IOC Report
5.dll

loading gif

Files

File Path
Type
Category
Malicious
5.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_c11fc434b2ae51c730bfcbd95eaf71498a857ba_7522e4b5_0fb7ab75-edfc-41bf-a9b9-14de17a46d00\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_c11fc434b2ae51c730bfcbd95eaf71498a857ba_7522e4b5_42576753-4178-4839-8eac-13ee23643e2c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_f48ee1d79ba125ec73679e59d0b16d42546ec4d_7522e4b5_256b9362-2db3-403a-a4b5-8296c3b6906c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_f48ee1d79ba125ec73679e59d0b16d42546ec4d_7522e4b5_8974e0c5-0254-4f14-aaad-496eda389701\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1D36.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 3 01:33:59 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1E6F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1E8F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8904.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 3 01:33:22 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8A9B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8D0D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF422.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 3 01:33:49 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF5AA.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF637.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF6E1.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 3 01:33:50 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF934.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF954.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\rundll32.txt
ASCII text, with CRLF line terminators
modified
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\5.dll"
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\5.dll,TMethodImplementationIntercept
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\5.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\5.dll,__dbk_fcall_wrapper
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\5.dll,azo06olt3gs7uifwf18b8
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\5.dll",TMethodImplementationIntercept
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\5.dll",__dbk_fcall_wrapper
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\5.dll",azo06olt3gs7uifwf18b8
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\5.dll",dbkFCallWrapperAddr
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\5.dll",#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7432 -s 704
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7972 -s 712
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 8004 -s 696
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7396 -s 696
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://pastebin.com/raw/hQqNRrQt
104.20.3.235
malicious
https://pastebin.com/raw/ZELZp1Yr
104.20.3.235
malicious
https://pastebin.com/raw/ZELZp1YrHu
unknown
https://setember2024inf2.is-a-nurse.com:5002/02
unknown
https://pastebin.com/_
unknown
http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf
unknown
https://pastebin.com/raw/hQqNRrQtHu
unknown
https://pastebin.com/raw/ZELZp1YrI%
unknown
http://tools.ietf.org/html/rfc1321
unknown
http://www.schneier.com/paper-blowfish-fse.htmlS
unknown
http://upx.sf.net
unknown
https://pastebin.com/5
unknown
http://csrc.nist.gov/publications/drafts/800-67-rev1/SP-800-67-rev1-2_July-2011.pdfS
unknown
https://pastebin.com/raw/ZELZp1YrQu
unknown
https://setember2024inf2.is-a-nurse.com:50K5
unknown
http://www.indyproject.org/
unknown
https://pastebin.com/raw/ZELZp1Yrrt
unknown
https://setember2024inf2.is-a-nurse.com:50
unknown
http://tools.ietf.org/html/rfc4648S
unknown
https://pastebin.com/5_
unknown
https://pastebin.com//
unknown
http://www.itl.nist.gov/fipspubs/fip180-1.htm
unknown
https://pastebin.com/5$
unknown
http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdfS
unknown
https://pastebin.com/5e
unknown
https://pastebin.com/i
unknown
http://www.movable-type.co.uk/scripts/xxtea.pdfS
unknown
http://www.schneier.com/paper-twofish-paper.pdfS
unknown
https://pastebin.com/raw/ZELZp1YrEM$-
unknown
http://csrc.nist.gov/publications/drafts/fips180-4/Draft-FIPS180-4_Feb2011.pdfU
unknown
https://pastebin.com/X
unknown
https://pastebin.com/V
unknown
http://www.componentace.com
unknown
https://pastebin.com/
unknown
https://pastebin.com/raw/ZELZp1Yrl
unknown
https://pastebin.com/raw/hQqNRrQt:u
unknown
https://pastebin.com/raw/ZELZp1YrILE_X
unknown
https://pastebin.com/raw/hQqNRrQt40
unknown
http://www.csrc.nist.gov/publications/fips/fips197/fips-197.pdfS
unknown
https://pastebin.com/L
unknown
http://www.ietf.org/rfc/rfc3447.txtS
unknown
https://pastebin.com/I
unknown
There are 32 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
setember2024inf2.is-a-nurse.com
208.109.246.134
malicious
pastebin.com
104.20.3.235
malicious

IPs

IP
Domain
Country
Malicious
104.20.3.235
pastebin.com
United States
malicious
208.109.246.134
setember2024inf2.is-a-nurse.com
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProgramId
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
FileId
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LowerCaseLongPath
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LongPathHash
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Name
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
OriginalFileName
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Publisher
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Version
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinFileVersion
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinaryType
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductName
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
ProductVersion
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
LinkDate
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
BinProductVersion
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageFullName
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
AppxPackageRelativeId
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Size
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Language
