IOC Report
TsLvuUO.dll

loading gif

Files

File Path
Type
Category
Malicious
TsLvuUO.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js_tempXMDGGl
ASCII text, with very long lines (1743), with CRLF, CR line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js_tempjgCdeX
ASCII text, with very long lines (1743), with CRLF, CR line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js_tempnShBdn
ASCII text, with very long lines (1743), with CRLF, CR line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.js_tempnwhObf
ASCII text, with very long lines (1743), with CRLF, CR line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\TsLvuUO.dll,#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\TsLvuUO.dll",#1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\TsLvuUO.dll",#1
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /END /TN "WYKSCfYVrwsdWpT"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "WYKSCfYVrwsdWpT"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /END /TN "WYKSCfYVrwsdWpT2"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "WYKSCfYVrwsdWpT2"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /END /TN "nfblQVJFwWHDFj"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "nfblQVJFwWHDFj"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /END /TN "YGYYnsbMowvpr"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "YGYYnsbMowvpr"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /END /TN "YGYYnsbMowvpr2"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "YGYYnsbMowvpr2"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /END /TN "SfQlcfTRPgaddFhgU"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "SfQlcfTRPgaddFhgU"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /END /TN "SfQlcfTRPgaddFhgU2"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "SfQlcfTRPgaddFhgU2"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /END /TN "MBOKUVJttHMBWpgjMbJ"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "MBOKUVJttHMBWpgjMbJ"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /END /TN "MBOKUVJttHMBWpgjMbJ2"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "MBOKUVJttHMBWpgjMbJ2"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /END /TN "WYKSCfYVrwsdWpT"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "WYKSCfYVrwsdWpT"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /END /TN "WYKSCfYVrwsdWpT2"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "WYKSCfYVrwsdWpT2"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /END /TN "nfblQVJFwWHDFj"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "nfblQVJFwWHDFj"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /END /TN "YGYYnsbMowvpr"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "YGYYnsbMowvpr"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /END /TN "YGYYnsbMowvpr2"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "YGYYnsbMowvpr2"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /END /TN "SfQlcfTRPgaddFhgU"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "SfQlcfTRPgaddFhgU"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /END /TN "SfQlcfTRPgaddFhgU2"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "SfQlcfTRPgaddFhgU2"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /END /TN "MBOKUVJttHMBWpgjMbJ"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /DELETE /F /TN "MBOKUVJttHMBWpgjMbJ"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /END /TN "MBOKUVJttHMBWpgjMbJ2"
malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\TsLvuUO.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\TsLvuUO.dll",#1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 66 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://api2.check-data.xyz
unknown
malicious
http://api4.check-data.xyz/api/uninstall/17511/2C6A44CB-AD42-4731-A544-3FBD3D83AB5B/2.0.0.3281/wrtzr_ytab_b_1/8E53D89817ED4B0291FBFA7D0F319D53/97D99714-22C7-D2AF-3668-2A796B33DC65
44.232.42.242
malicious
http://api4.check-data.xyz/api/uninstall/59078/2C6A44CB-AD42-4731-A544-3FBD3D83AB5B/2.0.0.3281/wrtzr
unknown
malicious
http://api4.check-data.xyz/api/uninstall/59078/2C6A44CB-AD42-4731-A544-3FBD3D83AB5B/2.0.0.3281/wrtzr_ytab_b_1/8E53D89817ED4B0291FBFA7D0F319D53/1D5E65EB-947C-7A0A-9CCF-076D85CAD35E
44.232.42.242
malicious
http://api4.check-data.xyz
unknown
malicious
http://api4.check-data.xyz/api/uninstall/17511/2C6A44CB-AD42-4731-A544-3FBD3D83AB5B/2.0.0.3281/wrtzr
unknown
malicious
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://smartblock.firefox.etp/play.svg
unknown
https://payments.google.com/
unknown
https://sandbox.google.com/payments/v4/js/integrator.js
unknown
https://docs.google.com/
unknown
https://www.google.com/s/
unknown
https://ads.stickyadstv.com/firefox-etp
unknown
https://drive-staging.corp.google.com/
unknown
https://drive.google.com/
unknown
https://www.amazon.com/exec/obidos/external-search/
unknown
https://hg.mozilla.org/releases/mozilla-release
unknown
https://github.com/mozilla-services/screenshots
unknown
http://api5.check-data.xyz
unknown
http://api.check-data.xyz
unknown
https://github.com/mozilla/webcompat-reporter
unknown
https://crash-reports.mozilla.com/submit?id=
unknown
https://screenshots.firefox.com/
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
https://drive-autopush.corp.google.com/
unknown
https://payments.google.com/payments/v4/js/integrator.js
unknown
https://drive-daily-4.corp.google.com/
unknown
https://docs.google.co
unknown
http://api3.check-data.xyz
unknown
https://drive-daily-1.corp.google.com/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://www.google.com/m/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://static.adsafeprotected.com/firefox-etp-pixeli
