IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Drivers\csrss.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBA72.tmp.dmp
Mini DuMP crash report, 15 streams, Wed May 22 20:20:18 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCDFB.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCE88.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\4KPV6A~1\cached-certs (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\4KPV6A~1\cached-microdesc-consensus (copy)
ASCII text, with very long lines (1006)
dropped
C:\Users\user\AppData\Local\Temp\4KPV6A~1\state (copy)
ASCII text, with very long lines (368), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\4KPV6A~1\unverified-microdesc-consensus (copy)
ASCII text, with very long lines (1006)
dropped
C:\Users\user\AppData\Local\Temp\4kPv6aJG8e\cached-certs.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\4kPv6aJG8e\cached-microdesc-consensus.tmp
ASCII text, with very long lines (1006)
dropped
C:\Users\user\AppData\Local\Temp\4kPv6aJG8e\cached-microdescs.new
ASCII text, with very long lines (16050)
dropped
C:\Users\user\AppData\Local\Temp\4kPv6aJG8e\state.tmp
ASCII text, with very long lines (368), with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\4kPv6aJG8e\unverified-microdesc-consensus.tmp
ASCII text, with very long lines (1006)
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\ProgramData\Drivers\csrss.exe
"C:\ProgramData\Drivers\csrss.exe"
malicious
C:\ProgramData\Drivers\csrss.exe
"C:\ProgramData\Drivers\csrss.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 34992

URLs

Name
IP
Malicious
http://adsm.com.au/administrator/
54.66.209.197
malicious
http://siemax.com.au/admin/
103.18.109.164
malicious
http://biyac.com/admin
199.188.201.89
malicious
http://electrafied.com.au/wp-login.php
13.248.243.5
malicious
http://tilepower.com/pma/
43.250.142.104
malicious
http://tapi.re/administrator/
133.130.97.143
malicious
http://gufum.com/wp-login.php
104.21.92.162
malicious
http://picopond.com/wp-admin/
111.67.22.12
malicious
https://student.uow.edu.pk/phpmyadmin/
195.201.84.146
malicious
http://candassociates.com/pma/
51.254.35.55
malicious
http://moimoi.re/admin.php
133.130.97.143
malicious
http://emergentvillage.org/wp-admin/
51.254.35.55
malicious
http://theboxingshop.com.au/wp-login.php
122.252.3.114
malicious
http://biyac.com/admin/
199.188.201.89
malicious
https://theboxingshop.com.au/administrator/index.php
122.252.3.114
malicious
http://theboxingshop.com.au/administrator/index.php
122.252.3.114
malicious
http://electrafied.com.au/phpmyadmin/
13.248.243.5
malicious
http://student.uow.edu.pk/wp-login.php
195.201.84.146
malicious
http://woodysmobilemechanic.com.au/pma/
103.37.8.118
malicious
https://cutradition.com/phpmyadmin/
188.114.96.3
malicious
http://altonarsl.com/admin
110.232.143.78
malicious
http://parrysjewellers.com.au/phpMyAdmin/
23.227.38.65
malicious
http://eurokool.com/PhpMyAdmin/
51.254.35.55
malicious
http://cutradition.com/administrator/
188.114.96.3
malicious
http://sika3.com/PhpMyAdmin/
133.130.97.143
malicious
https://rad4x4.com.au/administrator/index.php
210.7.48.103
malicious
http://onekisspresave.com/phpMyAdmin/
199.59.243.225
malicious
http://blazenhaven.com/phpmyadmin/
27.54.88.98
malicious
http://mowers.co.nz/admin
76.76.21.21
malicious
http://kvsernakulamregion.in/PhpMyAdmin/
15.197.142.173
malicious
http://woodysmobilemechanic.com.au/admin.php
103.37.8.118
malicious
http://rivet.com.au/wp-login.php
101.0.116.9
malicious
http://runfoxyrun.com/phpMyAdmin/
72.52.179.174
malicious
http://googl.win/pma/
44.227.76.166
malicious
http://woodysmobilemechanic.com.au/phpMyAdmin/
103.37.8.118
malicious
http://longwapps.com/administrator/
198.54.115.215
malicious
https://mowers.co.nz/admin.php
76.76.21.21
malicious
http://tempmailin.com/admin.php
104.21.80.33
malicious
http://kmail.li/phpmyadmin/
133.130.97.143
malicious
http://storegmail.com/PhpMyAdmin/R
unknown
http://kingfisherschool.co.za/wp-includes/js/underscore.min.js?ver=1.13.4
unknown
http://gmail.com-xxx/phpMyAdmin/2
unknown
https://kingfisherschool.co.za/comments/feed/
unknown
https://naturalisticscollection.com/cdn
unknown
http://storegmail.com/PhpMyAdmin/
unknown
https://kingststudio.com/phpmyadmin/
unknown
http://crendon.com.au/pma/1
unknown
http://docintopdf.com/PhpMyAdmin/4c
unknown
http://gmail.com-xxx/phpMyAdmin/.
unknown
https://protonmail.uservoice.com/
unknown
http://siemax.com.au/wp/wp-content/themes/betheme/js/menu.js?ver=20.6
unknown
https://googl.win/phpmyadmin/j
unknown
http://wmail2.net/pma/
unknown
https://damhabac.com.vn/gioi-thieu/gioi-thieu-cong-ty-co-phan-phan-dam-va-hoa-chat-ha-bac/
unknown
http://baney.com.au/pma/
unknown
http://lyricspad.net/administrator/index.php
unknown
http://woodvillehs.sa.edu.su/phpmyadmin/
unknown
http://bvhrk.com/
unknown
http://nthrw.com/pma/
unknown
https://googl.win/phpmyadmin/X
unknown
http://midiharmonica.com/wp-admin/hpex.php
unknown
https://damhabac.com.vn/wp-content/plugins/woocommerce/assets/js/frontend/add-to-cart.min.js?ver=6.0
unknown
https://damhabac.com.vn/wp-content/plugins/question-answer-faq/js/app.js?ver=1
unknown
http://kingfisherschool.co.za/wp-content/uploads/2018/11/cropped-favicon-1-270x270.png
unknown
https://woodysmobilemechanic.com.au/
unknown
http://isemmm.org/administrator/index.php
172.67.156.3
http://kingfisherschool.co.za/administrator/K
unknown
https://cdn.jsdelivr.net/gh/fancyapps/fancybox
unknown
https://googl.win/phpmyadmin/0
unknown
http://kingfisherschool.co.za/wp-includes/js/dist/vendor/regenerato
unknown
http://pacificweldingaustralia.com.au/com
unknown
https://orp.com.kw/administrator/
172.67.68.171
https://isemmm.org/phpmyadmin/
172.67.156.3
http://mixalo.com/pma/Admin/
unknown
http://trythe.net/phpmyadmin/xlM
unknown
https://orp.com.kw/#place
unknown
http://orp.com.kw/com
unknown
http://wetargetdeals.com/phpMyAdmin/
unknown
https://img1.wsimg.com/gfonts/s/cabin/v27/u-4X0qWljRw-PfU81xCKCpdpbgZJl6XFpfEd7eA9BIxxkbqDH7alwQ.wof
unknown
https://mirai.re/phpmyadmin/:2
unknown
http://eurokool.com/wp-login.phpm
unknown
http://gmail.com-xxx/n.infoVs
unknown
https://rad4x4.com.au/phpMyAdmin/
unknown
http://kingfisherschool.co.za/wp-content/uploads/2018/11/cropped-kingfisher-private-school-1.png
unknown
http://isemmm.org/pma/
172.67.156.3
http://gmail.com.0.wybuwy.xyz/pma/Admin/
unknown
http://kingfisherschool.co.za/wp-content/uploads/2018/11/cropped-favicon-1-180x180.png
unknown
http://jalcemail.net/phpmyadmin/
unknown
http://sinaite.net/.netn.comM
unknown
http://apacinfrastructure.com.au/
unknown
http://crendon.com.au/xxx0
unknown
http://maxgeo.com/pma/YYP
unknown
https://orp.com.kw
unknown
http://alcoholetn.com/phpmyadmin/
unknown
http://maxgeo.com/PhpMyAdmin/wYr
unknown
http://kingfisherschool.co.za/wp-admin/css/login.min.css?ver=6.1.6
unknown
https://lokerpintar.id/gin.php
unknown
https://damhabac.com.vn/wp-content/uploads/2022/01/logo-dam-ha-bac-final-min-263x300.png
unknown
http://spicescatering.com.au/pma/
unknown
http://emergentvillage.org/B
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ftp.tilepower.com
43.250.142.104
malicious
mailgate.norwegischlernen.info
91.195.240.12
malicious
rad4x4.com.au
210.7.48.103
malicious
hdr-nlb5-4e815dd67a14bf7f.elb.us-east-2.amazonaws.com
3.130.253.23
malicious
picopond.com
111.67.22.12
malicious
mail.mowers.co.nz
43.245.52.240
malicious
altonarsl-com.mail.protection.outlook.com
52.101.149.2
malicious
mail.onekisspresave.com
199.59.243.225
malicious
recv100.erinn.biz
160.251.96.188
malicious
crendon.com.au
210.50.6.252
malicious
relay.gmail.com.0.wybuwy.xyz
199.59.243.225
malicious
trythe.net
172.67.202.108
malicious
srv4.unstablemail.com
146.190.212.90
malicious
route3.mx.cloudflare.net
162.159.205.23
malicious
imap.gmail.com.0.wybuwy.xyz
199.59.243.225
malicious
eurokool.com
51.254.35.55
malicious
pop.bvhrk.com
103.224.212.214
malicious
mailstore1.secureserver.net
92.204.80.3
malicious
sika3.com
133.130.97.143
malicious
fanclub.pm
133.130.97.143
malicious
biyac.com
199.188.201.89
malicious
mail.apacinfrastructure.com.au
116.90.51.251
malicious
mail.sjctni.edu
210.212.250.35
malicious
student.uow.edu.pk
195.201.84.146
malicious
pop3.norwegischlernen.info
91.195.240.12
malicious
recv101.erinn.biz
160.251.107.179
malicious
knowledgemd.com
51.254.35.55
malicious
us2.mx1.mailhostbox.com
162.215.3.26
malicious
route1.mx.cloudflare.net
162.159.205.13
malicious
aero4.unstablemail.com
146.190.223.124
malicious
pop.onekisspresave.com
199.59.243.225
malicious
ftp.gmail.com.0.wybuwy.xyz
199.59.243.225
malicious
www.adsm.com.au
54.66.209.197
malicious
ftp.blazenhaven.com
27.54.88.98
malicious
gmail.com.0.wybuwy.xyz
199.59.243.225
malicious
onekisspresave.com
199.59.243.225
malicious
ssh.norwegischlernen.info
91.195.240.12
malicious
www.kingfisherschool.co.za
197.221.14.82
malicious
srv4.rejecthost.com
165.22.204.99
malicious
ftp.onekisspresave.com
199.59.243.225
malicious
midiharmonica.com
51.254.35.55
malicious
parrysjewellers.com.au
23.227.38.65
malicious
candassociates.com
51.254.35.55
malicious
recv1.erinn.biz
133.130.97.143
malicious
parrysjewellers-com-au.mail.protection.outlook.com
52.101.149.1
malicious
ftp.mailboxt.net
103.224.182.239
malicious
electrafied.com.au
13.248.243.5
malicious
mowers.co.nz
76.76.21.21
malicious
ssh.mailboxt.net
103.224.182.239
malicious
mta.hosts.net.nz
43.245.52.230
malicious
pltraffic39.com
72.52.179.174
malicious
mail.electrafied.com.au
110.173.134.144
malicious
orp.com.kw
172.67.68.171
malicious
maxgeo.com
104.22.78.252
malicious
www.crendon.com.au
210.50.6.252
malicious
mirai.re
133.130.97.143
malicious
adsm.com.au
54.66.209.197
malicious
77026.bodis.com
199.59.243.225
malicious
ssh.danotrans.com
92.51.165.29
malicious
theboxingshop.com.au
122.252.3.114
malicious
gufum.com
104.21.92.162
malicious
wreg4.brushemail.com
134.122.50.100
malicious
tempgmail.org
104.219.232.59
malicious
us2.mx2.mailhostbox.com
162.215.2.27
malicious
mx.zoho.com
204.141.43.44
malicious
smtp.secureserver.net
92.204.80.0
malicious
ftp.apacinfrastructure.com.au
116.90.51.251
malicious
mx4.catchservers.net
165.22.201.68
malicious
em4.catchservers.com
137.184.154.224
malicious
damhabac.com.vn
103.166.184.214
malicious
coloa4.hubblehost.com
146.190.65.64
malicious
ftp.gmail.com.0.warna222.com
199.59.243.225
malicious
pop.gmail.com.0.wybuwy.xyz
199.59.243.225
malicious
pop3.bvhrk.com
103.224.212.214
malicious
runfoxyrun.com
72.52.179.174
malicious
mx.looksecure.net
45.76.245.181
malicious
mail.rgdoubtdhq.com
199.59.243.225
malicious
mailgate.gmail.com.0.wybuwy.xyz
199.59.243.225
malicious
penarcam-com-au.mail.protection.outlook.com
