IOC Report
ADZP 20 Complex.exe

loading gif

Files

File Path
Type
Category
Malicious
ADZP 20 Complex.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\9B58.tmp\9B59.tmp\9B6A.bat
Unicode text, UTF-8 text, with very long lines (817), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\B132.tmp\B133.tmp\B134.bat
Unicode text, UTF-8 text, with very long lines (817), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\B539.tmp\B53A.tmp\B53B.bat
Unicode text, UTF-8 text, with very long lines (817), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\BE03.tmp\BE04.tmp\BE05.bat
Unicode text, UTF-8 text, with very long lines (817), with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\Advertencia.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\ErrorCritico.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\Informacion.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\Desktop\Twain_20.dll
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\System32\Twain_20.dll
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Twain_20.cmd
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\Autorun.inf
Microsoft Windows Autorun file
dropped
C:\Users\user\Desktop\Taskdl.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\Taskse.exe
ASCII text, with very long lines (477), with CRLF line terminators
dropped
C:\Users\user\Desktop\Twain_20.cmd
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\Twain_20.dll:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\windowswimn32.bat
DOS batch file, ASCII text, with CRLF line terminators
modified
C:\Windows\System32\Twain_20.dll:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ADZP 20 Complex.exe
"C:\Users\user\Desktop\ADZP 20 Complex.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\sysnative\cmd" /c "C:\Users\user\AppData\Local\Temp\9B58.tmp\9B59.tmp\9B6A.bat "C:\Users\user\Desktop\ADZP 20 Complex.exe""
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /K Twain_20.cmd
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /K Twain_20.cmd
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\Desktop\Informacion.vbs"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /K Taskdl.bat
malicious
C:\Windows\System32\reg.exe
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
malicious
C:\Windows\System32\reg.exe
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
malicious
C:\Windows\System32\ipconfig.exe
ipconfig /release
malicious
C:\Windows\System32\taskkill.exe
taskkill /im DiskPart /f
malicious
C:\Windows\System32\attrib.exe
attrib -r -a -s -h *.*
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\Desktop\ErrorCritico.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\Desktop\Advertencia.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\Desktop\ErrorCritico.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\Desktop\Advertencia.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\Desktop\ErrorCritico.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\Desktop\Advertencia.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\Desktop\ErrorCritico.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\Desktop\Advertencia.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\Desktop\ErrorCritico.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\Desktop\Advertencia.vbs"
malicious
C:\Users\user\Desktop\ADZP 20 Complex.exe
"C:\Users\user\Desktop\ADZP 20 Complex.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\sysnative\cmd" /c "C:\Users\user\AppData\Local\Temp\B132.tmp\B133.tmp\B134.bat "C:\Users\user\Desktop\ADZP 20 Complex.exe""
malicious
C:\Users\user\Desktop\ADZP 20 Complex.exe
"C:\Users\user\Desktop\ADZP 20 Complex.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\sysnative\cmd" /c "C:\Users\user\AppData\Local\Temp\B539.tmp\B53A.tmp\B53B.bat "C:\Users\user\Desktop\ADZP 20 Complex.exe""
malicious
C:\Users\user\Desktop\ADZP 20 Complex.exe
"C:\Users\user\Desktop\ADZP 20 Complex.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\sysnative\cmd" /c "C:\Users\user\AppData\Local\Temp\BE03.tmp\BE04.tmp\BE05.bat "C:\Users\user\Desktop\ADZP 20 Complex.exe""
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\takeown.exe
takeown /f "C:\Windows\System32" /r
C:\Windows\System32\msg.exe
msg * Virus Detectado
C:\Windows\System32\msg.exe
msg * Virus Detectado
C:\Windows\System32\msg.exe
msg * Has Sido Hackeado!
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\notepad.exe
notepad
C:\Windows\System32\calc.exe
calc
C:\Windows\explorer.exe
explorer.exe
C:\Windows\System32\mspaint.exe
mspaint.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\notepad.exe
notepad
C:\Windows\System32\calc.exe
calc
C:\Windows\explorer.exe
explorer.exe
C:\Windows\System32\mspaint.exe
mspaint.exe
C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe
"C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe" -ServerName:App.AppXsm3pg4n7er43kdh1qp4e79f1j7am68r8.mca
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\notepad.exe
notepad
C:\Windows\System32\calc.exe
calc
C:\Windows\explorer.exe
explorer.exe
There are 40 hidden processes, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWindowsOnlyEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fPasteOriginalEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fReverse
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWrapAround
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fMatchCase
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\explorerframe.dll.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\explorerframe.dll.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\shell32.dll.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\shell32.dll.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
\REGISTRY\A\{400233dc-4811-5b5c-7fa2-cd324b504121}\LocalState
VeryFirstLaunch
\REGISTRY\A\{400233dc-4811-5b5c-7fa2-cd324b504121}\LocalState
Mode
\REGISTRY\A\{400233dc-4811-5b5c-7fa2-cd324b504121}\LocalState
Mode
\REGISTRY\A\{400233dc-4811-5b5c-7fa2-cd324b504121}\LocalState
Mode
\REGISTRY\A\{400233dc-4811-5b5c-7fa2-cd324b504121}\LocalState
Mode
\REGISTRY\A\{400233dc-4811-5b5c-7fa2-cd324b504121}\LocalState
Mode
\REGISTRY\A\{400233dc-4811-5b5c-7fa2-cd324b504121}\LocalState
Mode
\REGISTRY\A\{400233dc-4811-5b5c-7fa2-cd324b504121}\LocalState
Mode
\REGISTRY\A\{400233dc-4811-5b5c-7fa2-cd324b504121}\LocalState
Mode
\REGISTRY\A\{400233dc-4811-5b5c-7fa2-cd324b504121}\LocalState
Mode
\REGISTRY\A\{400233dc-4811-5b5c-7fa2-cd324b504121}\LocalState
Mode
\REGISTRY\A\{400233dc-4811-5b5c-7fa2-cd324b504121}\LocalState
Mode
\REGISTRY\A\{400233dc-4811-5b5c-7fa2-cd324b504121}\LocalState
Mode
\REGISTRY\A\{400233dc-4811-5b5c-7fa2-cd324b504121}\LocalState
Mode
\REGISTRY\A\{400233dc-4811-5b5c-7fa2-cd324b504121}\LocalState
Mode
