IOC Report
JtJ50Swtfo.dll

loading gif

Files

File Path
Type
Category
Malicious
JtJ50Swtfo.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
MPEG-4 LOAS
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xd061a25e, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_JtJ_b2672842ecefaba91fdafe39d8111bc89c8ace76_9903e0f3_1913dfeb\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_JtJ_b2672842ecefaba91fdafe39d8111bc89c8ace76_9903e0f3_193be049\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD174.tmp.dmp
Mini DuMP crash report, 15 streams, Mon May 23 05:42:02 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD28D.tmp.dmp
Mini DuMP crash report, 15 streams, Mon May 23 05:42:03 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD4D0.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD5AB.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD752.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD7DE.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 61480 bytes, 1 file
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
modified
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_JtJ_f1302aae73d1bd36c99beead2422e86237ae15_9903e0f3_15e02aea\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_JtJ_f1302aae73d1bd36c99beead2422e86237ae15_9903e0f3_1747af5d\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_JtJ_f1302aae73d1bd36c99beead2422e86237ae15_9903e0f3_1773b171\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1A8E.tmp.dmp
Mini DuMP crash report, 15 streams, Mon May 23 05:29:45 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2127.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER235A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7F45.tmp.dmp
Mini DuMP crash report, 15 streams, Mon May 23 05:29:37 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER809D.tmp.dmp
Mini DuMP crash report, 15 streams, Mon May 23 05:29:38 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA01C.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA33A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA3F4.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA7DD.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
There are 19 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\JtJ50Swtfo.dll
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\JtJ50Swtfo.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\JtJ50Swtfo.dll,AddIn_FileTime
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\DEtOD\ObhSjvufE.dll"
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\JtJ50Swtfo.dll,AddIn_SystemTime
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\JtJ50Swtfo.dll,DllRegisterServer
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\GJzmbimn\geJzufDvqRClHij.dll"
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\JtJ50Swtfo.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\JtJ50Swtfo.dll",#1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6348 -s 316
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 6340 -s 324
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7136 -s 328
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7124 -s 336
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 3552 -s 332
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 3552 -s 332
There are 19 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://165.22.73.229/
unknown
malicious
https://165.22.73.229/h
unknown
malicious
https://165.22.73.229:8080/tem3
unknown
https://dev.ditu.live.com/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
unknown
https://165.22.73.229:8080/d
unknown
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
unknown
https://t0.tiles.ditu.live.com/tiles/gen
unknown
https://dev.virtualearth.net/REST/v1/Routes/Walking
unknown
https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
unknown
https://dev.ditu.live.com/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
http://www.bingmapsportal.com
unknown
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://165.22.73.229:8080/p
unknown
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
unknown
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
unknown
https://dev.ditu.live.com/REST/v1/Transit/Stops/
unknown
https://dev.virtualearth.net/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
unknown
http://crl.ver)
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
unknown
https://www.tiktok.com/legal/report/feedback
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
unknown
https://%s.xboxlive.com
unknown
https://dev.ditu.live.com/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
unknown
https://dev.virtualearth.net/mapcontrol/logging.ashx
unknown
https://support.hotspotshield.com/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://dev.virtualearth.net/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.t
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
https://165.22.73.229:8080/
unknown
https://disneyplus.com/legal.
unknown
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
unknown
https://activity.windows.com
unknown
https://dev.ditu.live.com/REST/v1/Locations
unknown
http://help.disneyplus.com.
unknown
https://%s.dnet.xboxlive.com
unknown
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
http://schemas.xmlsoap.o
unknown
https://165.22.73.229:8080/z
unknown
https://165.22.73.229:8080/Num
unknown
There are 46 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
165.22.73.229
unknown
United States
malicious
192.168.2.1
unknown
unknown
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