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
IsOsComponent
\REGISTRY\A\{6056b4f8-e854-3fc5-cb86-9669761de25f}\Root\InventoryApplicationFile\rundll32.exe|ccf370e740f0e788
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018400CF081ADAB
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018400CF081ADAB
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
66DB000
direct allocation
page read and write
6490000
heap
page read and write
2961000
heap
page read and write
4801000
unkown
page execute read
3240000
trusted library allocation
page read and write
2961000
heap
page read and write
6824000
direct allocation
page read and write
6324000
direct allocation
page read and write
6997000
heap
page read and write
646B000
direct allocation
page read and write
3E32000
heap
page read and write
4CE8000
unkown
page read and write
6908000
heap
page read and write
6487000
direct allocation
page read and write
6671000
heap
page read and write
2BE4000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
3204000
heap
page read and write
5DB8000
direct allocation
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
4EA8000
unkown
page read and write
7E4000
heap
page read and write
6979000
heap
page read and write
680000
heap
page read and write
6807000
direct allocation
page read and write
2CC4000
heap
page read and write
5D3F000
direct allocation
page read and write
4D24000
unkown
page execute read
2EA4000
heap
page read and write
2BE4000
heap
page read and write
6671000
heap
page read and write
5DD4000
direct allocation
page read and write
657F000
stack
page read and write
2961000
heap
page read and write
5093000
unkown
page execute read
5DC6000
direct allocation
page read and write
66FF000
stack
page read and write
4823000
unkown
page write copy
30B4000
heap
page read and write
3204000
heap
page read and write
4EE1000
unkown
page read and write
2CC4000
heap
page read and write
6570000
heap
page read and write
692E000
heap
page read and write
482A000
unkown
page write copy
31C4000
heap
page read and write
3E31000
heap
page read and write
2F80000
direct allocation
page execute and read and write
676D000
direct allocation
page read and write
64A1000
heap
page read and write
5D2B000
direct allocation
page read and write
692E000
heap
page read and write
4DFB000
unkown
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
645E000
stack
page read and write
4E90000
unkown
page read and write
6791000
direct allocation
page read and write
2961000
heap
page read and write
6370000
trusted library allocation
page read and write
307C000
stack
page read and write
2961000
heap
page read and write
2CC4000
heap
page read and write
2CC4000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
4E4E000
unkown
page read and write
68B8000
direct allocation
page read and write
639B000
direct allocation
page read and write
643D000
direct allocation
page read and write
65E1000
heap
page read and write
6671000
heap
page read and write
4CCB000
unkown
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
6171000
heap
page read and write
2EE4000
heap
page read and write
31C4000
heap
page read and write
5AE0000
unkown
page execute read
31C0000
heap
page read and write
670000
heap
page read and write
2BE4000
heap
page read and write
3E31000
heap
page read and write
7E4000
heap
page read and write
4CDC000
unkown
page write copy
68F0000
heap
page read and write
2CC4000
heap
page read and write
481F000
unkown
page write copy
93A000
heap
page read and write
2EE4000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
2CC4000
heap
page read and write
6A10000
remote allocation
page read and write
2961000
heap
page read and write
6560000
heap
page read and write
699B000
heap
page read and write
6561000
heap
page read and write
2961000
heap
page read and write
2CC4000
heap
page read and write
6918000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
4EE4000
unkown
page execute read
6993000
heap
page read and write
6851000
direct allocation
page read and write
324E000
stack
page read and write
67EB000
direct allocation
page read and write
2BE4000
heap
page read and write
2961000
heap
page read and write
31C4000
heap
page read and write
3E31000
heap
page read and write
7E4000
heap
page read and write
2ABA000
heap
page read and write
639A000
direct allocation
page read and write
5CE3000
direct allocation
page read and write
3E30000
heap
page read and write
2CC4000
heap
page read and write
2F10000
heap
page read and write
8EF000
unkown
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
699B000
heap
page read and write
2EE4000
heap
page read and write
2961000
heap
page read and write
675F000
stack
page read and write
62A1000
heap
page read and write
335A000
heap
page read and write
697A000
heap
page read and write
62A1000
heap
page read and write
3204000
heap
page read and write
683D000
direct allocation
page read and write
65D0000
heap
page read and write
4BD0000
unkown
page readonly
2EA4000
heap
page read and write
3204000
heap
page read and write
2EA4000
heap
page read and write
31C4000
heap
page read and write
2961000
heap
page read and write
690C000
heap
page read and write
6561000
heap
page read and write
65E1000
heap
page read and write
2EA4000
heap
page read and write
661B000
direct allocation
page read and write
2EA4000
heap
page read and write
5D92000
direct allocation
page read and write
2AD1000
heap
page read and write
2EA4000
heap
page read and write
2961000
heap
page read and write
6982000
heap
page read and write
6171000
heap
page read and write
6630000
direct allocation
page read and write
65E1000
heap
page read and write
670D000
direct allocation
page read and write
2961000
heap
page read and write
6741000
direct allocation
page read and write
2961000
heap
page read and write
30B4000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
4931000
unkown
page execute read
50C5000
unkown
page execute read
68F5000
heap
page read and write
4E00000
unkown
page read and write
2961000
heap
page read and write
6798000
direct allocation
page read and write
3204000
heap
page read and write
64A1000
heap
page read and write
6A4000
heap
page read and write
2CC4000
heap
page read and write