\REGISTRY\A\{400233dc-4811-5b5c-7fa2-cd324b504121}\LocalState
Mode
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
There are 22 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2300000
heap
page read and write
21D75F8B000
heap
page read and write
12A9000
heap
page read and write
990000
heap
page read and write
136D8880000
heap
page read and write
B394DFF000
stack
page read and write
417000
unkown
page read and write
1F91C234000
heap
page read and write
3E0000
heap
page read and write
260DD0D1000
heap
page read and write
21D7991E000
heap
page read and write
13D0B8E8000
heap
page read and write
1FD94B68000
heap
page read and write
1AA53AA0000
trusted library allocation
page read and write
13DD87F000
stack
page read and write
2B9E000
heap
page read and write
21D6F7BE000
heap
page read and write
21D77766000
heap
page read and write
3679000
heap
page read and write
136D890F000
heap
page read and write
21D7870D000
heap
page read and write
21D5A428000
heap
page read and write
413000
unkown
page readonly
21D77C00000
heap
page read and write
2B09000
heap
page read and write
E0B81FF000
stack
page read and write
2004000
heap
page read and write
1FA8C314000
heap
page read and write
6FF000
stack
page read and write
21D786BC000
heap
page read and write
21D7710A000
heap
page read and write
6CFCD5C000
stack
page read and write
21D6F7B9000
heap
page read and write
1F9185F0000
heap
page read and write
770000
heap
page read and write
260DD39A000
heap
page read and write
21D6F7F0000
heap
page read and write
21D71E02000
heap
page read and write
4ED2F28000
stack
page read and write
34C0000
heap
page read and write
2B11A540000
heap
page read and write
1A318F04000
heap
page read and write
1AA54336000
heap
page read and write
21D5A340000
heap
page read and write
21D77A5E000
heap
page read and write
8C0000
heap
page read and write
21D6F75F000
heap
page read and write
E9CB3FE000
stack
page read and write
560000
heap
page read and write
2500000
heap
page read and write
2007000
heap
page read and write
2004000
heap
page read and write
21D75E2B000
heap
page read and write
21D77C80000
heap
page read and write
21D78678000
heap
page read and write
2316000
heap
page read and write
1EFFCF71000
heap
page read and write
21D77A00000
heap
page read and write
13DD7FD000
stack
page read and write
6B0000
heap
page read and write
275A000
heap
page read and write
1FD94E20000
heap
page read and write
14175FF000
stack
page read and write
96C56DC000
stack
page read and write
21D75EFB000
heap
page read and write
326E000
stack
page read and write
E0B68EE000
stack
page read and write
13D0B780000
heap
page read and write
136D8BA0000
heap
page read and write
1AA51CF0000
heap
page read and write
224C91F8000
heap
page read and write
21D77FE0000
heap
page read and write
E0B4EF8000
stack
page read and write
28BE000
stack
page read and write
21D777FF000
heap
page read and write
E0B65FE000
stack
page read and write
3710000
heap
page read and write
81E000
heap
page read and write
1F919846000
heap
page read and write
1AA541A0000
heap
page read and write
2B11C0A0000
heap
page read and write
16E46B78000
heap
page read and write
21D78851000
heap
page read and write
224C952E000
heap
page read and write
27760FF000
stack
page read and write
E0B6CFF000
stack
page read and write
21D77740000
heap
page read and write
21D7992A000
heap
page read and write
1F9188F0000
heap
page read and write
21D771C8000
heap
page read and write
21D781DB000
heap
page read and write
E0B83FF000
stack
page read and write
9B000
stack
page read and write
260E000
stack
page read and write
21D76A04000
trusted library allocation
page read and write
351A000
heap
page read and write
16A10000
trusted library allocation
page read and write
21D781BB000
heap
page read and write
2800000
heap
page read and write
790000
heap
page read and write
1D14EC2E000
heap
page read and write
413000
unkown
page readonly
224C9450000
heap
page read and write
21D77762000
heap
page read and write
8B663FF000
stack
page read and write
1A3175C0000
heap
page read and write
E65FEB4000
stack
page read and write
E0B5DFC000
stack
page read and write
21D77197000
heap
page read and write
A50077F000
stack
page read and write
21D6F6DC000
heap
page read and write
21D781A1000
heap
page read and write
1AABD604000
heap
page read and write
21D772B6000
heap
page read and write
401000
unkown
page execute read
401000
unkown
page execute read
21D5A260000
heap
page read and write
21D6F7CF000
heap
page read and write
1A317638000
heap
page read and write
260DD350000
heap
page read and write
8B661FE000
stack
page read and write
21D770E5000
heap
page read and write
B394CFD000
stack
page read and write
21D75FCB000
heap
page read and write
173A6FD000
stack
page read and write
1F9185C0000
heap
page read and write
16E46BA9000
heap
page read and write
21D774B2000
heap
page read and write
87E88FD000
stack
page read and write
21D75EFE000
heap
page read and write
21D71F95000
heap
page read and write
13DD4FE000
stack
page read and write
9B000
stack
page read and write
21D772F9000
heap
page read and write
174C9FF6000
heap
page read and write
417000
unkown
page write copy
2AF2000
heap
page read and write
21D77200000
heap
page read and write
35BA000
heap
page read and write
21D78FF3000
heap
page read and write
1AA56810000
trusted library allocation
page read and write
224C9201000
heap
page read and write
21D7B8F3000
heap
page read and write
21D77513000
heap
page read and write
21D5A459000
heap
page read and write
E0B52FE000
stack
page read and write
EBFDC7F000
stack
page read and write
2801000
heap
page read and write
224C9480000
heap
page read and write
21D71F4A000
heap
page read and write
21D771C4000
heap
page read and write
1A317684000
heap
page read and write
5A0000
heap
page read and write
21D781E9000
heap
page read and write
21D777B0000
heap
page read and write
21D78199000
heap
page read and write
21D77362000
heap
page read and write
21D7769A000
heap
page read and write
1F60DB10000
heap
page read and write
12A0000
heap
page read and write
21D71F44000
heap
page read and write
22F0000
heap
page read and write
E6603FE000
stack
page read and write
21D77138000
heap
page read and write
21D78146000
heap
page read and write
1169DD00000
heap
page read and write
2775EFE000
stack
page read and write
21D78023000
heap
page read and write
2510000
heap
page read and write
E0B72FF000
stack
page read and write
21D77117000
heap
page read and write
7DB000
heap
page read and write
1EFFCF97000
heap
page read and write
21D77213000
heap
page read and write
18014A14000
heap
page read and write
500000
heap
page read and write
21D71560000
trusted library allocation
page read and write
21D71FF4000
heap
page read and write
21D777FB000
heap
page read and write
21D77D80000
heap
page read and write
1FA8C2F8000
heap
page read and write
27761FF000
stack
