IOC Report
Documents.7z

loading gif

Files

File Path
Type
Category
Malicious
Documents.7z
7-zip archive data, version 0.4
initial sample
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 13:42:46 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 13:42:46 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 13:42:46 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 13:42:46 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Apr 18 13:42:46 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 128
ASCII text, with very long lines (56412), with no line terminators
downloaded
Chrome Cache Entry: 129
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 130
JPEG image data, JFIF standard 1.02, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
downloaded
Chrome Cache Entry: 131
JPEG image data, JFIF standard 1.02, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
downloaded
Chrome Cache Entry: 132
JPEG image data, JFIF standard 1.02, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
downloaded
Chrome Cache Entry: 133
MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
downloaded
Chrome Cache Entry: 134
ASCII text, with very long lines (17688)
downloaded
Chrome Cache Entry: 135
JPEG image data, JFIF standard 1.02, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 300x300, components 3
downloaded
Chrome Cache Entry: 136
PNG image data, 48 x 48, 8-bit gray+alpha, non-interlaced
downloaded
Chrome Cache Entry: 137
ASCII text, with very long lines (1222), with no line terminators
downloaded
Chrome Cache Entry: 138
PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 139
JPEG image data, JFIF standard 1.02, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 450x450, components 3
downloaded
Chrome Cache Entry: 140
ASCII text, with very long lines (597)
downloaded
Chrome Cache Entry: 141
PNG image data, 48 x 48, 8-bit gray+alpha, non-interlaced
downloaded
Chrome Cache Entry: 142
Web Open Font Format (Version 2), TrueType, length 15340, version 1.0
downloaded
Chrome Cache Entry: 143
JPEG image data, JFIF standard 1.02, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
downloaded
Chrome Cache Entry: 144
JPEG image data, JFIF standard 1.02, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
downloaded
Chrome Cache Entry: 145
PNG image data, 98 x 90, 8-bit/color RGB, non-interlaced
downloaded
Chrome Cache Entry: 146
Web Open Font Format (Version 2), TrueType, length 15552, version 1.0
downloaded
Chrome Cache Entry: 147
Web Open Font Format (Version 2), TrueType, length 15344, version 1.0
downloaded
Chrome Cache Entry: 148
PNG image data, 48 x 48, 8-bit gray+alpha, non-interlaced
downloaded
Chrome Cache Entry: 149
JPEG image data, JFIF standard 1.02, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 450x450, components 3
downloaded
Chrome Cache Entry: 150
ASCII text, with no line terminators
downloaded
There are 20 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 --field-trial-handle=1896,i,2522147141678714913,16162524076685256105,262144 /prefetch:8

URLs

Name
IP
Malicious
https://www.google.com/recaptcha/api2/reload?k=6LfwuyUTAAAAAOAmoS0fdqijC2PbbdH4kjq62Y1b
64.233.176.106
https://developers.google.com/recaptcha/docs/faq#localhost_support
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=7zi&oit=1&cp=3&pgcl=7&gs_rn=42&psi=RNf-2vw-scF0IRoG&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
64.233.176.106
https://www.google.com/recaptcha/api2/userverify?k=6LfwuyUTAAAAAOAmoS0fdqijC2PbbdH4kjq62Y1b
64.233.176.106
https://www.google.com/recaptcha/api2/payload?p=06AFcWeA5EkBAPcMOv8LoW-z9oBGkRrNwkqmrtq_175ZiAFCWhI-dyfruxwN0EDtkBtrIe45FR2B35vqjequ9u7h18hT0EZgUvvCNumA3qqc1Nn-xqxq27UAv_m_wGsMefQh0-uUR_Pqw0MRFz6NSBUxRcoRoZXH2Q2wOpxOB1syaPENODsWo-xZ2DDegCQOWtGbJF25CD4XKk&k=6LfwuyUTAAAAAOAmoS0fdqijC2PbbdH4kjq62Y1b&id=ad1303f5874012dd
64.233.176.106
https://support.google.com/recaptcha#6262736
unknown
https://cloud.google.com/recaptcha-enterprise/billing-information
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/search%3Fq%3D7zip%26oq%3D7zip%26gs_lcrp%3DEgZjaHJvbWUyBggAEEUYOdIBCDEyNjJqMGo3qAIAsAIA%26sourceid%3Dchrome%26ie%3DUTF-8&q=EgRRtTk0GOrihLEGIjDncaOX7h5agDML-_J39PqAZeZyl4N1vdca56wLBd_o0sqwelo3iqnzIfwGjYHh1C8yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
64.233.176.106
https://recaptcha.net
unknown
https://www.apache.org/licenses/
unknown
https://www.google.com/async/newtab_promos
64.233.176.106
https://www.google.com/recaptcha/api2/webworker.js?hl=en&v=QoukH5jSO3sKFzVEA7Vc8VgC
64.233.176.106
https://www.google.com/recaptcha/api2/payload?p=06AFcWeA4frbWer0wKH0ZR6C82DbZps44nKxyxai6240hzAEw4slWjXUVJ3G1AUW3Y7SCTq-LwA_ygKzzLxwJlUwqwNlcl3_wi5JOCrgtg40cH6DJGZ1KhngUVXVffYTbAGm5AhZKzZt9feWlVBAu2j2Kye-blWt3VyTeXfK2TkZ7U2m_pU2d80hjh4I5LRFeyCpD9IVa-f_I9&k=6LfwuyUTAAAAAOAmoS0fdqijC2PbbdH4kjq62Y1b&id=58248a340f3c879f
64.233.176.106
https://www.gstatic.c..?/recaptcha/releases/QoukH5jSO3sKFzVEA7Vc8VgC/recaptcha__.
