IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_05057d34\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_0789c3c3\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_0fa97499\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_0fb9b83a\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_14062c50\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_1431a86b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_17918727\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_17c5cdc5\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_17e1912a\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_83ec7e94952b3dcbb61bd30e98682b9f65d64_440dec59_0e4aaad7\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4PB7FJMT\soft[1]
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\dll[1]
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\6clvSx8en71SUl1hUuzQ6n56lWM0\Bunifu_UI_v1.5.3.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\6clvSx8en71SUl1hUuzQ6n56lWM0\Cleaner.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER276E.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:30:19 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2A00.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2ACC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER70B1.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:32 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER72A6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7334.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER790E.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:35 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7B03.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7BA0.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8245.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:37 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER84A8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8545.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8C48.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:40 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8E7B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8F09.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER957F.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:43 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9D7F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA4CC.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:30:52 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA550.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA77D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA849.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB28D.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:50 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB608.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB6A5.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBE54.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:53 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC1DF.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC26D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC980.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:55 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCC01.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCC9E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4PB7FJMT\library[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\fuckingdllENCR[1].dll
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\ping[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NUEPGTR9\ping[1].htm
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\library[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\ping[1].htm
very short file (no magic)
dropped
C:\Users\user\Desktop\Cleaner.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Icon number=0, Archive, ctime=Mon Oct 3 23:30:18 2022, mtime=Mon Oct 3 23:30:18 2022, atime=Mon Oct 3 23:30:18 2022, length=3947920, window=hide
dropped
There are 42 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
C:\Users\user\Desktop\file.exe
malicious
C:\Users\user\AppData\Local\Temp\6clvSx8en71SUl1hUuzQ6n56lWM0\Cleaner.exe
"C:\Users\user\AppData\Local\Temp\6clvSx8en71SUl1hUuzQ6n56lWM0\Cleaner.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 528
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 700
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 724
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 760
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 768
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 848
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 840
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 1032
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 1292
C:\Windows\SysWOW64\cmd.exe
C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\user\AppData\Local\Temp\6clvSx8en71SUl1hUuzQ6n56lWM0\Cleaner.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 1552
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c taskkill /im "file.exe" /f & erase "C:\Users\user\Desktop\file.exe" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /im "file.exe" /f
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://208.67.104.97/powfhxhxcjzx/ping.php?sub=NOSUB&stream=start&substream=mixinte
208.67.104.97
malicious
http://208.67.104.97/powfhxhxcjzx/ping.php?sub=NOSUB&stream=mixtwo&substream=mixinte
208.67.104.97
malicious
http://85.31.46.167/software.php
85.31.46.167
malicious
http://208.67.104.97/powfhxhxcjzx/ping.php?sub=NOSUB&stream=start&subst
unknown
malicious
http://171.22.30.106/library.php
171.22.30.106
malicious
http://www.jiyu-kobo.co.jp/ho
unknown
http://www.sajatypeworks.com-
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.sajatypeworks.como2
unknown
http://www.fontbureau.com/designers?
