IOC Report
DR2HpFNuLr.exe

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps201510501,00010010Label

Files

File Path
Type
Category
Malicious
Download
DR2HpFNuLr.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\GuardTech Solutions\AchillesGuard.com
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\GuardTech Solutions\AchillesGuard.js
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4UK5I61J\random[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\HI1BCF07\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\QI6Y9C7H\random[1].exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\random[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1075537001\d6562bae8e.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1075539001\02cfad1a50.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1075540001\bce01a8c6a.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\1075541001\3608a41d1e.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\764661\Macromedia.com
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_02cfad1a50.exe_afd22c779a2eb42824aa73b3e8424c3980730ad_3210d941_a799d4e2-ea82-4917-b753-367c39802abe\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_bce01a8c6a.exe_eef5b2bda83916d857a48bb3f64ed75984d28bc_5fa10376_928fa732-be0e-425c-828c-e5a1d313dbb0\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER625.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Feb 11 17:18:56 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9CF.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9FF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCD23.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Feb 11 17:18:41 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCE1E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCE5E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\GuardTech Solutions\r
data
dropped
C:\Users\user\AppData\Local\Temp\764661\F
data
dropped
C:\Users\user\AppData\Local\Temp\Addresses
data
dropped
C:\Users\user\AppData\Local\Temp\Baghdad
data
dropped
C:\Users\user\AppData\Local\Temp\Benz
data
dropped
C:\Users\user\AppData\Local\Temp\Complement
data
dropped
C:\Users\user\AppData\Local\Temp\Deluxe
data
dropped
C:\Users\user\AppData\Local\Temp\Derived
data
dropped
C:\Users\user\AppData\Local\Temp\Drunk
data
dropped
C:\Users\user\AppData\Local\Temp\Fm
Microsoft Cabinet archive data, 490023 bytes, 12 files, at 0x2c +A "Drunk" +A "Derived", ID 7200, number 1, 29 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\Local\Temp\Glasses
data
dropped
C:\Users\user\AppData\Local\Temp\Hills
data
dropped
C:\Users\user\AppData\Local\Temp\Pac
data
dropped
C:\Users\user\AppData\Local\Temp\Plumbing
data
dropped
C:\Users\user\AppData\Local\Temp\Racing
data
dropped
C:\Users\user\AppData\Local\Temp\Soundtrack
data
dropped
C:\Users\user\AppData\Local\Temp\Tender
data
dropped
C:\Users\user\AppData\Local\Temp\Totally
data
dropped
C:\Users\user\AppData\Local\Temp\Turner
ASCII text, with very long lines (969), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Turner.cmd
ASCII text, with very long lines (969), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\York
data
dropped
C:\Windows\Tasks\skotes.job
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 37 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\DR2HpFNuLr.exe
"C:\Users\user\Desktop\DR2HpFNuLr.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious
C:\Users\user\AppData\Local\Temp\1075537001\d6562bae8e.exe
"C:\Users\user\AppData\Local\Temp\1075537001\d6562bae8e.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c copy Turner Turner.cmd & Turner.cmd
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "opssvc wrsa"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 764661
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "Tunnel" Addresses
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b 764661\Macromedia.com + Totally + York + Drunk + Baghdad + Benz + Glasses + Pac + Tender + Racing + Deluxe + Derived 764661\Macromedia.com
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Complement + ..\Soundtrack + ..\Plumbing + ..\Hills F
malicious
C:\Users\user\AppData\Local\Temp\764661\Macromedia.com
Macromedia.com F
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks.exe /create /tn "AchillesGuard" /tr "wscript //B 'C:\Users\user\AppData\Local\GuardTech Solutions\AchillesGuard.js'" /sc onlogon /F /RL HIGHEST
malicious
C:\Windows\System32\wscript.exe
C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\GuardTech Solutions\AchillesGuard.js"
malicious
C:\Users\user\AppData\Local\GuardTech Solutions\AchillesGuard.com
"C:\Users\user\AppData\Local\GuardTech Solutions\AchillesGuard.com" "C:\Users\user\AppData\Local\GuardTech Solutions\r"
malicious
C:\Users\user\AppData\Local\Temp\1075539001\02cfad1a50.exe
"C:\Users\user\AppData\Local\Temp\1075539001\02cfad1a50.exe"
malicious
C:\Users\user\AppData\Local\Temp\1075539001\02cfad1a50.exe
"C:\Users\user\AppData\Local\Temp\1075539001\02cfad1a50.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Users\user\AppData\Local\Temp\1075540001\bce01a8c6a.exe
"C:\Users\user\AppData\Local\Temp\1075540001\bce01a8c6a.exe"
malicious
C:\Users\user\AppData\Local\Temp\1075540001\bce01a8c6a.exe
"C:\Users\user\AppData\Local\Temp\1075540001\bce01a8c6a.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\extrac32.exe
extrac32 /Y /E Fm
C:\Windows\SysWOW64\choice.exe
choice /d y /t 15
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 944
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7900 -s 952
There are 18 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://paleboreei.biz/d
unknown
malicious
https://timnelessdesign.cyou/
unknown
malicious
https://paleboreei.biz/apie
unknown
malicious
http://185.215.113.43/Zu7JuNko/index.phpncodedq/
unknown
malicious
https://paleboreei.biz/
unknown
malicious
https://paleboreei.biz/Q
unknown
malicious
https://paleboreei.biz/P
unknown
malicious
http://185.215.113.43/Zu7JuNko/index.phpH
unknown
malicious
http://185.215.113.43/Zu7JuNko/index.php6
unknown
malicious
http://185.215.113.43/Zu7JuNko/index.phpta
unknown
malicious
https://paleboreei.biz/apiB
unknown
malicious
https://paleboreei.biz/03
unknown
malicious
https://paleboreei.biz/V37k
unknown
malicious
https://timnelessdesign.cyou/api
172.67.128.154
malicious
paleboreei.biz
malicious
https://paleboreei.biz/OuMa
unknown
malicious
https://timnelessdesign.cyou/apid
unknown
malicious
inputrreparnt.com
https://paleboreei.biz/api
188.114.96.3
http://185.215.113.43/Zu7JuNko/index.phpncoded
unknown
http://schemas.micro
unknown
https://www.autoitscript.com/autoit3/
unknown
voicesharped.com
http://185.215.113.43/Zu7JuNko/index.php
185.215.113.43
http://185.215.113.43/Zu7JuNko/index.php7
unknown
garulouscuto.com
https://timnelessdesign.cyou:443/apiTelegramMessengerLLP.TelegramDesktop_t4vj0pshhgkwm
unknown
rebeldettern.com
http://185.215.113.75/files/none/random.exev$
unknown
torpdidebar.com
http://185.215.113.43/Zu7JuNko/index.php$
unknown
http://185.215.113.43/Zu7JuNko/index.phpcoded
unknown
http://185.215.113.43/Zu7JuNko/index.php~%
unknown
http://185.215.113.75/files/c0dxnfz/random.exeu
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
actiothreaz.com
http://185.215.113.43/Zu7JuNko/index.php1
unknown
http://185.215.113.75/files/c0dxnfz/random.exer
unknown
breedertremnd.com
http://185.215.113.75/files/fate/random.exeLv
unknown
http://185.215.113.75/files/c0dxnfz/random.exe
unknown
http://185.215.113.75/files/none/random.exeN%
unknown
http://185.215.113.43/Zu7JuNko/index.phpJ$
unknown
http://185.215.113.43/Zu7JuNko/index.phpf%
unknown
http://185.215.113.43/Zu7JuNko/index.php38c2817dba29a4b5b25dcf0d
unknown
http://185.215.113.43/Zu7JuNko/index.phpncodedF/
unknown
http://upx.sf.net
unknown
http://www.autoitscript.com/autoit3/X
unknown
https://paleboreei.biz:443/api
unknown
http://185.215.113.75/files/asjduwgsgausi/random.exe
unknown
http://185.215.113.43/Zu7JuNko/index.phpb$
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://185.215.113.43/Zu7JuNko/index.php01
unknown
https://timnelessdesign.cyou:443/apium
unknown
http://185.215.113.75/files/asjduwgsgausi/random.exeT
unknown
https://paleboreei.biz:443/apiF
unknown
https://timnelessdesign.cyou:443/apiyou-10581
unknown
https://paleboreei.biz:443/apikages
unknown
http://185.215.113.43/Zu7JuNko/index.phpz
unknown
http://185.215.113.43/Zu7JuNko/index.phpF$
unknown
http://185.215.113.43/Zu7JuNko/index.phpqYo30zpOYVp
unknown
importenptoc.com
http://185.215.113.43/Zu7JuNko/index.php)/
unknown
http://185.215.113.43/Zu7JuNko/index.phpk
unknown
http://185.215.113.75/files/fate/random.exe
unknown
https://paleboreei.biz:443/apid
unknown
There are 56 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
timnelessdesign.cyou
172.67.128.154
malicious
bg.microsoft.map.fastly.net
199.232.210.172
paleboreei.biz
188.114.96.3
s-part-0017.t-0009.t-msedge.net
13.107.246.45
UrDtxPvdestkLUKCgdoC.UrDtxPvdestkLUKCgdoC
unknown

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
172.67.128.154
timnelessdesign.cyou
United States
malicious
159.100.19.137
unknown
Germany
malicious
185.215.113.75
unknown
Portugal
188.114.96.3
paleboreei.biz
European Union

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\02cfad1a50.exe|ee1e139af052e013
ProgramId
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\02cfad1a50.exe|ee1e139af052e013
FileId
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\02cfad1a50.exe|ee1e139af052e013
LowerCaseLongPath
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\02cfad1a50.exe|ee1e139af052e013
LongPathHash
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\02cfad1a50.exe|ee1e139af052e013
Name
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\02cfad1a50.exe|ee1e139af052e013
OriginalFileName
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\02cfad1a50.exe|ee1e139af052e013
Publisher
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\02cfad1a50.exe|ee1e139af052e013
