IOC Report
EUR_Cert_3883774784847_CMR8494849.pdf.scr.exe

loading gif

Files

File Path
Type
Category
Malicious
EUR_Cert_3883774784847_CMR8494849.pdf.scr.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Airplane_14.bmp
JPEG image data, JFIF standard 1.01, resolution (DPI), density 100x100, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=3], baseline, precision 8, 110x110, frames 3
dropped
C:\Users\user\AppData\Local\Temp\Baglommerne127.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Colluvia.wad
data
dropped
C:\Users\user\AppData\Local\Temp\System.Net.Quic.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Undergaaedes.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\euda.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
dropped
C:\Users\user\AppData\Local\Temp\folder-drag-accept-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\nshBA9E.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\EUR_Cert_3883774784847_CMR8494849.pdf.scr.exe
"C:\Users\user\Desktop\EUR_Cert_3883774784847_CMR8494849.pdf.scr.exe"
malicious
C:\Users\user\Desktop\EUR_Cert_3883774784847_CMR8494849.pdf.scr.exe
"C:\Users\user\Desktop\EUR_Cert_3883774784847_CMR8494849.pdf.scr.exe"
malicious

URLs

Name
IP
Malicious
http://graphicdes.com/bin_MpLvP21.bin
166.62.28.114
malicious
http://graphicdes.com/
unknown
malicious
http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
unknown
http://graphicdes.com/bin_MpLvP21.binr
unknown
https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
unknown
http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.
unknown
http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD
unknown
http://www.gopher.ftp://ftp.
unknown
http://graphicdes.com/bin_MpLvP21.binA
unknown
http://graphicdes.com/bin_MpLvP21.binrN
unknown
https://github.com/dotnet/runtime
unknown
https://aka.ms/dotnetquic
unknown
There are 4 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
graphicdes.com
166.62.28.114
malicious
dual-a-0001.dc-msedge.net
131.253.33.200
e-0009.e-msedge.net
13.107.5.88

IPs

IP
Domain
Country
Malicious
166.62.28.114
graphicdes.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\metabolise\CERTIFIER
AMBULANCES
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Bay
Heatlike106
HKEY_LOCAL_MACHINE\SOFTWARE\MACLES\smattedes
hormons
HKEY_LOCAL_MACHINE\SOFTWARE\rudimentariness\TMNINGSORDNINGEN
Expand String Value
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\farveprgtig
Noedvendigste
HKEY_CURRENT_USER\SOFTWARE\domfldelsernes\isolators
curatorial
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AFTERLOSS
Respirit
HKEY_CURRENT_USER\SOFTWARE\Breakouts\Glamorous
aandsvidenskaben
HKEY_LOCAL_MACHINE\SOFTWARE\metabolise\CERTIFIER
AMBULANCES

Memdumps

Base Address
Regiontype
Protect
Malicious
1660000
remote allocation
page execute and read and write
malicious
2E80000
direct allocation
page execute and read and write
malicious
1DB89FC0000
remote allocation
page read and write
1DB8A052000
heap
page read and write
1D816CB8000
heap
page read and write
1D816C74000
heap
page read and write
5EC000
unkown
page write copy
3FF7D7E000
stack
page read and write
168A6338000
heap
page read and write
1D816CF4000
heap
page read and write
2C756277000
heap
page read and write
17B83483000
heap
page read and write
CFCA7FE000
stack
page read and write
1D8162E1000
heap
page read and write
146FC195000
heap
page read and write
1D816C81000
heap
page read and write
1D816CE4000
heap
page read and write
2A9E548F000
heap
page read and write
1D8172A6000
heap
page read and write
1EFBBC71000
heap
page read and write
1D8172C4000
heap
page read and write
2C75626C000
heap
page read and write
2C7562A4000
heap
page read and write
14A26855000
heap
page read and write
1D81755E000
heap
page read and write
168A639B000
heap
page read and write
1D816CB4000
heap
page read and write
168A63A8000
heap
page read and write
168A63A0000
heap
page read and write
1D8165DD000
heap
page read and write
1F803C4F000
heap
page read and write
168A6369000
heap
page read and write
14A26129000
heap
page read and write
1D8172A6000
heap
page read and write
1EFBBC90000
heap
page read and write
7DF000
unkown
page readonly
2C7562A4000
heap
page read and write
1D8172B9000
heap
page read and write
22C27B02000
heap
page read and write
2C7562B9000
heap
page read and write
2340EA13000
heap
page read and write
2A9E557C000
heap
page read and write
1D816C8D000
heap
page read and write
1D816CB1000
heap
page read and write
178B5B40000
trusted library allocation
page read and write
1D816CB8000
heap
page read and write
1D816CD5000
heap
page read and write
14A25713000
heap
page read and write
168A6537000
heap
page read and write
14A256BE000
heap
page read and write
168A63D6000
heap
page read and write
1D817234000
heap
page read and write
1D816D45000
heap
page read and write
22C2D907000
trusted library allocation
page read and write
FE94F7C000
unkown
page read and write
22C2D8A0000
trusted library allocation
page read and write
1F9AB8C5000
heap
page read and write
2A9E5F4E000
heap
page read and write
1937DC69000
heap
page read and write
2B2D67E000
stack
page read and write
178B5202000
heap
page read and write
1D817234000
heap
page read and write
1D816C25000
heap
page read and write
14A26875000
heap
page read and write
178B5271000
heap
page read and write
1D816CCD000
heap
page read and write
168A6688000
heap
page read and write
1CB81000
heap
page read and write
19AA000
heap
page read and write
1D81633E000
heap
page read and write
2B2D6FE000
stack
page read and write
1974000
heap
page read and write
22C27A30000
heap
page read and write
1EFBBC98000
heap
page read and write
168A5750000
heap
page read and write
1F9AB8C7000
heap
page read and write
22C2D8C0000
trusted library allocation
page read and write
8D4000
heap
page read and write
168A6378000
heap
page read and write
1D817227000
heap
page read and write
8D4000
heap
page read and write
1D816CD7000
heap
page read and write
22C2969C000
heap
page read and write
1D816D11000
heap
page read and write
1D81721E000
heap
page read and write
1D816BAC000
heap
page read and write
1F803C2A000
heap
page read and write
1D81637D000
heap
page read and write
1D816CD5000
heap
page read and write
1D9CC000
trusted library allocation
page execute and read and write
34B9000
trusted library allocation
page read and write
1F803C02000
heap
page read and write
168A6337000
heap
page read and write
168A6680000
heap
page read and write
1D829000
trusted library allocation
page execute and read and write
2A9E53B0000
heap
page read and write
1EFBBCA5000
heap
page read and write
2C756190000
heap
page read and write
1EFBBD02000
heap
page read and write
400000
unkown
page readonly
7DF000
unkown
page readonly
1EFBBC8B000
heap
page read and write
3FF807E000
stack
page read and write
17B834A1000
heap
page read and write
1D8172A2000
heap
page read and write
14A256A6000
heap
page read and write
1D816CC9000
heap
page read and write
2B2D57F000
stack
page read and write
2C7562B9000
heap
page read and write
1D816CD3000
heap
page read and write
1D816CA1000
heap
page read and write
17B8347E000
heap
page read and write
17B8347E000
heap
page read and write
1D816CBA000
heap
page read and write
17B83472000
heap
page read and write
168A57D1000
heap
page read and write
1D816CD4000
heap
page read and write
408000
unkown
page readonly
2A9E5FB0000
heap
page read and write
22C2DA00000
trusted library allocation
page read and write
22C27AE2000
heap
page read and write
22C27AA1000
heap
page read and write
1D8162DF000
heap
page read and write
14A26191000
heap
page read and write
1D816C57000
heap
page read and write
14A26847000
heap
page read and write
1DB89FC0000
remote allocation
page read and write
1D816C57000
heap
page read and write
1EFBC400000
heap
page read and write
17B83472000
heap
page read and write
40A000
unkown
page write copy
1EFBBA10000
heap
page read and write
17B834AE000
heap
page read and write
1EFBB9B0000
heap
page read and write
2E00000
trusted library allocation
page read and write
1D817239000
heap
page read and write
168A63BF000
heap
page read and write
1D816343000
heap
page read and write
1D8162B6000
heap
page read and write
14A26181000
heap
page read and write
22C29675000
heap
page read and write
1D816CF2000
heap
page read and write
1DB8A077000
heap
page read and write
1D816C8B000
heap
page read and write
1EFBBC5F000
heap
page read and write
5E8000
unkown
page write copy
1D816BF7000
heap
page read and write
1937DC46000
heap
page read and write
1F9AB8A0000
heap
page read and write
17B8347E000
heap
page read and write
2C756230000
heap
page read and write
17B83483000
heap
page read and write
1D816CA2000
heap