6622000
direct allocation
page read and write
7E4000
heap
page read and write
3371000
heap
page read and write
309C000
stack
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
68AA000
direct allocation
page read and write
2FF0000
heap
page read and write
651A000
direct allocation
page read and write
2961000
heap
page read and write
6376000
direct allocation
page read and write
690C000
heap
page read and write
2EA4000
heap
page read and write
2961000
heap
page read and write
31C4000
heap
page read and write
6171000
heap
page read and write
5CC0000
direct allocation
page read and write
BC6E000
stack
page read and write
6561000
heap
page read and write
62A1000
heap
page read and write
7E7000
heap
page read and write
2961000
heap
page read and write
6660000
heap
page read and write
685A000
direct allocation
page read and write
3E31000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
30B4000
heap
page read and write
2CC4000
heap
page read and write
50AB000
unkown
page read and write
4EB3000
unkown
page readonly
627E000
stack
page read and write
6672000
direct allocation
page read and write
6842000
direct allocation
page read and write
5DDC000
direct allocation
page read and write
633B000
direct allocation
page read and write
4E54000
unkown
page execute read
2EA4000
heap
page read and write
6985000
heap
page read and write
6A4000
heap
page read and write
3204000
heap
page read and write
692E000
heap
page read and write
3204000
heap
page read and write
50BE000
unkown
page write copy
4E51000
unkown
page read and write
2961000
heap
page read and write
3240000
direct allocation
page execute and read and write
6810000
direct allocation
page read and write
3E31000
heap
page read and write
30B4000
heap
page read and write
6504000
direct allocation
page read and write
4EAD000
unkown
page read and write
2EA4000
heap
page read and write
2961000
heap
page read and write
6650000
heap
page read and write
2961000
heap
page read and write
481A000
unkown
page write copy
3204000
heap
page read and write
64A0000
unkown
page readonly
2961000
heap
page read and write
6AD0000
heap
page read and write
6654000
direct allocation
page read and write
686D000
stack
page read and write
31E0000
heap
page read and write
2EE4000
heap
page read and write
2961000
heap
page read and write
5D5F000
direct allocation
page read and write
4351000
unkown
page execute read
675F000
direct allocation
page read and write
4DFA000
unkown
page write copy
2961000
heap
page read and write
6480000
direct allocation
page read and write
7E4000
heap
page read and write
6A4000
heap
page read and write
62A1000
heap
page read and write
4CC3000
unkown
page execute read
2961000
heap
page read and write
2DDE000
stack
page read and write
3350000
heap
page read and write
64EF000
direct allocation
page read and write
2961000
heap
page read and write
6802000
direct allocation
page read and write
6748000
direct allocation
page read and write
2961000
heap
page read and write
2EE4000
heap
page read and write
509B000
unkown
page read and write
687F000
direct allocation
page read and write
2B6E000
heap
page read and write
30B4000
heap
page read and write
2E5B000
stack
page read and write
6461000
direct allocation
page read and write
6921000
heap
page read and write
3100000
heap
page read and write
684B000
direct allocation
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
30B4000
heap
page read and write
2BE4000
heap
page read and write
698F000
heap
page read and write
32C0000
trusted library allocation
page read and write
2E10000
heap
page read and write
4CDE000
unkown
page read and write
63E4000
direct allocation
page read and write
6561000
heap
page read and write
6671000
heap
page read and write
3290000
heap
page read and write
6906000
heap
page read and write
6A4000
heap
page read and write
64A1000
heap
page read and write
6844000
direct allocation
page read and write
66D1000
direct allocation
page read and write
3E31000
heap
page read and write
31C4000
heap
page read and write
6979000
heap
page read and write
4EE0000
unkown
page write copy
62F2000
direct allocation
page read and write
2EA4000
heap
page read and write
5D74000
direct allocation
page read and write
7F0000
heap
page read and write
2961000
heap
page read and write
2EE4000
heap
page read and write
2961000
heap
page read and write
6334000
direct allocation
page read and write
483D000
unkown
page read and write
2961000
heap
page read and write
6A4000
heap
page read and write
936000
heap
page read and write
6A4000
heap
page read and write
2BE4000
heap
page read and write
6800000
direct allocation
page read and write
6436000
direct allocation
page read and write
2EE4000
heap
page read and write
2B8A000
heap
page read and write
31C4000
heap
page read and write
6444000
direct allocation
page read and write
30B4000
heap
page read and write
64A1000
heap
page read and write
2961000
heap
page read and write
69AD000
heap
page read and write
682E000
stack
page read and write
2BE4000
heap
page read and write
2BE4000
heap
page read and write
3E31000
heap
page read and write
6906000
heap
page read and write
7E4000
heap
page read and write
6570000
heap
page read and write
663E000
stack
page read and write
69BD000
heap
page read and write
4E9A000
unkown
page write copy
630F000
direct allocation
page read and write
6171000
heap
page read and write
583F000
unkown
page read and write
2F40000
heap
page read and write
3204000
heap
page read and write
32B0000
heap
page read and write
3204000
heap
page read and write
2961000
heap
page read and write
68A8000
direct allocation
page read and write
B90000
heap
page read and write
3210000
heap
page read and write
2F9A000
heap
page read and write
2961000
heap
page read and write
6906000
heap
page read and write
2961000
heap
page read and write
4E8B000
unkown
page read and write
6672000
heap
page read and write
30D0000
heap
page read and write
30B4000
heap
page read and write
2E7C000
stack
page read and write
2961000
heap
page read and write
7A0000
trusted library allocation
page read and write
2AEA000
heap
page read and write
525F000
unkown
page read and write
2961000
heap
page read and write
2970000
heap
page read and write