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://drive-daily-6.corp.google.com/
unknown
https://static.adsafeprotected.com/firefox-etp-pixel
unknown
https://drive-daily-0.corp.google.com/
unknown
https://static.adsafeprotected.com/firefox-etp-js
unknown
https://drive-daily-2.c
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://chrome.google.com/webstore/
unknown
https://sandbox.google.com/
unknown
https://www.google.com/
unknown
https://drive-daily-3.corp.google.com/
unknown
There are 41 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
checkdata-1114476139.us-west-2.elb.amazonaws.com
44.232.42.242
malicious
api4.check-data.xyz
unknown
malicious
bg.microsoft.map.fastly.net
199.232.210.172

IPs

IP
Domain
Country
Malicious
44.232.42.242
checkdata-1114476139.us-west-2.elb.amazonaws.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node
global UID
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations

Memdumps

Base Address
Regiontype
Protect
Malicious
3340000
heap
page read and write
E0C000
stack
page read and write
2F74000
heap
page read and write
4B71000
heap
page read and write
5140000
direct allocation
page read and write
3244000
heap
page read and write
2F74000
heap
page read and write
9CF000
unkown
page read and write
1CD000
stack
page read and write
3040000
heap
page read and write
3611000
heap
page read and write
4D07000
heap
page read and write
4FBE000
stack
page read and write
780000
heap
page read and write
57B000
heap
page read and write
4DC1000
heap
page read and write
420000
heap
page read and write
5BD000
stack
page read and write
C0E000
unkown
page read and write
30B7000
heap
page read and write
31D0000
heap
page read and write
4D0000
heap
page read and write
2F5D000
stack
page read and write
34C000
stack
page read and write
4B71000
heap
page read and write
4F1E000
stack
page read and write
BCE000
stack
page read and write
4B71000
heap
page read and write
CA0000
heap
page read and write
5A0000
heap
page read and write
A4A000
heap
page read and write
2F74000
heap
page read and write
4FA4000
heap
page read and write
80F0000
remote allocation
page read and write
930000
heap
page read and write
37C000
stack
page read and write
3B0000
heap
page read and write
4B71000
heap
page read and write
4DC1000
heap
page read and write
3450000
heap
page read and write
5420000
direct allocation
page read and write
3244000
heap
page read and write
2F74000
heap
page read and write
4D6E000
heap
page read and write
4ED4000
heap
page read and write
4ED8000
heap
page read and write
3F0000
heap
page read and write
2F9E000
stack
page read and write
4EE1000
heap
page read and write
352B000
heap
page read and write
DC000
stack
page read and write
33D000
stack
page read and write
4EC1000
heap
page read and write
3244000
heap
page read and write
4B54000
heap
page read and write
31C0000
heap
page read and write
4DC1000
heap
page read and write
75D000
stack
page read and write
4B71000
heap
page read and write
31C6000
heap
page read and write
4DC1000
heap
page read and write
960000
heap
page read and write
860000
heap
page read and write
361E000
heap
page read and write
37C0000
heap
page read and write
88D000
stack
page read and write
4B71000
heap
page read and write
4EF3000
heap
page read and write
4EDD000
stack
page read and write
3320000
heap
page read and write
830000
heap
page read and write
2FDF000
stack
page read and write
8BE000
stack
page read and write
4DC1000
heap
page read and write
C30000
heap
page read and write
3244000
heap
page read and write
83E000
unkown
page read and write
9A0000
heap
page read and write
4C70000
trusted library allocation
page read and write
4DC1000
heap
page read and write
31B6000
heap
page read and write
2FB0000
heap
page read and write
4CB2000
heap
page read and write
4CDA000
heap
page read and write
3590000
heap
page read and write
59EF000
direct allocation
page execute and read and write
7FFF000
stack
page read and write
4DC1000
heap
page read and write
2F20000
heap
page read and write
332F000
stack
page read and write
4ED4000
heap
page read and write
5EE000
unkown
page read and write
4B71000
heap
page read and write
4B70000
heap
page read and write
4D33000
heap
page read and write
4C70000
trusted library allocation
page read and write
3527000
heap
page read and write
3244000
heap
page read and write
3632000
heap
page read and write
2F74000
heap
page read and write
9DE000
stack
page read and write
3244000
heap
page read and write
6CC0000
trusted library allocation
page read and write
55D000
stack
page read and write
2F74000
heap
page read and write
4FC0000
heap
page read and write
940000
heap
page read and write
311C000
heap
page read and write
33F4000
heap
page read and write
2F4F000
stack
page read and write
570D000
direct allocation
page readonly
3370000
heap
page read and write
52C000
stack
page read and write
3510000
heap
page read and write
2F74000
heap
page read and write
31D0000
heap
page read and write
8FF000
stack
page read and write
31D2000
heap
page read and write
4B71000
heap
page read and write
F7F000
stack
page read and write
30D0000
heap
page read and write
3244000
heap
page read and write
4F04000
heap
page read and write
4C91000
heap
page read and write
3244000
heap
page read and write
33C1000
direct allocation
page execute read
4D4B000
heap
page read and write
4B71000
heap
page read and write
4B71000
heap
page read and write
4DC1000
heap
page read and write
31CF000
heap
page read and write
2F29000
stack
page read and write
2F74000
heap
page read and write
6FB000
heap
page read and write
361E000
heap
page read and write