unknown
http://www.founder.com.cn/cn/cn
unknown
http://www.jiyu-kobo.co.jp/jp/ho
unknown
https://take.rdrct-now.online/go/ZWKA?p78705p298845p1174
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.jiyu-kobo.co.jp/Y0ho
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://fontfabrik.com
unknown
http://www.jiyu-kobo.co.jp/.T
unknown
http://www.zhongyicts.com.cn.TTF
unknown
http://www.fontbureau.com(
unknown
http://www.typography.net
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.sajatypeworks.comtr
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.urwpp.de
unknown
http://www.zhongyicts.com.cn
unknown
http://107.182.129.235/storage/ping.php
107.182.129.235
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.fontbureau.com/designersp
unknown
http://www.sakkal.com
unknown
http://www.fontbureau.com/designerso
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.jiyu-kobo.co.jp/.TTC
unknown
http://www.fontbureau.comH_
unknown
http://www.sakkal.comI
unknown
http://www.tiro.comq
unknown
http://107.182.129.235/storage/extension.php
107.182.129.235
http://www.jiyu-kobo.co.jp/F
unknown
http://www.ccleaner.comqhttps://take.rdrct-now.online/go/ZWKA?p78705p298845p1174
unknown
https://iplogger.org
unknown
http://www.sajatypeworks.comd:
unknown
https://iplogger.orgx
unknown
http://www.carterandcone.coml
unknown
http://www.founder.com.cn/cn/
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://iplogger.org
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-jones.html
unknown
http://www.typography.netad
unknown
https://g-cleanit.hk
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.fontbureau.com/designers8
unknown
http://www.sajatypeworks.comcom
unknown
https://iplogger.org/1Pz8p7
148.251.234.83
http://www.fontbureau.com/designers/
unknown
http://www.monotype.9
unknown
There are 56 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
iplogger.org
148.251.234.83

IPs

IP
Domain
Country
Malicious
208.67.104.97
unknown
United States
malicious
85.31.46.167
unknown
Germany
malicious
148.251.234.83
iplogger.org
Germany
107.182.129.235
unknown
Reserved
171.22.30.106
unknown
Germany

Registry

Path
Value
Malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
ProgramId
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
FileId
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
LowerCaseLongPath
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
LongPathHash
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
Name
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
Publisher
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
Version
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
BinFileVersion
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
BinaryType
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
ProductName
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
ProductVersion
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
LinkDate
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
BinProductVersion
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
Size
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
Language
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
IsPeFile
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
IsOsComponent
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Software\GCleaner\Trial
Count
HKEY_CURRENT_USER\Software\GCleaner\License
License
HKEY_CURRENT_USER\Software\GCleaner\Install
Postcheck
There are 27 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
21C0000
direct allocation
page execute and read and write
malicious
21C0000
direct allocation
page execute and read and write
malicious
21C0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
21C0000
direct allocation
page execute and read and write
malicious
21C0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
21C0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
21C0000
direct allocation
page execute and read and write
malicious
21C0000
direct allocation
page execute and read and write
malicious
21C0000
direct allocation
page execute and read and write
malicious
2200000
direct allocation
page read and write
malicious
21C0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
21C0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
21C0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
21C0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
21C0000
direct allocation
page execute and read and write
malicious
21C0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
21C0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
2EAE000
stack
page read and write
9D000
stack
