IOC Report
CMTNGTFESJRKMAMSPWITGCAGOVGAFQODETEHLFVAACNQUJQP.jar

loading gif

Files

File Path
Type
Category
Malicious
CMTNGTFESJRKMAMSPWITGCAGOVGAFQODETEHLFVAACNQUJQP.jar
Zip archive data, at least v2.0 to extract
initial sample
malicious
C:\ProgramData\Oracle\Java\.oracle_jre_usage\cce3fe3b0d8d83e2.timestamp
ASCII text, with CRLF line terminators
dropped
C:\cmdlinestart.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\CMTNGTFESJRKMAMSPWITGCAGOVGAFQODETEHLFVAACNQUJQP.jar"" >> C:\cmdlinestart.log 2>&1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe
"C:\Program Files (x86)\Java\jre1.8.0_211\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\CMTNGTFESJRKMAMSPWITGCAGOVGAFQODETEHLFVAACNQUJQP.jar"
C:\Windows\SysWOW64\icacls.exe
C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://java.oracle.com/
unknown
http://bugreport.sun.com/bugreport/
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
49FB000
trusted library allocation
page read and write
1CE29060000
heap
page read and write
2978C102000
heap
page read and write
1CE291E2000
heap
page read and write
1D01DD02000
heap
page read and write
1CE27FFF000
heap
page read and write
1CE29044000
heap
page read and write
31A4978000
stack
page read and write
1CE27F3D000
heap
page read and write
1CE27E34000
heap
page read and write
193680C0000
heap
page read and write
1CE2799C000
trusted library allocation
page read and write
1CE27F63000
heap
page read and write
1CE27F04000
heap
page read and write
1CE21E2F000
heap
page read and write
4BA5000
trusted library allocation
page read and write
1CE291E2000
heap
page read and write
21DB0076000
heap
page read and write
1D01E202000
trusted library allocation
page read and write
1CE2786A000
trusted library allocation
page read and write
1CE291ED000
heap
page read and write
6335BFA000
stack
page read and write
1CE229C4000
heap
page read and write
2409D813000
heap
page read and write
4BFC000
trusted library allocation
page read and write
19FBE152000
heap
page read and write
4BB1000
trusted library allocation
page read and write
F0FDB7E000
stack
page read and write
1CE27E2F000
heap
page read and write
2493000
trusted library allocation
page read and write
1CE29045000
heap
page read and write
4BC2000
trusted library allocation
page read and write
4B59000
trusted library allocation
page read and write
599217B000
stack
page read and write
1CE29044000
heap
page read and write
1CE27F6D000
heap
page read and write
1CE21DD0000
heap
page read and write
482A000
trusted library allocation
page read and write
1CE27BA0000
remote allocation
page read and write
1CE27840000
trusted library allocation
page read and write
4B31000
trusted library allocation
page read and write
4B8A000
trusted library allocation
page read and write
1CE22802000
heap
page read and write
FAFB9FC000
stack
page read and write
1CE2907C000
heap
page read and write
1CE29131000
heap
page read and write
4BD0000
trusted library allocation
page read and write
1CE21E13000
heap
page read and write
1CE290EB000
heap
page read and write
4869000
trusted library allocation
page read and write
1CE27F6C000
heap
page read and write
4BA8000
trusted library allocation
page read and write
4B66AFB000
stack
page read and write
1CE29006000
heap
page read and write
1CE291E2000
heap
page read and write
31A4D78000
stack
page read and write
2980000
heap
page read and write
1CE29085000
heap
page read and write
1CE23660000
trusted library allocation
page read and write
1CE21E00000
heap
page read and write
4A93000
trusted library allocation
page read and write
B7C795B000
stack
page read and write
1CE27FF0000
heap
page read and write
4BBA000
trusted library allocation
page read and write
9105B7E000
stack
page read and write
1CE29102000
heap
page read and write
1CE27FCD000
heap
page read and write
14EE6000
trusted library allocation
page read and write
19368308000
heap
page read and write
1CE27F7B000
heap
page read and write
4C3C000
trusted library allocation
page read and write
BF761FB000
stack
page read and write
4AB5000
trusted library allocation
page read and write
1CE2904B000
heap
page read and write
49F1000
trusted library allocation
page read and write
49E0000
trusted library allocation
page read and write
2978C077000
heap
page read and write
1CE27F03000
heap
page read and write
1CE27E61000
heap
page read and write
19FBD7D0000
heap
page read and write
19FBDA13000
heap
page read and write
19FBE196000
heap
page read and write
1CB40FE000
stack
page read and write
1CB447C000
stack
page read and write
19FBE602000
heap
page read and write
1CE27FCD000
heap
page read and write
19FBDA70000
heap
page read and write
1CE27832000
trusted library allocation
page read and write
4B94000
trusted library allocation
page read and write
1CE27F64000
heap
page read and write
2712000
trusted library allocation
page execute and read and write
1CE27F63000
heap
page read and write
31A4EFE000
stack
page read and write
20A66000000
heap
page read and write
1CE27FCD000
heap
page read and write
1CE27960000
trusted library allocation
page read and write
20A602FD000
heap
page read and write
14DB6000
trusted library allocation
page read and write
1CE27F64000
heap
page read and write
24796079000
heap
page read and write
1CE27820000
trusted library allocation
page read and write
4BAF000
trusted library allocation
page read and write
19FBDAB1000
heap
page read and write
19FBE196000
heap
page read and write
19FBDA3C000
heap
page read and write
1534E000
stack
page read and write
20A60A02000
heap
page read and write
1CE2906C000
heap
page read and write
1CE29048000
heap
page read and write
4B666CC000
stack
page read and write
910617F000
stack
page read and write
1CE23000000
trusted library allocation
page read and write
1CE27F6B000
heap
page read and write
1CE29E02000
heap
page read and write
19368256000
heap
page read and write
19FBE194000
heap
page read and write
21DB0042000
heap
page read and write
1CE27FFF000
heap
page read and write
24796100000
heap
page read and write
1CE2903F000
heap
page read and write
19368313000
heap
page read and write
1CE27F43000
heap
page read and write
1CE27F64000
heap
page read and write
1CE27F63000
heap
page read and write
4B4D000
trusted library allocation
page read and write
1CE27E34000
heap
page read and write
1CE27F3D000
heap
page read and write
1D01D9C0000
heap
page read and write
1CE29058000
heap
page read and write
1CE27820000
trusted library allocation
page read and write
2409D802000
heap
page read and write
1CE27E62000
heap
page read and write
FAFB47E000
stack
page read and write
1CE2910D000
heap
page read and write
1CB49FA000
stack
page read and write
2F37000
heap
page read and write
1CE291CB000
heap
page read and write
633537B000
stack
page read and write
4B8C000
trusted library allocation
page read and write
1CE229BF000
heap
page read and write
4AA2000
trusted library allocation
page read and write
1CE27E58000
heap
page read and write
4AA5000
trusted library allocation
page read and write
2C3C000
stack
page read and write
1CE2271D000
heap
page read and write
1CE29199000
heap
page read and write
4AC2000
trusted library allocation
page read and write
4C3F000
trusted library allocation
page read and write
1CE279D0000
trusted library allocation
page read and write
1CE27820000
trusted library allocation
page read and write
4BFA000
trusted library allocation
page read and write
24095E88000
heap
page read and write
1CE27E2D000
heap
page read and write
49F3000
trusted library allocation
page read and write
1CE27E2F000
heap
page read and write
1CE27E50000
heap
page read and write
1CE29017000
heap
page read and write
1CE27F3C000
heap
page read and write
20A657B0000
trusted library allocation
page read and write
1CE29089000
heap
page read and write
1CE29052000
heap
page read and write
1936828A000
heap
page read and write
1506E000
unkown
page read and write
1CE27E3F000
heap
page read and write
1CE290E7000
heap
page read and write
1E7C5702000
heap
page read and write
599237E000
stack
page read and write
20A65890000
trusted library allocation
page read and write
5991CFC000
stack
page read and write
24795E50000
heap
page read and write
2AFE0426000
heap
page read and write
1CE27F6B000
heap
page read and write
1CE290AD000
heap
page read and write
BF75F7B000
stack
page read and write
1CE29009000
heap
page read and write
19FBE184000
heap
page read and write
1CE2906B000
