IOC Report
AutoUpdater.js

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\AutoUpdater.js"
malicious

URLs

Name
IP
Malicious
https://2b1c.telegram.godsmightywhispers.com/updateResource
77.91.127.52
malicious
https://2b1c.telegram.godsmightywhispers.com/updateResource~
unknown
https://2b1c.telegram.godsmightywhispers.com/.
unknown
https://2b1c.telegram.godsmightywhispers.com/
unknown
https://2b1c.telegram.godsmightywhispers.com/updateResource$
unknown

Domains

Name
IP
Malicious
2b1c.telegram.godsmightywhispers.com
77.91.127.52
malicious

IPs

IP
Domain
Country
Malicious
77.91.127.52
2b1c.telegram.godsmightywhispers.com
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
FA0FBFA000
stack
page read and write
1B1F984A000
heap
page read and write
1EE59869000
heap
page read and write
1E8958AB000
heap
page read and write
1B1C1380000
heap
page read and write
19F6FC35000
heap
page read and write
19F6FC38000
heap
page read and write
1EE59938000
heap
page read and write
1E1A17E000
stack
page read and write
1EE5982F000
heap
page read and write
1EE5B044000
heap
page read and write
19F6FC42000
heap
page read and write
22E372B2000
heap
page read and write
1EE5996C000
heap
page read and write
1EE5B0FF000
heap
page read and write
1E63B66A000
heap
page read and write
196681A0000
heap
page read and write
26000EC000
stack
page read and write
26001EE000
stack
page read and write
19F6FBF0000
heap
page read and write
1EE5B08B000
heap
page read and write
1EE592EE000
trusted library allocation
page read and write
1EE599EB000
heap
page read and write
19F6FC31000
heap
page read and write
EF1257E000
stack
page read and write
1EE543CA000
heap
page read and write
268EF43C000
heap
page read and write
19F6FEC0000
heap
page read and write
1EE59480000
trusted library allocation
page read and write
1EE5B003000
heap
page read and write
1EE5982F000
heap
page read and write
1EE5B089000
heap
page read and write
1EE59989000
heap
page read and write
1B1F9852000
heap
page read and write
1E63B67A000
heap
page read and write
1EE545AB000
heap
page read and write
24C64443000
heap
page read and write
1EE5B103000
heap
page read and write
19F6FC30000
heap
page read and write
1EE599E6000
heap
page read and write
22E372A2000
heap
page read and write
1EE59976000
heap
page read and write
1EE5B099000
heap
page read and write
19F6FC57000
heap
page read and write
19F6FC2E000
heap
page read and write
1E7F5E3C000
heap
page read and write
1B1C14BA000
heap
page read and write
1EE5B034000
heap
page read and write
B918EFE000
stack
page read and write
19F6FD00000
heap
page read and write
208EA902000
heap
page read and write
1EE54597000
heap
page read and write
1E890B02000
heap
page read and write
1EE59856000
heap
page read and write
1EE59971000
heap
page read and write
1EE5441B000
heap
page read and write
1EE5B113000
heap
page read and write
1EE59414000
trusted library allocation
page read and write
1EE5B04E000
heap
page read and write
1E7F5E13000
heap
page read and write
1EE5B019000
heap
page read and write
1EE59450000
trusted library allocation
page read and write
1EE59414000
trusted library allocation
page read and write
1EE53A76000
heap
page read and write
1EE550A0000
trusted library section
page readonly
19F6FC10000
heap
page read and write
1EE5B0A5000
heap
page read and write
19F6FC3D000
heap
page read and write
1EE593E0000
trusted library allocation
page read and write
1EE59813000
heap
page read and write
1EE5B0B8000
heap
page read and write
1EE594A0000
trusted library allocation
page read and write
1EE59938000
heap
page read and write
1EE5B1B2000
heap
page read and write
1E89570E000
trusted library allocation
page read and write
1EE59975000
heap
page read and write
1EE5B0C6000
heap
page read and write
19F6FC13000
heap
page read and write
24C64990000
trusted library allocation
page read and write
19F6FC42000
heap
page read and write
A70DF5C000
stack
page read and write
1EE545AF000
heap
page read and write
1EE55060000
trusted library section
page readonly
19F6FC3A000
heap
page read and write
19F6FBF4000
heap
page read and write
1E890A00000
heap
page read and write
1EE545D0000
heap
page read and write
1EE59900000
heap
page read and write
1EE5B0F5000
heap
page read and write
134B0BB000
stack
page read and write
1EE5929C000
trusted library allocation
page read and write
1EE5B09B000
heap
page read and write
1EE5B100000
heap
page read and write
1EE543E1000
heap
page read and write
27380E4D000
heap
page read and write
19F6FC12000
heap
page read and write
1E63B646000
heap
page read and write
FA0FCFC000
stack
page read and write
1E8909F0000
trusted library allocation
page read and write
1EE59855000
heap
page read and write
19F6DDC0000
heap
page read and write
1B1F98E1000
heap
page read and write
1B1F987C000
heap
page read and write
1EE59986000
heap
page read and write
19F6FC3D000
heap
page read and write
19F6FC34000
heap
page read and write
19F6FC00000
heap
page read and write
19F6DEE0000
heap
page read and write
1B1F9880000
heap
page read and write
1EE5997A000
heap
page read and write
1EE53B13000
heap
page read and write
1B1F98EB000
heap
page read and write
68D93B6000
stack
page read and write
1EE592A5000
trusted library allocation
page read and write
19F6FC04000
heap
page read and write
19F6FC10000
heap
page read and write
1EE5B14B000
heap
page read and write
19F6DEB3000
heap
page read and write
1E890B04000
heap
page read and write
3F30679000
stack
page read and write
1EE592B4000
trusted library allocation
page read and write
1EE599E5000
heap
page read and write
19F6FC10000
heap
page read and write
9F7FFFA000
stack
page read and write
19F6FBFF000
heap
page read and write
9F0087E000
stack
page read and write
19F6FC55000
heap
page read and write
1EE592AE000
trusted library allocation
page read and write
1EE5B0D9000
heap
page read and write
19F6FC1E000
heap
page read and write
1EE599E5000
heap
page read and write
19F6FC10000
heap
page read and write
1EE5B0B8000
heap
page read and write
1E895A60000
remote allocation
page read and write
1E895740000
trusted library allocation
page read and write
1B1F9858000
heap
page read and write
1EE5B10B000
heap
page read and write
19F6DD30000
heap
page read and write
19F6FC25000
heap
page read and write
1EE54300000
heap
page read and write
19F6FC2C000
heap
page read and write
1EE5B0FA000
heap
page read and write
19F6FC2C000
heap
page read and write
1EE5982C000
heap
page read and write
19F6E1A9000
heap
page read and write
1EE59460000
trusted library allocation
page read and write
1B1FA644000
heap
page read and write
1D03C654000
heap
page read and write
1EE59826000
heap
page read and write
22E37280000
heap
page read and write
1E63B65A000
heap
page read and write
19F6FE95000
heap
page read and write
1EE5B0D9000
heap
page read and write
19F6FC34000
heap
page read and write
1EE59985000
heap
page read and write
1EE5B08D000
heap
page read and write
3F307F9000
stack
page read and write
19F6FC2E000
heap
page read and write
1EE5B0A3000
heap
page read and write
1EE550E0000
trusted library allocation
page read and write
1EE543C5000
heap
page read and write
1E63B632000
heap
page read and write
19F6FC35000
heap
page read and write
1EE54458000
heap
page read and write
1EE5B0B8000
heap
page read and write
1EE5B130000
heap
page read and write
19F6FC2E000
heap
page read and write
1EE59340000
trusted library allocation
page read and write
1EE5B177000
heap
page read and write
1EE5B09D000
heap
page read and write
19F6FC44000
heap
page read and write
1E890302000
heap
page read and write
19F6DDA0000
heap
page read and write
208EA690000
heap
page read and write
19F6FC34000
heap
page read and write
1E8955E0000
trusted library allocation
page read and write
1E7F5F00000
heap
page read and write
1C97D090000
trusted library allocation
page read and write
1EE54390000
heap
page read and write
1B1C1413000
heap
page read and write
1EE54554000
heap
page read and write