\REGISTRY\A\{271edc71-be7d-d429-f922-9a7f21c9b119}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{271edc71-be7d-d429-f922-9a7f21c9b119}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{271edc71-be7d-d429-f922-9a7f21c9b119}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{271edc71-be7d-d429-f922-9a7f21c9b119}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{271edc71-be7d-d429-f922-9a7f21c9b119}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{271edc71-be7d-d429-f922-9a7f21c9b119}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{271edc71-be7d-d429-f922-9a7f21c9b119}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{271edc71-be7d-d429-f922-9a7f21c9b119}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{271edc71-be7d-d429-f922-9a7f21c9b119}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{271edc71-be7d-d429-f922-9a7f21c9b119}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{271edc71-be7d-d429-f922-9a7f21c9b119}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{271edc71-be7d-d429-f922-9a7f21c9b119}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{271edc71-be7d-d429-f922-9a7f21c9b119}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{271edc71-be7d-d429-f922-9a7f21c9b119}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{271edc71-be7d-d429-f922-9a7f21c9b119}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{271edc71-be7d-d429-f922-9a7f21c9b119}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsPeFile
\REGISTRY\A\{271edc71-be7d-d429-f922-9a7f21c9b119}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018800453F4626F
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018800453F4626F
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
MonthID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsPeFile
\REGISTRY\A\{0df7dca4-87ea-295b-fb24-088f656e8197}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018C005C62C4D85
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018C005C62C4D85
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018C005C62C4D85
There are 46 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
B10000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
2BC80000000
direct allocation
page execute and read and write
malicious
267363C0000
direct allocation
page execute and read and write
malicious
840000
direct allocation
page execute and read and write
malicious
2BC80000000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
2BC80000000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
267363C0000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
180001000
direct allocation
page execute read
malicious
267363C0000
direct allocation
page execute and read and write
malicious
1A366B24000
heap
page read and write
45D447B000
stack
page read and write
26E7F43C000
heap
page read and write
1A366BA9000
heap
page read and write
A6C26FE000
stack
page read and write
1A365FF0000
heap
page read and write
2A6F000
stack
page read and write
2830BAD3000
heap
page read and write
1A366B98000
heap
page read and write
2830BADD000
heap
page read and write
207C5ECD000
heap
page read and write
8BB000
heap
page read and write
267363F0000
heap
page readonly
26E7F466000
heap
page read and write
943000
heap
page read and write
1A366B26000
heap
page read and write
2BAE000
stack
page read and write
1200C859000
heap
page read and write
1200C843000
heap
page read and write
5256FD000
stack
page read and write
99A000
heap
page read and write
1A366B7B000
heap
page read and write
1A3662E4000
heap
page read and write
CC0237F000
stack
page read and write
2C3B000
heap
page read and write
CA4DF7E000
stack
page read and write
2C53000
heap
page read and write
267360B0000
heap
page read and write
F49FD8E000
stack
page read and write
2830ED90000
heap
page read and write
7FFC671F1000
unkown
page execute read
4484A7E000
stack
page read and write
1200C86B000
heap
page read and write
1A366BBB000
heap
page read and write
20607C3C000
heap
page read and write
23349118000
heap
page read and write
2C55000
heap
page read and write
1200C841000
heap
page read and write
23348870000
heap
page read and write
2BCFC170000
heap
page read and write
2BCFC2F0000
direct allocation
page execute and read and write
1B330D60000
heap
page read and write
2ECC5DE000
stack
page read and write
1A367002000
heap
page read and write
26E7F461000
heap
page read and write
267360B0000
heap
page read and write
7FFC67212000
unkown
page readonly
1A366B76000
heap
page read and write
2ECC87F000
stack
page read and write
26130902000
heap
page read and write
1A366B7E000
heap
page read and write
7FFC67212000
unkown
page readonly
2580000
heap
page read and write
26331102000
heap
page read and write
1A367018000
heap
page read and write
1200C842000
heap
page read and write
20607D00000
heap
page read and write
979000
heap
page read and write
26E7F48A000
heap
page read and write
2D61000
heap
page read and write
229E000
stack
page read and write
2C55000
heap
page read and write
2334E104000
heap
page read and write
1A366BBC000
heap
page read and write
CC0237F000
stack
page read and write
1A366BBB000
heap
page read and write
26737B90000
heap
page read and write
1A366B98000
heap
page read and write
207C5D60000
trusted library allocation
page read and write
1CA90E66000
heap
page read and write
2ECC9FF000
stack
page read and write
2BC80030000
heap
page readonly
F49FD8E000
stack
page read and write
1A36623C000
heap
page read and write
1E31CB24000
heap
page read and write
2830B9F0000
heap
page read and write
1A366BBC000