A8E000
unkown
page read and write
550000
heap
page read and write
4B00000
heap
page read and write
4B71000
heap
page read and write
4CB9000
heap
page read and write
6AE000
stack
page read and write
3079000
stack
page read and write
3244000
heap
page read and write
3244000
heap
page read and write
9D000
stack
page read and write
33F4000
heap
page read and write
4DC1000
heap
page read and write
7DE000
unkown
page read and write
4B71000
heap
page read and write
33CE000
stack
page read and write
4B71000
heap
page read and write
3244000
heap
page read and write
2F00000
heap
page read and write
3244000
heap
page read and write
4DC1000
heap
page read and write
2E39000
stack
page read and write
34FB000
heap
page read and write
34EC000
heap
page read and write
4CB9000
heap
page read and write
3128000
heap
page read and write
2F74000
heap
page read and write
31DB000
heap
page read and write
3244000
heap
page read and write
80F0000
remote allocation
page read and write
31B6000
heap
page read and write
B8F000
unkown
page read and write
67E000
stack
page read and write
4DC1000
heap
page read and write
4EE4000
heap
page read and write
2FE0000
heap
page read and write
330E000
stack
page read and write
3161000
heap
page read and write
2E79000
stack
page read and write
352B000
heap
page read and write
90F000
unkown
page read and write
322E000
stack
page read and write
4DC1000
heap
page read and write
323E000
stack
page read and write
4DC1000
heap
page read and write
2F74000
heap
page read and write
D5E000
unkown
page read and write
4C70000
trusted library allocation
page read and write
32F0000
heap
page read and write
311F000
heap
page read and write
4B71000
heap
page read and write
4B0000
heap
page read and write
C90000
heap
page read and write
340F000
stack
page read and write
2F74000
heap
page read and write
7CF000
stack
page read and write
5CC000
stack
page read and write
2F0D000
stack
page read and write
D30000
heap
page read and write
AB0000
heap
page read and write
3524000
heap
page read and write
4B71000
heap
page read and write
D30000
heap
page read and write
A1F000
stack
page read and write
4F5F000
stack
page read and write
2F74000
heap
page read and write
4EE1000
heap
page read and write
2FC0000
heap
page read and write
832C000
stack
page read and write
328F000
unkown
page read and write
4E5E000
stack
page read and write
2E8D000
stack
page read and write
4DC1000
heap
page read and write
2EB0000
heap
page read and write
C4F000
unkown
page read and write
3524000
heap
page read and write
4CB000
heap
page read and write
51C0000
trusted library allocation
page read and write
2EAB000
heap
page read and write
2F74000
heap
page read and write
2FB0000
heap
page read and write
350F000
stack
page read and write
32AB000
heap
page read and write
3457000
heap
page read and write
DC0000
heap
page read and write
BB0000
heap
page read and write
3244000
heap
page read and write
34F1000
heap
page read and write
4DC1000
heap
page read and write
3200000
heap
page read and write
3615000
heap
page read and write
4CB9000
heap
page read and write
308E000
stack
page read and write
4E1E000
stack
page read and write
30F0000
heap
page read and write
78F000
stack
page read and write
4DC1000
heap
page read and write
570000
heap
page read and write
4B71000
heap
page read and write
2EF0000
heap
page read and write
53B1000
direct allocation
page execute read
2F6E000
stack
page read and write
3210000
heap
page read and write
54E000
unkown
page read and write
6BE000
unkown
page read and write
790000
heap
page read and write
3244000
heap
page read and write
4C98000
heap
page read and write
58B000
heap
page read and write
4F9F000
heap
page read and write
3244000
heap
page read and write
4F9D000
heap
page read and write
34FE000
stack
page read and write
450000
heap
page read and write
361D000
heap
page read and write
34D9000
heap
page read and write
4B71000
heap
page read and write
B50000
heap
page read and write
4DE0000
trusted library allocation
page read and write
4EE4000
heap
page read and write
33F0000
heap
page read and write
2F74000
heap
page read and write
2FEF000
unkown
page read and write
809C000
stack
page read and write
98D000
stack
page read and write
4C94000
heap
page read and write
4B71000
heap
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
2FCE000
unkown
page read and write
4C84000
heap
page read and write
343A000
heap
page read and write
990000
heap
page read and write
2F1D000
stack
page read and write
30B0000
heap
page read and write
51FD000
stack
page read and write
AE0000
heap
page read and write
351A000
heap
page read and write
4FF1000
heap
page read and write
4B20000
heap
page read and write
311B000
heap
page read and write
2FFA000
heap
page read and write
70E000
unkown
page read and write
59C000
stack
page read and write
470000
heap
page read and write
4DC1000
heap
page read and write
72E000
stack
page read and write
5710000
direct allocation
page read and write
3244000
heap
page read and write
31CA000
heap
page read and write
4E24000
heap
page read and write
352B000
heap
page read and write
2EE0000
heap
page read and write
9ED000
stack
page read and write
351C000
heap
page read and write
5421000
direct allocation
page execute read
3110000
heap
page read and write
4B71000
heap
page read and write
4CE6000
heap
page read and write
3430000
heap
page read and write
4D62000
heap
page read and write
4B71000
heap
page read and write
34ED000
heap
page read and write
4FC1000
heap
page read and write
2F74000
heap
page read and write
35D0000
heap
page read and write
31B2000
heap
page read and write
2F74000
heap
page read and write
3641000
heap
page read and write
