IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\bYrIyAT.a3x
data
dropped
C:\Users\user\AppData\Local\Temp\is-09MIB.tmp\file.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-NDTIL.tmp\_isetup\_isdecmp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-NDTIL.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-OR928.tmp\file.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\NVFTVRDLL64.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\NvFrapsOpenVR.man (copy)
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\_isetup\_isdecmp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\ddETWExternal.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\ddETWExternal.xml (copy)
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (399), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\htcvive_install.bat (copy)
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\is-5MQFH.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\is-7G1NI.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\is-8JII1.tmp
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\is-E0D1D.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\is-EUGF2.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\is-ML8HU.tmp
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\is-TP03U.tmp
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (399), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\nvfvsdksvc_x64.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-QF9UH.tmp\nvinstall.cmd (copy)
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\hangbird\Updater.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\hangbird\caliculus.csv (copy)
data
dropped
C:\Users\user\AppData\Local\hangbird\caliculus.zip (copy)
data
dropped
C:\Users\user\AppData\Local\hangbird\is-7LJOT.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\hangbird\is-8EU3L.tmp
data
dropped
C:\Users\user\AppData\Local\hangbird\is-JBS10.tmp
data
dropped
\Device\Null
ASCII text, with CRLF line terminators
dropped
There are 19 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c ping -n 5 127.0.0.1 >nul && updater.exe C:\ProgramData\\bYrIyAT.a3x && del C:\ProgramData\\bYrIyAT.a3x
malicious
C:\Windows\SysWOW64\PING.EXE
ping -n 5 127.0.0.1
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
C:\Users\user\AppData\Local\Temp\is-09MIB.tmp\file.tmp
"C:\Users\user\AppData\Local\Temp\is-09MIB.tmp\file.tmp" /SL5="$40476,2820349,845824,C:\Users\user\Desktop\file.exe"
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe" /VERYSILENT
C:\Users\user\AppData\Local\Temp\is-OR928.tmp\file.tmp
"C:\Users\user\AppData\Local\Temp\is-OR928.tmp\file.tmp" /SL5="$2047E,2820349,845824,C:\Users\user\Desktop\file.exe" /VERYSILENT
C:\Windows\System32\cmd.exe
"cmd.exe" /C tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH | find /I "wrsa.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist /FI "IMAGENAME eq wrsa.exe" /FO CSV /NH
C:\Windows\System32\find.exe
find /I "wrsa.exe"
C:\Windows\System32\cmd.exe
"cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH
C:\Windows\System32\find.exe
find /I "opssvc.exe"
C:\Windows\System32\cmd.exe
"cmd.exe" /C tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH | find /I "avastui.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist /FI "IMAGENAME eq avastui.exe" /FO CSV /NH
C:\Windows\System32\find.exe
find /I "avastui.exe"
C:\Windows\System32\cmd.exe
"cmd.exe" /C tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH | find /I "avgui.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist /FI "IMAGENAME eq avgui.exe" /FO CSV /NH
C:\Windows\System32\find.exe
find /I "avgui.exe"
C:\Windows\System32\cmd.exe
"cmd.exe" /C tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | find /I "nswscsvc.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH
C:\Windows\System32\find.exe
find /I "nswscsvc.exe"
C:\Windows\System32\cmd.exe
"cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH
C:\Windows\System32\find.exe
find /I "sophoshealth.exe"
C:\Users\user\AppData\Local\hangbird\Updater.exe
"C:\Users\user\AppData\Local\hangbird\\Updater.exe" "C:\Users\user\AppData\Local\hangbird\\caliculus.csv"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Users\user\AppData\Local\hangbird\Updater.exe
updater.exe C:\ProgramData\\bYrIyAT.a3x
There are 24 hidden processes, click here to show them.

URLs

Name
IP
Malicious
contemteny.site
malicious
opposezmny.site
malicious
servicedny.site
malicious
goalyfeastz.site
malicious
authorisev.site
malicious
faulteyotk.site
malicious
https://authorisev.site/api
104.21.85.194
malicious
seallysl.site
malicious
dilemmadu.site
malicious
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
http://repository.certum.pl/ctsca2021.cer0A
unknown
http://vovsoft.com/blog/how-to-activate-using-license-key/openU
unknown
http://crl.certum.pl/ctsca2021.crl0o
unknown
http://repository.certum.pl/cscasha2.cer0
unknown
https://authorisev.site/2U
unknown
http://ocsp.sectigo.com0
unknown
http://ocsp.entrust.net03
unknown
http://ocsp.entrust.net02
unknown
https://authorisev.site:443/api
unknown
http://cscasha2.ocsp-ce
unknown
http://ccsca2021.crl.certum.pl/ccsca2021.crl0s
unknown
http://www.indyproject.org/
unknown
https://www.autoitscript.com/autoit3/
unknown
http://repository.certum.pl/ccsca2021.cer0
unknown
http://vovsoft.com/
unknown
http://subca.ocsp-certum.com05
unknown
https://www.remobjects.com/ps
unknown
http://subca.ocsp-certum.com02
unknown
http://subca.ocsp-certum.com01
unknown
https://www.innosetup.com/
unknown
https://sectigo.com/CPS0D
unknown
http://crl.certum.pl/ctnca2.crl0l
unknown
http://repository.certum.pl/ctnca2.cer09
unknown
https://jrsoftware.org0
unknown
https://jrsoftware.org/
unknown
http://ccsca2021.ocsp-certum.com05
unknown
http://crl.entrust.net/ts1ca.crl0
unknown
http://www.certum.pl/CPS0
unknown
http://repository.certum.pl/ctnca.cer09
unknown
http://vovsoft.com
unknown
http://crl.certum.pl/ctnca.crl0k
unknown
http://www.entrust.net/rpa03
unknown
https://vovsoft.com/translation/
unknown
http://aia.entrust.net/ts1-chain256.cer01
unknown
http://www.autoitscript.com/autoit3/X
unknown
http://vovsoft.com/help/
unknown
http://vovsoft.comopenU
unknown
https://www.certum.pl/CPS0
unknown
http://vovsoft.comopenS
unknown
http://crl.certum.pl/cscasha2.crl0q
unknown
http://cscasha2.ocsp-certum.com04
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
https://vovsoft.com/blog/credits-and-acknowledgements/open
unknown
https://authorisev.site//
unknown
https://authorisev.site/0
unknown
https://authorisev.site/mOW
unknown
http://vovsoft.com/blog/how-to-uninstall-vovsoft-software/openU
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
https://authorisev.site/
unknown
https://vovsoft.com/translation/openU
unknown
http://repository.certum
unknown
http://ocsp.us
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://authorisev.site/pi
unknown
https://www.entrust.net/rpa0
unknown
http://vovsoft.com/openU
unknown
There are 56 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
authorisev.site
104.21.85.194
malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
127.0.0.1
unknown
unknown
malicious
104.21.85.194
authorisev.site
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
3D3C000
direct allocation
page read and write
malicious
BBD000
unkown
page readonly
7CC000
stack
page read and write
2C3DB7F000
stack
page read and write
1410000
heap
page read and write
140D000
heap
page read and write
