IOC Report
Document_a51_19i793302-14b09981a5569-3684u8.js

loading gif

Files

File Path
Type
Category
Malicious
Document_a51_19i793302-14b09981a5569-3684u8.js
ASCII text, with very long lines (533), with CRLF line terminators
initial sample
malicious
:wtfbbq (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\sharepoint\360total.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Custom_update\Update_cd47bedf.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI181.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI54.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIA3.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIC4.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIFFD6.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Config.Msi\4e00e0.rbs
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C5C8CC0A7FE31816B4641D0465402560
Certificate, Version=3
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C5C8CC0A7FE31816B4641D0465402560
data
dropped
C:\Windows\Installer\MSI103.tmp
data
dropped
C:\Windows\Installer\MSI846B.tmp
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {6C81CEE0-3161-4D91-A688-254B67D7D838}, Number of Words: 10, Subject: 360 Total, Author: HuMaster LLC, Name of Creating Application: 360 Total, Template: ;1033, Comments: This installer database contains the logic and data required to install 360 Total., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF0673ED736785A4D1.TMP
data
dropped
C:\Windows\Temp\~DF1472FD4508764B7C.TMP
data
dropped
C:\Windows\Temp\~DF2962571C7317E3C5.TMP
data
dropped
C:\Windows\Temp\~DF2C17C88212509880.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF41638D872A10A065.TMP
data
dropped
C:\Windows\Temp\~DF42BDB990109EC114.TMP
data
dropped
C:\Windows\Temp\~DF61773DAED613FFB9.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFA3E2CC6CAB1B816A.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFA850122BA55067CF.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFC79B60F342C6D33F.TMP
data
dropped
C:\Windows\Temp\~DFF122760D5CC42A2E.TMP
Composite Document File V2 Document, Cannot read section info
dropped
There are 18 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Document_a51_19i793302-14b09981a5569-3684u8.js"
malicious
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
malicious
C:\Windows\Installer\MSI181.tmp
"C:\Windows\Installer\MSI181.tmp" C:/Windows/System32/rundll32.exe C:\Users\user\AppData\Local\sharepoint\360total.dll, homq
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Local\sharepoint\360total.dll, homq
malicious
C:\Windows\System32\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Local\sharepoint\360total.dll, homq
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_cd47bedf.dll", homq
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_cd47bedf.dll", homq
malicious
C:\Windows\System32\cmd.exe
/c ipconfig /all
malicious
C:\Windows\System32\ipconfig.exe
ipconfig /all
malicious
C:\Windows\System32\cmd.exe
/c systeminfo
malicious
C:\Windows\System32\systeminfo.exe
systeminfo
malicious
C:\Windows\System32\cmd.exe
/c nltest /domain_trusts
malicious
C:\Windows\System32\cmd.exe
/c nltest /domain_trusts /all_trusts
malicious
C:\Windows\System32\cmd.exe
/c net view /all /domain
malicious
C:\Windows\System32\net.exe
net view /all /domain
malicious
C:\Windows\System32\cmd.exe
/c net view /all
malicious
C:\Windows\System32\net.exe
net view /all
malicious
C:\Windows\System32\cmd.exe
/c net group "Domain Admins" /domain
malicious
C:\Windows\System32\net.exe
net group "Domain Admins" /domain
malicious
C:\Windows\System32\cmd.exe
/c net config workstation
malicious
C:\Windows\System32\net.exe
net config workstation
malicious
C:\Windows\System32\cmd.exe
/c wmic.exe /node:localhost /namespace:\\root\SecurityCenter2 path AntiVirusProduct Get DisplayName | findstr /V /B /C:displayName || echo No Antivirus installed
malicious
C:\Windows\System32\cmd.exe
/c whoami /groups
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding B0AF98778AC35F634802E620BDCA3C21
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://473750571567004317064230583514468350804565684324378075159610742091604698238217701484029465762430135913242023857750034401559054060945654540273638867228794983640833862748912121851334807031249099092790952130035074227943842970399582505875/
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1996,i,12555166688129216027,17064817212319626723,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1952,i,10714614445797353568,16368385931931740060,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\nltest.exe
nltest /domain_trusts
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\nltest.exe
nltest /domain_trusts /all_trusts
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\net1.exe
C:\Windows\system32\net1 group "Domain Admins" /domain
C:\Windows\System32\wbem\WMIC.exe
/Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get * /Format:List
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\net1.exe
C:\Windows\system32\net1 config workstation
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WMIC.exe
wmic.exe /node:localhost /namespace:\\root\SecurityCenter2 path AntiVirusProduct Get DisplayName
C:\Windows\System32\findstr.exe
findstr /V /B /C:displayName
There are 36 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://startmast.shop/live/
malicious
https://jarinamaers.shop/files/stkm.bin
104.21.46.75
malicious
https://pewwhranet.com/live/
172.67.197.34
malicious
https://grizmotras.com/live/
172.67.219.28
malicious
https://jarinamaers.shop/live/
104.21.46.75
malicious
https://jarinamaers.shop/
unknown
malicious
http://146.19.106.236/neo.msi
146.19.106.236
https://pewwhranet.com/
unknown
https://jarinamaers.shop/live/dll
unknown
https://grizmotras.com/live/S
unknown
http://pconf.f.360.cn/safe_update.php
unknown
https://grizmotras.com/E0#W
unknown
https://grizmotras.com/live/ras.com/live/
unknown
https://jarinamaers.shop/?
