IOC Report
rpayment.scr.exe

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps201510501,00010010Label

Files

File Path
Type
Category
Malicious
Download
rpayment.scr.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\TmpUserData\Crashpad\throttle_store.dat
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\TmpUserData\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
modified
C:\Users\user\AppData\Local\Temp\TmpUserData\Default\Secure Preferences
JSON data
dropped
C:\Users\user\AppData\Local\Temp\TmpUserData\Local State
JSON data
dropped
C:\Users\user\AppData\Local\Temp\bhv534E.tmp
Extensible storage user DataBase, version 0x620, checksum 0x879bc593, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\bvuzblpqxjlibkaa
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsyD303.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\boblehallers\biklangenes\brainless\Afpilningens\programmeringsbegrebets.txt
Generic INItialization configuration [hypertensive brugskunstneren]
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\boblehallers\biklangenes\brainless\Afpilningens\sc.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, comment: "CREATOR: gd-jpeg v1.0 (using IJG JPEG v62), quality = 82", baseline, precision 8, 2560x1440, components 3
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\boblehallers\biklangenes\brainless\Billigvarers246.til
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\boblehallers\biklangenes\brainless\Guris.Ama
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\boblehallers\biklangenes\brainless\Puddersukker.Uds
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\boblehallers\biklangenes\brainless\godetia.txt
Generic INItialization configuration [MIMRE VINDE]
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\boblehallers\biklangenes\brainless\halefjerens.for
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\boblehallers\biklangenes\brainless\overcarking.iso
data
dropped
\Device\ConDrv
ISO-8859 text, with CRLF line terminators
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rpayment.scr.exe
"C:\Users\user\Desktop\rpayment.scr.exe"
malicious
C:\Users\user\Desktop\rpayment.scr.exe
"C:\Users\user\Desktop\rpayment.scr.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
--user-data-dir=C:\Users\user\AppData\Local\Temp\TmpUserData --headless --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --no-pre-read-main-dll --field-trial-handle=1888,i,16186237348926557625,18343697041951544397,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2180 /prefetch:3
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\bvuzblpqxjlibkaa"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\lqhjbdzrlrdvlywmoke"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\lqhjbdzrlrdvlywmoke"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\nkncuwklzzvanekqxvqgjyt"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
--user-data-dir=C:\Users\user\AppData\Local\Temp\TmpUserData --headless --remote-debugging-port=9222 --profile-directory="Default"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --use-angle=swiftshader-webgl --use-gl=angle --headless --mojo-platform-channel-handle=1680 --field-trial-handle=1384,i,6195158516380223951,15669063586807479138,262144 --disable-features=PaintHolding /prefetch:3
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.office.com/
unknown
http://www.imvu.comr
unknown
http://www.imvu.compData
unknown
https://aefd.nelreports.net/api/report?cat=bingth
unknown
http://www.imvu.com
unknown
https://aefd.nelreports.net/api/report?cat=wsb
unknown
http://c.pki.goog/r/gsr1.crl0
unknown
https://drive.usercontent.google.com/
unknown
http://geoplugin.net/json.gpIVq.
unknown
http://www.nirsoft.net
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://c.pki.goog/we2/64OUIVzpZV4.crl0
unknown
http://i.pki.goog/we2.crt0
unknown
http://o.pki.goog/we20%
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://geoplugin.net/json.gp=
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://www.google.com
unknown
http://nsis.sf.net/NSIS_Error
unknown
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=EL
unknown
https://dl.google.com/update2/installers/icons/%7B8a69d345-d564-463c-aff1-a69d9e530f96%7D.bmp?lang=e
unknown
https://aefd.nelreports.net/api/report?cat=bingaot
unknown
https://drive.google.com/
unknown
https://maps.windows.com/windows-app-web-link
unknown
http://i.pki.goog/gsr1.crt0-
unknown
https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
unknown
http://c.pki.goog/r/r4.crl0
unknown
https://chromewebstore.google.com/
unknown
http://i.pki.goog/r4.crt0
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
https://apis.google.com
unknown
https://clients2.googleusercontent.com/crx/blobs/Ad_brx2zn0VllUfDy3IInsf2x_JT_KYwvCFCBKIccViK8GQrmAxO7uKh27DftB49uvpTV6LoiwfTytfG26LWZ9yEblrh9n2ArDUdsJt1S0eRDzFPHmbtV_p0UKkid0dN6ohjAMZSmuWMxdBIryELE2Jro2LlEMjsJPgraw/EFAIDNBMNNNIBPCAJPCGLCLEFINDMKAJ_25_3_1_1.crx
142.251.35.161
https://chrome.google.com/webstore/
unknown
http://www.nirsoft.net/
unknown
https://aefd.nelreports.net/api/report?cat=wsb&ndcParam=QWthbWFp
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&
unknown
https://drive.google.com/a
unknown
http://www.ebuddy.com
unknown
There are 33 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
geoplugin.net
178.237.33.50
drive.google.com
142.251.41.14
drive.usercontent.google.com
142.251.41.1
googlehosted.l.googleusercontent.com
142.251.35.161
clients2.googleusercontent.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.6
unknown
unknown
malicious
176.65.142.14
unknown
Germany
malicious
142.251.35.161
googlehosted.l.googleusercontent.com
United States
142.251.41.14
drive.google.com
United States
142.251.41.1
drive.usercontent.google.com
United States
178.237.33.50
geoplugin.net
Netherlands
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-HM3EZ8
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-HM3EZ8
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-HM3EZ8
time
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-HM3EZ8
UID
malicious
HKEY_CURRENT_USER\Cormel\bructeri\arachis
Medalet80
HKEY_CURRENT_USER\slapping\Vikariatet199\relegates
funktionsleders
HKEY_CURRENT_USER\Impregnability246\yashmak\pneumatocystic
epinicia
HKEY_CURRENT_USER\afvekslingens\Uninstall\fremdeles\Personificator53
tencteri
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
dr
There are 3 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
3372B000
heap
page read and write
malicious
2B28000
heap
page read and write
malicious
338AB000
heap
page read and write
malicious
3378E000
heap
page read and write
malicious
33C4D000
heap
page read and write
malicious
5078000
direct allocation
page execute and read and write
malicious
2B2C000
heap
page read and write
malicious
338B0000
unclassified section
page execute and read and write
malicious