page read and write
21D781AA000
heap
page read and write
21D788E6000
heap
page read and write
1AA51BD0000
heap
page read and write
22C9F270000
heap
page read and write
21D7779B000
heap
page read and write
21D7B8E6000
heap
page read and write
21D77BD8000
heap
page read and write
21D6F710000
heap
page read and write
6CFCDDF000
stack
page read and write
E39E0FF000
stack
page read and write
21D76640000
trusted library allocation
page read and write
1AABD640000
heap
page read and write
21D77A49000
heap
page read and write
1AABD600000
heap
page read and write
21D781C3000
heap
page read and write
1EFFCF68000
heap
page read and write
21D769F0000
heap
page read and write
21D7C644000
heap
page read and write
1AABD65E000
heap
page read and write
2526000
heap
page read and write
21D7774D000
heap
page read and write
21D785E0000
trusted library allocation
page read and write
417000
unkown
page read and write
7FA000
heap
page read and write
294E000
heap
page read and write
1FA8C240000
heap
page read and write
400000
unkown
page readonly
1169F694000
heap
page read and write
273F000
stack
page read and write
21D6F6FA000
heap
page read and write
480000
heap
page read and write
21D77758000
heap
page read and write
87E8CFE000
stack
page read and write
294B000
heap
page read and write
1F60F444000
heap
page read and write
E0B6DFF000
stack
page read and write
1FA8C4D0000
heap
page read and write
9D5C7D000
stack
page read and write
174C9EA0000
heap
page read and write
234C000
heap
page read and write
21D6F7DE000
heap
page read and write
237FD1EF000
heap
page read and write
21D78840000
heap
page read and write
401000
unkown
page execute read
2B11A520000
heap
page read and write
1D150664000
heap
page read and write
21D78127000
heap
page read and write
400000
unkown
page readonly
21D774BF000
heap
page read and write
21D78724000
heap
page read and write
21D77D3D000
heap
page read and write
1F916AE8000
heap
page read and write
21D77183000
heap
page read and write
67B687F000
stack
page read and write
2B0B000
heap
page read and write
2A4A000
heap
page read and write
21D777D5000
heap
page read and write
16A30000
trusted library allocation
page read and write
224C9262000
heap
page read and write
E0B61FE000
stack
page read and write
21D5C5B0000
heap
page read and write
21D7746F000
heap
page read and write
2950000
heap
page read and write
370E000
heap
page read and write
16E48DA0000
heap
page read and write
590000
heap
page read and write
1AA51D90000
trusted library allocation
page read and write
237FD1F3000
heap
page read and write
430000
heap
page read and write
21D7869A000
heap
page read and write
21D71D70000
heap
page read and write
260DD0C0000
heap
page read and write
1F916AC0000
heap
page read and write
21D6F67B000
heap
page read and write
E0B84FF000
stack
page read and write
413000
unkown
page readonly
13D0B916000
heap
page read and write
21D774BA000
heap
page read and write
E0B86FF000
stack
page read and write
1169DB38000
heap
page read and write
28AE000
heap
page read and write
1F919110000
heap
page read and write
174CBA24000
heap
page read and write
21D77141000
heap
page read and write
2000000
heap
page read and write
419000
unkown
page readonly
E0B71EE000
stack
page read and write
21D6F779000
heap
page read and write
20F8FD90000
heap
page read and write
21D76934000
heap
page read and write
E0B77FF000
stack
page read and write
251C000
heap
page read and write
136D88FE000
heap
page read and write
22C9F426000
heap
page read and write
21D770BC000
heap
page read and write
21D5BEB0000
heap
page read and write
21D776F5000
heap
page read and write
3719000
heap
page read and write
136D8923000
heap
page read and write
21D77DCC000
heap
page read and write
21D77313000
heap
page read and write
1FA8C4D4000
heap
page read and write
2B11A594000
heap
page read and write
21D71570000
trusted library allocation
page read and write
2332000
heap
page read and write
1F919829000
heap
page read and write
16E485B4000
heap
page read and write
798000
heap
page read and write
21D774FC000
heap
page read and write
136D8907000
heap
page read and write
28A2000
heap
page read and write
21D5BEB4000
heap
page read and write
8B660FD000
stack
page read and write
21D77CCF000
heap
page read and write
19C7C340000
heap
page read and write
21D76813000
heap
page read and write
419000
unkown
page readonly
E6602FE000
stack
page read and write
1AA53950000
heap
page read and write
1AA51BF8000
heap
page read and write
13D0B8F1000
heap
page read and write
1873CC40000
heap
page read and write
2007000
heap
page read and write
34C1000
heap
page read and write
16E46A30000
heap
page read and write
1280000
heap
page read and write
E271E7E000
stack
page read and write
413000
unkown
page readonly
854000
heap
page read and write
E0B89FF000
stack
page read and write
11A90000
trusted library allocation
page read and write
1F916ACB000
heap
page read and write
E39E1FF000
stack
page read and write
22F2000
heap
page read and write
22CA0D80000
heap
page read and write
E9CB4FF000
stack
page read and write
2A50000
heap
page read and write
21D77B74000
heap
page read and write
21D77488000
heap
page read and write
21D71F8E000
heap
page read and write
21D78882000
heap
page read and write
260DD0F6000
heap
page read and write
21D773B1000
heap
page read and write
E0B5FFA000
stack
page read and write
21D78635000
heap
page read and write
21D76968000
heap
page read and write
260DCFE0000
heap
page read and write
21D76857000
heap
page read and write
401000
unkown
page execute read
BFD52FD000
stack
page read and write
28C5000
heap
page read and write
21D71F3C000
heap
page read and write
21D5A420000
heap
page read and write
237FD1B1000
heap
page read and write
237FD1A0000
heap
page read and write
22C9F3F8000
heap
page read and write
1F916E80000
heap
page read and write
21D71F5D000
heap
page read and write
21D76821000
heap
page read and write
E0B5EFC000
stack
page read and write
21D6F69A000
heap
page read and write
174CA28E000
heap
page read and write
224C9242000
heap
page read and write
1D150660000
heap
page read and write
1F918600000
trusted library allocation
page read and write
417000
unkown
page write copy
21D77C5B000
heap
page read and write
21D6F6C4000
heap
page read and write
21D77AB7000
heap
page read and write
3685000
heap
page read and write
224C9252000
heap
page read and write
21D77B4F000
heap
page read and write
13DD77D000
stack
page read and write
13D0B8E0000
heap
page read and write
237FD140000
heap
page read and write
1EFFCFD3000
heap
page read and write
2FFB000
stack
page read and write
21D6F7AB000
heap
page read and write
21D79916000
heap
page read and write
E0B78FE000
stack
page read and write
BFD56FF000
stack
page read and write
21D78034000
heap
page read and write
400000
unkown
page readonly
400000
unkown
page readonly
4B7357E000
stack