1EE5995E000
heap
page read and write
1EE59834000
heap
page read and write
1EE54316000
heap
page read and write
19F6FF11000
heap
page read and write
19F6FC2E000
heap
page read and write
19F6FF32000
heap
page read and write
1EE59974000
heap
page read and write
19F6FC25000
heap
page read and write
1E890030000
heap
page read and write
1EE5B0FD000
heap
page read and write
1B1FA18B000
heap
page read and write
1B1F9849000
heap
page read and write
E8E9A7C000
stack
page read and write
1EE5B0FA000
heap
page read and write
1B1F9F00000
remote allocation
page read and write
1B1FA197000
heap
page read and write
1EE59979000
heap
page read and write
1B1FA186000
heap
page read and write
1B1C14CB000
heap
page read and write
1EE5B013000
heap
page read and write
1EE5B0C9000
heap
page read and write
328B3FB000
stack
page read and write
1EE59964000
heap
page read and write
19F6FC00000
heap
page read and write
19F6DF3C000
heap
page read and write
1EE59610000
remote allocation
page read and write
1D03CC02000
trusted library allocation
page read and write
1E890307000
heap
page read and write
1E7F5F02000
heap
page read and write
1EE59861000
heap
page read and write
19F6FC10000
heap
page read and write
27380E70000
heap
page read and write
19F6E1AA000
heap
page read and write
1EE5B0F3000
heap
page read and write
1E89580F000
heap
page read and write
19F6FC2F000
heap
page read and write
1E1A07B000
stack
page read and write
1EE5440A000
heap
page read and write
1C97C4F0000
heap
page read and write
19F6FC25000
heap
page read and write
19F6FC47000
heap
page read and write
24C64413000
heap
page read and write
1E8901A0000
trusted library allocation
page read and write
1B1FA602000
heap
page read and write
3F308F9000
stack
page read and write
AF729FE000
stack
page read and write
1B1F9850000
heap
page read and write
1EE54423000
heap
page read and write
1EE59826000
heap
page read and write
19F6FC35000
heap
page read and write
1EE54302000
heap
page read and write
1EE5B08F000
heap
page read and write
1B1FA602000
heap
page read and write
27380E49000
heap
page read and write
1EE599D6000
heap
page read and write
1EE5985C000
heap
page read and write
1B1F984C000
heap
page read and write
1B1FA002000
heap
page read and write
5404AFD000
stack
page read and write
134B1BE000
stack
page read and write
27380D80000
heap
page read and write
1EE5B11C000
heap
page read and write
1EE5B042000
heap
page read and write
1EE59977000
heap
page read and write
1B1F984B000
heap
page read and write
260097F000
stack
page read and write
A70EBFF000
stack
page read and write
1EE5B082000
heap
page read and write
1EE59843000
heap
page read and write
1EE5B132000
heap
page read and write
1EE5941C000
trusted library allocation
page read and write
1EE59938000
heap
page read and write
19F6DEF8000
heap
page read and write
1EE5B033000
heap
page read and write
1EE545AF000
heap
page read and write
1EE59984000
heap
page read and write
1EE592A0000
trusted library allocation
page read and write
1EE5B0FF000
heap
page read and write
1EE59862000
heap
page read and write
1EE54400000
heap
page read and write
19F6FC10000
heap
page read and write
19F6FC24000
heap
page read and write
1EE59869000
heap
page read and write
1EE54402000
heap
page read and write
1E1A6FE000
stack
page read and write
19F6FC12000
heap
page read and write
B918F7D000
stack
page read and write
19F6FC25000
heap
page read and write
1EE5B0E8000
heap
page read and write
1EE599E9000
heap
page read and write
27380E3C000
heap
page read and write
9F004FF000
stack
page read and write
1E890213000
heap
page read and write
1EE5997A000
heap
page read and write
19F6FC3F000
heap
page read and write
FA101FF000
stack
page read and write
1EE5B074000
heap
page read and write
19F6E1A0000
heap
page read and write
1E890274000
heap
page read and write
19F6FBF5000
heap
page read and write
A70E37C000
stack
page read and write
1EE5941C000
trusted library allocation
page read and write
1EE5B000000
heap
page read and write
1EE5982F000
heap
page read and write
19F6FC06000
heap
page read and write
1EE5B0FA000
heap
page read and write
19F6DE91000
heap
page read and write
1C97C815000
heap
page read and write
22E37291000
heap
page read and write
1EE5B13E000
heap
page read and write
19F6FC32000
heap
page read and write
19F6FC10000
heap
page read and write
24C64502000
heap
page read and write
1E63B63D000
heap
page read and write
A70EAFD000
stack
page read and write
1EE59869000
heap
page read and write
1EE5B0B9000
heap
page read and write
1EE59979000
heap
page read and write
19F6FC06000
heap
page read and write
1E7F5E66000
heap
page read and write
1B1F984D000
heap
page read and write
19F6FF0F000
heap
page read and write
1E895730000
trusted library allocation
page read and write
1B1F9F00000
remote allocation
page read and write
1B1F98C5000
heap
page read and write
1EE5B074000
heap
page read and write
1EE59280000
trusted library allocation
page read and write
19F6FC49000
heap
page read and write
1EE5B0A1000
heap
page read and write
AF7227B000
stack
page read and write
19F6FC20000
heap
page read and write
24C6443C000
heap
page read and write
19F6DF14000
heap
page read and write
1E895902000
heap
page read and write
1D03C664000
heap
page read and write
27380DB0000
trusted library allocation
page read and write
26008FF000
stack
page read and write
1EE59855000
heap
page read and write
1B1FA18E000
heap
page read and write
1B1C1488000
heap
page read and write
1EE5B03B000
heap
page read and write
19668429000
heap
page read and write
1EE599A9000
heap
page read and write
1EE5932C000
trusted library allocation
page read and write
1EE5B0F5000
heap
page read and write
1EE5B144000
heap
page read and write
19F6FC3A000
heap
page read and write
1EE5B0A1000
heap
page read and write
19F6FC3D000
heap
page read and write
19F6FC00000
heap
page read and write
1E890254000
heap
page read and write
9F0077D000
stack
page read and write
19F6FC55000
heap
page read and write
1EE59997000
heap
page read and write
1B1C1513000
heap
page read and write
19F6FBFC000
heap
page read and write
1EE59834000
heap
page read and write
1EE5B0F1000
heap
page read and write
1E890040000
heap
page read and write
24C64429000
heap
page read and write
FA102FF000
stack
page read and write
1EE59400000
trusted library allocation
page read and write
19F6FC21000
heap
page read and write
1EE59650000
trusted library allocation
page read and write
26006F7000
stack
page read and write
1E1A5FE000
stack
page read and write
1B1F96E0000
heap
page read and write
1E7F5F08000
heap
page read and write
22E372A0000
heap
page read and write
19F6FC12000
heap
page read and write
1E7F5DF0000
trusted library allocation
page read and write
1EE5B01B000
heap
page read and write
27380E00000
heap
page read and write
9F0067B000
stack
page read and write
19F6FE90000
heap
page read and write
1EE5B074000
heap
page read and write
1EE5982D000
heap
page read and write
19F6FC17000
heap
page read and write
1EE5B018000
heap
page read and write
19F6FC31000
heap
page read and write
1EE5B12A000
heap
page read and write
1EE5B07D000
heap
page read and write
19F6FC34000
heap
page read and write
22E372B2000
heap
page read and write
19F6FC12000
heap
page read and write
1EE5A010000
heap
page read and write
1EE59869000
heap
page read and write
1D03C700000
heap
page read and write
1EE59400000
trusted library allocation
page read and write
68D9BFE000
stack
page read and write
19F6FC21000
heap
page read and write
19F6FDF0000
heap
page read and write
1B1C146D000
heap
page read and write
19F6FC57000
heap
page read and write
1C97C819000
heap
page read and write
1EE599E9000
heap
page read and write
1D03C668000
heap
page read and write
68D9FFE000
stack
page read and write
E8E997F000
stack
page read and write
19F6FC02000
heap
page read and write
19F6FC20000
heap
page read and write
1C97D2E0000
trusted library allocation
page read and write
1EE592BA000
trusted library allocation
