IOC Report
click.wsf

loading gif

Files

File Path
Type
Category
Malicious
click.wsf
HTML document, ASCII text, with very long lines (792), with CRLF line terminators
initial sample
malicious
C:\Users\user\Desktop\click.wsf
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\Desktop\rad1F9A4.tmp.dll
HTML document, ASCII text
dropped
malicious
C:\Users\user\Desktop\rad75349.tmp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\BlUwZJEPejvMeG\xhwdmo.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 62582 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_13929_20386-20230320T0906180748-804.etl
old-fs dump file (16-bit, assuming PDP-11 endianness), Previous dump Thu Jan 1 01:07:36 1970, This dump Thu Jan 1 01:09:04 1970,
modified
C:\Users\user\Documents\Outlook Files\Outlook Data File - NoEmail.pst
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\click.wsf"
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe" "C:\Users\user\Desktop\rad75349.tmp.dll
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\BlUwZJEPejvMeG\xhwdmo.dll"
malicious
C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE
"C:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE" /PIM NoEmail

URLs

Name
IP
Malicious
http://wrappixels.co
unknown
malicious
http://softwareulike.com/cWIYxWMPkK/
unknown
malicious
https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/
31.31.196.172
malicious
http://ozmeydan.com/cekici/9/
unknown
malicious
https://www.gomespontes.com.br/logs/pd/
186.202.153.5
malicious
https://www.gomespontes.com.br/
unknown
malicious
https://164.90.222.65/wfqhlvcfruxkwghn/ivirkxueekmcz/
164.90.222.65
malicious
https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/uM
unknown
malicious
https://penshorn.org/admin/Ses8712iGR8du/
203.26.41.131
malicious
http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/
unknown
malicious
https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/
unknown
malicious
https://bbvoyage.com/useragreement/ElKHvb4QIQqSrh6Hqm/476
unknown
malicious
http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/H#K#0
unknown
https://160.16.142.56:8080/M
unknown
https://160.16.142.56:8080/wfqhlvcfruxkwghn/ivirkxueekmcz/
unknown
https://187.63.160.88:80/wfqhlvcfruxkwghn/ivirkxueekmcz/VnX
unknown
https://66.228.32.31:7080/wfqhlvcfruxkwghn/ivirkxueekmcz/
unknown
https://91.121.146.47:8080/wfqhlvcfruxkwghn/ivirkxueekmcz/X
unknown
https://104.168.155.143:8080/Y
unknown
https://163.44.196.120:8080/wfqhlvcfruxkwghn/ivirkxueekmcz/bK
unknown
https://91.121.146.47:8080/
unknown
https://163.44.196.120:8080/
unknown
https://163.44.196.120:8080/wfqhlvcfruxkwghn/ivirkxueekmcz/z
unknown
https://www.gomespontes.com.br/logs/pd/vM
unknown
https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/cw34006
unknown
https://167.172.199.165:8080/l
unknown
https://167.172.199.165:8080/
unknown
https://91.121.146.47:8080/wfqhlvcfruxkwghn/ivirkxueekmcz/dllgz
unknown
https://187.63.160.88:80/wfqhlvcfruxkwghn/ivirkxueekmcz/
unknown
https://163.44.196.120:8080/wfqhlvcfruxkwghn/ivirkxueekmcz/
unknown
https://www.gomespontes.com.br/s
unknown
https://164.90.222.65/)
unknown
https://portalevolucao.com/GerarBoleto/fLIOoFbFs1jHtX/wM
unknown
https://160.16.142.56:8080/wfqhlvcfruxkwghn/ivirkxueekmcz//
unknown
https://penshorn.org/admin/Ses8712iGR8du/tM
unknown
https://104.168.155.143:8080/4
unknown
https://66.228.32.31:7080/wfqhlvcfruxkwghn/ivirkxueekmcz/.DLL
unknown
http://softwareulike.com/cWIYxWMPkK/yM
unknown
https://167.172.199.165:8080/wfqhlvcfruxkwghn/ivirkxueekmcz/
unknown
https://104.168.155.143:8080/wfqhlvcfruxkwghn/ivirkxueekmcz/
unknown
http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/dll
unknown
http://ozmeydan.com/cekici/9/xM
unknown
https://104.168.155.143:8080/P
unknown
https://www.gomespontes.com.br/logs/pd/l
unknown
https://104.168.155.143:8080/
unknown
http://wrappixels.com/wp-admin/GdIA2oOQEiO5G/zM
unknown
https://160.16.142.56:8080/
unknown
https://91.121.146.47:8080/wfqhlvcfruxkwghn/ivirkxueekmcz/
unknown
https://penshorn.org/admin/Ses8712iGR8du/95DC4.tmp.dll(
unknown
https://www.gomespontes.com.br/logs/pd/0w
unknown
http://softwareulike.com/cWIYxWMPkK/_
unknown
https://160.16.142.56:8080/)
unknown
There are 42 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bbvoyage.com
31.31.196.172
malicious
gomespontes.com.br
186.202.153.5
malicious
penshorn.org
203.26.41.131
malicious
www.gomespontes.com.br
unknown
malicious

IPs

IP
Domain
Country
Malicious
110.232.117.186
unknown
Australia
malicious
103.132.242.26
unknown
India
malicious
104.168.155.143
unknown
United States
malicious
79.137.35.198
unknown
France
malicious
115.68.227.76
unknown
Korea Republic of
malicious
163.44.196.120
unknown
Singapore
malicious
206.189.28.199
unknown
United States
malicious
31.31.196.172
bbvoyage.com
Russian Federation
malicious
186.202.153.5
gomespontes.com.br
Brazil
malicious
203.26.41.131
penshorn.org
Australia
malicious
107.170.39.149
unknown
United States
malicious
66.228.32.31
unknown
United States
malicious
197.242.150.244
unknown
South Africa
malicious
185.4.135.165
unknown
Greece
malicious
183.111.227.137
unknown
Korea Republic of
malicious
45.176.232.124
unknown
Colombia
malicious
169.57.156.166
unknown
United States
malicious
164.68.99.3
unknown
Germany
malicious
139.59.126.41
unknown
Singapore
malicious
167.172.253.162
unknown
United States
malicious
167.172.199.165
unknown
United States
malicious
202.129.205.3
unknown
Thailand
malicious
147.139.166.154
unknown
United States
malicious
153.92.5.27
unknown
Germany
