IOC Report
HfJLn9erXb.exe

loading gif

Files

File Path
Type
Category
Malicious
HfJLn9erXb.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Kontos.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsb2DEE.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\5D4ACB\B73EF6.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3425316567-2969588382-3778222414-1001\1b1d0082738e9f9011266f86ab9723d2_11389406-0377-47ed-98c7-d564e683c6eb
data
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Dykereeve\Jackbsningen\Telescopiform\Bestridende\AEGISIIIRadeonHelper.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Dykereeve\Jackbsningen\Telescopiform\Bestridende\Profetiske.Byg
data
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Dykereeve\Jackbsningen\Telescopiform\Bestridende\Sankekort.Sch209
data
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Hjtideligholdelser\Liechtensteiner\Systemopstninger\pan-start-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Hjtideligholdelser\Liechtensteiner\Systemopstninger\printer-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Idolatrous\Kaes\pt-br.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Ravingly\Magnetoplasmadynamics\godsvognen\avatar-default-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Tilrettelggelsernes\Gyrite\be.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Tilrettelggelsernes\Gyrite\changes-allow-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Tilrettelggelsernes\Gyrite\dotnet.api
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Tilrettelggelsernes\Gyrite\ebook-reader.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Tilrettelggelsernes\Gyrite\emblem-photos-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Tilrettelggelsernes\Gyrite\font-select-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Tilrettelggelsernes\Gyrite\network-wired-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\fumigatorium\Tertser\Omstrukturdnr\Unrivalled\Nonexhaustively\Snaffle\Stealthful\LogoCanary.png
PNG image data, 600 x 600, 8-bit/color RGBA, non-interlaced
dropped
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\HfJLn9erXb.exe
C:\Users\user\Desktop\HfJLn9erXb.exe
malicious
C:\Users\user\Desktop\HfJLn9erXb.exe
C:\Users\user\Desktop\HfJLn9erXb.exe
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 1368

URLs

Name
IP
Malicious
http://185.246.220.85/habrik/five/fre.php
185.246.220.85
malicious
http://ruhsalgelisim.com/jgEyxsZj50.ttf
85.95.248.49
http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.
unknown
http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
unknown
http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
unknown
http://nsis.sf.net/NSIS_Error
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD
unknown
http://www.gopher.ftp://ftp.
unknown
https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
unknown

Domains

Name
IP
Malicious
ruhsalgelisim.com
85.95.248.49

IPs

IP
Domain
Country
Malicious
185.246.220.85
unknown
Germany
malicious
85.95.248.49
ruhsalgelisim.com
Turkey

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Shabbyish\Retablerings
Aphetism

Memdumps

Base Address
Regiontype
Protect
Malicious
348C000
direct allocation
page execute and read and write
malicious
32490000
direct allocation
page read and write
1DF8A800000
heap
page read and write
21E31A0A000
heap
page read and write
21E31AA1000
heap
page read and write
32490000
direct allocation
page read and write
1BD512F0000
heap
page read and write
21E31AB8000
heap
page read and write
28A10D00000
heap
page read and write
60000
direct allocation
page read and write
21E319F7000
heap
page read and write
21E319F4000
heap
page read and write
209BC8CB000
heap
page read and write
1BD512F5000
heap
page read and write
21E320E5000
heap
page read and write
21E32003000
heap
page read and write
324A0000
direct allocation
page read and write
19820E68000
heap
page read and write
44D217E000
stack
page read and write
59E000
stack
page read and write
230B9F5A000
heap
page read and write
21E31A63000
heap
page read and write
3F40000
trusted library allocation
page read and write
436000
unkown
page readonly
21E31AF0000
heap
page read and write
209BC913000
heap
page read and write
21E320AC000
heap
page read and write
21E31A8B000
heap
page read and write
29992FE0000
trusted library allocation
page read and write
21E3109D000
heap
page read and write
230B9F81000
heap
page read and write
7A32DFC000
stack
page read and write
2889AE39000
heap
page read and write
21E31A74000
heap
page read and write
28A10BD0000
trusted library allocation
page read and write
21E31AA3000
heap
page read and write
21E319F4000
heap
page read and write
21E31B0D000
heap
page read and write
21E31028000
heap
page read and write
21E32089000
heap
page read and write
21E32044000
heap
page read and write
7A32AFB000
stack
page read and write
230B9F92000
heap
page read and write
21E31A46000
heap
page read and write
23439200000
heap
page read and write
1F3247E000
stack
page read and write
19821670000
trusted library allocation
page read and write
21E31012000
heap
page read and write
209BCAD0000
heap
page read and write
21E31A23000
heap
page read and write
21E319CC000
heap
page read and write
160DD877000
heap
page read and write
21E31A9E000
heap
page read and write
1DF8A87A000
heap
page read and write
21E322C9000
heap
page read and write
21E31AD0000
heap
page read and write
1F31C7F000
stack
page read and write
21E319EB000
heap
page read and write
324A0000
direct allocation
page read and write
21E31099000
heap
page read and write
32490000
direct allocation
page read and write
28E7000
heap
page read and write
25B0000
heap
page read and write
21E3210A000
heap
page read and write
19821802000
trusted library allocation
page read and write
433000
unkown
page read and write
21E3208F000
heap
page read and write
21E310A2000
heap
page read and write
21E31A78000
heap
page read and write
21E31389000
heap
page read and write
21E31943000
heap
page read and write
21E319BA000
heap
page read and write
32490000
direct allocation
page read and write
21E31096000
heap
page read and write
168E8E62000
heap
page read and write
32490000
direct allocation
page read and write
23439281000
heap
page read and write
28A10C3B000
heap
page read and write
21E31AA1000
heap
page read and write
1DF8A740000
heap
page read and write
31BB0000
direct allocation
page read and write
168E8E5B000
heap
page read and write
21E31AD0000
heap
page read and write
3202F000
stack
page read and write
21E32154000
heap
page read and write
21E31A73000
heap
page read and write
21E3109E000
heap
page read and write
410F3FF000
stack
page read and write
21E32159000
heap
page read and write
1DF8A83B000
heap
page read and write
230B9F2B000
heap
page read and write
21E31AB6000
heap
page read and write
230B9F5A000
heap
page read and write
21E31AE8000
heap
page read and write
23439213000
heap
page read and write
160DD8A5000
heap
page read and write
1B2C8D00000
heap
page read and write
21E31A4A000
heap
page read and write
21E31A61000
heap
page read and write
31F6E000
stack
page read and write
21E319ED000
heap
page read and write
21E32059000
heap
page read and write
21E3203F000
heap
page read and write
324A0000
direct allocation
page read and write
2889B802000
trusted library allocation
page read and write
28E7000
heap
page read and write
209BC8D5000
heap
page read and write
21E31A99000
heap
page read and write
1B2C8B02000
trusted library allocation
page read and write
168E8E60000
heap
page read and write
21E319CC000
heap
page read and write
18FD0E77000
heap
page read and write
230B969F000
heap
page read and write
21E31A39000
heap
page read and write
21E31A53000
heap
page read and write
21E3208F000
heap
page read and write
21E31A44000
heap
page read and write
18FD0D60000
heap
page read and write
209BC8CD000
heap
page read and write
21E31AF4000