page read and write
1EE5B0A1000
heap
page read and write
1E63B613000
heap
page read and write
19F6FC35000
heap
page read and write
1EE5982D000
heap
page read and write
1EE59869000
heap
page read and write
1E7F5E00000
heap
page read and write
1EE545AF000
heap
page read and write
1EE5995A000
heap
page read and write
1EE54577000
heap
page read and write
1B1F9908000
heap
page read and write
19F6FC38000
heap
page read and write
1EE599E7000
heap
page read and write
19F6FC4C000
heap
page read and write
1EE54327000
heap
page read and write
1EE5458F000
heap
page read and write
19F6FBF8000
heap
page read and write
19F6FC38000
heap
page read and write
1EE5B1A9000
heap
page read and write
1EE599FC000
heap
page read and write
1EE54F80000
trusted library allocation
page read and write
1B1FA182000
heap
page read and write
1E63B641000
heap
page read and write
19F6DE48000
heap
page read and write
1EE53A6E000
heap
page read and write
19F6FC47000
heap
page read and write
208EA85B000
heap
page read and write
1EE5B0F6000
heap
page read and write
1EE5B0A5000
heap
page read and write
1EE5B036000
heap
page read and write
27380E51000
heap
page read and write
1EE592A0000
trusted library allocation
page read and write
134B67E000
stack
page read and write
1EE5982D000
heap
page read and write
19F6FC06000
heap
page read and write
1EE5B057000
heap
page read and write
1E63B684000
heap
page read and write
19F6FC12000
heap
page read and write
3F3028B000
stack
page read and write
1B1F98BE000
heap
page read and write
AF71F7A000
stack
page read and write
FA100FF000
stack
page read and write
19F6FC20000
heap
page read and write
1EE5B0EF000
heap
page read and write
22E3728D000
heap
page read and write
FA104FF000
stack
page read and write
1D03C713000
heap
page read and write
19668990000
remote allocation
page read and write
1EE5B074000
heap
page read and write
1E8909F3000
trusted library allocation
page read and write
19F6FC10000
heap
page read and write
1EE5982D000
heap
page read and write
1EE5B0E9000
heap
page read and write
1E890302000
heap
page read and write
1EE59834000
heap
page read and write
1EE5992F000
heap
page read and write
19F701B0000
heap
page read and write
19668400000
heap
page read and write
19F6FC06000
heap
page read and write
1EE543CE000
heap
page read and write
19F6FC02000
heap
page read and write
1EE5B1C1000
heap
page read and write
1EE5B05F000
heap
page read and write
19F6FC00000
heap
page read and write
1EE5445A000
heap
page read and write
19F6FEDE000
heap
page read and write
27380D20000
heap
page read and write
9F00C7C000
stack
page read and write
19F6FC20000
heap
page read and write
19F6DEE8000
heap
page read and write
1EE5B089000
heap
page read and write
1E890B18000
heap
page read and write
1EE59861000
heap
page read and write
19F6DEE5000
heap
page read and write
1EE5B1C5000
heap
page read and write
1E895900000
heap
page read and write
19F6FC06000
heap
page read and write
1B1FA196000
heap
page read and write
1C97C390000
heap
page read and write
1EE53A3C000
heap
page read and write
22E372A6000
heap
page read and write
1E8957D0000
trusted library allocation
page read and write
1EE59853000
heap
page read and write
1EE59834000
heap
page read and write
1B1FA619000
heap
page read and write
1EE59941000
heap
page read and write
1EE53A74000
heap
page read and write
1EE55070000
trusted library section
page readonly
1EE5B0A5000
heap
page read and write
1EE594A0000
trusted library allocation
page read and write
19F6FC04000
heap
page read and write
1EE5B110000
heap
page read and write
1EE599E9000
heap
page read and write
1EE59420000
trusted library allocation
page read and write
19F6FECF000
heap
page read and write
19F701C0000
trusted library allocation
page read and write
1EE5B0B8000
heap
page read and write
1EE592A5000
trusted library allocation
page read and write
1B1C1D3A000
heap
page read and write
1EE599D7000
heap
page read and write
19F6DEDB000
heap
page read and write
1EE5982F000
heap
page read and write
19F6FC34000
heap
page read and write
19F6FC12000
heap
page read and write
1EE59826000
heap
page read and write
19F6FC38000
heap
page read and write
1EE5B059000
heap
page read and write
1EE59951000
heap
page read and write
19F6DF14000
heap
page read and write
1EE592B4000
trusted library allocation
page read and write
1EE5B076000
heap
page read and write
1EE5B0E9000
heap
page read and write
B91907C000
stack
page read and write
19F6FBFC000
heap
page read and write
1EE5984F000
heap
page read and write
19F6FC10000
heap
page read and write
1B1F9888000
heap
page read and write
19F6FC10000
heap
page read and write
19F6FC10000
heap
page read and write
1EE596E0000
trusted library allocation
page read and write
1EE5B0F1000
heap
page read and write
1EE5997C000
heap
page read and write
9F0047F000
stack
page read and write
19F6FC34000
heap
page read and write
1B1C1370000
heap
page read and write
1EE5B0FB000
heap
page read and write
268EF481000
heap
page read and write
1EE592C2000
trusted library allocation
page read and write
1EE59160000
trusted library allocation
page read and write
54046FD000
stack
page read and write
1E63B65C000
heap
page read and write
1B1F9813000
heap
page read and write
1EE599BD000
heap
page read and write
1E89028B000
heap
page read and write
68D9DFF000
stack
page read and write
19F6FC31000
heap
page read and write
22E37550000
heap
page read and write
1EE5B044000
heap
page read and write
19F6FC2C000
heap
page read and write
22E372BF000
heap
page read and write
1EE59826000
heap
page read and write
1E89022A000
heap
page read and write
19F6FC2E000
heap
page read and write
1B1F9902000
heap
page read and write
19F6FC02000
heap
page read and write
19F6FC25000
heap
page read and write
1B1F9680000
heap
page read and write
19F6FC30000
heap
page read and write
22E37140000
heap
page read and write
1E890B13000
heap
page read and write
1EE5982F000
heap
page read and write
1E895A10000
trusted library allocation
page read and write
1EE59984000
heap
page read and write
208EA813000
heap
page read and write
1B1F984F000
heap
page read and write
19F6FDC0000
heap
page read and write
19668200000
heap
page read and write
19F6DEEF000
heap
page read and write
1E7F6602000
trusted library allocation
page read and write
1EE5B0D9000
heap
page read and write
1E63B645000
heap
page read and write
1EE592A8000
trusted library allocation
page read and write
1EE5B085000
heap
page read and write
1B1FA14E000
heap
page read and write
1EE5B0EA000
heap
page read and write
1EE59923000
heap
page read and write
1EE5B0F5000
heap
page read and write
1EE592EE000
trusted library allocation
page read and write
19F6FC04000
heap
page read and write
19F6FC04000
heap
page read and write
1EE59960000
heap
page read and write
1EE5B1B9000
heap
page read and write
19F6FC07000
heap
page read and write
19F6FC2E000
heap
page read and write
1EE59305000
trusted library allocation
page read and write
268EF470000
heap
page read and write
19F6FC31000
heap
page read and write
1EE53810000
heap
page read and write
1EE53870000
heap
page read and write
19F6FC34000
heap
page read and write
1C97D0A0000
trusted library allocation
page read and write
19F6FBFA000
heap
page read and write
1EE5996A000
heap
page read and write
19F6FC3F000
heap
page read and write
1EE592BA000
trusted library allocation
page read and write
1B1FA184000
heap
page read and write
19F6DF3C000
heap
page read and write
1B1FA188000
heap
page read and write
1B1FA18C000
heap
page read and write
1B1C1502000
heap
page read and write
1E7F5E82000
heap
page read and write
1EE59976000
heap
page read and write
19F6FC31000
heap
page read and write
68D97FE000
stack
page read and write
1EE59861000
heap
page read and write
19F6FC21000
heap
page read and write
1EE5929C000
trusted library allocation
page read and write
1E8957D0000
trusted library allocation
page read and write
1EE592BC000
trusted library allocation
page read and write
1EE5B100000
heap