unknown
https://www.google.com/recaptcha/api2/payload?p=06AFcWeA6zzF3weexsGQsiWg04-ruhQ_tnzyde1vKlIfQTjXALVxjLUHt7ksR07qCbedVXCdf7altNdSUGcUkuXTtpWJYU1TmqYTGYMjngvfu5iz-u-r_yqaBbwk7wABh0-URfontoaNLPwu0FJLJ3KzNq-OXDV7kkFUISOHGokyjqXj72tyoda8Fi-G9Z9RyFs1grPBTrsdf7&k=6LfwuyUTAAAAAOAmoS0fdqijC2PbbdH4kjq62Y1b
64.233.176.106
https://support.google.com/recaptcha/?hl=en#6223828
unknown
https://www.google.com/favicon.ico
64.233.176.106
https://cloud.google.com/contact
unknown
https://developers.google.com/recaptcha/docs/faq#my-computer-or-network-may-be-sending-automated-que
unknown
https://www.google.com/recaptcha/api2/payload?p=06AFcWeA6DWEmokBLWnQOYm0IsLW2NCAFj1c2miGD5eH2hsSm1OHz49c2N1MxVhKxDDtEEL2zZk2NK1bsbR1AyeFT-vRiVoiZRg1e25gAiEal0mju1vKctIGQ_5UdkqDGfcfqrme1y35dXtXt6qAOzD9phZba08Uo-Ffyw9mQ7k5rKJ135QuOWdPWi6ZyqtYbh6-oY7luoLg26&k=6LfwuyUTAAAAAOAmoS0fdqijC2PbbdH4kjq62Y1b
64.233.176.106
https://play.google.com/log?format=json&hasfast=true
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
64.233.176.106
https://developers.google.com/recaptcha/docs/faq#are-there-any-qps-or-daily-limits-on-my-use-of-reca
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgRRtTk0GObihLEGIjAI7DtiS_GiN5bc9NLEssGbsC0oLSesQcn1J6SH9zJpOTjdzgSOLpnIbu-Pxo5sr8MyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
64.233.176.106
https://www.google.com/recaptcha/api.js
64.233.176.106
https://www.google.com/js/bg/IsHUla7t4cK5kOAb6cwcBiPQ5HnUjMTZuq5wUJJd2UM.js
64.233.176.106
https://support.google.com/recaptcha/#6175971
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgRRtTk0GObihLEGIjCjYMa1_LGDVbrC5SvJmZkMYhY0iukalt9_KGlWf27Rj0MpZxY-3zG0gN8CvSCy_K8yAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
64.233.176.106
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=7zip&oit=1&cp=4&pgcl=7&gs_rn=42&psi=RNf-2vw-scF0IRoG&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
64.233.176.106
https://www.google.com/sorry/index?continue=https://www.google.com/complete/search%3Fclient%3Dchrome-omni%26gs_ri%3Dchrome-ext-ansg%26xssi%3Dt%26q%3D%26oit%3D0%26oft%3D1%26pgcl%3D20%26gs_rn%3D42%26sugkey%3DAIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw&q=EgRRtTk0GObihLEGIjDQR5zrL8Z8FIe--7JmhwAOhhfkAQgrLLC7_vpIQAglsXqdjDqfhIkPDrbvTHmKgCIyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
64.233.176.106
https://www.google.com/search?q=7zip&oq=7zip&gs_lcrp=EgZjaHJvbWUyBggAEEUYOdIBCDEyNjJqMGo3qAIAsAIA&sourceid=chrome&ie=UTF-8
64.233.176.106
https://www.google.com/recaptcha/api2/replaceimage?k=6LfwuyUTAAAAAOAmoS0fdqijC2PbbdH4kjq62Y1b
64.233.176.106
https://www.google.com/recaptcha/api2/bframe?hl=en&v=QoukH5jSO3sKFzVEA7Vc8VgC&k=6LfwuyUTAAAAAOAmoS0fdqijC2PbbdH4kjq62Y1b
64.233.176.106
https://www.google.com/recaptcha/api2/payload?p=06AFcWeA4hugY_j6cLjsTq6ItB7G_7FlPQ9OasBoDJZI-uCF-q987pjHxm_7YGCRPVqOpYpw0ppSeNrVqJoqqm8xchQuabGTkM6aSjP-BS9CdlR7vK9V1cTgmj0DyYvHLV4aeRchnWmVXlCpfs6vZ_2UaD9uosQ-VQZmNKVoD1Rayxmqe25qq4nKvjQt97p5TjWMzvSoCMOLwq&k=6LfwuyUTAAAAAOAmoS0fdqijC2PbbdH4kjq62Y1b&id=d8fb9f57db980dec
64.233.176.106
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
64.233.176.106
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=7&oit=4&cp=1&pgcl=7&gs_rn=42&psi=RNf-2vw-scF0IRoG&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
64.233.176.106
https://www.google.com/recaptcha/api2/
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=7z&oit=1&cp=2&pgcl=7&gs_rn=42&psi=RNf-2vw-scF0IRoG&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
64.233.176.106
https://www.google.com/recaptcha/api2/payload?p=06AFcWeA7ZXw9uOkzALS2kTLha29HPHU16TQlZMx1pKUQ_7wrrt-sofC93B5Gzs09quO4b5SQJHCmYHReXfi5VGgdKJJAbCbCk-tgCCtCpA6KflzJKIdpjmWKDksHG1uX8pTnEgx7MlhKw9QEWgFjprGJNpLH_qpjPuN2JS_Cw43bf-dyuoA8h0Z5tkw6aMn_Crw32vrySkE60&k=6LfwuyUTAAAAAOAmoS0fdqijC2PbbdH4kjq62Y1b&id=9747b01ef597c89c
64.233.176.106
https://www.google.com/recaptcha/api2/payload?p=06AFcWeA6DWEmokBLWnQOYm0IsLW2NCAFj1c2miGD5eH2hsSm1OHz49c2N1MxVhKxDDtEEL2zZk2NK1bsbR1AyeFT-vRiVoiZRg1e25gAiEal0mju1vKctIGQ_5UdkqDGfcfqrme1y35dXtXt6qAOzD9phZba08Uo-Ffyw9mQ7k5rKJ135QuOWdPWi6ZyqtYbh6-oY7luoLg26&k=6LfwuyUTAAAAAOAmoS0fdqijC2PbbdH4kjq62Y1b&id=2
64.233.176.106
https://support.google.com/recaptcha
unknown
There are 31 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
64.233.176.106

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
192.168.2.16
unknown
unknown
64.233.176.106
www.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2B139476000
heap
page read and write
DE63F7E000
stack
page read and write
2B1393A6000
heap
page read and write
2B139409000
heap
page read and write
2B139518000
heap
page read and write
2B1393B3000
heap
page read and write
1E21526C000
heap
page read and write
1E215229000
heap
page read and write
2B13938B000
