IOC Report
documentos DHL.exe

loading gif

Files

File Path
Type
Category
Malicious
documentos DHL.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\nsw5DC6.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3425316567-2969588382-3778222414-1001\1b1d0082738e9f9011266f86ab9723d2_11389406-0377-47ed-98c7-d564e683c6eb
data
dropped
C:\Users\user\Zorillinae\Skaalpundet\Inkbslistes\Tset\Demodulationen\Iagttagerposition\Americanly.Unc
ASCII text, with very long lines (41286), with no line terminators
dropped
C:\Users\user\Zorillinae\Skaalpundet\Inkbslistes\Tset\Demodulationen\Iagttagerposition\Strukturerne.Pom
OpenPGP Public Key
dropped
C:\Users\user\Zorillinae\Skaalpundet\Inkbslistes\Tset\Demodulationen\Iagttagerposition\libpixbufloader-icns.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Windows\Resources\0409\Transcriptive.ini
ASCII text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\documentos DHL.exe
C:\Users\user\Desktop\documentos DHL.exe
malicious
C:\Program Files (x86)\Internet Explorer\ExtExport.exe
C:\Users\user\Desktop\documentos DHL.exe
malicious
C:\Program Files (x86)\Internet Explorer\ieinstal.exe
C:\Users\user\Desktop\documentos DHL.exe
C:\Program Files (x86)\Internet Explorer\ieinstal.exe
C:\Users\user\Desktop\documentos DHL.exe
C:\Program Files (x86)\Internet Explorer\ieinstal.exe
C:\Users\user\Desktop\documentos DHL.exe
C:\Program Files (x86)\Internet Explorer\ieinstal.exe
C:\Users\user\Desktop\documentos DHL.exe
C:\Program Files (x86)\Internet Explorer\ieinstal.exe
C:\Users\user\Desktop\documentos DHL.exe
C:\Program Files (x86)\Internet Explorer\ieinstal.exe
C:\Users\user\Desktop\documentos DHL.exe
C:\Program Files (x86)\Internet Explorer\ieinstal.exe
C:\Users\user\Desktop\documentos DHL.exe
C:\Program Files (x86)\Internet Explorer\ieinstal.exe
C:\Users\user\Desktop\documentos DHL.exe
C:\Program Files (x86)\Internet Explorer\ieinstal.exe
C:\Users\user\Desktop\documentos DHL.exe
C:\Program Files (x86)\Internet Explorer\ieinstal.exe
C:\Users\user\Desktop\documentos DHL.exe
C:\Program Files (x86)\Internet Explorer\ieinstal.exe
C:\Users\user\Desktop\documentos DHL.exe
C:\Program Files (x86)\Internet Explorer\ielowutil.exe
C:\Users\user\Desktop\documentos DHL.exe
C:\Program Files (x86)\Internet Explorer\ielowutil.exe
C:\Users\user\Desktop\documentos DHL.exe
C:\Program Files (x86)\Internet Explorer\ielowutil.exe
C:\Users\user\Desktop\documentos DHL.exe
C:\Program Files (x86)\Internet Explorer\ielowutil.exe
C:\Users\user\Desktop\documentos DHL.exe
C:\Program Files (x86)\Internet Explorer\ielowutil.exe
C:\Users\user\Desktop\documentos DHL.exe
C:\Program Files (x86)\Internet Explorer\ielowutil.exe
C:\Users\user\Desktop\documentos DHL.exe
C:\Program Files (x86)\Internet Explorer\ielowutil.exe
C:\Users\user\Desktop\documentos DHL.exe
C:\Program Files (x86)\Internet Explorer\ielowutil.exe
C:\Users\user\Desktop\documentos DHL.exe
C:\Program Files (x86)\Internet Explorer\ielowutil.exe
C:\Users\user\Desktop\documentos DHL.exe
C:\Program Files (x86)\Internet Explorer\ielowutil.exe
C:\Users\user\Desktop\documentos DHL.exe
There are 13 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://doc-04-90-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/cus72g9u
unknown
https://doc-04-90-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/cus72g9uti9p4sqam1k45t4h3de3hhkd/1669658550000/01268323115933183181/*/1lmBjkmJX2WixZUvaKmoyB8cex-DCePE2?e=download&uuid=e0f4c7f4-041c-4571-801a-cda7ca0f1ae2
142.250.186.65
http://nsis.sf.net/NSIS_ErrorError
unknown
https://doc-04-90-docs.googleusercontent.com/
unknown
https://doc-04-90-docs.googleusercontent.com/:
unknown
https://drive.google.com/
unknown
https://drive.google.com/d
unknown
https://doc-04-90-docs.googleusercontent.com/=
unknown
https://csp.withgoogle.com/csp/report-to/DriveUntrustedContentHttp/external
unknown

Domains

Name
IP
Malicious
drive.google.com
142.250.74.206
googlehosted.l.googleusercontent.com
142.250.186.65
doc-04-90-docs.googleusercontent.com
unknown

IPs

IP
Domain
Country
Malicious
142.250.74.206
drive.google.com
United States
142.250.186.65
googlehosted.l.googleusercontent.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Canaller\Kogenichernes\Vagtparaden
Sporocarpium
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Legendarian
Prefecture
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Tovtrkkeriet
Orkhon

Memdumps

Base Address
Regiontype
Protect
Malicious
2A00000
remote allocation
page execute and read and write
malicious
2A00000
remote allocation
page execute and read and write
malicious
3370000
direct allocation
page execute and read and write
malicious
1DDFF71A000
heap
page read and write
16743362000
heap
page read and write
16743AD9000
heap
page read and write
19A218C9000
heap
page read and write
19A217A0000
heap
page read and write
19A218A1000
heap
page read and write
16743AD9000
heap
page read and write
29C41600000
heap
page read and write
1DDFFA04000
heap
page read and write
16743A36000
heap
page read and write
1674335C000
heap
page read and write
250000
unkown
page readonly
1DDFF89B000
heap
page read and write
98E000
stack
page read and write
1674410B000
heap
page read and write
16743B84000
heap
page read and write
16743BB0000
heap
page read and write
19A22378000
heap
page read and write
1E736DE0000
heap
page read and write
16743B85000
heap
page read and write
19A22395000
heap
page read and write
16743300000
heap
page read and write
16743B1D000
heap
page read and write
19A22329000
heap
page read and write
19A218B2000
heap
page read and write
16744390000
heap
page read and write
52B76FD000
stack
page read and write
1674337F000
heap
page read and write
16743B34000
heap
page read and write
544DBFF000
stack
page read and write
16743BBC000
heap
page read and write
167432FA000
heap
page read and write
48C47FE000
stack
page read and write
1AE95302000
heap
page read and write
42D000
unkown
page read and write
2740000
unkown
page readonly
2C80000
unkown
page readonly
1AA26493000
heap
page read and write
112F9A7000
stack
page read and write
1DDFEDC5000
heap
page read and write
1DDFF719000
heap
page read and write
16743AD9000
heap
page read and write
16743367000
heap
page read and write
19A22395000
heap
page read and write
1674415B000
heap
page read and write
16743AAA000
heap
page read and write
2DE0000
unkown
page readonly
1DDFEC24000
heap
page read and write
1DDFF735000
heap
page read and write
1DDFF89E000
heap
page read and write
19A218A7000
heap
page read and write
16743B4C000
heap
page read and write
1E7B6000
direct allocation
page read and write
48C467E000
stack
page read and write
16743B89000
heap
page read and write
1AA26453000
heap
page read and write
16743AFD000
heap
page read and write
23895190000
trusted library allocation
page read and write
29F0000
unkown
page readonly
19A22395000
heap
page read and write
16744175000
heap
page read and write
16743B86000
heap
page read and write
1DDFF729000
heap
page read and write
2AC0000
remote allocation
page read and write
1674410C000
heap
page read and write
2C80000
unkown
page readonly
1AA26425000
heap
page read and write
16743479000
heap
page read and write
1DDFF715000
heap
page read and write
231DE200000
heap
page read and write
16743377000
heap
page read and write
16743AD4000
heap
page read and write
19A2232B000
heap
page read and write
19A22376000
heap
page read and write
16743AD9000
heap
page read and write
112FF7D000
stack
page read and write
167440F0000
heap
page read and write
19A22370000
heap
page read and write
10059000
trusted library allocation
page read and write
19A218C2000
heap
page read and write
9025FE000
stack
page read and write
19A22845000
heap
page read and write
3600000
trusted library allocation
page read and write
1AA2646C000
heap
page read and write
16743BE4000
heap
page read and write
1DDFF9F8000
heap
page read and write
3040000
remote allocation
page read and write
1E736F50000
trusted library allocation
page read and write
1DDFF6EB000
heap
page read and write
1DDFF730000
heap
page read and write
230E000
stack
page read and write
16743B57000
heap
page read and write
40A000
unkown
page write copy
16743B88000
heap
page read and write
23895A02000
trusted library allocation
page read and write
16743BDC000
heap
page read and write