page read and write
22CA0E24000
heap
page read and write
21D78713000
heap
page read and write
21D7B8F5000
heap
page read and write
E0B60EE000
stack
page read and write
1F60DAE0000
heap
page read and write
E0B67FA000
stack
page read and write
174CBA20000
heap
page read and write
21D5BE50000
heap
page read and write
E0B7EEE000
stack
page read and write
98F000
stack
page read and write
E0B6EEE000
stack
page read and write
4ED37FE000
stack
page read and write
21D76923000
heap
page read and write
417000
unkown
page write copy
21D775A7000
heap
page read and write
21D7779F000
heap
page read and write
A755CFF000
stack
page read and write
21D77CBE000
heap
page read and write
21D77133000
heap
page read and write
21A0000
heap
page read and write
21D770F7000
heap
page read and write
2B11A7FE000
heap
page read and write
21D77B13000
heap
page read and write
A5007FD000
stack
page read and write
588FDFD000
stack
page read and write
21D77B70000
heap
page read and write
14173FE000
stack
page read and write
21D77623000
heap
page read and write
21D7729E000
heap
page read and write
136D8903000
heap
page read and write
21D7690B000
heap
page read and write
E66047E000
stack
page read and write
21D7742E000
heap
page read and write
21D777E6000
heap
page read and write
21D71F78000
heap
page read and write
1F919770000
heap
page read and write
12EE000
heap
page read and write
21D78793000
heap
page read and write
21D77724000
heap
page read and write
21D78550000
trusted library allocation
page read and write
4AC000
heap
page read and write
E66037E000
stack
page read and write
174C9FB1000
heap
page read and write
BFD53FE000
stack
page read and write
19C7C790000
heap
page read and write
67B65FD000
stack
page read and write
588FAF8000
stack
page read and write
21D7717E000
heap
page read and write
21D776D4000
heap
page read and write
22CA0E2C000
heap
page read and write
21D7714C000
heap
page read and write
21D76F20000
trusted library allocation
page read and write
A755889000
stack
page read and write
21D71F38000
heap
page read and write
E0B75EF000
stack
page read and write
21D78700000
heap
page read and write
1EFFCE50000
heap
page read and write
2701000
heap
page read and write
21D77151000
heap
page read and write
1AA537B0000
heap
page read and write
20F8FDB0000
heap
page read and write
136D88B8000
heap
page read and write
2BA0000
heap
page read and write
1993B465000
heap
page read and write
1AA51D80000
heap
page read and write
260DD115000
heap
page read and write
341E000
stack
page read and write
136D88B0000
heap
page read and write
21D7B88F000
heap
page read and write
488000
heap
page read and write
19C7C3D8000
heap
page read and write
1FA8C31C000
heap
page read and write
254C000
heap
page read and write
E0B4AEE000
stack
page read and write
1F91C1E0000
heap
page read and write
4B7367E000
stack
page read and write
13D0BAFE000
heap
page read and write
6CFD07F000
stack
page read and write
21D6F7CC000
heap
page read and write
E2719DC000
stack
page read and write
21D75E9F000
heap
page read and write
67C000
stack
page read and write
21D781CC000
heap
page read and write
173A178000
stack
page read and write
21D777B9000
heap
page read and write
11A80000
trusted library allocation
page read and write
EBFD7E9000
stack
page read and write
11A80000
trusted library allocation
page read and write
21D771E2000
heap
page read and write
21D6F7E3000
heap
page read and write
1993B421000
heap
page read and write
1EFFCF60000
heap
page read and write
21D77FD0000
trusted library allocation
page read and write
2BA9000
heap
page read and write
1F91981A000
heap
page read and write
174CA0A0000
heap
page read and write
1FD94B60000
heap
page read and write
E271DFB000
stack
page read and write
21D7802A000
heap
page read and write
21D75EA1000
heap
page read and write
21D7712B000
heap
page read and write
B394FFE000
stack
page read and write
21D771F5000
heap
page read and write
21D71FE5000
heap
page read and write
13D0B936000
heap
page read and write
260DD394000
heap
page read and write
1AA51E04000
heap
page read and write
13D0BA80000
heap
page read and write
21D77B6A000
heap
page read and write
237FD215000
heap
page read and write
13DD47C000
stack
page read and write
2B11A7F4000
heap
page read and write
21D71F91000
heap
page read and write
21D5BE53000
heap
page read and write
1993B418000
heap
page read and write
21D7743A000
heap
page read and write
21D6F580000
heap
page read and write
21D77AD9000
heap
page read and write
21D7991E000
heap
page read and write
E271C7F000
stack
page read and write
21D6F6CB000
heap
page read and write
1F919849000
heap
page read and write
224C91F0000
heap
page read and write
21D7715A000
heap
page read and write
21D7B88F000
heap
page read and write
401000
unkown
page execute read
21D5DE60000
trusted library allocation
page read and write
174C9FA0000
heap
page read and write
260DD000000
heap
page read and write
1AA51CB6000
heap
page read and write
400000
unkown
page readonly
174CA280000
heap
page read and write
2B11A730000
heap
page read and write
21D7B179000
heap
page read and write
7DE000
heap
page read and write
2B15000
heap
page read and write
21D77157000
heap
page read and write
1A317692000
heap
page read and write
16B4000
heap
page read and write
35F2000
heap
page read and write
A5002AC000
stack
page read and write
136D87A0000
heap
page read and write
21D78624000
heap
page read and write
21D71F48000
heap
page read and write
19C7C794000
heap
page read and write
21D7681E000
heap
page read and write
1A317641000
heap
page read and write
21D71F30000
heap
page read and write
2400000
heap
page read and write
21D77BE9000
heap
page read and write
400000
unkown
page readonly
21D6F7F5000
heap
page read and write
127D000
stack
page read and write
21D78749000
heap
page read and write
21D78151000
heap
page read and write
21D7992C000
heap
page read and write
1AA542B0000
heap
page read and write
251D000
heap
page read and write
1993B446000
heap
page read and write
21D77DB3000
heap
page read and write
1993B3B0000
heap
page read and write
400000
unkown
page readonly
5E0000
heap
page read and write
13D0B880000
heap
page read and write
E9CB0FD000
stack
page read and write
1AABD560000
heap
page read and write
21D77124000
heap
page read and write
2130000
heap
page read and write
21D7889F000
heap
page read and write
2200000
heap
page read and write
260DEB84000
heap
page read and write
21D76A22000
trusted library allocation
page read and write
2352000
heap
page read and write
6B8000
heap
page read and write
1F919260000
heap
page read and write
1AA51AE0000
heap
page read and write
1F918910000
heap
page read and write
1F919790000
heap
page read and write
224C9246000
heap
page read and write
21D78800000
heap
page read and write
1993B77E000
heap
page read and write
237FEB60000
heap
page read and write
1F60F440000
heap