33B92000
heap
page read and write
malicious
3394B000
heap
page read and write
malicious
33A25000
heap
page read and write
malicious
2AF2000
heap
page read and write
malicious
33668000
heap
page read and write
malicious
400000
system
page execute and read and write
malicious
3372A000
heap
page read and write
malicious
3372A000
heap
page read and write
malicious
3372A000
heap
page read and write
malicious
3372A000
heap
page read and write
malicious
33AE3000
heap
page read and write
malicious
33A2A000
heap
page read and write
malicious
3372A000
heap
page read and write
malicious
336CF000
heap
page read and write
malicious
3372A000
heap
page read and write
malicious
464F000
heap
page read and write
43D1000
heap
page read and write
31F4000
heap
page read and write
33541000
heap
page read and write
48D6000
heap
page read and write
2FDC000
stack
page read and write
4652000
heap
page read and write
4B82000
heap
page read and write
341E000
stack
page read and write
46A0000
heap
page read and write
49F2000
heap
page read and write
3363B000
heap
page read and write
335FF000
heap
page read and write
33870000
direct allocation
page execute and read and write
37AC000
heap
page read and write
615000
heap
page read and write
3363B000
heap
page read and write
4AD7000
heap
page read and write
4676000
heap
page read and write
4914000
heap
page read and write
335BA000
heap
page read and write
4724000
heap
page read and write
4AB3000
heap
page read and write
4AD3000
heap
page read and write
5589000
heap
page read and write
483B000
heap
page read and write
496E000
heap
page read and write
379D000
heap
page read and write
22C0000
heap
page read and write
336D3000
heap
page read and write
37BB000
heap
page read and write
2D7A000
heap
page read and write
2CB9000
heap
page read and write
3362B000
heap
page read and write
48F9000
heap
page read and write
2C17000
heap
page read and write
2A47000
heap
page read and write
3480000
heap
page read and write
4A47000
heap
page read and write
2B43000
heap
page read and write
2B4A000
heap
page read and write
3362B000
heap
page read and write
2B35000
heap
page read and write
37A0000
heap
page read and write
43A4000
heap
page read and write
2B43000
heap
page read and write
335BA000
heap
page read and write
29F5000
heap
page read and write
3050000
heap
page read and write
2B4E000
heap
page read and write
33623000
heap
page read and write
2DB6000
heap
page read and write
33541000
heap
page read and write
2B36000
heap
page read and write
75E000
stack
page read and write
2280000
heap
page read and write
37B5000
heap
page read and write
444C000
heap
page read and write
84E000
heap
page read and write
4930000
heap
page read and write
33608000
heap
page read and write
336DD000
heap
page read and write
43B7000
heap
page read and write
32CCD000
stack
page read and write
33D06000
direct allocation
page execute and read and write
37B5000
heap
page read and write
2C66000
heap
page read and write
4720000
heap
page read and write
4640000
direct allocation
page read and write
45A3000
heap
page read and write
37C3000
heap
page read and write
33541000
heap
page read and write
37B0000
heap
page read and write
83A000
heap
page read and write
22B0000
direct allocation
page read and write
3834000
heap
page read and write
37B5000
heap
page read and write
49FE000
heap
page read and write
2B4E000
heap
page read and write
4B28000
heap
page read and write
4830000
heap
page read and write
55F3000
heap
page read and write
2B6A000
heap
page read and write
4804000
heap
page read and write
4466000
heap
page read and write
3362B000
heap
page read and write
43B3000
heap
page read and write
409000
unkown
page read and write
335BA000
heap
page read and write
897000
heap
page read and write
33716000
heap
page read and write
37C0000
heap
page read and write
37C4000
heap
page read and write
335BA000
heap
page read and write
4852000
heap
page read and write
2B50000
heap
page read and write
33726000
heap
page read and write
452A000
heap
page read and write
37C1000
heap
page read and write
4824000
heap
page read and write
2B4A000
heap
page read and write
2B4A000
heap
page read and write
2A9F000
heap
page read and write
2B4F000
heap
page read and write
5399000
heap
page read and write
2B32000
heap
page read and write
37B0000
heap
page read and write
37C0000
heap
page read and write
2DC8000
heap
page read and write
33C9C000
unclassified section
page execute and read and write
33608000
heap
page read and write
4B0B000
heap
page read and write
37B0000
heap
page read and write
48CA000
heap
page read and write
2CF8000
heap
page read and write
3390000
heap
page read and write
33541000
heap
page read and write
472C000
heap
page read and write
2B4E000
heap
page read and write
4ADE000
heap
page read and write
4B37000
heap
page read and write
528F000
stack
page read and write
335FB000
heap
page read and write
4A6D000
heap
page read and write
377F000
stack
page read and write
37B0000
heap
page read and write
2B4A000
heap
page read and write
28BC000
stack
page read and write
33541000
heap
page read and write
45D6000
heap
page read and write
37C0000
heap
page read and write
2C1E000
heap
page read and write
2B3F000
heap
page read and write
37D2000
heap
page read and write
4747000
heap
page read and write
37FD000
heap
page read and write
33541000
heap
page read and write
335BA000
heap
page read and write
336FE000
heap
page read and write
4A1A000
heap
page read and write
401000
unkown
page execute read
33D4000
heap
page read and write
335BA000
heap
page read and write
811000
heap
page read and write
2B46000
heap
page read and write
318E000
stack
page read and write
37B5000
heap
page read and write
37B3000
heap
page read and write
48A8000
heap
page read and write
7E6000
heap
page read and write
21F0000
heap
page read and write
2B4E000
heap
page read and write
4990000
heap
page read and write
4453000
heap
page read and write
2B3F000
heap
page read and write
3362B000
heap
page read and write
2B6A000
heap
page read and write
33624000
heap
page read and write
3020000
heap
page read and write
37B0000
heap
page read and write
4B0D000
heap
page read and write
2250000
heap
page read and write
4A2B000
heap
page read and write
349D000
heap
page read and write
451E000
heap
page read and write
3790000
heap
page read and write
31F4000
heap
page read and write
2B3C000
heap
page read and write
4689000
heap
page read and write
37E3000
heap
page read and write
470D000
heap
page read and write
37B0000
heap
page read and write
336DE000
heap
page read and write
85E000
heap
page read and write
37A5000
heap
page read and write
38A6000
heap
page read and write
45FC000
heap
page read and write
2D99000
stack
page read and write
37A9000
heap
page read and write
4B19000
heap
page read and write
5AE000
stack
page read and write
3372A000
heap
page read and write
4B15000
heap
page read and write
335F0000
heap
page read and write