C1F000
stack
page read and write
F8B31CF000
stack
page read and write
1410000
heap
page read and write
3504000
heap
page read and write
345D000
heap
page read and write
BD4D47E000
stack
page read and write
7FB6A000
direct allocation
page read and write
25AC000
direct allocation
page read and write
1410000
heap
page read and write
25C1000
direct allocation
page read and write
113E000
unkown
page read and write
3657000
heap
page read and write
BE1000
unkown
page readonly
FCF000
heap
page read and write
2BE3000
direct allocation
page read and write
BF1000
unkown
page write copy
BED000
unkown
page write copy
2C09000
direct allocation
page read and write
36ED000
direct allocation
page read and write
13EC000
heap
page read and write
29D000
unkown
page execute read
A40000
heap
page read and write
3481000
heap
page read and write
2C86000
direct allocation
page read and write
2BCEA7E000
stack
page read and write
25C8000
direct allocation
page read and write
347E000
heap
page read and write
E60B7EC000
stack
page read and write
2BCD000
direct allocation
page read and write
345D000
heap
page read and write
2DCA000
direct allocation
page read and write
33E1000
heap
page read and write
13EC000
heap
page read and write
D97000
heap
page read and write
347E000
heap
page read and write
2C5B000
direct allocation
page read and write
345D000
heap
page read and write
2D5E000
direct allocation
page read and write
FAE000
heap
page read and write
11D0000
heap
page read and write
3B5E000
direct allocation
page read and write
408C000
direct allocation
page read and write
37E1000
heap
page read and write
A30000
heap
page read and write
146B000
heap
page read and write
24D57260000
heap
page read and write
355C000
heap
page read and write
961000
heap
page read and write
104C000
heap
page read and write
4045CFF000
stack
page read and write
345D000
heap
page read and write
13EC000
heap
page read and write
B21000
unkown
page execute read
13EC000
heap
page read and write
13EC000
heap
page read and write
36E1000
heap
page read and write
140D000
heap
page read and write
25A4000
direct allocation
page read and write
3581000
heap
page read and write
1465000
heap
page read and write
1410000
heap
page read and write
932A7E000
stack
page read and write
179C6320000
heap
page read and write
104C000
heap
page read and write
34E1000
heap
page read and write
37A1000
heap
page read and write
259D000
direct allocation
page read and write
33E1000
heap
page read and write
34E1000
heap
page read and write
140D000
heap
page read and write
93297E000
stack
page read and write
3CA627E000
stack
page read and write
13EC000
heap
page read and write
1410000
heap
page read and write
345D000
heap
page read and write
1478000
heap
page read and write
1410000
heap
page read and write
FCF000
heap
page read and write
1410000
heap
page read and write
1410000
heap
page read and write
140D000
heap
page read and write
D40000
heap
page read and write
2544000
direct allocation
page read and write
13EC000
heap
page read and write
2BF29F9B000
heap
page read and write
1410000
heap
page read and write
FAE000
heap
page read and write
357E000
heap
page read and write
11EA276A000
heap
page read and write
9FA000
heap
page read and write
FD2000
heap
page read and write
173DB185000
heap
page read and write
419E000
stack
page read and write
20737015000
heap
page read and write
355C000
heap
page read and write
3581000
heap
page read and write
C20000
heap
page read and write
33E1000
heap
page read and write
33E1000
heap
page read and write
140D000
heap
page read and write
D43000
heap
page read and write
3AC8000
direct allocation
page read and write
358E000
stack
page read and write
1049000
unkown
page read and write
33E1000
heap
page read and write
13EC000
heap
page read and write
285E2D08000
heap
page read and write
33E1000
heap
page read and write
104F000
heap
page read and write
104C000
heap
page read and write
20737190000
heap
page read and write
1410000
heap
page read and write
FD2000
heap
page read and write
1410000
heap
page read and write
140D000
heap
page read and write
1410000
heap
page read and write
355C000
heap
page read and write
1410000
heap
page read and write
33E1000
heap
page read and write
13EC000
heap
page read and write
3430000
heap
page read and write
34E1000
heap
page read and write
38E6000
trusted library allocation
page read and write
36E1000
heap
page read and write
2CA3000
direct allocation
page read and write
173DAEFB000
heap
page read and write
34E1000
heap
page read and write
3504000
heap
page read and write
2C62000
direct allocation
page read and write
1FF1E9BB000
heap
page read and write
1049000
unkown
page read and write
2D14000
direct allocation
page read and write
140D000
heap
page read and write
13EC000
heap
page read and write
2BCEB7E000
stack
page read and write
37EA000
heap
page read and write
13EC000
heap
page read and write
2519000
direct allocation
page read and write
1410000
heap
page read and write
2D23000
direct allocation
page read and write
21154447000
heap
page read and write
34E1000
heap
page read and write
33E1000
heap
page read and write
2D82000
direct allocation
page read and write
3DC4000
direct allocation
page read and write
1410000
heap
page read and write
299F000
direct allocation
page read and write
355C000
heap
page read and write
2BEA000
direct allocation
page read and write
1410000
heap
page read and write
357E000
heap
page read and write
2D2A000
direct allocation
page read and write
2BD4000
direct allocation
page read and write
24B2000
direct allocation
page read and write
3481000
heap
page read and write
140D000
heap
page read and write
355C000
heap
page read and write
140D000
heap
page read and write
140D000
heap
page read and write
3706000
direct allocation
page read and write
1410000
heap
page read and write
3481000
heap
page read and write
2EFD000
stack
page read and write
355D000
heap
page read and write
BC5000
heap
page read and write
2F90000
heap
page read and write
104C000
heap
page read and write
B975FE000
stack
page read and write
2596000
direct allocation
page read and write
34E1000
heap
page read and write
3581000
heap
page read and write
285E2D18000
heap
page read and write
2CFF000
direct allocation
page read and write
357E000
heap
page read and write
345D000
heap
page read and write
34E1000
heap
page read and write
140D000
heap
page read and write
28E2000
direct allocation
page read and write
1410000
heap
page read and write
9328FE000
stack
page read and write
E164F7E000
stack
page read and write
3581000
heap
page read and write
13EC000
heap
page read and write
347E000
heap
page read and write
3481000
heap
page read and write
4008000
direct allocation
page read and write
1DA085AD000
heap
page read and write
140D000
heap
page read and write
13EC000
heap
page read and write
367A000
heap
page read and write
2588000
direct allocation
page read and write
1410000
heap
page read and write
364E000
stack
page read and write
1FF1E9CD000
heap
page read and write
E60BA7F000
stack
page read and write
3504000
heap
page read and write
3657000
heap
page read and write
11EA2769000
heap
page read and write
2B9D000
direct allocation
page read and write
2DBC000
direct allocation
page read and write
3504000
heap
page read and write
345D000
heap
page read and write
1080000
heap
page read and write
3481000
heap
page read and write
1410000
heap
page read and write
13ED000
heap
page read and write
140D000
heap
page read and write
