IOC Report
rFACTURA_FAC_2023_1-1000733.PDF.exe

loading gif

Files

File Path
Type
Category
Malicious
rFACTURA_FAC_2023_1-1000733.PDF.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\antiphthisical\Primar\Cunicular\Densimetric\Talestrmmene.Unr
data
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_caspol.exe_c9831a337d3627d9a81a22112d1a4918180c9e2_ea830a9b_d3bd527c-2f90-4458-9cd4-e1517201fb0e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2B2E.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Mar 20 11:06:18 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2DBF.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2DEF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Nikotins61.sto
ASCII text, with very long lines (22842), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\System.Reflection.TypeExtensions.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\antiphthisical\Primar\Cunicular\Densimetric\System.Reflection.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\battery-level-90-charging-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\colorimeter-colorhug-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\media-playlist-consecutive-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\network-offline-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\network-wireless.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\preferences-desktop-font-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\task-due-symbolic.symbolic.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\window-close.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\nsp1D68.tmp\AdvSplash.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsp1D68.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
dropped
\Device\ConDrv
ASCII text, with CRLF, LF line terminators
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6576 -s 2500

URLs

Name
IP
Malicious
http://checkip.dyndns.org/
132.226.8.169
malicious
http://crl.certum.pl/ctsca2021.crl0o
unknown
http://repository.certum.pl/ctnca.cer09
unknown
http://crl.certum.pl/ctnca.crl0k
unknown
https://drive.google.com/2
unknown
http://creativecommons.org/ns#ShareAlike
unknown
http://upx.sf.net
unknown
http://checkip.dyndns.org
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://doc-0s-a8-docs.googleusercontent.com/#
unknown
http://creativecommons.org/ns#
unknown
https://github.com/dotnet/runtime
unknown
http://creativecommons.org/ns#DerivativeWorks
unknown
https://doc-0s-a8-docs.googleusercontent.com/
unknown
http://creativecommons.org/licenses/by-sa/4.0/
unknown
http://creativecommons.org/ns#Distribution
unknown
http://repository.certum.pl/ctsca2021.cer0
unknown
http://subca.ocsp-certum.com05
unknown
http://creativecommons.org/ns#Attribution
unknown
http://subca.ocsp-certum.com02
unknown
https://doc-0s-a8-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/mjejjps3gi1cd44ihbckcd43d7dn78od/1679306700000/12467729248612761337/*/1XARcr4sm_5_dvnsnsVtsDOfjHfua_08k?e=download&uuid=dc7be3b5-c5f0-4bcb-ad3e-a7d72194b047
142.250.185.193
http://subca.ocsp-certum.com01
unknown
https://csp.withgoogle.com/csp/report-to/DriveUntrustedContentHttp/external
unknown
http://crl.certum.pl/ctnca2.crl0l
unknown
http://repository.certum.pl/ctnca2.cer09
unknown
https://github.com/dotnet/runtimeBSJB
unknown
https://drive.google.com/j
unknown
http://checkip.dyndns.com
unknown
http://creativecommons.org/ns#Notice
unknown
http://creativecommons.org/ns#Reproduction
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.certum.pl/CPS0
unknown
https://doc-0s-a8-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/mjejjps3
unknown
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
checkip.dyndns.com
132.226.8.169
malicious
checkip.dyndns.org
unknown
malicious
drive.google.com
142.250.181.238
googlehosted.l.googleusercontent.com
142.250.185.193
doc-0s-a8-docs.googleusercontent.com
unknown

IPs

IP
Domain
Country
Malicious
132.226.8.169
checkip.dyndns.com
United States
malicious
142.250.181.238
drive.google.com
United States
142.250.185.193
googlehosted.l.googleusercontent.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\InstallDir32
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Micos\Irises\Kandissens\Raceblanding
Sulphammonium164
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Hermeneutics\Ophjedes\Amtsraadsmedlemmet
Printerproblemernes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Replyingly\Avnbgen\Spisekamrenes
Rumfartscenterets
HKEY_LOCAL_MACHINE\SOFTWARE\Fetichry
Isobase
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
FileDirectory
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
ProgramId
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
FileId
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
LowerCaseLongPath
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
LongPathHash
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
Name
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
OriginalFileName
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
Publisher
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
Version
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
BinFileVersion
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
BinaryType
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
ProductName
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
ProductVersion
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
LinkDate
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
BinProductVersion
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
AppxPackageFullName
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
AppxPackageRelativeId
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
Size
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
Language
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
IsOsComponent
\REGISTRY\A\{0d50961f-3942-294a-b704-edbe88fdef91}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C0099012AB0F
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 35 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5E20000
direct allocation
page execute and read and write
malicious
48B0000
direct allocation
page execute and read and write
malicious
FC0000
remote allocation
page execute and read and write
malicious
210680C2000
heap
page read and write
7EF000
unkown
page readonly
224F9A9B000
heap
page read and write
224F891C000
heap
page read and write
3C0E000
stack
page read and write
224F8902000
heap
page read and write
12ECEC67000
heap
page read and write
32FB1000
heap
page read and write
21067FFC000
heap
page read and write
2106800C000
heap
page read and write
12ECEBB0000
heap
page read and write
210680B3000
heap
page read and write
210680CD000
heap
page read and write
7E9000
unkown
page readonly
2426A9B0000
remote allocation
page read and write
201D948F000
heap
page read and write
F4A8079000
stack
page read and write
21068730000
heap
page read and write
364C0000
trusted library allocation
page read and write
12ECEC6C000
heap
page read and write
21068963000
heap
page read and write
36530000
trusted library allocation
page read and write
2106808B000
heap
page read and write
224F932F000
heap
page read and write
32FB1000
heap
page read and write
224F930F000
heap
page read and write
2CF0581E000
unkown
page read and write
12ECEC82000
heap
page read and write
21068104000
heap
page read and write
210686AF000
heap
page read and write
32FB1000
heap
page read and write
3AC4000
heap
page read and write
335A0000
heap
page read and write
B8F000
heap
page read and write
995000
heap
page read and write
341B0000