52.101.149.9
malicious
imap.norwegischlernen.info
91.195.240.12
malicious
ssh.bvhrk.com
103.224.212.214
malicious
pop.norwegischlernen.info
91.195.240.12
malicious
ftp.norwegischlernen.info
91.195.240.12
malicious
maxgeo-com.mail.protection.outlook.com
52.101.149.2
malicious
moimoi.re
133.130.97.143
malicious
mx.naturalisticscollection.com.cust.b.hostedemail.com
64.98.36.4
malicious
mixalo.com
72.52.179.174
malicious
alt2.aspmx.l.google.com
142.251.9.27
www.statusit.com
194.1.147.80
aspmx3.googlemail.com
142.251.9.26
ftp.rivet.com.au
52.13.240.191
hdr-nlb7-aebd5d615260636b.elb.us-east-1.amazonaws.com
54.161.222.85
ftp.electrafied.com.au
172.67.169.205
td-ccm-neg-87-45.wixdns.net
34.149.87.45
themowershopwaikanae.husqvarnadealers.co.nz
188.114.97.3
recv4.erinn.biz
118.27.118.63
pop3.partnerconsole.net
54.206.62.196
alt4.aspmx.l.google.com
74.125.200.27
hdr-nlb8-39c51fa8696874ee.elb.us-east-1.amazonaws.com
52.86.6.113
aspmx4.googlemail.com
142.250.150.26
There are 90 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
122.252.3.114
theboxingshop.com.au
Australia
malicious
173.230.139.246
mail.gufum.com
United States
malicious
115.70.192.241
mail.spicescatering.com.au
Australia
malicious
44.227.76.166
googl.win
United States
malicious
63.250.43.74
mx2-hosting.jellyfish.systems
United States
malicious
160.251.83.161
recv3.erinn.biz
Japan
malicious
54.66.209.197
www.adsm.com.au
United States
malicious
198.54.115.215
longwapps.com
United States
malicious
185.70.42.45
proton.me
Switzerland
malicious
51.254.35.55
eurokool.com
France
malicious
103.18.109.164
siemax.com.au
Australia
malicious
103.224.212.214
pop.bvhrk.com
Australia
malicious
146.190.78.248
ereg4.brushemail.com
United States
malicious
202.130.45.2
mx01.mailcluster.com.au
Australia
malicious
18.119.154.66
unknown
United States
malicious
133.130.97.104
recv2.erinn.biz
Japan
malicious
111.67.22.12
picopond.com
Australia
malicious
101.0.120.34
mx02.mailcluster.com.au
Australia
malicious
92.204.80.0
smtp.secureserver.net
Germany
malicious
172.67.202.108
trythe.net
United States
malicious
195.201.84.146
student.uow.edu.pk
Germany
malicious
134.122.50.100
wreg4.brushemail.com
United States
malicious
92.204.80.3
mailstore1.secureserver.net
Germany
malicious
162.215.2.27
us2.mx2.mailhostbox.com
United States
malicious
15.197.142.173
kvsernakulamregion.in
United States
malicious
103.166.184.214
damhabac.com.vn
unknown
malicious
164.90.197.162
mx195.m1bp.com
United States
malicious
116.90.51.251
mail.apacinfrastructure.com.au
Australia
malicious
199.188.201.89
biyac.com
United States
malicious
133.130.97.143
sika3.com
Japan
malicious
104.21.80.33
tempmailin.com
United States
malicious
165.22.201.68
mx4.catchservers.net
United States
malicious
172.67.68.171
orp.com.kw
United States
malicious
52.101.151.0
unknown
United States
malicious
104.21.25.209
looksecure.net
United States
malicious
184.105.182.225
mxbackup2.junkemailfilter.com
United States
malicious
176.119.200.128
mail.protonmail.ch
unknown
malicious
176.119.200.129
mailsec.protonmail.ch
unknown
malicious
198.54.127.242
mx1-hosting.jellyfish.systems
United States
malicious
49.12.18.190
in.mail.tm
Germany
malicious
23.227.38.67
naturalisticscollection.com
Canada
malicious
23.227.38.65
parrysjewellers.com.au
Canada
malicious
165.22.205.213
em4.rejecthost.com
United States
malicious
110.173.134.144
mail.electrafied.com.au
Australia
malicious
188.114.96.3
www.alabamadebtreliefhelp.com
European Union
malicious
165.22.196.27
aero4.externalemail.com
United States
malicious
162.255.118.13
mx3-hosting.jellyfish.systems
United States
malicious
204.141.43.44
mx.zoho.com
United States
malicious
103.20.200.185
ediface.biz
Australia
malicious
43.250.142.104
ftp.tilepower.com
Australia
malicious
27.54.88.98
ftp.blazenhaven.com
Australia
malicious
104.219.232.59
tempgmail.org
United States
malicious
137.184.154.224
em4.catchservers.com
United States
malicious
178.62.210.184
colob4.hubblehost.com
European Union
malicious
194.1.147.82
statusit.com
Bulgaria
malicious
76.76.21.21
mowers.co.nz
United States
malicious
162.159.205.23
route3.mx.cloudflare.net
United States
malicious
13.248.243.5
electrafied.com.au
United States
malicious
147.182.130.78
mx195.mb5p.com
United States
malicious
101.0.116.9
rivet.com.au
Australia
malicious
91.195.240.12
mailgate.norwegischlernen.info
Germany
malicious
199.59.243.225
mail.onekisspresave.com
United States
malicious
160.251.96.188
recv100.erinn.biz
Japan
malicious
210.212.250.35
mail.sjctni.edu
India
malicious
160.251.107.179
recv101.erinn.biz
Japan
malicious
104.22.78.252
maxgeo.com
United States
malicious
210.7.48.103
rad4x4.com.au
Australia
malicious
146.190.212.90
srv4.unstablemail.com
United States
malicious
43.245.52.230
mta.hosts.net.nz
New Zealand
malicious
202.130.44.227
unknown
Australia
164.90.197.105
unknown
United States
147.182.160.18
unknown
United States
52.13.240.191
ftp.rivet.com.au
United States
142.250.150.26
aspmx4.googlemail.com
United States
118.27.118.63
recv4.erinn.biz
Japan
202.130.45.7
unknown
Australia
185.220.100.248
unknown
Germany
104.26.6.37
www.hugedomains.com
United States
142.250.153.27
aspmx2.googlemail.com
United States
142.250.153.26
alt1.aspmx.l.google.com
United States
160.251.76.226
recv5.erinn.biz
Japan
23.227.38.74
shops.myshopify.com
Canada
172.67.156.3
isemmm.org
United States
13.238.203.112
unknown
United States
91.121.86.59
unknown
France
164.90.194.37
unknown
United States
74.125.200.26
aspmx5.googlemail.com
United States
74.125.200.27
alt4.aspmx.l.google.com
United States
147.182.180.139
unknown
United States
52.71.57.184
hdr-nlb9-41371129e8304c29.elb.us-east-1.amazonaws.com
United States
37.120.171.230
unknown
Germany
172.67.173.170
lokerpintar.id
United States
164.90.197.143
unknown
United States
133.130.99.7
recv6.erinn.biz
Japan
198.187.29.4
ftp.longwapps.com
United States
194.1.147.80
www.statusit.com
Bulgaria
142.250.186.115
unknown
United States
13.248.148.254
552190.parkingcrew.net
United States
142.251.9.26
aspmx3.googlemail.com
United States
142.251.9.27
alt2.aspmx.l.google.com
United States
There are 90 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\System\Config
i
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
CSRSS
\REGISTRY\A\{49ffe144-2fad-5935-8e22-4e740d287f46}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
\REGISTRY\A\{49ffe144-2fad-5935-8e22-4e740d287f46}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
\REGISTRY\A\{49ffe144-2fad-5935-8e22-4e740d287f46}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
\REGISTRY\A\{49ffe144-2fad-5935-8e22-4e740d287f46}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
\REGISTRY\A\{49ffe144-2fad-5935-8e22-4e740d287f46}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
\REGISTRY\A\{49ffe144-2fad-5935-8e22-4e740d287f46}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
\REGISTRY\A\{49ffe144-2fad-5935-8e22-4e740d287f46}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
\REGISTRY\A\{49ffe144-2fad-5935-8e22-4e740d287f46}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
\REGISTRY\A\{49ffe144-2fad-5935-8e22-4e740d287f46}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
\REGISTRY\A\{49ffe144-2fad-5935-8e22-4e740d287f46}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
\REGISTRY\A\{49ffe144-2fad-5935-8e22-4e740d287f46}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
\REGISTRY\A\{49ffe144-2fad-5935-8e22-4e740d287f46}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
\REGISTRY\A\{49ffe144-2fad-5935-8e22-4e740d287f46}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
\REGISTRY\A\{49ffe144-2fad-5935-8e22-4e740d287f46}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
\REGISTRY\A\{49ffe144-2fad-5935-8e22-4e740d287f46}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
\REGISTRY\A\{49ffe144-2fad-5935-8e22-4e740d287f46}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
\REGISTRY\A\{49ffe144-2fad-5935-8e22-4e740d287f46}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
\REGISTRY\A\{49ffe144-2fad-5935-8e22-4e740d287f46}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
\REGISTRY\A\{49ffe144-2fad-5935-8e22-4e740d287f46}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
768E000
stack
page read and write
31B2000
heap
page read and write
18E3E000
stack
page read and write
3DC7E000
stack
page read and write
3A9B000
heap
page read and write
928000
heap
page read and write
38AD000
heap
page read and write
1867E000
stack
page read and write
15ABE000
stack
page read and write
5443E000
stack
page read and write
196FE000
stack
page read and write
50D3E000
stack
page read and write
A15000
heap
page read and write
379FE000
stack
page read and write
5742000
heap
page read and write
2507E000
stack
page read and write
5F5B000
heap
page read and write
36E4C000
heap
page read and write
1713D000
stack
page read and write
36E79000
heap
page read and write
38D2000
heap
page read and write
5C636000
heap
page read and write
3243D000
stack
page read and write
BEE000
stack
page read and write
18F3E000
stack
page read and write
DD0D000
stack
page read and write
2D50000
heap
page read and write
5C944000
heap
page read and write
6DCE000
stack
page read and write
16EFE000
stack
page read and write
339D000
heap
page read and write
401000
unkown
page execute read
1C507000
heap
page read and write
146BE000
stack
page read and write
10C8E000
stack
page read and write
43B1B000
heap
page read and write
550B000
heap
page read and write
3D5B000
heap
page read and write
81CE000
stack
page read and write
7BCA000
stack
page read and write
29C6000
heap
page read and write
514FE000
stack
page read and write
3C6A000
heap
page read and write
43A00000
heap
page read and write
3869000
heap
page read and write
1343E000
stack
page read and write
437E000
stack
page read and write
17EFE000
stack
page read and write
4AF3E000
stack
page read and write
36E11000
heap
page read and write
43BCD000
heap
page read and write
43B87000
heap
page read and write
424FE000
stack
page read and write
43B36000
heap
page read and write
16B3E000
stack
page read and write
14CFE000
stack
page read and write
36E41000
heap
page read and write
5BE1000
heap
page read and write
932000
heap
page read and write
1717E000
stack
page read and write
178FE000
stack
page read and write
2A90000
trusted library allocation
page read and write
5357E000
stack
page read and write
17F3E000
stack
page read and write
3AFFE000
stack
page read and write
5FE1000
heap
page read and write
76CE000
stack
page read and write
5F26000
heap
page read and write
5433E000
stack
page read and write
629B000
heap
page read and write
