IOC Report
J2NWKU2oJi.exe

loading gif

Files

File Path
Type
Category
Malicious
J2NWKU2oJi.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\331463\Pleasure.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Microsoft\Yuem.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ccbfb9d50e\Dctooux.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\331463\Q
ASCII text, with very long lines (941), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Auckland
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Cocks
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Conditions
ASCII text, with very long lines (2572), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Japanese
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Lessons
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Master
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Pitch
ASCII text, with very long lines (941), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Publication
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Pushing
ASCII text, with very long lines (2572), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Remembered
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Scenes
ASCII text, with very long lines (845), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Scenes.bat (copy)
ASCII text, with very long lines (845), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Speak
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Spectrum
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Twelve
ASCII text, with very long lines (2572), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Venture
ASCII text, with very long lines (2572), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\246122658369
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
dropped
C:\Windows\Tasks\Dctooux.job
data
dropped
There are 13 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\J2NWKU2oJi.exe
"C:\Users\user\Desktop\J2NWKU2oJi.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c move Scenes Scenes.bat && Scenes.bat
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa.exe opssvc.exe"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 331463
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "AdditionUnitKoreanLn" Remembered
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b Pitch + Twelve + Conditions + Venture + Pushing 331463\Q
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\331463\Pleasure.pif
331463\Pleasure.pif 331463\Q
malicious
C:\Windows\SysWOW64\PING.EXE
ping -n 5 127.0.0.1
malicious
C:\Windows\System32\OpenWith.exe
"C:\Windows\system32\openwith.exe"
malicious
C:\Users\user\AppData\Local\Microsoft\Yuem.exe
"C:\Users\user\AppData\Local\Microsoft\Yuem.exe"
malicious
C:\Users\user\AppData\Local\Temp\ccbfb9d50e\Dctooux.exe
"C:\Users\user\AppData\Local\Temp\ccbfb9d50e\Dctooux.exe"
malicious
C:\Users\user\AppData\Local\Temp\ccbfb9d50e\Dctooux.exe
C:\Users\user\AppData\Local\Temp\ccbfb9d50e\Dctooux.exe
malicious
C:\Users\user\AppData\Local\Temp\ccbfb9d50e\Dctooux.exe
C:\Users\user\AppData\Local\Temp\ccbfb9d50e\Dctooux.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\dialer.exe
"C:\Windows\system32\dialer.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 984
There are 9 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://91.202.233.180/g88sks2SaM/index.php
91.202.233.180
malicious
http://91.202.233.180/g88sks2SaM/index.php?scr=1
91.202.233.180
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
http://91.202.233.180/g88sks2SaM/index.phpc
unknown
https://discordapp.com
unknown
http://91.202.233.180/g88sks2SaM/index.php?scr=19Gf
unknown
http://91.202.233.180/g88sks2SaM/index.phpodedJdUk
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://91.202.233.180/g88sks2SaM/index.phpT
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.autoitscript.com/autoit3/
unknown
https://support.office
unknown
http://91.202.233.180/g88sks2SaM/index.phpsF
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e171
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17N-SiX4Yyn3iFo5fv-Rsj0cGE-FFrP
unknown
http://91.202.233.180/g88sks2SaM/index.php?scr=19IfYj
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://91.202.233.180/g88sks2SaM/index.phps
unknown
http://91.202.233.180/g88sks2SaM/index.phpOF
unknown
http://91.202.233.180/g88sks2SaM/index.php?scr=19aeqk
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://discord.com
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-21
unknown
https://go.micro
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://support.mic
unknown
https://www.ecosia.org/newtab/
unknown
https://94.156.10.37:2036/efc85e6acdfc3a785/1evgkhav.3ltvh
unknown
http://91.202.233.180/g88sks2SaM/index.php?scr=1on
unknown
http://91.202.233.180/g88sks2SaM/index.php3G
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://91.202.233.180/g88sks2SaM/index.php?scr=19
unknown
http://91.202.233.180/g88sks2SaM/index.php?scr=1=1
unknown
http://91.202.233.180/g88sks2SaM/index.phpded
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016y
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17t.mc_id=EnterPK201694ba2e0b-6
unknown
http://91.202.233.180/g88sks2SaM/index.php?scr=1D
unknown
http://91.202.233.180/g88sks2SaM/index.php?scr=17e
unknown
http://91.202.233.180/g88sks2SaM/index.php/
unknown
http://91.202.233.180/g88sks2SaM/index.phpic
unknown
http://91.202.233.180/g88sks2SaM/index.php?scr=19mfuj
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://91.202.233.180/g88sks2SaM/index.phpoded
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://94.156.10.37:2036/efc85e6acdfc3a785/1evgkhav.3ltvhkernelbasentdllkernel32GetProcessMitigatio
unknown
https://94.156.10.37:2036/efc85e6acdfc3a785/1evgkhav.3ltvhD
unknown
There are 41 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
hnlhrsLvnXQMkLSbq.hnlhrsLvnXQMkLSbq
unknown

IPs

IP
Domain
Country
Malicious
94.156.10.37
unknown
Bulgaria
malicious
91.202.233.180
unknown
Russian Federation
malicious
127.0.0.1
unknown
unknown
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\SibCode
sn

Memdumps

Base Address
Regiontype
Protect
Malicious
A51000
unkown
page execute read
malicious
A51000
unkown
page execute read
malicious
4720000
direct allocation
page execute and read and write
malicious
2E95000
heap
page read and write
malicious
1BD77AF1000
heap
page read and write
malicious
CE1000
unkown
page execute read
malicious
1BD77953000
heap
page read and write
malicious
1BD779C0000
heap
page read and write
malicious
A51000
unkown
page execute read
malicious
CE1000
unkown
page execute read
malicious
A51000
unkown
page execute read
malicious
1BD7793B000
heap
page read and write
malicious
2C50000
direct allocation
page read and write
malicious
A51000
unkown
page execute read
malicious
1BD77953000
heap
page read and write
malicious
1BD778F1000
heap
page read and write
malicious
A51000
unkown
page execute read
malicious
1BD77768000
heap
page read and write
4E61000
heap
page read and write
1BD759CB000
heap
page read and write
5AD6000
trusted library allocation
page read and write
4E61000
heap
page read and write
1BD779DB000
heap
page read and write
334E000
stack
page read and write
1BD776F1000
heap
page read and write
5A2C000
trusted library allocation
page read and write
5AE7000
trusted library allocation
page read and write
40F1000
heap
page read and write
40F0000
heap
page read and write
2BC4000
heap
page read and write
1BD779EB000
heap
page read and write
1BD77795000
heap
page read and write
1BD77781000
heap
page read and write
DBC000
heap
page read and write
51C2000
unkown
page read and write
5ACA000
trusted library allocation
page read and write
1BD776F1000
heap
page read and write
3360000
heap
page read and write
5AC8000
trusted library allocation
page read and write
1BD779BB000
heap
page read and write
33D0000
heap
page read and write
1BD7794A000
heap
page read and write
1BD77797000
heap
page read and write
1BD779F3000
heap
page read and write
4E61000
heap
page read and write
33B7000
heap
page read and write
ABA000
unkown
page readonly
1BD779AB000
heap
page read and write
1BD7796D000
heap
page read and write
2EA7000
heap
page read and write
5DFE000
stack
page read and write
2F80000
heap
page read and write
2BC4000
heap
page read and write
1BD779BB000
heap
page read and write
1BD77A03000
heap
page read and write
FB1000
heap
page read and write
1BD776F5000
heap
page read and write
1BD77795000
heap
page read and write
1BD75860000
unkown
page execute and read and write
4E61000
heap
page read and write
52EF000
heap
page read and write
1BD779C3000
heap
page read and write
1BD776C7000
heap
page read and write
1BD779F3000
heap
page read and write
1BD77A3B000
heap
page read and write
5158000
heap
page read and write
1BD779DB000
heap
page read and write
3FDD000
stack
page read and write
1BD77997000
heap
page read and write
33DA000
heap
page read and write
1BD779D3000
heap
page read and write
FDA000
heap
page read and write
1BD779D3000
heap
page read and write
1BD776E5000
heap
page read and write
5158000
heap
page read and write
1BD776C1000
heap
page read and write
4E61000
heap
page read and write
1BD779C3000
heap
page read and write
1BD779D3000
heap
page read and write
4731000
heap
page read and write
53D3000
heap
page read and write
1BD77A0B000
heap
page read and write
1BD7776A000
heap
page read and write
5A29000
trusted library allocation
page read and write
4E61000
heap
page read and write
1BD77792000
heap
page read and write
3E5E000
stack
page read and write
1BD779F3000
heap
page read and write
1BD779BB000
heap
page read and write
50DD000
heap
page read and write
1BD771A5000
heap
page read and write
4388000
heap
page read and write
1BD779C3000
heap
page read and write
4E61000
heap
page read and write
2A7A000
heap
page read and write
5129000
unkown
page read and write
3EE5000
heap
page read and write
1BD779C3000
heap
page read and write
1BD779D3000
heap
page read and write
1BD779DB000
heap
page read and write
5AC7000
trusted library allocation
page read and write
1BD779DB000
heap
page read and write
5A2A000
trusted library allocation
page read and write
1BD77377000
heap
page read and write
1BD779DB000
heap
page read and write
1BD7796D000
heap
page read and write
1BD779DB000
heap
page read and write
