IOC Report
TctqdRX5Wq.exe

loading gif

Files

File Path
Type
Category
Malicious
TctqdRX5Wq.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TctqdRX5Wq.exe.log
CSV text
modified
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
data
dropped
C:\Windows\Logs\SIH\SIH.20241006.042216.173.1.etl
data
dropped
C:\Windows\SoftwareDistribution\SLS\522D76A4-93E1-47F8-B8CE-07C937AD1A1E\TMP3B3A.tmp
Microsoft Cabinet archive data, single, 462 bytes, 1 file, at 0x44 +Utf "environment.xml", flags 0x4, ID 31944, number 1, extra bytes 20 in head, 1 datablock, 0x1 compression
dropped
C:\Windows\SoftwareDistribution\SLS\522D76A4-93E1-47F8-B8CE-07C937AD1A1E\sls.cab
Microsoft Cabinet archive data, single, 7826 bytes, 1 file, at 0x44 +Utf "environment.cab", flags 0x4, ID 53283, number 1, extra bytes 20 in head, 1 datablock, 0x1 compression
dropped
C:\Windows\SoftwareDistribution\SLS\E7A50285-D08D-499D-9FF8-180FDC2332BC\TMPCDA8.tmp
Microsoft Cabinet archive data, single, 858 bytes, 1 file, at 0x44 +Utf "environment.xml", flags 0x4, ID 12183, number 1, extra bytes 20 in head, 1 datablock, 0x1 compression
modified
C:\Windows\SoftwareDistribution\SLS\E7A50285-D08D-499D-9FF8-180FDC2332BC\sls.cab
Microsoft Cabinet archive data, single, 11149 bytes, 1 file, at 0x44 +Utf "environment.cab", flags 0x4, ID 18779, number 1, extra bytes 20 in head, 1 datablock, 0x1 compression
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
data
dropped
\Device\ConDrv
ASCII text, with CRLF, LF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\TctqdRX5Wq.exe
"C:\Users\user\Desktop\TctqdRX5Wq.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\OpenWith.exe
"C:\Windows\system32\openwith.exe"
malicious
C:\Program Files\Windows Media Player\setup_wm.exe
"C:\Program Files\Windows Media Player\setup_wm.exe"
malicious
C:\Windows\System32\dllhost.exe
"C:\Windows\system32\dllhost.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\OpenWith.exe
"C:\Windows\system32\openwith.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3180 -s 688
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3180 -s 684
C:\Windows\System32\SIHClient.exe
C:\Windows\System32\sihclient.exe /cv gXqch/IrSkuvKvqIAnHVew.0.2
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://135.181.4.162:2423/97e9fc994198e76/ok9djscw.jxh0g
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://discord.com
unknown
https://135.181.4.162:2423/97e9fc994198e76/ok9djscw.jxh0g(
unknown
https://duckduckgo.com/ac/?q=
unknown
https://135.181.4.162:2423/97e9fc994198e76/ok9djscw.jxh0gkernelbasentdllkernel32GetProcessMitigation
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17t.mc_id=EnterPK201694ba2e0b-6
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.mic)
unknown
https://discordapp.com
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://support.mic
unknown
https://www.ecosia.org/newtab/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://135.h
unknown
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172

IPs

IP
Domain
Country
Malicious
135.181.4.162
unknown
Germany
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\SibCode
sn2

Memdumps

Base Address
Regiontype
Protect
Malicious
1C4B3A71000
heap
page read and write
malicious
3795000
trusted library allocation
page read and write
malicious
1C4B3924000
heap
page read and write
malicious
4100000
direct allocation
page execute and read and write
malicious
3010000
direct allocation
page read and write
malicious
4AA0000
direct allocation
page execute and read and write
malicious
1C4B3871000
heap
page read and write
malicious
4979000
heap
page read and write
malicious
4983000
heap
page read and write
1C4B3BAA000
heap
page read and write
1C4B39C1000
heap
page read and write
51E1000
heap
page read and write
1C4B3B95000
heap
page read and write
1C4B3BAD000
heap
page read and write
2F5F000
stack
page read and write
1C4B3BA9000
heap
page read and write
1C4B3BCD000
heap
page read and write
1C4B39D8000
heap
page read and write
1C4B3973000
heap
page read and write
1E48AB73000
heap
page read and write
1C4B3BCB000
heap
page read and write
1C4B36F0000
heap
page read and write
1C4B3715000
heap
page read and write
1C4B3BA9000
heap
page read and write
1E48AB92000
heap
page read and write
1C4B3BB5000
heap
page read and write
1C4B3B96000
heap
page read and write
1C4B30C7000
heap
page read and write
1C4B36F3000
heap
page read and write
539C000
stack
page read and write
4986000
heap
page read and write
7DF42F602000
unkown
page read and write
1C4B3BE3000
heap
page read and write
1C4B3646000
heap
page read and write
1C4B362B000
heap
page read and write
1C4B36C6000
heap
page read and write
1C4B3621000
heap
page read and write
1C4B39A3000
heap
page read and write
1C4B36EF000
heap
page read and write
51E1000
heap
page read and write
5E185FD000
stack
page read and write
1C4B3BE5000
heap
page read and write
1C4B3BDD000
heap
page read and write
1C4B3BAD000
heap
page read and write
1E48AC39000
heap
page read and write
1C4B3BDD000
heap
page read and write
2E44000
heap
page read and write
1C4B3BCD000
heap
page read and write
1C4B363A000
heap
page read and write
1E48ABC2000
heap
page read and write
5627000
heap
page read and write
1C4B3973000
heap
page read and write
51E1000
heap
page read and write
1C4B393B000
heap
page read and write
1E48B425000
heap
page read and write
1C4B3971000
heap
page read and write
1C4B3971000
heap
page read and write
4979000
heap
page read and write
19169D55000
heap
page read and write
1C4B3BA5000
heap
page read and write
497D000
heap
page read and write
1C4B36F8000
heap
page read and write
1E48AB5D000
heap
page read and write
1C4B3BAD000
heap
page read and write
1C4B3BDD000
heap
page read and write
1C4B364D000
heap
page read and write
1C4B36F3000
heap
page read and write
1C4B371D000
heap
page read and write
1C4B3BB5000
heap
page read and write
2FDE000
stack
page read and write
5627000
heap
page read and write
1C4B3BAD000
heap
page read and write
1C4B3973000
heap
page read and write
1E48AC19000
heap
page read and write
1C4B3BCB000
heap
page read and write
1C4B36C6000
heap
page read and write
1C4B394B000
heap
page read and write
5350000
unkown
page read and write
1C4B3BB5000
heap
page read and write
1C4B3971000
heap
page read and write
1C4B3621000
heap
page read and write
1C4B36F3000
heap
page read and write
1C4B3BE5000
heap
page read and write
51E1000
heap
page read and write
2E44000
heap
page read and write
5A1C000
heap
page read and write
51E1000
heap
page read and write
1C4B1658000
heap
page read and write
5360000
unkown
page read and write
1E48ABD0000
heap
page read and write
1C4B3665000
heap
page read and write
24278300000
heap
page read and write
1C4B3933000
heap
page read and write
1C4B3933000
heap
page read and write
1C4B366C000
heap
page read and write
1C4B3B6E000
heap
page read and write
54AF000
stack
page read and write
1C4B3467000
heap
page read and write
5627000
heap
page read and write
1C4B3665000
heap
page read and write
1C4B3B8D000
heap
page read and write
51E1000
heap
page read and write
1C4B3BAD000
heap
page read and write
2E44000
heap
page read and write
1C4B3BC5000
heap
page read and write
1C4B3BC5000
heap
page read and write
5627000
heap
page read and write
5280000
unkown
page read and write
2E44000
heap
page read and write
1C4B395B000
heap
page read and write
51E1000
heap
page read and write
1C4B36D1000
heap
page read and write
1C4B3BB5000
heap
page read and write
1C4B36F3000
heap
page read and write
1C4B366A000
heap
page read and write
5303000
unkown
page read and write
5627000
heap
page read and write
1C4B36D1000
heap
page read and write
51E1000
heap
page read and write
1C4B395B000
heap
page read and write
1C4B3BE6000
heap
page read and write
1C4B3BC5000
heap
page read and write
1E48B712000
heap
page read and write
B13000
trusted library allocation
page execute and read and write
1C4B3632000
heap
page read and write
1C4B36EE000
heap
page read and write
1C4B3971000
heap
page read and write
1C4B366E000
heap
page read and write
1C4B3BE3000
heap
page read and write