page read and write
40A000
unkown
page write copy
1CC0000
heap
page read and write
2340EA3E000
heap
page read and write
2C7562B9000
heap
page read and write
17B83513000
heap
page read and write
AAEE07E000
stack
page read and write
1D816CF5000
heap
page read and write
382477E000
stack
page read and write
22C29662000
heap
page read and write
2B2D87F000
stack
page read and write
17B8346E000
heap
page read and write
1D817227000
heap
page read and write
1D816D0B000
heap
page read and write
7A6000
unkown
page read and write
1D816D3D000
heap
page read and write
14A26859000
heap
page read and write
1F9ABAF0000
heap
page read and write
2A9E5582000
heap
page read and write
15FE97F000
stack
page read and write
1D816D0F000
heap
page read and write
5471B7C000
stack
page read and write
14A2687F000
heap
page read and write
17B83483000
heap
page read and write
168A57D4000
heap
page read and write
1D816CC7000
heap
page read and write
1D816D24000
heap
page read and write
146FC18B000
heap
page read and write
1937DC53000
heap
page read and write
22C27970000
unclassified section
page readonly
3020000
heap
page read and write
3FF7F7F000
stack
page read and write
2A9E5C70000
trusted library allocation
page read and write
1D816C93000
heap
page read and write
1D816CC4000
heap
page read and write
54721FD000
stack
page read and write
14A26845000
heap
page read and write
1D816BFF000
heap
page read and write
22C28300000
heap
page read and write
19AA000
heap
page read and write
1D816CD5000
heap
page read and write
24EEE7C000
stack
page read and write
22C27ACC000
heap
page read and write
22C2D901000
trusted library allocation
page read and write
2C7564DD000
heap
page read and write
2C756253000
heap
page read and write
2340EA3B000
heap
page read and write
1F9AB860000
heap
page read and write
1D816D35000
heap
page read and write
1F803C13000
heap
page read and write
17B83483000
heap
page read and write
168A63CC000
heap
page read and write
1D816354000
heap
page read and write
1D816CE3000
heap
page read and write
1D8162E8000
heap
page read and write
1D81637E000
heap
page read and write
89E000
stack
page read and write
1D816CCD000
heap
page read and write
168A653A000
heap
page read and write
98000
stack
page read and write
69EAD7A000
stack
page read and write
718B0000
unkown
page readonly
1D8172C1000
heap
page read and write
FE95577000
stack
page read and write
1D8162E8000
heap
page read and write
1D81637D000
heap
page read and write
168A63CB000
heap
page read and write
1F9AB89F000
heap
page read and write
1D816CEE000
heap
page read and write
17B8347A000
heap
page read and write
168A637E000
heap
page read and write
1D816CFC000
heap
page read and write
1D816CC7000
heap
page read and write
14A26859000
heap
page read and write
17B8347A000
heap
page read and write
19B7000
heap
page read and write
178B51C0000
trusted library allocation
page read and write
17B834A9000
heap
page read and write
2A9E5360000
heap
page read and write
168A637B000
heap
page read and write
14A26806000
heap
page read and write
2A9E5463000
heap
page read and write
168A63A8000
heap
page read and write
1F9ABAE5000
heap
page read and write
1937DC6D000
heap
page read and write
14A25510000
heap
page read and write
14A26100000
heap
page read and write
1D8174C0000
heap
page read and write
14A25695000
heap
page read and write
1D816364000
heap
page read and write
1F9AC12F000
heap
page read and write
1D816CE7000
heap
page read and write
168A63A7000
heap
page read and write
17B8342E000
heap
page read and write
22C27A00000
heap
page read and write
1EFBBC60000
heap
page read and write
22C2D8A0000
trusted library allocation
page read and write
1D816C57000
heap
page read and write
1D816CF9000
heap
page read and write
17B83475000
heap
page read and write
F20000
heap
page read and write
1D816D45000
heap
page read and write
1D816CA1000
heap
page read and write
1D816C20000
heap
page read and write
1D817259000
heap
page read and write
1D816CEB000
heap
page read and write
14A268B8000
heap
page read and write
17B83400000
heap
page read and write
400000
unkown
page readonly
1D817239000
heap
page read and write
1F803C00000
heap
page read and write
1D816CCC000
heap
page read and write
40A000
unkown
page write copy
1F9AC121000
heap
page read and write
178B526C000
heap
page read and write
17B8347E000
heap
page read and write
1937DC62000
heap
page read and write
19A3000
heap
page read and write
1D816CF0000
heap
page read and write
15FE87D000
stack
page read and write
168A653B000
heap
page read and write
1D816C95000
heap
page read and write
8D4000
heap
page read and write
1D816B9A000
heap
page read and write
1D816C10000
heap
page read and write
22C2DA60000
remote allocation
page read and write
1D816348000
heap
page read and write
2C75626F000
heap
page read and write
A5C000
heap
page read and write
1D82D000
trusted library allocation
page execute and read and write
22C27A40000
heap
page read and write
1EFBBCA4000
heap
page read and write
19C6000
heap
page read and write
1D816CB5000
heap
page read and write
1D816CDC000
heap
page read and write
14A2612C000
heap
page read and write
1D81733A000
heap
page read and write
1D817502000
heap
page read and write
17B8347E000
heap
page read and write
1D816D11000
heap
page read and write
168A6380000
heap
page read and write
8D4000
heap
page read and write
1D816C74000
heap
page read and write
1D816D40000
heap
page read and write
168A6535000
heap
page read and write
17B834A7000
heap
page read and write
168A63B6000
heap
page read and write
178B5282000
heap
page read and write
2340EA9B000
heap
page read and write
1937DC58000
heap
page read and write
22C27A93000
heap
page read and write
14A26137000
heap
page read and write
17B83483000
heap
page read and write
1D817264000
heap
page read and write
168A63A8000
heap
page read and write
168A57E4000
heap
page read and write
1D816CDB000
heap
page read and write
1D816CD5000
heap
page read and write
168A63CC000
heap
page read and write
1D816C05000
heap
page read and write
168A638E000
heap
page read and write
1D8172A2000
heap
page read and write
14A25613000
heap
page read and write
11E000
stack
page read and write
17B834A8000
heap
page read and write
2A9E600A000
heap
page read and write
2A9E5413000
heap
page read and write
1D816C87000
heap
page read and write
168A6534000
heap
page read and write
14A2612D000
heap
page read and write
22C2975E000
heap
page read and write
2A9E55AE000
heap
page read and write
1937DC96000
heap
page read and write
22C2D8D7000
trusted library allocation
page read and write
17B83483000
heap
page read and write
1F803C56000
heap
page read and write
17B8342F000
heap
page read and write
1D816D45000
heap
page read and write
14A25600000
heap
page read and write
22C2D95B000
trusted library allocation
page read and write
1EFBBCBB000
heap
page read and write
1D816CD3000
heap
page read and write
1C0000
remote allocation
page read and write
168A596B000
heap
page read and write
22C2D92A000
trusted library allocation
page read and write
3021000
heap
page read and write
1F9AC135000
heap
page read and write
1D8162D0000
heap
page read and write
22C2D9D0000
trusted library allocation
page read and write
2A9E5F5F000
heap
page read and write
1937DC5B000
heap
page read and write
14A25F50000
remote allocation
page read and write
FE9537B000
stack
page read and write
168A636E000
heap
page read and write
1D816C5A000
heap
page read and write
168A63B7000
heap
page read and write
14A255C0000
unclassified section
page readonly
1D816C01000
heap
page read and write
2340EA40000
heap
page read and write
168A57B3000
heap
page read and write
178B5B00000
trusted library allocation
page read and write
22C27AC7000
heap
page read and write
19A3000
heap
page read and write
168A669C000
heap
page read and write
17B83360000
unclassified section
page readonly
1D816C25000
heap
page read and write
1D816361000
heap
page read and write
168A63D6000
heap
page read and write
14A25681000
heap
page read and write
168A57D1000
heap
page read and write
1D816D24000
heap
page read and write
1DB8A000000
heap
page read and write
1D816CF1000
heap
page read and write
2A9E5E02000
heap
page read and write
1937DC59000
heap
page read and write
626000
unkown
page write copy
401000
unkown
page execute read
1937DC64000
heap
page read and write
2A9E5FD0000
heap
page read and write
17B83479000
heap
page read and write
1937DC6F000
heap
page read and write
22C29664000
heap
page read and write
1EFBBD13000
heap
page read and write
2C756430000
heap
page read and write
1D816CD4000
heap
page read and write
1DB89FC0000
remote allocation
page read and write
2B2D7F9000
stack
page read and write
1D817239000
heap
page read and write
17B8347E000
heap