unknown
https://grizmotras.com/live/URLS1https://pewwhranet.com/live/
unknown
https://jarinamaers.shop/live/(y
unknown
https://pewwhranet.com/live/My
unknown
https://pewwhranet.com/4g9V
unknown
https://pewwhranet.com/Pb
unknown
https://pewwhranet.com/=0
unknown
http://dr.f.360.cn/scanlist
unknown
https://pewwhranet.com/d
unknown
https://grizmotras.com/Li
unknown
https://grizmotras.com/live/l
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.217.228
https://jarinamaers.shop/live/J$=W
unknown
http://secure.globalsign
unknown
https://grizmotras.cH
unknown
http://cacerts.di
unknown
https://jarinamaers.shop/live/s6
unknown
http://146.19.106.236/neo.msi-995103104311030230
unknown
https://grizmotras.com/live/hy
unknown
https://jarinamaers.shop/live/l
unknown
ftp://ftp%2desktop.ini
unknown
https://grizmotras.com/
unknown
https://www.google.com/async/newtab_promos
142.250.217.228
http://146.19.106.236/neo.msi0
unknown
https://pewwhranet.com/live/ll
unknown
https://grizmotras.com/es
unknown
https://grizmotras.com/w
unknown
https://jarinamaers.shop/live/P
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.250.217.228
http://pscan.f.360.cn/safe_update.php
unknown
http://secure.globalsign)
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.217.228
https://www.thawte.com/cps0/
unknown
http://pscan.f.360.cn/safe_update.phphttp://pconf.f.360.cn/safe_update.phphttp://sconf.f.360.cn/clie
unknown
https://jarinamaers.shop/live/OIDV6SW/
unknown
https://www.thawte.com/repository0W
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgRmgZjcGLizsLEGIjAYi0E5THM4aIj8FUOrJpdUpPAhU1RG5ebUtVLBNvumYZ4qVuqJu7WbwqMCr0qqjPIyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.250.217.228
https://grizmotras.com/H
unknown
http://sconf.f.360.cn/client_security_conf
unknown
http://crl3.digic
unknown
http://dr.f.360.cn/scan
unknown
https://www.advancedinstaller.com
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgRmgZjcGLizsLEGIjBzxD8y3zpVM4rvYXOzD0wZHGfxDV2C93K9X3HWoqlaBUqfM3Uck6U5jewh4t8bDhoyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.250.217.228
https://pewwhranet.c
unknown
https://pewwhranet.com/(h)W$
unknown
https://grizmotras.com/live/rW
unknown
There are 49 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
jarinamaers.shop
104.21.46.75
malicious
pewwhranet.com
172.67.197.34
malicious
grizmotras.com
172.67.219.28
malicious
www.google.com
142.250.217.228

IPs

IP
Domain
Country
Malicious
104.21.46.75
jarinamaers.shop
United States
malicious
172.67.197.34
pewwhranet.com
United States
malicious
172.67.219.28
grizmotras.com
United States
malicious
142.250.217.228
www.google.com
United States
192.168.2.4
unknown
unknown
239.255.255.250
unknown
Reserved
192.168.2.13
unknown
unknown
192.168.2.23
unknown
unknown
192.168.2.15
unknown
unknown
192.168.2.14
unknown
unknown
146.19.106.236
unknown
France
There are 1 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\4e00e0.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\4e00e0.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\Microsoft\Installer\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\C72CC84B32896524285338B4DFD2D0BB
E927531B47501D447B1AE64455F005B6
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\F5D323A437D662C4E893EB9882AD31BE
E927531B47501D447B1AE64455F005B6
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\895F9FDA48B79C541BAC8E90865A83AB
E927531B47501D447B1AE64455F005B6
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\HuMaster LLC\360 Total\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\HuMaster LLC\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Local\sharepoint\
HKEY_CURRENT_USER\SOFTWARE\HuMaster LLC\360 Total
Version
HKEY_CURRENT_USER\SOFTWARE\HuMaster LLC\360 Total
Path
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\system32\mlang.dll,-4387
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\system32\mlang.dll,-4407
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1800FE30000
direct allocation
page execute and read and write
malicious
1800FA60000
direct allocation
page execute and read and write
malicious
1800FE30000
direct allocation
page execute and read and write
malicious
1800FE30000
direct allocation
page execute and read and write
malicious
1800FE30000
direct allocation
page execute and read and write
malicious
235B4340000
direct allocation
page read and write
malicious
235B5CE0000
direct allocation
page execute and read and write
malicious
1800FE30000
direct allocation
page execute and read and write
malicious
1EF532A0000
direct allocation
page read and write
malicious
18010010000
direct allocation
page execute and read and write
malicious
1EF532B0000
direct allocation
page execute and read and write
malicious
1800FA60000
direct allocation
page execute and read and write
malicious
1800FA60000
direct allocation
page execute and read and write
malicious
26334480000
heap
page read and write
1BA315AD000
heap
page read and write
1BA30DB7000
heap
page read and write
1800FF1B000
heap
page read and write
180100F0000
direct allocation
page execute and read and write
1800FF2E000
heap
page read and write
23F97D8E000
heap
page read and write
1800FF56000
heap
page read and write
1EF53140000
heap
page read and write
2E80000
heap
page read and write
1800FF2E000
heap
page read and write
2C733683000
heap
page read and write
24E2BB05000
heap
page read and write
1BA30FC0000
trusted library allocation
page read and write
1800FF56000
heap
page read and write
1800FF3F000
heap
page read and write
1800FF2E000
heap
page read and write
BDC000
stack
page read and write
B538FFB000
stack
page read and write
1800FF4C000
heap
page read and write
1BA30DFC000
heap
page read and write
1800FF46000
heap
page read and write
23F97C18000
heap
page read and write
1800FF56000
heap
page read and write
1800FF2C000
heap
page read and write
23F99BD4000
heap
page read and write
1BA315AD000
heap
page read and write
2C7335C0000
heap
page read and write
1434AC74000
heap
page read and write
1800FF2E000
heap
page read and write
707EFF000
stack
page read and write
1800FF35000
heap
page read and write
18010160000
direct allocation
page execute and read and write
1FBDD475000
heap
page read and write
788A36F000
stack
page read and write
2C733689000
heap
page read and write
D80000
heap
page read and write
1800FF1C000
heap
page read and write
228C50C000
stack
page read and write
1BA31440000
heap
page read and write
23BEC0DC000
heap
page read and write
1800FF2A000
heap
