624E00000
heap
page read and write
235587D000
stack
page read and write
D3A127F000
stack
page read and write
1B1EE270000
direct allocation
page execute and read and write
25078B00000
heap
page read and write
147C93AF000
heap
page read and write
24368000000
heap
page read and write
147C934C000
heap
page read and write
2D62000
heap
page read and write
A50000
direct allocation
page execute and read and write
147C938C000
heap
page read and write
25078A02000
heap
page read and write
147C9377000
heap
page read and write
1D624CC0000
heap
page read and write
221D2876000
heap
page read and write
147C8A80000
heap
page read and write
2436D5C4000
trusted library allocation
page read and write
147C939E000
heap
page read and write
6EA000
stack
page read and write
2432E429000
heap
page read and write
8B7F5FD000
stack
page read and write
147C8A7E000
heap
page read and write
DFEE9FE000
stack
page read and write
1B1EE129000
heap
page read and write
2432E45B000
heap
page read and write
22903429000
heap
page read and write
2436D8A0000
heap
page read and write
1E4F4479000
heap
page read and write
6B253FC000
stack
page read and write
2436D700000
remote allocation
page read and write
2355DFC000
stack
page read and write
6B2587E000
stack
page read and write
147C93AF000
heap
page read and write
22903508000
heap
page read and write
2B4E000
stack
page read and write
262961F0000
heap
page read and write
1C64D210000
trusted library allocation
page read and write
2D9BCC00000
heap
page read and write
24368904000
heap
page read and write
1D624F20000
heap
page read and write
180030000
direct allocation
page readonly
1B1EE100000
heap
page read and write
29A78F68000
heap
page read and write
2355CFC000
stack
page read and write
1D624E23000
heap
page read and write
147C937D000
heap
page read and write
17C4A5F8000
heap
page read and write
147C9386000
heap
page read and write
710000
remote allocation
page read and write
7FFFF6D10000
unkown
page readonly
2436D857000
heap
page read and write
221D2857000
heap
page read and write
6D5BEFE000
stack
page read and write
147C937D000
heap
page read and write
221D2846000
heap
page read and write
29A7C2C0000
trusted library allocation
page read and write
2432E513000
heap
page read and write
221D2861000
heap
page read and write
944C8B000
stack
page read and write
2FDAD4BD000
heap
page read and write
769FD9F000
stack
page read and write
9452FB000
stack
page read and write
147C937F000
heap
page read and write
221D2878000
heap
page read and write
2CF4000
heap
page read and write
7FFFF6D3B000
unkown
page read and write
1E4F448A000
heap
page read and write
1C64D0F0000
trusted library allocation
page read and write
C29000
heap
page read and write
1C64CF33000
heap
page read and write
29A29F90000
heap
page read and write
26296050000
heap
page read and write
25078200000
heap
page read and write
25077F90000
heap
page read and write
2D34000
heap
page read and write
2436D8E4000
heap
page read and write
18002F000
direct allocation
page read and write
A30208C000
stack
page read and write
2CD1000
heap
page read and write
17C4A400000
heap
page read and write
17C4A560000
heap
page read and write
147C9397000
heap
page read and write
1B1EE220000
heap
page read and write
147C938C000
heap
page read and write
17C4A5B0000
direct allocation
page execute and read and write
147C9385000
heap
page read and write
1C64D1A0000
heap
page readonly
2355BFF000
stack
page read and write
AA0000
heap
page readonly
147C8A4C000
heap
page read and write
147C937A000
heap
page read and write
2CD0000
heap
page read and write
7FFFF6D32000
unkown
page readonly
8B7EF0C000
stack
page read and write
2436D8FD000
heap
page read and write
769FD1F000
stack
page read and write
17C4BF10000
remote allocation
page read and write
147C9383000
heap
page read and write
262962A6000
heap
page read and write
2D65000
heap
page read and write
D805AF7000
stack
page read and write
24368958000
heap
page read and write
199B7E13000
heap
page read and write
2D62000
heap
page read and write
7FFFF6D11000
unkown
page execute read
147C88A0000
heap
page read and write
2436D670000
trusted library allocation
page read and write
147C9379000
heap
page read and write
262961A0000
heap
page read and write
24368800000
heap
page read and write
6D5C2F7000
stack
page read and write
2D65000
heap
page read and write
29A2A052000
heap
page read and write
2D8C000
heap
page read and write
221D25F0000
heap
page read and write
260B000
stack
page read and write
24368815000
heap
page read and write
26296290000
heap
page read and write
1BA97828000
heap
page read and write
6B2567E000
stack
page read and write
8B7FAFF000
stack
page read and write
147C9393000
heap
page read and write
1E4F4500000
heap
page read and write
1D624E2D000
heap
page read and write
1C64CE80000
heap
page read and write
147C9380000
heap
page read and write
2436D410000
trusted library allocation
