IOC Report
CUfsVUDkr6

loading gif

Files

File Path
Type
Category
Malicious
CUfsVUDkr6.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x9088c28c, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 61712 bytes, 1 file
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\CUfsVUDkr6.dll
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\CUfsVUDkr6.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\CUfsVUDkr6.dll,DllRegisterServer
malicious
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Ofpagmb\vfvyklscua.sam"
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\CUfsVUDkr6.dll,DllUnregisterServerr
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\CUfsVUDkr6.dll"
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\CUfsVUDkr6.dll",#1
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 11 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
unknown
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
unknown
https://dev.ditu.live.com/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
unknown
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
unknown
https://t0.tiles.ditu.live.com/tiles/gen
unknown
https://dev.virtualearth.net/REST/v1/Routes/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Routes/Walking
unknown
http://crl.ver)
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
unknown
https://www.tiktok.com/legal/report/feedback
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
unknown
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
unknown
https://%s.xboxlive.com
unknown
https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://dev.virtualearth.net/mapcontrol/logging.ashx
unknown
https://support.hotspotshield.com/
unknown
https://dev.ditu.live.com/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
unknown
https://dynamic.t
unknown
http://schemas.xmlsoap.org/ws/2004/09/enumeration
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
https://disneyplus.com/legal.
unknown
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
unknown
http://schemas.xmlsoap.org/ws/2004/09/enumera
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
unknown
https://activity.windows.com
unknown
http://www.bingmapsportal.com
unknown
https://dev.ditu.live.com/REST/v1/Locations
unknown
http://help.disneyplus.com.
unknown
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://%s.dnet.xboxlive.com
unknown
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
There are 36 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
217.182.25.250
unknown
France
malicious
8.8.0.0
unknown
United States
malicious
60.7.0.0
unknown
China
malicious
70.36.102.35
unknown
United States
malicious
244.7.0.0
unknown
Reserved
malicious
144.7.0.0
unknown
China
malicious
128.7.0.0
unknown
Germany
malicious
176.130.193.2
unknown
France
malicious
44.7.0.0
unknown
United States
malicious
48.126.193.2
unknown
United States
malicious
128.130.193.2
unknown
Austria
malicious
172.7.0.0
unknown
United States
malicious
228.7.0.0
unknown
Reserved
malicious
120.8.0.0
unknown
China
malicious
160.135.187.2
unknown
United States
malicious
240.7.0.0
unknown
Reserved
malicious
136.206.195.2
unknown
Ireland
malicious
72.7.0.0
unknown
United States
malicious
76.7.0.0
unknown
United States
malicious
200.7.0.0
unknown
Brazil
malicious
96.7.0.0
unknown
United States
malicious
140.7.0.0
unknown
United States
malicious
160.7.0.0
unknown
United States
malicious
224.130.193.2
unknown
Reserved
malicious
51.91.76.89
unknown
France
malicious
4.8.0.0
unknown
United States
malicious
124.7.0.0
unknown
India
malicious
128.127.193.2
unknown
Saudi Arabia
malicious
56.8.0.0
unknown
United States
malicious
176.7.0.0
unknown
Germany
malicious
224.7.0.0
unknown
Reserved
malicious
119.193.124.41
unknown
Korea Republic of
malicious
128.154.195.2
unknown
United States
malicious
8.109.194.2
unknown
United States
malicious
156.7.0.0
unknown
United States
malicious
92.240.254.110
unknown
Slovakia (SLOVAK Republic)
malicious
192.168.2.1
unknown
unknown
127.0.0.1
unknown
unknown
There are 28 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
MonthID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\TaskStore
Schedule Scan
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\State
BlockUntilTimeStatus
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\Configuration
refreshAfter
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
46C1000
direct allocation
page execute read
malicious
4760000
direct allocation
page execute and read and write
malicious
3390000
direct allocation
page execute and read and write
malicious
4CE1000
direct allocation
page execute read
malicious
4690000
direct allocation
page execute and read and write
malicious
4791000
direct allocation
page execute read
malicious
940000
direct allocation
page execute and read and write
malicious
43A1000
direct allocation
page execute read
malicious
29CF000
stack
page read and write
1D1CF24D000
heap
page read and write
9E1977C000
stack
page read and write
23CC0387000
heap
page read and write
21BB0485000
heap
page read and write
23CC081A000
heap
page read and write
201C7C20000
heap
page read and write
1BF00C5B000
heap
page read and write
23CC038E000
heap
page read and write
4781000
heap
page read and write
46C0000
direct allocation
page read and write
F5F337F000
stack
page read and write
51C000
stack
page read and write
23CBFA00000
heap
page read and write
1D1CF23B000
heap
page read and write
1AB800D0000
heap
page read and write
2799FB80000
trusted library allocation
page read and write
10051000
unkown
page readonly
175ABA6B000
heap
page read and write
2C70000
trusted library allocation
page read and write