heap
page read and write
1CE29163000
heap
page read and write
1CE290E2000
heap
page read and write
1CE27F3C000
heap
page read and write
480D000
trusted library allocation
page read and write
1CE21E6B000
heap
page read and write
1CE27F06000
heap
page read and write
1D01E1B0000
remote allocation
page read and write
1CE290D6000
heap
page read and write
4BCB000
trusted library allocation
page read and write
1CE29E03000
heap
page read and write
1CE27E26000
heap
page read and write
1CE27F02000
heap
page read and write
1CE27F3C000
heap
page read and write
20A6028C000
heap
page read and write
1CE290F7000
heap
page read and write
1CE27F08000
heap
page read and write
1CE29034000
heap
page read and write
F0FDAF8000
stack
page read and write
19FBDA4B000
heap
page read and write
4B46000
trusted library allocation
page read and write
1CE2900B000
heap
page read and write
20A612A0000
trusted library section
page readonly
1CE22530000
trusted library allocation
page read and write
1CB45FA000
stack
page read and write
1CE29168000
heap
page read and write
19FBDAE2000
heap
page read and write
1CE2908F000
heap
page read and write
BF767FE000
stack
page read and write
1CE2912A000
heap
page read and write
1CE22602000
heap
page read and write
1CE27F6B000
heap
page read and write
4BC9000
trusted library allocation
page read and write
1CE27834000
trusted library allocation
page read and write
1CE21E54000
heap
page read and write
153F9000
trusted library allocation
page read and write
1D01DC40000
heap
page read and write
1CE27E2F000
heap
page read and write
9105FF7000
stack
page read and write
1CE290AB000
heap
page read and write
20A60293000
heap
page read and write
4B1C000
trusted library allocation
page read and write
46C0000
trusted library allocation
page read and write
1CE290F4000
heap
page read and write
1CE27E69000
heap
page read and write
1CE29008000
heap
page read and write
2409D83C000
heap
page read and write
2DAE000
stack
page read and write
24095DF0000
heap
page read and write
1CE29067000
heap
page read and write
1CE2905A000
heap
page read and write
1CE290A0000
heap
page read and write
19FBE002000
heap
page read and write
1CE291E2000
heap
page read and write
9DD6000
trusted library allocation
page read and write
21DB0063000
heap
page read and write
1B9ACA80000
heap
page read and write
20A65A2C000
heap
page read and write
484E000
trusted library allocation
page read and write
1CE2905B000
heap
page read and write
1CE27834000
trusted library allocation
page read and write
4ABE000
trusted library allocation
page read and write
1CE27BA0000
remote allocation
page read and write
1CE21E5C000
heap
page read and write
20A60257000
heap
page read and write
1CE291F9000
heap
page read and write
4ACE000
trusted library allocation
page read and write
1CE278AC000
trusted library allocation
page read and write
1CE29139000
heap
page read and write
1CE29044000
heap
page read and write
1CE27F07000
heap
page read and write
1CE2280A000
heap
page read and write
1CE27F8A000
heap
page read and write
4BD5000
trusted library allocation
page read and write
1CE2906A000
heap
page read and write
1CE229C4000
heap
page read and write
2648000
trusted library allocation
page read and write
1CE27A40000
trusted library allocation
page read and write
1CE2904C000
heap
page read and write
1CE27E26000
heap
page read and write
2DF0000
trusted library allocation
page read and write
4B7E000
trusted library allocation
page read and write
1CE27834000
trusted library allocation
page read and write
24796002000
heap
page read and write
1CE27F69000
heap
page read and write
4B35000
trusted library allocation
page read and write
1CE27E38000
heap
page read and write
1CE2904A000
heap
page read and write
1CE2799C000
trusted library allocation
page read and write
4B66BFB000
stack
page read and write
4814000
trusted library allocation
page read and write
4C02000
trusted library allocation
page read and write
19FBE188000
heap
page read and write
1936827F000
heap
page read and write
4B6A000
trusted library allocation
page read and write
20A609E1000
trusted library allocation
page read and write
4ACC000
trusted library allocation
page read and write
25B0000
heap
page read and write
1CE21E6E000
heap
page read and write
1CE27980000
trusted library allocation
page read and write
19FBDAAB000
heap
page read and write
19FBE1B8000
heap
page read and write
1CE27800000
trusted library allocation
page read and write
1CE29180000
heap
page read and write
2AFE0640000
heap
page read and write
9105EFB000
stack
page read and write
20A65A2A000
heap
page read and write
1CE27801000
trusted library allocation
page read and write
20A60A15000
heap
page read and write
1CE29006000
heap
page read and write
20A65A4B000
heap
page read and write
4C08000
trusted library allocation
page read and write
4B44000
trusted library allocation
page read and write
1CE2908B000
heap
page read and write
1CE29148000
heap
page read and write
1CE29166000
heap
page read and write
4AC9000
trusted library allocation
page read and write
1CE29195000
heap
page read and write
1CE27E39000
heap
page read and write
1CE29016000
heap
page read and write
21DB0062000
heap
page read and write
1CE229BF000
heap
page read and write
1CE229C4000
heap
page read and write
24795E60000
heap
page read and write
2702000
trusted library allocation
page execute and read and write
1CE22956000
heap
page read and write
20A658B0000
trusted library allocation
page read and write
1CE27F3D000
heap
page read and write
4B64000
trusted library allocation
page read and write
19FBE165000
heap
page read and write
1CE2786E000
trusted library allocation
page read and write
1CE229C4000
heap
page read and write
19FBDA4D000
heap
page read and write
1CE27E26000
heap
page read and write
4B9A000
trusted library allocation
page read and write
1CE229BF000
heap
page read and write
19FBE189000
heap
page read and write
BF766FF000
stack
page read and write
1CE27F7B000
heap
page read and write
1CE2903B000
heap
page read and write
20A60276000
heap
page read and write
19368200000
heap
page read and write
20A65ADE000
heap
page read and write
24096602000
heap
page read and write
1CE27980000
trusted library allocation
page read and write
1CE229A3000
heap
page read and write
1CE29044000
heap
page read and write
1CE229D3000
heap
page read and write
1CB487F000
stack
page read and write
1CE291E2000
heap
page read and write
1CE2786A000
trusted library allocation
page read and write
14C29000
trusted library allocation
page read and write
1CE290A1000
heap
page read and write
2DEE000
stack
page read and write
1CE29083000
heap
page read and write
1CE27F65000
heap
page read and write
1CE291AB000
heap
page read and write
19FBE177000
heap
page read and write
1D01DBF0000
trusted library allocation
page read and write
4CE0EFE000
stack
page read and write
7FB000
heap
page read and write
2AFE0421000
heap
page read and write
1CE29097000
heap
page read and write
21DB007A000
heap
page read and write
24096700000
heap
page read and write
19FBD7E0000
heap
page read and write
2409D88A000
heap
page read and write
4BB5000
trusted library allocation
page read and write
1CE291D4000
heap
page read and write
1CE27E61000
heap
page read and write
21DB005E000
heap
page read and write
24796013000
heap
page read and write
20A657A0000
trusted library allocation
page read and write
1CE29114000
heap
page read and write
4C0F000
trusted library allocation
page read and write
1CE2799C000
trusted library allocation
page read and write
1CE229C4000
heap
page read and write
21DB004D000
heap
page read and write
1CE27FFF000
heap
page read and write
1CE22550000
trusted library allocation
page read and write
24095E13000
heap
page read and write
153CC000
trusted library allocation
page read and write
1CE29069000
heap
page read and write
2763000
trusted library allocation
page execute and read and write
1E7C5644000
heap
page read and write
1CE27E5B000
heap
page read and write
24796113000
heap
page read and write
1CB41FB000
stack
page read and write
1CE291B2000
heap
page read and write
19FBE186000
heap
page read and write
1CE291E3000
heap
page read and write
4B5B000
trusted library allocation
page read and write
A4F000
stack
page read and write
6335DFE000
stack
page read and write
1CE27842000
trusted library allocation
page read and write
1CB5075000
stack
page read and write
1CE27980000
trusted library allocation