4673E000
stack
page read and write
565FE000
stack
page read and write
320E000
heap
page read and write
2C30000
trusted library allocation
page read and write
59DFE000
stack
page read and write
88E000
stack
page read and write
5D13000
heap
page read and write
824000
remote allocation
page execute and read and write
3387E000
stack
page read and write
36F22000
heap
page read and write
43DA7000
heap
page read and write
354FE000
stack
page read and write
5809000
heap
page read and write
43B47000
heap
page read and write
4F01000
heap
page read and write
17C7E000
stack
page read and write
3914000
heap
page read and write
43B43000
heap
page read and write
5E11000
heap
page read and write
43DA5000
heap
page read and write
41C3E000
stack
page read and write
3E62000
heap
page read and write
43CFE000
heap
page read and write
3B4BE000
stack
page read and write
38C9000
heap
page read and write
5DCC000
heap
page read and write
58F9000
heap
page read and write
5F17000
heap
page read and write
335BE000
stack
page read and write
7FCD000
stack
page read and write
1BD7E000
stack
page read and write
48FFE000
stack
page read and write
150FE000
stack
page read and write
3969000
heap
page read and write
4A7F000
stack
page read and write
5C5C8000
heap
page read and write
558E000
heap
page read and write
5B4C000
heap
page read and write
381A000
heap
page read and write
6A0D000
stack
page read and write
4953E000
stack
page read and write
9BA000
heap
page read and write
43B58000
heap
page read and write
A17000
heap
page read and write
78CBA000
heap
page read and write
541FE000
stack
page read and write
3872000
heap
page read and write
37F3E000
stack
page read and write
1637E000
stack
page read and write
573A000
heap
page read and write
5C2D000
heap
page read and write
3DFFE000
stack
page read and write
1028E000
stack
page read and write
401000
unkown
page execute read
3B4A000
heap
page read and write
12BCE000
stack
page read and write
36F1F000
heap
page read and write
1244E000
stack
page read and write
13A3E000
stack
page read and write
48D3E000
stack
page read and write
581D000
heap
page read and write
36E0C000
heap
page read and write
43BAD000
heap
page read and write
37D3000
heap
page read and write
5FC1000
heap
page read and write
16DBE000
stack
page read and write
5C88C000
heap
page read and write
4E97E000
stack
page read and write
3398000
heap
page read and write
1A5BE000
stack
page read and write
15BFE000
stack
page read and write
9B3000
heap
page read and write
5DAB000
heap
page read and write
3C0BE000
stack
page read and write
BD4E000
stack
page read and write
5610000
heap
page read and write
5B3E000
heap
page read and write
2E9BE000
stack
page read and write
56A2000
heap
page read and write
5FA1000
heap
page read and write
6091000
heap
page read and write
5C428000
heap
page read and write
38D2000
heap
page read and write
5B8F000
heap
page read and write
5627E000
stack
page read and write
48E3E000
stack
page read and write
3B71000
heap
page read and write
3ACFE000
stack
page read and write
4BE3E000
stack
page read and write
3817000
heap
page read and write
43D13000
heap
page read and write
36E19000
heap
page read and write
11F4E000
stack
page read and write
43DF8000
heap
page read and write
5E98000
heap
page read and write
13BBE000
stack
page read and write
5B7F000
heap
page read and write
43A3C000
heap
page read and write
3863000
heap
page read and write
690E000
stack
page read and write
5C518000
heap
page read and write
97B000
heap
page read and write
442FE000
stack
page read and write
A88E000
stack
page read and write
4F6FE000
stack
page read and write
1807E000
stack
page read and write
920E000
stack
page read and write
51EA000
heap
page read and write
62B9000
heap
page read and write
164FE000
stack
page read and write
150BE000
stack
page read and write
78C97000
heap
page read and write
36C4000
heap
page read and write
5C4E8000
heap
page read and write
51FFE000
stack
page read and write
3CEBE000
stack
page read and write
3337000
heap
page read and write
5C39A000
heap
page read and write
389A000
heap
page read and write
5C3B4000
heap
page read and write
4EB3000
heap
page read and write
628E000
heap
page read and write
960E000
stack
page read and write
60C4000
heap
page read and write
BA4E000
stack
page read and write
4DE0000
direct allocation
page execute and read and write
593FE000
stack
page read and write
1BFFE000
stack
page read and write
6304000
heap
page read and write
36EFD000
heap
page read and write
5C756000
heap
page read and write
43CED000
heap
page read and write
3EB9000
heap
page read and write
49DFE000
stack
page read and write
3C77000
heap
page read and write
3387000
heap
page read and write
36EB4000
heap
page read and write
5ACE000
heap
page read and write
4AE3E000
stack
page read and write
5C917000
heap
page read and write
36EE6000
heap
page read and write
38AD000
heap
page read and write
894E000
stack
page read and write
941000
heap
page read and write
5B9F000
heap
page read and write
1703E000
stack
page read and write
4B1BE000
stack
page read and write
40DFE000
stack
page read and write
1D03E000
stack
page read and write
43BF3000
heap
page read and write
36ED2000
heap
page read and write
968000
heap
page read and write
2A21000
heap
page read and write
387D000
heap
page read and write
3B09000
heap
page read and write
4277E000
stack
page read and write
3884000
heap
page read and write
6ECE000
unkown
page read and write
339D000
heap
page read and write
884E000
stack
page read and write
55D3000
heap
page read and write
6254000
heap
page read and write
5C9B0000
heap
page read and write
43A2B000
heap
page read and write
29E5000
heap
page read and write
3C99000
heap
page read and write
32AD000
heap
page read and write
14E7E000
stack
page read and write
5D8B000
heap
page read and write
4493E000
stack
page read and write
5B87000
heap
page read and write
5613E000
stack
page read and write
400000
unkown
page readonly
A3CE000
stack
page read and write
3CDF000
heap
page read and write
41BFE000
stack
page read and write
5C522000
heap
page read and write
1AABE000
stack
page read and write
151FE000
stack
page read and write
36DFE000
stack
page read and write
5D7E000
heap
page read and write
52DBE000
stack
page read and write
ADCE000
stack
page read and write
5DBD000
heap
page read and write
5FE5000
heap
page read and write
5873E000
stack
page read and write
43A28000
heap
page read and write
14D3E000
stack
page read and write
966000
heap
page read and write
38C9000
heap
page read and write
18F7E000
stack
page read and write
563B000
heap
page read and write
1A87E000
stack
page read and write
1367D000
stack
page read and write
2A2E000
heap
page read and write
E94E000
stack
page read and write
51F4000
heap
page read and write
5603E000
stack
page read and write
5981000
heap
page read and write
2C94000
heap
page read and write
FE0D000
stack
page read and write
29E1000
heap
page read and write
1407E000
stack
page read and write
BA8E000
stack
page read and write
43B14000
heap
page read and write
3833000
heap
page read and write
514BE000
stack
page read and write
5C4B4000
heap
page read and write
39FBE000
stack
page read and write
36F1B000
heap
page read and write
43E3E000
stack
page read and write
3817000
heap
page read and write
78BAA000
heap
page read and write
9AE000
heap
page read and write
5804000
heap
page read and write
FC0E000
stack
page read and write
3F43E000
stack
page read and write
1280E000
stack
page read and write
B50E000
stack
page read and write
50E7000
heap
page read and write
83D000
remote allocation
page execute and read and write
5C8CB000
heap
page read and write
38AD000
heap
page read and write
29E1000
heap
page read and write
19B000
stack
page read and write
66040000
heap
page read and write
43CEF000
heap
page read and write
5913E000
stack
page read and write
3AE7E000
stack
page read and write
43B31000
heap
page read and write
DE0D000
stack
page read and write
400000
remote allocation
page execute and read and write
4C10000
heap
page read and write
38AD000
heap
page read and write
93F000
heap
page read and write
980000
heap
page read and write
3C94000
heap
page read and write
56FB000
heap
page read and write
3A8D1000
heap
page read and write
36E98000
heap
page read and write
43A1F000
heap
page read and write
37A3000
heap
page read and write
5CBA000
heap
page read and write
497E000
stack
page read and write
42D7E000
stack
page read and write
6C8E000
stack
page read and write
42EBE000
stack
page read and write
54B8000
heap
page read and write
5C768000
heap
page read and write
3C33E000
stack
page read and write
499F000
heap
page read and write
14A7D000
stack
page read and write
3CFBE000
stack
page read and write
5C8B9000
heap
page read and write
1038E000
stack
page read and write
190BE000
stack
page read and write
2C93000
heap
page read and write
3ABFE000
stack
page read and write
146FE000
stack
page read and write
5E2F000
heap
page read and write
970E000
stack
page read and write
2A83000
heap
page read and write
5E87000
heap
page read and write
186BE000
stack
page read and write
19B000
stack
page read and write
37A2000
heap
page read and write
4483E000
stack
page read and write
9C0D000
stack
page read and write
5630000
heap
page read and write
4205000
heap
page read and write
62B3000
heap
page read and write
43B8B000
heap
page read and write
3DB3E000
stack
page read and write
51C3E000
stack
page read and write
5D0C000
heap
page read and write
1547E000
stack
page read and write
12A4E000
stack
page read and write
36E89000
heap
page read and write
3884000
heap
page read and write
43A14000
heap
page read and write
2A0E000
heap
page read and write
5C3A3000
heap
page read and write
4570000
heap
page read and write
29FE000
heap
page read and write
589FE000
stack
page read and write
2C99000
heap
page read and write
36F2F000
heap
page read and write
401000
unkown
page execute read
122CE000
stack
page read and write
17B3E000
stack
page read and write
524FE000
stack
page read and write
442D000
heap
page read and write
5699000
heap
page read and write
51E2000
heap
page read and write
2553E000
stack
page read and write
A13000
heap
page read and write
3890000
heap
page read and write
5137E000
stack
page read and write
43B94000
heap
page read and write
43CF9000
heap
page read and write
3F2F000
heap
page read and write
469C000
heap
page read and write
3808000
heap
page read and write
A17000
heap
page read and write
998E000
stack
page read and write
2E2F000
unkown
page readonly
36E2F000
heap
page read and write
43A2F000
heap
page read and write
159BE000
stack
page read and write
54ED000
heap
page read and write
5C4D2000