page read and write
1434AE00000
heap
page read and write
23BEC4D8000
heap
page read and write
23F97C1D000
heap
page read and write
23F97C82000
heap
page read and write
1BA30DD3000
heap
page read and write
23F97C6C000
heap
page read and write
1800FF56000
heap
page read and write
1800FF2C000
heap
page read and write
23F97C53000
heap
page read and write
180100E0000
direct allocation
page execute and read and write
23BE9EB0000
heap
page read and write
27757770000
heap
page read and write
1BA30DD8000
heap
page read and write
1BA30FE0000
heap
page read and write
8797EFE000
stack
page read and write
23BE9EE5000
heap
page read and write
788A36B000
stack
page read and write
1D440260000
heap
page read and write
1FBDD100000
heap
page read and write
1800F9B0000
trusted library allocation
page read and write
20C5C900000
heap
page read and write
2A61B018000
heap
page read and write
18010010000
direct allocation
page execute and read and write
221F3BF0000
heap
page read and write
23F9834D000
heap
page read and write
B5389FE000
stack
page read and write
2785CC4B000
heap
page read and write
1800FF51000
heap
page read and write
1FBDD0E8000
heap
page read and write
1800FF56000
heap
page read and write
1BA30DF5000
heap
page read and write
1800FF56000
heap
page read and write
180100E0000
direct allocation
page execute and read and write
180001000
unkown
page execute read
23BEA150000
remote allocation
page read and write
1800FF56000
heap
page read and write
20C5C9B0000
heap
page read and write
1800FF56000
heap
page read and write
1800FF29000
heap
page read and write
1800FF29000
heap
page read and write
1BA30DF5000
heap
page read and write
2C733693000
heap
page read and write
26334690000
heap
page read and write
23F97C5D000
heap
page read and write
1BA30DE5000
heap
page read and write
23BEC4B5000
heap
page read and write
235B5F30000
direct allocation
page execute and read and write
180100F0000
direct allocation
page execute and read and write
2C7336BD000
heap
page read and write
1800FF2A000
heap
page read and write
8797E7E000
stack
page read and write
C85E5FE000
stack
page read and write
180100F0000
direct allocation
page execute and read and write
1800DFFF000
heap
page read and write
1EF53240000
heap
page read and write
23BEC468000
heap
page read and write
1800C6000
unkown
page write copy
23BEC4BB000
heap
page read and write
707CFC000
stack
page read and write
1800FF56000
heap
page read and write
1800FF10000
heap
page read and write
1800FF56000
heap
page read and write
23F97C7D000
heap
page read and write
1800FF47000
heap
page read and write
23BE9F3C000
heap
page read and write
23F97C1D000
heap
page read and write
23BEC4DB000
heap
page read and write
1800FF2C000
heap
page read and write
235B46C0000
heap
page read and write
23BEC4CF000
heap
page read and write
8A88D4C000
stack
page read and write
23F98338000
heap
page read and write
180100E0000
direct allocation
page execute and read and write
1800F9B0000
trusted library allocation
page read and write
1800FF2E000
heap
page read and write
1800FF2E000
heap
page read and write
235B42B0000
heap
page read and write
18010110000
direct allocation
page execute and read and write
235B4350000
heap
page read and write
1D440280000
heap
page read and write
B5391FD000
stack
page read and write
221F3FF0000
heap
page read and write
1800FF56000
heap
page read and write
FCFA0AB000
stack
page read and write
23F9833C000
heap
page read and write
20C5C804000
heap
page read and write
1800FF51000
heap
page read and write
20C5C8E0000
heap
page read and write
23BEC4DB000
heap
page read and write
2A42FB40000
heap
page read and write
263343A0000
heap
page read and write
1D80CC90000
heap
page read and write
1800F9B0000
trusted library allocation
page read and write
23F97C56000
heap
page read and write
FCFA1AE000
stack
page read and write
B5388FE000
stack
page read and write
1800FF3F000
heap
page read and write
23F9833E000
heap
page read and write
DBB000
heap
page read and write
1BA30DD8000
heap
page read and write
2C733695000
heap
page read and write
1BA315A7000
heap
page read and write
20C5C9A0000
heap
page read and write
B538557000
stack
page read and write
23F97D85000
heap
page read and write
1800DFFF000
heap
page read and write
23F99BD3000
heap
page read and write
334F000
stack
page read and write
180100F0000
direct allocation
page execute and read and write
1800FF3E000
heap
page read and write
1800FF4E000
heap
page read and write
2E4387C000
stack
page read and write
1800DFC9000
heap
page read and write
23BEC4C4000
heap
page read and write
23BEC495000
heap
page read and write
FC262FF000
unkown
page read and write
2C733693000
heap
page read and write
23BEC4DB000
heap
page read and write
235B5EF0000
direct allocation
page execute and read and write
2A42FEB0000
heap
page read and write
580000
unkown
page readonly
23BEC4BA000
heap
page read and write
1800FF56000
heap
page read and write
1BA315A2000
heap
page read and write
DA8000
heap
page read and write
1A2254C0000
heap
page read and write
1BA315A3000
heap
page read and write
23F98330000
heap
page read and write
1FBDD090000
heap
page read and write
1800FF29000
heap
page read and write
18010070000
direct allocation
page execute and read and write
18010310000
direct allocation
page execute and read and write
277577A0000
heap
page read and write
1D80CB9B000
heap
page read and write
10AD000
stack
page read and write
1800FA90000
direct allocation
page execute and read and write
1800FAC0000
direct allocation
page execute and read and write
1800FF2C000
heap
page read and write
2C7336A7000
heap
page read and write
23F97C64000
heap
page read and write
1800FF3F000
heap
page read and write
1D4402D5000
heap
page read and write
2DA81420000
heap
page read and write
2A61AF00000
heap
page read and write
23F97D40000
trusted library allocation
page read and write
1800FF35000
heap
page read and write
23F97C6E000
heap
page read and write
23E66A40000
heap
page read and write
23BEBE71000
heap
page read and write
1800FF56000
heap
page read and write
1BA30FEA000
heap
page read and write
1800FF35000
heap
page read and write
23F97C77000
heap
page read and write
1D440090000
heap
page read and write
23F98361000
heap
page read and write
23BEC4C9000
heap
page read and write
23BEC4C9000
heap
page read and write
1BA315BA000
heap
page read and write
23F97C75000
heap
page read and write
1800FF3E000
heap
page read and write
1800FE30000
direct allocation
page execute and read and write
1BA315C1000
heap
page read and write