page read and write
1D817250000
heap
page read and write
1EFBBB80000
trusted library allocation
page read and write
22C27ADC000
heap
page read and write
1D816D45000
heap
page read and write
1D8162BD000
heap
page read and write
1F803AD0000
heap
page read and write
168A653A000
heap
page read and write
17B834A8000
heap
page read and write
2D0F000
stack
page read and write
1EFBBC70000
heap
page read and write
1D816CA5000
heap
page read and write
1DB8A12D000
heap
page read and write
1D816C25000
heap
page read and write
22C2D990000
trusted library allocation
page read and write
2C7562A4000
heap
page read and write
168A63B6000
heap
page read and write
1EFBBC13000
heap
page read and write
2C756238000
heap
page read and write
1937DC4D000
heap
page read and write
2C75626F000
heap
page read and write
146FC1AE000
heap
page read and write
168A63A8000
heap
page read and write
1D816C3C000
heap
page read and write
2A9E5F8F000
heap
page read and write
1D8162E1000
heap
page read and write
2A9E5F4C000
heap
page read and write
17B83472000
heap
page read and write
22C2975C000
heap
page read and write
2A9E5584000
heap
page read and write
17B8347E000
heap
page read and write
1D816D08000
heap
page read and write
1D817234000
heap
page read and write
1D816C5A000
heap
page read and write
1DB8A095000
heap
page read and write
3823F1B000
stack
page read and write
1D816CA5000
heap
page read and write
30000
heap
page read and write
1D817276000
heap
page read and write
22C2D8FE000
trusted library allocation
page read and write
1D81736B000
heap
page read and write
14A2617C000
heap
page read and write
1D816C74000
heap
page read and write
1EFBBC5E000
heap
page read and write
AAEE27A000
stack
page read and write
14A26129000
heap
page read and write
1D816CA5000
heap
page read and write
1937DC78000
heap
page read and write
1D8172C4000
heap
page read and write
2C7562B1000
heap
page read and write
7A4000
unkown
page read and write
178B5170000
heap
page read and write
1EFBBC8B000
heap
page read and write
1D816368000
heap
page read and write
17B83483000
heap
page read and write
1D816D35000
heap
page read and write
1D816BE0000
heap
page read and write
15FE77F000
stack
page read and write
1937DC5A000
heap
page read and write
22C28359000
heap
page read and write
1F9AC126000
heap
page read and write
1D816280000
heap
page read and write
178B5AD0000
trusted library allocation
page read and write
2C7562B1000
heap
page read and write
2A9E6023000
heap
page read and write
17B83E02000
heap
page read and write
5F2000
unkown
page write copy
17B834A7000
heap
page read and write
1D816D20000
heap
page read and write
1D816CEA000
heap
page read and write
1D816C57000
heap
page read and write
A9E000
heap
page read and write
1937DC52000
heap
page read and write
7AD000
unkown
page read and write
2340EA7A000
heap
page read and write
1D816CD7000
heap
page read and write
1F803C40000
heap
page read and write
1D816CF7000
heap
page read and write
1C0000
remote allocation
page read and write
14A25F50000
remote allocation
page read and write
1EFBBC32000
heap
page read and write
168A63C2000
heap
page read and write
22C29646000
heap
page read and write
168A639F000
heap
page read and write
168A5849000
heap
page read and write
7A0000
unkown
page read and write
14A25663000
heap
page read and write
1D816CC3000
heap
page read and write
1F9ABAED000
heap
page read and write
1D816C5E000
heap
page read and write
17B8347E000
heap
page read and write
17B83475000
heap
page read and write
382467A000
stack
page read and write
1937DC4A000
heap
page read and write
1D816C57000
heap
page read and write
1DB8A113000
heap
page read and write
1D81729C000
heap
page read and write
1D816CE3000
heap
page read and write
FE9507E000
unkown
page read and write
168A6532000
heap
page read and write
2340EA24000
heap
page read and write
1D816C57000
heap
page read and write
1D816CD5000
heap
page read and write
1D817344000
heap
page read and write
14A256AF000
heap
page read and write
1D816BF3000
heap
page read and write
1D816CD0000
heap
page read and write
146FBFC0000
heap
page read and write
17B8347A000
heap
page read and write
14A256C2000
heap
page read and write
22C2D880000
trusted library allocation
page read and write
17B834A9000
heap
page read and write
1D816BE0000
heap
page read and write
2B2D5FF000
stack
page read and write
178B5261000
heap
page read and write
1D817250000
heap
page read and write
1DB89F90000
trusted library allocation
page read and write
8D4000
heap
page read and write
14A268A0000
heap
page read and write
3FEB67F000
stack
page read and write
17B8347E000
heap
page read and write
17B8349F000
heap
page read and write
2C756293000
heap
page read and write
14A26161000
heap
page read and write
17B8347E000
heap
page read and write
CFCA77E000
stack
page read and write
1D816367000
heap
page read and write
1D817503000
heap
page read and write
17B83483000
heap
page read and write
F3FA9DA000
stack
page read and write
27CF000
stack
page read and write
1D816D5C000
heap
page read and write
1D816CA3000
heap
page read and write
2A9E6012000
heap
page read and write
1DB89D70000
heap
page read and write
1D816BF6000
heap
page read and write
1D816CC7000
heap
page read and write
22C28302000
heap
page read and write
168A57E9000
heap
page read and write
2C756253000
heap
page read and write
168A6533000
heap
page read and write
17B8347E000
heap
page read and write
168A63BF000
heap
page read and write
168A63B6000
heap
page read and write
2A9E54B8000
heap
page read and write
1D816C88000
heap
page read and write
1D816B92000
heap
page read and write
1D816B98000
heap
page read and write
17B8347A000
heap
page read and write
1D817232000
heap
page read and write
1D816362000
heap
page read and write
2340EA83000
heap
page read and write
2C756293000
heap
page read and write
1937DC00000
heap
page read and write
17B83472000
heap
page read and write
C1E000
stack
page read and write
1D816343000
heap
page read and write
146FC100000
heap
page read and write
17B8347E000
heap
page read and write
1D816C74000
heap
page read and write
17B83471000
heap
page read and write
F25000
heap
page read and write
1F9ABAEE000
heap
page read and write
168A5965000
heap
page read and write
1D816D35000
heap
page read and write
19A1000
heap
page read and write
168A63C4000
heap
page read and write
168A63B7000
heap
page read and write
22C2D8E0000
trusted library allocation
page read and write
17B83483000
heap
page read and write
22C2D9C7000
trusted library allocation
page read and write
85E000
stack
page read and write
1D817232000
heap
page read and write
2A9E557D000
heap
page read and write
168A634E000
heap
page read and write
1D816CDB000
heap
page read and write
1D816288000
heap
page read and write
2A9E6002000
heap
page read and write
1D816CC0000
heap
page read and write
1D816CC0000
heap
page read and write
1F9AC120000
heap
page read and write
1D817210000
heap
page read and write
17B83E15000
heap
page read and write
2A9E5FBE000
heap
page read and write
17B83483000
heap
page read and write
15FE8FF000
stack
page read and write
1D816C74000
heap
page read and write
22C29756000
heap
page read and write
14A26140000
heap
page read and write
1D817359000
heap
page read and write
1D816C81000
heap
page read and write
14A2573B000
heap
page read and write
1D816CC0000
heap
page read and write
1DB8A0A0000
heap
page read and write
14A25580000
heap
page read and write
22C29081000
trusted library allocation
page read and write
1D816CE3000
heap
page read and write
1D816BC1000
heap
page read and write
14A2562A000
heap
page read and write
1D816CCD000
heap
page read and write
168A63AB000
heap
page read and write
24EEEFE000
stack
page read and write
1D816CD5000
heap
page read and write
54720FE000
stack
page read and write
1D816CAD000
heap
page read and write
1D816190000
heap
page read and write
2A9E5440000
heap
page read and write
22C29654000
heap
page read and write
547227F000
stack
page read and write
2340EA99000
heap
page read and write
1D816C5E000
heap
page read and write
1D816CAD000
heap
page read and write
14A2616B000
heap
page read and write
1D817285000
heap
page read and write
22C27A98000
heap
page read and write
17B8347E000
heap
page read and write
5471AFF000
stack
page read and write
1D816C9E000
heap
page read and write
1D816BD3000
heap
page read and write
168A57B8000
heap
page read and write
1DB8A013000
heap
page read and write
1DB8BA02000
trusted library allocation
page read and write
168A63B6000
heap
page read and write
168A57DE000
heap
page read and write
1937DC51000
heap
page read and write
1D8161F0000
heap
page read and write
1D816CE5000
heap
page read and write
15FE2D7000
stack
page read and write
1D816C5E000
heap
page read and write