2A93000
heap
page read and write
3363B000
heap
page read and write
45F8000
heap
page read and write
45E5000
heap
page read and write
37A9000
heap
page read and write
33668000
heap
page read and write
45AE000
heap
page read and write
38AD000
heap
page read and write
4BDB000
heap
page read and write
2B6A000
heap
page read and write
4938000
heap
page read and write
42F000
unkown
page read and write
2B4E000
heap
page read and write
4A28000
heap
page read and write
33604000
heap
page read and write
2B4A000
heap
page read and write
2B4F000
heap
page read and write
2D57000
heap
page read and write
32EAF000
stack
page read and write
47A4000
heap
page read and write
45C000
system
page execute and read and write
2A88000
heap
page read and write
10000000
unkown
page readonly
31F4000
heap
page read and write
33703000
heap
page read and write
2ACC000
heap
page read and write
3363B000
heap
page read and write
3362B000
heap
page read and write
47A8000
heap
page read and write
4A66000
heap
page read and write
37A8000
heap
page read and write
3362B000
heap
page read and write
2C35000
heap
page read and write
280F000
stack
page read and write
4634000
heap
page read and write
46A4000
heap
page read and write
2C3D000
heap
page read and write
37C0000
heap
page read and write
4AAF000
heap
page read and write
33668000
heap
page read and write
4A11000
heap
page read and write
4733000
heap
page read and write
33608000
heap
page read and write
4943000
heap
page read and write
4ADA000
heap
page read and write
2B4A000
heap
page read and write
335F7000
heap
page read and write
456C000
heap
page read and write
335BA000
heap
page read and write
400000
unkown
page readonly
407000
unkown
page readonly
4630000
direct allocation
page read and write
4A43000
heap
page read and write
37B0000
heap
page read and write
2C0D000
heap
page read and write
482C000
heap
page read and write
47C6000
heap
page read and write
481F000
heap
page read and write
37AC000
heap
page read and write
37D8000
heap
page read and write
4B9D000
heap
page read and write
37CA000
heap
page read and write
37A1000
heap
page read and write
491C000
heap
page read and write
31F4000
heap
page read and write
4901000
heap
page read and write
448000
unkown
page readonly
2D4B000
heap
page read and write
335BA000
heap
page read and write
37B3000
heap
page read and write
4B33000
heap
page read and write
44BB000
heap
page read and write
37B1000
heap
page read and write
48EE000
heap
page read and write
335C3000
heap
page read and write
33D5000
heap
page read and write
5481000
heap
page read and write
4514000
heap
page read and write
32E30000
remote allocation
page read and write
37C0000
heap
page read and write
37BC000
heap
page read and write
5580000
trusted library allocation
page read and write
3362B000
heap
page read and write
335F0000
heap
page read and write
4A05000
heap
page read and write
2B4E000
heap
page read and write
37C0000
heap
page read and write
4843000
heap
page read and write
49B0000
heap
page read and write
47B3000
heap
page read and write
33872000
direct allocation
page execute and read and write
4764000
heap
page read and write
48C7000
heap
page read and write
33170000
heap
page read and write
446E000
heap
page read and write
495A000
heap
page read and write
4656000
heap
page read and write
2E40000
direct allocation
page read and write
2B4A000
heap
page read and write
29C0000
heap
page read and write
33CF000
stack
page read and write
2B6B000
heap
page read and write
760000
heap
page read and write
33604000
heap
page read and write
4539000
heap
page read and write
2B4A000
heap
page read and write
5780000
trusted library allocation
page read and write
3372A000
heap
page read and write
497A000
heap
page read and write
336CE000
heap
page read and write
2C27000
heap
page read and write
336CE000
heap
page read and write
2A79000
heap
page read and write
4406000
heap
page read and write
336CE000
heap
page read and write
4AC0000
heap
page read and write
46A8000
heap
page read and write
336CE000
heap
page read and write
467A000
heap
page read and write
476D000
heap
page read and write
2FEF000
stack
page read and write
2B43000
heap
page read and write
4A76000
heap
page read and write
33608000
heap
page read and write
335BA000
heap
page read and write
4998000
heap
page read and write
4669000
heap
page read and write
4985000
heap
page read and write
4705000
heap
page read and write
2B43000
heap
page read and write
4A5E000
heap
page read and write
382C000
heap
page read and write
44F0000
heap
page read and write
2E80000
direct allocation
page read and write
2C46000
heap
page read and write
2B4A000
heap
page read and write
2A08000
heap
page read and write
2B4A000
heap
page read and write
4B95000
heap
page read and write
4B20000
heap
page read and write
21CE000
stack
page read and write
37A5000
heap
page read and write
440E000
heap
page read and write
37AC000
heap
page read and write
32BCD000
stack
page read and write
2D04000
heap
page read and write
2D40000
heap
page read and write
2A90000
heap
page read and write
37C0000
heap
page read and write
4AEE000
heap
page read and write
37A4000
heap
page read and write
4457000
heap
page read and write
4450000
heap
page read and write
33702000
heap
page read and write
49AB000
heap
page read and write
459B000
heap
page read and write
4A62000
heap
page read and write
2D47000
heap
page read and write
37A9000
heap
page read and write
4424000
heap
page read and write
2B3F000
heap
page read and write
4610000
direct allocation
page read and write
37C0000
heap
page read and write
3313F000
stack
page read and write
335DA000
heap
page read and write
2A5C000
heap
page read and write
367F000
stack
page read and write
37A1000
heap
page read and write
47CA000
heap
page read and write
4690000
direct allocation
page read and write
4909000
heap
page read and write
4415000
heap
page read and write
400000
unkown
page readonly
33541000
heap
page read and write
33D5000
heap
page read and write
2B3F000
heap
page read and write
443B000
heap
page read and write
37B5000
heap
page read and write
37E5000
heap
page read and write
4728000
heap
page read and write
33841000
direct allocation
page execute and read and write
4A85000
heap
page read and write
2B4E000
heap
page read and write
44AC000
heap
page read and write
335F0000
heap
page read and write
2D13000
heap
page read and write
4972000
heap
page read and write
46AB000
heap
page read and write
3460000
heap
page read and write
33541000
heap
page read and write
4428000
heap
page read and write
37B5000
heap
page read and write
4B8D000
heap
page read and write
2B4E000
heap
page read and write
449D000
heap
page read and write
4A95000
heap
page read and write
5091000
heap
page read and write
33608000
heap
page read and write
2B00000
heap
page read and write
22C5000
heap
page read and write
37B0000
heap
page read and write
448000
unkown
page readonly
2CF5000
heap
