Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
JtJ50Swtfo.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
MPEG-4 LOAS
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x292d39b8, page size 16384, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_JtJ_f1302aae73d1bd36c99beead2422e86237ae15_9903e0f3_15e02aea\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_JtJ_f1302aae73d1bd36c99beead2422e86237ae15_9903e0f3_1747af5d\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_JtJ_f1302aae73d1bd36c99beead2422e86237ae15_9903e0f3_1773b171\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1A8E.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon May 23 05:29:45 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2127.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER235A.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7F45.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon May 23 05:29:37 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER809D.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon May 23 05:29:38 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA01C.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA33A.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA3F4.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA7DD.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
ASCII text, with no line terminators
|
dropped
|
There are 8 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\regsvr32.exe
|
regsvr32.exe /s C:\Users\user\Desktop\JtJ50Swtfo.dll
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\JtJ50Swtfo.dll",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\JtJ50Swtfo.dll,AddIn_FileTime
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\JtJ50Swtfo.dll,AddIn_SystemTime
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\GJzmbimn\geJzufDvqRClHij.dll"
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\JtJ50Swtfo.dll,DllRegisterServer
|
||
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\JtJ50Swtfo.dll"
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\JtJ50Swtfo.dll",#1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 7136 -s 328
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 7124 -s 336
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 3552 -s 332
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 3552 -s 332
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p
|
There are 8 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.disneyplus.com/legal/your-california-privacy-rights
|
unknown
|
||
https://www.disneyplus.com/legal/privacy-policy
|
unknown
|
||
https://165.22.73.229:8080/d
|
unknown
|
||
https://165.22.73.229:8080/
|
unknown
|
||
https://www.hotspotshield.com/terms/
|
unknown
|
||
https://www.pango.co/privacy
|
unknown
|
||
http://schemas.xmlsoap.o
|
unknown
|
||
https://disneyplus.com/legal.
|
unknown
|
||
https://165.22.73.229/
|
unknown
|
||
https://165.22.73.229:8080/z
|
unknown
|
||
https://165.22.73.229:8080/Num
|
unknown
|
||
http://crl.ver)
|
unknown
|
||
https://www.tiktok.com/legal/report/feedback
|
unknown
|
||
http://help.disneyplus.com.
|
unknown
|
||
https://support.hotspotshield.com/
|
unknown
|
There are 5 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
165.22.73.229
|
unknown
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProgramId
|
||
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
FileId
|
||
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LowerCaseLongPath
|
||
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LongPathHash
|
||
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Name
|
||
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Publisher
|
||
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Version
|
||
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinFileVersion
|
||
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinaryType
|
||
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProductName
|
||
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
ProductVersion
|
||
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
LinkDate
|
||
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
BinProductVersion
|
||
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Size
|
||
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
Language
|
||
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
IsPeFile
|
||
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
|
IsOsComponent
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
0018C005C62C4D85
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
0018C005C62C4D85
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
0018C005C62C4D85
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
There are 25 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2A20000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
297062B0000
|
direct allocation
|
page execute and read and write
|
||
297062B0000
|
direct allocation
|
page execute and read and write
|
||
18014000000
|
direct allocation
|
page execute and read and write
|
||
21310570000
|
direct allocation
|
page execute and read and write
|
||
21310570000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
18014000000
|
direct allocation
|
page execute and read and write
|
||
1490000
|
direct allocation
|
page execute and read and write
|
||
18014000000
|
direct allocation
|
page execute and read and write
|
||
297062B0000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
180001000
|
direct allocation
|
page execute read
|
||
21310570000
|
direct allocation
|
page execute and read and write
|
||
180001000
|
direct allocation
|
page execute read
|
||
213105F0000
|
heap
|
page read and write
|
||
1DCF3D59000
|
heap
|
page read and write
|
||
1E5F2F8D000
|
heap
|
page read and write
|
||
1DCF2010000
|
trusted library allocation
|
page read and write
|
||
1DCF204E000
|
heap
|
page read and write
|
||
21372730000
|
trusted library allocation
|
page read and write
|
||
6B2CDEE000
|
stack
|
page read and write
|
||
21372898000
|
heap
|
page read and write
|
||
18002F000
|
direct allocation
|
page read and write
|
||
1E5F2FCD000
|
heap
|
page read and write
|
||
244ABB08000
|
heap
|
page read and write
|
||
264CFE30000
|
trusted library allocation
|
page read and write
|
||
2136DB18000
|
heap
|
page read and write
|
||
7FFA5336F000
|
unkown
|
page readonly
|
||
18002F000
|
direct allocation
|