heap
page read and write
7FFC6721F000
unkown
page readonly
23349159000
heap
page read and write
207C6CA0000
trusted library allocation
page read and write
180030000
direct allocation
page readonly
26131002000
trusted library allocation
page read and write
2334E01B000
heap
page read and write
2D60000
heap
page read and write
2334DBB0000
trusted library allocation
page read and write
23349002000
heap
page read and write
1CA90E8E000
heap
page read and write
2334E04E000
heap
page read and write
282E000
stack
page read and write
1A366B8B000
heap
page read and write
1CA90E8A000
heap
page read and write
1F41C85E000
heap
page read and write
256415D0000
heap
page read and write
20607C4E000
heap
page read and write
7FFC671F1000
unkown
page execute read
25FB29D0000
heap
page read and write
94E000
heap
page read and write
7FFC6721F000
unkown
page readonly
C45000
heap
page read and write
78AAAF7000
stack
page read and write
26331802000
heap
page read and write
10B70F9000
stack
page read and write
1F41C87F000
heap
page read and write
26736400000
heap
page read and write
4AD77E000
stack
page read and write
1E31CA79000
heap
page read and write
2C3B000
heap
page read and write
26331088000
heap
page read and write
890000
remote allocation
page read and write
A6C27FE000
stack
page read and write
F6582FE000
stack
page read and write
2334E000000
heap
page read and write
CA4D6FB000
stack
page read and write
26330F70000
heap
page read and write
2334E102000
heap
page read and write
2C3B000
heap
page read and write
26330F80000
heap
page read and write
24FC000
stack
page read and write
1A366BC9000
heap
page read and write
1CA90E8A000
heap
page read and write
2334DE30000
trusted library allocation
page read and write
2758FC29000
heap
page read and write
1F41C913000
heap
page read and write
1CA90E77000
heap
page read and write
2BC0000
heap
page read and write
1E31C990000
heap
page read and write
2B30000
remote allocation
page read and write
1CA90E74000
heap
page read and write
78AA6FE000
stack
page read and write
7FFC67212000
unkown
page readonly
1A367018000
heap
page read and write
26330FE0000
heap
page read and write
4484B79000
stack
page read and write
447CABB000
stack
page read and write
78AABFE000
stack
page read and write
20607C68000
heap
page read and write
1CA90DB0000
heap
page read and write
2334888F000
heap
page read and write
1CA90C20000
heap
page read and write
2400000
trusted library allocation
page read and write
1A366B98000
heap
page read and write
1A366B86000
heap
page read and write
1CA90D50000
heap
page read and write
1A366B87000
heap
page read and write
23349118000
heap
page read and write
7FFC6721F000
unkown
page readonly
1A3662FB000
heap
page read and write
D7F6BDC000
stack
page read and write
1B331602000
trusted library allocation
page read and write
2334DD61000
trusted library allocation
page read and write
45D4678000
stack
page read and write
7FFC671F0000
unkown
page readonly
1A366B75000
heap
page read and write
1A367002000
heap
page read and write
5251FE000
stack
page read and write
2C5F000
heap
page read and write
1B331550000
remote allocation
page read and write
180030000
direct allocation
page readonly
2334DE50000
trusted library allocation
page read and write
26130865000
heap
page read and write
1A367002000
heap
page read and write
2400000
trusted library allocation
page read and write
180000000
direct allocation
page read and write
267360D0000
heap
page read and write
2BC80080000
heap
page read and write
7FFC671F0000
unkown
page readonly
CA4E07F000
stack
page read and write
180000000
direct allocation
page read and write
1B330DC0000
heap
page read and write
1200C829000
heap
page read and write
2334DC30000
trusted library allocation
page read and write
1CA90E81000
heap
page read and write
1CA90DB5000
heap
page read and write
180030000
direct allocation
page readonly
1E31CB00000
heap
page read and write
1F41C900000
heap
page read and write
207C5E70000
heap
page read and write
979000
heap
page read and write
2564133B000
heap
page read and write
1200C813000
heap
page read and write
2334E04D000
heap
page read and write
7FFC671F0000
unkown
page readonly
7FFC671F1000
unkown
page execute read
F4A007F000
stack
page read and write
2758FA40000
heap
page read and write
2334E100000
heap
page read and write
207C5E39000
heap
page read and write
2334DD70000
trusted library allocation
page read and write
20607D08000
heap
page read and write
BBDFB7D000
stack
page read and write
1E31CA02000
heap
page read and write
2BC80080000
heap
page read and write
7FFC6721B000
unkown
page read and write
233488FD000
heap
page read and write
1A366BBA000
heap
page read and write
1A366B75000
heap
page read and write
7FFC671F0000
unkown
page readonly
180000000
direct allocation
page read and write
1A366B7E000
heap
page read and write
207C5DE0000
heap
page read and write
F49FD0C000
stack
page read and write
26E7F453000
heap
page read and write
F4A007F000
stack
page read and write
2C55000
heap
page read and write
2334882A000
heap
page read and write
2334E0A2000
heap
page read and write
2ECC55B000
stack
page read and write
180000000
direct allocation
page read and write
2C68000
heap
page read and write
1A366B87000
heap
page read and write
F5F3EFD000
stack
page read and write
26130829000
heap
page read and write
1B330E40000
heap
page read and write
26E7F513000
heap
page read and write
256444D0000
trusted library allocation
page read and write
20607B60000
trusted library allocation
page read and write
26736405000
heap
page read and write
26735F70000
unkown
