IOC Report
ijexogdf64.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,JdXfbK
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,MDlQdmktXg
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\ijexogdf64.dll,VejwwBbES
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",JdXfbK
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",MDlQdmktXg
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",VejwwBbES
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",XeZsfh
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",YqufWwLNu
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\ijexogdf64.dll"
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\ijexogdf64.dll",#1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
peranistaer.top
malicious
ultomductingbig.pro
malicious
klareqvino.com
malicious
gruvihabralo.nl
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1F73E077000
heap
page read and write
malicious
180001000
direct allocation
page execute read
malicious
2AD77866000
heap
page read and write
157F89A0000
heap
page read and write
157F8838000
heap
page read and write
2130E8F0000
heap
page read and write
2130EA13000
heap
page read and write
157F8C74000
heap
page read and write
1EB9B413000
heap
page read and write
2B066E18000
heap
page read and write
D132C7E000
stack
page read and write
21E36260000
heap
page read and write
21E37190000
trusted library allocation
page read and write
157F89FD000
heap
page read and write
157F8834000
heap
page read and write
27ADAE35000
heap
page read and write
157F8D10000
heap
page read and write
157F894C000
heap
page read and write
1999EC41000
heap
page read and write
8EA57FF000
stack
page read and write
21E36ED0000
trusted library allocation
page read and write
27ADAA80000
heap
page read and write
2AD777E0000
trusted library allocation
page read and write
103AFC000
stack
page read and write
157F89D0000
heap
page read and write
186F11C000
stack
page read and write
157F8CF7000
heap
page read and write
157F82C0000
trusted library allocation
page read and write
1ACAA2ED000
heap
page read and write
157F33AF000
heap
page read and write
157F33F3000
heap
page read and write
157F82CE000
trusted library allocation
page read and write
1ACAAB85000
heap
page read and write
10CF2064000
heap
page read and write
157F8C44000
heap
page read and write
2AD77913000
heap
page read and write
1D9D3C28000
heap
page read and write
157F2A3C000
heap
page read and write
11CE5318000
heap
page read and write
C1125AA000
stack
page read and write
2130EA00000
heap
page read and write
157F8C52000
heap
page read and write
186F47E000
stack
page read and write
2002DA00000
heap
page read and write
46787E000
stack
page read and write
157F8C4F000
heap
page read and write
1ACAA308000
heap
page read and write
157F82A1000
trusted library allocation
page read and write
157F35E3000
heap
page read and write
46747F000
stack
page read and write
20CE2C00000
heap
page read and write
212E9F13000
heap
page read and write
157F8856000
heap
page read and write
24899587000
heap
page read and write
157F8420000
trusted library allocation
page read and write
157F8470000
trusted library allocation
page read and write
2AD77902000
heap
page read and write
157F8DAB000
heap
page read and write
157F84F0000
trusted library allocation
page read and write
157F8C86000
heap
page read and write
157F89C0000
heap
page read and write
1D9D4190000
trusted library allocation
page read and write
2130F302000
heap
page read and write
2130EA92000
heap
page read and write
157F8CA7000
heap
page read and write
E7EAA7F000
stack
page read and write
21314080000
trusted library allocation
page read and write
1451F470000
heap
page read and write
1EB9B200000
heap
page read and write
212EA602000
trusted library allocation
page read and write
11CE5685000
heap
page read and write
157F882C000
heap
page read and write
157F8CEF000
heap
page read and write
EBFBF1B000
stack
page read and write
2AD7788F000
heap
page read and write
2B066FB5000
heap
page read and write
1451F688000
heap
page read and write
157F8DF0000
heap
page read and write
157F332E000
heap
page read and write
12F63500000
heap
page read and write
E7EA1CC000
stack
page read and write
895E97E000
stack
page read and write
157F85F0000
remote allocation
page read and write
1999EC55000
heap
page read and write
157F8963000
heap
page read and write
11D107B000
stack
page read and write
157F8D13000
heap
page read and write
1ACAAB7E000
heap
page read and write
1ACAA24B000
heap
page read and write
2130F202000
heap
page read and write
157F8834000
heap
page read and write
157F89BA000
heap
page read and write
157F33CA000
heap
page read and write
248994C0000
heap
page read and write
B57E47F000
stack
page read and write
157F8DAA000
heap
page read and write
157F8923000
heap
page read and write
EBFCBFC000
stack
page read and write
46727F000
stack
page read and write
157F35CB000
heap
page read and write
157F8CC2000
heap
page read and write
46777F000
stack
page read and write
157F4100000
trusted library allocation
page read and write
1999EC3E000
heap
page read and write
157F843C000
trusted library allocation
page read and write
212E9E76000
heap
page read and write
157F89C5000
heap
page read and write
157F8D7A000
heap
page read and write
21E362AC000
heap
page read and write
1451F66D000
heap
page read and write
157F8D69000
heap
page read and write
157F3327000
heap
page read and write
2002DA02000
heap
page read and write
1ACAA2A9000
heap
page read and write
E7EA77E000
stack
page read and write
2130F1F0000
trusted library allocation
page read and write
157F8CA9000
heap
page read and write
157F340A000
heap
page read and write
B7F3C7E000
stack
page read and write
248994E0000
heap
page read and write
157F89B0000
heap
page read and write
157F8D24000
heap
page read and write
1C29E850000
heap
page read and write
157F8994000
heap
page read and write
157F82C0000
trusted library allocation
page read and write
157F89F2000
heap
page read and write
1999EC43000
heap
page read and write
1999EC45000
heap
page read and write
157F8C32000
heap
page read and write
24899860000
heap
page read and write
157F8430000
trusted library allocation
page read and write
1ACAA8F0000
remote allocation
page read and write
1ACAA250000
heap
page read and write
213142FF000
heap
page read and write
72F4D7C000
stack
page read and write
79599DB000
stack
page read and write
157F8CD3000
heap
page read and write
157F882F000
heap
page read and write
157F8CA1000
heap
page read and write
157F8993000
heap
page read and write
21314256000
heap
page read and write
1999EBF0000
trusted library allocation
page read and write