1800FF28000
heap
page read and write
23BE9EE6000
heap
page read and write
1800FF56000
heap
page read and write
1FBDD101000
heap
page read and write
235B5F50000
direct allocation
page execute and read and write
23BEC4D8000
heap
page read and write
1800FF2C000
heap
page read and write
23F9835E000
heap
page read and write
1800FF00000
remote allocation
page read and write
1800FF56000
heap
page read and write
23BEC4C9000
heap
page read and write
2C7336A7000
heap
page read and write
20C5C7E0000
heap
page read and write
1BA315A3000
heap
page read and write
24E2B830000
heap
page read and write
180100E0000
direct allocation
page execute and read and write
5E0000
unkown
page readonly
1800FF4B000
heap
page read and write
23E66A60000
heap
page read and write
1800FF47000
heap
page read and write
1800FF35000
heap
page read and write
23BEBD73000
heap
page read and write
221F3C40000
heap
page read and write
1800FF35000
heap
page read and write
1800FF2E000
heap
page read and write
1BA30E06000
heap
page read and write
23F98358000
heap
page read and write
305AAFF000
stack
page read and write
1800DFC7000
heap
page read and write
1800E004000
heap
page read and write
1800DFC9000
heap
page read and write
20882CAF000
heap
page read and write
1800FF3E000
heap
page read and write
23BEBD71000
heap
page read and write
F8B0D8D000
stack
page read and write
23BEC48A000
heap
page read and write
B5390FF000
stack
page read and write
180100E0000
direct allocation
page execute and read and write
1800FF56000
heap
page read and write
1800FF54000
heap
page read and write
1800F9B0000
trusted library allocation
page read and write
1BA31340000
heap
page read and write
180100C0000
direct allocation
page execute and read and write
1800FF2A000
heap
page read and write
1BA30DA0000
heap
page read and write
277577B0000
heap
page read and write
1BA3144E000
heap
page read and write
1BA315A5000
heap
page read and write
23BEC4D8000
heap
page read and write
1800FF4B000
heap
page read and write
1800FF3F000
heap
page read and write
1BA31590000
heap
page read and write
23BEC4D8000
heap
page read and write
23F9833C000
heap
page read and write
1D80CE20000
heap
page read and write
1800FF3E000
heap
page read and write
180103B5000
direct allocation
page execute and read and write
27757820000
heap
page read and write
1800FF35000
heap
page read and write
263344DB000
heap
page read and write
1800FF2A000
heap
page read and write
1800FF56000
heap
page read and write
1800FF2E000
heap
page read and write
1BA315BA000
heap
page read and write
23F97C39000
heap
page read and write
1800FF56000
heap
page read and write
235B5EC0000
direct allocation
page execute and read and write
1800FF47000
heap
page read and write
23BEC4D8000
heap
page read and write
826BD8C000
stack
page read and write
1800FF2A000
heap
page read and write
20882F15000
heap
page read and write
1800FF2E000
heap
page read and write
E16C2FB000
stack
page read and write
23BE9ED1000
heap
page read and write
1800FF35000
heap
page read and write
20882B60000
heap
page read and write
1800DFB4000
heap
page read and write
1800FF00000
remote allocation
page read and write
B538EFC000
stack
page read and write
2C0F2370000
heap
page read and write
1BA3159E000
heap
page read and write
1800FF35000
heap
page read and write
23F97D80000
heap
page read and write
461487E000
stack
page read and write
23BEC499000
heap
page read and write
235B5E10000
trusted library allocation
page read and write
23F9834D000
heap
page read and write
23F97C71000
heap
page read and write
1EF53351000
heap
page read and write
23F98358000
heap
page read and write
1800FF56000
heap
page read and write
1800FF2E000
heap
page read and write
1800FF3F000
heap
page read and write
23F97D8A000
heap
page read and write
1D80CD70000
heap
page read and write
23BE9EF3000
heap
page read and write
23BEBE71000
heap
page read and write
23F97C66000
heap
page read and write
870F68D000
stack
page read and write
99A33AD000
stack
page read and write
1800FF3E000
heap
page read and write
23F97C7B000
heap
page read and write
2C733668000
heap
page read and write
B538BFF000
stack
page read and write
BC8A17D000
stack
page read and write
23F99DC0000
heap
page read and write
23BEC4D6000
heap
page read and write
1800FF35000
heap
page read and write
2785CAD0000
heap
page read and write
235B5E40000
trusted library allocation
page read and write
18010010000
direct allocation
page execute and read and write
11AE000
stack
page read and write
1800FF45000
heap
page read and write
23BEA150000
remote allocation
page read and write
23F98346000
heap
page read and write
1FBDD0EC000
heap
page read and write
FC25FEB000
stack
page read and write
23E66E95000
heap
page read and write
23BE9DC0000
heap
page read and write
1800FF35000
heap
page read and write
870F78E000
stack
page read and write
1800FF56000
heap
page read and write
23BEBF5B000
heap
page read and write
23BE9E30000
heap
page read and write
1BA30FF0000
trusted library allocation
page read and write
23BEC100000
heap
page read and write
D3C79BC000
stack
page read and write
18010020000
direct allocation
page execute and read and write
23BEC4D8000
heap
page read and write
23BEC4D6000
heap
page read and write
1BA315CD000
heap
page read and write
C85E14B000
stack
page read and write
23F97C77000
heap
page read and write
2DA81290000
heap
page read and write
1800FF35000
heap
page read and write
23F97C00000
heap
page read and write
1434AC50000
heap
page read and write
23F97D83000
heap
page read and write
23BEBD71000
heap
page read and write
21045B47000
heap
page read and write
1800FF2C000
heap
page read and write
2785CBD0000
heap
page read and write
2A61B165000
heap
page read and write
2E4397F000
stack
page read and write
4614537000
stack
page read and write
1800FF56000
heap
page read and write
1800C5000
unkown
page read and write
235B42C0000
heap
page read and write
F8B107E000
stack
page read and write
23BEC4C3000
heap
page read and write
1D440097000
heap
page read and write
1800FF44000
heap
page read and write
BC8A1FE000
stack
page read and write
235B5E30000
heap
page read and write
23BEC100000
heap
page read and write
23BEC085000
heap
page read and write
5C7000
unkown
page readonly
23F97C18000
heap
page read and write
1EF54D00000
trusted library allocation
page read and write
4614AFE000
stack
page read and write
1800DFFF000
heap
page read and write
23F98341000
heap
page read and write
20882C40000
heap
page read and write
1FBDD0F0000
heap
page read and write
1800FF29000
heap
page read and write
