IOC Report
98765434567890.exe

loading gif

Files

File Path
Type
Category
Malicious
98765434567890.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\nstFA69.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\X\Unsalty\Epithem.Dre
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\X\Unsalty\libgiognutls.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Stempelpligtig93\antagonizing\Trespassage\Importprisernes.Qui
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\98765434567890.exe
C:\Users\user\Desktop\98765434567890.exe
malicious
C:\Users\user\Desktop\98765434567890.exe
C:\Users\user\Desktop\98765434567890.exe
malicious

URLs

Name
IP
Malicious
http://bulungan.go.id/jnSMxRfpiTGW30.mdpZ
unknown
malicious
http://bulungan.go.id/jnSMxRfpiTGW30.mdphJ
unknown
malicious
http://bulungan.go.id/jnSMxRfpiTGW30.mdpW
unknown
malicious
http://bulungan.go.id/jnSMxRfpiTGW30.mdppJ)
unknown
malicious
http://bulungan.go.id/jnSMxRfpiTGW30.mdpt
unknown
malicious
http://bulungan.go.id/jnSMxRfpiTGW30.mdp
unknown
malicious
http://bulungan.go.id/jnSMxRfpiTGW30.mdp.
unknown
malicious
http://bulungan.go.id/jnSMxRfpiTGW30.mdp3d
unknown
malicious
http://bulungan.go.id/jnSMxRfpiTGW30.mdpoV%
unknown
malicious
http://bulungan.go.id/jnSMxRfpiTGW30.mdpXJ1
unknown
malicious
http://bulungan.go.id/jnSMxRfpiTGW30.mdp$M
unknown
malicious
http://bulungan.go.id/jnSMxRfpiTGW30.mdp_7d
unknown
malicious
http://bulungan.go.id/jnSMxRfpiTGW30.mdp32T7
unknown
malicious
http://bulungan.go.id/jnSMxRfpiTGW30.mdpLJ%
unknown
malicious
http://bulungan.go.id/jnSMxRfpiTGW30.mdpdJ
unknown
malicious
http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
unknown
https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
unknown
http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.
unknown
http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD
unknown
http://www.gopher.ftp://ftp.
unknown
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bulungan.go.id
103.131.61.194

IPs

IP
Domain
Country
Malicious
103.131.61.194
bulungan.go.id
Indonesia

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Spaan\Pushfully
Trials101

Memdumps

Base Address
Regiontype
Protect
Malicious
3490000
direct allocation
page execute and read and write
malicious
1660000
remote allocation
page execute and read and write
malicious
25ED593F000
heap
page read and write
25ED52DC000
heap
page read and write
1B410A27000
heap
page read and write
25ED52F0000
heap
page read and write
4A5F9FE000
stack
page read and write
19100F78000
heap
page read and write
1E7A1C50000
heap
page read and write
19101400000
heap
page read and write
25ED53A1000
heap
page read and write
168E4B90000
heap
page read and write
25ED4BD8000
heap
page read and write
25ED52B7000
heap
page read and write
25ED5401000
heap
page read and write
26D7A670000
trusted library allocation
page read and write
25ED59B1000
heap
page read and write
191013A0000
remote allocation
page read and write
25ED5A10000
heap
page read and write
19100F7C000
heap
page read and write
19100F7C000
heap
page read and write
25ED53AA000
heap
page read and write
19BD8E52000
heap
page read and write
1910053D000
heap
page read and write
25ED5354000
heap
page read and write
400000
unkown
page readonly
19BD8E60000
heap
page read and write
1B410A51000
heap
page read and write
191004A6000
heap
page read and write
26727CBB000
heap
page read and write
25ED532B000
heap
page read and write
25ED4B42000
heap
page read and write
19BD8E6D000
heap
page read and write
1F7C4EC0000
heap
page read and write
26727CBC000
heap
page read and write
245E000
stack
page read and write
46E000
unkown
page readonly
25ED59CC000
heap
page read and write
25ED5329000
heap
page read and write
191F062A000
heap
page read and write
25ED53FB000
heap
page read and write
25ED536E000
heap
page read and write
19100F8E000
heap
page read and write
D16E4FF000
stack
page read and write
25ED53A4000
heap
page read and write
D16E27E000
stack
page read and write
19BD8E29000
heap
page read and write
1B410A7E000
heap
page read and write
25ED5341000
heap
page read and write
19BD8E13000
heap
page read and write
19BD8F02000
heap
page read and write
400000
unkown
page readonly
2464000
heap
page read and write
1B410A31000
heap
page read and write
19100F0E000
heap
page read and write
25ED5C02000
heap
page read and write
1C450A7A000
heap
page read and write
25ED525E000
heap
page read and write
25ED53A6000
heap
page read and write
1B410A00000
heap
page read and write
19100F29000
heap
page read and write
25ED539C000
heap
page read and write
26727CBF000
heap
page read and write
25ED5991000
heap
page read and write
25ED4BD8000
heap
page read and write
1F7C508C000
heap
page read and write
25ED53F4000
heap
page read and write
19101497000
heap
page read and write
26727CBB000
heap
page read and write
25ED58E0000
remote allocation
page read and write
1C0000
remote allocation
page read and write
25ED4BA5000
heap
page read and write
25ED5378000
heap
page read and write
191F067A000
heap
page read and write
25ED4C9D000
heap
page read and write
168E4C56000
heap
page read and write
19100F29000
heap
page read and write
1B410A13000
heap
page read and write
26727CBF000
heap
page read and write
26727CBF000
heap
page read and write
19BD8E6A000
heap
page read and write
25ED5400000
heap
page read and write
1F7C5B96000
heap
page read and write
1C450AB6000
heap
page read and write
191004F9000
heap
page read and write
25ED531B000
heap
page read and write
25ED5991000
heap
page read and write
25ED5371000
heap
page read and write
26D78C40000
heap
page read and write
1B410A74000
heap
page read and write
D16E07C000
stack
page read and write
25ED5329000
heap
page read and write
25ED531B000
heap
page read and write
25ED5BCC000
heap
page read and write
19BD8BA0000
heap
page read and write
25ED5A0D000
heap
page read and write
19100F5B000
heap
page read and write
19100F84000
heap
page read and write
25ED536D000
heap
page read and write
1F7C5B84000
heap
page read and write
25ED53A4000
heap
page read and write
25ED53A7000
heap
page read and write
25ED52B3000
heap
page read and write
191F0700000
heap
page read and write
1C450CD0000
unclassified section
page readonly
1C0000
remote allocation
page read and write
191014A7000
heap
page read and write
25ED5390000
heap
page read and write
19101476000
heap
page read and write
1F7C5051000
heap
page read and write
25ED539A000
heap
page read and write
25ED5329000
heap
page read and write
191F0724000
heap
page read and write
