IOC Report
bscHLGMyjW

loading gif

Files

File Path
Type
Category
Malicious
bscHLGMyjW.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x2c04a331, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 61712 bytes, 1 file
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\regsvr32.exe
regsvr32.exe /s C:\Users\user\Desktop\bscHLGMyjW.dll
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\bscHLGMyjW.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\bscHLGMyjW.dll,DllRegisterServer
malicious
C:\Windows\SysWOW64\regsvr32.exe
C:\Windows\SysWOW64\regsvr32.exe /s "C:\Windows\SysWOW64\Mjzwixkz\jiugg.vcz"
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\bscHLGMyjW.dll,DllUnregisterServerr
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\bscHLGMyjW.dll"
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\bscHLGMyjW.dll",#1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://120.50.40.183:80/wVZyzHXwzFIbSsMDkdb
unknown
malicious
https://51.91.7.5/
unknown
malicious
https://120.50.40.183/
unknown
malicious
https://159.8.59.82/
unknown
malicious
https://131.100.24.231:80/H
unknown
malicious
https://103.221.221.247:8080/gYHJIs
unknown
malicious
https://173.254.208.91:8080/FHNmSQhMPmUgfiGTpfRKglWV
unknown
malicious
https://192.99.251.50/0
unknown
malicious
https://159.8.59.82:8080/
unknown
malicious
https://79.172.212.216/9
unknown
malicious
https://149.56.128.192/fSTm
149.56.128.192
malicious
https://131.100.24.231:80/
unknown
malicious
https://51.91.7.5:8080/rxYzgkPqLyQVovawmSL
unknown
malicious
https://51.91.76.89:8080/lNTCDnLEFARnzCSTbPqiarmtqBjaTTxMdOLjVhFUj
unknown
malicious
https://160.16.218.63:8080/rlxtXuQTWcz
unknown
malicious
https://192.99.251.50/4
unknown
malicious
https://192.99.251.50/99.251.50/hdaVPxkDfoKJQyOXvwYhhkAy
unknown
malicious
https://46.55.222.11/BiEgOdFqxzyfFPqwAOweHeXemJBZKjqwNwwVobqyTYy
unknown
malicious
https://103.221.221.247:8080/
unknown
malicious
https://206.188.212.92/
unknown
malicious
https://120.50.40.183:80/wVZyzHXwzFIbSsMDkdbsI
unknown
malicious
https://103.221.221.247:8080/gYHJIsD
unknown
malicious
https://173.254.208.91/
unknown
malicious
https://160.16.218.63/
unknown
malicious
https://206.188.212.92:8080/XGoDqOmEznVckdttzjTudmbZ
unknown
malicious
https://192.99.251.50/0/wVZyzHXwzFIbSsMDkdb
unknown
malicious
https://46.55.222.11/B
unknown
malicious
https://149.56.128.192/
unknown
malicious
https://103.221.221.247:8080/tas
unknown
malicious
https://46.55.222.11/F
unknown
malicious
https://131.100.24.231:80/HjsJJresDkOtazdwjPkgeyoMeBIGInWLCajLkkcuvkifWRvynwfbRFAZdPO
unknown
malicious
https://192.99.251.50/
unknown
malicious
https://192.99.251.50/hdaVPxkDfoKJQyOXvwYhhkAQ
unknown
malicious
https://46.55.222.11/
unknown
malicious
https://120.50.40.183:80/wVZyzHX
unknown
malicious
https://131.100.24.231/
unknown
malicious
https://51.91.7.5:8080/
unknown
malicious
https://131.100.24.231/I
unknown
malicious
https://120.50.40.183:80/wVZyzHXwzFIbSsMDkdbX
unknown
malicious
https://46.55.222.11/.50.40.183/
unknown
malicious
https://103.221.221.247/
unknown
malicious
https://160.16.218.63/Y
unknown
malicious
https://159.8.59.82:8080/taEjAKKH
unknown
malicious
https://79.172.212.216:8080/
unknown
malicious
https://185.157.82.211:8080/
unknown
malicious
https://192.99.251.50/hdaVPxkDfoKJQyOXvwYhhkA
unknown
malicious
https://160.16.218.63:8080/rlxtXuQTWczj
unknown
malicious
https://160.16.218.63/K
unknown
malicious
https://185.157.82.211:8080/)
unknown
malicious
https://192.99.251.50/hdaVPxkDfoKJQyOXvwYhhkAAppData
unknown
malicious
https://46.55.222.11/-
unknown
malicious
https://120.50.40.183:80/wVZyzHXwzFIbSsMDkdbP
unknown
malicious
https://46.55.222.11/.50.40.183:80/wVZyzHXwzFIbSsMDkdb
unknown
malicious
https://185.157.82.211/
unknown
malicious
https://185.157.82.211/V
unknown
malicious
https://46.55.222.11/BiEgOdFqxzyfFPqwAOweHeXemJBZKjqwNwwVobqyTY=
unknown
malicious
https://51.91.76.89/
unknown
malicious
https://46.55.222.11/BiEgOdFqxzyfFPqwAOweHeXemJBZKjqwNwwVobqyTY
46.55.222.11
malicious
https://79.172.212.216/
unknown
malicious
https://159.8.59.82:8080/taEjAKKHJ
unknown
malicious
https://79.172.212.216:8080/QLBvrKXyQhlLtOrpKVuDaNHJ
unknown
malicious
https://159.8.59.82/5
unknown
malicious
https://185.157.82.211:8080/riNpYqdQCgxyFX
unknown
malicious
https://120.50.40.183:80/
unknown
malicious
https://79.172.212.216:8080/QLBvrKXyQhlLtOrpKVuDaNHJ%
unknown
malicious
https://120.50.40.183:80/wVZyzHXwzFIbSsMDkdb1
unknown
malicious
https://58.227.42.236:80/sCQmfFGUJRcSUjROebyagzBacHzSNzxJ771D
unknown
https://58.227.42.236/72.212.216/
unknown
https://58.227.42.236/
unknown
https://sls.upP
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
https://58.227.42.236/n
unknown
https://58.227.42.236:80/2.212.216:8080/QLBvrKXyQhlLtOrpKVuDaNHJ
unknown
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
https://58.227.42.236:80/
unknown
http://crl.ver)
unknown
https://www.tiktok.com/legal/report/feedback
unknown
https://58.227.42.236:80/sCQmfFGUJRcSUjROebyagzBacHzSNzxJh
unknown
https://support.hotspotshield.com/
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
https://58.227.42.236:80/sCQmfFGUJRcSUjROebyagzBacHzSNzxJ
unknown
https://58.227.42.236:80/sCQmfFGUJRcSUjROebyagzBacHzSNzxJn
unknown
https://disneyplus.com/legal.