page read and write
21D75E64000
heap
page read and write
180147A0000
heap
page read and write
1A317665000
heap
page read and write
21D77A81000
heap
page read and write
21D7777D000
heap
page read and write
1A3175D0000
heap
page read and write
21D7770A000
heap
page read and write
1416DF8000
stack
page read and write
21D787D9000
heap
page read and write
9B000
stack
page read and write
21D77717000
heap
page read and write
1A319360000
heap
page read and write
21D77756000
heap
page read and write
21D77142000
heap
page read and write
224C9454000
heap
page read and write
21D5A45A000
heap
page read and write
22C9F446000
heap
page read and write
1AABD649000
heap
page read and write
1F60F7E0000
heap
page read and write
237FD1A8000
heap
page read and write
27BF000
stack
page read and write
1A3175CE000
heap
page read and write
1AA539A7000
heap
page read and write
258E000
stack
page read and write
1EFFD240000
heap
page read and write
610000
heap
page read and write
420000
heap
page read and write
27FA000
heap
page read and write
1FA8C140000
heap
page read and write
1AA54340000
heap
page read and write
419000
unkown
page readonly
21D77791000
heap
page read and write
21D77155000
heap
page read and write
1D14EBA0000
heap
page read and write
21D6F789000
heap
page read and write
1EFFD24A000
heap
page read and write
1A31767C000
heap
page read and write
E0B62FE000
stack
page read and write
21D78129000
heap
page read and write
A5006FB000
stack
page read and write
16E46BA9000
heap
page read and write
2A4A000
heap
page read and write
EBFDBFF000
stack
page read and write
A5003AE000
stack
page read and write
1D14EAC0000
heap
page read and write
21D77736000
heap
page read and write
21D77600000
heap
page read and write
1D14EBC8000
heap
page read and write
1993CEE4000
heap
page read and write
21D781B2000
heap
page read and write
1993B3D0000
heap
page read and write
21D77CE2000
heap
page read and write
21D777C4000
heap
page read and write
4ED35FF000
stack
page read and write
E0B57FE000
stack
page read and write
E0B6BEE000
stack
page read and write
1FA8C400000
heap
page read and write
1873C890000
heap
page read and write
21D6F7B5000
heap
page read and write
19C7C330000
heap
page read and write
1993B770000
heap
page read and write
21D76938000
heap
page read and write
1AA51CD0000
heap
page read and write
21D79900000
heap
page read and write
21D770EE000
heap
page read and write
21D78560000
heap
page read and write
2951000
heap
page read and write
1EFFD060000
heap
page read and write
21D76900000
heap
page read and write
21D77D6F000
heap
page read and write
21D7710E000
heap
page read and write
21D79922000
heap
page read and write
419000
unkown
page readonly
21D71F46000
heap
page read and write
499000
heap
page read and write
470000
heap
page read and write
21D7811A000
heap
page read and write
A755D7E000
stack
page read and write
180147C0000
heap
page read and write
401000
unkown
page execute read
2A4D000
heap
page read and write
2D48000
stack
page read and write
417000
unkown
page write copy
21D75C70000
trusted library allocation
page read and write
1EFFE9C0000
heap
page read and write
21D7778A000
heap
page read and write
21D7992C000
heap
page read and write
21D5A380000
heap
page read and write
E9CB1FE000
stack
page read and write
1F918A50000
trusted library allocation
page read and write
2AE4000
heap
page read and write
19D000
stack
page read and write
1EFFCFB3000
heap
page read and write
3654000
heap
page read and write
21D769B4000
heap
page read and write
1A3175A0000
heap
page read and write
21D77AB5000
heap
page read and write
21D78137000
heap
page read and write
1993B466000
heap
page read and write
E0B47CB000
stack
page read and write
21D75EAC000
heap
page read and write
16E484E0000
trusted library allocation
page read and write
21D7763E000
heap
page read and write
22C9F390000
heap
page read and write
2959000
heap
page read and write
1FA8C2C8000
heap
page read and write
20F8FF84000
heap
page read and write
8B65B78000
stack
page read and write
21D77A13000
heap
page read and write
1FA8C317000
heap
page read and write
E271F7D000
stack
page read and write
19C7C3D0000
heap
page read and write
35C1000
heap
page read and write
1A318F00000
heap
page read and write
20A0000
heap
page read and write
21D7772C000
heap
page read and write
21D6F68F000
heap
page read and write
21D79922000
heap
page read and write
21D6F735000
heap
page read and write
E0B63FA000
stack
page read and write
E271FFE000
stack
page read and write
E271D7F000
stack
page read and write
22CA0D10000
trusted library allocation
page read and write
16E46B70000
heap
page read and write
11A80000
trusted library allocation
page read and write
13DD5FF000
stack
page read and write
BFD55FF000
stack
page read and write
13D0BA40000
heap
page read and write
419000
unkown
page readonly
A755C7E000
stack
page read and write
173A7FE000
stack
page read and write
A500676000
stack
page read and write
174C9FF5000
heap
page read and write
3D0000
heap
page read and write
366C000
heap
page read and write
660000
heap
page read and write
2207000
heap
page read and write
21D78657000
heap
page read and write
21D6F724000
heap
page read and write
21D785A0000
trusted library allocation
page read and write
16E48500000
heap
page read and write
1EFFCFB7000
heap
page read and write
540000
heap
page read and write
20A0000
heap
page read and write
21D71F7E000
heap
page read and write
21D77BB7000
heap
page read and write
21D6F643000
heap
page read and write
1169DB10000
heap
page read and write
21D79926000
heap
page read and write
1EFFCFB6000
heap
page read and write
180146C0000
heap
page read and write
E0B64EF000
stack
page read and write
21D780B3000
heap
page read and write
237FD144000
heap
page read and write
13DD8FF000
stack
page read and write
2894000
heap
page read and write
370B000
heap
page read and write
21D771D5000
heap
page read and write
854000
heap
page read and write
21D779D0000
trusted library allocation
page read and write
E39DEFE000
stack
page read and write
27FA000
heap
page read and write
3662000
heap
page read and write
35BD000
heap
page read and write
2B11A7F0000
heap
page read and write
830000
heap
page read and write
21D771ED000
heap
page read and write
21D77C6F000
heap
page read and write
47F000
stack
page read and write
21D777D9000
heap
page read and write
21D775FB000
heap
page read and write
24E0000
heap
page read and write
1FA8C2C0000
heap
page read and write
174CBA00000
heap
page read and write
21D77AB7000
heap
page read and write
1FD94A80000
heap
page read and write
2556000
heap
page read and write
2350000
heap
page read and write
22C9F42E000
heap
page read and write
234D000
heap
page read and write
19D000
stack
page read and write
4BEBC7C000
stack
page read and write
237FD14E000
heap
page read and write
E9CAB78000
stack
page read and write
401000