1C4B3BAD000
heap
page read and write
5627000
heap
page read and write
2E44000
heap
page read and write
51E1000
heap
page read and write
1C4B3BDD000
heap
page read and write
51E0000
unkown
page read and write
1C4B3A70000
heap
page read and write
5627000
heap
page read and write
51E1000
heap
page read and write
1C4B3669000
heap
page read and write
1C4B3BA9000
heap
page read and write
1C4B3BE3000
heap
page read and write
D70000
trusted library allocation
page execute and read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
1C4B364D000
heap
page read and write
2E44000
heap
page read and write
51E1000
heap
page read and write
7DF42F641000
unkown
page read and write
1C4B36E2000
heap
page read and write
1C4B36F3000
heap
page read and write
2E44000
heap
page read and write
1C4B3BDD000
heap
page read and write
1916A361000
heap
page read and write
1C4B3927000
heap
page read and write
51E1000
heap
page read and write
5627000
heap
page read and write
51E1000
heap
page read and write
1C4B3BDD000
heap
page read and write
19169E20000
heap
page read and write
1C4B3B95000
heap
page read and write
1C4B3BC9000
heap
page read and write
1E48AB47000
heap
page read and write
7DF449D11000
unkown
page execute read
51E1000
heap
page read and write
1C4B36C6000
heap
page read and write
1C4B398A000
heap
page read and write
51E1000
heap
page read and write
1C4B36C8000
heap
page read and write
1C4B36E8000
heap
page read and write
5E36F7E000
stack
page read and write
1C4B3BC5000
heap
page read and write
1C4B30C8000
heap
page read and write
2E44000
heap
page read and write
5627000
heap
page read and write
1C4B3632000
heap
page read and write
1C4B392B000
heap
page read and write
1C4B3B85000
heap
page read and write
1C4B3714000
heap
page read and write
51E1000
heap
page read and write
AFF000
stack
page read and write
1C4B3641000
heap
page read and write
1C4B3BCD000
heap
page read and write
1C4B3665000
heap
page read and write
1E48B40A000
heap
page read and write
191683EC000
heap
page read and write
1C4B3714000
heap
page read and write
1C4B3BE3000
heap
page read and write
1C4B3BE6000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
1C4B3971000
heap
page read and write
1C4B3B85000
heap
page read and write
51E1000
heap
page read and write
1C4B36F8000
heap
page read and write
1C4B371E000
heap
page read and write
1C4B397B000
heap
page read and write
19168469000
heap
page read and write
B2E000
heap
page read and write
51E1000
heap
page read and write
1C4B3BA5000
heap
page read and write
1C4B3BE5000
heap
page read and write
1C4B398B000
heap
page read and write
1C4B3966000
heap
page read and write
1C4B3654000
heap
page read and write
1E48B3FE000
heap
page read and write
1C4B3BB5000
heap
page read and write
1C4B3966000
heap
page read and write
1E48ABD5000
heap
page read and write
1C4B3620000
heap
page read and write
1C4B3BE3000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
1C4B393F000
heap
page read and write
19169D45000
heap
page read and write
1C4B3BB5000
heap
page read and write
1E48ABC4000
heap
page read and write
1C4B3BC5000
heap
page read and write
1C4B36F3000
heap
page read and write
1C4B3B7A000
heap
page read and write
5627000
heap
page read and write
1E48B5BE000
heap
page read and write
1E48B42E000
heap
page read and write
1C4B36F3000
heap
page read and write
1C4B36C6000
heap
page read and write
258E000
stack
page read and write
4979000
heap
page read and write
1E48B423000
heap
page read and write
DA0000
heap
page read and write
5627000
heap
page read and write
5627000
heap
page read and write
1C4B3714000
heap
page read and write
2F2F000
stack
page read and write
1C4B3BD5000
heap
page read and write
1C4B3BEE000
heap
page read and write
1C4B366E000
heap
page read and write
1C4B3BC9000
heap
page read and write
1C4B3654000
heap
page read and write
1E48ABD5000
heap
page read and write
1E48AC38000
heap
page read and write
1C4B3648000
heap
page read and write
1C4B30C7000
heap
page read and write
1C4B36E1000
heap
page read and write
1C4B3040000
trusted library allocation
page read and write
1C4B3BCD000
heap
page read and write
1C4B39A3000
heap
page read and write
1C4B3BCD000
heap
page read and write
1C4B3714000
heap
page read and write
7FFE22160000
direct allocation
page execute and read and write
51E1000
heap
page read and write
19168249000
unkown
page read and write
1C4B3BDD000
heap
page read and write
1C4B36F3000
heap
page read and write
1C4B3BE6000
heap
page read and write
1C4B366D000
heap
page read and write
1C4B3BCD000
heap
page read and write
1C4B398B000
heap
page read and write
51E1000
heap
page read and write
1C4B3BAC000
heap
page read and write
25F0000
heap
page read and write
51E1000
heap
page read and write
1C4B371E000
heap
page read and write
1C4B3B9D000
heap
page read and write
5627000
heap
page read and write
24278510000
heap
page read and write
1C4B3BE6000
heap
page read and write
1540000
heap
page read and write
5627000
heap
page read and write
1E48B406000
heap
page read and write
1E48B42F000
heap
page read and write
1C4B38C2000
heap
page read and write
19168360000
heap
page read and write
1C4B3BE5000
heap
page read and write
1C4B3B95000
heap
page read and write
1E48B5B5000
heap
page read and write
1C4B36C6000
heap
page read and write
1C4B36C8000
heap
page read and write
1C4B3B9D000
heap
page read and write
1C4B3BCB000
heap
page read and write
1C4B3BC9000
heap
page read and write
1C4B3B95000
heap
page read and write
1C4B3965000
heap
page read and write
1C4B370C000
heap
page read and write
1C4B3966000
heap
page read and write
1E48AC39000
heap
page read and write
3E2000
unkown
page readonly
5627000
heap
page read and write
51E1000
heap
page read and write
1C4B3643000
heap
page read and write
19169CD0000
heap
page read and write
51E1000
heap
page read and write
1C4B3BD5000
heap
page read and write
1C4B3BB5000
heap
page read and write
1E48B5B7000
heap
page read and write
2E44000
heap
page read and write
1C4B363A000
heap
page read and write
1C4B3BCD000
heap
page read and write
1C4B36F3000
heap
page read and write
51E1000
heap
page read and write
1C4B3943000
heap
page read and write
5E1867C000
stack
page read and write
1C4B3BAC000
heap
page read and write
1C4B36F6000
heap
page read and write
51E1000
heap
page read and write
1C4B3714000
heap
page read and write
1C4B39D8000
heap
page read and write
1C4B3BDD000
heap
page read and write
2E44000
heap
page read and write
5570000
heap
page read and write
1C4B3BC9000
heap
page read and write
1E48ABE7000
heap
page read and write
1C4B397B000
heap
page read and write
5627000
heap
page read and write
1C4B3BE6000
heap
page read and write
5627000
heap
page read and write
1C4B3BC9000
heap
page read and write
1C4B39D8000
heap
page read and write
1C4B1600000
unkown
page execute and read and write
1C4B3966000
heap
page read and write
5627000
heap
page read and write
1C4B370E000
heap
page read and write
1E48AA60000
heap
page read and write
2780000
heap
page execute and read and write
5627000
heap
page read and write
1C4B3BCD000
heap
page read and write
51E1000
heap
page read and write
1E48A960000
heap
page read and write
1C4B3BCD000
heap
page read and write
1C4B36EE000
heap
page read and write
1E48AB5A000
heap
page read and write
1C4B3B74000
heap
page read and write
1E48AC39000
heap
page read and write
1C4B3953000
heap
page read and write
1C4B3BE6000
heap
page read and write
1C4B3BC5000
heap
page read and write
5E36E7F000
stack
page read and write
5627000
heap
page read and write
1C4B3BA6000
heap
page read and write
D3A000
trusted library allocation
page execute and read and write
1C4B3971000
heap
page read and write
1C4B36F3000
heap
page read and write
1C4B3464000
heap
page read and write
1E48B716000
heap
page read and write
154A000
heap
page read and write
5627000
heap
page read and write
A8268FF000
stack
page read and write
51E1000
heap
page read and write
1C4B371D000
heap
page read and write
1E48AB92000
heap
page read and write
1C4B370E000
heap
page read and write
1E48B445000
heap
page read and write
51E1000
heap
page read and write