trusted library allocation
page read and write
224F891C000
heap
page read and write
224F9A14000
heap
page read and write
33FEA000
trusted library allocation
page execute and read and write
2106875D000
heap
page read and write
224F9378000
heap
page read and write
3388F000
stack
page read and write
1F6BBE52000
heap
page read and write
33E3E000
stack
page read and write
364D0000
trusted library allocation
page read and write
364E0000
trusted library allocation
page read and write
B58000
heap
page read and write
21068088000
heap
page read and write
21068787000
heap
page read and write
224F9376000
heap
page read and write
21068095000
heap
page read and write
3814000
heap
page read and write
224F9AAC000
heap
page read and write
1F6BBE60000
heap
page read and write
21067806000
heap
page read and write
21067929000
heap
page read and write
3A94000
heap
page read and write
21067FD9000
heap
page read and write
210680CD000
heap
page read and write
224F9329000
heap
page read and write
3652D000
stack
page read and write
21068081000
heap
page read and write
210680E9000
heap
page read and write
224F937C000
heap
page read and write
21067FDA000
heap
page read and write
3AAD000
heap
page read and write
21067FC4000
heap
page read and write
7EF000
unkown
page readonly
24268F50000
heap
page read and write
1C7BE260000
heap
page read and write
12ECEC64000
heap
page read and write
B9C000
heap
page read and write
2106792E000
heap
page read and write
364C0000
trusted library allocation
page read and write
21068110000
heap
page read and write
1F6BBDC0000
heap
page read and write
201D9400000
heap
page read and write
2106897B000
heap
page read and write
21068045000
heap
page read and write
21068123000
heap
page read and write
3637E000
stack
page read and write
2DE0000
heap
page read and write
487CDFE000
stack
page read and write
210680F1000
heap
page read and write
21067FFA000
heap
page read and write
2106811C000
heap
page read and write
210686B0000
heap
page read and write
3AA3000
heap
page read and write
210680CD000
heap
page read and write
12ECED02000
heap
page read and write
DA8ADF9000
stack
page read and write
2106813B000
heap
page read and write
210680E3000
heap
page read and write
32FB1000
heap
page read and write
210687C5000
heap
page read and write
7E0000
unkown
page readonly
21068754000
heap
page read and write
21287DB0000
unclassified section
page readonly
224F88F3000
heap
page read and write
2CF05800000
unkown
page read and write
21068962000
heap
page read and write
21068754000
heap
page read and write
32FB1000
heap
page read and write
1C7BEA00000
heap
page read and write
27EE000
stack
page read and write
210687A0000
heap
page read and write
DA8ACFF000
stack
page read and write
142DEFE000
stack
page read and write
210680FB000
heap
page read and write
2CF05813000
unkown
page read and write
224F9396000
heap
page read and write
33FC3000
trusted library allocation
page execute and read and write
21068108000
heap
page read and write
32FB1000
heap
page read and write
1C7BE2A6000
heap
page read and write
32FB1000
heap
page read and write
6820000
direct allocation
page execute and read and write
210687C5000
heap
page read and write
3AA3000
heap
page read and write
21068094000
heap
page read and write
142E3FE000
stack
page read and write
27494D00000
heap
page read and write
21287E51000
heap
page read and write
12ECEC53000
heap
page read and write
570D5DB000
stack
page read and write
21068755000
heap
page read and write
379E000
stack
page read and write
1C7BE28E000
heap
page read and write
40A000
unkown
page read and write
224F9378000
heap
page read and write
224F9329000
heap
page read and write
3AAD000
heap
page read and write
210687C5000
heap
page read and write
210677FE000
heap
page read and write
224F9330000
heap
page read and write
2665000
heap
page read and write
2106813A000
heap
page read and write
210680F0000
heap
page read and write
363FF000
heap
page read and write
ABBD17E000
stack
page read and write
210680D1000
heap
page read and write
570D9FD000
stack
page read and write
210680A4000
heap
page read and write
27494D13000
heap
page read and write
21068104000
heap
page read and write
2CF056C0000
heap
page read and write
24269100000
heap
page read and write
21068730000
heap
page read and write
3671F000
stack
page read and write
24269063000
heap
page read and write
3417E000
stack
page read and write
1C7BE2AE000
heap
page read and write
224F9379000
heap
page read and write
2106813B000
heap
page read and write
364D0000
trusted library allocation
page read and write
21068730000
heap
page read and write
21068123000
heap
page read and write
2106811A000
heap
page read and write
32FB1000
heap
page read and write
3AEA000
heap
page read and write
210680A5000
heap
page read and write
27494C3A000
heap
page read and write
2426A9B0000
remote allocation
page read and write
224F930E000
heap
page read and write
224F9A08000
heap
page read and write
364E0000
trusted library allocation
page read and write
210680A7000
heap
page read and write
224F88A5000
heap
page read and write
210680C4000
heap
page read and write
1C7BE276000
heap
page read and write
21068712000
heap
page read and write
487C55C000
stack
page read and write
201D943B000
heap
page read and write
21068134000
heap
page read and write
210686AA000
heap
page read and write
1C7BE278000
heap
page read and write
224F9390000
heap
page read and write
224F9329000
heap
page read and write
2FB0000
heap
page read and write
210680C4000
heap
page read and write
201D9445000
heap
page read and write
2660000
heap
page read and write
26D4F5B000
stack
page read and write
21068754000
heap
page read and write
ABBD375000
stack
page read and write
201D9502000
heap
page read and write
2E5C000
stack
page read and write
21067779000
heap
page read and write
224F932D000
heap
page read and write
3ACB000
heap
page read and write
210677FE000
heap
page read and write
1F6BC6B0000
trusted library allocation
page read and write
210680F3000
heap
page read and write
24268F40000
unclassified section
page readonly
21068730000
heap
page read and write
224F9130000
remote allocation
page read and write
2426902A000
heap
page read and write
1C7BE278000
heap
page read and write
210680D0000
heap
page read and write
210680C2000
heap
page read and write
21067FFA000
heap
page read and write
274953F0000
trusted library allocation
page read and write
210680DA000
heap
page read and write
21067FD4000
heap
page read and write
3AC7000
heap
page read and write
ABBD0FF000
stack
page read and write
33FFB000
trusted library allocation
page execute and read and write
364C0000
trusted library allocation
page read and write
21068759000
heap
page read and write
368BE000
stack
page read and write
3A9F000
heap
page read and write
210687A0000
heap
page read and write
21068136000
heap
page read and write
21068144000
heap
page read and write
32FB1000
heap
page read and write
224F9AB5000
heap
page read and write
210687A0000
heap
page read and write
12ECEC59000
heap
page read and write
2106800C000
heap
page read and write
210680C7000
heap
page read and write
224F9329000
heap
page read and write
21068743000
heap
page read and write
224F935E000
heap
page read and write
224F8760000
heap
page read and write
21068963000
heap
page read and write
21068924000
heap
page read and write
224F88EF000
heap
page read and write
32FB1000
heap
page read and write
224F937D000
heap
page read and write
32FB1000
heap
page read and write
33210000
direct allocation
page read and write
210680AB000
heap
page read and write
364C0000
trusted library allocation
page read and write
21067764000
heap
page read and write
950000