page read and write
|
||
1E5F2F68000
|
heap
|
page read and write
|
||
1DCF4810000
|
remote allocation
|
page read and write
|
||
5B1B87C000
|
stack
|
page read and write
|
||
1FB35CF000
|
stack
|
page read and write
|
||
1E059C56000
|
heap
|
page read and write
|
||
1DCF3CE2000
|
heap
|
page read and write
|
||
1DCF3D74000
|
heap
|
page read and write
|
||
E5CFC7F000
|
stack
|
page read and write
|
||
1E5F2F8B000
|
heap
|
page read and write
|
||
1E5F2FA4000
|
heap
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
1E5F24BF000
|
heap
|
page read and write
|
||
1E5F2F9C000
|
heap
|
page read and write
|
||
2C0A27D000
|
stack
|
page read and write
|
||
7FFA53341000
|
unkown
|
page execute read
|
||
1DCF2050000
|
trusted library allocation
|
page read and write
|
||
18014050000
|
heap
|
page read and write
|
||
1DCF3D89000
|
heap
|
page read and write
|
||
6B2CCEB000
|
stack
|
page read and write
|
||
1E5F2467000
|
heap
|
page read and write
|
||
131C000
|
heap
|
page read and write
|
||
1DCF1F3E000
|
heap
|
page read and write
|
||
1F3EB23D000
|
heap
|
page read and write
|
||
213105A0000
|
heap
|
page readonly
|
||
1DCF3D33000
|
heap
|
page read and write
|
||
264CFE29000
|
heap
|
page read and write
|
||
7FFA53340000
|
unkown
|
page readonly
|
||
18013E38000
|
heap
|
page read and write
|
||
11E1000
|
heap
|
page read and write
|
||
22CDD2E000
|
stack
|
page read and write
|
||
1E5F2300000
|
heap
|
page read and write
|
||
1E5F2CC0000
|
remote allocation
|
page read and write
|
||
1186000
|
heap
|
page read and write
|
||
1DCF3D01000
|
heap
|
page read and write
|
||
1DCF3D89000
|
heap
|
page read and write
|
||
1DCF1F4F000
|
heap
|
page read and write
|
||
22E5B624000
|
heap
|
page read and write
|
||
22377A90000
|
trusted library allocation
|
page read and write
|
||
22E5B708000
|
heap
|
page read and write
|
||
22E5B702000
|
heap
|
page read and write
|
||
18013E38000
|
heap
|
page read and write
|
||
1DCF40D8000
|
heap
|
page read and write
|
||
16F8AE13000
|
heap
|
page read and write
|
||
6B2D07F000
|
stack
|
page read and write
|
||
16F8ADC0000
|
trusted library allocation
|
page read and write
|
||
9789FFF000
|
stack
|
page read and write
|
||
648BC7A000
|
stack
|
page read and write
|
||
21372800000
|
heap
|
page read and write
|
||
1DCF1F65000
|
heap
|
page read and write
|
||
2C09FAF000
|
stack
|
page read and write
|
||
1E5F2F25000
|
heap
|
page read and write
|
||
9E9447F000
|
stack
|
page read and write
|
||
3E616F9000
|
stack
|
page read and write
|
||
1DCF3D6D000
|
heap
|
page read and write
|
||
1DCF1F76000
|
heap
|
page read and write
|
||
21310418000
|
heap
|
page read and write
|
||
1E059C46000
|
heap
|
page read and write
|
||
1DCF3CFB000
|
heap
|
page read and write
|
||
16F8AE8D000
|
heap
|
page read and write
|
||
297062E0000
|
heap
|
page readonly
|
||
1E5F24EF000
|
heap
|
page read and write
|
||
244AC202000
|
trusted library allocation
|
page read and write
|
||
213103F0000
|
heap
|
page read and write
|
||
1348000
|
heap
|
page read and write
|
||
1DCF3CF4000
|
heap
|
page read and write
|
||
1DCF3D89000
|
heap
|
page read and write
|
||
21310510000
|
heap
|
page read and write
|
||
1DCF47A1000
|
heap
|
page read and write
|
||
1DCF1FE0000
|
trusted library allocation
|
page read and write
|
||
1DCF3D07000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
2136D224000
|
heap
|
page read and write
|
||
9789AFF000
|
stack
|
page read and write
|
||
244ABA13000
|
heap
|
page read and write
|
||
1DCF1F50000
|
heap
|
page read and write
|
||
213105D0000
|
heap
|
page read and write
|
||
223747A0000
|
heap
|
page read and write
|
||
29706150000
|
heap
|
page read and write
|
||
7FFA53340000
|
unkown
|
page readonly
|
||
648BF7B000
|
stack
|
page read and write
|
||
264CFD50000
|
heap
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
213727F0000
|
trusted library allocation
|
page read and write
|
||
2CAC000
|
stack
|
page read and write
|
||
30F0000
|
trusted library allocation
|
page read and write
|
||
21372730000
|
trusted library allocation
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
9E941FB000
|
stack
|
page read and write
|
||
7FFA53362000
|
unkown
|
page readonly
|
||
2136D080000
|
heap
|
page read and write
|
||
29706188000
|
heap
|
page read and write
|
||
1DCF3D01000
|
heap
|
page read and write
|
||
1480000
|
direct allocation
|
page execute and read and write
|
||
1E5F245E000
|
heap
|
page read and write
|
||
1DCF3D33000
|
heap
|
page read and write
|
||
7FFA5336F000
|
unkown
|
page readonly
|
||
297063D0000
|
heap
|
page read and write
|
||
3E617FC000
|
stack
|
page read and write
|
||
1E059C76000
|
heap
|
page read and write
|
||
213105A0000
|
heap
|
page readonly
|
||
22378290000
|
heap
|
page read and write
|
||
22377A80000
|
heap
|
page read and write
|
||
2136DA15000
|
heap
|
page read and write
|
||
1DCF3D14000
|
heap
|
page read and write
|
||
1DCF3D6D000
|
heap
|
page read and write
|
||
21372720000
|
trusted library allocation
|
page read and write
|
||
7FFA5336B000
|
unkown
|
page read and write
|
||
1DCF2010000
|
trusted library allocation
|
page read and write
|
||
989915C000
|
stack
|
page read and write
|
||
297063D5000
|
heap
|
page read and write
|
||
2C0A5F7000
|
stack
|
page read and write
|
||
8D8DB8B000
|
stack
|
page read and write
|
||
1DCF1E80000
|
heap
|
page read and write
|
||
1DCF3CEE000
|
heap
|
page read and write
|
||
2136D1F3000
|
trusted library allocation
|
page read and write
|
||
7FFA5336B000
|
unkown
|
page read and write
|
||
1E5F2464000
|
heap
|
page read and write
|
||
1DCF1F51000
|
heap
|
page read and write
|
||
1DCF3CDC000
|
heap
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
21310410000
|
heap
|
page read and write
|
||
264CFDE0000
|
trusted library allocation
|
page read and write
|
||
9D70078000
|
stack
|
page read and write
|
||
18013DA0000
|
heap
|
page read and write
|
||
1DCF2010000
|
trusted library allocation
|
page read and write
|
||
21372680000
|
trusted library allocation
|
page read and write
|
||
1DCF3D01000
|
heap
|
page read and write
|
||
213105F0000
|
heap
|
page read and write
|
||
213728F0000
|
heap
|
page read and write
|
||
213728E4000
|
heap
|
page read and write
|
||
1E059BD0000
|
heap
|
page read and write
|
||
1E5F3402000
|
heap
|
page read and write
|
||
131C000
|
heap
|
page read and write
|
||
213105A0000
|
heap
|
page readonly
|
||
180000000
|
direct allocation
|
