IOC Report
SSMD34590-DDMV09.pdf

loading gif

Files

File Path
Type
Category
Malicious
SSMD34590-DDMV09.pdf
PDF document, version 1.3
initial sample
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\05349744be1ad4ad_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0786087c3c360803_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0998db3a32ab3f41_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0ace9ee3d914a5c0_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\0f25049d69125b1e_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\230e5fe3e6f82b2c_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2798067b152b83c7_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\2a426f11fd8ebe18_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\39c14c1f4b086971_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\3a4ae3940784292a_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\4a0e94571d979b3c_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\560e9c8bff5008d8_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\56c4cd218555ae2b_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\6267ed4d4a13f54b_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\6fb6d030c4ebbc21_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\7120c35b509b0fae_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\71febec55d5c75cd_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\86b8040b7132b608_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c159cc5880890bc_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8c84d92a9dbce3e0_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\8e417e79df3bf0e9_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\91cec06bb2836fa5_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\927a1596c37ebe5e_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\92c56fa2a6c4d5ba_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\946896ee27df7947_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\983b7a3da8f39a46_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\aba6710fde0876af_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\b6d5deb4812ac6e9_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bba29d2e6197e2f4_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\bf0ac66ae1eb4a7f_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\cf3e34002cde7e9c_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\d449e58cb15daaf1_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\d88192ac53852604_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\de789e80edd740d6_0
data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f0cf6dfa8a1afa3d_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f4a0d4ca2f3b95da_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f941376b2efdd6e6_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\f971b7eda7fa05c3_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\fd17b2d8331c91e8_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\fdd733564de6fbcb_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\febb41df4ea2b63a_0
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\temp-index
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Code Cache\js\index-dir\the-real-index (copy)
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Visited Links
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ConnectorIcons\icon-220811122419Z-198.bmp
PC bitmap, Windows 3.x format, 117 x -152 x 32
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
SQLite 3.x database, last written using SQLite version 3024000
dropped
C:\Users\user\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt16.lst.6064
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt19.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Security\ES_session_store
data
dropped
There are 43 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\user\Desktop\SSMD34590-DDMV09.pdf
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043

IPs

IP
Domain
Country
Malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
aFS
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
tDIText
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
tFileName
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
tFileSource
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
sFileAncestors
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
sDI
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
sDate
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
uFileSize
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c1
uPageCount
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
aFS
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
tDIText
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
tFileName
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
sFileAncestors
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
sDI
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral\cRecentFiles\c2
sDate
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
216A9EDD000
heap
page read and write
216A9C38000
heap
page read and write
216A54C0000
trusted library allocation
page read and write
216A9F9C000
heap
page read and write
1632AC65000
heap
page read and write
1AE36EA0000
remote allocation
page read and write
2092F6AD000
heap
page read and write
216A97F0000
trusted library allocation
page read and write
2092FF75000
heap
page read and write
216A9EB9000
heap
page read and write
216A9D17000
heap
page read and write
18A7F400000
heap
page read and write
1D5365C3000
trusted library allocation
page read and write
216A45F0000
trusted library allocation
page read and write
2092F6FF000
heap
page read and write
1A758FF000
stack
page read and write
20930402000
heap
page read and write
23874300000
heap
page read and write
216A9C2F000
heap
page read and write
216A9EA0000
heap
page read and write
216A9ED5000
heap
page read and write
216A4975000
heap
page read and write
216A9DC5000
heap
page read and write
216A9EAA000
heap
page read and write
216A9ED5000
heap
page read and write
216A3FC2000
heap
page read and write
216A9ED5000
heap
page read and write
216AB470000
trusted library allocation
page read and write
216A97E0000
trusted library allocation
page read and write
216A9C38000
heap
page read and write
216A9E31000
heap
page read and write
216A9C62000
heap
page read and write
216A9F57000
heap
page read and write
216A9880000
trusted library allocation
page read and write
216A9E9F000
heap
page read and write
13E1126D000
heap
page read and write
216A9D1B000