16743A9B000
heap
page read and write
28283666000
heap
page read and write
16743B88000
heap
page read and write
16743B3E000
heap
page read and write
16743300000
heap
page read and write
1AA2646D000
heap
page read and write
16743B5F000
heap
page read and write
2B70000
unkown
page readonly
48C411C000
stack
page read and write
2DFC000
heap
page read and write
19A2191B000
heap
page read and write
16743B45000
heap
page read and write
1674439C000
heap
page read and write
16743B96000
heap
page read and write
16743BA4000
heap
page read and write
1E737802000
trusted library allocation
page read and write
19A2230E000
heap
page read and write
167440C0000
remote allocation
page read and write
16743AD4000
heap
page read and write
19A228A5000
heap
page read and write
1E7370B9000
heap
page read and write
2B243A13000
heap
page read and write
1E6A0000
remote allocation
page read and write
1E7370B8000
heap
page read and write
19A218EE000
heap
page read and write
282833E0000
heap
page read and write
1DDFF9FB000
heap
page read and write
1DDFEC5A000
heap
page read and write
2BF0000
unkown
page read and write
16743479000
heap
page read and write
1E7370B8000
heap
page read and write
1DDFF744000
heap
page read and write
28283702000
heap
page read and write
16743BD4000
heap
page read and write
16743B1D000
heap
page read and write
2B243B02000
heap
page read and write
16743BC3000
heap
page read and write
16743B89000
heap
page read and write
19A2185F000
heap
page read and write
19A2230E000
heap
page read and write
CD5C8FF000
stack
page read and write
16743B95000
heap
page read and write
1AA26440000
heap
page read and write
28283684000
heap
page read and write
19A2232D000
heap
page read and write
1E71F000
stack
page read and write
1E737000000
heap
page read and write
19A2230E000
heap
page read and write
16743AAA000
heap
page read and write
112FD7E000
stack
page read and write
16743BC3000
heap
page read and write
29C40E2A000
heap
page read and write
2B70000
unkown
page readonly
29F0000
unkown
page readonly
1AE95281000
heap
page read and write
19A218AD000
heap
page read and write
16743AD5000
heap
page read and write
16743479000
heap
page read and write
1674421C000
heap
page read and write
19A22361000
heap
page read and write
1AA26432000
heap
page read and write
1DDFF744000
heap
page read and write
19A22200000
heap
page read and write
16743B8C000
heap
page read and write
16743A51000
heap
page read and write
19A2236B000
heap
page read and write
16743B62000
heap
page read and write
167432CD000
heap
page read and write
19A2232C000
heap
page read and write
16743B88000
heap
page read and write
1E737013000
heap
page read and write
1AA264A0000
heap
page read and write
16744175000
heap
page read and write
19A2232F000
heap
page read and write
16743AA6000
heap
page read and write
16744115000
heap
page read and write
1DDFF892000
heap
page read and write
16743343000
heap
page read and write
16743B9B000
heap
page read and write
2FE0000
unkown
page readonly
16743B51000
heap
page read and write
1AA2644E000
heap
page read and write
1DDFEBFC000
heap
page read and write
28283713000
heap
page read and write
425000
unkown
page read and write
1DDFF744000
heap
page read and write
408000
unkown
page readonly
28283621000
heap
page read and write
16743BBA000
heap
page read and write
1674410C000
heap
page read and write
16743B44000
heap
page read and write
16743B52000
heap
page read and write
16743B6D000
heap
page read and write
16743B8E000
heap
page read and write
19A218A0000
heap
page read and write
19A2237E000
heap
page read and write
16744117000
heap
page read and write
19A22329000
heap
page read and write
16743A92000
heap
page read and write
1674411B000
heap
page read and write
29C41615000
heap
page read and write
19A22332000
heap
page read and write
29F0000
unkown
page readonly
19A22823000
heap
page read and write
1DDFF735000
heap
page read and write
16743BBA000
heap
page read and write
16743B93000
heap
page read and write
1DDFEC0C000
heap
page read and write
19A22376000
heap
page read and write
16743B2B000
heap
page read and write
1DDFF6C0000
heap
page read and write
16743368000
heap
page read and write
19A22395000
heap
page read and write
1AE950B0000
heap
page read and write
29C40E7A000
heap
page read and write
16744131000
heap
page read and write
19A2232A000
heap
page read and write
2B244584000
heap
page read and write
1DDFFA01000
heap
page read and write
6BBF6FE000
stack
page read and write
19A216E0000
heap
page read and write
1DDFF740000
heap
page read and write
16743362000
heap
page read and write
2DA0000
remote allocation
page read and write
16743B52000
heap
page read and write
2750000
unkown
page read and write
1674411B000
heap
page read and write
16743AAA000
heap
page read and write
16743B77000
heap
page read and write
28283669000
heap
page read and write
16744106000
heap
page read and write
19A22329000
heap
page read and write
25B0000
unkown
page readonly
2BF4000
heap
page read and write
16744154000
heap
page read and write
16743BFD000
heap
page read and write
1E47C000
stack
page read and write
19A22329000
heap
page read and write
1E33E000
stack
page read and write
19A228A5000
heap
page read and write
2820000
remote allocation
page read and write
2B243B02000
heap
page read and write
16743B9A000
heap
page read and write
16743B20000
heap
page read and write
16744407000
heap
page read and write
16743B1D000
heap
page read and write
1674347E000
heap
page read and write
16743A25000
heap
page read and write
16743BA4000
heap
page read and write
167432FA000
heap
page read and write
16743B43000
heap
page read and write
16743BB9000
heap
page read and write
2E46000
heap
page read and write
2B243AF1000
heap
page read and write
16743A74000
heap
page read and write
1DDFEC31000
heap
page read and write
2B80000
unkown
page readonly
167441A9000
heap
page read and write
16743BE3000
heap
page read and write
5C0000
heap
page read and write
19A22329000
heap
page read and write
29C40E52000
heap
page read and write
19A2235A000
heap
page read and write
112FEFC000
stack
page read and write
1DDFF7D0000
heap
page read and write
16743BC1000
heap
page read and write
1AE95213000
heap
page read and write
400000
unkown
page readonly
16743ADF000
heap
page read and write
1674410C000
heap
page read and write
16743A86000
heap
page read and write
1AA2644C000
heap
page read and write
16743B96000
heap
page read and write
1AA26487000
heap
page read and write
16743B1D000
heap
page read and write
427000
unkown
page read and write
1674410C000
heap
page read and write
16744164000
heap
page read and write
10000000
unkown
page readonly
2730000
unkown
page readonly
2550000
unkown
page readonly
CD5CD7E000
stack
page read and write
2BF0000
heap
page read and write
2828372A000
heap
page read and write
1DDFF724000
heap
page read and write
1DDFF6ED000
heap
page read and write
29C40F00000
heap
page read and write
29C40D00000
heap
page read and write
167441F2000
heap
page read and write
27E0000
remote allocation
page read and write
2C10000
unkown
page read and write
16743B64000
heap
page read and write
1DDFF6C6000
heap
page read and write
19A000
stack
page read and write
1E736F00000
heap
page read and write
1AE952B7000
heap
page read and write
19A2235B000
heap
page read and write
25B0000
unkown
page readonly
19A2237C000
heap
page read and write
6BBF12C000
stack
page read and write
16743AC3000
heap
page read and write
1DDFF763000
heap
page read and write
DEBF2FF000
stack
page read and write
1DDFF71F000
heap
page read and write
19A2232C000
heap
page read and write
1674410D000
heap
page read and write
19A22350000
heap
page read and write
16743B6D000
heap
page read and write
16743B31000
heap
page read and write
16744131000
heap
page read and write
1674337C000
heap
page read and write
167441A9000
heap
page read and write
19A22370000
heap
page read and write
16743AD9000
heap
page read and write
1DDFEC31000
heap
page read and write
1AE952BE000
heap
page read and write
29C41602000
heap
page read and write
1AA2644A000
heap
page read and write
25D0000
unkown
page read and write
1674421D000
heap
page read and write
19A22840000
heap
page read and write
544DCF9000
stack
page read and write
1AA26480000
heap
page read and write
19A22378000
heap
page read and write
1AA264A3000
heap
page read and write