page read and write
A1B06FE000
stack
page read and write
59E000
stack
page read and write
1CFE1B63000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE3711000
trusted library allocation
page read and write
2270000
heap
page read and write
1CFE1C30000
trusted library allocation
page read and write
7FF9A5950000
trusted library allocation
page read and write
6CE000
stack
page read and write
19B000
stack
page read and write
1CFE1B68000
heap
page read and write
1CFE1B30000
heap
page read and write
3841000
trusted library allocation
page read and write
1160000
unkown
page read and write
1CFE1B38000
heap
page read and write
103D000
stack
page read and write
251E000
stack
page read and write
B1A000
heap
page read and write
1CFE554A000
trusted library allocation
page read and write
1CFE1B30000
heap
page read and write
3928000
trusted library allocation
page read and write
1CFD91D1000
trusted library allocation
page read and write
1CFE1AE0000
trusted library allocation
page read and write
223D000
stack
page read and write
1CFE1B68000
heap
page read and write
1CFE1B67000
heap
page read and write
1CFE1AA0000
trusted library allocation
page read and write
1CFE1B2E000
heap
page read and write
1CFE2020000
trusted library allocation
page read and write
7FF9A57B2000
trusted library allocation
page read and write
1CFE1B68000
heap
page read and write
1CFE1B4C000
heap
page read and write
3952000
heap
page read and write
1CFE1B33000
heap
page read and write
1CFE1B29000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFC77C0000
heap
page read and write
295E000
stack
page read and write
43F000
unkown
page execute and read and write
1CFE1B63000
heap
page read and write
7E2000
heap
page read and write
1CFE1CED000
trusted library allocation
page read and write
1CFC7870000
heap
page read and write
30000
unkown
page read and write
1F0000
trusted library allocation
page read and write
1CFE1B63000
heap
page read and write
1CFE64DE000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B64000
heap
page read and write
2D5E000
stack
page read and write
2270000
heap
page read and write
1CFE5C3C000
heap
page read and write
1CFE36BC000
trusted library allocation
page read and write
1CFE1B63000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFC7831000
trusted library allocation
page read and write
1CFE1B2B000
heap
page read and write
1CFE36C7000
trusted library allocation
page read and write
591000
unkown
page readonly
3716000
trusted library allocation
page read and write
1CFE1B64000
heap
page read and write
1CFE1B3A000
heap
page read and write
1CFE1B66000
heap
page read and write
251E000
stack
page read and write
1CFE1B29000
heap
page read and write
1CFC7850000
trusted library allocation
page read and write
2350000
heap
page read and write
1CFC7830000
trusted library allocation
page read and write
3274000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFC7830000
trusted library allocation
page read and write
2410000
heap
page read and write
1CFC7830000
trusted library allocation
page read and write
680000
heap
page read and write
1CFE1B2F000
heap
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFE1B00000
heap
page read and write
1CFE1B67000
heap
page read and write
1CFE1932000
unkown
page readonly
1CFE1B30000
heap
page read and write
230D000
stack
page read and write
1CFE1B6D000
heap
page read and write
1CFE1B2F000
heap
page read and write
1CFE33C0000
trusted library allocation
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B4B000
heap
page read and write
9D000
stack
page read and write
19B000
stack
page read and write
1CFC91A0000
trusted library allocation
page read and write
1CFE1B42000
heap
page read and write
A1B08FE000
stack
page read and write
1F0000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFE1A49000
heap
page read and write
91F000
stack
page read and write
1CFE1B30000
heap
page read and write
1CFE1B4D000
heap
page read and write
590000
unkown
page read and write
591000
unkown
page readonly
19B000
stack
page read and write
1CFE36D5000
trusted library allocation
page read and write
7E2000
heap
page read and write
590000
unkown
page read and write
590000
unkown
page read and write
1CFC7830000
trusted library allocation
page read and write
295E000
stack
page read and write
720000
heap
page read and write
1CFE1B2E000
heap
page read and write
70E000
stack
page read and write
1CFE2120000
trusted library allocation
page read and write
1CFE1B39000
heap
page read and write
25AA0849000
heap
page read and write
1CFE1B28000
heap
page read and write
1CFE1B50000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B64000
heap