page read and write
EF11DEE000
stack
page read and write
268EF456000
heap
page read and write
1EE59955000
heap
page read and write
EF12377000
stack
page read and write
22E372C3000
heap
page read and write
1EE599D9000
heap
page read and write
24C64452000
heap
page read and write
1E8958B4000
heap
page read and write
1EE592BE000
trusted library allocation
page read and write
1EE5B024000
heap
page read and write
1E7F5E29000
heap
page read and write
19F6FC25000
heap
page read and write
1EE592C2000
trusted library allocation
page read and write
1EE59938000
heap
page read and write
1B1F98B3000
heap
page read and write
19F6FEC0000
heap
page read and write
1EE5994F000
heap
page read and write
27380E69000
heap
page read and write
1EE54543000
heap
page read and write
19F6FC3A000
heap
page read and write
1E8955F0000
trusted library allocation
page read and write
1E63B550000
heap
page read and write
AF7217F000
stack
page read and write
1EE5B0DB000
heap
page read and write
22E37296000
heap
page read and write
1EE59826000
heap
page read and write
19F6FC10000
heap
page read and write
1B1F985C000
heap
page read and write
1EE54593000
heap
page read and write
1EE5B12C000
heap
page read and write
19F6FC2F000
heap
page read and write
1B1F9F00000
remote allocation
page read and write
1EE594F0000
trusted library allocation
page read and write
1EE5B074000
heap
page read and write
1EE5B0E0000
heap
page read and write
1EE599DF000
heap
page read and write
1EE59975000
heap
page read and write
1EE5B0A5000
heap
page read and write
1B1FA161000
heap
page read and write
1E89029D000
heap
page read and write
19F6FC2E000
heap
page read and write
1EE59974000
heap
page read and write
1EE5B099000
heap
page read and write
19F6FC3F000
heap
page read and write
260016E000
stack
page read and write
1EE59400000
trusted library allocation
page read and write
19F6DE99000
heap
page read and write
1EE5982D000
heap
page read and write
1EE599BB000
heap
page read and write
1EE59834000
heap
page read and write
1EE599E9000
heap
page read and write
19F6FC20000
heap
page read and write
268EF230000
heap
page read and write
1EE5B119000
heap
page read and write
22E37296000
heap
page read and write
19F6FC21000
heap
page read and write
19F6FC56000
heap
page read and write
9F001FE000
stack
page read and write
19F6FC21000
heap
page read and write
9F7FE7B000
stack
page read and write
19F6FC34000
heap
page read and write
1EE54D40000
trusted library allocation
page read and write
208EA700000
heap
page read and write
1EE59305000
trusted library allocation
page read and write
1B1FA603000
heap
page read and write
1B1C13E0000
heap
page read and write
1B1FA190000
heap
page read and write
1C97C4D0000
heap
page read and write
1EE5B04E000
heap
page read and write
1E7F5E52000
heap
page read and write
1EE5982F000
heap
page read and write
19F6FC10000
heap
page read and write
1EE59869000
heap
page read and write
19F6FC07000
heap
page read and write
268EF502000
heap
page read and write
22E372A4000
heap
page read and write
19F6FF0F000
heap
page read and write
1EE59810000
heap
page read and write
19F6FBFB000
heap
page read and write
1EE59962000
heap
page read and write
1EE593F0000
trusted library allocation
page read and write
27380E81000
heap
page read and write
1EE5B11A000
heap
page read and write
1B1FA196000
heap
page read and write
1EE59985000
heap
page read and write
19F6DE67000
heap
page read and write
24C64430000
heap
page read and write
1EE5997A000
heap
page read and write
19F6FC2E000
heap
page read and write
1EE5941C000
trusted library allocation
page read and write
19F6FC31000
heap
page read and write
1EE599EB000
heap
page read and write
1EE5B10E000
heap
page read and write
B918E7B000
stack
page read and write
1EE592B0000
trusted library allocation
page read and write
19F6FC10000
heap
page read and write
68D9CFA000
stack
page read and write
1EE59861000
heap
page read and write
328AEEB000
stack
page read and write
1EE59170000
trusted library allocation
page read and write
1EE5B165000
heap
page read and write
1D03C63C000
heap
page read and write
1EE59869000
heap
page read and write
19F6FEDE000
heap
page read and write
19F6FC55000
heap
page read and write
1EE599EA000
heap
page read and write
19F6DEDB000
heap
page read and write
1EE5996F000
heap
page read and write
1E63B67E000
heap
page read and write
1B1F985B000
heap
page read and write
1EE5B0E1000
heap
page read and write
A70E77C000
stack
page read and write
1EE541F0000
trusted library allocation
page read and write
1EE592B2000
trusted library allocation
page read and write
1EE59834000
heap
page read and write
19F6FC35000
heap
page read and write
208EA872000
heap
page read and write
19F6FC12000
heap
page read and write
EF121FB000
stack
page read and write
1B1F9800000
heap
page read and write
19F6FC28000
heap
page read and write
1E63B62D000
heap
page read and write
1EE592B0000
trusted library allocation
page read and write
A70E4FE000
stack
page read and write
19F6FC31000
heap
page read and write
19F6DE6A000
heap
page read and write
1EE53A93000
heap
page read and write
19F6DEDB000
heap
page read and write
1EE5B096000
heap
page read and write
1B1FA18C000
heap
page read and write
1EE5B0BD000
heap
page read and write
1EE545C1000
heap
page read and write
1E7F5F13000
heap
page read and write
1E890325000
heap
page read and write
19F6DEDB000
heap
page read and write
1EE5436F000
heap
page read and write
1EE5B074000
heap
page read and write
1B1F9857000
heap
page read and write
1EE5B099000
heap
page read and write
1EE59414000
trusted library allocation
page read and write
1EE599E5000
heap
page read and write
3F3077E000
stack
page read and write
19F6FC36000
heap
page read and write
1B1FA182000
heap
page read and write
1EE5B074000
heap
page read and write
19F6FBF1000
heap
page read and write
1EE5B0E4000
heap
page read and write
1EE545EF000
heap
page read and write
24C641E0000
heap
page read and write
1EE543B1000
heap
page read and write
19F6FC07000
heap
page read and write
1EE599E5000
heap
page read and write
1EE545EF000
heap
page read and write
208EA6A0000
heap
page read and write
19F6FC47000
heap
page read and write
AF71CFF000
stack
page read and write
19F6FC49000
heap
page read and write
19F6FC47000
heap
page read and write
1EE5B0AA000
heap
page read and write
1C97C5AE000
heap
page read and write
1E89583D000
heap
page read and write
208EA802000
heap
page read and write
1EE5B05D000
heap
page read and write
1EE5B0F7000
heap
page read and write
1B1C1B40000
trusted library allocation
page read and write
1EE599A1000
heap
page read and write
1EE59977000
heap
page read and write
19F6FC10000
heap
page read and write
1EE5B11D000
heap
page read and write
1C97C5AE000
heap
page read and write
1EE599E7000
heap
page read and write
1B1F98F3000
heap
page read and write
1EE592C0000
trusted library allocation
page read and write
1EE53A00000
heap
page read and write
1EE593F0000
trusted library allocation
page read and write
1EE5B0E6000
heap
page read and write
1EE5982F000
heap
page read and write
19F6FC21000
heap
page read and write
19F6FC12000
heap
page read and write
19F6FC12000
heap
page read and write
1EE5B13F000
heap
page read and write
1EE5B111000
heap
page read and write
1EE59949000
heap
page read and write
1EE5B0BB000
heap
page read and write
1B1FA1D7000
heap
page read and write
1EE59400000
trusted library allocation
page read and write
1E63B66B000
heap
page read and write
1EE59979000
heap
page read and write
1B1FA600000
heap
page read and write
1EE5982F000
heap
page read and write
1EE596D0000
trusted library allocation
page read and write
19F6FBFF000
heap
page read and write
1EE592B6000
trusted library allocation
page read and write
1EE5B074000
heap
page read and write
1C97D310000
trusted library allocation
page read and write
1EE5B026000
heap
page read and write
1EE592B8000
trusted library allocation
page read and write
1E63B658000
heap
page read and write