2D7F000
stack
page read and write
5158000
heap
page read and write
1BD778F1000
heap
page read and write
2D0E000
stack
page read and write
1BD7794A000
heap
page read and write
340F000
heap
page read and write
1BD77A0B000
heap
page read and write
5A2A000
trusted library allocation
page read and write
1BD7798A000
heap
page read and write
1BD779D3000
heap
page read and write
1BD779DB000
heap
page read and write
4E61000
heap
page read and write
1BD779F3000
heap
page read and write
5AC2000
trusted library allocation
page read and write
3360000
heap
page read and write
1BD779F3000
heap
page read and write
1BD7776B000
heap
page read and write
4731000
heap
page read and write
47E1000
heap
page read and write
1BD776F9000
heap
page read and write
1BD759B3000
heap
page read and write
5A27000
trusted library allocation
page read and write
1BD779DB000
heap
page read and write
1BD779BB000
heap
page read and write
1754000
heap
page read and write
1BD779BB000
heap
page read and write
5158000
heap
page read and write
DA4000
heap
page read and write
3FF2000
heap
page read and write
1BD776E7000
heap
page read and write
3570000
heap
page read and write
1BD77775000
heap
page read and write
1BD77A1B000
heap
page read and write
1BD776DA000
heap
page read and write
2BC4000
heap
page read and write
ABA000
unkown
page readonly
4731000
heap
page read and write
1BD779C3000
heap
page read and write
AB5000
unkown
page read and write
6FF000
stack
page read and write
1BD7796B000
heap
page read and write
2BC4000
heap
page read and write
4E61000
heap
page read and write
1BD77794000
heap
page read and write
1BD779BB000
heap
page read and write
5ABE000
trusted library allocation
page read and write
1BD7795D000
heap
page read and write
FC0000
heap
page read and write
1E0000
unkown
page readonly
1BD77A1B000
heap
page read and write
2E9C000
heap
page read and write
5F0000
heap
page read and write
1BD779AB000
heap
page read and write
50D5000
heap
page read and write
F82000
heap
page read and write
5B0A000
trusted library allocation
page read and write
1BD776F1000
heap
page read and write
1BD779D3000
heap
page read and write
1BD779BB000
heap
page read and write
1BD779D3000
heap
page read and write
1BD77A17000
heap
page read and write
1BD77A23000
heap
page read and write
1BD77A13000
heap
page read and write
1BD776F3000
heap
page read and write
2B3E000
stack
page read and write
5A2A000
trusted library allocation
page read and write
1BD77A23000
heap
page read and write
2BC4000
heap
page read and write
1BD779BB000
heap
page read and write
5158000
heap
page read and write
56E000
stack
page read and write
1BD759C0000
heap
page read and write
1BD77A33000
heap
page read and write
2C10000
heap
page read and write
1BD77974000
heap
page read and write
1BD77792000
heap
page read and write
3FF2000
heap
page read and write
1BD776F1000
heap
page read and write
2D80000
heap
page read and write
4E61000
heap
page read and write
1BD779C3000
heap
page read and write
1BD779DB000
heap
page read and write
1BD77A03000
heap
page read and write
1BD77765000
heap
page read and write
5AC5000
trusted library allocation
page read and write
1BD77953000
heap
page read and write
1BD77982000
heap
page read and write
1BD779D3000
heap
page read and write
1BD77978000
heap
page read and write
116D000
stack
page read and write
2AEE000
stack
page read and write
4E61000
heap
page read and write
4FD0000
unkown
page read and write
FB0000
heap
page read and write
2EB3000
heap
page read and write
1BD779C3000
heap
page read and write
1BD779BB000
heap
page read and write
1BD77389000
heap
page read and write
2BC4000
heap
page read and write
7C0000
heap
page read and write
5090000
heap
page read and write
446000
unkown
page readonly
1BD77A4B000
heap
page read and write
1BD779E8000
heap
page read and write
1BD77763000
heap
page read and write
26F0000
heap
page read and write
7EF000
stack
page read and write
1BD779F3000
heap
page read and write
364F000
stack
page read and write
1BD779D3000
heap
page read and write
1BD779DB000
heap
page read and write
1BD779C3000
heap
page read and write
4382000
heap
page read and write
1BD779D3000
heap
page read and write
1BD77A53000
heap
page read and write
1BD77A4B000
heap
page read and write
1BD779C3000
heap
page read and write
1BD776EA000
heap
page read and write
33BC000
heap
page read and write
FB0000
heap
page read and write
1BD779BB000
heap
page read and write
2E20000
heap
page read and write
1BD779D3000
heap
page read and write
1BD759B2000
heap
page read and write
6091000
heap
page read and write
1BD779DB000
heap
page read and write
4E61000
heap
page read and write
5AC6000
trusted library allocation
page read and write
3EA0000
heap
page read and write
5ADC000
trusted library allocation
page read and write
1BD77377000
heap
page read and write
33AB000
heap
page read and write
47EE000
heap
page read and write
2F8A000
heap
page read and write
4E61000
heap
page read and write
1BD776F1000
heap
page read and write
4E61000
heap
page read and write
1BD7794A000
heap
page read and write
1BD776C7000
heap
page read and write
1BD77792000
heap
page read and write
1BD77781000
heap
page read and write
2890000
heap
page read and write
1270000
heap
page read and write
3392000
heap
page read and write
1BD7777D000
heap
page read and write
4E61000
heap
page read and write
446000
unkown
page readonly
1BD779BB000
heap
page read and write
1BD779C3000
heap
page read and write
1BD77943000
heap
page read and write
1BD779D3000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
1BD776B3000
heap
page read and write
1BD779BB000
heap
page read and write
5A22000
trusted library allocation
page read and write
CE0000
unkown
page readonly
1BD77A0B000
heap
page read and write
1BD779BB000
heap
page read and write
1BD776D8000
heap
page read and write
1BD779C3000
heap
page read and write
1BD7794A000
heap
page read and write
1BD77981000
heap
page read and write
5080000
unkown
page read and write
1BD779DB000
heap
page read and write
1BD779D3000
heap
page read and write
73F037F000
stack
page read and write
1BD77982000
heap
page read and write
1BD779C4000
heap
page read and write
1BD779DB000
heap
page read and write
AB7000
unkown
page write copy
1BD77A03000
heap
page read and write
52E3000
heap
page read and write
5158000
heap
page read and write
7DF4B6360000
unkown
page read and write
FDA000
heap
page read and write
40F1000
heap
page read and write
1BD779AB000
heap
page read and write
5A21000
trusted library allocation
page read and write
4E61000
heap
page read and write
1BD779DB000
heap
page read and write
1BD77788000
heap
page read and write
1BD77791000
heap
page read and write
215F000
stack
page read and write
1BD779C3000
heap
page read and write
4E61000
heap
page read and write
5A24000
trusted library allocation
page read and write
4E61000
heap
page read and write
1BD759CF000
heap
page read and write
1BD77779000
heap
page read and write
5158000
heap
page read and write
1BD77952000
heap
page read and write
3402000
heap
page read and write
4E61000
heap
page read and write
F6E000
heap
page read and write
2BC4000
heap
page read and write
1BD77A83000
heap
page read and write
1BD779AB000
heap
page read and write
5080000
heap
page read and write
291B000
stack
page read and write
50A1000
heap
page read and write
1BD7775B000
heap
page read and write
1BD7794B000
heap
page read and write
27AC000
stack
page read and write
3419000
heap
page read and write
1BD779AB000
heap
page read and write
1BD7799D000
heap
page read and write
1BD779C3000
heap
page read and write
33AE000
stack
page read and write
1BD77510000
direct allocation
page read and write
2A70000
heap
page read and write
4F10000
unkown
page read and write
1BD776C7000
heap
page read and write
1BD77A1B000
heap
page read and write
3378000
heap
page read and write
1BD779C3000
heap
page read and write
1BD779EB000
heap
page read and write
1BD776E7000
heap
page read and write
402D000
heap
page read and write
1BD77967000
heap
page read and write
4731000
heap
page read and write
438C000
heap
page read and write
1BD779F3000
heap
page read and write
1BD779A7000
heap
page read and write
1BD779D3000
heap
page read and write
1BD77964000
heap
page read and write
1BD779DB000
heap
page read and write
1BD77950000
heap
page read and write
1BD759C0000
heap
page read and write
4E61000
heap
page read and write
EEC000
stack
page read and write
4731000
heap
page read and write
5221000
trusted library allocation
page read and write
434E000
stack
page read and write
4383000
heap
page read and write
4E61000
heap
page read and write
3390000
heap
page read and write
4E61000
heap
page read and write
1BD77795000
heap
page read and write
C6F000
stack
page read and write
1BD776F1000
heap
page read and write
1BD776F2000
heap
page read and write
1BD779BB000
heap
page read and write
5A2A000
trusted library allocation
page read and write
4731000
heap
page read and write
2BC4000
heap
page read and write
4E61000
heap
page read and write
1BD779D3000
heap
page read and write
5158000
heap
page read and write
33A1000
heap
page read and write
1BD779DB000
heap
page read and write
5AD4000
trusted library allocation
page read and write
1BD779EB000
heap
page read and write
1BD779D3000
heap
page read and write
1BD77795000
heap
page read and write
3040000
heap
page read and write
1BD779A7000
heap
page read and write
1BD779D3000
heap
page read and write
5158000
heap
page read and write
1BD77A33000
heap
page read and write
4E61000
heap
page read and write
1BD776AE000
heap
page read and write
33B4000
heap
page read and write
1BD77952000
heap
page read and write
4E61000
heap
page read and write
1BD779C3000
heap
page read and write
FB9000
heap
page read and write
33FE000
heap
page read and write
1BD77963000
heap
page read and write
4381000
heap
page read and write
F9C000
heap
page read and write
342D000
heap
page read and write
1BD77991000
heap
page read and write
1BD77A4B000
heap
page read and write
40D8000
heap
page read and write
5AC5000
trusted library allocation
page read and write
5F0000
heap
page read and write
4E61000
heap
page read and write
5158000
heap
page read and write
FD8000
heap
page read and write
1BD77A23000
heap
page read and write
1BD77A23000
heap
page read and write
4389000
heap
page read and write
1BD779D3000
heap