157F8839000
heap
page read and write
2FC48FE000
stack
page read and write
157F82D0000
trusted library allocation
page read and write
157F8963000
heap
page read and write
157F8434000
trusted library allocation
page read and write
24EBBE70000
heap
page read and write
24EBBF20000
heap
page read and write
157F89FA000
heap
page read and write
21E361D0000
heap
page read and write
1C29E870000
heap
page read and write
2130FE20000
trusted library allocation
page read and write
2130EA8B000
heap
page read and write
21313FF0000
trusted library allocation
page read and write
795A07E000
stack
page read and write
C3A02DC000
stack
page read and write
213142AF000
heap
page read and write
2002DA8A000
heap
page read and write
D13293C000
stack
page read and write
157F8DDC000
heap
page read and write
1219AC000
stack
page read and write
288C2490000
heap
page read and write
157F8CD8000
heap
page read and write
2130EAAB000
heap
page read and write
186F19E000
stack
page read and write
1F73DFF0000
heap
page read and write
1D9D39D0000
heap
page read and write
157F8DB4000
heap
page read and write
157F8900000
heap
page read and write
1999EC50000
heap
page read and write
157F8DA6000
heap
page read and write
157F882F000
heap
page read and write
1ACAB002000
heap
page read and write
1ACAAB4C000
heap
page read and write
157F8C60000
heap
page read and write
212E9E66000
heap
page read and write
2130EB02000
heap
page read and write
597487F000
stack
page read and write
157F8DB7000
heap
page read and write
157F89BA000
heap
page read and write
1DFF4290000
heap
page read and write
1D9D3C02000
heap
page read and write
5E86EFF000
stack
page read and write
157F8CFD000
heap
page read and write
2B066E10000
heap
page read and write
157F89EC000
heap
page read and write
1999EC46000
heap
page read and write
1451F4E0000
heap
page read and write
157F33C4000
heap
page read and write
1EB9BC02000
trusted library allocation
page read and write
EBFC47C000
stack
page read and write
157F8CEF000
heap
page read and write
1ACAA313000
heap
page read and write
157F89E5000
heap
page read and write
157F8DDC000
heap
page read and write
157F8D39000
heap
page read and write
2130EB16000
heap
page read and write
157F89E8000
heap
page read and write
2B066FB0000
heap
page read and write
157F8710000
trusted library allocation
page read and write
72F4FFF000
stack
page read and write
21314303000
heap
page read and write
157F35B6000
heap
page read and write
157F8D7F000
heap
page read and write
157F8969000
heap
page read and write
7FFC66E00000
unkown
page readonly
2002D8D0000
heap
page read and write
157F82D4000
trusted library allocation
page read and write
1C29E910000
heap
page read and write
21E36EC0000
trusted library allocation
page read and write
1ACAA302000
heap
page read and write
139DB7E000
stack
page read and write
1ACAAB8D000
heap
page read and write
157F8C1C000
heap
page read and write
21314080000
trusted library allocation
page read and write
212E9D60000
heap
page read and write
2131423E000
heap
page read and write
1ACAA2DB000
heap
page read and write
157F2890000
heap
page read and write
20CE2C5F000
heap
page read and write
157F82DA000
trusted library allocation
page read and write
1EB9B437000
heap
page read and write
157F82D0000
trusted library allocation
page read and write
E7EA6FB000
stack
page read and write
157F82C0000
trusted library allocation
page read and write
1451F640000
heap
page read and write
157F882D000
heap
page read and write
20CE3202000
trusted library allocation
page read and write
157F8C05000
heap
page read and write
21315000000
heap
page read and write
12F63569000
heap
page read and write
72F50FD000
stack
page read and write
157F8C02000
heap
page read and write
157F89C0000
heap
page read and write
EBFCD79000
stack
page read and write
2002D940000
heap
page read and write
2AD77888000
heap
page read and write
2130F358000
heap
page read and write
10CF2102000
heap
page read and write
157F882D000
heap
page read and write
1999EC6E000
heap
page read and write
157F8C0F000
heap
page read and write
EBFC77B000
stack
page read and write
157F89C1000
heap
page read and write
157F8915000
heap
page read and write
157F899D000
heap
page read and write
1C2A0460000
heap
page read and write
157F8C5B000
heap
page read and write
157F8C29000
heap
page read and write
157F35EF000
heap
page read and write
157F8C7E000
heap
page read and write
1ACAA2B3000
heap
page read and write
248995AF000
heap
page read and write
1999EC69000
heap
page read and write
1ACAAB3D000
heap
page read and write
157F33D9000
heap
page read and write
2FC437B000
stack
page read and write
157F8650000
trusted library allocation
page read and write
157F8C0A000
heap
page read and write
12F65120000
heap
page read and write
46757D000
stack
page read and write
157F8C91000
heap
page read and write
157F8C48000
heap
page read and write
C3F00FF000
stack
page read and write
157F896B000
heap
page read and write
2130F304000
heap
page read and write
157F331D000
heap
page read and write
157F8C38000
heap
page read and write
21314302000
heap
page read and write
157F8853000
heap
page read and write
157F8C40000
heap
page read and write
2FC427E000
stack
page read and write
2A5A62B0000
heap
page read and write
212E9F02000
heap
page read and write
157F8D9D000
heap
page read and write
72F4EFE000
stack
page read and write
2130F9E0000
trusted library allocation
page read and write
B57E1CF000
stack
page read and write
21313FE0000
trusted library allocation
page read and write
1D9D39C0000
heap
page read and write
157F8D35000
heap
page read and write
157F8DAF000
heap
page read and write
157F8D0C000
heap
page read and write
248995A1000
heap
page read and write
11D11FE000
stack
page read and write
1ACAA253000
heap
page read and write
157F2990000
trusted library allocation
page read and write
10CF20BC000
heap
page read and write
157F8C61000
heap
page read and write
2002DA70000
heap
page read and write
157F8C05000
heap
page read and write
157F83F0000
trusted library allocation
page read and write
21314110000
trusted library allocation
page read and write
212E9E3C000
heap
page read and write
213140D0000
trusted library allocation
page read and write
10CF2932000
heap
page read and write
20CE2A00000
heap
page read and write
157F8826000
heap
page read and write
1ACAAB13000
heap
page read and write
1999EC4C000
heap
page read and write
E7EA4FE000
stack
page read and write
157F8D70000
heap
page read and write
157F8D73000
heap
page read and write
157F82E2000
trusted library allocation
page read and write
5E87079000
stack
page read and write
1D9D3C00000
heap
page read and write
288C2498000
heap
page read and write