Version
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\02cfad1a50.exe|ee1e139af052e013
BinFileVersion
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\02cfad1a50.exe|ee1e139af052e013
BinaryType
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\02cfad1a50.exe|ee1e139af052e013
ProductName
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\02cfad1a50.exe|ee1e139af052e013
ProductVersion
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\02cfad1a50.exe|ee1e139af052e013
LinkDate
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\02cfad1a50.exe|ee1e139af052e013
BinProductVersion
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\02cfad1a50.exe|ee1e139af052e013
AppxPackageFullName
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\02cfad1a50.exe|ee1e139af052e013
AppxPackageRelativeId
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\02cfad1a50.exe|ee1e139af052e013
Size
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\02cfad1a50.exe|ee1e139af052e013
Language
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\02cfad1a50.exe|ee1e139af052e013
Usn
HKEY_CURRENT_USER\SOFTWARE\27BE871DC49F910E6A63
1A717C40FF7F60C18953B46A69A8FC47CCE7DAD6116CD3715DEB2ABF0D80722D
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\bce01a8c6a.exe|154348b652aff7d5
ProgramId
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\bce01a8c6a.exe|154348b652aff7d5
FileId
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\bce01a8c6a.exe|154348b652aff7d5
LowerCaseLongPath
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\bce01a8c6a.exe|154348b652aff7d5
LongPathHash
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\bce01a8c6a.exe|154348b652aff7d5
Name
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\bce01a8c6a.exe|154348b652aff7d5
OriginalFileName
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\bce01a8c6a.exe|154348b652aff7d5
Publisher
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\bce01a8c6a.exe|154348b652aff7d5
Version
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\bce01a8c6a.exe|154348b652aff7d5
BinFileVersion
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\bce01a8c6a.exe|154348b652aff7d5
BinaryType
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\bce01a8c6a.exe|154348b652aff7d5
ProductName
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\bce01a8c6a.exe|154348b652aff7d5
ProductVersion
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\bce01a8c6a.exe|154348b652aff7d5
LinkDate
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\bce01a8c6a.exe|154348b652aff7d5
BinProductVersion
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\bce01a8c6a.exe|154348b652aff7d5
AppxPackageFullName
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\bce01a8c6a.exe|154348b652aff7d5
AppxPackageRelativeId
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\bce01a8c6a.exe|154348b652aff7d5
Size
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\bce01a8c6a.exe|154348b652aff7d5
Language
\REGISTRY\A\{9b9e8c7c-5499-e071-cb2b-feaa254e3f42}\Root\InventoryApplicationFile\bce01a8c6a.exe|154348b652aff7d5
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
001880113BFEF68F
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
There are 34 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
400000
remote allocation
page execute and read and write
malicious
5D2000
remote allocation
page execute and read and write
malicious
E42000
unkown
page readonly
malicious
37F7000
trusted library allocation
page read and write
malicious
4289000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
D5D000
heap
page read and write
malicious
27F1000
trusted library allocation
page read and write
malicious
357D000
trusted library allocation
page read and write
malicious
6D2000
unkown
page readonly
malicious
D53000
heap
page read and write
malicious
D3C000
heap
page read and write
malicious
6650000
trusted library section
page read and write
malicious
A41000
unkown
page execute and read and write
malicious
3561000
trusted library allocation
page read and write
malicious
3561000
trusted library allocation
page read and write
malicious
356D000
trusted library allocation
page read and write
malicious
35BB000
trusted library allocation
page read and write
malicious
D3C000
heap
page read and write
malicious
D54000
heap
page read and write
malicious
2F1000
unkown
page execute and read and write
malicious
2F1000
unkown
page execute and read and write
malicious
39F9000
trusted library allocation
page read and write
malicious
AF0000
trusted library allocation
page read and write
FEEC0000
trusted library allocation
page execute and read and write
B3E000
stack
page read and write
28F1000
trusted library allocation
page read and write
322E000
stack
page read and write
2BAE000
stack
page read and write
1461000
heap
page read and write
A40000
unkown
page readonly
2EB4000
heap
page read and write
A58000
heap
page read and write
2C5E000
stack
page read and write
32B1000
heap
page read and write
16B5000
heap
page read and write
16AD000
heap
page read and write
6750000
trusted library allocation
page execute and read and write
4DA1000
heap
page read and write
16EF000
heap
page read and write
2CA67591000
heap
page read and write
14B0000
direct allocation
page read and write
3B14000
trusted library allocation
page read and write
2CA67570000
heap
page read and write
4B21000
heap
page read and write
A00000
direct allocation
page read and write
4B21000
heap
page read and write
281B000
heap
page read and write
690F000
stack
page read and write
1150000
heap
page read and write
BA9000
heap
page read and write
D60000
unkown
page execute and read and write
18B0000
heap
page read and write
1270000
direct allocation
page read and write
375F000
stack
page read and write
61EE000
stack
page read and write
68A000
heap
page read and write
627000
unkown
page execute and write copy
17EE000
stack
page read and write
3DB3000
trusted library allocation
page read and write
3E9F000
stack
page read and write
527B000
stack
page read and write
CC000
stack
page read and write
9DF000
heap
page read and write
4DA1000
heap
page read and write
4B21000
heap
page read and write
290E000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
C1C000
heap
page read and write
2440000
heap
page read and write
2802000
heap
page read and write
6B4F000
stack
page read and write
CB6000
heap
page read and write
610000
unkown
page execute and read and write
B79000
heap
page read and write
113000
unkown
page readonly
1134000
heap
page read and write
16C6000
heap
page read and write
DFD000
heap
page read and write
5180000
direct allocation
page execute and read and write
16C3000
heap
page read and write
9D8000
heap
page read and write
4DA1000
heap
page read and write
42A0000
trusted library allocation
page read and write
733000
unkown
page readonly
CFB000
heap
page read and write
500000
unkown
page readonly
143E000
stack
page read and write
27C0000
trusted library allocation
page execute and read and write
6F1000
heap
page read and write
372E000
trusted library allocation
page read and write
887F000
stack
page read and write
4DA1000
heap
page read and write
B52000
heap
page read and write
E56000
unkown
page readonly
48BE000
stack
page read and write
5DE000
remote allocation
page execute and read and write
67C000
stack
page read and write
2F4E000
stack
page read and write
161E000
heap
page read and write
2797000
heap
page read and write
4DA1000
heap
page read and write
21C0000
heap
page read and write
56E9000
trusted library allocation
page read and write
3351000
heap
page read and write
C5B000
heap
page read and write
CF0000
trusted library allocation
page read and write
278E000
stack
page read and write
2790000
heap
page read and write
9A4000
heap
page read and write
E5A000
unkown
page readonly
4DA1000
heap
page read and write
453E000
stack
page read and write
864000
heap
page read and write
3560000
trusted library allocation
page read and write
4DA1000
heap
page read and write
84C000
stack
page read and write
B2D000
heap
page read and write
389E000
stack
page read and write
89EB000
stack
page read and write
4B21000
heap
page read and write
4DA1000
heap
page read and write
43DF000
stack
page read and write
6770000
trusted library allocation
page read and write
4DA1000
heap
page read and write
378F000
stack
page read and write
120000
heap
page read and write
16B5000
heap
page read and write
BF6000
heap
page read and write
4B21000
heap
page read and write
510000
heap
page read and write
F1B000
heap
page read and write
3070000
heap
page read and write
401E000
stack
page read and write
CAC000
heap
page read and write
289F000
stack
page read and write
5710000
trusted library allocation
page read and write
4F6000
heap
page read and write
4DA1000
heap
page read and write
3A50000
heap
page read and write
1134000
heap
page read and write
14B0000
direct allocation
page read and write
AFE000
heap
page read and write
B8C000
heap
page read and write
A6E000
heap
page read and write
214000
heap
page read and write
220E000
stack
page read and write
4B21000
heap
page read and write
1134000
heap
page read and write
2C1F000
stack
page read and write
15FA000
heap
page read and write
1134000
heap
page read and write
16DB000
heap
page read and write
399F000
stack
page read and write
27CF000
stack
page read and write
A5D000
heap
page read and write
34DF000
stack
page read and write
5A7C000
stack
page read and write
1134000
heap
page read and write
A6E000
heap
page read and write
53C0000
direct allocation
page execute and read and write
49C000
stack
page read and write
DB1F1FF000
stack
page read and write
4B21000
heap
page read and write
A48000
heap
page read and write
CB3000
trusted library allocation
page execute and read and write
49D0000
direct allocation
page execute and read and write
2CA69000000
heap
page read and write
716E000
heap
page read and write
816000
heap