unknown
http://help.disneyplus.com.
unknown
https://58.227.42.236/3
unknown
There are 76 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
248.38.74.3
unknown
Reserved
malicious
208.185.68.3
unknown
United States
malicious
185.157.82.211
unknown
Poland
malicious
216.131.66.3
unknown
United States
malicious
180.4.0.0
unknown
Japan
malicious
79.172.212.216
unknown
Hungary
malicious
114.240.2.0
unknown
China
malicious
220.194.66.52
unknown
China
malicious
91.240.2.0
unknown
United Kingdom
malicious
173.254.208.91
unknown
United States
malicious
206.188.212.92
unknown
United States
malicious
40.38.70.3
unknown
United States
malicious
135.52.4.0
unknown
United States
malicious
51.91.7.5
unknown
France
malicious
32.137.69.3
unknown
United States
malicious
108.240.2.0
unknown
United States
malicious
148.4.0.0
unknown
United States
malicious
108.4.0.0
unknown
United States
malicious
192.16.0.0
unknown
United States
malicious
149.56.128.192
unknown
Canada
malicious
128.4.0.0
unknown
United States
malicious
120.240.2.0
unknown
China
malicious
131.100.24.231
unknown
Brazil
malicious
156.4.0.0
unknown
United States
malicious
184.4.0.0
unknown
United States
malicious
46.55.222.11
unknown
Bulgaria
malicious
51.91.76.89
unknown
France
malicious
103.240.2.0
unknown
unknown
malicious
160.16.218.63
unknown
Japan
malicious
224.120.66.3
unknown
Reserved
malicious
192.99.251.50
unknown
Canada
malicious
216.64.72.3
unknown
United States
malicious
124.4.0.0
unknown
India
malicious
112.135.10.118
unknown
Sri Lanka
malicious
152.4.0.0
unknown
United States
malicious
159.8.59.82
unknown
United States
malicious
120.50.40.183
unknown
Singapore
malicious
58.227.42.236
unknown
Korea Republic of
malicious
103.221.221.247
unknown
Viet Nam
malicious
192.168.2.1
unknown
unknown
127.0.0.1
unknown
unknown
There are 31 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\TaskStore
Schedule Scan
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\State
BlockUntilTimeStatus
HKEY_LOCAL_MACHINE\SYSTEM\WaaS\WaaSMedic\Configuration
refreshAfter
There are 2 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4DB1000
direct allocation
page execute read
malicious
3590000
direct allocation
page execute and read and write
malicious
3550000
direct allocation
page execute and read and write
malicious
4DF1000
direct allocation
page execute read
malicious
4C21000
direct allocation
page execute read
malicious
4B81000
direct allocation
page execute read
malicious
3150000
direct allocation
page execute and read and write
malicious
4DC0000
direct allocation
page execute and read and write
malicious
1C922EAF000
heap
page read and write
34C8000
heap
page read and write
3270000
heap
page read and write
DD0000
trusted library allocation
page read and write
170237BB000
heap
page read and write
1CA1558E000
heap
page read and write
1CA155AC000
heap
page read and write
1E9A4229000
heap
page read and write
1008C000
unkown
page readonly
19576655000
heap
page read and write
3447000
heap
page read and write
B51F1FA000
stack
page read and write
1CA15568000
heap
page read and write
32D4000
heap
page read and write
170237B5000
heap
page read and write
32D4000
heap
page read and write
172597F000
stack
page read and write
1BCA24FC000
heap
page read and write
1CA15A02000
heap
page read and write
4DF0000
direct allocation
page read and write
249B37D0000
trusted library allocation
page read and write
3474000
heap
page read and write
1CA155DC000
heap
page read and write
30F0000
remote allocation
page read and write
217F8AE0000
trusted library allocation
page read and write
1BCA2457000
heap
page read and write
4E21000
heap
page read and write
759D179000
stack
page read and write
1CA14A3C000
heap
page read and write
3474000
heap
page read and write
53E6000
trusted library allocation
page read and write
12CA000
heap
page read and write
2A5C158B000
heap
page read and write
759CB4F000
stack
page read and write
19576400000
heap
page read and write
1F2D2013000
heap
page read and write
B51F77C000
stack
page read and write
1BCA7E50000
trusted library allocation
page read and write
1E3F3F46000
heap
page read and write
217F8C5E000
heap
page read and write
1008C000
unkown
page readonly
10B0000
heap
page read and write
249B382E000
heap
page read and write
1BCA8000000
heap
page read and write
5358000
trusted library allocation
page read and write
96A6EBA000
stack
page read and write
19576682000
heap
page read and write
B51FB7F000
stack
page read and write
EBD000
heap
page read and write
530F000
trusted library allocation
page read and write
1CA14A00000
heap
page read and write
4E21000
heap
page read and write
30E3000
heap
page read and write
1E9A4281000
heap
page read and write
1BCA7C49000
heap
page read and write
1BCA7C80000
trusted library allocation
page read and write
1BCA7B60000
trusted library allocation
page read and write
1BCA2E02000
heap
page read and write
32D4000
heap
page read and write
32D4000
heap
page read and write
759D07A000
stack
page read and write
1CA14AAB000
heap
page read and write
4E21000
heap
page read and write
1C922EA6000
heap
page read and write
1BCA7E90000
remote allocation
page read and write
1E3F3DF0000
heap
page read and write
32D4000
heap
page read and write
249B38A7000
heap
page read and write
32D4000
heap
page read and write
4E12000
direct allocation
page read and write
1B139A29000
heap
page read and write
FF0000
heap
page read and write
12FF000
stack
page read and write
1E9A428D000
heap
page read and write
3439000
heap
page read and write
5A27B7D000
stack
page read and write
1BCA7C90000
trusted library allocation
page read and write
32D4000
heap
page read and write
B05F000
stack
page read and write
1BCA7B74000
trusted library allocation
page read and write
249B4800000
heap
page read and write
32D4000
heap
page read and write
10001000
unkown
page execute read
1F2D2065000
heap
page read and write
4D40000
trusted library allocation