157F8CEF000
heap
page read and write
157F3202000
heap
page read and write
121CFF000
stack
page read and write
157F8E02000
heap
page read and write
157F8C1E000
heap
page read and write
1D9D3C62000
heap
page read and write
157F8C70000
heap
page read and write
157F899A000
heap
page read and write
11CE5680000
heap
page read and write
21E361D9000
heap
page read and write
157F843C000
trusted library allocation
page read and write
10CF2088000
heap
page read and write
157F33CD000
heap
page read and write
157F82C0000
trusted library allocation
page read and write
157F8CF5000
heap
page read and write
180002000
direct allocation
page readonly
157F8C4A000
heap
page read and write
157F3543000
heap
page read and write
1999EC4F000
heap
page read and write
157F89B6000
heap
page read and write
11CE54E0000
heap
page read and write
1ACAAB7C000
heap
page read and write
1999EC66000
heap
page read and write
157F82CE000
trusted library allocation
page read and write
157F345A000
heap
page read and write
10CF2023000
heap
page read and write
20CE2C02000
heap
page read and write
2AD77813000
heap
page read and write
157F882D000
heap
page read and write
157F89D2000
heap
page read and write
157F8CC4000
heap
page read and write
2B068850000
heap
page read and write
10CF20CA000
heap
page read and write
157F8C78000
heap
page read and write
157F8862000
heap
page read and write
157F3575000
heap
page read and write
21314230000
heap
page read and write
157F8720000
trusted library allocation
page read and write
157F89C1000
heap
page read and write
157F8434000
trusted library allocation
page read and write
21E36450000
trusted library allocation
page read and write
103DFC000
stack
page read and write
157F2A71000
heap
page read and write
157F8C2E000
heap
page read and write
157F3EC0000
trusted library section
page readonly
248995A1000
heap
page read and write
1ACAA281000
heap
page read and write
2130E8E0000
heap
page read and write
157F8510000
trusted library allocation
page read and write
8EA547B000
stack
page read and write
1D9D3A30000
heap
page read and write
895E8FE000
stack
page read and write
157F336F000
heap
page read and write
1451F672000
heap
page read and write
7959CFE000
stack
page read and write
1ACAA213000
heap
page read and write
157F8D6E000
heap
page read and write
20CE2C3C000
heap
page read and write
20CE3190000
remote allocation
page read and write
157F894B000
heap
page read and write
213142C1000
heap
page read and write
C112AFC000
stack
page read and write
12F63490000
heap
page read and write
213142E6000
heap
page read and write
1999EC47000
heap
page read and write
157F3D60000
trusted library allocation
page read and write
24899583000
heap
page read and write
21313FD0000
trusted library allocation
page read and write
288C26F5000
heap
page read and write
157F8810000
heap
page read and write
157F8C1A000
heap
page read and write
157F8C03000
heap
page read and write
157F8D46000
heap
page read and write
157F40D1000
trusted library allocation
page read and write
157F2B8E000
heap
page read and write
2FC47FF000
unkown
page read and write
157F35D7000
heap
page read and write
1ACAA2C5000
heap
page read and write
157F8D0E000
heap
page read and write
C3A09FB000
stack
page read and write
157F8855000
heap
page read and write
157F356D000
heap
page read and write
157F3ED0000
trusted library section
page readonly
46767E000
stack
page read and write
7959C7E000
stack
page read and write
157F8C1B000
heap
page read and write
157F40F0000
trusted library allocation
page read and write
10CF20C1000
heap
page read and write
1D9D4202000
trusted library allocation
page read and write
D1329BF000
stack
page read and write
157F8922000
heap
page read and write
2131428C000
heap
page read and write
212E9D00000
heap
page read and write
157F82CC000
trusted library allocation
page read and write
157F8600000
remote allocation
page read and write
24899599000
heap
page read and write
11D13FE000
stack
page read and write
157F8C4C000
heap
page read and write
21E36250000
trusted library allocation
page read and write
157F8CF4000
heap
page read and write
157F82D0000
trusted library allocation
page read and write
2A5A6250000
heap
page read and write
157F8C3B000
heap
page read and write
157F8440000
trusted library allocation
page read and write
1ACAA2E2000
heap
page read and write
2AD77900000
heap
page read and write
157F8480000
trusted library allocation
page read and write
1F73E325000
heap
page read and write
11D0D7E000
stack
page read and write
157F8869000
heap
page read and write
24EBBD30000
heap
page read and write
157F3587000
heap
page read and write
157F8CF1000
heap
page read and write
157F8C90000
heap
page read and write
157F2A5B000
heap
page read and write
11D1EFD000
stack
page read and write
103D7E000
stack
page read and write
157F82DC000
trusted library allocation
page read and write
10CF2900000
heap
page read and write
157F3EE0000
trusted library section
page readonly
1EB9B402000
heap
page read and write
157F82DE000
trusted library allocation
page read and write
157F8800000
heap
page read and write
1ACAAB92000
heap
page read and write
1DFF429D000
heap
page read and write
11D1FFA000
stack
page read and write
157F2A43000
heap
page read and write
21314305000
heap
page read and write
288C25F0000
heap
page read and write
2AD776E0000
heap
page read and write
1ACAAB85000
heap
page read and write
157F8C2B000
heap
page read and write
157F89B6000
heap
page read and write
157F89EA000
heap
page read and write
157F8C88000
heap
page read and write
21E36430000
heap
page read and write
1EB9B424000
heap
page read and write
1999EC6B000
heap
page read and write
157F8CCD000
heap
page read and write
1999EC52000
heap
page read and write
157F8C8A000
heap
page read and write
157F8600000
remote allocation
page read and write
157F89B0000
heap
page read and write
157F8861000
heap
page read and write
157F882F000
heap
page read and write
157F8430000
trusted library allocation
page read and write
2B066C70000
heap
page read and write
157F882F000
heap
page read and write
1451F5E0000
trusted library allocation
page read and write
157F899D000
heap
page read and write
157F8C0B000
heap
page read and write
157F8DD4000
heap
page read and write
157F8C22000
heap
page read and write
213140F0000
trusted library allocation
page read and write
157F8430000
trusted library allocation
page read and write
11D18FA000
stack
page read and write
2130E980000
trusted library allocation
page read and write
157F8C55000
heap
page read and write
157F84A0000
trusted library allocation
page read and write
20CE2BD0000
trusted library allocation
page read and write
157F8C1B000
heap