19F6FC12000
heap
page read and write
1EE5B0E2000
heap
page read and write
1E8957E0000
trusted library allocation
page read and write
1EE53B8E000
heap
page read and write
268EF513000
heap
page read and write
1E890B18000
heap
page read and write
1E89026F000
heap
page read and write
1EE599E7000
heap
page read and write
1EE54A40000
trusted library allocation
page read and write
1EE59869000
heap
page read and write
1D03C613000
heap
page read and write
1EE594B0000
trusted library allocation
page read and write
19F6FC47000
heap
page read and write
54049FF000
stack
page read and write
1EE599E5000
heap
page read and write
1EE599EA000
heap
page read and write
1E89582E000
heap
page read and write
1EE5B123000
heap
page read and write
1EE5998E000
heap
page read and write
19F6FECF000
heap
page read and write
1EE5995E000
heap
page read and write
24C64446000
heap
page read and write
9F000FA000
stack
page read and write
1EE5B092000
heap
page read and write
9F7FA7C000
stack
page read and write
1EE59839000
heap
page read and write
1EE592EA000
trusted library allocation
page read and write
1EE5B065000
heap
page read and write
1EE592A0000
trusted library allocation
page read and write
19F6FC12000
heap
page read and write
19F6FC2F000
heap
page read and write
1EE5B0F1000
heap
page read and write
1C97C5CA000
heap
page read and write
1EE592B4000
trusted library allocation
page read and write
1E7F5E5C000
heap
page read and write
1EE59834000
heap
page read and write
1EE5431D000
heap
page read and write
19F6FC2E000
heap
page read and write
1B1C1451000
heap
page read and write
1B1FA121000
heap
page read and write
540497D000
stack
page read and write
19F6FC2E000
heap
page read and write
1EE5B0A5000
heap
page read and write
1EE5B0EC000
heap
page read and write
1EE599E0000
heap
page read and write
B91947E000
stack
page read and write
1EE599E8000
heap
page read and write
1D03C625000
heap
page read and write
19F6FC36000
heap
page read and write
24C64230000
heap
page read and write
1EE545AF000
heap
page read and write
1EE592A0000
trusted library allocation
page read and write
1E7F5C80000
heap
page read and write
19F6FBFF000
heap
page read and write
1EE5B0B8000
heap
page read and write
19F6FC3F000
heap
page read and write
1EE5982D000
heap
page read and write
AF7207B000
stack
page read and write
1EE5998C000
heap
page read and write
B91937F000
stack
page read and write
1B1FA113000
heap
page read and write
1EE53A8A000
heap
page read and write
1EE53A43000
heap
page read and write
1EE59834000
heap
page read and write
1E895A60000
remote allocation
page read and write
19F6FC10000
heap
page read and write
1E895724000
trusted library allocation
page read and write
19F6FC56000
heap
page read and write
1EE53A13000
heap
page read and write
1B1FA194000
heap
page read and write
1EE590E0000
trusted library allocation
page read and write
A70E7FB000
stack
page read and write
1EE59962000
heap
page read and write
19F6FBFF000
heap
page read and write
1EE59861000
heap
page read and write
1EE5431D000
heap
page read and write
19F6FC4C000
heap
page read and write
268EF477000
heap
page read and write
1E63B657000
heap
page read and write
19668190000
heap
page read and write
68D99FF000
stack
page read and write
1E891560000
trusted library allocation
page read and write
1EE54AC0000
trusted library allocation
page read and write
1B1FA18C000
heap
page read and write
1EE5458A000
heap
page read and write
1EE5B14A000
heap
page read and write
1EE592AE000
trusted library allocation
page read and write
1E895720000
trusted library allocation
page read and write
A70E5FF000
stack
page read and write
1C97C3A0000
trusted library allocation
page read and write
1E895A40000
trusted library allocation
page read and write
19F6FC22000
heap
page read and write
1EE59410000
trusted library allocation
page read and write
1EE59975000
heap
page read and write
22E372A1000
heap
page read and write
208EA869000
heap
page read and write
1EE59959000
heap
page read and write
1EE5B074000
heap
page read and write
1EE5941C000
trusted library allocation
page read and write
1EE59934000
heap
page read and write
19F6FC10000
heap
page read and write
1B1FA602000
heap
page read and write
1EE59972000
heap
page read and write
1EE54575000
heap
page read and write
1EE599E5000
heap
page read and write
24C64402000
heap
page read and write
A70E67C000
stack
page read and write
19F6FC10000
heap
page read and write
1EE5B0AA000
heap
page read and write
268EF1D0000
heap
page read and write
268EF44E000
heap
page read and write
1E8900A0000
heap
page read and write
1EE545AF000
heap
page read and write
1EE55080000
trusted library section
page readonly
19F6FF11000
heap
page read and write
19F6FC3D000
heap
page read and write
19F6FC30000
heap
page read and write
1B1F98D9000
heap
page read and write
54045FE000
stack
page read and write
1EE545D0000
heap
page read and write
26009FE000
unkown
page read and write
19F6FBF6000
heap
page read and write
1EE5B1B2000
heap
page read and write
19F6FC4E000
heap
page read and write
1D03C602000
heap
page read and write
FA0FFFD000
stack
page read and write
27380F13000
heap
page read and write
1E895700000
trusted library allocation
page read and write
1EE5B102000
heap
page read and write
1EE59470000
trusted library allocation
page read and write
1EE5B0A1000
heap
page read and write
22E372C1000
heap
page read and write
1EE5B1A4000
heap
page read and write
19F6FC31000
heap
page read and write
1E895860000
trusted library allocation
page read and write
B91917B000
stack
page read and write
1EE590F0000
trusted library allocation
page read and write
1EE5B136000
heap
page read and write
1EE599E5000
heap
page read and write
19F6FC4E000
heap
page read and write
19F6FC2E000
heap
page read and write
19F6FEA0000
heap
page read and write
22E372A1000
heap
page read and write
1EE59653000
trusted library allocation
page read and write
1B1F9829000
heap
page read and write
1EE5B07B000
heap
page read and write
9F7FC7E000
stack
page read and write
1EE5B092000
heap
page read and write
1E7F5E5E000
heap
page read and write
19F6FC31000
heap
page read and write
19F6FC25000
heap
page read and write
1EE5456C000
heap
page read and write
19F6FC3F000
heap
page read and write
268EF508000
heap
page read and write
19F6DEB4000
heap
page read and write
1E63B659000
heap
page read and write
E8E99FE000
stack
page read and write
1EE59976000
heap
page read and write
9F7FBFF000
stack
page read and write
E8E98F8000
stack
page read and write
1E890256000
heap
page read and write
1E890277000
heap
page read and write
1B1FA110000
heap
page read and write
1EE5995A000
heap
page read and write
1EE59826000
heap
page read and write
1E1A0FE000
stack
page read and write
1EE5459F000
heap
page read and write
19F6FC4E000
heap
page read and write
1D03C679000
heap
page read and write
1EE599E5000
heap
page read and write
19F70040000
heap
page read and write
1EE592A0000
trusted library allocation
page read and write
19F6FC2B000
heap
page read and write
1EE59905000
heap
page read and write
19F6FBFF000
heap
page read and write
1EE5B09A000
heap
page read and write
19F6FC34000
heap
page read and write
27380F02000
heap
page read and write
19F6FC1E000
heap
page read and write
1E7F5E4B000
heap
page read and write
1EE59410000
trusted library allocation
page read and write
1EE550C1000
trusted library allocation
page read and write
1E1A37B000
stack
page read and write
1EE5996E000
heap
page read and write
19F6DEDD000
heap
page read and write
1EE59958000
heap
page read and write
1EE59853000
heap
page read and write
E8E987F000
stack
page read and write
1B1C1C02000
heap
page read and write
19F6FC20000
heap
page read and write
328B6FF000
stack
page read and write
19F6FBFB000
heap
page read and write
1C97D360000
trusted library allocation
page read and write
19F6FC49000
heap
page read and write
1EE59280000
trusted library allocation
page read and write
1EE5B089000
heap
page read and write