25ED5362000
heap
page read and write
19100F5A000
heap
page read and write
25ED5962000
heap
page read and write
19BD8E87000
heap
page read and write
19100F2B000
heap
page read and write
25ED593F000
heap
page read and write
1C450AB1000
heap
page read and write
25ED5354000
heap
page read and write
191F0600000
heap
page read and write
26727CBB000
heap
page read and write
1B410A82000
heap
page read and write
26727C40000
heap
page read and write
25ED4B8C000
heap
page read and write
26727CBB000
heap
page read and write
26727CC2000
heap
page read and write
19BD8D80000
trusted library allocation
page read and write
26D78C21000
heap
page read and write
19100F5D000
heap
page read and write
25ED5351000
heap
page read and write
1C450A70000
heap
page read and write
26727CC3000
heap
page read and write
25ED5372000
heap
page read and write
26727C13000
heap
page read and write
26727CB7000
heap
page read and write
25ED5368000
heap
page read and write
1B410A6E000
heap
page read and write
25ED5329000
heap
page read and write
25ED531B000
heap
page read and write
401000
unkown
page execute read
25ED5C15000
heap
page read and write
25ED5372000
heap
page read and write
25ED531B000
heap
page read and write
25ED531B000
heap
page read and write
26727CBB000
heap
page read and write
1D0AB000
stack
page read and write
18C3000
heap
page read and write
43A36FE000
stack
page read and write
25ED53FA000
heap
page read and write
1C450A2B000
heap
page read and write
26727C81000
heap
page read and write
26727CC7000
heap
page read and write
25ED5354000
heap
page read and write
1910045F000
heap
page read and write
1D0000
unclassified section
page readonly
25ED5329000
heap
page read and write
26727CCE000
heap
page read and write
25ED536A000
heap
page read and write
25ED5BFF000
heap
page read and write
10007B000
stack
page read and write
26727C74000
heap
page read and write
19100F2C000
heap
page read and write
25ED5399000
heap
page read and write
724130B000
stack
page read and write
25ED53C3000
heap
page read and write
25ED59B1000
heap
page read and write
25ED4C99000
heap
page read and write
1910051C000
heap
page read and write
25ED52F7000
heap
page read and write
19BD8D30000
heap
page read and write
25ED541C000
heap
page read and write
25ED5404000
heap
page read and write
1E7A1C93000
heap
page read and write
19BD8E36000
heap
page read and write
18C7000
heap
page read and write
25ED53AA000
heap
page read and write
25ED526B000
heap
page read and write
1F7C4F30000
heap
page read and write
25ED53A6000
heap
page read and write
25ED5A0E000
heap
page read and write
25ED594D000
heap
page read and write
4C20979000
stack
page read and write
19100F2B000
heap
page read and write
25ED4BB8000
heap
page read and write
25ED5370000
heap
page read and write
26727C6C000
heap
page read and write
25ED5365000
heap
page read and write
1910140D000
heap
page read and write
19100F56000
heap
page read and write
49DCFDE000
stack
page read and write
25ED59B8000
heap
page read and write
25ED5A9F000
heap
page read and write
25ED4BC7000
heap
page read and write
46E000
unkown
page readonly
19BD8E50000
heap
page read and write
168E4C40000
heap
page read and write
25ED5C45000
heap
page read and write
26727B50000
trusted library allocation
page read and write
1C450A40000
heap
page read and write
25ED597A000
heap
page read and write
5EA000
unkown
page write copy
1CB70000
trusted library allocation
page read and write
19100F2A000
heap
page read and write
25ED534B000
heap
page read and write
25ED533E000
heap
page read and write
25ED59CA000
heap
page read and write
25ED53FB000
heap
page read and write
19100F0E000
heap
page read and write
1C450A6F000
heap
page read and write
25ED5353000
heap
page read and write
25ED5390000
heap
page read and write
19BD8E93000
heap
page read and write
1C450ABF000
heap
page read and write
1B410A8F000
heap
page read and write
25ED5378000
heap
page read and write
1C450960000
heap
page read and write
26727CC7000
heap
page read and write
25ED5365000
heap
page read and write
25ED531D000
heap
page read and write
1C450A74000
heap
page read and write
168E4BD0000
unclassified section
page readonly
25ED537F000
heap
page read and write
168E4C91000
heap
page read and write
19100490000
heap
page read and write
25ED5370000
heap
page read and write
26727CBB000
heap
page read and write
168E4C00000
heap
page read and write
96000
stack
page read and write
1B410B02000
heap
page read and write
25ED536C000
heap
page read and write
1C450A5E000
heap
page read and write
25ED531D000
heap
page read and write
25ED53C3000
heap
page read and write
25ED5341000
heap
page read and write
25ED59A0000
heap
page read and write
1C4512D0000
trusted library allocation
page read and write
1814000
heap
page read and write
26727CC0000
heap
page read and write
19BD8E96000
heap
page read and write
25ED53FA000
heap
page read and write
25ED4AE7000
heap
page read and write
19BD8E80000
heap
page read and write
25ED593E000
heap
page read and write
1910053B000
heap
page read and write
49DCF5C000
stack
page read and write
D16E6FE000
stack
page read and write
4A5F4FC000
stack
page read and write
25ED53A4000
heap
page read and write
25ED53C6000
heap
page read and write
25ED4C9E000
heap
page read and write
25ED5250000
heap
page read and write
168E4CB0000
heap
page read and write
19100F30000
heap
page read and write
26727C00000
heap
page read and write
25ED53A4000
heap
page read and write
19BD8E9F000
heap
page read and write
25ED536E000
heap
page read and write
25ED5BF2000
heap
page read and write
10059000
trusted library allocation
page read and write
19100F32000
heap
page read and write
25ED539F000
heap
page read and write
19100F0F000
heap
page read and write
1F7C4F80000
heap
page read and write
25ED53C5000
heap
page read and write
25ED5404000
heap
page read and write
25ED5356000
heap
page read and write
1F7C5B91000
heap
page read and write
19BD8E49000
heap
page read and write
19100F91000
heap
page read and write
25ED5C44000
heap
page read and write
1910048C000
heap
page read and write
25ED52B6000
heap
page read and write
25ED4BA1000
heap
page read and write
25ED5250000
heap
page read and write
1F7C50EC000
heap
page read and write
25ED5350000
heap
page read and write
26727CCE000
heap
page read and write
25ED53D6000
heap
page read and write
25ED53FC000
heap
page read and write
72418FE000
stack
page read and write
25ED5375000
heap
page read and write
191F0613000
heap
page read and write
401000
unkown
page execute read
25ED53FC000
heap