page read and write
301E000
stack
page read and write
5709000
trusted library allocation
page read and write
49B0000
direct allocation
page execute and read and write
F80000
heap
page read and write
43DE000
stack
page read and write
AC6000
trusted library allocation
page execute and read and write
587E000
stack
page read and write
28D0000
heap
page read and write
AAC000
heap
page read and write
F20000
trusted library allocation
page execute and read and write
3240000
trusted library allocation
page read and write
4DA1000
heap
page read and write
459000
remote allocation
page execute and read and write
A0C000
heap
page read and write
D0F000
heap
page read and write
1442000
heap
page read and write
1134000
heap
page read and write
161A000
heap
page read and write
F46000
heap
page read and write
27A0000
heap
page read and write
EA0000
heap
page read and write
CF0000
trusted library allocation
page read and write
B80000
trusted library allocation
page execute and read and write
2912000
trusted library allocation
page read and write
56FE000
stack
page read and write
A2B000
heap
page read and write
43E1000
heap
page read and write
39DE000
stack
page read and write
33B0000
trusted library allocation
page read and write
37F1000
trusted library allocation
page read and write
B2F000
stack
page read and write
16D5000
heap
page read and write
16EF000
heap
page read and write
4B21000
heap
page read and write
A00000
direct allocation
page read and write
4DA1000
heap
page read and write
420000
unkown
page read and write
CFA000
heap
page read and write
2CA676E0000
heap
page read and write
AA2000
unkown
page execute and write copy
D33000
heap
page read and write
124000
heap
page read and write
32B2000
heap
page read and write
4A20000
direct allocation
page execute and read and write
44DF000
stack
page read and write
4B21000
heap
page read and write
AC0000
trusted library allocation
page read and write
4DA1000
heap
page read and write
3AFC000
trusted library allocation
page read and write
53B0000
direct allocation
page execute and read and write
126E000
stack
page read and write
67CE000
stack
page read and write
CF0000
trusted library allocation
page read and write
7E0000
direct allocation
page read and write
49D0000
direct allocation
page execute and read and write
1C9000
stack
page read and write
2CA69350000
heap
page read and write
3351000
heap
page read and write
1850000
heap
page read and write
CF0000
trusted library allocation
page read and write
4DF0000
heap
page read and write
4DA1000
heap
page read and write
D63000
heap
page read and write
32B2000
heap
page read and write
143A000
heap
page read and write
4D9E000
stack
page read and write
214000
heap
page read and write
2FCF000
stack
page read and write
990000
heap
page read and write
D2C000
heap
page read and write
49D0000
direct allocation
page execute and read and write
7160000
heap
page read and write
AF9000
stack
page read and write
3351000
heap
page read and write
36FF000
stack
page read and write
32B2000
heap
page read and write
4DA1000
heap
page read and write
32B1000
heap
page read and write
4DA1000
heap
page read and write
580000
heap
page read and write
44CF000
stack
page read and write
15F0000
heap
page read and write
ABD000
trusted library allocation
page execute and read and write
3B12000
trusted library allocation
page read and write
2CA675A7000
heap
page read and write
4B21000
heap
page read and write
4A00000
direct allocation
page execute and read and write
995000
heap
page read and write
2902000
trusted library allocation
page read and write
32B2000
heap
page read and write
A97000
heap
page read and write
4DA1000
heap
page read and write
ADB000
trusted library allocation
page execute and read and write
CBD000
heap
page read and write
39F5000
trusted library allocation
page read and write
361F000
stack
page read and write
3B8F000
trusted library allocation
page read and write
4B21000
heap
page read and write
995000
heap
page read and write
A47000
heap
page read and write
4D1E000
stack
page read and write
6762000
trusted library allocation
page read and write
4DA0000
heap
page read and write
D77000
unkown
page execute and write copy
25E0000
trusted library allocation
page read and write
3579000
trusted library allocation
page read and write
B18000
heap
page read and write
40FF000
stack
page read and write
275E000
stack
page read and write
12F6000
heap
page read and write
4F50000
trusted library allocation
page read and write
628000
unkown
page execute and write copy
38FE000
stack
page read and write
1134000
heap
page read and write
CF1000
heap
page read and write
3351000
heap
page read and write
13EE000
stack
page read and write
35BA000
trusted library allocation
page read and write
5390000
direct allocation
page execute and read and write
F29000
unkown
page execute and read and write
4DA1000
heap
page read and write
A2B000
heap
page read and write
3560000
trusted library allocation
page read and write
42A0000
heap
page read and write
1704000
heap
page read and write
B24000
heap
page read and write
8E0000
heap
page read and write
4DA1000
heap
page read and write
451E000
stack
page read and write
3D91000
trusted library allocation
page read and write
DCD000
heap
page read and write
CB3000
heap
page read and write
915000
heap
page read and write
C87000
heap
page read and write
9A4000
heap
page read and write
6800000
heap
page read and write
5190000
direct allocation
page execute and read and write
4DA1000
heap
page read and write
218C000
stack
page read and write
B88000
heap
page read and write
1134000
heap
page read and write
4A40000
direct allocation
page execute and read and write
864000
heap
page read and write
D19000
heap
page read and write
3351000
heap
page read and write
4DA1000
heap
page read and write
864000
heap
page read and write
A90000
heap
page read and write
1446000
heap
page read and write
10EA000
heap
page read and write
9D8000
heap
page read and write
35B000
unkown
page execute and read and write
40C000
unkown
page write copy
7CC000
stack
page read and write
7E0000
direct allocation
page read and write
1270000
direct allocation
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
671000
unkown
page execute read
1110000
heap
page read and write
124000
heap
page read and write
14B0000
direct allocation
page read and write
6670000
heap
page read and write
4B20000
heap
page read and write
34E7000
trusted library allocation
page read and write
4B21000
heap
page read and write
BC5000
heap
page read and write
437F000
stack
page read and write
670000
unkown
page readonly
16B1000
heap
page read and write
CF0000
trusted library allocation
page read and write
248C000
heap
page read and write
479E000
stack
page read and write
71F000
heap
page read and write
214000
heap
page read and write
DB1EDFF000
stack
page read and write
B4F000
stack
page read and write
35BA000
trusted library allocation
page read and write
352000
unkown
page execute and read and write
4DA1000
heap
page read and write
5476000
trusted library allocation
page read and write
351E000
stack
page read and write
2CA675D8000
heap
page read and write
368E000
stack
page read and write
32B2000
heap
page read and write
3E2C000
trusted library allocation
page read and write
A87000
heap
page read and write
C02000
heap
page read and write
427E000
stack
page read and write
387E000
stack
page read and write
341D000
stack
page read and write
CDA000
trusted library allocation
page execute and read and write
15C4000
trusted library allocation
page read and write
35BA000
trusted library allocation
page read and write
4DA1000
heap
page read and write
2CA675A7000
heap
page read and write
3351000
heap
page read and write
A2E000
heap
page read and write
27B0000
heap
page read and write
6F7000
heap
page read and write
F8C000
stack
page read and write
4B21000
heap
page read and write
4E0000
heap
page read and write
2914000
trusted library allocation
page read and write
489E000
stack
page read and write
2CA675DC000
heap
page read and write
EAE000
heap
page read and write
3EBE000
stack
page read and write
4B21000
heap
page read and write
1134000
heap
page read and write
AF5000
heap
page read and write
ACF000
heap
page read and write
CFE000
heap
page read and write
375E000
stack
page read and write
1270000
direct allocation
page read and write
3E20000
trusted library allocation
page read and write
8502000
heap
page read and write
2CA675D5000
heap
page read and write
C54000
heap
page read and write
A4B000
heap
page read and write
D51000
heap
page read and write
30EC000
stack
page read and write
6678000
heap
page read and write
2CA675DE000
heap
page read and write
10AB000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
13D0000
heap
page read and write
2F1000
unkown
page execute and write copy
AB0000
trusted library allocation
page read and write
537F000
stack
page read and write
14B0000
direct allocation
page read and write
3DA3000
trusted library allocation
page read and write
A90000
heap
page read and write
628000
unkown
page execute and write copy
124000
heap
page read and write
4C2E000
stack
page read and write
3EFF000
stack
page read and write
2F1000
unkown
page execute and write copy
16DB000
heap
page read and write
4DA1000
heap
page read and write
A46000
heap
page read and write
43E1000
heap
page read and write
619000
unkown
page execute and read and write
16E8000
heap
page read and write
4B21000
heap
page read and write
337E000
stack
page read and write
4F45000
trusted library allocation
page read and write
3ADF000
stack
page read and write
3CF0000
trusted library allocation
page read and write
6630000
trusted library allocation
page read and write
A1C000
heap
page read and write
59FE000
stack
page read and write
99F000
heap
page read and write
125000
unkown
page readonly
3BBE000
stack
page read and write
2E63000
heap
page read and write
448E000
stack
page read and write
7D9000
unkown
page execute and read and write