7EE000
stack
page read and write
352B000
heap
page read and write
3244000
heap
page read and write
7F7F000
stack
page read and write
34A2000
heap
page read and write
4CB9000
heap
page read and write
4B71000
heap
page read and write
B1E000
unkown
page read and write
3524000
heap
page read and write
2F74000
heap
page read and write
3527000
heap
page read and write
7D00000
remote allocation
page read and write
4CC3000
heap
page read and write
2F74000
heap
page read and write
327F000
unkown
page read and write
352B000
heap
page read and write
3524000
heap
page read and write
31CA000
heap
page read and write
348E000
stack
page read and write
3620000
heap
page read and write
3527000
heap
page read and write
4B71000
heap
page read and write
336E000
stack
page read and write
4FA6000
heap
page read and write
3076000
stack
page read and write
4B71000
heap
page read and write
74C5000
heap
page read and write
3244000
heap
page read and write
4CB9000
heap
page read and write
345F000
heap
page read and write
4B71000
heap
page read and write
9B0000
heap
page read and write
4ED8000
heap
page read and write
30BA000
heap
page read and write
9BB000
heap
page read and write
3244000
heap
page read and write
34D9000
heap
page read and write
3615000
heap
page read and write
4E20000
heap
page read and write
4CB9000
heap
page read and write
580000
heap
page read and write
99E000
unkown
page read and write
3360000
heap
page read and write
3334000
heap
page read and write
3244000
heap
page read and write
BBE000
unkown
page read and write
4DE0000
trusted library allocation
page read and write
AEC000
stack
page read and write
3244000
heap
page read and write
4DC1000
heap
page read and write
4B71000
heap
page read and write
2F74000
heap
page read and write
2F9C000
stack
page read and write
3615000
heap
page read and write
2EB8000
heap
page read and write
319C000
heap
page read and write
6C60000
trusted library allocation
page read and write
773C000
heap
page read and write
4C99000
heap
page read and write
34EC000
heap
page read and write
2F74000
heap
page read and write
2F74000
heap
page read and write
4DC0000
heap
page read and write
3244000
heap
page read and write
2E8F000
stack
page read and write
4B80000
heap
page read and write
4DC1000
heap
page read and write
940000
heap
page read and write
7D00000
remote allocation
page read and write
3244000
heap
page read and write
BCE000
stack
page read and write
31CB000
heap
page read and write
A00000
heap
page read and write
3244000
heap
page read and write
8180000
trusted library allocation
page read and write
2F74000
heap
page read and write
31D0000
heap
page read and write
A10000
heap
page read and write
4C8D000
heap
page read and write
3244000
heap
page read and write
4CF6000
heap
page read and write
31CA000
heap
page read and write
4B71000
heap
page read and write
CEF000
stack
page read and write
4DE1000
heap
page read and write
91E000
unkown
page read and write
4DC1000
heap
page read and write
BC0000
heap
page read and write
78E000
stack
page read and write
4B71000
heap
page read and write
347E000
stack
page read and write
56E000
unkown
page read and write
4B50000
heap
page read and write
89C000
stack
page read and write
3244000
heap
page read and write
2FE0000
heap
page read and write
2F74000
heap
page read and write
33C0000
trusted library allocation
page read and write
4B71000
heap
page read and write
4CDB000
heap
page read and write
3460000
heap
page read and write
31C0000
heap
page read and write
6E0000
heap
page read and write
33F4000
heap
page read and write
82F000
stack
page read and write
3F0000
heap
page read and write
314C000
heap
page read and write
4A0E000
stack
page read and write
321B000
heap
page read and write
816F000
stack
page read and write
3454000
heap
page read and write
4C94000
heap
page read and write
98F000
stack
page read and write
4CDB000
heap
page read and write
9C0000
heap
page read and write
4D6E000
heap
page read and write
ABB000
heap
page read and write
4DC1000
heap
page read and write
51F0000
trusted library allocation
page read and write
C9A000
heap
page read and write
1E0000
heap
page read and write
B40000
heap
page read and write
4D8000
heap
page read and write
5E0000
heap
page read and write
361F000
heap
page read and write
3330000
heap
page read and write
4DC1000
heap
page read and write
2F74000
heap
page read and write
D9F000
unkown
page read and write
3370000
heap
page read and write
B4E000
stack
page read and write
30FA000
heap
page read and write
4C71000
heap
page read and write
4D6A000
heap
page read and write
2FF0000
heap
page read and write
4B71000
heap
page read and write
7E0000
heap
page read and write
4D71000
direct allocation
page execute read
34C0000
heap
page read and write
4F3A000
heap
page read and write
536F000
stack
page read and write
59ED000
direct allocation
page readonly
9F0000
heap
page read and write
3310000
heap
page read and write
361E000
heap
page read and write
31CA000
heap
page read and write
D1C000
stack
page read and write
A20000
heap
page read and write
4C96000
heap
page read and write
2FF0000
heap
page read and write
3111000
heap
page read and write
812E000
stack
page read and write
A5D000
stack
page read and write
B4E000
stack
page read and write
4DCA000
direct allocation
page read and write
3244000
heap
page read and write
3244000
heap
page read and write
140000
heap
page read and write
3524000
heap
page read and write
560000
heap
page read and write
7D90000
trusted library allocation
page read and write
34CB000
heap
page read and write
C0E000
stack
page read and write
3300000
heap
page read and write
3200000
heap
page read and write
2F74000