14A26871000
heap
page read and write
1D816B92000
heap
page read and write
69EB8FF000
stack
page read and write
1EFBBC6A000
heap
page read and write
1D816CB2000
heap
page read and write
1D816C57000
heap
page read and write
1D816C5E000
heap
page read and write
1D816C01000
heap
page read and write
22C2D9CA000
trusted library allocation
page read and write
2C756277000
heap
page read and write
22C27ABF000
heap
page read and write
1D816D16000
heap
page read and write
22C2D91A000
trusted library allocation
page read and write
1D817227000
heap
page read and write
14A2567E000
heap
page read and write
1D816C95000
heap
page read and write
44295CE000
stack
page read and write
1DB8A128000
heap
page read and write
1C0000
remote allocation
page read and write
1EFBBC53000
heap
page read and write
1DB8A067000
heap
page read and write
168A5806000
heap
page read and write
1D816D0B000
heap
page read and write
1D816C0F000
heap
page read and write
22C29751000
heap
page read and write
22C2D8A2000
trusted library allocation
page read and write
14A2617C000
heap
page read and write
1D816CBF000
heap
page read and write
44294CB000
stack
page read and write
168A57A4000
heap
page read and write
14A256C8000
heap
page read and write
1D8162E8000
heap
page read and write
17B834A7000
heap
page read and write
168A6691000
heap
page read and write
1D816CCD000
heap
page read and write
1D816C5A000
heap
page read and write
2C7562B9000
heap
page read and write
1F9AB8C3000
heap
page read and write
1937DC33000
heap
page read and write
168A669C000
heap
page read and write
1D816C5A000
heap
page read and write
22C2D92D000
trusted library allocation
page read and write
1937DC67000
heap
page read and write
168A63D4000
heap
page read and write
E1F000
stack
page read and write
1D817276000
heap
page read and write
718B1000
unkown
page execute read
16EA6FD000
stack
page read and write
1D816BE0000
heap
page read and write
22C29654000
heap
page read and write
24EF0FF000
stack
page read and write
1D816CC0000
heap
page read and write
22C2D8DA000
trusted library allocation
page read and write
19C0000
heap
page read and write
1D816CBA000
heap
page read and write
1D816C5E000
heap
page read and write
178B5160000
unclassified section
page readonly
1D816367000
heap
page read and write
1D816C5A000
heap
page read and write
178B5B10000
trusted library allocation
page read and write
1D816CD0000
heap
page read and write
1D81722E000
heap
page read and write
168A5849000
heap
page read and write
17B83320000
heap
page read and write
1F9AC12D000
heap
page read and write
14A26129000
heap
page read and write
22C27AB7000
heap
page read and write
1937DCA8000
heap
page read and write
FE94E7B000
stack
page read and write
2A9E5F00000
heap
page read and write
FE9547E000
stack
page read and write
1D816C74000
heap
page read and write
400000
unkown
page readonly
1D817276000
heap
page read and write
1F803C6E000
heap
page read and write
1D816D35000
heap
page read and write
1D816CBF000
heap
page read and write
1D81736B000
heap
page read and write
168A653E000
heap
page read and write
1D81722E000
heap
page read and write
1D816D0F000
heap
page read and write
14A268A8000
heap
page read and write
1D816CA2000
heap
page read and write
1D816C08000
heap
page read and write
F3FAC7F000
stack
page read and write
168A5797000
heap
page read and write
1D816C57000
heap
page read and write
17B83483000
heap
page read and write
1DB8A00B000
heap
page read and write
1D816CEC000
heap
page read and write
1EFBBCAE000
heap
page read and write
1D816353000
heap
page read and write
1D816CC7000
heap
page read and write
1937DC36000
heap
page read and write
178B5B50000
trusted library allocation
page read and write
14A26174000
heap
page read and write
1D816C82000
heap
page read and write
401000
unkown
page execute read
1F9AB868000
heap
page read and write
1D816D45000
heap
page read and write
1937DC66000
heap
page read and write
16EA978000
stack
page read and write
1D816D06000
heap
page read and write
22C2D980000
trusted library allocation
page read and write
17B8347E000
heap
page read and write
1D817227000
heap
page read and write
14A2613B000
heap
page read and write
168A63DE000
heap
page read and write
1F9AC125000
heap
page read and write
198D000
heap
page read and write
146FC180000
heap
page read and write
178B5AE0000
trusted library allocation
page read and write
516000
unkown
page write copy
14A25693000
heap
page read and write
1D816B98000
heap
page read and write
22C28319000
heap
page read and write
1D816C10000
heap
page read and write
22C296CA000
heap
page read and write
3021000
heap
page read and write
8D4000
heap
page read and write
A28000
heap
page read and write
14A2615E000
heap
page read and write
168A63C7000
heap
page read and write
1D816CA9000
heap
page read and write
1D816376000
heap
page read and write
400000
unkown
page readonly
1D816CEE000
heap
page read and write
168A63E1000
heap
page read and write
168A63D4000
heap
page read and write
17B83483000
heap
page read and write
14A26864000
heap
page read and write
2340EA8F000
heap
page read and write
22C27ADE000
heap
page read and write
22C2D8BF000
trusted library allocation
page read and write
401000
unkown
page execute read
2340EA86000
heap
page read and write
19A1000
heap
page read and write
1D816CE5000
heap
page read and write
2340EA00000
heap
page read and write
2C7564E6000
heap
page read and write
1D816332000
heap
page read and write
1D816CAC000
heap
page read and write
1D816C08000
heap
page read and write
14A26814000
heap
page read and write
22C27A51000
heap
page read and write
1DB8A02A000
heap
page read and write
1D816C5A000
heap
page read and write
168A653E000
heap
page read and write
1D8162E1000
heap
page read and write
1D816C74000
heap
page read and write
1C0000
remote allocation
page read and write
1D816362000
heap
page read and write
1D816D3D000
heap
page read and write
1D8162DE000
heap
page read and write
168A5806000
heap
page read and write
168A57B7000
heap
page read and write
1D816C91000
heap
page read and write
1D816CE2000
heap
page read and write
1937DD02000
heap
page read and write
1D816D0F000
heap
page read and write
1F803C49000
heap
page read and write
1D81722E000
heap
page read and write
17B8347E000
heap
page read and write
1D81755F000
heap
page read and write
1D81721B000
heap
page read and write
2C756293000
heap
page read and write
17B83483000
heap
page read and write
168A6698000
heap
page read and write
17B8342A000
heap
page read and write
22C27A13000
heap
page read and write
1D8172F6000
heap
page read and write
14A2610E000
heap
page read and write
408000
unkown
page readonly
22C2D8EE000
trusted library allocation
page read and write
7DF000
unkown
page readonly
1937DA50000
heap
page read and write
1D816CF0000
heap
page read and write
1D816332000
heap
page read and write
15FE9FD000
stack
page read and write
22C277F0000
heap
page read and write
1D8165D0000
heap
page read and write
1D816CE7000
heap
page read and write
1D816D5C000
heap
page read and write
178B5B20000
trusted library allocation
page read and write
22C2835A000
heap
page read and write
1989000
heap
page read and write
1D816CCD000
heap
page read and write
1D816CA3000
heap
page read and write
1D816CB0000
heap
page read and write
1D816367000
heap
page read and write
2C756440000
heap
page read and write
AAEDACB000
stack
page read and write
1937DB70000
heap
page read and write
1D816376000
heap
page read and write
14A25E90000
trusted library allocation
page read and write
198D000
heap
page read and write
1D816CA3000
heap
page read and write
1D816C74000
heap
page read and write
1F9AB8BD000
heap
page read and write
1D816D0F000
heap
page read and write
1D816CE2000
heap
page read and write
1D817503000
heap
page read and write
1937DCA3000
heap
page read and write
22C27B17000
heap
page read and write
1D816CB2000
heap
page read and write
22C29702000
heap
page read and write
1D816D06000
heap
page read and write
17B83413000
heap
page read and write
1D816C81000
heap
page read and write
CFCA3DE000
stack
page read and write
178B5AB0000
trusted library allocation
page read and write
1D817234000
heap
page read and write
1D816372000
heap
page read and write
DE000
stack
page read and write
1D816BA5000
heap
page read and write
14A268A0000
heap
page read and write
1D816C8D000
heap
page read and write
1D816CE3000
heap
page read and write
17B8347E000
heap
page read and write
22C2D904000
trusted library allocation
page read and write
718B4000
unkown
page readonly
1D816361000
heap
page read and write
17B83471000
heap
page read and write
2A9E5513000
heap
page read and write
146FC445000
heap
page read and write
2340EB02000
heap
page read and write
1D816D44000
heap