page read and write
10B717E000
stack
page read and write
26E7F500000
heap
page read and write
98103EB000
stack
page read and write
78AACFF000
stack
page read and write
25644CD0000
heap
page read and write
830000
heap
page read and write
1A366271000
heap
page read and write
2334E0AD000
heap
page read and write
1A366B87000
heap
page read and write
1A366B98000
heap
page read and write
2DA6000
heap
page read and write
1F41D002000
trusted library allocation
page read and write
206079F0000
heap
page read and write
1A366236000
heap
page read and write
1CA90E81000
heap
page read and write
1200C861000
heap
page read and write
AF0000
heap
page readonly
2BCFC3C0000
heap
page read and write
276C000
stack
page read and write
1B331550000
remote allocation
page read and write
18002E000
direct allocation
page readonly
1A366235000
heap
page read and write
1A366B82000
heap
page read and write
447CB3F000
stack
page read and write
2334DD48000
trusted library allocation
page read and write
2758FD13000
heap
page read and write
1200C7E0000
trusted library allocation
page read and write
1A366B31000
heap
page read and write
2BCFC1E7000
heap
page read and write
447D37E000
stack
page read and write
1E31C920000
heap
page read and write
7FFC6721F000
unkown
page readonly
78AA87B000
stack
page read and write
1A366B77000
heap
page read and write
25641329000
heap
page read and write
1200C85B000
heap
page read and write
2334DE80000
trusted library allocation
page read and write
25FB2890000
heap
page read and write
1A3662AB000
heap
page read and write
26E7F390000
trusted library allocation
page read and write
52507B000
stack
page read and write
2830BAD9000
heap
page read and write
1A36701A000
heap
page read and write
1A366302000
heap
page read and write
1200C886000
heap
page read and write
1A36624A000
heap
page read and write
267360B0000
heap
page read and write
233488FD000
heap
page read and write
23349000000
heap
page read and write
1200C863000
heap
page read and write
207C6040000
trusted library allocation
page read and write
2C41000
heap
page read and write
10B71FC000
stack
page read and write
2334E0F4000
heap
page read and write
26130887000
heap
page read and write
18002E000
direct allocation
page readonly
1A367000000
heap
page read and write
1B330E13000
heap
page read and write
2C3B000
heap
page read and write
10B6D4F000
stack
page read and write
23348813000
heap
page read and write
207C69F0000
trusted library allocation
page read and write
26736120000
direct allocation
page execute and read and write
1CA90E66000
heap
page read and write
2334DEA0000
remote allocation
page read and write
18002E000
direct allocation
page readonly
1200C860000
heap
page read and write
26331040000
heap
page read and write
2758FC49000
heap
page read and write
5A0000
heap
page read and write
20607C89000
heap
page read and write
1200C845000
heap
page read and write
7FFC6721B000
unkown
page read and write
1A366BBA000
heap
page read and write
1A367021000
heap
page read and write
256412C0000
heap
page read and write
1A366BA9000
heap
page read and write
26331029000
heap
page read and write
2BCFC3C5000
heap
page read and write
1A366BBA000
heap
page read and write
26E7F482000
heap
page read and write
1200C86F000
heap
page read and write
25FB2A70000
heap
page read and write
F49FD0C000
stack
page read and write
180000000
direct allocation
page read and write
26737B40000
remote allocation
page read and write
2BCFC2F0000
direct allocation
page execute and read and write
2613086E000
heap
page read and write
CC022FF000
stack
page read and write
1A366200000
heap
page read and write
875000
heap
page read and write
C40000
heap
page read and write
1CA90D70000
heap
page read and write
45D4878000
stack
page read and write
1E31CB02000
heap
page read and write
1B330E29000
heap
page read and write
2BCFC190000
heap
page read and write
23348670000
heap
page read and write
1A367002000
heap
page read and write
1A366213000
heap
page read and write
2334E026000
heap
page read and write
447D27F000
stack
page read and write
2B30000
remote allocation
page read and write
1200C86D000
heap
page read and write
2830BACF000
heap
page read and write
2334DD70000
trusted library allocation
page read and write
2ECCDFF000
stack
page read and write
1A366313000
heap
page read and write
CC0227C000
stack
page read and write
2758FC4B000
heap
page read and write
2830BACE000
heap
page read and write
4B0000
heap
page read and write
26E7F220000
heap
page read and write
294C000
stack
page read and write
7FFC67212000
unkown
page readonly
2758FC83000
heap
page read and write
2334E01A000
heap
page read and write
26E7F400000
heap
page read and write
1A366B7A000
heap
page read and write
1A366BA9000
heap
page read and write
7FFC6721B000
unkown
page read and write
26E7F290000
heap
page read and write
8EA000
heap
page read and write
207C6CD0000
trusted library allocation
page read and write
233486E0000
heap
page read and write
20607D02000
heap
page read and write
267363F0000
heap
page readonly
263310BA000
heap
page read and write
A4E717F000
stack
page read and write
26331900000
heap
page read and write
1A366BAA000
heap
page read and write
20607C57000
heap
page read and write
26736130000
heap
page read and write
1E31C930000
heap
page read and write
1B330D50000
heap
page read and write
2830BACA000
heap
page read and write
2613085A000
heap
page read and write
9A6000
heap
page read and write
1A366B7C000
heap
page read and write
2830BAB0000
heap
page read and write
25641344000
heap
page read and write
BBDF8FB000
stack
page read and write