heap
page read and write
7D00000
remote allocation
page read and write
2F74000
heap
page read and write
2F74000
heap
page read and write
312B000
heap
page read and write
2F74000
heap
page read and write
2F6E000
stack
page read and write
3420000
direct allocation
page read and write
30BE000
stack
page read and write
351D000
heap
page read and write
4DC1000
heap
page read and write
597D000
direct allocation
page readonly
2E50000
heap
page read and write
46E000
unkown
page read and write
34D9000
heap
page read and write
3244000
heap
page read and write
71C000
stack
page read and write
DA0000
heap
page read and write
5230000
heap
page read and write
31B6000
heap
page read and write
3624000
heap
page read and write
3380000
heap
page read and write
3244000
heap
page read and write
323C000
stack
page read and write
2FE0000
heap
page read and write
34AB000
heap
page read and write
35C2000
heap
page read and write
34DF000
heap
page read and write
A40000
heap
page read and write
324E000
unkown
page read and write
3165000
heap
page read and write
D70000
heap
page read and write
3527000
heap
page read and write
60F000
stack
page read and write
5CE000
stack
page read and write
4CDB000
heap
page read and write
4C99000
heap
page read and write
33F4000
heap
page read and write
520000
heap
page read and write
7D90000
trusted library allocation
page read and write
337A000
heap
page read and write
C50000
heap
page read and write
3244000
heap
page read and write
DAC000
stack
page read and write
4DC1000
heap
page read and write
4CEE000
stack
page read and write
DEE000
stack
page read and write
4DC1000
heap
page read and write
4B71000
heap
page read and write
4FA6000
heap
page read and write
4B71000
heap
page read and write
8180000
trusted library allocation
page read and write
334E000
unkown
page read and write
3000000
heap
page read and write
4B71000
heap
page read and write
3244000
heap
page read and write
4D69000
heap
page read and write
361E000
heap
page read and write
D6D000
stack
page read and write
4DC1000
heap
page read and write
3039000
stack
page read and write
339E000
stack
page read and write
4D22000
heap
page read and write
49CE000
stack
page read and write
4C94000
heap
page read and write
4B71000
heap
page read and write
AFC000
stack
page read and write
3370000
heap
page read and write
3161000
heap
page read and write
32FE000
stack
page read and write
4CB3000
heap
page read and write
31CA000
heap
page read and write
34E3000
heap
page read and write
4B71000
heap
page read and write
C7E000
unkown
page read and write
34F2000
heap
page read and write
2F30000
heap
page read and write
A1E000
stack
page read and write
4FF1000
heap
page read and write
2F74000
heap
page read and write
51C0000
trusted library allocation
page read and write
2F74000
heap
page read and write
31CB000
heap
page read and write
35DD000
heap
page read and write
2F74000
heap
page read and write
32ED000
stack
page read and write
3631000
heap
page read and write
344E000
stack
page read and write
35CC000
heap
page read and write
1F0000
heap
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
87F000
unkown
page read and write
3161000
heap
page read and write
DBF000
unkown
page read and write
850000
heap
page read and write
D60000
heap
page read and write
2F74000
heap
page read and write
340E000
direct allocation
page readonly
316A000
heap
page read and write
328E000
stack
page read and write
3244000
heap
page read and write
3240000
heap
page read and write
33C0000
trusted library allocation
page read and write
4DC1000
heap
page read and write
4D08000
heap
page read and write
4DC1000
heap
page read and write
323F000
unkown
page read and write
33D6000
heap
page read and write
2FD0000
heap
page read and write
4C94000
heap
page read and write
950000
heap
page read and write
2990000
heap
page read and write
7D90000
trusted library allocation
page read and write
3244000
heap
page read and write
4B71000
heap
page read and write
34CE000
stack
page read and write
37C000
stack
page read and write
334F000
stack
page read and write
4EE4000
heap
page read and write
580000
heap
page read and write
4B71000
heap
page read and write
D8F000
heap
page read and write
34D1000
heap
page read and write
500000
heap
page read and write
2F74000
heap
page read and write
33B0000
heap
page read and write
2FAF000
stack
page read and write
304A000
heap
page read and write
19E000
unkown
page read and write
3244000
heap
page read and write
31B9000
heap
page read and write
4B71000
heap
page read and write
334B000
heap
page read and write
680000
heap
page read and write
D80000
heap
page read and write
33F4000
heap
page read and write
2FAE000
unkown
page read and write
4DC1000
heap
page read and write
522F000
stack
page read and write
740000
heap
page read and write
43E000
stack
page read and write
7D3E000
stack
page read and write
400000
heap
page read and write
4DC1000
heap
page read and write
33A0000
heap
page read and write
3615000
heap
page read and write
51C0000
trusted library allocation
page read and write
31AE000
heap
page read and write
4F99000
heap
page read and write
31D3000
heap
page read and write
34F3000
heap
page read and write
4B71000
heap
page read and write
3244000
heap
page read and write
4CDE000
heap
page read and write
4B71000
heap
page read and write
94E000
stack
page read and write
31B0000
heap
page read and write
4ED8000
heap
page read and write
18C000
stack
page read and write
4CD8000
heap
page read and write
63F000
stack
page read and write
58D000
stack
page read and write
2EAD000
stack
page read and write
72C000
stack
page read and write
35AA000
heap
page read and write
4FA1000
heap