unkown
page execute read
21D775B8000
heap
page read and write
1AA51D60000
trusted library allocation
page read and write
E0B6FFF000
stack
page read and write
1AA51CAD000
heap
page read and write
21D78000000
heap
page read and write
21D771C0000
heap
page read and write
174C9FD6000
heap
page read and write
21D77797000
heap
page read and write
21D77CA1000
heap
page read and write
21D76863000
heap
page read and write
E0B5BFC000
stack
page read and write
21D7807E000
heap
page read and write
21D7711B000
heap
page read and write
21D77700000
heap
page read and write
1F916A90000
heap
page read and write
16E46B50000
heap
page read and write
21D77AC8000
heap
page read and write
1F60DBD5000
heap
page read and write
1AA54332000
heap
page read and write
21D78655000
heap
page read and write
E0B88EE000
stack
page read and write
21D77734000
heap
page read and write
136D8915000
heap
page read and write
20A4000
heap
page read and write
420000
heap
page read and write
21D7773C000
heap
page read and write
230D000
heap
page read and write
13D0BAF0000
heap
page read and write
21D71F5A000
heap
page read and write
81E000
heap
page read and write
2B11A5B1000
heap
page read and write
A3F6074000
stack
page read and write
1993B774000
heap
page read and write
21D77A11000
heap
page read and write
21D78823000
heap
page read and write
1993E9B0000
heap
page read and write
E0B7DFF000
stack
page read and write
E271CF6000
stack
page read and write
21D767F0000
heap
page read and write
419000
unkown
page readonly
21D7802C000
heap
page read and write
700000
heap
page read and write
1FD94E24000
heap
page read and write
413000
unkown
page readonly
21D78148000
heap
page read and write
21D7714D000
heap
page read and write
1FA8C30F000
heap
page read and write
2832000
heap
page read and write
237FD000000
heap
page read and write
21D77153000
heap
page read and write
E0B80FE000
stack
page read and write
16E4A650000
trusted library allocation
page read and write
2B11A58B000
heap
page read and write
2AFC000
heap
page read and write
136DA3A4000
heap
page read and write
1169DBB3000
heap
page read and write
1AA54190000
heap
page read and write
22CA1610000
heap
page read and write
14176FF000
stack
page read and write
20F8FDD8000
heap
page read and write
857000
heap
page read and write
18014830000
heap
page read and write
E0B7FFF000
stack
page read and write
21D774A1000
heap
page read and write
570000
heap
page read and write
1F916B9F000
heap
page read and write
E0B53FC000
stack
page read and write
21D77113000
heap
page read and write
224C9245000
heap
page read and write
1F9185C3000
heap
page read and write
1F9185D0000
trusted library allocation
page read and write
413000
unkown
page readonly
E271EFD000
stack
page read and write
22C9F429000
heap
page read and write
1FA8C2D1000
heap
page read and write
16E46BA6000
heap
page read and write
21D5A459000
heap
page read and write
21D77A8A000
heap
page read and write
438000
heap
page read and write
21D771FA000
heap
page read and write
58901FF000
stack
page read and write
224C91C0000
heap
page read and write
2340000
heap
page read and write
13DD67B000
stack
page read and write
21D7754A000
heap
page read and write
21D787B4000
heap
page read and write
16E46BAA000
heap
page read and write
18014838000
heap
page read and write
21D77D56000
heap
page read and write
13D0B942000
heap
page read and write
21D77133000
heap
page read and write
4BEBCFF000
stack
page read and write
E0B85EF000
stack
page read and write
1B2857F000
stack
page read and write
21D781AE000
heap
page read and write
16E484B0000
heap
page read and write
21D77CF3000
heap
page read and write
22CA0D83000
heap
page read and write
7F7000
heap
page read and write
A50087D000
stack
page read and write
13D0B952000
heap
page read and write
1169F690000
heap
page read and write
237FD1D6000
heap
page read and write
29AA000
heap
page read and write
2A82000
heap
page read and write
21D7A06B000
heap
page read and write
21D6F784000
heap
page read and write
750000
heap
page read and write
28BB000
heap
page read and write
E0B55FC000
stack
page read and write
2402000
heap
page read and write
9D5CFF000
stack
page read and write
21D7B8F3000
heap
page read and write
588FEFF000
stack
page read and write
21D6F7E0000
heap
page read and write
9B000
stack
page read and write
14EF000
stack
page read and write
1B284FF000
stack
page read and write
1873C990000
heap
page read and write
58902FE000
stack
page read and write
850000
heap
page read and write
20F8FCB0000
heap
page read and write
21D6F709000
heap
page read and write
E0B54FF000
stack
page read and write
E0B58FE000
stack
page read and write
1993B410000
heap
page read and write
2330000
heap
page read and write
21D6F62B000
heap
page read and write
21D77AF2000
heap
page read and write
174C9FF5000
heap
page read and write
E0B79FF000
stack
page read and write
4ED34FD000
stack
page read and write
136D8BAA000
heap
page read and write
21D77133000
heap
page read and write
20A4000
heap
page read and write
136D88C1000
heap
page read and write
1A3174C0000
heap
page read and write
21D77A38000
heap
page read and write
21D6F693000
heap
page read and write
20A7000
heap
page read and write
21D77706000
heap
page read and write
1D150470000
heap
page read and write
224C9524000
heap
page read and write
174C9F80000
heap
page read and write
21D771B7000
heap
page read and write
20F8FF80000
heap
page read and write
27FD000
heap
page read and write
224C93C0000
heap
page read and write
1FA8C334000
heap
page read and write
4DD000
heap
page read and write
21D76802000
heap
page read and write
E0B56F9000
stack
page read and write
21D780F2000
heap
page read and write
2204000
heap
page read and write
E0B4DFE000
stack
page read and write
237FEBA0000
heap
page read and write
136DA3A0000
heap
page read and write
1AA57B00000
heap
page read and write
21D7813D000
heap
page read and write
21C8000
stack
page read and write
1993B482000
heap
page read and write
1D150B90000
heap
page read and write
13D0B92D000
heap
page read and write
21D76EF0000
trusted library allocation
page read and write
96C5A7F000
stack
page read and write
21D77B3C000
heap
page read and write
4ED38FF000
stack
page read and write
B3947A8000
stack
page read and write
21D6F772000
heap
page read and write
1F91981A000
heap
page read and write
419000
unkown
page readonly
2775DFD000
stack
page read and write
21D7A06B000
heap
page read and write
2356000
heap
page read and write
21E0000
heap
page read and write
1993B462000
heap
page read and write
13D0B860000
heap
page read and write
19C7C360000
heap
page read and write
1AA51E00000
heap
page read and write
21D75FC9000
heap
page read and write
1F9197F2000
heap
page read and write
1F916C90000
heap
page read and write
1F0000
heap
page read and write
1B2847C000
stack
page read and write
21D788BC000
heap
page read and write