heap
page read and write
D74777E000
stack
page read and write
21E31A68000
heap
page read and write
21E319EB000
heap
page read and write
28A10C50000
heap
page read and write
168E8E54000
heap
page read and write
2889AE6B000
heap
page read and write
21E31ACC000
heap
page read and write
230B9F29000
heap
page read and write
18FD0BD0000
heap
page read and write
21E31099000
heap
page read and write
168E8E2A000
heap
page read and write
21E319ED000
heap
page read and write
21E31A97000
heap
page read and write
21E31AA1000
heap
page read and write
21E31389000
heap
page read and write
D74767F000
stack
page read and write
21E31A46000
heap
page read and write
2889AE00000
heap
page read and write
1DF8A82B000
heap
page read and write
7A32CFF000
stack
page read and write
2390000
heap
page read and write
230B9F0E000
heap
page read and write
21E3206C000
heap
page read and write
21E31AA0000
heap
page read and write
21E31ACC000
heap
page read and write
28A10C76000
heap
page read and write
21E31AA3000
heap
page read and write
21E31AF4000
heap
page read and write
209BC8D1000
heap
page read and write
230B9F7C000
heap
page read and write
21E31A02000
heap
page read and write
23439242000
heap
page read and write
28A109F0000
heap
page read and write
9BCA17B000
stack
page read and write
2B9327E000
stack
page read and write
21E319FD000
heap
page read and write
32486000
direct allocation
page read and write
21E31FB0000
remote allocation
page read and write
230B9F74000
heap
page read and write
230B9F95000
heap
page read and write
21E31028000
heap
page read and write
209BD0B0000
trusted library allocation
page read and write
19820E40000
heap
page read and write
21E31A02000
heap
page read and write
209BC8B0000
heap
page read and write
21E319E8000
heap
page read and write
44D19CC000
stack
page read and write
230B96F1000
heap
page read and write
21E31A61000
heap
page read and write
2290000
heap
page read and write
735D3000
unkown
page readonly
230B9F6B000
heap
page read and write
1D0000
unclassified section
page readonly
230BA684000
heap
page read and write
21E319ED000
heap
page read and write
1F322FE000
stack
page read and write
209BC88D000
heap
page read and write
4454C7F000
stack
page read and write
193AFCF000
stack
page read and write
21E3108F000
heap
page read and write
21E31AC2000
heap
page read and write
230B9F70000
heap
page read and write
21E3203F000
heap
page read and write
21E31A65000
heap
page read and write
18FD0E00000
heap
page read and write
21E31A69000
heap
page read and write
21E31AE6000
heap
page read and write
1BD50F60000
heap
page read and write
44D21FE000
stack
page read and write
21E31992000
heap
page read and write
7A32FFE000
stack
page read and write
21E32058000
heap
page read and write
21E31A44000
heap
page read and write
324A0000
direct allocation
page read and write
21E319F4000
heap
page read and write
209BC883000
heap
page read and write
2889AE13000
heap
page read and write
266F000
stack
page read and write
28A10B70000
unclassified section
page readonly
21E31A9D000
heap
page read and write
1DF8A895000
heap
page read and write
21E31FEC000
heap
page read and write
230BA600000
heap
page read and write
2889ADB0000
unclassified section
page readonly
1B2C8A1C000
unkown
page read and write
18FD177D000
heap
page read and write
21E31A41000
heap
page read and write
230B9F74000
heap
page read and write
324A0000
direct allocation
page read and write
230BA606000
heap
page read and write
21E3208F000
heap
page read and write
324A0000
direct allocation
page read and write
21E319F1000
heap
page read and write
21E319D0000
heap
page read and write
21E319C7000
heap
page read and write
324A0000
direct allocation
page read and write
2B92D2F000
stack
page read and write
21E319ED000
heap
page read and write
324A0000
direct allocation
page read and write
209BC8C2000
heap
page read and write
21E31A4B000
heap
page read and write
1B2C8A11000
unkown
page read and write
230B9F0F000
heap
page read and write
2343925A000
heap
page read and write
21E31011000
heap
page read and write
21E31083000
heap
page read and write
21E3138D000
heap
page read and write
21E31ACA000
heap
page read and write
19820E6C000
heap
page read and write
43F000
unkown
page readonly
436000
unkown
page readonly
21E31AA1000
heap
page read and write
2889AE46000
heap
page read and write
21E31070000
heap
page read and write
230B9F6D000
heap
page read and write
21E3206C000
heap
page read and write
160DD8AF000
heap
page read and write
571D379000
stack
page read and write
21E3200B000
heap
page read and write
324A0000
direct allocation
page read and write
230B9F70000
heap
page read and write
21E319D0000
heap
page read and write
230B9F7B000
heap
page read and write
324A0000
direct allocation
page read and write
21E31A78000
heap
page read and write
230B9F61000
heap
page read and write
21E319E4000
heap
page read and write
32490000
direct allocation
page read and write
21E319D0000
heap
page read and write
3330000
trusted library allocation
page read and write
407000
unkown
page readonly
230B9F93000
heap
page read and write
230B9F0E000
heap
page read and write
2343925B000
heap
page read and write
21E3107E000
heap
page read and write
23439253000
heap
page read and write
21E31A4B000
heap
page read and write
21E32294000
heap
page read and write
21E31A78000
heap
page read and write
21E31A9E000
heap
page read and write
230B9F2F000
heap
page read and write
230B9F81000
heap
page read and write
324A0000
direct allocation
page read and write
2343926A000
heap
page read and write
230B9F0E000
heap
page read and write
230B972B000
heap
page read and write
21E32025000
heap
page read and write
21E31A39000
heap
page read and write
21E31ACA000
heap
page read and write
168E8DF0000
unclassified section
page readonly
209BC8BC000
heap
page read and write
28A11402000
heap
page read and write
30000
heap
page read and write
230B9F2C000
heap
page read and write
230BA6A1000
heap
page read and write
28A10C82000
heap
page read and write
230B9E00000
heap
page read and write
21E31A39000
heap
page read and write
21E31A02000
heap
page read and write
230B9F7E000
heap
page read and write
160DD84B000
heap
page read and write
A8F000
stack
page read and write
21E31A61000
heap
page read and write
21E319BA000
heap
page read and write
31A51000
heap
page read and write
21E32042000
heap
page read and write
168E8E7D000
heap
page read and write
21E319AB000
heap
page read and write
22B0000
heap
page read and write
21E31A84000
heap
page read and write
21E32056000
heap
page read and write
2889AE62000
heap
page read and write
21E31AEF000
heap
page read and write
21E322C3000
heap
page read and write
21E31389000
heap
page read and write
21E3205C000
heap
page read and write
160DE200000
heap
page read and write
21E319F9000
heap
page read and write
29991700000
heap
page read and write
3E99000
trusted library allocation
page read and write
21E31AEF000
heap
page read and write
209BC8B1000
heap
page read and write
160DD8AA000
heap
page read and write
21E319CE000
heap
page read and write
21E319E4000
heap
page read and write
21E3204D000
heap
page read and write
1DF8A813000
heap
page read and write
21E31088000
heap
page read and write
19820E6E000
heap
page read and write
21E31A78000
heap
page read and write
230B9F7E000
heap
page read and write
23439240000
heap
page read and write
1F31A7B000
stack
page read and write
230B9F29000
heap
page read and write
44D1EFE000
stack
page read and write
160DD863000
heap
page read and write
209BC8B0000
heap
page read and write
19820E2A000
heap
page read and write
21E31A87000
heap
page read and write
160DD8A9000
heap
page read and write
21E3205A000
heap
page read and write
21E31AC5000
heap
page read and write
21E31AAD000
heap
page read and write
21E319ED000
heap
page read and write
325E0000
direct allocation
page read and write
230B9F92000
heap
page read and write
407000
unkown
page readonly