page read and write
A1B09FE000
stack
page read and write
1CFE1B2F000
heap
page read and write
91F000
stack
page read and write
1CFC7832000
trusted library allocation
page read and write
25AA0D13000
heap
page read and write
2410000
heap
page read and write
1CFE1B4E000
heap
page read and write
75F000
heap
page read and write
7FF9A5970000
trusted library allocation
page execute and read and write
6CE000
stack
page read and write
1CFC7754000
trusted library allocation
page read and write
1CFE1B2A000
heap
page read and write
386E000
trusted library allocation
page read and write
23FD000
stack
page read and write
2350000
heap
page read and write
1CFE1B22000
heap
page read and write
1CFE1B66000
heap
page read and write
7E2000
heap
page read and write
1CFE1B30000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE20B0000
trusted library allocation
page read and write
7F4000
heap
page read and write
251E000
stack
page read and write
1CFE1B2F000
heap
page read and write
1CFE1B64000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE6463000
heap
page read and write
1CFE1B39000
heap
page read and write
1CFE1CD6000
trusted library allocation
page read and write
1CFE1B25000
heap
page read and write
2B5E000
stack
page read and write
2350000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B21000
heap
page read and write
1CFE6404000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFE5F83000
heap
page read and write
7E2000
heap
page read and write
1CFE1B50000
heap
page read and write
E628B2D000
stack
page read and write
1CFE1B23000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B4E000
heap
page read and write
2350000
heap
page read and write
22CD000
stack
page read and write
1CFE1B4A000
heap
page read and write
3710000
trusted library allocation
page read and write
251E000
stack
page read and write
1CFE1B39000
heap
page read and write
1CFC72F0000
unkown
page readonly
1CFC7831000
trusted library allocation
page read and write
1CFE1B30000
heap
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFE1CA0000
trusted library allocation
page read and write
1CFE1E10000
trusted library allocation
page read and write
1CFE1B30000
heap
page read and write
1CFE1B28000
heap
page read and write
1CFE1B66000
heap
page read and write
680000
heap
page read and write
1CFC7830000
trusted library allocation
page read and write
7FF9A58C2000
trusted library allocation
page read and write
1CFE1B66000
heap
page read and write
E628EF9000
stack
page read and write
1CFE1B63000
heap
page read and write
680000
heap
page read and write
1CFE1B39000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B22000
heap
page read and write
591000
unkown
page readonly
1CFE1B63000
heap
page read and write
2FEE000
stack
page read and write
A1F000
stack
page read and write
1CFC91A0000
remote allocation
page read and write
1CFC7834000
trusted library allocation
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B39000
heap
page read and write
1CFE1B6D000
heap
page read and write
1CFE676F000
trusted library allocation
page read and write
1CFE36F9000
trusted library allocation
page read and write
1CFE1B30000
heap
page read and write
1CFE1DC0000
trusted library allocation
page read and write
1CFE1B65000
heap
page read and write
1CFE1B66000
heap
page read and write
1CFE1B4B000
heap
page read and write
7F4000
heap
page read and write
94E000
unkown
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B2A000
heap
page read and write
2410000
heap
page read and write
1CFC7810000
trusted library allocation
page read and write
1CFE1AE0000
trusted library allocation
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B30000
heap
page read and write
1CFE1B26000
heap
page read and write
1CFE19DD000
heap
page read and write
2410000
heap
page read and write
720000
heap
page read and write
1CFE1AB0000
trusted library allocation
page read and write
1CFC7831000
trusted library allocation
page read and write
1CFE1C80000
trusted library allocation
page read and write
1CFE1D10000
trusted library allocation
page read and write
1CFE1B28000
heap
page read and write
25AA0700000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B2D000
heap
page read and write
3717000
trusted library allocation
page read and write
25AA0D13000
heap
page read and write
1CFE1B63000
heap
page read and write
1150000
unkown
page readonly
1CFE1B4B000
heap
page read and write
1CFC7830000
trusted library allocation
page read and write
410000
unkown
page write copy
1CFE1B4B000
heap
page read and write
1CFE1A8D000
trusted library allocation
page read and write
1CFE1D90000
trusted library allocation
page read and write
1CFE1B65000