21D71FD1000
heap
page read and write
21D7712D000
heap
page read and write
21D78045000
heap
page read and write
21D78602000
heap
page read and write
260DEB80000
heap
page read and write
21D6F7A2000
heap
page read and write
21D7B8F5000
heap
page read and write
A3F62FE000
stack
page read and write
21D5BD00000
trusted library allocation
page read and write
260DCF00000
heap
page read and write
131E000
heap
page read and write
21D6F7EC000
heap
page read and write
22CA0E20000
heap
page read and write
87E8379000
stack
page read and write
21D77AA2000
heap
page read and write
21D78B02000
heap
page read and write
1EFFE9C4000
heap
page read and write
21D769BF000
heap
page read and write
21D6F780000
heap
page read and write
490000
heap
page read and write
21D77000000
heap
page read and write
21D781BF000
heap
page read and write
1F919852000
heap
page read and write
224C9520000
heap
page read and write
1AA539F4000
heap
page read and write
21D770E2000
heap
page read and write
21D778B0000
heap
page read and write
260DD10B000
heap
page read and write
1AA51CB2000
heap
page read and write
21D78170000
heap
page read and write
11A60000
trusted library allocation
page read and write
20F8FDD0000
heap
page read and write
1F91C3E0000
trusted library allocation
page read and write
E0B7AFD000
stack
page read and write
21D78440000
trusted library allocation
page read and write
224C9226000
heap
page read and write
1993B3A0000
heap
page read and write
13D0B935000
heap
page read and write
21D78112000
heap
page read and write
28B9000
heap
page read and write
21D7778E000
heap
page read and write
21D77400000
heap
page read and write
136D8BA4000
heap
page read and write
1EFFF210000
heap
page read and write
21D6F7E8000
heap
page read and write
E0B4BFD000
stack
page read and write
A3F63FE000
stack
page read and write
173A9FE000
stack
page read and write
173AAFF000
stack
page read and write
28AC000
heap
page read and write
1FD94A60000
heap
page read and write
21D6F713000
heap
page read and write
21D7741D000
heap
page read and write
E39DAF8000
stack
page read and write
1F919817000
heap
page read and write
27FD000
heap
page read and write
16E46BA0000
heap
page read and write
21D77A79000
heap
page read and write
1A3175C4000
heap
page read and write
237FD1F7000
heap
page read and write
96C575E000
stack
page read and write
21D6F748000
heap
page read and write
21D7991A000
heap
page read and write
21D774C7000
heap
page read and write
1AA57D00000
trusted library allocation
page read and write
21D6F560000
heap
page read and write
A50032F000
stack
page read and write
E0B82EF000
stack
page read and write
2775AF8000
stack
page read and write
174CA284000
heap
page read and write
22D0000
heap
page read and write
174C9FA8000
heap
page read and write
E0B4FEF000
stack
page read and write
E0B73FE000
stack
page read and write
21D771D9000
heap
page read and write
21D7812F000
heap
page read and write
260DD390000
heap
page read and write
1993CEE0000
heap
page read and write
22C9F42D000
heap
page read and write
21D77745000
heap
page read and write
136D88D6000
heap
page read and write
770000
heap
page read and write
87E89FF000
stack
page read and write
2700000
heap
page read and write
136D892B000
heap
page read and write
21D77417000
heap
page read and write
1169F650000
heap
page read and write
21D77D91000
heap
page read and write
21D7D584000
heap
page read and write
E0B5CFC000
stack
page read and write
237FD0E0000
heap
page read and write
E0B51FE000
stack
page read and write
E0B8AFF000
stack
page read and write
367B000
heap
page read and write
1AA54351000
heap
page read and write
2300000
heap
page read and write
1A3176A1000
heap
page read and write
21D77152000
heap
page read and write
2B11A575000
heap
page read and write
413000
unkown
page readonly
1F916AA0000
heap
page read and write
2204000
heap
page read and write
BFD4D98000
stack
page read and write
22C9F3F0000
heap
page read and write
87E8BFF000
stack
page read and write
21D75E00000
heap
page read and write
21D75DE0000
heap
page read and write
7B3000
heap
page read and write
21D772D3000
heap
page read and write
21D77149000
heap
page read and write
21D7775E000
heap
page read and write
1F60DB58000
heap
page read and write
E0B70FF000
stack
page read and write
1993B45D000
heap
page read and write
16E485B0000
heap
page read and write
21D785F0000
heap
page read and write
E0B66FF000
stack
page read and write
1AA5434F000
heap
page read and write
21D77BCC000
heap
page read and write
21D6F600000
heap
page read and write
174C9FEC000
heap
page read and write
21D76938000
heap
page read and write
21D78689000
heap
page read and write
16A40000
trusted library allocation
page read and write
7A4000
heap
page read and write
1FA8C317000
heap
page read and write
2207000
heap
page read and write
419000
unkown
page readonly
21D786AB000
heap
page read and write
A3F637E000
stack
page read and write
260DD115000
heap
page read and write
260DD132000
heap
page read and write
1D14EC43000
heap
page read and write
1AA537B3000
heap
page read and write
22C9F420000
heap
page read and write
16A30000
trusted library allocation
page read and write
1F919774000
heap
page read and write
21D77106000
heap
page read and write
417000
unkown
page read and write
224C91B0000
heap
page read and write
35C0000
heap
page read and write
21D78613000
heap
page read and write
E0B5AFC000
stack
page read and write
E0B4CF9000
stack
page read and write
1EFFCFB6000
heap
page read and write
420000
heap
page read and write
21D6F550000
heap
page read and write
1EFFD244000
heap
page read and write
413000
unkown
page readonly
21D777E2000
heap
page read and write
21D75F8E000
heap
page read and write
21D777EA000
heap
page read and write
21D5A456000
heap
page read and write
E0B69FF000
stack
page read and write
1F919827000
heap
page read and write
21D71F2C000
heap
page read and write
4B735FE000
stack
page read and write
420000
heap
page read and write
FC0000
heap
page read and write
2B11A548000
heap
page read and write
18014A10000
heap
page read and write
1A317630000
heap
page read and write
21D77149000
heap
page read and write
FD0000
heap
page read and write
7F9000
heap
page read and write
21D78163000
heap
page read and write
21D77D00000
heap
page read and write
21D7B8E6000
heap
page read and write
22CA2EC0000
trusted library allocation
page read and write
857000
heap
page read and write
1FA8C31B000
heap
page read and write
21D7712D000
heap
page read and write
14172FD000
stack
page read and write
5F0000
heap
page read and write
2B9B000
heap
page read and write
21D71F60000
heap
page read and write
1F60DA00000
heap
page read and write
1873CA90000
heap
page read and write
1873C898000
heap
page read and write
1169DB30000
heap
page read and write
21D77121000
heap
page read and write
A3F627E000
stack
page read and write
21D77786000