2972000
direct allocation
page read and write
1DA085AD000
heap
page read and write
932AFE000
stack
page read and write
1DA0858B000
heap
page read and write
13EC000
heap
page read and write
2D0000
unkown
page read and write
285E2C80000
heap
page read and write
24A5000
direct allocation
page read and write
35FB000
heap
page read and write
140D000
heap
page read and write
C50000
heap
page read and write
3657000
heap
page read and write
750000
heap
page read and write
3404000
heap
page read and write
20737195000
heap
page read and write
34E1000
heap
page read and write
114D000
unkown
page read and write
13EC000
heap
page read and write
2EBD000
stack
page read and write
FD2000
heap
page read and write
347E000
heap
page read and write
297B000
direct allocation
page read and write
20964EF0000
heap
page read and write
2C1B000
direct allocation
page read and write
355D000
heap
page read and write
1145000
unkown
page read and write
1410000
heap
page read and write
357E000
heap
page read and write
24D56FA0000
heap
page read and write
28CA000
direct allocation
page read and write
3581000
heap
page read and write
36E1000
heap
page read and write
34E1000
heap
page read and write
355D000
heap
page read and write
293F000
direct allocation
page read and write
347E000
heap
page read and write
1410000
heap
page read and write
13EC000
heap
page read and write
357E000
heap
page read and write
345D000
heap
page read and write
2520000
direct allocation
page read and write
13EC000
heap
page read and write
3B40000
direct allocation
page read and write
252B000
direct allocation
page read and write
1410000
heap
page read and write
B9767E000
stack
page read and write
2DD000
unkown
page read and write
1410000
heap
page read and write
285E2D2D000
heap
page read and write
20964E50000
heap
page read and write
140D000
heap
page read and write
2BCEAFE000
stack
page read and write
3920000
heap
page read and write
1E710D00000
heap
page read and write
2BCE79E000
stack
page read and write
36E1000
heap
page read and write
3504000
heap
page read and write
295E000
direct allocation
page read and write
11EA2755000
heap
page read and write
B20000
unkown
page readonly
1410000
heap
page read and write
140D000
heap
page read and write
347E000
heap
page read and write
140D000
heap
page read and write
13EC000
heap
page read and write
2860000
heap
page read and write
1130000
unkown
page read and write
1410000
heap
page read and write
2E4000
unkown
page write copy
1410000
heap
page read and write
3581000
heap
page read and write
140D000
heap
page read and write
B974FF000
stack
page read and write
8DE000
stack
page read and write
93A000
heap
page read and write
37E1000
heap
page read and write
104C000
heap
page read and write
345D000
heap
page read and write
964000
heap
page read and write
3B70000
direct allocation
page read and write
347E000
heap
page read and write
1410000
heap
page read and write
1238000
heap
page read and write
337E000
direct allocation
page read and write
34E1000
heap
page read and write
173DAEFB000
heap
page read and write
13EC000
heap
page read and write
B90000
heap
page read and write
2989000
direct allocation
page read and write
347E000
heap
page read and write
355C000
heap
page read and write
367A000
heap
page read and write
11EA2560000
heap
page read and write
24C0000
direct allocation
page read and write
33E1000
heap
page read and write
3404000
heap
page read and write
355C000
heap
page read and write
960000
heap
page read and write
104C000
heap
page read and write
21154440000
heap
page read and write
3481000
heap
page read and write
38E8000
trusted library allocation
page read and write
1DA085AB000
heap
page read and write
355D000
heap
page read and write
33E1000
heap
page read and write
28F7000
direct allocation
page read and write
3933000
trusted library allocation
page read and write
2890000
heap
page read and write
357E000
heap
page read and write
1E710B30000
heap
page read and write
3581000
heap
page read and write
920000
heap
page read and write
3656000
heap
page read and write
2BF29F97000
heap
page read and write
355C000
heap
page read and write
345D000
heap
page read and write
BD4D27B000
stack
page read and write
1F4E000
stack
page read and write
13EC000
heap
page read and write
3D44000
direct allocation
page read and write
294F000
direct allocation
page read and write
1389000
heap
page read and write
37E3000
heap
page read and write
137A000
heap
page read and write
35D9000
heap
page read and write
34E1000
heap
page read and write
275F000
stack
page read and write
2C9C000
direct allocation
page read and write
1410000
heap
page read and write
3404000
heap
page read and write
1438000
heap
page read and write
34E1000
heap
page read and write
2982000
direct allocation
page read and write
3404000
heap
page read and write
95A000
heap
page read and write
FD2000
heap
page read and write
2DC3000
direct allocation
page read and write
34E1000
heap
page read and write
11EA2761000
heap
page read and write
2BF4000
direct allocation
page read and write
21000
unkown
page execute read
972000
heap
page read and write
345D000
heap
page read and write
3504000
heap
page read and write
1410000
heap
page read and write
14C6000
heap
page read and write
13EC000
heap
page read and write
2BCE71E000
stack
page read and write
345D000
heap
page read and write
345D000
heap
page read and write
357E000
heap
page read and write
1410000
heap
page read and write
21154540000
heap
page read and write
345D000
heap
page read and write
13EC000
heap
page read and write
13EC000
heap
page read and write
34E1000
heap
page read and write
35FE000
heap
page read and write
345D000
heap
page read and write
CC0000
heap
page read and write
B20000
unkown
page readonly
21154610000
heap
page read and write
28FF000
direct allocation
page read and write
285E2D2D000
heap
page read and write
357E000
heap
page read and write
140D000
heap
page read and write
39E0000
heap
page read and write
1410000
heap
page read and write
104C000
heap
page read and write
140D000
heap
page read and write
13EC000
heap
page read and write
24F3000
direct allocation
page read and write
34E1000
heap
page read and write
345D000
heap
page read and write
24FA000
direct allocation
page read and write
28F0000
direct allocation
page read and write
1410000
heap
page read and write
3481000
heap
page read and write
3657000
heap
page read and write
3704000
heap
page read and write
4120000
direct allocation
page read and write
2D56000
direct allocation
page read and write
104F000
heap
page read and write
1B4E000
stack
page read and write
3404000
heap
page read and write
11EA2640000
heap
page read and write
1410000
heap
page read and write
179C6470000
heap
page read and write
40E0000
direct allocation
page read and write
357E000
heap
page read and write
173DAEE5000
heap
page read and write
13EC000
heap
page read and write
3481000
heap
page read and write
124D000
heap
page read and write
285E2D31000
heap
page read and write
140D000
heap
page read and write
BE1000
unkown
page readonly
345D000
heap
page read and write
140D000
heap
page read and write
378E000
stack
page read and write
3704000
heap
page read and write
BF5000
unkown
page readonly
104C000
heap
page read and write
140D000
heap
page read and write
1FF1E9DE000
heap
page read and write
F4E000
stack
page read and write
13EC000
heap
page read and write
2B80000
direct allocation
page read and write
2073703C000
heap
page read and write
29BC000