2961000
heap
page read and write
6521000
direct allocation
page read and write
30F1000
heap
page read and write
6A4000
heap
page read and write
692E000
heap
page read and write
2961000
heap
page read and write
4D1E000
unkown
page read and write
6916000
heap
page read and write
2CC4000
heap
page read and write
6671000
heap
page read and write
4CED000
unkown
page read and write
5D8B000
direct allocation
page read and write
2CC4000
heap
page read and write
65E1000
heap
page read and write
65E0000
heap
page read and write
30F1000
heap
page read and write
50B8000
unkown
page read and write
6A4000
heap
page read and write
3220000
heap
page read and write
2FB0000
heap
page read and write
2EE4000
heap
page read and write
691E000
heap
page read and write
3220000
heap
page read and write
6411000
direct allocation
page read and write
333A000
heap
page read and write
2961000
heap
page read and write
4E25000
unkown
page execute read
2961000
heap
page read and write
682D000
direct allocation
page read and write
3E31000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
50F4000
unkown
page execute read
49C1000
unkown
page execute read
5DE3000
direct allocation
page read and write
2961000
heap
page read and write
2EA4000
heap
page read and write
BDE000
stack
page read and write
6991000
heap
page read and write
5D6D000
direct allocation
page read and write
64C2000
direct allocation
page read and write
681F000
direct allocation
page read and write
5DA8000
direct allocation
page read and write
4DFF000
unkown
page write copy
3E31000
heap
page read and write
4350000
unkown
page readonly
63C0000
direct allocation
page read and write
2961000
heap
page read and write
2B54000
heap
page read and write
2961000
heap
page read and write
6A4000
heap
page read and write
4843000
unkown
page readonly
C1E000
stack
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
6688000
direct allocation
page read and write
2BE4000
heap
page read and write
2961000
heap
page read and write
6997000
heap
page read and write
4D20000
unkown
page write copy
2BE4000
heap
page read and write
2EE4000
heap
page read and write
63ED000
direct allocation
page read and write
32B0000
heap
page read and write
5710000
unkown
page execute read
3204000
heap
page read and write
482C000
unkown
page write copy
2EA4000
heap
page read and write
62EB000
direct allocation
page read and write
7E4000
heap
page read and write
671F000
stack
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
6732000
direct allocation
page read and write
2BE4000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
83B000
stack
page read and write
30F1000
heap
page read and write
6A4000
heap
page read and write
5D84000
direct allocation
page read and write
7E4000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
65E1000
heap
page read and write
6368000
direct allocation
page read and write
7E4000
heap
page read and write
2961000
heap
page read and write
2CC4000
heap
page read and write
3270000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
7E4000
heap
page read and write
6921000
heap
page read and write
62A0000
heap
page read and write
2960000
heap
page read and write
4870000
unkown
page write copy
2961000
heap
page read and write
2DF0000
heap
page read and write
6671000
heap
page read and write
2B5B000
stack
page read and write
2961000
heap
page read and write
2BE4000
heap
page read and write
760000
heap
page read and write
2961000
heap
page read and write
31C4000
heap
page read and write
2961000
heap
page read and write
64A1000
heap
page read and write
31C4000
heap
page read and write
6834000
direct allocation
page read and write
2961000
heap
page read and write
4871000
unkown
page read and write
2EA4000
heap
page read and write
2961000
heap
page read and write
30B4000
heap
page read and write
5D7D000
direct allocation
page read and write
4E9B000
unkown
page read and write
7E4000
heap
page read and write
2C3E000
stack
page read and write
2BE4000
heap
page read and write
6758000
direct allocation
page read and write
2B39000
heap
page read and write
482E000
unkown
page read and write
6A10000
remote allocation
page read and write
2961000
heap
page read and write
2BE4000
heap
page read and write
4E04000
unkown
page read and write
2BE4000
heap
page read and write
2961000
heap
page read and write
6342000
direct allocation
page read and write
31B0000
heap
page read and write
65E1000
heap
page read and write
6980000
heap
page read and write
2961000
heap
page read and write
637000
stack
page read and write
6A10000
remote allocation
page read and write
29B0000
direct allocation
page execute and read and write
2FF0000
heap
page read and write
30B4000
heap
page read and write
6995000
heap
page read and write
6714000
direct allocation
page read and write
689A000
direct allocation
page read and write
30B4000
heap
page read and write
50AC000
unkown
page write copy
5D3B000
direct allocation
page read and write
6990000
heap
page read and write
66BF000
stack
page read and write
49C0000
unkown
page readonly
2EA4000
heap
page read and write
31C4000
heap
page read and write
67AF000
stack
page read and write
63F4000
direct allocation
page read and write
3204000
heap
page read and write
2961000
heap
page read and write
62A1000
heap
page read and write
6402000
direct allocation
page read and write
6817000
direct allocation
page read and write
30B4000
heap
page read and write
2961000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
649D000
direct allocation
page read and write
3E31000
heap
page read and write
62A1000
heap
page read and write
2EA4000
heap
page read and write
69E0000
heap
page read and write
2961000
heap
page read and write
6351000
direct allocation
page read and write
6300000
direct allocation
page read and write
2961000
heap
page read and write
66C3000
direct allocation
page read and write
2EE4000
heap
page read and write
692E000
heap
page read and write
2C7F000
stack
page read and write
2961000
heap
page read and write
7E4000
heap
page read and write
4CDB000
unkown
page read and write
2BE4000
heap
page read and write
2F90000
heap
page read and write
30B4000
heap
page read and write
2961000
heap
page read and write
5CC7000
direct allocation