heap
page read and write
4ED1000
heap
page read and write
505FE000
stack
page read and write
3C52000
heap
page read and write
2BCE000
stack
page read and write
37A3E000
stack
page read and write
2C6E000
stack
page read and write
5123E000
stack
page read and write
974E000
stack
page read and write
BECE000
stack
page read and write
EE0D000
stack
page read and write
5623E000
stack
page read and write
1C5F8000
heap
page read and write
43D9B000
heap
page read and write
37F6000
heap
page read and write
3777E000
stack
page read and write
54E5000
heap
page read and write
319F000
stack
page read and write
55C4000
heap
page read and write
1353E000
stack
page read and write
5964000
heap
page read and write
3D12000
heap
page read and write
5C835000
heap
page read and write
EF0D000
stack
page read and write
3DC3E000
stack
page read and write
1204E000
stack
page read and write
4F17E000
stack
page read and write
5C3FF000
heap
page read and write
D3CD000
stack
page read and write
5C71C000
heap
page read and write
1933E000
stack
page read and write
1957E000
stack
page read and write
78C05000
heap
page read and write
1D13E000
stack
page read and write
1C5C9000
heap
page read and write
36EDA000
heap
page read and write
43DBD000
heap
page read and write
13A7E000
stack
page read and write
1C0000
heap
page read and write
464BE000
stack
page read and write
3AE3E000
stack
page read and write
37A2000
heap
page read and write
17B7E000
stack
page read and write
43CC7000
heap
page read and write
3D08000
heap
page read and write
165FE000
stack
page read and write
5CA0E000
heap
page read and write
266FE000
stack
page read and write
43A16000
heap
page read and write
5E36000
heap
page read and write
704E000
stack
page read and write
29ED000
heap
page read and write
59F7000
heap
page read and write
2E2F000
unkown
page readonly
1268E000
stack
page read and write
3C0FE000
stack
page read and write
71CE000
stack
page read and write
1AC3E000
stack
page read and write
15D7E000
stack
page read and write
5C955000
heap
page read and write
5C93C000
heap
page read and write
1C73E000
stack
page read and write
38D2000
heap
page read and write
3AA3000
heap
page read and write
38C9000
heap
page read and write
591E000
heap
page read and write
EFCE000
stack
page read and write
4B97E000
stack
page read and write
136BE000
stack
page read and write
568B000
heap
page read and write
D2CD000
stack
page read and write
1B4BE000
stack
page read and write
43BAB000
heap
page read and write
37B4000
heap
page read and write
6181000
heap
page read and write
5C867000
heap
page read and write
3E4FE000
stack
page read and write
5798000
heap
page read and write
36F3C000
heap
page read and write
3577E000
stack
page read and write
10C4E000
stack
page read and write
2A48000
heap
page read and write
2B1BE000
stack
page read and write
5A93E000
stack
page read and write
36F00000
heap
page read and write
C35000
heap
page read and write
7B8E000
stack
page read and write
2373E000
stack
page read and write
95CE000
stack
page read and write
51DA000
heap
page read and write
3892000
heap
page read and write
F84E000
stack
page read and write
9FCE000
stack
page read and write
5C526000
heap
page read and write
1EF3E000
stack
page read and write
BF8E000
stack
page read and write
3391000
heap
page read and write
5C498000
heap
page read and write
47B3E000
stack
page read and write
3803E000
stack
page read and write
43CFC000
heap
page read and write
D87000
heap
page read and write
318F000
unkown
page read and write
5829000
heap
page read and write
4EFD000
heap
page read and write
AB4E000
stack
page read and write
138FE000
stack
page read and write
4C21000
heap
page execute and read and write
3892000
heap
page read and write
10ECE000
stack
page read and write
606A000
heap
page read and write
2993000
heap
page read and write
C40E000
stack
page read and write
1663E000
stack
page read and write
5960000
heap
page read and write
1533E000
stack
page read and write
90D000
heap
page read and write
1F0000
heap
page read and write
2C47F000
stack
page read and write
187FE000
stack
page read and write
78BBB000
heap
page read and write
758E000
stack
page read and write
BF4E000
stack
page read and write
346E000
heap
page read and write
3E1B000
heap
page read and write
5C713000
heap
page read and write
43B26000
heap
page read and write
36F64000
heap
page read and write
43BBA000
heap
page read and write
29E9000
heap
page read and write
AC4E000
stack
page read and write
38AD000
heap
page read and write
147FE000
stack
page read and write
126CE000
stack
page read and write
4B43E000
stack
page read and write
634E000
heap
page read and write
5CD0000
heap
page read and write
5DA0000
heap
page read and write
39A7E000
stack
page read and write
2E2F000
unkown
page readonly
42C7E000
stack
page read and write
78C81000
heap
page read and write
10B4E000
stack
page read and write
546BE000
stack
page read and write
58C9000
heap
page read and write
5650000
heap
page read and write
6025000
heap
page read and write
14ABE000
stack
page read and write
3884000
heap
page read and write
5C869000
heap
page read and write
36F31000
heap
page read and write
10F0E000
stack
page read and write
1317E000
stack
page read and write
3CF3000
heap
page read and write
117CE000
stack
page read and write
173FE000
stack
page read and write
36E04000
heap
page read and write
1627E000
stack
page read and write
CB8E000
stack
page read and write
3F67E000
stack
page read and write
3733000
heap
page read and write
38C3E000
stack
page read and write
428BE000
stack
page read and write
3880000
heap
page read and write
402FE000
stack
page read and write
1763E000
stack
page read and write
43B8E000
heap
page read and write
5F46000
heap
page read and write
5D0000
unkown
page read and write
5C4C4000
heap
page read and write
540BE000
stack
page read and write
5D1D000
heap
page read and write
3C23E000
stack
page read and write
5C76A000
heap
page read and write
5C538000
heap
page read and write
346C000
heap
page read and write
3EF0000
heap
page read and write
5783E000
stack
page read and write
5DF2000
heap
page read and write
155BE000
stack
page read and write
43BC3000
heap
page read and write
3F7BE000
stack
page read and write
4A3FE000
stack
page read and write
C38D000
stack
page read and write
2B75000
heap
page read and write
3D18000
heap
page read and write
36EE8000
heap
page read and write
1497E000
stack
page read and write
5919000
heap
page read and write
36F38000
heap
page read and write
43DC4000
heap
page read and write
593A000
heap
page read and write
5C86000
heap
page read and write
AECE000
stack
page read and write
5C514000
heap
page read and write
437BE000
stack
page read and write
5C3D4000
heap
page read and write
5C72E000
heap
page read and write
358E000
stack
page read and write
4C0BE000
stack
page read and write
1218E000
stack
page read and write
29ED000
heap
page read and write
29D8000
heap
page read and write
43A78000
heap
page read and write
5723E000
stack
page read and write
CCCE000
stack
page read and write
2E73F000
stack
page read and write
36EC4000
heap
page read and write
43DA0000
heap
page read and write
1C500000
heap
page read and write
3978000
heap
page read and write
944000
heap
page read and write
43DCD000
heap
page read and write
3855000
heap
page read and write
59FB000
heap
page read and write
19D3E000
stack
page read and write
4A03E000
stack
page read and write
D4C000
stack
page read and write
5033E000
stack
page read and write
6B8E000
stack
page read and write
43B10000
heap
page read and write
43D05000
heap
page read and write
36E25000
heap
page read and write
1803E000
stack
page read and write
4CF7E000
stack
page read and write
562BE000
stack
page read and write
438FE000
stack
page read and write
15AFE000
stack
page read and write
3884000
heap
page read and write
36EEF000
heap
page read and write
36E82000
heap
page read and write
39BBE000
stack
page read and write
5B6C000
heap
page read and write
3600000
heap
page read and write
5C34000
heap
page read and write
5C792000
heap
page read and write
97E000
stack
page read and write
40A7E000
stack
page read and write
3DDA000
heap
page read and write
2363E000
stack
page read and write
466FE000
stack
page read and write
1100E000
stack
page read and write
5C3DE000
heap
page read and write
1393E000
stack
page read and write
3C95000
heap
page read and write
195BE000
stack
page read and write
3972000
heap
page read and write
5FC4000
heap
page read and write
5695000
heap
page read and write
267FE000
stack
page read and write
1A4BE000
stack
page read and write
57CA000
heap
page read and write
11CCE000
stack
page read and write
37EFE000
stack
page read and write
1433E000
stack
page read and write
C25000
heap
page read and write
50B5000
heap
page read and write
7A4E000
stack
page read and write
4FFFE000
stack
page read and write
EFF000
stack
page read and write
3E63000
heap
page read and write
2FAE000
stack
page read and write
12EFE000
stack
page read and write
3AD3E000
stack
page read and write
163BE000
stack
page read and write
3A0FE000
stack
page read and write
3B3BE000
stack
page read and write
5B56000
heap
page read and write
6310000
heap
page read and write
2E40000
trusted library allocation
page read and write
1587E000
stack
page read and write
2D51000
heap
page read and write
36E94000
heap
page read and write
948E000
stack
page read and write
6320000
heap
page read and write
3A7D000
heap
page read and write
5C7E7000
heap
page read and write
3A84000
heap
page read and write
418000
unkown
page write copy
3873000
heap
page read and write
5A97E000
stack
page read and write
5A83E000
stack
page read and write
3D8BE000
stack
page read and write
4C48000
heap
page read and write
1BC3E000
stack
page read and write
17DFE000
stack
page read and write
3736000
heap
page read and write
3AC6000
heap
page read and write
37BA000
heap
page read and write
5C4A6000
heap
page read and write
5922000
heap
page read and write
49B7E000
stack
page read and write
406FE000
stack
page read and write
935000
heap
page read and write
4BFBE000
stack
page read and write
8E8E000
stack
page read and write
339F000
heap
page read and write
794E000
stack
page read and write
5C50A000
heap
page read and write
43B89000
heap
page read and write
2C95000
heap
page read and write
5C66E000
heap
page read and write
384D000
heap
page read and write
17CBE000
stack
page read and write
43B3F000
heap
page read and write
3707000
heap
page read and write
539B000
heap
page read and write
5600000
heap
page read and write
CF0000
heap
page read and write
3E13E000
stack
page read and write
43B17000
heap
page read and write
3C89000
heap
page read and write