direct allocation
page read and write
1410000
heap
page read and write
1410000
heap
page read and write
20965245000
heap
page read and write
37E6000
heap
page read and write
1410000
heap
page read and write
12CF000
heap
page read and write
347E000
heap
page read and write
13EC000
heap
page read and write
1410000
heap
page read and write
2D7B000
direct allocation
page read and write
BD4D3FF000
stack
page read and write
13EC000
heap
page read and write
104C000
heap
page read and write
367A000
heap
page read and write
357E000
heap
page read and write
347E000
heap
page read and write
258F000
direct allocation
page read and write
2CAA000
direct allocation
page read and write
1410000
heap
page read and write
1410000
heap
page read and write
963000
heap
page read and write
13EC000
heap
page read and write
FAE000
heap
page read and write
BC0000
heap
page read and write
35CE000
stack
page read and write
13EC000
heap
page read and write
3581000
heap
page read and write
54FF000
stack
page read and write
FAE000
heap
page read and write
37E0000
heap
page read and write
2073703C000
heap
page read and write
357E000
heap
page read and write
FD2000
heap
page read and write
36E1000
heap
page read and write
12DE000
heap
page read and write
FD2000
heap
page read and write
33E1000
heap
page read and write
296B000
direct allocation
page read and write
34E1000
heap
page read and write
1410000
heap
page read and write
3CA5FFE000
stack
page read and write
FA0000
unkown
page readonly
1DA0858B000
heap
page read and write
1DA08595000
heap
page read and write
BB5000
heap
page read and write
1410000
heap
page read and write
347E000
heap
page read and write
345D000
heap
page read and write
18DF000
stack
page read and write
B976FF000
stack
page read and write
2998000
direct allocation
page read and write
4020000
direct allocation
page read and write
345D000
heap
page read and write
1271000
heap
page read and write
1FF1E9DF000
heap
page read and write
1410000
heap
page read and write
285E2D2D000
heap
page read and write
345D000
heap
page read and write
14B6000
heap
page read and write
34E1000
heap
page read and write
29A6000
direct allocation
page read and write
13EC000
heap
page read and write
104F000
heap
page read and write
36E1000
heap
page read and write
3B20000
direct allocation
page read and write
FA1000
unkown
page execute read
BED000
unkown
page read and write
13EC000
heap
page read and write
374F000
stack
page read and write
95A000
heap
page read and write
13EC000
heap
page read and write
3404000
heap
page read and write
D54000
heap
page read and write
29D1000
direct allocation
page read and write
140D000
heap
page read and write
3504000
heap
page read and write
11EA2660000
heap
page read and write
1088000
heap
page read and write
790000
heap
page read and write
2C1E000
direct allocation
page read and write
13ED000
heap
page read and write
179C622B000
heap
page read and write
345D000
heap
page read and write
33E1000
heap
page read and write
2507000
direct allocation
page read and write
140D000
heap
page read and write
355D000
heap
page read and write
173DAEEA000
heap
page read and write
F8E192C000
stack
page read and write
3481000
heap
page read and write
3CA62FF000
stack
page read and write
96A000
heap
page read and write
34E1000
heap
page read and write
345D000
heap
page read and write
F00000
heap
page read and write
1410000
heap
page read and write
140D000
heap
page read and write
34E1000
heap
page read and write
20737029000
heap
page read and write
4045D7F000
stack
page read and write
140D000
heap
page read and write
2C94000
direct allocation
page read and write
1FF1E9B6000
heap
page read and write
FAE000
heap
page read and write
CE9000
heap
page read and write
13EC000
heap
page read and write
13EC000
heap
page read and write
3504000
heap
page read and write
1FF1EAA0000
heap
page read and write
3D98000
direct allocation
page read and write
13BF000
heap
page read and write
1049000
unkown
page write copy
355D000
heap
page read and write
1410000
heap
page read and write
345D000
heap
page read and write
3581000
heap
page read and write
345D000
heap
page read and write
E164B2E000
stack
page read and write
3704000
heap
page read and write
34E1000
heap
page read and write
3657000
heap
page read and write
32A0000
heap
page read and write
347E000
heap
page read and write
13B9000
heap
page read and write
D61000
heap
page read and write
355D000
heap
page read and write
357E000
heap
page read and write
1180000
heap
page read and write
3481000
heap
page read and write
1410000
heap
page read and write
FCF000
heap
page read and write
429F000
stack
page read and write
345D000
heap
page read and write
1410000
heap
page read and write
34E1000
heap
page read and write
2C10000
direct allocation
page read and write
B79000
heap
page read and write
367A000
heap
page read and write
6CB000
stack
page read and write
140D000
heap
page read and write
FAE000
heap
page read and write
35DA000
heap
page read and write
11EA2771000
heap
page read and write
1E710DE5000
heap
page read and write
13EC000
heap
page read and write
DBD0E7C000
stack
page read and write
13EC000
heap
page read and write
34E1000
heap
page read and write
3481000
heap
page read and write
B9747B000
stack
page read and write
13EC000
heap
page read and write
13EC000
heap
page read and write
C30000
direct allocation
page execute and read and write
E60000
heap
page read and write
FAE000
heap
page read and write
3657000
heap
page read and write
B10000
heap
page read and write
357E000
heap
page read and write
13EC000
heap
page read and write
179C6220000
heap
page read and write
2BF2A190000
heap
page read and write
B21000
unkown
page execute read
140D000
heap
page read and write
13EC000
heap
page read and write
BF1000
unkown
page write copy
33E1000
heap
page read and write
140D000
heap
page read and write
33E1000
heap
page read and write
E91000
unkown
page execute read
980000
heap
page read and write
104F000
heap
page read and write
13EC000
heap
page read and write
140D000
heap
page read and write
20736EC0000
heap
page read and write
2C2D000
direct allocation
page read and write
2C01000
direct allocation
page read and write
173DADE0000
heap
page read and write
140D000
heap
page read and write
140D000
heap
page read and write
14BC000
heap
page read and write
140D000
heap
page read and write
1E710B10000
heap
page read and write
140D000
heap
page read and write
2536000
direct allocation
page read and write
2DAD000
direct allocation
page read and write
3504000
heap
page read and write
1410000
heap
page read and write
13EC000
heap
page read and write
3581000
heap
page read and write
FCF000
heap
page read and write
1FF1E9C8000
heap
page read and write
3657000
heap
page read and write
36E1000
heap
page read and write
3404000
heap
page read and write
104C000
heap
page read and write
13EC000
heap
page read and write
347E000
heap
page read and write
95E000
heap
page read and write
20964EF7000
heap
page read and write
345D000
heap
page read and write
1580000
heap
page read and write
20964E70000
heap
page read and write
11EA2771000
heap
page read and write
2D4F000
direct allocation
page read and write
20000
unkown
page readonly
11EA2771000
heap
page read and write
34E1000
heap
page read and write
367A000
heap
page read and write
2BF2A170000
heap
page read and write
985000
heap
page read and write
11EA277F000
heap
page read and write
38DE000
stack
page read and write
3481000
heap
page read and write
DAE000