16744106000
heap
page read and write
19A2289D000
heap
page read and write
1674347C000
heap
page read and write
1674410C000
heap
page read and write
16743368000
heap
page read and write
2E4C000
heap
page read and write
16744174000
heap
page read and write
DEBF47F000
stack
page read and write
3080000
unkown
page read and write
16743B98000
heap
page read and write
23895302000
heap
page read and write
231DE1C0000
heap
page read and write
16743B64000
heap
page read and write
2BD0000
remote allocation
page read and write
16743A6C000
heap
page read and write
DEBEB4B000
stack
page read and write
30000
heap
page read and write
16743350000
heap
page read and write
19A2236C000
heap
page read and write
19A2236F000
heap
page read and write
2420000
heap
page read and write
27E0000
remote allocation
page read and write
2B20000
remote allocation
page read and write
1E737029000
heap
page read and write
167441A4000
heap
page read and write
16743AD9000
heap
page read and write
45E000
unkown
page readonly
1E7370BD000
heap
page read and write
16743BE3000
heap
page read and write
1DDFF74B000
heap
page read and write
1DDFF9EC000
heap
page read and write
1E7B0000
trusted library allocation
page read and write
16743A67000
heap
page read and write
2B244588000
heap
page read and write
16743377000
heap
page read and write
5FC000
heap
page read and write
1674416B000
heap
page read and write
16743A25000
heap
page read and write
1AA26461000
heap
page read and write
19A2232D000
heap
page read and write
1674421D000
heap
page read and write
19A227A0000
remote allocation
page read and write
16743B44000
heap
page read and write
1AE952B7000
heap
page read and write
16743B3E000
heap
page read and write
16743AEE000
heap
page read and write
2BE0000
unkown
page readonly
2B244573000
heap
page read and write
19A22329000
heap
page read and write
2BD0000
remote allocation
page read and write
16743B34000
heap
page read and write
1AE9529B000
heap
page read and write
19A22383000
heap
page read and write
45E000
unkown
page readonly
16743B6D000
heap
page read and write
970A3FF000
stack
page read and write
16744192000
heap
page read and write
1AE95286000
heap
page read and write
48C49FE000
stack
page read and write
1DDFEC3A000
heap
page read and write
1AA26442000
heap
page read and write
19A2237E000
heap
page read and write
19A22387000
heap
page read and write
16743BBF000
heap
page read and write
16744117000
heap
page read and write
16743B85000
heap
page read and write
16743AD1000
heap
page read and write
23895291000
heap
page read and write
19A22332000
heap
page read and write
16743AFD000
heap
page read and write
2570000
unkown
page read and write
167432E5000
heap
page read and write
1AA26502000
heap
page read and write
16743A88000
heap
page read and write
1E737089000
heap
page read and write
16743A74000
heap
page read and write
19A2237E000
heap
page read and write
28283668000
heap
page read and write
16743B52000
heap
page read and write
96000
stack
page read and write
2B243A8B000
heap
page read and write
16743B70000
heap
page read and write
16744192000
heap
page read and write
16743290000
heap
page read and write
1674347D000
heap
page read and write
19A2237B000
heap
page read and write
16743B33000
heap
page read and write
16743373000
heap
page read and write
1AA2646B000
heap
page read and write
16744108000
heap
page read and write
19A2237D000
heap
page read and write
48C419E000
stack
page read and write
19A21800000
heap
page read and write
16743384000
heap
page read and write
1E737067000
heap
page read and write
16743AAA000
heap
page read and write
1E7370B8000
heap
page read and write
1AE95229000
heap
page read and write
16743A88000
heap
page read and write
16743AB2000
heap
page read and write
16743343000
heap
page read and write
19A22370000
heap
page read and write
1DDFEC97000
heap
page read and write
2550000
unkown
page readonly
2570000
unkown
page read and write
167443EF000
heap
page read and write
1DDFEC24000
heap
page read and write
167440C0000
remote allocation
page read and write
19A2232C000
heap
page read and write
606000
heap
page read and write
1AA264A8000
heap
page read and write
2EAE000
stack
page read and write
25C0000
unkown
page readonly
1DDFEC97000
heap
page read and write
16743A74000
heap
page read and write
1AE9525A000
heap
page read and write
167440C0000
remote allocation
page read and write
1E736EF0000
unclassified section
page readonly
2B244594000
heap
page read and write
2E46000
heap
page read and write
3040000
remote allocation
page read and write
1E7370C0000
heap
page read and write
29C40E87000
heap
page read and write
167432FA000
heap
page read and write
1E43D000
stack
page read and write
10001000
unkown
page execute read
1AA2645B000
heap
page read and write
16744166000
heap
page read and write
16743B91000
heap
page read and write
1DDFEC3A000
heap
page read and write
16743B9A000
heap
page read and write
16743BE4000
heap
page read and write
1DDFEBE6000
heap
page read and write
16743B54000
heap
page read and write
16743B8F000
heap
page read and write
1DDFF9F6000
heap
page read and write
1674337F000
heap
page read and write
2E60000
remote allocation
page read and write
1E737092000
heap
page read and write
16743AD4000
heap
page read and write
19A2236E000
heap
page read and write
16743AD9000
heap
page read and write
1AA26467000
heap
page read and write
2FF0000
unkown
page read and write
16743BE4000
heap
page read and write
16743300000
heap
page read and write
29C40D50000
trusted library allocation
page read and write
16743B52000
heap
page read and write
88F000
stack
page read and write
1AE95240000
heap
page read and write
29C40EA8000
heap
page read and write
16743B82000
heap
page read and write
16743B45000
heap
page read and write
167443D2000
heap
page read and write
1AE95C02000
heap
page read and write
16743B9B000
heap
page read and write
1AA2645D000
heap
page read and write
1E7370BA000
heap
page read and write
16744166000
heap
page read and write
16743BBA000
heap
page read and write
16743BBA000
heap
page read and write
1674337F000
heap
page read and write
2B20000
remote allocation
page read and write
1DDFF70D000
heap
page read and write
1DDFF9FC000
heap
page read and write
16743BFD000
heap
page read and write
16744155000
heap
page read and write
16743B5C000
heap
page read and write
1674347A000
heap
page read and write
16743350000
heap
page read and write
CD5CA7E000
stack
page read and write
1DDFEC2A000
heap
page read and write
16743BC3000
heap
page read and write
19A22388000
heap
page read and write
16743300000
heap
page read and write
2B24458A000
heap
page read and write
270000
unkown
page read and write
29C40B70000
heap
page read and write
16743385000
heap
page read and write
16743BA3000
heap
page read and write
1DDFF729000
heap
page read and write
16743B25000
heap
page read and write
16743B4D000
heap
page read and write
167432FA000
heap
page read and write
1F0000
heap
page read and write
2B244500000
heap
page read and write
16743B83000
heap
page read and write
19A2232F000
heap
page read and write
1E7370B8000
heap
page read and write
16743BE4000
heap
page read and write
16744122000
heap
page read and write
2D3E000
stack
page read and write
16743BC3000
heap
page read and write
231DE280000
heap
page read and write
970A7FC000
stack
page read and write
231DE302000
heap
page read and write
1DF40000
trusted library allocation
page read and write
1AE95285000
heap
page read and write
2389526C000
heap
page read and write
544DEFF000
stack
page read and write
19A2230F000
heap
page read and write
23895259000
heap
page read and write
1E7370BE000
heap
page read and write
2DA0000
remote allocation
page read and write
52B7CFE000
stack
page read and write
1AE95261000
heap
page read and write
3270000
trusted library allocation
page read and write
1E7370BF000
heap
page read and write
167432CD000
heap
page read and write
19A22378000
heap
page read and write
544E0FB000
stack
page read and write
19A2193C000
heap
page read and write
1AE9527E000
heap
page read and write
2750000
unkown
page read and write
19A22332000
heap
page read and write
16744124000
heap
page read and write
1E3BE000
stack
page read and write
1DDFF6FE000
heap
page read and write
296F000
stack
page read and write
1674412C000
heap
page read and write
16744192000