heap
page read and write
216A49A8000
heap
page read and write
2092FFA6000
heap
page read and write
216A9D02000
heap
page read and write
216A97F4000
trusted library allocation
page read and write
1632AC5F000
heap
page read and write
216A9C61000
heap
page read and write
216A9F1C000
heap
page read and write
216A9ECC000
heap
page read and write
216A472F000
heap
page read and write
216A49CA000
heap
page read and write
95CDC7E000
stack
page read and write
216A9D9B000
heap
page read and write
216A47DF000
heap
page read and write
216A9E32000
heap
page read and write
216A97FC000
trusted library allocation
page read and write
13E11260000
heap
page read and write
216A9C3C000
heap
page read and write
216A494C000
heap
page read and write
216A9D43000
heap
page read and write
216A498B000
heap
page read and write
216A9E2E000
heap
page read and write
13E11200000
heap
page read and write
390D2FE000
stack
page read and write
579F8FF000
stack
page read and write
216A9C53000
heap
page read and write
216A9FCA000
heap
page read and write
216A49EE000
heap
page read and write
216A9C69000
heap
page read and write
1D53B610000
trusted library allocation
page read and write
22FCB2E1000
heap
page read and write
216A49C4000
heap
page read and write
5887A7B000
stack
page read and write
13E1127B000
heap
page read and write
216A49FB000
heap
page read and write
9C99E7F000
stack
page read and write
20930400000
heap
page read and write
216A498B000
heap
page read and write
216A9C26000
heap
page read and write
216A9696000
trusted library allocation
page read and write
2092F6C4000
heap
page read and write
216A9D2B000
heap
page read and write
23874228000
heap
page read and write
216A9FDA000
heap
page read and write
216A9C2F000
heap
page read and write
216A9EB8000
heap
page read and write
1D53B234000
heap
page read and write
216A9DD4000
heap
page read and write
216A9C2D000
heap
page read and write
2092F6B9000
heap
page read and write
216A97E0000
trusted library allocation
page read and write
216A9DB9000
heap
page read and write
55CD279000
stack
page read and write
1FC9AD02000
heap
page read and write
216A9950000
trusted library allocation
page read and write
2092F6C1000
heap
page read and write
2733B68E000
heap
page read and write
216A9D43000
heap
page read and write
1D535E76000
heap
page read and write
216A9C2D000
heap
page read and write
1B2F2DB0000
heap
page read and write
216A9EDD000
heap
page read and write
787C5FE000
stack
page read and write
5BCCBF7000
stack
page read and write
216A9ED5000
heap
page read and write
1AE36851000
heap
page read and write
216A9F00000
heap
page read and write
2F06FFF000
stack
page read and write
22FCBA02000
heap
page read and write
216A3E85000
heap
page read and write
2092F716000
heap
page read and write
216A9D17000
heap
page read and write
43D4FBC000
stack
page read and write
216A9D03000
heap
page read and write
1D535E8B000
heap
page read and write
1632B402000
trusted library allocation
page read and write
216A4802000
heap
page read and write
216A9694000
trusted library allocation
page read and write
216A97D0000
trusted library allocation
page read and write
216A9C26000
heap
page read and write
1B02A115000
heap
page read and write
216A9F8A000
heap
page read and write
22FCB200000
heap
page read and write
1D53B257000
heap
page read and write
2092FF17000
heap
page read and write
216A9D7B000
heap
page read and write
13E11262000
heap
page read and write
1632AC13000
heap
page read and write
216A9C4F000
heap
page read and write
5BCC8FE000
stack
page read and write
13E1127E000
heap
page read and write
13E11264000
heap
page read and write
216A98C0000
trusted library allocation
page read and write
18A7F43E000
heap
page read and write
1B029E57000
heap
page read and write
216A9C2D000
heap
page read and write
216A9C50000
heap
page read and write
216A9C61000
heap
page read and write
216A9D85000
heap
page read and write
2733B661000
heap
page read and write
216A9F02000
heap
page read and write
216A9EE6000
heap
page read and write
216A9C2D000
heap
page read and write
22FCB120000
heap
page read and write
216A9ED5000
heap
page read and write
216A96CE000
trusted library allocation
page read and write
216A9EEB000
heap
page read and write
2F06EFF000
stack
page read and write
216A9C61000
heap
page read and write
216A9FF2000
heap
page read and write
1D535E8D000
heap
page read and write
13E1126B000
heap
page read and write
216A9680000
trusted library allocation
page read and write
216A9EA8000
heap
page read and write
216A9F26000
heap
page read and write
216A9E9B000
heap
page read and write
13E11229000
heap
page read and write
216A9D82000
heap
page read and write
390CBDE000
stack
page read and write
216A9D6F000
heap
page read and write
216A4792000
heap
page read and write
216A9E2D000
heap
page read and write
216A9850000
trusted library allocation
page read and write
216A9EA0000
heap
page read and write
2092FF00000
heap
page read and write
216A9780000
remote allocation
page read and write
579FBFE000
stack
page read and write
216A472A000
heap
page read and write
1AE36800000
heap
page read and write
787C3FC000
stack
page read and write
2092FFB8000
heap
page read and write
216A9FA6000
heap
page read and write
1D53B2B0000
heap
page read and write
216A9720000
trusted library allocation
page read and write
216A9D83000
heap
page read and write
216A9FEB000
heap
page read and write
43D527E000
stack
page read and write
18A7F370000
heap
page read and write
216A9EDD000
heap
page read and write
1FC9AC75000
heap
page read and write
216A3E00000
heap
page read and write
216A4998000
heap
page read and write
216A49E5000
heap
page read and write
2733B708000
heap
page read and write
216A9EC9000
heap
page read and write
216A9ECD000
heap
page read and write
216A4969000
heap
page read and write
216A4700000
heap
page read and write
1B2F304E000
heap
page read and write
216A9F15000
heap
page read and write
216A969C000
trusted library allocation
page read and write
216A4823000
heap
page read and write
2733B5E0000
heap
page read and write
1B029DF0000
heap
page read and write
216A4990000
heap
page read and write
9C9A07B000
stack
page read and write
216A9F6F000
heap
page read and write
1D535E55000
heap
page read and write
216A9F46000
heap
page read and write
216A3BE0000
heap
page read and write
216A9EC9000
heap
page read and write
216A49E5000
heap
page read and write
216A9C62000
heap
page read and write
216A9690000
trusted library allocation
page read and write
43D577F000
stack
page read and write
216A49F7000
heap