page read and write
1CE2915E000
heap
page read and write
4A98000
trusted library allocation
page read and write
1CE2909C000
heap
page read and write
4ABC000
trusted library allocation
page read and write
21DB005A000
heap
page read and write
6335F7F000
stack
page read and write
4C28000
trusted library allocation
page read and write
4C39000
trusted library allocation
page read and write
1CE27F6B000
heap
page read and write
1CE27994000
trusted library allocation
page read and write
20A6029E000
heap
page read and write
1E7C563C000
heap
page read and write
19368050000
heap
page read and write
1CE27F02000
heap
page read and write
1CE2907E000
heap
page read and write
1CE27F64000
heap
page read and write
F0FDA7C000
stack
page read and write
FAFB67B000
stack
page read and write
19FBE17A000
heap
page read and write
1CE2910B000
heap
page read and write
2D60000
heap
page read and write
1CE22900000
heap
page read and write
1CE29039000
heap
page read and write
1CE27990000
trusted library allocation
page read and write
1CE27F2E000
heap
page read and write
21DB0061000
heap
page read and write
1CE291E4000
heap
page read and write
1CE2904A000
heap
page read and write
2978C065000
heap
page read and write
2978BDF0000
heap
page read and write
1CE27F5E000
heap
page read and write
1CE229CA000
heap
page read and write
20A65770000
trusted library allocation
page read and write
1CE27E34000
heap
page read and write
1CE225A0000
trusted library allocation
page read and write
20A65A64000
heap
page read and write
9DD4000
trusted library allocation
page read and write
19FBE196000
heap
page read and write
19FBE17A000
heap
page read and write
1B9ACD08000
heap
page read and write
4BDB000
trusted library allocation
page read and write
1CE2900A000
heap
page read and write
1CE27E26000
heap
page read and write
1CE27828000
trusted library allocation
page read and write
1CE27E53000
heap
page read and write
1B9ACC7E000
heap
page read and write
4CE0AFE000
stack
page read and write
1CE27F3D000
heap
page read and write
14FDE000
unkown
page read and write
1548E000
trusted library allocation
page read and write
1CE27994000
trusted library allocation
page read and write
1527F000
unkown
page read and write
19FBDB16000
heap
page read and write
20A65A3E000
heap
page read and write
1CE27990000
trusted library allocation
page read and write
1CE22754000
heap
page read and write
19FBE19A000
heap
page read and write
1CE21D60000
heap
page read and write
483D000
trusted library allocation
page read and write
24095E3E000
heap
page read and write
1CE28010000
heap
page read and write
1CE2915A000
heap
page read and write
1CE27800000
trusted library allocation
page read and write
1CE27E2F000
heap
page read and write
21DB0602000
trusted library allocation
page read and write
2409D660000
heap
page read and write
7F0000
heap
page read and write
4BC6000
trusted library allocation
page read and write
1B9ACA70000
heap
page read and write
1CE227AD000
heap
page read and write
1CE29170000
heap
page read and write
4832000
trusted library allocation
page read and write
4857000
trusted library allocation
page read and write
1CE2906B000
heap
page read and write
1CE290BF000
heap
page read and write
1CB47FE000
stack
page read and write
4C12000
trusted library allocation
page read and write
1CE27E2F000
heap
page read and write
1CE27F3C000
heap
page read and write
1CE21F8E000
heap
page read and write
4B667CE000
stack
page read and write
1CE29071000
heap
page read and write
20A60313000
heap
page read and write
1CE27E26000
heap
page read and write
20A65AF5000
heap
page read and write
1CE27AA0000
trusted library allocation
page read and write
20A65AA4000
heap
page read and write
1CE29179000
heap
page read and write
1CE291CB000
heap
page read and write
1CE27E69000
heap
page read and write
1CE27E02000
heap
page read and write
1CE27E48000
heap
page read and write
19FBDAF4000
heap
page read and write
1CE29157000
heap
page read and write
1CE2799C000
trusted library allocation
page read and write
4B3E000
trusted library allocation
page read and write
4C43000
trusted library allocation
page read and write
1CE29045000
heap
page read and write
1CE27994000
trusted library allocation
page read and write
4BF0000
trusted library allocation
page read and write
484C000
trusted library allocation
page read and write
1CE29063000
heap
page read and write
31A4A77000
stack
page read and write
19FBE17E000
heap
page read and write
20A60271000
heap
page read and write
4CE0B7E000
stack
page read and write
B7C7CFE000
stack
page read and write
20A60229000
heap
page read and write
1CE29044000
heap
page read and write
1CE27E61000
heap
page read and write
1CE22950000
heap
page read and write
1CB4C7A000
stack
page read and write
1CE2905B000
heap
page read and write
21DB007D000
heap
page read and write
1CE2786E000
trusted library allocation
page read and write
1CE27E62000
heap
page read and write
1CE22957000
heap
page read and write
1CE29050000
heap
page read and write
1CE2910F000
heap
page read and write
1CE291D4000
heap
page read and write
BF75B0C000
stack
page read and write
1CE27FBE000
heap
page read and write
2409D85F000
heap
page read and write
1CE22702000
heap
page read and write
1CE29006000
heap
page read and write
24095F02000
heap
page read and write
19FBE17A000
heap
page read and write
1CE27F03000
heap
page read and write
1CE27FC0000
heap
page read and write
B7C7F7E000
stack
page read and write
1CE229C4000
heap
page read and write
2AFE0435000
heap
page read and write
1CE27F6C000
heap
page read and write
1CE27F7B000
heap
page read and write
1CE27830000
trusted library allocation
page read and write
19FBE1A7000
heap
page read and write
9DC5000
trusted library allocation
page read and write
4B5E000
trusted library allocation
page read and write
20A658A0000
trusted library allocation
page read and write
1CE27F6D000
heap
page read and write
1CE29044000
heap
page read and write
1CE27F3D000
heap
page read and write
1CE27F3D000
heap
page read and write
4AD1000
trusted library allocation
page read and write
1CE29161000
heap
page read and write
1CE29177000
heap
page read and write
19FBE160000
heap
page read and write
19FBE1B8000
heap
page read and write
1CE29008000
heap
page read and write
B7C807D000
stack
page read and write
1CE22988000
heap
page read and write
59920FD000
stack
page read and write
B7C81FD000
stack
page read and write
1CE27E2D000
heap
page read and write
2978BF50000
trusted library allocation
page read and write
1CE29044000
heap
page read and write
FAFBAFF000
stack
page read and write
14CC1000
trusted library allocation
page read and write
1CE27FEF000
heap
page read and write
1CE22729000
heap
page read and write
4BA1000
trusted library allocation
page read and write
1CE27F3C000
heap
page read and write
1CE235E0000
trusted library section
page readonly
19FBDA53000
heap
page read and write
1CE27F3C000
heap
page read and write
4B6674E000
stack
page read and write
FAFB15B000
stack
page read and write
1CE27F70000
heap
page read and write
21DB0000000
heap
page read and write
A923B9B000
stack
page read and write
F1B76FF000
stack
page read and write
1501E000
stack
page read and write
1CE2918A000
heap
page read and write
1CE2905E000
heap
page read and write
19FBE196000
heap
page read and write
1E7C5613000
heap
page read and write
1CE229BF000
heap
page read and write
20A65A00000
heap
page read and write
1CE229AE000
heap
page read and write
1CE2904E000
heap
page read and write
2AFE0437000
heap
page read and write
1CE27836000
trusted library allocation
page read and write
20A61270000
trusted library section
page readonly
1CE2781C000
trusted library allocation
page read and write
1CE29044000
heap
page read and write
1CE2783A000
trusted library allocation
page read and write
1CE27E61000
heap
page read and write
1CE291DB000
heap
page read and write
1CE291E4000
heap
page read and write
1CE2917B000
heap
page read and write
1CE27830000
trusted library allocation
page read and write
1CE27A80000
trusted library allocation
page read and write
24095D90000
heap
page read and write
24095E6C000
heap
page read and write
1CE290B9000
heap
page read and write
20A60980000
trusted library section
page read and write
1CE291CB000
heap
page read and write
1CE29127000
heap
page read and write
14F8E000
stack
page read and write
49EC000
trusted library allocation
page read and write
19FBE644000
heap