46145BE000
stack
page read and write
18010210000
direct allocation
page execute and read and write
23F99BDD000
heap
page read and write
1800FF47000
heap
page read and write
23BEC085000
heap
page read and write
23BEC4D6000
heap
page read and write
1800FF2A000
heap
page read and write
1BA315A8000
heap
page read and write
1800FF51000
heap
page read and write
2C7339F0000
heap
page read and write
221F3C4B000
heap
page read and write
1BA315A9000
heap
page read and write
1800FF56000
heap
page read and write
23F9834D000
heap
page read and write
228C58F000
stack
page read and write
23F97EA5000
heap
page read and write
1800FF10000
heap
page read and write
180106A1000
heap
page read and write
23BEC4BA000
heap
page read and write
23F97C53000
heap
page read and write
1D80CD90000
heap
page read and write
1800FF2A000
heap
page read and write
1800FF35000
heap
page read and write
263344D0000
heap
page read and write
1800FF00000
remote allocation
page read and write
1BA3144A000
heap
page read and write
23F97D8A000
heap
page read and write
23F97D00000
heap
page read and write
23F97C38000
heap
page read and write
180000000
unkown
page readonly
23BE9ECC000
heap
page read and write
DD6000
heap
page read and write
23BE9FA4000
heap
page read and write
23F98340000
heap
page read and write
1800FF3E000
heap
page read and write
180100E0000
direct allocation
page execute and read and write
1BA30EA0000
heap
page read and write
1BA31400000
heap
page read and write
8A891FF000
stack
page read and write
1800FF2C000
heap
page read and write
1800FF35000
heap
page read and write
180100F0000
trusted library allocation
page read and write
180101B0000
direct allocation
page execute and read and write
1800FF2C000
heap
page read and write
221F3C66000
heap
page read and write
1800E004000
heap
page read and write
1800FF4A000
heap
page read and write
180101A0000
direct allocation
page execute and read and write
1800FF56000
heap
page read and write
23F9833F000
heap
page read and write
1800FF56000
heap
page read and write
FCFA57F000
stack
page read and write
2E5E000
stack
page read and write
1800FF2A000
heap
page read and write
1800FF56000
heap
page read and write
1800E002000
heap
page read and write
1EF53328000
heap
page read and write
461497E000
stack
page read and write
1BA30FE5000
heap
page read and write
263344F6000
heap
page read and write
1434AC5B000
heap
page read and write
1BA315BA000
heap
page read and write
1BA30DF5000
heap
page read and write
5DC000
unkown
page read and write
8797F7E000
stack
page read and write
A2A857E000
stack
page read and write
9844EFF000
stack
page read and write
23BEC466000
heap
page read and write
1800FF1B000
heap
page read and write
18010220000
direct allocation
page execute and read and write
1EF53220000
heap
page read and write
23BEC4A9000
heap
page read and write
23BEC27A000
heap
page read and write
23F97C70000
heap
page read and write
23F98346000
heap
page read and write
F8B10FE000
stack
page read and write
2A42FEB5000
heap
page read and write
23E66AD0000
heap
page read and write
1BA315AD000
heap
page read and write
180100E0000
direct allocation
page execute and read and write
23F97EA0000
heap
page read and write
180100F0000
direct allocation
page execute and read and write
305A8FC000
stack
page read and write
1A2255A0000
heap
page read and write
1800FF3E000
heap
page read and write
30CE000
stack
page read and write
1BA315AD000
heap
page read and write
1800FE40000
direct allocation
page execute and read and write
1800FF3E000
heap
page read and write
106E000
stack
page read and write
1434AB10000
heap
page read and write
18010150000
direct allocation
page execute and read and write
2C7336A7000
heap
page read and write
1BA315CD000
heap
page read and write
1800FF56000
heap
page read and write
23F98340000
heap
page read and write
23BEC274000
heap
page read and write
235B5EE0000
direct allocation
page execute and read and write
20C5C805000
heap
page read and write
21045B2B000
heap
page read and write
180101A0000
direct allocation
page execute and read and write
1800FF2A000
heap
page read and write
18010310000
direct allocation
page execute and read and write
1800FF4C000
heap
page read and write
235B5E40000
direct allocation
page execute and read and write
1D80CBB5000
heap
page read and write
1BA30DA9000
heap
page read and write
20882F10000
heap
page read and write
1800FF56000
heap
page read and write
23BEC442000
heap
page read and write
221F3BC0000
heap
page read and write
1800FF2C000
heap
page read and write
1800FF2C000
heap
page read and write
2C0F237B000
heap
page read and write
1800FF47000
heap
page read and write
23BEC513000
heap
page read and write
18010060000
direct allocation
page execute and read and write
1800FF2A000
heap
page read and write
1800FF56000
heap
page read and write
1BA315AD000
heap
page read and write
23F97C77000
heap
page read and write
D3C7DFF000
stack
page read and write
23BEC4CF000
heap
page read and write
1BA30F80000
heap
page read and write
235B5E10000
trusted library allocation
page read and write
1800FF56000
heap
page read and write
23F98369000
heap
page read and write
23BEBD70000
heap
page read and write
2C0F2550000
heap
page read and write
23F97C1D000
heap
page read and write
2A42FB60000
heap
page read and write
1800FF2E000
heap
page read and write
300E000
stack
page read and write
2DA81425000
heap
page read and write
1800FF2C000
heap
page read and write
23F98362000
heap
page read and write
23F97C53000
heap
page read and write
1800DFBD000
heap
page read and write
180103B5000
direct allocation
page execute and read and write
1A225695000
heap
page read and write
2FCE000
stack
page read and write
A2A84FD000
stack
page read and write
1BA315BA000
heap
page read and write
1800FF35000
heap
page read and write
23BEC515000
heap
page read and write
2DA81197000
heap
page read and write
1800E004000
heap
page read and write
1800FF56000
heap
page read and write
23F97D90000
heap
page read and write
23BE9F79000
heap
page read and write
2A61B010000
heap
page read and write
F25E7FF000
unkown
page read and write
1800FF2E000
heap
page read and write
2C7336A7000
heap
page read and write
1FBDD0C0000
heap
page read and write
2C7336AE000
heap
page read and write
1800FF56000
heap
page read and write
2C0F2560000
heap
page read and write
23BE9EF3000
heap
page read and write
2C7336AF000
heap
page read and write
1800FF2A000
heap
page read and write
1800FF6D000
heap
page read and write
1800FF56000
heap
page read and write
23BE9F4C000
heap