page read and write
1BD779D3000
heap
page read and write
1BD779C3000
heap
page read and write
25EE000
stack
page read and write
1BD776F5000
heap
page read and write
1BD779F3000
heap
page read and write
1BD779F3000
heap
page read and write
1BD779C3000
heap
page read and write
5158000
heap
page read and write
1BD779D3000
heap
page read and write
1BD77A03000
heap
page read and write
5A2F000
trusted library allocation
page read and write
1BD77A03000
heap
page read and write
4E61000
heap
page read and write
5158000
heap
page read and write
4E61000
heap
page read and write
5A22000
trusted library allocation
page read and write
342D000
heap
page read and write
1BD779D3000
heap
page read and write
1BD77A3B000
heap
page read and write
295C000
stack
page read and write
1BD779AB000
heap
page read and write
1BD779DB000
heap
page read and write
5158000
heap
page read and write
5158000
heap
page read and write
606C000
stack
page read and write
4731000
heap
page read and write
1BD779C3000
heap
page read and write
4731000
heap
page read and write
1BD777A5000
heap
page read and write
4731000
heap
page read and write
DAC000
heap
page read and write
150000
unkown
page readonly
5158000
heap
page read and write
1BD77A03000
heap
page read and write
4E61000
heap
page read and write
31CA000
heap
page read and write
1BD77792000
heap
page read and write
1BD77792000
heap
page read and write
1BD779D7000
heap
page read and write
F6E000
heap
page read and write
4E61000
heap
page read and write
1BD779D3000
heap
page read and write
1BD776E9000
heap
page read and write
4E61000
heap
page read and write
1BD77375000
heap
page read and write
1BD779DB000
heap
page read and write
1BD77768000
heap
page read and write
50A0000
heap
page read and write
1BD77999000
heap
page read and write
1BD779A3000
heap
page read and write
1BD77A0B000
heap
page read and write
1BD776DA000
heap
page read and write
1BD779C3000
heap
page read and write
4731000
heap
page read and write
1BD776F9000
heap
page read and write
4E61000
heap
page read and write
1BD779DB000
heap
page read and write
1BD779DB000
heap
page read and write
4031000
heap
page read and write
6CB000
stack
page read and write
5A29000
trusted library allocation
page read and write
5A28000
trusted library allocation
page read and write
EC000
stack
page read and write
1BD779BB000
heap
page read and write
34AE000
stack
page read and write
1BD779C3000
heap
page read and write
4E61000
heap
page read and write
1BD779C3000
heap
page read and write
276B000
stack
page read and write
1BD7797A000
heap
page read and write
D4A000
unkown
page readonly
4E61000
heap
page read and write
1BD779DB000
heap
page read and write
4E61000
heap
page read and write
1BD779DB000
heap
page read and write
1BD776AA000
heap
page read and write
339A000
heap
page read and write
1BD779C3000
heap
page read and write
1BD77A03000
heap
page read and write
1BD77A0B000
heap
page read and write
31B3000
heap
page read and write
F1A000
heap
page read and write
1BD776F1000
heap
page read and write
1BD776F9000
heap
page read and write
1BD779C3000
heap
page read and write
2BC4000
heap
page read and write
1BD779BB000
heap
page read and write
1BD779C3000
heap
page read and write
1BD77956000
heap
page read and write
4E61000
heap
page read and write
5340000
heap
page read and write
AA2000
unkown
page readonly
4E61000
heap
page read and write
AB5000
unkown
page read and write
40F1000
heap
page read and write
450000
heap
page read and write
4E61000
heap
page read and write
1BD77A1B000
heap
page read and write
5AD1000
trusted library allocation
page read and write
F90000
heap
page read and write
5AE8000
trusted library allocation
page read and write
1BD779D3000
heap
page read and write
1BD776F1000
heap
page read and write
4E61000
heap
page read and write
1BD783B0000
heap
page read and write
5B07000
trusted library allocation
page read and write
1BD779EB000
heap
page read and write
4E61000
heap
page read and write
3E9D000
stack
page read and write
1BD779D3000
heap
page read and write
401000
unkown
page execute read
1BD759CC000
heap
page read and write
5A22000
trusted library allocation
page read and write
1BD77A53000
heap
page read and write
4E61000
heap
page read and write
438D000
heap
page read and write
1BD779D3000
heap
page read and write
1BD7799F000
heap
page read and write
5A20000
trusted library allocation
page read and write
52DF000
stack
page read and write
1BD77A17000
heap
page read and write
F5A000
heap
page read and write
4E61000
heap
page read and write
1BD75900000
heap
page read and write
1BD779BB000
heap
page read and write
1BD779F3000
heap
page read and write
3FF2000
heap
page read and write
AA2000
unkown
page readonly
2EBA000
heap
page read and write
4731000
heap
page read and write
460000
heap
page read and write
AA2000
unkown
page readonly
1BD779EB000
heap
page read and write
5158000
heap
page read and write
1BD779F3000
heap
page read and write
1BD779D3000
heap
page read and write
1BD77A23000
heap
page read and write
5A2D000
trusted library allocation
page read and write
1BD77A17000
heap
page read and write
1BD779DB000
heap
page read and write
5158000
heap
page read and write
5158000
heap
page read and write
40F1000
heap
page read and write
5158000
heap
page read and write
1BD779DB000
heap
page read and write
4E61000
heap
page read and write
F1E000
heap
page read and write
D4A000
unkown
page readonly
1BD77999000
heap
page read and write
2BC4000
heap
page read and write
33BC000
heap
page read and write
5AC7000
trusted library allocation
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
1BD77795000
heap
page read and write
5A26000
trusted library allocation
page read and write
1BD77952000
heap
page read and write
4E61000
heap
page read and write
1BD779DB000
heap
page read and write
1BD77795000
heap
page read and write
7DF4B649B000
unkown
page read and write
1BD779DB000
heap
page read and write
51D6000
unkown
page read and write
5158000
heap
page read and write
4E61000
heap
page read and write
1BD77781000
heap
page read and write
5AE0000
trusted library allocation
page read and write
438D000
heap
page read and write
5CBC000
stack
page read and write
5B00000
trusted library allocation
page read and write
FC0000
heap
page read and write
41F0000
heap
page read and write
1BD779F3000
heap
page read and write
F5C000
stack
page read and write
4F83000
unkown
page read and write
1BD779C3000
heap
page read and write
1BD779BB000
heap
page read and write
1BD776A4000
heap
page read and write
2F3A000
heap
page read and write
2F7A000
heap
page read and write
1BD779DB000
heap
page read and write
5158000
heap
page read and write
1BD779DB000
heap
page read and write
1BD7737A000
heap
page read and write
77E000
stack
page read and write
3424000
heap
page read and write
1BD77A6B000
heap
page read and write
1BD779F3000
heap
page read and write
1BD77792000
heap
page read and write
D67000
heap
page read and write
4E61000
heap
page read and write
1BD77A1B000
heap
page read and write
1BD779BB000
heap
page read and write
3958000
heap
page read and write
1BD75920000
heap
page read and write
1BD776E1000
heap
page read and write
4731000
heap
page read and write
2B6A000
heap
page read and write
D9D000
heap
page read and write
1BD779A3000
heap
page read and write
4E61000
heap
page read and write
2F70000
heap
page read and write
1BD779D3000
heap
page read and write
FBD000
heap
page read and write
ABA000
unkown
page readonly
1BD779BB000
heap
page read and write
1BD776AB000
heap
page read and write
1BD779C3000
heap
page read and write
1BD779F3000
heap
page read and write
1BD779D3000
heap
page read and write
1BD779D3000
heap
page read and write
1BD77953000
heap
page read and write
4E61000
heap
page read and write
73EFF7F000
stack
page read and write
4E61000
heap
page read and write
1BD779D3000
heap
page read and write
1BD779D3000
heap
page read and write
336A000
heap
page read and write
3FF2000
heap
page read and write
1BD779EB000
heap
page read and write
1BD7799A000
heap
page read and write
1BD779C3000
heap
page read and write
1BD759CF000
heap
page read and write
4E61000
heap
page read and write
1BD7794D000
heap
page read and write
4E61000
heap
page read and write
4731000
heap
page read and write
7B0000
heap
page read and write
1BD776E5000
heap
page read and write
5158000
heap
page read and write
1BD779F3000
heap
page read and write
1BD7797A000
heap
page read and write
1BD77A53000
heap
page read and write
1BD77A7B000
heap
page read and write
1BD77771000
heap
page read and write
5BBA000
trusted library allocation
page read and write
33B8000
heap
page read and write
5158000
heap
page read and write
40F1000
heap
page read and write
4E61000
heap
page read and write
2EBF000
stack
page read and write
1BD77A3B000
heap
page read and write
1BD77792000
heap
page read and write
1BD7794A000
heap
page read and write
1BD779D3000
heap
page read and write
4E61000
heap
page read and write
1BD77781000
heap
page read and write
7E0000
heap
page read and write
1BD779D3000
heap
page read and write
1BD779EB000
heap
page read and write
5158000
heap
page read and write
1BD779EB000
heap
page read and write
5158000
heap
page read and write
1BD776F8000
heap
page read and write
1EC000
stack
page read and write
1BD7751D000
heap
page read and write
4E61000
heap
page read and write
1BD7793B000
heap
page read and write
1BD77953000
heap
page read and write
1BD75908000
heap
page read and write
1BD77973000
heap
page read and write
1BD7777B000
heap
page read and write
1BD779DB000
heap
page read and write
5A28000
trusted library allocation
page read and write
1BD776F5000
heap
page read and write
41EF000
stack
page read and write
1BD779BB000
heap
page read and write
1BD77A03000
heap
page read and write
4118000
heap
page read and write
40F1000
heap
page read and write
AB5000
unkown
page write copy
29DE000
stack
page read and write
4E61000
heap
page read and write
1BD779BB000
heap
page read and write
1BD771AC000
heap
page read and write
1BD779DB000
heap
page read and write
41BC000
heap
page read and write
2BC4000
heap
page read and write
1BD779A3000
heap
page read and write
1BD77A23000
heap
page read and write
1BD77A1B000
heap
page read and write
1BD776F5000
heap
page read and write
5157000
heap
page read and write
1BD77A0B000
heap
page read and write
40A000
unkown