page read and write
1CE21E62000
heap
page read and write
1CE27FFF000
heap
page read and write
4B23000
trusted library allocation
page read and write
6335EFF000
stack
page read and write
19FBDA49000
heap
page read and write
4B9F000
trusted library allocation
page read and write
26FA000
trusted library allocation
page execute and read and write
1CE27FE7000
heap
page read and write
1CE290F6000
heap
page read and write
1CE2905E000
heap
page read and write
1CE27980000
trusted library allocation
page read and write
1CE27E55000
heap
page read and write
21DB0060000
heap
page read and write
A92437E000
stack
page read and write
1CE29052000
heap
page read and write
19FBDA52000
heap
page read and write
1522E000
stack
page read and write
1CE229B0000
heap
page read and write
1CE27E00000
heap
page read and write
F1B6F4C000
stack
page read and write
1CE29005000
heap
page read and write
1CE27F63000
heap
page read and write
1CE290CA000
heap
page read and write
49E8000
trusted library allocation
page read and write
1E7C5637000
heap
page read and write
1CE21E44000
heap
page read and write
1E7C564E000
heap
page read and write
4830000
trusted library allocation
page read and write
19FBDA54000
heap
page read and write
1CE21E85000
heap
page read and write
1D01DC00000
heap
page read and write
1CE27F7B000
heap
page read and write
1CE27FC7000
heap
page read and write
24796029000
heap
page read and write
19FBDAC3000
heap
page read and write
4B50000
trusted library allocation
page read and write
1CB48FF000
stack
page read and write
1CE27E2F000
heap
page read and write
2409E002000
trusted library allocation
page read and write
1CE29065000
heap
page read and write
1CB4F7E000
stack
page read and write
4C37000
trusted library allocation
page read and write
2AFE044F000
heap
page read and write
24796802000
trusted library allocation
page read and write
25A0000
unkown
page read and write
1CE2906A000
heap
page read and write
21DAFDD0000
heap
page read and write
1CE2904A000
heap
page read and write
1CE291CB000
heap
page read and write
24095ECC000
heap
page read and write
2978BDE0000
heap
page read and write
1CE229BF000
heap
page read and write
1CE29061000
heap
page read and write
1CE29087000
heap
page read and write
1CE2904C000
heap
page read and write
26C2000
trusted library allocation
page execute and read and write
1CE27F6A000
heap
page read and write
1CE29007000
heap
page read and write
1CE290F3000
heap
page read and write
4C1B000
trusted library allocation
page read and write
4B4B000
trusted library allocation
page read and write
1B9ACC4C000
heap
page read and write
1CE29102000
heap
page read and write
1CE27E61000
heap
page read and write
FAFB8FF000
stack
page read and write
21DB0013000
heap
page read and write
7D0000
trusted library allocation
page read and write
1CE27FE2000
heap
page read and write
1CE276F0000
trusted library allocation
page read and write
1CE27F17000
heap
page read and write
1CE27E34000
heap
page read and write
1CE27970000
trusted library allocation
page read and write
1CE291CB000
heap
page read and write
1CE291D4000
heap
page read and write
1CE29002000
heap
page read and write
1CE29049000
heap
page read and write
1CE27F03000
heap
page read and write
1CE29054000
heap
page read and write
1D01E1B0000
remote allocation
page read and write
49EF000
trusted library allocation
page read and write
1CE291E2000
heap
page read and write
1CE29040000
heap
page read and write
1CE2799C000
trusted library allocation
page read and write
20A61280000
trusted library section
page readonly
1CE27E3C000
heap
page read and write
1CE29087000
heap
page read and write
2409D825000
heap
page read and write
1CE27FFF000
heap
page read and write
1B9ACC88000
heap
page read and write
1CE229F0000
heap
page read and write
1CE2298C000
heap
page read and write
19FBDB08000
heap
page read and write
19FBE186000
heap
page read and write
4ABA000
trusted library allocation
page read and write
1B9ACC70000
heap
page read and write
1CE27FF7000
heap
page read and write
1CE29192000
heap
page read and write
1CE29105000
heap
page read and write
4BED000
trusted library allocation
page read and write
1CE229C4000
heap
page read and write
1E7C5629000
heap
page read and write
20A61170000
trusted library allocation
page read and write
1CE27FEF000
heap
page read and write
1CE27F64000
heap
page read and write
1CE291E4000
heap
page read and write
67C000
stack
page read and write
1B9ACC29000
heap
page read and write
1CE29151000
heap
page read and write
1CE2782C000
trusted library allocation
page read and write
1CE27F6B000
heap
page read and write
1CE27F03000
heap
page read and write
1E7C5649000
heap
page read and write
21DB0102000
heap
page read and write
49E2000
trusted library allocation
page read and write
1CE229F0000
heap
page read and write
910637E000
stack
page read and write
1B9ACC4B000
heap
page read and write
20A60200000
heap
page read and write
1CE276E0000
trusted library allocation
page read and write
6335CFB000
stack
page read and write
20A657B4000
trusted library allocation
page read and write
20A65790000
trusted library allocation
page read and write
2AFE0645000
heap
page read and write
1CE27F64000
heap
page read and write
1CE229C4000
heap
page read and write
1936824B000
heap
page read and write
21DB0056000
heap
page read and write
4BAA000
trusted library allocation
page read and write
4804000
trusted library allocation
page read and write
1CB4AFE000
stack
page read and write
1CE2917C000
heap
page read and write
19368213000
heap
page read and write
599247C000
stack
page read and write
1CE27F03000
heap
page read and write
21DB0029000
heap
page read and write
1CE27842000
trusted library allocation
page read and write
1CE235F0000
trusted library section
page readonly
A924279000
stack
page read and write
20A615F0000
trusted library allocation
page read and write
FAFB7F7000
stack
page read and write
19FBE5A0000
remote allocation
page read and write
4AA7000
trusted library allocation
page read and write
486C000
trusted library allocation
page read and write
20A658D0000
remote allocation
page read and write
1CE27A30000
trusted library allocation
page read and write
19FBE177000
heap
page read and write
1E7C5500000
heap
page read and write
1CE2905F000
heap
page read and write
20A65880000
trusted library allocation
page read and write
19FBE173000
heap
page read and write
1CE27C60000
trusted library allocation
page read and write
1CE27840000
trusted library allocation
page read and write
1CE27F63000
heap
page read and write
1CE2918E000
heap
page read and write
19FBDA4C000
heap
page read and write
1D01D9B0000
heap
page read and write
1CE27E2D000
heap
page read and write
1CE229AE000
heap
page read and write
63361FF000
stack
page read and write
19FBDA4F000
heap
page read and write
1CE29013000
heap
page read and write
1CE21F13000
heap
page read and write
1CE2906C000
heap
page read and write
1CE291E2000
heap
page read and write
19FBDAA8000
heap
page read and write
4C46000
trusted library allocation
page read and write
1CE290AC000
heap
page read and write
49E6000
trusted library allocation
page read and write
1CE2905D000
heap
page read and write
31A4B7F000
stack
page read and write
21DAFE40000
heap
page read and write
2AFE0433000
heap
page read and write
1CE229C0000
heap
page read and write
2978C029000
heap
page read and write
2978C05B000
heap
page read and write
1CE2908F000
heap
page read and write
B7C7E7E000
stack
page read and write
480A000
trusted library allocation
page read and write
1CE29109000
heap
page read and write
20A65AA1000
heap
page read and write
1CE27F63000
heap
page read and write
2978C013000
heap
page read and write
1CE2906B000
heap
page read and write
5991F7E000
stack
page read and write
1CE278A0000
trusted library allocation
page read and write
2409D902000
heap
page read and write
1CE22730000
heap
page read and write
4B97000
trusted library allocation
page read and write
19FBE177000
heap
page read and write
6335D7E000
stack
page read and write
599189B000
stack
page read and write
1CE27E2D000
heap
page read and write
1CE2909E000
heap
page read and write
1539F000
unkown
page read and write
1CE290E5000
heap
page read and write
4B66EFD000
stack
page read and write
24095F13000
heap
page read and write
1CE279E0000
trusted library allocation
page read and write
1CE229D4000
heap
page read and write
1CE2783C000
trusted library allocation