21E32007000
heap
page read and write
21E31A93000
heap
page read and write
3223E000
stack
page read and write
21E3138B000
heap
page read and write
299915B0000
heap
page read and write
29993550000
remote allocation
page read and write
21E31AA3000
heap
page read and write
209BC8B1000
heap
page read and write
23439140000
heap
page read and write
21E31A76000
heap
page read and write
21E32056000
heap
page read and write
230B9F2D000
heap
page read and write
21E320A2000
heap
page read and write
21E32159000
heap
page read and write
21E319ED000
heap
page read and write
21E31220000
heap
page read and write
21E31934000
heap
page read and write
230BA625000
heap
page read and write
230BA613000
heap
page read and write
21E3205D000
heap
page read and write
21E319CC000
heap
page read and write
7A3257E000
stack
page read and write
94278FF000
stack
page read and write
21E31AA3000
heap
page read and write
21E319AA000
heap
page read and write
230B9F95000
heap
page read and write
234394D0000
heap
page read and write
21E31A58000
heap
page read and write
32490000
direct allocation
page read and write
324A0000
direct allocation
page read and write
21E31A4E000
heap
page read and write
230B9F92000
heap
page read and write
409000
unkown
page read and write
2889AE2A000
heap
page read and write
21E320A2000
heap
page read and write
21E3208F000
heap
page read and write
230B9F7E000
heap
page read and write
23439226000
heap
page read and write
21E31A43000
heap
page read and write
230B9F29000
heap
page read and write
29991713000
heap
page read and write
21E31A4E000
heap
page read and write
21E31992000
heap
page read and write
21E3205D000
heap
page read and write
28E3000
heap
page read and write
32490000
direct allocation
page read and write
21E310B6000
heap
page read and write
23439261000
heap
page read and write
21E3210A000
heap
page read and write
21E319AE000
heap
page read and write
21E31A43000
heap
page read and write
21E32049000
heap
page read and write
324A0000
direct allocation
page read and write
230B9F7C000
heap
page read and write
32490000
direct allocation
page read and write
94279FE000
stack
page read and write
230B9F7A000
heap
page read and write
324A0000
direct allocation
page read and write
230BA646000
heap
page read and write
230B9F76000
heap
page read and write
160DD8A6000
heap
page read and write
160DD841000
heap
page read and write
AB61E7B000
stack
page read and write
AB61F7F000
stack
page read and write
230B9639000
heap
page read and write
230B9F78000
heap
page read and write
21E3210A000
heap
page read and write
44543AB000
stack
page read and write
32490000
direct allocation
page read and write
21E31951000
heap
page read and write
21E31A61000
heap
page read and write
32490000
direct allocation
page read and write
230B9F95000
heap
page read and write
19820D70000
heap
page read and write
230B9F78000
heap
page read and write
28E2000
heap
page read and write
324A0000
direct allocation
page read and write
21E31AF4000
heap
page read and write
21E31FE0000
heap
page read and write
21E31AC9000
heap
page read and write
649000
heap
page read and write
28DF000
stack
page read and write
21E31AB4000
heap
page read and write
21E31A35000
heap
page read and write
21E319CB000
heap
page read and write
21E31ACC000
heap
page read and write
230B96AD000
heap
page read and write
21E3109A000
heap
page read and write
230B9F0E000
heap
page read and write
18FD0E40000
heap
page read and write
324A0000
direct allocation
page read and write
230B9F6C000
heap
page read and write
21E31FEC000
heap
page read and write
18FD1602000
heap
page read and write
230B9F82000
heap
page read and write
29991613000
heap
page read and write
32490000
direct allocation
page read and write
21E31A4C000
heap
page read and write
21E31A61000
heap
page read and write
21E3205C000
heap
page read and write
28A10CA3000
heap
page read and write
230B9F95000
heap
page read and write
31B90000
heap
page read and write
21E31A53000
heap
page read and write
21E32154000
heap
page read and write
230B967F000
heap
page read and write
160DDAE0000
heap
page read and write
43F000
unkown
page readonly
21E31AE7000
heap
page read and write
32490000
direct allocation
page read and write
21E31A4F000
heap
page read and write
21E3204D000
heap
page read and write
23439262000
heap
page read and write
209BC8D6000
heap
page read and write
21E3203B000
heap
page read and write
32490000
direct allocation
page read and write
230B9430000
heap
page read and write
160DD868000
heap
page read and write
21E319ED000
heap
page read and write
21E32101000
heap
page read and write
21E319AE000
heap
page read and write
21E32126000
heap
page read and write
21E31AE8000
heap
page read and write
21E31FE6000
heap
page read and write
21E31FE6000
heap
page read and write
21E319E4000
heap
page read and write
21E3205D000
heap
page read and write
21E319CB000
heap
page read and write
21E3201D000
heap
page read and write
230B96F7000
heap
page read and write
1BD510A0000
heap
page read and write
23439267000
heap
page read and write
23439268000
heap
page read and write
21E31A84000
heap
page read and write
160DD876000
heap
page read and write
230B9F00000
heap
page read and write
43F000
unkown
page readonly
21E31A31000
heap
page read and write
21E31A55000
heap
page read and write
18FD0D50000
unclassified section
page readonly
21E31AA1000
heap
page read and write
18FD0E2B000
heap
page read and write
230B9F78000
heap
page read and write
230B9702000
heap
page read and write
21E319AB000
heap
page read and write
209BC8B3000
heap
page read and write
230B9F5A000
heap
page read and write
21E320A8000
heap
page read and write
28A10C60000
heap
page read and write
410F2FE000
stack
page read and write
21E31A02000
heap
page read and write
23439237000
heap
page read and write
21E31A75000
heap
page read and write
18FD1784000
heap
page read and write
160DE0D0000
trusted library allocation
page read and write
21E322C3000
heap
page read and write
21E32021000
heap
page read and write
D74787E000
stack
page read and write
1B2C8B15000
trusted library allocation
page read and write
21E3108C000
heap
page read and write
80F000
stack
page read and write
571D07E000
stack
page read and write
21E31AE6000
heap
page read and write
230B967E000
heap
page read and write
32490000
direct allocation
page read and write
410F37E000
stack
page read and write
4454DFF000
stack
page read and write
18FD0EC7000
heap
page read and write
5F0000
unkown
page execute read
209BC841000
heap
page read and write
21E31083000
heap
page read and write
230B9F78000
heap
page read and write
21E319ED000
heap
page read and write
21E31A54000
heap
page read and write
209BC8B0000
heap
page read and write
21E320E6000
heap
page read and write
21E31AF4000
heap
page read and write
230B9F3B000
heap
page read and write
28A10C52000
heap
page read and write
21E31AB6000
heap
page read and write
299916A2000
heap
page read and write
18FD0EF6000
heap
page read and write
32480000
direct allocation
page read and write
21E31AA3000
heap
page read and write
324A0000
direct allocation
page read and write
21E31A02000
heap
page read and write
21E31AE8000
heap
page read and write
21E31AC2000
heap
page read and write
32490000
direct allocation
page read and write
21E31A31000
heap
page read and write
230B9E15000
heap
page read and write
28E2000
heap
page read and write
230B9F74000
heap
page read and write
262E000
stack
page read and write
21E31A98000
heap
page read and write
1DF8A852000
heap
page read and write
21E31A78000
heap
page read and write
21E322D2000
heap
page read and write
21E31AA1000
heap
page read and write
160DD8B7000
heap
page read and write
21E319F1000
heap
page read and write
21E31ACC000
heap
page read and write
2318000
heap
page read and write
21E3210A000
heap
page read and write
21E31AB3000
heap
page read and write
21E32056000
heap
page read and write
21E319D0000
heap
page read and write
44D20FB000
stack
