IOC Report
nD2ozRD7MN.exe

loading gif

Files

File Path
Type
Category
Malicious
nD2ozRD7MN.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files (x86)\DNS Host\dnshost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\DNS Host\dnshost.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_nD2ozRD7MN.exe_4fa1da79cea2cbf32999c8e1107f97476821d1_8feead53_d883b67e-1feb-4267-a892-15cd5ec5b08e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\nD2ozRD7MN.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpC5F1.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\run.dat
ISO-8859 text, with no line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3715.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Nov 1 05:21:06 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC750.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC79F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dnshost.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3ohjy5so.4eb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_czbpvgmy.cwb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dmfjbfr1.d2r.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jqck4s30.o1a.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pduy52k5.4a5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pi4k1zyf.1x5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r3r1hvfs.xda.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sudve215.sqg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t4g4q4fv.uf3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ujtan33d.4pj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wvi5vtw4.jjn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zcimjcld.jah.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpC8C1.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\catalog.dat
data
dropped
C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\settings.bin
data
dropped
C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\storage.dat
data
dropped
C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\task.dat
ASCII text, with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 20 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\nD2ozRD7MN.exe
"C:\Users\user\Desktop\nD2ozRD7MN.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nD2ozRD7MN.exe"
malicious
C:\Users\user\Desktop\nD2ozRD7MN.exe
"C:\Users\user\Desktop\nD2ozRD7MN.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmpC5F1.tmp"
malicious
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /create /f /tn "DNS Host Task" /xml "C:\Users\user\AppData\Local\Temp\tmpC8C1.tmp"
malicious
C:\Users\user\Desktop\nD2ozRD7MN.exe
C:\Users\user\Desktop\nD2ozRD7MN.exe 0
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nD2ozRD7MN.exe"
malicious
C:\Users\user\Desktop\nD2ozRD7MN.exe
"C:\Users\user\Desktop\nD2ozRD7MN.exe"
malicious
C:\Program Files (x86)\DNS Host\dnshost.exe
"C:\Program Files (x86)\DNS Host\dnshost.exe" 0
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files (x86)\DNS Host\dnshost.exe"
malicious
C:\Program Files (x86)\DNS Host\dnshost.exe
"C:\Program Files (x86)\DNS Host\dnshost.exe"
malicious
C:\Program Files (x86)\DNS Host\dnshost.exe
"C:\Program Files (x86)\DNS Host\dnshost.exe"
malicious
C:\Program Files (x86)\DNS Host\dnshost.exe
"C:\Program Files (x86)\DNS Host\dnshost.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 1960
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
66.63.187.113
malicious
http://google.com
unknown
malicious
http://upx.sf.net
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

IPs

IP
Domain
Country
Malicious
66.63.187.113
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
DNS Host
\REGISTRY\A\{e0af4acf-5ca4-fa40-2d92-be0b344241d8}\Root\InventoryApplicationFile\nd2ozrd7mn.exe|69cf10a29b0a30cd
ProgramId
\REGISTRY\A\{e0af4acf-5ca4-fa40-2d92-be0b344241d8}\Root\InventoryApplicationFile\nd2ozrd7mn.exe|69cf10a29b0a30cd
FileId
\REGISTRY\A\{e0af4acf-5ca4-fa40-2d92-be0b344241d8}\Root\InventoryApplicationFile\nd2ozrd7mn.exe|69cf10a29b0a30cd
LowerCaseLongPath
\REGISTRY\A\{e0af4acf-5ca4-fa40-2d92-be0b344241d8}\Root\InventoryApplicationFile\nd2ozrd7mn.exe|69cf10a29b0a30cd
LongPathHash
\REGISTRY\A\{e0af4acf-5ca4-fa40-2d92-be0b344241d8}\Root\InventoryApplicationFile\nd2ozrd7mn.exe|69cf10a29b0a30cd
Name
\REGISTRY\A\{e0af4acf-5ca4-fa40-2d92-be0b344241d8}\Root\InventoryApplicationFile\nd2ozrd7mn.exe|69cf10a29b0a30cd
OriginalFileName
\REGISTRY\A\{e0af4acf-5ca4-fa40-2d92-be0b344241d8}\Root\InventoryApplicationFile\nd2ozrd7mn.exe|69cf10a29b0a30cd
Publisher
\REGISTRY\A\{e0af4acf-5ca4-fa40-2d92-be0b344241d8}\Root\InventoryApplicationFile\nd2ozrd7mn.exe|69cf10a29b0a30cd
Version
\REGISTRY\A\{e0af4acf-5ca4-fa40-2d92-be0b344241d8}\Root\InventoryApplicationFile\nd2ozrd7mn.exe|69cf10a29b0a30cd
BinFileVersion
\REGISTRY\A\{e0af4acf-5ca4-fa40-2d92-be0b344241d8}\Root\InventoryApplicationFile\nd2ozrd7mn.exe|69cf10a29b0a30cd
BinaryType
\REGISTRY\A\{e0af4acf-5ca4-fa40-2d92-be0b344241d8}\Root\InventoryApplicationFile\nd2ozrd7mn.exe|69cf10a29b0a30cd
ProductName
\REGISTRY\A\{e0af4acf-5ca4-fa40-2d92-be0b344241d8}\Root\InventoryApplicationFile\nd2ozrd7mn.exe|69cf10a29b0a30cd
ProductVersion
\REGISTRY\A\{e0af4acf-5ca4-fa40-2d92-be0b344241d8}\Root\InventoryApplicationFile\nd2ozrd7mn.exe|69cf10a29b0a30cd
LinkDate
\REGISTRY\A\{e0af4acf-5ca4-fa40-2d92-be0b344241d8}\Root\InventoryApplicationFile\nd2ozrd7mn.exe|69cf10a29b0a30cd
BinProductVersion
\REGISTRY\A\{e0af4acf-5ca4-fa40-2d92-be0b344241d8}\Root\InventoryApplicationFile\nd2ozrd7mn.exe|69cf10a29b0a30cd
AppxPackageFullName
\REGISTRY\A\{e0af4acf-5ca4-fa40-2d92-be0b344241d8}\Root\InventoryApplicationFile\nd2ozrd7mn.exe|69cf10a29b0a30cd
AppxPackageRelativeId
\REGISTRY\A\{e0af4acf-5ca4-fa40-2d92-be0b344241d8}\Root\InventoryApplicationFile\nd2ozrd7mn.exe|69cf10a29b0a30cd
Size
\REGISTRY\A\{e0af4acf-5ca4-fa40-2d92-be0b344241d8}\Root\InventoryApplicationFile\nd2ozrd7mn.exe|69cf10a29b0a30cd
Language
\REGISTRY\A\{e0af4acf-5ca4-fa40-2d92-be0b344241d8}\Root\InventoryApplicationFile\nd2ozrd7mn.exe|69cf10a29b0a30cd
Usn
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4075000
trusted library allocation
page read and write
malicious
5CD0000
trusted library section
page read and write
malicious
2C31000
trusted library allocation
page read and write
malicious
2D91000
trusted library allocation
page read and write
malicious
4129000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
47CA000
trusted library allocation
page read and write
malicious
3C39000
trusted library allocation
page read and write
malicious
3F79000
trusted library allocation
page read and write
malicious
33B1000
trusted library allocation
page read and write
malicious
E0E000
stack
page read and write
5480000
heap
page read and write
25A0000
trusted library allocation
page execute and read and write
4D50000
heap
page read and write
9C2000
trusted library allocation
page read and write
E67000
trusted library allocation
page execute and read and write
EF5E000
stack
page read and write
336D000
trusted library allocation
page read and write
2F56000
trusted library allocation
page read and write
5970000
trusted library allocation
page read and write
97E000
stack
page read and write
5890000
trusted library allocation
page read and write
5CBE000
stack
page read and write
4D5A000
trusted library allocation
page read and write
1430000
heap
page read and write
3397000
trusted library allocation
page read and write
3403000
trusted library allocation
page read and write
1750000
trusted library allocation
page read and write
5190000
heap
page read and write
2B31000
trusted library allocation
page read and write
1780000
trusted library allocation
page read and write
338F000
trusted library allocation
page read and write