1C4B3BCB000
heap
page read and write
1C4B3BCD000
heap
page read and write
1C4B3714000
heap
page read and write
1C4B3B91000
heap
page read and write
51E1000
heap
page read and write
1C4B3BA5000
heap
page read and write
1C4B3BDD000
heap
page read and write
51E1000
heap
page read and write
1C4B3BB5000
heap
page read and write
1E48B427000
heap
page read and write
1C4B3963000
heap
page read and write
1C4B36C6000
heap
page read and write
A82687E000
stack
page read and write
1C4B392B000
heap
page read and write
1C4B36EE000
heap
page read and write
1C4B3BAD000
heap
page read and write
51E1000
heap
page read and write
1C4B3BDD000
heap
page read and write
1C4B39AB000
heap
page read and write
5627000
heap
page read and write
1E48B445000
heap
page read and write
1C4B3B7B000
heap
page read and write
5300000
unkown
page read and write
1E48B433000
heap
page read and write
1E48AC39000
heap
page read and write
1C4B3BBD000
heap
page read and write
307C000
heap
page read and write
1C4B362B000
heap
page read and write
1C4B3666000
heap
page read and write
5627000
heap
page read and write
1C4B3971000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
5627000
heap
page read and write
1C4B3BDF000
heap
page read and write
1C4B36C8000
heap
page read and write
1C4B30C7000
heap
page read and write
1C4B363A000
heap
page read and write
1C4B36C8000
heap
page read and write
1C4B3BBD000
heap
page read and write
5627000
heap
page read and write
19169E94000
heap
page read and write
49C7000
heap
page read and write
1C4B3643000
heap
page read and write
1C4B39BB000
heap
page read and write
1C4B1620000
heap
page read and write
51E1000
heap
page read and write
1C4B3BC5000
heap
page read and write
1E48B41A000
heap
page read and write
1C4B3643000
heap
page read and write
1C4B3BC9000
heap
page read and write
2E44000
heap
page read and write
1C4B3BE3000
heap
page read and write
5627000
heap
page read and write
51E1000
heap
page read and write
1C4B395B000
heap
page read and write
1C4B394B000
heap
page read and write
1C4B362B000
heap
page read and write
1C4B3BAA000
heap
page read and write
5627000
heap
page read and write
51E1000
heap
page read and write
1C4B3719000
heap
page read and write
2F9C000
heap
page read and write
1C4B3BAD000
heap
page read and write
5627000
heap
page read and write
1C4B3BE5000
heap
page read and write
1C4B393F000
heap
page read and write
1C4B398A000
heap
page read and write
1C4B395B000
heap
page read and write
1C4B36C6000
heap
page read and write
1C4B3668000
heap
page read and write
D80000
heap
page read and write
1C4B3641000
heap
page read and write
1E48AB62000
heap
page read and write
1E48B716000
heap
page read and write
1C4B3B8D000
heap
page read and write
1E48ABBC000
heap
page read and write
5627000
heap
page read and write
1C4B366D000
heap
page read and write
1C4B3BCB000
heap
page read and write
19169D36000
heap
page read and write
7FFE22160000
direct allocation
page execute and read and write
1C4B370D000
heap
page read and write
51E1000
heap
page read and write
1C4B3663000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
1C4B3BBD000
heap
page read and write
1C4B39D8000
heap
page read and write
1C4B3BD6000
heap
page read and write
5627000
heap
page read and write
133C000
stack
page read and write
1C4B3BE3000
heap
page read and write
5627000
heap
page read and write
19168400000
direct allocation
page execute and read and write
1C4B3BC5000
heap
page read and write
1C4B3BC9000
heap
page read and write
4A4E000
stack
page read and write
24278550000
heap
page read and write
1C4B3BAD000
heap
page read and write
1C4B3BC5000
heap
page read and write
1C4B3953000
heap
page read and write
5627000
heap
page read and write
2E44000
heap
page read and write
1E48B427000
heap
page read and write
1E48AB86000
heap
page read and write
1C4B3971000
heap
page read and write
26FE000
stack
page read and write
5779000
heap
page read and write
1C4B371A000
heap
page read and write
3791000
trusted library allocation
page read and write
1C4B39A3000
heap
page read and write
5560000
heap
page read and write
1C4B3971000
heap
page read and write
1C4B36F3000
heap
page read and write
51E1000
heap
page read and write
25CD000
stack
page read and write
1C4B39D8000
heap
page read and write
1C4B3B85000
heap
page read and write
5627000
heap
page read and write
55C7000
unkown
page read and write
1C4B3BC9000
heap
page read and write
562A000
heap
page read and write
242784F0000
heap
page read and write
1C4B1630000
heap
page read and write
1C4B3BCD000
heap
page read and write
1C4B1650000
heap
page read and write
1C4B39D8000
heap
page read and write
5627000
heap
page read and write
1C4B4370000
heap
page read and write
51E1000
heap
page read and write
2BB0000
unkown
page execute and read and write
5627000
heap
page read and write
1C4B3B7A000
heap
page read and write
1C4B36CB000
heap
page read and write
1C4B3BC9000
heap
page read and write
2E44000
heap
page read and write
1C4B3643000
heap
page read and write
1C4B38C3000
heap
page read and write
51E1000
heap
page read and write
31BF000
heap
page read and write
2BAC000
stack
page read and write
1C4B3B6D000
heap
page read and write
1C4B3BB5000
heap
page read and write
2E44000
heap
page read and write
1C4B396B000
heap
page read and write
13D0000
heap
page read and write
2E44000
heap
page read and write
1C4B3BC5000
heap
page read and write
5571000
heap
page read and write
1C4B3BA2000
heap
page read and write
1C4B3BF4000
heap
page read and write
1C4B3668000
heap
page read and write
1C4B3714000
heap
page read and write
1C4B3BCD000
heap
page read and write
1C4B3B75000
heap
page read and write
55B4000
heap
page read and write
5627000
heap
page read and write
1C4B3B74000
heap
page read and write
1C4B3BEF000
heap
page read and write
3020000
heap
page read and write
1C4B3B70000
heap
page read and write
51E1000
heap
page read and write
1C4B3641000
heap
page read and write
51E1000
heap
page read and write
2E44000
heap
page read and write
1C4B3BD5000
heap
page read and write
5627000
heap
page read and write
1C4B3BDD000
heap
page read and write
4A93000
heap
page read and write
5627000
heap
page read and write
1C4B3646000
heap
page read and write
1C4B3648000
heap
page read and write
51E0000
unkown
page read and write
535F000
stack
page read and write
4989000
heap
page read and write
2E44000
heap
page read and write
5E369FE000
stack
page read and write
5627000
heap
page read and write
1E48ABD5000
heap
page read and write
1C4B3BAD000
heap
page read and write
51E1000
heap
page read and write
1E48B459000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
5627000
heap
page read and write
1C4B3927000
heap
page read and write
51E1000
heap
page read and write
1C4B3BC5000
heap
page read and write
1C4B366C000
heap
page read and write
2E44000
heap
page read and write
5627000
heap
page read and write
1C4B36D1000
heap
page read and write
51E1000
heap
page read and write
1C4B3BCD000
heap
page read and write
1C4B3BA5000
heap
page read and write
1C4B3BDD000
heap
page read and write
1C4B3665000
heap
page read and write
1E48B700000
heap
page read and write
1C4B3715000
heap
page read and write
1C4B3BF4000
heap
page read and write
1C4B3B8B000
heap
page read and write
5627000
heap
page read and write
242782B0000
remote allocation
page execute and read and write
1C4B39D8000
heap
page read and write
9F5000
heap
page read and write
51E1000
heap
page read and write
1C4B36F9000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
1C4B3871000
heap
page read and write
2E44000
heap
page read and write
2E44000
heap
page read and write
1E48ABD5000
heap
page read and write
1C4B393B000
heap
page read and write
19169D46000
heap
page read and write
1C4B364B000
heap
page read and write
51E1000
heap
page read and write
5627000
heap
page read and write
1E48B423000
heap
page read and write
1C4B393F000
heap
page read and write
1C4B3BB5000
heap
page read and write
1C4B395B000
heap
page read and write
5627000
heap
page read and write
5627000
heap
page read and write
1C4B36C8000
heap
page read and write
5627000
heap
page read and write