2516B45F000
heap
page read and write
262CDA02000
heap
page read and write
262CDB02000
heap
page read and write
48A0000
trusted library allocation
page read and write
2BC9000
heap
page read and write
2EAB1190000
trusted library allocation
page read and write
52469CB000
stack
page read and write
CA2A07F000
stack
page read and write
8030F1B000
stack
page read and write
A5BC000
trusted library allocation
page read and write
2799FC20000
heap
page read and write
2BC9000
heap
page read and write
2E20000
heap
page read and write
1BF00C00000
heap
page read and write
7D0000
heap
page read and write
4FE2000
trusted library allocation
page read and write
2EFB000
stack
page read and write
4E5F000
stack
page read and write
1BF01C02000
heap
page read and write
23CC03A0000
heap
page read and write
1F7318A8000
heap
page read and write
23CC0389000
heap
page read and write
175ABA44000
heap
page read and write
2CFE000
stack
page read and write
1004B000
unkown
page read and write
4781000
heap
page read and write
4781000
heap
page read and write
23CC038D000
heap
page read and write
2E41000
heap
page read and write
2799AD04000
heap
page read and write
B34000
heap
page read and write
2EAB122A000
heap
page read and write
1003C000
unkown
page readonly
23CC037D000
heap
page read and write
D2E4A9C000
stack
page read and write
1BF0150E000
heap
page read and write
2799AD00000
heap
page read and write
1BF00A30000
heap
page read and write
4D10000
heap
page read and write
D2E527F000
stack
page read and write
5127000
trusted library allocation
page read and write
2E62000
heap
page read and write
33C0000
heap
page read and write
1009A000
unkown
page readonly
1F7318A0000
heap
page read and write
1BF75D08000
heap
page read and write
DA6E7B000
stack
page read and write
B34000
heap
page read and write
2799B871000
trusted library allocation
page read and write
4E70000
heap
page read and write
4780000
heap
page read and write
2BC9000
heap
page read and write
23CC038D000
heap
page read and write
2C11000
heap
page read and write
21BB0402000
heap
page read and write
21FA5985000
heap
page read and write
A870C7B000
stack
page read and write
2EBC000
stack
page read and write
1BF01C00000
heap
page read and write
524757C000
stack
page read and write
23CBFA53000
heap
page read and write
2799FCDD000
heap
page read and write
2E4D000
heap
page read and write
23CC03B2000
heap
page read and write
B34000
heap
page read and write
2CA0000
heap
page read and write
2C41000
heap
page read and write
1004B000
unkown
page read and write
2C08000
heap
page read and write
1BF00CCB000
heap
page read and write
23CC035B000
heap
page read and write
2EAB124A000
heap
page read and write
175AC300000
heap
page read and write
AD0E000
trusted library allocation
page read and write
21BB0467000
heap
page read and write
4781000
heap
page read and write
B34000
heap
page read and write
5CC299A000
stack
page read and write
1BF00D95000
heap
page read and write
B34000
heap
page read and write
4781000
heap
page read and write
2799FE90000
trusted library allocation
page read and write
33CA000
heap
page read and write
2BEC000
heap
page read and write
62379FE000
stack
page read and write
161FCD20000
heap
page read and write
23CC0376000
heap
page read and write
1BF00C6A000
heap
page read and write
23CC0802000
heap
page read and write
2EAB1090000
heap
page read and write
20BEC855000
heap
page read and write
4610000
heap
page read and write
1D1CF2B7000
heap
page read and write
CA29F77000
stack
page read and write
3300000
heap
page read and write
2799A380000
heap
page read and write
2DA1000
heap
page read and write
1F731830000
heap
page read and write
2E50000
heap
page read and write
23CC0386000
heap
page read and write
465E000
trusted library allocation
page read and write
161FCDC0000
trusted library allocation
page read and write
9E1987D000
stack
page read and write
2D86000
heap
page read and write
4C60000
trusted library allocation
page read and write
2799FC15000
heap
page read and write
2516B457000
heap
page read and write
4FC5000
trusted library allocation
page read and write
1BF00BB0000
trusted library allocation
page read and write
23CC0384000
heap
page read and write
20BEC841000
heap
page read and write
1ABFFF13000
heap
page read and write
2237EFA000
stack
page read and write
4F87000
trusted library allocation
page read and write
2799FA40000
trusted library allocation
page read and write
2E4D000
heap
page read and write
2BEE000
heap
page read and write
2799F930000
trusted library allocation
page read and write
1BF01513000
heap
page read and write
2799FA70000
trusted library allocation
page read and write
4610000
trusted library allocation
page read and write
22380FE000
stack
page read and write
1D1CF320000
remote allocation
page read and write
1BF00DE1000
heap
page read and write
2E45000
heap
page read and write
1ABFFE56000
heap
page read and write
1D1CF2AA000
heap
page read and write
2516B1C0000
heap
page read and write
2B7A000
heap
page read and write
23CC03A5000
heap
page read and write
4640000
heap
page read and write
23CC038B000
heap
page read and write
4781000
heap
page read and write
2BEC000
heap
page read and write
234CE7C000
stack
page read and write
262CD9B0000
heap
page read and write
23CBFAA3000
heap
page read and write
A87137A000
stack
page read and write
4781000
heap
page read and write
F5F32FE000
stack
page read and write
559000
stack
page read and write
1BF00CEF000
heap
page read and write
2516B230000
heap
page read and write
234D07B000
stack
page read and write
1BF01510000
heap
page read and write
23CBF860000
heap
page read and write
23CC0322000
heap
page read and write
DA693B000
stack