page read and write
26727CCE000
heap
page read and write
19100F0E000
heap
page read and write
25ED52FB000
heap
page read and write
4A5F1CB000
stack
page read and write
1F7C5BB5000
heap
page read and write
1B71000
heap
page read and write
26D78C75000
heap
page read and write
25ED52A0000
heap
page read and write
25ED5287000
heap
page read and write
6F8287B000
stack
page read and write
191F1002000
trusted library allocation
page read and write
25ED59B1000
heap
page read and write
19100438000
heap
page read and write
19BD8E40000
heap
page read and write
168E5602000
trusted library allocation
page read and write
25ED53F4000
heap
page read and write
26727CCE000
heap
page read and write
25ED53FC000
heap
page read and write
26727CC5000
heap
page read and write
191004DF000
heap
page read and write
185E000
stack
page read and write
26727CD5000
heap
page read and write
25ED4B9B000
heap
page read and write
25ED533E000
heap
page read and write
1F7C5000000
heap
page read and write
1F7C50C3000
heap
page read and write
25ED529E000
heap
page read and write
542000
heap
page read and write
25ED5967000
heap
page read and write
25ED5AC0000
heap
page read and write
26D78D28000
heap
page read and write
25ED538C000
heap
page read and write
19100F76000
heap
page read and write
1E7A1CA1000
heap
page read and write
25ED53C3000
heap
page read and write
191003A0000
heap
page read and write
6F82CFB000
stack
page read and write
25ED5354000
heap
page read and write
25ED5A6B000
heap
page read and write
191004E6000
heap
page read and write
25ED5A6B000
heap
page read and write
1910053D000
heap
page read and write
168E4B30000
heap
page read and write
25ED52FB000
heap
page read and write
25ED536C000
heap
page read and write
19100F76000
heap
page read and write
1B410A8B000
heap
page read and write
26727C51000
heap
page read and write
25ED52B3000
heap
page read and write
19100F32000
heap
page read and write
1B4108F0000
unclassified section
page readonly
19100F7D000
heap
page read and write
25ED59B4000
heap
page read and write
19100F29000
heap
page read and write
19BD8EA3000
heap
page read and write
4B0000
heap
page read and write
1F7C50AE000
heap
page read and write
25ED5375000
heap
page read and write
25ED59B0000
heap
page read and write
26D78C9A000
heap
page read and write
1C450A22000
heap
page read and write
1F7C5B99000
heap
page read and write
25ED531D000
heap
page read and write
25ED5397000
heap
page read and write
25ED53A1000
heap
page read and write
6F8277E000
stack
page read and write
26727CCE000
heap
page read and write
25ED5354000
heap
page read and write
168E4CAA000
heap
page read and write
25ED4C9E000
heap
page read and write
25ED53C5000
heap
page read and write
1F7C5B77000
heap
page read and write
25ED596E000
heap
page read and write
1E7A1C4B000
heap
page read and write
4F8000
heap
page read and write
191013A0000
remote allocation
page read and write
25ED52B9000
heap
page read and write
19100F29000
heap
page read and write
191F0702000
heap
page read and write
4C201FE000
stack
page read and write
25ED531B000
heap
page read and write
19100F2A000
heap
page read and write
168E4ED0000
heap
page read and write
19BD8D20000
unclassified section
page readonly
25ED53A4000
heap
page read and write
26727CCE000
heap
page read and write
1E7A1C3A000
heap
page read and write
26727CBB000
heap
page read and write
28BF000
stack
page read and write
4C2037F000
stack
page read and write
19100F8E000
heap
page read and write
408000
unkown
page readonly
1910051A000
heap
page read and write
26D78B90000
heap
page read and write
25ED4BA4000
heap
page read and write
940000
trusted library allocation
page read and write
25ED53BE000
heap
page read and write
25ED52C3000
heap
page read and write
19BD8E00000
heap
page read and write
25ED5973000
heap
page read and write
19BD8E5B000
heap
page read and write
427000
unkown
page read and write
1B410A2A000
heap
page read and write
1D0000
unclassified section
page readonly
19100F7D000
heap
page read and write
25ED535D000
heap
page read and write
19100F2C000
heap
page read and write
25ED59A0000
heap
page read and write
25ED5240000
heap
page read and write
19100F76000
heap
page read and write
241F000
stack
page read and write
25ED594A000
heap
page read and write
1E7A1D00000
heap
page read and write
25ED53A9000
heap
page read and write
267279E0000
heap
page read and write
25ED53BE000
heap
page read and write
25ED5390000
heap
page read and write
19100F32000
heap
page read and write
1C450B02000
heap
page read and write
1E7A2400000
heap
page read and write
25ED531B000
heap
page read and write
25ED53C5000
heap
page read and write
49DD27E000
stack
page read and write
19A000
stack
page read and write
25ED531B000
heap
page read and write
25ED4BB6000
heap
page read and write
168E4C2B000
heap
page read and write
32D0000
trusted library allocation
page read and write
25ED5349000
heap
page read and write
25ED539A000
heap
page read and write
19100C70000
trusted library allocation
page read and write
26727970000
heap
page read and write
25ED5C02000
heap
page read and write
1E7A1D13000
heap
page read and write
25ED52F7000
heap
page read and write
25ED52F7000
heap
page read and write
25ED5404000
heap
page read and write
19100F74000
heap
page read and write
1B410A86000
heap
page read and write
530000
heap
page read and write
25ED5396000
heap
page read and write
25ED5382000
heap
page read and write
25ED5370000
heap
page read and write
19100F30000
heap
page read and write
25ED4B28000
heap
page read and write
19100F76000
heap
page read and write
19100F29000
heap
page read and write
25ED5372000
heap
page read and write
1910048A000
heap
page read and write
26D78C87000
heap
page read and write
1F7C502B000
heap
page read and write
25ED4BD2000
heap
page read and write
19100F94000
heap
page read and write
25ED53C6000
heap
page read and write
25ED537C000
heap
page read and write
1F7C5A02000
heap
page read and write
25ED4B99000
heap
page read and write
25ED53DB000
heap
page read and write
25ED5386000
heap
page read and write
1910051B000
heap
page read and write
25ED4BB9000
heap
page read and write
19100F87000
heap
page read and write
191F0647000
heap
page read and write
19100F2B000
heap
page read and write
25ED4B8C000
heap
page read and write
19100F84000
heap
page read and write
25ED5371000
heap
page read and write
25ED531D000
heap
page read and write
295A000
trusted library allocation
page read and write
19100F7D000
heap
page read and write
19100F94000
heap
page read and write
25ED5A0E000
heap