B00000
trusted library allocation
page read and write
1C4B366E000
heap
page read and write
1E48B40B000
heap
page read and write
242786AE000
heap
page read and write
1C4B362B000
heap
page read and write
1E48B43D000
heap
page read and write
1C4B3BEC000
heap
page read and write
1C4B3BCD000
heap
page read and write
1C4B3B7A000
heap
page read and write
5E186FE000
stack
page read and write
2E44000
heap
page read and write
5627000
heap
page read and write
5627000
heap
page read and write
1C4B364D000
heap
page read and write
1C4B3625000
heap
page read and write
1C4B36F0000
heap
page read and write
4A90000
heap
page read and write
1C4B3BF4000
heap
page read and write
1C4B3BCB000
heap
page read and write
1916846A000
heap
page read and write
2E44000
heap
page read and write
1C4B3963000
heap
page read and write
2E44000
heap
page read and write
51E1000
heap
page read and write
1C4B36E8000
heap
page read and write
2E44000
heap
page read and write
51E1000
heap
page read and write
9F0000
heap
page read and write
51E1000
heap
page read and write
1C4B30C5000
heap
page read and write
1C4B371A000
heap
page read and write
1C4B3BC0000
heap
page read and write
24278567000
heap
page read and write
1C4B3A71000
heap
page read and write
1E48AB86000
heap
page read and write
1C4B366A000
heap
page read and write
1C4B36F3000
heap
page read and write
1C4B3BE3000
heap
page read and write
1C4B3BD6000
heap
page read and write
1C4B393F000
heap
page read and write
1E48B42F000
heap
page read and write
1C4B39C9000
heap
page read and write
1C4B36F3000
heap
page read and write
51E1000
heap
page read and write
48D0000
direct allocation
page read and write
1C4B366D000
heap
page read and write
1C4B3BC5000
heap
page read and write
1E48B5BA000
heap
page read and write
3093000
heap
page read and write
5627000
heap
page read and write
1E48B40D000
heap
page read and write
1C4B366D000
heap
page read and write
19169E10000
heap
page read and write
1C4B3933000
heap
page read and write
5627000
heap
page read and write
19168400000
direct allocation
page execute and read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
48F0000
direct allocation
page read and write
5E36FFD000
stack
page read and write
1E48B708000
heap
page read and write
2F30000
heap
page read and write
1C4B3BB6000
heap
page read and write
1E48ABD0000
heap
page read and write
1C4B397D000
heap
page read and write
242786AE000
heap
page read and write
1C4B3714000
heap
page read and write
51E0000
unkown
page read and write
2E44000
heap
page read and write
2E44000
heap
page read and write
1E48AC1B000
heap
page read and write
51E1000
heap
page read and write
1C4B394B000
heap
page read and write
1C4B366C000
heap
page read and write
1E48ABC2000
heap
page read and write
585C000
heap
page read and write
1C4B3632000
heap
page read and write
1C4B3BE3000
heap
page read and write
1C4B3710000
heap
page read and write
1C4B362D000
heap
page read and write
1C4B3BC5000
heap
page read and write
5E36CFC000
stack
page read and write
1C4B36BC000
heap
page read and write
51E1000
heap
page read and write
1C4B36C8000
heap
page read and write
1C4B36EE000
heap
page read and write
1C4B3BE0000
heap
page read and write
55B4000
heap
page read and write
2E44000
heap
page read and write
55A4000
heap
page read and write
1C4B39D8000
heap
page read and write
5627000
heap
page read and write
51E1000
heap
page read and write
1C4B394B000
heap
page read and write
51E1000
heap
page read and write
1C4B3971000
heap
page read and write
1C4B3BE6000
heap
page read and write
1C4B36C8000
heap
page read and write
1C4B3637000
heap
page read and write
1C4B3BC5000
heap
page read and write
1C4B3BE3000
heap
page read and write
1C4B3BCD000
heap
page read and write
51E1000
heap
page read and write
1C4B3BBD000
heap
page read and write
1C4B39AB000
heap
page read and write
5627000
heap
page read and write
51E1000
heap
page read and write
1C4B3BEC000
heap
page read and write
1E48AC19000
heap
page read and write
1C4B3BCD000
heap
page read and write
51E1000
heap
page read and write
1C4B3A24000
heap
page read and write
1E48AB10000
heap
page read and write
1C4B366D000
heap
page read and write
51E1000
heap
page read and write
1E48AB92000
heap
page read and write
1C4B3654000
heap
page read and write
1C4B36E2000
heap
page read and write
1E48AB92000
heap
page read and write
1C4B39D8000
heap
page read and write
1C4B3B9D000
heap
page read and write
1C4B371E000
heap
page read and write
1C4B36F3000
heap
page read and write
1C4B371A000
heap
page read and write
7DF449D2B000
unkown
page read and write
1C4B3BC5000
heap
page read and write
5627000
heap
page read and write
1C4B363C000
heap
page read and write
1C4B3BCD000
heap
page read and write
51E1000
heap
page read and write
1C4B3BE3000
heap
page read and write
1C4B3654000
heap
page read and write
3E0000
unkown
page readonly
51E1000
heap
page read and write
51E1000
heap
page read and write
1C4B3971000
heap
page read and write
1E48AB9D000
heap
page read and write
1C4B3BF4000
heap
page read and write
1C4B3BB5000
heap
page read and write
1E48AC1B000
heap
page read and write
1C4B3BE2000
heap
page read and write
5627000
heap
page read and write
5627000
heap
page read and write
5542000
unkown
page read and write
1C4B36F3000
heap
page read and write
1C4B36F3000
heap
page read and write
1E48AB9B000
heap
page read and write
1E48B423000
heap
page read and write
2E44000
heap
page read and write
5627000
heap
page read and write
1C4B371A000
heap
page read and write
1E48B5B7000
heap
page read and write
5627000
heap
page read and write
1C4B36E2000
heap
page read and write
5627000
heap
page read and write
1C4B36F3000
heap
page read and write
1C4B3BDD000
heap
page read and write
19169D11000
heap
page read and write
1C4B3BCB000
heap
page read and write
1E48ABD5000
heap
page read and write
1C4B3BDD000
heap
page read and write
1C4B3923000
heap
page read and write
1C4B3B8B000
heap
page read and write
1E48B5B0000
heap
page read and write
1C4B1670000
heap
page read and write
1E48AC1B000
heap
page read and write
1C4B3BB5000
heap
page read and write
1C4B3BE6000
heap
page read and write
1C4B3983000
heap
page read and write
1C4B370A000
heap
page read and write
1C4B3BCD000
heap
page read and write
242786A6000
heap
page read and write
1C4B3BE3000
heap
page read and write
19168438000
heap
page read and write
19168200000
unkown
page read and write
5627000
heap
page read and write
1C4B3659000
heap
page read and write
51E1000
heap
page read and write
5627000
heap
page read and write
1E48B3FD000
heap
page read and write
1C4B3971000
heap
page read and write
1C4B3BCE000
heap
page read and write
7DF449D06000
unkown
page read and write
2E44000
heap
page read and write
51E1000
heap
page read and write
1C4B363A000
heap
page read and write
1C4B3BB5000
heap
page read and write
2E44000
heap
page read and write
5627000
heap
page read and write
5627000
heap
page read and write
1C4B3BC5000
heap
page read and write
1C4B3BC9000
heap
page read and write
51E1000
heap
page read and write
1C4B3020000
heap
page readonly
19169D57000
heap
page read and write
1C4B3BCB000
heap
page read and write
1C4B3725000
heap
page read and write
1C4B36C8000
heap
page read and write
51E1000
heap
page read and write
1C4B36D1000
heap
page read and write
51E1000
heap
page read and write
1C4B3971000
heap
page read and write
5627000
heap
page read and write
1C4B3BA5000
heap
page read and write
5627000
heap
page read and write
5627000
heap
page read and write
5627000
heap
page read and write
7DF449D10000
unkown
page read and write
1C4B3BE5000
heap
page read and write
191683E5000
heap
page read and write
1C4B3B7F000
heap
page read and write
51E1000
heap
page read and write
A8265BD000
stack
page read and write
2E44000
heap
page read and write
2793000
trusted library allocation
page read and write
51E1000
heap
page read and write
1C4B3BAD000
heap
page read and write
7DF42F500000
unkown
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
1C4B3B9D000
heap
page read and write
1C4B3B6D000
heap
page read and write
54A9000
unkown
page read and write