page write copy
1BD77940000
heap
page read and write
33E0000
heap
page read and write
31D0000
heap
page read and write
1BD779D3000
heap
page read and write
2BC4000
heap
page read and write
1BD779C3000
heap
page read and write
1BD779C3000
heap
page read and write
1BD75800000
heap
page read and write
2BC4000
heap
page read and write
5ACA000
trusted library allocation
page read and write
40C000
unkown
page read and write
4E61000
heap
page read and write
1BD779BB000
heap
page read and write
5BBE000
trusted library allocation
page read and write
2CA0000
direct allocation
page read and write
1BD779BB000
heap
page read and write
1BD779DB000
heap
page read and write
1BD779EB000
heap
page read and write
1BD77A03000
heap
page read and write
1BD779DB000
heap
page read and write
1BD779DB000
heap
page read and write
5158000
heap
page read and write
3230000
heap
page read and write
5AEE000
trusted library allocation
page read and write
40F1000
heap
page read and write
438A000
heap
page read and write
5158000
heap
page read and write
1BD779F3000
heap
page read and write
1BD779D3000
heap
page read and write
4E61000
heap
page read and write
5158000
heap
page read and write
5158000
heap
page read and write
5AFD000
trusted library allocation
page read and write
1BD779D3000
heap
page read and write
2E99000
heap
page read and write
1BD779DB000
heap
page read and write
F9C000
heap
page read and write
5A24000
trusted library allocation
page read and write
1BD779C3000
heap
page read and write
FC9000
heap
page read and write
3FF2000
heap
page read and write
1BD77792000
heap
page read and write
1BD779A3000
heap
page read and write
AA2000
unkown
page readonly
40DC000
stack
page read and write
40F1000
heap
page read and write
4731000
heap
page read and write
5BBB000
stack
page read and write
5261000
unkown
page read and write
40F1000
heap
page read and write
5A29000
trusted library allocation
page read and write
1BD77A03000
heap
page read and write
1BD776D3000
heap
page read and write
40C9000
heap
page read and write
100F000
stack
page read and write
4E61000
heap
page read and write
AB5000
unkown
page write copy
5158000
heap
page read and write
52A0000
direct allocation
page read and write
5F7000
heap
page read and write
4E61000
heap
page read and write
5158000
heap
page read and write
424D000
stack
page read and write
7A0000
heap
page read and write
1BD779C3000
heap
page read and write
1BD779DB000
heap
page read and write
1BD779EB000
heap
page read and write
1BD77516000
heap
page read and write
1BD779DB000
heap
page read and write
1BD779D3000
heap
page read and write
1BD779F3000
heap
page read and write
1BD7794B000
heap
page read and write
AB7000
unkown
page write copy
E70000
heap
page read and write
3296000
heap
page read and write
1BD77797000
heap
page read and write
5B07000
trusted library allocation
page read and write
4731000
heap
page read and write
1BD779EB000
heap
page read and write
5050000
unkown
page read and write
1BD779BB000
heap
page read and write
146E000
stack
page read and write
4E61000
heap
page read and write
1BD776F1000
heap
page read and write
1BD776EA000
heap
page read and write
1BD759D0000
heap
page read and write
2B2E000
stack
page read and write
2F4A000
heap
page read and write
1BD77A0B000
heap
page read and write
1BD77795000
heap
page read and write
1BD779DB000
heap
page read and write
40A000
unkown
page read and write
1050000
heap
page read and write
5A28000
trusted library allocation
page read and write
1BD759A9000
heap
page read and write
1BD779F3000
heap
page read and write
5158000
heap
page read and write
1BD77950000
heap
page read and write
3E1F000
stack
page read and write
F2C000
stack
page read and write
F0F000
stack
page read and write
DA8000
heap
page read and write
40F1000
heap
page read and write
1BD7794D000
heap
page read and write
1BD77A13000
heap
page read and write
4E61000
heap
page read and write
2896000
heap
page read and write
4E61000
heap
page read and write
2BC4000
heap
page read and write
1BD779DB000
heap
page read and write
FD7000
heap
page read and write
1BD776D6000
heap
page read and write
2BC4000
heap
page read and write
1BD779DB000
heap
page read and write
1BD77952000
heap
page read and write
1BD77370000
heap
page read and write
1BD779F3000
heap
page read and write
5A22000
trusted library allocation
page read and write
2BC4000
heap
page read and write
D10000
heap
page read and write
1BD779BB000
heap
page read and write
33A1000
heap
page read and write
1BD779C3000
heap
page read and write
5B68000
trusted library allocation
page read and write
4E61000
heap
page read and write
1BD779BB000
heap
page read and write
F5A000
heap
page read and write
1BD77781000
heap
page read and write
1BD776D4000
heap
page read and write
5221000
trusted library allocation
page read and write
50E5000
heap
page read and write
1BD7794A000
heap
page read and write
1BD77A33000
heap
page read and write
519E000
unkown
page read and write
1BD779DB000
heap
page read and write
1BD77A07000
heap
page read and write
1BD779BB000
heap
page read and write
1BD779DB000
heap
page read and write
710000
heap
page read and write
5D0000
heap
page read and write
1BD779EB000
heap
page read and write
5B8B000
trusted library allocation
page read and write
1BD779EB000
heap
page read and write
2BC4000
heap
page read and write
1BD7797A000
heap
page read and write
4241000
heap
page read and write
1BD779C3000
heap
page read and write
1BD77A03000
heap
page read and write
5158000
heap
page read and write
1BD779D3000
heap
page read and write
5A28000
trusted library allocation
page read and write
1BD77A7B000
heap
page read and write
1BD779D3000
heap
page read and write
1BD77A0B000
heap
page read and write
1BD77A1B000
heap
page read and write
4E61000
heap
page read and write
1BD77998000
heap
page read and write
2BC4000
heap
page read and write
1BD7795B000
heap
page read and write
1BD779BB000
heap
page read and write
1BD77952000
heap
page read and write
4E61000
heap
page read and write
1BD779DB000
heap
page read and write
4E61000
heap
page read and write
1BD77774000
heap
page read and write
5A2A000
trusted library allocation
page read and write
4E61000
heap
page read and write
1BD779A3000
heap
page read and write
A50000
unkown
page readonly
1BD779BB000
heap
page read and write
4E61000
heap
page read and write
1BD779DB000
heap
page read and write
1BD7799E000
heap
page read and write
1BD779DB000
heap
page read and write
1BD77939000
heap
page read and write
1BD77795000
heap
page read and write
5AE6000
trusted library allocation
page read and write
5AD3000
trusted library allocation
page read and write
5ABF000
trusted library allocation
page read and write
408000
unkown
page readonly
1BD77781000
heap
page read and write
1BD77A0B000
heap
page read and write
17E0000
trusted library allocation
page read and write
1BD779AB000
heap
page read and write
1BD77A0B000
heap
page read and write
9B000
stack
page read and write
1BD77A23000
heap
page read and write
1BD779C3000
heap
page read and write
1BD77792000
heap
page read and write
400000
unkown
page readonly
2BC4000
heap
page read and write
4090000
heap
page read and write
1BD77A23000
heap
page read and write
1BD7797B000
heap
page read and write
4E61000
heap
page read and write
27EC000
stack
page read and write
5AF1000
trusted library allocation
page read and write
1BD77950000
heap
page read and write
1BD779E9000
heap
page read and write
5158000
heap
page read and write
5DE000
stack
page read and write
1BD779DB000
heap
page read and write
17E0000
trusted library allocation
page read and write
2890000
heap
page read and write
1BD779C3000
heap
page read and write
5A2B000
trusted library allocation
page read and write
CEC000
stack
page read and write
5ADC000
trusted library allocation
page read and write
1BD77A23000
heap
page read and write
4E61000
heap
page read and write
1BD779BB000
heap
page read and write
4E61000
heap
page read and write
219000
unkown
page readonly
5158000
heap
page read and write
1BD779D3000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
5A20000
trusted library allocation
page read and write
4E61000
heap
page read and write
1BD776B4000
heap
page read and write
2A20000
heap
page read and write
1BD779C3000
heap
page read and write
41E000
unkown
page read and write
2D20000
heap
page read and write
1BD779EB000
heap
page read and write
1BD779BB000
heap
page read and write
31C0000
heap
page read and write
4E60000
unkown
page read and write
1BD7794A000
heap
page read and write
ABA000
unkown
page readonly
4E61000
heap
page read and write
4731000
heap
page read and write
1BD779C3000
heap
page read and write
1BD7793B000
heap
page read and write
1BD776F1000
heap
page read and write
5158000
heap
page read and write
1BD779EB000
heap
page read and write
5BEE000
trusted library allocation
page read and write
1BD779BB000
heap
page read and write
5158000
heap
page read and write
1BD779DB000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
33B3000
heap
page read and write
1BD776F1000
heap
page read and write
4E61000
heap
page read and write
40F1000
heap
page read and write
1BD779DB000
heap
page read and write
5158000
heap
page read and write
1BD77952000
heap
page read and write
4026000
heap
page read and write
4731000
heap
page read and write
1BD776F5000
heap
page read and write
1BD779DB000
heap
page read and write
1BD779C3000
heap
page read and write
1BD776E1000
heap
page read and write
2BC4000
heap
page read and write
1BD779D3000
heap
page read and write
1BD77A0B000
heap
page read and write
1BD779DB000
heap
page read and write
1BD77950000
heap
page read and write
5158000
heap
page read and write
4731000
heap
page read and write
3EB0000
heap
page read and write
31E0000
heap
page read and write
1BD77A0B000
heap
page read and write
4E61000
heap
page read and write
1BD77A1B000
heap
page read and write
1BD77A03000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
D47000
unkown
page write copy
1BD77795000
heap
page read and write
DA7000
heap
page read and write
1BD779BB000
heap
page read and write
1BD779F3000
heap
page read and write
1BD779DB000
heap
page read and write
5A22000
trusted library allocation
page read and write
2EE2000
heap
page read and write
3FF2000
heap
page read and write
5158000
heap
page read and write
1BD759B2000
heap