heap
page read and write
2B139393000
heap
page read and write
1E215250000
heap
page read and write
2B1374DA000
heap
page read and write
2B1393B0000
heap
page read and write
2B139394000
heap
page read and write
2B1393D3000
heap
page read and write
2B1393A7000
heap
page read and write
1E21520E000
heap
page read and write
2B1394B4000
heap
page read and write
1E215229000
heap
page read and write
2B1393D5000
heap
page read and write
1E213284000
heap
page read and write
2B1393B4000
heap
page read and write
2B139465000
heap
page read and write
2B13BCF1000
heap
page read and write
2B139532000
heap
page read and write
2B1374C4000
heap
page read and write
1E21522E000
heap
page read and write
2B1393AD000
heap
page read and write
1E2151E2000
heap
page read and write
1E2151E2000
heap
page read and write
2B1393DD000
heap
page read and write
1E215334000
heap
page read and write
2B1393BF000
heap
page read and write
1E217B26000
heap
page read and write
2B139474000
heap
page read and write
1E2153BD000
heap
page read and write
18DAC570000
heap
page read and write
1E2151FA000
heap
page read and write
2B13BCDE000
heap
page read and write
1E215385000
heap
page read and write
1E2132B7000
heap
page read and write
1E215328000
heap
page read and write
1E21520E000
heap
page read and write
2B139511000
heap
page read and write
1E215278000
heap
page read and write
1E2151FF000
heap
page read and write
2B1374CC000
heap
page read and write
2B1393DD000
heap
page read and write
332A8FF000
stack
page read and write
2B13953E000
heap
page read and write
2B1393A6000
heap
page read and write
2B1393E9000
heap
page read and write
1E2151D6000
heap
page read and write
2B1393BA000
heap
page read and write
B53767E000
stack
page read and write
2B137523000
heap
page read and write
2B1394ED000
heap
page read and write
2B1393DD000
heap
page read and write
1E215274000
heap
page read and write
1E215385000
heap
page read and write
2B139388000
heap
page read and write
1E21521B000
heap
page read and write
2B1394F7000
heap
page read and write
2B138E00000
heap
page read and write
1E215351000
heap
page read and write
2B139450000
heap
page read and write
1E214B6D000
heap
page read and write
1E215264000
heap
page read and write
1E21533B000
heap
page read and write
1E215348000
heap
page read and write
2B1393D3000
heap
page read and write
2B137430000
heap
page read and write
1E21522C000
heap
page read and write
1E2151D0000
heap
page read and write
2B139472000
heap
page read and write
2B1374DC000
heap
page read and write
2B1374E0000
heap
page read and write
2B139470000
heap
page read and write
2B13BCD9000
heap
page read and write
2B1393A9000
heap
page read and write
2B1393A6000
heap
page read and write
2B139379000
heap
page read and write
1E2151FA000
heap
page read and write
1E215236000
heap
page read and write
2B139397000
heap
page read and write
2B1374EF000
heap
page read and write
1E217B6F000
heap
page read and write
1E217B69000
heap
page read and write
2B1393B3000
heap
page read and write
1E21534A000
heap
page read and write
2B1393C5000
heap
page read and write
2B1393A6000
heap
page read and write
1E213287000
heap
page read and write
2B1393AB000
heap
page read and write
2B139512000
heap
page read and write
2B13938D000
heap
page read and write
2B13E300000
heap
page readonly
B53797B000
stack
page read and write
2B13752B000
heap
page read and write
1E215210000
heap
page read and write
1E215334000
heap
page read and write
1E2151FF000
heap
page read and write
1E2152EF000
heap
page read and write
1E21325E000
heap
page read and write
2B1394D4000
heap
page read and write
2B1394B0000
heap
page read and write
2B1393FD000
heap
page read and write
B5373A7000
stack
page read and write
1E215336000
heap
page read and write
1E2153A5000
heap
page read and write
2B1393A2000
heap
page read and write
1E215363000
heap
page read and write
1E215398000
heap
page read and write
2B1393AE000
heap
page read and write
2B139388000
heap
page read and write
1E2153B7000
heap
page read and write
2B13939D000
heap
page read and write
1E215232000
heap
page read and write
2B1393E9000
heap
page read and write
1E213180000
heap
page read and write
1E218000000
heap
page read and write
1E2153A1000
heap
page read and write
2B1393D5000
heap
page read and write
2B13946C000
heap
page read and write
1E215322000
heap
page read and write
2B1374D4000
heap
page read and write
DE63A7D000
stack
page read and write
2B1393AD000
heap
page read and write
2B1393E1000
heap
page read and write
2B1393B3000
heap
page read and write
2B1393A9000
heap
page read and write
2B13940D000
heap
page read and write
1E215383000
heap
page read and write
2B1393CF000
heap
page read and write
DE63E7B000
stack
page read and write
2B1394A6000
heap
page read and write
