IOC Report
JtJ50Swtfo

loading gif

Files

File Path
Type
Category
Malicious
JtJ50Swtfo.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x292d39b8, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_JtJ_f1302aae73d1bd36c99beead2422e86237ae15_9903e0f3_15e02aea\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_JtJ_f1302aae73d1bd36c99beead2422e86237ae15_9903e0f3_1747af5d\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_JtJ_f1302aae73d1bd36c99beead2422e86237ae15_9903e0f3_1773b171\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1A8E.tmp.dmp
Mini DuMP crash report, 15 streams, Mon May 23 05:29:45 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2127.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER235A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7F45.tmp.dmp
Mini DuMP crash report, 15 streams, Mon May 23 05:29:37 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER809D.tmp.dmp
Mini DuMP crash report, 15 streams, Mon May 23 05:29:38 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA01C.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA33A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA3F4.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA7DD.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\JtJ50Swtfo.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\JtJ50Swtfo.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\JtJ50Swtfo.dll,AddIn_FileTime
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\JtJ50Swtfo.dll,AddIn_SystemTime
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\GJzmbimn\geJzufDvqRClHij.dll"
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\JtJ50Swtfo.dll,DllRegisterServer
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\JtJ50Swtfo.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\JtJ50Swtfo.dll",#1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7136 -s 328
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7124 -s 336
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 3552 -s 332
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 3552 -s 332
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://165.22.73.229:8080/d
unknown
https://165.22.73.229:8080/
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
http://schemas.xmlsoap.o
unknown
https://disneyplus.com/legal.
unknown
https://165.22.73.229/
unknown
https://165.22.73.229:8080/z
unknown
https://165.22.73.229:8080/Num
unknown
http://crl.ver)
unknown
https://www.tiktok.com/legal/report/feedback
unknown
http://help.disneyplus.com.
unknown
https://support.hotspotshield.com/
unknown
There are 5 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
165.22.73.229
unknown
United States
malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsPeFile
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018C005C62C4D85
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018C005C62C4D85
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018C005C62C4D85
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100
There are 25 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2A20000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
297062B0000
direct allocation
page execute and read and write
malicious
297062B0000
direct allocation
page execute and read and write
malicious
18014000000
direct allocation
page execute and read and write
malicious
21310570000
direct allocation
page execute and read and write
malicious
21310570000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
18014000000
direct allocation
page execute and read and write
malicious
1490000
direct allocation
page execute and read and write
malicious
18014000000
direct allocation
page execute and read and write
malicious
297062B0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
21310570000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
213105F0000
heap
page read and write
1DCF3D59000
heap
page read and write
1E5F2F8D000
heap
page read and write
1DCF2010000
trusted library allocation
page read and write
1DCF204E000
heap
page read and write
21372730000
trusted library allocation
page read and write
6B2CDEE000
stack
page read and write
21372898000
heap
page read and write
18002F000
direct allocation
page read and write
1E5F2FCD000
heap
page read and write
244ABB08000
heap
page read and write
264CFE30000
trusted library allocation
page read and write
2136DB18000
heap
page read and write
7FFA5336F000
unkown
page readonly
18002F000
direct allocation
page read and write
1E5F2F68000
heap
page read and write
1DCF4810000
remote allocation
page read and write
5B1B87C000
stack
page read and write
1FB35CF000
stack
page read and write
1E059C56000
heap
page read and write
1DCF3CE2000
heap
page read and write
1DCF3D74000
heap
page read and write
E5CFC7F000
stack
page read and write
1E5F2F8B000
heap
page read and write
1E5F2FA4000
heap
page read and write
F50000
heap
page read and write
1E5F24BF000
heap
page read and write
1E5F2F9C000
heap
page read and write
2C0A27D000
stack
page read and write
7FFA53341000
unkown
page execute read
1DCF2050000
trusted library allocation
page read and write
18014050000
heap
page read and write
1DCF3D89000
heap
page read and write
6B2CCEB000
stack
page read and write
1E5F2467000
heap
page read and write