page read and write
2A24000
heap
page read and write
47F0000
heap
page read and write
806000
heap
page read and write
480000
heap
page read and write
1BD77781000
heap
page read and write
5158000
heap
page read and write
558C000
heap
page read and write
2BC4000
heap
page read and write
33A1000
heap
page read and write
1BD776E0000
heap
page read and write
5158000
heap
page read and write
1BD7795B000
heap
page read and write
336A000
heap
page read and write
1BD779DB000
heap
page read and write
1BD77792000
heap
page read and write
1BD77768000
heap
page read and write
1BD77A23000
heap
page read and write
1BD779DB000
heap
page read and write
1BD77A4B000
heap
page read and write
1BD77768000
heap
page read and write
5A28000
trusted library allocation
page read and write
FB0000
heap
page read and write
2BC4000
heap
page read and write
1BD779D3000
heap
page read and write
1BD779DB000
heap
page read and write
4E61000
heap
page read and write
1BD779C3000
heap
page read and write
1BD77974000
heap
page read and write
59E000
stack
page read and write
5158000
heap
page read and write
D1E000
heap
page read and write
4E61000
heap
page read and write
5158000
heap
page read and write
40F1000
heap
page read and write
1BD779F3000
heap
page read and write
1BD779AB000
heap
page read and write
4E61000
heap
page read and write
1BD779C3000
heap
page read and write
1BD779BB000
heap
page read and write
5A28000
trusted library allocation
page read and write
3F9E000
stack
page read and write
1BD77A3B000
heap
page read and write
5158000
heap
page read and write
1BD77795000
heap
page read and write
5158000
heap
page read and write
3580000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
1BD77792000
heap
page read and write
5B6E000
trusted library allocation
page read and write
1BD7795C000
heap
page read and write
1BD7798A000
heap
page read and write
1BD779EB000
heap
page read and write
1BD77953000
heap
page read and write
1BD779F3000
heap
page read and write
BBC000
stack
page read and write
1BD779F3000
heap
page read and write
1BD779F3000
heap
page read and write
1BD75840000
heap
page read and write
4E61000
heap
page read and write
33FE000
heap
page read and write
4E61000
heap
page read and write
2BC4000
heap
page read and write
1BD77781000
heap
page read and write
1BD779DB000
heap
page read and write
D48000
unkown
page read and write
5AC1000
trusted library allocation
page read and write
1BD77973000
heap
page read and write
5A26000
trusted library allocation
page read and write
3290000
heap
page read and write
4731000
heap
page read and write
1BD779DB000
heap
page read and write
4E61000
heap
page read and write
1BD779EB000
heap
page read and write
4E61000
heap
page read and write
3FF2000
heap
page read and write
4E61000
heap
page read and write
1BD77962000
heap
page read and write
4E61000
heap
page read and write
1BD77A1B000
heap
page read and write
5AEC000
trusted library allocation
page read and write
438C000
heap
page read and write
1BD779AB000
heap
page read and write
1BD7799D000
heap
page read and write
1BD779D3000
heap
page read and write
1BD7776A000
heap
page read and write
1BD77797000
heap
page read and write
1BD77240000
heap
page read and write
AB5000
unkown
page write copy
2A5E000
stack
page read and write
1BD779BB000
heap
page read and write
5158000
heap
page read and write
5AC5000
trusted library allocation
page read and write
4E61000
heap
page read and write
D32000
unkown
page readonly
4E61000
heap
page read and write
FB0000
heap
page read and write
5A29000
trusted library allocation
page read and write
1BD779C3000
heap
page read and write
2EA7000
heap
page read and write
DCD000
heap
page read and write
7CA000
stack
page read and write
1BD77A03000
heap
page read and write
401000
unkown
page execute read
1BD776F2000
heap
page read and write
1BD779D3000
heap
page read and write
AA2000
unkown
page readonly
4E61000
heap
page read and write
33A1000
heap
page read and write
4E61000
heap
page read and write
E4E000
stack
page read and write
51EE000
stack
page read and write
3FF2000
heap
page read and write
1BD7776A000
heap
page read and write
1BD77A3B000
heap
page read and write
1BD776E5000
heap
page read and write
1BD77781000
heap
page read and write
4E60000
heap
page read and write
1BD77A0B000
heap
page read and write
1BD77784000
heap
page read and write
40EF000
stack
page read and write
2BC4000
heap
page read and write
4E61000
heap
page read and write
1BD776CE000
heap
page read and write
5A21000
trusted library allocation
page read and write
5158000
heap
page read and write
1BD779EB000
heap
page read and write
1BD779D3000
heap
page read and write
F39000
heap
page read and write
1BD779C3000
heap
page read and write
1BD77A3B000
heap
page read and write
327E000
stack
page read and write
1BD776D3000
heap
page read and write
1BD776F1000
heap
page read and write
4082000
heap
page read and write
FDA000
heap
page read and write
5158000
heap
page read and write
1BD779D3000
heap
page read and write
1BD77A23000
heap
page read and write
2BC4000
heap
page read and write
5A20000
trusted library allocation
page read and write
1BD77771000
heap
page read and write
7D0000
heap
page read and write
1BD77795000
heap
page read and write
5A20000
trusted library allocation
page read and write
2E95000
heap
page read and write
1BD77796000
heap
page read and write
1BD776A8000
heap
page read and write
2BBE000
stack
page read and write
4731000
heap
page read and write
5158000
heap
page read and write
4387000
heap
page read and write
1BD779BB000
heap
page read and write
1BD779C3000
heap
page read and write
532F000
stack
page read and write
1BD77973000
heap
page read and write
1BD779DB000
heap
page read and write
1BD779C3000
heap
page read and write
1BD7775E000
heap
page read and write
5ABF000
trusted library allocation
page read and write
1BD779DB000
heap
page read and write
4E61000
heap
page read and write
1BD776D1000
heap
page read and write
408000
unkown
page readonly
1BD779D3000
heap
page read and write
1BD759CF000
heap
page read and write
1BD779DB000
heap
page read and write
1BD779C3000
heap
page read and write
4E61000
heap
page read and write
1BD75880000
heap
page readonly
4E61000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
5158000
heap
page read and write
1BD7776A000
heap
page read and write
2C70000
direct allocation
page read and write
1BD776F5000
heap
page read and write
25AF000
stack
page read and write
1BD779EB000
heap
page read and write
1BD779DB000
heap
page read and write
5A21000
trusted library allocation
page read and write
4E61000
heap
page read and write
1BD776C7000
heap
page read and write
1BD779F3000
heap
page read and write
1BD77781000
heap
page read and write
1BD77950000
heap
page read and write
1BD779D3000
heap
page read and write
4731000
heap
page read and write
51B6000
unkown
page read and write
1BD779D3000
heap
page read and write
4731000
heap
page read and write
1BD779D3000
heap
page read and write
1BD77768000
heap
page read and write
73F027B000
stack
page read and write
33AB000
heap
page read and write
1BD77A0B000
heap
page read and write
4100000
heap
page read and write
4E61000
heap
page read and write
1BD779BB000
heap
page read and write
4E61000
heap
page read and write
1BD779D3000
heap
page read and write
4E61000
heap
page read and write
1BD77797000
heap
page read and write
1BD779D3000
heap
page read and write
1BD776DF000
heap
page read and write
1BD779AB000
heap
page read and write
1BD779C3000
heap
page read and write
1BD77A1B000
heap
page read and write
1BD7794A000
heap
page read and write
1BD77A1B000
heap
page read and write
1BD77953000
heap
page read and write
CD0000
heap
page read and write
1BD7797B000
heap
page read and write
1BD779A3000
heap
page read and write
1BD776D8000
heap
page read and write
1BD776C7000
heap
page read and write
5A27000
trusted library allocation
page read and write
1BD77A07000
heap
page read and write
1BD779D3000
heap
page read and write
1BD779D3000
heap
page read and write
1BD77A23000
heap
page read and write
151000
unkown
page execute read
1BD77A0B000
heap
page read and write
1BD779BB000
heap
page read and write
3427000
heap
page read and write
4731000
heap
page read and write
1BD779BB000
heap
page read and write
2E95000
heap
page read and write
1BD77778000
heap
page read and write
505C000
stack
page read and write
5A23000
trusted library allocation
page read and write
1BD779D3000
heap
page read and write
342D000
heap
page read and write
5A25000
trusted library allocation
page read and write
1BD779AB000
heap
page read and write
1BD779C3000
heap
page read and write
40A1000
heap
page read and write
1BD7793B000
heap
page read and write
2BC4000
heap
page read and write
1BD779DB000
heap
page read and write
1BD779A7000
heap
page read and write
5ACF000
trusted library allocation
page read and write
3588000
heap
page read and write
1BD779BB000
heap
page read and write
5AF5000
trusted library allocation
page read and write
1BD77974000
heap
page read and write
1BD776E0000
heap
page read and write
1BD779F3000
heap
page read and write
1BD77993000
heap
page read and write
1BD779C3000
heap
page read and write
1BD77A0B000
heap
page read and write
1BD77A33000
heap
page read and write
4E61000
heap
page read and write
1BD779C3000
heap
page read and write
1BD779F3000
heap
page read and write
1BD779F3000
heap
page read and write
1BD779DB000
heap
page read and write
5A27000
trusted library allocation
page read and write
2EA1000
heap
page read and write
1BD779BB000
heap
page read and write
2BC4000
heap
page read and write
5CFE000
stack
page read and write
1BD779DB000
heap
page read and write
1BD776A1000
heap
page read and write
5A25000
trusted library allocation
page read and write
2F5F000
stack
page read and write
5158000
heap
page read and write
1BD779D3000
heap
page read and write
1BD77798000
heap
page read and write
2EA7000
heap
page read and write
5A24000
trusted library allocation
page read and write
4E61000
heap
page read and write
FC4000
heap
page read and write
1BD779BB000
heap
page read and write
2BC4000
heap
page read and write
1BD77781000
heap
page read and write
4E61000
heap
page read and write
1BD776B4000
heap
page read and write
F75000
heap
page read and write
1BD77A6B000
heap
page read and write
4E61000
heap
page read and write
1BD776AF000