1E2151D7000
heap
page read and write
1E215341000
heap
page read and write
2B1393DD000
heap
page read and write
2B1393B3000
heap
page read and write
2B1393CA000
heap
page read and write
2B139388000
heap
page read and write
1E215270000
heap
page read and write
2B13938F000
heap
page read and write
1E2151EB000
heap
page read and write
2B1393E5000
heap
page read and write
1E215229000
heap
page read and write
B53777E000
stack
page read and write
1E21533B000
heap
page read and write
1E215336000
heap
page read and write
2B139393000
heap
page read and write
2B1393B3000
heap
page read and write
2B1393A7000
heap
page read and write
2B13938D000
heap
page read and write
2B139393000
heap
page read and write
2B13937B000
heap
page read and write
2B1393B3000
heap
page read and write
2B13BCB0000
heap
page read and write
2B1393CB000
heap
page read and write
2B139388000
heap
page read and write
1E215251000
heap
page read and write
7DF4CA561000
trusted library allocation
page execute read
2B1393AA000
heap
page read and write
2B1394D4000
heap
page read and write
2B1374F4000
heap
page read and write
2B13BCE3000
heap
page read and write
2B1394C9000
heap
page read and write
1E21520E000
heap
page read and write
2B1393AB000
heap
page read and write
1E215392000
heap
page read and write
1E213281000
heap
page read and write
1E217B36000
heap
page read and write
1E215278000
heap
page read and write
2B1393A6000
heap
page read and write
2B1374DD000
heap
page read and write
18DAC4E0000
heap
page read and write
2B1374D5000
heap
page read and write
1E2151FA000
heap
page read and write
2B1393C7000
heap
page read and write
2B1394AF000
heap
page read and write
1E215216000
heap
page read and write
1E215203000
heap
page read and write
1E2152C0000
heap
page read and write
2B1374B9000
heap
page read and write
1E218004000
heap
page read and write
2B139495000
heap
page read and write
2B1393B7000
heap
page read and write
1E2153A1000
heap
page read and write
2B1393B5000
heap
page read and write
2B13953E000
heap
page read and write
2B1374EB000
heap
page read and write
1E21524C000
heap
page read and write
1E215203000
heap
page read and write
2B139399000
heap
page read and write
2B13947A000
heap
page read and write
2B139388000
heap
page read and write
2B1393AE000
heap
page read and write
2B1374EB000
heap
page read and write
2B1394A6000
heap
page read and write
2B13938F000
heap
page read and write
2B1393C3000
heap
page read and write
1E215216000
heap
page read and write
2B139546000
heap
page read and write
1E2151F5000
heap
page read and write
2B13BCDE000
heap
page read and write
2B1393F5000
heap
page read and write
2B1374C4000
heap
page read and write
1E215317000
heap
page read and write
2B13937F000
heap
page read and write
2B13BCC1000
heap
page read and write
2B1393F1000
heap
page read and write
1E2151FA000
heap
page read and write
1E217B55000
heap
page read and write
2B1393B3000
heap
page read and write
1E21534F000
heap
page read and write
2B1393E9000
heap
page read and write
2B13C084000
heap
page read and write
2B139405000
heap
page read and write
2B1393A6000
heap
page read and write
2B13BCD5000
heap
page read and write
1E2151E1000
heap
page read and write
1E217B56000
heap
page read and write
2B13939A000
heap
page read and write
1E215388000
heap
page read and write
1E215398000
heap
page read and write
1E215300000
heap
page read and write
1E214B65000
heap
page read and write
1E215254000
heap
page read and write
2B1393D9000
heap
page read and write
1E21525C000
heap
page read and write
1E2153AB000
heap
page read and write
1E215248000
heap
page read and write
2B1393B8000
heap
page read and write
2B1393AB000
heap
page read and write
2B139370000
heap
page read and write
2B139361000
heap
page read and write
332A87C000
stack
page read and write
2B1374C4000
heap
page read and write
DE63AFF000
stack
page read and write
2B13DBE4000
trusted library allocation
page read and write
2B1393B9000
heap
page read and write
2B1393DD000
heap
page read and write
1E217B32000
heap
page read and write
2B1394E5000
heap
page read and write
1E215229000
heap
page read and write
2B13936D000
heap
page read and write
2B13BCD8000
heap
page read and write
2B139393000
heap
page read and write
1E215224000
heap
page read and write
2B1393FD000
heap
page read and write
2B1393ED000
heap
page read and write
2B1393C6000
heap
page read and write
2B1393A7000
heap
page read and write
2B139395000
heap
page read and write
2B139393000
heap
page read and write
1E21326F000
heap
page read and write
1E217B47000
heap
page read and write
1E21521C000
heap
page read and write
2B13937F000
heap
page read and write
2B13936F000
heap
page read and write
1E2152CD000
heap
page read and write
2B1393BB000
heap
page read and write
2B139384000
heap