page read and write
29A2A061000
heap
page read and write
8B7F9FF000
stack
page read and write
262962B2000
heap
page read and write
147C9380000
heap
page read and write
29A78F00000
heap
page read and write
199B7F08000
heap
page read and write
180000000
direct allocation
page read and write
2D65000
heap
page read and write
284C000
stack
page read and write
147C8AF8000
heap
page read and write
2D7C000
heap
page read and write
C25BBFF000
stack
page read and write
147C8A59000
heap
page read and write
29A2A065000
heap
page read and write
1BA97900000
heap
page read and write
147C9373000
heap
page read and write
147C939E000
heap
page read and write
C75000
heap
page read and write
1E4F442A000
heap
page read and write
CED000
heap
page read and write
2D68000
heap
page read and write
235567B000
stack
page read and write
29A78F40000
heap
page read and write
2436D490000
trusted library allocation
page read and write
1C64D1B0000
trusted library allocation
page read and write
147C8A13000
heap
page read and write
6D5C1FF000
stack
page read and write
298F000
stack
page read and write
C56000
heap
page read and write
7D0000
heap
page read and write
147C9371000
heap
page read and write
22903220000
heap
page read and write
2629629A000
heap
page read and write
147C9390000
heap
page read and write
1C64CE10000
heap
page read and write
1BA97902000
heap
page read and write
17C4A560000
heap
page read and write
25077FA0000
heap
page read and write
2DD0000
heap
page read and write
180030000
direct allocation
page readonly
147C9372000
heap
page read and write
B30000
heap
page read and write
29A78F59000
heap
page read and write
262962B2000
heap
page read and write
180030000
direct allocation
page readonly
147C97B0000
remote allocation
page read and write
2DF0000
heap
page read and write
2436D800000
heap
page read and write
1C64CF4F000
heap
page read and write
147C937B000
heap
page read and write
1BA97864000
heap
page read and write
2D70000
heap
page read and write
24367FD1000
trusted library allocation
page read and write
9085EFF000
stack
page read and write
1B1EE120000
heap
page read and write
147C9387000
heap
page read and write
1D624E1E000
heap
page read and write
2436D5D0000
trusted library allocation
page read and write
6B24BEB000
stack
page read and write
2A4C000
stack
page read and write
147C938C000
heap
page read and write
250782C4000
heap
page read and write
147C9820000
heap
page read and write
147C937F000
heap
page read and write
2436803F000
heap
page read and write
147C937A000
heap
page read and write
221D2660000
heap
page read and write
710000
remote allocation
page read and write
CB4000
heap
page read and write
2D9BCBD0000
remote allocation
page read and write
1BA97660000
heap
page read and write
221D3002000
trusted library allocation
page read and write
2CF5000
heap
page read and write
6D5C17B000
stack
page read and write
1B1EFDF0000
heap
page read and write
147C8A4B000
heap
page read and write
2D70000
heap
page read and write
474DCFE000
stack
page read and write
2D9BCBD0000
remote allocation
page read and write
147C938C000
heap
page read and write
B35000
heap
page read and write
221D286C000
heap
page read and write
147C9386000
heap
page read and write
2D65000
heap
page read and write
147C939E000
heap
page read and write
7FFFF6D3B000
unkown
page read and write
2D56000
heap
page read and write
147C9803000
heap
page read and write
2E16000
heap
page read and write
2D9BCC3D000
heap
page read and write
336707F000
stack
page read and write
29A2A044000
heap
page read and write
262962A1000
heap
page read and write
1D624F00000
heap
page read and write
2436D5D0000
trusted library allocation
page read and write
24368056000
heap
page read and write
29A2A100000
heap
page read and write
17C4A5B0000
direct allocation
page execute and read and write
1D624E1F000
heap
page read and write
C56000
heap
page read and write
BF0000
heap
page read and write
769FC9C000
stack
page read and write
1BA9783E000
heap
page read and write
D04137C000
stack
page read and write
2D56000
heap
page read and write
18002E000
direct allocation
page readonly
7FFFF6D11000
unkown
page execute read
221D2868000
heap
page read and write
180000000
direct allocation
page read and write
CB4000
heap
page read and write
769FD9F000
stack
page read and write
D3A0F9E000
stack
page read and write
2432E502000
heap
page read and write
199B7E02000
heap
page read and write
229031B0000
heap
page read and write
D3A0F1E000
stack
page read and write
C9D000
heap
page read and write
147C8A4A000
heap
page read and write
262962A6000
heap
page read and write
7FFFF6D10000
unkown
page readonly
147C9398000
heap
page read and write
147C9390000
heap
page read and write
147C9802000
heap
page read and write
147C8AEA000
heap
page read and write
9085BEE000
stack
page read and write
17C4A400000
unkown
page read and write
22903464000
heap