page read and write
168E8E64000
heap
page read and write
21E31A02000
heap
page read and write
21E31AF1000
heap
page read and write
230B9E02000
heap
page read and write
21E31980000
heap
page read and write
21E31ACC000
heap
page read and write
3F40000
trusted library allocation
page read and write
230B9F70000
heap
page read and write
21E3138A000
heap
page read and write
21E319A2000
heap
page read and write
21E31A02000
heap
page read and write
21E31FB0000
remote allocation
page read and write
160DD821000
heap
page read and write
21E3205D000
heap
page read and write
168E8E3C000
heap
page read and write
21E3203B000
heap
page read and write
2889AE40000
heap
page read and write
19820F02000
heap
page read and write
28E8000
heap
page read and write
19820E8A000
heap
page read and write
230B9F56000
heap
page read and write
21E31A55000
heap
page read and write
18FD0E13000
heap
page read and write
168E8D50000
heap
page read and write
3237C000
stack
page read and write
230BA480000
remote allocation
page read and write
21E32049000
heap
page read and write
32490000
direct allocation
page read and write
21E31A9E000
heap
page read and write
21E31A3B000
heap
page read and write
230B93C0000
heap
page read and write
230B9F55000
heap
page read and write
21E319D0000
heap
page read and write
21E319C7000
heap
page read and write
21E31A7B000
heap
page read and write
22EA000
heap
page read and write
28A10C28000
heap
page read and write
1DF8A902000
heap
page read and write
21E31ACC000
heap
page read and write
230B9F76000
heap
page read and write
21E31FEC000
heap
page read and write
230B9F88000
heap
page read and write
21E319C4000
heap
page read and write
230B9F2A000
heap
page read and write
160DD81F000
heap
page read and write
234392A1000
heap
page read and write
230B9F78000
heap
page read and write
19820D20000
heap
page read and write
3E8C000
direct allocation
page execute and read and write
21E31A30000
heap
page read and write
21E31AE7000
heap
page read and write
32490000
direct allocation
page read and write
209BC894000
heap
page read and write
21E31A4A000
heap
page read and write
230B96CE000
heap
page read and write
7A324FC000
stack
page read and write
230B9F5E000
heap
page read and write
209BC8CF000
heap
page read and write
21E31A96000
heap
page read and write
9BC9E7B000
stack
page read and write
424000
unkown
page read and write
409000
unkown
page write copy
21E31A39000
heap
page read and write
324A0000
direct allocation
page read and write
324A0000
direct allocation
page read and write
23439259000
heap
page read and write
230B9F76000
heap
page read and write
F898EFE000
stack
page read and write
21E31A48000
heap
page read and write
230B9F4B000
heap
page read and write
32490000
direct allocation
page read and write
32490000
direct allocation
page read and write
21E3212B000
heap
page read and write
31D10000
direct allocation
page read and write
2889AF02000
heap
page read and write
230B9F60000
heap
page read and write
32490000
direct allocation
page read and write
209BC8CA000
heap
page read and write
21E31085000
heap
page read and write
485000
heap
page read and write
21E31A5C000
heap
page read and write
410F4FE000
stack
page read and write
2343925F000
heap
page read and write
401000
unkown
page execute read
21E31A7D000
heap
page read and write
21E319BA000
heap
page read and write
230B96A7000
heap
page read and write
2331000
heap
page read and write
32490000
direct allocation
page read and write
2410000
heap
page read and write
32490000
direct allocation
page read and write
160DD84A000
heap
page read and write
324A0000
direct allocation
page read and write
21E31389000
heap
page read and write
28A10C00000
heap
page read and write
230B9F6B000
heap
page read and write
98E000
stack
page read and write
1B2C8820000
heap
page read and write
160DD849000
heap
page read and write
21E31AA1000
heap
page read and write
324A0000
direct allocation
page read and write
232F000
heap
page read and write
F898BCB000
stack
page read and write
21E3108F000
heap
page read and write
21E31A97000
heap
page read and write
21E31A9D000
heap
page read and write
21E31A61000
heap
page read and write
21E319BA000
heap
page read and write
21E32058000
heap
page read and write
230B96C6000
heap
page read and write
2889ADC0000
heap
page read and write
21E31A32000
heap
page read and write
3FC9000
trusted library allocation
page read and write
21E319AE000
heap
page read and write
44D1CFF000
stack
page read and write
21E31A43000
heap
page read and write
21E32005000
heap
page read and write
209BC870000
heap
page read and write
21E31AF4000
heap
page read and write
9BCA07B000
stack
page read and write
32490000
direct allocation
page read and write
21E31A01000
heap
page read and write
230BA69C000
heap
page read and write
1D0000
unclassified section
page readonly
230B9540000
unclassified section
page readonly
32490000
direct allocation
page read and write
160DD893000
heap
page read and write
1B2C8A24000
unkown
page read and write
2343925E000
heap
page read and write
230B9F29000
heap
page read and write
230B9550000
heap
page read and write
324A0000
direct allocation
page read and write
21E3208F000
heap
page read and write
2B938FF000
stack
page read and write
910000
heap
page read and write
29991420000
heap
page read and write
410F879000
stack
page read and write
21E31A53000
heap
page read and write
21E3210A000
heap
page read and write
28EC000
heap
page read and write
19820DC0000
trusted library allocation
page read and write
21E31ACF000
heap
page read and write
9BCA2FE000
stack
page read and write
18FD0F02000
heap
page read and write
18FD1740000
heap
page read and write
234391B0000
heap
page read and write
168E8F02000
heap
page read and write
21E31A5D000
heap
page read and write
21E31A02000
heap
page read and write
21E3210A000
heap
page read and write
230B9F7E000
heap
page read and write
21E319B7000
heap
page read and write
21E322C3000
heap
page read and write
21E31FEE000
heap
page read and write
31CD0000
direct allocation
page read and write
21E31AB6000
heap
page read and write
21E32021000
heap
page read and write
21E31949000
heap
page read and write
28A11415000
heap
page read and write
3200000
heap
page read and write
21E31AA0000
heap
page read and write
2B92CAB000
stack
page read and write
28A10C8E000
heap
page read and write
21E32154000
heap
page read and write
21E32006000
heap
page read and write
209BC8D8000
heap
page read and write
209BC8D5000
heap
page read and write
160DD8C0000
heap
page read and write
21E3195D000
heap
page read and write
735D5000
unkown
page readonly
18FD1700000
heap
page read and write
429000
unkown
page read and write
160DD813000
heap
page read and write
21E31A55000
heap
page read and write
230B9F76000
heap
page read and write
4454D7D000
stack
page read and write
23439295000
heap
page read and write
21E32000000
heap
page read and write
21E3138E000
heap
page read and write
2339000
heap
page read and write
21E319D0000
heap
page read and write
21E3205D000
heap
page read and write
28A10D02000
heap
page read and write
230B9F7C000
heap
page read and write
21E319ED000
heap
page read and write
23439289000
heap
page read and write
21E31A48000
heap
page read and write
3F40000
trusted library allocation
page read and write
21E319EB000
heap
page read and write
168E8E45000
heap
page read and write
626000
unkown
page execute read
21E31A4C000
heap
page read and write
1DF8A620000
heap
page read and write
230B9F37000
heap
page read and write
21E3206C000
heap
page read and write
23439256000
heap
page read and write
230B9F78000
heap
page read and write
1B2C8990000
trusted library allocation
page read and write
21E319F1000
heap
page read and write
209BC7E0000
unclassified section
page readonly
21E31A78000
heap
page read and write
21E31385000
heap
page read and write
160DD81B000
heap
page read and write
21E3206C000
heap
page read and write
230B9F7C000
heap