2640000
heap
page read and write
74E0000
trusted library allocation
page execute and read and write
7880000
trusted library section
page read and write
5FB0000
trusted library allocation
page read and write
322F000
stack
page read and write
1770000
trusted library allocation
page read and write
E33000
trusted library allocation
page execute and read and write
3150000
heap
page execute and read and write
6D1E000
heap
page read and write
174D000
trusted library allocation
page execute and read and write
8F7000
stack
page read and write
4305000
trusted library allocation
page read and write
13F0000
heap
page read and write
F05E000
stack
page read and write
2833000
heap
page read and write
59F0000
heap
page read and write
54C0000
heap
page read and write
5800000
heap
page read and write
9D000
stack
page read and write
FD0000
heap
page read and write
4B09000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
9B2000
trusted library allocation
page read and write
E34000
trusted library allocation
page read and write
38E0000
trusted library allocation
page read and write
2ED5000
trusted library allocation
page read and write
DA0000
heap
page read and write
32CF000
trusted library allocation
page read and write
14AB000
trusted library allocation
page read and write
EF7000
stack
page read and write
5836000
trusted library allocation
page read and write
15E0000
heap
page read and write
16A2000
trusted library allocation
page read and write
4F40000
heap
page read and write
2EE0000
trusted library allocation
page read and write
1039000
stack
page read and write
33C5000
trusted library allocation
page read and write
27D0000
heap
page read and write
416A000
trusted library allocation
page read and write
7EA0000
trusted library section
page read and write
56F0000
trusted library allocation
page execute and read and write
3060000
heap
page read and write
3415000
trusted library allocation
page read and write
4669000
trusted library allocation
page read and write
337B000
trusted library allocation
page read and write
5480000
heap
page read and write
343D000
trusted library allocation
page read and write
1670000
trusted library allocation
page read and write
14C6000
trusted library allocation
page read and write
6F14000
heap
page read and write
730E000
stack
page read and write
5834000
trusted library allocation
page read and write
334B000
trusted library allocation
page read and write
AB3000
heap
page read and write
4A8A000
trusted library allocation
page read and write
19B0000
trusted library allocation
page execute and read and write
B6A000
heap
page read and write
6BE0000
trusted library allocation
page execute and read and write
E6B000
trusted library allocation
page execute and read and write
1775000
trusted library allocation
page read and write
5E7F000
stack
page read and write
258E000
stack
page read and write
1317000
trusted library allocation
page execute and read and write
3425000
trusted library allocation
page read and write
56E0000
heap
page read and write
7E3C000
stack
page read and write
10C0000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
3070000
heap
page read and write
30E0000
trusted library allocation
page read and write
4C71000
trusted library allocation
page read and write
6A80000
heap
page read and write
1113000
trusted library allocation
page read and write
47C6000
trusted library allocation
page read and write
5310000
heap
page read and write
11B5000
heap
page read and write
532C000
stack
page read and write
3DAF000
trusted library allocation
page read and write
1680000
trusted library allocation
page read and write
F20000
trusted library allocation
page execute and read and write
33EB000
trusted library allocation
page read and write
ECE000
stack
page read and write
5976000
trusted library allocation
page read and write
5C7E000
stack
page read and write
18AE000
stack
page read and write
5180000
trusted library allocation
page read and write
428A000
trusted library allocation
page read and write
3989000
trusted library allocation
page read and write
3327000
trusted library allocation
page read and write
7860000
trusted library section
page read and write
427F000
trusted library allocation
page read and write
5DFE000
stack
page read and write
6BF0000
trusted library allocation
page execute and read and write
4D8D000
trusted library allocation
page read and write
1628000
trusted library allocation
page read and write
1306000
trusted library allocation
page execute and read and write
804B000
stack
page read and write
C30000
heap
page read and write
6B7E000
stack
page read and write
1717000
heap
page read and write
5A13000
heap
page read and write
32C5000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
1094000
trusted library allocation
page read and write
13F0000
trusted library allocation
page execute and read and write
A72000
unkown
page readonly
3919000
trusted library allocation
page read and write
69E0000
heap
page read and write
43B1000
trusted library allocation
page read and write
28B0000
trusted library allocation
page read and write
38A9000
trusted library allocation
page read and write
784C000
stack
page read and write
78F8000
trusted library section
page read and write
33A5000
trusted library allocation
page read and write
F69000
stack
page read and write
7F290000
trusted library allocation
page execute and read and write
1122000
trusted library allocation
page read and write
5856000
trusted library allocation
page read and write
5131000
trusted library allocation
page read and write
16C0000
trusted library allocation
page read and write
33AF000
trusted library allocation
page read and write
12E3000
trusted library allocation
page execute and read and write
11A4000
heap
page read and write
56C1000
trusted library allocation
page read and write
1335000
heap
page read and write
129E000
stack
page read and write
56A4000
trusted library allocation
page read and write
57B0000
heap
page execute and read and write
33E1000
trusted library allocation
page read and write
15E8000
heap
page read and write
774C000
stack
page read and write
1310000
heap
page execute and read and write
52FA000
trusted library allocation
page read and write
512E000
trusted library allocation
page read and write
28A0000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
F20000
heap
page read and write
33FD000
trusted library allocation
page read and write
33AB000
trusted library allocation
page read and write
B2E000
unkown
page readonly
1A1E000
stack
page read and write
1170000
trusted library allocation
page read and write
56DE000
stack
page read and write
9A0000
trusted library allocation
page read and write
17B0000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
341F000
trusted library allocation
page read and write
1302000
trusted library allocation
page read and write
30FF000
stack
page read and write
1300000
trusted library allocation
page execute and read and write
96E1000
heap
page read and write
42AB000
trusted library allocation
page read and write
45E4000
trusted library allocation
page read and write
5880000
trusted library allocation
page read and write
3261000
trusted library allocation
page read and write
4E7D000
trusted library allocation
page read and write
30BE000
stack
page read and write
5A4D000
stack
page read and write
1160000
heap
page read and write
43D9000
trusted library allocation
page read and write
33A9000
trusted library allocation
page read and write
3307000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page execute and read and write
1110000
trusted library allocation
page read and write
136E000
stack
page read and write
78F0000
trusted library section
page read and write
3407000
trusted library allocation
page read and write