page read and write
31BC000
heap
page read and write
4EC0000
heap
page read and write
352B000
heap
page read and write
4CDD000
heap
page read and write
34D5000
heap
page read and write
4B71000
heap
page read and write
2E8E000
stack
page read and write
4C8B000
heap
page read and write
34B2000
heap
page read and write
557A000
direct allocation
page read and write
AAD000
stack
page read and write
77A000
heap
page read and write
4B71000
heap
page read and write
34A0000
heap
page read and write
47A000
heap
page read and write
2FD0000
heap
page read and write
51E000
unkown
page read and write
8180000
trusted library allocation
page read and write
9CC000
stack
page read and write
D97000
heap
page read and write
D80000
heap
page read and write
34EC000
heap
page read and write
34ED000
heap
page read and write
570000
heap
page read and write
2F5C000
stack
page read and write
DCE000
unkown
page read and write
79C000
stack
page read and write
352B000
heap
page read and write
4DC5000
heap
page read and write
3244000
heap
page read and write
4CDB000
heap
page read and write
3161000
heap
page read and write
69E000
unkown
page read and write
570000
heap
page read and write
17D000
stack
page read and write
C8D000
stack
page read and write
2F74000
heap
page read and write
4C8D000
heap
page read and write
740000
heap
page read and write
74F000
unkown
page read and write
A1F000
stack
page read and write
2F74000
heap
page read and write
30A0000
heap
page read and write
3466000
heap
page read and write
9CF000
unkown
page read and write
4B10000
heap
page read and write
4D44000
heap
page read and write
4ED8000
heap
page read and write
4AE000
unkown
page read and write
34A7000
heap
page read and write
4DC1000
heap
page read and write
32BF000
stack
page read and write
341A000
direct allocation
page read and write
2F4C000
stack
page read and write
2EA0000
heap
page read and write
B7F000
stack
page read and write
31CF000
heap
page read and write
523F000
stack
page read and write
2F74000
heap
page read and write
315E000
heap
page read and write
2FF0000
heap
page read and write
4DC1000
heap
page read and write
34D1000
heap
page read and write
2F74000
heap
page read and write
4DD0000
direct allocation
page read and write
800000
heap
page read and write
2FDF000
unkown
page read and write
2EB0000
heap
page read and write
7FBE000
stack
page read and write
335F000
unkown
page read and write
2F5D000
stack
page read and write
98E000
unkown
page read and write
4CB3000
heap
page read and write
4B71000
heap
page read and write
150000
heap
page read and write
3290000
heap
page read and write
351B000
heap
page read and write
2F70000
heap
page read and write
6EF000
stack
page read and write
600000
heap
page read and write
4B71000
heap
page read and write
2F74000
heap
page read and write
34CE000
stack
page read and write
4CB3000
heap
page read and write
3620000
heap
page read and write
A20000
heap
page read and write
327E000
stack
page read and write
4DC1000
heap
page read and write
2F74000
heap
page read and write
1CC000
stack
page read and write
5231000
heap
page read and write
7D7F000
stack
page read and write
34EC000
heap
page read and write
C6D000
stack
page read and write
55F000
unkown
page read and write
B70000
heap
page read and write
14D000
stack
page read and write
98E000
unkown
page read and write
3B0000
heap
page read and write
B8F000
stack
page read and write
2F70000
heap
page read and write
4DC1000
heap
page read and write
95F000
unkown
page read and write
4DC1000
heap
page read and write
4B71000
heap
page read and write
2FD0000
heap
page read and write
3244000
heap
page read and write
4F23000
heap
page read and write
2F5F000
unkown
page read and write
4B71000
heap
page read and write
4F9F000
heap
page read and write
4CDE000
heap
page read and write
4DC1000
heap
page read and write
3244000
heap
page read and write
73E000
stack
page read and write
DFE000
unkown
page read and write
352B000
heap
page read and write
324E000
unkown
page read and write
2ECF000
unkown
page read and write
2F78000
heap
page read and write
C80000
heap
page read and write
2E76000
stack
page read and write
6DF000
unkown
page read and write
4B71000
heap
page read and write
93E000
unkown
page read and write
35CC000
heap
page read and write
2F0A000
heap
page read and write
B7B000
heap
page read and write
2F74000
heap
page read and write
3527000
heap
page read and write
6D0000
heap
page read and write
4D6E000
heap
page read and write
2F5E000
stack
page read and write
4CB9000
heap
page read and write
4F2B000
heap
page read and write
4FFF000
stack
page read and write
DCD000
stack
page read and write
4DC1000
heap
page read and write
33F4000
heap
page read and write
4CB9000
heap
page read and write
2E8E000
unkown
page read and write
5BF000
unkown
page read and write
B0F000
unkown
page read and write
2F74000
heap
page read and write
3244000
heap
page read and write
836C000
stack
page read and write
4DBE000
direct allocation
page readonly
3380000
heap
page read and write
AEB000
heap
page read and write
35D0000
heap
page read and write
930000
heap
page read and write
2F20000
heap
page read and write
550A000
direct allocation
page read and write
34A2000
heap
page read and write
4E9E000
stack
page read and write
A40000
heap
page read and write
4B71000
heap
page read and write
33B0000
heap
page read and write
C80000
heap
page read and write
2F74000
heap
page read and write
C30000
heap
page read and write
4CB9000
heap
page read and write
51F0000
trusted library allocation
page read and write
3527000
heap
page read and write
4CDB000
heap
page read and write
3350000
heap
page read and write
2F74000
heap
page read and write