page read and write
160DD895000
heap
page read and write
32490000
direct allocation
page read and write
230B9F2E000
heap
page read and write
21E319ED000
heap
page read and write
230BA648000
heap
page read and write
21E31A4B000
heap
page read and write
21E31ACC000
heap
page read and write
21E31A4B000
heap
page read and write
31A50000
heap
page read and write
21E31AA1000
heap
page read and write
230B9F32000
heap
page read and write
3330000
trusted library allocation
page read and write
324A0000
direct allocation
page read and write
21E3208F000
heap
page read and write
1DF8A840000
heap
page read and write
209BC8B0000
heap
page read and write
21E31AE7000
heap
page read and write
324A0000
direct allocation
page read and write
324A0000
direct allocation
page read and write
21E31AE7000
heap
page read and write
21E319ED000
heap
page read and write
230B9F76000
heap
page read and write
21E31A9C000
heap
page read and write
2889AE49000
heap
page read and write
256E000
stack
page read and write
28A10C82000
heap
page read and write
230B96C9000
heap
page read and write
21E31AE4000
heap
page read and write
3330000
trusted library allocation
page read and write
230B9F40000
heap
page read and write
21E31A78000
heap
page read and write
21E32056000
heap
page read and write
21E3208F000
heap
page read and write
19820E00000
heap
page read and write
21E31AF4000
heap
page read and write
21E31FEE000
heap
page read and write
21E31A02000
heap
page read and write
209BC8C5000
heap
page read and write
21E319F1000
heap
page read and write
29991671000
heap
page read and write
21E31A78000
heap
page read and write
27DF000
stack
page read and write
21E31FE5000
heap
page read and write
324A0000
direct allocation
page read and write
21E3208F000
heap
page read and write
18FD1788000
heap
page read and write
21E31A02000
heap
page read and write
21E3138D000
heap
page read and write
400000
unkown
page readonly
234392A6000
heap
page read and write
2999166D000
heap
page read and write
21E32159000
heap
page read and write
230B9F7E000
heap
page read and write
160DD8AD000
heap
page read and write
2889AE02000
heap
page read and write
410F775000
stack
page read and write
28A10CAA000
heap
page read and write
3227B000
stack
page read and write
21E31A99000
heap
page read and write
21E320F2000
heap
page read and write
21E31099000
heap
page read and write
21E31A5C000
heap
page read and write
21E3205D000
heap
page read and write
21E31AA1000
heap
page read and write
5F2000
unkown
page execute read
29993002000
trusted library allocation
page read and write
230B9F70000
heap
page read and write
230B9F6E000
heap
page read and write
160DD8AA000
heap
page read and write
18FD0EB8000
heap
page read and write
18FD0EFE000
heap
page read and write
3212E000
stack
page read and write
29991625000
heap
page read and write
21E31A31000
heap
page read and write
21E3205D000
heap
page read and write
230B9F91000
heap
page read and write
21E319F4000
heap
page read and write
31A51000
heap
page read and write
31B91000
heap
page read and write
230B9F5B000
heap
page read and write
21E32003000
heap
page read and write
230B9F95000
heap
page read and write
209BC8D5000
heap
page read and write
21E31A91000
heap
page read and write
230B9F88000
heap
page read and write
234391F0000
unclassified section
page readonly
230BA6A9000
heap
page read and write
21E3205D000
heap
page read and write
28A10C4B000
heap
page read and write
230B965F000
heap
page read and write
32490000
direct allocation
page read and write
21E320F2000
heap
page read and write
21E31AC2000
heap
page read and write
21E31A78000
heap
page read and write
21E31A76000
heap
page read and write
3248A000
direct allocation
page read and write
29993550000
remote allocation
page read and write
21E319F5000
heap
page read and write
3330000
trusted library allocation
page read and write
28A10C9F000
heap
page read and write
193B5FE000
stack
page read and write
28A10CA3000
heap
page read and write
230B9F95000
heap
page read and write
324DE000
stack
page read and write
21E31A0A000
heap
page read and write
230B9F82000
heap
page read and write
21E31A4A000
heap
page read and write
410F6FE000
stack
page read and write
230B9F5A000
heap
page read and write
209BC887000
heap
page read and write
21E319CC000
heap
page read and write
230B9F76000
heap
page read and write
21E31AEF000
heap
page read and write
3330000
trusted library allocation
page read and write
21E31070000
heap
page read and write
21E319E4000
heap
page read and write
21E3138E000
heap
page read and write
D74714E000
stack
page read and write
21E3138E000
heap
page read and write
2324000
heap
page read and write
21E32041000
heap
page read and write
29991691000
heap
page read and write
400000
unkown
page readonly
21E31AB4000
heap
page read and write
21E3205D000
heap
page read and write
21E3108E000
heap
page read and write
3216F000
stack
page read and write
230B9F6C000
heap
page read and write
160DD8B0000
heap
page read and write
209BC8CA000
heap
page read and write
324A0000
direct allocation
page read and write
21E319AD000
heap
page read and write
21E319BA000
heap
page read and write
320AE000
stack
page read and write
21E31A02000
heap
page read and write
23439302000
heap
page read and write
1DF8A858000
heap
page read and write
21E31088000
heap
page read and write
21E31A02000
heap
page read and write
21E31AF4000
heap
page read and write
21E31A81000
heap
page read and write
21E31AA4000
heap
page read and write
32490000
direct allocation
page read and write
21E31A93000
heap
page read and write
230B9F29000
heap
page read and write
4454EFD000
stack
page read and write
230B9F13000
heap
page read and write
21E31A97000
heap
page read and write
2830000
heap
page read and write
21E31A6C000
heap
page read and write
21E32314000
heap
page read and write
21E319E8000
heap
page read and write
21E32040000
heap
page read and write
160DD913000
heap
page read and write
21E31A59000
heap
page read and write
21E319A8000
heap
page read and write
21E319D0000
heap
page read and write
21E31A45000
heap
page read and write
28A10C89000
heap
page read and write
29991665000
heap
page read and write
230B9684000
heap
page read and write
1B2C8D02000
heap
page read and write
2306000
heap
page read and write
209BC873000
heap
page read and write
31FAF000
stack
page read and write
28E5000
heap
page read and write
2414000
heap
page read and write
21E31A23000
heap
page read and write
230B9F78000
heap
page read and write
209BC829000
heap
page read and write
232A000
heap
page read and write
28A10CA7000
heap
page read and write
19820E62000
heap
page read and write
209BC8CF000
heap
page read and write
407000
unkown
page readonly
21E31A3C000
heap
page read and write
21E322FE000
heap
page read and write
1B2C8A39000
unkown
page read and write
209BC8A1000
heap
page read and write
21E310AF000
heap
page read and write
21E31A4E000
heap
page read and write
21E3102C000
heap
page read and write
28A10C2A000
heap
page read and write
252E000
stack
page read and write
21E31AEF000
heap
page read and write
32490000
direct allocation
page read and write
916E16B000
stack
page read and write
19820E57000
heap
page read and write
21E3200B000
heap
page read and write
230B9F62000
heap
page read and write
21E31AE4000
heap
page read and write
18FD0DB0000
trusted library allocation
page read and write
7A32BF9000
stack
page read and write
21E31A61000
heap
page read and write
2394000
heap
page read and write
7A329FF000
stack
page read and write
7A32EFF000
stack
page read and write
90E000
stack
page read and write
21E3208F000
heap
page read and write
44D1FFF000
stack
page read and write
43A000
unkown
page readonly
209BC8CF000
heap
page read and write
21E31A61000
heap
page read and write
21E322C2000
heap
page read and write
21E31AEF000
heap
page read and write
21E319C8000
heap
page read and write
21E3204D000
heap
page read and write
21E31AA1000
heap
page read and write