131C000
heap
page read and write
1DCF1F3E000
heap
page read and write
1F3EB23D000
heap
page read and write
213105A0000
heap
page readonly
1DCF3D33000
heap
page read and write
264CFE29000
heap
page read and write
7FFA53340000
unkown
page readonly
18013E38000
heap
page read and write
11E1000
heap
page read and write
22CDD2E000
stack
page read and write
1E5F2300000
heap
page read and write
1E5F2CC0000
remote allocation
page read and write
1186000
heap
page read and write
1DCF3D01000
heap
page read and write
1DCF3D89000
heap
page read and write
1DCF1F4F000
heap
page read and write
22E5B624000
heap
page read and write
22377A90000
trusted library allocation
page read and write
22E5B708000
heap
page read and write
22E5B702000
heap
page read and write
18013E38000
heap
page read and write
1DCF40D8000
heap
page read and write
16F8AE13000
heap
page read and write
6B2D07F000
stack
page read and write
16F8ADC0000
trusted library allocation
page read and write
9789FFF000
stack
page read and write
648BC7A000
stack
page read and write
21372800000
heap
page read and write
1DCF1F65000
heap
page read and write
2C09FAF000
stack
page read and write
1E5F2F25000
heap
page read and write
9E9447F000
stack
page read and write
3E616F9000
stack
page read and write
1DCF3D6D000
heap
page read and write
1DCF1F76000
heap
page read and write
21310418000
heap
page read and write
1E059C46000
heap
page read and write
1DCF3CFB000
heap
page read and write
16F8AE8D000
heap
page read and write
297062E0000
heap
page readonly
1E5F24EF000
heap
page read and write
244AC202000
trusted library allocation
page read and write
213103F0000
heap
page read and write
1348000
heap
page read and write
1DCF3CF4000
heap
page read and write
1DCF3D89000
heap
page read and write
21310510000
heap
page read and write
1DCF47A1000
heap
page read and write
1DCF1FE0000
trusted library allocation
page read and write
1DCF3D07000
heap
page read and write
1390000
heap
page read and write
2136D224000
heap
page read and write
9789AFF000
stack
page read and write
244ABA13000
heap
page read and write
1DCF1F50000
heap
page read and write
213105D0000
heap
page read and write
223747A0000
heap
page read and write
29706150000
heap
page read and write
7FFA53340000
unkown
page readonly
648BF7B000
stack
page read and write
264CFD50000
heap
page read and write
180030000
direct allocation
page readonly
213727F0000
trusted library allocation
page read and write
2CAC000
stack
page read and write
30F0000
trusted library allocation
page read and write
21372730000
trusted library allocation
page read and write
180000000
direct allocation
page read and write
9E941FB000
stack
page read and write
7FFA53362000
unkown
page readonly
2136D080000
heap
page read and write
29706188000
heap
page read and write
1DCF3D01000
heap
page read and write
1480000
direct allocation
page execute and read and write
1E5F245E000
heap
page read and write
1DCF3D33000
heap
page read and write
7FFA5336F000
unkown
page readonly
297063D0000
heap
page read and write
3E617FC000
stack
page read and write
1E059C76000
heap
page read and write
213105A0000
heap
page readonly
22378290000
heap
page read and write
22377A80000
heap
page read and write
2136DA15000
heap
page read and write
1DCF3D14000
heap
page read and write
1DCF3D6D000
heap
page read and write
21372720000
trusted library allocation
page read and write
7FFA5336B000
unkown
page read and write
1DCF2010000
trusted library allocation
page read and write
989915C000
stack
page read and write
297063D5000
heap
page read and write
2C0A5F7000
stack
page read and write
8D8DB8B000
stack
page read and write
1DCF1E80000
heap
page read and write
1DCF3CEE000
heap
page read and write
2136D1F3000
trusted library allocation
page read and write
7FFA5336B000
unkown
page read and write
1E5F2464000
heap
page read and write
1DCF1F51000
heap
page read and write
1DCF3CDC000
heap
page read and write
13E0000
heap
page read and write
21310410000
heap
page read and write
264CFDE0000
trusted library allocation
page read and write
9D70078000
stack
page read and write
18013DA0000
heap
page read and write
1DCF2010000
trusted library allocation
page read and write
21372680000
trusted library allocation
page read and write
1DCF3D01000
heap
page read and write
213105F0000
heap
page read and write
213728F0000
heap
page read and write
213728E4000
heap
page read and write
1E059BD0000
heap
page read and write
1E5F3402000
heap
page read and write
131C000
heap
page read and write
213105A0000
heap
page readonly
180000000
direct allocation
page read and write
1E5F2FD7000
heap
page read and write
1E5F2FB3000
heap
page read and write
1DCF2010000
trusted library allocation
page read and write
16F8AF08000
heap
page read and write
22E5B700000
heap
page read and write
1E5F2516000
heap
page read and write
1DCF2010000
trusted library allocation
page read and write
9D6FA7E000
stack
page read and write
21372855000
heap
page read and write
7FFA5336F000
unkown
page readonly
340E000
stack
page read and write
24340A28000
heap
page read and write
22CDCA3000
stack
page read and write
2C0A3FF000
stack
page read and write
1DCF3D1A000
heap
page read and write
264CFE25000
heap
page read and write
1E5F2F89000
heap
page read and write
1DCF47C0000
heap