page read and write
1F9AB89B000
heap
page read and write
1EFBBC4E000
heap
page read and write
40A000
unkown
page write copy
1D816D40000
heap
page read and write
F3FADFE000
stack
page read and write
1D816CB2000
heap
page read and write
1D816CE3000
heap
page read and write
168A63C8000
heap
page read and write
2C756130000
heap
page read and write
15FE67E000
stack
page read and write
168A639B000
heap
page read and write
1D816343000
heap
page read and write
1D816D3D000
heap
page read and write
14A26174000
heap
page read and write
2A9E548D000
heap
page read and write
7DF000
unkown
page readonly
14A25702000
heap
page read and write
1D816CC0000
heap
page read and write
1DB89EF0000
unclassified section
page readonly
1D816CD7000
heap
page read and write
17B83483000
heap
page read and write
2A9E55AE000
heap
page read and write
2A9E5571000
heap
page read and write
2C7564E4000
heap
page read and write
37AB000
stack
page read and write
22C29662000
heap
page read and write
1DB8A082000
heap
page read and write
1937DBC0000
trusted library allocation
page read and write
1D817503000
heap
page read and write
1D816D08000
heap
page read and write
22C2969F000
heap
page read and write
27D0000
heap
page read and write
2B2D8F9000
stack
page read and write
168A63C2000
heap
page read and write
14A2687B000
heap
page read and write
2A9E54BD000
heap
page read and write
22C2D9E0000
trusted library allocation
page read and write
1D817359000
heap
page read and write
2A9E5F85000
heap
page read and write
1D8162DE000
heap
page read and write
1D816CCD000
heap
page read and write
14A26129000
heap
page read and write
1D816C85000
heap
page read and write
14A2688A000
heap
page read and write
2C756435000
heap
page read and write
178B5200000
heap
page read and write
22C2D970000
trusted library allocation
page read and write
2A9E55C3000
heap
page read and write
400000
unkown
page readonly
22C27860000
heap
page read and write
1D816D1C000
heap
page read and write
1D816CCD000
heap
page read and write
1D817339000
heap
page read and write
1D816C5A000
heap
page read and write
1D10F000
stack
page read and write
17B8347A000
heap
page read and write
1D816377000
heap
page read and write
1D816D44000
heap
page read and write
1D67F000
trusted library allocation
page read and write
1D816C5E000
heap
page read and write
14A2566F000
heap
page read and write
14A256F8000
heap
page read and write
27D4000
heap
page read and write
1D816BF3000
heap
page read and write
17B83475000
heap
page read and write
1EFBBC77000
heap
page read and write
146FC1B8000
heap
page read and write
1D817239000
heap
page read and write
2C7562B7000
heap
page read and write
1937D9E0000
heap
page read and write
1D816BFC000
heap
page read and write
1D8162E8000
heap
page read and write
17B83471000
heap
page read and write
17B83471000
heap
page read and write
22C27AD8000
heap
page read and write
146FC1B8000
heap
page read and write
45349FE000
stack
page read and write
22C2DA60000
remote allocation
page read and write
7B3000
unkown
page read and write
1D8162B6000
heap
page read and write
1D816C25000
heap
page read and write
1D817386000
heap
page read and write
178B5240000
heap
page read and write
1D816367000
heap
page read and write
401000
unkown
page execute read
1D816CE2000
heap
page read and write
22C29662000
heap
page read and write
14A256BF000
heap
page read and write
1D816C2B000
heap
page read and write
1D8162BD000
heap
page read and write
22C27B06000
heap
page read and write
2A9E53A0000
unclassified section
page readonly
17B8343B000
heap
page read and write
1D816D44000
heap
page read and write
24EF17F000
stack
page read and write
168A6696000
heap
page read and write
1937DC49000
heap
page read and write
1D8165D9000
heap
page read and write
2C756400000
trusted library allocation
page read and write
14A2612B000
heap
page read and write
1DB89F00000
heap
page read and write
17B8347A000
heap
page read and write
1D816C5A000
heap
page read and write
2A9E5495000
heap
page read and write
1937DB60000
unclassified section
page readonly
1D816BCD000
heap
page read and write
22C29654000
heap
page read and write
2C7562B1000
heap
page read and write
178B5AC0000
trusted library allocation
page read and write
1D8165B0000
remote allocation
page read and write
1DB8A040000
heap
page read and write
1D816CC0000
heap
page read and write
168A63D4000
heap
page read and write
19A000
stack
page read and write
D1F000
stack
page read and write
2340F402000
trusted library allocation
page read and write
1D816BE0000
heap
page read and write
168A63BF000
heap
page read and write
1F9AB8BE000
heap
page read and write
1D816D0F000
heap
page read and write
3470000
trusted library allocation
page read and write
168A63A1000
heap
page read and write
22C2967C000
heap
page read and write
22C2D820000
trusted library allocation
page read and write
1D816C12000
heap
page read and write
168A5970000
heap
page read and write
22C2D970000
trusted library allocation
page read and write
1D8174D8000
heap
page read and write
168A6382000
heap
page read and write
17B834B0000
heap
page read and write
1D816C93000
heap
page read and write
1DB89F50000
trusted library allocation
page read and write
1D816D24000
heap
page read and write
1D816CAF000
heap
page read and write
3FEADFF000
stack
page read and write
2A9E5580000
heap
page read and write
1D8172C4000
heap
page read and write
1D816CDB000
heap
page read and write
1D81726B000
heap
page read and write
146FC280000
heap
page read and write
1D817229000
heap
page read and write
40A000
unkown
page read and write
1D816C1F000
heap
page read and write
453467B000
stack
page read and write
17D0000
heap
page read and write
1D816C57000
heap
page read and write
1D816C25000
heap
page read and write
14A2616B000
heap
page read and write
168A63D4000
heap
page read and write
1D816C08000
heap
page read and write
22C29722000
heap
page read and write
1F9ABAE0000
heap
page read and write
1D816CF2000
heap
page read and write
17B834A8000
heap
page read and write
1D816D02000
heap
page read and write
1D816C92000
heap
page read and write
2C756258000
heap
page read and write
1D817283000
heap
page read and write
1D816CF5000
heap
page read and write
1D816D5C000
heap
page read and write
22C2D8D0000
trusted library allocation
page read and write
1D816BFE000
heap
page read and write
14A26132000
heap
page read and write
1F803C33000
heap
page read and write
1D816BE0000
heap
page read and write
1D816C25000
heap
page read and write
1D8172D7000
heap
page read and write
1D8165DC000
heap
page read and write
168A63B6000
heap
page read and write
17B834A1000
heap
page read and write
1D816CE8000
heap
page read and write
CFCA67E000
stack
page read and write
2A9E549A000
heap
page read and write
1D816367000
heap
page read and write
17B834A7000
heap
page read and write
17B83471000
heap
page read and write
1D816C11000
heap
page read and write
1937DC94000
heap
page read and write
1D817239000
heap
page read and write
1D817509000
heap
page read and write
1D816D43000
heap
page read and write
38243F9000
stack
page read and write
14A26000000
heap
page read and write
14A26179000
heap
page read and write
3FF817E000
stack
page read and write
1D816CF5000
heap
page read and write
1D816CC2000
heap
page read and write
2C756293000
heap
page read and write
1EFBBB20000
unclassified section
page readonly
1D816CB2000
heap
page read and write
3FEAFFE000
stack
page read and write
14A255D0000
heap
page read and write
22C27ACE000
heap
page read and write
22C2D8E3000
trusted library allocation
page read and write
1D816C25000
heap
page read and write
1D816C74000
heap
page read and write
19C9000
heap
page read and write
1D816CEE000
heap
page read and write
17B8347E000
heap
page read and write
1D816CC0000
heap
page read and write
788000
unkown
page read and write
14A2687B000
heap
page read and write
17B8343B000
heap
page read and write
1D817358000
heap
page read and write
168A63A8000
heap
page read and write
14A256C2000
heap
page read and write
1937DC4C000
heap
page read and write
168A57D4000
heap
page read and write
178B5B80000
trusted library allocation
page read and write
22C28215000
heap
page read and write
14A26176000
heap
page read and write
1937DC57000
heap
page read and write
1937DC40000
heap
page read and write
1D816BE0000
heap
page read and write
1D556000
trusted library allocation
page read and write
1D816D0F000
heap
page read and write
19B7000
heap
page read and write
408000
unkown
page readonly
1D816CD0000
heap
page read and write
1D816B81000
heap
page read and write
178B5232000
heap
page read and write
1D8164C0000
trusted library allocation
page read and write
1D816CA2000
heap
page read and write
1D816C25000
heap
page read and write
22C2D917000