page read and write
19100F2E000
heap
page read and write
26D7A6C0000
remote allocation
page read and write
1F7C5102000
heap
page read and write
25ED5388000
heap
page read and write
26D78BF0000
trusted library allocation
page read and write
25ED597A000
heap
page read and write
26727CC4000
heap
page read and write
19100E02000
heap
page read and write
1C451415000
heap
page read and write
19100F29000
heap
page read and write
1E7A1C40000
heap
page read and write
25ED53F8000
heap
page read and write
1C450ABC000
heap
page read and write
26727C30000
heap
page read and write
25ED58E0000
remote allocation
page read and write
19100F59000
heap
page read and write
19100F88000
heap
page read and write
19100F94000
heap
page read and write
1910047B000
heap
page read and write
4C2007C000
stack
page read and write
25ED5345000
heap
page read and write
D16E1FF000
stack
page read and write
25ED536A000
heap
page read and write
25ED5A0E000
heap
page read and write
25ED5354000
heap
page read and write
19D000
stack
page read and write
25ED5A80000
heap
page read and write
25ED531B000
heap
page read and write
625000
heap
page read and write
26727B00000
heap
page read and write
25ED5355000
heap
page read and write
25ED5354000
heap
page read and write
19100513000
heap
page read and write
1E7A1C64000
heap
page read and write
26D78C68000
heap
page read and write
191004B7000
heap
page read and write
25ED536E000
heap
page read and write
19100444000
heap
page read and write
25ED52FB000
heap
page read and write
6F8267B000
stack
page read and write
26727CC0000
heap
page read and write
1C450A78000
heap
page read and write
25ED5341000
heap
page read and write
19BD8EA8000
heap
page read and write
25ED5375000
heap
page read and write
1C451400000
heap
page read and write
25ED53CD000
heap
page read and write
19100F32000
heap
page read and write
1007FC000
stack
page read and write
1910053C000
heap
page read and write
26727CBB000
heap
page read and write
4A5F6FE000
stack
page read and write
25ED53E3000
heap
page read and write
26727CCE000
heap
page read and write
25ED53AC000
heap
page read and write
25ED53E3000
heap
page read and write
25ED53CD000
heap
page read and write
25ED534D000
heap
page read and write
1C450A6B000
heap
page read and write
25ED4BB6000
heap
page read and write
19100F30000
heap
page read and write
26D78C6A000
heap
page read and write
4C202F9000
stack
page read and write
1B410A1A000
heap
page read and write
25ED5390000
heap
page read and write
25ED539A000
heap
page read and write
C921DDD000
stack
page read and write
26727CCE000
heap
page read and write
25ED5340000
heap
page read and write
D16E5F5000
stack
page read and write
25ED5397000
heap
page read and write
1F7C5BA5000
heap
page read and write
1910043C000
heap
page read and write
19100F6B000
heap
page read and write
168E4CA2000
heap
page read and write
19100F2F000
heap
page read and write
25ED53A4000
heap
page read and write
1E7A1CA7000
heap
page read and write
1B410780000
heap
page read and write
25ED5368000
heap
page read and write
1910042A000
heap
page read and write
19100413000
heap
page read and write
25ED53A4000
heap
page read and write
19BD8E58000
heap
page read and write
26D78D00000
heap
page read and write
25ED539F000
heap
page read and write
25ED5333000
heap
page read and write
25ED53BE000
heap
page read and write
25ED52DC000
heap
page read and write
1E7A1C9F000
heap
page read and write
26D78B40000
heap
page read and write
19BD8C10000
heap
page read and write
25ED53A2000
heap
page read and write
19BD8E4C000
heap
page read and write
25ED5365000
heap
page read and write
25ED5C25000
heap
page read and write
19BD8E6B000
heap
page read and write
25ED59B8000
heap
page read and write
19100F2D000
heap
page read and write
25ED53F6000
heap
page read and write
25ED536D000
heap
page read and write
25ED5285000
heap
page read and write
1C450A28000
heap
page read and write
19100F7F000
heap
page read and write
4C2017F000
stack
page read and write
1F7C5B00000
heap
page read and write
25ED539C000
heap
page read and write
26D78C13000
heap
page read and write
25ED4BCB000
heap
page read and write
25ED539A000
heap
page read and write
25ED539A000
heap
page read and write
400000
unkown
page readonly
1F7C50C7000
heap
page read and write
25ED5244000
heap
page read and write
25ED5A31000
heap
page read and write
19BD8E62000
heap
page read and write
168E4D02000
heap
page read and write
25ED5287000
heap
page read and write
19BD8EA0000
heap
page read and write
25ED5AA4000
heap
page read and write
3390000
heap
page read and write
19100F7D000
heap
page read and write
1E7A1C90000
heap
page read and write
191F0602000
heap
page read and write
25ED5372000
heap
page read and write
25ED5998000
heap
page read and write
187A000
heap
page read and write
40A000
unkown
page read and write
19100F30000
heap
page read and write
1C450A6F000
heap
page read and write
25ED4C99000
heap
page read and write
19100F03000
heap
page read and write
1910143B000
heap
page read and write
25ED53A6000
heap
page read and write
25ED53C6000
heap
page read and write
25ED53CD000
heap
page read and write
10020000
trusted library allocation
page read and write
19BD8E6F000
heap
page read and write
1F7C5113000
heap
page read and write
25ED5243000
heap
page read and write
1E7A1C85000
heap
page read and write
26727CC4000
heap
page read and write
191004F3000
heap
page read and write
1C0000
remote allocation
page read and write
19100F7A000
heap
page read and write
19100F2E000
heap
page read and write
25ED52F7000
heap
page read and write
25ED4B42000
heap
page read and write
4B7000
heap
page read and write
25ED5390000
heap
page read and write
26727CC4000
heap
page read and write
1868000
heap
page read and write
1910051C000
heap
page read and write
19100E15000
heap
page read and write
26D7A802000
trusted library allocation
page read and write
25ED4C90000
heap
page read and write
168E4C13000
heap
page read and write
2BCB47F000
stack
page read and write
25ED53F7000
heap
page read and write
25ED53C3000
heap
page read and write
25ED53C5000
heap
page read and write
42D000
unkown
page read and write
25ED52F7000
heap
page read and write
25ED53A8000
heap
page read and write
25ED5369000
heap
page read and write
26727CCE000
heap
page read and write
25ED535E000
heap
page read and write
168E4C9F000
heap
page read and write
1005FE000
stack
page read and write
1C0000
remote allocation
page read and write
19100F2D000
heap
page read and write
401000
unkown
page execute read
25ED4A50000
heap