230B972B000
heap
page read and write
230BA651000
heap
page read and write
21E322C4000
heap
page read and write
21E31AC0000
heap
page read and write
209BC730000
heap
page read and write
21E320E6000
heap
page read and write
21E31A87000
heap
page read and write
28A10A60000
heap
page read and write
21E32003000
heap
page read and write
230B9F2B000
heap
page read and write
1F32577000
stack
page read and write
21E31A47000
heap
page read and write
21E31A98000
heap
page read and write
32490000
trusted library allocation
page read and write
21E31A38000
heap
page read and write
230B9F95000
heap
page read and write
22A0000
heap
page read and write
480000
heap
page read and write
324A0000
direct allocation
page read and write
23439270000
heap
page read and write
21E31A4C000
heap
page read and write
21E32026000
heap
page read and write
28A10C8F000
heap
page read and write
31FEE000
stack
page read and write
29992FA0000
trusted library allocation
page read and write
230B9F2C000
heap
page read and write
160DD86E000
heap
page read and write
21E32089000
heap
page read and write
21E31099000
heap
page read and write
21E319D0000
heap
page read and write
1DF8A730000
unclassified section
page readonly
21E31A98000
heap
page read and write
21E319E6000
heap
page read and write
209BC8CA000
heap
page read and write
96000
stack
page read and write
21E31930000
heap
page read and write
21E32041000
heap
page read and write
230B96A2000
heap
page read and write
21E3203B000
heap
page read and write
1B2C8D00000
heap
page read and write
230B971A000
heap
page read and write
31B70000
direct allocation
page read and write
21E319E4000
heap
page read and write
230B962A000
heap
page read and write
230B9F29000
heap
page read and write
230BA698000
heap
page read and write
667000
heap
page read and write
21E31A55000
heap
page read and write
21E3208F000
heap
page read and write
21E3102C000
heap
page read and write
21E31A5C000
heap
page read and write
2343924D000
heap
page read and write
28A10B80000
heap
page read and write
32490000
direct allocation
page read and write
28A10C64000
heap
page read and write
21E30FC0000
heap
page read and write
230BA611000
heap
page read and write
400000
unkown
page readonly
3F90000
trusted library allocation
page read and write
2889B680000
trusted library allocation
page read and write
230B9F95000
heap
page read and write
21E31028000
heap
page read and write
1BD51149000
heap
page read and write
23439250000
heap
page read and write
1B2C8B00000
trusted library allocation
page read and write
21E32153000
heap
page read and write
230B9F60000
heap
page read and write
29991674000
heap
page read and write
18FD1795000
heap
page read and write
1DF8A89A000
heap
page read and write
160DD8B1000
heap
page read and write
209BC8D5000
heap
page read and write
21E31AE7000
heap
page read and write
21E3203F000
heap
page read and write
21E32005000
heap
page read and write
230B9F92000
heap
page read and write
235E000
stack
page read and write
21E3208F000
heap
page read and write
28A10C40000
heap
page read and write
230B9639000
heap
page read and write
21E310BC000
heap
page read and write
21E31A43000
heap
page read and write
1DF8B002000
trusted library allocation
page read and write
160DD86E000
heap
page read and write
18FD0EEE000
heap
page read and write
32490000
direct allocation
page read and write
21E3208F000
heap
page read and write
3230F000
stack
page read and write
70000
direct allocation
page read and write
21E32021000
heap
page read and write
21E3138E000
heap
page read and write
28E7000
heap
page read and write
230B9F78000
heap
page read and write
2B9337F000
stack
page read and write
324A0000
direct allocation
page read and write
21E31A4A000
heap
page read and write
230B9F2F000
heap
page read and write
21E31009000
heap
page read and write
18FD1795000
heap
page read and write
230B973B000
heap
page read and write
23439298000
heap
page read and write
916E8F9000
stack
page read and write
21E319F9000
heap
page read and write
230B9F7B000
heap
page read and write
32490000
direct allocation
page read and write
230B96CC000
heap
page read and write
21E319F5000
heap
page read and write
230B9F7C000
heap
page read and write
2343926E000
heap
page read and write
21E31958000
heap
page read and write
209BC891000
heap
page read and write
5E8000
unkown
page execute read
230B9689000
heap
page read and write
168E96C0000
trusted library allocation
page read and write
21E3199B000
heap
page read and write
230B9F2E000
heap
page read and write
5EA000
unkown
page execute read
209BC8D7000
heap
page read and write
21E32147000
heap
page read and write
21E31A80000
heap
page read and write
230B9644000
heap
page read and write
209BD202000
trusted library allocation
page read and write
160DD860000
heap
page read and write
21E3200A000
heap
page read and write
21E32056000
heap
page read and write
18FD0E8B000
heap
page read and write
21E31FE3000
heap
page read and write
21E31A3C000
heap
page read and write
1B2C8A02000
unkown
page read and write
2889AD00000
heap
page read and write
230B9F7B000
heap
page read and write
21E3204D000
heap
page read and write
401000
unkown
page execute read
21E3206C000
heap
page read and write
21E32157000
heap
page read and write
571CBCD000
stack
page read and write
7A32979000
stack
page read and write
226E000
stack
page read and write
D7471CE000
stack
page read and write
230B9F5C000
heap
page read and write
21E31A73000
heap
page read and write
21E31AA3000
heap
page read and write
21E31A49000
heap
page read and write
230B972B000
heap
page read and write
21E32059000
heap
page read and write
21E3107D000
heap
page read and write
168E8E40000
heap
page read and write
28A10C75000
heap
page read and write
21E31A70000
heap
page read and write
21E31AE5000
heap
page read and write
21E31A48000
heap
page read and write
28A11400000
heap
page read and write
487000
heap
page read and write
193B6FA000
stack
page read and write
21E319AB000
heap
page read and write
234392AA000
heap
page read and write
18FD0F13000
heap
page read and write
21E3138B000
heap
page read and write
25AF000
stack
page read and write
324A0000
direct allocation
page read and write
21E319AE000
heap
page read and write
21E32159000
heap
page read and write
5EC000
unkown
page execute read
942749B000
stack
page read and write
43A000
unkown
page readonly
618000
heap
page read and write
230B9F60000
heap
page read and write
21E31934000
heap
page read and write
230B9F32000
heap
page read and write
230B9F6F000
heap
page read and write
160DD861000
heap
page read and write
21E3201D000
heap
page read and write
19820EAA000
heap
page read and write
18FD0C40000
heap
page read and write
1B2C8D13000
heap
page read and write
230BA480000
remote allocation
page read and write
735D0000
unkown
page readonly
29991717000
heap
page read and write
21E32280000
heap
page read and write
21E3208F000
heap
page read and write
916E4FF000
stack
page read and write
21E31A44000
heap
page read and write
21E31A52000
heap
page read and write
21E31A7D000
heap
page read and write
21E3102C000
heap
page read and write
21E31002000
heap
page read and write
21E31A63000
heap
page read and write
21E31093000
heap
page read and write
21E31AD3000
heap
page read and write
21E31AEA000
heap
page read and write
21E32056000
heap
page read and write
2999169D000
heap
page read and write
230B9F2C000
heap
page read and write
1DF8A790000
trusted library allocation
page read and write
21E31A51000
heap
page read and write
21E31A02000
heap
page read and write
230B9F2E000
heap
page read and write
21E32112000
heap
page read and write
21E319E9000
heap
page read and write
21E31A98000
heap
page read and write
230B95A0000
trusted library allocation
page read and write
21E30FFA000
heap
page read and write
1B2C8C00000
heap
page read and write
1DF8A893000
heap
page read and write
409000
unkown
page write copy
232F000
heap
page read and write