5870000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
72EE000
stack
page read and write
3325000
trusted library allocation
page read and write
152A000
heap
page read and write
335B000
trusted library allocation
page read and write
9BA000
trusted library allocation
page execute and read and write
F90000
heap
page read and write
FF0000
heap
page read and write
5730000
heap
page read and write
1720000
trusted library allocation
page read and write
397A000
trusted library allocation
page read and write
4DA9000
trusted library allocation
page read and write
7EE30000
trusted library allocation
page execute and read and write
70B0000
heap
page read and write
A52000
heap
page read and write
2C0C000
trusted library allocation
page read and write
4E50000
trusted library allocation
page read and write
4F20000
heap
page execute and read and write
71D0000
heap
page read and write
56BE000
trusted library allocation
page read and write
76D0000
trusted library section
page read and write
5370000
heap
page read and write
1656000
heap
page read and write
5193000
heap
page read and write
3335000
trusted library allocation
page read and write
78A0000
trusted library section
page read and write
175D000
trusted library allocation
page execute and read and write
5543000
heap
page read and write
33EF000
trusted library allocation
page read and write
1762000
trusted library allocation
page read and write
6A30000
heap
page read and write
1104000
trusted library allocation
page read and write
3393000
trusted library allocation
page read and write
1696000
trusted library allocation
page execute and read and write
516E000
stack
page read and write
5EA000
heap
page read and write
1200000
heap
page read and write
5110000
trusted library allocation
page read and write
1137000
trusted library allocation
page execute and read and write
2889000
trusted library allocation
page read and write
1617000
heap
page read and write
163F000
stack
page read and write
1109000
stack
page read and write
33FF000
trusted library allocation
page read and write
139E000
stack
page read and write
262C000
stack
page read and write
13A0000
heap
page read and write
5B05000
heap
page read and write
F7E000
stack
page read and write
39CE000
trusted library allocation
page read and write
33ED000
trusted library allocation
page read and write
7D0E000
stack
page read and write
56D2000
trusted library allocation
page read and write
4679000
trusted library allocation
page read and write
1647000
heap
page read and write
3345000
trusted library allocation
page read and write
7660000
heap
page read and write
4295000
trusted library allocation
page read and write
2C0F000
trusted library allocation
page read and write
54F000
stack
page read and write
1100000
trusted library allocation
page read and write
1598000
heap
page read and write
341B000
trusted library allocation
page read and write
5160000
trusted library allocation
page read and write
11C0000
heap
page read and write
58F0000
trusted library allocation
page execute and read and write
337D000
trusted library allocation
page read and write
38C5000
trusted library allocation
page read and write
5A10000
heap
page read and write
71FC000
stack
page read and write
7040000
trusted library allocation
page execute and read and write
4E20000
trusted library allocation
page read and write
424E000
trusted library allocation
page read and write
330F000
trusted library allocation
page read and write
16A0000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
1237000
heap
page read and write
57F0000
heap
page read and write
5FA0000
trusted library section
page read and write
71C6000
heap
page read and write
113B000
trusted library allocation
page execute and read and write
1140000
trusted library allocation
page read and write
E15000
trusted library allocation
page read and write
336B000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
11B0000
trusted library allocation
page execute and read and write
4ED0000
heap
page read and write
3305000
trusted library allocation
page read and write
276E000
trusted library allocation
page read and write
494C000
stack
page read and write
2EB6000
trusted library allocation
page read and write
78E0000
trusted library allocation
page execute and read and write
319A000
heap
page read and write
6D00000
heap
page read and write
2EC0000
trusted library allocation
page execute and read and write
2F70000
heap
page read and write
59A0000
heap
page read and write
3419000
trusted library allocation
page read and write
5B7E000
stack
page read and write
3337000
trusted library allocation
page read and write
585D000
trusted library allocation
page read and write
3285000
trusted library allocation
page read and write
5136000
trusted library allocation
page read and write
13EC000
stack
page read and write
3351000
trusted library allocation
page read and write
3911000
trusted library allocation
page read and write
F2CC000
stack
page read and write
2C10000
trusted library allocation
page read and write
FE0000
heap
page read and write
790E000
stack
page read and write
3411000
trusted library allocation
page read and write
6B42000
heap
page read and write
1150000
trusted library allocation
page read and write
12E4000
trusted library allocation
page read and write
6881000
stack
page read and write
3127000
trusted library allocation
page read and write
59D0000
heap
page read and write
F00000
heap
page read and write
7000000
trusted library allocation
page read and write
12F3000
trusted library allocation
page read and write
1126000
trusted library allocation
page execute and read and write
4255000
trusted library allocation
page read and write
117B000
trusted library allocation
page execute and read and write
342F000
trusted library allocation
page read and write
1741000
trusted library allocation
page read and write
777000
stack
page read and write
4F50000
trusted library allocation
page execute and read and write
33BF000
trusted library allocation
page read and write
10B0000
trusted library allocation
page read and write
794E000
stack
page read and write
6CBE000
stack
page read and write
53EC000
stack
page read and write
3922000
trusted library allocation
page read and write
7F700000
trusted library allocation
page execute and read and write
5440000
heap
page read and write
7634000
heap
page read and write
338D000
trusted library allocation
page read and write
6BD0000
trusted library allocation
page read and write
3421000
trusted library allocation
page read and write
5862000
trusted library allocation
page read and write
3313000
trusted library allocation
page read and write
3311000
trusted library allocation
page read and write
5ED0000
trusted library allocation
page execute and read and write
1520000
heap
page read and write
337F000
trusted library allocation
page read and write
1772000
trusted library allocation
page read and write
1110000
heap
page read and write
33B5000
trusted library allocation
page read and write
56C0000
trusted library section
page readonly
F10000
heap
page read and write
283F000
stack
page read and write
1720000
heap
page read and write
33CD000
trusted library allocation
page read and write
E37000
heap
page read and write
5FC0000
heap
page read and write
96A0000
heap
page read and write
4CE5000
trusted library allocation
page read and write
762F000
stack
page read and write
60FE000
stack
page read and write
114D000
trusted library allocation
page execute and read and write
56F1000
trusted library allocation
page read and write
5221000
trusted library allocation
page read and write
3391000
trusted library allocation
page read and write
7F30000
trusted library allocation
page execute and read and write
764F000
heap
page read and write
2771000
trusted library allocation
page read and write