heap
page read and write
234E000
stack
page read and write
16744164000
heap
page read and write
19A22376000
heap
page read and write
16743B71000
heap
page read and write
16743AD9000
heap
page read and write
2E0A000
heap
page read and write
2828363E000
heap
page read and write
1DDFEC97000
heap
page read and write
16744123000
heap
page read and write
23895240000
heap
page read and write
16743B89000
heap
page read and write
19A21750000
heap
page read and write
1AE9528E000
heap
page read and write
16743B91000
heap
page read and write
1E7370B8000
heap
page read and write
544D7FE000
stack
page read and write
1674412A000
heap
page read and write
29C40CF0000
unclassified section
page readonly
34C0000
heap
page read and write
2E0A000
heap
page read and write
16743352000
heap
page read and write
19A22389000
heap
page read and write
16744169000
heap
page read and write
231DE1B0000
unclassified section
page readonly
23895110000
heap
page read and write
16743BD4000
heap
page read and write
45A000
unkown
page read and write
19A2232D000
heap
page read and write
16743BE4000
heap
page read and write
19A2230E000
heap
page read and write
2C90000
unkown
page read and write
2E01000
heap
page read and write
29C40F13000
heap
page read and write
19A21913000
heap
page read and write
10003000
unkown
page readonly
2560000
unkown
page readonly
2B243AB4000
heap
page read and write
16743B51000
heap
page read and write
5C7000
heap
page read and write
28283600000
heap
page read and write
1E4FE000
stack
page read and write
544DB79000
stack
page read and write
1DDFF73E000
heap
page read and write
1E737095000
heap
page read and write
16743381000
heap
page read and write
1E737102000
heap
page read and write
16743B84000
heap
page read and write
19A22387000
heap
page read and write
1DDFF894000
heap
page read and write
1DDFEC3A000
heap
page read and write
19A22391000
heap
page read and write
1AA26270000
heap
page read and write
16743AB6000
heap
page read and write
16743B5B000
heap
page read and write
16743AA6000
heap
page read and write
1674410F000
heap
page read and write
16743B71000
heap
page read and write
1DDFEC97000
heap
page read and write
2DE0000
unkown
page readonly
2DE0000
unkown
page readonly
1674416B000
heap
page read and write
1E6DE000
stack
page read and write
16743B34000
heap
page read and write
29C40F02000
heap
page read and write
19A22800000
heap
page read and write
1674410B000
heap
page read and write
19A22361000
heap
page read and write
16743A86000
heap
page read and write
2E4C000
heap
page read and write
2C80000
unkown
page readonly
16744124000
heap
page read and write
16743AD9000
heap
page read and write
CD5CEFF000
stack
page read and write
3050000
heap
page read and write
1DDFF73C000
heap
page read and write
19A2236C000
heap
page read and write
19A2235A000
heap
page read and write
1AA26458000
heap
page read and write
1674410C000
heap
page read and write
16743B82000
heap
page read and write
16743B6D000
heap
page read and write
1DDFF6D7000
heap
page read and write
29C40E8F000
heap
page read and write
1DDFF729000
heap
page read and write
29C40E77000
heap
page read and write
16743A74000
heap
page read and write
16743A20000
heap
page read and write
2BD0000
unkown
page readonly
2EB0000
trusted library allocation
page read and write
2C00000
unkown
page readonly
19A2235E000
heap
page read and write
16743479000
heap
page read and write
16743AA4000
heap
page read and write
29C40EA2000
heap
page read and write
48C4875000
stack
page read and write
23895100000
unclassified section
page readonly
1E63F000
stack
page read and write
16743BB2000
heap
page read and write
3080000
unkown
page read and write
16743B9B000
heap
page read and write
16743BDA000
heap
page read and write
16744190000
heap
page read and write
29C40E87000
heap
page read and write
1DDFF725000
heap
page read and write
1DDFEC31000
heap
page read and write
16744122000
heap
page read and write
32F0000
trusted library allocation
page read and write
16744174000
heap
page read and write
19A218A5000
heap
page read and write
19A22360000
heap
page read and write
16744174000
heap
page read and write
1DDFEC97000
heap
page read and write
16743BDA000
heap
page read and write
1E7370BD000
heap
page read and write
1674410B000
heap
page read and write
1DDFF74B000
heap
page read and write
16743B51000
heap
page read and write
1674412A000
heap
page read and write
1674415B000
heap
page read and write
16743A86000
heap
page read and write
16744124000
heap
page read and write
52B777F000
stack
page read and write
231DE292000
heap
page read and write
2BD0000
unkown
page readonly
16743B90000
heap
page read and write
29F0000
unkown
page readonly
16743AD0000
heap
page read and write
19A22395000
heap
page read and write
1DDFF6EB000
heap
page read and write
19A22387000
heap
page read and write
16743B9A000
heap
page read and write
16743B31000
heap
page read and write
167443D3000
heap
page read and write
16744192000
heap
page read and write
19A22329000
heap
page read and write
19A22374000
heap
page read and write
1674421D000
heap
page read and write
2920000
remote allocation
page read and write
231DE288000
heap
page read and write
1DDFF893000
heap
page read and write
1AE95150000
unclassified section
page readonly
16743A4A000
heap
page read and write
16743BC3000
heap
page read and write
16743B21000
heap
page read and write
1AA2645E000
heap
page read and write
16743B51000
heap
page read and write
DEBEEFC000
stack
page read and write
19A22340000
heap
page read and write
19A2237C000
heap
page read and write
19A2235A000
heap
page read and write
2B244577000
heap
page read and write
16743AC3000
heap
page read and write
19A228A3000
heap
page read and write
16744104000
heap
page read and write
2DEE000
heap
page read and write
11300FD000
stack
page read and write
16743B47000
heap
page read and write
DEBEBCF000
stack
page read and write
DEBF07E000
stack
page read and write
16744192000
heap
page read and write
16743BC0000
heap
page read and write
16743B9B000
heap
page read and write
16744192000
heap
page read and write
1DDFF89A000
heap
page read and write
231DE240000
heap
page read and write
19A22332000
heap
page read and write
1E550000
heap
page read and write
16743B8F000
heap
page read and write
16743B64000
heap
page read and write
16743B81000
heap
page read and write
19A2232C000
heap
page read and write
16743B41000
heap
page read and write
19A218A2000
heap
page read and write
16743AA7000
heap
page read and write
16743A51000
heap
page read and write
16744221000
heap
page read and write
1DDFEC2C000
heap
page read and write
6BBF4FE000
stack
page read and write
1DDFEC5B000
heap
page read and write
16743B1D000
heap
page read and write
19A21840000
heap
page read and write
2B244532000
heap
page read and write
16743B1D000
heap
page read and write
23895160000
trusted library allocation
page read and write
1AE952A2000
heap
page read and write
628000
heap
page read and write
2AF0000
remote allocation
page read and write
1AE952B9000
heap
page read and write
19A22395000
heap
page read and write
DEBF27B000
stack
page read and write
1DDFEC2A000
heap
page read and write
19A2237B000
heap
page read and write
19A2235C000
heap
page read and write
2B80000
unkown
page readonly
16743A50000
heap
page read and write
28284FD0000
remote allocation
page read and write
1DDFF71A000
heap
page read and write
1DF80000
trusted library allocation
page read and write
19A22356000
heap
page read and write
16743343000
heap
page read and write
1E7370BE000
heap
page read and write
19A2233B000
heap
page read and write
16743AAD000
heap
page read and write
19A2191A000
heap
page read and write
16743B67000
heap
page read and write
16743B50000
heap
page read and write
1AA26469000
heap
page read and write
1674424B000
heap
page read and write
19A218C6000
heap
page read and write
1AA26BF0000
trusted library allocation
page read and write
16743BE4000
heap
page read and write
167443D3000
heap
page read and write
A8F000
stack
page read and write
1AA26459000
heap
page read and write
16743362000
heap
page read and write
6BBF7FE000
stack
page read and write
1DDFF9E0000
heap
page read and write
16743B57000
heap
page read and write
112FE7F000
stack
page read and write
2FE0000
unkown
page readonly
1D0000
unclassified section
page readonly
1DDFF711000
heap