page read and write
37C0000
heap
page read and write
4AA0000
heap
page read and write
4BD7000
heap
page read and write
33D4000
heap
page read and write
37AC000
heap
page read and write
33CC0000
unclassified section
page execute and read and write
481B000
heap
page read and write
335FA000
heap
page read and write
48B4000
heap
page read and write
33640000
heap
page read and write
341E000
stack
page read and write
2DC4000
heap
page read and write
32D20000
heap
page read and write
37A4000
heap
page read and write
2C2A000
heap
page read and write
37D9000
heap
page read and write
43A8000
heap
page read and write
47FD000
heap
page read and write
37AC000
heap
page read and write
2B4A000
heap
page read and write
3080000
heap
page read and write
48AC000
heap
page read and write
4444000
heap
page read and write
33608000
heap
page read and write
4B1D000
heap
page read and write
45F4000
heap
page read and write
48BB000
heap
page read and write
37B0000
heap
page read and write
4A20000
heap
page read and write
2B50000
heap
page read and write
37B8000
heap
page read and write
37EC000
heap
page read and write
47BB000
heap
page read and write
472F000
heap
page read and write
37C1000
heap
page read and write
33702000
heap
page read and write
30BC000
stack
page read and write
467E000
heap
page read and write
4A18000
heap
page read and write
2A19000
heap
page read and write
440A000
heap
page read and write
4694000
heap
page read and write
48AA000
heap
page read and write
4833000
heap
page read and write
336CE000
heap
page read and write
336DD000
heap
page read and write
2C7F000
heap
page read and write
4604000
heap
page read and write
2B4E000
heap
page read and write
33608000
heap
page read and write
493B000
heap
page read and write
2A5A000
heap
page read and write
4AFA000
heap
page read and write
37D8000
heap
page read and write
31F4000
heap
page read and write
44F4000
heap
page read and write
2B6A000
heap
page read and write
409000
unkown
page write copy
81B000
heap
page read and write
3823000
heap
page read and write
37C7000
heap
page read and write
45AB000
heap
page read and write
4956000
heap
page read and write
2B46000
heap
page read and write
3363B000
heap
page read and write
401000
unkown
page execute read
33D5000
heap
page read and write
4A01000
heap
page read and write
45DD000
heap
page read and write
3367F000
heap
page read and write
4AB8000
heap
page read and write
3000000
heap
page read and write
2B6A000
heap
page read and write
4BA4000
heap
page read and write
33541000
heap
page read and write
335BA000
heap
page read and write
4536000
heap
page read and write
4610000
heap
page read and write
10001000
unkown
page execute read
4507000
heap
page read and write
4A53000
heap
page read and write
4CAE000
stack
page read and write
446A000
heap
page read and write
4B8A000
heap
page read and write
453D000
heap
page read and write
37B3000
heap
page read and write
33D4000
heap
page read and write
33873000
direct allocation
page read and write
2B43000
heap
page read and write
2D5A000
heap
page read and write
37A1000
heap
page read and write
336CE000
heap
page read and write
5390000
trusted library allocation
page read and write
2C98000
heap
page read and write
337EF000
heap
page read and write
407000
unkown
page readonly
2C55000
heap
page read and write
2B4A000
heap
page read and write
37B1000
heap
page read and write
43C2000
heap
page read and write
4738000
heap
page read and write
31F4000
heap
page read and write
48F2000
heap
page read and write
4492000
heap
page read and write
4961000
heap
page read and write
2B43000
heap
page read and write
464B000
heap
page read and write
365F000
stack
page read and write
335BA000
heap
page read and write
2C4A000
heap
page read and write
44B8000
heap
page read and write
4AAC000
heap
page read and write
5589000
heap
page read and write
336CF000
heap
page read and write
49FA000
heap
page read and write
2FBC000
stack
page read and write
45E9000
heap
page read and write
33D0000
heap
page read and write
469C000
heap
page read and write
335BA000
heap
page read and write
33D4000
heap
page read and write
5481000
heap
page read and write
5090000
heap
page read and write
33608000
heap
page read and write
4715000
heap
page read and write
7A0000
heap
page read and write
4989000
heap
page read and write
2C74000
heap
page read and write
37B0000
heap
page read and write
37CA000
heap
page read and write
3363B000
heap
page read and write
37B0000
heap
page read and write
4A41000
heap
page read and write
45F0000
direct allocation
page read and write
37F2000
heap
page read and write
4672000
heap
page read and write
16E0000
remote allocation
page execute and read and write
29BB000
stack
page read and write
55F2000
heap
page read and write
33608000
heap
page read and write
33541000
heap
page read and write
335BA000
heap
page read and write
3363B000
heap
page read and write
33541000
heap
page read and write
37C4000
heap
page read and write
2B3F000
heap
page read and write
4BDF000
heap
page read and write
37E1000
heap
page read and write
2B6A000
heap
page read and write
2B58000
heap
page read and write
37D4000
heap
page read and write
335F7000
heap
page read and write
2A50000
heap
page read and write
37A9000
heap
page read and write
2B6A000
heap
page read and write
37C1000
heap
page read and write
2C59000
heap
page read and write
4762000
heap
page read and write
2B4E000
heap
page read and write
2E10000
direct allocation
page read and write
401000
unkown
page execute read
2B4A000
heap
page read and write
480C000
heap
page read and write
48E1000
heap
page read and write
33D5000
heap
page read and write
2C5D000
heap
page read and write
4866000
heap
page read and write
335FC000
heap
page read and write
33608000
heap
page read and write
4A1D000
heap
page read and write
4532000
heap
page read and write
48EA000
heap
page read and write
4AC4000
heap
page read and write
33541000
heap
page read and write
3372A000
heap
page read and write
4554000
heap
page read and write
2DAB000
heap
page read and write
409000
unkown
page write copy
37A9000
heap
page read and write
826000
heap
page read and write
47EA000
heap
page read and write
379C000
heap
page read and write
2B50000
heap
page read and write
37C6000
heap
page read and write
445B000
heap
page read and write
3081000
heap
page read and write
45BE000
heap
page read and write
2B43000
heap
page read and write
3363B000
heap
page read and write
447A000
heap
page read and write
329E000
stack
page read and write
33C96000
unclassified section
page execute and read and write
4BB4000
heap
page read and write
7DC000
heap
page read and write
347C000
heap
page read and write
37AC000
heap
page read and write
7F3000
heap
page read and write
560000
heap
page read and write
45B2000
heap
page read and write
37A1000
heap
page read and write
499C000
heap
page read and write
2B4E000
heap
page read and write
2C70000
heap
page read and write