page read and write
32D4000
heap
page read and write
1E9A4308000
heap
page read and write
1BCA7B54000
trusted library allocation
page read and write
1BCA2400000
heap
page read and write
2E9A2FE000
stack
page read and write
73B291B000
stack
page read and write
1C922E8B000
heap
page read and write
5320000
trusted library allocation
page read and write
3212000
heap
page read and write
3474000
heap
page read and write
32D4000
heap
page read and write
1BCA2513000
heap
page read and write
EB9000
heap
page read and write
1F2D2A02000
trusted library allocation
page read and write
1CA1556E000
heap
page read and write
249B39AA000
heap
page read and write
1C922EAF000
heap
page read and write
38BE4F7000
stack
page read and write
249B490A000
heap
page read and write
32D4000
heap
page read and write
5320000
trusted library allocation
page read and write
1C922EAF000
heap
page read and write
1F2D2102000
heap
page read and write
34DC000
heap
page read and write
32D4000
heap
page read and write
1B139870000
heap
page read and write
249B38C7000
heap
page read and write
1BCA2455000
heap
page read and write
249B4902000
heap
page read and write
10000000
unkown
page readonly
32D4000
heap
page read and write
1BCA7CEA000
heap
page read and write
249B3913000
heap
page read and write
B0DE000
stack
page read and write
1BCA2478000
heap
page read and write
32D4000
heap
page read and write
1295000
heap
page read and write
32D4000
heap
page read and write
4E30000
heap
page read and write
249B3881000
heap
page read and write
1BCA79A0000
trusted library allocation
page read and write
170238C0000
remote allocation
page read and write
1F2D205C000
heap
page read and write
1CA1558D000
heap
page read and write
1090000
heap
page read and write
170237D8000
heap
page read and write
4E21000
heap
page read and write
1BCA35F0000
trusted library section
page readonly
1430000
heap
page read and write
3435000
heap
page read and write
4E21000
heap
page read and write
EEC000
stack
page read and write
3370000
heap
page read and write
724FA7E000
stack
page read and write
34C8000
heap
page read and write
1F2D1F70000
heap
page read and write
1E9A4050000
heap
page read and write
32D4000
heap
page read and write
1B139A59000
heap
page read and write
1B139A13000
heap
page read and write
4DC0000
trusted library allocation
page read and write
10000000
unkown
page readonly
249B4125000
heap
page read and write
1CA155B0000
heap
page read and write
32D4000
heap
page read and write
AF1E000
stack
page read and write
1CA1556F000
heap
page read and write
1BCA2491000
heap
page read and write
172557C000
stack
page read and write
53C0000
trusted library allocation
page read and write
3580000
heap
page read and write
32D4000
heap
page read and write
4C20000
direct allocation
page read and write
170242D2000
heap
page read and write
1CA1558F000
heap
page read and write
1BCA2390000
heap
page read and write
32D4000
heap
page read and write
4E22000
heap
page read and write
1BCA7B38000
trusted library allocation
page read and write
B19E000
stack
page read and write
1BCA2F18000
heap
page read and write
32D4000
heap
page read and write
4D1E000
stack
page read and write
1BCA3001000
trusted library allocation
page read and write
540E000
trusted library allocation
page read and write
1CA149B0000
trusted library allocation
page read and write
3474000
heap
page read and write
5329000
trusted library allocation
page read and write
1E3F4280000
heap
page read and write
1BCA7C1D000
heap
page read and write
34B3000
heap
page read and write
1B139A00000
heap
page read and write
1E9A4213000
heap
page read and write
249B38FD000
heap
page read and write
B51F47F000
stack
page read and write
4B00000
trusted library allocation
page read and write
32D4000
heap
page read and write
4E21000
heap
page read and write
1BCA7C63000
heap
page read and write
1CA15564000
heap
page read and write
96A737F000
stack
page read and write
4C34000
heap
page read and write
1CA15A20000
heap
page read and write
1B139860000
heap
page read and write
217F9B70000
heap
page readonly
1C922EA5000
heap
page read and write
1CA15A02000
heap
page read and write
4E21000
heap
page read and write
1CA15568000
heap
page read and write
170237BB000
heap
page read and write
DE0000
heap
page read and write
1CA14ADE000
heap
page read and write
3020000
heap
page read and write
EC7000
heap
page read and write
E24000
heap
page read and write
4E21000
heap
page read and write
1B139B02000
heap
page read and write
1CA15568000
heap
page read and write
249B41ED000
heap
page read and write
19576E02000
trusted library allocation
page read and write
1BCA7A20000
trusted library allocation
page read and write
53E7000
trusted library allocation
page read and write
249B3829000
heap
page read and write
249B3800000
heap
page read and write
4E21000
heap
page read and write
1CA1556E000
heap
page read and write
52C1000
trusted library allocation
page read and write
249B38CD000
heap
page read and write
1BCA7E70000
trusted library allocation
page read and write
1CA1558E000
heap
page read and write
249B38AD000
heap
page read and write
249B3853000
heap
page read and write
1BCA2475000
heap
page read and write
1B139B28000
heap
page read and write
170237CD000
heap
page read and write
1CA15A02000
heap
page read and write
170238C0000
remote allocation
page read and write
1CA1558C000
heap
page read and write
170237B5000
heap
page read and write
1CA1558C000
heap
page read and write
17023793000
heap
page read and write
1BCA35E0000
trusted library section
page readonly
249B4133000
heap
page read and write
13C0000
heap
page read and write
1CA1558A000
heap
page read and write
1CA15568000
heap
page read and write
532F000
trusted library allocation
page read and write
10085000
unkown
page read and write
B85A1DC000
stack
page read and write
1957664F000
heap
page read and write
32D4000
heap
page read and write
10072000
unkown
page readonly
19576700000
heap
page read and write