21E31A02000
heap
page read and write
21E31A7A000
heap
page read and write
21E319F4000
heap
page read and write
230B9F60000
heap
page read and write
21E31A64000
heap
page read and write
21E3108B000
heap
page read and write
21E32153000
heap
page read and write
21E3204D000
heap
page read and write
410F27C000
stack
page read and write
1DF8A88C000
heap
page read and write
21E32028000
heap
page read and write
21E319E6000
heap
page read and write
445467F000
stack
page read and write
21E30FFA000
heap
page read and write
3247D000
stack
page read and write
21E32150000
heap
page read and write
209BC854000
heap
page read and write
23439258000
heap
page read and write
18FD1785000
heap
page read and write
21E31FB0000
remote allocation
page read and write
3330000
direct allocation
page execute and read and write
230B9F70000
heap
page read and write
21E31AF4000
heap
page read and write
21E31A98000
heap
page read and write
21E319D0000
heap
page read and write
21E31AB6000
heap
page read and write
21E31A96000
heap
page read and write
230B9F2B000
heap
page read and write
18FD17A5000
heap
page read and write
23439243000
heap
page read and write
21E31A61000
heap
page read and write
21E319CB000
heap
page read and write
21E31AD3000
heap
page read and write
209BC8CF000
heap
page read and write
21E31A57000
heap
page read and write
21E3205D000
heap
page read and write
209BC8CC000
heap
page read and write
230B9F88000
heap
page read and write
299915A0000
unclassified section
page readonly
29991490000
heap
page read and write
230B9F29000
heap
page read and write
21E31AAA000
heap
page read and write
D74747E000
stack
page read and write
21E31B0C000
heap
page read and write
32490000
direct allocation
page read and write
21E32045000
heap
page read and write
168E90D0000
heap
page read and write
21E32159000
heap
page read and write
32180000
heap
page read and write
21E322E5000
heap
page read and write
230B968F000
heap
page read and write
21E31AE4000
heap
page read and write
21E31AA1000
heap
page read and write
32490000
direct allocation
page read and write
1DF8A5C0000
heap
page read and write
21E31A7D000
heap
page read and write
43A000
unkown
page readonly
19820E51000
heap
page read and write
23439287000
heap
page read and write
21E31A61000
heap
page read and write
2999167E000
heap
page read and write
21E3199B000
heap
page read and write
735D1000
unkown
page execute read
29991640000
heap
page read and write
230B9F7D000
heap
page read and write
401000
unkown
page execute read
21E31A02000
heap
page read and write
230BA6A9000
heap
page read and write
21E319D0000
heap
page read and write
160DD82B000
heap
page read and write
21E3200C000
heap
page read and write
21E31A61000
heap
page read and write
230B9682000
heap
page read and write
3240000
heap
page read and write
21E319E9000
heap
page read and write
32490000
direct allocation
page read and write
21E31A58000
heap
page read and write
32480000
direct allocation
page read and write
230B9F70000
heap
page read and write
21E31FEE000
heap
page read and write
21E31AF2000
heap
page read and write
1B2C8890000
heap
page read and write
21E31092000
heap
page read and write
168E8E56000
heap
page read and write
21E320B3000
heap
page read and write
21E31AA1000
heap
page read and write
2343922B000
heap
page read and write
21E31AA1000
heap
page read and write
421000
unkown
page read and write
21E31A40000
heap
page read and write
28A10C9D000
heap
page read and write
1F31FFE000
stack
page read and write
230BA480000
remote allocation
page read and write
230B9F70000
heap
page read and write
21E31A68000
heap
page read and write
21E31AC0000
heap
page read and write
21E319BA000
heap
page read and write
21E319E4000
heap
page read and write
21E31389000
heap
page read and write
21E31AF2000
heap
page read and write
324A0000
direct allocation
page read and write
21E3200E000
heap
page read and write
21E31A89000
heap
page read and write
21E319CB000
heap
page read and write
21E32048000
heap
page read and write
160DD889000
heap
page read and write
21E31A52000
heap
page read and write
209BC8D3000
heap
page read and write
649000
unkown
page execute read
21E31A98000
heap
page read and write
29991702000
heap
page read and write
29991728000
heap
page read and write
160DD7C0000
heap
page read and write
2343925C000
heap
page read and write
21E3138B000
heap
page read and write
324A0000
direct allocation
page read and write
21E319F7000
heap
page read and write
5DE000
stack
page read and write
21E31A4B000
heap
page read and write
2889AD70000
heap
page read and write
21E319D0000
heap
page read and write
21E31AA1000
heap
page read and write
21E31A4B000
heap
page read and write
230B9678000
heap
page read and write
21E31AE4000
heap
page read and write
23DE000
stack
page read and write
21E31B0D000
heap
page read and write
21E3206C000
heap
page read and write
32490000
direct allocation
page read and write
21E31070000
heap
page read and write
21E31A73000
heap
page read and write
21E32021000
heap
page read and write
401000
unkown
page execute read
168E8E00000
heap
page read and write
19820E84000
heap
page read and write
160DD879000
heap
page read and write
21E322C9000
heap
page read and write
21E31A7B000
heap
page read and write
209BC861000
heap
page read and write
21E31A5E000
heap
page read and write
21E31A31000
heap
page read and write
21E30FC8000
heap
page read and write
21E310AB000
heap
page read and write
21E320F2000
heap
page read and write
1F31B7F000
stack
page read and write
32490000
direct allocation
page read and write
19A000
stack
page read and write
21E3204D000
heap
page read and write
18FD1753000
heap
page read and write
19820EAA000
heap
page read and write
21E3204D000
heap
page read and write
168E8E13000
heap
page read and write
324A0000
direct allocation
page read and write
168E8E32000
heap
page read and write
21E319F5000
heap
page read and write
21E3210A000
heap
page read and write
21E31A6D000
heap
page read and write
18FD0F02000
heap
page read and write
1B2C8D13000
heap
page read and write
2999169E000
heap
page read and write
916E6FE000
stack
page read and write
21E31ACA000
heap
page read and write
21E31AEF000
heap
page read and write
21E319F4000
heap
page read and write
44D1DFF000
stack
page read and write
28A10C82000
heap
page read and write
2310000
heap
page read and write
21E319AB000
heap
page read and write
60000
direct allocation
page read and write
2343925D000
heap
page read and write
160DD760000
heap
page read and write
230B9F7D000
heap
page read and write
21E320A8000
heap
page read and write
21E3205D000
heap
page read and write
21E31A49000
heap
page read and write
1BD51240000
heap
page read and write
325DF000
stack
page read and write
230B9F50000
heap
page read and write
21E31AEA000
heap
page read and write
21E31290000
trusted library allocation
page read and write
21E31A94000
heap
page read and write
21E32008000
heap
page read and write
19820E73000
heap
page read and write
230B973B000
heap
page read and write
3330000
trusted library allocation
page read and write
21E31A44000
heap
page read and write
230B9F92000
heap
page read and write
230B9613000
heap
page read and write
1B2C8D02000
heap
page read and write
21E322C9000
heap
page read and write
21E3204D000
heap
page read and write
610000
heap
page read and write
230B9F7C000
heap
page read and write
1660000
remote allocation
page execute and read and write
1B2C8C13000
heap
page read and write
193AF4B000
stack
page read and write
230B9F50000
heap
page read and write
2889AE5E000
heap
page read and write
160DE202000
heap
page read and write
324A0000
direct allocation
page read and write
21E31AC2000
heap
page read and write
21E319FD000
heap
page read and write
21E31A73000
heap
page read and write
230B9F61000
heap
page read and write
21E31AE5000
heap
page read and write
21E31A59000
heap
page read and write
2343926B000
heap
page read and write
18FD178B000
heap