page read and write
1003C000
unkown
page readonly
1BF00C89000
heap
page read and write
2799AC02000
heap
page read and write
5CC2C7E000
stack
page read and write
23CBFA4A000
heap
page read and write
439F000
stack
page read and write
F5F347C000
stack
page read and write
4D3C000
stack
page read and write
2EAB1200000
heap
page read and write
529E000
stack
page read and write
2799FB10000
trusted library allocation
page read and write
20BEC7E5000
heap
page read and write
23CC03A9000
heap
page read and write
2237FFE000
stack
page read and write
2799FBA0000
remote allocation
page read and write
B34000
heap
page read and write
1BF75C54000
heap
page read and write
5100000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
2799FB50000
trusted library allocation
page read and write
1BF75A70000
heap
page read and write
21BB043C000
heap
page read and write
2516B442000
heap
page read and write
10001000
unkown
page execute read
1D1CF1C0000
heap
page read and write
1F731700000
heap
page read and write
4781000
heap
page read and write
2BEE000
heap
page read and write
2516B46A000
heap
page read and write
2516B47E000
heap
page read and write
21BB045C000
heap
page read and write
6070000
heap
page read and write
262CD950000
heap
page read and write
4B0000
heap
page read and write
1BF00C7A000
heap
page read and write
21BB0310000
heap
page read and write
A6ED000
trusted library allocation
page read and write
161FD602000
trusted library allocation
page read and write
46D3000
heap
page read and write
BBD4FE000
stack
page read and write
A7EF000
trusted library allocation
page read and write
262CDA13000
heap
page read and write
43C3000
direct allocation
page read and write
23CC0802000
heap
page read and write
9D5BBFE000
stack
page read and write
20BEC85D000
heap
page read and write
20BEC670000
heap
page read and write
2799A4B2000
heap
page read and write
1BF75D02000
heap
page read and write
1D1CF2B4000
heap
page read and write
23CC034F000
heap
page read and write
2EAB1302000
heap
page read and write
20BEC846000
heap
page read and write
1BF00C3C000
heap
page read and write
F5F35FB000
stack
page read and write
4781000
heap
page read and write
4781000
heap
page read and write
F5F36F7000
stack
page read and write
2799B890000
trusted library allocation
page read and write
21FA55E0000
heap
page read and write
1BF00A80000
heap
page read and write
2C90000
trusted library allocation
page read and write
2BC9000
heap
page read and write
2E69000
heap
page read and write
3402000
heap
page read and write
2FB0000
heap
page read and write
2799FCA4000
heap
page read and write
23CBFA50000
heap
page read and write
F5F34FE000
stack
page read and write
23CBF870000
heap
page read and write
2516B459000
heap
page read and write
161FCE00000
heap
page read and write
CA2989B000
stack
page read and write
340D000
heap
page read and write
10001000
unkown
page execute read
2799A48C000
heap
page read and write
201C7D13000
heap
page read and write
201C8A30000
trusted library allocation
page read and write
161FCE57000
heap
page read and write
11CA000
heap
page read and write
23CC037C000
heap
page read and write
1BF75D13000
heap
page read and write
262CDA2A000
heap
page read and write
1ABFFE3C000
heap
page read and write
2516B432000
heap
page read and write
20BEC852000
heap
page read and write
1D1CF294000
heap
page read and write
6F72DEC000
stack
page read and write
20BEC7C0000
heap
page read and write
1AB80560000
trusted library allocation
page read and write
4C4E000
stack
page read and write
DA6F7B000
stack
page read and write
5CC2E7F000
stack
page read and write
46E3000
direct allocation
page read and write
4D02000
direct allocation
page read and write
6F73179000
stack
page read and write
2799FA61000
trusted library allocation
page read and write
1D1CF390000
heap
page read and write
161FCE02000
heap
page read and write
23CC00F0000
remote allocation
page read and write
4786000
heap
page read and write
2EAB1020000
heap
page read and write
23CC037E000
heap
page read and write
525E000
stack
page read and write
341A000
heap
page read and write
1D1CF2B7000
heap
page read and write
23CC0387000
heap
page read and write
161FCF02000
heap
page read and write
21BB0460000
heap
page read and write
23CBFA4B000
heap
page read and write
2799FEB0000
trusted library allocation
page read and write
4CCE000
stack
page read and write
23CC0376000
heap
page read and write
2516B44D000
heap
page read and write
CA2999E000
stack
page read and write
4FA2000
trusted library allocation
page read and write
5077AFD000
stack
page read and write
1BF00C4A000
heap
page read and write
1ABFFDC0000
heap
page read and write
4781000
heap
page read and write
23CC0378000
heap
page read and write
5128000
trusted library allocation
page read and write
B34000
heap
page read and write
4D8C000
stack
page read and write
CA2991E000
stack
page read and write
20BEC86F000
heap
page read and write
279A0000000
heap
page read and write
21FA567B000
heap
page read and write
23CC0388000
heap
page read and write
1BF00B80000
trusted library allocation
page read and write
1ABFFE13000
heap
page read and write
2516B467000
heap
page read and write
262CDA5A000
heap
page read and write
20BEC85D000
heap
page read and write
1ABFFE68000
heap
page read and write
487D000
stack
page read and write
1D1CF050000
heap
page read and write
23CC0802000
heap
page read and write
1D1CF2B5000
heap
page read and write
23CC0202000
heap
page read and write
2516B990000
trusted library allocation
page read and write
4FA2000
trusted library allocation
page read and write
334F000
stack
page read and write
2799A473000
heap
page read and write
161FCDF0000
remote allocation