327F000
trusted library allocation
page read and write
41E9000
trusted library allocation
page read and write
27F0000
trusted library allocation
page read and write
39B6000
trusted library allocation
page read and write
1020000
heap
page read and write
50C0000
trusted library allocation
page read and write
6FF0000
trusted library allocation
page read and write
F6E000
stack
page read and write
71EB000
heap
page read and write
4135000
trusted library allocation
page read and write
331D000
trusted library allocation
page read and write
4E80000
trusted library section
page readonly
333F000
trusted library allocation
page read and write
395A000
trusted library allocation
page read and write
3190000
heap
page read and write
3349000
trusted library allocation
page read and write
747E000
stack
page read and write
330D000
trusted library allocation
page read and write
8150000
trusted library allocation
page read and write
131B000
trusted library allocation
page execute and read and write
27E0000
trusted library allocation
page execute and read and write
5AAE000
stack
page read and write
130A000
trusted library allocation
page execute and read and write
552B000
stack
page read and write
6B0F000
heap
page read and write
5400000
trusted library allocation
page read and write
135E000
stack
page read and write
5471000
trusted library allocation
page read and write
332F000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
12ED000
trusted library allocation
page execute and read and write
38D4000
trusted library allocation
page read and write
71B0000
heap
page read and write
4268000
trusted library allocation
page read and write
3445000
trusted library allocation
page read and write
FB1000
heap
page read and write
12F8000
stack
page read and write
3DF9000
trusted library allocation
page read and write
3323000
trusted library allocation
page read and write
33BB000
trusted library allocation
page read and write
5150000
heap
page read and write
40AA000
trusted library allocation
page read and write
3379000
trusted library allocation
page read and write
651E000
stack
page read and write
4E90000
heap
page read and write
3383000
trusted library allocation
page read and write
33A3000
trusted library allocation
page read and write
3437000
trusted library allocation
page read and write
589D000
stack
page read and write
53F0000
trusted library allocation
page read and write
D16E000
stack
page read and write
1D0000
heap
page read and write
56D0000
heap
page read and write
379A000
trusted library allocation
page read and write
33DF000
trusted library allocation
page read and write
5EBC000
stack
page read and write
E1E000
stack
page read and write
4E7C000
stack
page read and write
14BE000
trusted library allocation
page read and write
1800000
heap
page read and write
332D000
trusted library allocation
page read and write
33D9000
trusted library allocation
page read and write
A20000
heap
page read and write
1750000
trusted library allocation
page read and write
7370000
trusted library allocation
page execute and read and write
54A0000
heap
page execute and read and write
5C11000
trusted library allocation
page read and write
2880000
trusted library allocation
page read and write
6DBE000
stack
page read and write
78C0000
trusted library section
page read and write
72E0000
trusted library allocation
page execute and read and write
550000
heap
page read and write
5A6E000
stack
page read and write
1630000
heap
page read and write
667E000
stack
page read and write
11B0000
heap
page read and write
1103000
trusted library allocation
page execute and read and write
397D000
trusted library allocation
page read and write
1700000
trusted library allocation
page read and write
334F000
trusted library allocation
page read and write
3443000
trusted library allocation
page read and write
E3D000
stack
page read and write
2F4B000
stack
page read and write
16C3000
heap
page read and write
339D000
trusted library allocation
page read and write
DA5000
heap
page read and write
3125000
trusted library allocation
page read and write
5650000
heap
page execute and read and write
4168000
trusted library allocation
page read and write
3355000
trusted library allocation
page read and write
327C000
trusted library allocation
page read and write
6ABE000
heap
page read and write
2F50000
trusted library allocation
page read and write
76C0000
heap
page read and write
53B0000
trusted library allocation
page execute and read and write
FBE000
stack
page read and write
2911000
trusted library allocation
page read and write
254F000
stack
page read and write
4E6E000
trusted library allocation
page read and write
994000
trusted library allocation
page read and write
4BFC000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
162F000
stack
page read and write
3454000
trusted library allocation
page read and write
38BC000
trusted library allocation
page read and write
687E000
stack
page read and write
1660000
trusted library allocation
page read and write
7EEC0000
trusted library allocation
page execute and read and write
A14000
trusted library allocation
page read and write
19C4000
trusted library allocation
page read and write
9A3000
trusted library allocation
page read and write
50E5000
heap
page read and write
F45000
heap
page read and write
4269000
trusted library allocation
page read and write
2F77000
heap
page read and write
28C0000
heap
page read and write
6C7D000
stack
page read and write
BCA000
stack
page read and write
2A71000
trusted library allocation
page read and write
33F5000
trusted library allocation
page read and write
4288000
trusted library allocation
page read and write
D30C000
stack
page read and write
33E3000
trusted library allocation
page read and write
1A20000
heap
page read and write
3409000
trusted library allocation
page read and write
5CF0000
heap
page execute and read and write
37A7000
trusted library allocation
page read and write
5CCD000
stack
page read and write
1310000
trusted library allocation
page read and write
274F000
stack
page read and write
2900000
heap
page execute and read and write
3389000
trusted library allocation
page read and write
33F1000
trusted library allocation
page read and write
6EDE000
stack
page read and write
50E000
stack
page read and write
11E0000
heap
page read and write
3439000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
5140000
trusted library section
page readonly
ECFF000
stack
page read and write
99D000
trusted library allocation
page execute and read and write
3387000
trusted library allocation
page read and write
8EE000
stack
page read and write
389C000
trusted library allocation
page read and write
5760000
heap
page read and write
7366000
trusted library allocation
page read and write
1704000
trusted library allocation
page read and write
11AE000
stack
page read and write
71CE000
stack
page read and write
3431000
trusted library allocation
page read and write
9F9000
stack
page read and write
116A000
trusted library allocation
page execute and read and write
3457000
trusted library allocation
page read and write
9F0000
trusted library allocation
page execute and read and write
7B8E000
stack
page read and write
2DF8000
trusted library allocation
page read and write
567E000
stack
page read and write
33AD000
trusted library allocation
page read and write
3294000
trusted library allocation
page read and write
33D7000
trusted library allocation
page read and write
800E000
stack
page read and write
152E000
heap
page read and write
AFF000
heap
page read and write
E50000
trusted library allocation
page read and write
7B50000
trusted library allocation
page read and write
5FFE000
stack
page read and write
59D0000
heap
page read and write
DA000
stack
page read and write
78CE000
stack