page read and write
21E319F4000
heap
page read and write
230B9F6B000
heap
page read and write
21E319F9000
heap
page read and write
21E31A4B000
heap
page read and write
21E310BD000
heap
page read and write
21E31190000
heap
page read and write
21E319E4000
heap
page read and write
18FD0F02000
heap
page read and write
21E319D0000
heap
page read and write
652000
heap
page read and write
18FD1736000
heap
page read and write
21E31A44000
heap
page read and write
21E3203B000
heap
page read and write
230B9F29000
heap
page read and write
32490000
direct allocation
page read and write
21E31A78000
heap
page read and write
2B9347C000
stack
page read and write
21E322E5000
heap
page read and write
209BC902000
heap
page read and write
18FD1732000
heap
page read and write
230BA67C000
heap
page read and write
21E31A31000
heap
page read and write
21E319BA000
heap
page read and write
230B9F0F000
heap
page read and write
21BC000
remote allocation
page execute and read and write
22A0000
heap
page read and write
21E3108C000
heap
page read and write
193B4FE000
stack
page read and write
322CE000
stack
page read and write
21E31092000
heap
page read and write
21E31957000
heap
page read and write
230B9F95000
heap
page read and write
21E30F60000
heap
page read and write
160DD880000
heap
page read and write
2999166F000
heap
page read and write
445497D000
stack
page read and write
21E31ACC000
heap
page read and write
230B972B000
heap
page read and write
21E31FEC000
heap
page read and write
21E319F4000
heap
page read and write
21E319D0000
heap
page read and write
21E31A39000
heap
page read and write
160DD8C1000
heap
page read and write
230B9F76000
heap
page read and write
21E31A48000
heap
page read and write
230B96BC000
heap
page read and write
23439263000
heap
page read and write
160DD88D000
heap
page read and write
230B96B8000
heap
page read and write
1B2C8A00000
unkown
page read and write
230B9F76000
heap
page read and write
21E3107E000
heap
page read and write
3206E000
stack
page read and write
21E3208F000
heap
page read and write
19820CB0000
heap
page read and write
21E32147000
heap
page read and write
5EE000
unkown
page execute read
209BC8D7000
heap
page read and write
21E31A54000
heap
page read and write
2889AE54000
heap
page read and write
160DE215000
heap
page read and write
21E319F1000
heap
page read and write
28A10D13000
heap
page read and write
2343926C000
heap
page read and write
21E320E6000
heap
page read and write
1B2C8C02000
heap
page read and write
230B972B000
heap
page read and write
21E32059000
heap
page read and write
21E31A60000
heap
page read and write
21E3204D000
heap
page read and write
324A0000
direct allocation
page read and write
21E319F9000
heap
page read and write
9BC9F7E000
stack
page read and write
21E32009000
heap
page read and write
21E319F4000
heap
page read and write
21E3195D000
heap
page read and write
28A10C60000
heap
page read and write
21E319BA000
heap
page read and write
209BC8D3000
heap
page read and write
21E320F2000
heap
page read and write
28A10C8C000
heap
page read and write
17BC000
remote allocation
page execute and read and write
21E31931000
heap
page read and write
21E31A6D000
heap
page read and write
324A0000
direct allocation
page read and write
21E3208F000
heap
page read and write
28E8000
heap
page read and write
209BC800000
heap
page read and write
21E3206C000
heap
page read and write
324A0000
direct allocation
page read and write
21E319FD000
heap
page read and write
209BC8D3000
heap
page read and write
21E32284000
heap
page read and write
19820D60000
unclassified section
page readonly
23439C02000
trusted library allocation
page read and write
19820EA7000
heap
page read and write
21E31A81000
heap
page read and write
324A0000
direct allocation
page read and write
230B9F2B000
heap
page read and write
230B9F5A000
heap
page read and write
230B9F5A000
heap
page read and write
168E8E02000
heap
page read and write
28E3000
heap
page read and write
1B2C8B40000
heap
page read and write
21E319D0000
heap
page read and write
230B9F29000
heap
page read and write
160DD800000
heap
page read and write
29991600000
heap
page read and write
21E31AF3000
heap
page read and write
21E31AEF000
heap
page read and write
D7470CB000
stack
page read and write
21E310BA000
heap
page read and write
21E319E4000
heap
page read and write
21E3203B000
heap
page read and write
21E31993000
heap
page read and write
230B9F7B000
heap
page read and write
230B9F95000
heap
page read and write
21E31A51000
heap
page read and write
19820E66000
heap
page read and write
21E32000000
heap
page read and write
2889AE26000
heap
page read and write
1F31EFB000
stack
page read and write
160DD902000
heap
page read and write
21E31B0D000
heap
page read and write
230B9713000
heap
page read and write
21E319F9000
heap
page read and write
21E31AD0000
heap
page read and write
1B2C8A13000
unkown
page read and write
21E31ACA000
heap
page read and write
230B9F95000
heap
page read and write
410F57E000
stack
page read and write
168E8DB0000
heap
page read and write
21E31A49000
heap
page read and write
21E319BA000
heap
page read and write
209BC8D3000
heap
page read and write
21E32049000
heap
page read and write
21E32315000
heap
page read and write
168E9802000
trusted library allocation
page read and write
230BA60B000
heap
page read and write
209BC7A0000
heap
page read and write
23439AC0000
trusted library allocation
page read and write
1DF8A88F000
heap
page read and write
21E31380000
heap
page read and write
21E319F7000
heap
page read and write
21E31A02000
heap
page read and write
21E32101000
heap
page read and write
21E31AB6000
heap
page read and write
21E319EB000
heap
page read and write
230B9600000
heap
page read and write
168E8E4F000
heap
page read and write
21E3138B000
heap
page read and write
168E8E4A000
heap
page read and write
29993550000
remote allocation
page read and write
21E319D0000
heap
page read and write
21E31099000
heap
page read and write
21E322C3000
heap
page read and write
160DD86D000
heap
page read and write
28E6000
heap
page read and write
21E319ED000
heap
page read and write
209BC8B3000
heap
page read and write
209BC8B7000
heap
page read and write
168E8E59000
heap
page read and write
21E3108F000
heap
page read and write
21E31A96000
heap
page read and write
230B9F2F000
heap
page read and write
21E31A3D000
heap
page read and write
21E31A8A000
heap
page read and write
32490000
direct allocation
page read and write
209BC8D8000
heap
page read and write
22A5000
heap
page read and write
21E31AF4000
heap
page read and write
168E8E5D000
heap
page read and write
21E31A61000
heap
page read and write
21E310BC000
heap
page read and write
21E31A78000
heap
page read and write
23439265000
heap
page read and write
22A8000
heap
page read and write
21E31958000
heap
page read and write
21E3108C000
heap
page read and write
21E320A1000
heap
page read and write
21E32059000
heap
page read and write
410F47F000
stack
page read and write
1BD51140000
heap
page read and write
21E31FEE000
heap
page read and write
21E310BD000
heap
page read and write
19820E13000
heap
page read and write
1BD51176000
heap
page read and write
30000
heap
page read and write
209BC813000
heap
page read and write
436000
unkown
page readonly
21E319F1000
heap
page read and write
18FD0F02000
heap
page read and write
23439232000
heap
page read and write
21E31AE7000
heap
page read and write
168E8E54000
heap
page read and write
21E32159000
heap
page read and write
209BC900000
heap
page read and write
21E32021000
heap
page read and write
28A10C13000
heap
page read and write
230B9690000
heap
page read and write
160DDAD0000
unclassified section
page readonly
230B968C000
heap
page read and write
21E31A23000
heap
page read and write
21E3200B000
heap
page read and write
21E319D0000
heap
page read and write
21E31A0A000
heap
page read and write
There are 1558 hidden memdumps, click here to show them.