page read and write
201C8A40000
heap
page readonly
23CC03AC000
heap
page read and write
23CC0389000
heap
page read and write
2E4D000
heap
page read and write
46E2000
direct allocation
page read and write
1BF01D02000
heap
page read and write
23CC0378000
heap
page read and write
EFD000
stack
page read and write
234D0FF000
stack
page read and write
2799A4A7000
heap
page read and write
2799AD02000
heap
page read and write
7AB000
stack
page read and write
457E000
stack
page read and write
6F732F9000
stack
page read and write
B34000
heap
page read and write
201C7AE0000
heap
page read and write
23CC03AF000
heap
page read and write
1D1CF292000
heap
page read and write
9D5B3FE000
stack
page read and write
4FAA000
trusted library allocation
page read and write
23CBFB13000
heap
page read and write
23CC03B4000
heap
page read and write
B5C000
stack
page read and write
1F731850000
heap
page read and write
2799FC89000
heap
page read and write
2799A413000
heap
page read and write
2EAB124B000
heap
page read and write
4470000
heap
page read and write
80313FF000
stack
page read and write
1BF01402000
heap
page read and write
B34000
heap
page read and write
489F000
stack
page read and write
BC0000
trusted library allocation
page read and write
23CBFAEB000
heap
page read and write
2C67000
heap
page read and write
D2E517E000
stack
page read and write
A77000
stack
page read and write
175ABABF000
heap
page read and write
23CC0379000
heap
page read and write
23CBFA6F000
heap
page read and write
2E2A000
heap
page read and write
23CBFA55000
heap
page read and write
2799FBA0000
trusted library allocation
page read and write
9D5B4FC000
stack
page read and write
201C8A60000
trusted library allocation
page read and write
201C7CB0000
trusted library allocation
page read and write
1BF75BD0000
trusted library allocation
page read and write
4C8F000
stack
page read and write
1BF75AD0000
heap
page read and write
2799A457000
heap
page read and write
47E0000
heap
page read and write
23CC0382000
heap
page read and write
2799FBA0000
remote allocation
page read and write
1BF00C7E000
heap
page read and write
1ABFFE02000
heap
page read and write
1BF75A60000
heap
page read and write
21BB0487000
heap
page read and write
9D5B7FF000
stack
page read and write
161FCD30000
heap
page read and write
1BF00C4C000
heap
page read and write
23CBFA4D000
heap
page read and write
2799FB70000
trusted library allocation
page read and write
2799FA84000
trusted library allocation
page read and write
7F0000
trusted library allocation
page read and write
23CBFA3C000
heap
page read and write
514F000
trusted library allocation
page read and write
BBD877000
stack
page read and write
52DE000
stack
page read and write
1BF75C62000
heap
page read and write
4EFE000
stack
page read and write
23CBFAC5000
heap
page read and write
2E48000
heap
page read and write
175AB8B0000
heap
page read and write
23CC03C6000
heap
page read and write
2799A400000
heap
page read and write
9E1947A000
stack
page read and write
1BF76402000
trusted library allocation
page read and write
23CC0802000
heap
page read and write
4FAA000
trusted library allocation
page read and write
1BF0155E000
heap
page read and write
1BF01530000
heap
page read and write
485E000
stack
page read and write
2516B440000
heap
page read and write
2BEE000
heap
page read and write
1D1CF230000
heap
page read and write
2799FC00000
heap
page read and write
175ABB02000
heap
page read and write
10001000
unkown
page execute read
1BF01C43000
heap
page read and write
B34000
heap
page read and write
4FE2000
trusted library allocation
page read and write
B34000
heap
page read and write
B34000
heap
page read and write
2B2F000
heap
page read and write
1ABFFF02000
heap
page read and write
47B2000
direct allocation
page read and write
D2E507E000
stack
page read and write
21BB0429000
heap
page read and write
2EAB1213000
heap
page read and write
CA2A3F8000
stack
page read and write
23CC0389000
heap
page read and write
201C7F80000
heap
page read and write
4781000
heap
page read and write
1ABFFD50000
heap
page read and write
BBD6FB000
stack
page read and write
1BF00C52000
heap
page read and write
2E57000
heap
page read and write
B34000
heap
page read and write
2516B429000
heap
page read and write
2516B496000
heap
page read and write
B34000
heap
page read and write
9D5B07B000
stack
page read and write
23CBFA49000
heap
page read and write
4FE2000
trusted library allocation
page read and write
2CE8000
heap
page read and write
175AB920000
heap
page read and write
23CC039E000
heap
page read and write
21BB0508000
heap
page read and write
201C7D25000
heap
page read and write
1BF01D1B000
heap
page read and write
201C7F85000
heap
page read and write
2799AB40000
trusted library allocation
page read and write
2516B400000
heap
page read and write
23CC0818000
heap
page read and write
472D000
stack
page read and write
23CC0376000
heap
page read and write
11BB000
heap
page read and write
1D1CF205000
heap
page read and write
21BB0380000
heap
page read and write
2F60000
trusted library allocation
page read and write
161FCE29000
heap
page read and write
2EAB129B000
heap
page read and write
501B000
trusted library allocation
page read and write
2516B460000
heap
page read and write
1BF00C23000
heap
page read and write
23CC039E000
heap
page read and write
45BE000
stack
page read and write
29D0000
trusted library allocation
page read and write
7D0000
remote allocation
page read and write
23CC03A0000
heap
page read and write
4770000
heap
page read and write
175ABA13000
heap
page read and write
2C77000
heap
page read and write
23CBF8D0000
heap
page read and write
524707F000
stack
page read and write