AF65000
trusted library allocation
page read and write
127F000
stack
page read and write
133E000
stack
page read and write
38BE0FE000
stack
page read and write
170237CD000
heap
page read and write
1CA1556F000
heap
page read and write
1CA15584000
heap
page read and write
1BCA7B30000
trusted library allocation
page read and write
10000000
unkown
page readonly
32D4000
heap
page read and write
1CA14AC8000
heap
page read and write
5A2767E000
stack
page read and write
32D4000
heap
page read and write
1702382D000
heap
page read and write
12BE000
stack
page read and write
EBD000
heap
page read and write
6090000
trusted library allocation
page read and write
1BCA7C5C000
heap
page read and write
249B3813000
heap
page read and write
1702375D000
heap
page read and write
1E9A4300000
heap
page read and write
217F8C5E000
heap
page read and write
32D4000
heap
page read and write
17023738000
heap
page read and write
1F2D205F000
heap
page read and write
B01E000
stack
page read and write
1CA15A19000
heap
page read and write
1BCA7CA1000
heap
page read and write
4E21000
heap
page read and write
1CA14A77000
heap
page read and write
724F73B000
stack
page read and write
1CA1558D000
heap
page read and write
1CA155B5000
heap
page read and write
2A5C1568000
heap
page read and write
3000000
heap
page read and write
9F0000
trusted library allocation
page read and write
4C4C000
trusted library allocation
page read and write
1CA15500000
heap
page read and write
73B2CFA000
stack
page read and write
4EE0000
heap
page read and write
AF5A000
stack
page read and write
1CA15589000
heap
page read and write
1BCA248C000
heap
page read and write
1F2D1F00000
heap
page read and write
1BCA3961000
trusted library allocation
page read and write
AD9E000
stack
page read and write
1CA1558D000
heap
page read and write
1B1398D0000
heap
page read and write
1CA14A61000
heap
page read and write
32D4000
heap
page read and write
172515B000
stack
page read and write
32D4000
heap
page read and write
540F000
trusted library allocation
page read and write
1F2D2108000
heap
page read and write
ED9000
heap
page read and write
4E21000
heap
page read and write
4E20000
heap
page read and write
217F9B90000
trusted library allocation
page read and write
51DF000
stack
page read and write
1100000
heap
page read and write
1F2D2061000
heap
page read and write
32D4000
heap
page read and write
4C43000
direct allocation
page read and write
4F20000
trusted library allocation
page read and write
17023775000
heap
page read and write
1CA14A86000
heap
page read and write
249B4135000
heap
page read and write
2A5C1510000
heap
page read and write
DEA000
heap
page read and write
1CA1558D000
heap
page read and write
1E3F3E80000
heap
page read and write
1BCA7C00000
heap
page read and write
217F9BE0000
trusted library allocation
page read and write
1CA1558D000
heap
page read and write
32D4000
heap
page read and write
3439000
heap
page read and write
1C922EA7000
heap
page read and write
17023812000
heap
page read and write
1F2D2054000
heap
page read and write
1BCA7CFA000
heap
page read and write
1CA15595000
heap
page read and write
38BDF7B000
stack
page read and write
172567B000
stack
page read and write
AEDE000
stack
page read and write
30E0000
heap
page read and write
32D4000
heap
page read and write
249B41D8000
heap
page read and write
170242D4000
heap
page read and write
1E9A4276000
heap
page read and write
1CA15589000
heap
page read and write
34C3000
heap
page read and write
B1DF000
stack
page read and write
4FBC000
stack
page read and write
1548000
heap
page read and write
506E000
stack
page read and write
4C40000
trusted library allocation
page read and write
4D30000
trusted library allocation
page read and write
724FF7F000
stack
page read and write
32D4000
heap
page read and write
32D4000
heap
page read and write
5329000
trusted library allocation
page read and write
1CA14AA4000
heap
page read and write
38BE67F000
stack
page read and write
1BCA2E00000
heap
page read and write
249B4802000
heap
page read and write
B51F2FE000
stack
page read and write
217F9B60000
trusted library allocation
page read and write
32D4000
heap
page read and write
249B38B8000
heap
page read and write
512C000
stack
page read and write
1E9A423C000
heap
page read and write
33EA000
heap
page read and write
4E23000
heap
page read and write
724FC7B000
stack
page read and write
1340000
heap
page read and write
19576702000
heap
page read and write
1CA1558A000
heap
page read and write
1BCA7CF2000
heap
page read and write
4E13000
direct allocation
page read and write
249B3670000
heap
page read and write
E90000
heap
page read and write
1CA14A67000
heap
page read and write
5314000
trusted library allocation
page read and write
170242D0000
heap
page read and write
4E21000
heap
page read and write
1CA1558D000
heap
page read and write
4CCE000
stack
page read and write
217F8E40000
trusted library allocation
page read and write
3439000
heap
page read and write
EB5000
heap
page read and write
1F2D202A000
heap
page read and write
759D47E000
stack
page read and write
1E9A40C0000
heap
page read and write
533A000
trusted library allocation
page read and write
5338000
trusted library allocation
page read and write
1725777000
stack
page read and write
1CA1556B000
heap
page read and write
1350000
trusted library allocation
page read and write
32D4000
heap
page read and write
3374000
heap
page read and write
33E0000
heap
page read and write
1BCA7E40000
trusted library allocation
page read and write
32D4000
heap
page read and write
1BCA7A10000
trusted library allocation
page read and write
1CA14AEF000
heap
page read and write
3200000
trusted library allocation
page read and write
D30000
heap
page read and write
34B2000
heap
page read and write
B51EFF8000
stack
page read and write
10089000
unkown
page read and write
1008C000
unkown
page readonly
530F000
trusted library allocation
page read and write
4E21000
heap