page read and write
2FC4677000
stack
page read and write
1ACAA0D0000
heap
page read and write
157F8C57000
heap
page read and write
2A5A6230000
heap
page read and write
157F82DC000
trusted library allocation
page read and write
C1128FF000
stack
page read and write
157F8C8E000
heap
page read and write
1999EC49000
heap
page read and write
157F8CC8000
heap
page read and write
1999EC7F000
heap
page read and write
2FC4577000
stack
page read and write
2AD78002000
trusted library allocation
page read and write
11CE52A0000
heap
page read and write
157F8C34000
heap
page read and write
157F8C30000
heap
page read and write
157F8861000
heap
page read and write
157F8C7C000
heap
page read and write
157F896E000
heap
page read and write
157F8869000
heap
page read and write
157F894B000
heap
page read and write
157F8D5C000
heap
page read and write
157F8C11000
heap
page read and write
157F894B000
heap
page read and write
157F3358000
heap
page read and write
1999EC53000
heap
page read and write
157F843C000
trusted library allocation
page read and write
157F2A6E000
heap
page read and write
2130EB07000
heap
page read and write
248995A1000
heap
page read and write
1D9D3D13000
heap
page read and write
157F82C5000
trusted library allocation
page read and write
157F8D94000
heap
page read and write
157F89EC000
heap
page read and write
21313FB8000
trusted library allocation
page read and write
157F8DB2000
heap
page read and write
157F8CD2000
heap
page read and write
157F89C2000
heap
page read and write
157F8C0B000
heap
page read and write
157F3A40000
trusted library allocation
page read and write
DB1A5FB000
stack
page read and write
1D9D3C40000
heap
page read and write
DB1A08B000
stack
page read and write
11D167A000
stack
page read and write
10437F000
stack
page read and write
11D17FE000
stack
page read and write
157F2A43000
heap
page read and write
157F8DFC000
heap
page read and write
157F3458000
heap
page read and write
157F8C29000
heap
page read and write
E7EA47E000
stack
page read and write
157F8C15000
heap
page read and write
157F8869000
heap
page read and write
157F33C8000
heap
page read and write
2A5A62B8000
heap
page read and write
1ACAB000000
heap
page read and write
157F8869000
heap
page read and write
21314110000
remote allocation
page read and write
157F35B9000
heap
page read and write
157F8400000
trusted library allocation
page read and write
157F8D16000
heap
page read and write
157F8C98000
heap
page read and write
157F8838000
heap
page read and write
157F8826000
heap
page read and write
12F63910000
heap
page read and write
1999EC76000
heap
page read and write
1ACAA265000
heap
page read and write
467A7E000
stack
page read and write
1D9D3C68000
heap
page read and write
72F527D000
stack
page read and write
157F8968000
heap
page read and write
157F89EE000
heap
page read and write
C112978000
stack
page read and write
157F894E000
heap
page read and write
157F8826000
heap
page read and write
157F8D59000
heap
page read and write
157F8CC1000
heap
page read and write
2AD77860000
heap
page read and write
21E36268000
heap
page read and write
157F332C000
heap
page read and write
157F884D000
heap
page read and write
2002DA4D000
heap
page read and write
157F8325000
trusted library allocation
page read and write
157F8826000
heap
page read and write
21314410000
trusted library allocation
page read and write
157F8D83000
heap
page read and write
157F89F6000
heap
page read and write
1EB9B431000
heap
page read and write
8EA54FE000
stack
page read and write
157F892B000
heap
page read and write
1ACAAB92000
heap
page read and write
157F8837000
heap
page read and write
157F8C4B000
heap
page read and write
1ACAAB94000
heap
page read and write
2002DA3C000
heap
page read and write
157F8C2C000
heap
page read and write
20CE2C13000
heap
page read and write
157F89B6000
heap
page read and write
157F8C53000
heap
page read and write
1F73E240000
unclassified section
page execute and read and write
157F8D2F000
heap
page read and write
157F82BC000
trusted library allocation
page read and write
157F29B0000
trusted library allocation
page read and write
157F84C0000
trusted library allocation
page read and write
1ACAA2AA000
heap
page read and write
157F830E000
trusted library allocation
page read and write
157F8CDD000
heap
page read and write
11D147E000
stack
page read and write
21E36E50000
trusted library allocation
page read and write
157F8826000
heap
page read and write
27ADACC0000
heap
page read and write
1ACAA1D0000
trusted library allocation
page read and write
157F8C65000
heap
page read and write
157F8C72000
heap
page read and write
157F2A8F000
heap
page read and write
2130F318000
heap
page read and write
24EBD9E0000
heap
page read and write
7959F7E000
stack
page read and write
2AD77827000
heap
page read and write
213140E0000
trusted library allocation
page read and write
157F885F000
heap
page read and write
157F82D0000
trusted library allocation
page read and write
212E9E82000
heap
page read and write
157F8C4E000
heap
page read and write
2130EAFD000
heap
page read and write
157F8D92000
heap
page read and write
157F883D000
heap
page read and write
1999EB60000
heap
page read and write
157F8CAA000
heap
page read and write
157F8C6C000
heap
page read and write
157F8420000
trusted library allocation
page read and write
21313FF4000
trusted library allocation
page read and write
B57E14C000
stack
page read and write
157F8869000
heap
page read and write
157F8420000
trusted library allocation
page read and write
2FC49FD000
stack
page read and write
157F331D000
heap
page read and write
24899591000
heap
page read and write
2002DA4B000
heap
page read and write
157F8C72000
heap
page read and write
1EB9B443000
heap
page read and write
466BCB000
stack
page read and write
157F8D4E000
heap
page read and write
157F89D6000
heap
page read and write
157F2A57000
heap
page read and write
1ACAA2F4000
heap
page read and write
1999EC7E000
heap
page read and write
2130EA9D000
heap
page read and write
157F8C5C000
heap
page read and write
157F8420000
trusted library allocation
page read and write
1ACAAB92000
heap
page read and write
157F89B6000
heap
page read and write
1F73DF60000
heap
page read and write
157F8861000
heap
page read and write
72F4E7E000
stack
page read and write
157F8834000
heap
page read and write
10407C000
stack
page read and write
DB1A97C000
stack
page read and write
157F8826000
heap
page read and write
2002DA4F000
heap
page read and write
21313FB0000
trusted library allocation
page read and write
157F8C46000
heap
page read and write
157F2A85000
heap
page read and write
157F8D8F000
heap
page read and write
21314305000
heap