heap
page read and write
210680C3000
heap
page read and write
210680BC000
heap
page read and write
224F9202000
heap
page read and write
27494C92000
heap
page read and write
21068134000
heap
page read and write
224F9329000
heap
page read and write
27494C52000
heap
page read and write
210680B1000
heap
page read and write
12ECEC36000
heap
page read and write
12ECEC40000
heap
page read and write
210680B4000
heap
page read and write
36530000
trusted library allocation
page read and write
21068764000
heap
page read and write
ABBD07E000
stack
page read and write
27494C8A000
heap
page read and write
2106811A000
heap
page read and write
210680DA000
heap
page read and write
210680CD000
heap
page read and write
21068104000
heap
page read and write
3AC6000
heap
page read and write
210680E8000
heap
page read and write
224F891B000
heap
page read and write
21068045000
heap
page read and write
2106875D000
heap
page read and write
224F882A000
heap
page read and write
210680EF000
heap
page read and write
210686CB000
heap
page read and write
DA8B1FE000
stack
page read and write
33230000
direct allocation
page read and write
21068730000
heap
page read and write
21068144000
heap
page read and write
224F932F000
heap
page read and write
21067FE9000
heap
page read and write
21067929000
heap
page read and write
210687C5000
heap
page read and write
1F6BBE27000
heap
page read and write
210680EC000
heap
page read and write
224F937C000
heap
page read and write
210680AD000
heap
page read and write
224F935A000
heap
page read and write
1C7BE1A0000
unclassified section
page readonly
2106813B000
heap
page read and write
12ECEC62000
heap
page read and write
32FB1000
heap
page read and write
1F6BBDB0000
unclassified section
page readonly
21068137000
heap
page read and write
12ECEC5B000
heap
page read and write
12ECECA9000
heap
page read and write
224F9313000
heap
page read and write
12ECEC97000
heap
page read and write
21068743000
heap
page read and write
32FB1000
heap
page read and write
224F9376000
heap
page read and write
224F936B000
heap
page read and write
224F9337000
heap
page read and write
21068094000
heap
page read and write
2106811C000
heap
page read and write
210680E4000
heap
page read and write
21068110000
heap
page read and write
12ECEC6D000
heap
page read and write
21067779000
heap
page read and write
21068081000
heap
page read and write
2106813C000
heap
page read and write
21068709000
heap
page read and write
21068104000
heap
page read and write
341E1000
trusted library allocation
page read and write
224F88F9000
heap
page read and write
2860000
heap
page read and write
36530000
trusted library allocation
page read and write
210680E6000
heap
page read and write
21067FFC000
heap
page read and write
27AF000
stack
page read and write
3374F000
stack
page read and write
369BE000
stack
page read and write
1F6BBD00000
heap
page read and write
32FB1000
heap
page read and write
224F891C000
heap
page read and write
210680E9000
heap
page read and write
789000
unkown
page read and write
21067F51000
heap
page read and write
210680AD000
heap
page read and write
224F9379000
heap
page read and write
224F9374000
heap
page read and write
F4A78BD000
stack
page read and write
21067660000
heap
page read and write
2CF05D02000
heap
page read and write
210680A5000
heap
page read and write
32FB1000
heap
page read and write
224F9396000
heap
page read and write
10003000
unkown
page readonly
2106776D000
heap
page read and write
224F932D000
heap
page read and write
21067F95000
heap
page read and write
2CF05915000
trusted library allocation
page read and write
21067FB2000
heap
page read and write
210680A5000
heap
page read and write
2106800C000
heap
page read and write
210680FA000
heap
page read and write
32FB1000
heap
page read and write
224F9350000
heap
page read and write
210680EC000
heap
page read and write
3A0E000
stack
page read and write
142DFFE000
stack
page read and write
21068650000
remote allocation
page read and write
12ECEC2B000
heap
page read and write
BC0000
heap
page read and write
32FB1000
heap
page read and write
21068730000
heap
page read and write
3ABB000
heap
page read and write
2CF05C00000
heap
page read and write
12ECEC32000
heap
page read and write
21287E92000
heap
page read and write
2106792A000
heap
page read and write
2106800C000
heap
page read and write
21067920000
heap
page read and write
142E2FE000
stack
page read and write
21067FBD000
heap
page read and write
34283000
trusted library allocation
page read and write
10000000
unkown
page readonly
21067FE0000
heap
page read and write
27494C49000
heap
page read and write
21068094000
heap
page read and write
21068045000
heap
page read and write
210680F1000
heap
page read and write
32FB1000
heap
page read and write
32FB1000
heap
page read and write
210677F0000
heap
page read and write
2106898A000
heap
page read and write
26D587D000
stack
page read and write
21068103000
heap
page read and write
12ECEC87000
heap
page read and write
21068702000
heap
page read and write
1C7BEA02000
heap
page read and write
1C7BE26D000
heap
page read and write
201D946C000
heap
page read and write
21067FB2000
heap
page read and write
32FB1000
heap
page read and write
21067FEA000
heap
page read and write
BBA000
heap
page read and write
210680F3000
heap
page read and write
201D9360000
heap
page read and write
224F932F000
heap
page read and write
32FB1000
heap
page read and write
21067FA0000
heap
page read and write
210680C6000
heap
page read and write
210680CD000
heap
page read and write
21067F64000
heap
page read and write
3ADC000
heap
page read and write
224F9362000
heap
page read and write
32FB1000
heap
page read and write
224F9393000
heap
page read and write
224F9376000
heap
page read and write
224F930F000
heap
page read and write
210677C4000
heap
page read and write
3AD9000
heap
page read and write
2106809F000
heap
page read and write
210680C7000
heap
page read and write
210677FA000
heap
page read and write
224F9329000
heap
page read and write
210680C4000
heap
page read and write
2CF0584A000
heap
page read and write
3A99000
heap
page read and write
224F932C000
heap
page read and write
32FB1000
heap
page read and write
21068104000
heap
page read and write
342A2000
trusted library allocation
page read and write
21068045000
heap
page read and write
1F6BC802000
trusted library allocation
page read and write
BB0000
heap
page read and write
B90000
heap
page read and write
224F9A39000
heap
page read and write
210680C3000
heap
page read and write
21067764000
heap
page read and write
12ECEC51000
heap
page read and write
F4A7CFE000
stack
page read and write
24268E30000
heap
page read and write
990000
heap
page read and write
12ECEC69000
heap
page read and write
21287D10000
heap
page read and write
27495615000
heap
page read and write
331AF000
stack
page read and write
24269113000
heap
page read and write
1C7BE25A000
heap
page read and write
210686CC000
heap
page read and write
32FB1000
heap
page read and write
210680F1000
heap
page read and write
36484000
trusted library allocation
page read and write
12ECEC5E000
heap
page read and write
21068730000
heap
page read and write
12ECEC5D000
heap
page read and write
21287E8C000
heap
page read and write
24269083000
heap
page read and write
210677FE000
heap
page read and write
19A000
stack
page read and write
2CF05C13000
heap
page read and write
21067FA8000
heap
page read and write
3130000
direct allocation
page read and write
224F8913000
heap
page read and write
7B3000
unkown
page read and write
21068787000
heap
page read and write
33FF7000
trusted library allocation
page execute and read and write
21068091000
heap