214000
heap
page read and write
56D4000
trusted library allocation
page read and write
12A0000
direct allocation
page read and write
2CA675CA000
heap
page read and write
10FA000
heap
page read and write
D24000
heap
page read and write
707000
heap
page read and write
5110000
direct allocation
page execute and read and write
E2F000
stack
page read and write
8C0000
trusted library allocation
page read and write
960000
heap
page read and write
3351000
heap
page read and write
DEB000
stack
page read and write
4530000
heap
page read and write
51A0000
direct allocation
page execute and read and write
42C000
unkown
page read and write
3560000
trusted library allocation
page read and write
2CA675D4000
heap
page read and write
B79000
heap
page read and write
4B21000
heap
page read and write
2CC6000
heap
page read and write
F01000
heap
page read and write
958000
heap
page read and write
ACA000
trusted library allocation
page execute and read and write
2CC0000
heap
page read and write
1270000
direct allocation
page read and write
3351000
heap
page read and write
3C1F000
stack
page read and write
5110000
heap
page read and write
34FF000
stack
page read and write
3660000
trusted library allocation
page read and write
16B1000
heap
page read and write
27F7000
heap
page read and write
3D7E000
stack
page read and write
873C000
stack
page read and write
35B000
unkown
page execute and read and write
CF0000
trusted library allocation
page read and write
CF0000
trusted library allocation
page read and write
137A000
heap
page read and write
51000
unkown
page execute read
9D2000
heap
page read and write
28ED000
trusted library allocation
page read and write
19B000
stack
page read and write
43E0000
heap
page read and write
3B5E000
stack
page read and write
16C3000
heap
page read and write
1134000
heap
page read and write
14B0000
direct allocation
page read and write
2CA675CB000
heap
page read and write
293E000
stack
page read and write
7E0000
direct allocation
page read and write
CF0000
trusted library allocation
page read and write
4B21000
heap
page read and write
3351000
heap
page read and write
CD3000
heap
page read and write
52BB000
stack
page read and write
C8D000
heap
page read and write
4DA1000
heap
page read and write
34DE000
stack
page read and write
DB1E9FF000
stack
page read and write
7DB000
unkown
page execute and write copy
260E000
stack
page read and write
38FE000
stack
page read and write
4DA1000
heap
page read and write
6E0000
heap
page read and write
27FF000
heap
page read and write
53C0000
direct allocation
page execute and read and write
4DA1000
heap
page read and write
3561000
trusted library allocation
page read and write
C45000
heap
page read and write
1348000
heap
page read and write
1134000
heap
page read and write
5410000
direct allocation
page execute and read and write
3D89000
trusted library allocation
page read and write
6806000
heap
page read and write
500000
unkown
page readonly
373C000
trusted library allocation
page read and write
4DA1000
heap
page read and write
32B2000
heap
page read and write
2817000
heap
page read and write
2F9E000
stack
page read and write
325E000
stack
page read and write
1134000
heap
page read and write
1295000
heap
page read and write
3351000
heap
page read and write
2CA67598000
heap
page read and write
5400000
direct allocation
page execute and read and write
4B21000
heap
page read and write
12F0000
heap
page read and write
28DF000
trusted library allocation
page read and write
ED000
unkown
page readonly
2CA67578000
heap
page read and write
2CA676EC000
heap
page read and write
329E000
stack
page read and write
373E000
stack
page read and write
50DF000
stack
page read and write
864000
heap
page read and write
DB1ECFF000
stack
page read and write
16B1000
heap
page read and write
4DA1000
heap
page read and write
C5D000
heap
page read and write
4DA1000
heap
page read and write
4F60000
trusted library allocation
page read and write
AD2000
heap
page read and write
5490000
trusted library allocation
page read and write
328A000
trusted library allocation
page read and write
E8D000
heap
page read and write
30DF000
stack
page read and write
28D3000
trusted library allocation
page read and write
1530000
heap
page read and write
35FF000
stack
page read and write
32B2000
heap
page read and write
AAA000
heap
page read and write
2DEE000
stack
page read and write
4E20000
heap
page read and write
4DA1000
heap
page read and write
3A1D000
stack
page read and write
7E0000
direct allocation
page read and write
27D0000
trusted library allocation
page read and write
1134000
heap
page read and write
3597000
trusted library allocation
page read and write
B5B000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
21E0000
heap
page read and write
16E8000
heap
page read and write
4DA1000
heap
page read and write
423F000
stack
page read and write
3351000
heap
page read and write
CF0000
trusted library allocation
page read and write
4A10000
direct allocation
page execute and read and write
1134000
heap
page read and write
2E9F000
stack
page read and write
4DA1000
heap
page read and write
7E0000
direct allocation
page read and write
7E0000
direct allocation
page read and write
D77000
unkown
page execute and read and write
970000
heap
page read and write
1610000
heap
page read and write
2E4A000
heap
page read and write
1134000
heap
page read and write
1287000
heap
page read and write
C14000
heap
page read and write
1655000
heap
page read and write
270F000
stack
page read and write
2160000
heap
page read and write
C7E000
heap
page read and write
2CA675A7000
heap
page read and write
1699000
heap
page read and write
2817000
heap
page read and write
363D000
stack
page read and write
1535000
heap
page read and write
4285000
trusted library allocation
page read and write
1437000
heap
page read and write
6A4E000
stack
page read and write
214000
heap
page read and write
C02000
heap
page read and write
2EAE000
stack
page read and write
139A000
heap
page read and write
4DA1000
heap
page read and write
2CA675BC000
heap
page read and write
40C000
unkown
page read and write
4A30000
direct allocation
page execute and read and write
87F000
stack
page read and write
323E000
stack
page read and write
ACD000
heap
page read and write
35B4000
trusted library allocation
page read and write
27F7000
heap
page read and write
4DA1000
heap
page read and write
C1E000
heap
page read and write
1134000
heap
page read and write
864000
heap
page read and write
4DA1000
heap
page read and write
C29000
heap
page read and write
14A0000
heap
page read and write
996000
heap
page read and write
25CE000
stack
page read and write
1290000
heap
page read and write
4DA1000
heap
page read and write
6A0F000
stack
page read and write
5D0000
remote allocation
page execute and read and write
121000
unkown
page write copy
3ABF000
stack
page read and write
1134000
heap
page read and write
2F5E000
stack
page read and write
B2D000
heap
page read and write
170F000
stack
page read and write
3B1E000
stack
page read and write
16D5000
heap
page read and write
3351000
heap
page read and write
14B0000
direct allocation
page read and write
B97000
heap
page read and write
9FE000
heap
page read and write
1270000
direct allocation
page read and write
56F5000
trusted library allocation
page read and write
2DEC000
stack
page read and write
C2B000
heap
page read and write
EEF000
stack
page read and write
4DA1000
heap
page read and write
B2D000
heap
page read and write
180E000
stack
page read and write
3560000
trusted library allocation
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
A01000
heap
page read and write
4DA1000
heap
page read and write
14C5000
heap
page read and write
4A0000
heap
page read and write
3B0B000
trusted library allocation
page read and write
4F24000
trusted library allocation
page read and write
161B000
heap
page read and write
4DA1000
heap
page read and write
51000
unkown
page execute read
3560000
trusted library allocation
page read and write
2953000
trusted library allocation
page read and write
3560000
trusted library allocation
page read and write
4DA1000
heap
page read and write
C69000
heap
page read and write
214000
heap
page read and write
32B2000
heap
page read and write
1486000
heap
page read and write
3351000
heap
page read and write
409000
unkown
page readonly
415F000
stack
page read and write
4B21000
heap
page read and write
28D5000
trusted library allocation
page read and write
570B000
trusted library allocation
page read and write
4DA1000
heap
page read and write
4F36000
trusted library allocation
page read and write
400000
unkown
page readonly
56B0000
trusted library allocation
page read and write
2E9C000
stack
page read and write
7BE000
stack
page read and write
B25000
heap
page read and write
27E0000
heap
page execute and read and write
4A70000
direct allocation
page execute and read and write
25F0000
heap
page read and write
619000
unkown
page execute and read and write
A2A000
heap
page read and write
110000
heap
page read and write
514A000
heap
page read and write
154F000
stack
page read and write
28E0000
heap
page read and write
30F7000
heap
page read and write
6760000
trusted library allocation
page read and write
4DA1000
heap
page read and write
8AFC000
heap
page read and write
28F0000
heap
page read and write
1134000
heap
page read and write
11AF000
stack
page read and write
80C000
stack
page read and write
32B2000
heap
page read and write
8D3000
trusted library allocation
page execute and read and write
13D0000
heap
page read and write
214000
heap
page read and write
BBC000
heap
page read and write
864000
heap
page read and write
4DA1000
heap
page read and write
597D000
stack
page read and write
2CA675DE000
heap
page read and write
CFC000
stack
page read and write
321F000
stack
page read and write
864000
heap
page read and write
D20000
heap
page read and write
AAB000
unkown
page execute and read and write
C1C000
heap
page read and write