page read and write
2B1393D9000
heap
page read and write
1E2152F1000
heap
page read and write
2B13BFD0000
trusted library allocation
page read and write
2B139393000
heap
page read and write
2B13939A000
heap
page read and write
2B1394C9000
heap
page read and write
2B1393B7000
heap
page read and write
2B1393A6000
heap
page read and write
2B139399000
heap
page read and write
2B1374CE000
heap
page read and write
2B1393D5000
heap
page read and write
1E21538E000
heap
page read and write
1E215308000
heap
page read and write
2B13938B000
heap
page read and write
1E2153B7000
heap
page read and write
1E2151F5000
heap
page read and write
2B1393B3000
heap
page read and write
2B1394E8000
heap
page read and write
2B139549000
heap
page read and write
2B1393B7000
heap
page read and write
2B139411000
heap
page read and write
1E2151F1000
heap
page read and write
1E213267000
heap
page read and write
2B13936B000
heap
page read and write
1E2152E8000
heap
page read and write
2B1393B4000
heap
page read and write
1E2151D9000
heap
page read and write
2B13950E000
heap
page read and write
2B13939D000
heap
page read and write
1E215322000
heap
page read and write
2B1393AB000
heap
page read and write
2B137526000
heap
page read and write
2B1393A7000
heap
page read and write
1E215300000
heap
page read and write
1E2152F5000
heap
page read and write
1E215268000
heap
page read and write
2B1374AB000
heap
page read and write
2B139538000
heap
page read and write
2B1393CB000
heap
page read and write
2B1393E5000
heap
page read and write
1E215254000
heap
page read and write
2B13BCB4000
heap
page read and write
1E215240000
heap
page read and write
1E213298000
heap
page read and write
1E21523C000
heap
page read and write
2B139373000
heap
page read and write
1E215390000
heap
page read and write
1E219D20000
heap
page readonly
1E2151EB000
heap
page read and write
2B13950E000
heap
page read and write
B53787D000
stack
page read and write
1E213290000
heap
page read and write
2B1393B9000
heap
page read and write
2B137508000
heap
page read and write
2B1393B3000
heap
page read and write
2B1393F9000
heap
page read and write
2B1393F5000
heap
page read and write
1E215212000
heap
page read and write
2B1393A6000
heap
page read and write
1E217B78000
heap
page read and write
1E217E40000
trusted library allocation
page read and write
1E2152E5000
heap
page read and write
1E213230000
heap
page read and write
2B13BCC3000
heap
page read and write
1E213255000
heap
page read and write
1E213268000
heap
page read and write
18DAC885000
heap
page read and write
2B137502000
heap
page read and write
1E21521B000
heap
page read and write
1E2151DC000
heap
page read and write
2B13954D000
heap
page read and write
2B13952F000
heap
page read and write
B5377FE000
stack
page read and write
2B13B5A0000
trusted library allocation
page read and write
2B139536000
heap
page read and write
2B139395000
heap
page read and write
2B139393000
heap
page read and write
2B1393C7000
heap
page read and write
2B1394E0000
heap
page read and write
2B1393BA000
heap
page read and write
1E2151E9000
heap
page read and write
2B139365000
heap
page read and write
2B1393AC000
heap
page read and write
1E217B30000
heap
page read and write
2B1393C3000
heap
page read and write
2B1393BC000
heap
page read and write
1E215260000
heap
page read and write
2B139483000
heap
page read and write
2B13937B000
heap
page read and write
2B1394DA000
heap
page read and write
1E21521B000
heap
page read and write
1E213253000
heap
page read and write
2B1393ED000
heap
page read and write
2B1393B9000
heap
page read and write
2B1393A6000
heap
page read and write
2B13939D000
heap
page read and write
2B13939A000
heap
page read and write
2B1393A7000
heap
page read and write
2B13948F000
heap
page read and write
1E215250000
heap
page read and write
1E213261000
heap
page read and write
1E215319000
heap
page read and write
2B1393C0000
heap
page read and write
2B13DC02000
trusted library allocation
page read and write
2B13939C000
heap
page read and write
2B1393B3000
heap
page read and write
1E2151F1000
heap
page read and write
2B1393BF000
heap
page read and write
2B13936D000
heap
page read and write
2B1393A6000
heap
page read and write
1E215325000
heap
page read and write
1E217410000
trusted library allocation
page read and write
2B139388000
heap
page read and write
2B1394B8000
heap
page read and write
2B13949C000
heap
page read and write
1E2151D5000
heap
page read and write
2B1373E0000
heap
page read and write
2B138D40000
heap
page read and write
2B13953F000
heap
page read and write
1E2152CE000
heap
page read and write
1E21327A000
heap
page read and write
2B13938D000
heap
page read and write
2B13939A000
heap
page read and write
2B139389000
heap
page read and write
1E213238000
heap