page read and write
7FFA5336F000
unkown
page readonly
1DCF4610000
heap
page read and write
14D0000
heap
page read and write
1DCF47C1000
heap
page read and write
2ADE000
stack
page read and write
13E5000
heap
page read and write
1E5F2FA4000
heap
page read and write
9E944FF000
stack
page read and write
1DCF1DA0000
unkown
page read and write
1DCF3CDA000
heap
page read and write
9E944FF000
stack
page read and write
18014050000
heap
page read and write
29707CB0000
heap
page read and write
18013DA0000
heap
page read and write
1DCF47A7000
heap
page read and write
1DCF1D80000
unkown
page readonly
1DCF3CD4000
heap
page read and write
1DCF3D0E000
heap
page read and write
9D6FD77000
stack
page read and write
7FFA53341000
unkown
page execute read
7FFA53362000
unkown
page readonly
1E5F2413000
heap
page read and write
1E5F2F8B000
heap
page read and write
22CE07E000
stack
page read and write
264CFBF0000
heap
page read and write
1DCF3D33000
heap
page read and write
1DCF2010000
trusted library allocation
page read and write
1E5F2465000
heap
page read and write
1DCF3CEE000
heap
page read and write
9789CFF000
stack
page read and write
1DCF3D07000
heap
page read and write
8D8E0F9000
stack
page read and write
22374ABB000
heap
page read and write
9D6FC78000
stack
page read and write
10F0000
heap
page read and write
1E5F2F9A000
heap
page read and write
16F8AD90000
heap
page read and write
1DCF3D6D000
heap
page read and write
18013E30000
heap
page read and write
34D0000
remote allocation
page read and write
18014100000
heap
page read and write
1E059E70000
heap
page read and write
131C000
heap
page read and write
2137289E000
heap
page read and write
24340B02000
heap
page read and write
264D0CB0000
trusted library allocation
page read and write
1DCF47AA000
heap
page read and write
22374848000
heap
page read and write
1110000
heap
page read and write
1DCF3D14000
heap
page read and write
1DCF3CE8000
heap
page read and write
22CE0FE000
stack
page read and write
2136E1E0000
trusted library allocation
page read and write
21310560000
direct allocation
page execute and read and write
21372750000
trusted library allocation
page read and write
9D6F75B000
stack
page read and write
22374AB0000
heap
page read and write
1E5F24C6000
heap
page read and write
1E5F248C000
heap
page read and write
244ABA80000
heap
page read and write
18002E000
direct allocation
page readonly
22374640000
heap
page read and write
1E5F2FB7000
heap
page read and write
7FFA53362000
unkown
page readonly
21372813000
heap
page read and write
2136DB59000
heap
page read and write
1E059C73000
heap
page read and write
18013DC0000
heap
page read and write
2137284C000
heap
page read and write
1E5F2FAF000
heap
page read and write
29707CB0000
heap
page read and write
1DCF1F45000
heap
page read and write
24340A7A000
heap
page read and write
18013DA0000
heap
page read and write
1DCF3D20000
heap
page read and write
1DCF1F59000
heap
page read and write
1DCF3CEE000
heap
page read and write
29707CD0000
heap
page read and write
1F3EB1D0000
heap
page read and write
1DCF4740000
heap
page read and write
21372700000
trusted library allocation
page read and write
1FB34CC000
stack
page read and write
297062A0000
direct allocation
page execute and read and write
22374842000
heap
page read and write
12B0000
heap
page read and write
2237485D000
heap
page read and write
21310635000
heap
page read and write
1E5F2F68000
heap
page read and write
16F8AF00000
heap
page read and write
2136DB02000
heap
page read and write
1DCF2010000
trusted library allocation
page read and write
2136D29F000
heap
page read and write
213728E1000
heap
page read and write
1DCF3CE8000
heap
page read and write
978A1FF000
stack
page read and write
12F2000
heap
page read and write
3E61679000
stack
page read and write
1E5F2CC0000
remote allocation
page read and write
9789B7F000
stack
page read and write
264CFE20000
heap
page read and write
1DCF3D6D000
heap
page read and write
1E5F2FA0000
heap
page read and write
29706130000
heap
page read and write
16F8AE4D000
heap
page read and write
978A0FD000
stack
page read and write
1E5F2F78000
heap
page read and write
29706180000
heap
page read and write
244ABA29000
heap
page read and write
21310418000
heap
page read and write
24340A02000
heap
page read and write
2136D302000
heap
page read and write
180030000
direct allocation
page readonly
18014100000
heap
page read and write
8D8E07E000
stack
page read and write
2136DB04000
heap
page read and write
18002E000
direct allocation
page readonly
2B5F000
stack
page read and write
1DCF3F10000
heap
page read and write
9789C7B000
stack
page read and write
1E5F2F85000
heap
page read and write
21372CB0000
trusted library allocation
page read and write
1E5F2FCD000
heap
page read and write
1DCF3CFB000
heap
page read and write
648BE7A000
stack
page read and write
16F8AD30000
heap
page read and write
1DCF3CEA000
heap
page read and write
2136D213000
heap
page read and write
1E5F2F0E000
heap
page read and write
1DCF3F13000
heap
page read and write
1DCF3D27000
heap
page read and write
18015A00000
heap
page read and write
18002E000
direct allocation
page readonly
22374820000
heap
page read and write
648BD7E000
stack
page read and write
22E5B65D000
heap
page read and write
1E5F245C000
heap