page read and write
1ACAAB90000
heap
page read and write
24899594000
heap
page read and write
157F8843000
heap
page read and write
157F8C97000
heap
page read and write
157F3F00000
trusted library section
page readonly
1DFF44A0000
heap
page read and write
180000000
direct allocation
page read and write
157F8540000
trusted library allocation
page read and write
157F8C76000
heap
page read and write
157F8982000
heap
page read and write
1999EC30000
heap
page read and write
2130EA71000
heap
page read and write
11D19FD000
stack
page read and write
E7EA97F000
stack
page read and write
2AD7783C000
heap
page read and write
212E9E29000
heap
page read and write
157F2820000
heap
page read and write
157F8C56000
heap
page read and write
11D0F7E000
stack
page read and write
1999EC54000
heap
page read and write
157F82A0000
trusted library allocation
page read and write
157F3D50000
trusted library allocation
page read and write
21314110000
remote allocation
page read and write
157F82DA000
trusted library allocation
page read and write
157F8850000
heap
page read and write
2130EA55000
heap
page read and write
1ACAAB7E000
heap
page read and write
2002E202000
trusted library allocation
page read and write
157F8C93000
heap
page read and write
157F8C06000
heap
page read and write
1ACAA288000
heap
page read and write
157F89FE000
heap
page read and write
157F8C29000
heap
page read and write
157F89B4000
heap
page read and write
157F8D1B000
heap
page read and write
212E9E61000
heap
page read and write
157F89EE000
heap
page read and write
1C29EB60000
heap
page read and write
1ACAAB5F000
heap
page read and write
2130EA41000
heap
page read and write
157F82D4000
trusted library allocation
page read and write
121C7F000
stack
page read and write
157F8963000
heap
page read and write
157F8826000
heap
page read and write
157F882D000
heap
page read and write
157F35F2000
heap
page read and write
157F82E0000
trusted library allocation
page read and write
157F883A000
heap
page read and write
1F73E2D0000
heap
page read and write
213142FD000
heap
page read and write
1ACAA2BF000
heap
page read and write
157F8C3A000
heap
page read and write
1D9D3D02000
heap
page read and write
4B2EA7C000
stack
page read and write
8EA58F7000
stack
page read and write
157F89E9000
heap
page read and write
157F8660000
trusted library allocation
page read and write
157F3569000
heap
page read and write
157F8CEF000
heap
page read and write
157F894B000
heap
page read and write
12F63520000
heap
page read and write
157F8922000
heap
page read and write
11D16FE000
stack
page read and write
157F8500000
trusted library allocation
page read and write
C11287E000
stack
page read and write
2130F200000
heap
page read and write
10CF1DE0000
heap
page read and write
157F8D00000
heap
page read and write
157F8922000
heap
page read and write
157F2A64000
heap
page read and write
157F2A94000
heap
page read and write
157F834C000
trusted library allocation
page read and write
212E9E5B000
heap
page read and write
157F882F000
heap
page read and write
2AD77908000
heap
page read and write
157F884F000
heap
page read and write
24899598000
heap
page read and write
21314110000
remote allocation
page read and write
20CE2C29000
heap
page read and write
157F82E0000
trusted library allocation
page read and write
1ACAA8F0000
remote allocation
page read and write
157F8834000
heap
page read and write
1999EC5D000
heap
page read and write
157F882D000
heap
page read and write
157F8869000
heap
page read and write
157F82D6000
trusted library allocation
page read and write
597456C000
stack
page read and write
157F8848000
heap
page read and write
157F89B0000
heap
page read and write
2130EA76000
heap
page read and write
157F8C4C000
heap
page read and write
1C29EB65000
heap
page read and write
157F8D53000
heap
page read and write
2002DB02000
heap
page read and write
2130EA8D000
heap
page read and write
157F8922000
heap
page read and write
1999EC48000
heap
page read and write
157F8C9D000
heap
page read and write
288C2440000
heap
page read and write
157F899D000
heap
page read and write
10CF2113000
heap
page read and write
103F7B000
stack
page read and write
DB1A18E000
stack
page read and write
103EFC000
stack
page read and write
11D1AFE000
stack
page read and write
157F84D0000
trusted library allocation
page read and write
157F8CEF000
heap
page read and write
1999EC13000
heap
page read and write
2130EA7B000
heap
page read and write
2A5A64E0000
heap
page read and write
157F882D000
heap
page read and write
1DFF4390000
heap
page read and write
1451F667000
heap
page read and write
157F82DE000
trusted library allocation
page read and write
157F8C7F000
heap
page read and write
157F89F4000
heap
page read and write
157F82C0000
trusted library allocation
page read and write
157F8C29000
heap
page read and write
2002DB08000
heap
page read and write
10CF2043000
heap
page read and write
895E87C000
stack
page read and write
157F89B0000
heap
page read and write
157F843C000
trusted library allocation
page read and write
24899582000
heap
page read and write
EBFC67E000
stack
page read and write
157F8C42000
heap
page read and write
157F358B000
heap
page read and write
157F899D000
heap
page read and write
1999EC85000
heap
page read and write
157F830A000
trusted library allocation
page read and write
21314300000
heap
page read and write
157F8802000
heap
page read and write
157F8922000
heap
page read and write
1D9D3C5A000
heap
page read and write
213140A0000
trusted library allocation
page read and write
1EB9B260000
heap
page read and write
10CF2802000
heap
page read and write
213141F0000
trusted library allocation
page read and write
212E9E4D000
heap
page read and write
157F3402000
heap
page read and write
157F8430000
trusted library allocation
page read and write
157F2BC2000
heap
page read and write
157F3EB0000
trusted library section
page readonly
157F8C13000
heap
page read and write
EBFC378000
stack
page read and write
11D1BF5000
stack
page read and write
157F8180000
trusted library allocation
page read and write
157F8CEF000
heap
page read and write
27ADAAF9000
heap
page read and write
288C2460000
heap
page read and write
2130EA58000
heap
page read and write
157F8C0D000
heap
page read and write
157F8996000
heap
page read and write
1ACAA316000
heap
page read and write
1ACAAB7C000
heap
page read and write
157F8434000
trusted library allocation
page read and write
157F830A000
trusted library allocation
page read and write
157F8C0D000
heap
page read and write
157F8190000
trusted library allocation
page read and write
157F8CEF000
heap
page read and write
1ACAABD3000
heap
page read and write
157F89D6000
heap