page read and write
|
||
1E5F2FD7000
|
heap
|
page read and write
|
||
1E5F2FB3000
|
heap
|
page read and write
|
||
1DCF2010000
|
trusted library allocation
|
page read and write
|
||
16F8AF08000
|
heap
|
page read and write
|
||
22E5B700000
|
heap
|
page read and write
|
||
1E5F2516000
|
heap
|
page read and write
|
||
1DCF2010000
|
trusted library allocation
|
page read and write
|
||
9D6FA7E000
|
stack
|
page read and write
|
||
21372855000
|
heap
|
page read and write
|
||
7FFA5336F000
|
unkown
|
page readonly
|
||
340E000
|
stack
|
page read and write
|
||
24340A28000
|
heap
|
page read and write
|
||
22CDCA3000
|
stack
|
page read and write
|
||
2C0A3FF000
|
stack
|
page read and write
|
||
1DCF3D1A000
|
heap
|
page read and write
|
||
264CFE25000
|
heap
|
page read and write
|
||
1E5F2F89000
|
heap
|
page read and write
|
||
1DCF47C0000
|
heap
|
page read and write
|
||
7FFA5336F000
|
unkown
|
page readonly
|
||
1DCF4610000
|
heap
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
1DCF47C1000
|
heap
|
page read and write
|
||
2ADE000
|
stack
|
page read and write
|
||
13E5000
|
heap
|
page read and write
|
||
1E5F2FA4000
|
heap
|
page read and write
|
||
9E944FF000
|
stack
|
page read and write
|
||
1DCF1DA0000
|
unkown
|
page read and write
|
||
1DCF3CDA000
|
heap
|
page read and write
|
||
9E944FF000
|
stack
|
page read and write
|
||
18014050000
|
heap
|
page read and write
|
||
29707CB0000
|
heap
|
page read and write
|
||
18013DA0000
|
heap
|
page read and write
|
||
1DCF47A7000
|
heap
|
page read and write
|
||
1DCF1D80000
|
unkown
|
page readonly
|
||
1DCF3CD4000
|
heap
|
page read and write
|
||
1DCF3D0E000
|
heap
|
page read and write
|
||
9D6FD77000
|
stack
|
page read and write
|
||
7FFA53341000
|
unkown
|
page execute read
|
||
7FFA53362000
|
unkown
|
page readonly
|
||
1E5F2413000
|
heap
|
page read and write
|
||
1E5F2F8B000
|
heap
|
page read and write
|
||
22CE07E000
|
stack
|
page read and write
|
||
264CFBF0000
|
heap
|
page read and write
|
||
1DCF3D33000
|
heap
|
page read and write
|
||
1DCF2010000
|
trusted library allocation
|
page read and write
|
||
1E5F2465000
|
heap
|
page read and write
|
||
1DCF3CEE000
|
heap
|
page read and write
|
||
9789CFF000
|
stack
|
page read and write
|
||
1DCF3D07000
|
heap
|
page read and write
|
||
8D8E0F9000
|
stack
|
page read and write
|
||
22374ABB000
|
heap
|
page read and write
|
||
9D6FC78000
|
stack
|
page read and write
|
||
10F0000
|
heap
|
page read and write
|
||
1E5F2F9A000
|
heap
|
page read and write
|
||
16F8AD90000
|
heap
|
page read and write
|
||
1DCF3D6D000
|
heap
|
page read and write
|
||
18013E30000
|
heap
|
page read and write
|
||
34D0000
|
remote allocation
|
page read and write
|
||
18014100000
|
heap
|
page read and write
|
||
1E059E70000
|
heap
|
page read and write
|
||
131C000
|
heap
|
page read and write
|
||
2137289E000
|
heap
|
page read and write
|
||
24340B02000
|
heap
|
page read and write
|
||
264D0CB0000
|
trusted library allocation
|
page read and write
|
||
1DCF47AA000
|
heap
|
page read and write
|
||
22374848000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
1DCF3D14000
|
heap
|
page read and write
|
||
1DCF3CE8000
|
heap
|
page read and write
|
||
22CE0FE000
|
stack
|
page read and write
|
||
2136E1E0000
|
trusted library allocation
|
page read and write
|
||
21310560000
|
direct allocation
|
page execute and read and write
|
||
21372750000
|
trusted library allocation
|
page read and write
|
||
9D6F75B000
|
stack
|
page read and write
|
||
22374AB0000
|
heap
|
page read and write
|
||
1E5F24C6000
|
heap
|
page read and write
|
||
1E5F248C000
|
heap
|
page read and write
|
||
244ABA80000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
22374640000
|
heap
|
page read and write
|
||
1E5F2FB7000
|
heap
|
page read and write
|
||
7FFA53362000
|
unkown
|
page readonly
|
||
21372813000
|
heap
|
page read and write
|
||
2136DB59000
|
heap
|
page read and write
|
||
1E059C73000
|
heap
|
page read and write
|
||
18013DC0000
|
heap
|
page read and write
|
||
2137284C000
|
heap
|
page read and write
|
||
1E5F2FAF000
|
heap
|
page read and write
|
||
29707CB0000
|
heap
|
page read and write
|
||
1DCF1F45000
|
heap
|
page read and write
|
||
24340A7A000
|
heap
|
page read and write
|
||
18013DA0000
|
heap
|
page read and write
|
||
1DCF3D20000
|
heap
|
page read and write
|
||
1DCF1F59000
|
heap
|
page read and write
|
||
1DCF3CEE000
|
heap
|
page read and write
|
||
29707CD0000
|
heap
|
page read and write
|
||
1F3EB1D0000
|
heap
|
page read and write
|
||
1DCF4740000
|
heap
|
page read and write
|
||
21372700000
|
trusted library allocation
|
page read and write
|
||
1FB34CC000
|
stack
|
page read and write
|
||
297062A0000
|
direct allocation
|
page execute and read and write
|
||
22374842000
|
heap
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
2237485D000
|
heap
|
page read and write
|
||
21310635000
|
heap
|
page read and write
|
||
1E5F2F68000
|
heap
|
page read and write
|
||
16F8AF00000
|
heap
|
page read and write
|
||
2136DB02000
|
heap
|
page read and write
|
||
1DCF2010000
|
trusted library allocation
|
page read and write
|
||
2136D29F000
|
heap
|
page read and write
|
||
213728E1000
|
heap
|
page read and write
|
||
1DCF3CE8000
|
heap
|
page read and write
|
||
978A1FF000
|
stack
|
page read and write
|
||
12F2000
|
heap
|
page read and write
|
||
3E61679000
|
stack
|
page read and write
|
||
1E5F2CC0000
|
remote allocation
|
page read and write
|
||
9789B7F000
|
stack
|
page read and write
|
||
264CFE20000
|
heap
|
page read and write
|
||
1DCF3D6D000
|
heap
|
page read and write
|
||
1E5F2FA0000
|
heap
|
page read and write
|
||
29706130000
|
heap
|
page read and write
|
||
16F8AE4D000
|
heap
|
page read and write
|
||
978A0FD000
|
stack
|
page read and write
|
||
1E5F2F78000
|
heap
|
page read and write
|
||
29706180000
|
heap
|
page read and write
|
||
244ABA29000
|
heap
|
page read and write
|
||
21310418000
|
heap
|
page read and write
|
||
24340A02000
|
heap
|
page read and write
|
||
2136D302000
|
heap
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
18014100000
|
heap
|
page read and write
|
||
8D8E07E000
|
stack
|
page read and write
|
||
2136DB04000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
2B5F000
|
stack
|
page read and write
|
||
1DCF3F10000
|
heap
|
page read and write
|
||
9789C7B000
|
stack
|
page read and write
|
||
1E5F2F85000
|