page read and write
2092FF76000
heap
page read and write
216A49CE000
heap
page read and write
216A9688000
trusted library allocation
page read and write
216A9E50000
heap
page read and write
1D53B2E9000
heap
page read and write
90334FA000
stack
page read and write
2092F654000
heap
page read and write
1B2F3102000
heap
page read and write
13E11213000
heap
page read and write
1D535D80000
trusted library section
page read and write
1FC9AC00000
heap
page read and write
216A4EC0000
trusted library allocation
page read and write
216A471D000
heap
page read and write
216A96CE000
trusted library allocation
page read and write
1D53B500000
trusted library allocation
page read and write
216A969C000
trusted library allocation
page read and write
579F3FF000
stack
page read and write
1632AAB0000
heap
page read and write
2092F627000
heap
page read and write
1D53B670000
remote allocation
page read and write
1D537160000
trusted library allocation
page read and write
216A3E65000
heap
page read and write
1D53B300000
heap
page read and write
13E11256000
heap
page read and write
216A9D82000
heap
page read and write
216A9C2C000
heap
page read and write
216A9EDD000
heap
page read and write
216A9F76000
heap
page read and write
1632AC24000
heap
page read and write
216A9ED1000
heap
page read and write
216A9688000
trusted library allocation
page read and write
216A9F7D000
heap
page read and write
216A4999000
heap
page read and write
216A9DD1000
heap
page read and write
1632AD08000
heap
page read and write
13E1124F000
heap
page read and write
1AE3683D000
heap
page read and write
572D0FD000
stack
page read and write
18A7F42F000
heap
page read and write
23874050000
heap
page read and write
216A9D05000
heap
page read and write
216A9690000
trusted library allocation
page read and write
43D5AFC000
stack
page read and write
2092FF90000
heap
page read and write
216A9C58000
heap
page read and write
1D53B521000
trusted library allocation
page read and write
1D536718000
heap
page read and write
216A9E59000
heap
page read and write
216A9C2D000
heap
page read and write
216A9DD1000
heap
page read and write
216A9D2B000
heap
page read and write
216A9E2F000
heap
page read and write
216A9D4E000
heap
page read and write
1B2F3002000
heap
page read and write
216A97F0000
trusted library allocation
page read and write
216A9C26000
heap
page read and write
1FC9AC64000
heap
page read and write
216A9E13000
heap
page read and write
216A9D43000
heap
page read and write
216A9C55000
heap
page read and write
1632AC02000
heap
page read and write
216A495C000
heap
page read and write
1D535C00000
heap
page read and write
216A4602000
heap
page read and write
216A968E000
trusted library allocation
page read and write
23874A02000
trusted library allocation
page read and write
588797F000
stack
page read and write
1D53B508000
trusted library allocation
page read and write
1D535E71000
heap
page read and write
23874279000
heap
page read and write
216A49E5000
heap
page read and write
216A9E5F000
heap
page read and write
216A9FF0000
heap
page read and write
216A9660000
trusted library allocation
page read and write
216A9F68000
heap
page read and write
216A9E52000
heap
page read and write
2733BE02000
trusted library allocation
page read and write
1B2F303C000
heap
page read and write
216A9698000
trusted library allocation
page read and write
2733B570000
heap
page read and write
216A96E5000
trusted library allocation
page read and write
216A9E6D000
heap
page read and write
216A9E00000
heap
page read and write
216A9E9F000
heap
page read and write
216A9D2B000
heap
page read and write
216A9E3D000
heap
page read and write
216A9F6F000
heap
page read and write
2733B63C000
heap
page read and write
216A9FDE000
heap
page read and write
216A9660000
trusted library allocation
page read and write
216A9FDC000
heap
page read and write
216A49F9000
heap
page read and write
238741C0000
trusted library allocation
page read and write
216A9D2B000
heap
page read and write
13E1122D000
heap
page read and write
2733B688000
heap
page read and write
216A49C7000
heap
page read and write
216A9C26000
heap
page read and write
216A9EDD000
heap
page read and write
216A480A000
heap
page read and write
9032FFB000
stack
page read and write
9033C7F000
stack
page read and write
216A9E4B000
heap
page read and write
216A9C53000
heap
page read and write
216A9900000
trusted library allocation
page read and write
216A9F42000
heap
page read and write
216A49CA000
heap
page read and write
2092F651000
heap
page read and write
43D52FE000
stack
page read and write
216A9ED3000
heap
page read and write
9C9A67D000
stack
page read and write
216A9DC1000
heap
page read and write
216A9C34000
heap
page read and write
216A97E0000
trusted library allocation
page read and write
1D536602000
heap
page read and write
216A9ED5000
heap
page read and write
216A9F13000
heap
page read and write
2092FFA1000
heap
page read and write
216A9FD0000
heap
page read and write
1D53B2FC000
heap
page read and write
216A9C00000
heap
page read and write
216A9E93000
heap
page read and write
216A9C34000
heap
page read and write
216A9FB6000
heap
page read and write
579F4FC000
stack
page read and write
216A9D2B000
heap
page read and write
1B2F3113000
heap
page read and write
216A97E0000
trusted library allocation
page read and write
1632AC52000
heap
page read and write
2092FF8D000
heap
page read and write
216A9EAE000
heap
page read and write
216A49CF000
heap
page read and write
2733B580000
heap
page read and write
2092F440000
heap
page read and write
1FC9AC7C000
heap
page read and write
2092F64D000
heap
page read and write
2092FF9E000
heap
page read and write
1AE37002000
trusted library allocation
page read and write
572CAFE000
stack
page read and write
43D547E000
stack
page read and write
22FCB190000
heap
page read and write
216A4943000
heap
page read and write
216A485A000
heap
page read and write
43D5877000
stack
page read and write
216A4998000
heap
page read and write
95CD75E000
stack
page read and write
22FCB2B8000
heap
page read and write
1D53B204000
heap
page read and write
216A9E97000
heap
page read and write
216A3FEB000
heap
page read and write
13E1123D000
heap
page read and write
23874200000
heap
page read and write
2092F6B1000
heap
page read and write
216A9D43000
heap
page read and write
216A9C5F000
heap
page read and write
2092F685000
heap
page read and write
1632AD02000
heap
page read and write
216A4900000
heap
page read and write
1B02A110000
heap
page read and write
216A9FE0000
heap
page read and write
95CD6DB000
stack
