IOC Report
Pilne zamowienie nr5363582 UTECH Maszyny i Urzadzenia Techniczne Jaroslaw Koenig sp. k..exe

loading gif

Files

File Path
Type
Category
Malicious
Pilne zamowienie nr5363582 UTECH Maszyny i Urzadzenia Techniczne Jaroslaw Koenig sp. k..exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\nsgFEE3.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsgFEE3.tmp\nsExec.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\Pacifisterne\Automatcafeer\Nedrustningspolitikken\Dilemmaers146\Glasgaibleanir\Nodebilledet\Microsoft.Practices.Composite.UnityExtensions.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\Pacifisterne\Automatcafeer\Nedrustningspolitikken\Dilemmaers146\Glasgaibleanir\Nodebilledet\Reinspired.Aut
ASCII text, with very long lines (50244), with no line terminators
dropped
C:\Users\user\Pacifisterne\Automatcafeer\Seacross.Him
data
dropped
C:\Users\user\Pacifisterne\Automatcafeer\Syntaksgenkendelsernes\Temposkifterne\default.css
Unicode text, UTF-8 text
dropped
C:\Users\user\Pacifisterne\Automatcafeer\Syntaksgenkendelsernes\Temposkifterne\network-cellular-signal-none-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\Pacifisterne\Automatcafeer\Tubulating\application-x-executable.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Pilne zamowienie nr5363582 UTECH Maszyny i Urzadzenia Techniczne Jaroslaw Koenig sp. k..exe
C:\Users\user\Desktop\Pilne zamowienie nr5363582 UTECH Maszyny i Urzadzenia Techniczne Jaroslaw Koenig sp. k..exe
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x0E^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x19^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x05^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x0E^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x07^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x78^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x79^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x71^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x71^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x08^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x39^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x2E^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x2A^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x3F^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x2E^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x0D^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x22^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x27^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x2E^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x0A^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x63^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x26^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x6B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x39^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7F^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x6B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x67^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x6B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x22^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x6B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x33^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x73^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x67^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x6B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x22^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x6B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x67^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x6B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x3B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x6B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x67^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x6B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x22^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x6B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7F^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x67^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x6B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x22^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x6B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x33^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x73^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x67^75"
malicious
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 119 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://creativecommons.org/licenses/by-sa/4.0/
unknown
http://nsis.sf.net/NSIS_Error
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://mozilla.org/MPL/2.0/.
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Territorialkravets
Tantaliferous

Memdumps

Base Address
Regiontype
Protect
Malicious
613000
heap
page read and write
malicious
23F53494000
heap
page read and write
24CC8B13000
heap
page read and write
1AC43CB000
stack
page read and write
23F544D3000
heap
page read and write
1194A084000
heap
page read and write
409000
unkown
page write copy
23F53D7E000
heap
page read and write
23F53D71000
heap
page read and write
23F5349E000
heap
page read and write
F9FD67E000
stack
page read and write
23F53D86000
heap
page read and write
21FF1402000
heap
page read and write
23F53D78000
heap
page read and write
23F53D60000
heap
page read and write
23F53D84000
heap
page read and write
F86867E000
stack
page read and write
23F53D57000
heap
page read and write
21FF136F000
heap
page read and write
23F544CF000
heap
page read and write
23F53D5C000
heap
page read and write
23F53D60000
heap
page read and write
23F53429000
heap
page read and write
23F53D4B000
heap
page read and write
23F53D82000
heap
page read and write
23F53D74000
heap
page read and write
2898000
heap
page read and write
23F53D6B000
heap
page read and write
23F53D5C000
heap
page read and write
23F53D5E000
heap
page read and write
6B18000
direct allocation
page execute and read and write
23F53D8A000
heap
page read and write
22345013000
heap
page read and write
23F53D82000
heap
page read and write
308E9FC000