25641340000
heap
page read and write
1CA90E72000
heap
page read and write
1A366B89000
heap
page read and write
7FFC67212000
unkown
page readonly
256415DB000
heap
page read and write
26737B90000
heap
page read and write
20607A00000
heap
page read and write
890000
remote allocation
page read and write
2BCFC030000
unkown
page read and write
2ECCEFF000
stack
page read and write
20607C68000
heap
page read and write
25641320000
heap
page read and write
2C2D000
heap
page read and write
2758FC3C000
heap
page read and write
2BCFC030000
heap
page read and write
1A367021000
heap
page read and write
1200C740000
heap
page read and write
207C5E30000
heap
page read and write
1A366B98000
heap
page read and write
F6581FF000
stack
page read and write
180000000
direct allocation
page read and write
26736405000
heap
page read and write
18002F000
direct allocation
page read and write
26130E80000
trusted library allocation
page read and write
23349B93000
trusted library allocation
page read and write
A6C277E000
stack
page read and write
7FFC6721B000
unkown
page read and write
26735F70000
heap
page read and write
23348902000
heap
page read and write
87A000
stack
page read and write
180000000
direct allocation
page read and write
1A366248000
heap
page read and write
F6587FD000
stack
page read and write
2564133B000
heap
page read and write
2DA6000
heap
page read and write
1200C902000
heap
page read and write
27590202000
trusted library allocation
page read and write
1F41C802000
heap
page read and write
25641220000
heap
page read and write
8B0000
heap
page read and write
1A3662A4000
heap
page read and write
26E7FC02000
trusted library allocation
page read and write
1A366B0E000
heap
page read and write
1A366B5C000
heap
page read and write
52537E000
stack
page read and write
2BCFC030000
unkown
page read and write
2334888B000
heap
page read and write
1E31C9C0000
trusted library allocation
page read and write
256415D5000
heap
page read and write
8F1000
heap
page read and write
2334E0FB000
heap
page read and write
26E7F458000
heap
page read and write
1200C880000
heap
page read and write
2334E0E3000
heap
page read and write
26737B10000
heap
page read and write
45D3F0E000
stack
page read and write
1F41C6C0000
heap
page read and write
2BC1000
heap
page read and write
26E7F230000
heap
page read and write
F4A007F000
stack
page read and write
26130800000
heap
page read and write
1A366B7A000
heap
page read and write
1CA90E50000
heap
page read and write
1E31CA55000
heap
page read and write
8F1000
heap
page read and write
2830BACA000
heap
page read and write
207C6A50000
trusted library allocation
page read and write
1A366BC9000
heap
page read and write
2564133F000
heap
page read and write
20607C84000
heap
page read and write
26130720000
heap
page read and write
26E7F45D000
heap
page read and write
256412F3000
heap
page read and write
1F41C851000
heap
page read and write
1F41C800000
heap
page read and write
2BC80030000
heap
page readonly
AE0000
direct allocation
page execute and read and write
1A366B75000
heap
page read and write
23349113000
heap
page read and write
1A367002000
heap
page read and write
2334E0DF000
heap
page read and write
18002E000
direct allocation
page readonly
1A366B76000
heap
page read and write
78AA97B000
stack
page read and write
1CA90E8F000
heap
page read and write
18002F000
direct allocation
page read and write
45D4577000
stack
page read and write
267360D0000
heap
page read and write
2758FC00000
heap
page read and write
2830BAD3000
heap
page read and write
23349B90000
trusted library allocation
page read and write
26E7F508000
heap
page read and write
2334DEA0000
trusted library allocation
page read and write
2C53000
heap
page read and write
2BC80080000
heap
page read and write
23348907000
heap
page read and write
1A36624F000
heap
page read and write
1200C87C000
heap
page read and write
26130857000
heap
page read and write
1A366B98000
heap
page read and write
1200C85D000
heap
page read and write
8B0000
heap
page read and write
20607D13000
heap
page read and write
2334DD40000
trusted library allocation
page read and write
23349159000
heap
page read and write
1CA90E8A000
heap
page read and write
2830BAEE000
heap
page read and write
207C5EEA000
heap
page read and write
207C6CC0000
trusted library allocation
page read and write
2758FC61000
heap
page read and write
2334889F000
heap
page read and write
1200C82E000
heap
page read and write
1A366B80000
heap
page read and write
26130813000
heap
page read and write
1F41C813000
heap
page read and write
180000000
direct allocation
page read and write
2DEE000
heap
page read and write
1A366B98000
heap
page read and write
207C5DC0000
heap
page read and write
1200C87D000
heap
page read and write
7FFC67212000
unkown
page readonly
26737B40000
remote allocation
page read and write
4AD47C000
stack
page read and write
1A366249000
heap
page read and write
2564134A000
heap
page read and write
1B331550000
remote allocation
page read and write
1A366B83000
heap
page read and write
2334E032000
heap
page read and write
2DA7000
heap
page read and write
4484BFF000
stack
page read and write
2334E102000
heap
page read and write
B00000
heap
page read and write
1A366B75000
heap
page read and write
BBDF67E000
stack
page read and write
2758FD02000
heap
page read and write
1200C832000
heap
page read and write
26736138000
heap
page read and write
BBDF6FE000
stack
page read and write
2334E016000
heap
page read and write
1A366B93000
heap
page read and write
261306B0000
heap
page read and write
2BCFC3C0000
heap
page read and write