malicious
159.65.88.10
unknown
United States
malicious
172.105.226.75
unknown
United States
malicious
164.90.222.65
unknown
United States
malicious
213.239.212.5
unknown
Germany
malicious
5.135.159.50
unknown
France
malicious
186.194.240.217
unknown
Brazil
malicious
119.59.103.152
unknown
Thailand
malicious
159.89.202.34
unknown
United States
malicious
91.121.146.47
unknown
France
malicious
160.16.142.56
unknown
Japan
malicious
201.94.166.162
unknown
Brazil
malicious
91.207.28.33
unknown
Kyrgyzstan
malicious
103.75.201.2
unknown
Thailand
malicious
103.43.75.120
unknown
Japan
malicious
188.44.20.25
unknown
Macedonia
malicious
45.235.8.30
unknown
Brazil
malicious
153.126.146.25
unknown
Japan
malicious
72.15.201.15
unknown
United States
malicious
187.63.160.88
unknown
Brazil
malicious
82.223.21.224
unknown
Spain
malicious
173.212.193.249
unknown
Germany
malicious
95.217.221.146
unknown
Germany
malicious
149.56.131.28
unknown
Canada
malicious
182.162.143.56
unknown
Korea Republic of
malicious
1.234.2.232
unknown
Korea Republic of
malicious
129.232.188.93
unknown
South Africa
malicious
94.23.45.86
unknown
France
malicious
52.109.13.63
unknown
United States
192.229.221.95
unknown
United States
52.109.76.141
unknown
United States
There are 44 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\Settings\Data
global_Accessibility_ReminderType
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Profiles\NoEmail\9207f3e0a3b11019908b08002b2a56c2
11023d05
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{AA8FA310-0939-4CE3-B9BB-AE05B2695110}
5
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{AA8FA310-0939-4CE3-B9BB-AE05B2695110}
Categories
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{691E1C12-2693-4D4A-852C-7478657BBE6E}
255
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{691E1C12-2693-4D4A-852C-7478657BBE6E}
Categories
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{287BF315-5A11-4B2F-B069-B761ADE25A49}
4
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{287BF315-5A11-4B2F-B069-B761ADE25A49}
Categories
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{6B6B571B-F4E3-4FBB-A83F-0790D11D19AB}
255
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{6B6B571B-F4E3-4FBB-A83F-0790D11D19AB}
Categories
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{284B8D30-4AA6-4A0F-9143-CE2E8E1F10F0}
255
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{284B8D30-4AA6-4A0F-9143-CE2E8E1F10F0}
Categories
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{F762CE39-AC6C-4E1C-B55F-0E11586E6D07}
5
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{F762CE39-AC6C-4E1C-B55F-0E11586E6D07}
Categories
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{02CAC15F-D4BE-400E-9127-D54982AA4AE9}
5
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{02CAC15F-D4BE-400E-9127-D54982AA4AE9}
Categories
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{11ADBD74-7DF2-4E8E-802B-B3BCBFD04A78}
5
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{11ADBD74-7DF2-4E8E-802B-B3BCBFD04A78}
Categories
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{02FD33DF-F746-4A10-93A0-2BC6273BC8E4}
4
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{02FD33DF-F746-4A10-93A0-2BC6273BC8E4}
Categories
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{13967EE5-6B23-4BCD-A496-1D788449A8CF}
4
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{13967EE5-6B23-4BCD-A496-1D788449A8CF}
Categories
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ULSMonitor
ULSTagIds0
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ULSMonitor
ULSCategoriesSeverities
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{AA8FA310-0939-4CE3-B9BB-AE05B2695110}
5
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{AA8FA310-0939-4CE3-B9BB-AE05B2695110}
Categories
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{691E1C12-2693-4D4A-852C-7478657BBE6E}
255
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{691E1C12-2693-4D4A-852C-7478657BBE6E}
Categories
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{287BF315-5A11-4B2F-B069-B761ADE25A49}
4
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{287BF315-5A11-4B2F-B069-B761ADE25A49}
Categories
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{6B6B571B-F4E3-4FBB-A83F-0790D11D19AB}
255
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{6B6B571B-F4E3-4FBB-A83F-0790D11D19AB}
Categories
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{284B8D30-4AA6-4A0F-9143-CE2E8E1F10F0}
255
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{284B8D30-4AA6-4A0F-9143-CE2E8E1F10F0}
Categories
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{F762CE39-AC6C-4E1C-B55F-0E11586E6D07}
5
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{F762CE39-AC6C-4E1C-B55F-0E11586E6D07}
Categories
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{02CAC15F-D4BE-400E-9127-D54982AA4AE9}
5
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{02CAC15F-D4BE-400E-9127-D54982AA4AE9}
Categories
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{11ADBD74-7DF2-4E8E-802B-B3BCBFD04A78}
5
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{11ADBD74-7DF2-4E8E-802B-B3BCBFD04A78}
Categories
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{02FD33DF-F746-4A10-93A0-2BC6273BC8E4}
4
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{02FD33DF-F746-4A10-93A0-2BC6273BC8E4}
Categories
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{13967EE5-6B23-4BCD-A496-1D788449A8CF}
4