1D1CF2AA000
heap
page read and write
2516B46D000
heap
page read and write
23CC0389000
heap
page read and write
524747F000
stack
page read and write
175AC312000
heap
page read and write
2799AD18000
heap
page read and write
1BF75D00000
heap
page read and write
23CC0821000
heap
page read and write
1F731870000
heap
page read and write
3305000
heap
page read and write
2799FA4E000
trusted library allocation
page read and write
1BF00C29000
heap
page read and write
23CBFA56000
heap
page read and write
20BEC85F000
heap
page read and write
4CE0000
direct allocation
page read and write
F5F327B000
stack
page read and write
21BB0462000
heap
page read and write
1003C000
unkown
page readonly
21BB0413000
heap
page read and write
4A8D000
stack
page read and write
2799A441000
heap
page read and write
2516B43D000
heap
page read and write
4781000
heap
page read and write
23CC0392000
heap
page read and write
2799FC2E000
heap
page read and write
2DAC000
heap
page read and write
2799A475000
heap
page read and write
62375FB000
stack
page read and write
262CDA00000
heap
page read and write
CA2A177000
stack
page read and write
2516B47B000
heap
page read and write
4FE2000
trusted library allocation
page read and write
4A0F000
stack
page read and write
2C67000
heap
page read and write
1BF01C1D000
heap
page read and write
CA2A2FE000
unkown
page read and write
2E54000
heap
page read and write
20BEC7A0000
heap
page read and write
B30000
heap
page read and write
4C7E000
stack
page read and write
4F88000
trusted library allocation
page read and write
2799A49F000
heap
page read and write
2516B46B000
heap
page read and write
23CC037E000
heap
page read and write
46E0000
trusted library allocation
page read and write
201C7CC0000
trusted library allocation
page read and write
4790000
direct allocation
page read and write
4781000
heap
page read and write
4FA2000
trusted library allocation
page read and write
2799A4FC000
heap
page read and write
B34000
heap
page read and write
2EAB123C000
heap
page read and write
9E195FE000
stack
page read and write
2799AC00000
heap
page read and write
F5F37FE000
stack
page read and write
175AB8C0000
heap
page read and write
23CC03A1000
heap
page read and write
1BF75C77000
heap
page read and write
175ABA00000
heap
page read and write
1D1CF212000
heap
page read and write
23CC038D000
heap
page read and write
2799FA70000
trusted library allocation
page read and write
1BF01D13000
heap
page read and write
2C6E000
stack
page read and write
23CC0802000
heap
page read and write
161FCE13000
heap
page read and write
2799FA64000
trusted library allocation
page read and write
23CC038B000
heap
page read and write
23CC038B000
heap
page read and write
1BF00CAA000
heap
page read and write
483C000
stack
page read and write
4781000
heap
page read and write
47B3000
direct allocation
page read and write
4E90000
heap
page read and write
BBD97F000
stack
page read and write
4781000
heap
page read and write
62376F7000
stack
page read and write
1D1CF292000
heap
page read and write
5CC2EFE000
stack
page read and write
201C7CE1000
heap
page read and write
2799FCF6000
heap
page read and write
22381F9000
stack
page read and write
2799A4AC000
heap
page read and write
21BB0C02000
trusted library allocation
page read and write
2C0B000
heap
page read and write
23CBFB02000
heap
page read and write
B34000
heap
page read and write
1D1CF2B7000
heap
page read and write
1D1CF2AB000
heap
page read and write
2B19000
heap
page read and write
23CC03A5000
heap
page read and write
A3C000
stack
page read and write
7D0000
remote allocation
page read and write
2D64000
heap
page read and write
4EC0000
remote allocation
page read and write
2C11000
heap
page read and write
1D1CF205000
heap
page read and write
23CC0844000
heap
page read and write
2799FB10000
trusted library allocation
page read and write
2ACA000
heap
page read and write
2516B45C000
heap
page read and write
1D1CF320000
remote allocation
page read and write
1BF01500000
heap
page read and write
9E198FF000
stack
page read and write
43C2000
direct allocation
page read and write
4781000
heap
page read and write
21BB0500000
heap
page read and write
4781000
heap
page read and write
234D17E000
stack
page read and write
4EC0000
remote allocation
page read and write
262CDA87000
heap
page read and write
B34000
heap
page read and write
4CFD000
stack
page read and write
23CBFAC7000
heap
page read and write
23CC030D000
heap
page read and write
B34000
heap
page read and write
A870B77000
stack
page read and write
23CC0392000
heap
page read and write
23CC038D000
heap
page read and write
20BEC846000
heap
page read and write
2799FA80000
trusted library allocation
page read and write
2516B47A000
heap
page read and write
23CBFAD4000
heap
page read and write
2516B413000
heap
page read and write
1BF01534000
heap
page read and write
2B70000
heap
page read and write
9E1967B000
stack
page read and write
2799FBA0000
remote allocation
page read and write
262CDA76000
heap
page read and write
DA717E000
stack
page read and write
1BF01C02000
heap
page read and write
10000000
unkown
page readonly
201C7D25000
heap
page read and write
175ABA65000
heap
page read and write
2799FCEE000
heap
page read and write
2799FCFB000
heap
page read and write
22379EB000
stack
page read and write
2D20000
heap
page read and write
262CD9E0000
trusted library allocation
page read and write
2799A491000
heap
page read and write
43A0000
direct allocation
page read and write
4C3B000
stack
page read and write
B34000
heap
page read and write
23CC03B6000
heap
page read and write
23CC03C4000
heap
page read and write
2799A48A000
heap
page read and write
62377FE000
stack