page read and write
2EE4000
heap
page read and write
6A4000
heap
page read and write
840000
heap
page read and write
5D17000
direct allocation
page read and write
3204000
heap
page read and write
2961000
heap
page read and write
31C4000
heap
page read and write
482B000
unkown
page read and write
667F000
stack
page read and write
6561000
heap
page read and write
2CC4000
heap
page read and write
6671000
heap
page read and write
2CC4000
heap
page read and write
2961000
heap
page read and write
3E31000
heap
page read and write
64AE000
stack
page read and write
2EF0000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
62A1000
heap
page read and write
30B4000
heap
page read and write
4E0A000
unkown
page write copy
65A0000
trusted library allocation
page read and write
2961000
heap
page read and write
6370000
heap
page read and write
A48E000
stack
page read and write
303B000
stack
page read and write
7A0000
heap
page read and write
4E18000
unkown
page read and write
6562000
heap
page read and write
2961000
heap
page read and write
328A000
heap
page read and write
4845000
unkown
page execute read
2CC4000
heap
page read and write
69AD000
heap
page read and write
2961000
heap
page read and write
3E31000
heap
page read and write
2EE4000
heap
page read and write
30B4000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
4E83000
unkown
page execute read
6921000
heap
page read and write
2EA4000
heap
page read and write
2DFA000
heap
page read and write
3280000
heap
page read and write
4D21000
unkown
page read and write
3240000
trusted library allocation
page read and write
30F0000
heap
page read and write
2BE4000
heap
page read and write
2961000
heap
page read and write
2FFA000
heap
page read and write
7E4000
heap
page read and write
2961000
heap
page read and write
64A1000
heap
page read and write
6171000
heap
page read and write
2BE4000
heap
page read and write
65E1000
heap
page read and write
2BE4000
heap
page read and write
65E1000
heap
page read and write
63CF000
direct allocation
page read and write
68D0000
heap
page read and write
631D000
direct allocation
page read and write
2961000
heap
page read and write
4E8A000
unkown
page write copy
4EAE000
unkown
page write copy
2EA4000
heap
page read and write
6698000
direct allocation
page read and write
7E4000
heap
page read and write
7DB000
heap
page read and write
6681000
direct allocation
page read and write
31C4000
heap
page read and write
48E0000
heap
page read and write
30F1000
heap
page read and write
2EE4000
heap
page read and write
A44D000
stack
page read and write
4E50000
unkown
page write copy
3204000
heap
page read and write
665D000
direct allocation
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
6852000
direct allocation
page read and write
3D8000
stack
page read and write
2961000
heap
page read and write
2FE0000
heap
page read and write
65E1000
heap
page read and write
2BE4000
heap
page read and write
30B4000
heap
page read and write
2961000
heap
page read and write
6A4000
heap
page read and write
2961000
heap
page read and write
6916000
heap
page read and write
2961000
heap
page read and write
6918000
heap
page read and write
2B28000
heap
page read and write
3E31000
heap
page read and write
570F000
unkown
page read and write
7E4000
heap
page read and write
30F1000
heap
page read and write
7E4000
heap
page read and write
66D0000
heap
page read and write
2CC4000
heap
page read and write
2961000
heap
page read and write
6A4000
heap
page read and write
6982000
heap
page read and write
4E9E000
unkown
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
64A1000
heap
page read and write
6418000
direct allocation
page read and write
2CC4000
heap
page read and write
328F000
stack
page read and write
2961000
heap
page read and write
31C4000
heap
page read and write
6921000
heap
page read and write
2B1C000
heap
page read and write
2F20000
heap
page read and write
2961000
heap
page read and write
6918000
heap
page read and write
2961000
heap
page read and write
5DF1000
direct allocation
page read and write
2961000
heap
page read and write
690C000
heap
page read and write
2961000
heap
page read and write
63DD000
direct allocation
page read and write
66E2000
direct allocation
page read and write
2EE4000
heap
page read and write
3204000
heap
page read and write
7E0000
heap
page read and write
6886000
direct allocation
page read and write
63DE000
stack
page read and write
669F000
direct allocation
page read and write
481B000
unkown
page read and write
4824000
unkown
page read and write
2961000
heap
page read and write
31C4000
heap
page read and write
7E4000
heap
page read and write
31C4000
heap
page read and write
692C000
heap
page read and write
2DA0000
heap
page read and write
67F2000
direct allocation
page read and write
2961000
heap
page read and write
67DB000
direct allocation
page read and write
3011000
heap
page read and write
4813000
unkown
page execute read
64B4000
direct allocation
page read and write
2961000
heap
page read and write
637D000
direct allocation
page read and write
651F000
stack
page read and write
3E31000
heap
page read and write
2B30000
heap
page read and write
31C4000
heap
page read and write
5D50000
direct allocation
page read and write
4930000
unkown
page readonly
2961000
heap
page read and write
5D10000
direct allocation
page read and write
2CC4000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
8D0000
trusted library allocation
page read and write
31C4000
heap
page read and write
6766000
direct allocation
page read and write
6171000
heap
page read and write
6561000
heap
page read and write
65E1000
heap
page read and write
2961000
heap
page read and write
2A70000
heap
page read and write
6561000
heap
page read and write
31C4000
heap
page read and write
30B4000
heap
page read and write
2961000
heap
page read and write
64FD000
direct allocation
page read and write
6884000
direct allocation
page read and write
3E31000
heap
page read and write
6987000
heap
page read and write
4E8F000
unkown
page write copy
30F1000
heap
page read and write
2B13000
heap
page read and write
2961000
heap
page read and write
455F000
stack
page read and write
650C000
direct allocation