1EE5B1B9000
heap
page read and write
1E63B64E000
heap
page read and write
19F6FC2E000
heap
page read and write
1E8902B6000
heap
page read and write
E8E95FE000
stack
page read and write
19F6FC30000
heap
page read and write
19F6FC31000
heap
page read and write
1EE59400000
trusted library allocation
page read and write
1EE59858000
heap
page read and write
1EE59280000
trusted library allocation
page read and write
328B5FF000
stack
page read and write
19F6FC12000
heap
page read and write
19F6FC3F000
heap
page read and write
1EE5B099000
heap
page read and write
1EE594E0000
trusted library allocation
page read and write
1EE5B0AB000
heap
page read and write
1EE53A43000
heap
page read and write
1E8902FD000
heap
page read and write
1E63B660000
heap
page read and write
1C97C820000
trusted library allocation
page read and write
1B1FA199000
heap
page read and write
1B1F9855000
heap
page read and write
1EE53BEB000
heap
page read and write
1EE599BF000
heap
page read and write
1EE59985000
heap
page read and write
1EE5B0A8000
heap
page read and write
1EE5B076000
heap
page read and write
19F6FC10000
heap
page read and write
1EE5B0D4000
heap
page read and write
1B1FA186000
heap
page read and write
19F6FC2F000
heap
page read and write
1EE59986000
heap
page read and write
1EE5B08A000
heap
page read and write
19F6DEB3000
heap
page read and write
19F6FBFF000
heap
page read and write
1B1FA196000
heap
page read and write
1EE599E6000
heap
page read and write
1C97C810000
heap
page read and write
1C97D2F0000
heap
page readonly
19F6FC10000
heap
page read and write
19F6FC44000
heap
page read and write
19F6FC07000
heap
page read and write
1EE59988000
heap
page read and write
1E63BE02000
trusted library allocation
page read and write
1E1A4F7000
stack
page read and write
1EE5B05D000
heap
page read and write
1EE5B093000
heap
page read and write
19F6FC10000
heap
page read and write
1EE599EA000
heap
page read and write
27380F08000
heap
page read and write
19F6FBFC000
heap
page read and write
1B1C1429000
heap
page read and write
134B87E000
stack
page read and write
1EE59410000
trusted library allocation
page read and write
1EE59978000
heap
page read and write
B919277000
stack
page read and write
19F6FF0F000
heap
page read and write
1EE5B06C000
heap
page read and write
24C641D0000
heap
page read and write
FA0F79B000
stack
page read and write
1E8957D0000
trusted library allocation
page read and write
27380E24000
heap
page read and write
3F306F9000
stack
page read and write
134B13E000
stack
page read and write
1EE5B0DE000
heap
page read and write
1EE59848000
heap
page read and write
1B1FA1AA000
heap
page read and write
22E372C0000
heap
page read and write
19F6FBFC000
heap
page read and write
1EE5996A000
heap
page read and write
1EE592BC000
trusted library allocation
page read and write
1C97C571000
heap
page read and write
1EE59838000
heap
page read and write
19668502000
heap
page read and write
68D96FE000
stack
page read and write
19F6FC3A000
heap
page read and write
19F6FC2F000
heap
page read and write
27381602000
trusted library allocation
page read and write
1B1F9854000
heap
page read and write
1EE545A8000
heap
page read and write
268EF429000
heap
page read and write
1EE599E5000
heap
page read and write
1E890A15000
heap
page read and write
19F6FC38000
heap
page read and write
208EA86D000
heap
page read and write
24C6441F000
heap
page read and write
19F6FC25000
heap
page read and write
19F6FC00000
heap
page read and write
19F6DE40000
heap
page read and write
1C97C800000
trusted library allocation
page read and write
1EE59400000
trusted library allocation
page read and write
1E895560000
trusted library allocation
page read and write
1EE59952000
heap
page read and write
1EE59938000
heap
page read and write
1D03C3A0000
heap
page read and write
1EE59869000
heap
page read and write
1EE5983F000
heap
page read and write
1EE5B055000
heap
page read and write
E8395FF000
stack
page read and write
1EE5B057000
heap
page read and write
1EE5B0B8000
heap
page read and write
19F6FC28000
heap
page read and write
19F6DF24000
heap
page read and write
1EE5982D000
heap
page read and write
1EE5B151000
heap
page read and write
1E895570000
trusted library allocation
page read and write
1EE53A58000
heap
page read and write
1EE53800000
heap
page read and write
22E37555000
heap
page read and write
1EE53A92000
heap
page read and write
22E372B2000
heap
page read and write
1EE545E4000
heap
page read and write
1EE592B0000
trusted library allocation
page read and write
208EA913000
heap
page read and write
19F6FC10000
heap
page read and write
1EE59850000
heap
page read and write
19F6FC44000
heap
page read and write
1D03C628000
heap
page read and write
19F6DEED000
heap
page read and write
1EE592B0000
trusted library allocation
page read and write
19668413000
heap
page read and write
1EE599E5000
heap
page read and write
1EE5B141000
heap
page read and write
1EE59800000
heap
page read and write
1EE5B1C2000
heap
page read and write
1EE5B13B000
heap
page read and write
1E63B677000
heap
page read and write
328B4FE000
stack
page read and write
19F6FBFF000
heap
page read and write
1E895850000
trusted library allocation
page read and write
208EB002000
trusted library allocation
page read and write
22E372A1000
heap
page read and write
1E895B50000
trusted library allocation
page read and write
134B77E000
stack
page read and write
19F6FC2E000
heap
page read and write
1EE5B0A1000
heap
page read and write
1EE545A7000
heap
page read and write
68D9EFF000
stack
page read and write
1EE54597000
heap
page read and write
1EE59902000
heap
page read and write
1EE592B0000
trusted library allocation
page read and write
1EE5B057000
heap
page read and write
1EE59838000
heap
page read and write
19F6DF22000
heap
page read and write
1E890B00000
heap
page read and write
19F6FC55000
heap
page read and write
19F6FC4E000
heap
page read and write
1EE59966000
heap
page read and write
19F6FC49000
heap
page read and write
1EE5B108000
heap
page read and write
1EE59861000
heap
page read and write
27380D10000
heap
page read and write
1EE54202000
heap
page read and write
1EE5B055000
heap
page read and write
1EE59802000
heap
page read and write
1EE5B028000
heap
page read and write
1EE5B034000
heap
page read and write
1E89589B000
heap
page read and write
9F00A75000
stack
page read and write
1EE59834000
heap
page read and write
208EAE60000
trusted library allocation
page read and write
19F6FC42000
heap
page read and write
19F6FDD0000
remote allocation
page read and write
19F6FC44000
heap
page read and write
1EE59540000
trusted library allocation
page read and write
19F6FC04000
heap
page read and write
1E63B4E0000
heap
page read and write
19F6FC10000
heap
page read and write
19F6FC24000
heap
page read and write
1EE54327000
heap
page read and write
1EE543F2000
heap
page read and write
27380E74000
heap
page read and write
26005FB000
stack
page read and write
E838E9C000
stack
page read and write
1EE5B078000
heap
page read and write
19F6FF32000
heap
page read and write
1E8958E9000
heap
page read and write
19F6FC42000
heap
page read and write
1EE5B134000
heap
page read and write
1EE5B0FF000
heap
page read and write
19F6FC02000
heap
page read and write
1E895A60000
remote allocation
page read and write
1EE59968000
heap
page read and write
19F6FBFB000
heap
page read and write
68D9AFF000
stack
page read and write
1EE5B117000
heap
page read and write
E8E957A000
stack
page read and write
1EE59861000
heap
page read and write
1EE53990000
trusted library allocation
page read and write
1B1C1D00000
heap
page read and write
1EE54354000
heap
page read and write
1EE5B145000
heap
page read and write
22E373A0000
heap
page read and write
1EE54322000
heap
page read and write
19F6FC01000
heap
page read and write
1EE5B14F000
heap
page read and write
1E63B600000
heap
page read and write
1EE59977000
heap
page read and write
19F6FF32000
heap
page read and write