page read and write
2E4A000
heap
page read and write
2799A502000
heap
page read and write
23CC00F0000
remote allocation
page read and write
4781000
heap
page read and write
201C7F60000
trusted library allocation
page read and write
2799FA48000
trusted library allocation
page read and write
2516B458000
heap
page read and write
23CC03A5000
heap
page read and write
93E000
stack
page read and write
476F000
stack
page read and write
2516B484000
heap
page read and write
23CC0300000
heap
page read and write
23CC0376000
heap
page read and write
1020000
heap
page read and write
5246DFB000
stack
page read and write
175ABB13000
heap
page read and write
1BF00CAF000
heap
page read and write
2799AD13000
heap
page read and write
30DA000
heap
page read and write
2799F8B0000
trusted library allocation
page read and write
2BEE000
heap
page read and write
1F731875000
heap
page read and write
1D1CF228000
heap
page read and write
BBDA7F000
stack
page read and write
1D1CF23B000
heap
page read and write
23CC03A2000
heap
page read and write
4891000
trusted library allocation
page read and write
B34000
heap
page read and write
B34000
heap
page read and write
4F97000
trusted library allocation
page read and write
23CBFB16000
heap
page read and write
B34000
heap
page read and write
4D70000
heap
page read and write
DA707E000
stack
page read and write
21BB0320000
heap
page read and write
23CC039A000
heap
page read and write
30D0000
heap
page read and write
4781000
heap
page read and write
23CC03AF000
heap
page read and write
2799FCD7000
heap
page read and write
1D1CF1C8000
heap
page read and write
1BF00DFD000
heap
page read and write
4EC0000
remote allocation
page read and write
201C7AF0000
trusted library allocation
page read and write
1BF00C94000
heap
page read and write
1D1CF23B000
heap
page read and write
262CE202000
trusted library allocation
page read and write
2799A3E0000
heap
page read and write
5101000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
2EAB124E000
heap
page read and write
2B02000
heap
page read and write
1BF00CE2000
heap
page read and write
B34000
heap
page read and write
472E000
stack
page read and write
1009A000
unkown
page readonly
2516BA02000
trusted library allocation
page read and write
AF0000
heap
page read and write
23CC0318000
heap
page read and write
1ABFFE00000
heap
page read and write
2799FB60000
trusted library allocation
page read and write
5077C7D000
stack
page read and write
1D1CF1F1000
heap
page read and write
9E197FF000
stack
page read and write
2799A507000
heap
page read and write
441D000
stack
page read and write
23CC0821000
heap
page read and write
22383FF000
stack
page read and write
1D1CF190000
heap
page read and write
1BF75C68000
heap
page read and write
9D5BAFF000
stack
page read and write
4F9C000
trusted library allocation
page read and write
10000000
unkown
page readonly
4781000
heap
page read and write
23CBFA13000
heap
page read and write
201C7F89000
heap
page read and write
23CC00F0000
remote allocation
page read and write
4781000
heap
page read and write
21BB03B0000
trusted library allocation
page read and write
1009A000
unkown
page readonly
4DA0000
heap
page read and write
1BF015D6000
heap
page read and write
1ABFFE79000
heap
page read and write
23CC0802000
heap
page read and write
2516B441000
heap
page read and write
10051000
unkown
page readonly
B34000
heap
page read and write
2799AD18000
heap
page read and write
1BF00CC5000
heap
page read and write
23CC038B000
heap
page read and write
4D4E000
stack
page read and write
A870E7E000
stack
page read and write
2C06000
heap
page read and write
4D0F000
stack
page read and write
201C7F90000
trusted library allocation
page read and write
23CC0320000
heap
page read and write
2799AC15000
heap
page read and write
2EAB1263000
heap
page read and write
4781000
heap
page read and write
1004B000
unkown
page read and write
4F3F000
stack
page read and write
D2E4B1E000
stack
page read and write
507777C000
stack
page read and write
1BF00C13000
heap
page read and write
20BEC7E0000
heap
page read and write
23CC03CC000
heap
page read and write
1BF01C0A000
heap
page read and write
10001000
unkown
page execute read
4D5F000
stack
page read and write
4880000
heap
page read and write
262CD940000
heap
page read and write
1BF00D13000
heap
page read and write
23CC0802000
heap
page read and write
4790000
heap
page read and write
11B0000
heap
page read and write
20BEC85D000
heap
page read and write
BBD77E000
stack
page read and write
524727B000
stack
page read and write
20BEC85F000
heap
page read and write
23CBFA58000
heap
page read and write
8F0000
heap
page read and write
2E69000
heap
page read and write
23CBFAE8000
heap
page read and write
2DA1000
heap
page read and write
1D1CF228000
heap
page read and write
5CC2D7C000
stack
page read and write
47A0000
heap
page read and write
CA2A27C000
stack
page read and write
2D92000
heap
page read and write
23CC03C3000
heap
page read and write
2CBE000
stack
page read and write
9E196FC000
stack
page read and write
23CC0370000
heap
page read and write
2C70000
heap
page read and write
1009A000
unkown
page readonly
1003C000
unkown
page readonly
23CC037C000
heap
page read and write
1BF00C39000
heap
page read and write
23CC0397000
heap
page read and write
5246F7F000
stack
page read and write
2AAE000
stack
page read and write
B34000
heap
page read and write
50778FE000
stack
page read and write
B34000
heap
page read and write
23CBFAF7000
heap
page read and write
1D1CF2C0000
heap
page read and write
2799FA60000
trusted library allocation
page read and write
23CC03A8000
heap
page read and write
4781000
heap
page read and write
4CBE000
stack