page read and write
64D1000
direct allocation
page read and write
6561000
heap
page read and write
2EE4000
heap
page read and write
87C000
stack
page read and write
64D8000
direct allocation
page read and write
3010000
heap
page read and write
509A000
unkown
page write copy
5D57000
direct allocation
page read and write
3E31000
heap
page read and write
2961000
heap
page read and write
5CE1000
direct allocation
page read and write
3204000
heap
page read and write
6290000
unkown
page readonly
63B2000
direct allocation
page read and write
6A4000
heap
page read and write
B76E000
stack
page read and write
62A1000
heap
page read and write
31C4000
heap
page read and write
31C4000
heap
page read and write
6834000
direct allocation
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
4E93000
unkown
page write copy
664D000
direct allocation
page read and write
6986000
heap
page read and write
2961000
heap
page read and write
6774000
direct allocation
page read and write
2EE4000
heap
page read and write
2BE4000
heap
page read and write
673A000
direct allocation
page read and write
3330000
heap
page read and write
66BE000
stack
page read and write
5260000
unkown
page execute read
BC2D000
stack
page read and write
4BD1000
unkown
page execute read
692E000
heap
page read and write
4CF3000
unkown
page readonly
94B000
direct allocation
page read and write
2961000
heap
page read and write
2E3B000
stack
page read and write
4EB2000
unkown
page read and write
68BD000
stack
page read and write
671D000
direct allocation
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
692E000
heap
page read and write
30F1000
heap
page read and write
67ED000
stack
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
6A4000
heap
page read and write
2CC0000
heap
page read and write
3204000
heap
page read and write
318E000
stack
page read and write
6921000
heap
page read and write
31A0000
heap
page read and write
3E31000
heap
page read and write
2BE4000
heap
page read and write
7E4000
heap
page read and write
6428000
direct allocation
page read and write
678A000
direct allocation
page read and write
2BE0000
heap
page read and write
4820000
unkown
page read and write
692E000
heap
page read and write
2961000
heap
page read and write
64A1000
heap
page read and write
68A1000
direct allocation
page read and write
4E89000
unkown
page read and write
30B4000
heap
page read and write
2961000
heap
page read and write
6820000
heap
page read and write
6916000
heap
page read and write
2EE4000
heap
page read and write
2CFB000
stack
page read and write
2DB0000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
4E1D000
unkown
page read and write
2961000
heap
page read and write
2A80000
heap
page read and write
2EE4000
heap
page read and write
50EE000
unkown
page read and write
6893000
direct allocation
page read and write
50F1000
unkown
page read and write
6999000
heap
page read and write
697B000
heap
page read and write
64A4000
direct allocation
page read and write
2961000
heap
page read and write
30B4000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
31C4000
heap
page read and write
698E000
heap
page read and write
331E000
stack
page read and write
2FB000
stack
page read and write
636F000
direct allocation
page read and write
2961000
heap
page read and write
2EE4000
heap
page read and write
2CC4000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
2960000
trusted library allocation
page read and write
688C000
direct allocation
page read and write
648F000
direct allocation
page read and write
3204000
heap
page read and write
58D0000
unkown
page execute read
2FB1000
heap
page read and write
486E000
unkown
page read and write
7E4000
heap
page read and write
2FFA000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
50A3000
unkown
page write copy
65CE000
stack
page read and write
6171000
heap
page read and write
640A000
direct allocation
page read and write
6A4000
heap
page read and write
4E9C000
unkown
page write copy
7E4000
heap
page read and write
7D4000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
7E4000
heap
page read and write
5CD6000
direct allocation
page read and write
2961000
heap
page read and write
4DF3000
unkown
page execute read
2961000
heap
page read and write
2961000
heap
page read and write
5CD3000
direct allocation
page read and write
4E94000
unkown
page read and write
7E4000
heap
page read and write
2BE4000
heap
page read and write
6520000
trusted library allocation
page read and write
2B0B000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
6307000
direct allocation
page read and write
6384000
direct allocation
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
2EA4000
heap
page read and write
2961000
heap
page read and write
2EE4000
heap
page read and write
3204000
heap
page read and write
2961000
heap
page read and write
2AFA000
heap
page read and write
4838000
unkown
page read and write
2EA4000
heap
page read and write
2961000
heap
page read and write
3204000
heap
page read and write
660B000
direct allocation
page read and write
7F5000
heap
page read and write
4920000
heap
page read and write
8AE000
stack
page read and write
62DB000
direct allocation
page read and write
64E8000
direct allocation
page read and write
2961000
heap
page read and write
677C000
direct allocation
page read and write
2CC4000
heap
page read and write
3E31000
heap
page read and write
4819000
unkown
page read and write
2961000
heap
page read and write
6A70000
heap
page read and write
58CF000
unkown
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
4CF5000
unkown
page execute read
2BE4000
heap
page read and write
2BE4000
heap
page read and write
66AD000
direct allocation
page read and write
3050000
heap
page read and write
66F0000
direct allocation
page read and write
2E12000
heap
page read and write
2961000
heap
page read and write
50C2000
unkown
page read and write
2961000
heap
page read and write
3120000
direct allocation
page execute and read and write
684A000
direct allocation
page read and write
2CC4000
heap
page read and write
64AD000
direct allocation
page read and write
4E22000
unkown
page read and write
6991000
heap
page read and write
3E31000
heap
page read and write
30B4000
heap