page read and write
19100F91000
heap
page read and write
19100F29000
heap
page read and write
25ED53F6000
heap
page read and write
25ED538C000
heap
page read and write
26727CCE000
heap
page read and write
25ED535F000
heap
page read and write
1C450ACB000
heap
page read and write
25ED539A000
heap
page read and write
46E000
unkown
page readonly
25ED528F000
heap
page read and write
25ED5281000
heap
page read and write
191F05D0000
heap
page read and write
19BD9602000
trusted library allocation
page read and write
1B410A20000
heap
page read and write
25ED4C9E000
heap
page read and write
191002E0000
heap
page read and write
25ED53F6000
heap
page read and write
25ED53AE000
heap
page read and write
18C7000
heap
page read and write
26727C7C000
heap
page read and write
19BD8E9F000
heap
page read and write
1F7C50B4000
heap
page read and write
25ED5360000
heap
page read and write
26727CC7000
heap
page read and write
26727CC2000
heap
page read and write
26D78D02000
heap
page read and write
25ED536D000
heap
page read and write
19100F6E000
heap
page read and write
25ED52F7000
heap
page read and write
26D78C56000
heap
page read and write
25ED4C9E000
heap
page read and write
26727CC1000
heap
page read and write
25ED52B3000
heap
page read and write
26D78C00000
heap
page read and write
19101415000
heap
page read and write
25ED53E3000
heap
page read and write
25ED5368000
heap
page read and write
19100F98000
heap
page read and write
25ED4890000
heap
page read and write
25ED53C6000
heap
page read and write
25ED5371000
heap
page read and write
10003000
unkown
page readonly
25ED53F6000
heap
page read and write
19100F13000
heap
page read and write
25ED533A000
heap
page read and write
1F7C50A4000
heap
page read and write
25ED53CD000
heap
page read and write
1F7C5070000
heap
page read and write
25ED5390000
heap
page read and write
435000
unkown
page read and write
26D78B80000
unclassified section
page readonly
1CB0000
heap
page read and write
25ED5355000
heap
page read and write
1049000
unkown
page write copy
1F7C5B94000
heap
page read and write
D16E2FF000
stack
page read and write
649000
unkown
page write copy
1C450AC6000
heap
page read and write
25ED5998000
heap
page read and write
19100F37000
heap
page read and write
25ED5386000
heap
page read and write
1E7A1CA8000
heap
page read and write
1F7C5B9E000
heap
page read and write
8ED5F7D000
stack
page read and write
19BD8E85000
heap
page read and write
25ED531D000
heap
page read and write
2460000
heap
page read and write
400000
unkown
page readonly
19100F7C000
heap
page read and write
400000
unkown
page readonly
40A000
unkown
page write copy
191004AA000
heap
page read and write
1B410A55000
heap
page read and write
25ED5A63000
heap
page read and write
19100F2C000
heap
page read and write
1F7C5B73000
heap
page read and write
25ED4C9C000
heap
page read and write
1910142E000
heap
page read and write
25ED4B25000
heap
page read and write
19100F8E000
heap
page read and write
10005000
unkown
page readonly
25ED531D000
heap
page read and write
1C450B13000
heap
page read and write
25ED53FA000
heap
page read and write
26727D00000
heap
page read and write
1C450A13000
heap
page read and write
26727CC4000
heap
page read and write
25ED4BBA000
heap
page read and write
168E54A0000
trusted library allocation
page read and write
408000
unkown
page readonly
25ED53B2000
heap
page read and write
26727CBB000
heap
page read and write
19100F70000
heap
page read and write
26D78C60000
heap
page read and write
49DD2FE000
stack
page read and write
1C450A60000
heap
page read and write
25ED5282000
heap
page read and write
25ED5390000
heap
page read and write
5EE000
unkown
page write copy
25ED53A8000
heap
page read and write
1B70000
heap
page read and write
43A33FD000
stack
page read and write
25ED5946000
heap
page read and write
26D78C7D000
heap
page read and write
19100F94000
heap
page read and write
25ED4C9C000
heap
page read and write
46E000
unkown
page readonly
26728402000
trusted library allocation
page read and write
49DD6FE000
stack
page read and write
168E4CA5000
heap
page read and write
25ED59B0000
heap
page read and write
25ED5403000
heap
page read and write
1C450AAB000
heap
page read and write
25ED537B000
heap
page read and write
25ED53A4000
heap
page read and write
C921CDB000
stack
page read and write
25ED5342000
heap
page read and write
25ED5371000
heap
page read and write
2BCACFB000
stack
page read and write
1D16F000
stack
page read and write
1C450AB4000
heap
page read and write
25ED5A80000
heap
page read and write
19100350000
heap
page read and write
4A5F97F000
stack
page read and write
1F7C50D4000
heap
page read and write
25ED5375000
heap
page read and write
26727CBB000
heap
page read and write
25ED4B8C000
heap
page read and write
25ED53A8000
heap
page read and write
25ED53A4000
heap
page read and write
17DE000
stack
page read and write
40A000
unkown
page write copy
25ED52CD000
heap
page read and write
19100F80000
heap
page read and write
168E4CA7000
heap
page read and write
26D78C2A000
heap
page read and write
1C450A28000
heap
page read and write
191004CB000
heap
page read and write
25ED5998000
heap
page read and write
25ED5BB8000
heap
page read and write
25ED5354000
heap
page read and write
1CBB0000
trusted library allocation
page read and write
1910148A000
heap
page read and write
26727CC2000
heap
page read and write
1C450A52000
heap
page read and write
26727CD5000
heap
page read and write
18CF000
heap
page read and write
46E000
unkown
page readonly
100C7E000
stack
page read and write
26727CBB000
heap
page read and write
25ED52B6000
heap
page read and write
191014A7000
heap
page read and write
4EF000
heap
page read and write
25ED5292000
heap
page read and write
7241AFA000
stack
page read and write
25ED59B0000
heap
page read and write
25ED52C8000
heap
page read and write
25ED5348000
heap
page read and write
25ED5367000
heap
page read and write
25ED5349000
heap
page read and write
26727CCE000
heap
page read and write
26D78D13000
heap
page read and write
25ED59B0000
heap
page read and write
1810000
heap
page read and write
191014A4000
heap
page read and write
25ED4B1D000
heap
page read and write
25ED5404000
heap
page read and write
18D8000
heap
page read and write
D16E679000
stack
page read and write
1660000
remote allocation
page execute and read and write
1F7C506F000
heap
page read and write
25ED5998000
heap
page read and write
25ED53D1000
heap
page read and write
25ED53A6000
heap
page read and write
25ED4BA4000
heap
page read and write