heap
|
page read and write
|
||
21372CB0000
|
trusted library allocation
|
page read and write
|
||
1E5F2FCD000
|
heap
|
page read and write
|
||
1DCF3CFB000
|
heap
|
page read and write
|
||
648BE7A000
|
stack
|
page read and write
|
||
16F8AD30000
|
heap
|
page read and write
|
||
1DCF3CEA000
|
heap
|
page read and write
|
||
2136D213000
|
heap
|
page read and write
|
||
1E5F2F0E000
|
heap
|
page read and write
|
||
1DCF3F13000
|
heap
|
page read and write
|
||
1DCF3D27000
|
heap
|
page read and write
|
||
18015A00000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
22374820000
|
heap
|
page read and write
|
||
648BD7E000
|
stack
|
page read and write
|
||
22E5B65D000
|
heap
|
page read and write
|
||
1E5F245C000
|
heap
|
page read and write
|
||
18013DC0000
|
heap
|
page read and write
|
||
1E5F2FA0000
|
heap
|
page read and write
|
||
7FFA53340000
|
unkown
|
page readonly
|
||
7FFA5336F000
|
unkown
|
page readonly
|
||
34D0000
|
remote allocation
|
page read and write
|
||
1DCF47A0000
|
heap
|
page read and write
|
||
7FFA53362000
|
unkown
|
page readonly
|
||
9D6FF7F000
|
stack
|
page read and write
|
||
2136D010000
|
heap
|
page read and write
|
||
1DCF3CFB000
|
heap
|
page read and write
|
||
1DCF1F5C000
|
heap
|
page read and write
|
||
3E6138E000
|
stack
|
page read and write
|
||
22E5B63C000
|
heap
|
page read and write
|
||
7FFA53362000
|
unkown
|
page readonly
|
||
264D0A90000
|
trusted library allocation
|
page read and write
|
||
1DCF40D7000
|
heap
|
page read and write
|
||
1DCF3D6D000
|
heap
|
page read and write
|
||
213727F0000
|
trusted library allocation
|
page read and write
|
||
1DCF1F53000
|
heap
|
page read and write
|
||
1E5F2F6A000
|
heap
|
page read and write
|
||
7FFA53362000
|
unkown
|
page readonly
|
||
18013E10000
|
direct allocation
|
page execute and read and write
|
||
1E5F3402000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1DCF3D20000
|
heap
|
page read and write
|
||
264CFE9B000
|
heap
|
page read and write
|
||
2136D302000
|
heap
|
page read and write
|
||
1E5F2F9E000
|
heap
|
page read and write
|
||
2136D274000
|
heap
|
page read and write
|
||
1E5F248C000
|
heap
|
page read and write
|
||
1DCF3D4D000
|
heap
|
page read and write
|
||
244ABA4A000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
22E5B4B0000
|
heap
|
page read and write
|
||
29707BB0000
|
remote allocation
|
page read and write
|
||
30F0000
|
trusted library allocation
|
page read and write
|
||
1DCF2010000
|
trusted library allocation
|
page read and write
|
||
264CFE9B000
|
heap
|
page read and write
|
||
1E5F2400000
|
heap
|
page read and write
|
||
1DCF1F5B000
|
heap
|
page read and write
|
||
3E6128A000
|
stack
|
page read and write
|
||
1E5F2F94000
|
heap
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
7FFA53362000
|
unkown
|
page readonly
|
||
1DCF3D33000
|
heap
|
page read and write
|
||
7FFA53341000
|
unkown
|
page execute read
|
||
22374836000
|
heap
|
page read and write
|
||
244ABB13000
|
heap
|
page read and write
|
||
7FFA5336B000
|
unkown
|
page read and write
|
||
213728AC000
|
heap
|
page read and write
|
||
264D0CA0000
|
trusted library allocation
|
page read and write
|
||
1E5F3402000
|
heap
|
page read and write
|
||
1E5F2459000
|
heap
|
page read and write
|
||
213102B0000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
1DCF3F16000
|
heap
|
page read and write
|
||
1E5F24F9000
|
heap
|
page read and write
|
||
1E5F2F74000
|
heap
|
page read and write
|
||
1DCF3CD6000
|
heap
|
page read and write
|
||
29706180000
|
heap
|
page read and write
|
||
1DCF3D20000
|
heap
|
page read and write
|
||
244ABA4C000
|
heap
|
page read and write
|
||
1DCF2010000
|
trusted library allocation
|
page read and write
|
||
989915C000
|
stack
|
page read and write
|
||
1E5F2F8D000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1DCF4011000
|
heap
|
page read and write
|
||
7FFA53340000
|
unkown
|
page readonly
|
||
29705FF0000
|
unkown
|
page read and write
|
||
12F2000
|
heap
|
page read and write
|
||
134B000
|
heap
|
page read and write
|
||
22E5B5B0000
|
trusted library allocation
|
page read and write
|
||
29706180000
|
heap
|
page read and write
|
||
21310635000
|
heap
|
page read and write
|
||
9789EF7000
|
stack
|
page read and write
|
||
244ABA49000
|
heap
|
page read and write
|
||
1DCF3CFB000
|
heap
|
page read and write
|
||
1E5F2F8F000
|
heap
|
page read and write
|
||
21372B80000
|
remote allocation
|
page read and write
|
||
1E5F2508000
|
heap
|
page read and write
|
||
1DCF47E3000
|
heap
|
page read and write
|
||
16F8AD20000
|
heap
|
page read and write
|
||
1DCF47D1000
|
heap
|
page read and write
|
||
1DCF4810000
|
remote allocation
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
DE5000
|
stack
|
page read and write
|
||
22E5B622000
|
heap
|
page read and write
|
||
1E5F3402000
|
heap
|
page read and write
|
||
648BB7A000
|
stack
|
page read and write
|
||
2136D279000
|
heap
|
page read and write
|
||
21372764000
|
trusted library allocation
|
page read and write
|
||
7FFA53341000
|
unkown
|
page execute read
|
||
1DCF3D01000
|
heap
|
page read and write
|
||
2136D229000
|
heap
|
page read and write
|
||
1E5F22F0000
|
heap
|
page read and write
|
||
1E5F2FAF000
|
heap
|
page read and write
|
||
1FB354F000
|
stack
|
page read and write
|
||
9D6F7DD000
|
stack
|
page read and write
|
||
1DCF1E92000
|
heap
|
page read and write
|
||
1E059BF0000
|
heap
|
page read and write
|
||
1DCF3D07000
|
heap
|
page read and write
|
||
1E5F3402000
|
heap
|
page read and write
|
||
16F8AE00000
|
heap
|
page read and write
|
||
32ED000
|
stack
|
page read and write
|
||
1DCF3D14000
|
heap
|
page read and write
|
||
2136DB00000
|
heap
|
page read and write
|
||
1E5F2FA1000
|
heap
|
page read and write
|
||
264CFEB7000
|
heap
|
page read and write
|
||
1DCF2030000
|
trusted library allocation
|
page read and write
|
||
2A10000
|
direct allocation
|
page execute and read and write
|
||
14C0000
|
heap
|
page readonly
|
||
134B000
|
heap
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
22374780000
|
heap
|
page read and write
|
||
2136DA00000
|
heap
|
page read and write
|
||
29707CD0000
|
heap
|
page read and write
|
||
213728AE000
|
heap
|
page read and write
|
||
1DCF3CEE000
|
heap
|
page read and write
|
||
1FB34CC000
|
stack
|
page read and write
|
||
213103F0000
|
heap
|
page read and write
|
||
1DCF1F53000
|
heap
|
page read and write
|
||