heap
page read and write
1CFE1B30000
heap
page read and write
1CFE1B20000
heap
page read and write
A1B07FD000
stack
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFE36DC000
trusted library allocation
page read and write
295E000
stack
page read and write
2350000
heap
page read and write
1CFE1D00000
trusted library allocation
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFE1B28000
heap
page read and write
3B36000
trusted library allocation
page read and write
223D000
stack
page read and write
1CFE5980000
trusted library allocation
page read and write
25AA0839000
heap
page read and write
1CFE1F90000
trusted library allocation
page read and write
1CFE1B4E000
heap
page read and write
23C0000
remote allocation
page read and write
A1F000
stack
page read and write
371A000
trusted library allocation
page read and write
1CFE1B4A000
heap
page read and write
70E000
stack
page read and write
234D000
stack
page read and write
1CFE1B4D000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1EC0000
trusted library allocation
page read and write
A1F000
stack
page read and write
1CFE1A65000
heap
page read and write
30000
unkown
page read and write
1F0000
trusted library allocation
page read and write
91F000
stack
page read and write
1CFE1B26000
heap
page read and write
1CFE1B64000
heap
page read and write
1CFE1B26000
heap
page read and write
3D75000
trusted library allocation
page read and write
2B5F000
stack
page read and write
1CFE1B67000
heap
page read and write
1CFE1B26000
heap
page read and write
1CFE1B32000
heap
page read and write
6CE000
stack
page read and write
1CFE1FC0000
trusted library allocation
page read and write
1CFE1B64000
heap
page read and write
E62907F000
stack
page read and write
1CFC7850000
heap
page read and write
43F000
unkown
page execute and read and write
1CFE2D13000
heap
page read and write
1CFE1B50000
heap
page read and write
1CFC7833000
trusted library allocation
page read and write
1CFE1B63000
heap
page read and write
1CFC7810000
trusted library allocation
page read and write
1CFE1B52000
heap
page read and write
591000
unkown
page readonly
1CFC7750000
trusted library allocation
page read and write
1F0000
trusted library allocation
page read and write
1CFC77E0000
trusted library allocation
page read and write
295E000
stack
page read and write
1CFE1AE0000
trusted library allocation
page read and write
1CFE1B30000
heap
page read and write
25AA0828000
heap
page read and write
37C3000
trusted library allocation
page read and write
1CFC7830000
trusted library allocation
page read and write
31C8000
trusted library allocation
page read and write
1CFE1B4D000
heap
page read and write
2D5E000
stack
page read and write
1CFE1B4B000
heap
page read and write
1CFE20A0000
trusted library allocation
page read and write
1CFC9180000
trusted library allocation
page read and write
1CFE1AE0000
trusted library allocation
page read and write
1CFE1930000
unkown
page readonly
1CFE64BD000
heap
page read and write
386E000
trusted library allocation
page read and write
19B000
stack
page read and write
1CFE1B4E000
heap
page read and write
1CFE2110000
trusted library allocation
page read and write
1CFE1B15000
heap
page read and write
1CFE1F50000
trusted library allocation
page read and write
1CFE1B26000
heap
page read and write
A1F000
stack
page read and write
1CFE1B38000
heap
page read and write
1CFE1B28000
heap
page read and write
1CFC7843000
heap
page read and write
7E2000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B65000
heap
page read and write
1CFE646D000
heap
page read and write
1CFE1B52000
heap
page read and write
390B000
trusted library allocation
page read and write
1CFE1B23000
heap
page read and write
7F4000
heap
page read and write
1F0000
trusted library allocation
page read and write
1CFE1D50000
trusted library allocation
page read and write
1CFE1B64000
heap
page read and write
5A0000
unkown
page readonly
1CFE1B67000
heap
page read and write
1CFC7832000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFE1E50000
trusted library allocation
page read and write
1CFE1B30000
heap
page read and write
1CFE1B70000
trusted library allocation
page read and write
1CFC91A0000
remote allocation
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFE1B22000
heap
page read and write
1CFE1F00000
trusted library allocation
page read and write
22CD000
stack
page read and write
2410000
heap
page read and write
2A5E000
stack
page read and write
1CFE1B32000
heap
page read and write
1CFE3700000
trusted library allocation
page read and write
1CFE6460000
heap
page read and write
295E000
stack
page read and write
1CFE1B4E000
heap