51E1000
heap
page read and write
1C4B366E000
heap
page read and write
5E36DFB000
stack
page read and write
2E44000
heap
page read and write
1C4B3BE6000
heap
page read and write
5627000
heap
page read and write
1C4B3BCB000
heap
page read and write
1C4B3973000
heap
page read and write
1C4B3BEC000
heap
page read and write
5627000
heap
page read and write
1C4B36E8000
heap
page read and write
1C4B3971000
heap
page read and write
51E1000
heap
page read and write
1C4B3632000
heap
page read and write
1C4B364D000
heap
page read and write
1C4B3BC9000
heap
page read and write
51E1000
heap
page read and write
1C4B3985000
heap
page read and write
51E1000
heap
page read and write
1C4B394B000
heap
page read and write
1C4B398A000
heap
page read and write
1C4B3BCB000
heap
page read and write
5627000
heap
page read and write
1C4B39A4000
heap
page read and write
1C4B3BE3000
heap
page read and write
51E1000
heap
page read and write
1C4B36C8000
heap
page read and write
5536000
unkown
page read and write
1C4B3BE5000
heap
page read and write
1E48B40D000
heap
page read and write
1C4B364D000
heap
page read and write
1C4B3BC9000
heap
page read and write
1C4B3BCD000
heap
page read and write
1C4B3BCD000
heap
page read and write
1C4B396B000
heap
page read and write
1C4B30DA000
heap
page read and write
1E48B436000
heap
page read and write
B4C000
heap
page read and write
1916825F000
unkown
page execute and read and write
1C4B3BC5000
heap
page read and write
1C4B3BE3000
heap
page read and write
1C4B36D1000
heap
page read and write
1C4B366E000
heap
page read and write
B1B000
stack
page read and write
1E48AB49000
heap
page read and write
1E48ABBC000
heap
page read and write
2E44000
heap
page read and write
1C4B3BB9000
heap
page read and write
1E48B42C000
heap
page read and write
1C4B3985000
heap
page read and write
1C4B3BC5000
heap
page read and write
1C4B36F9000
heap
page read and write
1C4B3BD6000
heap
page read and write
1C4B366D000
heap
page read and write
5556000
unkown
page read and write
1C4B38CA000
heap
page read and write
1C4B3BCB000
heap
page read and write
54AD000
unkown
page read and write
7DF449D39000
unkown
page read and write
1C4B3BF4000
heap
page read and write
1C4B3B8A000
heap
page read and write
1C4B3870000
heap
page read and write
1C4B3641000
heap
page read and write
4986000
heap
page read and write
1C4B3BD9000
heap
page read and write
1E48ABA2000
heap
page read and write
1C4B3BC5000
heap
page read and write
1C4B3B6E000
heap
page read and write
1C4B39AB000
heap
page read and write
1C4B3714000
heap
page read and write
1C4B3BE3000
heap
page read and write
5627000
heap
page read and write
1C4B368D000
heap
page read and write
5627000
heap
page read and write
1C4B36BD000
heap
page read and write
546E000
stack
page read and write
51E1000
heap
page read and write
2E44000
heap
page read and write
5627000
heap
page read and write
1C4B3715000
heap
page read and write
1C4B3993000
heap
page read and write
51E1000
heap
page read and write
1C4B366A000
heap
page read and write
1C4B3715000
heap
page read and write
1C4B3BB5000
heap
page read and write
1E48AB92000
heap
page read and write
1C4B366E000
heap
page read and write
1E48AC3A000
heap
page read and write
242786AE000
heap
page read and write
19169CD0000
unkown
page read and write
1C4B3BB5000
heap
page read and write
1C4B366F000
heap
page read and write
1E48B405000
heap
page read and write
1E48ABD5000
heap
page read and write
1C4B3648000
heap
page read and write
5330000
unkown
page read and write
1C4B3645000
heap
page read and write
5627000
heap
page read and write
1C4B366A000
heap
page read and write
191683F0000
trusted library allocation
page read and write
1C4B39D8000
heap
page read and write
1E48B707000
heap
page read and write
51E1000
heap
page read and write
1C4B3BB5000
heap
page read and write
3028000
heap
page read and write
1C4B3B88000
heap
page read and write
1C4B3BD6000
heap
page read and write
1E48B420000
heap
page read and write
51E1000
heap
page read and write
5627000
heap
page read and write
D26000
trusted library allocation
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
1C4B3B95000
heap
page read and write
97E000
stack
page read and write
1C4B371D000
heap
page read and write
1C4B396B000
heap
page read and write
1C4B3937000
heap
page read and write
1C4B3666000
heap
page read and write
4840000
heap
page read and write
123C000
stack
page read and write
1C4B3621000
heap
page read and write
1E48AC1B000
heap
page read and write
1E48ABBC000
heap
page read and write
1C4B36F3000
heap
page read and write
1E48B42E000
heap
page read and write
1C4B3BAA000
heap
page read and write
1C4B3BDD000
heap
page read and write
1C4B3BB5000
heap
page read and write
191684F2000
heap
page read and write
1C4B3637000
heap
page read and write
1C4B3BA5000
heap
page read and write
5627000
heap
page read and write
51E1000
heap
page read and write
1C4B39D8000
heap
page read and write
1C4B3924000
heap
page read and write
2E44000
heap
page read and write
492E000
stack
page read and write
1C4B36E2000
heap
page read and write
1C4B3BC5000
heap
page read and write
2791000
trusted library allocation
page execute and read and write
1C4B36BD000
heap
page read and write
2E44000
heap
page read and write
1C4B36E1000
heap
page read and write
51E1000
heap
page read and write
1C4B36E2000
heap
page read and write
51E1000
heap
page read and write
1C4B399B000
heap
page read and write
1C4B394B000
heap
page read and write
1C4B3BCD000
heap
page read and write
1C4B3B8F000
heap
page read and write
1E48ABA1000
heap
page read and write
1C4B3715000
heap
page read and write
1C4B3BC9000
heap
page read and write
1C4B366E000
heap
page read and write
1C4B366D000
heap
page read and write
49A5000
heap
page read and write
1C4B3B9E000
heap
page read and write
1C4B366E000
heap
page read and write
1E48ABBC000
heap
page read and write
191683F0000
unkown
page read and write
1C4B39D8000
heap
page read and write
1C4B3BAD000
heap
page read and write
5627000
heap
page read and write
5627000
heap
page read and write
1C4B399B000
heap
page read and write
19168201000
unkown
page execute read
1C4B3659000
heap
page read and write
1E48ABE7000
heap
page read and write
1C4B36F3000
heap
page read and write
1C4B3BC5000
heap
page read and write
1E48ABC2000
heap
page read and write
1C4B3714000
heap
page read and write
2E44000
heap
page read and write
1C4B3626000
heap
page read and write
5627000
heap
page read and write
1C4B3BC5000
heap
page read and write
1C4B3BD5000
heap
page read and write
1C4B3641000
heap
page read and write
19169D10000
heap
page read and write
1C4B3BCD000
heap
page read and write
2E44000
heap
page read and write
1C4B3BC9000
heap
page read and write
51E1000
heap
page read and write
1C4B3BCD000
heap
page read and write
1C4B36E9000
heap
page read and write
1C4B3BF4000
heap
page read and write
5627000
heap
page read and write
1C4B3BE3000
heap
page read and write
1C4B3B85000
heap
page read and write
1C4B3BAA000
heap
page read and write
2E44000
heap
page read and write
1C4B36F3000
heap
page read and write
1E48AB40000
heap
page read and write
1E48B5B2000
heap
page read and write
51E1000
heap
page read and write
1C4B3BA0000
heap
page read and write
1C4B39D8000
heap
page read and write
1C4B3971000
heap
page read and write
1C4B3BDF000
heap
page read and write
1E48B404000
heap
page read and write
1C4B371E000
heap
page read and write
51E1000
heap
page read and write
1C4B3BE6000
heap
page read and write
1E48B5BE000
heap
page read and write
1C4B3627000
heap
page read and write
1E48AC19000
heap
page read and write
1C4B3648000
heap
page read and write
1C4B3BC9000
heap
page read and write
1C4B3BCE000
heap
page read and write
1370000
heap
page read and write
1C4B3BB5000
heap
page read and write
1C4B3BC9000
heap
page read and write
2E44000
heap
page read and write
1C4B366D000
heap
page read and write
1C4B3BF4000
heap
page read and write
242782F1000
remote allocation
page execute and read and write
1C4B3BAD000
heap
page read and write
D4B000
trusted library allocation
page execute and read and write