stack
page read and write
23F53D7B000
heap
page read and write
23F54502000
heap
page read and write
1AC46FE000
stack
page read and write
133D967E000
heap
page read and write
23F53498000
heap
page read and write
24CC8B00000
heap
page read and write
23F53D74000
heap
page read and write
23F53D77000
heap
page read and write
376D000
stack
page read and write
1194A05E000
heap
page read and write
625000
heap
page read and write
B071B7E000
stack
page read and write
23F54469000
heap
page read and write
A01587B000
stack
page read and write
19272C60000
heap
page read and write
23F54602000
heap
page read and write
23F53D7E000
heap
page read and write
2383C630000
heap
page read and write
133D968D000
heap
page read and write
23F53D86000
heap
page read and write
23F544EC000
heap
page read and write
2383C83E000
heap
page read and write
19272E40000
heap
page read and write
23F544D3000
heap
page read and write
22344F60000
trusted library allocation
page read and write
B07157E000
stack
page read and write
23F534B7000
heap
page read and write
23F53D29000
heap
page read and write
23F53D86000
heap
page read and write
23F5354E000
heap
page read and write
23F53D5C000
heap
page read and write
A0153FF000
stack
page read and write
23F53B50000
remote allocation
page read and write
23F53D5A000
heap
page read and write
24CC8A65000
heap
page read and write
F867C7F000
stack
page read and write
23F53D86000
heap
page read and write
24CC8A13000
heap
page read and write
23F53D79000
heap
page read and write
23F53D5C000
heap
page read and write
23F54515000
heap
page read and write
2891000
heap
page read and write
23F544C2000
heap
page read and write
23F53D5C000
heap
page read and write
23F53B70000
remote allocation
page read and write
23F53DA5000
heap
page read and write
23F53D5E000
heap
page read and write
A01577B000
stack
page read and write
23F54453000
heap
page read and write
23F54535000
heap
page read and write
133D963C000
heap
page read and write
1194A02D000
heap
page read and write
23F544DE000
heap
page read and write
9382AFB000
stack
page read and write
23F53D5C000
heap
page read and write
5FD000
heap
page read and write
23F544A9000
heap
page read and write
23F53D6A000
heap
page read and write
23F5445C000
heap
page read and write
133D9570000
heap
page read and write
24EFE652000
heap
page read and write
133D9629000
heap
page read and write
2383CDC0000
remote allocation
page read and write
21FF0A43000
heap
page read and write
281069C0000
trusted library allocation
page read and write
23F544EB000
heap
page read and write
23F544D3000
heap
page read and write
23F53D5C000
heap
page read and write
23F54502000
heap
page read and write
23F53DA2000
heap
page read and write
27E62502000
heap
page read and write
23F53D76000
heap
page read and write
19273602000
trusted library allocation
page read and write
1194A047000
heap
page read and write
19272E68000
heap
page read and write
F9FDAFD000
stack
page read and write
23F53D13000
heap
page read and write
24EFE718000
heap
page read and write
23F53D60000
heap
page read and write
1194A05E000
heap
page read and write
23F53D85000
heap
page read and write
23F53D5F000
heap
page read and write
28106A77000
heap
page read and write
22B0000
heap
page read and write
194E2D13000
heap
page read and write
23F53D0E000
heap
page read and write
F86857D000
stack
page read and write
429000
unkown
page read and write
24F00200000
trusted library allocation
page read and write
23F544A3000
heap
page read and write
28106A5F000
heap
page read and write
23F53D82000
heap
page read and write
23F53D0E000
heap
page read and write
23F54411000
heap
page read and write
24EFE5A0000
trusted library allocation
page read and write
23F53D6D000
heap
page read and write
6118000
direct allocation
page execute and read and write
23F544DE000
heap
page read and write
421000
unkown
page read and write
23F53DA3000
heap
page read and write
19272E79000
heap
page read and write
23F53D79000
heap
page read and write
23F544B0000
heap
page read and write
1194A045000
heap
page read and write
23F53D66000
heap
page read and write
23F53D80000
heap
page read and write
133D9500000
heap
page read and write
23F53D5C000
heap
page read and write
23F5352C000
heap
page read and write
23F53D76000
heap
page read and write
23F53D75000
heap
page read and write
23F544E3000
heap
page read and write
8A6327C000
stack
page read and write
23F53D74000
heap
page read and write
23F53D8A000
heap
page read and write
23F53D82000
heap
page read and write
B070DAB000
stack
page read and write
23F544B8000
heap
page read and write
24EFE63E000
heap
page read and write
194E2C41000
heap
page read and write
23F54488000
heap
page read and write
23F54512000
heap
page read and write
28106A82000
heap
page read and write
23F53D68000
heap
page read and write
B0977E000
stack
page read and write
23F53D52000
heap
page read and write
F867BFB000
stack
page read and write
23F53D5C000
heap
page read and write
23F53D74000
heap
page read and write
23F53D61000
heap
page read and write
3190000
heap
page read and write
23F544AE000
heap
page read and write
22FE000
stack
page read and write
B07167D000
stack
page read and write
28106A77000
heap
page read and write
21FF1413000
heap
page read and write
B07197F000
stack
page read and write
23F53D72000
heap
page read and write
28106A5A000
heap
page read and write
23F53D58000
heap
page read and write
23F53D5C000
heap
page read and write
23F53D5C000
heap
page read and write
21FF0A13000
heap
page read and write
24CC8A3C000
heap
page read and write
23F544B6000
heap
page read and write
23F53502000
heap
page read and write
23F544D8000
heap
page read and write
23F53D85000
heap
page read and write
1194A06A000
heap
page read and write
11949FD0000
trusted library allocation
page read and write
21FF13BC000
heap
page read and write
23F534EA000
heap
page read and write
21FF0A4C000
heap
page read and write
194E2CCE000
heap
page read and write
60F000
heap
page read and write
23F53D62000
heap
page read and write
23F544B3000
heap
page read and write
23F53D62000
heap
page read and write
23F53D4B000
heap
page read and write
21FF1427000
heap
page read and write
23F544B0000
heap
page read and write