1DCF20E0000
|
heap
|
page read and write
|
||
21372B80000
|
remote allocation
|
page read and write
|
||
1E5F2F8F000
|
heap
|
page read and write
|
||
1E5F2F8F000
|
heap
|
page read and write
|
||
2C09F2B000
|
stack
|
page read and write
|
||
1DCF1F51000
|
heap
|
page read and write
|
||
22E5BE02000
|
trusted library allocation
|
page read and write
|
||
648C57E000
|
stack
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
1DCF4790000
|
heap
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
1DCF3D33000
|
heap
|
page read and write
|
||
1DCF2010000
|
trusted library allocation
|
page read and write
|
||
989947F000
|
stack
|
page read and write
|
||
1E5F2F6A000
|
heap
|
page read and write
|
||
213728E8000
|
heap
|
page read and write
|
||
22374AB5000
|
heap
|
page read and write
|
||
213102B0000
|
unkown
|
page read and write
|
||
1E5F24A8000
|
heap
|
page read and write
|
||
21310635000
|
heap
|
page read and write
|
||
9789DFB000
|
stack
|
page read and write
|
||
1E059C78000
|
heap
|
page read and write
|
||
264CFF50000
|
trusted library allocation
|
page read and write
|
||
1DCF2050000
|
heap
|
page read and write
|
||
1E5F3421000
|
heap
|
page read and write
|
||
21372B30000
|
trusted library allocation
|
page read and write
|
||
264CFE61000
|
heap
|
page read and write
|
||
1E059C60000
|
heap
|
page read and write
|
||
22E5B713000
|
heap
|
page read and write
|
||
1DCF3D41000
|
heap
|
page read and write
|
||
1E5F2489000
|
heap
|
page read and write
|
||
1DCF3CD0000
|
heap
|
page read and write
|
||
5B1BB7B000
|
stack
|
page read and write
|
||
7FFA53362000
|
unkown
|
page readonly
|
||
22E5B675000
|
heap
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
1DCF2010000
|
trusted library allocation
|
page read and write
|
||
1DCF3D27000
|
heap
|
page read and write
|
||
1E5F341A000
|
heap
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
2C0A4FA000
|
stack
|
page read and write
|
||
29707CB0000
|
heap
|
page read and write
|
||
1DCF3D74000
|
heap
|
page read and write
|
||
1DCF3D76000
|
heap
|
page read and write
|
||
297063D0000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
29707CD0000
|
heap
|
page read and write
|
||
1DCF2010000
|
trusted library allocation
|
page read and write
|
||
9D700FE000
|
stack
|
page read and write
|
||
244AB850000
|
heap
|
page read and write
|
||
1E5F2502000
|
heap
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
21310510000
|
heap
|
page read and write
|
||
6570BED000
|
stack
|
page read and write
|
||
1DCF1F7E000
|
heap
|
page read and write
|
||
1E059C4F000
|
heap
|
page read and write
|
||
16F8AE50000
|
heap
|
page read and write
|
||
2136D277000
|
heap
|
page read and write
|
||
2237483E000
|
heap
|
page read and write
|
||
1DCF2010000
|
trusted library allocation
|
page read and write
|
||
E5CF38E000
|
stack
|
page read and write
|
||
21372750000
|
trusted library allocation
|
page read and write
|
||
2136D2FE000
|
heap
|
page read and write
|
||
1DCF3D75000
|
heap
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
7FFA53341000
|
unkown
|
page execute read
|
||
1DCF3D0E000
|
heap
|
page read and write
|
||
1DCF1D40000
|
heap
|
page read and write
|
||
264CFDC0000
|
trusted library allocation
|
page read and write
|
||
1DCF2010000
|
trusted library allocation
|
page read and write
|
||
1FB35CF000
|
stack
|
page read and write
|
||
1DCF4010000
|
heap
|
page read and write
|
||
1DCF1F57000
|
heap
|
page read and write
|
||
1DCF2010000
|
trusted library allocation
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
319B000
|
stack
|
page read and write
|
||
2136D2BC000
|
heap
|
page read and write
|
||
2136D23D000
|
heap
|
page read and write
|
||
354F000
|
stack
|
page read and write
|
||
1DCF3D2D000
|
heap
|
page read and write
|
||
1DCF2010000
|
trusted library allocation
|
page read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
1E5F2F26000
|
heap
|
page read and write
|
||
264CFDD0000
|
trusted library allocation
|
page read and write
|
||
1DCF3D3F000
|
heap
|
page read and write
|
||
16F8AE3C000
|
heap
|
page read and write
|
||
E5CF28B000
|
stack
|
page read and write
|
||
24340A13000
|
heap
|
page read and write
|
||
16F8AE49000
|
heap
|
page read and write
|
||
1E5F2461000
|
heap
|
page read and write
|
||
24340B13000
|
heap
|
page read and write
|
||
1DCF1F5B000
|
heap
|
page read and write
|
||
1DCF1F51000
|
heap
|
page read and write
|
||
16F8AF13000
|
heap
|
page read and write
|
||
2136DA02000
|
heap
|
page read and write
|
||
1F3EB160000
|
heap
|
page read and write
|
||
6B2CD6E000
|
stack
|
page read and write
|
||
11C7000
|
heap
|
page read and write
|
||
1E5F2FA4000
|
heap
|
page read and write
|
||
24340A00000
|
heap
|
page read and write
|
||
22E5B681000
|
heap
|
page read and write
|
||
244AB840000
|
heap
|
page read and write
|
||
22CE2FC000
|
stack
|
page read and write
|
||
1DCF3D0E000
|
heap
|
page read and write
|
||
127A000
|
stack
|
page read and write
|
||
1DCF3D6F000
|
heap
|
page read and write
|
||
18014050000
|
heap
|
page read and write
|
||
3E6177F000
|
stack
|
page read and write
|
||
1DCF3CE8000
|
heap
|
page read and write
|
||
2136DB18000
|
heap
|
page read and write
|
||
21372B00000
|
trusted library allocation
|
page read and write
|
||
213102B0000
|
unkown
|
page read and write
|
||
1DCF3D6D000
|
heap
|
page read and write
|
||
1E5F245D000
|
heap
|
page read and write
|
||
1E059C46000
|
heap
|
page read and write
|
||
1E5F2F9E000
|
heap
|
page read and write
|
||
1DCF2010000
|
trusted library allocation
|
page read and write
|
||
1DCF1F80000
|
heap
|
page read and write
|
||
31EC000
|
stack
|
page read and write
|
||
1DCF4263000
|
heap
|
page read and write
|
||
1E5F2F9E000
|
heap
|
page read and write
|
||
29706188000
|
heap
|
page read and write
|
||
E5CFB7C000
|
stack
|
page read and write
|
||
E5CF977000
|
stack
|
page read and write
|
||
29706130000
|
heap
|
page read and write
|
||
1DCF1F4D000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
244ABB00000
|
heap
|
page read and write
|
||
1DCF2010000
|
trusted library allocation
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
2136E661000
|
trusted library allocation
|
page read and write
|
||
21372B40000
|
trusted library allocation
|
page read and write
|
||
244ABA6E000
|
heap
|
page read and write
|
||
1DCF2010000
|
trusted library allocation
|
page read and write
|
||
1DCF3CE8000
|
heap
|
page read and write
|
||