6C0000
heap
page read and write
224E000
stack
page read and write
D40000
heap
page read and write
CC0000
heap
page read and write
4DDF000
stack
page read and write
2CA675CE000
heap
page read and write
D2E000
stack
page read and write
1134000
heap
page read and write
4DA1000
heap
page read and write
1134000
heap
page read and write
AD2000
trusted library allocation
page read and write
AD5000
trusted library allocation
page execute and read and write
B90000
heap
page read and write
C1C000
heap
page read and write
73D000
unkown
page write copy
3660000
trusted library allocation
page read and write
1270000
direct allocation
page read and write
14B3000
heap
page read and write
4B21000
heap
page read and write
4B21000
heap
page read and write
429F000
stack
page read and write
DB1EAFE000
stack
page read and write
5479000
trusted library allocation
page read and write
2D0E000
stack
page read and write
C9E000
heap
page read and write
4DA1000
heap
page read and write
3351000
heap
page read and write
CF0000
trusted library allocation
page read and write
2E10000
heap
page read and write
14C4000
heap
page read and write
59BD000
stack
page read and write
147B000
heap
page read and write
359000
unkown
page read and write
3560000
trusted library allocation
page read and write
514E000
heap
page read and write
16B5000
heap
page read and write
8D0000
trusted library allocation
page read and write
2CAF000
stack
page read and write
29FE000
stack
page read and write
E70000
heap
page read and write
1134000
heap
page read and write
51000
unkown
page execute read
3F00000
trusted library allocation
page read and write
4B21000
heap
page read and write
14DA000
heap
page read and write
16F0000
heap
page read and write
16B1000
heap
page read and write
21C5000
heap
page read and write
D0F000
heap
page read and write
1339000
heap
page read and write
A78000
heap
page read and write
D1A000
heap
page read and write
DAE000
stack
page read and write
CF0000
trusted library allocation
page read and write
C8C000
heap
page read and write
2FDF000
stack
page read and write
A01000
heap
page read and write
577E000
stack
page read and write
401F000
stack
page read and write
4B21000
heap
page read and write
405E000
stack
page read and write
4DA1000
heap
page read and write
379E000
stack
page read and write
6F7000
heap
page read and write
1134000
heap
page read and write
678E000
stack
page read and write
2CA675AF000
heap
page read and write
39FF000
stack
page read and write
214000
heap
page read and write
53F0000
direct allocation
page execute and read and write
15D0000
trusted library allocation
page read and write
18A0000
trusted library allocation
page execute and read and write
4DA1000
heap
page read and write
4C90000
heap
page read and write
FD3000
heap
page read and write
4E8E000
stack
page read and write
3C9E000
stack
page read and write
4DA1000
heap
page read and write
487F000
stack
page read and write
FF0000
heap
page read and write
4B21000
heap
page read and write
94C000
heap
page read and write
4B21000
heap
page read and write
25F6000
heap
page read and write
639000
stack
page read and write
46B000
unkown
page read and write
9A4000
heap
page read and write
3351000
heap
page read and write
D52000
heap
page read and write
1634000
heap
page read and write
DFD000
stack
page read and write
3DB1000
trusted library allocation
page read and write
4B21000
heap
page read and write
50E0000
direct allocation
page execute and read and write
6830000
trusted library allocation
page execute and read and write
4DA1000
heap
page read and write
215F000
stack
page read and write
1270000
direct allocation
page read and write
1270000
direct allocation
page read and write
C51000
heap
page read and write
147E000
stack
page read and write
1134000
heap
page read and write
29D0000
heap
page read and write
4B21000
heap
page read and write
7170000
heap
page read and write
B7B000
heap
page read and write
13C0000
heap
page read and write
A05000
heap
page read and write
1270000
direct allocation
page read and write
4B21000
heap
page read and write
168F000
heap
page read and write
3D3F000
stack
page read and write
D2A000
heap
page read and write
2BF0000
heap
page read and write
9F5000
heap
page read and write
14BF000
stack
page read and write
5100000
direct allocation
page execute and read and write
B88000
heap
page read and write
3A80000
trusted library allocation
page read and write
ACC000
heap
page read and write
AAC000
heap
page read and write
32B2000
heap
page read and write
627000
unkown
page execute and read and write
5178000
heap
page read and write
1457000
heap
page read and write
67F0000
heap
page read and write
9DD000
heap
page read and write
401000
unkown
page execute read
E40000
unkown
page readonly
145A000
heap
page read and write
2CA675BE000
heap
page read and write
D2E000
unkown
page execute and read and write
CD6000
heap
page read and write
4D81000
heap
page read and write
2FDE000
stack
page read and write
3B10000
trusted library allocation
page read and write
347F000
stack
page read and write
3351000
heap
page read and write
3F1E000
stack
page read and write
361E000
stack
page read and write
CEF000
stack
page read and write
2C3C000
stack
page read and write
A00000
direct allocation
page read and write
4DA1000
heap
page read and write
745000
unkown
page readonly
4B21000
heap
page read and write
2280000
heap
page read and write
311E000
stack
page read and write
28D8000
heap
page read and write
AC2000
trusted library allocation
page read and write
F8B000
stack
page read and write
1134000
heap
page read and write
4DA1000
heap
page read and write
5499000
trusted library allocation
page read and write
2CA675B0000
heap
page read and write
6800000
trusted library allocation
page read and write
49A0000
direct allocation
page execute and read and write
3ABA000
trusted library allocation
page read and write
68E000
heap
page read and write
1134000
heap
page read and write
2CA675D1000
heap
page read and write
CB0000
trusted library allocation
page read and write
49C0000
direct allocation
page execute and read and write
6E2000
unkown
page readonly
28CD000
trusted library allocation
page read and write
BD5000
heap
page read and write
830000
heap
page read and write
32B1000
heap
page read and write
434000
unkown
page read and write
124000
heap
page read and write
9ED000
heap
page read and write
B64000
heap
page read and write
142C000
heap
page read and write
4DA1000
heap
page read and write
3DAB000
trusted library allocation
page read and write
5D50000
heap
page read and write
3351000
heap
page read and write
2906000
trusted library allocation
page read and write
1134000
heap
page read and write
27F3000
heap
page read and write
281B000
heap
page read and write
4DA1000
heap
page read and write
CA9000
heap
page read and write
361F000
stack
page read and write
CF0000
trusted library allocation
page read and write
1134000
heap
page read and write
1134000
heap
page read and write
184E000
stack
page read and write
8D4000
trusted library allocation
page read and write
315E000
stack
page read and write
281B000
heap
page read and write
4DA1000
heap
page read and write
3DF0000
trusted library allocation
page read and write
9EC000
heap
page read and write
4DA1000
heap
page read and write
1134000
heap
page read and write
4DA1000
heap
page read and write
C5F000
heap
page read and write
1280000
heap
page read and write
4B21000
heap
page read and write
333F000
stack
page read and write
4B21000
heap
page read and write
397F000
stack
page read and write
F70000
trusted library allocation
page read and write
4B21000
heap
page read and write
4F14000
trusted library allocation
page read and write
73D000
unkown
page read and write
C1C000
heap
page read and write
44FE000
stack
page read and write
351F000
stack
page read and write
5170000
direct allocation
page execute and read and write
6640000
heap
page read and write
28E1000
trusted library allocation
page read and write
7E0000
direct allocation
page read and write
A6A000
heap
page read and write
4DA1000
heap
page read and write
43BD000
stack
page read and write
100000
heap
page read and write
2CA67591000
heap
page read and write
B1F000
stack
page read and write
5110000
direct allocation
page execute and read and write
F9A000
heap
page read and write
4B21000
heap
page read and write
12A0000
direct allocation
page read and write
2D4F000
stack
page read and write
1800000
trusted library allocation
page read and write
4B40000
heap
page read and write
2CA675A7000
heap
page read and write
8500000
heap
page read and write
3ABF000
stack
page read and write
840000
heap
page read and write
4B21000
heap
page read and write
14D4000
heap
page read and write
5160000
direct allocation
page execute and read and write
3351000
heap
page read and write
16D2000
heap
page read and write
2CE0000
heap
page read and write
15B0000
trusted library allocation
page read and write
1094000
heap
page read and write
2E0000
heap
page read and write
15B3000
trusted library allocation
page execute and read and write
4B1F000
stack
page read and write
2E2D000
stack
page read and write
3A4D000
stack
page read and write
2951000
trusted library allocation
page read and write
56E000
stack
page read and write
12F9000
stack
page read and write
29EF000
stack
page read and write
4B3E000
stack
page read and write
53E0000
direct allocation
page execute and read and write
4B21000
heap
page read and write
6F1000
heap
page read and write
6740000
trusted library allocation
page execute and read and write
6790000
trusted library allocation
page read and write
B09000
heap
page read and write
58BC000
stack
page read and write
56C4000
trusted library allocation
page read and write
409000
unkown
page readonly
14E7000
heap
page read and write
44BF000
stack
page read and write
993000
heap
page read and write
1410000
heap
page read and write
352000
unkown
page execute and write copy
4DA1000
heap
page read and write
2620000