heap
page read and write
2500000
direct allocation
page read and write
2C3DAFF000
stack
page read and write
1FF1E960000
heap
page read and write
3404000
heap
page read and write
140D000
heap
page read and write
140D000
heap
page read and write
1DA08597000
heap
page read and write
B60000
heap
page read and write
2BF29F90000
heap
page read and write
13FE000
stack
page read and write
345D000
heap
page read and write
2DD8000
direct allocation
page read and write
1DA08585000
heap
page read and write
2C3DA7C000
stack
page read and write
33E1000
heap
page read and write
357E000
heap
page read and write
140D000
heap
page read and write
345D000
heap
page read and write
13EC000
heap
page read and write
2C34000
direct allocation
page read and write
2D06000
direct allocation
page read and write
3657000
heap
page read and write
3504000
heap
page read and write
345D000
heap
page read and write
13EC000
heap
page read and write
1410000
heap
page read and write
3404000
heap
page read and write
928000
heap
page read and write
3704000
heap
page read and write
140D000
heap
page read and write
34E1000
heap
page read and write
1DA08595000
heap
page read and write
34E1000
heap
page read and write
33E1000
heap
page read and write
6DA000
stack
page read and write
13EC000
heap
page read and write
14EC000
heap
page read and write
173DAEFB000
heap
page read and write
355D000
heap
page read and write
347E000
heap
page read and write
3404000
heap
page read and write
34E1000
heap
page read and write
3504000
heap
page read and write
3260000
direct allocation
page read and write
1150000
unkown
page write copy
1410000
heap
page read and write
2956000
direct allocation
page read and write
13EC000
heap
page read and write
1410000
heap
page read and write
345D000
heap
page read and write
850000
heap
page read and write
95F000
heap
page read and write
3504000
heap
page read and write
B9B000
stack
page read and write
D48000
heap
page read and write
2F8E000
stack
page read and write
37EC000
heap
page read and write
855000
heap
page read and write
FCF000
heap
page read and write
2572000
direct allocation
page read and write
140D000
heap
page read and write
3504000
heap
page read and write
355D000
heap
page read and write
3504000
heap
page read and write
2C69000
direct allocation
page read and write
140D000
heap
page read and write
961000
heap
page read and write
13EC000
heap
page read and write
BD4D4FE000
stack
page read and write
D87000
heap
page read and write
140D000
heap
page read and write
140D000
heap
page read and write
11EA277F000
heap
page read and write
1410000
heap
page read and write
3481000
heap
page read and write
13EC000
heap
page read and write
400C000
direct allocation
page read and write
355D000
heap
page read and write
367A000
heap
page read and write
FCF000
heap
page read and write
38E0000
trusted library allocation
page read and write
173DACE0000
heap
page read and write
285E2CA0000
heap
page read and write
24D56EA0000
heap
page read and write
1410000
heap
page read and write
140D000
heap
page read and write
EEB000
stack
page read and write
89E000
stack
page read and write
34E1000
heap
page read and write
24D56F80000
heap
page read and write
347E000
heap
page read and write
1410000
heap
page read and write
2D3F000
direct allocation
page read and write
29D8000
direct allocation
page read and write
21154560000
heap
page read and write
3481000
heap
page read and write
140D000
heap
page read and write
1410000
heap
page read and write
104F000
heap
page read and write
2C4B000
direct allocation
page read and write
345D000
heap
page read and write
140D000
heap
page read and write
3B30000
direct allocation
page read and write
3481000
heap
page read and write
1120000
unkown
page read and write
11EA277F000
heap
page read and write
3404000
heap
page read and write
3704000
heap
page read and write
1360000
heap
page read and write
36E1000
heap
page read and write
7F850000
direct allocation
page read and write
1FF1E880000
heap
page read and write
36E4000
direct allocation
page read and write
140D000
heap
page read and write
FCF000
stack
page read and write
36E1000
heap
page read and write
964000
heap
page read and write
1DA08599000
heap
page read and write
173DAEEA000
heap
page read and write
12FE000
heap
page read and write
20737028000
heap
page read and write
13EC000
heap
page read and write
1410000
heap
page read and write
1114000
heap
page read and write
34E1000
heap
page read and write
3CA63FE000
stack
page read and write
1DA085AD000
heap
page read and write
265E000
stack
page read and write
285E2D09000
heap
page read and write
13EC000
heap
page read and write
1057000
unkown
page readonly
1410000
heap
page read and write
347E000
heap
page read and write
13ED000
heap
page read and write
3481000
heap
page read and write
3B30000
direct allocation
page read and write
E164BAE000
stack
page read and write
1410000
heap
page execute and read and write
140D000
heap
page read and write
357E000
heap
page read and write
1FF1E990000
heap
page read and write
1220000
heap
page read and write
285E2D34000
heap
page read and write
1FF1E9DE000
heap
page read and write
13E1000
heap
page read and write
F8B314C000
stack
page read and write
140D000
heap
page read and write
285E2D0D000
heap
page read and write
33E1000
heap
page read and write
355D000
heap
page read and write
2D5000
unkown
page read and write
173DAEB0000
heap
page read and write
21154615000
heap
page read and write
345D000
heap
page read and write
415E000
stack
page read and write
1465000
heap
page read and write
24D57010000
heap
page read and write
3DC4000
direct allocation
page read and write
13EC000
heap
page read and write
13EC000
heap
page read and write
1FF1E9DE000
heap
page read and write
1396000
heap
page read and write
1157000
unkown
page readonly
1421000
heap
page read and write
36B2000
direct allocation
page read and write
357E000
heap
page read and write
FCF000
heap
page read and write
43DC000
stack
page read and write
345D000
heap
page read and write
34E1000
heap
page read and write
1DA085AD000
heap
page read and write
36E1000
heap
page read and write
FD2000
heap
page read and write
347E000
heap
page read and write
7F86B000
direct allocation
page read and write
1FF1E9B5000
heap
page read and write
13EC000
heap
page read and write
B20000
unkown
page readonly
1410000
heap
page read and write
36E1000
heap
page read and write
34E1000
heap
page read and write
3330000
trusted library allocation
page read and write
33E1000
heap
page read and write
173DAEE7000
heap
page read and write
FAE000
heap
page read and write
13EC000
heap
page read and write
34E1000
heap
page read and write
3581000
heap
page read and write
FEA000
stack
page read and write
2D47000
direct allocation
page read and write
290D000
direct allocation
page read and write
34E1000
heap
page read and write
36D9000
direct allocation
page read and write
140D000
heap
page read and write
355D000
heap
page read and write
13EC000
heap
page read and write
13EC000
heap
page read and write
140D000
heap
page read and write
E90000
unkown
page readonly
347E000
heap
page read and write
104C000
heap
page read and write
1FF1E9E0000
heap
page read and write
13E1000
heap
page read and write
34E1000
heap
page read and write
345D000
heap
page read and write
347E000
heap
page read and write
140D000
heap
page read and write
140D000
heap
page read and write
285E2D2D000
heap
page read and write
37E1000
heap
page read and write
357E000
heap