page read and write
1ACAB044000
heap
page read and write
157F8430000
trusted library allocation
page read and write
157F8C03000
heap
page read and write
46797F000
stack
page read and write
2130EB02000
heap
page read and write
2A5A6505000
heap
page read and write
157F882D000
heap
page read and write
157F899F000
heap
page read and write
1999EC51000
heap
page read and write
157F8420000
trusted library allocation
page read and write
11D1CFE000
stack
page read and write
2AD77680000
heap
page read and write
157F8D31000
heap
page read and write
1ACAA2EC000
heap
page read and write
157F341B000
heap
page read and write
21313EA0000
trusted library allocation
page read and write
139DAFE000
stack
page read and write
157F82E2000
trusted library allocation
page read and write
103C7F000
stack
page read and write
157F8C84000
heap
page read and write
157F8978000
heap
page read and write
213142F7000
heap
page read and write
11D157F000
stack
page read and write
157F82C5000
trusted library allocation
page read and write
157F355C000
heap
page read and write
157F8D14000
heap
page read and write
157F8D7C000
heap
page read and write
157F89EA000
heap
page read and write
157F8C7B000
heap
page read and write
157F82D4000
trusted library allocation
page read and write
4B2F07C000
stack
page read and write
1ACAAB94000
heap
page read and write
157F830E000
trusted library allocation
page read and write
157F8C99000
heap
page read and write
157F8993000
heap
page read and write
157F8D27000
heap
page read and write
157F8C5D000
heap
page read and write
1DFF43B0000
heap
page read and write
21E36270000
heap
page read and write
157F8C7A000
heap
page read and write
10CF1DF0000
heap
page read and write
8EA567C000
stack
page read and write
1ACAB002000
heap
page read and write
157F8D06000
heap
page read and write
8EA557E000
stack
page read and write
157F8CAD000
heap
page read and write
1D9D3D00000
heap
page read and write
212E9CF0000
heap
page read and write
157F35E8000
heap
page read and write
21E362C6000
heap
page read and write
213142AC000
heap
page read and write
157F35B0000
heap
page read and write
157F8C09000
heap
page read and write
10CF1F50000
trusted library allocation
page read and write
157F82D0000
trusted library allocation
page read and write
46717B000
stack
page read and write
2AD7787F000
heap
page read and write
DB1A4FC000
stack
page read and write
157F8C18000
heap
page read and write
157F3500000
heap
page read and write
157F8855000
heap
page read and write
1ACAAB92000
heap
page read and write
157F82C0000
trusted library allocation
page read and write
1EB9B452000
heap
page read and write
157F3400000
heap
page read and write
157F3FF0000
trusted library allocation
page read and write
1F73E320000
heap
page read and write
157F8DD1000
heap
page read and write
157F8922000
heap
page read and write
157F883C000
heap
page read and write
157F8838000
heap
page read and write
157F3302000
heap
page read and write
157F8D6B000
heap
page read and write
157F82D8000
trusted library allocation
page read and write
2130E9F0000
trusted library allocation
page read and write
157F8CC2000
heap
page read and write
157F86B0000
trusted library allocation
page read and write
20CE29A0000
heap
page read and write
157F8C0E000
heap
page read and write
1ACAA200000
heap
page read and write
157F89C1000
heap
page read and write
157F8D91000
heap
page read and write
1999EC70000
heap
page read and write
1999EC00000
heap
page read and write
21313FE0000
trusted library allocation
page read and write
157F82C8000
trusted library allocation
page read and write
27ADAAF0000
heap
page read and write
157F8813000
heap
page read and write
157F899D000
heap
page read and write
2130EAB9000
heap
page read and write
157F8968000
heap
page read and write
21E37140000
trusted library allocation
page read and write
157F8C29000
heap
page read and write
EBFCA7A000
stack
page read and write
157F82A0000
trusted library allocation
page read and write
213142DF000
heap
page read and write
157F8963000
heap
page read and write
157F8D57000
heap
page read and write
157F8963000
heap
page read and write
157F89E6000
heap
page read and write
157F8C66000
heap
page read and write
157F8D99000
heap
page read and write
20CE2D02000
heap
page read and write
157F89B6000
heap
page read and write
DB1A10E000
stack
page read and write
8EA577A000
stack
page read and write
21E362AC000
heap
page read and write
2002DA7F000
heap
page read and write
157F882D000
heap
page read and write
1C29E917000
heap
page read and write
157F882F000
heap
page read and write
157F843C000
trusted library allocation
page read and write
157F8DCB000
heap
page read and write
10417E000
stack
page read and write
157F8D4A000
heap
page read and write
21E36230000
heap
page read and write
212E9D90000
trusted library allocation
page read and write
157F8C80000
heap
page read and write
157F8C68000
heap
page read and write
157F8C29000
heap
page read and write
157F899D000
heap
page read and write
157F35C1000
heap
page read and write
157F8CBF000
heap
page read and write
157F8430000
trusted library allocation
page read and write
212E9E57000
heap
page read and write
157F8965000
heap
page read and write
157F8C08000
heap
page read and write
2002DA49000
heap
page read and write
24EBBE90000
heap
page read and write
212E9F08000
heap
page read and write
1451F652000
heap
page read and write
157F8C21000
heap
page read and write
2AD77851000
heap
page read and write
212E9F00000
heap
page read and write
157F8DB5000
heap
page read and write
C3A08FB000
stack
page read and write
157F8100000
trusted library allocation
page read and write
21313FD4000
trusted library allocation
page read and write
157F8C1F000
heap
page read and write
157F2A8A000
heap
page read and write
157F894E000
heap
page read and write
157F8C33000
heap
page read and write
157F89C7000
heap
page read and write
7FFC66E01000
unkown
page execute read
157F3D48000
trusted library allocation
page read and write
24899590000
heap
page read and write
157F89FB000
heap
page read and write
5E86F7F000
stack
page read and write
157F3215000
heap
page read and write
21313FBE000
trusted library allocation
page read and write
157F8C5F000
heap
page read and write
2AD7785C000
heap
page read and write
180003000
direct allocation
page read and write
27ADACE0000
heap
page read and write
157F8C51000
heap
page read and write
157F8862000
heap
page read and write
21314080000
trusted library allocation
page read and write
157F8D6C000
heap
page read and write
157F82C8000
trusted library allocation
page read and write
8EA5AFD000
stack
page read and write
157F8CA3000
heap
page read and write
157F8D75000
heap