page read and write
1D53B200000
heap
page read and write
1B2F3013000
heap
page read and write
216A4999000
heap
page read and write
2092F650000
heap
page read and write
216A49A7000
heap
page read and write
216A969C000
trusted library allocation
page read and write
216A9F98000
heap
page read and write
216A9C2F000
heap
page read and write
579F9FF000
stack
page read and write
216A9C2F000
heap
page read and write
1D53B50E000
trusted library allocation
page read and write
216A97FC000
trusted library allocation
page read and write
216A97E0000
trusted library allocation
page read and write
1A756F9000
stack
page read and write
216A9D02000
heap
page read and write
9033A7F000
stack
page read and write
216A9EF5000
heap
page read and write
216A9C5C000
heap
page read and write
5BCC87E000
stack
page read and write
216A97B0000
trusted library allocation
page read and write
216A9D17000
heap
page read and write
216A9EDD000
heap
page read and write
216A98F0000
trusted library allocation
page read and write
1632AC5C000
heap
page read and write
2092FF74000
heap
page read and write
216A47F3000
heap
page read and write
216A9D2B000
heap
page read and write
13E111F0000
trusted library allocation
page read and write
216A9FA9000
heap
page read and write
1D53B1D0000
trusted library allocation
page read and write
216A9EB2000
heap
page read and write
216A4990000
heap
page read and write
216A9D2B000
heap
page read and write
216A9F35000
heap
page read and write
216A9E2E000
heap
page read and write
216A54B0000
trusted library section
page readonly
216A9D6A000
heap
page read and write
2092FF97000
heap
page read and write
216AA010000
heap
page read and write
216A9D17000
heap
page read and write
1AE366A0000
heap
page read and write
216A49EE000
heap
page read and write
216A9FEE000
heap
page read and write
216A481B000
heap
page read and write
1632ABB0000
trusted library allocation
page read and write
9033B7E000
stack
page read and write
216A9F68000
heap
page read and write
216A967C000
trusted library allocation
page read and write
1B2F3066000
heap
page read and write
2092FF69000
heap
page read and write
216A9EE3000
heap
page read and write
1D53B2E8000
heap
page read and write
23874264000
heap
page read and write
2092F5B0000
trusted library allocation
page read and write
1632AC00000
heap
page read and write
1D536E00000
trusted library section
page readonly
216A9F53000
heap
page read and write
216A97FC000
trusted library allocation
page read and write
216A9C34000
heap
page read and write
216A9EE9000
heap
page read and write
216A9C38000
heap
page read and write
1D53B1C0000
trusted library allocation
page read and write
216A9EB5000
heap
page read and write
216A9F2E000
heap
page read and write
216A49D7000
heap
page read and write
1D536702000
heap
page read and write
216A4600000
heap
page read and write
216A97F4000
trusted library allocation
page read and write
216A9D86000
heap
page read and write
216A9F5E000
heap
page read and write
216A9C34000
heap
page read and write
2092FF75000
heap
page read and write
18A7F380000
heap
page read and write
216A9C2D000
heap
page read and write
216A9F76000
heap
page read and write
216A9EDD000
heap
page read and write
1B029E46000
heap
page read and write
13E11248000
heap
page read and write
216A9EDE000
heap
page read and write
216A9C34000
heap
page read and write
2092FF15000
heap
page read and write
216A98D0000
trusted library allocation
page read and write
216A9D9D000
heap
page read and write
1D5365D0000
trusted library allocation
page read and write
95CD7DE000
stack
page read and write
216A9EC9000
heap
page read and write
2092F6F2000
heap
page read and write
1B029E10000
heap
page read and write
2092F6CA000
heap
page read and write
2092FF8D000
heap
page read and write
216A9EDD000
heap
page read and write
390CFFE000
stack
page read and write
216A498B000
heap
page read and write
1D535E78000
heap
page read and write
579FAFF000
stack
page read and write
1D535EA4000
heap
page read and write
1AE36710000
heap
page read and write
1D53B1D0000
trusted library allocation
page read and write
1FC9AC13000
heap
page read and write
216A9C34000
heap
page read and write
216A9D17000
heap
page read and write
1B2F3044000
heap
page read and write
216A9D2B000
heap
page read and write
23874313000
heap
page read and write
18A7F413000
heap
page read and write
2F06DF7000
stack
page read and write
9033D7D000
stack
page read and write
9C991DB000
stack
page read and write
390CB5B000
stack
page read and write
216A9D17000
heap
page read and write
2F06BFB000
stack
page read and write
216A9660000
trusted library allocation
page read and write
13E11246000
heap
page read and write
1D536DD0000
trusted library section
page readonly
216A97C0000
trusted library allocation
page read and write
2733B67D000
heap
page read and write
216A49FD000
heap
page read and write
1D53B2B9000
heap
page read and write
13E11268000
heap
page read and write
216A9ED5000
heap
page read and write
2092FF69000
heap
page read and write
9C9A27E000
stack
page read and write
2092FF8D000
heap
page read and write
216A5158000
trusted library allocation
page read and write
216A3E5C000
heap
page read and write
216A3D50000
trusted library allocation
page read and write
23874277000
heap
page read and write
216A9D62000
heap
page read and write
216A968C000
trusted library allocation
page read and write
216A9685000
trusted library allocation
page read and write
2733B629000
heap
page read and write
216A9D2B000
heap
page read and write
216A9680000
trusted library allocation
page read and write
55CCEBA000
stack
page read and write
216A9E54000
heap
page read and write
216A9ECC000
heap
page read and write
1D53B2FE000
heap
page read and write
216A3E29000
heap
page read and write
2092FF76000
heap
page read and write
216A9FD2000
heap
page read and write
216A9E2E000
heap
page read and write
216A49D5000
heap
page read and write
216A9F24000
heap
page read and write
216A9680000
trusted library allocation
page read and write
216A9D66000
heap
page read and write
216A9DD4000
heap
page read and write
216A9D50000
heap
page read and write
216A9C55000
heap
page read and write
18A7F445000
heap
page read and write
216A9FE2000
heap
page read and write
20930402000
heap
page read and write
216A9680000
trusted library allocation
page read and write
216A3E93000
heap
page read and write
216A9E4E000
heap
page read and write
216A9D43000
heap
page read and write
216A9690000
trusted library allocation
page read and write
216A5150000
trusted library allocation
page read and write