page read and write
25AA0802000
unkown
page read and write
234D000
stack
page read and write
1CFE36E7000
trusted library allocation
page read and write
1CFE1AF0000
heap
page read and write
1CFE1B30000
heap
page read and write
1CFE1B24000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFC75B0000
heap
page read and write
1CFE1AC5000
trusted library allocation
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B39000
heap
page read and write
1CFE6457000
heap
page read and write
234D000
stack
page read and write
1CFC7837000
trusted library allocation
page read and write
1CFE1B63000
heap
page read and write
7FF9A57C0000
trusted library allocation
page read and write
1CFE1DB0000
trusted library allocation
page read and write
25AA0D02000
heap
page read and write
1CFE1B53000
heap
page read and write
234F000
stack
page read and write
1CFE1B63000
heap
page read and write
3718000
trusted library allocation
page read and write
1CFE1B30000
heap
page read and write
9D000
stack
page read and write
2410000
heap
page read and write
1CFC7790000
heap
page execute and read and write
19B000
stack
page read and write
1CFE1B68000
heap
page read and write
591000
unkown
page readonly
11A0000
trusted library allocation
page read and write
1CFE1B69000
heap
page read and write
9D000
stack
page read and write
B00000
heap
page read and write
1CFE1B4E000
heap
page read and write
720000
heap
page read and write
1CFE6406000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
25AA0D13000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B30000
trusted library allocation
page read and write
1CFE1B26000
heap
page read and write
25AA0D02000
heap
page read and write
1CFE64ED000
heap
page read and write
8D0000
trusted library allocation
page read and write
1CFE1B4A000
heap
page read and write
2FF0000
remote allocation
page read and write
251E000
stack
page read and write
1CFE1B4B000
heap
page read and write
1CFC91B0000
heap
page read and write
1CFE1FB0000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B2E000
heap
page read and write
1CFE1B4B000
heap
page read and write
1F0000
trusted library allocation
page read and write
1CFE1B67000
heap
page read and write
1CFE1E00000
trusted library allocation
page read and write
1CFE1B4A000
heap
page read and write
1CFC7830000
trusted library allocation
page read and write
75F000
heap
page read and write
1CFE1B66000
heap
page read and write
1CFE6483000
heap
page read and write
1CFE1B4D000
heap
page read and write
1CFC77E0000
trusted library allocation
page read and write
22CD000
stack
page read and write
1CFE2D62000
heap
page read and write
1CFE1B2D000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFC95D8000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
7FF9A57A0000
trusted library allocation
page read and write
1CFE1B67000
heap
page read and write
23BD000
stack
page read and write
1CFE1B4B000
heap
page read and write
2DAD000
stack
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFE1B6D000
heap
page read and write
1CFE1B42000
heap
page read and write
1CFE1B4E000
heap
page read and write
25AA0923000
heap
page read and write
1CFE1B32000
heap
page read and write
1CFE1B38000
heap
page read and write
1F0000
trusted library allocation
page read and write
295E000
stack
page read and write
2410000
heap
page read and write
1CFE213C000
trusted library allocation
page read and write
1CFE647A000
heap
page read and write
1CFE1B30000
heap
page read and write
D66000
heap
page read and write
1CFE36EE000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
720000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B2F000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE66A2000
trusted library allocation
page read and write
72A000
heap
page read and write
1CFE1B26000
heap
page read and write
1CFE1B4B000
heap
page read and write
3801000
trusted library allocation
page read and write
70E000
stack
page read and write
3B38000
trusted library allocation
page read and write
1CFE5C5F000
heap
page read and write
3882000
trusted library allocation
page read and write
1CFE1A4C000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B2A000
heap
page read and write
1CFE1B53000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE2C97000
heap
page read and write
1CFC7800000
trusted library allocation
page read and write
1CFC91A0000
trusted library allocation
page read and write
1CFE1B65000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B4E000
heap
page read and write
1F0000
trusted library allocation
page read and write
23BD000
stack
page read and write
371D000
trusted library allocation
page read and write
1CFE5C61000