52527E000
stack
page read and write
1200C826000
heap
page read and write
26331000000
heap
page read and write
2334E020000
heap
page read and write
F6586FE000
stack
page read and write
2BCFC1E0000
heap
page read and write
1A366308000
heap
page read and write
1A3662AF000
heap
page read and write
1200C858000
heap
page read and write
94E000
heap
page read and write
1F41C6B0000
heap
page read and write
1A366BA9000
heap
page read and write
BBDF39B000
stack
page read and write
A4E6E7B000
stack
page read and write
2334DEA0000
remote allocation
page read and write
207C5E78000
heap
page read and write
26331113000
heap
page read and write
2334DE10000
trusted library allocation
page read and write
2BCFC2E0000
heap
page read and write
20607C13000
heap
page read and write
1F41C908000
heap
page read and write
1A367002000
heap
page read and write
BBDF7FB000
stack
page read and write
44847DE000
stack
page read and write
447D177000
stack
page read and write
1A366B76000
heap
page read and write
1A366B8D000
heap
page read and write
CA4D87C000
stack
page read and write
23348894000
heap
page read and write
7FFC6721B000
unkown
page read and write
2ECCBF7000
stack
page read and write
1200C862000
heap
page read and write
52557D000
stack
page read and write
2334DD64000
trusted library allocation
page read and write
1A366880000
remote allocation
page read and write
1A366B7B000
heap
page read and write
7FFC671F0000
unkown
page readonly
D7F747C000
stack
page read and write
1F41C88A000
heap
page read and write
10B7079000
stack
page read and write
2334888D000
heap
page read and write
BBDFA77000
stack
page read and write
4AD67F000
stack
page read and write
2BCFC3C0000
heap
page read and write
2758FC13000
heap
page read and write
1A367002000
heap
page read and write
94B000
heap
page read and write
20607C53000
heap
page read and write
CA4D97E000
stack
page read and write
1A366B97000
heap
page read and write
2BCFC1E7000
heap
page read and write
1200C750000
heap
page read and write
2613083F000
heap
page read and write
CC0227C000
stack
page read and write
45D3F8E000
stack
page read and write
207C5E35000
heap
page read and write
BBDFC7F000
stack
page read and write
2BCFC1E7000
heap
page read and write
2334DD60000
trusted library allocation
page read and write
1A366BBA000
heap
page read and write
1E31CA68000
heap
page read and write
1CA90E78000
heap
page read and write
2758FD00000
heap
page read and write
207C5EBF000
heap
page read and write
18002E000
direct allocation
page readonly
1E31D202000
trusted library allocation
page read and write
1A366BBA000
heap
page read and write
2830BAB8000
heap
page read and write
1A3662CA000
heap
page read and write
9A6000
heap
page read and write
1A366BA9000
heap
page read and write
2334E065000
heap
page read and write
5252FC000
stack
page read and write
F6585FD000
stack
page read and write
A4E693C000
stack
page read and write
951000
heap
page read and write
2334DD80000
trusted library allocation
page read and write
2334E058000
heap
page read and write
CA4DB7D000
stack
page read and write
F6584FB000
stack
page read and write
1B330E5C000
heap
page read and write
2334883D000
heap
page read and write
D7F737E000
stack
page read and write
7FFC6721B000
unkown
page read and write
263310E1000
heap
page read and write
233496F0000
trusted library allocation
page read and write
943000
heap
page read and write
2C55000
heap
page read and write
1A366229000
heap
page read and write
267363F0000
heap
page readonly
25641240000
heap
page read and write
180030000
direct allocation
page readonly
1A366060000
heap
page read and write
1A366880000
remote allocation
page read and write
1B330F02000
heap
page read and write
247F000
stack
page read and write
99A000
heap
page read and write
2BCFC190000
heap
page read and write
180030000
direct allocation
page readonly
2334E0A5000
heap
page read and write
2C58000
heap
page read and write
2830BD50000
heap
page read and write
1A366B75000
heap
page read and write
1A36624B000
heap
page read and write
45D477E000
stack
page read and write
207C5ECD000
heap
page read and write
233488A9000
heap
page read and write
1B330DF0000
trusted library allocation
page read and write
7FFC6721F000
unkown
page readonly
2564134E000
heap
page read and write
1A366B91000
heap
page read and write
5255FE000
stack
page read and write
2BCFC2F0000
direct allocation
page execute and read and write
7FFC6721B000
unkown
page read and write
2830BCC0000
heap
page read and write
2C53000
heap
page read and write
1200C85A000
heap
page read and write
7FFC67212000
unkown
page readonly
2334DC20000
trusted library allocation
page read and write
1A366B96000
heap
page read and write
2C76000
heap
page read and write
4AD97F000
stack
page read and write
1A366B98000
heap
page read and write
23349100000
heap
page read and write
25FB2A7D000
heap
page read and write
78AA67B000
stack
page read and write
10B6CCA000
stack
page read and write
256410E0000
heap
page read and write
45D3E8B000
stack
page read and write
2334DD84000
trusted library allocation
page read and write
F65847D000
stack
page read and write
1200C846000
heap
page read and write
25641344000
heap
page read and write
F6588FF000
stack
page read and write
257E000
stack
page read and write
18002E000
direct allocation
page readonly
1200D002000
trusted library allocation
page read and write
2830EF53000
heap
page read and write
AA0000
heap
page read and write
F49FD0C000
stack
page read and write
180030000
direct allocation
page readonly
26E7F429000
heap
page read and write
7FFC671F0000
unkown