page read and write
18013DC0000
heap
page read and write
1E5F2FA0000
heap
page read and write
7FFA53340000
unkown
page readonly
7FFA5336F000
unkown
page readonly
34D0000
remote allocation
page read and write
1DCF47A0000
heap
page read and write
7FFA53362000
unkown
page readonly
9D6FF7F000
stack
page read and write
2136D010000
heap
page read and write
1DCF3CFB000
heap
page read and write
1DCF1F5C000
heap
page read and write
3E6138E000
stack
page read and write
22E5B63C000
heap
page read and write
7FFA53362000
unkown
page readonly
264D0A90000
trusted library allocation
page read and write
1DCF40D7000
heap
page read and write
1DCF3D6D000
heap
page read and write
213727F0000
trusted library allocation
page read and write
1DCF1F53000
heap
page read and write
1E5F2F6A000
heap
page read and write
7FFA53362000
unkown
page readonly
18013E10000
direct allocation
page execute and read and write
1E5F3402000
heap
page read and write
180000000
direct allocation
page read and write
1DCF3D20000
heap
page read and write
264CFE9B000
heap
page read and write
2136D302000
heap
page read and write
1E5F2F9E000
heap
page read and write
2136D274000
heap
page read and write
1E5F248C000
heap
page read and write
1DCF3D4D000
heap
page read and write
244ABA4A000
heap
page read and write
1340000
heap
page read and write
22E5B4B0000
heap
page read and write
29707BB0000
remote allocation
page read and write
30F0000
trusted library allocation
page read and write
1DCF2010000
trusted library allocation
page read and write
264CFE9B000
heap
page read and write
1E5F2400000
heap
page read and write
1DCF1F5B000
heap
page read and write
3E6128A000
stack
page read and write
1E5F2F94000
heap
page read and write
326E000
stack
page read and write
180000000
direct allocation
page read and write
7FFA53362000
unkown
page readonly
1DCF3D33000
heap
page read and write
7FFA53341000
unkown
page execute read
22374836000
heap
page read and write
244ABB13000
heap
page read and write
7FFA5336B000
unkown
page read and write
213728AC000
heap
page read and write
264D0CA0000
trusted library allocation
page read and write
1E5F3402000
heap
page read and write
1E5F2459000
heap
page read and write
213102B0000
heap
page read and write
1340000
heap
page read and write
1DCF3F16000
heap
page read and write
1E5F24F9000
heap
page read and write
1E5F2F74000
heap
page read and write
1DCF3CD6000
heap
page read and write
29706180000
heap
page read and write
1DCF3D20000
heap
page read and write
244ABA4C000
heap
page read and write
1DCF2010000
trusted library allocation
page read and write
989915C000
stack
page read and write
1E5F2F8D000
heap
page read and write
180000000
direct allocation
page read and write
1DCF4011000
heap
page read and write
7FFA53340000
unkown
page readonly
29705FF0000
unkown
page read and write
12F2000
heap
page read and write
134B000
heap
page read and write
22E5B5B0000
trusted library allocation
page read and write
29706180000
heap
page read and write
21310635000
heap
page read and write
9789EF7000
stack
page read and write
244ABA49000
heap
page read and write
1DCF3CFB000
heap
page read and write
1E5F2F8F000
heap
page read and write
21372B80000
remote allocation
page read and write
1E5F2508000
heap
page read and write
1DCF47E3000
heap
page read and write
16F8AD20000
heap
page read and write
1DCF47D1000
heap
page read and write
1DCF4810000
remote allocation
page read and write
180030000
direct allocation
page readonly
DE5000
stack
page read and write
22E5B622000
heap
page read and write
1E5F3402000
heap
page read and write
648BB7A000
stack
page read and write
2136D279000
heap
page read and write
21372764000
trusted library allocation
page read and write
7FFA53341000
unkown
page execute read
1DCF3D01000
heap
page read and write
2136D229000
heap
page read and write
1E5F22F0000
heap
page read and write
1E5F2FAF000
heap
page read and write
1FB354F000
stack
page read and write
9D6F7DD000
stack
page read and write
1DCF1E92000
heap
page read and write
1E059BF0000
heap
page read and write
1DCF3D07000
heap
page read and write
1E5F3402000
heap
page read and write
16F8AE00000
heap
page read and write
32ED000
stack
page read and write
1DCF3D14000
heap
page read and write
2136DB00000
heap
page read and write
1E5F2FA1000
heap
page read and write
264CFEB7000
heap
page read and write
1DCF2030000
trusted library allocation
page read and write
2A10000
direct allocation
page execute and read and write
14C0000
heap
page readonly
134B000
heap
page read and write
180030000
direct allocation
page readonly
22374780000
heap
page read and write
2136DA00000
heap
page read and write
29707CD0000
heap
page read and write
213728AE000
heap
page read and write
1DCF3CEE000
heap
page read and write
1FB34CC000
stack
page read and write
213103F0000
heap
page read and write
1DCF1F53000
heap
page read and write
1DCF20E0000
heap
page read and write
21372B80000
remote allocation
page read and write
1E5F2F8F000
heap
page read and write
1E5F2F8F000
heap
page read and write
2C09F2B000
stack
page read and write
1DCF1F51000
heap
page read and write
22E5BE02000
trusted library allocation
page read and write
648C57E000
stack
page read and write
180030000
direct allocation
page readonly
1DCF4790000
heap
page read and write
180030000