trusted library allocation
page read and write
28C0000
heap
page read and write
14A2616F000
heap
page read and write
E20000
trusted library allocation
page read and write
1D81738B000
heap
page read and write
17B83471000
heap
page read and write
2340EA58000
heap
page read and write
1D816D3D000
heap
page read and write
1EFBBC75000
heap
page read and write
1F8043E0000
trusted library allocation
page read and write
17B834AB000
heap
page read and write
1D816BFE000
heap
page read and write
2C7562B7000
heap
page read and write
22C28200000
heap
page read and write
1D816348000
heap
page read and write
1D8162E1000
heap
page read and write
1D816D08000
heap
page read and write
1D8172A4000
heap
page read and write
1D817509000
heap
page read and write
168A6537000
heap
page read and write
1F803E00000
heap
page read and write
178B5AF0000
trusted library allocation
page read and write
1D816C86000
heap
page read and write
1D816C11000
heap
page read and write
1CB81000
heap
page read and write
1D816C10000
heap
page read and write
69EAF7B000
stack
page read and write
1EFBBC6A000
heap
page read and write
1D81722E000
heap
page read and write
1D816BE9000
heap
page read and write
1D816363000
heap
page read and write
F3FACFD000
stack
page read and write
1D0000
unclassified section
page readonly
19A0000
heap
page read and write
1D816CE2000
heap
page read and write
24EF1FC000
stack
page read and write
1D816376000
heap
page read and write
14A2573B000
heap
page read and write
1D816C93000
heap
page read and write
1D81721E000
heap
page read and write
1D816CA5000
heap
page read and write
168A63C4000
heap
page read and write
1D816CEF000
heap
page read and write
22C28304000
heap
page read and write
168A63CB000
heap
page read and write
2A9E6000000
heap
page read and write
1D81721B000
heap
page read and write
22C296DB000
heap
page read and write
1D816363000
heap
page read and write
2C7564D8000
heap
page read and write
2340EA51000
heap
page read and write
1EFBBC9D000
heap
page read and write
1DB8A084000
heap
page read and write
19C9000
heap
page read and write
22C27A7B000
heap
page read and write
1D816CA8000
heap
page read and write
1D816D1B000
heap
page read and write
1D816CFD000
heap
page read and write
1D3A6000
trusted library allocation
page read and write
1D817259000
heap
page read and write
14A26170000
heap
page read and write
168A5660000
heap
page read and write
1D8165D5000
heap
page read and write
1DB8A102000
heap
page read and write
178B524A000
heap
page read and write
1D816C01000
heap
page read and write
22C27A7F000
heap
page read and write
1D8172A6000
heap
page read and write
2810000
trusted library allocation
page read and write
2C75626F000
heap
page read and write
1D816CF0000
heap
page read and write
FE956FF000
unkown
page read and write
1D816CC2000
heap
page read and write
1D817272000
heap
page read and write
14A26178000
heap
page read and write
400000
unkown
page readonly
1D8173A7000
heap
page read and write
1D816C57000
heap
page read and write
2340EAA1000
heap
page read and write
1974000
heap
page read and write
19C0000
heap
page read and write
19AA000
heap
page read and write
17B8348C000
heap
page read and write
1D8165B0000
remote allocation
page read and write
14A26160000
heap
page read and write
3FEB3FC000
stack
page read and write
1D816CC0000
heap
page read and write
1D816CA3000
heap
page read and write
22C27AFA000
heap
page read and write
1D816BD7000
heap
page read and write
168A639F000
heap
page read and write
1D816CCD000
heap
page read and write
1D816C5E000
heap
page read and write
17B834B1000
heap
page read and write
1D816332000
heap
page read and write
2A9E557A000
heap
page read and write
1D816B80000
heap
page read and write
1D816CE7000
heap
page read and write
2A9E547C000
heap
page read and write
1F803C5D000
heap
page read and write
2A9E5FCE000
heap
page read and write
1D816C25000
heap
page read and write
1D816C0F000
heap
page read and write
1D8165DE000
heap
page read and write
2A9E5457000
heap
page read and write
1937DC87000
heap
page read and write
1D816C25000
heap
page read and write
168A63CB000
heap
page read and write
1D816367000
heap
page read and write
14A2616E000
heap
page read and write
1D81722E000
heap
page read and write
40A000
unkown
page write copy
2340E940000
heap
page read and write
17B83472000
heap
page read and write
168A5849000
heap
page read and write
1937DC48000
heap
page read and write
782000
unkown
page read and write
1948000
heap
page read and write
17B83483000
heap
page read and write
1937DC2B000
heap
page read and write
4534AFE000
stack
page read and write
3FF7CFE000
stack
page read and write
2A9E548B000
heap
page read and write
1D817259000
heap
page read and write
1D816C28000
heap
page read and write
2B2D975000
stack
page read and write
1D817338000
heap
page read and write
14A26176000
heap
page read and write
A91000
heap
page read and write
2340EA95000
heap
page read and write
1F9AB8B3000
heap
page read and write
1D816CC2000
heap
page read and write
17B83483000
heap
page read and write
168A57E9000
heap
page read and write
2C7564D0000
heap
page read and write
5471DFD000
stack
page read and write
1D8165DB000
heap
page read and write
2A9E5473000
heap
page read and write
17B8347A000
heap
page read and write
14A268B8000
heap
page read and write
22C2DA60000
remote allocation
page read and write
1D816C25000
heap
page read and write
17B834A8000
heap
page read and write
1D816BA4000
heap
page read and write
1D816CA1000
heap
page read and write
22C27A24000
heap
page read and write
A6D000
heap
page read and write
1CB81000
heap
page read and write
2340EAA4000
heap
page read and write
1D816CC2000
heap
page read and write
17B8347A000
heap
page read and write
2A9E546B000
heap
page read and write
14A256F9000
heap
page read and write
15FE6FC000
stack
page read and write
1D816C08000
heap
page read and write
168A63D5000
heap
page read and write
1D816BFC000
heap
page read and write
1D816CC7000
heap
page read and write
1D8165D9000
heap
page read and write
178B5B30000
trusted library allocation
page read and write
1D4C9000
trusted library allocation
page read and write
1D816BD3000
heap
page read and write
22C2D927000
trusted library allocation
page read and write
1D817227000
heap
page read and write
22C2D8D0000
trusted library allocation
page read and write
14A268A8000
heap
page read and write
2A9E5587000
heap
page read and write
1D816C9A000
heap
page read and write
22C2D8B9000
trusted library allocation
page read and write
1937DC13000
heap
page read and write
22C29690000
heap
page read and write
1D816C95000
heap
page read and write
22C27B29000
heap
page read and write
4A59000
trusted library allocation
page read and write
1D817239000
heap
page read and write
1D3A0000
trusted library allocation
page read and write
1937DC6B000
heap
page read and write
2340F270000
trusted library allocation
page read and write
14A26170000
heap
page read and write
22C2D8E6000
trusted library allocation
page read and write
14A26132000
heap
page read and write
1EFBBC4B000
heap
page read and write
1D816CBB000
heap
page read and write
22C28313000
heap
page read and write
FE953FE000
stack
page read and write
1D816BA0000
heap
page read and write
1D816C5A000
heap
page read and write
1D816D24000
heap
page read and write
1D816D40000
heap
page read and write
14A26002000
heap
page read and write
22C2D810000
trusted library allocation
page read and write
168A63D6000
heap
page read and write
168A6530000
heap
page read and write
14A26113000
heap
page read and write
2A9E542A000
heap
page read and write
1D816BC4000
heap
page read and write
2C7564D1000
heap
page read and write
14A2612F000
heap
page read and write
1D816CA5000
heap
page read and write
2A9E55F1000
heap
page read and write
178B50C0000
heap
page read and write
1D817320000
heap
page read and write
547237E000
stack
page read and write
1D816C5E000
heap
page read and write
1D816C01000
heap
page read and write
1DB89DE0000
heap
page read and write
1D816C74000
heap
page read and write
2C7562A4000
heap
page read and write
1D816CC7000
heap
page read and write
1EFBBCA5000
heap
page read and write
1D816CAC000
heap
page read and write
1F9ABAA0000
trusted library allocation
page read and write
2A9E5CA0000
trusted library allocation
page read and write
1D8165DB000
heap
page read and write
5EA000
unkown
page write copy
1D816CAF000
heap
page read and write
1F9AC134000
heap
page read and write
1EFBBC00000
heap
page read and write
146FC19A000
heap
page read and write
22C29745000
heap
page read and write
1F9AB8B1000
heap
page read and write
17B83475000
heap
page read and write
14A26015000
heap
page read and write
1D816CF0000
heap
page read and write
22C2D8FB000