page read and write
1DDFF9F2000
heap
page read and write
1AA2644D000
heap
page read and write
1E7370B8000
heap
page read and write
16743B6D000
heap
page read and write
16743A74000
heap
page read and write
19A22378000
heap
page read and write
52B7F7D000
stack
page read and write
1DDFEBD6000
heap
page read and write
16743B88000
heap
page read and write
16743B2D000
heap
page read and write
19A22382000
heap
page read and write
16743B75000
heap
page read and write
1DDFF743000
heap
page read and write
1DDFF74F000
heap
page read and write
1AE952B9000
heap
page read and write
1E7BA000
direct allocation
page read and write
19A22395000
heap
page read and write
2FD0000
unkown
page readonly
16743B6D000
heap
page read and write
40A000
unkown
page read and write
1DDFF71F000
heap
page read and write
27E0000
remote allocation
page read and write
16743BD4000
heap
page read and write
1DDFF9EF000
heap
page read and write
16743A25000
heap
page read and write
16744131000
heap
page read and write
16743B85000
heap
page read and write
19A228A1000
heap
page read and write
1AE95200000
heap
page read and write
1674337F000
heap
page read and write
1DDFF73D000
heap
page read and write
19A22376000
heap
page read and write
1DDFF730000
heap
page read and write
16743AFD000
heap
page read and write
231DE256000
heap
page read and write
2DA0000
remote allocation
page read and write
1674412C000
heap
page read and write
167443D7000
heap
page read and write
16743B70000
heap
page read and write
2560000
unkown
page readonly
19A2237C000
heap
page read and write
2C20000
remote allocation
page read and write
1AA26494000
heap
page read and write
1DDFF89A000
heap
page read and write
1AA26485000
heap
page read and write
167443D3000
heap
page read and write
1DDFF747000
heap
page read and write
2AF0000
remote allocation
page read and write
19A2235C000
heap
page read and write
16744164000
heap
page read and write
2B243A40000
heap
page read and write
16744192000
heap
page read and write
1DDFF729000
heap
page read and write
19A2232C000
heap
page read and write
19A2237D000
heap
page read and write
16744154000
heap
page read and write
1DDFEBFC000
heap
page read and write
2389522A000
heap
page read and write
19A22361000
heap
page read and write
16744174000
heap
page read and write
408000
unkown
page readonly
16744117000
heap
page read and write
1674412C000
heap
page read and write
16743B85000
heap
page read and write
1AA26462000
heap
page read and write
19A21890000
heap
page read and write
19A22370000
heap
page read and write
19A2235A000
heap
page read and write
16743B49000
heap
page read and write
16743B38000
heap
page read and write
2740000
unkown
page readonly
544E1FF000
stack
page read and write
435000
unkown
page read and write
2FD0000
unkown
page readonly
2B243920000
heap
page read and write
16743B51000
heap
page read and write
16743B31000
heap
page read and write
2AC0000
remote allocation
page read and write
1DDFF725000
heap
page read and write
167432E6000
heap
page read and write
16743B45000
heap
page read and write
16743B62000
heap
page read and write
1DDFF732000
heap
page read and write
1DDFF757000
heap
page read and write
1AA26451000
heap
page read and write
1DDFEC0C000
heap
page read and write
1DDFF740000
heap
page read and write
9024FE000
stack
page read and write
1AA262E0000
heap
page read and write
16743BBA000
heap
page read and write
250000
unkown
page readonly
167432E6000
heap
page read and write
16743B62000
heap
page read and write
16744102000
heap
page read and write
167432FA000
heap
page read and write
2C90000
unkown
page read and write
28283450000
heap
page read and write
1AE9526B000
heap
page read and write
1AE95231000
heap
page read and write
16743AC3000
heap
page read and write
16743B5B000
heap
page read and write
16743B4C000
heap
page read and write
16743AD5000
heap
page read and write
1DDFEB10000
heap
page read and write
16743B4E000
heap
page read and write
2C00000
unkown
page readonly
2B24458F000
heap
page read and write
2B244595000
heap
page read and write
2B243AA4000
heap
page read and write
1DDFEC06000
heap
page read and write
19A22395000
heap
page read and write
1DDFF706000
heap
page read and write
16743B3D000
heap
page read and write
1E737078000
heap
page read and write
2BD0000
unkown
page readonly
16743AD4000
heap
page read and write
16743AFD000
heap
page read and write
3640000
trusted library allocation
page read and write
1E7370BF000
heap
page read and write
1674415B000
heap
page read and write
16743BA4000
heap
page read and write
23895296000
heap
page read and write
23895252000
heap
page read and write
27BB000
stack
page read and write
16743B22000
heap
page read and write
16743AA6000
heap
page read and write
2CFF000
stack
page read and write
2D60000
trusted library allocation
page readonly
1E73709A000
heap
page read and write
1674410F000
heap
page read and write
1674416B000
heap
page read and write
19A2232F000
heap
page read and write
16743A6A000
heap
page read and write
16743A51000
heap
page read and write
19A22812000
heap
page read and write
112FDFB000
stack
page read and write
16743A7F000
heap
page read and write
16743B93000
heap
page read and write
1DDFF895000
heap
page read and write
19A2232E000
heap
page read and write
16744154000
heap
page read and write
16743A99000
heap
page read and write
52B7DFD000
stack
page read and write
16743AD4000
heap
page read and write
16743AFD000
heap
page read and write
16744120000
heap
page read and write
19A2232F000
heap
page read and write
16744192000
heap
page read and write
46E000
unkown
page readonly
1DDFF74B000
heap
page read and write
23895202000
heap
page read and write
19A2235C000
heap
page read and write
19A2193C000
heap
page read and write
1E7370C1000
heap
page read and write
16744114000
heap
page read and write
1DDFF732000
heap
page read and write
19A22376000
heap
page read and write
19A2191A000
heap
page read and write
16743BDC000
heap
page read and write
19A2191B000
heap
page read and write
1E6A0000
remote allocation
page read and write
1AE95110000
heap
page read and write
16743A44000
heap
page read and write
C1FD37F000
stack
page read and write
29C40E13000
heap
page read and write
29C40E4A000
heap
page read and write
1E7370B8000
heap
page read and write
19A218D4000
heap
page read and write
1F5000
heap
page read and write
48C44FF000
stack
page read and write
19A2191B000
heap
page read and write
25D0000
unkown
page read and write
16743B31000
heap
page read and write
16743B51000
heap
page read and write
16743B74000
heap
page read and write
25C0000
unkown
page readonly
231DE252000
heap
page read and write
1DDFF731000
heap
page read and write
16743B56000
heap
page read and write
2B243A7B000
heap
page read and write
1E737095000
heap
page read and write
16743B62000
heap
page read and write
1DDFEBC4000
heap
page read and write
16743B93000
heap
page read and write
4849000
trusted library allocation
page read and write
16743B60000
heap
page read and write
29C40E7C000
heap
page read and write
19A22393000
heap
page read and write
2B90000
unkown
page read and write
1DDFF709000
heap
page read and write
1AA26441000
heap
page read and write
2550000
unkown
page readonly
23894FF0000
heap
page read and write
2820000
remote allocation
page read and write
19A2237C000
heap
page read and write
19A2193B000
heap
page read and write
16743B87000
heap
page read and write
16743BD4000
heap
page read and write
1AE952BE000
heap
page read and write
DEBF17E000
stack
page read and write
19A2193B000
heap
page read and write
16743A6C000
heap
page read and write
C1FD2FF000
stack
page read and write
167443D3000
heap
page read and write
16743070000
heap
page read and write
260000
unkown
page readonly
19A2232C000
heap
page read and write
1AE9527F000
heap
page read and write
2DD7000
heap
page read and write
1AA26471000
heap
page read and write
19A2237E000
heap
page read and write
28283717000
heap
page read and write
16743AD9000
heap
page read and write
16743B31000
heap
page read and write
16743B43000
heap
page read and write
16743AFD000
heap
page read and write
2560000
unkown
page readonly
23E0000
heap
page read and write
16743B64000
heap
page read and write
29C40E93000
heap
page read and write
16743343000
heap
page read and write
16743ABD000
heap
page read and write
16743B70000
heap
page read and write