page read and write
1CE27BC0000
trusted library allocation
page read and write
1CE27F3C000
heap
page read and write
B60000
heap
page read and write
1CE29107000
heap
page read and write
1CE290E1000
heap
page read and write
1CE290E0000
heap
page read and write
1CE27E5F000
heap
page read and write
1CE27F7B000
heap
page read and write
1CE29076000
heap
page read and write
1CE227C4000
heap
page read and write
20A65840000
trusted library allocation
page read and write
1CE21E92000
heap
page read and write
2409D829000
heap
page read and write
19FBE602000
heap
page read and write
1CE229BF000
heap
page read and write
2410000
heap
page read and write
24095EE2000
heap
page read and write
1CE27FCD000
heap
page read and write
1CE29045000
heap
page read and write
19FBE1A8000
heap
page read and write
1CE29189000
heap
page read and write
1CE27F3C000
heap
page read and write
1CE29046000
heap
page read and write
19FBE199000
heap
page read and write
1CE27E34000
heap
page read and write
1CE27F64000
heap
page read and write
4A9A000
trusted library allocation
page read and write
1B9ACC4F000
heap
page read and write
F1B75FF000
stack
page read and write
4802000
trusted library allocation
page read and write
1CE27F3D000
heap
page read and write
19FBE188000
heap
page read and write
1CE27FC9000
heap
page read and write
19FBE1A7000
heap
page read and write
1CE27E26000
heap
page read and write
63359FA000
stack
page read and write
1CE29077000
heap
page read and write
1CE22700000
heap
page read and write
1D01DA20000
heap
page read and write
1CE29098000
heap
page read and write
1CE27825000
trusted library allocation
page read and write
4C41000
trusted library allocation
page read and write
20A600A0000
heap
page read and write
1CE22972000
heap
page read and write
4B66FFE000
stack
page read and write
1CE279F0000
trusted library allocation
page read and write
1CE29100000
heap
page read and write
1CE27FCD000
heap
page read and write
1CE2903D000
heap
page read and write
1CE27E55000
heap
page read and write
2978C065000
heap
page read and write
4BF2000
trusted library allocation
page read and write
4B56000
trusted library allocation
page read and write
24095EC9000
heap
page read and write
14DAE000
trusted library allocation
page read and write
19FBE186000
heap
page read and write
4B3B000
trusted library allocation
page read and write
20A65650000
trusted library allocation
page read and write
21DB005F000
heap
page read and write
F0FDBFE000
stack
page read and write
1CE27F6B000
heap
page read and write
1CE27FCE000
heap
page read and write
1CE27820000
trusted library allocation
page read and write
1CE27830000
trusted library allocation
page read and write
7C0000
heap
page read and write
1CE27E2F000
heap
page read and write
1CE278C0000
trusted library allocation
page read and write
2978BE50000
heap
page read and write
4B70000
trusted library allocation
page read and write
1CE291E2000
heap
page read and write
1CE27F5E000
heap
page read and write
1CE27FEA000
heap
page read and write
1CE29000000
heap
page read and write
1CE29047000
heap
page read and write
1CE27FFF000
heap
page read and write
20A60C01000
trusted library allocation
page read and write
25C0000
trusted library allocation
page read and write
1CE29002000
heap
page read and write
1CE27E34000
heap
page read and write
1CE290A0000
heap
page read and write
19368302000
heap
page read and write
1CE29006000
heap
page read and write
20A602BB000
heap
page read and write
1CE227C8000
heap
page read and write
14E53000
trusted library allocation
page read and write
1CE2271D000
heap
page read and write
29ED000
stack
page read and write
19368229000
heap
page read and write
1CE27FCD000
heap
page read and write
1CE29081000
heap
page read and write
1CE29142000
heap
page read and write
1CE2906B000
heap
page read and write
20A65A5E000
heap
page read and write
1CE229BF000
heap
page read and write
1CE27E61000
heap
page read and write
485F000
trusted library allocation
page read and write
4CE0FFF000
stack
page read and write
1CE2799C000
trusted library allocation
page read and write
1CE27885000
trusted library allocation
page read and write
1B9ACC7C000
heap
page read and write
1CB437E000
stack
page read and write
20A65A12000
heap
page read and write
1CE290F0000
heap
page read and write
1CE27F64000
heap
page read and write
21DB0047000
heap
page read and write
2409D866000
heap
page read and write
24796059000
heap
page read and write
4BE9000
trusted library allocation
page read and write
1CE29044000
heap
page read and write
4B1E000
trusted library allocation
page read and write
20A65AF7000
heap
page read and write
1CE28010000
heap
page read and write
31A43EC000
stack
page read and write
1CE27E2D000
heap
page read and write
2409D913000
heap
page read and write
1CE27990000
trusted library allocation
page read and write
1CE22991000
heap
page read and write
2978C002000
heap
page read and write
31A46FE000
stack
page read and write
19FBE196000
heap
page read and write
19FBE188000
heap
page read and write
4AAC000
trusted library allocation
page read and write
1CE27C70000
trusted library allocation
page read and write
1CE2295C000
heap
page read and write
1CE27F63000
heap
page read and write
1CE23290000
trusted library allocation
page read and write
1CE29009000
heap
page read and write
2978C000000
heap
page read and write
14DC9000
trusted library allocation
page read and write
1CE291E2000
heap
page read and write
1CE291E2000
heap
page read and write
AE0000
heap
page read and write
1CE291DB000
heap
page read and write
1CE29009000
heap
page read and write
4C06000
trusted library allocation
page read and write
1CE27E43000
heap
page read and write
2479603D000
heap
page read and write
24095E00000
heap
page read and write
1CE27F43000
heap
page read and write
4C89000
trusted library allocation
page read and write
1B9ACC52000
heap
page read and write
1CE27F64000
heap
page read and write
1CE291B7000
heap
page read and write
1936823C000
heap
page read and write
ADF000
stack
page read and write
F1B74FB000
stack
page read and write
2409D7C0000
trusted library allocation
page read and write
19368202000
heap
page read and write
26C0000
trusted library allocation
page execute and read and write
19FBE602000
heap
page read and write
1CE29009000
heap
page read and write
19FBE1B8000
heap
page read and write
19FBDA4A000
heap
page read and write
19FBDAA4000
heap
page read and write
19FBE1A7000
heap
page read and write
1B9AD402000
trusted library allocation
page read and write
1CE29183000
heap
page read and write
1CE27FFF000
heap
page read and write
6335E7F000
stack
page read and write
1E7C5C60000
trusted library allocation
page read and write
4B66CF7000
stack
page read and write
24096714000
heap
page read and write
4CE0CFF000
stack
page read and write
4BC0000
trusted library allocation
page read and write
1CE2906A000
heap
page read and write
1CE27802000
trusted library allocation
page read and write
1936824E000
heap
page read and write
20A60B02000
heap
page read and write
14D50000
trusted library allocation
page read and write
1CE27FCD000
heap
page read and write
4CE0A7C000
stack
page read and write
1CE2782E000
trusted library allocation
page read and write
1CE29088000
heap
page read and write
1CE227F3000
heap
page read and write
4B68000
trusted library allocation
page read and write
49E4000
trusted library allocation
page read and write
19FBDA56000
heap
page read and write
24095D80000
heap
page read and write
4C00000
trusted library allocation
page read and write
1530E000
unkown
page read and write
1CE27A00000
trusted library allocation
page read and write
24096550000
trusted library allocation
page read and write
19FBE199000
heap
page read and write
1CE2285A000
heap
page read and write
1CE29175000
heap
page read and write
1CE29044000
heap
page read and write
1CE29003000
heap
page read and write
4C26000
trusted library allocation
page read and write
1CE29035000
heap
page read and write
1CE29102000
heap
page read and write
4C0D000
trusted library allocation
page read and write
1CE27E2C000
heap
page read and write
19FBE15C000
heap
page read and write
1CE27E26000
heap
page read and write
21DB0058000
heap
page read and write
19368271000
heap
page read and write
20A60B00000
heap
page read and write
1CE27E69000
heap
page read and write
1CE227E0000
heap
page read and write
1CE27E69000
heap
page read and write
1CE2299F000
heap