19F6FC3A000
heap
page read and write
19F6FC00000
heap
page read and write
1EE5982D000
heap
page read and write
1EE54200000
heap
page read and write
1EE592AC000
trusted library allocation
page read and write
1EE59985000
heap
page read and write
FA0FDFD000
stack
page read and write
1EE59984000
heap
page read and write
1EE5B172000
heap
page read and write
1EE59974000
heap
page read and write
1EE5B1C5000
heap
page read and write
1E8902B7000
heap
page read and write
1EE59520000
trusted library allocation
page read and write
1EE59862000
heap
page read and write
1EE59410000
trusted library allocation
page read and write
1EE545B4000
heap
page read and write
1EE5982D000
heap
page read and write
1EE59964000
heap
page read and write
1EE5B017000
heap
page read and write
1EE59826000
heap
page read and write
1EE59869000
heap
page read and write
1B1F98AF000
heap
page read and write
19F6FF11000
heap
page read and write
27380F00000
heap
page read and write
1EE59837000
heap
page read and write
1E63B62F000
heap
page read and write
1E8958FD000
heap
page read and write
19F6FC4C000
heap
page read and write
1EE5B0A5000
heap
page read and write
19F6FC31000
heap
page read and write
1EE5B187000
heap
page read and write
1EE5432A000
heap
page read and write
1E63B644000
heap
page read and write
E8394FF000
stack
page read and write
1EE5B0FF000
heap
page read and write
19F6DEF3000
heap
page read and write
EF1247E000
stack
page read and write
1E890200000
heap
page read and write
1EE5B198000
heap
page read and write
19F6FC2B000
heap
page read and write
1EE599E8000
heap
page read and write
1EE5B097000
heap
page read and write
1EE5B057000
heap
page read and write
9F0057E000
stack
page read and write
19F6FC38000
heap
page read and write
1EE592B8000
trusted library allocation
page read and write
1B1C14C3000
heap
page read and write
19F6FC31000
heap
page read and write
268EF500000
heap
page read and write
1EE592EA000
trusted library allocation
page read and write
19F6FC2B000
heap
page read and write
1EE5B127000
heap
page read and write
1EE5B057000
heap
page read and write
1EE545CB000
heap
page read and write
19F6FC38000
heap
page read and write
1EE5983C000
heap
page read and write
1EE59985000
heap
page read and write
19668990000
remote allocation
page read and write
1E63B667000
heap
page read and write
19F6DE81000
heap
page read and write
1EE5B079000
heap
page read and write
EF11D6E000
stack
page read and write
19F6FBFF000
heap
page read and write
1E63B649000
heap
page read and write
1E8902FD000
heap
page read and write
1EE5A010000
heap
page read and write
1E63B642000
heap
page read and write
1EE543F0000
heap
page read and write
19F6FC2F000
heap
page read and write
19F6FC10000
heap
page read and write
1EE59938000
heap
page read and write
1EE594C0000
trusted library allocation
page read and write
1E63B67B000
heap
page read and write
1D03C660000
heap
page read and write
1E896000000
heap
page read and write
19F6FC56000
heap
page read and write
1EE592C0000
trusted library allocation
page read and write
268EF990000
trusted library allocation
page read and write
19F6FC42000
heap
page read and write
19F6FC2E000
heap
page read and write
1EE592B2000
trusted library allocation
page read and write
1EE59826000
heap
page read and write
1D03C5E0000
trusted library allocation
page read and write
19F6FC42000
heap
page read and write
1EE54215000
heap
page read and write
1EE592B6000
trusted library allocation
page read and write
19F6FC31000
heap
page read and write
1EE59826000
heap
page read and write
19F6FC4E000
heap
page read and write
1EE5B0BF000
heap
page read and write
1EE59938000
heap
page read and write
9F003FA000
stack
page read and write
1EE5995C000
heap
page read and write
268EF44B000
heap
page read and write
1E63B662000
heap
page read and write
19F6FBF2000
heap
page read and write
19F6FC2E000
heap
page read and write
1B1F97E0000
trusted library allocation
page read and write
1B1F9916000
heap
page read and write
19F6FC44000
heap
page read and write
1D03C600000
heap
page read and write
268EF1C0000
heap
page read and write
19F6FC10000
heap
page read and write
19F6FC34000
heap
page read and write
1EE5B125000
heap
page read and write
1EE5B0C1000
heap
page read and write
19F6FC13000
heap
page read and write
196683D0000
trusted library allocation
page read and write
19F6FBFC000
heap
page read and write
19F6DF14000
heap
page read and write
1E89023D000
heap
page read and write
A70E9FE000
stack
page read and write
1EE55090000
trusted library section
page readonly
1EE53A8D000
heap
page read and write
19F6E1AD000
heap
page read and write
9F002FA000
stack
page read and write
1EE5B147000
heap
page read and write
1EE5B074000
heap
page read and write
1EE5B115000
heap
page read and write
268EF413000
heap
page read and write
1E7F5CF0000
heap
page read and write
1EE59414000
trusted library allocation
page read and write
1EE543AE000
heap
page read and write
1EE59414000
trusted library allocation
page read and write
1E63B63B000
heap
page read and write
19F6FC06000
heap
page read and write
1EE59974000
heap
page read and write
208EA829000
heap
page read and write
1EE5994A000
heap
page read and write
1EE59986000
heap
page read and write
1EE5B074000
heap
page read and write
1E890292000
heap
page read and write
1EE593D0000
trusted library allocation
page read and write
1E895A30000
trusted library allocation
page read and write
19F6FC2E000
heap
page read and write
AF726FA000
stack
page read and write
1EE54586000
heap
page read and write
27380E13000
heap
page read and write
1EE5B1B9000
heap
page read and write
1D03C3B0000
heap
page read and write
1EE5B14D000
heap
page read and write
1E63B661000
heap
page read and write
19F6FC04000
heap
page read and write
19F6FC2F000
heap
page read and write
1EE545D3000
heap
page read and write
1EE5B0FF000
heap
page read and write
1B1F9670000
heap
page read and write
22E37380000
heap
page read and write
26007FA000
stack
page read and write
1C97D300000
trusted library allocation
page read and write
134B57E000
stack
page read and write
24C64400000
heap
page read and write
19F6FBFB000
heap
page read and write
1EE592AC000
trusted library allocation
page read and write
1EE54322000
heap
page read and write
1EE5B03D000
heap
page read and write
1EE5B138000
heap
page read and write
19F6FC1D000
heap
page read and write
1EE5B0B8000
heap
page read and write
E8393F9000
stack
page read and write
1EE5B107000
heap
page read and write
19F6FDD0000
remote allocation
page read and write
1EE59978000
heap
page read and write
208EA867000
heap
page read and write
1B1FA100000
heap
page read and write
1B1F9913000
heap
page read and write
1EE59974000
heap
page read and write
1EE5B148000
heap
page read and write
1EE592A0000
trusted library allocation
page read and write
1C97C7F0000
trusted library allocation
page read and write
1EE5B00A000
heap
page read and write
1EE5941C000
trusted library allocation
page read and write
1B1FA602000
heap
page read and write
1B1F985A000
heap
page read and write
19F6DE69000
heap
page read and write
1B1FA196000
heap
page read and write
1EE5941C000
trusted library allocation
page read and write
E8392FE000
stack
page read and write
1E7F5E61000
heap
page read and write
19F6FC20000
heap
page read and write
1EE5B0A6000
heap
page read and write
1EE5B1B2000
heap
page read and write
268EF400000
heap
page read and write
1EE5B1B2000
heap
page read and write
22E372A7000
heap
page read and write
22E372C5000
heap
page read and write
1EE5985F000
heap
page read and write
1E1A3FF000
stack
page read and write
19F6FC47000
heap
page read and write
1EE5B0B9000
heap
page read and write
19F6FC04000
heap
page read and write
268EF451000
heap
page read and write
1EE5984D000
heap
page read and write
1E63B4F0000
heap
page read and write
1EE59560000
remote allocation
page read and write
1C97C5AE000
heap
page read and write
AF71E77000
stack
page read and write
1EE545CD000
heap