21FF0820000
heap
page read and write
23F53D5C000
heap
page read and write
24EFE5F0000
remote allocation
page read and write
21FF1343000
heap
page read and write
60F000
heap
page read and write
23F53D84000
heap
page read and write
9382F7F000
stack
page read and write
23F54512000
heap
page read and write
23F53D65000
heap
page read and write
1194A04E000
heap
page read and write
24EFE602000
heap
page read and write
23F53D4B000
heap
page read and write
27E62402000
heap
page read and write
23F53D5C000
heap
page read and write
24EFE5F0000
remote allocation
page read and write
23F544DE000
heap
page read and write
23F53D5D000
heap
page read and write
23F53D61000
heap
page read and write
23F53D5C000
heap
page read and write
23F54604000
heap
page read and write
609000
heap
page read and write
133D9600000
heap
page read and write
28106930000
heap
page read and write
24CC8960000
trusted library allocation
page read and write
23F53D9D000
heap
page read and write
23F54502000
heap
page read and write
23F53D57000
heap
page read and write
23F53D5C000
heap
page read and write
23F54620000
heap
page read and write
28106A13000
heap
page read and write
23F53483000
heap
page read and write
23F53D5C000
heap
page read and write
22345802000
trusted library allocation
page read and write
1194A04B000
heap
page read and write
23F53D0E000
heap
page read and write
23F53D29000
heap
page read and write
23F544D7000
heap
page read and write
23F53D69000
heap
page read and write
23F53D5E000
heap
page read and write
2383C5D0000
heap
page read and write
21FF0830000
heap
page read and write
23F53D7E000
heap
page read and write
60F000
heap
page read and write
609000
heap
page read and write
23F53D84000
heap
page read and write
23F54462000
heap
page read and write
9382E7A000
stack
page read and write
23F53D68000
heap
page read and write
194E2C6D000
heap
page read and write
23F53D62000
heap
page read and write
23F53D5C000
heap
page read and write
23F53D8B000
heap
page read and write
23F53D5E000
heap
page read and write
23F5354D000
heap
page read and write
23F53D5F000
heap
page read and write
23F544D3000
heap
page read and write
23F53D86000
heap
page read and write
F867D7C000
stack
page read and write
23F544F4000
heap
page read and write
613000
heap
page read and write
22345075000
heap
page read and write
23F53D84000
heap
page read and write
23F54524000
heap
page read and write
21FF1322000
heap
page read and write
5FD000
heap
page read and write
E23CB7A000
stack
page read and write
21FF0A76000
heap
page read and write
B0937E000
stack
page read and write
23F5354E000
heap
page read and write
23F53D84000
heap
page read and write
23F5352C000
heap
page read and write
23F5461A000
heap
page read and write
23F533B0000
trusted library allocation
page read and write
24EFE62A000
heap
page read and write
23F5440F000
heap
page read and write
23F53D53000
heap
page read and write
23F53D6E000
heap
page read and write
23F544D9000
heap
page read and write
2234506C000
heap
page read and write
23F53D61000
heap
page read and write
8A6337C000
stack
page read and write
23F53D5E000
heap
page read and write
23F5352A000
heap
page read and write
631000
heap
page read and write
21FF0A8B000
heap
page read and write
11949E60000
heap
page read and write
194E2C29000
heap
page read and write
1AC4C7D000
stack
page read and write
23F5451B000
heap
page read and write
289B000
heap
page read and write
21FF1322000
heap
page read and write
23F544B0000
heap
page read and write
23F544C0000
heap
page read and write
23F53D0E000
heap
page read and write
194E3500000
heap
page read and write
21FF0A90000
heap
page read and write
23F53D6D000
heap
page read and write
23F54464000
heap
page read and write
23F544B3000
heap
page read and write
23F54484000
heap
page read and write
23F53D85000
heap
page read and write
2383C802000
heap
page read and write
4D18000
direct allocation
page execute and read and write
23F5461B000
heap
page read and write
23F53D62000
heap
page read and write
23F544D3000
heap
page read and write
21FF0BE5000
heap
page read and write
23F544DB000
heap
page read and write
23F53D85000
heap
page read and write
2897000
heap
page read and write
23F53D5C000
heap
page read and write
23F53D52000
heap
page read and write
23F53D69000
heap
page read and write
23F544D9000
heap
page read and write
28106A29000
heap
page read and write
23F544BE000
heap
page read and write
23F53D8B000
heap
page read and write
23F53D69000
heap
page read and write
23F53502000
heap
page read and write
21FF1354000
heap
page read and write
21FF0A00000
heap
page read and write
23F53D84000
heap
page read and write
23F544C1000
heap
page read and write
1194A07A000
heap
page read and write
23F53D78000
heap
page read and write
23F53D74000
heap
page read and write
23F544D4000
heap
page read and write
23F53D87000
heap
page read and write
23F53D6D000
heap
page read and write
5FD000
heap
page read and write
23F53D86000
heap
page read and write
23F53D79000
heap
page read and write
23F53D8A000
heap
page read and write
23F54615000
heap
page read and write
23F53D84000
heap
page read and write
23F53D68000
heap
page read and write
23F53400000
heap
page read and write
401000
unkown
page execute read
2383CE02000
trusted library allocation
page read and write
23F53D76000
heap
page read and write
23F53D68000
heap
page read and write
23F53D52000
heap
page read and write
23F53D76000
heap
page read and write
28106A00000
heap
page read and write
23F53D86000
heap
page read and write
23F53D60000
heap
page read and write
21FF13C6000
heap
page read and write
22345054000
heap
page read and write
8A62F7F000
stack
page read and write
2897000
heap
page read and write
21FF0A6F000
heap
page read and write
23F53D0F000
heap
page read and write
4E0000
heap
page read and write
23F53D74000
heap
page read and write
27E62400000
heap
page read and write
C85297E000
stack
page read and write
23F53320000
heap
page read and write
23F53D5E000
heap
page read and write
23F54462000
heap
page read and write
4F6000
heap
page read and write
23F53DA5000
heap
page read and write
24CC8A65000
heap
page read and write
4B40000
direct allocation
page execute and read and write
23F53D29000
heap