direct allocation
page readonly
1DCF3D33000
heap
page read and write
1DCF2010000
trusted library allocation
page read and write
989947F000
stack
page read and write
1E5F2F6A000
heap
page read and write
213728E8000
heap
page read and write
22374AB5000
heap
page read and write
213102B0000
unkown
page read and write
1E5F24A8000
heap
page read and write
21310635000
heap
page read and write
9789DFB000
stack
page read and write
1E059C78000
heap
page read and write
264CFF50000
trusted library allocation
page read and write
1DCF2050000
heap
page read and write
1E5F3421000
heap
page read and write
21372B30000
trusted library allocation
page read and write
264CFE61000
heap
page read and write
1E059C60000
heap
page read and write
22E5B713000
heap
page read and write
1DCF3D41000
heap
page read and write
1E5F2489000
heap
page read and write
1DCF3CD0000
heap
page read and write
5B1BB7B000
stack
page read and write
7FFA53362000
unkown
page readonly
22E5B675000
heap
page read and write
180030000
direct allocation
page readonly
1DCF2010000
trusted library allocation
page read and write
1DCF3D27000
heap
page read and write
1E5F341A000
heap
page read and write
1140000
heap
page read and write
2C0A4FA000
stack
page read and write
29707CB0000
heap
page read and write
1DCF3D74000
heap
page read and write
1DCF3D76000
heap
page read and write
297063D0000
heap
page read and write
180000000
direct allocation
page read and write
29707CD0000
heap
page read and write
1DCF2010000
trusted library allocation
page read and write
9D700FE000
stack
page read and write
244AB850000
heap
page read and write
1E5F2502000
heap
page read and write
D30000
heap
page read and write
21310510000
heap
page read and write
6570BED000
stack
page read and write
1DCF1F7E000
heap
page read and write
1E059C4F000
heap
page read and write
16F8AE50000
heap
page read and write
2136D277000
heap
page read and write
2237483E000
heap
page read and write
1DCF2010000
trusted library allocation
page read and write
E5CF38E000
stack
page read and write
21372750000
trusted library allocation
page read and write
2136D2FE000
heap
page read and write
1DCF3D75000
heap
page read and write
180030000
direct allocation
page readonly
7FFA53341000
unkown
page execute read
1DCF3D0E000
heap
page read and write
1DCF1D40000
heap
page read and write
264CFDC0000
trusted library allocation
page read and write
1DCF2010000
trusted library allocation
page read and write
1FB35CF000
stack
page read and write
1DCF4010000
heap
page read and write
1DCF1F57000
heap
page read and write
1DCF2010000
trusted library allocation
page read and write
180030000
direct allocation
page readonly
319B000
stack
page read and write
2136D2BC000
heap
page read and write
2136D23D000
heap
page read and write
354F000
stack
page read and write
1DCF3D2D000
heap
page read and write
1DCF2010000
trusted library allocation
page read and write
180030000
direct allocation
page readonly
1E5F2F26000
heap
page read and write
264CFDD0000
trusted library allocation
page read and write
1DCF3D3F000
heap
page read and write
16F8AE3C000
heap
page read and write
E5CF28B000
stack
page read and write
24340A13000
heap
page read and write
16F8AE49000
heap
page read and write
1E5F2461000
heap
page read and write
24340B13000
heap
page read and write
1DCF1F5B000
heap
page read and write
1DCF1F51000
heap
page read and write
16F8AF13000
heap
page read and write
2136DA02000
heap
page read and write
1F3EB160000
heap
page read and write
6B2CD6E000
stack
page read and write
11C7000
heap
page read and write
1E5F2FA4000
heap
page read and write
24340A00000
heap
page read and write
22E5B681000
heap
page read and write
244AB840000
heap
page read and write
22CE2FC000
stack
page read and write
1DCF3D0E000
heap
page read and write
127A000
stack
page read and write
1DCF3D6F000
heap
page read and write
18014050000
heap
page read and write
3E6177F000
stack
page read and write
1DCF3CE8000
heap
page read and write
2136DB18000
heap
page read and write
21372B00000
trusted library allocation
page read and write
213102B0000
unkown
page read and write
1DCF3D6D000
heap
page read and write
1E5F245D000
heap
page read and write
1E059C46000
heap
page read and write
1E5F2F9E000
heap
page read and write
1DCF2010000
trusted library allocation
page read and write
1DCF1F80000
heap
page read and write
31EC000
stack
page read and write
1DCF4263000
heap
page read and write
1E5F2F9E000
heap
page read and write
29706188000
heap
page read and write
E5CFB7C000
stack
page read and write
E5CF977000
stack
page read and write
29706130000
heap
page read and write
1DCF1F4D000
heap
page read and write
18002E000
direct allocation
page readonly
244ABB00000
heap
page read and write
1DCF2010000
trusted library allocation
page read and write
180000000
direct allocation
page read and write
2136E661000
trusted library allocation
page read and write
21372B40000
trusted library allocation
page read and write
244ABA6E000
heap
page read and write
1DCF2010000
trusted library allocation
page read and write
1DCF3CE8000
heap
page read and write
1E5F2FA0000
heap
page read and write
264CFE93000
heap
page read and write
E5CF7FB000
stack
page read and write
22E5B659000
heap
page read and write
1DCF3CF4000
heap
page read and write
9E941FC000
stack