16744192000
heap
page read and write
2F41000
heap
page read and write
1DDFEBA0000
heap
page read and write
1DDFEC24000
heap
page read and write
2FD0000
unkown
page readonly
2B243AF7000
heap
page read and write
1AA26E02000
trusted library allocation
page read and write
16743B4C000
heap
page read and write
2B244536000
heap
page read and write
19A22350000
heap
page read and write
2B243B13000
heap
page read and write
2820000
remote allocation
page read and write
16743362000
heap
page read and write
1DDFF70E000
heap
page read and write
2B243A00000
heap
page read and write
19A2232F000
heap
page read and write
16743B7A000
heap
page read and write
29C40E6E000
heap
page read and write
19A22070000
trusted library allocation
page read and write
16743BC0000
heap
page read and write
1674420B000
heap
page read and write
167443EF000
heap
page read and write
970A37E000
unkown
page read and write
CD5C3AB000
stack
page read and write
16743A27000
heap
page read and write
19A2232B000
heap
page read and write
19A2237E000
heap
page read and write
2BD0000
remote allocation
page read and write
1674337C000
heap
page read and write
16743AFC000
heap
page read and write
28283695000
heap
page read and write
231DE279000
heap
page read and write
28283613000
heap
page read and write
16743BBA000
heap
page read and write
29C40E87000
heap
page read and write
16743AD9000
heap
page read and write
231DE230000
heap
page read and write
1DDFEDCB000
heap
page read and write
16743B83000
heap
page read and write
1AE952C3000
heap
page read and write
16743B9B000
heap
page read and write
19A218A1000
heap
page read and write
2D70000
heap
page read and write
19A218A3000
heap
page read and write
1DDFF731000
heap
page read and write
16743B7A000
heap
page read and write
10020000
trusted library allocation
page read and write
29C40EB5000
heap
page read and write
2DFC000
heap
page read and write
16743B51000
heap
page read and write
1DDFF6FB000
heap
page read and write
2570000
unkown
page read and write
2BE0000
unkown
page readonly
16743B51000
heap
page read and write
16743B73000
heap
page read and write
2B70000
unkown
page readonly
16743AB1000
heap
page read and write
16743362000
heap
page read and write
16743BA8000
heap
page read and write
19A21896000
heap
page read and write
1AE952A7000
heap
page read and write
277C000
stack
page read and write
19A2237C000
heap
page read and write
16743B5A000
heap
page read and write
19A22383000
heap
page read and write
28284FD0000
remote allocation
page read and write
16743AAA000
heap
page read and write
231DE283000
heap
page read and write
16743BE3000
heap
page read and write
270000
unkown
page read and write
282835C0000
trusted library allocation
page read and write
1E73709E000
heap
page read and write
19A22362000
heap
page read and write
1E73703B000
heap
page read and write
16744192000
heap
page read and write
A86175C000
stack
page read and write
19A2237C000
heap
page read and write
1DDFF897000
heap
page read and write
1E7370B8000
heap
page read and write
2FF0000
unkown
page read and write
16744174000
heap
page read and write
16743B52000
heap
page read and write
16743AD9000
heap
page read and write
231DE22B000
heap
page read and write
19A22898000
heap
page read and write
19A21902000
heap
page read and write
16744122000
heap
page read and write
28283570000
heap
page read and write
16743B48000
heap
page read and write
1E7370B5000
heap
page read and write
1E737040000
heap
page read and write
C1FD07B000
stack
page read and write
DEBF37D000
stack
page read and write
3080000
unkown
page read and write
16744105000
heap
page read and write
19A2283E000
heap
page read and write
1E7370C1000
heap
page read and write
1AA26452000
heap
page read and write
1DDFEC0D000
heap
page read and write
19A22376000
heap
page read and write
19A218CD000
heap
page read and write
16744164000
heap
page read and write
1E7370BD000
heap
page read and write
16743B1D000
heap
page read and write
2B80000
unkown
page readonly
16743A3E000
heap
page read and write
1E7370BE000
heap
page read and write
16743A8A000
heap
page read and write
2B243AA0000
heap
page read and write
16744154000
heap
page read and write
2B2439D0000
unclassified section
page readonly
16743A74000
heap
page read and write
16744153000
heap
page read and write
1E737113000
heap
page read and write
16743B82000
heap
page read and write
19A2193B000
heap
page read and write
2820000
remote allocation
page read and write
16743A88000
heap
page read and write
1AA2646F000
heap
page read and write
16743B31000
heap
page read and write
28285002000
trusted library allocation
page read and write
2BF0000
unkown
page read and write
1DDFF75F000
heap
page read and write
27E0000
remote allocation
page read and write
19A227A0000
remote allocation
page read and write
1DDFF729000
heap
page read and write
1674416B000
heap
page read and write
1DDFF89E000
heap
page read and write
19A22361000
heap
page read and write
19A22381000
heap
page read and write
16743A51000
heap
page read and write
1AE9527D000
heap
page read and write
2F40000
heap
page read and write
19A2235E000
heap
page read and write
2DF0000
unkown
page readonly
16743BD4000
heap
page read and write
167432FA000
heap
page read and write
19A22380000
heap
page read and write
16743B1D000
heap
page read and write
2920000
remote allocation
page read and write
10005000
unkown
page readonly
16743BD6000
heap
page read and write
1674416A000
heap
page read and write
297D000
trusted library allocation
page read and write
1E7370B8000
heap
page read and write
1E37F000
stack
page read and write
16743386000
heap
page read and write
1DFA0000
trusted library allocation
page read and write
16743BBC000
heap
page read and write
1AA26600000
heap
page read and write
1674411B000
heap
page read and write
2C20000
remote allocation
page read and write
25B0000
unkown
page readonly
19A2232F000
heap
page read and write
2E4C000
heap
page read and write
42B000
unkown
page read and write
19A2236E000
heap
page read and write
231DE213000
heap
page read and write
16743B84000
heap
page read and write
16743A7F000
heap
page read and write
16743BA2000
heap
page read and write
16743B6D000
heap
page read and write
260000
unkown
page readonly
27E0000
remote allocation
page read and write
2B243990000
heap
page read and write
16744123000
heap
page read and write
19A22374000
heap
page read and write
16743384000
heap
page read and write
16743B9A000
heap
page read and write
19A21790000
unclassified section
page readonly
16743390000
heap
page read and write
2C20000
remote allocation
page read and write
16743B9A000
heap
page read and write
2750000
unkown
page read and write
16743AC3000
heap
page read and write
231DE0A0000
heap
page read and write
544DDFC000
stack
page read and write
16743BFD000
heap
page read and write
29C40E00000
heap
page read and write
1AE952AA000
heap
page read and write
19A2232C000
heap
page read and write
19A22300000
heap
page read and write
16743384000
heap
page read and write
1674411B000
heap
page read and write
1AE95C15000
heap
page read and write
1AA2646A000
heap
page read and write
1DDFFA02000
heap
page read and write
16743B62000
heap
page read and write
19A2187A000
heap
page read and write
2260000
heap
page read and write
2FE0000
unkown
page readonly
16743BC3000
heap
page read and write
112FCFE000
stack
page read and write
16743ADC000
heap
page read and write
19A2235A000
heap
page read and write
1674412A000
heap
page read and write
1E7AD000
stack
page read and write
9028FE000
stack
page read and write
167432E5000
heap
page read and write
2E0A000
heap
page read and write
16743343000
heap
page read and write
1DDFF9E7000
heap
page read and write
28283627000
heap
page read and write
16743B36000
heap
page read and write
1AE95257000
heap
page read and write
19A22392000
heap
page read and write
2B243CD0000
heap
page read and write
1AE95313000
heap
page read and write
29C40E3A000
heap
page read and write
970A27C000
stack
page read and write
1DDFEBE6000
heap
page read and write
16743B51000
heap
page read and write
625000
heap
page read and write
1674410F000
heap
page read and write
28283652000
heap
page read and write
19A228A3000
heap
page read and write
2AC0000
remote allocation
page read and write
16743B1D000
heap
page read and write
16743BDC000
heap