page read and write
3385000
trusted library allocation
page read and write
5EA000
stack
page read and write
E52000
trusted library allocation
page read and write
7890000
trusted library section
page read and write
2BF4000
trusted library allocation
page read and write
16E0000
trusted library allocation
page execute and read and write
52EC000
trusted library allocation
page read and write
EEE000
stack
page read and write
3918000
trusted library allocation
page read and write
4FC1000
trusted library allocation
page read and write
6B35000
heap
page read and write
35E8000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
940000
heap
page read and write
7900000
trusted library section
page read and write
33D3000
trusted library allocation
page read and write
343F000
trusted library allocation
page read and write
3371000
trusted library allocation
page read and write
1793000
heap
page read and write
39AC000
trusted library allocation
page read and write
16AB000
trusted library allocation
page execute and read and write
54B0000
trusted library allocation
page execute and read and write
A10000
trusted library allocation
page read and write
6E3E000
stack
page read and write
2BAE000
stack
page read and write
5E3E000
stack
page read and write
4E76000
trusted library allocation
page read and write
336F000
trusted library allocation
page read and write
2F54000
trusted library allocation
page read and write
5C8E000
stack
page read and write
5733000
heap
page read and write
3231000
trusted library allocation
page read and write
2F50000
heap
page read and write
8F0000
heap
page read and write
71E2000
heap
page read and write
133E000
stack
page read and write
FC0000
heap
page read and write
1760000
trusted library allocation
page read and write
2F30000
heap
page read and write
33E5000
trusted library allocation
page read and write
7579000
stack
page read and write
2EAE000
trusted library allocation
page read and write
3381000
trusted library allocation
page read and write
44EA000
trusted library allocation
page read and write
3429000
trusted library allocation
page read and write
4238000
trusted library allocation
page read and write
3359000
trusted library allocation
page read and write
2F6F000
trusted library allocation
page read and write
3435000
trusted library allocation
page read and write
6E40000
heap
page read and write
11C0000
heap
page read and write
1093000
trusted library allocation
page execute and read and write
140000
heap
page read and write
1710000
heap
page read and write
393A000
trusted library allocation
page read and write
6DDE000
stack
page read and write
5310000
trusted library allocation
page read and write
3375000
trusted library allocation
page read and write
6BA1000
trusted library allocation
page read and write
7BEE000
stack
page read and write
121D000
heap
page read and write
6EEE000
stack
page read and write
1166000
trusted library allocation
page execute and read and write
59C1000
trusted library allocation
page read and write
3546000
trusted library allocation
page read and write
5EFE000
stack
page read and write
9C7000
trusted library allocation
page execute and read and write
17A0000
heap
page read and write
7E2F000
stack
page read and write
513D000
trusted library allocation
page read and write
5F9C000
stack
page read and write
3590000
trusted library allocation
page read and write
6AF5000
heap
page read and write
3D99000
trusted library allocation
page read and write
344D000
trusted library allocation
page read and write
56C6000
trusted library allocation
page read and write
7BAF000
stack
page read and write
3357000
trusted library allocation
page read and write
3785000
trusted library allocation
page read and write
148E000
stack
page read and write
1150000
trusted library allocation
page read and write
33A7000
trusted library allocation
page read and write
1177000
trusted library allocation
page execute and read and write
32B7000
trusted library allocation
page read and write
AE8000
heap
page read and write
2949000
trusted library allocation
page read and write
5530000
trusted library allocation
page execute and read and write
E5A000
trusted library allocation
page execute and read and write
75FE000
heap
page read and write
72FD000
stack
page read and write
6D1E000
stack
page read and write
391A000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
38D7000
trusted library allocation
page read and write
1770000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
7928000
trusted library section
page read and write
328B000
trusted library allocation
page read and write
74DE000
stack
page read and write
15D0000
trusted library allocation
page read and write
174D000
trusted library allocation
page read and write
1360000
heap
page read and write
5230000
trusted library allocation
page read and write
BB0000
heap
page read and write
950000
heap
page read and write
7F3C000
stack
page read and write
661E000
stack
page read and write
3321000
trusted library allocation
page read and write
1CF000
unkown
page read and write
4F30000
heap
page read and write
3373000
trusted library allocation
page read and write
6D2F000
heap
page read and write
793E000
trusted library section
page read and write
28C3000
heap
page read and write
980000
heap
page read and write
110F000
stack
page read and write
6AF7000
heap
page read and write
7770000
trusted library allocation
page read and write
3427000
trusted library allocation
page read and write
7CEE000
stack
page read and write
5B10000
heap
page read and write
7490000
trusted library allocation
page read and write
993000
trusted library allocation
page execute and read and write
10C0000
heap
page read and write
829E000
stack
page read and write
53C0000
trusted library allocation
page read and write
1170000
heap
page read and write
28D0000
trusted library allocation
page read and write
305F000
unkown
page read and write
1790000
trusted library allocation
page read and write
752E000
stack
page read and write
93EE000
stack
page read and write
3614000
trusted library allocation
page read and write
5AD0000
trusted library allocation
page read and write
33F9000
trusted library allocation
page read and write
33F7000
trusted library allocation
page read and write
4239000
trusted library allocation
page read and write
153E000
stack
page read and write
56CD000
trusted library allocation
page read and write
2F60000
heap
page execute and read and write
422000
remote allocation
page execute and read and write
33B3000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
2EBD000
trusted library allocation
page read and write
AE69000
trusted library allocation
page read and write
3536000
trusted library allocation
page read and write
33B1000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
32C3000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
B14000
heap
page read and write
3859000
trusted library allocation
page read and write
28B5000
trusted library allocation
page read and write
F30000
heap
page read and write
7930000
trusted library section
page read and write
338B000
trusted library allocation
page read and write
10C7000
trusted library allocation
page execute and read and write
33C1000
trusted library allocation
page read and write
11ED000
heap
page read and write
32B1000
trusted library allocation
page read and write
1510000
heap
page read and write
563E000
stack
page read and write
78D0000
trusted library allocation
page read and write
341D000
trusted library allocation
page read and write
2ECA000
stack
page read and write
70DE000
stack
page read and write
13AE000
stack
page read and write
7FA70000
trusted library allocation
page execute and read and write
3319000
trusted library allocation
page read and write
1368000
heap
page read and write
51AE000