heap
page read and write
27E0000
heap
page read and write
2CA675CB000
heap
page read and write
A92000
heap
page read and write
AD0000
heap
page read and write
5450000
direct allocation
page execute and read and write
4DA1000
heap
page read and write
E30000
heap
page read and write
AC4000
heap
page read and write
610000
unkown
page execute and read and write
B79000
heap
page read and write
C9D000
stack
page read and write
3EDE000
stack
page read and write
25BE000
stack
page read and write
2CA675DE000
heap
page read and write
147E000
heap
page read and write
15FE000
heap
page read and write
3DA0000
trusted library allocation
page read and write
57EF000
stack
page read and write
14BE000
heap
page read and write
4281000
trusted library allocation
page read and write
A0D000
heap
page read and write
28F7000
trusted library allocation
page read and write
50F0000
direct allocation
page execute and read and write
F2B000
unkown
page execute and write copy
3260000
trusted library allocation
page execute and read and write
457F000
stack
page read and write
4B21000
heap
page read and write
4DA1000
heap
page read and write
2F0000
unkown
page read and write
2EC0000
heap
page read and write
A3F000
heap
page read and write
5230000
direct allocation
page read and write
D1A000
heap
page read and write
F40000
heap
page read and write
C02000
heap
page read and write
B81000
heap
page read and write
B24000
heap
page read and write
1670000
heap
page read and write
FF0000
heap
page read and write
CA9000
heap
page read and write
1134000
heap
page read and write
15DA000
trusted library allocation
page execute and read and write
3660000
heap
page read and write
3351000
heap
page read and write
32B1000
heap
page read and write
4DA1000
heap
page read and write
3DDE000
stack
page read and write
1618000
heap
page read and write
274E000
stack
page read and write
429E000
stack
page read and write
B8D000
heap
page read and write
15CE000
stack
page read and write
458000
remote allocation
page execute and read and write
29F8000
trusted library allocation
page execute and read and write
3A4F000
stack
page read and write
EBD000
heap
page read and write
4B21000
heap
page read and write
42DE000
stack
page read and write
994000
heap
page read and write
A02000
heap
page read and write
CF0000
trusted library allocation
page read and write
978000
heap
page read and write
5720000
trusted library allocation
page read and write
3D9E000
trusted library allocation
page read and write
35BF000
stack
page read and write
15C0000
trusted library allocation
page read and write
3351000
heap
page read and write
4DA1000
heap
page read and write
70D000
unkown
page readonly
9A6000
heap
page read and write
1660000
heap
page read and write
4F60000
heap
page read and write
3351000
heap
page read and write
32B2000
heap
page read and write
3DAD000
trusted library allocation
page read and write
4B21000
heap
page read and write
15E7000
trusted library allocation
page execute and read and write
2B1E000
stack
page read and write
3AFE000
stack
page read and write
1134000
heap
page read and write
465E000
stack
page read and write
27F3000
heap
page read and write
2835000
trusted library allocation
page read and write
7E0000
direct allocation
page read and write
4DA1000
heap
page read and write
2BFB000
heap
page read and write
135B000
stack
page read and write
13F0000
heap
page read and write
6805000
heap
page read and write
3D83000
trusted library allocation
page read and write
32A0000
direct allocation
page execute and read and write
401000
unkown
page execute read
4DA1000
heap
page read and write
D69000
unkown
page execute and read and write
3B9C000
trusted library allocation
page read and write
B24000
heap
page read and write
C3E000
heap
page read and write
6DD000
heap
page read and write
2F0000
unkown
page readonly
DAE000
heap
page read and write
26CE000
stack
page read and write
863B000
stack
page read and write
A20000
heap
page read and write
1134000
heap
page read and write
28A0000
heap
page read and write
1270000
direct allocation
page read and write
B5F000
stack
page read and write
35BA000
trusted library allocation
page read and write
144C000
heap
page read and write
1134000
heap
page read and write
5700000
trusted library allocation
page read and write
A85000
heap
page read and write
4B21000
heap
page read and write
4DA1000
heap
page read and write
214000
heap
page read and write
3351000
heap
page read and write
4DA1000
heap
page read and write
CC9000
heap
page read and write
33DE000
stack
page read and write
963000
heap
page read and write
33B0000
trusted library allocation
page read and write
2E5D000
heap
page read and write
B40000
heap
page read and write
3351000
heap
page read and write
2284000
heap
page read and write
A41000
unkown
page execute and write copy
1134000
heap
page read and write
3821000
trusted library allocation
page read and write
14B0000
direct allocation
page read and write
4B21000
heap
page read and write
810000
heap
page read and write
2CEC000
stack
page read and write
5DE000
unkown
page execute and read and write
CA2000
heap
page read and write
568F000
stack
page read and write
C72000
heap
page read and write
3EDF000
stack
page read and write
304E000
stack
page read and write
BF5000
heap
page read and write
7E0000
direct allocation
page read and write
349F000
stack
page read and write
1270000
direct allocation
page read and write
27A8000
heap
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
3280000
heap
page read and write
4DA1000
heap
page read and write
4B21000
heap
page read and write
28E3000
trusted library allocation
page read and write
10CE000
stack
page read and write
4AFF000
stack
page read and write
C47000
heap
page read and write
4C3F000
stack
page read and write
2CA67599000
heap
page read and write
27AE000
stack
page read and write
49E0000
direct allocation
page execute and read and write
258F000
stack
page read and write
9EC000
heap
page read and write
28CB000
trusted library allocation
page read and write
3B87000
trusted library allocation
page read and write
45FF000
stack
page read and write
9C9000
heap
page read and write
4B21000
heap
page read and write
14D2000
heap
page read and write
2F8E000
stack
page read and write
4B21000
heap
page read and write
34BE000
stack
page read and write
214000
heap
page read and write
53C0000
direct allocation
page execute and read and write
4B21000
heap
page read and write
4DA1000
heap
page read and write
160F000
stack
page read and write
BF9000
heap
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
CEB000
trusted library allocation
page execute and read and write
6E6000
unkown
page readonly
2817000
heap
page read and write
4DA1000
heap
page read and write
5030000
heap
page execute and read and write
4BCE000
stack
page read and write
1134000
heap
page read and write
E0B000
heap
page read and write
BA7000
heap
page read and write
6CD0000
trusted library allocation
page execute and read and write
3120000
heap
page read and write
411F000
stack
page read and write
EF0000
heap
page read and write
CF0000
trusted library allocation
page read and write
14B0000
direct allocation
page read and write
365E000
stack
page read and write
680000
heap
page read and write
29F0000
heap
page read and write
4820000
trusted library allocation
page read and write
1134000
heap
page read and write
11D000
unkown
page write copy
6C8000
heap
page read and write
6C4000
heap
page read and write
D1C000
heap
page read and write
16C5000
heap
page read and write
4DA1000
heap
page read and write
30AF000
stack
page read and write
32B1000
heap
page read and write
4B21000
heap
page read and write
4C0000
heap
page read and write
583E000
stack
page read and write
5150000
direct allocation
page execute and read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
2EDE000
stack
page read and write
F50000
heap
page read and write
49BF000
stack
page read and write
3351000
heap
page read and write
3560000
trusted library allocation
page read and write
B16000
heap
page read and write
339E000
stack
page read and write
140E000
stack
page read and write
49D0000
direct allocation
page execute and read and write
14B6000
heap
page read and write
6D7000
heap
page read and write
4DA1000
heap
page read and write
9D8000
heap
page read and write
C60000
heap
page read and write
4DA1000
heap
page read and write
3351000
heap
page read and write
67E0000
heap
page read and write
3D80000
heap
page read and write
5140000
direct allocation
page execute and read and write
250000
heap
page read and write
2CA675C8000
heap
page read and write
4B21000
heap
page read and write
627000
unkown
page execute and write copy
864000
heap
page read and write
652C000
stack
page read and write
168C000
heap
page read and write
4F9000
unkown
page execute and read and write
444F000
stack
page read and write
3351000
heap
page read and write
AA2000
unkown
page execute and read and write
4ECE000
stack
page read and write
14B0000
direct allocation
page read and write
359000
unkown
page write copy
3230000
trusted library allocation
page read and write
1130000
heap
page read and write
6D7000
heap
page read and write
4B21000
heap
page read and write
7E0000
direct allocation
page read and write
4DA1000
heap
page read and write
325F000
stack
page read and write
33B0000
trusted library allocation
page read and write
DB1E8FA000
stack
page read and write
4A60000
direct allocation
page execute and read and write
382F000
trusted library allocation
page read and write
419E000
stack
page read and write
3D9E000
stack
page read and write
B3D000
stack
page read and write
B2D000
heap
page read and write
9CC000
heap
page read and write
70D000
unkown
page readonly
30F0000
heap
page read and write
3100000
heap
page read and write
662E000
stack
page read and write
3E7F000
stack
page read and write
4ACE000
stack
page read and write
2D92000
heap
page read and write
270F000
stack
page read and write
16C3000
heap