1C4B3BB5000
heap
page read and write
1C4B3971000
heap
page read and write
1C4B3BAD000
heap
page read and write
1C4B395B000
heap
page read and write
5627000
heap
page read and write
1C4B392B000
heap
page read and write
A82697C000
stack
page read and write
B28000
heap
page read and write
5627000
heap
page read and write
1C4B3933000
heap
page read and write
2E44000
heap
page read and write
1E48AC1B000
heap
page read and write
2E44000
heap
page read and write
5627000
heap
page read and write
1C4B3BC5000
heap
page read and write
1C4B3985000
heap
page read and write
1E48AC3A000
heap
page read and write
1E48B718000
heap
page read and write
19169D6D000
heap
page read and write
1C4B3B88000
heap
page read and write
1C4B3BDD000
heap
page read and write
1E48AC19000
heap
page read and write
1C4B36D0000
heap
page read and write
51E1000
heap
page read and write
1E48B3F3000
heap
page read and write
1C4B38B9000
heap
page read and write
51E1000
heap
page read and write
4991000
heap
page read and write
19168380000
heap
page read and write
1C4B394B000
heap
page read and write
1E48B42C000
heap
page read and write
1C4B36C6000
heap
page read and write
1C4B3BCD000
heap
page read and write
5E36EFF000
stack
page read and write
51E1000
heap
page read and write
1E48B510000
heap
page read and write
1C4B363A000
heap
page read and write
1C4B3B7D000
heap
page read and write
1C4B364D000
heap
page read and write
1C4B3933000
heap
page read and write
5627000
heap
page read and write
1C4B3BA9000
heap
page read and write
1C4B3BE4000
heap
page read and write
1C4B3B88000
heap
page read and write
242786AE000
heap
page read and write
2E44000
heap
page read and write
1C4B3BC9000
heap
page read and write
1E48B3F8000
heap
page read and write
24278307000
heap
page read and write
1E48AB47000
heap
page read and write
1C4B3648000
heap
page read and write
1C4B3BDD000
heap
page read and write
1C4B36E2000
heap
page read and write
1C4B3BC9000
heap
page read and write
2E44000
heap
page read and write
1C4B36E2000
heap
page read and write
1C4B36F3000
heap
page read and write
51E1000
heap
page read and write
1C4B3BAD000
heap
page read and write
55E1000
unkown
page read and write
1C4B3937000
heap
page read and write
51E1000
heap
page read and write
19169D55000
heap
page read and write
51E1000
heap
page read and write
1C4B3BC5000
heap
page read and write
1E48B404000
heap
page read and write
5627000
heap
page read and write
51E1000
heap
page read and write
1810000
heap
page read and write
24278530000
heap
page readonly
1C4B3BE6000
heap
page read and write
1C4B36EE000
heap
page read and write
5627000
heap
page read and write
1C4B36F3000
heap
page read and write
51E1000
heap
page read and write
1C4B3971000
heap
page read and write
1C4B36D1000
heap
page read and write
5627000
heap
page read and write
1C4B36E1000
heap
page read and write
1E48AC2F000
heap
page read and write
1E48B800000
heap
page read and write
1C4B36F9000
heap
page read and write
51E0000
unkown
page read and write
1E48B427000
heap
page read and write
1C4B3631000
heap
page read and write
1C4B3714000
heap
page read and write
1C4B3971000
heap
page read and write
2E44000
heap
page read and write
1C4B3714000
heap
page read and write
1C4B365F000
heap
page read and write
D20000
trusted library allocation
page read and write
5627000
heap
page read and write
5627000
heap
page read and write
1C4B36C6000
heap
page read and write
5380000
unkown
page read and write
1C4B3BC5000
heap
page read and write
2E44000
heap
page read and write
1C4B3971000
heap
page read and write
1C4B3BC9000
heap
page read and write
1C4B39A2000
heap
page read and write
1C4B3BBD000
heap
page read and write
1C4B3B8D000
heap
page read and write
5627000
heap
page read and write
1C4B3BBD000
heap
page read and write
1E48B451000
heap
page read and write
1C4B3714000
heap
page read and write
5627000
heap
page read and write
5627000
heap
page read and write
5627000
heap
page read and write
5627000
heap
page read and write
51E1000
heap
page read and write
1C4B366D000
heap
page read and write
1C4B3BA9000
heap
page read and write
1C4B3BD9000
heap
page read and write
1C4B3BE3000
heap
page read and write
51E1000
heap
page read and write
1C4B39D8000
heap
page read and write
1C4B36EE000
heap
page read and write
1C4B3BE3000
heap
page read and write
1E48B3FB000
heap
page read and write
1E48AC1B000
heap
page read and write
2E44000
heap
page read and write
1C4B39D8000
heap
page read and write
5627000
heap
page read and write
1C4B3641000
heap
page read and write
51E1000
heap
page read and write
1E48ABD5000
heap
page read and write
5627000
heap
page read and write
1C4B3BA3000
heap
page read and write
5571000
heap
page read and write
1C4B363C000
heap
page read and write
1C4B3B8B000
heap
page read and write
1C4B3B98000
heap
page read and write
51E1000
heap
page read and write
1E48B3FD000
heap
page read and write
1C4B3BB5000
heap
page read and write
53F0000
heap
page read and write
A8265AE000
stack
page read and write
51E1000
heap
page read and write
1C4B3971000
heap
page read and write
2E44000
heap
page read and write
51E1000
heap
page read and write
1C4B371E000
heap
page read and write
1C4B3B8B000
heap
page read and write
1C4B3B6E000
heap
page read and write
1E48B427000
heap
page read and write
51E1000
heap
page read and write
1C4B3BDF000
heap
page read and write
1C4B3B7E000
heap
page read and write
5627000
heap
page read and write
1C4B3B95000
heap
page read and write
850000
heap
page read and write
1C4B3632000
heap
page read and write
5627000
heap
page read and write
1C4B39C3000
heap
page read and write
1E48AC19000
heap
page read and write
1C4B39A3000
heap
page read and write
1C4B3963000
heap
page read and write
51E1000
heap
page read and write
5627000
heap
page read and write
1C4B3BAD000
heap
page read and write
5627000
heap
page read and write
1C4B3BC5000
heap
page read and write
1C4B392B000
heap
page read and write
51E1000
heap
page read and write
1C4B3BAD000
heap
page read and write
5627000
heap
page read and write
1C4B36F3000
heap
page read and write
1C4B3993000
heap
page read and write
1C4B3BAD000
heap
page read and write
1C4B3BE3000
heap
page read and write
1C4B3BD5000
heap
page read and write
1C4B30CB000
heap
page read and write
B20000
heap
page read and write
1C4B371D000
heap
page read and write
1E48ABD5000
heap
page read and write
5E1847C000
stack
page read and write
1C4B398B000
heap
page read and write
1C4B3974000
heap
page read and write
1C4B3BE3000
heap
page read and write
1C4B3BC5000
heap
page read and write
1C4B366E000
heap
page read and write
1C4B36E2000
heap
page read and write
1E48AB74000
heap
page read and write
1C4B363A000
heap
page read and write
1C4B3966000
heap
page read and write
1C4B3BCD000
heap
page read and write
1E48AB86000
heap
page read and write
51E1000
heap
page read and write
1C4B3BE5000
heap
page read and write
1C4B3BC5000
heap
page read and write
19169D11000
heap
page read and write
19169CDF000
unkown
page read and write
1C4B36D1000
heap
page read and write
1E48AB15000
heap
page read and write
51E1000
heap
page read and write
1C4B3654000
heap
page read and write
1E48AC39000
heap
page read and write
1C4B3645000
heap
page read and write
1C4B3963000
heap
page read and write
51E1000
heap
page read and write
1C4B366E000
heap
page read and write
1C4B3B85000
heap
page read and write
1C4B3BB5000
heap
page read and write
5627000
heap
page read and write
1C4B3B6E000
heap
page read and write
1C4B329C000
heap
page read and write
D90000
trusted library allocation
page read and write
1E48B407000
heap
page read and write
1C4B3BDD000
heap
page read and write
1C4B3BD9000
heap
page read and write
1E48AC3A000
heap
page read and write
2E44000
heap
page read and write
5E36C7E000
stack
page read and write
1C4B3BC5000
heap
page read and write
51E1000
heap
page read and write
1E48AC19000
heap
page read and write
1E48B70F000
heap
page read and write
5627000
heap
page read and write
1C4B394B000
heap
page read and write
1C4B3BC5000
heap
page read and write
1C4B3080000
trusted library allocation
page read and write