page read and write
21067FFC000
heap
page read and write
21068097000
heap
page read and write
210680EE000
heap
page read and write
224F9300000
heap
page read and write
2106800C000
heap
page read and write
224F937C000
heap
page read and write
21068123000
heap
page read and write
12ECF602000
trusted library allocation
page read and write
21067FBD000
heap
page read and write
2426900B000
heap
page read and write
364D0000
trusted library allocation
page read and write
21068726000
heap
page read and write
224F9332000
heap
page read and write
224F9A85000
heap
page read and write
3428C000
trusted library allocation
page read and write
21067779000
heap
page read and write
224F932C000
heap
page read and write
21067710000
heap
page read and write
21067FD9000
heap
page read and write
224F930E000
heap
page read and write
224F889C000
heap
page read and write
12ECEC94000
heap
page read and write
364D0000
trusted library allocation
page read and write
224F88C5000
heap
page read and write
224F935B000
heap
page read and write
224F88B4000
heap
page read and write
32FB1000
heap
page read and write
224F9329000
heap
page read and write
21067FBD000
heap
page read and write
21068744000
heap
page read and write
21067F58000
heap
page read and write
210680E8000
heap
page read and write
2CF05D02000
heap
page read and write
7D0000
unkown
page readonly
364D0000
trusted library allocation
page read and write
2CF05D13000
heap
page read and write
32FB1000
heap
page read and write
210680CF000
heap
page read and write
224F88B6000
heap
page read and write
224F937D000
heap
page read and write
21287E73000
heap
page read and write
21068725000
heap
page read and write
21067929000
heap
page read and write
21068110000
heap
page read and write
36610000
heap
page read and write
21068730000
heap
page read and write
224F9332000
heap
page read and write
1F6BBE02000
heap
page read and write
210680C6000
heap
page read and write
2106811A000
heap
page read and write
84BF12B000
stack
page read and write
224F887C000
heap
page read and write
24269102000
heap
page read and write
341C0000
trusted library allocation
page read and write
32FB1000
heap
page read and write
224F888B000
heap
page read and write
12ECEC5A000
heap
page read and write
1C7BE2B2000
heap
page read and write
201D9454000
heap
page read and write
224F88AF000
heap
page read and write
224F9329000
heap
page read and write
2CF05D00000
heap
page read and write
224F935C000
heap
page read and write
21068093000
heap
page read and write
2CF05C02000
heap
page read and write
2106877A000
heap
page read and write
1D0000
unclassified section
page readonly
224F937F000
heap
page read and write
1F6BBE2A000
heap
page read and write
36540000
trusted library allocation
page read and write
26D557F000
stack
page read and write
21068144000
heap
page read and write
210677FE000
heap
page read and write
21067F95000
heap
page read and write
224F932F000
heap
page read and write
210680ED000
heap
page read and write
341CB000
trusted library allocation
page read and write
2CF05824000
unkown
page read and write
2106800C000
heap
page read and write
21067779000
heap
page read and write
224F937D000
heap
page read and write
210680A5000
heap
page read and write
32FB1000
heap
page read and write
98000
stack
page read and write
3810000
heap
page read and write
21067F5B000
heap
page read and write
224F9365000
heap
page read and write
224F9A9E000
heap
page read and write
2106808D000
heap
page read and write
21068743000
heap
page read and write
487CEFD000
stack
page read and write
224F8888000
heap
page read and write
2106809B000
heap
page read and write
DA8ABFB000
stack
page read and write
21068712000
heap
page read and write
24269098000
heap
page read and write
224F9393000
heap
page read and write
224F9130000
remote allocation
page read and write
210677C4000
heap
page read and write
224F893D000
heap
page read and write
224F889A000
heap
page read and write
21287EA5000
heap
page read and write
224F9340000
heap
page read and write
3960000
heap
page read and write
3AEA000
heap
page read and write
3AC6000
heap
page read and write
33C9E000
stack
page read and write
21067FDB000
heap
page read and write
37D0000
heap
page read and write
21067F97000
heap
page read and write
224F935B000
heap
page read and write
21068080000
heap
page read and write
21067FD2000
heap
page read and write
210680AD000
heap
page read and write
21068045000
heap
page read and write
21067766000
heap
page read and write
364D0000
trusted library allocation
page read and write
33D3E000
stack
page read and write
2106811F000
heap
page read and write
27494C40000
heap
page read and write
210680E6000
heap
page read and write
32FB1000
heap
page read and write
21068144000
heap
page read and write
21287E40000
heap
page read and write
210686B7000
heap
page read and write
21287E9A000
heap
page read and write
1C7BE293000
heap
page read and write
210680B1000
heap
page read and write
224F893D000
heap
page read and write
224F9396000
heap
page read and write
3AD9000
heap
page read and write
2CF05902000
trusted library allocation
page read and write
210686FE000
heap
page read and write
210680B8000
heap
page read and write
210680A8000
heap
page read and write
21068144000
heap
page read and write
2106813F000
heap
page read and write
210687BC000
heap
page read and write
24269041000
heap
page read and write
3A8E000
heap
page read and write
21067FA8000
heap
page read and write
210680F1000
heap
page read and write
25F0000
heap
page read and write
3378E000
stack
page read and write
21068787000
heap
page read and write
2106774B000
heap
page read and write
21067F66000
heap
page read and write
224F9355000
heap
page read and write
224F8840000
heap
page read and write
27494C82000
heap
page read and write
3A90000
heap
page read and write
2106813B000
heap
page read and write
21288802000
trusted library allocation
page read and write
21067FCD000
heap
page read and write
10059000
trusted library allocation
page read and write
210680EC000
heap
page read and write
32FB1000
heap
page read and write
12ECEC5C000
heap
page read and write
21287DC0000
heap
page read and write
21067F96000
heap
page read and write
210680A8000
heap
page read and write
21067FB8000
heap
page read and write
21067765000
heap
page read and write
224F9A0C000
heap
page read and write
21068097000
heap
page read and write
21067FC1000
heap
page read and write
224F86F0000
heap
page read and write
224F9AB3000
heap
page read and write
21068787000
heap
page read and write
27495602000
heap
page read and write
12ECEC13000
heap
page read and write
21068787000
heap
page read and write
36530000
trusted library allocation
page read and write
201D947D000
heap
page read and write
1C7BE1B0000
heap
page read and write
210680E8000
heap
page read and write
210680E6000
heap
page read and write
210680AB000
heap
page read and write
2CF0587C000
heap
page read and write
224F9A12000
heap
page read and write
401000
unkown
page execute read
33A00000
trusted library allocation
page read and write
3ABB000
heap
page read and write
2106813C000
heap
page read and write
2106875D000
heap
page read and write
224F9215000
heap
page read and write
1C7BE240000
heap
page read and write
210680F1000
heap
page read and write
210680F3000
heap
page read and write
21067FBD000
heap
page read and write
21068920000
heap
page read and write
32FB1000
heap
page read and write
2106892C000
heap
page read and write
201D9449000
heap
page read and write
32FB1000
heap
page read and write
27494C6E000
heap
page read and write
2CF05900000
trusted library allocation
page read and write
3AB2000
heap
page read and write
33D00000
remote allocation