page read and write
2B137504000
heap
page read and write
2B138CD0000
heap
page read and write
2B1394AA000
heap
page read and write
1E2151FF000
heap
page read and write
2B1393E5000
heap
page read and write
2B1393C5000
heap
page read and write
2B139388000
heap
page read and write
2B13BCD6000
heap
page read and write
2B139411000
heap
page read and write
2B1394ED000
heap
page read and write
2B1393B3000
heap
page read and write
2B139401000
heap
page read and write
1E215203000
heap
page read and write
2B137526000
heap
page read and write
2B1393B6000
heap
page read and write
2B1393B7000
heap
page read and write
1E213238000
heap
page read and write
2B1374DE000
heap
page read and write
2B1393F9000
heap
page read and write
2B1393B7000
heap
page read and write
2B139405000
heap
page read and write
1E215264000
heap
page read and write
1E215211000
heap
page read and write
2B1393AE000
heap
page read and write
1E215270000
heap
page read and write
2B1393AB000
heap
page read and write
2B139396000
heap
page read and write
1E217B3B000
heap
page read and write
1E217B7F000
heap
page read and write
2B139391000
heap
page read and write
2B1393D3000
heap
page read and write
2B1374EC000
heap
page read and write
1E213263000
heap
page read and write
1E215268000
heap
page read and write
1E2152F7000
heap
page read and write
1E2151F5000
heap
page read and write
2B1393ED000
heap
page read and write
1E21525C000
heap
page read and write
1E21534E000
heap
page read and write
2B139377000
heap
page read and write
2B139409000
heap
page read and write
1E217B6D000
heap
page read and write
1E213250000
heap
page read and write
2B1374CC000
heap
page read and write
2B139401000
heap
page read and write
2B139398000
heap
page read and write
1E2151E6000
heap
page read and write
1E217B59000
heap
page read and write
1E213250000
heap
page read and write
2B139534000
heap
page read and write
2B1393ED000
heap
page read and write
1E2132B4000
heap
page read and write
1E215229000
heap
page read and write
1E213170000
heap
page read and write
1E217B51000
heap
page read and write
2B13938D000
heap
page read and write
2B13949E000
heap
page read and write
1E21531D000
heap
page read and write
2B137300000
heap
page read and write
2B1394A6000
heap
page read and write
1E213265000
heap
page read and write
1E2151E0000
heap
page read and write
1E215225000
heap
page read and write
2B139384000
heap
page read and write
2B139395000
heap
page read and write
1E215308000
heap
page read and write
2B1393A6000
heap
page read and write
2B139452000
heap
page read and write
1E217B20000
heap
page read and write
1E2151FF000
heap
page read and write
1E215218000
heap
page read and write
1E215210000
heap
page read and write
2B139401000
heap
page read and write
1E215254000
heap
page read and write
2B1393E9000
heap
page read and write
2B13938B000
heap
page read and write
2B139401000
heap
page read and write
2B1393A6000
heap
page read and write
1E214B6E000
heap
page read and write
2B139388000
heap
page read and write
2B139393000
heap
page read and write
1E2151E7000
heap
page read and write
2B1394A0000
heap
page read and write
1E215216000
heap
page read and write
2B13939A000
heap
page read and write
2B13938D000
heap
page read and write
2B13945D000
heap
page read and write
1E2151E9000
heap
page read and write
2B1374CC000
heap
page read and write
2B1374ED000
heap
page read and write
2B1394B5000
heap
page read and write
2B1393AE000
heap
page read and write
332A9FF000
stack
page read and write
2B139483000
heap
page read and write
2B1393D5000
heap
page read and write
2B1393B3000
heap
page read and write
1E2151FF000
heap
page read and write
1E2153AF000
heap
page read and write
1E2131C0000
heap
page read and write
1E215225000
heap
page read and write
1E215236000
heap
page read and write
2B1393A6000
heap
page read and write
1E215240000
heap
page read and write
2B1374FC000
heap
page read and write
2B139411000
heap
page read and write
1E21322F000
heap
page read and write
1E2153B5000
heap
page read and write
B537C7F000
stack
page read and write
2B1374DB000
heap
page read and write
2B13BCF0000
heap
page read and write
2B1393D3000
heap
page read and write
1E215248000
heap
page read and write
2B139397000
heap
page read and write
1E213294000
heap
page read and write
1E215337000
heap
page read and write
2B13938D000
heap
page read and write
1E217B55000
heap
page read and write
1E2132B1000
heap
page read and write
1E213278000
heap
page read and write
2B1393D5000
heap
page read and write
2B139393000
heap
page read and write
2B139380000
heap
page read and write
1E215216000
heap
page read and write
1E215220000
heap
page read and write
2B139397000
heap
page read and write
1E213290000
heap
page read and write
1E215248000
heap
page read and write