page read and write
65E1000
heap
page read and write
3200000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
6878000
direct allocation
page read and write
31C4000
heap
page read and write
656F000
stack
page read and write
2961000
heap
page read and write
30F1000
heap
page read and write
68B1000
direct allocation
page read and write
5DCD000
direct allocation
page read and write
2961000
heap
page read and write
2EA4000
heap
page read and write
50AE000
unkown
page read and write
2961000
heap
page read and write
2ED0000
heap
page read and write
2961000
heap
page read and write
4900000
direct allocation
page execute and read and write
68A3000
direct allocation
page read and write
5DA1000
direct allocation
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
6A4000
heap
page read and write
683B000
direct allocation
page read and write
3E31000
heap
page read and write
64A0000
heap
page read and write
3E31000
heap
page read and write
2BE4000
heap
page read and write
2EE4000
heap
page read and write
64F0000
heap
page read and write
6A4000
heap
page read and write
688D000
direct allocation
page read and write
31C4000
heap
page read and write
7E4000
heap
page read and write
2961000
heap
page read and write
2EA4000
heap
page read and write
2961000
heap
page read and write
667A000
direct allocation
page read and write
7E4000
heap
page read and write
50AA000
unkown
page write copy
6561000
heap
page read and write
644C000
direct allocation
page read and write
6A4000
heap
page read and write
6171000
heap
page read and write
2961000
heap
page read and write
5099000
unkown
page read and write
5D9A000
direct allocation
page read and write
6671000
heap
page read and write
2D3C000
stack
page read and write
4800000
unkown
page readonly
2961000
heap
page read and write
69BE000
heap
page read and write
2961000
heap
page read and write
2990000
heap
page read and write
66D8000
direct allocation
page read and write
2961000
heap
page read and write
66F7000
direct allocation
page read and write
6921000
heap
page read and write
6868000
direct allocation
page read and write
6916000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
31C4000
heap
page read and write
697F000
heap
page read and write
6770000
heap
page read and write
2EA0000
heap
page read and write
6993000
heap
page read and write
2961000
heap
page read and write
6671000
heap
page read and write
4842000
unkown
page read and write
6861000
direct allocation
page read and write
6671000
heap
page read and write
2961000
heap
page read and write
638C000
direct allocation
page read and write
3E31000
heap
page read and write
2EE4000
heap
page read and write
666B000
direct allocation
page read and write
6724000
direct allocation
page read and write
4E23000
unkown
page readonly
30D0000
trusted library allocation
page read and write
2961000
heap
page read and write
4CD3000
unkown
page write copy
3204000
heap
page read and write
4EDE000
unkown
page read and write
6513000
direct allocation
page read and write
671F000
stack
page read and write
2961000
heap
page read and write
64EF000
stack
page read and write
5D09000
direct allocation
page read and write
63A8000
direct allocation
page read and write
63A1000
direct allocation
page read and write
634A000
direct allocation
page read and write
3E31000
heap
page read and write
30B4000
heap
page read and write
66CA000
direct allocation
page read and write
2B41000
heap
page read and write
3204000
heap
page read and write
6A4000
heap
page read and write
690C000
heap
page read and write
2961000
heap
page read and write
687D000
direct allocation
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
6921000
heap
page read and write
6671000
heap
page read and write
2961000
heap
page read and write
3E31000
heap
page read and write
632D000
direct allocation
page read and write
2EE4000
heap
page read and write
64CA000
direct allocation
page read and write
6868000
direct allocation
page read and write
810000
direct allocation
page execute and read and write
2961000
heap
page read and write
3100000
heap
page read and write
64DE000
stack
page read and write
4E03000
unkown
page write copy
6995000
heap
page read and write
6876000
direct allocation
page read and write
7C0000
direct allocation
page execute and read and write
2E9C000
stack
page read and write
6671000
heap
page read and write
60D0000
unkown
page readonly
2961000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
B10000
trusted library allocation
page read and write
93B000
direct allocation
page read and write
50C3000
unkown
page readonly
30B0000
heap
page read and write
4CDA000
unkown
page write copy
6978000
heap
page read and write
6A4000
heap
page read and write
2961000
heap
page read and write
4CEE000
unkown
page write copy
4E0B000
unkown
page read and write
50F0000
unkown
page write copy
31C4000
heap
page read and write
66A6000
direct allocation
page read and write
5DBF000
direct allocation
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
6921000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
63C7000
direct allocation
page read and write
7E4000
heap
page read and write
2B2A000
heap
page read and write
4940000
direct allocation
page execute and read and write
3204000
heap
page read and write
2B19000
heap
page read and write
6171000
heap
page read and write
2961000
heap
page read and write
7D0000
heap
page read and write
2961000
heap
page read and write
8E0000
heap
page read and write
4010000
heap
page read and write
689C000
direct allocation
page read and write
2EE4000
heap
page read and write
63E0000
heap
page read and write
30B4000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
320F000
stack
page read and write
7E4000
heap
page read and write
2CC4000
heap
page read and write
5DEA000
direct allocation
page read and write
6358000
direct allocation
page read and write
62A1000
heap
page read and write
30F1000
heap
page read and write
3204000
heap
page read and write
62A1000
heap
page read and write
4CD4000
unkown
page read and write
2961000
heap
page read and write
5DF8000
direct allocation
page read and write
2961000
heap
page read and write
64A1000
heap
page read and write
2961000
heap
page read and write
50A4000