page read and write
77C000
unkown
page read and write
224F8813000
heap
page read and write
224F932D000
heap
page read and write
21068730000
heap
page read and write
DA8A979000
stack
page read and write
2106897B000
heap
page read and write
3AA1000
heap
page read and write
21068144000
heap
page read and write
21067F55000
heap
page read and write
210680A4000
heap
page read and write
30000
heap
page read and write
1F6BBE00000
heap
page read and write
2106813B000
heap
page read and write
21068094000
heap
page read and write
12ECEBA0000
unclassified section
page readonly
364C0000
trusted library allocation
page read and write
210680B1000
heap
page read and write
12ECEC4A000
heap
page read and write
34180000
heap
page execute and read and write
21068650000
remote allocation
page read and write
2CF05940000
heap
page read and write
401000
unkown
page execute read
224F937A000
heap
page read and write
21068680000
heap
page read and write
21068045000
heap
page read and write
1F6BBE59000
heap
page read and write
210680AC000
heap
page read and write
364D0000
trusted library allocation
page read and write
12ECEC9D000
heap
page read and write
3AC0000
heap
page read and write
32FB1000
heap
page read and write
1C7BE292000
heap
page read and write
2106815C000
heap
page read and write
210677C4000
heap
page read and write
21068104000
heap
page read and write
2106780E000
heap
page read and write
3A59000
heap
page read and write
224F9332000
heap
page read and write
7A4000
unkown
page read and write
21067779000
heap
page read and write
A8CC78B000
stack
page read and write
210680B1000
heap
page read and write
142E1FF000
stack
page read and write
12ECEAF0000
heap
page read and write
24269075000
heap
page read and write
1C7BE228000
heap
page read and write
B50000
heap
page read and write
21068705000
heap
page read and write
C09677E000
stack
page read and write
341B6000
trusted library allocation
page read and write
21068138000
heap
page read and write
34291000
trusted library allocation
page read and write
A8CCAFD000
stack
page read and write
33FB0000
trusted library allocation
page read and write
21067FA0000
heap
page read and write
21068690000
heap
page read and write
1F6BBE13000
heap
page read and write
224F9329000
heap
page read and write
21068093000
heap
page read and write
224F932F000
heap
page read and write
12ECEC00000
heap
page read and write
210680A8000
heap
page read and write
364D0000
trusted library allocation
page read and write
21068094000
heap
page read and write
3AFF000
heap
page read and write
2106875A000
heap
page read and write
210680C3000
heap
page read and write
3A90000
heap
page read and write
A8CCD78000
stack
page read and write
21068045000
heap
page read and write
364D0000
trusted library allocation
page read and write
364D0000
trusted library allocation
page read and write
33F87000
stack
page read and write
21068764000
heap
page read and write
2106811A000
heap
page read and write
210677FE000
heap
page read and write
224F9374000
heap
page read and write
210686FE000
heap
page read and write
21068144000
heap
page read and write
21067929000
heap
page read and write
210686FE000
heap
page read and write
224F9376000
heap
page read and write
32FCD000
heap
page read and write
224F893D000
heap
page read and write
210677F5000
heap
page read and write
210680B1000
heap
page read and write
1F6BBE6E000
heap
page read and write
242690A3000
heap
page read and write
210677E3000
heap
page read and write
210677F7000
heap
page read and write
2CF05802000
unkown
page read and write
3AEE000
heap
page read and write
C09687E000
stack
page read and write
21068712000
heap
page read and write
224F9341000
heap
page read and write
21068764000
heap
page read and write
2106815D000
heap
page read and write
210687AC000
heap
page read and write
3A87000
heap
page read and write
21067FFC000
heap
page read and write
224F891C000
heap
page read and write
487C5DF000
stack
page read and write
201D941A000
heap
page read and write
339CC000
stack
page read and write
210680F3000
heap
page read and write
21068743000
heap
page read and write
224F9340000
heap
page read and write
21067FD9000
heap
page read and write
210680E8000
heap
page read and write
201D944F000
heap
page read and write
224F8896000
heap
page read and write
21067FE9000
heap
page read and write
53F9000
trusted library allocation
page read and write
21067600000
heap
page read and write
201D9486000
heap
page read and write
408000
unkown
page readonly
224F937F000
heap
page read and write
21067FC1000
heap
page read and write
201D942A000
heap
page read and write
3AB1000
heap
page read and write
21068969000
heap
page read and write
210680ED000
heap
page read and write
364E0000
trusted library allocation
page read and write
400000
unkown
page readonly
21068123000
heap
page read and write
395E000
stack
page read and write
21287E86000
heap
page read and write
210686FE000
heap
page read and write
36730000
heap
page execute and read and write
2106815C000
heap
page read and write
21068963000
heap
page read and write
201D9440000
heap
page read and write
224F937C000
heap
page read and write
2106809E000
heap
page read and write
224F8879000
heap
page read and write
1C7BE282000
heap
page read and write
21288680000
trusted library allocation
page read and write
224F9329000
heap
page read and write
2106792D000
heap
page read and write
224F9396000
heap
page read and write
24269129000
heap
page read and write
210677FE000
heap
page read and write
2CF05760000
trusted library allocation
page read and write
210680F3000
heap
page read and write
2106792D000
heap
page read and write
32FB1000
heap
page read and write
224F932B000
heap
page read and write
3A10000
heap
page read and write
210680A5000
heap
page read and write
224F930F000
heap
page read and write
27494AE0000
heap
page read and write
2106775A000
heap
page read and write
224F9370000
heap
page read and write
32FB1000
heap
page read and write
32FB1000
heap
page read and write
2106813A000
heap
page read and write
21067764000
heap
page read and write
210680F0000
heap
page read and write
21068967000
heap
page read and write
224F893C000
heap
page read and write
33FCD000
trusted library allocation
page execute and read and write
21068688000
heap
page read and write
C09697A000
stack
page read and write
21068045000
heap
page read and write
224F937C000
heap
page read and write
DA8A49B000
stack
page read and write
2106811A000
heap
page read and write
12ECEC58000
heap
page read and write
21067FE9000
heap
page read and write
210687C5000
heap
page read and write
12ECEC4F000
heap
page read and write
224F9A9E000
heap
page read and write
21067925000
heap
page read and write
224F932C000
heap
page read and write
33FE6000
trusted library allocation
page execute and read and write
2106811D000
heap
page read and write
224F935C000
heap
page read and write
210689B3000
heap
page read and write
1C7BE271000
heap
page read and write
21068115000
heap
page read and write
210680BF000
heap
page read and write
21068098000
heap
page read and write
210677C4000
heap
page read and write
2106813B000
heap
page read and write
210680A4000
heap
page read and write
2106897B000
heap
page read and write
21067765000
heap
page read and write
3428E000
trusted library allocation
page read and write
224F9381000
heap
page read and write
3403E000
stack
page read and write
1C7BE2AC000
heap
page read and write
210680DA000
heap
page read and write
210680D4000
heap
page read and write
364D0000
trusted library allocation
page read and write
224F88A7000
heap
page read and write
210680C2000
heap
page read and write
36530000
trusted library allocation