page read and write
1D1CF294000
heap
page read and write
A87177E000
stack
page read and write
803137F000
stack
page read and write
623715E000
stack
page read and write
23CBFAB4000
heap
page read and write
52470FC000
stack
page read and write
4FAA000
trusted library allocation
page read and write
1D1CF292000
heap
page read and write
500A000
trusted library allocation
page read and write
2EAB127C000
heap
page read and write
23CC0380000
heap
page read and write
23CC0392000
heap
page read and write
23CC03AB000
heap
page read and write
2516B456000
heap
page read and write
4781000
heap
page read and write
21BB0513000
heap
page read and write
23CC03B3000
heap
page read and write
201C7C40000
heap
page read and write
23CBFB08000
heap
page read and write
175ABA86000
heap
page read and write
23CBF9D0000
trusted library allocation
page read and write
23CC0386000
heap
page read and write
262CDA68000
heap
page read and write
2799FA40000
trusted library allocation
page read and write
2E4E000
heap
page read and write
23CC037E000
heap
page read and write
62371DE000
stack
page read and write
6F731F9000
stack
page read and write
2BB4000
heap
page read and write
175AC080000
trusted library allocation
page read and write
23CBFA83000
heap
page read and write
5CC2DF9000
stack
page read and write
21BB0427000
heap
page read and write
23CBFA29000
heap
page read and write
CA29D7E000
stack
page read and write
20BEC85F000
heap
page read and write
2799B8A0000
trusted library allocation
page read and write
2516B43B000
heap
page read and write
2799A478000
heap
page read and write
23CC081A000
heap
page read and write
1BF00C30000
heap
page read and write
23CC0376000
heap
page read and write
1D1CF212000
heap
page read and write
23CC030C000
heap
page read and write
1D1CF24D000
heap
page read and write
2516B462000
heap
page read and write
2516B455000
heap
page read and write
23CC0318000
heap
page read and write
2C20000
heap
page read and write
175ABAB7000
heap
page read and write
23CC03B3000
heap
page read and write
23CC03B2000
heap
page read and write
1004B000
unkown
page read and write
21BB0502000
heap
page read and write
2E4D000
heap
page read and write
23CC037C000
heap
page read and write
4781000
heap
page read and write
23CBFAE1000
heap
page read and write
524767F000
stack
page read and write
4781000
heap
page read and write
4FB1000
trusted library allocation
page read and write
4781000
heap
page read and write
21FA5980000
heap
page read and write
1D1CF320000
remote allocation
page read and write
5C0000
trusted library allocation
page read and write
1BF75C60000
heap
page read and write
478F000
trusted library allocation
page read and write
1BF00C9B000
heap
page read and write
5077B7F000
stack
page read and write
1D1CF395000
heap
page read and write
201C7D25000
heap
page read and write
1BF00C98000
heap
page read and write
201C8800000
trusted library allocation
page read and write
A87107B000
stack
page read and write
2799FC4D000
heap
page read and write
23CC038F000
heap
page read and write
2C25000
heap
page read and write
2799FC40000
heap
page read and write
23CC0800000
heap
page read and write
23CBFAB1000
heap
page read and write
B34000
heap
page read and write
4BFD000
stack
page read and write
4781000
heap
page read and write
4781000
heap
page read and write
2FFE000
stack
page read and write
1D1CF22B000
heap
page read and write
161FCE3D000
heap
page read and write
10000000
unkown
page readonly
1D1CF1FF000
heap
page read and write
76C000
stack
page read and write
23CC0384000
heap
page read and write
2C3B000
stack
page read and write
23CBFAAA000
heap
page read and write
F5F38FF000
stack
page read and write
23CC038D000
heap
page read and write
9D5B6FD000
stack
page read and write
2D2A000
heap
page read and write
4DB0000
trusted library allocation
page read and write
1ABFFF00000
heap
page read and write
1D1CF294000
heap
page read and write
23CC037B000
heap
page read and write
23CC0360000
heap
page read and write
2C06000
heap
page read and write
262CDA3C000
heap
page read and write
2799B893000
trusted library allocation
page read and write
2799FC57000
heap
page read and write
2799A502000
heap
page read and write
9D5B8FF000
stack
page read and write
5CC2CFF000
stack
page read and write
4A4D000
stack
page read and write
1BF00C46000
heap
page read and write
2799A424000
heap
page read and write
175ABA63000
heap
page read and write
21BB0400000
heap
page read and write
49CE000
stack
page read and write
2EAB1A02000
trusted library allocation
page read and write
2EAB1308000
heap
page read and write
1BF015F3000
heap
page read and write
2799F920000
trusted library allocation
page read and write
2DEE000
stack
page read and write
3411000
heap
page read and write
1BF00A20000
heap
page read and write
23CBFACA000
heap
page read and write
1BF00CEA000
heap
page read and write
161FCDF0000
remote allocation
page read and write
23CC0380000
heap
page read and write
23CC0802000
heap
page read and write
2EAB1300000
heap
page read and write
4781000
heap
page read and write
A87070B000
stack
page read and write
BBD47E000
stack
page read and write
2AC0000
heap
page read and write
524737F000
stack
page read and write
23CC0381000
heap
page read and write
1D1CFB40000
heap
page read and write
201C7CD0000
heap
page read and write
B34000
heap
page read and write
1BF00C5E000
heap
page read and write
21BB0480000
heap
page read and write
2799A46E000
heap
page read and write
20BEC86E000
heap
page read and write
4781000
heap
page read and write
2799FB20000
trusted library allocation
page read and write
4FA2000
trusted library allocation
page read and write
1ABFFE64000
heap
page read and write
2799B3F0000