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ETWMonitor\{13967EE5-6B23-4BCD-A496-1D788449A8CF}
Categories
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ULSMonitor
ULSTagIds0
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\outlook.exe\ULSMonitor
ULSCategoriesSeverities
HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\Settings
Accounts
HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\Settings\Data
global_AccountsNeedResyncing
There are 38 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
731000
direct allocation
page execute read
malicious
C99000
heap
page read and write
malicious
460000
direct allocation
page execute and read and write
malicious
2D8463EE000
heap
page read and write
2F81000
heap
page read and write
760000
trusted library allocation
page read and write
2D845CDD000
heap
page read and write
2D84626F000
heap
page read and write
2D846412000
heap
page read and write
2D845E4E000
heap
page read and write
1F8B000
stack
page read and write
1EF87080000
heap
page read and write
D4B000
heap
page read and write
2D8462D5000
heap
page read and write
2D846610000
heap
page read and write
2D846747000
heap
page read and write
2D845C7D000
heap
page read and write
2D845D02000
heap
page read and write
180021000
unkown
page read and write
2D846297000
heap
page read and write
2FD1000
heap
page read and write
2EDD000
heap
page read and write
2D843FB1000
heap
page read and write
2D845E71000
heap
page read and write
2D846545000
heap
page read and write
2D843D10000
heap
page read and write
3018000
heap
page read and write
2D845CD6000
heap
page read and write
2EEC000
heap
page read and write
2FA9000
heap
page read and write
2D8464BA000
heap
page read and write
289C000
stack
page read and write
2D84619E000
heap
page read and write
2D846702000
heap
page read and write
2D84631A000
heap
page read and write
2D845920000
heap
page read and write
2D8462B3000
heap
page read and write
CF6000
heap
page read and write
2D846674000
heap
page read and write
D17000
heap
page read and write
2D84658E000
heap
page read and write
2D84613E000
heap
page read and write
CCF000
heap
page read and write
2D84678E000
heap
page read and write
2D843FCB000
heap
page read and write
2D8462DD000
heap
page read and write
2D84677F000
heap
page read and write
2D84653C000
heap
page read and write
2D846461000
heap
page read and write
2D843F89000
heap
page read and write
2D845E4A000
heap
page read and write
2D845DFA000
heap
page read and write
23CE000
stack
page read and write
D78000
heap
page read and write
2D846613000
heap
page read and write
2EE2000
heap
page read and write
2D8460C7000
heap
page read and write
2D845D52000
heap
page read and write
2D845DF6000
heap
page read and write
2ED6000
heap
page read and write
2D846828000
heap
page read and write
2D845ED2000
heap
page read and write
2D843FAC000
heap
page read and write
2D8463EE000
heap
page read and write
2D8466E9000
heap
page read and write
2D845D1B000
heap
page read and write
F35BCFE000
stack
page read and write
1EF86FA0000
trusted library allocation
page read and write
C88DEFE000
stack
page read and write
3018000
heap
page read and write
2D84402E000
heap
page read and write
C88DBEB000
stack
page read and write
4A0000
heap
page read and write
2D846100000
heap
page read and write
2D8466C5000
heap
page read and write
2D843F91000
heap
page read and write
D15000
heap
page read and write
2D8465A0000
heap
page read and write
2D8466F1000
heap
page read and write
EAB000
direct allocation
page read and write
2D845CCE000
heap
page read and write
2D846564000
heap
page read and write
1DA0000
trusted library allocation
page read and write
2D846012000
heap
page read and write
D77000
heap
page read and write
2D846717000
heap
page read and write
CD4000
heap
page read and write
1EF87064000
heap
page read and write
2F33000
heap
page read and write
2D84666F000
heap
page read and write
D62000
heap
page read and write
3018000
heap
page read and write
2D843FAD000
heap
page read and write
2D8460A0000
heap
page read and write
2D84600D000
heap
page read and write
2D845EB1000
heap
page read and write
2D845CDC000
heap
page read and write
2D846241000
heap
page read and write
2D843F86000
heap
page read and write
2D845C70000
heap
page read and write
180023000
unkown
page readonly
2D8467B0000
heap
page read and write
180021000
unkown
page read and write
2D845F4D000
heap
page read and write
2D845F35000
heap
page read and write
2D846291000
heap
page read and write
2D845EB5000
heap
page read and write
2D846065000
heap
page read and write
D04000
heap
page read and write
2D845CEF000
heap
page read and write
2D8468AE000
heap
page read and write
2D845E94000
heap
page read and write
2D845CB3000
heap
page read and write
ED7000
trusted library allocation
page read and write
2D84656F000
heap
page read and write
2E86000
heap
page read and write
2D845CCE000
heap
page read and write
2D845E6C000
heap
page read and write
2D8464BB000
heap
page read and write
2D846118000
heap
page read and write
2D845FF4000
heap
page read and write
2D846395000
heap
page read and write
291E000
stack
page read and write
2D8461BE000
heap
page read and write
2D8463C0000
heap
page read and write
2D846817000
heap
page read and write
2D843F0E000
heap
page read and write
2D845E4A000
heap
page read and write
CD9000
heap
page read and write
2D845EFA000
heap
page read and write
2D846631000
heap
page read and write
ED0000
trusted library allocation
page read and write
2D846703000
heap
page read and write
2D846570000
heap
page read and write
2D846658000
heap
page read and write
2D845D4E000
heap
page read and write