31F4000
heap
page read and write
37A5000
heap
page read and write
2B4A000
heap
page read and write
4BA8000
heap
page read and write
33D5000
heap
page read and write
5EE000
stack
page read and write
5091000
heap
page read and write
4B91000
heap
page read and write
495E000
heap
page read and write
33541000
heap
page read and write
2E70000
direct allocation
page read and write
335C6000
heap
page read and write
4711000
heap
page read and write
4600000
heap
page read and write
2AF7000
heap
page read and write
2B4A000
heap
page read and write
2A1B000
heap
page read and write
19A000
stack
page read and write
2B6A000
heap
page read and write
4AE2000
heap
page read and write
332C0000
trusted library allocation
page read and write
47F5000
heap
page read and write
33880000
trusted library allocation
page read and write
2C51000
heap
page read and write
335FB000
heap
page read and write
32E6E000
stack
page read and write
2CAA000
heap
page read and write
48B7000
heap
page read and write
3368F000
heap
page read and write
2D44000
heap
page read and write
46B4000
heap
page read and write
306F000
heap
page read and write
2B4A000
heap
page read and write
4766000
heap
page read and write
4B7E000
heap
page read and write
4A45000
heap
page read and write
3806000
heap
page read and write
45ED000
heap
page read and write
3386B000
direct allocation
page execute and read and write
474D000
stack
page read and write
37B5000
heap
page read and write
3300000
heap
page read and write
2DB2000
heap
page read and write
335BA000
heap
page read and write
37D2000
heap
page read and write
465A000
heap
page read and write
4722000
heap
page read and write
434000
unkown
page read and write
494B000
heap
page read and write
2B6A000
heap
page read and write
2B50000
heap
page read and write
4934000
heap
page read and write
2C2E000
heap
page read and write
335BA000
heap
page read and write
45F0000
heap
page read and write
809000
heap
page read and write
4594000
heap
page read and write
456000
system
page execute and read and write
2B43000
heap
page read and write
4790000
heap
page read and write
48DA000
heap
page read and write
37C1000
heap
page read and write
7AA000
heap
page read and write
2B4E000
heap
page read and write
33D4000
heap
page read and write
37DA000
heap
page read and write
335BA000
heap
page read and write
2B3F000
heap
page read and write
33541000
heap
page read and write
33541000
heap
page read and write
32FFD000
stack
page read and write
37A1000
heap
page read and write
32E30000
remote allocation
page read and write
3010000
heap
page readonly
37BC000
heap
page read and write
33D4000
heap
page read and write
335BA000
heap
page read and write
33D4000
heap
page read and write
33C40000
unclassified section
page execute and read and write
43D5000
heap
page read and write
335C2000
heap
page read and write
2E50000
direct allocation
page read and write
2B3F000
heap
page read and write
43DD000
heap
page read and write
48F6000
heap
page read and write
33840000
direct allocation
page read and write
37A5000
heap
page read and write
2B4A000
heap
page read and write
37C0000
heap
page read and write
480000
heap
page read and write
37CE000
heap
page read and write
452E000
heap
page read and write
2B43000
heap
page read and write
37C0000
heap
page read and write
2A9B000
heap
page read and write
331BE000
stack
page read and write
2D38000
heap
page read and write
2CED000
heap
page read and write
2DCC000
heap
page read and write
37B7000
heap
page read and write
47B7000
heap
page read and write
37C4000
heap
page read and write
47E2000
heap
page read and write
2B4A000
heap
page read and write
466D000
heap
page read and write
3362B000
heap
page read and write
4BCF000
heap
page read and write
47F9000
heap
page read and write
37AC000
heap
page read and write
33541000
heap
page read and write
2DA2000
heap
page read and write
4B11000
heap
page read and write
4AC7000
heap
page read and write
33D5000
heap
page read and write
2CC6000
heap
page read and write
448E000
heap
page read and write
2E60000
direct allocation
page read and write
492C000
heap
page read and write
4771000
heap
page read and write
4A8D000
heap
page read and write
4512000
heap
page read and write
4421000
heap
page read and write
4A38000
heap
page read and write
47A0000
heap
page read and write
4A4F000
heap
page read and write
2C13000
heap
page read and write
2CC1000
heap
page read and write
335BA000
heap
page read and write
2C39000
heap
page read and write
37A8000
heap
page read and write
328DD000
stack
page read and write
2C42000
heap
page read and write
2A57000
heap
page read and write
4965000
heap
page read and write
37BC000
heap
page read and write
43C6000
heap
page read and write
55F3000
heap
page read and write
4A3C000
heap
page read and write
493F000
heap
page read and write
2D9E000
heap
page read and write
4856000
heap
page read and write
2AA6000
heap
page read and write
2A14000
heap
page read and write
335BA000
heap
page read and write
2D6B000
heap
page read and write
37E3000
heap
page read and write
99F000
stack
page read and write
3363B000
heap
page read and write
37C0000
heap
page read and write
7F9000
heap
page read and write
2B4F000
heap
page read and write
2D53000
heap
page read and write
2B3F000
heap
page read and write
2CF1000
heap
page read and write
33653000
heap
page read and write
4698000
heap
page read and write
830000
heap
page read and write
37AC000
heap
page read and write
38A6000
heap
page read and write
3340000
heap
page readonly
2AF8000
heap
page read and write
49A0000
heap
page read and write
46FA000
heap
page read and write
44ED000
heap
page read and write
43E2000
heap
page read and write
2A10000
heap
page read and write
2C04000
heap
page read and write
2A27000
heap
page read and write
335F7000
heap
page read and write
4AFE000
heap
page read and write
2CE5000
heap
page read and write
21B8000
remote allocation
page execute and read and write
37B5000
heap
page read and write
2FBC000
stack
page read and write
2B4E000
heap
page read and write
2D0B000
heap
page read and write
336CE000
heap
page read and write
401000
unkown
page execute read
2B43000
heap
page read and write
335FA000
heap
page read and write
2B41000
heap
page read and write
2B7E000
heap
page read and write
4567000
heap
page read and write
4BE6000
heap
page read and write
4A89000
heap
page read and write
4927000
heap
page read and write
33541000
heap
page read and write
332BF000
stack
page read and write
2B4A000
heap
page read and write
44BF000
heap
page read and write
4810000
heap
page read and write
2B3C000
heap
page read and write
4753000
heap
page read and write
2C61000
heap
page read and write
7AE000
heap
page read and write
29D0000
heap
page read and write
2B43000
heap
page read and write
45C5000
heap
page read and write
46AF000
heap
page read and write
2C09000
heap
page read and write
33541000
heap
page read and write
38AD000
heap