1E5F2FA0000
|
heap
|
page read and write
|
||
264CFE93000
|
heap
|
page read and write
|
||
E5CF7FB000
|
stack
|
page read and write
|
||
22E5B659000
|
heap
|
page read and write
|
||
1DCF3CF4000
|
heap
|
page read and write
|
||
9E941FC000
|
stack
|
page read and write
|
||
18013E20000
|
heap
|
page readonly
|
||
7FFA5336B000
|
unkown
|
page read and write
|
||
1E5F2F6F000
|
heap
|
page read and write
|
||
1FB34CC000
|
stack
|
page read and write
|
||
2136D1F0000
|
trusted library allocation
|
page read and write
|
||
1E5F2F53000
|
heap
|
page read and write
|
||
3E6130F000
|
stack
|
page read and write
|
||
22E5B655000
|
heap
|
page read and write
|
||
1DCF20EA000
|
heap
|
page read and write
|
||
1FB35CF000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
243409D0000
|
trusted library allocation
|
page read and write
|
||
18013E30000
|
heap
|
page read and write
|
||
1E5F2F67000
|
heap
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
18013D30000
|
unkown
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
1E5F24EF000
|
heap
|
page read and write
|
||
1F3EB230000
|
heap
|
page read and write
|
||
1DCF4810000
|
remote allocation
|
page read and write
|
||
114B000
|
heap
|
page read and write
|
||
2C0A6FE000
|
stack
|
page read and write
|
||
1E5F24B3000
|
heap
|
page read and write
|
||
1DCF3D14000
|
heap
|
page read and write
|
||
18013E10000
|
direct allocation
|
page execute and read and write
|
||
22E5B65C000
|
heap
|
page read and write
|
||
2136D26F000
|
heap
|
page read and write
|
||
E5CF87E000
|
stack
|
page read and write
|
||
1DCF1F4F000
|
heap
|
page read and write
|
||
18013E38000
|
heap
|
page read and write
|
||
9D6FB7B000
|
stack
|
page read and write
|
||
22374828000
|
heap
|
page read and write
|
||
1E5F24E4000
|
heap
|
page read and write
|
||
1E5F2429000
|
heap
|
page read and write
|
||
1E059AA0000
|
heap
|
page read and write
|
||
648BA77000
|
stack
|
page read and write
|
||
29706150000
|
heap
|
page read and write
|
||
21372720000
|
trusted library allocation
|
page read and write
|
||
1DCF2010000
|
trusted library allocation
|
page read and write
|
||
1E5F2F8B000
|
heap
|
page read and write
|
||
1DCF1F57000
|
heap
|
page read and write
|
||
1FB354F000
|
stack
|
page read and write
|
||
213105F0000
|
heap
|
page read and write
|
||
213103F0000
|
heap
|
page read and write
|
||
21310418000
|
heap
|
page read and write
|
||
2136D2AA000
|
heap
|
page read and write
|
||
34AB000
|
stack
|
page read and write
|
||
1DCF3D0E000
|
heap
|
page read and write
|
||
E5CFA7E000
|
stack
|
page read and write
|
||
7FFA53340000
|
unkown
|
page readonly
|
||
1E059C52000
|
heap
|
page read and write
|
||
5B1BE7F000
|
stack
|
page read and write
|
||
244AB8B0000
|
heap
|
page read and write
|
||
264CFE50000
|
heap
|
page read and write
|
||
29706150000
|
heap
|
page read and write
|
||
989947F000
|
stack
|
page read and write
|
||
2137283F000
|
heap
|
page read and write
|
||
1E059C6A000
|
heap
|
page read and write
|
||
1E059C50000
|
heap
|
page read and write
|
||
1E5F2F8B000
|
heap
|
page read and write
|
||
18014105000
|
heap
|
page read and write
|
||
1E5F2FAE000
|
heap
|
page read and write
|
||
1E5F2F85000
|
heap
|
page read and write
|
||
21372C70000
|
trusted library allocation
|
page read and write
|
||
24340A5A000
|
heap
|
page read and write
|
||
1DCF1F4A000
|
heap
|
page read and write
|
||
264CFE58000
|
heap
|
page read and write
|
||
1DCF3CFB000
|
heap
|
page read and write
|
||
1E5F2FB1000
|
heap
|
page read and write
|
||
7FFA5336B000
|
unkown
|
page read and write
|
||
1E5F2FC2000
|
heap
|
page read and write
|
||
2136D258000
|
heap
|
page read and write
|
||
1DCF1DA0000
|
unkown
|
page read and write
|
||
7FFA5336B000
|
unkown
|
page read and write
|
||
1E059C30000
|
heap
|
page read and write
|
||
2136D25A000
|
heap
|
page read and write
|
||
1DCF3D27000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
21372B0E000
|
trusted library allocation
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
1DCF3CEE000
|
heap
|
page read and write
|
||
21310510000
|
heap
|
page read and write
|
||
98991DF000
|
stack
|
page read and write
|
||
1DCF47A4000
|
heap
|
page read and write
|
||
7FFA53340000
|
unkown
|
page readonly
|
||
1DCF1F59000
|
heap
|
page read and write
|
||
1DCF1F61000
|
heap
|
page read and write
|
||
1DCF1D80000
|
unkown
|
page readonly
|
||
213727F0000
|
trusted library allocation
|
page read and write
|
||
1E5F2497000
|
heap
|
page read and write
|
||
1E5F2460000
|
heap
|
page read and write
|
||
18014105000
|
heap
|
page read and write
|
||
16F8AE6F000
|
heap
|
page read and write
|
||
1E059C41000
|
heap
|
page read and write
|
||
1DCF1D90000
|
unkown
|
page readonly
|
||
297062E0000
|
heap
|
page readonly
|
||
98991DF000
|
stack
|
page read and write
|
||
22E5B613000
|
heap
|
page read and write
|
||
21372690000
|
trusted library allocation
|
page read and write
|
||
7FFA5336F000
|
unkown
|
page readonly
|
||
180000000
|
direct allocation
|
page read and write
|
||
1DCF3CF4000
|
heap
|
page read and write
|
||
18013E30000
|
heap
|
page read and write
|
||
1DCF4210000
|
heap
|
page read and write
|
||
1DCF3CF4000
|
heap
|
page read and write
|
||
2136D292000
|
heap
|
page read and write
|
||
7FFA53340000
|
unkown
|
page readonly
|
||
1E5F2F8D000
|
heap
|
page read and write
|
||
12EA000
|
heap
|
page read and write
|
||
1DCF1F77000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
1E5F2453000
|
heap
|
page read and write
|
||
1E5F2F8D000
|
heap
|
page read and write
|
||
7FFA5336F000
|
unkown
|
page readonly
|
||
22E5B65E000
|
heap
|
page read and write
|
||
1DCF4820000
|
heap
|
page read and write
|
||
1E5F2FB1000
|
heap
|
page read and write
|
||
1DCF204B000
|
heap
|
page read and write
|
||
7FFA5336B000
|
unkown
|
page read and write
|
||
21372B50000
|
trusted library allocation
|
page read and write
|
||
21372B24000
|
trusted library allocation
|
page read and write
|
||
1570000
|
heap
|
page read and write
|
||
213728EC000
|
heap
|
page read and write
|
||
297062A0000
|
direct allocation
|
page execute and read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
22CE17B000
|
stack
|
page read and write
|
||
2136D28B000
|
heap
|
page read and write
|
||
1E5F2F68000
|
heap
|
page read and write
|
||
1E5F2F61000
|
heap
|
page read and write
|
||
1E5F2360000
|
heap
|
page read and write
|
||
1E059C60000
|
heap
|
page read and write