244F000
stack
page read and write
2D845D4E000
heap
page read and write
D4F000
heap
page read and write
2D84651F000
heap
page read and write
2D843FF2000
heap
page read and write
2D845C83000
heap
page read and write
CF3000
heap
page read and write
2D846395000
heap
page read and write
2D846198000
heap
page read and write
2D845F13000
heap
page read and write
D37000
heap
page read and write
2D8464E3000
heap
page read and write
D51000
heap
page read and write
2D845DD4000
heap
page read and write
2D844026000
heap
page read and write
2ECD000
heap
page read and write
2D845CF2000
heap
page read and write
2EE8000
heap
page read and write
C88E0FB000
stack
page read and write
2D845EF6000
heap
page read and write
2D846461000
heap
page read and write
2D846379000
heap
page read and write
2D846780000
heap
page read and write
2D843FB0000
heap
page read and write
CE8000
heap
page read and write
2D843F0A000
heap
page read and write
2D84621A000
heap
page read and write
C88E2F7000
stack
page read and write
2D8466B2000
heap
page read and write
2D84660A000
heap
page read and write
2D84680C000
heap
page read and write
2D8465AA000
heap
page read and write
2D845DD0000
heap
page read and write
2E5B000
stack
page read and write
2EDF000
heap
page read and write
D17000
heap
page read and write
2D8463F5000
heap
page read and write
450000
direct allocation
page execute and read and write
291A000
stack
page read and write
2D845FB2000
heap
page read and write
2D8462DC000
heap
page read and write
2D846395000
heap
page read and write
2D5D000
stack
page read and write
2D846708000
heap
page read and write
2D8463DC000
heap
page read and write
2D845E6C000
heap
page read and write
2D845DF0000
heap
page read and write
2D8466CF000
heap
page read and write
2D845EF6000
heap
page read and write
2D84617E000
heap
page read and write
CFB000
heap
page read and write
2D845F18000
heap
page read and write
2D845D1B000
heap
page read and write
2D845D75000
heap
page read and write
2D845DB4000
heap
page read and write
C88E4FE000
stack
page read and write
2D8460D9000
heap
page read and write
2D84649E000
heap
page read and write
2D844019000
heap
page read and write
2EEB000
heap
page read and write
EC0000
trusted library allocation
page read and write
2D845D51000
heap
page read and write
D04000
heap
page read and write
2D845F52000
heap
page read and write
2D8460F8000
heap
page read and write
2D845CEA000
heap
page read and write
1EF87058000
heap
page read and write
2D84682D000
heap
page read and write
C8B000
heap
page read and write
2D84670D000
heap
page read and write
2D845C98000
heap
page read and write
2D845C87000
heap
page read and write
2D8466ED000
heap
page read and write
2D84656D000
heap
page read and write
2D844016000
heap
page read and write
730000
direct allocation
page read and write
2D845E16000
heap
page read and write
2D845D52000
heap
page read and write
2D84603E000
heap
page read and write
2D8460DE000
heap
page read and write
2D846469000
heap
page read and write
2D846658000
heap
page read and write
2D845CFA000
heap
page read and write
2D845E32000
heap
page read and write
2D8461DE000
heap
page read and write
2D845F58000
heap
page read and write
2D84602C000
heap
page read and write
2D845F7B000
heap
page read and write
20000
heap
page read and write
D30000
heap
page read and write
2D846241000
heap
page read and write
2D846482000
heap
page read and write
2DDE000
stack
page read and write
2D84615E000
heap
page read and write
2D8466F7000
heap
page read and write
2D845D4E000
heap
page read and write
2D845F7B000
heap
page read and write
2D8468A4000
heap
page read and write
2D8461B8000
heap
page read and write
CE6000
heap
page read and write
2D8465E8000
heap
page read and write
2D845C71000
heap
page read and write
D6A000
heap
page read and write
2D845FB7000
heap
page read and write
D68000
heap
page read and write
2EE8000
heap
page read and write
D0D000
heap
page read and write
DB000
stack
page read and write
2D84643D000
heap
page read and write
2D846694000
heap
page read and write
2D8461D8000
heap
page read and write
2D845C89000
heap
page read and write
CE0000
heap
page read and write
2D8462FE000
heap
page read and write
2D8468BE000
heap
page read and write
2ECF000
heap
page read and write
2D845EB1000
heap
page read and write
2D845C79000
heap
page read and write
910000
heap
page read and write
2D845CCE000
heap
page read and write
2007000
stack
page read and write
2D8460BF000
heap
page read and write
2D8463B8000
heap
page read and write
F10000
heap
page read and write
2D845CB3000
heap
page read and write
2D84656B000
heap
page read and write
2D843F60000
heap
page read and write
2D846579000
heap
page read and write
2D843FA0000
heap
page read and write
D38000
heap
page read and write
2D8460D9000
heap
page read and write
1EF87027000
heap
page read and write
2D845ECE000
heap
page read and write
2D845DB8000
heap
page read and write
D47000
heap
page read and write
2D845D1B000
heap
page read and write
2D845DB0000
heap
page read and write
2D8461D8000
heap
page read and write
2D846424000
heap
page read and write
2D846367000
heap
page read and write
2D84673D000
heap
page read and write
2D845DD4000
heap
page read and write
2D846811000
heap
page read and write
2D843FFC000
heap
page read and write
2D845C90000
heap
page read and write
2D84615E000
heap
page read and write
CF6000
heap
page read and write
2D84663B000
heap
page read and write
2D8465FA000
heap
page read and write
F35C1FB000
stack
page read and write
2D845EB5000
heap
page read and write
2D84401E000
heap
page read and write
2D84677F000