1E48B407000
heap
page read and write
1C4B366D000
heap
page read and write
1C4B3646000
heap
page read and write
1E48ABC2000
heap
page read and write
1C4B36C9000
heap
page read and write
1C4B3937000
heap
page read and write
1C4B3BB5000
heap
page read and write
D47000
trusted library allocation
page execute and read and write
51E1000
heap
page read and write
1E48AC19000
heap
page read and write
1C4B3000000
unkown
page execute and read and write
9BE000
stack
page read and write
1E48ABD5000
heap
page read and write
2E44000
heap
page read and write
1C4B3BC5000
heap
page read and write
5627000
heap
page read and write
1C4B36F3000
heap
page read and write
1C4B39D8000
heap
page read and write
1E48B41A000
heap
page read and write
7DF449D00000
unkown
page read and write
1E48ABBF000
heap
page read and write
1C4B30C7000
heap
page read and write
2E44000
heap
page read and write
1C4B2FE0000
heap
page read and write
1916A320000
heap
page read and write
1C4B3BB5000
heap
page read and write
1C4B3BE6000
heap
page read and write
1C4B3BCD000
heap
page read and write
1E48B436000
heap
page read and write
1C4B3BD6000
heap
page read and write
1C4B3709000
heap
page read and write
B62000
heap
page read and write
1C4B3BD5000
heap
page read and write
1C4B3973000
heap
page read and write
1E48B5BB000
heap
page read and write
1C4B3070000
heap
page read and write
51E1000
heap
page read and write
2E44000
heap
page read and write
1C4B3BAD000
heap
page read and write
191683E0000
heap
page read and write
1C4B3BA9000
heap
page read and write
1C4B39C1000
heap
page read and write
242786AA000
heap
page read and write
1C4B3971000
heap
page read and write
5627000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
1C4B371E000
heap
page read and write
51E1000
heap
page read and write
1C4B36C8000
heap
page read and write
317F000
heap
page read and write
1C4B36CB000
heap
page read and write
1E48AC1B000
heap
page read and write
1C4B36F3000
heap
page read and write
1C4B3B81000
heap
page read and write
1C4B3BE3000
heap
page read and write
1C4B3BE3000
heap
page read and write
51E1000
heap
page read and write
1C4B3648000
heap
page read and write
1C4B3646000
heap
page read and write
1C4B3709000
heap
page read and write
1C4B3969000
heap
page read and write
1C4B3BAA000
heap
page read and write
1C4B39D8000
heap
page read and write
51E1000
heap
page read and write
54B0000
direct allocation
page read and write
1E48AC1B000
heap
page read and write
1C4B3BCD000
heap
page read and write
B14000
trusted library allocation
page read and write
19169CEC000
unkown
page read and write
1E48B70C000
heap
page read and write
1C4B3BDF000
heap
page read and write
1C4B3714000
heap
page read and write
1C4B3714000
heap
page read and write
51E1000
heap
page read and write
1E48AB86000
heap
page read and write
51E1000
heap
page read and write
1C4B3BDD000
heap
page read and write
1E48B416000
heap
page read and write
1C4B3BB9000
heap
page read and write
1C4B3BCB000
heap
page read and write
1C4B3714000
heap
page read and write
1C4B3BE3000
heap
page read and write
1E48AB51000
heap
page read and write
1C4B393B000
heap
page read and write
1C4B3927000
heap
page read and write
1C4B3BE3000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
1C4B3BAD000
heap
page read and write
1C4B3BC5000
heap
page read and write
191684FB000
heap
page read and write
1C4B3BDD000
heap
page read and write
1C4B3BCB000
heap
page read and write
1E48AC19000
heap
page read and write
51E1000
heap
page read and write
1E48B5BA000
heap
page read and write
2E44000
heap
page read and write
7DF42F501000
unkown
page execute read
5627000
heap
page read and write
51E1000
heap
page read and write
1C4B3BE6000
heap
page read and write
1C4B3BC5000
heap
page read and write
5627000
heap
page read and write
25D0000
heap
page read and write
1C4B3B7F000
heap
page read and write
51E1000
heap
page read and write
1C4B36F9000
heap
page read and write
1C4B3971000
heap
page read and write
51E1000
heap
page read and write
1C4B3BCB000
heap
page read and write
5627000
heap
page read and write
1C4B36C8000
heap
page read and write
1C4B371B000
heap
page read and write
1C4B366D000
heap
page read and write
1E48ABA1000
heap
page read and write
5627000
heap
page read and write
54E0000
heap
page read and write
1C4B3BE3000
heap
page read and write
1C4B3637000
heap
page read and write
1C4B36C6000
heap
page read and write
1C4B3665000
heap
page read and write
1C4B36F3000
heap
page read and write
51E1000
heap
page read and write
4983000
heap
page read and write
53D0000
unkown
page read and write
51E1000
heap
page read and write
531E000
stack
page read and write
5272000
unkown
page read and write
1C4B3654000
heap
page read and write
1C4B36D1000
heap
page read and write
1E48B428000
heap
page read and write
1C4B3714000
heap
page read and write
2BF0000
heap
page read and write
51E1000
heap
page read and write
1C4B366C000
heap
page read and write
1C4B39A3000
heap
page read and write
1C4B3BCB000
heap
page read and write
1C4B3BCB000
heap
page read and write
24278410000
heap
page read and write
14EE000
stack
page read and write
1C4B394B000
heap
page read and write
191683C0000
heap
page readonly
D1F000
stack
page read and write
51E1000
heap
page read and write
1C4B3BA5000
heap
page read and write
19168430000
heap
page read and write
1E48B41B000
heap
page read and write
1C4B363A000
heap
page read and write
1E48AC1B000
heap
page read and write
1C4B36F3000
heap
page read and write
1C4B397B000
heap
page read and write
1C4B36E2000
heap
page read and write
1C4B3BCD000
heap
page read and write
1C4B3BE6000
heap
page read and write
1C4B3714000
heap
page read and write
1C4B3BC9000
heap
page read and write
1C4B3B8A000
heap
page read and write
51E1000
heap
page read and write
53DC000
stack
page read and write
51E1000
heap
page read and write
1C4B3937000
heap
page read and write
1C4B3BAD000
heap
page read and write
5627000
heap
page read and write
1E48B40B000
heap
page read and write
1C4B39C3000
heap
page read and write
19169D45000
heap
page read and write
1C4B3BEC000
heap
page read and write
1C4B36F3000
heap
page read and write
5627000
heap
page read and write
1C4B3714000
heap
page read and write
1C4B3BA5000
heap
page read and write
1C4B3B88000
heap
page read and write
51E1000
heap
page read and write
1C4B3BC9000
heap
page read and write
51E1000
heap
page read and write
1E48AC19000
heap
page read and write
1813000
heap
page read and write
E8DCAFC000
stack
page read and write
1C4B36D1000
heap
page read and write
1C4B36C9000
heap
page read and write
1C4B3BBD000
heap
page read and write
2E3D000
stack
page read and write
51E1000
heap
page read and write
1E48ABD0000
heap
page read and write
1C4B3718000
heap
page read and write
1C4B3634000
heap
page read and write
1C4B39C1000
heap
page read and write
1C4B3BB5000
heap
page read and write
1C4B39D8000
heap
page read and write
1C4B3648000
heap
page read and write
1C4B3BCD000
heap
page read and write
242786A0000
heap
page read and write
2E44000
heap
page read and write
1C4B366D000
heap
page read and write
1C4B36D1000
heap
page read and write
1C4B366E000
heap
page read and write
2E44000
heap
page read and write
51E1000
heap
page read and write
5627000
heap
page read and write
5627000
heap
page read and write
1C4B3709000
heap
page read and write
1C4B3BAD000
heap
page read and write
1C4B3971000
heap
page read and write
1E48B42C000
heap
page read and write
1C4B3B70000
heap
page read and write
1C4B3BAD000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
1C4B3B96000
heap
page read and write
51E1000
heap
page read and write
1C4B3963000
heap
page read and write
1C4B3BAD000
heap
page read and write
1C4B3BB5000
heap
page read and write
51E1000
heap
page read and write
1C4B3B9C000
heap
page read and write
51E1000
heap
page read and write
1C4B370E000
heap
page read and write
1E48ABBC000
heap
page read and write
1C4B3BCD000
heap
page read and write
1E48AC19000
heap
page read and write
5358000
unkown
page read and write
1E48AC1B000
heap
page read and write
1C4B3644000
heap
page read and write
1C4B3BE3000