stack
page read and write
5EE0000
heap
page read and write
B0A000
heap
page read and write
6A7C000
stack
page read and write
56F6000
trusted library allocation
page read and write
54B0000
heap
page read and write
3120000
trusted library allocation
page read and write
301E000
unkown
page read and write
5690000
heap
page read and write
2780000
trusted library allocation
page read and write
12FD000
trusted library allocation
page execute and read and write
747C000
stack
page read and write
9CB000
trusted library allocation
page execute and read and write
3290000
trusted library allocation
page read and write
1410000
trusted library allocation
page read and write
E90000
trusted library allocation
page execute and read and write
332B000
trusted library allocation
page read and write
12D0000
trusted library allocation
page read and write
6CFF000
stack
page read and write
9E0000
trusted library allocation
page read and write
2F71000
trusted library allocation
page read and write
55FE000
stack
page read and write
14A0000
trusted library allocation
page read and write
1710000
heap
page read and write
11E4000
heap
page read and write
56E0000
trusted library allocation
page read and write
33C7000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
E56000
trusted library allocation
page execute and read and write
7340000
trusted library allocation
page read and write
2851000
trusted library allocation
page read and write
11A0000
heap
page read and write
312A000
trusted library allocation
page read and write
177B000
trusted library allocation
page execute and read and write
4B88000
trusted library allocation
page read and write
462D000
trusted library allocation
page read and write
4351000
trusted library allocation
page read and write
6D5D000
heap
page read and write
33CF000
trusted library allocation
page read and write
AC0000
heap
page read and write
328D000
trusted library allocation
page read and write
506C000
stack
page read and write
30C0000
trusted library allocation
page read and write
3331000
trusted library allocation
page read and write
4291000
trusted library allocation
page read and write
7410000
trusted library allocation
page execute and read and write
2E90000
trusted library allocation
page read and write
96B4000
heap
page read and write
5390000
heap
page read and write
3363000
trusted library allocation
page read and write
1250000
heap
page read and write
342B000
trusted library allocation
page read and write
33D5000
trusted library allocation
page read and write
32E8000
trusted library allocation
page read and write
4E8F000
stack
page read and write
584E000
trusted library allocation
page read and write
3851000
trusted library allocation
page read and write
2BEC000
stack
page read and write
2EC0000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
101E000
stack
page read and write
169A000
trusted library allocation
page execute and read and write
339F000
trusted library allocation
page read and write
30AE000
stack
page read and write
5C16000
trusted library allocation
page read and write
5740000
heap
page read and write
7A0000
heap
page read and write
5A40000
heap
page read and write
150B000
stack
page read and write
331F000
trusted library allocation
page read and write
FE5000
heap
page read and write
5EC0000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
5430000
heap
page read and write
4F20000
heap
page execute and read and write
5330000
trusted library allocation
page read and write
10B6000
trusted library allocation
page execute and read and write
43C5000
trusted library allocation
page read and write
54D0000
trusted library allocation
page execute and read and write
6B38000
heap
page read and write
76D2000
trusted library allocation
page read and write
2790000
trusted library allocation
page read and write
36D4000
trusted library allocation
page read and write
1190000
trusted library allocation
page read and write
51D0000
heap
page read and write
7F20000
trusted library allocation
page read and write
3417000
trusted library allocation
page read and write
770E000
stack
page read and write
3441000
trusted library allocation
page read and write
10BA000
trusted library allocation
page execute and read and write
6D33000
heap
page read and write
6BD6000
trusted library allocation
page read and write
52EF000
trusted library allocation
page read and write
1040000
heap
page read and write
1555000
heap
page read and write
A49000
heap
page read and write
71DF000
stack
page read and write
819E000
stack
page read and write
7BBC000
stack
page read and write
1396000
heap
page read and write
171E000
stack
page read and write
6AF3000
heap
page read and write
110D000
trusted library allocation
page execute and read and write
7D2E000
stack
page read and write
19C0000
trusted library allocation
page read and write
1A27000
heap
page read and write
1674000
trusted library allocation
page read and write
357C000
trusted library allocation
page read and write
AC99000
trusted library allocation
page read and write
75EE000
stack
page read and write
341D000
trusted library allocation
page read and write
EF8000
stack
page read and write
5ADE000
stack
page read and write
10E0000
trusted library allocation
page read and write
830E000
stack
page read and write
14CE000
stack
page read and write
1170000
heap
page read and write
2896000
trusted library allocation
page read and write
4471000
trusted library allocation
page read and write
3377000
trusted library allocation
page read and write
4529000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
64DF000
stack
page read and write
56AB000
trusted library allocation
page read and write
342D000
trusted library allocation
page read and write
C1F000
stack
page read and write
4DCC000
stack
page read and write
59B0000
trusted library allocation
page execute and read and write
73BE000
stack
page read and write
5540000
heap
page read and write
2F00000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
378D000
trusted library allocation
page read and write
32A0000
heap
page read and write
2C15000
trusted library allocation
page read and write
718F000
stack
page read and write
356A000
trusted library allocation
page read and write
167D000
trusted library allocation
page execute and read and write
52D6000
trusted library allocation
page read and write
7F860000
trusted library allocation
page execute and read and write
5A30000
trusted library allocation
page execute and read and write
7CBC000
stack
page read and write
1207000
heap
page read and write
67A000
stack
page read and write
307E000
stack
page read and write
19AD000
stack
page read and write
3413000
trusted library allocation
page read and write
5990000
heap
page read and write
11B1000
heap
page read and write
990000
trusted library allocation
page read and write
33BD000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
330B000
trusted library allocation
page read and write
18E000
unkown
page read and write
31D8000
trusted library allocation
page read and write
16A7000
trusted library allocation
page execute and read and write
9B6000
trusted library allocation
page execute and read and write
1740000
trusted library allocation
page read and write
16C0000
heap
page read and write
583B000
trusted library allocation
page read and write
73EF000
stack
page read and write
33B7000
trusted library allocation
page read and write
3317000
trusted library allocation
page read and write
122A000
heap
page read and write
5E0000
heap
page read and write
41A8000
trusted library allocation
page read and write
287B000
stack
page read and write
3303000
trusted library allocation
page read and write
5420000
trusted library section
page readonly
6A4E000
heap
page read and write
82B0000
trusted library allocation