heap
page read and write
2D846470000
heap
page read and write
2D844029000
heap
page read and write
2D845DAB000
heap
page read and write
2D845CB3000
heap
page read and write
2D843FB7000
heap
page read and write
2FA7000
heap
page read and write
2D8467AB000
heap
page read and write
F15000
heap
page read and write
2D846547000
heap
page read and write
2D846181000
heap
page read and write
2D84672D000
heap
page read and write
2D8465D6000
heap
page read and write
2D8465FF000
heap
page read and write
2D846692000
heap
page read and write
F35C0FE000
stack
page read and write
2D8461FF000
heap
page read and write
2D846568000
heap
page read and write
2D8468D4000
heap
page read and write
2D846696000
heap
page read and write
2D845D06000
heap
page read and write
2D84648A000
heap
page read and write
1EF87802000
heap
page read and write
2D846298000
heap
page read and write
2D8464CC000
heap
page read and write
2D845EDE000
heap
page read and write
2D846082000
heap
page read and write
2D846503000
heap
page read and write
2D846541000
heap
page read and write
D78000
heap
page read and write
4AB000
heap
page read and write
1E0000
heap
page read and write
2D845E66000
heap
page read and write
2D843E70000
heap
page read and write
2D8465FA000
heap
page read and write
2D8466FC000
heap
page read and write
2D846541000
heap
page read and write
2D846711000
heap
page read and write
2D845CDA000
heap
page read and write
2D84680C000
heap
page read and write
2D846357000
heap
page read and write
2D845CCE000
heap
page read and write
D7B000
heap
page read and write
2D84654A000
heap
page read and write
2D846545000
heap
page read and write
D1F000
heap
page read and write
2D84634F000
heap
page read and write
2D84613E000
heap
page read and write
2E60000
heap
page read and write
2D845CB3000
heap
page read and write
2D84611E000
heap
page read and write
2D845E32000
heap
page read and write
2E61000
heap
page read and write
2D845CCE000
heap
page read and write
CF3000
heap
page read and write
75A000
direct allocation
page readonly
2D8464DC000
heap
page read and write
2D843F08000
heap
page read and write
2D845E94000
heap
page read and write
2D845E12000
heap
page read and write
2D843F05000
heap
page read and write
2D846829000
heap
page read and write
2D845FF3000
heap
page read and write
2D8466FF000
heap
page read and write
D79000
heap
page read and write
2D846821000
heap
page read and write
2D845E82000
heap
page read and write
2D8461D8000
heap
page read and write
D41000
heap
page read and write
2D843F0D000
heap
page read and write
2D845C7D000
heap
page read and write
2D846372000
heap
page read and write
D51000
heap
page read and write
2D846515000
heap
page read and write
2D843FB8000
heap
page read and write
2D84682C000
heap
page read and write
75B000
direct allocation
page read and write
D25000
heap
page read and write
2D846613000
heap
page read and write
CD9000
heap
page read and write
2D845CCF000
heap
page read and write
2D846547000
heap
page read and write
2D84405B000
heap
page read and write
2D845ECE000
heap
page read and write
2D846242000
heap
page read and write
2D84653F000
heap
page read and write
2D845ED9000
heap
page read and write
2D845F76000
heap
page read and write
2D845E4E000
heap
page read and write
2D845F35000
heap
page read and write
2D846817000
heap
page read and write
2D846058000
heap
page read and write
2D8460BF000
heap
page read and write
2D845FD5000
heap
page read and write
2D84605D000
heap
page read and write
2D846515000
heap
page read and write
2D846436000
heap
page read and write
2D845900000
remote allocation
page read and write
2D846568000
heap
page read and write
2D843F0C000
heap
page read and write
2790000
heap
page read and write
2D845FD0000
heap
page read and write
1EF87100000
heap
page read and write
D0A000
heap
page read and write
2D845D4F000
heap
page read and write
180001000
unkown
page execute read
2D846469000
heap
page read and write
2D84600D000
heap
page read and write
2F60000
heap
page read and write
2ED1000
heap
page read and write
2D8461F9000
heap
page read and write
2D8461DE000
heap
page read and write
CEB000
heap
page read and write
2D846276000
heap
page read and write
1EF87013000
heap
page read and write
F35BFFF000
stack
page read and write
2D84661F000
heap
page read and write
2D84645A000
heap
page read and write
2D84672F000
heap
page read and write
1EF87040000
heap
page read and write
2D845ED2000
heap
page read and write
2D8467A7000
heap
page read and write
2D846379000
heap
page read and write
2D846419000
heap
page read and write
C88E5FE000
stack
page read and write
D08000
heap
page read and write
CE5000
heap
page read and write
2D845D4E000
heap
page read and write
2D843F00000
heap
page read and write
F35BEFF000
stack
page read and write
CCB000
heap
page read and write
2D845F94000
heap
page read and write
2D845DF0000
heap
page read and write
2D845C75000
heap
page read and write
F35C2FD000
stack
page read and write
2EA5000
heap
page read and write
3165000
heap
page read and write
2D844026000
heap
page read and write
2D8467A1000
heap
page read and write
2EF3000
heap
page read and write
2D8462F7000
heap
page read and write
2D843FCC000
heap
page read and write
2D84609B000
heap
page read and write
2D8462BA000
heap
page read and write
1EF87800000
heap
page read and write
2D843E50000
heap
page read and write
490000
heap
page readonly
2D846321000
heap
page read and write
D08000
heap
page read and write
C80000
heap
page read and write
2D846817000
heap
page read and write
2D84639C000
heap
page read and write
2D84643D000
heap
page read and write