|
||
21372710000
|
trusted library allocation
|
page read and write
|
||
1E5F2FB3000
|
heap
|
page read and write
|
||
1E5F24DB000
|
heap
|
page read and write
|
||
1E5F2F96000
|
heap
|
page read and write
|
||
16F8AF02000
|
heap
|
page read and write
|
||
21310620000
|
remote allocation
|
page read and write
|
||
18015A00000
|
heap
|
page read and write
|
||
7FFA5336B000
|
unkown
|
page read and write
|
||
29707BB0000
|
remote allocation
|
page read and write
|
||
21372B60000
|
trusted library allocation
|
page read and write
|
||
2136DB58000
|
heap
|
page read and write
|
||
1DCF3D27000
|
heap
|
page read and write
|
||
2136D28D000
|
heap
|
page read and write
|
||
7FFA53340000
|
unkown
|
page readonly
|
||
1DCF3CDA000
|
heap
|
page read and write
|
||
7FFA53341000
|
unkown
|
page execute read
|
||
1E5F2F10000
|
heap
|
page read and write
|
||
16F8AE53000
|
heap
|
page read and write
|
||
22E5B65A000
|
heap
|
page read and write
|
||
21310630000
|
heap
|
page read and write
|
||
24341402000
|
trusted library allocation
|
page read and write
|
||
7FFA5336F000
|
unkown
|
page readonly
|
||
1DCF3D33000
|
heap
|
page read and write
|
||
1DCF3CE0000
|
heap
|
page read and write
|
||
1DCF3D0E000
|
heap
|
page read and write
|
||
7FFA5336F000
|
unkown
|
page readonly
|
||
1DCF3CF4000
|
heap
|
page read and write
|
||
16F8AE4C000
|
heap
|
page read and write
|
||
1DCF1F7E000
|
heap
|
page read and write
|
||
1E5F2FD1000
|
heap
|
page read and write
|
||
1DCF3D1A000
|
heap
|
page read and write
|
||
1E059E75000
|
heap
|
page read and write
|
||
18015A00000
|
heap
|
page read and write
|
||
24340940000
|
heap
|
page read and write
|
||
18014090000
|
remote allocation
|
page read and write
|
||
7FFA53341000
|
unkown
|
page execute read
|
||
16F8B802000
|
trusted library allocation
|
page read and write
|
||
1DCF1F77000
|
heap
|
page read and write
|
||
18014090000
|
remote allocation
|
page read and write
|
||
213105D0000
|
heap
|
page read and write
|
||
21372B80000
|
remote allocation
|
page read and write
|
||
21372862000
|
heap
|
page read and write
|
||
311E000
|
stack
|
page read and write
|
||
18013D30000
|
unkown
|
page read and write
|
||
1DCF3D89000
|
heap
|
page read and write
|
||
22E5B600000
|
heap
|
page read and write
|
||
1E5F2F8D000
|
heap
|
page read and write
|
||
5B1BD7E000
|
stack
|
page read and write
|
||
1E5F3400000
|
heap
|
page read and write
|
||
22E5B440000
|
heap
|
page read and write
|
||
1E059C74000
|
heap
|
page read and write
|
||
1E5F3402000
|
heap
|
page read and write
|
||
29706130000
|
heap
|
page read and write
|
||
1DCF2010000
|
trusted library allocation
|
page read and write
|
||
1DCF3D14000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
1E5F2F8B000
|
heap
|
page read and write
|
||
7FFA53362000
|
unkown
|
page readonly
|
||
18013E20000
|
heap
|
page readonly
|
||
FB0000
|
remote allocation
|
page read and write
|
||
29705FF0000
|
unkown
|
page read and write
|
||
1DCF3D2D000
|
heap
|
page read and write
|
||
1DCF1D90000
|
unkown
|
page readonly
|
||
264CFD30000
|
heap
|
page read and write
|
||
2A50000
|
heap
|
page readonly
|
||
22E5B660000
|
heap
|
page read and write
|
||
22377A83000
|
heap
|
page read and write
|
||
1E5F24EC000
|
heap
|
page read and write
|
||
9E9447F000
|
stack
|
page read and write
|
||
1E5F2F61000
|
heap
|
page read and write
|
||
2136D314000
|
heap
|
page read and write
|
||
1DCF1F4C000
|
heap
|
page read and write
|
||
21310620000
|
remote allocation
|
page read and write
|
||
1DCF3D07000
|
heap
|
page read and write
|
||
7FFA5336F000
|
unkown
|
page readonly
|
||
7FFA53341000
|
unkown
|
page execute read
|
||
7FFA53362000
|
unkown
|
page readonly
|
||
9789A7C000
|
stack
|
page read and write
|
||
1DCF3D2D000
|
heap
|
page read and write
|
||
7FFA53341000
|
unkown
|
page execute read
|
||
7FFA5336B000
|
unkown
|
page read and write
|
||
22CDDAE000
|
stack
|
page read and write
|
||
11A3000
|
heap
|
page read and write
|
||
16F8AE29000
|
heap
|
page read and write
|
||
1DCF40D7000
|
heap
|
page read and write
|
||
1DCF1F77000
|
heap
|
page read and write
|
||
1E5F2F13000
|
heap
|
page read and write
|
||
E5CF6FB000
|
stack
|
page read and write
|
||
2D50000
|
heap
|
page read and write
|
||
E5CF30E000
|
stack
|
page read and write
|
||
989915C000
|
stack
|
page read and write
|
||
5B1BC7B000
|
stack
|
page read and write
|
||
297063D5000
|
heap
|
page read and write
|
||
1DCF47A7000
|
heap
|
page read and write
|
||
29706188000
|
heap
|
page read and write
|
||
1DCF1F77000
|
heap
|
page read and write
|
||
1E5F2FAF000
|
heap
|
page read and write
|
||
22374839000
|
heap
|
page read and write
|
||
21310410000
|
heap
|
page read and write
|
||
1E5F2F89000
|
heap
|
page read and write
|
||
1E059C6A000
|
heap
|
page read and write
|
||
244ABB02000
|
heap
|
page read and write
|
||
1DCF2010000
|
trusted library allocation
|
page read and write
|
||
1E5F2F89000
|
heap
|
page read and write
|
||
2136D307000
|
heap
|
page read and write
|
||
21372820000
|
heap
|
page read and write
|
||
24340A40000
|
heap
|
page read and write
|
||
244ABA4E000
|
heap
|
page read and write
|
||
1E5F2FBA000
|
heap
|
page read and write
|
||
297063D0000
|
heap
|
page read and write
|
||
1E5F2E02000
|
heap
|
page read and write
|
||
9E944FF000
|
stack
|
page read and write
|
||
1DCF1E88000
|
heap
|
page read and write
|
||
297062E0000
|
heap
|
page readonly
|
||
264CFE9C000
|
heap
|
page read and write
|
||
1DCF3D1A000
|
heap
|
page read and write
|
||
1E5F2FB1000
|
heap
|
page read and write
|
||
29707BB0000
|
remote allocation
|
page read and write
|
||
1DCF3D75000
|
heap
|
page read and write
|
||
21310410000
|
heap
|
page read and write
|
||
2136D020000
|
heap
|
page read and write
|
||
21372B10000
|
trusted library allocation
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
264CFE93000
|
heap
|
page read and write
|
||
1DCF1FA0000
|
heap
|
page read and write
|
||
1DCF3D73000
|
heap
|
page read and write
|
||
1DCF3D0E000
|
heap
|
page read and write
|
||
2136E680000
|
trusted library allocation
|
page read and write
|
||
1E5F2513000
|
heap
|
page read and write
|
||
1E5F2FAD000
|
heap
|
page read and write
|
||
1575000
|
heap
|
page read and write
|
||
9E9447F000
|
stack
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
22374851000
|
heap
|
page read and write
|
||
180000000
|
direct allocation
|
page read and write
|
||
1E5F3418000
|
heap