heap
page read and write
1BD7778C000
heap
page read and write
6070000
heap
page read and write
4E61000
heap
page read and write
526E000
stack
page read and write
1BD779BB000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
2B60000
heap
page read and write
2BC4000
heap
page read and write
4E60000
unkown
page read and write
1BD779DB000
heap
page read and write
4FB0000
unkown
page read and write
1BD779C3000
heap
page read and write
4EF2000
unkown
page read and write
1BD779EB000
heap
page read and write
5AC7000
trusted library allocation
page read and write
2BC4000
heap
page read and write
1BD77A03000
heap
page read and write
4E61000
heap
page read and write
1BD77963000
heap
page read and write
1BD779C3000
heap
page read and write
1BD7799A000
heap
page read and write
4E61000
heap
page read and write
3EE0000
heap
page read and write
4E61000
heap
page read and write
1BD779BB000
heap
page read and write
1BD779DB000
heap
page read and write
1BD776E7000
heap
page read and write
2BC4000
heap
page read and write
1BD779BB000
heap
page read and write
5ABF000
trusted library allocation
page read and write
DA5000
heap
page read and write
1BD779BB000
heap
page read and write
1BD779DB000
heap
page read and write
1BD776F1000
heap
page read and write
1BD779AB000
heap
page read and write
DA4000
heap
page read and write
1BD779C3000
heap
page read and write
1BD77A53000
heap
page read and write
2BC4000
heap
page read and write
5158000
heap
page read and write
1BD77A00000
heap
page read and write
1BD779DB000
heap
page read and write
1BD779DB000
heap
page read and write
1BD776A2000
heap
page read and write
5158000
heap
page read and write
5370000
heap
page read and write
A50000
unkown
page readonly
1BD77A03000
heap
page read and write
5AEC000
trusted library allocation
page read and write
4177000
heap
page read and write
FCC000
heap
page read and write
1BD7796D000
heap
page read and write
4E61000
heap
page read and write
1BD776F5000
heap
page read and write
1BD779BB000
heap
page read and write
1277000
heap
page read and write
2BC4000
heap
page read and write
1BD779DB000
heap
page read and write
1BD77967000
heap
page read and write
1BD779DB000
heap
page read and write
4E61000
heap
page read and write
E0C000
heap
page read and write
1BD77974000
heap
page read and write
5AEE000
trusted library allocation
page read and write
1BD779C3000
heap
page read and write
2F70000
heap
page read and write
5158000
heap
page read and write
5AB4000
trusted library allocation
page read and write
7C5000
heap
page read and write
5158000
heap
page read and write
33AB000
heap
page read and write
5158000
heap
page read and write
1BD779DB000
heap
page read and write
1BD779EB000
heap
page read and write
5AD5000
trusted library allocation
page read and write
1BD776F8000
heap
page read and write
1BD779C3000
heap
page read and write
394F000
stack
page read and write
1BD77952000
heap
page read and write
1BD77A0B000
heap
page read and write
73EFEEE000
stack
page read and write
5158000
heap
page read and write
7DF4B6361000
unkown
page execute read
4386000
heap
page read and write
1BD77378000
heap
page read and write
1BD77A03000
heap
page read and write
1BD77768000
heap
page read and write
31B5000
heap
page read and write
1BD779BB000
heap
page read and write
1BD779F3000
heap
page read and write
1BD779BB000
heap
page read and write
4E61000
heap
page read and write
40F1000
heap
page read and write
1BD77952000
heap
page read and write
2BC4000
heap
page read and write
1BD779F3000
heap
page read and write
1BD779C3000
heap
page read and write
1BD779EB000
heap
page read and write
1BD7793F000
heap
page read and write
1BD77A33000
heap
page read and write
1BD776E9000
heap
page read and write
1BD779DB000
heap
page read and write
D45000
unkown
page read and write
3220000
heap
page read and write
A30000
heap
page read and write
5BCB000
trusted library allocation
page read and write
4E61000
heap
page read and write
1BD779AB000
heap
page read and write
4E61000
heap
page read and write
1BD779DB000
heap
page read and write
323E000
stack
page read and write
F9C000
heap
page read and write
5A2D000
trusted library allocation
page read and write
156F000
stack
page read and write
DDC000
heap
page read and write
4E61000
heap
page read and write
3FF2000
heap
page read and write
1BD779D3000
heap
page read and write
1BD779C3000
heap
page read and write
33FF000
heap
page read and write
1BD77983000
heap
page read and write
1BD779D3000
heap
page read and write
1BD779F3000
heap
page read and write
5ADE000
trusted library allocation
page read and write
1BD77991000
heap
page read and write
384F000
stack
page read and write
1BD77781000
heap
page read and write
1BD779DB000
heap
page read and write
5BB3000
trusted library allocation
page read and write
1BD776F5000
heap
page read and write
1BD779C3000
heap
page read and write
1BD77A03000
heap
page read and write
1BD779DB000
heap
page read and write
340F000
heap
page read and write
5158000
heap
page read and write
DA5000
heap
page read and write
40B0000
heap
page read and write
1BD779D3000
heap
page read and write
2BC4000
heap
page read and write
2BC4000
heap
page read and write
1BD779BB000
heap
page read and write
4E61000
heap
page read and write
5B04000
trusted library allocation
page read and write
1BD779BB000
heap
page read and write
1BD776E7000
heap
page read and write
4FDF000
stack
page read and write
5AD6000
trusted library allocation
page read and write
1BD77A23000
heap
page read and write
4E61000
heap
page read and write
1BD77771000
heap
page read and write
5A28000
trusted library allocation
page read and write
1BD779DB000
heap
page read and write
4FE0000
unkown
page read and write
1BD77A4B000
heap
page read and write
4731000
heap
page read and write
D77000
heap
page read and write
1BD779D3000
heap
page read and write
1BD7737E000
heap
page read and write
1BD776A1000
heap
page read and write
1BD7795C000
heap
page read and write
1BD7796A000
heap
page read and write
5B8C000
trusted library allocation
page read and write
4E61000
heap
page read and write
4210000
heap
page read and write
1BD7795B000
heap
page read and write
AB5000
unkown
page read and write
1BD776E0000
heap
page read and write
52E0000
heap
page read and write
5247000
unkown
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
1BD77A1B000
heap
page read and write
1BD779D3000
heap
page read and write
F58000
heap
page read and write
1BD77A33000
heap
page read and write
4E61000
heap
page read and write
5B7E000
trusted library allocation
page read and write
AA2000
unkown
page readonly
1BD77A03000
heap
page read and write
5ACB000
trusted library allocation
page read and write
3578000
heap
page read and write
1BD771A0000
heap
page read and write
1BD779BB000
heap
page read and write
ABA000
unkown
page readonly
1BD779BB000
heap
page read and write
1BD779C3000
heap
page read and write
A50000
unkown
page readonly
1BD779EB000
heap
page read and write
1BD77781000
heap
page read and write
525F000
stack
page read and write
D32000
unkown
page readonly
4E61000
heap
page read and write
1BD779BB000
heap
page read and write
323A000
heap
page read and write
4E61000
heap
page read and write
5158000
heap
page read and write
2BC4000
heap
page read and write
4E61000
heap
page read and write
1BD77A0B000
heap
page read and write
D75000
heap
page read and write
1BD779D3000
heap
page read and write
1BD77774000
heap
page read and write
4E61000
heap
page read and write
4731000
heap
page read and write
3E9E000
stack
page read and write
A50000
unkown
page readonly
1BD779EB000
heap
page read and write
5B0000
heap
page read and write
1BD779AB000
heap
page read and write
50A1000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
431000
unkown
page read and write
1BD776E7000
heap
page read and write
438D000
heap
page read and write
41AA000
heap
page read and write
1BD779DB000
heap
page read and write
1BD779C3000
heap
page read and write
1BD779D3000
heap
page read and write
1BD779EB000
heap
page read and write
FB0000
heap
page read and write
A50000
unkown
page readonly
1BD779BB000
heap
page read and write
FC4000
heap
page read and write
4E61000
heap
page read and write
1BD779AB000
heap
page read and write
1BD779AC000
heap
page read and write
5AF2000
trusted library allocation
page read and write
AB7000
unkown
page write copy
2F70000
heap
page read and write
B6E000
stack
page read and write
1BD776F1000
heap
page read and write
1BD779D3000
heap
page read and write
5ACE000
trusted library allocation
page read and write
3FF2000
heap
page read and write
D45000
unkown
page write copy
4E61000
heap
page read and write
214000
unkown
page write copy
1BD759AF000
heap
page read and write
206000
unkown
page readonly
CAD000
stack
page read and write
33AB000
heap
page read and write
2BC4000
heap
page read and write
B20000
heap
page read and write
1BD779D3000
heap
page read and write
11B0000
heap
page read and write
2F30000
heap
page read and write
1BD776C4000
heap
page read and write
5B9E000
trusted library allocation
page read and write
4F80000
unkown
page read and write
F6E000
heap
page read and write
1BD779BB000
heap
page read and write
1BD776C7000
heap
page read and write
1BD77785000
heap
page read and write
1BD779C3000
heap
page read and write
1BD77798000
heap
page read and write
1BD7797C000
heap
page read and write
4731000
heap
page read and write
1BD779BB000
heap
page read and write
5158000
heap
page read and write
1BD77790000
heap
page read and write
1BD779C3000
heap
page read and write
3419000
heap
page read and write
1BD77A0B000
heap
page read and write
1BD779D3000
heap
page read and write
5158000
heap
page read and write
1BD779BB000
heap
page read and write
1BD779D3000
heap
page read and write
1BD779DB000
heap
page read and write
1BD779F3000
heap
page read and write
5B00000
trusted library allocation
page read and write
2810000
heap
page read and write
2DBE000
stack
page read and write
1BD7778B000
heap
page read and write
5A26000
trusted library allocation
page read and write
1BD77762000
heap
page read and write
2EC7000
heap
page read and write
3FF2000
heap
page read and write
1BD779DB000
heap
page read and write
1BD77795000
heap
page read and write
1BD77A3B000
heap
page read and write
1BD776D5000
heap
page read and write
342D000
heap
page read and write