trusted library allocation
page read and write
17B83E00000
heap
page read and write
1D816CA7000
heap
page read and write
17B8347A000
heap
page read and write
786000
unkown
page read and write
1D816CBC000
heap
page read and write
1D81722F000
heap
page read and write
17B833C0000
trusted library allocation
page read and write
1D816C80000
heap
page read and write
168A63E9000
heap
page read and write
14A2612F000
heap
page read and write
178B5120000
heap
page read and write
168A63BB000
heap
page read and write
14A2612D000
heap
page read and write
14A26800000
heap
page read and write
168A5960000
heap
page read and write
382497C000
stack
page read and write
2C756269000
heap
page read and write
1D81728B000
heap
page read and write
1D816BD7000
heap
page read and write
1D816CC6000
heap
page read and write
2340EA91000
heap
page read and write
36AC000
stack
page read and write
2C75643E000
heap
page read and write
2C756277000
heap
page read and write
1EFBBC31000
heap
page read and write
1D816C0F000
heap
page read and write
1D816BD3000
heap
page read and write
1D8172A6000
heap
page read and write
1D8162B6000
heap
page read and write
178B5313000
heap
page read and write
178B5255000
heap
page read and write
14A2615B000
heap
page read and write
2C756291000
heap
page read and write
168A63BB000
heap
page read and write
1D816C01000
heap
page read and write
168A639F000
heap
page read and write
AAEE17E000
stack
page read and write
22C29810000
trusted library allocation
page read and write
22C27B13000
heap
page read and write
408000
unkown
page readonly
1D816CCD000
heap
page read and write
1940000
heap
page read and write
649000
unkown
page write copy
14A2617E000
heap
page read and write
1D816C94000
heap
page read and write
14A2612C000
heap
page read and write
22C2D90A000
trusted library allocation
page read and write
17B83471000
heap
page read and write
17B83483000
heap
page read and write
1D816CBC000
heap
page read and write
14A2617C000
heap
page read and write
2A9E5FAC000
heap
page read and write
1A80000
trusted library allocation
page read and write
1D816CD0000
heap
page read and write
14A2616C000
heap
page read and write
1C0000
remote allocation
page read and write
17B834A1000
heap
page read and write
1D816BF3000
heap
page read and write
1D816362000
heap
page read and write
A8E000
heap
page read and write
1937DC93000
heap
page read and write
5EE000
unkown
page write copy
EDE000
stack
page read and write
7A9000
unkown
page read and write
168A57B1000
heap
page read and write
1937DC5D000
heap
page read and write
168A638A000
heap
page read and write
168A6780000
heap
page read and write
168A6330000
heap
page read and write
14A2612C000
heap
page read and write
1D81736A000
heap
page read and write
168A639F000
heap
page read and write
1D816BF2000
heap
page read and write
FE9527F000
stack
page read and write
5F0000
unkown
page write copy
2C7562B1000
heap
page read and write
17B8347E000
heap
page read and write
1F9AC136000
heap
page read and write
2C7562B7000
heap
page read and write
1D816CD5000
heap
page read and write
1937DC80000
heap
page read and write
1D816367000
heap
page read and write
3FEAD7E000
unkown
page read and write
14A2571A000
heap
page read and write
9E000
stack
page read and write
1D81752F000
heap
page read and write
CFCA2DA000
stack
page read and write
178B5B70000
trusted library allocation
page read and write
1D816CE7000
heap
page read and write
1D817231000
heap
page read and write
1D817227000
heap
page read and write
17B83483000
heap
page read and write
1D816CDB000
heap
page read and write
1D816D3D000
heap
page read and write
CFCA35E000
stack
page read and write
1EFBBC9F000
heap
page read and write
2C756290000
heap
page read and write
168A637B000
heap
page read and write
22C29643000
heap
page read and write
22C2D8E4000
trusted library allocation
page read and write
A95000
heap
page read and write
1937E402000
trusted library allocation
page read and write
1EFBBC24000
heap
page read and write
17B8347E000
heap
page read and write
A52000
heap
page read and write
178B5213000
heap
page read and write
1D816C88000
heap
page read and write
1D816D1C000
heap
page read and write
2A9E5FBA000
heap
page read and write
1D816367000
heap
page read and write
1D816D09000
heap
page read and write
1D817250000
heap
page read and write
168A57DE000
heap
page read and write
1D816C1F000
heap
page read and write
1DB8A073000
heap
page read and write
14A2617C000
heap
page read and write
146FC1C2000
heap
page read and write
22C2D890000
trusted library allocation
page read and write
22C2D9F0000
trusted library allocation
page read and write
1D81721B000
heap
page read and write
1F9AB8CA000
heap
page read and write
1D816CF5000
heap
page read and write
14A256BB000
heap
page read and write
17B8347A000
heap
page read and write
2850000
trusted library allocation
page read and write
1D816BFE000
heap
page read and write
4534BFA000
stack
page read and write
17B83490000
heap
page read and write
1D8165D9000
heap
page read and write
2A9E5FCD000
heap
page read and write
8D4000
heap
page read and write
1D8173AC000
heap
page read and write
1D816367000
heap
page read and write
1D817276000
heap
page read and write
2A9E5FF1000
heap
page read and write
1D816C57000
heap
page read and write
69EA6EB000
stack
page read and write
14A25F50000
remote allocation
page read and write
15FE7FB000
stack
page read and write
44298FD000
stack
page read and write
1D816BDD000
heap
page read and write
1D816363000
heap
page read and write
1D816CEB000
heap
page read and write
1D8165B0000
remote allocation
page read and write
1D816C5E000
heap
page read and write
17B83471000
heap
page read and write
1EFBBC84000
heap
page read and write
1F9AB8B7000
heap
page read and write
22C29600000
heap
page read and write
178B523C000
heap
page read and write
2A9E54BF000
heap
page read and write
14A26156000
heap
page read and write
1D817234000
heap
page read and write
22C29180000
trusted library allocation
page read and write
1F9AB891000
heap
page read and write
1D817230000
heap
page read and write
1D816C25000
heap
page read and write
3FF7C7E000
stack
page read and write
1D8172C4000
heap
page read and write
A73000
heap
page read and write
14A2686A000
heap
page read and write
1D816C94000
heap
page read and write
2340E8E0000
heap
page read and write
1D81751F000
heap
page read and write
1D816D5C000
heap
page read and write
1D816D45000
heap
page read and write
1EFBC415000
heap
page read and write
1D816CD5000
heap
page read and write
1D816CC9000
heap
page read and write
1D8165DE000
heap
page read and write
24EEF7E000
stack
page read and write
1D817250000
heap
page read and write
3FF799B000
stack
page read and write
22C2D8C7000
trusted library allocation
page read and write
1D817234000
heap
page read and write
22C28202000
heap
page read and write
1937DC78000
heap
page read and write
146FC1AE000
heap
page read and write
1D816CF2000
heap
page read and write
17D4000
heap
page read and write
17B83500000
heap
page read and write
1D816CB1000
heap
page read and write
1D683000
trusted library allocation
page read and write
1D816CD0000
heap
page read and write
168A6687000
heap
page read and write
17B8347E000
heap
page read and write
1D816CAF000
heap
page read and write
2C7562B7000
heap
page read and write
8D0000
heap
page read and write
17B834AF000
heap
page read and write
22C27A7F000
heap
page read and write
178B527A000
heap
page read and write
15FE35E000
stack
page read and write
1EFBBCA8000
heap
page read and write
14A268A2000
heap
page read and write
2340E980000
unclassified section
page readonly
401000
unkown
page execute read
1D816BC4000
heap
page read and write
2C7564DF000
heap
page read and write
17B8347E000
heap
page read and write
168A6396000
heap
page read and write
1EFBBCB5000
heap
page read and write
1D816BD7000
heap
page read and write
2C7564E5000
heap
page read and write
14A26195000
heap
page read and write
1D8172A6000
heap
page read and write
1F803BE0000
unclassified section
page readonly
1D816C3C000
heap
page read and write
17B834A7000
heap
page read and write
178B525E000
heap
page read and write
1EFBBC40000
heap
page read and write
2A9E5F70000
heap
page read and write
17B83472000
heap
page read and write
1D816CB3000
heap
page read and write
1937DC61000
heap
page read and write
146FC440000
heap
page read and write
3FEAC7B000
stack
page read and write
1D816CD0000
heap
page read and write
1D816C57000
heap
page read and write
1D816363000
heap
page read and write
1989000
heap
page read and write
5471A7B000
stack
page read and write
1D816D44000
heap
page read and write
1937DC60000
heap
page read and write
1D816CC0000
heap
page read and write
17B834B1000
heap
page read and write