page read and write
2115444B000
heap
page read and write
F90000
heap
page read and write
3913000
trusted library allocation
page read and write
33E1000
heap
page read and write
2C7F000
direct allocation
page read and write
347E000
heap
page read and write
104F000
heap
page read and write
978000
heap
page read and write
355C000
heap
page read and write
345D000
heap
page read and write
3581000
heap
page read and write
3504000
heap
page read and write
FAE000
heap
page read and write
3581000
heap
page read and write
140D000
heap
page read and write
11EA2935000
heap
page read and write
104F000
heap
page read and write
B9757F000
stack
page read and write
357E000
heap
page read and write
34E1000
heap
page read and write
3481000
heap
page read and write
37E0000
heap
page read and write
2CF0000
direct allocation
page read and write
140D000
heap
page read and write
355C000
heap
page read and write
405C000
direct allocation
page read and write
28E9000
direct allocation
page read and write
1478000
heap
page read and write
140D000
heap
page read and write
13EC000
heap
page read and write
104C000
heap
page read and write
1410000
heap
page read and write
1427000
heap
page read and write
13EC000
heap
page read and write
1DA084F0000
heap
page read and write
3481000
heap
page read and write
13EC000
heap
page read and write
13EC000
heap
page read and write
140D000
heap
page read and write
1230000
heap
page read and write
33E1000
heap
page read and write
FAE000
heap
page read and write
F8E000
stack
page read and write
2D9F000
direct allocation
page read and write
140D000
heap
page read and write
DBD0EFF000
stack
page read and write
13DE000
stack
page read and write
3657000
heap
page read and write
34E1000
heap
page read and write
37A0000
heap
page read and write
37E1000
heap
page read and write
140D000
heap
page read and write
1410000
heap
page read and write
355D000
heap
page read and write
32F0000
heap
page read and write
157F000
stack
page read and write
B3A000
stack
page read and write
3504000
heap
page read and write
1410000
heap
page read and write
1055000
unkown
page write copy
140D000
heap
page read and write
3581000
heap
page read and write
355D000
heap
page read and write
3CA637E000
stack
page read and write
3404000
heap
page read and write
36E1000
heap
page read and write
29B4000
direct allocation
page read and write
34E1000
heap
page read and write
3DB9000
direct allocation
page read and write
104C000
unkown
page read and write
25B3000
direct allocation
page read and write
3504000
heap
page read and write
34E1000
heap
page read and write
1410000
heap
page read and write
34E1000
heap
page read and write
104F000
heap
page read and write
104F000
heap
page read and write
13EC000
heap
page read and write
EFC000
stack
page read and write
E60BAFF000
stack
page read and write
24EB000
direct allocation
page read and write
13EC000
heap
page read and write
2490000
direct allocation
page read and write
13EC000
heap
page read and write
3657000
heap
page read and write
972000
heap
page read and write
291B000
direct allocation
page read and write
FED000
stack
page read and write
F8E1C7F000
stack
page read and write
2D31000
direct allocation
page read and write
1052000
unkown
page read and write
13EC000
heap
page read and write
1410000
heap
page read and write
113E000
unkown
page write copy
24D5701B000
heap
page read and write
14C2000
heap
page read and write
104F000
heap
page read and write
34E1000
heap
page read and write
3504000
heap
page read and write
6EC000
stack
page read and write
12EA000
heap
page read and write
14B6000
heap
page read and write
226000
unkown
page execute read
104F000
heap
page read and write
140D000
heap
page read and write
3481000
heap
page read and write
13EC000
heap
page read and write
357E000
heap
page read and write
11EA2930000
heap
page read and write
1DA087B5000
heap
page read and write
35DF000
stack
page read and write
1410000
heap
page read and write
140D000
heap
page read and write
1FF1E9CD000
heap
page read and write
979000
heap
page read and write
3481000
heap
page read and write
4201000
direct allocation
page read and write
459000
remote allocation
page execute and read and write
29C3000
direct allocation
page read and write
3A45000
direct allocation
page read and write
2DD1000
direct allocation
page read and write
34E1000
heap
page read and write
37ED000
heap
page read and write
7DE000
stack
page read and write
36BD000
direct allocation
page read and write
1410000
heap
page read and write
24E4000
direct allocation
page read and write
11EA2730000
heap
page read and write
1410000
heap
page read and write
345D000
heap
page read and write
1410000
heap
page read and write
33E1000
heap
page read and write
3A42000
direct allocation
page read and write
2DA6000
direct allocation
page read and write
E164E7F000
stack
page read and write
255B000
direct allocation
page read and write
2990000
direct allocation
page read and write
1472000
heap
page read and write
13EC000
heap
page read and write
33E1000
heap
page read and write
13EC000
heap
page read and write
1410000
heap
page read and write
37E6000
heap
page read and write
3657000
heap
page read and write
3B40000
direct allocation
page read and write
3404000
heap
page read and write
345D000
heap
page read and write
1140000
unkown
page read and write
33E1000
heap
page read and write
2CB000
unkown
page execute read
1410000
heap
page read and write
173DADC0000
heap
page read and write
3504000
heap
page read and write
1DA085AE000
heap
page read and write
3581000
heap
page read and write
140D000
heap
page read and write
3481000
heap
page read and write
125E000
heap
page read and write
20736FA0000
heap
page read and write
1410000
heap
page read and write
2906000
direct allocation
page read and write
37D0000
heap
page read and write
24A1000
direct allocation
page read and write
13EC000
heap
page read and write
3504000
heap
page read and write
971000
heap
page read and write
BB9000
heap
page read and write
E70000
direct allocation
page execute and read and write
1410000
heap
page read and write
3B4B000
direct allocation
page read and write
11EA275B000
heap
page read and write
2073703C000
heap
page read and write
345D000
heap
page read and write
140D000
heap
page read and write
13ED000
heap
page read and write
3657000
heap
page read and write
12F2000
heap
page read and write
3404000
heap
page read and write
1410000
heap
page read and write
345D000
heap
page read and write
2CB8000
direct allocation
page read and write
BE1000
unkown
page readonly
3260000
direct allocation
page read and write
1FF1E9B5000
heap
page read and write
FCF000
heap
page read and write
13EC000
heap
page read and write
21154350000
heap
page read and write
100F000
stack
page read and write
24A3000
direct allocation
page read and write
3581000
heap
page read and write
F8E19AF000
stack
page read and write
12F7000
heap
page read and write
179C6110000
heap
page read and write
FD2000
heap
page read and write
13EC000
heap
page read and write
285E2D08000
heap
page read and write
FAE000
heap
page read and write
104F000
heap
page read and write
11EA2761000
heap
page read and write
43A6000
direct allocation
page read and write
1410000
heap
page read and write
FAE000
heap
page read and write
3050000
heap
page read and write
956000
heap
page read and write
143B000
heap
page read and write
345D000
heap
page read and write
BED000
unkown
page write copy
12DA000
heap
page read and write
1410000
heap