page read and write
157F8861000
heap
page read and write
157F8490000
trusted library allocation
page read and write
157F8950000
heap
page read and write
2130F300000
heap
page read and write
157F8C07000
heap
page read and write
288C26F0000
heap
page read and write
157F8C61000
heap
page read and write
157F8D17000
heap
page read and write
5E87179000
stack
page read and write
C3A07FB000
stack
page read and write
1ACAA060000
heap
page read and write
1ACAA23C000
heap
page read and write
72F517F000
stack
page read and write
27ADAE30000
heap
page read and write
2FC3F7B000
stack
page read and write
157F8CE3000
heap
page read and write
1999ED02000
heap
page read and write
1999EC6C000
heap
page read and write
2130F313000
heap
page read and write
1D9D3C13000
heap
page read and write
2131424B000
heap
page read and write
11D177F000
stack
page read and write
1EB9B44A000
heap
page read and write
1ACAAA02000
heap
page read and write
157F86B3000
trusted library allocation
page read and write
21313FD1000
trusted library allocation
page read and write
21E37120000
heap
page readonly
157F89F8000
heap
page read and write
1451F713000
heap
page read and write
24EBBF90000
heap
page read and write
157F2830000
heap
page read and write
157F8420000
trusted library allocation
page read and write
1ACAAB94000
heap
page read and write
1D9D3C79000
heap
page read and write
10CF2013000
heap
page read and write
157F8834000
heap
page read and write
157F8D64000
heap
page read and write
157F899D000
heap
page read and write
157F8869000
heap
page read and write
157F8C00000
heap
page read and write
157F8C8C000
heap
page read and write
157F8C9F000
heap
page read and write
2AD77800000
heap
page read and write
157F8D1A000
heap
page read and write
157F8C71000
heap
page read and write
157F8981000
heap
page read and write
157F82A0000
trusted library allocation
page read and write
2AD7785F000
heap
page read and write
24EBBF99000
heap
page read and write
157F8C3D000
heap
page read and write
157F8862000
heap
page read and write
2AD77863000
heap
page read and write
157F84C0000
trusted library allocation
page read and write
157F8D68000
heap
page read and write
157F35CE000
heap
page read and write
157F8D62000
heap
page read and write
C3A0AFE000
stack
page read and write
157F3300000
heap
page read and write
157F883C000
heap
page read and write
157F8C29000
heap
page read and write
2130EAFD000
heap
page read and write
157F82D2000
trusted library allocation
page read and write
1451F600000
heap
page read and write
157F8D65000
heap
page read and write
2130EA78000
heap
page read and write
157F9010000
heap
page read and write
21314303000
heap
page read and write
157F8D50000
heap
page read and write
157F882F000
heap
page read and write
2002DB13000
heap
page read and write
157F8C77000
heap
page read and write
1999EC4A000
heap
page read and write
157F89F6000
heap
page read and write
11D0E7A000
stack
page read and write
10CF2000000
heap
page read and write
1999EBC0000
heap
page read and write
157F8C6B000
heap
page read and write
10CF1E50000
heap
page read and write
157F899D000
heap
page read and write
24899587000
heap
page read and write
20CE3190000
remote allocation
page read and write
B7F39CE000
stack
page read and write
7FFC66E55000
unkown
page readonly
21E36E60000
trusted library allocation
page read and write
1DFF4150000
heap
page read and write
157F8D78000
heap
page read and write
466FFB000
stack
page read and write
157F89D0000
heap
page read and write
157F8CAE000
heap
page read and write
139DA7C000
stack
page read and write
10CF20B9000
heap
page read and write
21314217000
heap
page read and write
1ACAA8F0000
remote allocation
page read and write
157F8CC8000
heap
page read and write
157F8CBA000
heap
page read and write
1ACAA24E000
heap
page read and write
157F8434000
trusted library allocation
page read and write
1999EB50000
heap
page read and write
1999EC75000
heap
page read and write
21313FF0000
trusted library allocation
page read and write
157F89FE000
heap
page read and write
1ACAAB00000
heap
page read and write
157F8943000
heap
page read and write
12F63915000
heap
page read and write
157F8D60000
heap
page read and write
157F8861000
heap
page read and write
157F894B000
heap
page read and write
157F8530000
trusted library allocation
page read and write
10369B000
stack
page read and write
157F899D000
heap
page read and write
2FC3FFE000
stack
page read and write
4B2ED7A000
stack
page read and write
21314200000
heap
page read and write
1EB9B210000
heap
page read and write
2130E9F3000
trusted library allocation
page read and write
157F3423000
heap
page read and write
157F8D5B000
heap
page read and write
21313FB0000
trusted library allocation
page read and write
1ACAA265000
heap
page read and write
157F8CD3000
heap
page read and write
1999EC2E000
heap
page read and write
157F8325000
trusted library allocation
page read and write
11CE5310000
heap
page read and write
157F8434000
trusted library allocation
page read and write
212E9E78000
heap
page read and write
1451F702000
heap
page read and write
1ACAA271000
heap
page read and write
157F8C29000
heap
page read and write
157F8834000
heap
page read and write
157F8963000
heap
page read and write
157F8CC4000
heap
page read and write
1EB9B502000
heap
page read and write
5E86E7C000
stack
page read and write
157F8C82000
heap
page read and write
157F8D7D000
heap
page read and write
157F8855000
heap
page read and write
157F882F000
heap
page read and write
157F2BEB000
heap
page read and write
C1129FF000
stack
page read and write
157F8CEF000
heap
page read and write
20CE3190000
remote allocation
page read and write
157F3200000
heap
page read and write
24899570000
heap
page read and write
212E9E76000
heap
page read and write
E7EA877000
stack
page read and write
12F63560000
heap
page read and write
157F8963000
heap
page read and write
21E362AC000
heap
page read and write
157F35F6000
heap
page read and write
1ACAA249000
heap
page read and write
11CE5500000
heap
page read and write
157F8CA5000
heap
page read and write
21313E20000
trusted library allocation
page read and write
21314263000
heap
page read and write
21E361D5000
heap
page read and write
C112A7E000
stack
page read and write
157F8963000
heap
page read and write
795A17F000
stack
page read and write
2FC477F000
stack
page read and write
157F8C36000
heap
page read and write
2002DA4A000
heap
page read and write
2FC4478000
stack
page read and write
157F2A13000
heap
page read and write
248995B0000
heap
page read and write
157F8663000
trusted library allocation
page read and write
157F885C000
heap
page read and write
11CE55F0000
heap
page read and write