2092F671000
heap
page read and write
2092F6AB000
heap
page read and write
216A9D2B000
heap
page read and write
13E1127A000
heap
page read and write
2092FF69000
heap
page read and write
216A9EB0000
heap
page read and write
2733B702000
heap
page read and write
1FC9B402000
trusted library allocation
page read and write
216A9D44000
heap
page read and write
1B2F3029000
heap
page read and write
216A49D1000
heap
page read and write
216A9E94000
heap
page read and write
216A9D92000
heap
page read and write
216A9E90000
heap
page read and write
216A9D17000
heap
page read and write
1D53B1E0000
trusted library allocation
page read and write
20930402000
heap
page read and write
13E11277000
heap
page read and write
216A97F4000
trusted library allocation
page read and write
1AE36EA0000
remote allocation
page read and write
216A9C34000
heap
page read and write
22FCB302000
heap
page read and write
216A9F6F000
heap
page read and write
216A97E0000
trusted library allocation
page read and write
1D535E00000
heap
page read and write
216A9C69000
heap
page read and write
216A9C5B000
heap
page read and write
216A9EE7000
heap
page read and write
216A9C62000
heap
page read and write
216A9C2D000
heap
page read and write
216A3E13000
heap
page read and write
1B2F2E20000
heap
page read and write
9033F7F000
stack
page read and write
1D53B2F3000
heap
page read and write
1D5365E0000
trusted library allocation
page read and write
216A9D43000
heap
page read and write
216A3F13000
heap
page read and write
1B2F2FF0000
trusted library allocation
page read and write
22FCB229000
heap
page read and write
13E11020000
heap
page read and write
1632AD00000
heap
page read and write
1FC9AC65000
heap
page read and write
2733B65B000
heap
page read and write
216A4990000
heap
page read and write
5BCCD7F000
stack
page read and write
1FC9AC5A000
heap
page read and write
9C998FA000
stack
page read and write
216A9D7B000
heap
page read and write
2092F450000
heap
page read and write
216A9D17000
heap
page read and write
9C9A375000
stack
page read and write
216A9EDD000
heap
page read and write
18A7F43B000
heap
page read and write
2092F6F5000
heap
page read and write
216A9E2E000
heap
page read and write
1D53B29B000
heap
page read and write
216A9C26000
heap
page read and write
90337FB000
stack
page read and write
216A9C13000
heap
page read and write
216A49DA000
heap
page read and write
2092FFA6000
heap
page read and write
216A9C55000
heap
page read and write
216A3F8E000
heap
page read and write
216A9680000
trusted library allocation
page read and write
20930444000
heap
page read and write
1D535EBC000
heap
page read and write
216A9D92000
heap
page read and write
216A4E40000
trusted library allocation
page read and write
43D59F8000
stack
page read and write
216A49D9000
heap
page read and write
216A9500000
trusted library allocation
page read and write
1B029E75000
heap
page read and write
1FC9AC02000
heap
page read and write
216A9EEF000
heap
page read and write
13E11263000
heap
page read and write
216A969E000
trusted library allocation
page read and write
13E1122E000
heap
page read and write
216A49AF000
heap
page read and write
216A49CB000
heap
page read and write
216A97FC000
trusted library allocation
page read and write
13E11274000
heap
page read and write
216A54A0000
trusted library section
page readonly
1FC9AB30000
heap
page read and write
216A9890000
trusted library allocation
page read and write
1D53B514000
trusted library allocation
page read and write
13E11247000
heap
page read and write
216A9ED5000
heap
page read and write
216A97F4000
trusted library allocation
page read and write
216A9EA2000
heap
page read and write
216A9F19000
heap
page read and write
1D53B2D8000
heap
page read and write
216A9FCE000
heap
page read and write
5BCCE7F000
stack
page read and write
216A9F36000
heap
page read and write
216A9D64000
heap
page read and write
13E1123A000
heap
page read and write
2092FF7C000
heap
page read and write
1D53B524000
trusted library allocation
page read and write
216A3E8B000
heap
page read and write
2092FF70000
heap
page read and write
216A47C8000
heap
page read and write
2092F713000
heap
page read and write
1632AC80000
heap
page read and write
216A9EDD000
heap
page read and write
2733B65E000
heap
page read and write
90339FE000
stack
page read and write
216A47B0000
heap
page read and write
216A49FF000
heap
page read and write
216A9E5C000
heap
page read and write
579F6FD000
stack
page read and write
216A9D13000
heap
page read and write
216A4998000
heap
page read and write
1FC9AC55000
heap
page read and write
58872BB000
stack
page read and write
216A47F5000
heap
page read and write
1D53B5A0000
trusted library allocation
page read and write
1D535E7B000
heap
page read and write
216A9D92000
heap
page read and write
22FCB2C9000
heap
page read and write
216A9E54000
heap
page read and write
13E11240000
heap
page read and write
216A9E61000
heap
page read and write
2092F600000
heap
page read and write
216A96A0000
trusted library allocation
page read and write
216A4990000
heap
page read and write
1D53B305000
heap
page read and write
2F06A7E000
stack
page read and write
787C37D000
stack
page read and write
216A9E5A000
heap
page read and write
1D53B600000
trusted library allocation
page read and write
22FCBB12000
heap
page read and write
2092FFA0000
heap
page read and write
13E11249000
heap
page read and write
216A9FD8000
heap
page read and write
1632AA50000
heap
page read and write
216A9880000
trusted library allocation
page read and write
216A9EC4000
heap
page read and write
2733B713000
heap
page read and write
216A9EB3000
heap
page read and write
2092FF9F000
heap
page read and write
216A9E3B000
heap
page read and write
787BB0B000
stack
page read and write
18A7FB30000
trusted library allocation
page read and write
216A9D43000
heap
page read and write
55CD2F8000
stack
page read and write
216A9D43000
heap
page read and write
216A96A2000
trusted library allocation
page read and write
216A9DD4000
heap
page read and write
579F5FE000
stack
page read and write
579F7FF000
stack
page read and write
1D53B302000
heap
page read and write
2092FF65000
heap
page read and write
216A96CA000
trusted library allocation
page read and write
13E10FB0000
heap
page read and write
216A5470000
trusted library section
page readonly
216A9D0B000
heap
page read and write
572C70B000
stack
page read and write
216A9D02000
heap
page read and write
1AE36902000
heap
page read and write
1B029E60000
heap
page read and write
216A9C56000
heap
page read and write
1B2F3073000