page read and write
1674411B000
heap
page read and write
29C40BE0000
heap
page read and write
19A22834000
heap
page read and write
6BBF8FE000
stack
page read and write
16743AD9000
heap
page read and write
16743BBA000
heap
page read and write
23894F80000
heap
page read and write
2E60000
remote allocation
page read and write
6BBF1AE000
stack
page read and write
19A22337000
heap
page read and write
2C10000
unkown
page read and write
16743B9B000
heap
page read and write
1DDFEC97000
heap
page read and write
2828362A000
heap
page read and write
16743B1D000
heap
page read and write
23895292000
heap
page read and write
C1FD27C000
unkown
page read and write
16743B9A000
heap
page read and write
1DDFEC0C000
heap
page read and write
16743230000
trusted library allocation
page read and write
16743B51000
heap
page read and write
16744192000
heap
page read and write
19A22360000
heap
page read and write
16743BA4000
heap
page read and write
28284FD0000
remote allocation
page read and write
16743A6C000
heap
page read and write
2DE5000
heap
page read and write
19A21852000
heap
page read and write
16743AD4000
heap
page read and write
1AE9527E000
heap
page read and write
16743AFC000
heap
page read and write
19A218FA000
heap
page read and write
19A22395000
heap
page read and write
48C45FF000
stack
page read and write
19A22392000
heap
page read and write
19A2232E000
heap
page read and write
1DDFF70E000
heap
page read and write
19A218B2000
heap
page read and write
5BE000
stack
page read and write
16743A74000
heap
page read and write
167431A0000
heap
page read and write
2DFC000
heap
page read and write
2B243A24000
heap
page read and write
1E6A0000
remote allocation
page read and write
29C40EA8000
heap
page read and write
2B243A86000
heap
page read and write
1DDFF890000
heap
page read and write
231DE28C000
heap
page read and write
16743B53000
heap
page read and write
1DDFECA0000
heap
page read and write
1E737100000
heap
page read and write
16743B34000
heap
page read and write
1AA26460000
heap
page read and write
52B7E7F000
stack
page read and write
19A22815000
heap
page read and write
1E7370BD000
heap
page read and write
112FFFF000
stack
page read and write
231DE286000
heap
page read and write
19A22378000
heap
page read and write
16743B1D000
heap
page read and write
16743B86000
heap
page read and write
16743B84000
heap
page read and write
16743AFD000
heap
page read and write
1E7370AF000
heap
page read and write
19A2237E000
heap
page read and write
2BE0000
unkown
page readonly
16743A6D000
heap
page read and write
167432DC000
heap
page read and write
16743297000
heap
page read and write
1DDFF6EB000
heap
page read and write
16744164000
heap
page read and write
19A22376000
heap
page read and write
1AE95292000
heap
page read and write
19A2237B000
heap
page read and write
231DEA02000
trusted library allocation
page read and write
19A22376000
heap
page read and write
1E7370BB000
heap
page read and write
1DDFF6F8000
heap
page read and write
16743A92000
heap
page read and write
1AE95281000
heap
page read and write
2B90000
unkown
page read and write
2730000
unkown
page readonly
32B0000
trusted library allocation
page read and write
16743A8F000
heap
page read and write
1DDFEC3A000
heap
page read and write
2E60000
remote allocation
page read and write
16744106000
heap
page read and write
1674347D000
heap
page read and write
16743B81000
heap
page read and write
1674411B000
heap
page read and write
2DFC000
heap
page read and write
2E0A000
heap
page read and write
16743BB5000
heap
page read and write
19A2236B000
heap
page read and write
16743B1D000
heap
page read and write
16744191000
heap
page read and write
2B20000
remote allocation
page read and write
19A22891000
heap
page read and write
16743B43000
heap
page read and write
1AE95264000
heap
page read and write
19A22395000
heap
page read and write
25D0000
unkown
page read and write
16743B8D000
heap
page read and write
2BF0000
unkown
page read and write
2730000
unkown
page readonly
16743B43000
heap
page read and write
1674420A000
heap
page read and write
52B767B000
stack
page read and write
4F0000
heap
page read and write
16743B28000
heap
page read and write
16743B1D000
heap
page read and write
27F0000
unclassified section
page readonly
16744168000
heap
page read and write
2B243AFB000
heap
page read and write
1DDFEBBF000
heap
page read and write
16743AD9000
heap
page read and write
1E3FE000
stack
page read and write
16743A41000
heap
page read and write
4F5000
heap
page read and write
19A2237C000
heap
page read and write
29C40E7D000
heap
page read and write
112FC7E000
stack
page read and write
16743B93000
heap
page read and write
16743B88000
heap
page read and write
19A2237E000
heap
page read and write
19A2237E000
heap
page read and write
1AA2645C000
heap
page read and write
19A22332000
heap
page read and write
1AE952A0000
heap
page read and write
16743470000
heap
page read and write
19A22393000
heap
page read and write
19A227A0000
remote allocation
page read and write
2C00000
unkown
page readonly
16743A26000
heap
page read and write
19A21890000
heap
page read and write
16743AAA000
heap
page read and write
16743BB0000
heap
page read and write
231DE9B0000
trusted library allocation
page read and write
1674410B000
heap
page read and write
1674415B000
heap
page read and write
16744122000
heap
page read and write
1DDFEBE7000
heap
page read and write
19A21813000
heap
page read and write
CD5C77C000
stack
page read and write
19A22392000
heap
page read and write
90247B000
stack
page read and write
2C3E000
stack
page read and write
16744106000
heap
page read and write
1E736D70000
heap
page read and write
16743A2C000
heap
page read and write
1DDFF730000
heap
page read and write
16743BE4000
heap
page read and write
2C90000
unkown
page read and write
19A2237C000
heap
page read and write
19A2191B000
heap
page read and write
1DDFF89A000
heap
page read and write
16743B4C000
heap
page read and write
23E4000
heap
page read and write
1AA26464000
heap
page read and write
1E7370BC000
heap
page read and write
16743A51000
heap
page read and write
544DFFB000
stack
page read and write
16743B42000
heap
page read and write
16743A67000
heap
page read and write
19A22395000
heap
page read and write
48C457E000
stack
page read and write
2710000
heap
page read and write
19A22386000
heap
page read and write
16743A74000
heap
page read and write
28283700000
heap
page read and write
1E7370BF000
heap
page read and write
16743B34000
heap
page read and write
1AA26400000
heap
page read and write
2B244589000
heap
page read and write
16744131000
heap
page read and write
1DDFF9E8000
heap
page read and write
3040000
remote allocation
page read and write
19A22392000
heap
page read and write
167432FA000
heap
page read and write
1AA2644F000
heap
page read and write
400000
unkown
page readonly
544D6FB000
stack
page read and write
16743B58000
heap
page read and write
1674337C000
heap
page read and write
29C40E87000
heap
page read and write
6BBF47E000
stack
page read and write
2740000
unkown
page readonly
16743B3A000
heap
page read and write
167443A4000
heap
page read and write
2E01000
heap
page read and write
16743479000
heap
page read and write
19A22378000
heap
page read and write
1AE9528A000
heap
page read and write
16743B44000
heap
page read and write
16744192000
heap
page read and write
1DDFEC97000
heap
page read and write
1E7370BD000
heap
page read and write
16743AD5000
heap
page read and write
2B243A9D000
heap
page read and write
2DF0000
unkown
page readonly
282836A1000
heap
page read and write
19A22329000
heap
page read and write
2DF5000
heap
page read and write
2B244588000
heap
page read and write
167432E5000
heap
page read and write
19A2287B000
heap
page read and write
16743B79000
heap
page read and write
16743B51000
heap
page read and write
19A2236C000
heap
page read and write
1DDFF9FB000
heap
page read and write
19A21896000
heap
page read and write
1E7370AC000
heap
page read and write
401000
unkown
page execute read
C1FD17E000
stack
page read and write
2E49000
heap
page read and write
401000
unkown
page execute read
2B243A51000
heap
page read and write
19A22329000
heap
page read and write
16743B4A000
heap
page read and write
28283560000
unclassified section
page readonly
19A22329000
heap
page read and write
19A22370000
heap