63A000
heap
page read and write
4CDB000
heap
page read and write
805B000
stack
page read and write
C60000
heap
page read and write
2F74000
heap
page read and write
99F000
unkown
page read and write
2ECC000
stack
page read and write
33DA000
heap
page read and write
31BA000
heap
page read and write
3E0000
heap
page read and write
89B000
heap
page read and write
4C91000
heap
page read and write
3244000
heap
page read and write
4DC1000
heap
page read and write
2F74000
heap
page read and write
5AD000
stack
page read and write
2F74000
heap
page read and write
3244000
heap
page read and write
3570000
heap
page read and write
4D6E000
heap
page read and write
1BC000
stack
page read and write
4C70000
heap
page read and write
4CFF000
heap
page read and write
2F74000
heap
page read and write
B20000
heap
page read and write
3FE000
unkown
page read and write
4C70000
trusted library allocation
page read and write
3619000
heap
page read and write
4DC1000
heap
page read and write
B60000
heap
page read and write
2F74000
heap
page read and write
3200000
heap
page read and write
2F74000
heap
page read and write
4D6A000
heap
page read and write
890000
heap
page read and write
2F74000
heap
page read and write
35C3000
heap
page read and write
58F000
unkown
page read and write
870000
heap
page read and write
4CDB000
heap
page read and write
33C0000
trusted library allocation
page read and write
4DC1000
heap
page read and write
4F17000
heap
page read and write
14D000
stack
page read and write
7C0000
heap
page read and write
5FC000
stack
page read and write
2F50000
heap
page read and write
35A0000
heap
page read and write
33F4000
heap
page read and write
31C0000
heap
page read and write
3650000
heap
page read and write
34FA000
heap
page read and write
33C0000
heap
page read and write
7E0000
heap
page read and write
6F0000
heap
page read and write
4C96000
heap
page read and write
4D62000
heap
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
43C000
stack
page read and write
33BA000
heap
page read and write
63F000
unkown
page read and write
D9D000
heap
page read and write
3161000
heap
page read and write
9C7000
heap
page read and write
34ED000
heap
page read and write
4DC1000
heap
page read and write
4FEC000
heap
page read and write
4EE9000
heap
page read and write
4B71000
heap
page read and write
5980000
direct allocation
page read and write
3500000
heap
page read and write
529A000
direct allocation
page read and write
CAB000
heap
page read and write
31CB000
heap
page read and write
4CEC000
heap
page read and write
3244000
heap
page read and write
6ED000
stack
page read and write
35C7000
heap
page read and write
8180000
trusted library allocation
page read and write
4ED000
stack
page read and write
4F3A000
heap
page read and write
790000
heap
page read and write
51F0000
trusted library allocation
page read and write
4D69000
heap
page read and write
47D000
stack
page read and write
3615000
heap
page read and write
630000
heap
page read and write
330E000
unkown
page read and write
D8B000
heap
page read and write
2F74000
heap
page read and write
324B000
heap
page read and write
3527000
heap
page read and write
2F74000
heap
page read and write
7D90000
trusted library allocation
page read and write
4DC1000
heap
page read and write
DFE000
stack
page read and write
3527000
heap
page read and write
9DE000
stack
page read and write
D70000
heap
page read and write
3244000
heap
page read and write
2EEC000
stack
page read and write
34EC000
heap
page read and write
31C0000
heap
page read and write
AF0000
heap
page read and write
35C9000
heap
page read and write
34EC000
heap
page read and write
3244000
heap
page read and write
4D70000
direct allocation
page read and write
51F0000
trusted library allocation
page read and write
9A0000
heap
page read and write
4DC1000
heap
page read and write
4EF4000
heap
page read and write
35D7000
heap
page read and write
3244000
heap
page read and write
1DF000
unkown
page read and write
3524000
heap
page read and write
4DC1000
heap
page read and write
18C000
stack
page read and write
31CB000
heap
page read and write
2F60000
heap
page read and write
32BE000
stack
page read and write
6F30000
trusted library allocation
page read and write
2F74000
heap
page read and write
4EE7000
heap
page read and write
3524000
heap
page read and write
352B000
heap
page read and write
3641000
heap
page read and write
3641000
heap
page read and write
18D000
stack
page read and write
34D7000
heap
page read and write
4B71000
heap
page read and write
4DC1000
heap
page read and write
32A0000
heap
page read and write
33F0000
heap
page read and write
346A000
heap
page read and write
CDD000
stack
page read and write
A4E000
stack
page read and write
33F4000
heap
page read and write
2F9C000
stack
page read and write
31C7000
heap
page read and write
4EDE000
heap
page read and write
9AB000
heap
page read and write
312E000
heap
page read and write
2F74000
heap
page read and write
343F000
unkown
page read and write
4B71000
heap
page read and write
4D22000
heap
page read and write
33CB000
heap
page read and write
4DC1000
heap
page read and write
2F6C000
stack
page read and write
4B90000
heap
page read and write
33D0000
heap
page read and write
2FFD000
stack
page read and write
1F0000
heap
page read and write
31B6000
heap
page read and write
6FE000
stack
page read and write
4B71000
heap
page read and write
570F000
direct allocation
page execute and read and write
33B7000
heap
page read and write
4DC1000
heap
page read and write
4B71000
heap
page read and write
DB0000
heap
page read and write
3244000
heap
page read and write
3244000
heap
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