|
page read and write
|
||
21372B08000
|
trusted library allocation
|
page read and write
|
||
1E5F2458000
|
heap
|
page read and write
|
||
1E5F24A9000
|
heap
|
page read and write
|
||
1DCF2070000
|
trusted library allocation
|
page read and write
|
||
264CFC00000
|
trusted library allocation
|
page read and write
|
||
244ABA00000
|
heap
|
page read and write
|
||
2136D326000
|
heap
|
page read and write
|
||
1E5F2462000
|
heap
|
page read and write
|
||
1DCF2010000
|
trusted library allocation
|
page read and write
|
||
24340B00000
|
heap
|
page read and write
|
||
1E5F2F6A000
|
heap
|
page read and write
|
||
243409A0000
|
heap
|
page read and write
|
||
244ABA4B000
|
heap
|
page read and write
|
||
7FFA53341000
|
unkown
|
page execute read
|
||
1E059C60000
|
heap
|
page read and write
|
||
8D8DF7A000
|
stack
|
page read and write
|
||
1E5F2466000
|
heap
|
page read and write
|
||
1DCF47E3000
|
heap
|
page read and write
|
||
264D0D00000
|
trusted library allocation
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
2C0A7FC000
|
stack
|
page read and write
|
||
2136D180000
|
trusted library allocation
|
page read and write
|
||
244ABA3C000
|
heap
|
page read and write
|
||
1DCF3D07000
|
heap
|
page read and write
|
||
7FFA53362000
|
unkown
|
page readonly
|
||
1DCF3D73000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
648B87B000
|
stack
|
page read and write
|
||
1E5F2F6B000
|
heap
|
page read and write
|
||
1DCF3CE0000
|
heap
|
page read and write
|
||
648C37B000
|
stack
|
page read and write
|
||
9D6FE78000
|
stack
|
page read and write
|
||
22374839000
|
heap
|
page read and write
|
||
7FFA5336B000
|
unkown
|
page read and write
|
||
989947F000
|
stack
|
page read and write
|
||
1DCF3D2D000
|
heap
|
page read and write
|
||
22E5B450000
|
heap
|
page read and write
|
||
1E5F2F25000
|
heap
|
page read and write
|
||
1E059C6A000
|
heap
|
page read and write
|
||
2136D2A8000
|
heap
|
page read and write
|
||
12B8000
|
heap
|
page read and write
|
||
1DCF3D33000
|
heap
|
page read and write
|
||
21372B21000
|
trusted library allocation
|
page read and write
|
||
1DCF4135000
|
heap
|
page read and write
|
||
7FFA53340000
|
unkown
|
page readonly
|
||
1DCF3D14000
|
heap
|
page read and write
|
||
18002E000
|
direct allocation
|
page readonly
|
||
1E059C53000
|
heap
|
page read and write
|
||
18014100000
|
heap
|
page read and write
|
||
21372760000
|
trusted library allocation
|
page read and write
|
||
2237484C000
|
heap
|
page read and write
|
||
213728F0000
|
heap
|
page read and write
|
||
18013DC0000
|
heap
|
page read and write
|
||
297063D5000
|
heap
|
page read and write
|
||
9E941FC000
|
stack
|
page read and write
|
||
1E5F2390000
|
trusted library allocation
|
page read and write
|
||
2C2E000
|
stack
|
page read and write
|
||
22374842000
|
heap
|
page read and write
|
||
1E5F3418000
|
heap
|
page read and write
|
||
1FB354F000
|
stack
|
page read and write
|
||
2237483D000
|
heap
|
page read and write
|
||
1DCF1F48000
|
heap
|
page read and write
|
||
1E5F245A000
|
heap
|
page read and write
|
||
21372900000
|
heap
|
page read and write
|
||
1E5F2FAE000
|
heap
|
page read and write
|
||
1E5F3421000
|
heap
|
page read and write
|
||
22CE1FF000
|
stack
|
page read and write
|
||
1F3EB243000
|
heap
|
page read and write
|
||
21372902000
|
heap
|
page read and write
|
||
1DCF2040000
|
heap
|
page read and write
|
||
264CFE40000
|
heap
|
page readonly
|
||
1E5F2F00000
|
heap
|
page read and write
|
||
98991DF000
|
stack
|
page read and write
|
||
1E5F2FA0000
|
heap
|
page read and write
|
||
297062A0000
|
direct allocation
|
page execute and read and write
|
||
2237484C000
|
heap
|
page read and write
|
||
1DCF1F77000
|
heap
|
page read and write
|
||
2136D200000
|
heap
|
page read and write
|
||
FB0000
|
remote allocation
|
page read and write
|
||
24340930000
|
heap
|
page read and write
|
||
22374A60000
|
heap
|
page read and write
|
||
1DCF3D33000
|
heap
|
page read and write
|
||
1E5F243C000
|
heap
|
page read and write
|
||
2136D29D000
|
heap
|
page read and write
|
||
1DCF1F40000
|
heap
|
page read and write
|
||
316F000
|
stack
|
page read and write
|
||
18014105000
|
heap
|
page read and write
|
||
1DCF407F000
|
heap
|
page read and write
|
||
244AB9B0000
|
trusted library allocation
|
page read and write
|
||
1DCF3CE8000
|
heap
|
page read and write
|
||
213105D0000
|
heap
|
page read and write
|
||
2136DB13000
|
heap
|
page read and write
|
||
7FFA53340000
|
unkown
|
page readonly
|
||
1DCF3CD6000
|
heap
|
page read and write
|
||
18013D30000
|
heap
|
page read and write
|
||
1E5F341A000
|
heap
|
page read and write
|
||
16F8AE81000
|
heap
|
page read and write
|
||
21310630000
|
heap
|
page read and write
|
||
1E5F2F67000
|
heap
|
page read and write
|
||
7FFA5336B000
|
unkown
|
page read and write
|
||
18013E20000
|
heap
|
page readonly
|
||
3560000
|
heap
|
page read and write
|
||
1E5F2FA0000
|
heap
|
page read and write
|
||
244ABA4F000
|
heap
|
page read and write
|
||
1E5F2CC0000
|
remote allocation
|
page read and write
|
||
2136D2FE000
|
heap
|
page read and write
|
||
264CFE9B000
|
heap
|
page read and write
|
||
21310560000
|
direct allocation
|
page execute and read and write
|
||
180030000
|
direct allocation
|
page readonly
|
||
7FFA53341000
|
unkown
|
page execute read
|
||
1DCF2010000
|
trusted library allocation
|
page read and write
|
||
1E5F2FC3000
|
heap
|
page read and write
|
||
29705FF0000
|
heap
|
page read and write
|
||
2137282E000
|
heap
|
page read and write
|
||
1DCF3D01000
|
heap
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
1E5F2F25000
|
heap
|
page read and write
|
||
1E059C55000
|
heap
|
page read and write
|
||
7FFA53340000
|
unkown
|
page readonly
|
||
1E5F2427000
|
heap
|
page read and write
|
||
1DCF20E5000
|
heap
|
page read and write
|
||
1DCF4211000
|
heap
|
page read and write
|
||
16F8AE75000
|
heap
|
page read and write
|
||
18013E10000
|
direct allocation
|
page execute and read and write
|
||
7FFA5336F000
|
unkown
|
page readonly
|
||
1DCF2010000
|
trusted library allocation
|
page read and write
|
||
8D8DFF9000
|
stack
|
page read and write
|
||
22CE37E000
|
stack
|
page read and write
|
||
34D0000
|
remote allocation
|
page read and write
|
||
21310630000
|
heap
|
page read and write
|
||
21310560000
|
direct allocation
|
page execute and read and write
|
There are 977 hidden memdumps, click here to show them.