page read and write
1800FF56000
heap
page read and write
581000
unkown
page execute read
D3C7CFF000
unkown
page read and write
23F98337000
heap
page read and write
1800FF56000
heap
page read and write
1BA30DF5000
heap
page read and write
1EF53555000
heap
page read and write
235B42E0000
heap
page read and write
1EF54EB0000
heap
page read and write
1800FF54000
heap
page read and write
99A367E000
stack
page read and write
23BEC4DB000
heap
page read and write
1800FF35000
heap
page read and write
23F98358000
heap
page read and write
A2A847C000
stack
page read and write
1800FF2E000
heap
page read and write
F25E8FF000
stack
page read and write
1BA3144A000
heap
page read and write
235B5EC0000
direct allocation
page execute and read and write
23BEC50B000
heap
page read and write
1800FF56000
heap
page read and write
1800FE20000
direct allocation
page execute and read and write
2A61AFE0000
heap
page read and write
235B5F90000
direct allocation
page execute and read and write
1800FF35000
heap
page read and write
8797FFF000
stack
page read and write
23BEC4C9000
heap
page read and write
1800FF56000
heap
page read and write
23BEC4BB000
heap
page read and write
180100C0000
direct allocation
page execute and read and write
324E000
stack
page read and write
23BEBE71000
heap
page read and write
1800DFD0000
heap
page read and write
A4EA5FE000
stack
page read and write
235B5E10000
direct allocation
page execute and read and write
23F97D40000
trusted library allocation
page read and write
2EA0000
heap
page read and write
8A890FE000
unkown
page read and write
309E000
heap
page read and write
1BA315BA000
heap
page read and write
23F9834D000
heap
page read and write
2A42FBD0000
heap
page read and write
180100F0000
direct allocation
page execute and read and write
18010010000
direct allocation
page execute and read and write
1800DFFF000
heap
page read and write
1BA31599000
heap
page read and write
221F3C64000
heap
page read and write
1800E002000
heap
page read and write
1800FF44000
heap
page read and write
1BA3144B000
heap
page read and write
1800FA60000
direct allocation
page execute and read and write
2DA812B0000
heap
page read and write
1800FF2A000
heap
page read and write
1800FF2C000
heap
page read and write
DA0000
heap
page read and write
1800E003000
heap
page read and write
23BEBEE5000
heap
page read and write
18010190000
direct allocation
page execute and read and write
1800FF56000
heap
page read and write
9844BDD000
stack
page read and write
1800DFD0000
heap
page read and write
180100D0000
direct allocation
page execute and read and write
1800DFFF000
heap
page read and write
1800FF3E000
heap
page read and write
18010150000
direct allocation
page execute and read and write
1800FF4B000
heap
page read and write
1A225770000
heap
page read and write
27757760000
heap
page read and write
FCFA4FF000
stack
page read and write
23BEC499000
heap
page read and write
1A22567B000
heap
page read and write
1BA315BF000
heap
page read and write
23BEC4B8000
heap
page read and write
2C7335D0000
heap
page read and write
1BA30E04000
heap
page read and write
1800FF51000
heap
page read and write
1800FA60000
direct allocation
page execute and read and write
3080000
heap
page read and write
23F99BD0000
heap
page read and write
1800FF47000
heap
page read and write
1800E004000
heap
page read and write
1D440070000
heap
page read and write
23E66A30000
heap
page read and write
23F97D40000
trusted library allocation
page read and write
23F98361000
heap
page read and write
23BEC4CF000
heap
page read and write
23BE9EF3000
heap
page read and write
2C733660000
heap
page read and write
1800DFFF000
heap
page read and write
1800FF3E000
heap
page read and write
1BA31597000
heap
page read and write
23F97C6C000
heap
page read and write
228C87F000
stack
page read and write
23BEC4C9000
heap
page read and write
46149FF000
stack
page read and write
A4EA57E000
stack
page read and write
1800E002000
heap
page read and write
2A61B110000
heap
page read and write
2785CC40000
heap
page read and write
1800FF55000
heap
page read and write
1800FF27000
heap
page read and write
1800FF51000
heap
page read and write
263344F4000
heap
page read and write
23BEC4CF000
heap
page read and write
D7D000
stack
page read and write
5DC000
unkown
page write copy
1D80CE10000
heap
page read and write
23BEBD74000
heap
page read and write
23F9835B000
heap
page read and write
1800FE40000
direct allocation
page execute and read and write
1800FF11000
heap
page read and write
1D4402D0000
heap
page read and write
1BA31447000
heap
page read and write
826C0FE000
unkown
page read and write
180101B0000
direct allocation
page execute and read and write
23BEC4D6000
heap
page read and write
1BA315BA000
heap
page read and write
23BEC4D6000
heap
page read and write
1BA3144E000
heap
page read and write
1800FF3E000
heap
page read and write
23BEC4B5000
heap
page read and write
1800FF35000
heap
page read and write
23BEBC71000
heap
page read and write
23BEC4E2000
heap
page read and write
23F97B20000
heap
page read and write
1800FAC0000
direct allocation
page execute and read and write
23BEC440000
heap
page read and write
1800FF51000
heap
page read and write
2990000
heap
page read and write
23BEC4E2000
heap
page read and write
23F97D87000
heap
page read and write
21045A20000
heap
page read and write
1800FF46000
heap
page read and write
23BEBFCE000
heap
page read and write
2DA81190000
heap
page read and write
1BA315A9000
heap
page read and write
1800FF60000
heap
page read and write
1800FF2E000
heap
page read and write
308A000
heap
page read and write
23F9834D000
heap
page read and write
1800FF47000
heap
page read and write
D10000
heap
page read and write
21045CB0000
heap
page read and write
23BEA1A5000
heap
page read and write
23F9835C000
heap
page read and write
1BA30DF9000
heap
page read and write
1800FF56000
heap
page read and write
E16C3FF000
unkown
page read and write
1800FF2E000
heap
page read and write
1A22567D000
heap
page read and write
23BEC4CF000
heap
page read and write
23F97C0F000
heap
page read and write
23F98359000
heap
page read and write
BC8A47F000
stack
page read and write
23BEA1A0000
heap
page read and write
1800FF35000
heap
page read and write
1800FF2A000
heap
page read and write
1A2255C0000
heap
page read and write
1800FF35000
heap
page read and write
304F000
stack
page read and write
23BEBD7B000
heap
page read and write
23F98358000
heap
page read and write
1BA32E30000
heap
page read and write
23F98361000
heap
page read and write