page read and write
2DCF000
heap
page read and write
474B000
heap
page read and write
2C88000
heap
page read and write
2B4A000
heap
page read and write
4BB0000
heap
page read and write
2270000
direct allocation
page read and write
335BA000
heap
page read and write
37C0000
heap
page read and write
4A0D000
heap
page read and write
7D9000
heap
page read and write
32D30000
heap
page read and write
3390E000
unclassified section
page execute and read and write
4598000
heap
page read and write
33652000
heap
page read and write
32E30000
remote allocation
page read and write
33541000
heap
page read and write
4923000
heap
page read and write
858000
heap
page read and write
45E000
system
page execute and read and write
4516000
heap
page read and write
2B4E000
heap
page read and write
498D000
heap
page read and write
37B0000
heap
page read and write
4600000
direct allocation
page read and write
4BC9000
heap
page read and write
2C6D000
heap
page read and write
4981000
heap
page read and write
2D5C000
stack
page read and write
33541000
heap
page read and write
31F4000
heap
page read and write
4905000
heap
page read and write
2C31000
heap
page read and write
31C3000
heap
page read and write
37B1000
heap
page read and write
33CF0000
direct allocation
page read and write
37B3000
heap
page read and write
37A1000
heap
page read and write
4744000
heap
page read and write
5480000
heap
page read and write
4740000
heap
page read and write
4837000
heap
page read and write
31CD000
heap
page read and write
37A1000
heap
page read and write
475A000
heap
page read and write
4500000
heap
page read and write
335BA000
heap
page read and write
460B000
heap
page read and write
4607000
heap
page read and write
3488000
heap
page read and write
37CA000
heap
page read and write
37C0000
heap
page read and write
335BA000
heap
page read and write
2CAE000
heap
page read and write
37D2000
heap
page read and write
2B3F000
heap
page read and write
37AC000
heap
page read and write
2B4A000
heap
page read and write
4775000
heap
page read and write
2B3D000
heap
page read and write
335ED000
heap
page read and write
53EF000
stack
page read and write
2A30000
heap
page read and write
37AC000
heap
page read and write
37B3000
heap
page read and write
335FB000
heap
page read and write
33541000
heap
page read and write
37BC000
heap
page read and write
37A1000
heap
page read and write
335BA000
heap
page read and write
5780000
trusted library allocation
page read and write
4A83000
heap
page read and write
22A0000
direct allocation
page read and write
455C000
heap
page read and write
2A84000
heap
page read and write
47D5000
heap
page read and write
37C0000
heap
page read and write
37B1000
heap
page read and write
2B4A000
heap
page read and write
2B4E000
heap
page read and write
2D71000
heap
page read and write
45D2000
heap
page read and write
476A000
heap
page read and write
37AF000
heap
page read and write
33541000
heap
page read and write
337EF000
heap
page read and write
45C9000
heap
page read and write
33D4000
heap
page read and write
3080000
heap
page read and write
4A7A000
heap
page read and write
400000
unkown
page readonly
4665000
heap
page read and write
5780000
trusted library allocation
page read and write
2B4E000
heap
page read and write
2A2C000
heap
page read and write
37B0000
heap
page read and write
5581000
heap
page read and write
2A55000
heap
page read and write
335BA000
heap
page read and write
4A25000
heap
page read and write
400000
system
page execute and read and write
4472000
heap
page read and write
37D2000
heap
page read and write
4861000
heap
page read and write
4560000
heap
page read and write
33541000
heap
page read and write
2B4A000
heap
page read and write
468D000
heap
page read and write
33924000
unclassified section
page execute and read and write
2C9B000
heap
page read and write
3363B000
heap
page read and write
2D18000
heap
page read and write
37C0000
heap
page read and write
4681000
heap
page read and write
3362B000
heap
page read and write
4B2C000
heap
page read and write
2B4E000
heap
page read and write
336DE000
heap
page read and write
336E6000
heap
page read and write
484E000
heap
page read and write
4437000
heap
page read and write
2C68000
heap
page read and write
4814000
heap
page read and write
2D4F000
stack
page read and write
2D0F000
heap
page read and write
4A91000
heap
page read and write
48C3000
heap
page read and write
4434000
heap
page read and write
4B3C000
heap
page read and write
33702000
heap
page read and write
379F000
heap
page read and write
2A0C000
heap
page read and write
445F000
heap
page read and write
2A23000
heap
page read and write
4430000
heap
page read and write
4550000
heap
page read and write
4709000
heap
page read and write
42B000
unkown
page read and write
33D4000
heap
page read and write
4700000
heap
page read and write
2B4A000
heap
page read and write
4A9C000
heap
page read and write
335BA000
heap
page read and write
3363B000
heap
page read and write
47E6000
heap
page read and write
37F8000
heap
page read and write
336EE000
heap
page read and write
2DDC000
heap
page read and write
2B10000
heap
page read and write
335EC000
heap
page read and write
2AB1000
heap
page read and write
4B09000
heap
page read and write
43AB000
heap
page read and write
2B43000
heap
page read and write
400000
unkown
page readonly
407000
unkown
page readonly
4718000
heap
page read and write
4AA8000
heap
page read and write
4A69000
heap
page read and write
2FD7000
stack
page read and write
31C0000
heap
page read and write
4A71000
heap
page read and write
4BAC000
heap
page read and write
32B70000
heap
page read and write
336FD000
heap
page read and write
5481000
heap
page read and write
2E30000
direct allocation
page read and write
4FA0000
direct allocation
page execute and read and write
2B4E000
heap
page read and write
2AA3000
heap
page read and write
4ACB000
heap
page read and write
4947000
heap
page read and write
4AA4000
heap
page read and write
31F4000
heap
page read and write
10003000
unkown
page readonly
4638000
heap
page read and write
33541000
heap
page read and write
33541000
heap
page read and write
48B0000
heap
page read and write
3372A000
heap
page read and write
4BE2000
heap
page read and write
2C78000
heap
page read and write
4846000
heap
page read and write
223E000
stack
page read and write
2B4A000
heap
page read and write
43BE000
heap
page read and write
3790000
heap
page read and write
4481000
heap
page read and write
3363B000
heap
page read and write
47F1000
heap
page read and write
4448000
heap
page read and write
4A09000
heap
page read and write
2A40000
heap
page read and write
2B43000
heap
page read and write
37C4000
heap
page read and write
2B50000
heap
page read and write
2CA6000
heap
page read and write
37AF000
heap
page read and write
4ABC000
heap
page read and write
33641000
heap
page read and write
31F4000
heap
page read and write
45E1000
heap