page read and write
18013E20000
heap
page readonly
7FFA5336B000
unkown
page read and write
1E5F2F6F000
heap
page read and write
1FB34CC000
stack
page read and write
2136D1F0000
trusted library allocation
page read and write
1E5F2F53000
heap
page read and write
3E6130F000
stack
page read and write
22E5B655000
heap
page read and write
1DCF20EA000
heap
page read and write
1FB35CF000
stack
page read and write
180000000
direct allocation
page read and write
243409D0000
trusted library allocation
page read and write
18013E30000
heap
page read and write
1E5F2F67000
heap
page read and write
FE0000
heap
page read and write
18013D30000
unkown
page read and write
1340000
heap
page read and write
1E5F24EF000
heap
page read and write
1F3EB230000
heap
page read and write
1DCF4810000
remote allocation
page read and write
114B000
heap
page read and write
2C0A6FE000
stack
page read and write
1E5F24B3000
heap
page read and write
1DCF3D14000
heap
page read and write
18013E10000
direct allocation
page execute and read and write
22E5B65C000
heap
page read and write
2136D26F000
heap
page read and write
E5CF87E000
stack
page read and write
1DCF1F4F000
heap
page read and write
18013E38000
heap
page read and write
9D6FB7B000
stack
page read and write
22374828000
heap
page read and write
1E5F24E4000
heap
page read and write
1E5F2429000
heap
page read and write
1E059AA0000
heap
page read and write
648BA77000
stack
page read and write
29706150000
heap
page read and write
21372720000
trusted library allocation
page read and write
1DCF2010000
trusted library allocation
page read and write
1E5F2F8B000
heap
page read and write
1DCF1F57000
heap
page read and write
1FB354F000
stack
page read and write
213105F0000
heap
page read and write
213103F0000
heap
page read and write
21310418000
heap
page read and write
2136D2AA000
heap
page read and write
34AB000
stack
page read and write
1DCF3D0E000
heap
page read and write
E5CFA7E000
stack
page read and write
7FFA53340000
unkown
page readonly
1E059C52000
heap
page read and write
5B1BE7F000
stack
page read and write
244AB8B0000
heap
page read and write
264CFE50000
heap
page read and write
29706150000
heap
page read and write
989947F000
stack
page read and write
2137283F000
heap
page read and write
1E059C6A000
heap
page read and write
1E059C50000
heap
page read and write
1E5F2F8B000
heap
page read and write
18014105000
heap
page read and write
1E5F2FAE000
heap
page read and write
1E5F2F85000
heap
page read and write
21372C70000
trusted library allocation
page read and write
24340A5A000
heap
page read and write
1DCF1F4A000
heap
page read and write
264CFE58000
heap
page read and write
1DCF3CFB000
heap
page read and write
1E5F2FB1000
heap
page read and write
7FFA5336B000
unkown
page read and write
1E5F2FC2000
heap
page read and write
2136D258000
heap
page read and write
1DCF1DA0000
unkown
page read and write
7FFA5336B000
unkown
page read and write
1E059C30000
heap
page read and write
2136D25A000
heap
page read and write
1DCF3D27000
heap
page read and write
FC0000
heap
page read and write
21372B0E000
trusted library allocation
page read and write
18002E000
direct allocation
page readonly
1DCF3CEE000
heap
page read and write
21310510000
heap
page read and write
98991DF000
stack
page read and write
1DCF47A4000
heap
page read and write
7FFA53340000
unkown
page readonly
1DCF1F59000
heap
page read and write
1DCF1F61000
heap
page read and write
1DCF1D80000
unkown
page readonly
213727F0000
trusted library allocation
page read and write
1E5F2497000
heap
page read and write
1E5F2460000
heap
page read and write
18014105000
heap
page read and write
16F8AE6F000
heap
page read and write
1E059C41000
heap
page read and write
1DCF1D90000
unkown
page readonly
297062E0000
heap
page readonly
98991DF000
stack
page read and write
22E5B613000
heap
page read and write
21372690000
trusted library allocation
page read and write
7FFA5336F000
unkown
page readonly
180000000
direct allocation
page read and write
1DCF3CF4000
heap
page read and write
18013E30000
heap
page read and write
1DCF4210000
heap
page read and write
1DCF3CF4000
heap
page read and write
2136D292000
heap
page read and write
7FFA53340000
unkown
page readonly
1E5F2F8D000
heap
page read and write
12EA000
heap
page read and write
1DCF1F77000
heap
page read and write
18002E000
direct allocation
page readonly
1E5F2453000
heap
page read and write
1E5F2F8D000
heap
page read and write
7FFA5336F000
unkown
page readonly
22E5B65E000
heap
page read and write
1DCF4820000
heap
page read and write
1E5F2FB1000
heap
page read and write
1DCF204B000
heap
page read and write
7FFA5336B000
unkown
page read and write
21372B50000
trusted library allocation
page read and write
21372B24000
trusted library allocation
page read and write
1570000
heap
page read and write
213728EC000
heap
page read and write
297062A0000
direct allocation
page execute and read and write
18002E000
direct allocation
page readonly
22CE17B000
stack
page read and write
2136D28B000
heap
page read and write
1E5F2F68000
heap
page read and write
1E5F2F61000
heap
page read and write
1E5F2360000
heap
page read and write
1E059C60000
heap
page read and write
21372710000
trusted library allocation
page read and write
1E5F2FB3000
heap
page read and write