heap
page read and write
13E11261000
heap
page read and write
1D536801000
trusted library allocation
page read and write
9C99AFA000
stack
page read and write
216A9AA0000
trusted library allocation
page read and write
2733B666000
heap
page read and write
216A97FC000
trusted library allocation
page read and write
216A9F68000
heap
page read and write
216A9780000
remote allocation
page read and write
2093041A000
heap
page read and write
216A5490000
trusted library section
page readonly
216A9EF1000
heap
page read and write
216A9E2E000
heap
page read and write
216A9FAB000
heap
page read and write
18A7FC02000
trusted library allocation
page read and write
216A9E29000
heap
page read and write
1D535D70000
trusted library allocation
page read and write
216A9EA2000
heap
page read and write
216A9E5D000
heap
page read and write
216A49EE000
heap
page read and write
9C9987B000
stack
page read and write
2F06AFE000
stack
page read and write
216AA010000
heap
page read and write
1D536DF0000
trusted library section
page readonly
572CEFF000
stack
page read and write
216A49EE000
heap
page read and write
390D0FE000
stack
page read and write
216A9ECA000
heap
page read and write
9C99F7E000
stack
page read and write
1D53B24A000
heap
page read and write
13E11245000
heap
page read and write
216A9DC1000
heap
page read and write
216A45D1000
trusted library allocation
page read and write
1D53B2EB000
heap
page read and write
1D535E92000
heap
page read and write
216A9E56000
heap
page read and write
2092FF70000
heap
page read and write
2F067CC000
stack
page read and write
787C6FC000
stack
page read and write
216A9694000
trusted library allocation
page read and write
216A9F0A000
heap
page read and write
787C7FE000
stack
page read and write
216A47C5000
heap
page read and write
22FCBB00000
heap
page read and write
2092F613000
heap
page read and write
216A9EDD000
heap
page read and write
216A9E2B000
heap
page read and write
216A3E92000
heap
page read and write
43D53FB000
stack
page read and write
1632AD13000
heap
page read and write
2733B613000
heap
page read and write
216A9D43000
heap
page read and write
9C9A47E000
stack
page read and write
216A9EC9000
heap
page read and write
1B029D90000
heap
page read and write
787C1FE000
stack
page read and write
216A49B4000
heap
page read and write
9C994FE000
stack
page read and write
216A96E5000
trusted library allocation
page read and write
216A494D000
heap
page read and write
216A9ED5000
heap
page read and write
2092F6C4000
heap
page read and write
1D535EFE000
heap
page read and write
43D58FF000
unkown
page read and write
216A3E90000
heap
page read and write
9033BFE000
stack
page read and write
1D535F02000
heap
page read and write
216A9D43000
heap
page read and write
216A9690000
trusted library allocation
page read and write
1D535E58000
heap
page read and write
216A9D00000
heap
page read and write
216A9C34000
heap
page read and write
216A9DFD000
heap
page read and write
1B2F3602000
trusted library allocation
page read and write
43D5677000
stack
page read and write
216A5460000
trusted library section
page readonly
216A9C61000
heap
page read and write
216A4800000
heap
page read and write
2092FCD0000
remote allocation
page read and write
216A9D20000
heap
page read and write
216A97D0000
trusted library allocation
page read and write
216A9694000
trusted library allocation
page read and write
2092FCD0000
remote allocation
page read and write
2092FF8D000
heap
page read and write
216A9E2F000
heap
page read and write
2092FFAF000
heap
page read and write
216A9FEC000
heap
page read and write
9C995FB000
stack
page read and write
216A970C000
trusted library allocation
page read and write
216A9C3F000
heap
page read and write
2092FF74000
heap
page read and write
216A9D02000
heap
page read and write
1B029E58000
heap
page read and write
1632AC69000
heap
page read and write
216A9EDD000
heap
page read and write
2733B684000
heap
page read and write
216A9DD1000
heap
page read and write
216A9D02000
heap
page read and write
216A97F0000
trusted library allocation
page read and write
13E1126A000
heap
page read and write
216A969A000
trusted library allocation
page read and write
216A499B000
heap
page read and write
216A9D02000
heap
page read and write
216A9D7B000
heap
page read and write
216A3BF0000
heap
page read and write
1D535DE1000
trusted library allocation
page read and write
23874302000
heap
page read and write
1AE36E70000
trusted library allocation
page read and write
216A49EE000
heap
page read and write
2092FF57000
heap
page read and write
23874256000
heap
page read and write
216A9680000
trusted library allocation
page read and write
13E1124C000
heap
page read and write
216A9DF4000
heap
page read and write
2733B600000
heap
page read and write
216A969A000
trusted library allocation
page read and write
1D536DE0000
trusted library section
page readonly
5BCC9FB000
stack
page read and write
1B2F3060000
heap
page read and write
1A7519C000
stack
page read and write
1D536DC0000
trusted library section
page readonly
216A9FB1000
heap
page read and write
55CCF3F000
stack
page read and write
90335F9000
stack
page read and write
216A4702000
heap
page read and write
1FC9AB60000
trusted library allocation
page read and write
216A9F29000
heap
page read and write
2092FF6B000
heap
page read and write
216A9E27000
heap
page read and write
1FC9AC6F000
heap
page read and write
216A9D92000
heap
page read and write
216A94C0000
trusted library allocation
page read and write
1632AC61000
heap
page read and write
9C9A17D000
stack
page read and write
216A97FC000
trusted library allocation
page read and write
2387423C000
heap
page read and write
23874060000
heap
page read and write
216A9C2F000
heap
page read and write
216A9C26000
heap
page read and write
216A9E6E000
heap
page read and write
95CDF7E000
stack
page read and write
216A9EA8000
heap
page read and write
1AE36829000
heap
page read and write
216A9C10000
heap
page read and write
9C99DFA000
stack
page read and write
20930402000
heap
page read and write
216A9F92000
heap
page read and write
216A9AB0000
trusted library allocation
page read and write
216A97F4000
trusted library allocation
page read and write
216A9DC3000
heap
page read and write
1D536CE0000
trusted library allocation
page read and write
1D53B670000
remote allocation
page read and write
1D53B213000
heap
page read and write
216A9D7B000
heap
page read and write
216A49CE000
heap
page read and write
216A97F0000
trusted library allocation
page read and write
1B029E60000
heap
page read and write