page read and write
B51F57F000
stack
page read and write
4DD3000
direct allocation
page read and write
249B4843000
heap
page read and write
32D4000
heap
page read and write
217F8D30000
heap
page read and write
1BCA7C13000
heap
page read and write
10072000
unkown
page readonly
5337000
trusted library allocation
page read and write
1E3F4285000
heap
page read and write
1B139B13000
heap
page read and write
1BCA7C3C000
heap
page read and write
1CA14AC3000
heap
page read and write
1E3F3F10000
heap
page read and write
1F2D2097000
heap
page read and write
32D4000
heap
page read and write
10F3000
heap
page read and write
10085000
unkown
page read and write
1CA14A77000
heap
page read and write
1CA14AB5000
heap
page read and write
10089000
unkown
page read and write
32D4000
heap
page read and write
1CA14B13000
heap
page read and write
ED9000
heap
page read and write
1CA155B0000
heap
page read and write
1CA14920000
heap
page read and write
217F8C7A000
heap
page read and write
1F2D1F10000
heap
page read and write
249B387C000
heap
page read and write
1BCA35D0000
trusted library section
page readonly
96A6FBE000
stack
page read and write
52E3000
trusted library allocation
page read and write
32D4000
heap
page read and write
32D4000
heap
page read and write
1CA14B02000
heap
page read and write
249B38BC000
heap
page read and write
249B3680000
heap
page read and write
1CA14A5A000
heap
page read and write
B51F4FF000
stack
page read and write
5337000
trusted library allocation
page read and write
52A0000
remote allocation
page read and write
1BCA2E15000
heap
page read and write
1CA1558E000
heap
page read and write
52A0000
remote allocation
page read and write
2B90000
heap
page read and write
5358000
trusted library allocation
page read and write
31E7000
heap
page read and write
17023850000
heap
page read and write
E80000
heap
page read and write
19576671000
heap
page read and write
1CA1556E000
heap
page read and write
C49097F000
stack
page read and write
1CA1558E000
heap
page read and write
2FFE000
stack
page read and write
32D4000
heap
page read and write
4E1E000
stack
page read and write
217F9B80000
trusted library allocation
page read and write
F2A000
stack
page read and write
32D4000
heap
page read and write
B51F7FE000
stack
page read and write
532F000
trusted library allocation
page read and write
1CA14A29000
heap
page read and write
2A5C13E0000
heap
page read and write
10000000
unkown
page readonly
1BCA7CAC000
heap
page read and write
1CA1558A000
heap
page read and write
1CA14A66000
heap
page read and write
96A7278000
stack
page read and write
1530000
heap
page read and write
19576500000
trusted library allocation
page read and write
34D2000
heap
page read and write
4E21000
heap
page read and write
1CA1559F000
heap
page read and write
1BCA7E60000
trusted library allocation
page read and write
30CB000
stack
page read and write
249B4854000
heap
page read and write
1CA14B16000
heap
page read and write
1CA15513000
heap
page read and write
249B4100000
heap
page read and write
32D0000
heap
page read and write
1BCA7B50000
trusted library allocation
page read and write
217F8C60000
heap
page read and write
32D4000
heap
page read and write
32D4000
heap
page read and write
1C922EBF000
heap
page read and write
4D7D000
stack
page read and write
B85A6FE000
stack
page read and write
32D4000
heap
page read and write
195763A0000
heap
page read and write
1F2D203C000
heap
page read and write
350E000
stack
page read and write
1CA14B08000
heap
page read and write
B85A7FF000
stack
page read and write
4E21000
heap
page read and write
1CA15590000
heap
page read and write
1CA15589000
heap
page read and write
1E9A4266000
heap
page read and write
1CA14AB2000
heap
page read and write
5358000
trusted library allocation
page read and write
5358000
trusted library allocation
page read and write
1BCA7B3E000
trusted library allocation
page read and write
C49051B000
stack
page read and write
38BE57F000
unkown
page read and write
1CA152E0000
remote allocation
page read and write
34C3000
heap
page read and write
1CA15A02000
heap
page read and write
EC1000
heap
page read and write
2A5C1530000
heap
page read and write
2E38000
stack
page read and write
4E21000
heap
page read and write
4E21000
heap
page read and write
217F8C10000
heap
page read and write
AD1E000
trusted library allocation
page read and write
1CA15A00000
heap
page read and write
172547E000
stack
page read and write
1CA15402000
heap
page read and write
B25E000
stack
page read and write
DCA000
stack
page read and write
217F8E30000
heap
page read and write
4E21000
heap
page read and write
4C2E000
stack
page read and write
759D5FF000
stack
page read and write
B51F3FB000
stack
page read and write
52A0000
remote allocation
page read and write
AE9E000
stack
page read and write
3435000
heap
page read and write
1BCA7D02000
heap
page read and write
1BCA2413000
heap
page read and write
1F2D208C000
heap
page read and write
4D90000
heap
page read and write
1C922E97000
heap
page read and write
1BCA7B51000
trusted library allocation
page read and write
ED3000
heap
page read and write
32D4000
heap
page read and write
249B39BF000
heap
page read and write
724FD77000
stack
page read and write
1CA1550F000
heap
page read and write
4E21000
heap
page read and write
F90000
trusted library allocation
page read and write
345A000
heap
page read and write
1BCA23D0000
trusted library section
page read and write
1CA155AD000
heap
page read and write
5A2787B000
stack
page read and write
1CA15A44000
heap
page read and write
32D4000
heap
page read and write
1BCA2F00000
heap
page read and write
1BCA7C9F000
heap
page read and write
35C0000
heap
page read and write
32D4000
heap
page read and write
249B3FC0000
trusted library allocation
page read and write
EB9000
heap
page read and write
537F000
trusted library allocation
page read and write
308E000
stack
page read and write
17251DE000
stack
page read and write
4EBE000