465BE000
stack
page read and write
4E5C000
heap
page read and write
1C5C6000
heap
page read and write
1A0BE000
stack
page read and write
14E3E000
stack
page read and write
3872000
heap
page read and write
3212000
heap
page read and write
37AE000
heap
page read and write
43B3C000
heap
page read and write
3818000
heap
page read and write
3387000
heap
page read and write
54DD000
heap
page read and write
43AC9000
heap
page read and write
1A0FE000
stack
page read and write
5367E000
stack
page read and write
2EDE000
heap
page read and write
17DBE000
stack
page read and write
35FF000
stack
page read and write
5C740000
heap
page read and write
1303E000
stack
page read and write
2DB7E000
stack
page read and write
843000
remote allocation
page execute and read and write
5A95000
heap
page read and write
3C53000
heap
page read and write
5C638000
heap
page read and write
1673E000
stack
page read and write
5C5D6000
heap
page read and write
C00E000
stack
page read and write
5EAF000
heap
page read and write
38C9000
heap
page read and write
43BC1000
heap
page read and write
42B3E000
stack
page read and write
78C6D000
heap
page read and write
A50E000
stack
page read and write
16FFE000
stack
page read and write
3190000
heap
page read and write
3BBFE000
stack
page read and write
38C9000
heap
page read and write
3AB9000
heap
page read and write
333F000
heap
page read and write
450FE000
stack
page read and write
18DFE000
stack
page read and write
5CB0000
heap
page read and write
182FE000
stack
page read and write
3EDE000
heap
page read and write
3301000
heap
page read and write
3809000
heap
page read and write
3933E000
stack
page read and write
547FE000
stack
page read and write
3B5FE000
stack
page read and write
33ABE000
stack
page read and write
58EB000
heap
page read and write
2FD0000
heap
page read and write
5C47C000
heap
page read and write
3391000
heap
page read and write
3CA4000
heap
page read and write
A64E000
stack
page read and write
36E13000
heap
page read and write
43A09000
heap
page read and write
6202000
heap
page read and write
3892000
heap
page read and write
1E0000
heap
page read and write
36EDD000
heap
page read and write
381BE000
stack
page read and write
58F1000
heap
page read and write
5F2D000
heap
page read and write
38D2000
heap
page read and write
31C1000
heap
page read and write
61C1000
heap
page read and write
42C3E000
stack
page read and write
55C8000
heap
page read and write
4833000
heap
page read and write
C50D000
stack
page read and write
32F2000
heap
page read and write
AB0E000
stack
page read and write
5C11000
heap
page read and write
C28000
heap
page read and write
36F14000
heap
page read and write
3D9FE000
stack
page read and write
C12000
heap
page read and write
3C80000
heap
page read and write
55FC000
heap
page read and write
16AFE000
stack
page read and write
270FE000
stack
page read and write
3C8D000
heap
page read and write
1C59E000
heap
page read and write
5D0000
unkown
page read and write
2C94000
heap
page read and write
382BE000
stack
page read and write
4A2FE000
stack
page read and write
824000
remote allocation
page execute and read and write
2A0E000
heap
page read and write
5FA8000
heap
page read and write
418000
unkown
page write copy
423BE000
stack
page read and write
141FE000
stack
page read and write
12A8E000
stack
page read and write
3BCE000
heap
page read and write
400000
unkown
page readonly
A13000
heap
page read and write
1BC7E000
stack
page read and write
545BE000
stack
page read and write
34FF000
stack
page read and write
43A24000
heap
page read and write
43B28000
heap
page read and write
1687E000
stack
page read and write
43BA6000
heap
page read and write
132BD000
stack
page read and write
55A4000
heap
page read and write
192FD000
stack
page read and write
379A000
heap
page read and write
47A3E000
stack
page read and write
570E000
heap
page read and write
5BB1000
heap
page read and write
843000
remote allocation
page execute and read and write
3B0FE000
stack
page read and write
8FCE000
stack
page read and write
5C3E3000
heap
page read and write
371E000
heap
page read and write
5C510000
heap
page read and write
1024E000
stack
page read and write
4B1FE000
stack
page read and write
2990000
heap
page read and write
1777E000
stack
page read and write
21FBE000
stack
page read and write
A74D000
stack
page read and write
3A8D4000
heap
page read and write
36F43000
heap
page read and write
433BE000
stack
page read and write
1DA3E000
stack
page read and write
156FE000
stack
page read and write
924E000
stack
page read and write
381F000
heap
page read and write
6266000
heap
page read and write
56A7E000
stack
page read and write
1F0000
heap
page read and write
465FE000
stack
page read and write
5968000
heap
page read and write
486BE000
stack
page read and write
5788000
heap
page read and write
6330000
heap
page read and write
43A64000
heap
page read and write
CA0D000
stack
page read and write
790E000
stack
page read and write
383B000
heap
page read and write
4BBFE000
stack
page read and write
C33000
heap
page read and write
196BE000
stack
page read and write
36EDF000
heap
page read and write
419BE000
stack
page read and write
C60D000
stack
page read and write
5909000
heap
page read and write
3872000
heap
page read and write
E10D000
stack
page read and write
FACE000
stack
page read and write
589BE000
stack
page read and write
6046000
heap
page read and write
8F8E000
stack
page read and write
401000
unkown
page execute read
52AFE000
stack
page read and write
5839000
heap
page read and write
1943E000
stack
page read and write
3943E000
stack
page read and write
5C1F000
heap
page read and write
1623E000
stack
page read and write
532BE000
stack
page read and write
3A76000
heap
page read and write
CEE000
stack
page read and write
309FE000
stack
page read and write
5C8EE000
heap
page read and write
3107E000
stack
page read and write
3C7C000
heap
page read and write
594E000
heap
page read and write
3880000
heap
page read and write
E68E000
heap
page read and write
43DCF000
heap
page read and write
60A1000
heap
page read and write
11E0E000
stack
page read and write
5943E000
stack
page read and write
78C0D000
heap
page read and write
439FE000
stack
page read and write
1A97E000
stack
page read and write
43D22000
heap
page read and write
1537E000
stack
page read and write
622B000
heap
page read and write
410000
unkown
page readonly
52DE000
heap
page read and write
820E000
stack
page read and write
5B73000
heap
page read and write
6080000
heap
page read and write
531BE000
stack
page read and write
2F6E000
stack
page read and write
43C43000
heap
page read and write
5C774000
heap
page read and write
471C000
heap
page read and write
4A7FE000
stack
page read and write
3E62000
heap
page read and write
4B2FE000
stack
page read and write
5180000
heap
page read and write
38D2000
heap
page read and write
3CAFE000
stack
page read and write
3884000
heap
page read and write
36F05000
heap
page read and write
1E2BE000
stack
page read and write
5953E000
stack
page read and write
934E000
stack
page read and write
62C2000
heap
page read and write
36E33000
heap
page read and write
3263000
heap
page read and write
3893000
heap
page read and write
141BE000
stack
page read and write
43A0B000
heap
page read and write
42DBE000
stack
page read and write
43B4F000
heap
page read and write
2B0BE000
stack
page read and write
43BC5000
heap
page read and write
386A000
heap
page read and write
6035000
heap
page read and write
593BE000
stack
page read and write
1DB3E000
stack
page read and write
5C8DC000
heap
page read and write
400000
unkown
page execute and read and write
154BE000
stack
page read and write
418000
unkown
page write copy
3A8F5000
heap
page read and write
3EDE000
heap
page read and write
2C9C000
heap
page read and write
43CF3000
heap
page read and write
1C5B8000
heap
page read and write
36E31000
heap
page read and write
5D94000
heap
page read and write
2A28000
heap
page read and write
37DFE000
stack
page read and write
8D0000
heap
page read and write
5B64000
heap
page read and write
499FE000
stack
page read and write
4047E000
stack
page read and write
43AD2000
heap
page read and write
43BB6000
heap
page read and write
43DC8000
heap
page read and write
43A1D000
heap
page read and write
53A4000
heap
page read and write
3A42000
heap
page read and write
9A8D000
stack
page read and write
2C84000
heap
page read and write
16C3E000
stack
page read and write
5C588000
heap
page read and write
559C000
heap
page read and write
5975000
heap
page read and write
389A000
heap
page read and write
5863E000
stack
page read and write
40ABE000
stack
page read and write
11C8E000
stack
page read and write
133FE000
stack
page read and write
B54E000
stack
page read and write
97F000
heap
page read and write
564FE000
stack
page read and write
38A5000
heap
page read and write
43DA2000
heap
page read and write
5C73A000
heap
page read and write
181BE000
stack
page read and write
5E6C000
heap
page read and write
191FE000
stack
page read and write
2E2F000
unkown
page readonly
3D92000
heap
page read and write
11A0E000
stack
page read and write
43DAE000
heap
page read and write
178BE000
stack
page read and write
3CFF000
heap
page read and write
37E4000
heap
page read and write
43BA8000
heap
page read and write
43D19000
heap
page read and write
384FE000
stack
page read and write
9B000
stack
page read and write
8D8000
heap
page read and write
F74E000
stack
page read and write
1A6FE000
stack
page read and write
1907D000
stack
page read and write
55BD000
heap
page read and write
160FE000
stack
page read and write
39A9000
heap
page read and write
5773E000
stack
page read and write
5B38000
heap
page read and write
1E1BE000
stack
page read and write
44E3E000
stack
page read and write
830D000
stack
page read and write
5016000
heap
page read and write
B64E000
stack
page read and write
3A39000
heap
page read and write
40BBE000
stack
page read and write
36F3A000
heap
page read and write
3855000
heap
page read and write
B40E000
stack
page read and write
446BE000
stack
page read and write
1240E000
stack
page read and write
5FA6000
heap
page read and write
36E0E000
heap
page read and write
9E0000
heap
page read and write
1C513000
heap
page read and write
546FE000
stack
page read and write
5CE8000
heap
page read and write
55FFE000
stack
page read and write
2877E000
stack
page read and write
384D000
heap
page read and write
1014E000
stack
page read and write
62C0000
heap
page read and write
37BA000
heap
page read and write
56F7000
heap
page read and write
1A47E000
stack
page read and write
3DEFE000
stack
page read and write
441B000
heap
page read and write