page read and write
355D000
heap
page read and write
F8B347F000
stack
page read and write
140D000
heap
page read and write
253D000
direct allocation
page read and write
2CE9000
direct allocation
page read and write
104F000
heap
page read and write
3581000
heap
page read and write
4045C7C000
stack
page read and write
357E000
heap
page read and write
140D000
heap
page read and write
367A000
heap
page read and write
1410000
heap
page read and write
DAC000
heap
page read and write
24D57265000
heap
page read and write
14BC000
heap
page read and write
BD4D2FE000
stack
page read and write
3400000
heap
page read and write
347E000
heap
page read and write
13EC000
heap
page read and write
1410000
heap
page read and write
3D18000
direct allocation
page read and write
13EB000
heap
page execute and read and write
1DA08585000
heap
page read and write
1E710DE0000
heap
page read and write
FAE000
heap
page read and write
1410000
heap
page read and write
2511000
direct allocation
page read and write
1410000
heap
page read and write
3657000
heap
page read and write
2BF2A090000
heap
page read and write
9FA000
heap
page read and write
3581000
heap
page read and write
1FF1EAB0000
heap
page read and write
2BC6000
direct allocation
page read and write
1410000
heap
page read and write
1410000
heap
page read and write
B80000
heap
page read and write
140D000
heap
page read and write
20736FF8000
heap
page read and write
4137000
direct allocation
page read and write
355C000
heap
page read and write
13EC000
heap
page read and write
13EC000
heap
page read and write
33E1000
heap
page read and write
1350000
heap
page read and write
173DAEDB000
heap
page read and write
104C000
heap
page read and write
179C6227000
heap
page read and write
3481000
heap
page read and write
104F000
heap
page read and write
345D000
heap
page read and write
3B50000
heap
page read and write
3504000
heap
page read and write
E164EFE000
stack
page read and write
1410000
heap
page read and write
33E1000
heap
page read and write
3404000
heap
page read and write
3C6F000
stack
page read and write
400C000
direct allocation
page read and write
14C2000
heap
page read and write
345D000
heap
page read and write
1FF1E9A7000
heap
page read and write
2CE000
unkown
page read and write
963000
heap
page read and write
1E710B37000
heap
page read and write
2947000
direct allocation
page read and write
740000
heap
page read and write
BD4D37E000
stack
page read and write
355C000
heap
page read and write
345D000
heap
page read and write
952000
heap
page read and write
42DC000
stack
page read and write
104C000
heap
page read and write
3581000
heap
page read and write
1410000
heap
page read and write
28DA000
direct allocation
page read and write
1410000
heap
page read and write
345D000
heap
page read and write
1DA08568000
heap
page read and write
9FA000
heap
page read and write
140D000
heap
page read and write
2BBF000
direct allocation
page read and write
345D000
heap
page read and write
147E000
stack
page read and write
1410000
heap
page read and write
2D65000
direct allocation
page read and write
355C000
heap
page read and write
140D000
heap
page read and write
3E6000
stack
page read and write
1100000
unkown
page read and write
37E1000
heap
page read and write
A38000
stack
page read and write
3B54000
direct allocation
page read and write
3504000
heap
page read and write
CE5000
heap
page read and write
140D000
heap
page read and write
2923000
direct allocation
page read and write
1410000
heap
page read and write
33E1000
heap
page read and write
D7E000
heap
page read and write
20736FF0000
heap
page read and write
34E1000
heap
page read and write
355C000
heap
page read and write
357E000
heap
page read and write
1410000
heap
page read and write
B21000
unkown
page execute read
347E000
heap
page read and write
140D000
heap
page read and write
140D000
heap
page read and write
FAE000
heap
page read and write
347E000
heap
page read and write
140D000
heap
page read and write
345D000
heap
page read and write
36E1000
heap
page read and write
13EC000
heap
page read and write
405E000
stack
page read and write
B1E000
stack
page read and write
2D89000
direct allocation
page read and write
2931000
direct allocation
page read and write
1330000
heap
page read and write
1DA085B0000
heap
page read and write
2C26000
direct allocation
page read and write
2DB4000
direct allocation
page read and write
2CE2000
direct allocation
page read and write
1FF1E997000
heap
page read and write
427C000
direct allocation
page read and write
DAE000
heap
page read and write
13EC000
heap
page read and write
2BF2A2C0000
heap
page read and write
12DF000
stack
page read and write
42C0000
direct allocation
page read and write
25BA000
direct allocation
page read and write
11EA2738000
heap
page read and write
11B7000
unkown
page readonly
1410000
heap
page read and write
2D38000
direct allocation
page read and write
2BC0000
trusted library allocation
page read and write
2073701B000
heap
page read and write
2938000
direct allocation
page read and write
94D000
heap
page read and write
29CA000
direct allocation
page read and write
1E710B3B000
heap
page read and write
13EC000
heap
page read and write
34E1000
heap
page read and write
355D000
heap
page read and write
3481000
heap
page read and write
345D000
heap
page read and write
1410000
heap
page read and write
1FF1E9C7000
heap
page read and write
347E000
heap
page read and write
33E1000
heap
page read and write
1410000
heap
page read and write
355C000
heap
page read and write
1410000
heap
page read and write
3657000
heap
page read and write
13EC000
heap
page read and write
173DB180000
heap
page read and write
BBD000
unkown
page readonly
3053000
heap
page read and write
C53000
heap
page read and write
1410000
heap
page read and write
13EC000
heap
page read and write
DBD0F7F000
stack
page read and write
93287B000
stack
page read and write
2C44000
direct allocation
page read and write
1FF1EAA5000
heap
page read and write
140D000
heap
page read and write
3AA4000
direct allocation
page read and write
43AA000
direct allocation
page read and write
2914000
direct allocation
page read and write
140D000
heap
page read and write
3581000
heap
page read and write
140D000
heap
page read and write
3404000
heap
page read and write
140D000
heap
page read and write
1410000
heap
page read and write
40E0000
direct allocation
page read and write
1DA08410000
heap
page read and write
285E2CE0000
heap
page read and write
3CA5F7B000
stack
page read and write
1052000
unkown
page read and write
1110000
heap
page read and write
24AD000
direct allocation
page read and write
D5F000
stack
page read and write
173DAED5000
heap
page read and write
3704000
heap
page read and write
173DAEB8000
heap
page read and write
13E9000
heap
page read and write
3A20000
direct allocation
page read and write
33E1000
heap
page read and write
140D000
heap
page read and write
34E1000
heap
page read and write
FAE000
heap
page read and write
319D000
stack
page read and write
1381000
heap
page read and write
1350000
heap
page read and write
B5E000
stack
page read and write
38ED000
trusted library allocation
page read and write
13EC000
heap
page read and write
367A000
heap
page read and write
3504000
heap
page read and write
D70000
heap
page read and write
13E4000
heap
page read and write
3481000
heap
page read and write
20965240000
heap
page read and write
347E000
heap
page read and write
345D000
heap
page read and write
345D000