stack
page read and write
1C922EC1000
heap
page read and write
1CA1559C000
heap
page read and write
3110000
trusted library allocation
page read and write
5358000
trusted library allocation
page read and write
32D4000
heap
page read and write
1BCA7E90000
remote allocation
page read and write
1E9A4060000
heap
page read and write
1CA15A02000
heap
page read and write
1CA15589000
heap
page read and write
32D4000
heap
page read and write
1E3F3F1B000
heap
page read and write
94B000
stack
page read and write
1CA15A02000
heap
page read and write
30CF000
stack
page read and write
249B38E1000
heap
page read and write
32D4000
heap
page read and write
1CA15582000
heap
page read and write
1CA155D4000
heap
page read and write
347A000
heap
page read and write
532F000
trusted library allocation
page read and write
EC4000
heap
page read and write
4FEF000
stack
page read and write
217F8C18000
heap
page read and write
170239E5000
heap
page read and write
ABAA000
trusted library allocation
page read and write
135D000
stack
page read and write
4E21000
heap
page read and write
249B3846000
heap
page read and write
249B3861000
heap
page read and write
32D4000
heap
page read and write
34D2000
heap
page read and write
E20000
heap
page read and write
322A000
heap
page read and write
38BDB8E000
stack
page read and write
32D4000
heap
page read and write
32D4000
heap
page read and write
1CA1558C000
heap
page read and write
32D4000
heap
page read and write
32D4000
heap
page read and write
10FD000
heap
page read and write
17023814000
heap
page read and write
17023793000
heap
page read and write
4BA2000
direct allocation
page read and write
B21E000
stack
page read and write
52A0000
trusted library allocation
page read and write
4E7F000
stack
page read and write
4FF0000
heap
page read and write
759D37B000
stack
page read and write
17023761000
heap
page read and write
4DB0000
direct allocation
page read and write
249B3835000
heap
page read and write
1CA15562000
heap
page read and write
1B139A40000
heap
page read and write
1CA152E0000
remote allocation
page read and write
17023775000
heap
page read and write
AC3E000
trusted library allocation
page read and write
1CA1556A000
heap
page read and write
217F8C57000
heap
page read and write
249B415A000
heap
page read and write
38BDB0C000
stack
page read and write
38BDE7E000
stack
page read and write
4E21000
heap
page read and write
17023796000
heap
page read and write
2E9A57F000
stack
page read and write
19576390000
heap
page read and write
170242D7000
heap
page read and write
1E9A41C0000
trusted library allocation
page read and write
1095000
heap
page read and write
34B3000
heap
page read and write
B51F97B000
stack
page read and write
52F0000
trusted library allocation
page read and write
1CA14AF6000
heap
page read and write
B85A77E000
stack
page read and write
32D4000
heap
page read and write
1CA1556F000
heap
page read and write
1CA15594000
heap
page read and write
5A2734B000
stack
page read and write
2E9A47D000
stack
page read and write
85FF87E000
stack
page read and write
1CA14A69000
heap
page read and write
1CA15A03000
heap
page read and write
4E30000
heap
page read and write
5A27A7F000
stack
page read and write
759D57B000
stack
page read and write
32D4000
heap
page read and write
759CEFC000
stack
page read and write
531A000
trusted library allocation
page read and write
3435000
heap
page read and write
32D4000
heap
page read and write
1C922E40000
heap
page read and write
4CE0000
trusted library allocation
page read and write
1CA15593000
heap
page read and write
10072000
unkown
page readonly
2A5C1560000
heap
page read and write
73B2E79000
stack
page read and write
170237B5000
heap
page read and write
1BCA2429000
heap
page read and write
1CA155A0000
heap
page read and write
5329000
trusted library allocation
page read and write
1BCA7B70000
trusted library allocation
page read and write
73B2DFE000
stack
page read and write
1CA15A02000
heap
page read and write
1C922E97000
heap
page read and write
1CA15582000
heap
page read and write
1CA14980000
heap
page read and write
5358000
trusted library allocation
page read and write
1CA15589000
heap
page read and write
1E3F3E60000
heap
page read and write
1CA1558C000
heap
page read and write
17023730000
heap
page read and write
1CA15590000
heap
page read and write
1CA14A5B000
heap
page read and write
32D4000
heap
page read and write
249B4139000
heap
page read and write
32D4000
heap
page read and write
1BCA7B30000
trusted library allocation
page read and write
1B139A80000
heap
page read and write
10001000
unkown
page execute read
1BCA2441000
heap
page read and write
1E9A4302000
heap
page read and write
1CA152E0000
remote allocation
page read and write
EB1000
heap
page read and write
1CA1558A000
heap
page read and write
5320000
trusted library allocation
page read and write
5329000
trusted library allocation
page read and write
1B139B00000
heap
page read and write
EBD000
heap
page read and write
249B38D9000
heap
page read and write
1CA14A5C000
heap
page read and write
724FE7F000
stack
page read and write
1CA15589000
heap
page read and write
1BCA2F02000
heap
page read and write
2BFC000
stack
page read and write
1BCA34E0000
trusted library allocation
page read and write
1F2D2085000
heap
page read and write
110B000
heap
page read and write
125D000
stack
page read and write
1F2D1FA0000
trusted library allocation
page read and write
1CA15A02000
heap
page read and write
32B3000
heap
page read and write
5A27C7F000
stack
page read and write
38BE3FF000
stack
page read and write
1BCA23C0000
trusted library allocation
page read and write
154A000
heap
page read and write
1BCA3990000
trusted library allocation
page read and write
32D4000
heap
page read and write
12C0000
heap
page read and write
1CA1556E000
heap
page read and write
4E21000
heap
page read and write
531A000
trusted library allocation
page read and write
19576613000
heap
page read and write