59EFE000
stack
page read and write
1CD7E000
stack
page read and write
8D0E000
stack
page read and write
1128E000
stack
page read and write
33D3E000
stack
page read and write
5380000
heap
page read and write
5E79000
heap
page read and write
72CE000
stack
page read and write
1947E000
stack
page read and write
174FE000
stack
page read and write
5ABF000
heap
page read and write
5608000
heap
page read and write
3D18000
heap
page read and write
A02000
heap
page read and write
A38E000
stack
page read and write
36ED8000
heap
page read and write
78C60000
heap
page read and write
2533E000
stack
page read and write
49C7E000
stack
page read and write
5A6FE000
stack
page read and write
5538000
heap
page read and write
62AB000
heap
page read and write
3C9E000
heap
page read and write
587B000
heap
page read and write
3EF0000
heap
page read and write
137BE000
stack
page read and write
3C10000
heap
page read and write
2A4B000
heap
page read and write
2EEBE000
stack
page read and write
3567E000
stack
page read and write
2E2C000
unkown
page read and write
3EA7000
heap
page read and write
5379000
heap
page read and write
A10000
heap
page read and write
11B8E000
stack
page read and write
13B7E000
stack
page read and write
5B95000
heap
page read and write
67CE000
stack
page read and write
5902000
heap
page read and write
5CB3000
heap
page read and write
49F3E000
stack
page read and write
5BC1000
heap
page read and write
36E08000
heap
page read and write
410000
unkown
page readonly
5733E000
stack
page read and write
5B10000
heap
page read and write
5C5EE000
heap
page read and write
567E000
heap
page read and write
3880000
heap
page read and write
A9CE000
stack
page read and write
2E2F000
unkown
page readonly
15C3E000
stack
page read and write
3E6BE000
stack
page read and write
5C646000
heap
page read and write
5A5F000
heap
page read and write
36F28000
heap
page read and write
890000
heap
page read and write
1767E000
stack
page read and write
39ABE000
stack
page read and write
43D24000
heap
page read and write
5B50000
heap
page read and write
5C7A3000
heap
page read and write
415FE000
stack
page read and write
54B1000
heap
page read and write
3AC6000
heap
page read and write
975000
heap
page read and write
43DC1000
heap
page read and write
59CD000
heap
page read and write
3B13E000
stack
page read and write
220BE000
stack
page read and write
18B7E000
stack
page read and write
38A1000
heap
page read and write
410000
unkown
page readonly
46C3E000
stack
page read and write
43B0000
heap
page read and write
5546000
heap
page read and write
36F12000
heap
page read and write
3A8A000
heap
page read and write
1B3BE000
stack
page read and write
5CF5000
heap
page read and write
1A1FE000
stack
page read and write
334BE000
stack
page read and write
EC0E000
stack
page read and write
9BF000
heap
page read and write
5FEF000
heap
page read and write
177BE000
stack
page read and write
3393000
heap
page read and write
43A5A000
heap
page read and write
9B000
stack
page read and write
307BE000
stack
page read and write
623A000
heap
page read and write
37E4000
heap
page read and write
127CE000
stack
page read and write
5C74E000
heap
page read and write
5C3AC000
heap
page read and write
94CE000
stack
page read and write
600D000
heap
page read and write
36E96000
heap
page read and write
262B000
stack
page read and write
1483E000
stack
page read and write
43A36000
heap
page read and write
3F6BE000
stack
page read and write
588BE000
stack
page read and write
386A000
heap
page read and write
527BE000
stack
page read and write
3890000
heap
page read and write
43D17000
heap
page read and write
3872000
heap
page read and write
43DB6000
heap
page read and write
5CA9000
heap
page read and write
43D0A000
heap
page read and write
3855000
heap
page read and write
182BE000
stack
page read and write
43D1E000
heap
page read and write
5BED000
heap
page read and write
13DFE000
stack
page read and write
38DD000
heap
page read and write
36FD8000
heap
page read and write
43B2D000
heap
page read and write
43BA0000
heap
page read and write
36E17000
heap
page read and write
38AD000
heap
page read and write
860000
heap
page read and write
68CE000
stack
page read and write
668E000
stack
page read and write
389A000
heap
page read and write
CB0D000
stack
page read and write
4573E000
stack
page read and write
5C534000
heap
page read and write
56BA000
heap
page read and write
54FBE000
stack
page read and write
4EDFE000
stack
page read and write
400000
unkown
page readonly
416FE000
stack
page read and write
77CE000
stack
page read and write
11A4E000
stack
page read and write
A8CE000
stack
page read and write
5C4E0000
heap
page read and write
5E83000
heap
page read and write
36E45000
heap
page read and write
1264E000
stack
page read and write
468BE000
stack
page read and write
8A8E000
stack
page read and write
187BE000
stack
page read and write
5831000
heap
page read and write
3A00000
heap
page read and write
3892000
heap
page read and write
140BE000
stack
page read and write
43DDA000
heap
page read and write
3767E000
stack
page read and write
538FE000
stack
page read and write
145BE000
stack
page read and write
55CE000
heap
page read and write
3ECB000
heap
page read and write
3E63E000
stack
page read and write
2A73000
heap
page read and write
3397E000
stack
page read and write
5127000
heap
page read and write
5C474000
heap
page read and write
3AC1000
heap
page read and write
5C53E000
heap
page read and write
31E1000
heap
page read and write
C90D000
stack
page read and write
112CE000
stack
page read and write
389A000
heap
page read and write
4FBBE000
stack
page read and write
3983E000
stack
page read and write
339BE000
stack
page read and write
3231000
heap
page read and write
1254E000
stack
page read and write
3CB5000
heap
page read and write
2A4E000
heap
page read and write
14F7E000
stack
page read and write
37B7E000
stack
page read and write
43A19000
heap
page read and write
5C95E000
heap
page read and write
348E000
stack
page read and write
C4C000
heap
page read and write
36F5A000
heap
page read and write
3117E000
stack
page read and write
36EEC000
heap
page read and write
38AD000
heap
page read and write
36E9B000
heap
page read and write
43DD1000
heap
page read and write
43B22000
heap
page read and write
353FE000
stack
page read and write
36EE1000
heap
page read and write
1C4FE000
stack
page read and write
3914000
heap
page read and write
39B0000
heap
page read and write
5C59C000
heap
page read and write
43D2A000
heap
page read and write
383B000
heap
page read and write
3DB7000
heap
page read and write
CDCD000
stack
page read and write
469BE000
stack
page read and write
6179000
heap
page read and write
4033E000
stack
page read and write
B78E000
stack
page read and write
C30000
heap
page read and write
3A85000
heap
page read and write
3869000
heap
page read and write
3E8BE000
stack
page read and write
A00000
heap
page read and write
57E8000
heap
page read and write
4BF7E000
stack
page read and write
169FE000
stack
page read and write
43BAF000
heap
page read and write
13F7E000
stack
page read and write
5C883000
heap
page read and write
3642000
heap
page read and write
3399000
heap
page read and write
5C594000
heap
page read and write
5A2F000
heap
page read and write
3D14000
heap
page read and write
3872000
heap
page read and write
339F000
heap
page read and write
43B45000
heap
page read and write
1447E000
stack
page read and write
18A7E000
stack
page read and write
155FE000
stack
page read and write
43B99000
heap
page read and write
1A9BE000
stack
page read and write
3E62000
heap
page read and write
43DD6000
heap
page read and write
425FE000
stack
page read and write
5ACBE000
stack
page read and write
43D6B000
heap
page read and write
5C8D7000
heap
page read and write
410000
unkown
page readonly
36EB2000
heap
page read and write
36CFE000
stack
page read and write
5725000
heap
page read and write
3221000
heap
page read and write
14BFE000
stack
page read and write
3846000
heap
page read and write
55B8000
heap
page read and write
29F4000
heap
page read and write
13CBD000
stack
page read and write
1190E000
stack
page read and write
B8CE000
stack
page read and write
602D000
heap
page read and write
57B6000
heap
page read and write
57B0000
heap
page read and write
4B07E000
stack
page read and write
6A4E000
stack
page read and write
5CD5000
heap
page read and write
536FE000
stack
page read and write
168BE000
stack
page read and write
36EAE000
heap
page read and write
2517E000
stack
page read and write
12B8E000
stack
page read and write
19FBE000
stack
page read and write
1064E000
stack
page read and write
5903E000
stack
page read and write
2C80000
heap
page read and write
5058000
heap
page read and write
1AD3E000
stack
page read and write
4287E000
stack
page read and write
29E9000
heap
page read and write
43CE3000
heap
page read and write
173BE000
stack
page read and write
1104E000
stack
page read and write
410000
unkown
page readonly
1ED3E000
stack
page read and write
5BA1000
heap
page read and write
6F4E000
stack
page read and write
10B0E000
stack
page read and write
4043E000
stack
page read and write
5687000
heap
page read and write
118CD000
stack
page read and write
16D7E000
stack
page read and write
339C000
heap
page read and write
1BB3E000
stack
page read and write
5C4DA000
heap
page read and write
550BE000
stack
page read and write
5F7D000
heap
page read and write
B68E000
stack
page read and write
5B14000
heap
page read and write
5914000
heap
page read and write
53C2000
heap
page read and write
2ACE000
stack
page read and write
3805000
heap
page read and write
1C0000
heap
page read and write
26FBE000
stack
page read and write
43B9D000
heap
page read and write
43A31000
heap
page read and write
1843E000
stack
page read and write
3892000
heap
page read and write
3D37E000
stack
page read and write
326BE000
stack
page read and write
B7CE000
stack
page read and write
1114E000
stack
page read and write
3EF8000
heap
page read and write
950000
heap
page read and write
618F000
heap
page read and write
4377E000
stack
page read and write
78BCD000
heap
page read and write
15E7E000
stack
page read and write
4FDFE000
stack
page read and write
1C523000
heap
page read and write
44D3E000
stack
page read and write
1C3FE000
stack
page read and write
43D0C000
heap
page read and write
3E3FE000
stack
page read and write
D70000
heap
page read and write
43DBF000
heap
page read and write
1D87E000
stack
page read and write
4187000
heap
page read and write
2EABD000
stack
page read and write
18A3E000
stack
page read and write
5C5E6000
heap
page read and write
3F53E000
stack
page read and write
339C000
heap