26D7A6C0000
remote allocation
page read and write
1B410A66000
heap
page read and write
25ED533E000
heap
page read and write
1C450A78000
heap
page read and write
25ED5BF3000
heap
page read and write
19100F78000
heap
page read and write
191F0510000
heap
page read and write
25ED5A6B000
heap
page read and write
25ED4C9D000
heap
page read and write
43A357A000
stack
page read and write
1B411202000
trusted library allocation
page read and write
25ED594F000
heap
page read and write
19BD8E61000
heap
page read and write
25ED5348000
heap
page read and write
18CE000
heap
page read and write
19BD8E6C000
heap
page read and write
25ED4BD2000
heap
page read and write
25ED5355000
heap
page read and write
25ED537C000
heap
page read and write
19100F29000
heap
page read and write
191F065A000
heap
page read and write
1B410A40000
heap
page read and write
25ED5378000
heap
page read and write
168E4C6B000
heap
page read and write
25ED533D000
heap
page read and write
19100E00000
heap
page read and write
42B000
unkown
page read and write
401000
unkown
page execute read
25ED59B4000
heap
page read and write
18BF000
heap
page read and write
25ED597A000
heap
page read and write
5F0000
unkown
page write copy
1F7C5BB7000
heap
page read and write
25ED534D000
heap
page read and write
168E4CA3000
heap
page read and write
25ED4AE0000
heap
page read and write
25ED536E000
heap
page read and write
25ED52AE000
heap
page read and write
191F0675000
heap
page read and write
19100F29000
heap
page read and write
179E000
stack
page read and write
25ED59CC000
heap
page read and write
19100F91000
heap
page read and write
25ED5403000
heap
page read and write
25ED5355000
heap
page read and write
19100F2E000
heap
page read and write
25ED52FB000
heap
page read and write
25ED53F4000
heap
page read and write
25ED59B1000
heap
page read and write
52E000
heap
page read and write
25ED535E000
heap
page read and write
1F7C50A6000
heap
page read and write
26727CBE000
heap
page read and write
25ED52B5000
heap
page read and write
25ED5971000
heap
page read and write
2BCB2FF000
stack
page read and write
1E7A1C00000
heap
page read and write
4A5F7FF000
stack
page read and write
25ED4BA1000
heap
page read and write
25ED52F7000
heap
page read and write
1C450AAE000
heap
page read and write
18EB000
heap
page read and write
1910142A000
heap
page read and write
2BCAB7F000
stack
page read and write
19100390000
unclassified section
page readonly
1F7C5B98000
heap
page read and write
25ED59B8000
heap
page read and write
19100F5A000
heap
page read and write
1E7A1D02000
heap
page read and write
19100F40000
heap
page read and write
1E7A1BD0000
trusted library allocation
page read and write
26727CC1000
heap
page read and write
1A6E000
stack
page read and write
26727CC0000
heap
page read and write
19100F78000
heap
page read and write
25ED53AB000
heap
page read and write
19100F2A000
heap
page read and write
25ED52F0000
heap
page read and write
25ED5375000
heap
page read and write
1F7C5B9B000
heap
page read and write
25ED539F000
heap
page read and write
25ED5A83000
heap
page read and write
26727CC4000
heap
page read and write
25ED53B9000
heap
page read and write
1B410A3B000
heap
page read and write
25ED5C2E000
heap
page read and write
25ED5372000
heap
page read and write
2BCAFFE000
stack
page read and write
8ED5E7B000
stack
page read and write
19100F0F000
heap
page read and write
1910148C000
heap
page read and write
25ED4C9B000
heap
page read and write
2926000
trusted library allocation
page read and write
25ED53A4000
heap
page read and write
19100F7B000
heap
page read and write
25ED536D000
heap
page read and write
19100F78000
heap
page read and write
19100F7B000
heap
page read and write
26D78CA7000
heap
page read and write
46E000
unkown
page readonly
25ED5390000
heap
page read and write
18C2000
heap
page read and write
2BCADFD000
stack
page read and write
25ED52B3000
heap
page read and write
1C450A85000
heap
page read and write
25ED4C99000
heap
page read and write
26727CBF000
heap
page read and write
25ED53C2000
heap
page read and write
26727CCE000
heap
page read and write
10001000
unkown
page execute read
25ED5A83000
heap
page read and write
25ED59B8000
heap
page read and write
25ED53A4000
heap
page read and write
19BD8E5D000
heap
page read and write
25ED597A000
heap
page read and write
19100F2C000
heap
page read and write
25ED5A0E000
heap
page read and write
191F0580000
heap
page read and write
191F0685000
heap
page read and write
3290000
trusted library allocation
page read and write
25ED53DA000
heap
page read and write
25ED4BB9000
heap
page read and write
26727CC7000
heap
page read and write
401000
unkown
page execute read
25ED53A8000
heap
page read and write
25ED5329000
heap
page read and write
1B410A49000
heap
page read and write
25ED5292000
heap
page read and write
1001FF000
stack
page read and write
25ED53A4000
heap
page read and write
43A387E000
stack
page read and write
25ED52A0000
heap
page read and write
25ED535A000
heap
page read and write
1C450A1F000
heap
page read and write
25ED49C0000
heap
page read and write
19100F0F000
heap
page read and write
25ED5BF9000
heap
page read and write
1C451402000
heap
page read and write
25ED52DD000
heap
page read and write
25ED5386000
heap
page read and write
25ED531B000
heap
page read and write
19100F2F000
heap
page read and write
22A0000
heap
page read and write
26727CBD000
heap
page read and write
25ED5BC4000
heap
page read and write
25ED58E0000
remote allocation
page read and write
26727CD5000
heap
page read and write
25ED52BA000
heap
page read and write
1E7A1C8E000
heap
page read and write
25ED531D000
heap
page read and write
1E7A19F0000
heap
page read and write
1F7C4F70000
unclassified section
page readonly
19BD8E57000
heap
page read and write
19100400000
heap
page read and write
1E7A1C13000
heap
page read and write
25ED539D000
heap
page read and write
25ED531D000
heap
page read and write
1E7A1C8C000
heap
page read and write
25ED4B2D000
heap
page read and write
25ED52F7000
heap
page read and write
19100F29000
heap
page read and write
49DD5FE000
stack
page read and write
25ED52C9000
heap
page read and write
25ED5BF3000
heap
page read and write
26727C70000
heap
page read and write
25ED5350000
heap
page read and write
26727CC1000
heap
page read and write
25ED537E000
heap
page read and write
1910053C000
heap
page read and write
25ED52B3000
heap
page read and write
25ED53CD000
heap
page read and write
19100F94000
heap
page read and write
D16E37E000
stack
page read and write