2D846220000
heap
page read and write
9CB000
stack
page read and write
2D846610000
heap
page read and write
2D8467AA000
heap
page read and write
2D843FFC000
heap
page read and write
2ECD000
heap
page read and write
2D846158000
heap
page read and write
2D8462BA000
heap
page read and write
2D845F7C000
heap
page read and write
2D843FA2000
heap
page read and write
2D845DFA000
heap
page read and write
D58000
heap
page read and write
2D845CEE000
heap
page read and write
2D845D0F000
heap
page read and write
2D845C75000
heap
page read and write
2D845E2E000
heap
page read and write
D4F000
heap
page read and write
2D846158000
heap
page read and write
2D845C7D000
heap
page read and write
1EF86F70000
heap
page read and write
2D8467BD000
heap
page read and write
D78000
heap
page read and write
2D845FEE000
heap
page read and write
D42000
heap
page read and write
D3D000
heap
page read and write
2ECF000
heap
page read and write
2D845E2E000
heap
page read and write
2D845C89000
heap
page read and write
2D845F7B000
heap
page read and write
2D8464E6000
heap
page read and write
2EE2000
heap
page read and write
2D845CE6000
heap
page read and write
CE0000
heap
page read and write
2D845CE3000
heap
page read and write
2D843F88000
heap
page read and write
2D846570000
heap
page read and write
2D844042000
heap
page read and write
2D8460FE000
heap
page read and write
2EE8000
heap
page read and write
2D84623B000
heap
page read and write
2D845900000
remote allocation
page read and write
2D846031000
heap
page read and write
2D846631000
heap
page read and write
2D845F1C000
heap
page read and write
2D846789000
heap
page read and write
2D845F35000
heap
page read and write
D0A000
heap
page read and write
2D843F07000
heap
page read and write
2D8462FE000
heap
page read and write
2D84634F000
heap
page read and write
2D84646B000
heap
page read and write
2D845CFE000
heap
page read and write
2D845D90000
heap
page read and write
2D846518000
heap
page read and write
2D84405C000
heap
page read and write
2D8463BF000
heap
page read and write
2D8466DB000
heap
page read and write
2D846372000
heap
page read and write
2D846058000
heap
page read and write
2D845EDE000
heap
page read and write
ED0000
trusted library allocation
page read and write
2D845E6C000
heap
page read and write
2D845E5F000
heap
page read and write
2D84646C000
heap
page read and write
2D84401E000
heap
page read and write
2D8460F8000
heap
page read and write
1F0E000
stack
page read and write
D04000
heap
page read and write
2D845D17000
heap
page read and write
2D845F5E000
heap
page read and write
2D8468BD000
heap
page read and write
2D846300000
heap
page read and write
2D8468C3000
heap
page read and write
F35C3FD000
stack
page read and write
2D8462C3000
heap
page read and write
1EF87113000
heap
page read and write
2D845DB7000
heap
page read and write
D02000
heap
page read and write
2D8465A0000
heap
page read and write
2D845D0B000
heap
page read and write
2D84403E000
heap
page read and write
1EF87102000
heap
page read and write
2D845C82000
heap
page read and write
2D845C7D000
heap
page read and write
2D84680F000
heap
page read and write
2D845F4D000
heap
page read and write
D3F000
heap
page read and write
2D8464DE000
heap
page read and write
2D846647000
heap
page read and write
2D84623B000
heap
page read and write
CEB000
heap
page read and write
1DA2000
trusted library allocation
page read and write
2D845E59000
heap
page read and write
2D843F0E000
heap
page read and write
2EE8000
heap
page read and write
2D845E98000
heap
page read and write
2D846436000
heap
page read and write
2D843FF9000
heap
page read and write
2D844042000
heap
page read and write
2D84653C000
heap
page read and write
400000
heap
page read and write
2D845D0A000
heap
page read and write
2D845E16000
heap
page read and write
2D8463BF000
heap
page read and write
24CC000
stack
page read and write
2D84682C000
heap
page read and write
2EE6000
heap
page read and write
2D846759000
heap
page read and write
C88E3F8000
stack
page read and write
2D8460A0000
heap
page read and write
2D846791000
heap
page read and write
2D845D7A000
heap
page read and write
2D84403E000
heap
page read and write
2D84603E000
heap
page read and write
2D845FB7000
heap
page read and write
2D846118000
heap
page read and write
CD0000
heap
page read and write
2D84401E000
heap
page read and write
2D845F5E000
heap
page read and write
2D845CCE000
heap
page read and write
2D845E4A000
heap
page read and write
2F61000
heap
page read and write
2D8466EE000
heap
page read and write
2D845FEE000
heap
page read and write
2D846734000
heap
page read and write
2D846725000
heap
page read and write
2D8465C8000
heap
page read and write
2D846825000
heap
page read and write
CE0000
heap
page read and write
2D84681E000
heap
page read and write
2D846321000
heap
page read and write
2D84671D000
heap
page read and write
2D84402E000
heap
page read and write
D65000
heap
page read and write
1EF87099000
heap
page read and write
2D8461FF000
heap
page read and write
2D845CCE000
heap
page read and write
2D846178000
heap
page read and write
2D84633D000
heap
page read and write
2D846178000
heap
page read and write
2FF8000
heap
page read and write
D1B000
heap
page read and write
2D84639C000
heap
page read and write
2D846220000
heap
page read and write
1EF86F10000
heap
page read and write
D47000
heap
page read and write
D58000
heap
page read and write
2D8462FE000
heap
page read and write
2D84625D000
heap
page read and write
CDB000
heap
page read and write
2D845F13000
heap
page read and write
2D844026000
heap
page read and write