page read and write
166E000
heap
page read and write
520000
heap
page read and write
1450000
heap
page read and write
352000
unkown
page execute and write copy
4B21000
heap
page read and write
4DA1000
heap
page read and write
16D9000
heap
page read and write
BEB000
heap
page read and write
A2D000
heap
page read and write
4DA1000
heap
page read and write
2CA675BE000
heap
page read and write
E77000
heap
page read and write
4DA1000
heap
page read and write
C79000
heap
page read and write
49FE000
stack
page read and write
8FF000
heap
page read and write
ADD000
heap
page read and write
43E1000
heap
page read and write
3D5F000
stack
page read and write
1134000
heap
page read and write
53A0000
direct allocation
page execute and read and write
3597000
trusted library allocation
page read and write
7FE000
stack
page read and write
4DA1000
heap
page read and write
4D68000
heap
page read and write
549B000
trusted library allocation
page read and write
A58000
heap
page read and write
670000
unkown
page readonly
B97000
heap
page read and write
2CA67430000
heap
page read and write
3C5E000
stack
page read and write
281D000
heap
page read and write
463E000
stack
page read and write
7EF000
stack
page read and write
205E000
stack
page read and write
257E000
stack
page read and write
4A1E000
stack
page read and write
5A3F000
stack
page read and write
5110000
direct allocation
page execute and read and write
3760000
trusted library allocation
page read and write
7CF000
stack
page read and write
282F000
trusted library allocation
page read and write
3351000
heap
page read and write
1134000
heap
page read and write
1134000
heap
page read and write
4D7F000
stack
page read and write
1682000
heap
page read and write
604000
heap
page read and write
48DE000
stack
page read and write
3351000
heap
page read and write
864000
heap
page read and write
461F000
stack
page read and write
39F1000
trusted library allocation
page read and write
2BD0000
heap
page read and write
CFA000
heap
page read and write
B7C000
stack
page read and write
2CA675DE000
heap
page read and write
4B21000
heap
page read and write
2CA675D3000
heap
page read and write
3B08000
trusted library allocation
page read and write
6D0000
unkown
page readonly
598000
stack
page read and write
124000
heap
page read and write
5790000
heap
page execute and read and write
5430000
direct allocation
page execute and read and write
2E2F000
heap
page read and write
27F7000
heap
page read and write
3F00000
trusted library allocation
page read and write
6C1000
heap
page read and write
5464000
trusted library allocation
page read and write
2DFE000
stack
page read and write
243E000
stack
page read and write
32B2000
heap
page read and write
864000
heap
page read and write
D2B000
heap
page read and write
E62000
heap
page read and write
AAC000
heap
page read and write
8AEC000
stack
page read and write
4DA1000
heap
page read and write
16DA000
heap
page read and write
359000
unkown
page read and write
29BE000
stack
page read and write
C02000
heap
page read and write
DB1EFFE000
stack
page read and write
4DA1000
heap
page read and write
49D0000
direct allocation
page execute and read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
D2B000
heap
page read and write
CD3000
heap
page read and write
28F5000
trusted library allocation
page read and write
D48000
heap
page read and write
4DA1000
heap
page read and write
359000
unkown
page write copy
4B21000
heap
page read and write
49DF000
stack
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
3077000
heap
page read and write
15EB000
trusted library allocation
page execute and read and write
B2E000
heap
page read and write
4DA1000
heap
page read and write
CF0000
trusted library allocation
page read and write
3B1F000
stack
page read and write
4DA1000
heap
page read and write
CF0000
trusted library allocation
page read and write
4C98000
heap
page read and write
14CF000
heap
page read and write
C3B000
heap
page read and write
4DB1000
heap
page read and write
C13000
heap
page read and write
2E5F000
stack
page read and write
125000
unkown
page readonly
4B21000
heap
page read and write
27F0000
heap
page read and write
AF2000
heap
page read and write
C88000
heap
page read and write
4C80000
heap
page execute and read and write
29FA000
trusted library allocation
page read and write
7E0000
direct allocation
page read and write
12C0000
heap
page read and write
39BE000
stack
page read and write
2E18000
heap
page read and write
46E0000
trusted library allocation
page read and write
CB4000
trusted library allocation
page read and write
5420000
direct allocation
page execute and read and write
35B4000
trusted library allocation
page read and write
5120000
direct allocation
page execute and read and write
3281000
trusted library allocation
page read and write
3660000
trusted library allocation
page read and write
A68000
heap
page read and write
B95000
heap
page read and write
6810000
trusted library allocation
page read and write
4B21000
heap
page read and write
3CBF000
stack
page read and write
CC4000
trusted library allocation
page read and write
3AA8000
trusted library allocation
page read and write
11C000
stack
page read and write
14B0000
direct allocation
page read and write
BEB000
heap
page read and write
5DE000
unkown
page execute and read and write
413E000
stack
page read and write
3D9B000
trusted library allocation
page read and write
3B5E000
stack
page read and write
4D5F000
stack
page read and write
15A0000
trusted library allocation
page read and write
11D000
unkown
page read and write
90B000
heap
page read and write
4DA1000
heap
page read and write
AA1000
heap
page read and write
2EB0000
heap
page read and write
3B80000
trusted library allocation
page read and write
2904000
trusted library allocation
page read and write
13DE000
stack
page read and write
8E8000
heap
page read and write
7170000
heap
page read and write
14B0000
direct allocation
page read and write
ED000
unkown
page readonly
1270000
direct allocation
page read and write
16EF000
heap
page read and write
880000
heap
page read and write
440E000
stack
page read and write
210000
heap
page read and write
1060000
heap
page read and write
7DB000
unkown
page execute and write copy
6B5B000
heap
page read and write
68C0000
trusted library allocation
page execute and read and write
1440000
heap
page read and write
473F000
stack
page read and write
864000
heap
page read and write
71F000
heap
page read and write
145B000
heap
page read and write
A6E000
heap
page read and write
585000
heap
page read and write
240000
heap
page read and write
733000
unkown
page readonly
339F000
stack
page read and write
27DB000
trusted library allocation
page read and write
5144000
heap
page read and write
C02000
heap
page read and write
124000
heap
page read and write
1270000
direct allocation
page read and write
125E000
stack
page read and write
A23000
heap
page read and write
537E000
stack
page read and write
BA7000
heap
page read and write
279F000
stack
page read and write
29DE000
stack
page read and write
3350000
heap
page read and write
D2A000
heap
page read and write
27E0000
heap
page execute and read and write
1134000
heap
page read and write
4DA1000
heap
page read and write
2CA676E5000
heap
page read and write
CF0000
trusted library allocation
page read and write
2ADF000
stack
page read and write
2818000
heap
page read and write
2C7C000
stack
page read and write
425F000
stack
page read and write
2CA675C9000
heap
page read and write
3068000
trusted library allocation
page read and write
67F0000
trusted library allocation
page execute and read and write
489F000
stack
page read and write
B90000
heap
page read and write
4B21000
heap
page read and write
989000
heap
page read and write
AA9000
unkown
page read and write
BDE000
heap
page read and write
3B19000
trusted library allocation
page read and write
C69000
heap
page read and write
2D9E000
stack
page read and write
281B000
heap
page read and write
4B35000
heap
page read and write
276E000
stack
page read and write
C48000
heap
page read and write
4B21000
heap
page read and write
36BE000
stack
page read and write
B38000
heap
page read and write
1134000
heap
page read and write
2BC0000
heap
page read and write
3C3E000
stack
page read and write
A40000
unkown
page read and write
56E6000
trusted library allocation
page read and write
87E000
stack
page read and write
49F0000
direct allocation
page execute and read and write
160E000
stack
page read and write
1CD000
stack
page read and write
14B0000
direct allocation
page read and write
4B21000
heap
page read and write
371F000
stack
page read and write
28EE000
stack
page read and write
54A0000
trusted library allocation
page read and write
B26000
heap
page read and write
415D000
stack
page read and write
3351000
heap
page read and write
4DA1000
heap
page read and write
35FE000
stack
page read and write
3351000
heap
page read and write
2CA6758C000
heap
page read and write
CA0000
trusted library allocation
page read and write
4C6E000
stack
page read and write
477E000
stack
page read and write
50000
unkown
page readonly
27D9000
trusted library allocation
page read and write
2630000
trusted library allocation
page read and write
2CA675CD000
heap
page read and write
4DA1000
heap
page read and write
A5F000
heap
page read and write
50000
unkown
page readonly
3660000
trusted library allocation
page read and write
98000
stack
page read and write
4F60000
trusted library allocation
page read and write
877E000
stack
page read and write
214000
heap
page read and write
104F000
heap
page read and write
2CA67510000
heap
page read and write
32B2000
heap
page read and write
124000
heap
page read and write
4B21000
heap
page read and write
3FDF000
stack
page read and write
5230000
direct allocation
page read and write
32B2000
heap
page read and write
B3D000
heap
page read and write
335F000
stack
page read and write
4B21000
heap
page read and write
49D0000