1E5F24DB000
heap
page read and write
1E5F2F96000
heap
page read and write
16F8AF02000
heap
page read and write
21310620000
remote allocation
page read and write
18015A00000
heap
page read and write
7FFA5336B000
unkown
page read and write
29707BB0000
remote allocation
page read and write
21372B60000
trusted library allocation
page read and write
2136DB58000
heap
page read and write
1DCF3D27000
heap
page read and write
2136D28D000
heap
page read and write
7FFA53340000
unkown
page readonly
1DCF3CDA000
heap
page read and write
7FFA53341000
unkown
page execute read
1E5F2F10000
heap
page read and write
16F8AE53000
heap
page read and write
22E5B65A000
heap
page read and write
21310630000
heap
page read and write
24341402000
trusted library allocation
page read and write
7FFA5336F000
unkown
page readonly
1DCF3D33000
heap
page read and write
1DCF3CE0000
heap
page read and write
1DCF3D0E000
heap
page read and write
7FFA5336F000
unkown
page readonly
1DCF3CF4000
heap
page read and write
16F8AE4C000
heap
page read and write
1DCF1F7E000
heap
page read and write
1E5F2FD1000
heap
page read and write
1DCF3D1A000
heap
page read and write
1E059E75000
heap
page read and write
18015A00000
heap
page read and write
24340940000
heap
page read and write
18014090000
remote allocation
page read and write
7FFA53341000
unkown
page execute read
16F8B802000
trusted library allocation
page read and write
1DCF1F77000
heap
page read and write
18014090000
remote allocation
page read and write
213105D0000
heap
page read and write
21372B80000
remote allocation
page read and write
21372862000
heap
page read and write
311E000
stack
page read and write
18013D30000
unkown
page read and write
1DCF3D89000
heap
page read and write
22E5B600000
heap
page read and write
1E5F2F8D000
heap
page read and write
5B1BD7E000
stack
page read and write
1E5F3400000
heap
page read and write
22E5B440000
heap
page read and write
1E059C74000
heap
page read and write
1E5F3402000
heap
page read and write
29706130000
heap
page read and write
1DCF2010000
trusted library allocation
page read and write
1DCF3D14000
heap
page read and write
18002E000
direct allocation
page readonly
1E5F2F8B000
heap
page read and write
7FFA53362000
unkown
page readonly
18013E20000
heap
page readonly
FB0000
remote allocation
page read and write
29705FF0000
unkown
page read and write
1DCF3D2D000
heap
page read and write
1DCF1D90000
unkown
page readonly
264CFD30000
heap
page read and write
2A50000
heap
page readonly
22E5B660000
heap
page read and write
22377A83000
heap
page read and write
1E5F24EC000
heap
page read and write
9E9447F000
stack
page read and write
1E5F2F61000
heap
page read and write
2136D314000
heap
page read and write
1DCF1F4C000
heap
page read and write
21310620000
remote allocation
page read and write
1DCF3D07000
heap
page read and write
7FFA5336F000
unkown
page readonly
7FFA53341000
unkown
page execute read
7FFA53362000
unkown
page readonly
9789A7C000
stack
page read and write
1DCF3D2D000
heap
page read and write
7FFA53341000
unkown
page execute read
7FFA5336B000
unkown
page read and write
22CDDAE000
stack
page read and write
11A3000
heap
page read and write
16F8AE29000
heap
page read and write
1DCF40D7000
heap
page read and write
1DCF1F77000
heap
page read and write
1E5F2F13000
heap
page read and write
E5CF6FB000
stack
page read and write
2D50000
heap
page read and write
E5CF30E000
stack
page read and write
989915C000
stack
page read and write
5B1BC7B000
stack
page read and write
297063D5000
heap
page read and write
1DCF47A7000
heap
page read and write
29706188000
heap
page read and write
1DCF1F77000
heap
page read and write
1E5F2FAF000
heap
page read and write
22374839000
heap
page read and write
21310410000
heap
page read and write
1E5F2F89000
heap
page read and write
1E059C6A000
heap
page read and write
244ABB02000
heap
page read and write
1DCF2010000
trusted library allocation
page read and write
1E5F2F89000
heap
page read and write
2136D307000
heap
page read and write
21372820000
heap
page read and write
24340A40000
heap
page read and write
244ABA4E000
heap
page read and write
1E5F2FBA000
heap
page read and write
297063D0000
heap
page read and write
1E5F2E02000
heap
page read and write
9E944FF000
stack
page read and write
1DCF1E88000
heap
page read and write
297062E0000
heap
page readonly
264CFE9C000
heap
page read and write
1DCF3D1A000
heap
page read and write
1E5F2FB1000
heap
page read and write
29707BB0000
remote allocation
page read and write
1DCF3D75000
heap
page read and write
21310410000
heap
page read and write
2136D020000
heap
page read and write
21372B10000
trusted library allocation
page read and write
14E0000
heap
page read and write
264CFE93000
heap
page read and write
1DCF1FA0000
heap
page read and write
1DCF3D73000
heap
page read and write
1DCF3D0E000
heap
page read and write
2136E680000
trusted library allocation
page read and write
1E5F2513000
heap
page read and write
1E5F2FAD000
heap
page read and write
1575000
heap
page read and write
9E9447F000
stack
page read and write
180000000
direct allocation
page read and write
22374851000
heap
page read and write
180000000
direct allocation
page read and write
1E5F3418000
heap
page read and write
21372B08000
trusted library allocation