page execute and read and write
58D0000
heap
page read and write
3100000
trusted library allocation
page read and write
985000
heap
page read and write
5AB0000
trusted library section
page read and write
2776000
trusted library allocation
page read and write
1132000
trusted library allocation
page read and write
437A000
trusted library allocation
page read and write
33DB000
trusted library allocation
page read and write
77DC000
stack
page read and write
1312000
trusted library allocation
page read and write
5851000
trusted library allocation
page read and write
4E54000
trusted library allocation
page read and write
111D000
trusted library allocation
page execute and read and write
4431000
trusted library allocation
page read and write
143F000
stack
page read and write
6AE2000
heap
page read and write
50D0000
trusted library allocation
page read and write
33E7000
trusted library allocation
page read and write
3369000
trusted library allocation
page read and write
1330000
heap
page read and write
13A7000
heap
page read and write
708E000
stack
page read and write
3309000
trusted library allocation
page read and write
30B0000
trusted library allocation
page execute and read and write
639E000
stack
page read and write
13EC000
stack
page read and write
3504000
trusted library allocation
page read and write
7686000
heap
page read and write
73E0000
trusted library allocation
page execute and read and write
6C1E000
stack
page read and write
E80000
heap
page read and write
FF5000
heap
page read and write
7D6D000
stack
page read and write
980000
trusted library allocation
page read and write
46DB000
trusted library allocation
page read and write
D50000
heap
page read and write
33C3000
trusted library allocation
page read and write
1172000
trusted library allocation
page read and write
54ED000
stack
page read and write
2750000
trusted library allocation
page read and write
2C00000
trusted library allocation
page read and write
15FE000
heap
page read and write
1690000
trusted library allocation
page read and write
7007000
trusted library allocation
page read and write
3140000
heap
page read and write
59B0000
heap
page read and write
5850000
heap
page execute and read and write
1790000
heap
page read and write
A9E000
stack
page read and write
52D4000
trusted library allocation
page read and write
340D000
trusted library allocation
page read and write
740E000
stack
page read and write
2830000
heap
page read and write
7850000
trusted library section
page read and write
3333000
trusted library allocation
page read and write
A55000
heap
page read and write
1760000
trusted library allocation
page read and write
55BE000
stack
page read and write
10F5000
heap
page read and write
C20000
trusted library allocation
page read and write
52FD000
stack
page read and write
333D000
trusted library allocation
page read and write
11FF000
stack
page read and write
10F0000
trusted library allocation
page read and write
4231000
trusted library allocation
page read and write
5114000
trusted library allocation
page read and write
2C20000
heap
page execute and read and write
42DC000
trusted library allocation
page read and write
325E000
stack
page read and write
3353000
trusted library allocation
page read and write
3361000
trusted library allocation
page read and write
7870000
trusted library section
page read and write
3315000
trusted library allocation
page read and write
5150000
trusted library allocation
page read and write
F1CB000
stack
page read and write
78CE000
trusted library section
page read and write
3526000
trusted library allocation
page read and write
5A20000
trusted library allocation
page execute and read and write
E4D000
trusted library allocation
page execute and read and write
59B0000
trusted library allocation
page read and write
5D00000
heap
page read and write
3329000
trusted library allocation
page read and write
6B44000
heap
page read and write
3130000
trusted library allocation
page read and write
73F0000
trusted library section
page read and write
10F0000
heap
page read and write
421C000
trusted library allocation
page read and write
1144000
trusted library allocation
page read and write
3DDB000
trusted library allocation
page read and write
780E000
stack
page read and write
2ED0000
trusted library allocation
page read and write
1143000
trusted library allocation
page execute and read and write
6FEE000
stack
page read and write
A00000
trusted library allocation
page read and write
33D1000
trusted library allocation
page read and write
4585000
trusted library allocation
page read and write
35E0000
trusted library allocation
page read and write
170E000
stack
page read and write
5393000
heap
page read and write
56F0000
trusted library allocation
page read and write
4F9E000
stack
page read and write
335D000
trusted library allocation
page read and write
840E000
stack
page read and write
BA9000
stack
page read and write
11A7000
heap
page read and write
60FE000
stack
page read and write
513B000
stack
page read and write
3433000
trusted library allocation
page read and write
12CF000
stack
page read and write
1400000
trusted library allocation
page read and write
1160000
heap
page read and write
5300000
heap
page read and write
3399000
trusted library allocation
page read and write
19D0000
heap
page execute and read and write
77BD000
stack
page read and write
2F00000
heap
page read and write
117E000
heap
page read and write
7A4E000
stack
page read and write
4A0C000
stack
page read and write
5142000
trusted library allocation
page read and write
75F0000
heap
page read and write
55FE000
stack
page read and write
5960000
trusted library allocation
page execute and read and write
1420000
trusted library allocation
page read and write
50E0000
heap
page read and write
FE0000
heap
page read and write
72DE000
stack
page read and write
391C000
trusted library allocation
page read and write
5995000
heap
page read and write
3365000
trusted library allocation
page read and write
7940000
heap
page read and write
52E0000
trusted library allocation
page read and write
7D0000
heap
page read and write
78B0000
trusted library allocation
page read and write
A70000
unkown
page readonly
7F450000
trusted library allocation
page execute and read and write
4FC6000
trusted library allocation
page read and write
2D8E000
stack
page read and write
398F000
trusted library allocation
page read and write
33C9000
trusted library allocation
page read and write
3367000
trusted library allocation
page read and write
421C000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
32F5000
trusted library allocation
page read and write
F39000
heap
page read and write
127D000
heap
page read and write
3343000
trusted library allocation
page read and write
3935000
trusted library allocation
page read and write
72CF000
stack
page read and write
7360000
trusted library allocation
page read and write
B17000
heap
page read and write
17A7000
heap
page read and write
563E000
stack
page read and write
7211000
heap
page read and write
14C1000
trusted library allocation
page read and write
1746000
trusted library allocation
page read and write
7D10000
trusted library allocation
page execute and read and write
1640000
heap
page read and write
5791000
trusted library allocation
page read and write
7637000
heap
page read and write
AE0000
heap
page read and write
A3D000
heap
page read and write
340F000
trusted library allocation
page read and write
E62000
trusted library allocation
page read and write
9B0000
trusted library allocation
page read and write
5B00000
heap
page read and write
1214000
heap
page read and write
6BA6000
trusted library allocation
page read and write
5B20000
heap
page read and write
ED0000
heap
page read and write
14F5000
stack
page read and write
339B000