page read and write
20A65660000
trusted library allocation
page read and write
20A65AD9000
heap
page read and write
1CE27FF7000
heap
page read and write
21DB0073000
heap
page read and write
1CE290BD000
heap
page read and write
19FBE17A000
heap
page read and write
1CE232A0000
trusted library allocation
page read and write
4CE0DFE000
stack
page read and write
1CE291DB000
heap
page read and write
4B49000
trusted library allocation
page read and write
1CE2904B000
heap
page read and write
19FBDFA0000
trusted library allocation
page read and write
1CE27F90000
heap
page read and write
2F46000
heap
page read and write
1CE29116000
heap
page read and write
19FBDA29000
heap
page read and write
31A4DFF000
unkown
page read and write
49F6000
trusted library allocation
page read and write
1B9ACC4D000
heap
page read and write
19FBE18A000
heap
page read and write
21DB005C000
heap
page read and write
1CE29135000
heap
page read and write
20A658D0000
remote allocation
page read and write
1CE2916D000
heap
page read and write
1CE290A4000
heap
page read and write
B7C80FE000
stack
page read and write
19FBE600000
heap
page read and write
FAFB6FE000
stack
page read and write
1CE291F3000
heap
page read and write
1CE22823000
heap
page read and write
2409D851000
heap
page read and write
153B5000
trusted library allocation
page read and write
20A60213000
heap
page read and write
2978C802000
trusted library allocation
page read and write
4BE2000
trusted library allocation
page read and write
1E7C5602000
heap
page read and write
1CE29044000
heap
page read and write
4855000
trusted library allocation
page read and write
6335778000
stack
page read and write
1CE27E61000
heap
page read and write
4B21000
trusted library allocation
page read and write
1CE290A9000
heap
page read and write
F0FD69A000
stack
page read and write
1CE27F3C000
heap
page read and write
20A657A0000
trusted library allocation
page read and write
1CE29044000
heap
page read and write
19FBE173000
heap
page read and write
1CE22600000
heap
page read and write
1CE27A50000
trusted library allocation
page read and write
1CE23600000
trusted library section
page readonly
193681C0000
trusted library allocation
page read and write
20A65791000
trusted library allocation
page read and write
19FBE111000
heap
page read and write
19FBDAB5000
heap
page read and write
1CE229BF000
heap
page read and write
19FBDB13000
heap
page read and write
9FE000
stack
page read and write
1CE291AA000
heap
page read and write
1CE229C4000
heap
page read and write
154A1000
trusted library allocation
page read and write
1CE27E34000
heap
page read and write
1CE229BF000
heap
page read and write
153A0000
trusted library allocation
page read and write
1CE27E53000
heap
page read and write
19FBE5A0000
remote allocation
page read and write
4811000
trusted library allocation
page read and write
1CE27F6A000
heap
page read and write
20A60240000
heap
page read and write
1CE2918D000
heap
page read and write
19FBD840000
heap
page read and write
1CE27E69000
heap
page read and write
4B81000
trusted library allocation
page read and write
4BB8000
trusted library allocation
page read and write
1D01DC59000
heap
page read and write
1CE29044000
heap
page read and write
FAFB1DE000
stack
page read and write
BF768FF000
stack
page read and write
21DB0064000
heap
page read and write
19FBE1A8000
heap
page read and write
4AA0000
trusted library allocation
page read and write
2310000
trusted library allocation
page read and write
19FBE177000
heap
page read and write
1CE234F0000
trusted library allocation
page read and write
4C20000
trusted library allocation
page read and write
20A65778000
trusted library allocation
page read and write
1CE27FDF000
heap
page read and write
1CE27FFF000
heap
page read and write
24795EC0000
heap
page read and write
21DB0067000
heap
page read and write
1CE291CB000
heap
page read and write
19FBE17A000
heap
page read and write
2E3E000
stack
page read and write
1CE2781C000
trusted library allocation
page read and write
19FBE196000
heap
page read and write
1CE27E34000
heap
page read and write
1CE229C0000
heap
page read and write
1CE27F6B000
heap
page read and write
1CB4E7E000
stack
page read and write
1CE227F7000
heap
page read and write
1CE29076000
heap
page read and write
9DB3000
trusted library allocation
page read and write
19FBDA50000
heap
page read and write
1CE29007000
heap
page read and write
482C000
trusted library allocation
page read and write
1CE29044000
heap
page read and write
19FBDADB000
heap
page read and write
1CE225B0000
trusted library allocation
page read and write
1CE21E52000
heap
page read and write
1CE291E4000
heap
page read and write
31A487E000
stack
page read and write
1B9ACD02000
heap
page read and write
1CE290CA000
heap
page read and write
19FBE18C000
heap
page read and write
4B91000
trusted library allocation
page read and write
1CE27F3E000
heap
page read and write
1D01DC02000
heap
page read and write
19368060000
heap
page read and write
1B9ACAE0000
heap
page read and write
4B8F000
trusted library allocation
page read and write
1CE27F6C000
heap
page read and write
4839000
trusted library allocation
page read and write
21DB003A000
heap
page read and write
1CE27FF4000
heap
page read and write
1CE22F80000
trusted library allocation
page read and write
1CE2906D000
heap
page read and write
20A60B18000
heap
page read and write
1CE27E2F000
heap
page read and write
1CE27E69000
heap
page read and write
1CE21FEB000
heap
page read and write
4BF5000
trusted library allocation
page read and write
1CE29125000
heap
page read and write
1CE27E2F000
heap
page read and write
4AAF000
trusted library allocation
page read and write
1CE27830000
trusted library allocation
page read and write
1CE27990000
trusted library allocation
page read and write
21DB0057000
heap
page read and write
1CE27F6D000
heap
page read and write
1CE229C0000
heap
page read and write
20A65770000
trusted library allocation
page read and write
1CE27F03000
heap
page read and write
1CE27F02000
heap
page read and write
4B7C000
trusted library allocation
page read and write
1CE27F63000
heap
page read and write
1CE27F64000
heap
page read and write
19FBE173000
heap
page read and write
1CE29037000
heap
page read and write
1CE27F03000
heap
page read and write
1CE29044000
heap
page read and write
1B9ACC50000
heap
page read and write
2978C113000
heap
page read and write
3F0000
heap
page read and write
19FBE175000
heap
page read and write
1CE23620000
trusted library section
page readonly
1CE27E55000
heap
page read and write
31A4C7C000
stack
page read and write
F0FD71F000
stack
page read and write
1CE27BC3000
trusted library allocation
page read and write
1CE27F63000
heap
page read and write
31A47FB000
stack
page read and write
4C19000
trusted library allocation
page read and write
1CE21E3D000
heap
page read and write
599257F000
stack
page read and write
1CE27F70000
heap
page read and write
4CD4000
trusted library allocation
page read and write
4C49000
trusted library allocation
page read and write
1CE22956000
heap
page read and write
1CE27F08000
heap
page read and write
1CE229DB000
heap
page read and write
4C17000
trusted library allocation
page read and write
1CE27FFB000
heap
page read and write
1CE29111000
heap
page read and write
20A61260000
trusted library section
page readonly
3210000
heap
page read and write
1CE290A6000
heap
page read and write
20A60B18000
heap
page read and write
1D01E1B0000
remote allocation
page read and write
1CB527D000
stack
page read and write
1CE27990000
trusted library allocation
page read and write
21DB0040000
heap
page read and write
1CE291E2000
heap
page read and write
4AC5000
trusted library allocation
page read and write
1CE27F3D000
heap
page read and write
1CE27F3C000
heap
page read and write
1CE27FEB000
heap
page read and write
19FBE195000
heap
page read and write
1CE27836000
trusted library allocation
page read and write
1CE27800000
trusted library allocation
page read and write
4B79000
trusted library allocation
page read and write
1CE27FF0000
heap
page read and write
19FBE189000
heap
page read and write
485B000
trusted library allocation
page read and write
2978C03F000
heap
page read and write
1CE29169000
heap
page read and write
1CE27820000
trusted library allocation
page read and write
1CE2906A000
heap
page read and write
1CE2281B000
heap
page read and write
4984000