page readonly
2334E053000
heap
page read and write
1A36624D000
heap
page read and write
2C07000
heap
page read and write
2BCFC3C5000
heap
page read and write
233487E0000
trusted library allocation
page read and write
2334DD40000
trusted library allocation
page read and write
1A366000000
heap
page read and write
1A3662CE000
heap
page read and write
256412F0000
heap
page read and write
52547E000
stack
page read and write
2C40000
heap
page read and write
7FFC6721F000
unkown
page readonly
2334DEA0000
remote allocation
page read and write
1A366B7D000
heap
page read and write
2334DFA0000
trusted library allocation
page read and write
2334DF80000
trusted library allocation
page read and write
1200C868000
heap
page read and write
207C5D50000
heap
page read and write
26130913000
heap
page read and write
26E7F502000
heap
page read and write
2830BA60000
heap
page read and write
4AD57E000
stack
page read and write
91B000
heap
page read and write
23348879000
heap
page read and write
A4E6F7B000
stack
page read and write
CC022FF000
stack
page read and write
820000
direct allocation
page execute and read and write
1200C849000
heap
page read and write
20607C00000
heap
page read and write
D7F6FF7000
stack
page read and write
810000
heap
page read and write
1A366B79000
heap
page read and write
1A366B89000
heap
page read and write
1200C879000
heap
page read and write
4484AFA000
stack
page read and write
26736130000
heap
page read and write
2334E026000
heap
page read and write
26736120000
direct allocation
page execute and read and write
1F41C83C000
heap
page read and write
2BCFC1E0000
heap
page read and write
1A366B76000
heap
page read and write
2BC80160000
remote allocation
page read and write
231F000
stack
page read and write
98106FE000
stack
page read and write
207C5E60000
trusted library allocation
page read and write
F65837C000
stack
page read and write
26EE000
stack
page read and write
2DCE000
heap
page read and write
1A366160000
trusted library allocation
page read and write
A6C267B000
stack
page read and write
25641366000
heap
page read and write
2830BA80000
heap
page read and write
26331939000
heap
page read and write
2BCFC1E0000
heap
page read and write
1A36701A000
heap
page read and write
1A366B98000
heap
page read and write
263310C8000
heap
page read and write
99A000
heap
page read and write
1A367002000
heap
page read and write
8B8000
heap
page read and write
26E7F427000
heap
page read and write
1A366B62000
heap
page read and write
CC0237F000
stack
page read and write
7FFC67212000
unkown
page readonly
913000
heap
page read and write
1A366B26000
heap
page read and write
2334E046000
heap
page read and write
2BCFC190000
heap
page read and write
A4E707E000
stack
page read and write
94E000
heap
page read and write
7FFC6721F000
unkown
page readonly
26331912000
heap
page read and write
1A366B8F000
heap
page read and write
2564135F000
heap
page read and write
7FFC671F1000
unkown
page execute read
20607C27000
heap
page read and write
2BCFC3C5000
heap
page read and write
1CA90E70000
heap
page read and write
26E7F470000
heap
page read and write
91A000
heap
page read and write
1B330E55000
heap
page read and write
1A36624E000
heap
page read and write
1200C800000
heap
page read and write
207C5ECD000
heap
page read and write
2334884E000
heap
page read and write
2334DE60000
trusted library allocation
page read and write
1A366B85000
heap
page read and write
23348680000
heap
page read and write
2830BD55000
heap
page read and write
1B330E02000
heap
page read and write
25641353000
heap
page read and write
1A366B7D000
heap
page read and write
2830EF50000
heap
page read and write
2C66000
heap
page read and write
2D80000
heap
page read and write
2830BAE2000
heap
page read and write
7FFC671F1000
unkown
page execute read
180030000
direct allocation
page readonly
26736400000
heap
page read and write
2334E020000
heap
page read and write
4484C79000
stack
page read and write
981067E000
stack
page read and write
2633106F000
heap
page read and write
1200C84E000
heap
page read and write
26331740000
trusted library allocation
page read and write
207C6CB0000
heap
page readonly
2334DE70000
trusted library allocation
page read and write
2334DE90000
trusted library allocation
page read and write
26736400000
heap
page read and write
447CF7F000
stack
page read and write
2758FC78000
heap
page read and write
2BCFC170000
heap
page read and write
F65807C000
stack
page read and write
26737B10000
heap
page read and write
207C5E81000
heap
page read and write
23349B71000
trusted library allocation
page read and write
26735F70000
unkown
page read and write
1200C830000
heap
page read and write
20607C71000
heap
page read and write
2B30000
remote allocation
page read and write
D7F717A000
stack
page read and write
26E7F462000
heap
page read and write
2BCFC2E0000
heap
page read and write
263310CB000
heap
page read and write
2334DE10000
trusted library allocation
page read and write
267360D0000
heap
page read and write
979000
heap
page read and write
23348902000
heap
page read and write
23348916000
heap
page read and write
91A000
heap
page read and write
26736138000
heap
page read and write
447CBBE000
stack
page read and write
936000
heap
page read and write
20607C7E000
heap
page read and write
2830BADD000
heap
page read and write
D7F6E7F000
stack
page read and write
2DA6000
heap
page read and write
2334DD4E000
trusted library allocation
page read and write
4484CFE000
stack
page read and write
447D07B000
stack
page read and write
2334DE10000
trusted library allocation
page read and write