page read and write
3ACB000
heap
page read and write
224F9378000
heap
page read and write
21067FFC000
heap
page read and write
2106780E000
heap
page read and write
210686B7000
heap
page read and write
224F9386000
heap
page read and write
26D577E000
stack
page read and write
224F933B000
heap
page read and write
21068743000
heap
page read and write
84BF1AF000
stack
page read and write
224F9329000
heap
page read and write
30F0000
direct allocation
page read and write
26AE000
stack
page read and write
21068103000
heap
page read and write
21068104000
heap
page read and write
224F9390000
heap
page read and write
210680DB000
heap
page read and write
24269117000
heap
page read and write
224F9386000
heap
page read and write
210686F1000
heap
page read and write
224F9130000
remote allocation
page read and write
2106811D000
heap
page read and write
224F88BC000
heap
page read and write
224F9A8D000
heap
page read and write
224F937C000
heap
page read and write
210680B0000
heap
page read and write
364D0000
trusted library allocation
page read and write
32FB1000
heap
page read and write
224F9396000
heap
page read and write
3364E000
stack
page read and write
3A97000
heap
page read and write
21067779000
heap
page read and write
33FC4000
trusted library allocation
page read and write
1C7BE289000
heap
page read and write
210680CF000
heap
page read and write
210686FE000
heap
page read and write
21287E9E000
heap
page read and write
224F88B8000
heap
page read and write
33E8B000
stack
page read and write
32FB1000
heap
page read and write
26D547E000
stack
page read and write
21068120000
heap
page read and write
21068712000
heap
page read and write
210677DB000
heap
page read and write
364C0000
trusted library allocation
page read and write
10005000
unkown
page readonly
24269000000
heap
page read and write
21067FD9000
heap
page read and write
210680B7000
heap
page read and write
210680F1000
heap
page read and write
21068081000
heap
page read and write
2106811F000
heap
page read and write
12ECEC6A000
heap
page read and write
210686B0000
heap
page read and write
364D0000
trusted library allocation
page read and write
21068650000
remote allocation
page read and write
224F9393000
heap
page read and write
32FB1000
heap
page read and write
570D8FE000
stack
page read and write
21068712000
heap
page read and write
21067FD5000
heap
page read and write
21287D70000
heap
page read and write
2106811F000
heap
page read and write
1F6BC680000
trusted library allocation
page read and write
21068982000
heap
page read and write
21068092000
heap
page read and write
21067FE0000
heap
page read and write
224F936D000
heap
page read and write
210677C4000
heap
page read and write
21067F50000
heap
page read and write
12ECEC60000
heap
page read and write
1B30000
remote allocation
page execute and read and write
B84000
heap
page read and write
364D0000
trusted library allocation
page read and write
201D9350000
unclassified section
page readonly
27494C13000
heap
page read and write
21068112000
heap
page read and write
21068123000
heap
page read and write
2CF05D13000
heap
page read and write
210677FE000
heap
page read and write
201D9310000
heap
page read and write
1C7BEA15000
heap
page read and write
7A6000
unkown
page read and write
32FB1000
heap
page read and write
210680E8000
heap
page read and write
338CD000
stack
page read and write
210680ED000
heap
page read and write
12ECEC98000
heap
page read and write
224F9396000
heap
page read and write
26D53FF000
stack
page read and write
21068134000
heap
page read and write
21068755000
heap
page read and write
224F9332000
heap
page read and write
224F9329000
heap
page read and write
210686D5000
heap
page read and write
21068754000
heap
page read and write
224F8876000
heap
page read and write
36530000
trusted library allocation
page read and write
2106875A000
heap
page read and write
3A9D000
heap
page read and write
21068758000
heap
page read and write
210686CB000
heap
page read and write
364C0000
trusted library allocation
page read and write
32FB1000
heap
page read and write
224F9386000
heap
page read and write
21067779000
heap
page read and write
210680A5000
heap
page read and write
201D9413000
heap
page read and write
10020000
trusted library allocation
page read and write
21068709000
heap
page read and write
12ECEC55000
heap
page read and write
32FB1000
heap
page read and write
210680C7000
heap
page read and write
21068123000
heap
page read and write
32FB1000
heap
page read and write
210680AC000
heap
page read and write
224F9A70000
heap
page read and write
400000
unkown
page readonly
1F6BBE6A000
heap
page read and write
224F893D000
heap
page read and write
24268FE0000
trusted library allocation
page read and write
21067FB2000
heap
page read and write
224F9378000
heap
page read and write
21068134000
heap
page read and write
2106809B000
heap
page read and write
21067764000
heap
page read and write
21068045000
heap
page read and write
26D567B000
stack
page read and write
1C7BE302000
heap
page read and write
210680A2000
heap
page read and write
12ECEB60000
heap
page read and write
224F9AA7000
heap
page read and write
ABBCE7C000
stack
page read and write
224F9329000
heap
page read and write
210680A8000
heap
page read and write
ABBD47B000
stack
page read and write
2106875D000
heap
page read and write
21068139000
heap
page read and write
210677FA000
heap
page read and write
21068963000
heap
page read and write
32FB1000
heap
page read and write
21067FC3000
heap
page read and write
12ECEC29000
heap
page read and write
224F9350000
heap
page read and write
224F887E000
heap
page read and write
53B0000
trusted library allocation
page read and write
408000
unkown
page readonly
210687AC000
heap
page read and write
3AAA000
heap
page read and write
21067809000
heap
page read and write
C0961AC000
stack
page read and write
786000
unkown
page read and write
32FB1000
heap
page read and write
24269013000
heap
page read and write
2106800C000
heap
page read and write
32FB1000
heap
page read and write
210686B4000
heap
page read and write
364D0000
trusted library allocation
page read and write
201D92B0000
heap
page read and write
210677C4000
heap
page read and write
21068110000
heap
page read and write
210677FE000
heap
page read and write
487CAFD000
stack
page read and write
210680EF000
heap
page read and write
224F9376000
heap
page read and write
210687A0000
heap
page read and write
224F9A7F000
heap
page read and write
84BF8FC000
stack
page read and write
21068045000
heap
page read and write
21067FCE000
heap
page read and write
21068097000
heap
page read and write
2106811A000
heap
page read and write
782000
unkown
page read and write
21067930000
heap
page read and write
210686CB000
heap
page read and write
84BF6FF000
stack
page read and write
224F9396000
heap
page read and write
210680D4000
heap
page read and write
1C7BE26E000
heap
page read and write
21068144000
heap
page read and write
224F9376000
heap
page read and write
2106813C000
heap
page read and write
363C6000
heap
page read and write
33FF2000
trusted library allocation
page read and write
E20000
heap
page read and write
364E0000
trusted library allocation
page read and write
2426908C000
heap
page read and write
3ADF000
heap
page read and write
224F9376000
heap
page read and write
2106809A000
heap
page read and write
21067800000
heap
page read and write
21287E82000
heap
page read and write
2106870B000
heap
page read and write
364D6000
trusted library allocation
page read and write
224F9381000
heap
page read and write
224F9329000
heap
page read and write
21068120000
heap
page read and write
224F9376000
heap
page read and write
32FB1000