5A25000
trusted library allocation
page read and write
1BD77A1B000
heap
page read and write
DDD000
heap
page read and write
4E61000
heap
page read and write
2BC4000
heap
page read and write
1BD779DB000
heap
page read and write
5A23000
trusted library allocation
page read and write
4E61000
heap
page read and write
1BD779F3000
heap
page read and write
1BD776EA000
heap
page read and write
1BD77756000
heap
page read and write
4E61000
heap
page read and write
5158000
heap
page read and write
374F000
stack
page read and write
2BC4000
heap
page read and write
1BD779D3000
heap
page read and write
4E61000
heap
page read and write
1BD779EB000
heap
page read and write
1BD776D8000
heap
page read and write
1BD779D3000
heap
page read and write
5B04000
trusted library allocation
page read and write
5B5A000
trusted library allocation
page read and write
1BD77A53000
heap
page read and write
4E61000
heap
page read and write
1BD77377000
heap
page read and write
31E0000
heap
page read and write
5B02000
trusted library allocation
page read and write
1BD77A00000
heap
page read and write
F98000
heap
page read and write
1BD77A23000
heap
page read and write
1BD7793B000
heap
page read and write
355E000
stack
page read and write
4E60000
unkown
page read and write
1BD77A1B000
heap
page read and write
1BD7799A000
heap
page read and write
1BD779DB000
heap
page read and write
4731000
heap
page read and write
1BD77795000
heap
page read and write
4E61000
heap
page read and write
1BD779D3000
heap
page read and write
5A28000
trusted library allocation
page read and write
1BD77A0B000
heap
page read and write
1BD779D3000
heap
page read and write
F7A000
heap
page read and write
33BC000
heap
page read and write
1BD779DB000
heap
page read and write
4E61000
heap
page read and write
1BD77771000
heap
page read and write
52EE000
stack
page read and write
1BD779F3000
heap
page read and write
5A2C000
trusted library allocation
page read and write
7DF4B64A5000
unkown
page read and write
33D0000
heap
page read and write
1BD77952000
heap
page read and write
1BD779C3000
heap
page read and write
1BD77999000
heap
page read and write
5158000
heap
page read and write
5158000
heap
page read and write
7DF4B645F000
unkown
page read and write
1BD779C3000
heap
page read and write
1BD77A3B000
heap
page read and write
5AF2000
trusted library allocation
page read and write
1BD7793B000
heap
page read and write
1BD779DB000
heap
page read and write
1BD77A0B000
heap
page read and write
1BD776F1000
heap
page read and write
1BD759C0000
heap
page read and write
2EBA000
heap
page read and write
1BD77769000
heap
page read and write
1BD77960000
heap
page read and write
AB8000
unkown
page read and write
5158000
heap
page read and write
1BD779EB000
heap
page read and write
1BD77786000
heap
page read and write
1BD779F3000
heap
page read and write
5158000
heap
page read and write
5A29000
trusted library allocation
page read and write
A40000
heap
page read and write
521E000
stack
page read and write
5A22000
trusted library allocation
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
1BD779D3000
heap
page read and write
5158000
heap
page read and write
1BD779EB000
heap
page read and write
340B000
heap
page read and write
340C000
heap
page read and write
5158000
heap
page read and write
1BD779DB000
heap
page read and write
5ACF000
trusted library allocation
page read and write
4382000
heap
page read and write
1BD77A0B000
heap
page read and write
3FEF000
stack
page read and write
1BD77797000
heap
page read and write
1BD77753000
heap
page read and write
1BD776F1000
heap
page read and write
339C000
heap
page read and write
1BD779C3000
heap
page read and write
4731000
heap
page read and write
1BD779BB000
heap
page read and write
522F000
stack
page read and write
1BD77967000
heap
page read and write
4731000
heap
page read and write
6090000
heap
page read and write
2A20000
heap
page read and write
1BD75700000
unkown
page execute and read and write
4380000
heap
page read and write
1BD779DB000
heap
page read and write
1BD7794A000
heap
page read and write
F10000
heap
page read and write
1BD77967000
heap
page read and write
1BD77770000
heap
page read and write
1BD77757000
heap
page read and write
1BD779F3000
heap
page read and write
1BD776A2000
heap
page read and write
441000
unkown
page read and write
F9C000
stack
page read and write
730000
heap
page read and write
5AE4000
trusted library allocation
page read and write
5158000
heap
page read and write
1BD77792000
heap
page read and write
1BD779BB000
heap
page read and write
1BD77A63000
heap
page read and write
340F000
heap
page read and write
4E61000
heap
page read and write
1BD779D3000
heap
page read and write
1BD7799F000
heap
page read and write
5B00000
trusted library allocation
page read and write
501C000
stack
page read and write
5158000
heap
page read and write
1BD7796A000
heap
page read and write
1BD779DB000
heap
page read and write
3419000
heap
page read and write
1BD779C3000
heap
page read and write
FCC000
heap
page read and write
2BC4000
heap
page read and write
4F9E000
stack
page read and write
1BD779F3000
heap
page read and write
1BD779E9000
heap
page read and write
5A2D000
trusted library allocation
page read and write
4E61000
heap
page read and write
DBD000
heap
page read and write
1BD779F3000
heap
page read and write
1BD779DB000
heap
page read and write
DAD000
heap
page read and write
5158000
heap
page read and write
47F0000
heap
page read and write
1BD778F0000
heap
page read and write
4731000
heap
page read and write
1BD779C4000
heap
page read and write
1BD779C3000
heap
page read and write
1BD77A23000
heap
page read and write
5158000
heap
page read and write
1BD776F5000
heap
page read and write
3FF2000
heap
page read and write
1BD779BB000
heap
page read and write
1BD779D3000
heap
page read and write
1BD77377000
heap
page read and write
5BCE000
trusted library allocation
page read and write
2BC4000
heap
page read and write
352E000
stack
page read and write
5158000
heap
page read and write
5158000
heap
page read and write
1BD7796D000
heap
page read and write
1BD77A03000
heap
page read and write
DCC000
heap
page read and write
4E61000
heap
page read and write
1BD7793B000
heap
page read and write
5AB2000
trusted library allocation
page read and write
4E61000
heap
page read and write
DAA000
heap
page read and write
5158000
heap
page read and write
1BD77A0B000
heap
page read and write
D9D000
heap
page read and write
5AFE000
trusted library allocation
page read and write
40F1000
heap
page read and write
5A24000
trusted library allocation
page read and write
1BD776F9000
heap
page read and write
2BC4000
heap
page read and write
1BD779BB000
heap
page read and write
1BD779BB000
heap
page read and write
1BD77781000
heap
page read and write
5B77000
trusted library allocation
page read and write
1BD779C3000
heap
page read and write
5F5000
heap
page read and write
1BD77A3B000
heap
page read and write
1BD776C1000
heap
page read and write
1BD779BB000
heap
page read and write
1BD779F3000
heap
page read and write
1BD77771000
heap
page read and write
2D28000
heap
page read and write
5A2F000
trusted library allocation
page read and write
1BD77978000
heap
page read and write
1BD77960000
heap
page read and write
2FFD000
stack
page read and write
5158000
heap
page read and write
4E61000
heap
page read and write
1BD77A33000
heap
page read and write
1BD77795000
heap
page read and write
CCE000
stack
page read and write
3428000
heap
page read and write
1BD779D3000
heap
page read and write
1BD779D3000
heap
page read and write
5AF0000
trusted library allocation
page read and write
1BD77795000
heap
page read and write
5158000
heap
page read and write
1BD7794A000
heap
page read and write
1BD779EB000
heap
page read and write
5B04000
trusted library allocation
page read and write
3350000
heap
page read and write
1BD779F3000
heap
page read and write
2F7A000
heap
page read and write
4E61000
heap
page read and write
19A000
stack
page read and write
450000
heap
page read and write
1BD77755000
heap
page read and write
1BD759CF000
heap
page read and write
11AE000
stack
page read and write
1BD77A33000
heap
page read and write
1BD77981000
heap
page read and write
1BD779D3000
heap
page read and write
1BD77A0B000
heap
page read and write
4156000
heap
page read and write
1BD779C3000
heap
page read and write
1BD77A0B000
heap
page read and write
1BD7794A000
heap
page read and write
5158000
heap
page read and write
1BD77964000
heap
page read and write
1BD77A0B000
heap
page read and write
AB8000
unkown
page read and write
1BD776F5000
heap
page read and write
1BD77BE8000
heap
page read and write
5B4F000
trusted library allocation
page read and write
4E61000
heap
page read and write
1BD77950000
heap
page read and write
1BD779DB000
heap
page read and write
1BD779D3000
heap
page read and write
1BD77793000
heap
page read and write
3FF2000
heap
page read and write
1BD77781000
heap
page read and write
F9C000
heap
page read and write
1BD77960000
heap
page read and write
2D99000
heap
page read and write
73EFEFD000
stack
page read and write
7D0000
heap
page read and write
47E0000
heap
page read and write
1BD779C3000
heap
page read and write
1BD77797000
heap
page read and write
1BD779C3000
heap
page read and write
2BC4000
heap
page read and write
1BD77A0B000
heap
page read and write
1BD779DB000
heap
page read and write
40F1000
heap
page read and write
4E61000
heap
page read and write
5158000
heap
page read and write
3419000
heap
page read and write
402A000
heap
page read and write
5158000
heap
page read and write
1BD77795000
heap
page read and write
1BD779F3000
heap
page read and write
530D000
trusted library allocation
page read and write
A50000
unkown
page readonly
4E61000
heap
page read and write
342A000
heap
page read and write
4E61000
heap
page read and write
1BD7793F000
heap
page read and write
1BD779A3000
heap
page read and write
2817000
heap
page read and write
1BD77963000
heap
page read and write
2F40000
heap
page read and write
1BD77781000
heap
page read and write
1BD779C9000
heap
page read and write
338E000
heap
page read and write
2E98000
heap
page read and write
1BD779EB000
heap
page read and write
5A25000
trusted library allocation
page read and write
1BD77987000
heap
page read and write
52AF000
stack
page read and write