direct allocation
page execute and read and write
7E0000
direct allocation
page read and write
4DA1000
heap
page read and write
247A000
heap
page read and write
4F39000
trusted library allocation
page read and write
14B0000
direct allocation
page read and write
3351000
heap
page read and write
373D000
stack
page read and write
5110000
direct allocation
page execute and read and write
3270000
heap
page execute and read and write
4D80000
heap
page read and write
245E000
heap
page read and write
475F000
stack
page read and write
DB1EEFE000
stack
page read and write
17EF000
stack
page read and write
6B50000
heap
page read and write
9A3000
heap
page read and write
158E000
stack
page read and write
600000
heap
page read and write
AFF000
heap
page read and write
C49000
unkown
page execute and read and write
9D1000
heap
page read and write
2900000
trusted library allocation
page read and write
56EE000
stack
page read and write
1134000
heap
page read and write
2E6D000
stack
page read and write
125B000
stack
page read and write
16E8000
heap
page read and write
1134000
heap
page read and write
214000
heap
page read and write
21F0000
heap
page read and write
3351000
heap
page read and write
CE7000
trusted library allocation
page execute and read and write
16D5000
heap
page read and write
4FCE000
stack
page read and write
6671000
heap
page read and write
4B21000
heap
page read and write
1134000
heap
page read and write
4500000
heap
page read and write
5624000
heap
page read and write
214000
heap
page read and write
4DA1000
heap
page read and write
6730000
trusted library allocation
page read and write
4B21000
heap
page read and write
3560000
trusted library allocation
page read and write
DB1F0FF000
stack
page read and write
37F0000
heap
page read and write
53C0000
direct allocation
page execute and read and write
3FF0000
heap
page read and write
4DA1000
heap
page read and write
366D000
trusted library allocation
page read and write
2638000
trusted library allocation
page read and write
2E00000
heap
page read and write
189E000
stack
page read and write
5440000
direct allocation
page execute and read and write
4B21000
heap
page read and write
2F0000
unkown
page readonly
2448000
heap
page read and write
A2A000
heap
page read and write
593C000
stack
page read and write
A2E000
heap
page read and write
5110000
direct allocation
page execute and read and write
3560000
trusted library allocation
page read and write
4FDB000
stack
page read and write
16CD000
heap
page read and write
4B21000
heap
page read and write
860000
heap
page read and write
2F9F000
stack
page read and write
31FF000
stack
page read and write
1260000
heap
page read and write
14DF000
heap
page read and write
4F9000
unkown
page execute and read and write
671000
unkown
page execute read
25E6000
trusted library allocation
page read and write
4DA1000
heap
page read and write
383F000
stack
page read and write
28E5000
trusted library allocation
page read and write
AA9000
unkown
page write copy
214000
heap
page read and write
7161000
heap
page read and write
12A0000
direct allocation
page read and write
141E000
stack
page read and write
2ED0000
heap
page read and write
6C8000
heap
page read and write
4DA1000
heap
page read and write
38DE000
stack
page read and write
311F000
stack
page read and write
4B21000
heap
page read and write
5620000
heap
page read and write
C51000
heap
page read and write
1134000
heap
page read and write
113000
unkown
page readonly
3C5F000
stack
page read and write
1134000
heap
page read and write
499F000
stack
page read and write
15E0000
trusted library allocation
page read and write
6BE000
heap
page read and write
CF0000
trusted library allocation
page read and write
5114000
heap
page read and write
2BE000
stack
page read and write
16E8000
heap
page read and write
3BFF000
stack
page read and write
33B0000
trusted library allocation
page read and write
865000
heap
page read and write
3351000
heap
page read and write
3560000
trusted library allocation
page read and write
3BCE000
trusted library allocation
page read and write
3351000
heap
page read and write
627000
unkown
page execute and read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
53C0000
direct allocation
page execute and read and write
864000
heap
page read and write
139E000
stack
page read and write
4DA1000
heap
page read and write
557E000
stack
page read and write
511C000
stack
page read and write
4B21000
heap
page read and write
16B5000
heap
page read and write
741000
unkown
page write copy
3E24000
trusted library allocation
page read and write
35DF000
stack
page read and write
331D000
stack
page read and write
3288000
trusted library allocation
page execute and read and write
16CC000
heap
page read and write
2F1D000
stack
page read and write
385F000
stack
page read and write
4B21000
heap
page read and write
387F000
stack
page read and write
9D0000
heap
page read and write
53D0000
direct allocation
page execute and read and write
3560000
trusted library allocation
page read and write
9A000
stack
page read and write
1134000
heap
page read and write
4B21000
heap
page read and write
297E000
stack
page read and write
7E0000
direct allocation
page read and write
1134000
heap
page read and write
9A2000
heap
page read and write
3599000
trusted library allocation
page read and write
830000
heap
page read and write
21CB000
heap
page read and write
5130000
direct allocation
page execute and read and write
389F000
stack
page read and write
29E0000
heap
page read and write
4B21000
heap
page read and write
5AC0000
trusted library allocation
page read and write
B8E000
stack
page read and write
352000
unkown
page execute and read and write
745000
unkown
page readonly
2910000
trusted library allocation
page read and write
1134000
heap
page read and write
39DF000
stack
page read and write
7DD000
stack
page read and write
A70000
heap
page read and write
1410000
heap
page read and write
2CA675D9000
heap
page read and write
28EF000
trusted library allocation
page read and write
1430000
heap
page read and write
A1F000
heap
page read and write
1134000
heap
page read and write
15B4000
trusted library allocation
page read and write
51B0000
direct allocation
page execute and read and write
3FFE000
stack
page read and write
D78000
unkown
page execute and write copy
2CA675D5000
heap
page read and write
54EE000
stack
page read and write
4B21000
heap
page read and write
CF0000
heap
page read and write
4DA1000
heap
page read and write
33FD000
stack
page read and write
12C7000
heap
page read and write
961000
heap
page read and write
37DD000
stack
page read and write
281B000
heap
page read and write
1270000
direct allocation
page read and write
F30000
trusted library allocation
page read and write
165E000
heap
page read and write
AD7000
trusted library allocation
page execute and read and write
439F000
stack
page read and write
917000
heap
page read and write
AAE000
heap
page read and write
53C0000
direct allocation
page execute and read and write
2FB0000
heap
page read and write
573E000
stack
page read and write
16D9000
heap
page read and write
14C0000
heap
page read and write
707000
heap
page read and write
BF5000
heap
page read and write
4C7E000
stack
page read and write
B24000
heap
page read and write
14B0000
direct allocation
page read and write
400000
unkown
page readonly
3D05000
trusted library allocation
page read and write
1625000
heap
page read and write
5230000
direct allocation
page read and write
16F0000
heap
page read and write
2CA67530000
heap
page read and write
4B21000
heap
page read and write
10FB000
stack
page read and write
3FBF000
stack
page read and write
4B21000
heap
page read and write
2916000
trusted library allocation
page read and write
2F0000
unkown
page read and write
3B1E000
trusted library allocation
page read and write
2DF0000
heap
page read and write
5A7D000
stack
page read and write
2BF7000
heap
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
A58000
heap
page read and write
3351000
heap
page read and write
131C000
heap
page read and write
3D9F000
stack
page read and write
42A4000
heap
page read and write
16C4000
heap
page read and write
5485000
trusted library allocation
page read and write
5110000
direct allocation
page execute and read and write
A31000
heap
page read and write
27CE000
stack
page read and write
14D8000
heap
page read and write
28BE000
trusted library allocation
page read and write
515E000
heap
page read and write
67A0000
trusted library allocation
page read and write
4A50000
direct allocation
page execute and read and write
9FE000
heap
page read and write
864000
heap
page read and write
21B0000
heap
page read and write
299F000
stack
page read and write
3351000
heap
page read and write
394E000
stack
page read and write
3AB3000
trusted library allocation
page read and write
A2A000
heap
page read and write
CC0000
trusted library allocation
page read and write
1270000
heap
page read and write
B30000
heap
page read and write
32B2000
heap
page read and write
7E0000
direct allocation
page read and write
999000
heap
page read and write
32B2000
heap
page read and write
8DD000
trusted library allocation
page execute and read and write
7D9000
unkown
page execute and read and write
4CDF000
stack
page read and write
B2D000
heap
page read and write
3AFE000
stack
page read and write
951000
heap
page read and write
C69000
heap
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
51E0000
trusted library allocation
page read and write
C1C000
heap
page read and write
27E7000
heap
page read and write
2D5F000
stack
page read and write
214000
heap
page read and write
E50000
trusted library allocation
page read and write
567F000
stack
page read and write
12FA000
stack
page read and write
29F1000
trusted library allocation
page read and write
4B21000
heap
page read and write
377E000
stack
page read and write
2CA675DE000
heap
page read and write
There are 1743 hidden memdumps, click here to show them.