page read and write
613000
heap
page read and write
1194A049000
heap
page read and write
23F53D87000
heap
page read and write
23F53D68000
heap
page read and write
23F53D82000
heap
page read and write
24CC8A4F000
heap
page read and write
133D9652000
heap
page read and write
24F00002000
trusted library allocation
page read and write
23F53D68000
heap
page read and write
23F53D7E000
heap
page read and write
22345113000
heap
page read and write
5FD000
heap
page read and write
609000
heap
page read and write
23F53D86000
heap
page read and write
194E2C13000
heap
page read and write
609000
heap
page read and write
23F53D76000
heap
page read and write
23F53D77000
heap
page read and write
23F53D80000
heap
page read and write
23F5447C000
heap
page read and write
23F54484000
heap
page read and write
23F54400000
heap
page read and write
23F53D74000
heap
page read and write
23F53D9C000
heap
page read and write
24CC8B08000
heap
page read and write
B071C7F000
stack
page read and write
23F53D69000
heap
page read and write
23F53D66000
heap
page read and write
23F54502000
heap
page read and write
23F53D82000
heap
page read and write
23F53D75000
heap
page read and write
C852BFE000
stack
page read and write
23F544DE000
heap
page read and write
23F544F2000
heap
page read and write
5FD000
heap
page read and write
23F54512000
heap
page read and write
1194A07E000
heap
page read and write
23F53D88000
heap
page read and write
228E000
stack
page read and write
28106990000
heap
page read and write
23F53D80000
heap
page read and write
23F53D8D000
heap
page read and write
23F53380000
heap
page read and write
A015AFF000
stack
page read and write
23F53D62000
heap
page read and write
21FF0B13000
heap
page read and write
308E27B000
stack
page read and write
2383C85F000
heap
page read and write
23F53D2A000
heap
page read and write
23F53D74000
heap
page read and write
23F53D29000
heap
page read and write
1194A03A000
heap
page read and write
23F534CC000
heap
page read and write
23F53D60000
heap
page read and write
23F53D76000
heap
page read and write
23F53D79000
heap
page read and write
60F000
heap
page read and write
23F53D5C000
heap
page read and write
23F53D5F000
heap
page read and write
27E6242E000
heap
page read and write
23F53D63000
heap
page read and write
613000
heap
page read and write
23F544D1000
heap
page read and write
21FF1302000
heap
page read and write
23F53D7F000
heap
page read and write
23F53D60000
heap
page read and write
23F53D78000
heap
page read and write
F9FD38B000
stack
page read and write
630000
heap
page read and write
23F54502000
heap
page read and write
23F53491000
heap
page read and write
24EFE64B000
heap
page read and write
194E2C83000
heap
page read and write
23F534D0000
heap
page read and write
23F544B3000
heap
page read and write
23F53D6E000
heap
page read and write
407000
unkown
page readonly
308EAFF000
stack
page read and write
23F53D2A000
heap
page read and write
F9FD8FB000
stack
page read and write
23F53D69000
heap
page read and write
19272F13000
heap
page read and write
2330000
heap
page read and write
194E3402000
heap
page read and write
194E2B10000
heap
page read and write
23F544C9000
heap
page read and write
23F53D68000
heap
page read and write
23F53D5C000
heap
page read and write
194E2B80000
heap
page read and write
1194A067000
heap
page read and write
23F53D6D000
heap
page read and write
23F53538000
heap
page read and write
23F53D72000
heap
page read and write
43E000
unkown
page readonly
23F53D8B000
heap
page read and write
23F54614000
heap
page read and write
23F53D6A000
heap
page read and write
133D9670000
heap
page read and write
23F544B8000
heap
page read and write
23F53488000
heap
page read and write
23F53D6A000
heap
page read and write
23F53D68000
heap
page read and write
23F53413000
heap
page read and write
23F53D4B000
heap
page read and write
277F000
stack
page read and write
308E6FE000
stack
page read and write
194E3512000
heap
page read and write
23F53D7E000
heap
page read and write
24CC8A00000
heap
page read and write
23F53D6F000
heap
page read and write
27E629A0000
trusted library allocation
page read and write
23F54621000
heap
page read and write
613000
heap
page read and write
23F544D8000
heap
page read and write
23F53D5C000
heap
page read and write
23F53D7E000
heap
page read and write
23F53D85000
heap
page read and write
23F53D84000
heap
page read and write
23F5460B000
heap
page read and write
23F53D4B000
heap
page read and write
23F53D79000
heap
page read and write
23F53D82000
heap
page read and write
613000
heap
page read and write
24EFE440000
heap
page read and write
23F5356F000
heap
page read and write
480000
unkown
page readonly
27E6243C000
heap
page read and write
23F544A9000
heap
page read and write
23F53D68000
heap
page read and write
27E621E0000
heap
page read and write
23F53D57000
heap
page read and write
1194A802000
trusted library allocation
page read and write
2890000
heap
page read and write
23F53493000
heap
page read and write
23F53D84000
heap
page read and write
24EFE700000
heap
page read and write
23F53DBF000
heap
page read and write
30000
heap
page read and write
23F54496000
heap
page read and write
23F54464000
heap
page read and write
133D9700000
heap
page read and write
23F53D84000
heap
page read and write
23F544B3000
heap
page read and write
23F5446E000
heap
page read and write
C852B7D000
stack
page read and write
23F53D74000
heap
page read and write
23F53D5C000
heap
page read and write
1194A013000
heap
page read and write
23F534AA000
heap
page read and write
C852DFD000
stack
page read and write
23F544B3000
heap
page read and write
23F53D5C000
heap
page read and write
23F53D73000
heap
page read and write
23F5441B000
heap
page read and write
8A6347E000
stack
page read and write
23F544D9000
heap
page read and write
C85267B000
stack
page read and write
1AC47FC000
stack
page read and write
23F53D57000
heap
page read and write
24EFE64D000
heap
page read and write
23F53D84000
heap
page read and write
23F53D84000
heap
page read and write
23F53D5C000
heap
page read and write
E23CA79000
stack
page read and write
19A000
stack
page read and write
23F544C5000
heap
page read and write
23F53D60000
heap