heap
page read and write
21D7CDBC000
heap
page read and write
35BD000
heap
page read and write
21D77BA6000
heap
page read and write
1EFFCFAE000
heap
page read and write
268E000
stack
page read and write
254D000
heap
page read and write
417000
unkown
page read and write
7A0000
heap
page read and write
E0B7CFE000
stack
page read and write
19D000
stack
page read and write
22C9F460000
heap
page read and write
16E485BC000
heap
page read and write
21D777F3000
heap
page read and write
21D77368000
heap
page read and write
1F918947000
heap
page read and write
1AA542A0000
heap
page read and write
21D772E4000
heap
page read and write
400000
unkown
page readonly
1EFFCF30000
heap
page read and write
16B0000
heap
page read and write
2A4D000
heap
page read and write
21D7819D000
heap
page read and write
22C9F429000
heap
page read and write
F7C000
stack
page read and write
21D7992A000
heap
page read and write
21D78FF3000
heap
page read and write
21D6F7B1000
heap
page read and write
21D78190000
heap
page read and write
E0B6AFF000
stack
page read and write
21D7714A000
heap
page read and write
21D7810A000
heap
page read and write
401000
unkown
page execute read
21D7C682000
heap
page read and write
A3F61FB000
stack
page read and write
224C9245000
heap
page read and write
21D777AC000
heap
page read and write
35BA000
heap
page read and write
21D7811E000
heap
page read and write
21D77620000
heap
page read and write
21D7765B000
heap
page read and write
21D71F13000
heap
page read and write
800000
heap
page read and write
21D7CDBC000
heap
page read and write
260DD112000
heap
page read and write
21D6F79E000
heap
page read and write
E0B74EE000
stack
page read and write
21D776C3000
heap
page read and write
E0B76FF000
stack
page read and write
1873CA70000
heap
page read and write
21D788D5000
heap
page read and write
590000
heap
page read and write
2AFE000
heap
page read and write
2B11C0A4000
heap
page read and write
1873CC44000
heap
page read and write
21D6F613000
heap
page read and write
21D7717C000
heap
page read and write
EBFDB7D000
stack
page read and write
21D7991A000
heap
page read and write
260DD124000
heap
page read and write
16E46B10000
heap
page read and write
21D78776000
heap
page read and write
21D7771F000
heap
page read and write
230C000
heap
page read and write
21D78450000
trusted library allocation
page read and write
336F000
stack
page read and write
283F000
stack
page read and write
21D77488000
heap
page read and write
E66027C000
stack
page read and write
21D769B4000
heap
page read and write
67B68FF000
stack
page read and write
21D78159000
heap
page read and write
1FA8C490000
heap
page read and write
136D88E8000
heap
page read and write
21D76800000
heap
page read and write
21D77A20000
heap
page read and write
1AA53970000
heap
page read and write
1F60DB50000
heap
page read and write
22CA0D30000
heap
page read and write
E39DDFD000
stack
page read and write
136D892B000
heap
page read and write
77E000
heap
page read and write
21D71F23000
heap
page read and write
136DA300000
heap
page read and write
21D7818C000
heap
page read and write
224C923C000
heap
page read and write
13D0BAF4000
heap
page read and write
2160000
heap
page read and write
366E000
heap
page read and write
21D771D1000
heap
page read and write
21D79900000
heap
page read and write
21D7711F000
heap
page read and write
1993B465000
heap
page read and write
21D7C67A000
heap
page read and write
774000
heap
page read and write
237FD100000
heap
page read and write
2B11A595000
heap
page read and write
250F000
stack
page read and write
21D781ED000
heap
page read and write
1AC000
stack
page read and write
1320000
heap
page read and write
5A0000
heap
page read and write
1FA8C494000
heap
page read and write
21D71F00000
heap
page read and write
19D000
stack
page read and write
77A000
heap
page read and write
21D786E9000
heap
page read and write
1A317685000
heap
page read and write
16E484B3000
heap
page read and write
2B11A710000
heap
page read and write
1F916E84000
heap
page read and write
1D14EBC0000
heap
page read and write
2B11DB50000
heap
page read and write
2950000
heap
page read and write
21D79926000
heap
page read and write
1AA51BDB000
heap
page read and write
1FA8C220000
heap
page read and write
260DD116000
heap
page read and write
E0B7BEF000
stack
page read and write
1FA8C4DE000
heap
page read and write
21D77A02000
heap
page read and write
21D77DA2000
heap
page read and write
1F91981B000
heap
page read and write
2DB0000
heap
page read and write
237FD1F8000
heap
page read and write
21D5BEBC000
heap
page read and write
237FEBA4000
heap
page read and write
260DD0C8000
heap
page read and write
21D71F42000
heap
page read and write
21D71F1F000
heap
page read and write
1AABD540000
heap
page read and write
2B11A551000
heap
page read and write
1F919822000
heap
page read and write
21D773C8000
heap
page read and write
21D77D13000
heap
page read and write
E0B87FF000
stack
page read and write
21D6F7CA000
heap
page read and write
8B664FF000
stack
page read and write
21D6F6C7000
heap
page read and write
13D0BA84000
heap
page read and write
21D777C8000
heap
page read and write
21D7761E000
heap
page read and write
21D787FA000
heap
page read and write
21D7CDB6000
heap
page read and write
21D79916000
heap
page read and write
21D77BD1000
heap
page read and write
21D5A450000
heap
page read and write
5F0000
heap
page read and write
21D78646000
heap
page read and write
21D5A476000
heap
page read and write
21D781E4000
heap
page read and write
21D78600000
heap
page read and write
1FD94980000
heap
page read and write
A5008FF000
stack
page read and write
13DD575000
stack
page read and write
21D769B4000
heap
page read and write
1FA8C2E8000
heap
page read and write
21D781F6000
heap
page read and write
22C9F350000
heap
page read and write
B3950FF000
stack
page read and write
136D89B0000
heap
page read and write
21D7B179000
heap
page read and write
174C9FF2000
heap
page read and write
E271CF9000
stack
page read and write
81E000
heap
page read and write
21D77B95000
heap
page read and write
16A30000
trusted library allocation
page read and write
2540000
heap
page read and write
21D779F0000
trusted library allocation
page read and write
20A7000
heap
page read and write
2A51000
heap
page read and write
4B3000
heap
page read and write
21D6F762000
heap
page read and write
7F4000
heap
page read and write
32EE000
stack
page read and write
21D5BE10000
heap
page read and write
1AABD460000
heap
page read and write
1FC6000
stack
page read and write
4B73199000
stack
page read and write
90E000
stack
page read and write
21D77D2C000
heap
page read and write
1169F4C0000
heap
page read and write
21D777A8000
heap
page read and write
21D770F1000
heap
page read and write
13DD6FF000
stack
page read and write
There are 1277 hidden memdumps, click here to show them.