trusted library allocation
page read and write
1CE2901D000
heap
page read and write
1CE2904E000
heap
page read and write
9105AFC000
stack
page read and write
1CE2906F000
heap
page read and write
1B9ACD00000
heap
page read and write
1CE29164000
heap
page read and write
483F000
trusted library allocation
page read and write
1CE21E58000
heap
page read and write
F0FD79F000
stack
page read and write
1CE29044000
heap
page read and write
4BCD000
trusted library allocation
page read and write
1CE27F00000
heap
page read and write
1B9ACC90000
heap
page read and write
1CE27BA0000
remote allocation
page read and write
1CE22792000
heap
page read and write
4AAA000
trusted library allocation
page read and write
4B60000
trusted library allocation
page read and write
1D01DC13000
heap
page read and write
19FBE199000
heap
page read and write
4B38000
trusted library allocation
page read and write
A8E000
stack
page read and write
910627E000
stack
page read and write
1CE290C9000
heap
page read and write
1CE291DB000
heap
page read and write
1CE29010000
heap
page read and write
1CE27FDF000
heap
page read and write
21DB0041000
heap
page read and write
24795FC0000
trusted library allocation
page read and write
4B74000
trusted library allocation
page read and write
1CE23631000
trusted library allocation
page read and write
9DC1000
trusted library allocation
page read and write
1CE29124000
heap
page read and write
1CE27F64000
heap
page read and write
1B9ACC3C000
heap
page read and write
1CE291E2000
heap
page read and write
76E000
stack
page read and write
1CE21E5A000
heap
page read and write
1CE29072000
heap
page read and write
20A6028A000
heap
page read and write
1CE21D70000
heap
page read and write
24095E29000
heap
page read and write
1CE27E10000
heap
page read and write
1CE27994000
trusted library allocation
page read and write
1E7C54A0000
heap
page read and write
1CE290A4000
heap
page read and write
1CE27F64000
heap
page read and write
2AFE03C0000
heap
page read and write
4BDD000
trusted library allocation
page read and write
1CE29032000
heap
page read and write
1CE291CB000
heap
page read and write
1CE2906A000
heap
page read and write
1CE29008000
heap
page read and write
19FBE602000
heap
page read and write
B7C82FD000
stack
page read and write
19368251000
heap
page read and write
1CE227B0000
heap
page read and write
1CE27980000
trusted library allocation
page read and write
A923FFE000
stack
page read and write
1CE2919C000
heap
page read and write
1CE27FCD000
heap
page read and write
1CE27FF1000
heap
page read and write
20A60302000
heap
page read and write
1CE27820000
trusted library allocation
page read and write
1D01DC35000
heap
page read and write
1CE235D0000
trusted library section
page readonly
19FBE1B8000
heap
page read and write
19FBE602000
heap
page read and write
1CE27838000
trusted library allocation
page read and write
1CE21E29000
heap
page read and write
4A9C000
trusted library allocation
page read and write
1CE290A8000
heap
page read and write
21DB0082000
heap
page read and write
2409D650000
heap
page read and write
1CE2782C000
trusted library allocation
page read and write
1CE27F6B000
heap
page read and write
2AFE044E000
heap
page read and write
1CE27FF0000
heap
page read and write
20A658D0000
remote allocation
page read and write
1CB4D7D000
stack
page read and write
9D50000
trusted library allocation
page read and write
19368300000
heap
page read and write
21DB0059000
heap
page read and write
1CE27E3C000
heap
page read and write
14DD3000
trusted library allocation
page read and write
19FBE603000
heap
page read and write
2409D800000
heap
page read and write
19FBE619000
heap
page read and write
1CE291AE000
heap
page read and write
1CE2783E000
trusted library allocation
page read and write
1CE29015000
heap
page read and write
4B87000
trusted library allocation
page read and write
1CE291F7000
heap
page read and write
1CE229C0000
heap
page read and write
1CE29103000
heap
page read and write
1CE27E56000
heap
page read and write
24096739000
heap
page read and write
1CE2907A000
heap
page read and write
1CE27E69000
heap
page read and write
275C000
trusted library allocation
page execute and read and write
1CE29038000
heap
page read and write
19FBE176000
heap
page read and write
1CE27970000
trusted library allocation
page read and write
21DB0074000
heap
page read and write
1CE27F3D000
heap
page read and write
B50000
trusted library allocation
page read and write
1E7C5600000
heap
page read and write
1CE27F3D000
heap
page read and write
1CE29113000
heap
page read and write
1CE27E69000
heap
page read and write
1CE27885000
trusted library allocation
page read and write
1CE291E2000
heap
page read and write
4BD2000
trusted library allocation
page read and write
1CE227CE000
heap
page read and write
1CE29044000
heap
page read and write
1CE27E2D000
heap
page read and write
19FBDA00000
heap
page read and write
19FBE1B9000
heap
page read and write
20A65AE8000
heap
page read and write
2409D900000
heap
page read and write
21DAFDE0000
heap
page read and write
5991E7F000
stack
page read and write
1CE291CB000
heap
page read and write
5991FFC000
stack
page read and write
19FBE182000
heap
page read and write
1CE27950000
trusted library allocation
page read and write
63358F9000
stack
page read and write
1CE27E2F000
heap
page read and write
1CE2782E000
trusted library allocation
page read and write
1CE27E2D000
heap
page read and write
1CE29044000
heap
page read and write
20A600B0000
heap
page read and write
1CE290F8000
heap
page read and write
21DB0079000
heap
page read and write
1CE29044000
heap
page read and write
1CE27E13000
heap
page read and write
1CE27994000
trusted library allocation
page read and write
4834000
trusted library allocation
page read and write
1E7C54B0000
heap
page read and write
1CE23650000
trusted library allocation
page read and write
1CE21E8D000
heap
page read and write
1CB4A7F000
stack
page read and write
14B70000
trusted library allocation
page read and write
19FBE114000
heap
page read and write
1CE27E26000
heap
page read and write
20A60110000
heap
page read and write
1CE29173000
heap
page read and write
1CE29091000
heap
page read and write
4807000
trusted library allocation
page read and write
24095EE7000
heap
page read and write
2AFE0270000
heap
page read and write
1CE291EC000
heap
page read and write
1CE27E5C000
heap
page read and write
1CE227FD000
heap
page read and write
F1B77FF000
stack
page read and write
1CE2909A000
heap
page read and write
1CE27838000
trusted library allocation
page read and write
1CE2912C000
heap
page read and write
152BE000
stack
page read and write
1CE29044000
heap
page read and write
31A467E000
stack
page read and write
14800000
trusted library allocation
page read and write
BF764FE000
stack
page read and write
21DB003C000
heap
page read and write
2AFE0438000
heap
page read and write
1CE27670000
trusted library allocation
page read and write
1CE27F44000
heap
page read and write
4AC7000
trusted library allocation
page read and write
1CE229BF000
heap
page read and write
19FBE12F000
heap
page read and write
2978C075000
heap
page read and write
1CE29103000
heap
page read and write
1CB4B7E000
stack
page read and write
1CE2906A000
heap
page read and write
1CE27E38000
heap
page read and write
1CE27F05000
heap
page read and write
4B66DFF000
stack
page read and write
1CE27E2D000
heap
page read and write
1CE29002000
heap
page read and write
24796068000
heap
page read and write
7BE000
stack
page read and write
19FBE602000
heap
page read and write
1E7C5652000
heap
page read and write
19FBDA57000
heap
page read and write
19FBDA27000
heap
page read and write
BF762FE000
stack
page read and write
19FBE5A0000
remote allocation
page read and write
20A61250000
trusted library section
page readonly
4BE6000
trusted library allocation
page read and write
21DB0055000
heap
page read and write
4C1E000
trusted library allocation
page read and write
1CE23610000
trusted library section
page readonly
24095EBB000
heap
page read and write
1CE27825000
trusted library allocation
page read and write
2AFE03A0000
heap
page read and write
4CD0000
trusted library allocation
page read and write
1CE21E61000
heap
page read and write
19FBE128000
heap
page read and write
1CE2276F000
heap
page read and write
1CE27994000
trusted library allocation
page read and write
1CE29009000
heap
page read and write
19FBDAEC000