page read and write
23F5460A000
heap
page read and write
23F53D71000
heap
page read and write
23F53D60000
heap
page read and write
23F53D86000
heap
page read and write
23F544CA000
heap
page read and write
23F53D76000
heap
page read and write
23F53D7C000
heap
page read and write
23F53D68000
heap
page read and write
23F544FA000
heap
page read and write
27E62A02000
trusted library allocation
page read and write
23F53D5C000
heap
page read and write
C852A7E000
stack
page read and write
28106A61000
heap
page read and write
23F544A9000
heap
page read and write
23F544BA000
heap
page read and write
23F53D6E000
heap
page read and write
23F53D88000
heap
page read and write
23F5352C000
heap
page read and write
194E2BB0000
trusted library allocation
page read and write
23F53D85000
heap
page read and write
23F54510000
heap
page read and write
23F53D6A000
heap
page read and write
23F544D4000
heap
page read and write
133D9708000
heap
page read and write
23F544C1000
heap
page read and write
10001000
unkown
page execute read
194E2CBD000
heap
page read and write
308E47B000
stack
page read and write
23F544E2000
heap
page read and write
23F54469000
heap
page read and write
23F53D52000
heap
page read and write
23F53D84000
heap
page read and write
23F54512000
heap
page read and write
23F53D69000
heap
page read and write
1194A040000
heap
page read and write
23F53D8D000
heap
page read and write
23F53D75000
heap
page read and write
23F53D2A000
heap
page read and write
23F544C3000
heap
page read and write
23F54461000
heap
page read and write
24EFE64C000
heap
page read and write
23F53D2E000
heap
page read and write
23F53DB5000
heap
page read and write
23F53D77000
heap
page read and write
23F53D66000
heap
page read and write
23F53D29000
heap
page read and write
23F53D6D000
heap
page read and write
23F53DA5000
heap
page read and write
23F53D5F000
heap
page read and write
23F53D5D000
heap
page read and write
23F53D8A000
heap
page read and write
23F534D5000
heap
page read and write
28106A51000
heap
page read and write
23F53D82000
heap
page read and write
23F53D75000
heap
page read and write
2890000
heap
page read and write
23F53D69000
heap
page read and write
43E000
unkown
page readonly
F86817A000
stack
page read and write
1194A030000
heap
page read and write
23F53D2A000
heap
page read and write
B07147F000
stack
page read and write
609000
heap
page read and write
22345077000
heap
page read and write
23F53D86000
heap
page read and write
23F544B0000
heap
page read and write
23F544A4000
heap
page read and write
23F53D7E000
heap
page read and write
23F5356F000
heap
page read and write
1194A05E000
heap
page read and write
23F53D62000
heap
page read and write
2892000
heap
page read and write
23F53D82000
heap
page read and write
28106B00000
heap
page read and write
23F53D74000
heap
page read and write
2383C834000
heap
page read and write
23F53D62000
heap
page read and write
2234503C000
heap
page read and write
23F54600000
heap
page read and write
23F53D82000
heap
page read and write
23F53D74000
heap
page read and write
1AC4D7F000
stack
page read and write
23F53D66000
heap
page read and write
23F5461F000
heap
page read and write
23F53D10000
heap
page read and write
23F5446A000
heap
page read and write
23F53D80000
heap
page read and write
23F53D53000
heap
page read and write
23F534BD000
heap
page read and write
440000
unkown
page readonly
B071A7F000
stack
page read and write
23F53D61000
heap
page read and write
23F53D4C000
heap
page read and write
23F5354D000
heap
page read and write
1194A07B000
heap
page read and write
23F53D7F000
heap
page read and write
B092FB000
stack
page read and write
23F53D5C000
heap
page read and write
23F53D82000
heap
page read and write
308ECFF000
stack
page read and write
C852E7E000
stack
page read and write
5FD000
heap
page read and write
A015BFD000
stack
page read and write
23F53D75000
heap
page read and write
23F53D5E000
heap
page read and write
23F53D77000
heap
page read and write
23F53D86000
heap
page read and write
23F53D60000
heap
page read and write
23F53D69000
heap
page read and write
24EFE5C0000
trusted library allocation
page read and write
613000
heap
page read and write
21FF0BB9000
heap
page read and write
1194A02E000
heap
page read and write
23F53D5C000
heap
page read and write
23F53D80000
heap
page read and write
23F53D2A000
heap
page read and write
10005000
unkown
page readonly
1AC467F000
stack
page read and write
23F544CD000
heap
page read and write
23F544FE000
heap
page read and write
23F54502000
heap
page read and write
400000
unkown
page readonly
23F53D5F000
heap
page read and write
23F53D5E000
heap
page read and write
21FF0A3C000
heap
page read and write
23F53D9D000
heap
page read and write
21FF0A65000
heap
page read and write
308E87D000
stack
page read and write
11949ED0000
heap
page read and write
23F53D68000
heap
page read and write
27E621F0000
heap
page read and write
23F54609000
heap
page read and write
133D9E02000
trusted library allocation
page read and write
23F53D2E000
heap
page read and write
480000
unkown
page readonly
23F53513000
heap
page read and write
B07177D000
stack
page read and write
27E62441000
heap
page read and write
23F54538000
heap
page read and write
23F5354D000
heap
page read and write
23F5352D000
heap
page read and write
23F5352C000
heap
page read and write
C8528FE000
stack
page read and write
4EC507B000
stack
page read and write
23F53D5C000
heap
page read and write
23F53D57000
heap
page read and write
8A6299B000
stack
page read and write
386C000
stack
page read and write
23F544B3000
heap
page read and write
28106B08000
heap
page read and write
10000000
unkown
page readonly
1AC487E000
stack
page read and write
23F544B0000
heap
page read and write
23F53D6D000
heap
page read and write
F9FD9F7000
stack
page read and write
23F544DE000
heap
page read and write
22345002000
heap
page read and write
23F53D2C000
heap
page read and write
23F53D82000
heap
page read and write
23F544B0000
heap
page read and write
23F53D86000
heap
page read and write
19272CC0000
heap
page read and write
23F53D80000
heap
page read and write
23F53D9B000
heap
page read and write
1194A06B000
heap
page read and write
23F53D2A000