heap
page read and write
21068094000
heap
page read and write
2CF05D00000
heap
page read and write
224F932C000
heap
page read and write
32FB1000
heap
page read and write
21067764000
heap
page read and write
5420000
direct allocation
page execute and read and write
7AB000
unkown
page read and write
210680F1000
heap
page read and write
32FB1000
heap
page read and write
210676F0000
trusted library allocation
page read and write
7CE000
unkown
page read and write
351E1000
trusted library allocation
page read and write
21067FD9000
heap
page read and write
84BFD7F000
stack
page read and write
224F9350000
heap
page read and write
210680B2000
heap
page read and write
210680D7000
heap
page read and write
1C7BE298000
heap
page read and write
32FB1000
heap
page read and write
33B9E000
stack
page read and write
2106875D000
heap
page read and write
1F6BBE71000
heap
page read and write
210680F1000
heap
page read and write
B8C000
heap
page read and write
210680E6000
heap
page read and write
4A20000
direct allocation
page execute and read and write
21067F67000
heap
page read and write
224F9340000
heap
page read and write
21068098000
heap
page read and write
3ADC000
heap
page read and write
364B5000
trusted library allocation
page read and write
21067765000
heap
page read and write
21068045000
heap
page read and write
3AA9000
heap
page read and write
21287E95000
heap
page read and write
32FB1000
heap
page read and write
224F9378000
heap
page read and write
210680A8000
heap
page read and write
1F6BBE41000
heap
page read and write
224F885F000
heap
page read and write
21068085000
heap
page read and write
32FB1000
heap
page read and write
12ECF470000
trusted library allocation
page read and write
210680C3000
heap
page read and write
21067FA0000
heap
page read and write
12ECEC42000
heap
page read and write
210686A8000
heap
page read and write
32FB1000
heap
page read and write
21067717000
heap
page read and write
21068094000
heap
page read and write
12ECEC61000
heap
page read and write
21068712000
heap
page read and write
32FB1000
heap
page read and write
21067F75000
heap
page read and write
224F9200000
heap
page read and write
210680B1000
heap
page read and write
2106774B000
heap
page read and write
224F937F000
heap
page read and write
224F930E000
heap
page read and write
210680E7000
heap
page read and write
210677DB000
heap
page read and write
224F888F000
heap
page read and write
224F9396000
heap
page read and write
210680CD000
heap
page read and write
210680C6000
heap
page read and write
33A4E000
stack
page read and write
210680B2000
heap
page read and write
B93000
heap
page read and write
33D00000
remote allocation
page read and write
364C0000
trusted library allocation
page read and write
210680A4000
heap
page read and write
210677FF000
heap
page read and write
2CAF000
stack
page read and write
21068104000
heap
page read and write
34190000
trusted library allocation
page execute and read and write
210680AD000
heap
page read and write
224F9388000
heap
page read and write
210686AF000
heap
page read and write
21067FB2000
heap
page read and write
2F5D000
stack
page read and write
2426904C000
heap
page read and write
210677C4000
heap
page read and write
224F9356000
heap
page read and write
210680AE000
heap
page read and write
21068110000
heap
page read and write
224F937C000
heap
page read and write
21068082000
heap
page read and write
27494C2A000
heap
page read and write
ABBCFFF000
stack
page read and write
201D9421000
heap
page read and write
33FD0000
trusted library allocation
page read and write
210680B0000
heap
page read and write
BB1000
heap
page read and write
224F937F000
heap
page read and write
210677FE000
heap
page read and write
1C7BE282000
heap
page read and write
210677C4000
heap
page read and write
32FB1000
heap
page read and write
21287E56000
heap
page read and write
487CF7F000
stack
page read and write
21287E2B000
heap
page read and write
1C7BE090000
heap
page read and write
32FB1000
heap
page read and write
21068045000
heap
page read and write
21067809000
heap
page read and write
224F935E000
heap
page read and write
1C7BE313000
heap
page read and write
BA5000
heap
page read and write
2F30000
remote allocation
page execute and read and write
12ECEC6E000
heap
page read and write
21067F59000
heap
page read and write
224F9330000
heap
page read and write
21287E3B000
heap
page read and write
21068094000
heap
page read and write
32FB1000
heap
page read and write
210680A8000
heap
page read and write
224F8897000
heap
page read and write
224F9396000
heap
page read and write
224F9385000
heap
page read and write
27494D02000
heap
page read and write
210680B1000
heap
page read and write
210680B0000
heap
page read and write
210680DA000
heap
page read and write
7D0000
unkown
page readonly
21068097000
heap
page read and write
21068119000
heap
page read and write
21068144000
heap
page read and write
21067FC4000
heap
page read and write
224F936B000
heap
page read and write
33FF0000
trusted library allocation
page read and write
27494C26000
heap
page read and write
224F9329000
heap
page read and write
27494E00000
heap
page read and write
21068754000
heap
page read and write
27494BF0000
unclassified section
page readonly
224F9393000
heap
page read and write
21067779000
heap
page read and write
364D0000
trusted library allocation
page read and write
21067F82000
heap
page read and write
224F9351000
heap
page read and write
341D0000
heap
page read and write
32FB1000
heap
page read and write
210680BC000
heap
page read and write
224F9332000
heap
page read and write
2106811D000
heap
page read and write
32FB1000
heap
page read and write
35209000
trusted library allocation
page read and write
32FB1000
heap
page read and write
21067779000
heap
page read and write
210677DB000
heap
page read and write
7E9000
unkown
page readonly
21068102000
heap
page read and write
27495600000
heap
page read and write
ABBD279000
stack
page read and write
21068017000
heap
page read and write
210677F1000
heap
page read and write
210687A0000
heap
page read and write
210680D7000
heap
page read and write
210680F1000
heap
page read and write
201D9421000
heap
page read and write
224F930E000
heap
page read and write
210680EF000
heap
page read and write
1C7BE25E000
heap
page read and write
DA8A87E000
stack
page read and write
224F9396000
heap
page read and write
21068084000
heap
page read and write
224F893C000
heap
page read and write
210680E3000
heap
page read and write
364D0000
trusted library allocation
page read and write
21068963000
heap
page read and write
210686A0000
heap
page read and write
21067F67000
heap
page read and write
224F9A00000
heap
page read and write
210680F1000
heap
page read and write
210680B7000
heap
page read and write
3A1B000
heap
page read and write
210686B7000
heap
page read and write
201D9431000
heap
page read and write
1C7BE297000
heap
page read and write
40A000
unkown
page write copy
21287E79000
heap
page read and write
224F87A0000
unclassified section
page readonly
224F9332000
heap
page read and write
142DF7E000
stack
page read and write
32FB1000
heap
page read and write
2CF05842000
heap
page read and write
210680BB000
heap
page read and write
224F9392000
heap
page read and write
21068759000
heap
page read and write
242690A4000
heap
page read and write
224F893C000
heap
page read and write
21067FD1000
heap
page read and write
210680AC000
heap
page read and write
2106809A000
heap
page read and write
36530000
trusted library allocation
page read and write
B8F000
heap
page read and write
21068709000
heap
page read and write
33250000
heap
page read and write
21068787000
heap
page read and write