trusted library allocation
page read and write
173E000
trusted library allocation
page read and write
10AD000
trusted library allocation
page execute and read and write
5660000
heap
page execute and read and write
10A0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
1120000
trusted library allocation
page read and write
33AE000
stack
page read and write
1080000
trusted library allocation
page read and write
EDFC000
stack
page read and write
118F000
heap
page read and write
3954000
trusted library allocation
page read and write
115D000
trusted library allocation
page execute and read and write
3339000
trusted library allocation
page read and write
51EE000
stack
page read and write
45E0000
trusted library allocation
page read and write
3270000
trusted library allocation
page read and write
1673000
trusted library allocation
page execute and read and write
57A0000
heap
page read and write
677E000
stack
page read and write
35D8000
trusted library allocation
page read and write
3794000
trusted library allocation
page read and write
76E0000
trusted library section
page read and write
3401000
trusted library allocation
page read and write
355E000
trusted library allocation
page read and write
511B000
trusted library allocation
page read and write
56BC000
stack
page read and write
4E71000
trusted library allocation
page read and write
3656000
trusted library allocation
page read and write
5A10000
heap
page read and write
1706000
trusted library allocation
page read and write
930000
heap
page read and write
3405000
trusted library allocation
page read and write
1090000
trusted library allocation
page read and write
5FFE000
stack
page read and write
70BE000
heap
page read and write
4261000
trusted library allocation
page read and write
33A1000
trusted library allocation
page read and write
63DE000
stack
page read and write
33F3000
trusted library allocation
page read and write
CF8000
stack
page read and write
A16000
trusted library allocation
page read and write
760C000
heap
page read and write
277D000
trusted library allocation
page read and write
1766000
trusted library allocation
page execute and read and write
7350000
trusted library allocation
page execute and read and write
33B9000
trusted library allocation
page read and write
69EE000
heap
page read and write
4EE0000
trusted library allocation
page execute and read and write
4EA0000
heap
page read and write
333B000
trusted library allocation
page read and write
2890000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page read and write
33E9000
trusted library allocation
page read and write
176A000
trusted library allocation
page execute and read and write
D1E000
stack
page read and write
2840000
heap
page execute and read and write
32B9000
trusted library allocation
page read and write
5830000
trusted library allocation
page read and write
AB0000
heap
page read and write
14CD000
trusted library allocation
page read and write
2AAE000
stack
page read and write
743D000
stack
page read and write
340B000
trusted library allocation
page read and write
3D91000
trusted library allocation
page read and write
1160000
trusted library allocation
page read and write
5440000
trusted library allocation
page execute and read and write
2C19000
trusted library allocation
page read and write
33CB000
trusted library allocation
page read and write
396E000
trusted library allocation
page read and write
14E0000
heap
page read and write
2810000
trusted library allocation
page read and write
1137000
stack
page read and write
3347000
trusted library allocation
page read and write
760E000
stack
page read and write
7A8E000
stack
page read and write
E30000
heap
page read and write
2F0E000
stack
page read and write
343B000
trusted library allocation
page read and write
EA0000
heap
page read and write
42C9000
trusted library allocation
page read and write
3936000
trusted library allocation
page read and write
10C2000
trusted library allocation
page read and write
62FE000
stack
page read and write
168D000
trusted library allocation
page execute and read and write
6B00000
heap
page read and write
112A000
trusted library allocation
page execute and read and write
335F000
trusted library allocation
page read and write
3194000
trusted library allocation
page read and write
334D000
trusted library allocation
page read and write
3423000
trusted library allocation
page read and write
535C000
stack
page read and write
589E000
stack
page read and write
3395000
trusted library allocation
page read and write
109D000
trusted library allocation
page execute and read and write
4F8C000
stack
page read and write
10CB000
trusted library allocation
page execute and read and write
32A7000
heap
page read and write
5170000
trusted library allocation
page read and write
3875000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
3516000
trusted library allocation
page read and write
331B000
trusted library allocation
page read and write
3035000
trusted library allocation
page read and write
51F0000
trusted library allocation
page execute and read and write
7B40000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
9AD000
trusted library allocation
page execute and read and write
17F0000
heap
page read and write
1562000
heap
page read and write
5300000
trusted library allocation
page read and write
33DD000
trusted library allocation
page read and write
6AEF000
heap
page read and write
5980000
trusted library allocation
page read and write
33FB000
trusted library allocation
page read and write
4419000
trusted library allocation
page read and write
3DC5000
trusted library allocation
page read and write
5760000
trusted library allocation
page execute and read and write
6AE0000
heap
page read and write
30F0000
heap
page read and write
2820000
trusted library allocation
page read and write
AEB000
heap
page read and write
3140000
trusted library allocation
page read and write
7E6E000
stack
page read and write
2BF0000
trusted library allocation
page read and write
16AB000
heap
page read and write
6A40000
heap
page read and write
1744000
trusted library allocation
page read and write
7500000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
59D5000
heap
page read and write
28F0000
trusted library allocation
page read and write
52F5000
trusted library allocation
page read and write
2EB1000
trusted library allocation
page read and write
7776000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
16F0000
trusted library allocation
page read and write
E3D000
trusted library allocation
page execute and read and write
96B8000
heap
page read and write
1777000
trusted library allocation
page execute and read and write
3120000
heap
page execute and read and write
35F6000
trusted library allocation
page read and write
2F6C000
trusted library allocation
page read and write
F97000
heap
page read and write
56A0000
trusted library allocation
page read and write
160A000
heap
page read and write
3341000
trusted library allocation
page read and write
3F71000
trusted library allocation
page read and write
CDE000
stack
page read and write
61FE000
stack
page read and write
E43000
trusted library allocation
page read and write
2894000
trusted library allocation
page read and write
7F960000
trusted library allocation
page execute and read and write
1743000
trusted library allocation
page execute and read and write
71DE000
heap
page read and write
E40000
trusted library allocation
page read and write
3C31000
trusted library allocation
page read and write
35C6000
trusted library allocation
page read and write
6DFE000
stack
page read and write
6B0B000
heap
page read and write
D9D000
stack
page read and write
7700000
trusted library allocation
page read and write
There are 1200 hidden memdumps, click here to show them.