page read and write
F5CE000
stack
page read and write
43D9E000
heap
page read and write
400000
remote allocation
page execute and read and write
29ED000
heap
page read and write
3D87E000
stack
page read and write
5D30000
heap
page read and write
5C38000
heap
page read and write
5A1FE000
stack
page read and write
1613E000
stack
page read and write
3398000
heap
page read and write
3A840000
heap
page read and write
17A3E000
stack
page read and write
1178E000
stack
page read and write
5C789000
heap
page read and write
C00000
heap
page read and write
2C90000
heap
page read and write
4E9FE000
stack
page read and write
43A85000
heap
page read and write
37B3E000
stack
page read and write
36E36000
heap
page read and write
4BCFE000
stack
page read and write
15FFE000
stack
page read and write
4B9E000
heap
page read and write
5B83000
heap
page read and write
322D000
heap
page read and write
43DB2000
heap
page read and write
1294E000
stack
page read and write
43A10000
heap
page read and write
6286000
heap
page read and write
3E33000
heap
page read and write
D80000
heap
page read and write
59BBE000
stack
page read and write
35F0000
heap
page read and write
38AD000
heap
page read and write
1A5FE000
stack
page read and write
4D4A000
heap
page read and write
3A84C000
heap
page read and write
5C60A000
heap
page read and write
5949000
heap
page read and write
33C3E000
stack
page read and write
4F47E000
stack
page read and write
564BE000
stack
page read and write
5DC6000
heap
page read and write
4057E000
stack
page read and write
380F000
heap
page read and write
C04E000
stack
page read and write
3A88B000
heap
page read and write
440BE000
stack
page read and write
43A12000
heap
page read and write
308BE000
stack
page read and write
2887E000
stack
page read and write
3E59000
heap
page read and write
46B3E000
stack
page read and write
5C4FC000
heap
page read and write
3A01000
heap
page read and write
37C7E000
stack
page read and write
5C748000
heap
page read and write
13CFE000
stack
page read and write
92C000
heap
page read and write
43B4C000
heap
page read and write
29F7000
heap
page read and write
36F1D000
heap
page read and write
3468000
heap
page read and write
2E40000
heap
page read and write
2A4D000
heap
page read and write
78C1A000
heap
page read and write
51DE000
heap
page read and write
56C5000
heap
page read and write
51EFE000
stack
page read and write
92F000
heap
page read and write
5023E000
stack
page read and write
59CFE000
stack
page read and write
2A6E000
heap
page read and write
3809000
heap
page read and write
750E000
stack
page read and write
A17000
heap
page read and write
38AD000
heap
page read and write
3855000
heap
page read and write
5C59E000
heap
page read and write
1307E000
stack
page read and write
3A8D000
heap
page read and write
4684000
heap
page read and write
87CE000
stack
page read and write
8B0000
heap
page read and write
90CD000
stack
page read and write
339E000
heap
page read and write
3F57E000
stack
page read and write
3398000
heap
page read and write
384D000
heap
page read and write
78C64000
heap
page read and write
6282000
heap
page read and write
1857E000
stack
page read and write
5C5F8000
heap
page read and write
389A000
heap
page read and write
3733000
heap
page read and write
528BE000
stack
page read and write
36EB6000
heap
page read and write
3D27E000
stack
page read and write
35CE000
stack
page read and write
38AD000
heap
page read and write
608A000
heap
page read and write
57F7000
heap
page read and write
34D4000
heap
page read and write
5127E000
stack
page read and write
596E000
heap
page read and write
37A2000
heap
page read and write
142FD000
stack
page read and write
1443E000
stack
page read and write
197FE000
stack
page read and write
3903E000
stack
page read and write
A60E000
stack
page read and write
19E3E000
stack
page read and write
3865000
heap
page read and write
43A38000
heap
page read and write
18CFE000
stack
page read and write
5683E000
stack
page read and write
5237E000
stack
page read and write
1118E000
stack
page read and write
58C1000
heap
page read and write
3E4B000
heap
page read and write
6CCE000
stack
page read and write
43A42000
heap
page read and write
400000
unkown
page readonly
3893000
heap
page read and write
2E2F000
unkown
page readonly
644D000
stack
page read and write
36F33000
heap
page read and write
3C1FE000
stack
page read and write
43A1B000
heap
page read and write
1CC7E000
stack
page read and write
5C890000
heap
page read and write
420B000
heap
page read and write
630C000
heap
page read and write
3C5F000
heap
page read and write
5000000
heap
page execute and read and write
574BE000
stack
page read and write
6258000
heap
page read and write
418000
unkown
page write copy
3927000
heap
page read and write
36ED6000
heap
page read and write
575BE000
stack
page read and write
41AFE000
stack
page read and write
3F93E000
stack
page read and write
3E20000
heap
page read and write
4963E000
stack
page read and write
36FED000
heap
page read and write
5C94C000
heap
page read and write
6318000
heap
page read and write
5C29000
heap
page read and write
10D8E000
stack
page read and write
36FD2000
heap
page read and write
36E90000
heap
page read and write
5C38A000
heap
page read and write
5200000
direct allocation
page execute and read and write
172BE000
stack
page read and write
1C5E0000
heap
page read and write
F4CE000
stack
page read and write
5C5A2000
heap
page read and write
15D3E000
stack
page read and write
1853E000
stack
page read and write
4EB8000
heap
page read and write
3CF7000
heap
page read and write
2EFBE000
stack
page read and write
4097E000
stack
page read and write
43DCA000
heap
page read and write
78C12000
heap
page read and write
5C75C000
heap
page read and write
3833000
heap
page read and write
3A848000
heap
page read and write
7A8E000
stack
page read and write
36F09000
heap
page read and write
325BE000
stack
page read and write
43A07000
heap
page read and write
2FC0000
heap
page read and write
5BB9000
heap
page read and write
5BCF000
heap
page read and write
5C718000
heap
page read and write
A13000
heap
page read and write
43BBD000
heap
page read and write
43D10000
heap
page read and write
40C5000
heap
page read and write
3926000
heap
page read and write
1E0000
heap
page read and write
48B7000
heap
page read and write
F9CE000
stack
page read and write
5C678000
heap
page read and write
3CCB000
heap
page read and write
55EF000
heap
page read and write
1BAFE000
stack
page read and write
5C416000
heap
page read and write
36E7E000
heap
page read and write
3221000
heap
page read and write
16C7E000
stack
page read and write
A4CE000
stack
page read and write
36E3A000
heap
page read and write
1C534000
heap
page read and write
4B0BE000
stack
page read and write
1B9FE000
stack
page read and write
57E1000
heap
page read and write
18CBE000
stack
page read and write
4BA7E000
stack
page read and write
4BE7E000
stack
page read and write
445BE000
stack
page read and write
1493E000
stack
page read and write
9C000
stack
page read and write
5DEC000
heap
page read and write
400000
unkown
page readonly
5719000
heap
page read and write
78BFC000
heap
page read and write
1523E000
stack
page read and write
3718000
heap
page read and write
36E3C000
heap
page read and write
566A000
heap
page read and write
58AFE000
stack
page read and write
43BFD000
heap
page read and write
41D3E000
stack
page read and write
15FBE000
stack
page read and write
498FE000
stack
page read and write
43B41000
heap
page read and write
5B9D000
heap
page read and write
384A000
heap
page read and write
607A000
heap
page read and write
E5CE000
stack
page read and write
36E85000
heap
page read and write
5C644000
heap
page read and write
2DAFE000
stack
page read and write
523FE000
stack
page read and write
598D000
heap
page read and write
FB0E000
stack
page read and write
515FE000
stack
page read and write
3892000
heap
page read and write
407FE000
stack
page read and write
5426000
heap
page read and write
57C2000
heap
page read and write
36EB9000
heap
page read and write
5A59000
heap
page read and write
5E7D000
heap
page read and write
3B4FE000
stack
page read and write
56CFE000
stack
page read and write
5C51E000
heap
page read and write
382C000
heap
page read and write
4ECFE000
stack
page read and write
5C48C000
heap
page read and write
840F000
unkown
page read and write
2E50000
heap
page read and write
56CD000
heap
page read and write
59C5000
heap
page read and write
3D84000
heap
page read and write
5532000
heap
page read and write
4FABE000
stack
page read and write
55A8000
heap
page read and write
5C8E000
heap
page read and write
E84E000
stack
page read and write
36F0B000
heap
page read and write
910E000
stack
page read and write
3D18000
heap
page read and write
2D51000
heap
page read and write
A0E000
stack
page read and write
13E3E000
stack
page read and write
3BFBE000
stack
page read and write
43BB1000
heap
page read and write
3CD1000
heap
page read and write
3002000
heap
page read and write
3AAD000
heap
page read and write
29D4000
heap
page read and write
3802000
heap
page read and write
29FB000
heap
page read and write
4F57E000
stack
page read and write
424BE000
stack
page read and write
386A000
heap
page read and write
3D14000
heap
page read and write
121CE000
stack
page read and write
5BEF000
heap
page read and write
3381000
heap
page read and write
5C53C000
heap
page read and write
36EE3000
heap
page read and write
2E40000
trusted library allocation
page read and write
57E4000
heap
page read and write
164BE000
stack
page read and write
3CD6000
heap
page read and write
27E0000
heap
page read and write
3EDFE000
stack
page read and write
1168E000
stack
page read and write
5C8E6000
heap
page read and write
3200000
heap
page read and write
1597E000
stack
page read and write
5594000
heap
page read and write
5518000
heap
page read and write
18BBE000
stack
page read and write
36F26000
heap
page read and write
5963E000
stack
page read and write
401000
unkown
page execute read
5672000
heap
page read and write
55FBE000
stack
page read and write
3D9BE000
stack
page read and write
5BA7000
heap
page read and write
5264000
heap
page read and write
15EBE000
stack
page read and write
29FE000
heap
page read and write
6262000
heap
page read and write
36E8D000
heap
page read and write
1C544000
heap
page read and write
2C37E000
stack
page read and write
137FE000
stack
page read and write
5A7FE000
stack
page read and write
3855000
heap
page read and write
5307E000
stack
page read and write
5C9F6000
heap
page read and write
386A000
heap
page read and write
963000
heap
page read and write
5C92000
heap
page read and write
418000