1CA15A03000
heap
page read and write
1CA15589000
heap
page read and write
4C42000
direct allocation
page read and write
85FF97B000
stack
page read and write
249B4135000
heap
page read and write
3447000
heap
page read and write
32D4000
heap
page read and write
1BCA7990000
trusted library allocation
page read and write
347A000
heap
page read and write
1CA1558A000
heap
page read and write
32D4000
heap
page read and write
217F9930000
trusted library allocation
page read and write
249B4137000
heap
page read and write
1CA155C6000
heap
page read and write
5341000
trusted library allocation
page read and write
4E21000
heap
page read and write
32D4000
heap
page read and write
3278000
heap
page read and write
5A27977000
stack
page read and write
217F8E39000
heap
page read and write
8E0000
heap
page read and write
1CA15584000
heap
page read and write
3140000
heap
page read and write
217F8AD0000
heap
page read and write
249B39F5000
heap
page read and write
32D4000
heap
page read and write
ADDF000
stack
page read and write
96A72FF000
stack
page read and write
34CE000
heap
page read and write
1CA15568000
heap
page read and write
B51EBDB000
stack
page read and write
4C1F000
stack
page read and write
EBE000
heap
page read and write
DF0000
trusted library allocation
page read and write
1E9A4A02000
trusted library allocation
page read and write
B09E000
stack
page read and write
32D4000
heap
page read and write
249B4900000
heap
page read and write
153B000
heap
page read and write
249B38FA000
heap
page read and write
249B480C000
heap
page read and write
1BCA3610000
trusted library section
page readonly
1F2D2000000
heap
page read and write
1CA15582000
heap
page read and write
32D4000
heap
page read and write
1CA1556E000
heap
page read and write
32D4000
heap
page read and write
308C000
stack
page read and write
531A000
trusted library allocation
page read and write
C4909FF000
stack
page read and write
217F8C5E000
heap
page read and write
2A5C17D5000
heap
page read and write
13C0000
trusted library allocation
page read and write
32D4000
heap
page read and write
1BCA7D00000
heap
page read and write
5230000
trusted library allocation
page read and write
1BCA7E90000
remote allocation
page read and write
32D4000
heap
page read and write
5007000
trusted library allocation
page read and write
1CA15582000
heap
page read and write
4E21000
heap
page read and write
EBD000
heap
page read and write
1CA155B5000
heap
page read and write
304E000
stack
page read and write
170237CD000
heap
page read and write
249B4125000
heap
page read and write
1BCA3983000
trusted library allocation
page read and write
5329000
trusted library allocation
page read and write
1E9A4252000
heap
page read and write
1702382D000
heap
page read and write
249B39FD000
heap
page read and write
10085000
unkown
page read and write
2E9A5FF000
stack
page read and write
73B2D79000
stack
page read and write
249B3884000
heap
page read and write
32D4000
heap
page read and write
4E21000
heap
page read and write
1BCA35C0000
trusted library section
page readonly
85FF67B000
stack
page read and write
53E6000
trusted library allocation
page read and write
D20000
heap
page read and write
1CA155A5000
heap
page read and write
2E9A4FC000
stack
page read and write
32D4000
heap
page read and write
1BCA7CFD000
heap
page read and write
D7E000
stack
page read and write
4B80000
direct allocation
page read and write
17023830000
heap
page read and write
249B385F000
heap
page read and write
17023812000
heap
page read and write
1F2D2062000
heap
page read and write
32D4000
heap
page read and write
32D4000
heap
page read and write
10072000
unkown
page readonly
B51F0FA000
stack
page read and write
5A273CE000
stack
page read and write
1BCA2F18000
heap
page read and write
EB5000
heap
page read and write
1CA15550000
heap
page read and write
532F000
trusted library allocation
page read and write
4E21000
heap
page read and write
1BCA7B60000
trusted library allocation
page read and write
32D4000
heap
page read and write
1957663C000
heap
page read and write
170237D9000
heap
page read and write
1303000
heap
page read and write
38BE2F7000
stack
page read and write
249B4819000
heap
page read and write
131B000
heap
page read and write
1BCA248A000
heap
page read and write
759CACB000
stack
page read and write
1C922EA3000
heap
page read and write
AE5B000
stack
page read and write
17023814000
heap
page read and write
3439000
heap
page read and write
34D2000
heap
page read and write
32D4000
heap
page read and write
17023814000
heap
page read and write
1CA15589000
heap
page read and write
4E21000
heap
page read and write
B85A67B000
stack
page read and write
1CA155B2000
heap
page read and write
531A000
trusted library allocation
page read and write
1B1399D0000
trusted library allocation
page read and write
1702382D000
heap
page read and write
1BCA7E00000
trusted library allocation
page read and write
1CA155AC000
heap
page read and write
38BE1F9000
stack
page read and write
4CD0000
heap
page read and write
3245000
heap
page read and write
4E21000
heap
page read and write
1C9230F5000
heap
page read and write
31AA000
heap
page read and write
1CA1558E000
heap
page read and write
1B139A02000
heap
page read and write
19576600000
heap
page read and write
249B383D000
heap
page read and write
85FF77E000
stack
page read and write
4DD2000
direct allocation
page read and write
4C70000
heap
page read and write
4E21000
heap
page read and write
4E21000
heap
page read and write
EB9000
heap
page read and write
123E000
stack
page read and write
2E9A27E000
stack
page read and write
1CA1558D000
heap
page read and write
17023814000
heap
page read and write
1CA155B5000
heap
page read and write
1BCA2F13000
heap
page read and write
1CA15582000
heap
page read and write
32D4000
heap
page read and write
1BCA2473000
heap
page read and write
3439000
heap
page read and write
52E2000
trusted library allocation
page read and write