page read and write
2B43000
heap
page read and write
3058000
heap
page read and write
5780000
trusted library allocation
page read and write
4BBB000
heap
page read and write
2B4A000
heap
page read and write
4AE6000
heap
page read and write
37A9000
heap
page read and write
2C9F000
heap
page read and write
4525000
heap
page read and write
2C00000
heap
page read and write
47D9000
heap
page read and write
2AF5000
heap
page read and write
2CE9000
heap
page read and write
44C8000
heap
page read and write
49A7000
heap
page read and write
3362B000
heap
page read and write
48FD000
heap
page read and write
46F6000
heap
page read and write
33D4000
heap
page read and write
37AC000
heap
page read and write
336CE000
heap
page read and write
335BA000
heap
page read and write
2DB9000
heap
page read and write
3372A000
heap
page read and write
4591000
heap
page read and write
37B0000
heap
page read and write
33541000
heap
page read and write
4660000
direct allocation
page read and write
33D4000
heap
page read and write
2D66000
heap
page read and write
2A1F000
heap
page read and write
441D000
heap
page read and write
336FE000
heap
page read and write
37B0000
heap
page read and write
2B3F000
heap
page read and write
2B4E000
heap
page read and write
43D9000
heap
page read and write
3362B000
heap
page read and write
4751000
heap
page read and write
32A5E000
stack
page read and write
41B000
system
page execute and read and write
2CA3000
heap
page read and write
2D4F000
heap
page read and write
21F4000
heap
page read and write
4486000
heap
page read and write
2B7E000
heap
page read and write
3260000
heap
page read and write
335BA000
heap
page read and write
2AE1000
heap
page read and write
33541000
heap
page read and write
2C0F000
heap
page read and write
37DA000
heap
page read and write
37C0000
heap
page read and write
37C4000
heap
page read and write
31CD000
heap
page read and write
4411000
heap
page read and write
4476000
heap
page read and write
29F0000
heap
page read and write
2A97000
heap
page read and write
335FB000
heap
page read and write
37B5000
heap
page read and write
4A7E000
heap
page read and write
4D40000
heap
page read and write
270E000
stack
page read and write
2B4E000
heap
page read and write
335BA000
heap
page read and write
4499000
heap
page read and write
37CF000
heap
page read and write
2B4B000
heap
page read and write
47AB000
heap
page read and write
2B6A000
heap
page read and write
3468000
heap
page read and write
4BA0000
heap
page read and write
2B4E000
heap
page read and write
4FA0000
heap
page read and write
33608000
heap
page read and write
459F000
heap
page read and write
2B4A000
heap
page read and write
3250000
heap
page readonly
49F6000
heap
page read and write
7E2000
heap
page read and write
31F4000
heap
page read and write
336CE000
heap
page read and write
4B24000
heap
page read and write
4969000
heap
page read and write
2CB2000
heap
page read and write
33CDB000
unclassified section
page execute and read and write
4859000
heap
page read and write
33697000
heap
page read and write
448000
unkown
page readonly
38AD000
heap
page read and write
4801000
heap
page read and write
2DD3000
heap
page read and write
31F4000
heap
page read and write
45DA000
heap
page read and write
38AD000
heap
page read and write
450F000
heap
page read and write
37D7000
heap
page read and write
43CA000
heap
page read and write
335EC000
heap
page read and write
4920000
heap
page read and write
7DE000
heap
page read and write
33D4000
heap
page read and write
448A000
heap
page read and write
45BA000
heap
page read and write
4463000
heap
page read and write
44B4000
heap
page read and write
43A0000
heap
page read and write
3372A000
heap
page read and write
335F0000
heap
page read and write
335BA000
heap
page read and write
2B6A000
heap
page read and write
336EE000
heap
page read and write
33608000
heap
page read and write
37C0000
heap
page read and write
33D4000
heap
page read and write
44B0000
heap
page read and write
4AF2000
heap
page read and write
33541000
heap
page read and write
475E000
heap
page read and write
37AC000
heap
page read and write
2B43000
heap
page read and write
2AAC000
heap
page read and write
2E20000
direct allocation
page read and write
2AB5000
heap
page read and write
4650000
direct allocation
page read and write
4643000
heap
page read and write
409000
unkown
page write copy
3362B000
heap
page read and write
33608000
heap
page read and write
44C3000
heap
page read and write
2B6A000
heap
page read and write
44A5000
heap
page read and write
33541000
heap
page read and write
4670000
direct allocation
page read and write
4918000
heap
page read and write
3303E000
stack
page read and write
46A0000
direct allocation
page read and write
4952000
heap
page read and write
882000
heap
page read and write
3363B000
heap
page read and write
335BA000
heap
page read and write
335BA000
heap
page read and write
335F7000
heap
page read and write
2B4A000
heap
page read and write
44A8000
heap
page read and write
5780000
trusted library allocation
page read and write
45CE000
heap
page read and write
2C0B000
heap
page read and write
2A4B000
heap
page read and write
3362B000
heap
page read and write
335FB000
heap
page read and write
37BC000
heap
page read and write
31F0000
heap
page read and write
2DD7000
heap
page read and write
335FA000
heap
page read and write
4541000
heap
page read and write
33608000
heap
page read and write
4503000
heap
page read and write
37AC000
heap
page read and write
844000
heap
page read and write
465E000
heap
page read and write
3370E000
heap
page read and write
2B3F000
heap
page read and write
47CE000
heap
page read and write
2B3F000
heap
page read and write
335BA000
heap
page read and write
4A49000
heap
page read and write
5580000
heap
page read and write
474000
system
page execute and read and write
3842000
heap
page read and write
2DBC000
heap
page read and write
3430000
heap
page read and write
33608000
heap
page read and write
4563000
heap
page read and write
33541000
heap
page read and write
5481000
heap
page read and write
3069000
heap
page read and write
400000
system
page execute and read and write
2B4E000
heap
page read and write
2AF2000
heap
page read and write
5780000
trusted library allocation
page read and write
2B4E000
heap
page read and write
446000
unkown
page read and write
335BA000
heap
page read and write
3362B000
heap
page read and write
37B1000
heap
page read and write
37E2000
heap
page read and write
4558000
heap
page read and write
33D4000
heap
page read and write
33541000
heap
page read and write
483F000
heap
page read and write
490C000
heap
page read and write
49A4000
heap
page read and write
463F000
heap
page read and write
2C90000
heap
page read and write
33541000
heap
page read and write
10005000
unkown
page readonly
32A0000
heap
page read and write
31F4000
heap
page read and write
2AF8000
heap
page read and write
2A68000