unkown
page write copy
1677E000
stack
page read and write
1457E000
stack
page read and write
1817E000
stack
page read and write
1BEFE000
stack
page read and write
1C50E000
heap
page read and write
5C9FA000
heap
page read and write
5C92B000
heap
page read and write
37A3000
heap
page read and write
4237E000
stack
page read and write
2CCE000
stack
page read and write
3997E000
stack
page read and write
9B0E000
stack
page read and write
6012000
heap
page read and write
3DDE000
heap
page read and write
36EBD000
heap
page read and write
3865000
heap
page read and write
3A0BE000
stack
page read and write
43D33000
heap
page read and write
78CA0000
heap
page read and write
1290E000
stack
page read and write
183FE000
stack
page read and write
380F000
heap
page read and write
1AFBE000
stack
page read and write
5C8A0000
heap
page read and write
400000
unkown
page readonly
8C0E000
stack
page read and write
D74D000
stack
page read and write
D01000
heap
page read and write
5C5BE000
heap
page read and write
377FE000
stack
page read and write
37AE000
heap
page read and write
1074E000
stack
page read and write
451FE000
stack
page read and write
3D5A000
heap
page read and write
38A1000
heap
page read and write
3B08000
heap
page read and write
5C6F6000
heap
page read and write
308FE000
stack
page read and write
9ECE000
stack
page read and write
12F3E000
stack
page read and write
132FE000
stack
page read and write
5C504000
heap
page read and write
5A05000
heap
page read and write
10A0E000
stack
page read and write
78BA4000
heap
page read and write
36E00000
heap
page read and write
5C490000
heap
page read and write
36EEA000
heap
page read and write
4B33E000
stack
page read and write
78CD4000
heap
page read and write
5AC5000
heap
page read and write
38AD000
heap
page read and write
2800000
heap
page read and write
1C5FB000
heap
page read and write
432BE000
stack
page read and write
1230E000
stack
page read and write
43B38000
heap
page read and write
37D2000
heap
page read and write
373FE000
stack
page read and write
36F2D000
heap
page read and write
3B23E000
stack
page read and write
29E1000
heap
page read and write
60C9000
heap
page read and write
911000
heap
page read and write
3A6D000
heap
page read and write
3202000
heap
page read and write
19C000
stack
page read and write
938E000
stack
page read and write
5317E000
stack
page read and write
54A4000
heap
page read and write
388B000
heap
page read and write
5C5F2000
heap
page read and write
8A0F000
stack
page read and write
36F2B000
heap
page read and write
14BBE000
stack
page read and write
36E15000
heap
page read and write
5A55000
heap
page read and write
36E48000
heap
page read and write
6111000
heap
page read and write
9C1000
heap
page read and write
59B5000
heap
page read and write
56EB000
heap
page read and write
3A8BF000
heap
page read and write
937000
heap
page read and write
5DF6000
heap
page read and write
1893E000
stack
page read and write
36E4A000
heap
page read and write
5457E000
stack
page read and write
281C000
heap
page read and write
418000
unkown
page write copy
5F59000
heap
page read and write
3E53E000
stack
page read and write
1583E000
stack
page read and write
4F5BE000
stack
page read and write
43B3A000
heap
page read and write
131BE000
stack
page read and write
5CF9000
heap
page read and write
179FE000
stack
page read and write
5C926000
heap
page read and write
6193000
heap
page read and write
3DDE000
heap
page read and write
2E50000
heap
page read and write
3462000
heap
page read and write
4A46000
heap
page read and write
3B8C000
heap
page read and write
9C000
stack
page read and write
6B4E000
stack
page read and write
1C9BE000
stack
page read and write
591BE000
stack
page read and write
6210000
heap
page read and write
39FA000
heap
page read and write
320A000
heap
page read and write
2D51000
heap
page read and write
542FE000
stack
page read and write
3E20000
heap
page read and write
3DD7E000
stack
page read and write
633E000
heap
page read and write
1753E000
stack
page read and write
1C63E000
stack
page read and write
4E12000
heap
page read and write
506FE000
stack
page read and write
10DCE000
stack
page read and write
5C3F0000
heap
page read and write
11B4E000
stack
page read and write
38D2000
heap
page read and write
3233E000
stack
page read and write
51B3E000
stack
page read and write
4977E000
stack
page read and write
39D9000
heap
page read and write
36FBC000
heap
page read and write
5C424000
heap
page read and write
3CBFE000
stack
page read and write
36F10000
heap
page read and write
4227E000
stack
page read and write
78CBE000
heap
page read and write
F0CE000
stack
page read and write
37E4000
heap
page read and write
5C660000
heap
page read and write
5C6BA000
heap
page read and write
401FE000
stack
page read and write
3A5D000
heap
page read and write
36EC8000
heap
page read and write
5C80000
heap
page read and write
188FE000
stack
page read and write
36F02000
heap
page read and write
43D1B000
heap
page read and write
29E9000
heap
page read and write
38C9000
heap
page read and write
36F3F000
heap
page read and write
3A8F3000
heap
page read and write
2995000
heap
page read and write
3D10000
heap
page read and write
2C99000
heap
page read and write
55D7000
heap
page read and write
1C55D000
heap
page read and write
3BCFE000
stack
page read and write
5709000
heap
page read and write
36ECA000
heap
page read and write
169BE000
stack
page read and write
43A3A000
heap
page read and write
5C79F000
heap
page read and write
43F3E000
stack
page read and write
1727E000
stack
page read and write
55EBE000
stack
page read and write
36FB4000
heap
page read and write
3467000
heap
page read and write
43D5B000
heap
page read and write
631C000
heap
page read and write
43CCB000
heap
page read and write
11DCE000
stack
page read and write
5C4AE000
heap
page read and write
401000
unkown
page execute read
2E9E000
stack
page read and write
4C400000
trusted library allocation
page read and write
5447E000
stack
page read and write
6274000
heap
page read and write
5A2FE000
stack
page read and write
55DD000
heap
page read and write
3CB0000
heap
page read and write
5C77E000
heap
page read and write
3A1FE000
stack
page read and write
4583E000
stack
page read and write
2E50000
trusted library allocation
page read and write
1208E000
stack
page read and write
381F000
heap
page read and write
984E000
stack
page read and write
3CDA000
heap
page read and write
441FE000
stack
page read and write
563BE000
stack
page read and write
3D87000
heap
page read and write
56BFE000
stack
page read and write
5D36000
heap
page read and write
ED0E000
stack
page read and write
487BE000
stack
page read and write
5C380000
heap
page read and write
14FBE000
stack
page read and write
5C470000
heap
page read and write
5DD8000
heap
page read and write
6070000
heap
page read and write
374B000
heap
page read and write
2D60000
heap
page read and write
3DAFE000
stack
page read and write
3396000
heap
page read and write
4AF7E000
stack
page read and write
19C000
stack
page read and write
410000
unkown
page readonly
3817000
heap
page read and write
36E43000
heap
page read and write
7ECD000
stack
page read and write
551D000
heap
page read and write
5585000
heap
page read and write
37E5000
heap
page read and write
A13000
heap
page read and write
5C6F0000
heap
page read and write
13F3E000
stack
page read and write
3EEFE000
stack
page read and write
5C4EE000
heap
page read and write
4043000
heap
page read and write
5C6E8000
heap
page read and write
1573E000
stack
page read and write
41ABE000
stack
page read and write
3993E000
stack
page read and write
57F2000
heap
page read and write
3E03E000
stack
page read and write
6115000
heap
page read and write
D50000
unclassified section
page read and write
2ED0000
heap
page read and write
9BC000
heap
page read and write
494FE000
stack
page read and write
3D9C000
heap
page read and write
43B4A000
heap
page read and write
113CE000
stack
page read and write
4A58000
heap
page read and write
9E8E000
stack
page read and write
441BE000
stack
page read and write
7CCB000
stack
page read and write
11F0E000
stack
page read and write
569D000
heap
page read and write
5BAF000
heap
page read and write
5CA06000
heap
page read and write
5C9F2000
heap
page read and write
52FFE000
stack
page read and write
2DFFE000
stack
page read and write
37A2000
heap
page read and write
9A2000
heap
page read and write
1AF7E000
stack
page read and write
3706000
heap
page read and write
5C5E0000
heap
page read and write
49EFE000
stack
page read and write
624C000
heap
page read and write
43DAB000
heap
page read and write
2640000
heap
page read and write
36FAA000
heap
page read and write
5687E000
stack
page read and write
CFCD000
stack
page read and write
3872000
heap
page read and write
678D000
stack
page read and write
2812000
heap
page read and write
61EB000
heap
page read and write
43B1D000
heap
page read and write
5C4CC000
heap
page read and write
1C50A000
heap
page read and write
2A25000
heap
page read and write
438BE000
stack
page read and write
191BE000
stack
page read and write
382C000
heap
page read and write
3880000
heap
page read and write
541BE000
stack
page read and write
E5D0000
heap
page read and write
54FE000
heap
page read and write
5E26000
heap
page read and write
5DB6000
heap
page read and write
29E9000
heap
page read and write
1C8BE000
stack
page read and write
3A69000
heap
page read and write
5C394000
heap
page read and write
400000
unkown
page execute and read and write
4AA3E000
stack
page read and write
664E000
stack
page read and write
4F13E000
stack
page read and write
3ECB000
heap
page read and write
429BE000
stack
page read and write
4BD3E000
stack
page read and write
32F1000
heap
page read and write
43B92000
heap
page read and write
3FA3E000
stack
page read and write
2A6E000
heap
page read and write
2A83000
heap
page read and write
43DB8000
heap
page read and write
2EDA000
heap
page read and write
5746000
heap
page read and write
38AD000
heap
page read and write
1C5D8000
heap
page read and write
43A33000
heap
page read and write
3D67E000
stack
page read and write
1357E000
stack
page read and write
3E53000
heap
page read and write
29C2000
heap
page read and write
43BA4000
heap
page read and write
52CBE000
stack
page read and write
2E2C000
unkown
page read and write
60CD000
heap
page read and write
3808000
heap
page read and write
16EBE000
stack
page read and write
5AA7E000
stack
page read and write
2901000
heap
page read and write
3EF5000
heap
page read and write
898E000
stack
page read and write
4967E000
stack
page read and write
There are 1928 hidden memdumps, click here to show them.