23BEC4CF000
heap
page read and write
23BEC4D6000
heap
page read and write
581000
unkown
page execute read
23BEBE71000
heap
page read and write
1BA30E02000
heap
page read and write
23F99BD1000
heap
page read and write
1BA31444000
heap
page read and write
180100E0000
direct allocation
page execute and read and write
707DFF000
unkown
page read and write
1800FF56000
heap
page read and write
1800FF2E000
heap
page read and write
870F70F000
stack
page read and write
1800FF3E000
heap
page read and write
23F97D82000
heap
page read and write
3280000
heap
page read and write
1BA315C5000
heap
page read and write
23BEC4D8000
heap
page read and write
1FBDD0C7000
heap
page read and write
180101C0000
direct allocation
page execute and read and write
18010699000
heap
page read and write
1800FF56000
heap
page read and write
23BEC070000
heap
page read and write
1800FAC0000
direct allocation
page execute and read and write
1FBDD290000
heap
page read and write
23F9834D000
heap
page read and write
2C0F2330000
heap
page read and write
F25E6FC000
stack
page read and write
1800FAD0000
direct allocation
page execute and read and write
1BA315A4000
heap
page read and write
235B46C5000
heap
page read and write
23BE9FA5000
heap
page read and write
263344A0000
heap
page read and write
2A61B160000
heap
page read and write
1EF53320000
heap
page read and write
1800FF56000
heap
page read and write
1800FF48000
heap
page read and write
23F97EAA000
heap
page read and write
180086000
unkown
page readonly
1800FF56000
heap
page read and write
23F98363000
heap
page read and write
1EF54D00000
trusted library allocation
page read and write
1BA315BA000
heap
page read and write
1800FE20000
direct allocation
page execute and read and write
1800FF29000
heap
page read and write
1800FF2E000
heap
page read and write
23BE9F9C000
heap
page read and write
99A36FF000
stack
page read and write
1BA31443000
heap
page read and write
1800FF51000
heap
page read and write
1BA31447000
heap
page read and write
2E438FE000
stack
page read and write
1BA315BD000
heap
page read and write
2C733685000
heap
page read and write
2785CC65000
heap
page read and write
1800FE40000
direct allocation
page execute and read and write
24E2BB00000
heap
page read and write
1800FAD0000
direct allocation
page execute and read and write
1800FF28000
heap
page read and write
2DA810A0000
heap
page read and write
1BA3159F000
heap
page read and write
23BEC4CF000
heap
page read and write
23BE9F4C000
heap
page read and write
1BA30FF0000
trusted library allocation
page read and write
1800FF3E000
heap
page read and write
1800FF35000
heap
page read and write
2C0F2230000
heap
page read and write
7AC7FF000
unkown
page read and write
1BA315CD000
heap
page read and write
1800FF2E000
heap
page read and write
1800FF4A000
heap
page read and write
1800FF35000
heap
page read and write
1800FF40000
heap
page read and write
235B5F10000
direct allocation
page execute and read and write
31BE000
stack
page read and write
788A67E000
stack
page read and write
235B5FA0000
direct allocation
page execute and read and write
FCFA47E000
stack
page read and write
23BEC4DB000
heap
page read and write
23BE9DE0000
heap
page read and write
23F99BDE000
heap
page read and write
235B5E40000
trusted library allocation
page read and write
23F98341000
heap
page read and write
23F98358000
heap
page read and write
8797BBD000
stack
page read and write
277577A5000
heap
page read and write
1800FE40000
direct allocation
page execute and read and write
1800FF2E000
heap
page read and write
1BA315AD000
heap
page read and write
1800FF2E000
heap
page read and write
23BE9CE0000
heap
page read and write
1800DFBA000
heap
page read and write
580000
unkown
page readonly
180103B5000
direct allocation
page execute and read and write
24E2B820000
heap
page read and write
1800FF18000
heap
page read and write
E16C4FF000
stack
page read and write
180101D0000
direct allocation
page execute and read and write
1BA3159C000
heap
page read and write
D30000
heap
page read and write
1800FF56000
heap
page read and write
1800FF55000
heap
page read and write
1434ABF0000
heap
page read and write
23F98358000
heap
page read and write
1FBDD070000
heap
page read and write
23BE9ED9000
heap
page read and write
23F98369000
heap
page read and write
2C7335F0000
heap
page read and write
2C7336A7000
heap
page read and write
1800FF56000
heap
page read and write
180103B5000
direct allocation
page execute and read and write
23F97C53000
heap
page read and write
23F97C55000
heap
page read and write
23BEA150000
remote allocation
page read and write
2C0F2310000
heap
page read and write
1BA30DBB000
heap
page read and write
1800F9D0000
direct allocation
page execute and read and write
180100E0000
direct allocation
page execute and read and write
23BEC4DB000
heap
page read and write
23BEC4DB000
heap
page read and write
1EF53550000
heap
page read and write
23BEC4DB000
heap
page read and write
2C7339F5000
heap
page read and write
1800DFFF000
heap
page read and write
23BEC4C9000
heap
page read and write
1A225696000
heap
page read and write
24E2B850000
heap
page read and write
2785CC20000
heap
page read and write
23F97D87000
heap
page read and write
1800FF51000
heap
page read and write
23BE9ED8000
heap
page read and write
23BEBD59000
heap
page read and write
180100D0000
direct allocation
page execute and read and write
1800FF35000
heap
page read and write
9BC000
stack
page read and write
788A3EE000
stack
page read and write
1BA30FA0000
heap
page read and write
23F99BDE000
heap
page read and write
1D80CB90000
heap
page read and write
1800FF2A000
heap
page read and write
338B000
stack
page read and write
2785CD40000
heap
page read and write
23F99BE4000
heap
page read and write
21045C20000
heap
page read and write
1800E003000
heap
page read and write
23BEC071000
heap
page read and write
23F98343000
heap
page read and write
1800DFCD000
heap
page read and write
C85E4FF000
unkown
page read and write
18010310000
direct allocation
page execute and read and write
1BA30E00000
heap
page read and write
23F97C07000
heap
page read and write
23BEBD73000
heap
page read and write
221F3BD0000
heap
page read and write
2785CBB0000
heap
page read and write
1800FF2E000
heap
page read and write
24E2B8B8000
heap
page read and write
348C000
stack
page read and write
23F97D8E000
heap
page read and write
21045B20000
heap
page read and write
23BEC085000
heap
page read and write
1800E004000
heap
page read and write
180100E0000
direct allocation