heap
page read and write
BF765FF000
stack
page read and write
1CE229EE000
heap
page read and write
1CE291D4000
heap
page read and write
21DB0031000
heap
page read and write
24796000000
heap
page read and write
1CE27820000
trusted library allocation
page read and write
1CE22858000
heap
page read and write
1CE27F64000
heap
page read and write
19FBE174000
heap
page read and write
1CE27E69000
heap
page read and write
1CE290A9000
heap
page read and write
1CE290A2000
heap
page read and write
B7C7DFF000
stack
page read and write
4B19000
trusted library allocation
page read and write
1CE2900B000
heap
page read and write
20A61080000
trusted library allocation
page read and write
1CE2905A000
heap
page read and write
4B85000
trusted library allocation
page read and write
1CE2783C000
trusted library allocation
page read and write
1CE22943000
heap
page read and write
1D01DC2A000
heap
page read and write
4BD8000
trusted library allocation
page read and write
1CE291CB000
heap
page read and write
1CE27990000
trusted library allocation
page read and write
1CE27F64000
heap
page read and write
1CE2783E000
trusted library allocation
page read and write
1CE27E2D000
heap
page read and write
1CE22615000
heap
page read and write
4BEB000
trusted library allocation
page read and write
1CE27FFF000
heap
page read and write
1CE29042000
heap
page read and write
1CB3D9B000
stack
page read and write
1CE27F3C000
heap
page read and write
1CE291F1000
heap
page read and write
1CE27F3D000
heap
page read and write
1CE27FE4000
heap
page read and write
6335FFF000
stack
page read and write
1CE29050000
heap
page read and write
1CE291EF000
heap
page read and write
1CE291CB000
heap
page read and write
20A658C0000
trusted library allocation
page read and write
6CC000
stack
page read and write
2590000
trusted library allocation
page read and write
14860000
trusted library allocation
page read and write
1CE29006000
heap
page read and write
1CE29002000
heap
page read and write
1CE27F71000
heap
page read and write
1CE229D4000
heap
page read and write
1CE27E34000
heap
page read and write
2978C06F000
heap
page read and write
4836000
trusted library allocation
page read and write
AE5000
heap
page read and write
1B9ACD13000
heap
page read and write
2755000
trusted library allocation
page execute and read and write
21DB05A0000
trusted library allocation
page read and write
1CE27830000
trusted library allocation
page read and write
FAFB57B000
stack
page read and write
A92417F000
stack
page read and write
1CE2902C000
heap
page read and write
4A95000
trusted library allocation
page read and write
1CE27E2D000
heap
page read and write
20A602AF000
heap
page read and write
21DB0026000
heap
page read and write
20A6027A000
heap
page read and write
1CE27F63000
heap
page read and write
1CE27F69000
heap
page read and write
1CE29044000
heap
page read and write
1CE27F3D000
heap
page read and write
1CE2783A000
trusted library allocation
page read and write
1CE291D4000
heap
page read and write
1CE27E69000
heap
page read and write
1CE291E2000
heap
page read and write
1CE229F2000
heap
page read and write
1CE27F6B000
heap
page read and write
1CE27F3C000
heap
page read and write
2409D908000
heap
page read and write
1CE291AF000
heap
page read and write
9105BFE000
stack
page read and write
1CE29056000
heap
page read and write
19FBE196000
heap
page read and write
1CE21E89000
heap
page read and write
1CE27F64000
heap
page read and write
1CE27FE8000
heap
page read and write
20A658D0000
trusted library allocation
page read and write
1CE27E37000
heap
page read and write
1CE23298000
trusted library allocation
page read and write
1CE22800000
heap
page read and write
1CE229C4000
heap
page read and write
1CE22957000
heap
page read and write
4B77000
trusted library allocation
page read and write
1CE291A4000
heap
page read and write
1B9ACBE0000
trusted library allocation
page read and write
1CE27E26000
heap
page read and write
1CE22732000
heap
page read and write
1CE291CB000
heap
page read and write
1CE27E62000
heap
page read and write
480F000
trusted library allocation
page read and write
1CE27F5F000
heap
page read and write
1CE229C4000
heap
page read and write
1CE29146000
heap
page read and write
19368A02000
trusted library allocation
page read and write
21DB006B000
heap
page read and write
1CE27E4D000
heap
page read and write
1CE291CB000
heap
page read and write
1B9ACC00000
heap
page read and write
4859000
trusted library allocation
page read and write
1CE291F5000
heap
page read and write
1CE2906B000
heap
page read and write
19FBDB02000
heap
page read and write
20A65794000
trusted library allocation
page read and write
1CE27E4F000
heap
page read and write
19FBDAC8000
heap
page read and write
1CE229C4000
heap
page read and write
2F30000
heap
page read and write
4AB8000
trusted library allocation
page read and write
4B26000
trusted library allocation
page read and write
20A60870000
trusted library allocation
page read and write
1CE22956000
heap
page read and write
20A6577E000
trusted library allocation
page read and write
1CB46FA000
stack
page read and write
4852000
trusted library allocation
page read and write
1CE229D4000
heap
page read and write
1CE290EE000
heap
page read and write
1CE27F64000
heap
page read and write
BF760FD000
stack
page read and write
20A65AEF000
heap
page read and write
1CE29062000
heap
page read and write
1CE27F7B000
heap
page read and write
1CE27FFF000
heap
page read and write
1CE27E34000
heap
page read and write
1CE29003000
heap
page read and write
19FBE17A000
heap
page read and write
1CE2914B000
heap
page read and write
4B53000
trusted library allocation
page read and write
1CE2908D000
heap
page read and write
2AFE0410000
heap
page read and write
1CE229C4000
heap
page read and write
1CE27F64000
heap
page read and write
19FBE173000
heap
page read and write
1CE27FE0000
heap
page read and write
1CE21FC2000
heap
page read and write
19FBE15C000
heap
page read and write
1CE27832000
trusted library allocation
page read and write
1CE290DA000
heap
page read and write
1CE2917F000
heap
page read and write
1CE27A20000
trusted library allocation
page read and write
20A61290000
trusted library section
page readonly
2409D6C0000
heap
page read and write
1B9ACC13000
heap
page read and write
19FBE100000
heap
page read and write
1CE2914F000
heap
page read and write
20A61070000
trusted library allocation
page read and write
4988000
trusted library allocation
page read and write
1CE2906A000
heap
page read and write
1CE21E92000
heap
page read and write
1CB44F9000
stack
page read and write
20A65AFB000
heap
page read and write
20A60A00000
heap
page read and write
2409D87F000
heap
page read and write
1CE2783C000
trusted library allocation
page read and write
24796102000
heap
page read and write
1CE27E38000
heap
page read and write
19FBE1A8000
heap
page read and write
19FBDA87000
heap
page read and write
91060FC000
stack
page read and write
4BAD000
trusted library allocation
page read and write
1CE27F64000
heap
page read and write
BF763FD000
stack
page read and write
4BE0000
trusted library allocation
page read and write
1CE27660000
trusted library allocation
page read and write
1CE279A0000
trusted library allocation
page read and write
1CE229C4000
heap
page read and write
1CE27828000
trusted library allocation
page read and write
1CE27980000
trusted library allocation
page read and write
6335AFE000
stack
page read and write
19FBDA59000
heap
page read and write
4BBD000
trusted library allocation
page read and write
4C0B000
trusted library allocation
page read and write
20A60B13000
heap
page read and write
2AFE0426000
heap
page read and write
1CE290D5000
heap
page read and write
4B9D000
trusted library allocation
page read and write
2E7F000
stack
page read and write
1CE27E26000
heap
page read and write
1CE2912F000
heap
page read and write
1E7C562E000
heap
page read and write
1CE2906A000
heap
page read and write
49F8000
trusted library allocation
page read and write
1CE27E26000
heap
page read and write
270A000
trusted library allocation
page execute and read and write
1E7C5E02000
trusted library allocation
page read and write
4C4C000
trusted library allocation
page read and write
1548B000
trusted library allocation
page read and write
599227C000
stack
page read and write
1CE291FB000
heap
page read and write
There are 1558 hidden memdumps, click here to show them.