heap
page read and write
1C4B3BEE000
heap
page read and write
1C4B39BB000
heap
page read and write
1C4B3BAD000
heap
page read and write
1C4B3B81000
heap
page read and write
51E1000
heap
page read and write
4910000
heap
page read and write
1C4B3BE5000
heap
page read and write
1C4B3B7A000
heap
page read and write
1C4B39A3000
heap
page read and write
1C4B370A000
heap
page read and write
1C4B3BBD000
heap
page read and write
1C4B39AB000
heap
page read and write
2E44000
heap
page read and write
1C4B3B9D000
heap
page read and write
2E44000
heap
page read and write
1C4B36BF000
heap
page read and write
7DF449D0A000
unkown
page read and write
51E1000
heap
page read and write
1E48ABA1000
heap
page read and write
1C4B3BC9000
heap
page read and write
51E1000
heap
page read and write
1C4B3BE6000
heap
page read and write
1C4B36E2000
heap
page read and write
1C4B394B000
heap
page read and write
51E1000
heap
page read and write
1E48ABA1000
heap
page read and write
1C4B3BC5000
heap
page read and write
1C4B3BC5000
heap
page read and write
1C4B39A3000
heap
page read and write
1C4B366D000
heap
page read and write
2E44000
heap
page read and write
1C4B3BDD000
heap
page read and write
1C4B3B98000
heap
page read and write
5627000
heap
page read and write
1C4B3030000
trusted library allocation
page read and write
5E36D7E000
stack
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
1E48ABA1000
heap
page read and write
1C4B3973000
heap
page read and write
1C4B36D1000
heap
page read and write
1C4B36CB000
heap
page read and write
1E48B40F000
heap
page read and write
1C4B38C9000
heap
page read and write
1C4B3BAD000
heap
page read and write
1C4B3BC5000
heap
page read and write
5627000
heap
page read and write
1E48ABC2000
heap
page read and write
4A8F000
stack
page read and write
1C4B39D8000
heap
page read and write
5627000
heap
page read and write
1C4B393B000
heap
page read and write
1C4B3BCD000
heap
page read and write
1E48AB4B000
heap
page read and write
1E48AB44000
heap
page read and write
930000
heap
page read and write
51E1000
heap
page read and write
1C4B3BCD000
heap
page read and write
5627000
heap
page read and write
51E1000
heap
page read and write
1C4B3BB5000
heap
page read and write
1C4B36F6000
heap
page read and write
1C4B371E000
heap
page read and write
51E0000
heap
page read and write
19169D45000
heap
page read and write
1C4B3668000
heap
page read and write
7DF42F600000
unkown
page readonly
3100000
heap
page read and write
1C4B36EE000
heap
page read and write
1C4B3BAD000
heap
page read and write
1C4B365F000
heap
page read and write
1E48AC3A000
heap
page read and write
1C4B36C6000
heap
page read and write
19169FD0000
heap
page read and write
1C4B3BE3000
heap
page read and write
1C4B398A000
heap
page read and write
1C4B366E000
heap
page read and write
1C4B30DA000
heap
page read and write
A8269FF000
stack
page read and write
1C4B3BA9000
heap
page read and write
2F9E000
stack
page read and write
1C4B3BDD000
heap
page read and write
5627000
heap
page read and write
51E1000
heap
page read and write
1C4B36F3000
heap
page read and write
1C4B3BCB000
heap
page read and write
D24000
trusted library allocation
page read and write
19168280000
heap
page read and write
1916825C000
unkown
page read and write
4EC000
stack
page read and write
7DF449D01000
unkown
page execute read
1C4B3BCB000
heap
page read and write
5627000
heap
page read and write
51E1000
heap
page read and write
2E44000
heap
page read and write
1C4B3BDD000
heap
page read and write
1C4B36C9000
heap
page read and write
4997000
heap
page read and write
51E1000
heap
page read and write
5400000
unkown
page read and write
1C4B30C7000
heap
page read and write
1C4B366D000
heap
page read and write
1C4B3BE3000
heap
page read and write
51E1000
heap
page read and write
1C4B36D1000
heap
page read and write
1C4B3927000
heap
page read and write
5627000
heap
page read and write
1C4B39D8000
heap
page read and write
1C4B3BE3000
heap
page read and write
1C4B3BCB000
heap
page read and write
1C4B3BE3000
heap
page read and write
1C4B394B000
heap
page read and write
1C4B3BCB000
heap
page read and write
1E48B41A000
heap
page read and write
5627000
heap
page read and write
1C4B36C6000
heap
page read and write
5779000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
5627000
heap
page read and write
1C4B3BB5000
heap
page read and write
1E48AB8A000
heap
page read and write
1E48B425000
heap
page read and write
1E48B5BA000
heap
page read and write
1C4B3BDD000
heap
page read and write
51E1000
heap
page read and write
1C4B395B000
heap
page read and write
1C4B3B6E000
heap
page read and write
191683EB000
heap
page read and write
1C4B3BD5000
heap
page read and write
1C4B30D4000
heap
page read and write
19169D8F000
heap
page read and write
1C4B3BDD000
heap
page read and write
1C4B3714000
heap
page read and write
1C4B3622000
heap
page read and write
1C4B36F3000
heap
page read and write
1C4B3993000
heap
page read and write
1E48B433000
heap
page read and write
51E1000
heap
page read and write
5627000
heap
page read and write
55AC000
heap
page read and write
2FE0000
heap
page read and write
1C4B30CE000
heap
page read and write
1C4B3943000
heap
page read and write
5290000
unkown
page read and write
1E48B5B3000
heap
page read and write
1C4B3BE3000
heap
page read and write
1C4B3654000
heap
page read and write
5627000
heap
page read and write
1C4B30C0000
heap
page read and write
1E48ABD5000
heap
page read and write
51E1000
heap
page read and write
1C4B3BE3000
heap
page read and write
5627000
heap
page read and write
1C4B3BAD000
heap
page read and write
551E000
unkown
page read and write
5627000
heap
page read and write
1C4B30C7000
heap
page read and write
1C4B39D8000
heap
page read and write
1C4B3714000
heap
page read and write
1C4B3BE5000
heap
page read and write
1C4B363C000
heap
page read and write
1C4B3BDD000
heap
page read and write
5627000
heap
page read and write
1E48A980000
heap
page read and write
51E1000
heap
page read and write
1C4B36F3000
heap
page read and write
5E8000
stack
page read and write
1380000
heap
page read and write
1C4B3BDF000
heap
page read and write
1C4B3BCB000
heap
page read and write
1E48B3F0000
heap
page read and write
1C4B36F3000
heap
page read and write
5627000
heap
page read and write
5627000
heap
page read and write
1C4B3BE4000
heap
page read and write
51E1000
heap
page read and write
1C4B3BC5000
heap
page read and write
1C4B3BCD000
heap
page read and write
1E48B407000
heap
page read and write
19169E93000
heap
page read and write
1C4B3643000
heap
page read and write
51E1000
heap
page read and write
1C4B3BC5000
heap
page read and write
5627000
heap
page read and write
191683F0000
trusted library allocation
page read and write
1C4B3030000
trusted library allocation
page read and write
1E48B42E000
heap
page read and write
2E44000
heap
page read and write
1C4B3BAA000
heap
page read and write
1C4B3BE3000
heap
page read and write
1C4B38BB000
heap
page read and write
1E48AC3A000
heap
page read and write
1C4B36BE000
heap
page read and write
1C4B36C0000
heap
page read and write
1C4B3BAD000
heap
page read and write
5E36977000
stack
page read and write
1C4B30D4000
heap
page read and write
5627000
heap
page read and write
1C4B3933000
heap
page read and write
1C4B3963000
heap
page read and write
1C4B366D000
heap
page read and write
51E1000
heap
page read and write
1E48B5B4000
heap
page read and write
51E1000
heap
page read and write
5627000
heap
page read and write
51E1000
heap
page read and write
1C4B362B000
heap
page read and write
1C4B3B9E000
heap
page read and write
1C4B36F3000
heap
page read and write
1C4B3BDD000
heap
page read and write
1C4B3BEC000
heap
page read and write
2E44000
heap
page read and write
1C4B36F3000
heap
page read and write
1C4B3993000
heap
page read and write
1C4B3BE3000
heap
page read and write
51E1000
heap
page read and write
51E1000
heap
page read and write
5627000
heap
page read and write
1C4B3714000
heap
page read and write
2E40000
heap
page read and write
There are 1680 hidden memdumps, click here to show them.