heap
page read and write
21FF13B0000
heap
page read and write
23F53DA0000
heap
page read and write
23F53D5C000
heap
page read and write
23F53D85000
heap
page read and write
23F53DA5000
heap
page read and write
1194A039000
heap
page read and write
23F53D80000
heap
page read and write
23F53B50000
remote allocation
page read and write
133D964B000
heap
page read and write
23F53D6D000
heap
page read and write
9382CFB000
stack
page read and write
23F53D8F000
heap
page read and write
23F53D75000
heap
page read and write
23F54512000
heap
page read and write
194E2C00000
heap
page read and write
23F544AA000
heap
page read and write
23F53D0E000
heap
page read and write
23F544AE000
heap
page read and write
194E353A000
heap
page read and write
23F544D7000
heap
page read and write
21FF1430000
heap
page read and write
23F53D7E000
heap
page read and write
23F53D82000
heap
page read and write
400000
unkown
page readonly
2383C800000
heap
page read and write
23F5446A000
heap
page read and write
23F53D76000
heap
page read and write
23F53D72000
heap
page read and write
24CC88C0000
heap
page read and write
23F53D77000
heap
page read and write
632000
heap
page read and write
24EFFFA0000
trusted library allocation
page read and write
23F53D85000
heap
page read and write
23F544CD000
heap
page read and write
A015977000
stack
page read and write
23F53D77000
heap
page read and write
2383CDC0000
remote allocation
page read and write
21FF0A21000
heap
page read and write
287F000
stack
page read and write
1194A056000
heap
page read and write
23F544EA000
heap
page read and write
23F544DC000
heap
page read and write
2383C902000
heap
page read and write
23F53D74000
heap
page read and write
23F5461D000
heap
page read and write
8A6317F000
stack
page read and write
609000
heap
page read and write
A0159FF000
stack
page read and write
E23CC7E000
stack
page read and write
23F53D6E000
heap
page read and write
23F54464000
heap
page read and write
401000
unkown
page execute read
19272F02000
heap
page read and write
23F53D82000
heap
page read and write
23F544E3000
heap
page read and write
19272F00000
heap
page read and write
23F53D5F000
heap
page read and write
23F5354D000
heap
page read and write
23F53D69000
heap
page read and write
27E62447000
heap
page read and write
23F53D7A000
heap
page read and write
23F53D86000
heap
page read and write
93826AB000
stack
page read and write
23F5460D000
heap
page read and write
1194A000000
heap
page read and write
23F5352C000
heap
page read and write
23F53D92000
heap
page read and write
23F53D5C000
heap
page read and write
1194A042000
heap
page read and write
23F53D6E000
heap
page read and write
23F534DB000
heap
page read and write
23F544B0000
heap
page read and write
2220000
heap
page read and write
23F53D85000
heap
page read and write
22345000000
heap
page read and write
23F53D95000
heap
page read and write
23F53D32000
heap
page read and write
23F53D57000
heap
page read and write
F8677BB000
stack
page read and write
19272E64000
heap
page read and write
23F53D5E000
heap
page read and write
23F53D8A000
heap
page read and write
23F54498000
heap
page read and write
23F53D63000
heap
page read and write
23F53D5C000
heap
page read and write
23F53D6D000
heap
page read and write
F9FD6FE000
stack
page read and write
23F53D74000
heap
page read and write
9382BFF000
stack
page read and write
23F53D6A000
heap
page read and write
23F53D68000
heap
page read and write
23F53D8B000
heap
page read and write
23F53D68000
heap
page read and write
23F53D4B000
heap
page read and write
613000
heap
page read and write
23F54462000
heap
page read and write
194E2CCC000
heap
page read and write
23F53D5F000
heap
page read and write
8A6307F000
stack
page read and write
23F53D5C000
heap
page read and write
22344E60000
heap
page read and write
5FD000
heap
page read and write
23F53D70000
heap
page read and write
22344E00000
heap
page read and write
23F53D7C000
heap
page read and write
24CC8A8A000
heap
page read and write
19272C50000
heap
page read and write
B0711FB000
stack
page read and write
23F54512000
heap
page read and write
F9FDBFE000
stack
page read and write
21FF0A53000
heap
page read and write
22344DF0000
heap
page read and write
19272E13000
heap
page read and write
23F53D74000
heap
page read and write
24CC8A29000
heap
page read and write
23F544D7000
heap
page read and write
23F53D5B000
heap
page read and write
23F53D5C000
heap
page read and write
F867F7A000
stack
page read and write
23F544A9000
heap
page read and write
23F544D4000
heap
page read and write
4F0000
heap
page read and write
23F53D7D000
heap
page read and write
23F5345F000
heap
page read and write
21FF0A85000
heap
page read and write
1194A102000
heap
page read and write
23F544D3000
heap
page read and write
28106920000
heap
page read and write
21FF1394000
heap
page read and write
21FF1400000
heap
page read and write
609000
heap
page read and write
23F54469000
heap
page read and write
23F53D5F000
heap
page read and write
23F53D99000
heap
page read and write
635000
heap
page read and write
23F53D71000
heap
page read and write
43B000
unkown
page read and write
B07187F000
stack
page read and write
23F544C3000
heap
page read and write
23F53D74000
heap
page read and write
23F53D63000
heap
page read and write
1194A060000
heap
page read and write
60F000
heap
page read and write
23F544AB000
heap
page read and write
1194A03D000
heap
page read and write
23F53D85000
heap
page read and write
23F544C0000
heap
page read and write
5FD000
heap
page read and write
21FF0A74000
heap
page read and write
23F54602000
heap
page read and write
23F53D2A000
heap
page read and write
23F53D5D000
heap
page read and write
23F53D61000
heap
page read and write
27E62450000
heap
page read and write
24CC8A80000
heap
page read and write
8A62DFC000
stack
page read and write
23F53D69000
heap
page read and write
23F5446A000
heap
page read and write
23F5347A000
heap
page read and write
23F544D9000
heap
page read and write
24CC8930000
heap
page read and write
23F53D5C000
heap
page read and write
23F53D88000
heap
page read and write
23F5447E000
heap
page read and write
5D8000
heap
page read and write
23F544F7000
heap
page read and write