608F000
stack
page read and write
1C922E80000
heap
page read and write
1C922E92000
heap
page read and write
17023812000
heap
page read and write
32D4000
heap
page read and write
2F70000
trusted library allocation
page read and write
170235F0000
heap
page read and write
4E21000
heap
page read and write
96A73FC000
stack
page read and write
249B3863000
heap
page read and write
5260000
heap
page read and write
32D4000
heap
page read and write
5320000
trusted library allocation
page read and write
724F7BE000
stack
page read and write
249B384C000
heap
page read and write
EBA000
heap
page read and write
4BA3000
direct allocation
page read and write
C4908FE000
stack
page read and write
1CA14A65000
heap
page read and write
1CA15589000
heap
page read and write
52C0000
trusted library allocation
page read and write
B51F87F000
stack
page read and write
1CA15589000
heap
page read and write
1CA15568000
heap
page read and write
10001000
unkown
page execute read
532F000
trusted library allocation
page read and write
249B36D0000
heap
page read and write
4E21000
heap
page read and write
1BCA2502000
heap
page read and write
D8C000
stack
page read and write
3426000
heap
page read and write
1CA1558E000
heap
page read and write
4E21000
heap
page read and write
B51F67E000
stack
page read and write
38BE07B000
stack
page read and write
10BA000
heap
page read and write
217F8E35000
heap
page read and write
DBF000
stack
page read and write
1290000
heap
page read and write
1C922E60000
heap
page read and write
10089000
unkown
page read and write
3290000
trusted library allocation
page read and write
1702379B000
heap
page read and write
32D4000
heap
page read and write
1CA14A60000
heap
page read and write
4E21000
heap
page read and write
249B3889000
heap
page read and write
1CA14A55000
heap
page read and write
4E21000
heap
page read and write
4FFD000
stack
page read and write
4BEE000
stack
page read and write
1CA1559B000
heap
page read and write
1CA1559F000
heap
page read and write
249B39ED000
heap
page read and write
34BC000
heap
page read and write
4E21000
heap
page read and write
1CA1556B000
heap
page read and write
1BCA7CB8000
heap
page read and write
249B38E3000
heap
page read and write
3435000
heap
page read and write
4E21000
heap
page read and write
1CA14910000
heap
page read and write
85FF11B000
stack
page read and write
249B4802000
heap
page read and write
1F2D2113000
heap
page read and write
1F2D205E000
heap
page read and write
170238C0000
remote allocation
page read and write
2A5C17D0000
heap
page read and write
2E9A37E000
stack
page read and write
1CA15593000
heap
page read and write
50EE000
stack
page read and write
1CA1558A000
heap
page read and write
249B3869000
heap
page read and write
531A000
trusted library allocation
page read and write
50AF000
stack
page read and write
1C922D10000
heap
page read and write
EC4000
heap
page read and write
53C1000
trusted library allocation
page read and write
1BCA2330000
heap
page read and write
5320000
trusted library allocation
page read and write
249B4123000
heap
page read and write
1030000
trusted library allocation
page read and write
19576629000
heap
page read and write
17023812000
heap
page read and write
34BC000
heap
page read and write
32D4000
heap
page read and write
E9A000
heap
page read and write
1BCA3980000
trusted library allocation
page read and write
217F8E10000
trusted library allocation
page read and write
1CA14A13000
heap
page read and write
AE1D000
stack
page read and write
4E21000
heap
page read and write
724FB7C000
stack
page read and write
1CA155B5000
heap
page read and write
1B13A202000
trusted library allocation
page read and write
345A000
heap
page read and write
3458000
heap
page read and write
1CA1559F000
heap
page read and write
19576676000
heap
page read and write
1CA15584000
heap
page read and write
96A6F3E000
stack
page read and write
2E9A3FB000
stack
page read and write
1BCA246E000
heap
page read and write
32D4000
heap
page read and write
10085000
unkown
page read and write
10089000
unkown
page read and write
5337000
trusted library allocation
page read and write
4E21000
heap
page read and write
172587F000
stack
page read and write
1F2D2082000
heap
page read and write
31A0000
heap
page read and write
217F8DB0000
trusted library allocation
page read and write
32B0000
heap
page read and write
759D27F000
stack
page read and write
4C30000
heap
page read and write
1CA15583000
heap
page read and write
1BCA24A0000
heap
page read and write
217F8DA0000
trusted library allocation
page read and write
1E9A4200000
heap
page read and write
32D4000
heap
page read and write
98B000
stack
page read and write
1F2D2069000
heap
page read and write
217F8D10000
heap
page read and write
32D5000
heap
page read and write
E6E000
stack
page read and write
4E21000
heap
page read and write
1F2D2100000
heap
page read and write
1BCA7C2B000
heap
page read and write
1CA14A63000
heap
page read and write
1BCA2320000
heap
page read and write
1CA1556C000
heap
page read and write
DE7000
heap
page read and write
1BCA3600000
trusted library section
page readonly
2E99FBA000
stack
page read and write
170239E0000
heap
page read and write
4E21000
heap
page read and write
4E21000
heap
page read and write
1C9230F0000
heap
page read and write
19576708000
heap
page read and write
4E40000
heap
page read and write
1008C000
unkown
page readonly
30F0000
remote allocation
page read and write
1CA14A5E000
heap
page read and write
1E9A4260000
heap
page read and write
30F0000
remote allocation
page read and write
10001000
unkown
page execute read
249B4002000
heap
page read and write
1CA14AE4000
heap
page read and write
1CA1559B000
heap
page read and write
19576713000
heap
page read and write
170237BB000
heap
page read and write
217F8C20000
heap
page read and write
354F000
stack
page read and write
1E9A4313000
heap
page read and write
There are 1002 hidden memdumps, click here to show them.