2D84685B000
heap
page read and write
2D845D70000
heap
page read and write
2ECD000
heap
page read and write
2EDA000
heap
page read and write
2D846798000
heap
page read and write
2F0B000
heap
page read and write
1E00000
heap
page read and write
2D846613000
heap
page read and write
2EA4000
heap
page read and write
2D846291000
heap
page read and write
2D845900000
remote allocation
page read and write
2D845FBB000
heap
page read and write
2D8462DC000
heap
page read and write
2D846564000
heap
page read and write
2D846825000
heap
page read and write
2D845E65000
heap
page read and write
2D845DAF000
heap
page read and write
2D845F52000
heap
page read and write
2D845D13000
heap
page read and write
2D84602C000
heap
page read and write
2E87000
heap
page read and write
2D84658E000
heap
page read and write
2D846356000
heap
page read and write
D1B000
heap
page read and write
2D846784000
heap
page read and write
2D846298000
heap
page read and write
2D8461DE000
heap
page read and write
D0D000
heap
page read and write
2D846568000
heap
page read and write
2D845F18000
heap
page read and write
2D843FAA000
heap
page read and write
2D844029000
heap
page read and write
2D846138000
heap
page read and write
2D84611E000
heap
page read and write
2D84651F000
heap
page read and write
4B9000
heap
page read and write
2D8465AA000
heap
page read and write
2D84675B000
heap
page read and write
2D845D90000
heap
page read and write
2D845F94000
heap
page read and write
C88E1F7000
stack
page read and write
50A000
heap
page read and write
2D8467AE000
heap
page read and write
2D846547000
heap
page read and write
2D84605D000
heap
page read and write
2D845C7D000
heap
page read and write
2D846321000
heap
page read and write
2D8466C4000
heap
page read and write
CD9000
heap
page read and write
D08000
heap
page read and write
2D845EFA000
heap
page read and write
2D8460BA000
heap
page read and write
F35BBFE000
stack
page read and write
2D845F98000
heap
page read and write
2D846012000
heap
page read and write
D2C000
heap
page read and write
2D846543000
heap
page read and write
2D8460DF000
heap
page read and write
2D843FF2000
heap
page read and write
2D844057000
heap
page read and write
2D845EFA000
heap
page read and write
D65000
heap
page read and write
2D8462D5000
heap
page read and write
2D8465A0000
heap
page read and write
D45000
heap
page read and write
2D845D1B000
heap
page read and write
F35BAF7000
stack
page read and write
2D8460FD000
heap
page read and write
D4A000
heap
page read and write
2D84619E000
heap
page read and write
2D846721000
heap
page read and write
2D845C8B000
heap
page read and write
2D846400000
heap
page read and write
2EE6000
heap
page read and write
2D845E4E000
heap
page read and write
2D846201000
heap
page read and write
D2F000
heap
page read and write
2D8460DE000
heap
page read and write
2D843F8D000
heap
page read and write
EB0000
heap
page readonly
2D84626F000
heap
page read and write
2D846419000
heap
page read and write
2D8460F8000
heap
page read and write
2D845CCE000
heap
page read and write
2D84645A000
heap
page read and write
2D845C83000
heap
page read and write
2D845D4E000
heap
page read and write
2D843F07000
heap
page read and write
2D8461B8000
heap
page read and write
D68000
heap
page read and write
2D84653C000
heap
page read and write
2D8465FF000
heap
page read and write
2D845E5F000
heap
page read and write
EC5000
trusted library allocation
page read and write
D1B000
heap
page read and write
2D843FAD000
heap
page read and write
2D845DB4000
heap
page read and write
2D846541000
heap
page read and write
2D84653C000
heap
page read and write
CDC000
heap
page read and write
2D845D0E000
heap
page read and write
2D845FF3000
heap
page read and write
EC0000
trusted library allocation
page read and write
1EF86F00000
heap
page read and write
2D846761000
heap
page read and write
2EE6000
heap
page read and write
ED5000
trusted library allocation
page read and write
2D846568000
heap
page read and write
2D845CCE000
heap
page read and write
2D8461F9000
heap
page read and write
2D84633D000
heap
page read and write
2D845F30000
heap
page read and write
780000
heap
page read and write
2D845F13000
heap
page read and write
2D84600D000
heap
page read and write
2D84645A000
heap
page read and write
2D844007000
heap
page read and write
C88DF7E000
stack
page read and write
2D846829000
heap
page read and write
2D845D52000
heap
page read and write
2D845D1B000
heap
page read and write
2D846788000
heap
page read and write
2D845C7B000
heap
page read and write
2D846071000
heap
page read and write
2D846360000
heap
page read and write
2D845CCE000
heap
page read and write
2D8462B3000
heap
page read and write
C88E6FF000
stack
page read and write
2D846547000
heap
page read and write
1EF87039000
heap
page read and write
2D8460BA000
heap
page read and write
2D845CD2000
heap
page read and write
2D845CD7000
heap
page read and write
2D84680C000
heap
page read and write
2D846178000
heap
page read and write
2D8467A7000
heap
page read and write
2D846692000
heap
page read and write
2D8468D0000
heap
page read and write
2D8465A7000
heap
page read and write
2D8465C8000
heap
page read and write
2D845D1B000
heap
page read and write
2D846138000
heap
page read and write
2D846515000
heap
page read and write
2D84621A000
heap
page read and write
2D846012000
heap
page read and write
2D843FAA000
heap
page read and write
2D845D79000
heap
page read and write
2D8467BC000
heap
page read and write
2D846046000
heap
page read and write
2D845D71000
heap
page read and write
D7A000
heap
page read and write