21068045000
heap
page read and write
201D9E02000
trusted library allocation
page read and write
21067FFC000
heap
page read and write
21068095000
heap
page read and write
224F87B0000
heap
page read and write
12ECEC4D000
heap
page read and write
210686FD000
heap
page read and write
36380000
heap
page read and write
224F9355000
heap
page read and write
ABBD4FE000
stack
page read and write
1F6BBE7B000
heap
page read and write
224F9362000
heap
page read and write
21068089000
heap
page read and write
12ECEC89000
heap
page read and write
32FB1000
heap
page read and write
1C7BE22B000
heap
page read and write
21287E13000
heap
page read and write
7E0000
unkown
page readonly
1C7BE213000
heap
page read and write
224F9393000
heap
page read and write
24269098000
heap
page read and write
35D0000
trusted library allocation
page read and write
224F937C000
heap
page read and write
3AA7000
heap
page read and write
21068787000
heap
page read and write
224F9329000
heap
page read and write
24268FA0000
trusted library allocation
page read and write
3A99000
heap
page read and write
364C0000
trusted library allocation
page read and write
24268DC0000
heap
page read and write
1F6BBD70000
heap
page read and write
2106811A000
heap
page read and write
21068706000
heap
page read and write
224F932E000
heap
page read and write
21287E00000
heap
page read and write
224F9070000
trusted library allocation
page read and write
364E0000
trusted library allocation
page read and write
2106811C000
heap
page read and write
21068134000
heap
page read and write
32FB1000
heap
page read and write
224F9A72000
heap
page read and write
224F88BE000
heap
page read and write
224F88FE000
heap
page read and write
84BF4FF000
stack
page read and write
21068712000
heap
page read and write
3A87000
heap
page read and write
210677F5000
heap
page read and write
3AEF000
heap
page read and write
2106808B000
heap
page read and write
210689B2000
heap
page read and write
DA8A9FF000
stack
page read and write
210677C4000
heap
page read and write
33FE0000
trusted library allocation
page read and write
210680CF000
heap
page read and write
487C87D000
stack
page read and write
12ECEC66000
heap
page read and write
32FCD000
heap
page read and write
3A8E000
heap
page read and write
224F9A23000
heap
page read and write
2106792D000
heap
page read and write
1C7BE9A0000
trusted library allocation
page read and write
210677E3000
heap
page read and write
351E7000
trusted library allocation
page read and write
2426AA02000
trusted library allocation
page read and write
32FB1000
heap
page read and write
210687C5000
heap
page read and write
32FB1000
heap
page read and write
224F8800000
heap
page read and write
1C7BE200000
heap
page read and write
224F937C000
heap
page read and write
210680D9000
heap
page read and write
210680EF000
heap
page read and write
21068144000
heap
page read and write
224F935C000
heap
page read and write
B94000
heap
page read and write
210677C4000
heap
page read and write
2426A9B0000
remote allocation
page read and write
224F9374000
heap
page read and write
21068743000
heap
page read and write
364D0000
trusted library allocation
page read and write
201D93B0000
trusted library allocation
page read and write
210686D5000
heap
page read and write
12ECEC6F000
heap
page read and write
201D947E000
heap
page read and write
224F9396000
heap
page read and write
210680FB000
heap
page read and write
21067779000
heap
page read and write
210680A5000
heap
page read and write
331D0000
direct allocation
page read and write
21068969000
heap
page read and write
21068743000
heap
page read and write
364E0000
trusted library allocation
page read and write
364D0000
trusted library allocation
page read and write
2106875B000
heap
page read and write
21067FE9000
heap
page read and write
364F0000
trusted library allocation
page read and write
21068143000
heap
page read and write
32FB1000
heap
page read and write
21068712000
heap
page read and write
210680AB000
heap
page read and write
224F891B000
heap
page read and write
224F9386000
heap
page read and write
27494A70000
heap
page read and write
1C7BE030000
heap
page read and write
32FB1000
heap
page read and write
12ECEC71000
heap
page read and write
21068138000
heap
page read and write
2106813B000
heap
page read and write
12ECEC6B000
heap
page read and write
2106811F000
heap
page read and write
10001000
unkown
page execute read
32FB1000
heap
page read and write
224F9AB5000
heap
page read and write
ABBD2FE000
stack
page read and write
32FB1000
heap
page read and write
210686A0000
heap
page read and write
2106811C000
heap
page read and write
224F88B4000
heap
page read and write
1C7BE27E000
heap
page read and write
1130000
remote allocation
page execute and read and write
210680E8000
heap
page read and write
210680E8000
heap
page read and write
224F934B000
heap
page read and write
2864000
heap
page read and write
21068091000
heap
page read and write
12ECEC43000
heap
page read and write
210680A4000
heap
page read and write
224F9378000
heap
page read and write
21067F5B000
heap
page read and write
341A0000
trusted library allocation
page read and write
26D56FF000
stack
page read and write
21068120000
heap
page read and write
210680A1000
heap
page read and write
DA8AAFB000
stack
page read and write
21067764000
heap
page read and write
DA8A59F000
stack
page read and write
3413E000
stack
page read and write
224F9378000
heap
page read and write
224F9329000
heap
page read and write
27494C7D000
heap
page read and write
21068123000
heap
page read and write
21068095000
heap
page read and write
36530000
trusted library allocation
page read and write
2CF05730000
heap
page read and write
21287F02000
heap
page read and write
36540000
trusted library allocation
page read and write
32FB1000
heap
page read and write
32FB0000
heap
page read and write
21068712000
heap
page read and write
210680C2000
heap
page read and write
210686B0000
heap
page read and write
21068134000
heap
page read and write
3AD9000
heap
page read and write
142DE7B000
stack
page read and write
210677F8000
heap
page read and write
224F935F000
heap
page read and write
21068081000
heap
page read and write
1F6BBF02000
heap
page read and write
21067F5B000
heap
page read and write
210680E6000
heap
page read and write
27494C00000
heap
page read and write
21068123000
heap
page read and write
210677E5000
heap
page read and write
224F9329000
heap
page read and write
3AC0000
heap
page read and write
201D946F000
heap
page read and write
21067FA0000
heap
page read and write
21068681000
heap
page read and write
391E000
stack
page read and write
210680D1000
heap
page read and write
210680F3000
heap
page read and write
210677F8000
heap
page read and write
24269085000
heap
page read and write
487D07E000
stack
page read and write
210680D0000
heap
page read and write
210680A3000
heap
page read and write
3A78000
heap
page read and write
2DA0000
heap
page read and write
224F9356000
heap
page read and write
21068743000
heap
page read and write
33B4E000
stack
page read and write
21068743000
heap
page read and write
2106792C000
heap
page read and write
21068706000
heap
page read and write
224F9378000
heap
page read and write
224F9332000
heap
page read and write
27494C9D000
heap
page read and write
224F9329000
heap
page read and write
32FB1000
heap
page read and write
3660000
unclassified section
page readonly
342A5000
trusted library allocation
page read and write
32FB1000
heap
page read and write
2530000
remote allocation
page execute and read and write
33D00000
remote allocation
page read and write
There are 1418 hidden memdumps, click here to show them.