23F5446C000
heap
page read and write
2240000
heap
page read and write
1194A04F000
heap
page read and write
F867E7A000
stack
page read and write
23F53D74000
heap
page read and write
23F544AA000
heap
page read and write
23F53D61000
heap
page read and write
2383C829000
heap
page read and write
23F53310000
heap
page read and write
23F53D84000
heap
page read and write
23F53D6D000
heap
page read and write
23F53D51000
heap
page read and write
23F53DA0000
heap
page read and write
A01567E000
stack
page read and write
23F53D5C000
heap
page read and write
21FF09B0000
trusted library allocation
page read and write
23F53D68000
heap
page read and write
19272E02000
heap
page read and write
23F53D85000
heap
page read and write
4EC527E000
stack
page read and write
23F53D77000
heap
page read and write
24CC8A55000
heap
page read and write
23F53D80000
heap
page read and write
23F53D60000
heap
page read and write
60F000
heap
page read and write
23F54468000
heap
page read and write
1194A046000
heap
page read and write
23F53D5C000
heap
page read and write
23F53D84000
heap
page read and write
23F53D5C000
heap
page read and write
11949E70000
heap
page read and write
21FF0A91000
heap
page read and write
23F53D6A000
heap
page read and write
23F53D5D000
heap
page read and write
23F544B8000
heap
page read and write
60F000
heap
page read and write
23F54462000
heap
page read and write
23F5351A000
heap
page read and write
23F5448A000
heap
page read and write
23F54623000
heap
page read and write
24CC88D0000
heap
page read and write
23F54512000
heap
page read and write
F86827E000
stack
page read and write
23F53D63000
heap
page read and write
23F53D60000
heap
page read and write
21FF0A58000
heap
page read and write
23F53D30000
heap
page read and write
23F53D7C000
heap
page read and write
938317F000
stack
page read and write
23F53D68000
heap
page read and write
23F53D29000
heap
page read and write
23F53D75000
heap
page read and write
23F53D5C000
heap
page read and write
21FF1423000
heap
page read and write
609000
heap
page read and write
23F53D5C000
heap
page read and write
24EFE672000
heap
page read and write
23F54615000
heap
page read and write
1AC4B7F000
stack
page read and write
23F53D84000
heap
page read and write
23F5352A000
heap
page read and write
133D9510000
heap
page read and write
23F53D7F000
heap
page read and write
23F53D57000
heap
page read and write
23F53D76000
heap
page read and write
23F53517000
heap
page read and write
23F53D7F000
heap
page read and write
23F53D2E000
heap
page read and write
24EFE667000
heap
page read and write
23F53D5D000
heap
page read and write
2383C813000
heap
page read and write
23F53D7E000
heap
page read and write
23F53D2A000
heap
page read and write
24EFE702000
heap
page read and write
1194A065000
heap
page read and write
99000
stack
page read and write
27E62456000
heap
page read and write
1194A050000
heap
page read and write
23F53D5F000
heap
page read and write
21FF0A29000
heap
page read and write
23F544DC000
heap
page read and write
21FF0990000
trusted library allocation
page read and write
23F544CD000
heap
page read and write
B0987E000
stack
page read and write
23F53D74000
heap
page read and write
23F5352C000
heap
page read and write
21FF1300000
heap
page read and write
23F544C3000
heap
page read and write
133D9613000
heap
page read and write
23F54468000
heap
page read and write
23F53D75000
heap
page read and write
133D964C000
heap
page read and write
23F53481000
heap
page read and write
24EFE4A0000
heap
page read and write
27E62240000
heap
page read and write
E23C97E000
stack
page read and write
23F53C02000
heap
page read and write
23F54480000
heap
page read and write
60F000
heap
page read and write
23F53D74000
heap
page read and write
28106A67000
heap
page read and write
93830FF000
stack
page read and write
23F53D5C000
heap
page read and write
10003000
unkown
page readonly
23F544EB000
heap
page read and write
23F544DE000
heap
page read and write
23F544DC000
heap
page read and write
23F53D80000
heap
page read and write
23F53D5C000
heap
page read and write
23F534C8000
heap
page read and write
23F53D00000
heap
page read and write
23F53C15000
heap
page read and write
27E62429000
heap
page read and write
23F53D62000
heap
page read and write
23F544AA000
heap
page read and write
23F53D8F000
heap
page read and write
23F53D86000
heap
page read and write
28A1000
heap
page read and write
23F53D7E000
heap
page read and write
23F53D5C000
heap
page read and write
308E77C000
stack
page read and write
23F53D95000
heap
page read and write
23F53D6B000
heap
page read and write
23F53D71000
heap
page read and write
23F53D80000
heap
page read and write
23F53D4B000
heap
page read and write
B0997E000
stack
page read and write
23F53D7E000
heap
page read and write
23F53D84000
heap
page read and write
F86807A000
stack
page read and write
194E2C86000
heap
page read and write
23F53D5C000
heap
page read and write
23F544E8000
heap
page read and write
23F53D6E000
heap
page read and write
22345029000
heap
page read and write
23F53D77000
heap
page read and write
23F53D77000
heap
page read and write
23F5348A000
heap
page read and write
19272E28000
heap
page read and write
407000
unkown
page readonly
23F53D62000
heap
page read and write
23F53D79000
heap
page read and write
308E5FE000
stack
page read and write
23F53DA5000
heap
page read and write
19272DC0000
trusted library allocation
page read and write
23F53D86000
heap
page read and write
23F53D64000
heap
page read and write
1194A062000
heap
page read and write
24EFE430000
heap
page read and write
1194A06D000
heap
page read and write
21FF0890000
heap
page read and write
23F5352C000
heap
page read and write
1194A029000
heap
page read and write
23F53D29000
heap
page read and write
23F544DF000
heap
page read and write
23F53D63000
heap
page read and write
133D964F000
heap
page read and write
23F53D97000
heap
page read and write
23F53D82000
heap
page read and write
23F54510000
heap
page read and write
23F54459000
heap
page read and write
613000
heap
page read and write
23F53D2C000
heap
page read and write
308E8FB000
stack
page read and write
23F53D86000
heap
page read and write
24EFE613000
heap