157F8C6E000
heap
page read and write
157F8922000
heap
page read and write
21314100000
trusted library allocation
page read and write
10427D000
stack
page read and write
8EA59FE000
stack
page read and write
157F8941000
heap
page read and write
DB1A67F000
stack
page read and write
4B2EF7F000
stack
page read and write
157F8410000
trusted library allocation
page read and write
157F82D2000
trusted library allocation
page read and write
157F8869000
heap
page read and write
157F8DDF000
heap
page read and write
157F8C95000
heap
page read and write
157F82DC000
trusted library allocation
page read and write
2AD77829000
heap
page read and write
157F89E6000
heap
page read and write
2130FE01000
trusted library allocation
page read and write
157F8CBF000
heap
page read and write
157F8998000
heap
page read and write
157F8D2B000
heap
page read and write
1EB9B43E000
heap
page read and write
24EBBF25000
heap
page read and write
157F3EF0000
trusted library section
page readonly
1ACAABD5000
heap
page read and write
2002D8E0000
heap
page read and write
27ADC6C0000
heap
page read and write
24899865000
heap
page read and write
C3F017E000
stack
page read and write
157F8CAC000
heap
page read and write
EBFC57B000
stack
page read and write
157F8826000
heap
page read and write
157F8110000
trusted library allocation
page read and write
157F843C000
trusted library allocation
page read and write
2130F318000
heap
page read and write
DB1AA7F000
stack
page read and write
213140C0000
trusted library allocation
page read and write
157F3565000
heap
page read and write
157F893C000
heap
page read and write
11D0C7C000
stack
page read and write
157F8410000
trusted library allocation
page read and write
157F8CEF000
heap
page read and write
24899593000
heap
page read and write
157F8C63000
heap
page read and write
4B2EE79000
stack
page read and write
C3F007C000
stack
page read and write
1ACAAB84000
heap
page read and write
157F8853000
heap
page read and write
157F82C0000
trusted library allocation
page read and write
2130F215000
heap
page read and write
157F33E1000
heap
page read and write
157F9010000
heap
page read and write
DB1A777000
stack
page read and write
157F8D89000
heap
page read and write
2002D970000
trusted library allocation
page read and write
157F8340000
trusted library allocation
page read and write
212E9E00000
heap
page read and write
157F8360000
trusted library allocation
page read and write
157F883F000
heap
page read and write
157F8C3E000
heap
page read and write
1ACAA2EA000
heap
page read and write
157F82CC000
trusted library allocation
page read and write
7C9A6FD000
stack
page read and write
1999F402000
trusted library allocation
page read and write
157F8834000
heap
page read and write
2002DA4E000
heap
page read and write
B7F394C000
stack
page read and write
157F89E5000
heap
page read and write
157F8834000
heap
page read and write
2B066DD0000
heap
page read and write
157F8C16000
heap
page read and write
24899390000
heap
page read and write
157F8DA2000
heap
page read and write
1451FE02000
trusted library allocation
page read and write
212E9E5E000
heap
page read and write
157F894B000
heap
page read and write
157F82BC000
trusted library allocation
page read and write
2AD7787F000
heap
page read and write
2A5A6500000
heap
page read and write
2002DB00000
heap
page read and write
2002DA29000
heap
page read and write
1999EC2A000
heap
page read and write
1451F602000
heap
page read and write
157F8D39000
heap
page read and write
59745EF000
stack
page read and write
157F33CF000
heap
page read and write
2002DA13000
heap
page read and write
157F8CC6000
heap
page read and write
10CF206D000
heap
page read and write
1ACAA070000
heap
page read and write
1F73DFD0000
heap
page read and write
157F89C4000
heap
page read and write
21E361C0000
heap
page read and write
11D10F9000
stack
page read and write
157F8826000
heap
page read and write
2B066DB0000
heap
page read and write
157F89F0000
heap
page read and write
157F8964000
heap
page read and write
2130E950000
heap
page read and write
1451F480000
heap
page read and write
EBFCF7F000
stack
page read and write
DB1A87E000
stack
page read and write
157F2A28000
heap
page read and write
21313E90000
trusted library allocation
page read and write
1C29E710000
heap
page read and write
5E86FFA000
stack
page read and write
157F3390000
heap
page read and write
11D12FA000
stack
page read and write
1F73E070000
heap
page read and write
157F82D6000
trusted library allocation
page read and write
157F885B000
heap
page read and write
157F8C0F000
heap
page read and write
72F49AB000
stack
page read and write
20CE2990000
heap
page read and write
157F8C64000
heap
page read and write
7959E7E000
stack
page read and write
157F8CC6000
heap
page read and write
157F8D47000
heap
page read and write
1ACAA229000
heap
page read and write
2AD77670000
heap
page read and write
157F8922000
heap
page read and write
157F82D8000
trusted library allocation
page read and write
1999EC7C000
heap
page read and write
157F8C59000
heap
page read and write
2130EA29000
heap
page read and write
21E37110000
trusted library allocation
page read and write
1EB9B400000
heap
page read and write
157F894F000
heap
page read and write
157F8858000
heap
page read and write
212E9E13000
heap
page read and write
1ACAAB11000
heap
page read and write
157F8CEF000
heap
page read and write
157F3AC0000
trusted library allocation
page read and write
157F8CCF000
heap
page read and write
157F8C73000
heap
page read and write
2A5A60F0000
heap
page read and write
21E37130000
trusted library allocation
page read and write
1451F629000
heap
page read and write
1999EC32000
heap
page read and write
157F8DA4000
heap
page read and write
10CF2029000
heap
page read and write
1451F613000
heap
page read and write
1999EC5D000
heap
page read and write
288C2300000
heap
page read and write
157F3596000
heap
page read and write
157F8CD7000
heap
page read and write
1ACAAB88000
heap
page read and write
157F8C9B000
heap
page read and write
157F2B13000
heap
page read and write
157F8C29000
heap
page read and write
1999EC42000
heap
page read and write
157F8D5E000
heap
page read and write
5E870FE000
stack
page read and write
157F8C0A000
heap
page read and write
157F8D4C000
heap
page read and write
1EB9B360000
trusted library allocation
page read and write
21314222000
heap
page read and write
157F2A00000
heap
page read and write
157F8434000
trusted library allocation
page read and write
157F3D40000
trusted library allocation
page read and write
157F8C3A000
heap
page read and write
157F8869000
heap
page read and write
There are 1275 hidden memdumps, click here to show them.