page read and write
8B7F7FE000
stack
page read and write
147C9802000
heap
page read and write
1E4F4402000
heap
page read and write
1C64D190000
trusted library allocation
page read and write
147C9387000
heap
page read and write
17C4A8A5000
heap
page read and write
2E5E000
heap
page read and write
18002E000
direct allocation
page readonly
22903459000
heap
page read and write
D8059FE000
stack
page read and write
147C939E000
heap
page read and write
2D68000
heap
page read and write
A30257E000
stack
page read and write
147C937B000
heap
page read and write
AC0000
trusted library allocation
page read and write
2D56000
heap
page read and write
22903500000
heap
page read and write
2D9A000
heap
page read and write
2D4E000
heap
page read and write
C25BCFF000
stack
page read and write
1B1EE100000
heap
page read and write
147C938D000
heap
page read and write
C25B8FE000
stack
page read and write
147C9380000
heap
page read and write
29A2A013000
heap
page read and write
17C4BEF0000
heap
page read and write
2D9BCA40000
heap
page read and write
2FDAD4C3000
heap
page read and write
2D62000
heap
page read and write
1E4F4400000
heap
page read and write
1D628230000
heap
page read and write
24368107000
heap
page read and write
2D56000
heap
page read and write
2507823F000
heap
page read and write
29A2AA02000
trusted library allocation
page read and write
6D5BE7B000
stack
page read and write
2436D5E0000
trusted library allocation
page read and write
1B1EFDF0000
heap
page read and write
7FFFF6D3B000
unkown
page read and write
2432E467000
heap
page read and write
17C4A540000
heap
page read and write
2D62000
heap
page read and write
2436D84C000
heap
page read and write
BC0000
remote allocation
page read and write
180030000
direct allocation
page readonly
229031C0000
heap
page read and write
147C8A57000
heap
page read and write
2D62000
heap
page read and write
2DD1000
heap
page read and write
2680000
heap
page read and write
8B7FCFE000
stack
page read and write
474DC79000
stack
page read and write
9085BEE000
stack
page read and write
147C938D000
heap
page read and write
147C93BF000
heap
page read and write
147C93B4000
heap
page read and write
9085B6C000
stack
page read and write
17C4A8A5000
heap
page read and write
147C9386000
heap
page read and write
221D2858000
heap
page read and write
A30210E000
stack
page read and write
DFEEB7E000
stack
page read and write
CC6000
heap
page read and write
2436DA10000
trusted library allocation
page read and write
221D2600000
heap
page read and write
2436D82D000
heap
page read and write
17C4A880000
heap
page readonly
147C97B0000
remote allocation
page read and write
B68000
heap
page read and write
2436D89B000
heap
page read and write
147C938D000
heap
page read and write
147C9387000
heap
page read and write
1C64CF00000
heap
page read and write
1B1EE335000
heap
page read and write
29A2A113000
heap
page read and write
2432E46D000
heap
page read and write
147C935F000
heap
page read and write
24368FE0000
trusted library allocation
page read and write
336717C000
stack
page read and write
2FDAD4B0000
heap
page read and write
147C93AE000
heap
page read and write
2436D5A0000
trusted library allocation
page read and write
180000000
direct allocation
page read and write
2D4E000
heap
page read and write
147C9360000
heap
page read and write
DFEE87C000
stack
page read and write
189CE8B000
stack
page read and write
147C8AB2000
heap
page read and write
23559FE000
stack
page read and write
2436D7F0000
trusted library allocation
page read and write
147C935E000
heap
page read and write
147C8910000
heap
page read and write
1C64D220000
heap
page read and write
2507826B000
heap
page read and write
262962B2000
heap
page read and write
2D68000
heap
page read and write
147C8A54000
heap
page read and write
DFEEDFE000
stack
page read and write
769FC9C000
stack
page read and write
26296180000
heap
page read and write
6B24FFC000
stack
page read and write
2D70000
heap
page read and write
2436D83F000
heap
page read and write
262962CE000
heap
page read and write
24367FF3000
trusted library allocation
page read and write
2D7A000
heap
page read and write
199B7E8D000
heap
page read and write
7FFFF6D10000
unkown
page readonly
147C8A52000
heap
page read and write
180000000
direct allocation
page read and write
2432E270000
heap
page read and write
1C64CF4F000
heap
page read and write
2D51000
heap
page read and write
1B1EE129000
heap
page read and write
29A78F62000
heap
page read and write
1E4F43F0000
remote allocation
page read and write
17C4BF10000
remote allocation
page read and write
A70000
heap
page read and write
2436809D000
heap
page read and write
18002E000
direct allocation
page readonly
147C938D000
heap
page read and write
147C93B6000
heap
page read and write
24367DA0000
heap
page read and write
147C9385000
heap
page read and write
There are 1033 hidden memdumps, click here to show them.