page read and write
23F53D7E000
heap
page read and write
23F5352A000
heap
page read and write
B093FE000
stack
page read and write
23F53D0E000
heap
page read and write
133D964D000
heap
page read and write
23F53D5C000
heap
page read and write
28106A78000
heap
page read and write
23F5343D000
heap
page read and write
23F53D32000
heap
page read and write
23F53D5F000
heap
page read and write
194E2CE0000
heap
page read and write
23F544DC000
heap
page read and write
23F544A3000
heap
page read and write
23F53D5C000
heap
page read and write
23F53D68000
heap
page read and write
23F5349F000
heap
page read and write
23F544DE000
heap
page read and write
23F53D86000
heap
page read and write
23F53D62000
heap
page read and write
23F53D80000
heap
page read and write
23F54462000
heap
page read and write
23F53D63000
heap
page read and write
2234505A000
heap
page read and write
23F53D5C000
heap
page read and write
23F53D5F000
heap
page read and write
23F54491000
heap
page read and write
194E2D02000
heap
page read and write
1194A077000
heap
page read and write
23F53D74000
heap
page read and write
31A0000
heap
page read and write
23F53D37000
heap
page read and write
1194A063000
heap
page read and write
23F53D65000
heap
page read and write
23F53D68000
heap
page read and write
23F544C4000
heap
page read and write
24EFE600000
heap
page read and write
23F544D1000
heap
page read and write
23F53D53000
heap
page read and write
23F53D60000
heap
page read and write
21FF1202000
heap
page read and write
23F54462000
heap
page read and write
24EFE5F0000
remote allocation
page read and write
23F53D84000
heap
page read and write
23F53D6B000
heap
page read and write
609000
heap
page read and write
22B4000
heap
page read and write
23F53C00000
heap
page read and write
23F5447D000
heap
page read and write
27E62413000
heap
page read and write
23F544C8000
heap
page read and write
23F53D29000
heap
page read and write
23F53D64000
heap
page read and write
409000
unkown
page read and write
23F5460C000
heap
page read and write
23F544DA000
heap
page read and write
5718000
direct allocation
page execute and read and write
23F53D74000
heap
page read and write
4EC4F7B000
stack
page read and write
23F53D80000
heap
page read and write
24CC9202000
trusted library allocation
page read and write
938307E000
stack
page read and write
2383CDC0000
remote allocation
page read and write
194E2CE2000
heap
page read and write
23F53D5C000
heap
page read and write
23F544EA000
heap
page read and write
23F53D69000
heap
page read and write
24EFE65C000
heap
page read and write
23F53D5D000
heap
page read and write
2383CD90000
trusted library allocation
page read and write
22345102000
heap
page read and write
133D9713000
heap
page read and write
23F53D77000
heap
page read and write
23F53D52000
heap
page read and write
23F54462000
heap
page read and write
23F53D7F000
heap
page read and write
308EBFD000
stack
page read and write
60F000
heap
page read and write
23F53D7E000
heap
page read and write
133D9702000
heap
page read and write
23F5352C000
heap
page read and write
23F53D07000
heap
page read and write
23F53481000
heap
page read and write
133D968A000
heap
page read and write
23F53D82000
heap
page read and write
23F53D71000
heap
page read and write
23F53D69000
heap
page read and write
28106A3C000
heap
page read and write
23F54464000
heap
page read and write
28106B13000
heap
page read and write
133D9650000
heap
page read and write
27E6244A000
heap
page read and write
23F53DB3000
heap
page read and write
23F53D09000
heap
page read and write
B07137D000
stack
page read and write
23F54618000
heap
page read and write
23F544CA000
heap
page read and write
24EFE713000
heap
page read and write
2336000
heap
page read and write
23F534FC000
heap
page read and write
23F53D69000
heap
page read and write
A01537C000
stack
page read and write
23F5352C000
heap
page read and write
23F53D68000
heap
page read and write
E23C52C000
stack
page read and write
440000
unkown
page readonly
19272E00000
heap
page read and write
23F54489000
heap
page read and write
4EC517F000
stack
page read and write
133D95A0000
trusted library allocation
page read and write
B09A7E000
stack
page read and write
23F53D4C000
heap
page read and write
24CC8A6C000
heap
page read and write
23F53538000
heap
page read and write
23F53D71000
heap
page read and write
2383C5C0000
heap
page read and write
23F53D74000
heap
page read and write
A015CFE000
stack
page read and write
9382D79000
stack
page read and write
23F53D5E000
heap
page read and write
23F53D58000
heap
page read and write
23F53B50000
remote allocation
page read and write
C852CFD000
stack
page read and write
23F53D86000
heap
page read and write
19272E59000
heap
page read and write
23F5446E000
heap
page read and write
24EFE65D000
heap
page read and write
23F53D5C000
heap
page read and write
23F5446A000
heap
page read and write
F86847D000
stack
page read and write
28107202000
trusted library allocation
page read and write
23F53D74000
heap
page read and write
23F53D51000
heap
page read and write
23F53D7E000
heap
page read and write
23F53D68000
heap
page read and write
21FF0B8E000
heap
page read and write
23F53D74000
heap
page read and write
23F544A5000
heap
page read and write
23F54604000
heap
page read and write
23F53D6B000
heap
page read and write
24EFE65B000
heap
page read and write
133D9602000
heap
page read and write
23F53D7D000
heap
page read and write
194E2B20000
heap
page read and write
23F53DA3000
heap
page read and write
23F53D61000
heap
page read and write
23F544CD000
heap
page read and write
23F53D95000
heap
page read and write
23F53D6B000
heap
page read and write
1AC497B000
stack
page read and write
23F544BD000
heap
page read and write
23F53D31000
heap
page read and write
24CC8B02000
heap
page read and write
4EC4C7B000
stack
page read and write
23F54502000
heap
page read and write
28106B02000
heap
page read and write
23F53D2C000
heap
page read and write
1AC4A77000
stack
page read and write
5D0000
heap
page read and write
F9FDCFE000
stack
page read and write
23F53D79000
heap
page read and write
23F53D6D000
heap
page read and write
There are 1176 hidden memdumps, click here to show them.