page read and write
23895200000
heap
page read and write
1E76C000
stack
page read and write
16744124000
heap
page read and write
16743B91000
heap
page read and write
16743BBC000
heap
page read and write
16743A92000
heap
page read and write
16743300000
heap
page read and write
1AA2645A000
heap
page read and write
2DF0000
unkown
page readonly
1674411B000
heap
page read and write
1E737092000
heap
page read and write
1DDFF71B000
heap
page read and write
46E000
unkown
page readonly
16743475000
heap
page read and write
29C40E40000
heap
page read and write
1674410B000
heap
page read and write
2920000
remote allocation
page read and write
52B79FD000
stack
page read and write
16743B93000
heap
page read and write
29F0000
unkown
page readonly
1DDFF735000
heap
page read and write
1AE952BE000
heap
page read and write
16743B83000
heap
page read and write
16744192000
heap
page read and write
16743300000
heap
page read and write
16743BC3000
heap
page read and write
19A22395000
heap
page read and write
19A22370000
heap
page read and write
250000
unkown
page readonly
16743AD5000
heap
page read and write
16743B43000
heap
page read and write
19A22378000
heap
page read and write
16743362000
heap
page read and write
19A2236E000
heap
page read and write
2D78000
heap
page read and write
1DDFF897000
heap
page read and write
29C40E77000
heap
page read and write
16743BA4000
heap
page read and write
1DDFFA01000
heap
page read and write
16743BE1000
heap
page read and write
16743384000
heap
page read and write
2B24458D000
heap
page read and write
16743AC3000
heap
page read and write
16743B45000
heap
page read and write
2389528E000
heap
page read and write
16743B38000
heap
page read and write
2C7E000
stack
page read and write
1E7370B9000
heap
page read and write
16744131000
heap
page read and write
16743A2C000
heap
page read and write
16743BD7000
heap
page read and write
16743B3A000
heap
page read and write
16743BB9000
heap
page read and write
16743B51000
heap
page read and write
1AA26470000
heap
page read and write
16743B88000
heap
page read and write
16743B42000
heap
page read and write
16743B64000
heap
page read and write
540000
trusted library allocation
page read and write
16743AD9000
heap
page read and write
16743BE4000
heap
page read and write
16743B31000
heap
page read and write
1AA26457000
heap
page read and write
19A2237B000
heap
page read and write
25C0000
unkown
page readonly
1DDFF6C5000
heap
page read and write
16744122000
heap
page read and write
28284FA0000
trusted library allocation
page read and write
28283640000
heap
page read and write
19A22202000
heap
page read and write
19A22329000
heap
page read and write
167443D3000
heap
page read and write
19A22891000
heap
page read and write
2CBE000
stack
page read and write
1DDFFAE0000
heap
page read and write
16743300000
heap
page read and write
CD5C87F000
stack
page read and write
231DE040000
heap
page read and write
16743AB2000
heap
page read and write
1AE95C00000
heap
page read and write
16743343000
heap
page read and write
1DDFE9F0000
heap
page read and write
1DDFEBD7000
heap
page read and write
1DDFEC31000
heap
page read and write
1AE951B0000
trusted library allocation
page read and write
16743B91000
heap
page read and write
19A22376000
heap
page read and write
16743B9A000
heap
page read and write
19A2235A000
heap
page read and write
19A22378000
heap
page read and write
19A21893000
heap
page read and write
2B243AF4000
heap
page read and write
28283676000
heap
page read and write
2DBD000
heap
page read and write
16743B5C000
heap
page read and write
16743A8A000
heap
page read and write
2FF0000
unkown
page read and write
19A22374000
heap
page read and write
16744154000
heap
page read and write
1DDFF736000
heap
page read and write
2B2442A0000
trusted library allocation
page read and write
1DDFEBFC000
heap
page read and write
19A2191A000
heap
page read and write
1674415A000
heap
page read and write
19A2182A000
heap
page read and write
16743BC3000
heap
page read and write
1DDFF6E7000
heap
page read and write
19A22378000
heap
page read and write
19A2230E000
heap
page read and write
19A2230E000
heap
page read and write
4CE000
stack
page read and write
1AA26437000
heap
page read and write
1E7370CD000
heap
page read and write
2B243B02000
heap
page read and write
19A22329000
heap
page read and write
16743BD4000
heap
page read and write
167443D5000
heap
page read and write
19A22361000
heap
page read and write
1E7370B9000
heap
page read and write
2B244402000
heap
page read and write
16743AD1000
heap
page read and write
1E7B0000
direct allocation
page read and write
19A2193C000
heap
page read and write
16743B1D000
heap
page read and write
1E737082000
heap
page read and write
19A228A5000
heap
page read and write
167432DF000
heap
page read and write
16743388000
heap
page read and write
1DDFEDC0000
heap
page read and write
1AE95160000
heap
page read and write
19A22386000
heap
page read and write
167443AC000
heap
page read and write
1E5FE000
stack
page read and write
16743B67000
heap
page read and write
260000
unkown
page readonly
16743B85000
heap
page read and write
19A2193B000
heap
page read and write
19A2230E000
heap
page read and write
19A22313000
heap
page read and write
23895213000
heap
page read and write
16743AFC000
heap
page read and write
16743B31000
heap
page read and write
2820000
remote allocation
page read and write
16743B28000
heap
page read and write
2C10000
unkown
page read and write
1DDFEC3A000
heap
page read and write
16743343000
heap
page read and write
DEBEFFE000
stack
page read and write
167441AA000
heap
page read and write
1674412A000
heap
page read and write
CD5C2AC000
stack
page read and write
16743B3F000
heap
page read and write
970A5FE000
stack
page read and write
16743A51000
heap
page read and write
167443D3000
heap
page read and write
53E000
stack
page read and write
1AA26427000
heap
page read and write
19A2230E000
heap
page read and write
1AE95279000
heap
page read and write
1E53F000
stack
page read and write
16744192000
heap
page read and write
1DDFF71F000
heap
page read and write
1AA263F0000
unclassified section
page readonly
16743AB2000
heap
page read and write
19A22378000
heap
page read and write
16743BBC000
heap
page read and write
1DDFF74C000
heap
page read and write
19A22383000
heap
page read and write
1674416B000
heap
page read and write
1674421D000
heap
page read and write
16743B7B000
heap
page read and write
19A2193C000
heap
page read and write
19A22215000
heap
page read and write
16743B35000
heap
page read and write
1E7370B0000
heap
page read and write
2DDF000
heap
page read and write
1AA26466000
heap
page read and write
1674420B000
heap
page read and write
970AC7E000
stack
page read and write
1DDFEC31000
heap
page read and write
16743362000
heap
page read and write
19A2232C000
heap
page read and write
19A22381000
heap
page read and write
19A22395000
heap
page read and write
29C40E26000
heap
page read and write
1674338E000
heap
page read and write
270000
unkown
page read and write
16744150000
heap
page read and write
19A22885000
heap
page read and write
113007E000
stack
page read and write
16743AD4000
heap
page read and write
29C40E7D000
heap
page read and write
1AA26455000
heap
page read and write
29F0000
unkown
page readonly
2DF5000
heap
page read and write
2AF0000
remote allocation
page read and write
19A2235A000
heap
page read and write
9027FB000
stack
page read and write
2820000
remote allocation
page read and write
19A2289A000
heap
page read and write
19A22392000
heap
page read and write
29C40E95000
heap
page read and write
1674412C000
heap
page read and write
16743B5B000
heap
page read and write
1E7370B8000
heap
page read and write
16743BFC000
heap
page read and write
16743A92000
heap
page read and write
1AE9522B000
heap
page read and write
16743B51000
heap
page read and write
1DDFF747000
heap
page read and write
286F000
stack
page read and write
2B243A8F000
heap
page read and write
19A2230E000
heap
page read and write
2B90000
unkown
page read and write
1AA26496000
heap
page read and write
16744131000
heap
page read and write
19A22370000
heap
page read and write
1AA26413000
heap
page read and write
19A22392000
heap
page read and write
16743A25000
heap
page read and write
There are 1641 hidden memdumps, click here to show them.