7CF000
stack
page read and write
4DC1000
heap
page read and write
537E000
stack
page read and write
4C91000
heap
page read and write
34F5000
heap
page read and write
2ED0000
heap
page read and write
3244000
heap
page read and write
3244000
heap
page read and write
34BF000
stack
page read and write
3244000
heap
page read and write
3244000
heap
page read and write
3244000
heap
page read and write
4B71000
heap
page read and write
4CE6000
heap
page read and write
4B71000
heap
page read and write
B70000
heap
page read and write
4DC1000
heap
page read and write
3244000
heap
page read and write
4DC1000
heap
page read and write
3244000
heap
page read and write
3244000
heap
page read and write
4DC1000
heap
page read and write
E0F000
unkown
page read and write
CCC000
stack
page read and write
3240000
heap
page read and write
2F74000
heap
page read and write
2F0E000
stack
page read and write
33D000
stack
page read and write
2E9E000
unkown
page read and write
2FFE000
unkown
page read and write
4B71000
heap
page read and write
351D000
heap
page read and write
85D000
stack
page read and write
59F0000
direct allocation
page read and write
597F000
direct allocation
page execute and read and write
3116000
heap
page read and write
4B71000
heap
page read and write
30D000
stack
page read and write
3244000
heap
page read and write
9D0000
heap
page read and write
D80000
heap
page read and write
4EC4000
heap
page read and write
3290000
heap
page read and write
850000
heap
page read and write
33C0000
trusted library allocation
page read and write
31D0000
heap
page read and write
34FA000
heap
page read and write
4C91000
heap
page read and write
A40000
heap
page read and write
4C99000
heap
page read and write
C0F000
stack
page read and write
4C99000
heap
page read and write
95E000
unkown
page read and write
3244000
heap
page read and write
4D6E000
heap
page read and write
32A0000
heap
page read and write
4DC1000
heap
page read and write
33C0000
direct allocation
page read and write
527E000
stack
page read and write
3455000
heap
page read and write
430000
heap
page read and write
8F0000
heap
page read and write
C80000
heap
page read and write
770000
heap
page read and write
A0E000
stack
page read and write
361E000
heap
page read and write
4C99000
heap
page read and write
CAE000
stack
page read and write
323E000
unkown
page read and write
580000
heap
page read and write
34ED000
heap
page read and write
4DC1000
heap
page read and write
4B71000
heap
page read and write
5141000
direct allocation
page execute read
4B71000
heap
page read and write
4DC1000
heap
page read and write
4DC1000
heap
page read and write
2F74000
heap
page read and write
6B0000
heap
page read and write
32EE000
unkown
page read and write
505D000
stack
page read and write
31CA000
heap
page read and write
4ED4000
heap
page read and write
4CD8000
heap
page read and write
2F74000
heap
page read and write
4B71000
heap
page read and write
47F000
stack
page read and write
ACE000
unkown
page read and write
4CE6000
heap
page read and write
4C0000
heap
page read and write
4BC000
stack
page read and write
7DE000
stack
page read and write
2F74000
heap
page read and write
80F0000
remote allocation
page read and write
4B71000
heap
page read and write
B0E000
stack
page read and write
B70000
heap
page read and write
3244000
heap
page read and write
4CB9000
heap
page read and write
4B71000
heap
page read and write
CC0000
heap
page read and write
3527000
heap
page read and write
4B71000
heap
page read and write
31CB000
heap
page read and write
332E000
stack
page read and write
54E000
unkown
page read and write
2F74000
heap
page read and write
4C8D000
heap
page read and write
3166000
heap
page read and write
4B71000
heap
page read and write
5F0000
heap
page read and write
D10000
heap
page read and write
511C000
stack
page read and write
4B71000
heap
page read and write
4D2F000
stack
page read and write
5231000
heap
page read and write
2F74000
heap
page read and write
34D1000
heap
page read and write
4DD0000
heap
page read and write
C90000
heap
page read and write
312E000
heap
page read and write
328F000
unkown
page read and write
D50000
heap
page read and write
3370000
heap
page read and write
5FE000
stack
page read and write
6B0000
heap
page read and write
CAC000
stack
page read and write
8CC000
stack
page read and write
30C0000
heap
page read and write
4B71000
heap
page read and write
C3C000
stack
page read and write
2F74000
heap
page read and write
4DC1000
heap
page read and write
2F74000
heap
page read and write
3244000
heap
page read and write
5EC000
stack
page read and write
C3B000
heap
page read and write
BFE000
unkown
page read and write
A9C000
stack
page read and write
345C000
heap
page read and write
4DC1000
heap
page read and write
4B71000
heap
page read and write
4DC1000
heap
page read and write
3244000
heap
page read and write
3230000
heap
page read and write
4B71000
heap
page read and write
DA0000
heap
page read and write
4F98000
heap
page read and write
4DE0000
trusted library allocation
page read and write
4D22000
heap
page read and write
2F74000
heap
page read and write
35E1000
heap
page read and write
3244000
heap
page read and write
4DC1000
heap
page read and write
910000
heap
page read and write
52BC000
stack
page read and write
3160000
heap
page read and write
4F05000
heap
page read and write
33E0000
heap
page read and write
53B0000
direct allocation
page read and write
3524000
heap
page read and write
BB0000
heap
page read and write
C90000
heap
page read and write
3171000
heap
page read and write
4D0000
heap
page read and write
There are 1124 hidden memdumps, click here to show them.