page execute and read and write
1800FF3F000
heap
page read and write
180100F0000
direct allocation
page execute and read and write
1800FF27000
heap
page read and write
18010020000
direct allocation
page execute and read and write
23F97C5E000
heap
page read and write
31FF000
stack
page read and write
23F98358000
heap
page read and write
2EE0000
heap
page read and write
1800FF4B000
heap
page read and write
1BA30DE4000
heap
page read and write
1FBDD0D8000
heap
page read and write
FCFA12E000
stack
page read and write
1FBDD470000
heap
page read and write
23BE9F4C000
heap
page read and write
5E0000
unkown
page readonly
1D80CBB4000
heap
page read and write
1BA31445000
heap
page read and write
1800FF56000
heap
page read and write
1800E002000
heap
page read and write
46148FE000
stack
page read and write
23BE9F4C000
heap
page read and write
23F97C7C000
heap
page read and write
A4EA4FC000
stack
page read and write
1800DFC9000
heap
page read and write
23E66E90000
heap
page read and write
1BA31442000
heap
page read and write
1800FF41000
heap
page read and write
1800FF35000
heap
page read and write
1800FF47000
heap
page read and write
1800FF3E000
heap
page read and write
27757828000
heap
page read and write
23F9834D000
heap
page read and write
1800E002000
heap
page read and write
1800FF41000
heap
page read and write
2C0F237D000
heap
page read and write
21045B45000
heap
page read and write
23BEC516000
heap
page read and write
1EF53300000
trusted library allocation
page read and write
1800FF45000
heap
page read and write
20C5C7ED000
heap
page read and write
1800FF47000
heap
page read and write
1434AC10000
heap
page read and write
23F97C63000
heap
page read and write
20882CA0000
heap
page read and write
23F97D40000
trusted library allocation
page read and write
1BA30DD2000
heap
page read and write
1800FF2E000
heap
page read and write
7AC8FF000
stack
page read and write
23BEC4BB000
heap
page read and write
1800FF56000
heap
page read and write
23F97C70000
heap
page read and write
1800FF2E000
heap
page read and write
1800FF2A000
heap
page read and write
18010220000
direct allocation
page execute and read and write
1FBDD060000
heap
page read and write
2A42FB30000
heap
page read and write
1800FF2A000
heap
page read and write
1800FF1E000
heap
page read and write
23F97C13000
heap
page read and write
21045B00000
heap
page read and write
18010060000
direct allocation
page execute and read and write
1800FF2C000
heap
page read and write
20882C60000
heap
page read and write
1434AE10000
heap
page read and write
1BA3144A000
heap
page read and write
826C1FF000
stack
page read and write
1800FF3F000
heap
page read and write
23F97C5E000
heap
page read and write
1BA315A8000
heap
page read and write
23BEC4CF000
heap
page read and write
235B4358000
heap
page read and write
1800FF56000
heap
page read and write
1800FF55000
heap
page read and write
23E66AD8000
heap
page read and write
18010220000
direct allocation
page execute and read and write
23F97D20000
heap
page read and write
18010310000
direct allocation
page execute and read and write
1BA3159C000
heap
page read and write
23BEBE70000
heap
page read and write
1800DF8F000
heap
page read and write
7AC6FB000
stack
page read and write
FC263FF000
stack
page read and write
2C733683000
heap
page read and write
1BA315AD000
heap
page read and write
8797B37000
stack
page read and write
23F97D8A000
heap
page read and write
23F97D8B000
heap
page read and write
1800FF2D000
heap
page read and write
23BEC0B1000
heap
page read and write
23F97D84000
heap
page read and write
879807E000
stack
page read and write
23BEC0B1000
heap
page read and write
2EB0000
heap
page read and write
23F99BDE000
heap
page read and write
1BA30DDA000
heap
page read and write
1A225670000
heap
page read and write
1800FF35000
heap
page read and write
1800DFD5000
heap
page read and write
23BEBEE5000
heap
page read and write
1800FF35000
heap
page read and write
21045CA0000
heap
page read and write
221F3E10000
heap
page read and write
1BA30DB2000
heap
page read and write
B538CFF000
stack
page read and write
B538DFF000
stack
page read and write
1800E002000
heap
page read and write
2785CC67000
heap
page read and write
23F97C5E000
heap
page read and write
1EF53300000
trusted library allocation
page read and write
23F99BE4000
heap
page read and write
1800DF8D000
heap
page read and write
23BEC4C9000
heap
page read and write
18010220000
direct allocation
page execute and read and write
1BA30FC0000
trusted library allocation
page read and write
263346A0000
heap
page read and write
1800FF29000
heap
page read and write
5C7000
unkown
page readonly
23F97C82000
heap
page read and write
1BA315C0000
heap
page read and write
1800FF28000
heap
page read and write
DEC000
heap
page read and write
23BE9F14000
heap
page read and write
1800FF35000
heap
page read and write
180101B0000
direct allocation
page execute and read and write
23F99BD2000
heap
page read and write
180101C0000
trusted library allocation
page read and write
23BEBC70000
heap
page read and write
1BA315A8000
heap
page read and write
1A225610000
heap
page read and write
1800FF56000
heap
page read and write
1800FF35000
heap
page read and write
1800FF2A000
heap
page read and write
2E8C000
stack
page read and write
1800FF2E000
heap
page read and write
305A9FF000
unkown
page read and write
23BEC072000
heap
page read and write
180100C0000
direct allocation
page execute and read and write
235B5F70000
direct allocation
page execute and read and write
9844E7F000
stack
page read and write
1800FF4E000
heap
page read and write
1800FF27000
heap
page read and write
2C0F2395000
heap
page read and write
20C5C7EB000
heap
page read and write
1BA315CA000
heap
page read and write
20882CA7000
heap
page read and write
1800E002000
heap
page read and write
23BEC4C9000
heap
page read and write
180101B0000
direct allocation
page execute and read and write
23F98344000
heap
page read and write
20C5C700000
heap
page read and write
2C7336B6000
heap
page read and write
18010150000
direct allocation
page execute and read and write
2F8E000
stack
page read and write
24E2B8B0000
heap
page read and write
1434AC75000
heap
page read and write
18016C000
unkown
page readonly
1D4400AB000
heap
page read and write
2A42FBD8000
heap
page read and write
1EF53300000
direct allocation
page execute and read and write
23BEC4D8000
heap
page read and write
23BEC071000
heap
page read and write
CFC000
stack
page read and write
There are 1025 hidden memdumps, click here to show them.