heap
page read and write
347E000
heap
page read and write
3D2D000
stack
page read and write
2BA2000
direct allocation
page read and write
963000
heap
page read and write
140D000
heap
page read and write
BB0000
heap
page read and write
2BB8000
direct allocation
page read and write
3481000
heap
page read and write
297D000
direct allocation
page read and write
347E000
heap
page read and write
972000
heap
page read and write
179C61F0000
heap
page read and write
1170000
heap
page read and write
17DE000
stack
page read and write
2D1B000
direct allocation
page read and write
D60000
heap
page read and write
24DD000
direct allocation
page read and write
2D98000
direct allocation
page read and write
252E000
direct allocation
page read and write
FAE000
heap
page read and write
BF5000
unkown
page readonly
D1E000
stack
page read and write
830000
heap
page read and write
3504000
heap
page read and write
1FF1E9DE000
heap
page read and write
13EC000
heap
page read and write
34E1000
heap
page read and write
3657000
heap
page read and write
2B90000
direct allocation
page read and write
1DA08510000
heap
page read and write
2564000
direct allocation
page read and write
2BB0000
direct allocation
page read and write
13EC000
heap
page read and write
CE0000
heap
page read and write
D9F000
heap
page read and write
140D000
heap
page read and write
13EC000
heap
page read and write
2CF7000
direct allocation
page read and write
36FD000
direct allocation
page read and write
2C8D000
direct allocation
page read and write
2D0000
unkown
page write copy
36E1000
heap
page read and write
140D000
heap
page read and write
24CF000
direct allocation
page read and write
2554000
direct allocation
page read and write
20964EFB000
heap
page read and write
44D0000
heap
page read and write
345D000
heap
page read and write
1E710B00000
heap
page read and write
FCF000
heap
page read and write
401E000
stack
page read and write
13EC000
heap
page read and write
1DA08595000
heap
page read and write
FFF000
stack
page read and write
3704000
heap
page read and write
130B000
heap
page read and write
34E1000
heap
page read and write
2C3D000
direct allocation
page read and write
355C000
heap
page read and write
2E7000
unkown
page readonly
13EC000
heap
page read and write
2CCA000
direct allocation
page read and write
140D000
heap
page read and write
104C000
heap
page read and write
33E1000
heap
page read and write
173DAEEA000
heap
page read and write
1410000
heap
page read and write
13EC000
heap
page read and write
2BCE69B000
stack
page read and write
1FF1E9CD000
heap
page read and write
34E1000
heap
page read and write
357E000
heap
page read and write
9FA000
heap
page read and write
285E2CE9000
heap
page read and write
140D000
heap
page read and write
24D6000
direct allocation
page read and write
BBD000
unkown
page readonly
140D000
heap
page read and write
1410000
heap
page read and write
DCE000
heap
page read and write
285E2CA5000
heap
page read and write
13EC000
heap
page read and write
140D000
heap
page read and write
2D90000
direct allocation
page read and write
35FB000
heap
page read and write
345D000
heap
page read and write
1FF1E9BB000
heap
page read and write
4020000
direct allocation
page read and write
2C70000
direct allocation
page read and write
285E2D19000
heap
page read and write
1DA08586000
heap
page read and write
13EC000
heap
page read and write
140D000
heap
page read and write
3481000
heap
page read and write
1410000
heap
page read and write
1059000
unkown
page readonly
2D5000
unkown
page write copy
104F000
unkown
page read and write
104F000
heap
page read and write
36E1000
heap
page read and write
B68000
heap
page read and write
BF5000
unkown
page readonly
345D000
heap
page read and write
1410000
heap
page read and write
946000
heap
page read and write
2CE000
unkown
page write copy
33E1000
heap
page read and write
14FE000
stack
page read and write
13E4000
heap
page read and write
292A000
direct allocation
page read and write
3481000
heap
page read and write
33E1000
heap
page read and write
FAE000
heap
page read and write
140D000
heap
page read and write
2D0D000
direct allocation
page read and write
347E000
heap
page read and write
400000
remote allocation
page execute and read and write
96B000
heap
page read and write
13BC000
heap
page read and write
3E6D000
direct allocation
page read and write
FDF000
stack
page read and write
2C78000
direct allocation
page read and write
CDE000
stack
page read and write
2BDB000
direct allocation
page read and write
13EC000
heap
page read and write
2504000
direct allocation
page read and write
3704000
heap
page read and write
1155000
unkown
page readonly
256B000
direct allocation
page read and write
20964E40000
heap
page read and write
3C000
unkown
page execute read
13EC000
heap
page read and write
1410000
heap
page read and write
3581000
heap
page read and write
2BF2A2C5000
heap
page read and write
13EC000
heap
page read and write
9329FF000
stack
page read and write
29AD000
direct allocation
page read and write
3E77000
direct allocation
page read and write
104F000
heap
page read and write
1410000
heap
page read and write
1410000
heap
page read and write
179C6475000
heap
page read and write
78E000
stack
page read and write
3481000
heap
page read and write
3581000
heap
page read and write
347E000
heap
page read and write
309D000
stack
page read and write
345D000
heap
page read and write
1DA08560000
heap
page read and write
13EC000
heap
page read and write
1357000
heap
page read and write
DAE000
heap
page read and write
4120000
direct allocation
page read and write
1410000
heap
page read and write
345D000
heap
page read and write
140D000
heap
page read and write
3481000
heap
page read and write
33E1000
heap
page read and write
104F000
heap
page read and write
104C000
heap
page read and write
34E1000
heap
page read and write
DAE000
heap
page read and write
35FE000
heap
page read and write
93D000
heap
page read and write
20736FC0000
heap
page read and write
13EC000
heap
page read and write
1DA087B0000
heap
page read and write
DAF000
heap
page read and write
13EC000
heap
page read and write
1410000
heap
page read and write
140D000
heap
page read and write
357E000
heap
page read and write
3581000
heap
page read and write
9FA000
heap
page read and write
285E2B80000
heap
page read and write
3657000
heap
page read and write
140D000
heap
page read and write
345D000
heap
page read and write
13EC000
heap
page read and write
2C54000
direct allocation
page read and write
1417000
heap
page read and write
1471000
heap
page read and write
140D000
heap
page read and write
140D000
heap
page read and write
1410000
heap
page read and write
345D000
heap
page read and write
13EC000
heap
page read and write
140D000
heap
page read and write
24D57018000
heap
page read and write
104B000
unkown
page read and write
2CB1000
direct allocation
page read and write
345D000
heap
page read and write
140D000
heap
page read and write
34E1000
heap
page read and write
3DB6000
direct allocation
page read and write
24C8000
direct allocation
page read and write
34E1000
heap
page read and write
FD2000
heap
page read and write
13EC000
heap
page read and write
E164AAB000
stack
page read and write
140D000
heap
page read and write
140D000
heap
page read and write
104C000
heap
page read and write
140D000
heap
page read and write
140D000
heap
page read and write
285E2C60000
heap
page read and write
There are 1462 hidden memdumps, click here to show them.