90333F7000
stack
page read and write
216A49AB000
heap
page read and write
216A9EB1000
heap
page read and write
1D535F13000
heap
page read and write
216A9C39000
heap
page read and write
216A97F0000
trusted library allocation
page read and write
216A9DB8000
heap
page read and write
216A9685000
trusted library allocation
page read and write
9C99CFE000
stack
page read and write
9C999FB000
stack
page read and write
216A9ED5000
heap
page read and write
579F07B000
stack
page read and write
13E11250000
heap
page read and write
95CDE7F000
stack
page read and write
216A9690000
trusted library allocation
page read and write
1D535E40000
heap
page read and write
216A9C69000
heap
page read and write
216A9840000
trusted library allocation
page read and write
1D53B500000
trusted library allocation
page read and write
216A9D76000
heap
page read and write
216A9EDE000
heap
page read and write
18A7F452000
heap
page read and write
216A4732000
heap
page read and write
216A49EE000
heap
page read and write
216A9E3A000
heap
page read and write
55CD37E000
stack
page read and write
216A9D18000
heap
page read and write
1D53B500000
trusted library allocation
page read and write
9C99C7F000
stack
page read and write
216A9C2D000
heap
page read and write
2092FF6C000
heap
page read and write
13E11265000
heap
page read and write
216A9E27000
heap
page read and write
1FC9AD13000
heap
page read and write
1D535C70000
heap
page read and write
787BF7C000
stack
page read and write
216A9E2E000
heap
page read and write
1D53B2DF000
heap
page read and write
216A49BA000
heap
page read and write
572CE7D000
stack
page read and write
2092F702000
heap
page read and write
216A9D02000
heap
page read and write
13E11802000
trusted library allocation
page read and write
216A9F67000
heap
page read and write
216A9EDD000
heap
page read and write
22FCBB3A000
heap
page read and write
216A9C69000
heap
page read and write
216A94D0000
trusted library allocation
page read and write
216A9698000
trusted library allocation
page read and write
216A9E24000
heap
page read and write
9C9977F000
stack
page read and write
2092F657000
heap
page read and write
2092FF1D000
heap
page read and write
216A9C61000
heap
page read and write
216A9D7D000
heap
page read and write
1632AC3C000
heap
page read and write
90336FE000
stack
page read and write
216A9EE6000
heap
page read and write
1D5365C0000
trusted library allocation
page read and write
216A9EAC000
heap
page read and write
2092FF75000
heap
page read and write
216A9D92000
heap
page read and write
1B2F3088000
heap
page read and write
216A9ECC000
heap
page read and write
1D535E29000
heap
page read and write
2092FF6D000
heap
page read and write
216A3D70000
trusted library allocation
page read and write
22FCB1C0000
trusted library allocation
page read and write
216A9F76000
heap
page read and write
2092FFC9000
heap
page read and write
2092FFA6000
heap
page read and write
5BCC5FB000
stack
page read and write
1B2F3000000
heap
page read and write
216A9FAE000
heap
page read and write
13E11242000
heap
page read and write
1D535C10000
heap
page read and write
216A9D2B000
heap
page read and write
216A9680000
trusted library allocation
page read and write
18A7F3D0000
heap
page read and write
2733B700000
heap
page read and write
1D53B670000
remote allocation
page read and write
216A5148000
trusted library allocation
page read and write
216A97F4000
trusted library allocation
page read and write
216A9C26000
heap
page read and write
2092F4B0000
heap
page read and write
216A49E5000
heap
page read and write
216A9C37000
heap
page read and write
216A9C2F000
heap
page read and write
390CE7E000
stack
page read and write
2092FF9E000
heap
page read and write
216A9E4B000
heap
page read and write
18A7F402000
heap
page read and write
1D53B5E0000
trusted library allocation
page read and write
216A9E57000
heap
page read and write
1B029E46000
heap
page read and write
13E11231000
heap
page read and write
23874202000
heap
page read and write
1FC9AC29000
heap
page read and write
216A9F7D000
heap
page read and write
216A9ED5000
heap
page read and write
216A49F5000
heap
page read and write
1A757FC000
stack
page read and write
216A9C26000
heap
page read and write
216A9ED5000
heap
page read and write
216A9920000
trusted library allocation
page read and write
2092FFC2000
heap
page read and write
2092F6E4000
heap
page read and write
13E11275000
heap
page read and write
1AE36EA0000
remote allocation
page read and write
22FCB243000
heap
page read and write
1AE36813000
heap
page read and write
5BCCC7E000
stack
page read and write
216A9800000
trusted library allocation
page read and write
1D53B510000
trusted library allocation
page read and write
2733B654000
heap
page read and write
2092F708000
heap
page read and write
2092F6F5000
heap
page read and write
216A9FCB000
heap
page read and write
216A9C4D000
heap
page read and write
216A9696000
trusted library allocation
page read and write
216A9FD4000
heap
page read and write
216A9C02000
heap
page read and write
216A9F7D000
heap
page read and write
216A9EED000
heap
page read and write
1FC9AAD0000
heap
page read and write
13E10FC0000
heap
page read and write
216A498C000
heap
page read and write
216A9700000
trusted library allocation
page read and write
1D536615000
heap
page read and write
23874213000
heap
page read and write
1B029E60000
heap
page read and write
2092FF8D000
heap
page read and write
1D536E10000
trusted library section
page readonly
216A9F91000
heap
page read and write
216A9ECA000
heap
page read and write
1B2F3108000
heap
page read and write
216A9D83000
heap
page read and write
1FC9AAC0000
heap
page read and write
572CFFD000
stack
page read and write
216A9540000
trusted library allocation
page read and write
216A9E83000
heap
page read and write
9C99BFF000
stack
page read and write
216A9D92000
heap
page read and write
216A5380000
trusted library allocation
page read and write
1D53C000000
heap
page read and write
13E11284000
heap
page read and write
2092FF70000
heap
page read and write
903397E000
stack
page read and write
216A49A8000
heap
page read and write
1D536600000
heap
page read and write
216A9C26000
heap
page read and write
216A9ED1000
heap
page read and write
55CCFBE000
stack
page read and write
216A9D68000
heap
page read and write
572CC7F000
stack
page read and write
787C4FD000
stack
page read and write
216A968C000
trusted library allocation
page read and write
9C99EFF000
stack
page read and write
216A9C3C000
heap
page read and write
2092F63C000
heap
page read and write