2B139388000
heap
page read and write
2B13938D000
heap
page read and write
2B1393A9000
heap
page read and write
2B1393A8000
heap
page read and write
2B13948B000
heap
page read and write
1E21523B000
heap
page read and write
2B1394D5000
heap
page read and write
2B13952D000
heap
page read and write
2B1394AC000
heap
page read and write
2B1393E5000
heap
page read and write
2B139495000
heap
page read and write
2B13939A000
heap
page read and write
1E215232000
heap
page read and write
1E215236000
heap
page read and write
1E215244000
heap
page read and write
1E217B2C000
heap
page read and write
1E215328000
heap
page read and write
2B1393B8000
heap
page read and write
1E215300000
heap
page read and write
2B139468000
heap
page read and write
1E213269000
heap
page read and write
2B139391000
heap
page read and write
2B139543000
heap
page read and write
2B139388000
heap
page read and write
1E21524C000
heap
page read and write
2B1374C0000
heap
page read and write
2B139525000
heap
page read and write
2B139417000
heap
page read and write
2B1374A8000
heap
page read and write
2B13952E000
heap
page read and write
2B13E830000
heap
page read and write
1E213260000
heap
page read and write
2B139484000
heap
page read and write
2B13750B000
heap
page read and write
1E213275000
heap
page read and write
2B1393CF000
heap
page read and write
2B139384000
heap
page read and write
2B1393D3000
heap
page read and write
1E2151F1000
heap
page read and write
1E21324B000
heap
page read and write
1E215203000
heap
page read and write
2B1393AC000
heap
page read and write
2B1374D7000
heap
page read and write
1E2152D9000
heap
page read and write
18DAC577000
heap
page read and write
1E2132B7000
heap
page read and write
DE63C7B000
stack
page read and write
2B1393A6000
heap
page read and write
1E213259000
heap
page read and write
1E21530F000
heap
page read and write
1E21534A000
heap
page read and write
2B13940D000
heap
page read and write
2B1393B3000
heap
page read and write
2B13939A000
heap
page read and write
1E21523B000
heap
page read and write
2B139549000
heap
page read and write
1E2152ED000
heap
page read and write
DE6377E000
stack
page read and write
1E21520B000
heap
page read and write
1E215258000
heap
page read and write
1E215236000
heap
page read and write
2B1394A1000
heap
page read and write
2B1374F7000
heap
page read and write
2B1393BB000
heap
page read and write
1E2151F6000
heap
page read and write
2B13938B000
heap
page read and write
1E215248000
heap
page read and write
2B1393AB000
heap
page read and write
2B1374C4000
heap
page read and write
1E214C80000
heap
page read and write
2B139512000
heap
page read and write
2B139534000
heap
page read and write
2B13938C000
heap
page read and write
2B1393ED000
heap
page read and write
1E21524C000
heap
page read and write
2B13938D000
heap
page read and write
1E2151C0000
heap
page read and write
2B139398000
heap
page read and write
2B139350000
heap
page read and write
2B1393A7000
heap
page read and write
2B13937B000
heap
page read and write
2B13752B000
heap
page read and write
1E215260000
heap
page read and write
2B1393D3000
heap
page read and write
2B13BCD2000
heap
page read and write
1E215200000
heap
page read and write
2B1374B5000
heap
page read and write
2B13938B000
heap
page read and write
2B139530000
heap
page read and write
2B1374E9000
heap
page read and write
2B13951C000
heap
page read and write
2B1374CE000
heap
page read and write
1E2151E6000
heap
page read and write
2B139360000
heap
page read and write
1E21323E000
heap
page read and write
1E217B75000
heap
page read and write
2B1393CB000
heap
page read and write
1E213250000
heap
page read and write
2B13950E000
heap
page read and write
1E2151FA000
heap
page read and write
2B13949C000
heap
page read and write
1E217B7F000
heap
page read and write
1E2151E6000
heap
page read and write
1E21530F000
heap
page read and write
2B1374F0000
heap
page read and write
2B13749E000
heap
page read and write
18DAC500000
heap
page read and write
B5376FE000
stack
page read and write
1E213272000
heap
page read and write
2B1374FD000
heap
page read and write
1E213263000
heap
page read and write
1E21325E000
heap
page read and write
2B139495000
heap
page read and write
2B139384000
heap
page read and write
2B13BCEC000
heap
page read and write
2B1393AD000
heap
page read and write
2B137465000
heap
page read and write
2B139381000
heap
page read and write
1E215308000
heap
page read and write
2B1393B8000
heap
page read and write
2B139525000
heap
page read and write
1E21328E000
heap
page read and write
1E217B72000
heap
page read and write
DE637FE000
stack
page read and write
1E214B30000
heap
page read and write
1E215341000
heap
page read and write
2B1393B9000
heap
page read and write
2B1393A9000
heap
page read and write