168A6397000
heap
page read and write
1D700000
trusted library allocation
page execute and read and write
1937DC47000
heap
page read and write
1D816C08000
heap
page read and write
1937DC5C000
heap
page read and write
1D816D0F000
heap
page read and write
1937DCA0000
heap
page read and write
15F000
stack
page read and write
1D816C0F000
heap
page read and write
2A9E6002000
heap
page read and write
1D816CFD000
heap
page read and write
17B83502000
heap
page read and write
17B83451000
heap
page read and write
1D816D35000
heap
page read and write
1D816CC0000
heap
page read and write
1937DC4F000
heap
page read and write
1D0CE000
stack
page read and write
1D816360000
heap
page read and write
1F9AB8B7000
heap
page read and write
1CB80000
heap
page read and write
168A57E9000
heap
page read and write
1D816CE7000
heap
page read and write
17B83448000
heap
page read and write
CFCA87E000
stack
page read and write
1D816CBD000
heap
page read and write
1D816CC0000
heap
page read and write
1D81725D000
heap
page read and write
30000
heap
page read and write
14A26181000
heap
page read and write
19AA000
heap
page read and write
1F803D02000
heap
page read and write
168A63D9000
heap
page read and write
22C2D96F000
trusted library allocation
page read and write
168A5849000
heap
page read and write
17B83483000
heap
page read and write
718B6000
unkown
page readonly
22C2D9A0000
trusted library allocation
page read and write
1D0000
unclassified section
page readonly
168A63BB000
heap
page read and write
2A9E5400000
heap
page read and write
1D816C25000
heap
page read and write
1D816C25000
heap
page read and write
1D816C20000
heap
page read and write
1F803A70000
heap
page read and write
1F9AB8B7000
heap
page read and write
1937DC6A000
heap
page read and write
22C28319000
heap
page read and write
1D816CC0000
heap
page read and write
168A57B7000
heap
page read and write
1D816C5E000
heap
page read and write
14A26176000
heap
page read and write
1D816CCA000
heap
page read and write
1D816367000
heap
page read and write
17B8347E000
heap
page read and write
1F9AB7D0000
heap
page read and write
2A9E52F0000
heap
page read and write
2C7562B2000
heap
page read and write
22C27A9D000
heap
page read and write
178B5302000
heap
page read and write
408000
unkown
page readonly
1EFBBC70000
heap
page read and write
1D816BAD000
heap
page read and write
2C7562A4000
heap
page read and write
1D816CE3000
heap
page read and write
1D816CC5000
heap
page read and write
1D816C01000
heap
page read and write
22C29643000
heap
page read and write
1D816CAE000
heap
page read and write
1D8172A6000
heap
page read and write
1D816D1B000
heap
page read and write
1EFBC402000
heap
page read and write
146FC1C2000
heap
page read and write
22C2D8CA000
trusted library allocation
page read and write
1D816367000
heap
page read and write
1D816CA8000
heap
page read and write
17B834A7000
heap
page read and write
168A668F000
heap
page read and write
22C279D0000
trusted library allocation
page read and write
1D816363000
heap
page read and write
1D816CCD000
heap
page read and write
168A56B0000
heap
page read and write
2340E990000
heap
page read and write
1D816D1B000
heap
page read and write
1937DC5E000
heap
page read and write
1D816CD5000
heap
page read and write
1D9D0000
trusted library allocation
page execute and read and write
22C2D990000
trusted library allocation
page read and write
2C75643D000
heap
page read and write
1EFBBC4D000
heap
page read and write
1C0000
remote allocation
page read and write
1D816CC7000
heap
page read and write
1D816C0F000
heap
page read and write
7DF000
unkown
page readonly
168A57E9000
heap
page read and write
1F803C3C000
heap
page read and write
178B5C02000
trusted library allocation
page read and write
14A26824000
heap
page read and write
168A63E6000
heap
page read and write
69EB6FA000
stack
page read and write
7DF000
unkown
page readonly
22C2D9B0000
trusted library allocation
page read and write
1D1E0000
heap
page read and write
2A9E559D000
heap
page read and write
17B83483000
heap
page read and write
168A653A000
heap
page read and write
168A668C000
heap
page read and write
17B83483000
heap
page read and write
1D816CCD000
heap
page read and write
1660000
remote allocation
page execute and read and write
178B5B60000
trusted library allocation
page read and write
1D816CE5000
heap
page read and write
1937DC44000
heap
page read and write
1D816B88000
heap
page read and write
1D816C74000
heap
page read and write
1D816C08000
heap
page read and write
1D816C01000
heap
page read and write
69EAB78000
stack
page read and write
1D81722E000
heap
page read and write
22C2D8E0000
trusted library allocation
page read and write
1937DC85000
heap
page read and write
178B522A000
heap
page read and write
69EAC7E000
stack
page read and write
22C2D998000
trusted library allocation
page read and write
1D816367000
heap
page read and write
1D816CC0000
heap
page read and write
2A9E54B0000
heap
page read and write
1D816CC0000
heap
page read and write
1D816CA0000
heap
page read and write
15FE3DE000
stack
page read and write
77C000
unkown
page read and write
FE9517E000
stack
page read and write
1937DC6C000
heap
page read and write
1D816C95000
heap
page read and write
24EEFFF000
stack
page read and write
1D816D3A000
heap
page read and write
1DB8A100000
heap
page read and write
178B5246000
heap
page read and write
1D816CC4000
heap
page read and write
1F9ABA30000
heap
page read and write
17B834A7000
heap
page read and write
1D8165DA000
heap
page read and write
1D816CCA000
heap
page read and write
22C2967F000
heap
page read and write
4A20000
trusted library allocation
page read and write
9EE000
stack
page read and write
17B83370000
heap
page read and write
17D4000
heap
page read and write
1D816450000
heap
page read and write
22C2DC30000
trusted library allocation
page read and write
1D816CA8000
heap
page read and write
1D816D3A000
heap
page read and write
17B834A9000
heap
page read and write
168A63C4000
heap
page read and write
14A2617C000
heap
page read and write
1F803C42000
heap
page read and write
16EA3DC000
stack
page read and write
2B2D1BC000
stack
page read and write
22C29694000
heap
page read and write
A60000
heap
page read and write
A20000
heap
page read and write
1D816C92000
heap
page read and write
1D816332000
heap
page read and write
17B83483000
heap
page read and write
1F804602000
trusted library allocation
page read and write
401000
unkown
page execute read
1D816C5E000
heap
page read and write
168A63AD000
heap
page read and write
168A63B7000
heap
page read and write
1D816CCD000
heap
page read and write
1D81721C000
heap
page read and write
1D816BCD000
heap
page read and write
17B8347E000
heap
page read and write
1D81733F000
heap
page read and write
8D4000
heap
page read and write
1EFBBB30000
heap
page read and write
1D816D0F000
heap
page read and write
1937DC4B000
heap
page read and write
1D816D1A000
heap
page read and write
1D8162DE000
heap
page read and write
408000
unkown
page readonly
1D816D3A000
heap
page read and write
1EFBBC7B000
heap
page read and write
17B8347A000
heap
page read and write
1D816C94000
heap
page read and write
14A26174000
heap
page read and write
1D816BC1000
heap
page read and write
1D816C74000
heap
page read and write
1D816D24000
heap
page read and write
168A6450000
heap
page read and write
1D81721B000
heap
page read and write
2C7564D7000
heap
page read and write
2A9E5427000
heap
page read and write
1D817546000
heap
page read and write
1D816CE5000
heap
page read and write
1F803C65000
heap
page read and write
1D816D35000
heap
page read and write
2C7562B1000
heap
page read and write
1D816C0F000
heap
page read and write
168A63E5000
heap
page read and write
14A25641000
heap
page read and write
E9E000
stack
page read and write
22C27980000
heap
page read and write
1049000
unkown
page write copy
1D816C5A000
heap
page read and write
22C2D8BC000
trusted library allocation
page read and write
14A25702000
heap
page read and write
14A2615A000
heap
page read and write
17B83483000
heap
page read and write
2F91000
trusted library allocation
page read and write
382447F000
stack
page read and write
22C2DC70000
trusted library allocation
page read and write
2A9E5FA4000
heap
page read and write
2C75626A000
heap
page read and write
168A639B000
heap
page read and write
1D816C5E000
heap
page read and write
168A63C2000
heap
page read and write
17B832B0000
heap
page read and write
1D816CB8000
heap
page read and write
168A638A000
heap
page read and write
22C29645000
heap
page read and write
1D816D37000
heap
page read and write
1D8165DD000
heap
page read and write
168A57DD000
heap
page read and write
There are 1724 hidden memdumps, click here to show them.