page read and write
1E5F2458000
heap
page read and write
1E5F24A9000
heap
page read and write
1DCF2070000
trusted library allocation
page read and write
264CFC00000
trusted library allocation
page read and write
244ABA00000
heap
page read and write
2136D326000
heap
page read and write
1E5F2462000
heap
page read and write
1DCF2010000
trusted library allocation
page read and write
24340B00000
heap
page read and write
1E5F2F6A000
heap
page read and write
243409A0000
heap
page read and write
244ABA4B000
heap
page read and write
7FFA53341000
unkown
page execute read
1E059C60000
heap
page read and write
8D8DF7A000
stack
page read and write
1E5F2466000
heap
page read and write
1DCF47E3000
heap
page read and write
264D0D00000
trusted library allocation
page read and write
18002E000
direct allocation
page readonly
2C0A7FC000
stack
page read and write
2136D180000
trusted library allocation
page read and write
244ABA3C000
heap
page read and write
1DCF3D07000
heap
page read and write
7FFA53362000
unkown
page readonly
1DCF3D73000
heap
page read and write
18002E000
direct allocation
page readonly
648B87B000
stack
page read and write
1E5F2F6B000
heap
page read and write
1DCF3CE0000
heap
page read and write
648C37B000
stack
page read and write
9D6FE78000
stack
page read and write
22374839000
heap
page read and write
7FFA5336B000
unkown
page read and write
989947F000
stack
page read and write
1DCF3D2D000
heap
page read and write
22E5B450000
heap
page read and write
1E5F2F25000
heap
page read and write
1E059C6A000
heap
page read and write
2136D2A8000
heap
page read and write
12B8000
heap
page read and write
1DCF3D33000
heap
page read and write
21372B21000
trusted library allocation
page read and write
1DCF4135000
heap
page read and write
7FFA53340000
unkown
page readonly
1DCF3D14000
heap
page read and write
18002E000
direct allocation
page readonly
1E059C53000
heap
page read and write
18014100000
heap
page read and write
21372760000
trusted library allocation
page read and write
2237484C000
heap
page read and write
213728F0000
heap
page read and write
18013DC0000
heap
page read and write
297063D5000
heap
page read and write
9E941FC000
stack
page read and write
1E5F2390000
trusted library allocation
page read and write
2C2E000
stack
page read and write
22374842000
heap
page read and write
1E5F3418000
heap
page read and write
1FB354F000
stack
page read and write
2237483D000
heap
page read and write
1DCF1F48000
heap
page read and write
1E5F245A000
heap
page read and write
21372900000
heap
page read and write
1E5F2FAE000
heap
page read and write
1E5F3421000
heap
page read and write
22CE1FF000
stack
page read and write
1F3EB243000
heap
page read and write
21372902000
heap
page read and write
1DCF2040000
heap
page read and write
264CFE40000
heap
page readonly
1E5F2F00000
heap
page read and write
98991DF000
stack
page read and write
1E5F2FA0000
heap
page read and write
297062A0000
direct allocation
page execute and read and write
2237484C000
heap
page read and write
1DCF1F77000
heap
page read and write
2136D200000
heap
page read and write
FB0000
remote allocation
page read and write
24340930000
heap
page read and write
22374A60000
heap
page read and write
1DCF3D33000
heap
page read and write
1E5F243C000
heap
page read and write
2136D29D000
heap
page read and write
1DCF1F40000
heap
page read and write
316F000
stack
page read and write
18014105000
heap
page read and write
1DCF407F000
heap
page read and write
244AB9B0000
trusted library allocation
page read and write
1DCF3CE8000
heap
page read and write
213105D0000
heap
page read and write
2136DB13000
heap
page read and write
7FFA53340000
unkown
page readonly
1DCF3CD6000
heap
page read and write
18013D30000
heap
page read and write
1E5F341A000
heap
page read and write
16F8AE81000
heap
page read and write
21310630000
heap
page read and write
1E5F2F67000
heap
page read and write
7FFA5336B000
unkown
page read and write
18013E20000
heap
page readonly
3560000
heap
page read and write
1E5F2FA0000
heap
page read and write
244ABA4F000
heap
page read and write
1E5F2CC0000
remote allocation
page read and write
2136D2FE000
heap
page read and write
264CFE9B000
heap
page read and write
21310560000
direct allocation
page execute and read and write
180030000
direct allocation
page readonly
7FFA53341000
unkown
page execute read
1DCF2010000
trusted library allocation
page read and write
1E5F2FC3000
heap
page read and write
29705FF0000
heap
page read and write
2137282E000
heap
page read and write
1DCF3D01000
heap
page read and write
2BA0000
heap
page read and write
1E5F2F25000
heap
page read and write
1E059C55000
heap
page read and write
7FFA53340000
unkown
page readonly
1E5F2427000
heap
page read and write
1DCF20E5000
heap
page read and write
1DCF4211000
heap
page read and write
16F8AE75000
heap
page read and write
18013E10000
direct allocation
page execute and read and write
7FFA5336F000
unkown
page readonly
1DCF2010000
trusted library allocation
page read and write
8D8DFF9000
stack
page read and write
22CE37E000
stack
page read and write
34D0000
remote allocation
page read and write
21310630000
heap
page read and write
21310560000
direct allocation
page execute and read and write
There are 977 hidden memdumps, click here to show them.