page read and write
19F6FC55000
heap
page read and write
1E8958FB000
heap
page read and write
1EE5B091000
heap
page read and write
1EE5B0E9000
heap
page read and write
1D03C702000
heap
page read and write
1E895721000
trusted library allocation
page read and write
19F6FC49000
heap
page read and write
19F6FC17000
heap
page read and write
A70E8FD000
stack
page read and write
19F6FBF3000
heap
page read and write
9F7FEF9000
stack
page read and write
1EE5B0B8000
heap
page read and write
1EE53970000
trusted library allocation
page read and write
1EE59410000
trusted library allocation
page read and write
1EE59414000
trusted library allocation
page read and write
1EE59862000
heap
page read and write
27380E69000
heap
page read and write
9F0097E000
stack
page read and write
19F6FC2E000
heap
page read and write
1EE59826000
heap
page read and write
1EE5B024000
heap
page read and write
19F6FC27000
heap
page read and write
19F6DE99000
heap
page read and write
19668458000
heap
page read and write
19F6FC2E000
heap
page read and write
1EE545D9000
heap
page read and write
208EA800000
heap
page read and write
19F6FFA0000
heap
page read and write
2600AF8000
stack
page read and write
1EE599D2000
heap
page read and write
1EE5B089000
heap
page read and write
19F6FC04000
heap
page read and write
1EE5983C000
heap
page read and write
19F6FC4E000
heap
page read and write
1E63B65F000
heap
page read and write
1EE5B017000
heap
page read and write
1E895820000
heap
page read and write
1EE5B057000
heap
page read and write
540477E000
stack
page read and write
1EE59826000
heap
page read and write
19F6FC30000
heap
page read and write
19F6FEDE000
heap
page read and write
1B1F98A9000
heap
page read and write
1C97C5A6000
heap
page read and write
1EE59939000
heap
page read and write
1EE59949000
heap
page read and write
1B1FA192000
heap
page read and write
19F6FC34000
heap
page read and write
1E7F5C90000
heap
page read and write
208EA876000
heap
page read and write
19F6FC25000
heap
page read and write
19668A02000
trusted library allocation
page read and write
19F6FC2D000
heap
page read and write
1D03C410000
heap
page read and write
24C64A02000
trusted library allocation
page read and write
1EE5997B000
heap
page read and write
1EE5B176000
heap
page read and write
AF727F9000
stack
page read and write
1E7F5E77000
heap
page read and write
19F6FC3D000
heap
page read and write
1EE59985000
heap
page read and write
1E890A02000
heap
page read and write
1E89584A000
heap
page read and write
1EE54500000
heap
page read and write
1EE599E6000
heap
page read and write
19668440000
heap
page read and write
1EE594D0000
trusted library allocation
page read and write
1EE5982F000
heap
page read and write
1EE5B09E000
heap
page read and write
540447B000
stack
page read and write
19F6FC04000
heap
page read and write
1E63B66D000
heap
page read and write
1B1C1D12000
heap
page read and write
1EE599E5000
heap
page read and write
1EE5B033000
heap
page read and write
19668990000
remote allocation
page read and write
1EE59974000
heap
page read and write
19F6FC10000
heap
page read and write
1EE5B0A1000
heap
page read and write
1E895A20000
trusted library allocation
page read and write
1E895708000
trusted library allocation
page read and write
208EA840000
heap
page read and write
1EE5B0F4000
heap
page read and write
1EE5B074000
heap
page read and write
1EE59903000
heap
page read and write
1B1C1400000
heap
page read and write
1EE599EA000
heap
page read and write
1EE5B094000
heap
page read and write
1EE59855000
heap
page read and write
268EFA02000
trusted library allocation
page read and write
1EE599E8000
heap
page read and write
1EE53BC2000
heap
page read and write
1E895B70000
trusted library allocation
page read and write
1EE59979000
heap
page read and write
1EE5B11F000
heap
page read and write
19F6FC3A000
heap
page read and write
1E63B580000
trusted library allocation
page read and write
EF11CEB000
stack
page read and write
1EE599E5000
heap
page read and write
1EE545C7000
heap
page read and write
1EE5B105000
heap
page read and write
19F6FC49000
heap
page read and write
1EE592A8000
trusted library allocation
page read and write
19F6F880000
heap
page read and write
1EE5982D000
heap
page read and write
1E895862000
heap
page read and write
19F6DEE2000
heap
page read and write
FA103FF000
stack
page read and write
1EE592A0000
trusted library allocation
page read and write
19F6FC05000
heap
page read and write
1E895800000
heap
page read and write
208EA872000
heap
page read and write
1B1F983C000
heap
page read and write
19F6FC44000
heap
page read and write
1EE59320000
trusted library allocation
page read and write
19F6FC00000
heap
page read and write
19F6FC2E000
heap
page read and write
22E3728B000
heap
page read and write
1EE59834000
heap
page read and write
19F6FC57000
heap
page read and write
1E891140000
trusted library allocation
page read and write
1EE59560000
remote allocation
page read and write
EF1227E000
stack
page read and write
19F6FC34000
heap
page read and write
19F6FC4C000
heap
page read and write
19F6DEE9000
heap
page read and write
1EE592BC000
trusted library allocation
page read and write
1E63B702000
heap
page read and write
19F6FC12000
heap
page read and write
9F00AFF000
stack
page read and write
19F6FC31000
heap
page read and write
1E8958F2000
heap
page read and write
1EE59972000
heap
page read and write
19F6FC07000
heap
page read and write
19F6FC3D000
heap
page read and write
1E8958E7000
heap
page read and write
1EE5B128000
heap
page read and write
19F6FC25000
heap
page read and write
1B1FA120000
heap
page read and write
19F6FBFF000
heap
page read and write
19F6FDD0000
remote allocation
page read and write
1EE53A29000
heap
page read and write
19F6FC25000
heap
page read and write
19F6FC34000
heap
page read and write
1E8958E0000
heap
page read and write
19668402000
heap
page read and write
1E63B640000
heap
page read and write
19F6FC34000
heap
page read and write
1EE59985000
heap
page read and write
19F6FC55000
heap
page read and write
1EE59985000
heap
page read and write
1E890279000
heap
page read and write
1EE592BE000
trusted library allocation
page read and write
1EE5B04E000
heap
page read and write
1EE59974000
heap
page read and write
1EE59975000
heap
page read and write
1EE59410000
trusted library allocation
page read and write
1EE5B061000
heap
page read and write
1E1A27B000
stack
page read and write
1E895700000
trusted library allocation
page read and write
AF71C7C000
stack
page read and write
1EE59960000
heap
page read and write
19F6FC1D000
heap
page read and write
19F6FC3D000
heap
page read and write
1E895730000
trusted library allocation
page read and write
19F6FC12000
heap
page read and write
19F6FC44000
heap
page read and write
1EE5B04E000
heap
page read and write
19F6FC13000
heap
page read and write
1EE5B07F000
heap
page read and write
1C97C560000
heap
page read and write
1EE59838000
heap
page read and write
1EE5B04E000
heap
page read and write
1EE5985B000
heap
page read and write
1EE550B0000
trusted library section
page readonly
1B1F9870000
heap
page read and write
19F6FC20000
heap
page read and write
19F6FC04000
heap
page read and write
1E895744000
trusted library allocation
page read and write
1B1F9853000
heap
page read and write
1EE5B0AA000
heap
page read and write
19F6DE7E000
heap
page read and write
1EE5B080000
heap
page read and write
1EE5B019000
heap
page read and write
19F6FC00000
heap
page read and write
1B1FA1CD000
heap
page read and write
1EE5B01A000
heap
page read and write
1EE5982F000
heap
page read and write
1EE5B099000
heap
page read and write
9F7FD7E000
stack
page read and write
19F6FC55000
heap
page read and write
1E63B629000
heap
page read and write
1C97C569000
heap
page read and write
19F6FC12000
heap
page read and write
1EE5B12E000
heap
page read and write
1EE5B0F1000
heap
page read and write
There are 1560 hidden memdumps, click here to show them.