408000
unkown
page readonly
19100F7C000
heap
page read and write
515000
heap
page read and write
25ED4BB6000
heap
page read and write
19100F62000
heap
page read and write
25ED53C3000
heap
page read and write
25ED5354000
heap
page read and write
1F7C5B32000
heap
page read and write
1F7C50B1000
heap
page read and write
25ED531B000
heap
page read and write
25ED5369000
heap
page read and write
40A000
unkown
page write copy
1C450AB6000
heap
page read and write
19BD8E66000
heap
page read and write
25ED4BB0000
heap
page read and write
25ED53CD000
heap
page read and write
19100F7F000
heap
page read and write
1C450A00000
heap
page read and write
25ED5357000
heap
page read and write
26D7A6C0000
remote allocation
page read and write
25ED541C000
heap
page read and write
25ED531D000
heap
page read and write
25ED539D000
heap
page read and write
25ED5998000
heap
page read and write
26727CBF000
heap
page read and write
25ED531D000
heap
page read and write
25ED5A6B000
heap
page read and write
191F05C0000
unclassified section
page readonly
1910051B000
heap
page read and write
4C2067E000
stack
page read and write
19BD8E5E000
heap
page read and write
25ED5354000
heap
page read and write
1E7A2415000
heap
page read and write
10000000
unkown
page readonly
1C0000
remote allocation
page read and write
19BD8E69000
heap
page read and write
25ED5396000
heap
page read and write
1C4509C0000
heap
page read and write
25ED536E000
heap
page read and write
25ED53F4000
heap
page read and write
26D78D17000
heap
page read and write
25ED5241000
heap
page read and write
19100F5E000
heap
page read and write
25ED53C5000
heap
page read and write
1C450ABA000
heap
page read and write
25ED597A000
heap
page read and write
25ED52FB000
heap
page read and write
4A5F8FB000
stack
page read and write
25ED53A2000
heap
page read and write
19100F2A000
heap
page read and write
25ED597A000
heap
page read and write
25ED5335000
heap
page read and write
25ED5972000
heap
page read and write
25ED5972000
heap
page read and write
19100F91000
heap
page read and write
19100F7D000
heap
page read and write
25ED539C000
heap
page read and write
19100F0E000
heap
page read and write
19BD8E94000
heap
page read and write
19BD8E2B000
heap
page read and write
25ED5BB0000
heap
page read and write
191004A0000
heap
page read and write
25ED53AE000
heap
page read and write
25ED5401000
heap
page read and write
25ED5329000
heap
page read and write
26727CBB000
heap
page read and write
1D180000
heap
page read and write
25ED53C3000
heap
page read and write
25ED539A000
heap
page read and write
4C2057C000
stack
page read and write
168E4C61000
heap
page read and write
229E000
stack
page read and write
25ED5341000
heap
page read and write
26727CCF000
heap
page read and write
191F0640000
heap
page read and write
25ED53A1000
heap
page read and write
1910049C000
heap
page read and write
1E7A1CA1000
heap
page read and write
25ED53A9000
heap
page read and write
25ED5393000
heap
page read and write
19100F76000
heap
page read and write
191004A3000
heap
page read and write
25ED5281000
heap
page read and write
19100F00000
heap
page read and write
191F0EC0000
trusted library allocation
page read and write
25ED5A0E000
heap
page read and write
1E7A1A60000
heap
page read and write
25ED53A4000
heap
page read and write
25ED5291000
heap
page read and write
19100F5B000
heap
page read and write
1E7A1B80000
heap
page read and write
25ED4B19000
heap
page read and write
19100F74000
heap
page read and write
5EC000
unkown
page write copy
19100F76000
heap
page read and write
400000
unkown
page readonly
25ED5371000
heap
page read and write
25ED5370000
heap
page read and write
25ED53B2000
heap
page read and write
22A5000
heap
page read and write
33A0000
heap
page read and write
1F7C5041000
heap
page read and write
25ED538C000
heap
page read and write
26727CBF000
heap
page read and write
168E4C3D000
heap
page read and write
10017F000
stack
page read and write
191F067C000
heap
page read and write
25ED5386000
heap
page read and write
25ED4C95000
heap
page read and write
191013A0000
remote allocation
page read and write
19BD8E5A000
heap
page read and write
25ED5A7D000
heap
page read and write
25ED53CD000
heap
page read and write
25ED4BB9000
heap
page read and write
191014A6000
heap
page read and write
19100F0F000
heap
page read and write
1F7C4FD0000
trusted library allocation
page read and write
19100F94000
heap
page read and write
25ED5362000
heap
page read and write
1F7C5013000
heap
page read and write
26727CC3000
heap
page read and write
5E8000
unkown
page write copy
18ED000
heap
page read and write
25ED5255000
heap
page read and write
25ED597A000
heap
page read and write
1B410A7D000
heap
page read and write
25ED5397000
heap
page read and write
19100F85000
heap
page read and write
26727CC4000
heap
page read and write
26727CCE000
heap
page read and write
25ED53C5000
heap
page read and write
1F7C5BAB000
heap
page read and write
25ED594F000
heap
page read and write
25ED541C000
heap
page read and write
168E4C92000
heap
page read and write
25ED4BD6000
heap
page read and write
3630000
trusted library allocation
page read and write
3470000
trusted library allocation
page read and write
26727AF0000
unclassified section
page readonly
26727CC0000
heap
page read and write
1D12E000
stack
page read and write
25ED53A4000
heap
page read and write
26727CBF000
heap
page read and write
25ED531B000
heap
page read and write
19100F76000
heap
page read and write
25ED533E000
heap
page read and write
25ED5329000
heap
page read and write
25ED53F4000
heap
page read and write
25ED52D0000
heap
page read and write
25ED5365000
heap
page read and write
25ED53D1000
heap
page read and write
25ED5363000
heap
page read and write
25ED5396000
heap
page read and write
25ED52B7000
heap
page read and write
25ED537A000
heap
page read and write
25ED53AC000
heap
page read and write
25ED5359000
heap
page read and write
25ED594D000
heap
page read and write
25ED5358000
heap
page read and write
19100F94000
heap
page read and write
25ED5349000
heap
page read and write
25ED535A000
heap
page read and write
25ED52B6000
heap
page read and write
19BD8E67000
heap
page read and write
25ED531D000
heap
page read and write
1C450CE0000
heap
page read and write
25ED539C000
heap
page read and write
25ED4BB6000
heap
page read and write
25ED53A4000
heap
page read and write
25ED4B42000
heap
page read and write
191004BB000
heap
page read and write
25ED52C8000
heap
page read and write
3670000
trusted library allocation