2B1393A6000
heap
page read and write
2B13947C000
heap
page read and write
1E215345000
heap
page read and write
1E215396000
heap
page read and write
2B13939E000
heap
page read and write
1E215274000
heap
page read and write
1E215225000
heap
page read and write
1E2132B9000
heap
page read and write
2B1393AA000
heap
page read and write
2B139515000
heap
page read and write
1E2151D1000
heap
page read and write
2B139393000
heap
page read and write
DE63BFB000
stack
page read and write
2B138E05000
heap
page read and write
2B13938F000
heap
page read and write
1E21533C000
heap
page read and write
1E213255000
heap
page read and write
2B139485000
heap
page read and write
2B139388000
heap
page read and write
2B1393AF000
heap
page read and write
1E215208000
heap
page read and write
2B139381000
heap
page read and write
1E217B6D000
heap
page read and write
2B1374BF000
heap
page read and write
1E215239000
heap
page read and write
2B139388000
heap
page read and write
2B13BCF0000
heap
page read and write
2B13BCB8000
heap
page read and write
1E215244000
heap
page read and write
1E21521B000
heap
page read and write
2B13939A000
heap
page read and write
1E215220000
heap
page read and write
2B1393FD000
heap
page read and write
1E213259000
heap
page read and write
1E215203000
heap
page read and write
2B1393D9000
heap
page read and write
2B1393F5000
heap
page read and write
18DAC830000
heap
page read and write
2B139409000
heap
page read and write
2B1393E1000
heap
page read and write
332A97E000
stack
page read and write
1E21523C000
heap
page read and write
2B13BCD1000
heap
page read and write
2B13939D000
heap
page read and write
2B139397000
heap
page read and write
2B137502000
heap
page read and write
1E215317000
heap
page read and write
1E215313000
heap
page read and write
B5378FB000
stack
page read and write
1E2153A1000
heap
page read and write
2B137523000
heap
page read and write
2B1393E1000
heap
page read and write
2B139398000
heap
page read and write
1E2152F9000
heap
page read and write
1E2151DB000
heap
page read and write
1E215216000
heap
page read and write
1E217B53000
heap
page read and write
1E2151FF000
heap
page read and write
2B1393B6000
heap
page read and write
1E217B8B000
heap
page read and write
1E2153A5000
heap
page read and write
2B139397000
heap
page read and write
2B139478000
heap
page read and write
2B1393FD000
heap
page read and write
1E2153BD000
heap
page read and write
DE636F6000
stack
page read and write
2B13939D000
heap
page read and write
18DAC880000
heap
page read and write
1E215203000
heap
page read and write
2B13951C000
heap
page read and write
1E217B78000
heap
page read and write
1E2152E1000
heap
page read and write
2B13937F000
heap
page read and write
2B139514000
heap
page read and write
2B1393AD000
heap
page read and write
2B1393BF000
heap
page read and write
1E215353000
heap
page read and write
2B1393F1000
heap
page read and write
2B13939D000
heap
page read and write
DE63B7E000
stack
page read and write
2B139376000
heap
page read and write
2B139517000
heap
page read and write
2B1394F2000
heap
page read and write
2B139549000
heap
page read and write
1E213269000
heap
page read and write
1E219C30000
heap
page read and write
2B13937F000
heap
page read and write
1E2153AB000
heap
page read and write
2B1394E9000
heap
page read and write
1E214B60000
heap
page read and write
2B13954B000
heap
page read and write
2B1393D9000
heap
page read and write
2B1393D3000
heap
page read and write
1E21521B000
heap
page read and write
1E215325000
heap
page read and write
2B1393D3000
heap
page read and write
1E2151F1000
heap
page read and write
2B1394B4000
heap
page read and write
1E21534A000
heap
page read and write
1E215221000
heap
page read and write
1E215258000
heap
page read and write
B537B7B000
stack
page read and write
2B139373000
heap
page read and write
1E21530F000
heap
page read and write
1E21522E000
heap
page read and write
2B13952D000
heap
page read and write
2B1393B9000
heap
page read and write
1E21526C000
heap
page read and write
2B1393AE000
heap
page read and write
1E2152F3000
heap
page read and write
1E21520A000
heap
page read and write
2B1393CF000
heap
page read and write
2B1393D9000
heap
page read and write
2B13938D000
heap
page read and write
2B1393B7000
heap
page read and write
1E2153BD000
heap
page read and write
1E2153B2000
heap
page read and write
2B13C080000
heap
page read and write
2B1394E5000
heap
page read and write
18DAC4D0000
heap
page read and write
2B139409000
heap
page read and write
2B139369000
heap
page read and write
1E217B80000
heap
page read and write
2B13BD04000
heap
page read and write
1E215254000
heap
page read and write
2B139540000
heap
page read and write
There are 759 hidden memdumps, click here to show them.