unkown
page read and write
4CD0000
unkown
page read and write
2961000
heap
page read and write
64A1000
heap
page read and write
2961000
heap
page read and write
2F30000
trusted library allocation
page read and write
642F000
direct allocation
page read and write
6528000
direct allocation
page read and write
2961000
heap
page read and write
5D21000
direct allocation
page read and write
30B4000
heap
page read and write
5CEA000
direct allocation
page read and write
8F0000
heap
page read and write
30B4000
heap
page read and write
31C4000
heap
page read and write
7E4000
heap
page read and write
2EA4000
heap
page read and write
2961000
heap
page read and write
645A000
direct allocation
page read and write
2EA4000
heap
page read and write
2B9C000
stack
page read and write
64A2000
heap
page read and write
2961000
heap
page read and write
6A4000
heap
page read and write
64BB000
direct allocation
page read and write
2961000
heap
page read and write
698C000
heap
page read and write
31C4000
heap
page read and write
4E0E000
unkown
page read and write
6393000
direct allocation
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
6670000
heap
page read and write
6A4000
heap
page read and write
7E4000
heap
page read and write
2961000
heap
page read and write
A3CE000
stack
page read and write
2BE4000
heap
page read and write
2961000
heap
page read and write
64F6000
direct allocation
page read and write
4874000
unkown
page execute read
3204000
heap
page read and write
B60000
heap
page read and write
2961000
heap
page read and write
497E000
stack
page read and write
3204000
heap
page read and write
6A4000
heap
page read and write
2961000
heap
page read and write
2BE4000
heap
page read and write
4CC9000
unkown
page read and write
6200000
unkown
page readonly
6A4000
heap
page read and write
3290000
direct allocation
page execute and read and write
C30000
heap
page read and write
6453000
direct allocation
page read and write
2961000
heap
page read and write
4EB5000
unkown
page execute read
30B4000
heap
page read and write
30B4000
heap
page read and write
5C20000
unkown
page readonly
6170000
heap
page read and write
B72D000
stack
page read and write
31C4000
heap
page read and write
509F000
unkown
page write copy
6858000
direct allocation
page read and write
6A4000
heap
page read and write
6410000
heap
page read and write
66CB000
direct allocation
page read and write
930000
heap
page read and write
50BD000
unkown
page read and write
2961000
heap
page read and write
3E31000
heap
page read and write
2961000
heap
page read and write
3FC000
stack
page read and write
2CC4000
heap
page read and write
30B4000
heap
page read and write
3E31000
heap
page read and write
30F1000
heap
page read and write
6908000
heap
page read and write
3204000
heap
page read and write
2961000
heap
page read and write
A40F000
stack
page read and write
686F000
direct allocation
page read and write
2961000
heap
page read and write
6908000
heap
page read and write
4CCA000
unkown
page write copy
4E0C000
unkown
page write copy
2961000
heap
page read and write
7DF000
heap
page read and write
2EE0000
heap
page read and write
30F1000
heap
page read and write
7D0000
heap
page read and write
682D000
direct allocation
page read and write
2EE4000
heap
page read and write
2EE4000
heap
page read and write
2EA4000
heap
page read and write
5ADF000
unkown
page read and write
2EA4000
heap
page read and write
5D01000
direct allocation
page read and write
2EE4000
heap
page read and write
2EA4000
heap
page read and write
2961000
heap
page read and write
64A1000
heap
page read and write
2961000
heap
page read and write
4CCF000
unkown
page write copy
4E1E000
unkown
page write copy
6561000
heap
page read and write
6999000
heap
page read and write
6637000
direct allocation
page read and write
6561000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
2961000
heap
page read and write
681D000
direct allocation
page read and write
445F000
stack
page read and write
6664000
direct allocation
page read and write
62A1000
heap
page read and write
3204000
heap
page read and write
6671000
heap
page read and write
698F000
heap
page read and write
2CC4000
heap
page read and write
7ED000
heap
page read and write
6A4000
heap
page read and write
6894000
direct allocation
page read and write
63AB000
direct allocation
page read and write
5840000
unkown
page execute read
69BD000
heap
page read and write
66B4000
direct allocation
page read and write
6171000
heap
page read and write
672B000
direct allocation
page read and write
66F0000
heap
page read and write
4DF9000
unkown
page read and write
6A0000
heap
page read and write
64EF000
stack
page read and write
63FB000
direct allocation
page read and write
6561000
heap
page read and write
645B000
direct allocation
page read and write
3310000
heap
page read and write
2AB0000
heap
page read and write
660000
heap
page read and write
483E000
unkown
page write copy
4CF2000
unkown
page read and write
66BC000
direct allocation
page read and write
2961000
heap
page read and write
31E0000
heap
page read and write
6468000
direct allocation
page read and write
2EE4000
heap
page read and write
3E31000
heap
page read and write
67FB000
direct allocation
page read and write
67EB000
direct allocation
page read and write
64A1000
heap
page read and write
6493000
direct allocation
page read and write
2F60000
heap
page read and write
6171000
heap
page read and write
6472000
direct allocation
page read and write
2961000
heap
page read and write
2CC4000
heap
page read and write
305B000
stack
page read and write
2961000
heap
page read and write
691F000
heap
page read and write
2CC4000
heap
page read and write
676E000
stack
page read and write
6783000
direct allocation
page read and write
2EA4000
heap
page read and write
2EA4000
heap
page read and write
64A1000
heap
page read and write
2961000
heap
page read and write
30B4000
heap
page read and write
48B0000
trusted library allocation
page read and write
3E31000
heap
page read and write
2961000
heap
page read and write
6561000
heap
page read and write
50A0000
unkown
page read and write
2CC4000
heap
page read and write
There are 1241 hidden memdumps, click here to show them.