page read and write
25ED5260000
heap
page read and write
26727C9B000
heap
page read and write
25ED4BDD000
heap
page read and write
26727CBE000
heap
page read and write
25ED5997000
heap
page read and write
25ED4C9A000
heap
page read and write
25ED52B7000
heap
page read and write
46C000
unkown
page read and write
408000
unkown
page readonly
19BD8E55000
heap
page read and write
26D78AD0000
heap
page read and write
1A70000
trusted library allocation
page read and write
191F0678000
heap
page read and write
30000
heap
page read and write
25ED5383000
heap
page read and write
25ED533E000
heap
page read and write
191F0E90000
trusted library allocation
page read and write
25ED5948000
heap
page read and write
461000
unkown
page write copy
25ED53A4000
heap
page read and write
25ED5366000
heap
page read and write
25ED52B6000
heap
page read and write
19BD8E42000
heap
page read and write
19100F74000
heap
page read and write
19100F2D000
heap
page read and write
25ED53AC000
heap
page read and write
25ED52B9000
heap
page read and write
25ED5910000
heap
page read and write
19BD8E31000
heap
page read and write
25ED4B19000
heap
page read and write
25ED539C000
heap
page read and write
191014A8000
heap
page read and write
22B0000
heap
page read and write
25ED53A4000
heap
page read and write
25ED531D000
heap
page read and write
19BD8E5C000
heap
page read and write
25ED531B000
heap
page read and write
1910053B000
heap
page read and write
25ED597A000
heap
page read and write
25ED4AC0000
trusted library allocation
page read and write
25ED531B000
heap
page read and write
19BD8E59000
heap
page read and write
25ED52B3000
heap
page read and write
26727CBB000
heap
page read and write
25ED53FB000
heap
page read and write
620000
heap
page read and write
25ED5290000
heap
page read and write
25ED526A000
heap
page read and write
19100F2F000
heap
page read and write
26727CBF000
heap
page read and write
25ED53CD000
heap
page read and write
1D06D000
stack
page read and write
25ED53A3000
heap
page read and write
1E7A2402000
heap
page read and write
25ED4C99000
heap
page read and write
19100F29000
heap
page read and write
168E4C8D000
heap
page read and write
25ED4BB6000
heap
page read and write
C922277000
stack
page read and write
2BCAA7C000
stack
page read and write
25ED53C3000
heap
page read and write
25ED5365000
heap
page read and write
25ED53E3000
heap
page read and write
19BD8E4E000
heap
page read and write
1B410900000
heap
page read and write
26727CCE000
heap
page read and write
1E7A1C2A000
heap
page read and write
26727D13000
heap
page read and write
25ED5991000
heap
page read and write
25ED53E3000
heap
page read and write
25ED5393000
heap
page read and write
25ED4BB6000
heap
page read and write
1C450A8E000
heap
page read and write
26727CCE000
heap
page read and write
49DD4FF000
stack
page read and write
1B410950000
trusted library allocation
page read and write
25ED4BB7000
heap
page read and write
19100F94000
heap
page read and write
25ED52BA000
heap
page read and write
19100F6D000
heap
page read and write
25ED5399000
heap
page read and write
25ED538C000
heap
page read and write
25ED5355000
heap
page read and write
26727D02000
heap
page read and write
3250000
trusted library allocation
page read and write
30000
heap
page read and write
26727CA8000
heap
page read and write
5F2000
unkown
page write copy
25ED5A4E000
heap
page read and write
26727C29000
heap
page read and write
19100438000
heap
page read and write
25ED531D000
heap
page read and write
25ED5366000
heap
page read and write
25ED536C000
heap
page read and write
25ED5399000
heap
page read and write
25ED5365000
heap
page read and write
26727CB7000
heap
page read and write
25ED5C02000
heap
page read and write
2BCAE7E000
stack
page read and write
25ED53AC000
heap
page read and write
25ED5348000
heap
page read and write
25ED5401000
heap
page read and write
72419FE000
stack
page read and write
1C0000
remote allocation
page read and write
43A307B000
stack
page read and write
19100453000
heap
page read and write
25ED5948000
heap
page read and write
19100F80000
heap
page read and write
26727C91000
heap
page read and write
19100F6B000
heap
page read and write
168E4C4E000
heap
page read and write
19BD8E41000
heap
page read and write
43A30FF000
stack
page read and write
40A000
unkown
page write copy
4C2087B000
stack
page read and write
25ED59B0000
heap
page read and write
26727CC3000
heap
page read and write
1910046F000
heap
page read and write
25ED53A4000
heap
page read and write
9C000
stack
page read and write
18AB000
heap
page read and write
19BD8E64000
heap
page read and write
40A000
unkown
page write copy
25ED5A0E000
heap
page read and write
25ED52FB000
heap
page read and write
408000
unkown
page readonly
D16E479000
stack
page read and write
26727CC7000
heap
page read and write
19100F78000
heap
page read and write
25ED52B9000
heap
page read and write
18CB000
heap
page read and write
1860000
heap
page read and write
25ED53CD000
heap
page read and write
25ED4C99000
heap
page read and write
25ED530D000
heap
page read and write
1B4107E0000
heap
page read and write
626000
unkown
page write copy
25ED5389000
heap
page read and write
25ED539C000
heap
page read and write
34A9000
trusted library allocation
page read and write
25ED5948000
heap
page read and write
25ED5948000
heap
page read and write
25ED524F000
heap
page read and write
1B410A53000
heap
page read and write
1F7C5037000
heap
page read and write
1F7C50A9000
heap
page read and write
25ED529E000
heap
page read and write
19100F0F000
heap
page read and write
43A37FD000
stack
page read and write
4A5F5FE000
stack
page read and write
43A397E000
stack
page read and write
1C450AC4000
heap
page read and write
25ED52B4000
heap
page read and write
408000
unkown
page readonly
25ED59B1000
heap
page read and write
25ED531D000
heap
page read and write
25ED53AC000
heap
page read and write
8ED607F000
stack
page read and write
25ED5935000
heap
page read and write
25ED52B6000
heap
page read and write
1E7A1B70000
unclassified section
page readonly
25ED5373000
heap
page read and write
168E4C28000
heap
page read and write
401000
unkown
page execute read
6F82AFE000
stack
page read and write
1F7C50A4000
heap
page read and write
26727CCE000
heap
page read and write
2470000
heap
page read and write
19100502000
heap
page read and write
25ED53BE000
heap
page read and write
25ED5290000
heap
page read and write
1B410A46000
heap
page read and write
There are 1314 hidden memdumps, click here to show them.