heap
page read and write
485D000
heap
page read and write
3240000
heap
page read and write
610000
heap
page read and write
31F4000
heap
page read and write
4419000
heap
page read and write
37B0000
heap
page read and write
3780000
heap
page read and write
2B43000
heap
page read and write
335BA000
heap
page read and write
4A99000
heap
page read and write
4AF5000
heap
page read and write
447D000
heap
page read and write
2CB6000
heap
page read and write
4A4C000
heap
page read and write
2C7B000
heap
page read and write
2CDE000
heap
page read and write
4B06000
heap
page read and write
43AF000
heap
page read and write
2DC1000
heap
page read and write
48D2000
heap
page read and write
37FD000
heap
page read and write
803000
heap
page read and write
48BF000
heap
page read and write
454C000
heap
page read and write
46FE000
heap
page read and write
4994000
heap
page read and write
37C6000
heap
page read and write
5A78000
direct allocation
page execute and read and write
4A56000
heap
page read and write
2D3C000
heap
page read and write
290F000
stack
page read and write
2B43000
heap
page read and write
4680000
direct allocation
page read and write
335EC000
heap
page read and write
335BA000
heap
page read and write
335BA000
heap
page read and write
33D4000
heap
page read and write
37A9000
heap
page read and write
37AF000
heap
page read and write
37A5000
heap
page read and write
448000
unkown
page readonly
47AF000
heap
page read and write
2A44000
heap
page read and write
33702000
heap
page read and write
4691000
heap
page read and write
2B6A000
heap
page read and write
37A1000
heap
page read and write
463C000
heap
page read and write
3363B000
heap
page read and write
98000
stack
page read and write
5588000
heap
page read and write
407000
unkown
page readonly
2B3D000
heap
page read and write
2DAD000
heap
page read and write
443F000
heap
page read and write
4B78000
heap
page read and write
336F6000
heap
page read and write
2B4F000
heap
page read and write
17B8000
remote allocation
page execute and read and write
37C1000
heap
page read and write
3362B000
heap
page read and write
33541000
heap
page read and write
4A34000
heap
page read and write
2A3E000
stack
page read and write
3842000
heap
page read and write
4BCC000
heap
page read and write
37B0000
heap
page read and write
45C1000
heap
page read and write
2C8C000
heap
page read and write
4818000
heap
page read and write
48CE000
heap
page read and write
4B02000
heap
page read and write
2A04000
heap
page read and write
37B4000
heap
page read and write
4549000
heap
page read and write
4B30000
heap
page read and write
336DF000
heap
page read and write
335BA000
heap
page read and write
37B7000
heap
page read and write
44A1000
heap
page read and write
2CE2000
heap
page read and write
47C2000
heap
page read and write
37B0000
heap
page read and write
2AC3000
heap
page read and write
2C84000
heap
page read and write
37B5000
heap
page read and write
86E000
heap
page read and write
2CDA000
heap
page read and write
4808000
heap
page read and write
33608000
heap
page read and write
2C93000
heap
page read and write
2D62000
heap
page read and write
43BB000
heap
page read and write
2B6A000
heap
page read and write
336E6000
heap
page read and write
47EE000
heap
page read and write
2B4A000
heap
page read and write
33D5000
heap
page read and write
4757000
heap
page read and write
4BD3000
heap
page read and write
37A1000
heap
page read and write
47BE000
heap
page read and write
37B3000
heap
page read and write
338E000
stack
page read and write
48E5000
heap
page read and write
382C000
heap
page read and write
2B4A000
heap
page read and write
31F4000
heap
page read and write
2D75000
heap
page read and write
37B0000
heap
page read and write
2B7E000
heap
page read and write
336CC000
heap
page read and write
37C1000
heap
page read and write
3820000
heap
page read and write
3371D000
heap
page read and write
44FB000
heap
page read and write
4B99000
heap
page read and write
71F000
stack
page read and write
4521000
heap
page read and write
38A0000
heap
page read and write
37C0000
heap
page read and write
4976000
heap
page read and write
45B6000
heap
page read and write
48DD000
heap
page read and write
2B3F000
heap
page read and write
2B4E000
heap
page read and write
33D4000
heap
page read and write
471C000
heap
page read and write
2E00000
direct allocation
page read and write
379C000
heap
page read and write
2B43000
heap
page read and write
2A80000
heap
page read and write
494E000
heap
page read and write
31F4000
heap
page read and write
37B0000
heap
page read and write
2D08000
heap
page read and write
2D00000
heap
page read and write
2D6D000
heap
page read and write
335FA000
heap
page read and write
2B4A000
heap
page read and write
43CE000
heap
page read and write
2B50000
heap
page read and write
37CF000
heap
page read and write
2FDB000
stack
page read and write
33541000
heap
page read and write
2240000
heap
page read and write
379C000
heap
page read and write
4A2F000
heap
page read and write
33540000
heap
page read and write
2B4A000
heap
page read and write
4BB7000
heap
page read and write
2B6A000
heap
page read and write
47D1000
heap
page read and write
473C000
heap
page read and write
3366E000
heap
page read and write
2F9C000
stack
page read and write
335FB000
heap
page read and write
45A7000
heap
page read and write
2C4E000
heap
page read and write
55F2000
heap
page read and write
32EFC000
stack
page read and write
4A5A000
heap
page read and write
2C1B000
heap
page read and write
33653000
heap
page read and write
4828000
heap
page read and write
47DD000
heap
page read and write
4ACF000
heap
page read and write
37A9000
heap
page read and write
4545000
heap
page read and write
2B4E000
heap
page read and write
33541000
heap
page read and write
37DA000
heap
page read and write
442C000
heap
page read and write
4B86000
heap
page read and write
4663000
heap
page read and write
2AAA000
heap
page read and write
31F4000
heap
page read and write
33CF1000
direct allocation
page execute and read and write
33D4000
heap
page read and write
2B6A000
heap
page read and write
29BD000
stack
page read and write
32B5F000
stack
page read and write
4910000
heap
page read and write
4702000
heap
page read and write
4647000
heap
page read and write
3363B000
heap
page read and write
37AC000
heap
page read and write
4685000
heap
page read and write
37C0000
heap
page read and write
44F7000
heap
page read and write
3460000
heap
page read and write
3363B000
heap
page read and write
336CE000
heap
page read and write
4495000
heap
page read and write
2A00000
heap
page read and write
3834000
heap
page read and write
2B4A000
heap
page read and write
2CFC000
heap
page read and write
497D000
heap
page read and write
484A000
heap
page read and write
2CBD000
heap
page read and write
4620000
direct allocation
page read and write
There are 1410 hidden memdumps, click here to show them.