trusted library allocation
page read and write
1D1CF1EC000
heap
page read and write
D2E4B9E000
stack
page read and write
1BF75C3C000
heap
page read and write
62378FF000
stack
page read and write
4781000
heap
page read and write
21FA5670000
heap
page read and write
B34000
heap
page read and write
62370DC000
stack
page read and write
23CC0376000
heap
page read and write
507739C000
stack
page read and write
4D03000
direct allocation
page read and write
23CBFA4E000
heap
page read and write
2516B449000
heap
page read and write
2DC6000
heap
page read and write
D2E4F7E000
stack
page read and write
2237DFE000
stack
page read and write
175ABA29000
heap
page read and write
20BEC856000
heap
page read and write
9D5B27B000
stack
page read and write
23CC0374000
heap
page read and write
201C8AB0000
trusted library allocation
page read and write
507787E000
stack
page read and write
6F7337D000
stack
page read and write
4781000
heap
page read and write
960000
heap
page read and write
6080000
trusted library allocation
page read and write
10051000
unkown
page readonly
B34000
heap
page read and write
201C8A50000
trusted library allocation
page read and write
700000
heap
page read and write
2EAB1030000
heap
page read and write
2EAB1313000
heap
page read and write
A870D7D000
stack
page read and write
23CC03A9000
heap
page read and write
338E000
stack
page read and write
2516B1D0000
heap
page read and write
1BF00CA6000
heap
page read and write
20BEC83B000
heap
page read and write
2516B445000
heap
page read and write
2E45000
heap
page read and write
23CC0818000
heap
page read and write
A870F7A000
stack
page read and write
4FAA000
trusted library allocation
page read and write
B34000
heap
page read and write
1BF00C43000
heap
page read and write
23CC03A2000
heap
page read and write
9E194FE000
stack
page read and write
4781000
heap
page read and write
2CE0000
heap
page read and write
B34000
heap
page read and write
2C90000
heap
page read and write
2C67000
heap
page read and write
262CDB13000
heap
page read and write
20BEC830000
heap
page read and write
4BF0000
trusted library allocation
page read and write
1BF01D00000
heap
page read and write
6073000
heap
page read and write
521E000
stack
page read and write
B34000
heap
page read and write
AE0000
trusted library allocation
page read and write
23CC03A2000
heap
page read and write
1F7318AE000
heap
page read and write
4F61000
trusted library allocation
page read and write
21FA5840000
heap
page read and write
2799AD58000
heap
page read and write
2516B461000
heap
page read and write
9E1957E000
stack
page read and write
4781000
heap
page read and write
1ABFFE29000
heap
page read and write
2BC9000
heap
page read and write
1D1CFB41000
heap
page read and write
2D10000
trusted library allocation
page read and write
2516B477000
heap
page read and write
23CC0370000
heap
page read and write
6030000
trusted library allocation
page read and write
1BF01C54000
heap
page read and write
2799A4FC000
heap
page read and write
1BF75C29000
heap
page read and write
4781000
heap
page read and write
10051000
unkown
page readonly
2799A454000
heap
page read and write
1D1CF24D000
heap
page read and write
6F7327E000
stack
page read and write
161FCDF0000
remote allocation
page read and write
4781000
heap
page read and write
4781000
heap
page read and write
B34000
heap
page read and write
1BF00CB5000
heap
page read and write
2C93000
heap
page read and write
1BF00C84000
heap
page read and write
1BF75C81000
heap
page read and write
CA29E7A000
stack
page read and write
161FCD90000
heap
page read and write
2799FB90000
trusted library allocation
page read and write
BBD1DB000
stack
page read and write
2C06000
heap
page read and write
445F000
stack
page read and write
23CC038F000
heap
page read and write
175ABAC8000
heap
page read and write
46F0000
trusted library allocation
page read and write
30D7000
heap
page read and write
A87157A000
stack
page read and write
4EA0000
trusted library allocation
page read and write
2A60000
heap
page read and write
21FA5650000
heap
page read and write
2799FC64000
heap
page read and write
2516B45A000
heap
page read and write
23CC0387000
heap
page read and write
23CC03A2000
heap
page read and write
1AB80602000
trusted library allocation
page read and write
B34000
heap
page read and write
1BF00DB8000
heap
page read and write
BBD5FB000
stack
page read and write
1D1CF2B9000
heap
page read and write
1D1CF2B2000
heap
page read and write
7D0000
remote allocation
page read and write
20BEC854000
heap
page read and write
2799A525000
heap
page read and write
1BF75C00000
heap
page read and write
52471FC000
stack
page read and write
2799FB10000
trusted library allocation
page read and write
9D5B9FE000
stack
page read and write
2EAB124D000
heap
page read and write
2799F8A0000
trusted library allocation
page read and write
4FE2000
trusted library allocation
page read and write
2516B502000
heap
page read and write
4E1E000
stack
page read and write
4781000
heap
page read and write
23CBFA8A000
heap
page read and write
10000000
unkown
page readonly
23CC03A5000
heap
page read and write
2799FCA2000
heap
page read and write
1BF75C5C000
heap
page read and write
23CC03AB000
heap
page read and write
175AC202000
heap
page read and write
2799A370000
heap
page read and write
4781000
heap
page read and write
46D0000
heap
page read and write
B34000
heap
page read and write
29EB000
stack
page read and write
22382FA000
stack
page read and write
45FF000
stack
page read and write
1BF75C13000
heap
page read and write
80312FE000
stack
page read and write
2EAB1249000
heap
page read and write
There are 1044 hidden memdumps, click here to show them.