216A4615000
heap
page read and write
216A3E79000
heap
page read and write
2092FCD0000
remote allocation
page read and write
216A49CA000
heap
page read and write
2092FFA6000
heap
page read and write
216A9FD6000
heap
page read and write
216A9860000
trusted library allocation
page read and write
216A49EE000
heap
page read and write
216A9C2D000
heap
page read and write
216A9C69000
heap
page read and write
2093041A000
heap
page read and write
1D53B5F0000
trusted library allocation
page read and write
390D1FE000
stack
page read and write
13E11279000
heap
page read and write
5BCCAFB000
stack
page read and write
2092F629000
heap
page read and write
216A9692000
trusted library allocation
page read and write
216A9780000
remote allocation
page read and write
1B029E41000
heap
page read and write
787C27C000
stack
page read and write
216A9E9D000
heap
page read and write
216A9692000
trusted library allocation
page read and write
1D53B227000
heap
page read and write
216A9F88000
heap
page read and write
1D536713000
heap
page read and write
13E1124D000
heap
page read and write
1D53B1B0000
trusted library allocation
page read and write
216A9FA1000
heap
page read and write
1D53B1E0000
trusted library allocation
page read and write
216A4754000
heap
page read and write
216A3C50000
heap
page read and write
216A9C43000
heap
page read and write
1FC9AC41000
heap
page read and write
216A9ED1000
heap
page read and write
1632AC21000
heap
page read and write
216A49CA000
heap
page read and write
1A755FF000
stack
page read and write
216A9D17000
heap
page read and write
2092FF78000
heap
page read and write
216A9C34000
heap
page read and write
216A9C69000
heap
page read and write
22FCB270000
heap
page read and write
216A4858000
heap
page read and write
216A9F5B000
heap
page read and write
2092F6DA000
heap
page read and write
216A9DE6000
heap
page read and write
95CDBFB000
stack
page read and write
1AE36802000
heap
page read and write
2092FE02000
heap
page read and write
216A9D4E000
heap
page read and write
20930402000
heap
page read and write
216A9C2F000
heap
page read and write
1D53B209000
heap
page read and write
2092FFA6000
heap
page read and write
216A9E76000
heap
page read and write
13E11241000
heap
page read and write
216A9D82000
heap
page read and write
18A7F502000
heap
page read and write
216A9E36000
heap
page read and write
216A9D10000
heap
page read and write
2733BD40000
trusted library allocation
page read and write
216A9D2B000
heap
page read and write
22FCB213000
heap
page read and write
216A9C26000
heap
page read and write
1632AA40000
heap
page read and write
1AE3682D000
heap
page read and write
1D536718000
heap
page read and write
216A9F30000
heap
page read and write
22FCB2C7000
heap
page read and write
238740C0000
heap
page read and write
216A9C69000
heap
page read and write
216A9D82000
heap
page read and write
13E11244000
heap
page read and write
2092FF72000
heap
page read and write
216A49EF000
heap
page read and write
216A3E70000
heap
page read and write
216A97F0000
trusted library allocation
page read and write
216A9C61000
heap
page read and write
216A9C61000
heap
page read and write
1632AC5E000
heap
page read and write
216A96A0000
trusted library allocation
page read and write
216A9E38000
heap
page read and write
2092FFB7000
heap
page read and write
216A9C2F000
heap
page read and write
216A9F20000
heap
page read and write
216A9D02000
heap
page read and write
216A9EA4000
heap
page read and write
572CBFE000
stack
page read and write
216A9D02000
heap
page read and write
572CD7E000
stack
page read and write
216A9C69000
heap
page read and write
1B029E30000
heap
page read and write
13E11302000
heap
page read and write
1AE366B0000
heap
page read and write
216A96A2000
trusted library allocation
page read and write
216A9EDD000
heap
page read and write
22FCB313000
heap
page read and write
216A49F3000
heap
page read and write
216A967C000
trusted library allocation
page read and write
216A9D17000
heap
page read and write
22FCB130000
heap
page read and write
216A968E000
trusted library allocation
page read and write
2092F6A4000
heap
page read and write
216A9EC9000
heap
page read and write
216A9C2F000
heap
page read and write
216A9E4C000
heap
page read and write
1D535E13000
heap
page read and write
216A9EB9000
heap
page read and write
216A9D0E000
heap
page read and write
1B029E76000
heap
page read and write
588787B000
stack
page read and write
216A9ED5000
heap
page read and write
216A9FAD000
heap
page read and write
579F27B000
stack
page read and write
5887B7E000
stack
page read and write
1B2F3100000
heap
page read and write
216A9C26000
heap
page read and write
216A9C69000
heap
page read and write
216A97F0000
trusted library allocation
page read and write
216A5480000
trusted library section
page readonly
216A476F000
heap
page read and write
216A9FB3000
heap
page read and write
216A9D83000
heap
page read and write
216A96CA000
trusted library allocation
page read and write
55CD3FC000
stack
page read and write
216A9C2F000
heap
page read and write
216A5140000
trusted library allocation
page read and write
216A3E43000
heap
page read and write
216A471D000
heap
page read and write
216A9550000
trusted library allocation
page read and write
13E11239000
heap
page read and write
216A9D6F000
heap
page read and write
2092FF88000
heap
page read and write
216A9C48000
heap
page read and write
216A47CC000
heap
page read and write
216A9EDD000
heap
page read and write
216A9C69000
heap
page read and write
216A9F50000
heap
page read and write
216A9D7B000
heap
page read and write
216A9D09000
heap
page read and write
90338FB000
stack
page read and write
1B2F2DC0000
heap
page read and write
1632AC8A000
heap
page read and write
13E11230000
heap
page read and write
43D557B000
stack
page read and write
216A9DD1000
heap
page read and write
216A9C2D000
heap
page read and write
216A9830000
trusted library allocation
page read and write
216A9D2D000
heap
page read and write
18A7F429000
heap
page read and write
95CDD77000
stack
page read and write
13E11231000
heap
page read and write
216A9EA6000
heap
page read and write
216A3E3C000
heap
page read and write
2092FF6C000
heap
page read and write
216A9C34000
heap
page read and write
1D53B268000
heap
page read and write
787C0FF000
stack
page read and write
216A969E000
trusted library allocation
page read and write
216A49E5000
heap
page read and write
2F06CFB000
stack
page read and write
1D536700000
heap
page read and write
There are 1150 hidden memdumps, click here to show them.