C20000
heap
page read and write
D3F000
heap
page read and write
2D8465FA000
heap
page read and write
2D8461BE000
heap
page read and write
D7D000
heap
page read and write
2D846291000
heap
page read and write
2D846482000
heap
page read and write
2D845C76000
heap
page read and write
D45000
heap
page read and write
2D845D92000
heap
page read and write
2CDB000
stack
page read and write
2D845DEC000
heap
page read and write
1EF87815000
heap
page read and write
2D846515000
heap
page read and write
D04000
heap
page read and write
2D8463B8000
heap
page read and write
2D8467BC000
heap
page read and write
2D845E12000
heap
page read and write
2D846356000
heap
page read and write
2D843FAB000
heap
page read and write
2D8465C9000
heap
page read and write
2D845C90000
heap
page read and write
2D846430000
heap
page read and write
2D8463B8000
heap
page read and write
C00000
heap
page read and write
2D846158000
heap
page read and write
2EE4000
heap
page read and write
2D846198000
heap
page read and write
2D84681E000
heap
page read and write
1EF8704B000
heap
page read and write
2D845FB2000
heap
page read and write
2D84403E000
heap
page read and write
1EF87000000
heap
page read and write
2D846065000
heap
page read and write
2D84627D000
heap
page read and write
2D845C7D000
heap
page read and write
2D845F76000
heap
page read and write
F35C5FB000
stack
page read and write
2ECD000
heap
page read and write
2D84615E000
heap
page read and write
2D84405D000
heap
page read and write
1E8E000
stack
page read and write
2D84623B000
heap
page read and write
2D8466A0000
heap
page read and write
2D8466FE000
heap
page read and write
2D845C98000
heap
page read and write
2D8466CF000
heap
page read and write
2D845E59000
heap
page read and write
2D845ED9000
heap
page read and write
2D8465FF000
heap
page read and write
2D846658000
heap
page read and write
CD4000
heap
page read and write
2D8460FE000
heap
page read and write
D5E000
heap
page read and write
2D84646E000
heap
page read and write
2D84631A000
heap
page read and write
2F3F000
heap
page read and write
2D843F8C000
heap
page read and write
2D845F30000
heap
page read and write
2D845CCE000
heap
page read and write
D60000
heap
page read and write
2D845D1B000
heap
page read and write
2D846273000
heap
page read and write
2D84400A000
heap
page read and write
2D846520000
heap
page read and write
2D845DD0000
heap
page read and write
2D843F0E000
heap
page read and write
2D84400A000
heap
page read and write
2D84660A000
heap
page read and write
785000
heap
page read and write
2D845F99000
heap
page read and write
2D845CCF000
heap
page read and write
2D846412000
heap
page read and write
2D84672B000
heap
page read and write
2D846039000
heap
page read and write
2D845D94000
heap
page read and write
2D845E6C000
heap
page read and write
2D846545000
heap
page read and write
2D8461DF000
heap
page read and write
2D846471000
heap
page read and write
180016000
unkown
page readonly
2D845DD4000
heap
page read and write
2D84609B000
heap
page read and write
2D84646E000
heap
page read and write
2D845D4E000
heap
page read and write
2EFC000
heap
page read and write
2D84639C000
heap
page read and write
2D8462F7000
heap
page read and write
2D84670F000
heap
page read and write
2D843F0E000
heap
page read and write
D2C000
heap
page read and write
2D84606B000
heap
page read and write
2D84679D000
heap
page read and write
2D84605E000
heap
page read and write
2D845C7D000
heap
page read and write
2D843FA7000
heap
page read and write
2D8464DF000
heap
page read and write
2D845CFB000
heap
page read and write
2D845CB3000
heap
page read and write
2D845CF6000
heap
page read and write
2D84656B000
heap
page read and write
2D84617E000
heap
page read and write
2D8466D6000
heap
page read and write
2D84651E000
heap
page read and write
2D845F76000
heap
page read and write
2D8466F7000
heap
page read and write
2D8468C1000
heap
page read and write
2D8466B3000
heap
page read and write
2D845E54000
heap
page read and write
2D846070000
heap
page read and write
D76000
heap
page read and write
2D845E16000
heap
page read and write
2D845DEC000
heap
page read and write
2D8463F5000
heap
page read and write
2D8462F7000
heap
page read and write
2D84641A000
heap
page read and write
2D845FD0000
heap
page read and write
2D8466E7000
heap
page read and write
2D845CE2000
heap
page read and write
C88DE7E000
stack
page read and write
2D845E70000
heap
page read and write
2D845CDE000
heap
page read and write
2D84631A000
heap
page read and write
2D845DB8000
heap
page read and write
2EFD000
heap
page read and write
2D845DA7000
heap
page read and write
2D846379000
heap
page read and write
2D846372000
heap
page read and write
2D84617E000
heap
page read and write
2D84666E000
heap
page read and write
2D845CB3000
heap
page read and write
2D846570000
heap
page read and write
2D84606B000
heap
page read and write
2D8464E7000
heap
page read and write
2D845D99000
heap
page read and write
CDB000
heap
page read and write
2D846691000
heap
page read and write
2D846503000
heap
page read and write
2D8465A7000
heap
page read and write
2D84675E000
heap
page read and write
2D84403E000
heap
page read and write
2D845FD5000
heap
page read and write
D7D000
heap
page read and write
180000000
unkown
page readonly
2D8463BF000
heap
page read and write
2D843F96000
heap
page read and write
D7B000
heap
page read and write
2D843F87000
heap
page read and write
2D845C92000
heap
page read and write
2D845EDE000
heap
page read and write
2D846031000
heap
page read and write
There are 885 hidden memdumps, click here to show them.