1BD779DB000
heap
page read and write
1BD7777B000
heap
page read and write
4E61000
heap
page read and write
1BD776D1000
heap
page read and write
1BD77A63000
heap
page read and write
1BD77A4B000
heap
page read and write
7D8000
heap
page read and write
4E61000
heap
page read and write
1BD776B5000
heap
page read and write
1BD77950000
heap
page read and write
33E8000
heap
page read and write
1BD779D3000
heap
page read and write
302E000
stack
page read and write
1BD77987000
heap
page read and write
1BD779D3000
heap
page read and write
40F1000
heap
page read and write
1BD779F3000
heap
page read and write
4FD8000
unkown
page read and write
1BD779DB000
heap
page read and write
3306000
heap
page read and write
2BC4000
heap
page read and write
1BD779DB000
heap
page read and write
5BD7000
trusted library allocation
page read and write
1BD776F1000
heap
page read and write
FDC000
heap
page read and write
1BD776F9000
heap
page read and write
1BD77A23000
heap
page read and write
1BD7794A000
heap
page read and write
3370000
heap
page read and write
5A2A000
trusted library allocation
page read and write
1BD779BB000
heap
page read and write
1BD776A0000
heap
page read and write
1BD7794A000
heap
page read and write
1BD77781000
heap
page read and write
1BD77792000
heap
page read and write
4731000
heap
page read and write
2ED0000
heap
page read and write
1BD77BE8000
heap
page read and write
75C000
stack
page read and write
1BD779BB000
heap
page read and write
1BD779D3000
heap
page read and write
1BD779D3000
heap
page read and write
1BD7793B000
heap
page read and write
2BC4000
heap
page read and write
2BC4000
heap
page read and write
1BD77791000
heap
page read and write
1BD77A23000
heap
page read and write
1BD776F5000
heap
page read and write
73EFFFE000
stack
page read and write
2240000
heap
page read and write
3390000
heap
page read and write
2BC4000
heap
page read and write
4E60000
unkown
page read and write
DAA000
heap
page read and write
1BD771AC000
heap
page read and write
1BD75720000
heap
page read and write
5A2E000
trusted library allocation
page read and write
1BD776F5000
heap
page read and write
40C3000
heap
page read and write
4F00000
unkown
page read and write
1BD779DB000
heap
page read and write
5158000
heap
page read and write
FB8000
heap
page read and write
2EA1000
heap
page read and write
1BD7737B000
heap
page read and write
3FF2000
heap
page read and write
2BC4000
heap
page read and write
4731000
heap
page read and write
11C0000
heap
page read and write
1BD7795C000
heap
page read and write
2FEE000
stack
page read and write
1BD7793B000
heap
page read and write
1BD779DB000
heap
page read and write
5B05000
trusted library allocation
page read and write
2BC4000
heap
page read and write
1BD77974000
heap
page read and write
1BD77A17000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
4139000
heap
page read and write
4E61000
heap
page read and write
3300000
heap
page read and write
1BD77768000
heap
page read and write
1BD77953000
heap
page read and write
4E61000
heap
page read and write
1BD779BB000
heap
page read and write
1BD779DB000
heap
page read and write
1BD779C3000
heap
page read and write
1BD77A03000
heap
page read and write
1BD779C3000
heap
page read and write
5158000
heap
page read and write
1BD776F5000
heap
page read and write
1BD77A03000
heap
page read and write
4E61000
heap
page read and write
1BD776B4000
heap
page read and write
1BD779C3000
heap
page read and write
5400000
trusted library allocation
page read and write
1BD779DB000
heap
page read and write
1BD77974000
heap
page read and write
529E000
stack
page read and write
3FF2000
heap
page read and write
4731000
heap
page read and write
2F73000
heap
page read and write
2BC4000
heap
page read and write
1BD779D3000
heap
page read and write
1BD776B4000
heap
page read and write
2BC4000
heap
page read and write
1BD779BB000
heap
page read and write
1BD779D3000
heap
page read and write
1BD779C3000
heap
page read and write
1BD77A03000
heap
page read and write
50E5000
heap
page read and write
340F000
heap
page read and write
FC0000
heap
page read and write
1BD77778000
heap
page read and write
407F000
heap
page read and write
4E61000
heap
page read and write
1BD779DB000
heap
page read and write
1BD779BB000
heap
page read and write
1BD7794A000
heap
page read and write
33DA000
heap
page read and write
1BD779DB000
heap
page read and write
5A20000
trusted library allocation
page read and write
34EE000
stack
page read and write
4E61000
heap
page read and write
31EA000
heap
page read and write
5221000
trusted library allocation
page read and write
1BD7737B000
heap
page read and write
1BD776AA000
heap
page read and write
1BD779AB000
heap
page read and write
1BD779AB000
heap
page read and write
3422000
heap
page read and write
1BD7797C000
heap
page read and write
1BD77796000
heap
page read and write
1BD779DB000
heap
page read and write
2BC4000
heap
page read and write
1BD779D3000
heap
page read and write
400000
unkown
page readonly
1BD7795B000
heap
page read and write
1BD776DF000
heap
page read and write
2EF0000
heap
page read and write
2BC4000
heap
page read and write
1BD779BB000
heap
page read and write
1BD779BB000
heap
page read and write
2BC4000
heap
page read and write
4E61000
heap
page read and write
4E61000
heap
page read and write
351F000
stack
page read and write
1BD77951000
heap
page read and write
4389000
heap
page read and write
1BD77A1B000
heap
page read and write
1BD77792000
heap
page read and write
1BD779DB000
heap
page read and write
5158000
heap
page read and write
1BD759B4000
heap
page read and write
1BD779C3000
heap
page read and write
409E000
heap
page read and write
1BD779C3000
heap
page read and write
5AE000
stack
page read and write
33BC000
heap
page read and write
2EFC000
stack
page read and write
1BD776C7000
heap
page read and write
1BD7794D000
heap
page read and write
DEC000
stack
page read and write
5000000
unkown
page read and write
1BD7794D000
heap
page read and write
1BD77797000
heap
page read and write
3EE6000
heap
page read and write
AB8000
unkown
page read and write
4E61000
heap
page read and write
1BD77A83000
heap
page read and write
1BD7793B000
heap
page read and write
1BD779D3000
heap
page read and write
A3E000
stack
page read and write
1BD77792000
heap
page read and write
1BD77768000
heap
page read and write
5F6C000
stack
page read and write
512D000
unkown
page read and write
1BD779C3000
heap
page read and write
27E0000
unkown
page execute and read and write
5AF7000
trusted library allocation
page read and write
2A1E000
stack
page read and write
1BD779D3000
heap
page read and write
4E61000
heap
page read and write
1BD779BB000
heap
page read and write
1BD776D9000
heap
page read and write
7DF4B645D000
unkown
page readonly
DA8000
heap
page read and write
4E61000
heap
page read and write
5A21000
trusted library allocation
page read and write
1BD779AB000
heap
page read and write
5300000
heap
page read and write
1BD779BB000
heap
page read and write
5ADB000
trusted library allocation
page read and write
339D000
heap
page read and write
5158000
heap
page read and write
1BD77960000
heap
page read and write
1BD77797000
heap
page read and write
5A24000
trusted library allocation
page read and write
1BD779BB000
heap
page read and write
1BD779BB000
heap
page read and write
1BD779D3000
heap
page read and write
ABA000
unkown
page readonly
1BD7798B000
heap
page read and write
FB2000
heap
page read and write
51DF000
stack
page read and write
1BD779C3000
heap
page read and write
1BD779D3000
heap
page read and write
4E61000
heap
page read and write
1BD779DB000
heap
page read and write
1BD77A23000
heap
page read and write
73F02FE000
stack
page read and write
1BD7794A000
heap
page read and write
1BD77A53000
heap
page read and write
CE0000
unkown
page readonly
1BD779D3000
heap
page read and write
4E61000
heap
page read and write
40FD000
heap
page read and write
5AE2000
trusted library allocation
page read and write
DA7000
heap
page read and write
5AED000
trusted library allocation
page read and write
7A8000
heap
page read and write
1BD77A03000
heap
page read and write
17E0000
trusted library allocation
page read and write
1BD779BB000
heap
page read and write
1BD779EB000
heap
page read and write
1BD779EB000
heap
page read and write
D1A000
heap
page read and write
2C0E000
stack
page read and write
1BD77A03000
heap
page read and write
2B7F000
stack
page read and write
4E61000
heap
page read and write
5A28000
trusted library allocation
page read and write
1BD779C3000
heap
page read and write
2EFA000
heap
page read and write
4731000
heap
page read and write
1BD779C3000
heap
page read and write
1BD77A0B000
heap
page read and write
1BD77A33000
heap
page read and write
2BC4000
heap
page read and write
5AE5000
trusted library allocation
page read and write
26EF000
stack
page read and write
4731000
heap
page read and write
1BD77AF0000
heap
page read and write
2BC4000
heap
page read and write
1BD77792000
heap
page read and write
2BC4000
heap
page read and write
1BD77768000
heap
page read and write
1754000
heap
page read and write
4E61000
heap
page read and write
1BD779EB000
heap
page read and write
4E61000
heap
page read and write
1BD779D3000
heap
page read and write
4E61000
heap
page read and write
5A28000
trusted library allocation
page read and write
1BD779DB000
heap
page read and write
5060000
heap
page read and write
1BD779BB000
heap
page read and write
1BD779D3000
heap
page read and write
4073000
heap
page read and write
1BD779DB000
heap
page read and write
1BD779BB000
heap
page read and write
1BD779EB000
heap
page read and write
31DA000
heap
page read and write
5A20000
trusted library allocation
page read and write
1BD776E0000
heap
page read and write
FA0000
heap
page read and write
5158000
heap
page read and write
A35000
heap
page read and write
1BD779CC000
heap
page read and write
2C7E000
stack
page read and write
2BC0000
heap
page read and write
1BD776F5000
heap
page read and write
210000
unkown
page write copy
1BD7797A000
heap
page read and write
1BD779C3000
heap
page read and write
9CF000
stack
page read and write
1BD77778000
heap
page read and write
338E000
heap
page read and write
5A20000
trusted library allocation
page read and write
There are 2073 hidden memdumps, click here to show them.