CA4DD7E000
stack
page read and write
CC022FF000
stack
page read and write
7FFC671F0000
unkown
page readonly
207C5EC5000
heap
page read and write
20607A60000
heap
page read and write
1A366A02000
heap
page read and write
1E31CA00000
heap
page read and write
1A366BA9000
heap
page read and write
F49FD8E000
stack
page read and write
1A366B7F000
heap
page read and write
2830BAF6000
heap
page read and write
26E7F470000
heap
page read and write
45D48FF000
stack
page read and write
2ECCCFF000
stack
page read and write
26736138000
heap
page read and write
2758F9E0000
heap
page read and write
2BC80160000
remote allocation
page read and write
1200C847000
heap
page read and write
23349104000
heap
page read and write
CA4DC7F000
stack
page read and write
20608402000
trusted library allocation
page read and write
D7F7979000
stack
page read and write
448475B000
stack
page read and write
28AC000
stack
page read and write
1A366B98000
heap
page read and write
2BCFC170000
heap
page read and write
261306C0000
heap
page read and write
26736405000
heap
page read and write
2758FC50000
heap
page read and write
7FFC6721F000
unkown
page readonly
18002E000
direct allocation
page readonly
1CA90E71000
heap
page read and write
2C53000
heap
page read and write
1F41C829000
heap
page read and write
26130802000
heap
page read and write
2C55000
heap
page read and write
78AA77D000
stack
page read and write
F657E7C000
stack
page read and write
10B6DCF000
stack
page read and write
9A6000
heap
page read and write
7FFC671F1000
unkown
page execute read
1CA90E61000
heap
page read and write
1F41C902000
heap
page read and write
26737B10000
heap
page read and write
26E7F482000
heap
page read and write
1A366B6C000
heap
page read and write
A80000
heap
page read and write
45D42FB000
stack
page read and write
7FFC671F0000
unkown
page readonly
23349015000
heap
page read and write
1A366316000
heap
page read and write
1E31CA28000
heap
page read and write
1E31CA13000
heap
page read and write
2BC80030000
heap
page readonly
1A367002000
heap
page read and write
BBDF97E000
stack
page read and write
1200C83B000
heap
page read and write
26737B90000
heap
page read and write
2ECCAFB000
stack
page read and write
20607C29000
heap
page read and write
1A366BA9000
heap
page read and write
45D437E000
stack
page read and write
1A366288000
heap
page read and write
207C6D20000
trusted library allocation
page read and write
26E7F413000
heap
page read and write
1A366B98000
heap
page read and write
2BCFC2E0000
heap
page read and write
23348800000
heap
page read and write
2DCE000
heap
page read and write
CA4DE7F000
stack
page read and write
1A3662F5000
heap
page read and write
25641366000
heap
page read and write
2BE7000
heap
page read and write
880000
heap
page readonly
BBDFD7E000
stack
page read and write
23349102000
heap
page read and write
1200C7B0000
heap
page read and write
1A366BB4000
heap
page read and write
2B0B000
stack
page read and write
1E31CA40000
heap
page read and write
565000
stack
page read and write
1B330E00000
heap
page read and write
2C9F000
heap
page read and write
D7F757B000
stack
page read and write
9AB000
heap
page read and write
2C2D000
heap
page read and write
1A366B7E000
heap
page read and write
2758FC4D000
heap
page read and write
1A366B98000
heap
page read and write
1F41C85C000
heap
page read and write
18002E000
direct allocation
page readonly
2C3F000
heap
page read and write
870000
heap
page read and write
1CA90E81000
heap
page read and write
D7F7B7E000
stack
page read and write
4AD87F000
stack
page read and write
23348875000
heap
page read and write
2758F9D0000
heap
page read and write
1A3662B7000
heap
page read and write
233488AB000
heap
page read and write
5B0000
heap
page read and write
1F41C84B000
heap
page read and write
1A366B98000
heap
page read and write
26736130000
heap
page read and write
CC0227C000
stack
page read and write
7FFC671F1000
unkown
page execute read
207C6A60000
trusted library allocation
page read and write
7FFC6721B000
unkown
page read and write
CA4D2CC000
stack
page read and write
4AD4FE000
stack
page read and write
26331013000
heap
page read and write
2C53000
heap
page read and write
26E7F459000
heap
page read and write
D7F727A000
stack
page read and write
1200C83E000
heap
page read and write
2830EF60000
trusted library allocation
page read and write
180030000
direct allocation
page readonly
1A366B98000
heap
page read and write
78AA9FE000
stack
page read and write
1A366BBA000
heap
page read and write
1A366B24000
heap
page read and write
23349BA0000
trusted library allocation
page read and write
1F41C720000
heap
page read and write
275901A0000
trusted library allocation
page read and write
981077F000
stack
page read and write
1A366BC5000
heap
page read and write
937000
heap
page read and write
25FB2A83000
heap
page read and write
1F41CE80000
trusted library allocation
page read and write
1A366B00000
heap
page read and write
2C40000
heap
page read and write
1A3662C4000
heap
page read and write
2334DBA0000
trusted library allocation
page read and write
2564134E000
heap
page read and write
7FFC671F1000
unkown
page execute read
26736120000
direct allocation
page execute and read and write
5C0000
heap
page read and write
2758FD08000
heap
page read and write
1A366880000
remote allocation
page read and write
2C3B000
heap
page read and write
1A366B87000
heap
page read and write
1A366B98000
heap
page read and write
2830BD5B000
heap
page read and write
2334E0FD000
heap
page read and write
There are 936 hidden memdumps, click here to show them.