heap
page read and write
1CFC7830000
trusted library allocation
page read and write
23FD000
stack
page read and write
1CFC7800000
trusted library allocation
page read and write
739000
heap
page execute and read and write
1CFE6673000
trusted library allocation
page read and write
1CFE1F40000
trusted library allocation
page read and write
1CFE1B64000
heap
page read and write
1CFE1B2E000
heap
page read and write
1CFE6448000
heap
page read and write
1CFE1B30000
heap
page read and write
1150000
unkown
page readonly
1CFE1B2A000
heap
page read and write
1CFE1B30000
heap
page read and write
1CFE1B2A000
heap
page read and write
1CFE6573000
heap
page read and write
19B000
stack
page read and write
2270000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFE1B3B000
heap
page read and write
1CFE36B8000
trusted library allocation
page read and write
1CFE1B4E000
heap
page read and write
1CFE1C70000
trusted library allocation
page read and write
1CFE1B63000
heap
page read and write
230D000
stack
page read and write
1CFC9172000
trusted library allocation
page read and write
9D000
stack
page read and write
1CFE1B4E000
heap
page read and write
38EF000
trusted library allocation
page read and write
91F000
stack
page read and write
1CFE1B42000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B4D000
heap
page read and write
22CD000
stack
page read and write
1CFE1A90000
trusted library allocation
page read and write
1CFE33E0000
trusted library allocation
page read and write
1CFE1B6D000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE6548000
heap
page read and write
1CFE1B66000
heap
page read and write
1CFE1B4A000
heap
page read and write
1CFC7627000
heap
page read and write
2C5F000
stack
page read and write
7FF9A57CB000
trusted library allocation
page execute and read and write
1CFE1B40000
trusted library allocation
page read and write
1CFE1B4D000
heap
page read and write
1CFE1B4E000
heap
page read and write
70E000
stack
page read and write
1CFE1AC0000
trusted library allocation
page read and write
1CFE1B2C000
heap
page read and write
1CFC7831000
trusted library allocation
page read and write
3311000
trusted library allocation
page read and write
680000
heap
page read and write
91F000
stack
page read and write
2B5F000
stack
page read and write
1CFE36C3000
trusted library allocation
page read and write
1CFE1B2E000
heap
page read and write
720000
heap
page read and write
371C000
trusted library allocation
page read and write
223D000
stack
page read and write
1CFE1DA0000
trusted library allocation
page read and write
1CFE198A000
heap
page read and write
1CFE68E0000
trusted library allocation
page read and write
1CFE1B2A000
heap
page read and write
234D000
stack
page read and write
739000
heap
page execute and read and write
1CFE1C60000
trusted library allocation
page read and write
1CFE1B4A000
heap
page read and write
1CFE1B4A000
heap
page read and write
2C5F000
stack
page read and write
1CFE1B64000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1C20000
trusted library allocation
page read and write
1CFE1AE0000
trusted library allocation
page read and write
1CFE1B2C000
heap
page read and write
1CFE2D74000
heap
page read and write
1CFC74C0000
heap
page read and write
1CFE1FA0000
trusted library allocation
page read and write
1CFC7500000
heap
page read and write
1CFE2D6B000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B32000
heap
page read and write
1CFE1B10000
trusted library allocation
page read and write
1CFE1B65000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFC9130000
trusted library allocation
page read and write
1CFC7830000
trusted library allocation
page read and write
70E000
stack
page read and write
1CFE1B65000
heap
page read and write
1CFE1B4B000
heap
page read and write
19B000
stack
page read and write
1CFE1B23000
heap
page read and write
1CFE1B52000
heap
page read and write
1CFE1C90000
trusted library allocation
page read and write
1CFE1B4A000
heap
page read and write
3712000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B4E000
heap
page read and write
5C0000
unkown
page read and write
1CFE33F0000
trusted library allocation
page read and write
1CFE1B4A000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B4B000
heap
page read and write
371E000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B65000
heap
page read and write
1CFE5C55000
heap
page read and write
739000
heap
page execute and read and write
25AA0D02000
heap
page read and write
1CFE1B51000
heap
page read and write
7E2000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B64000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1A84000
trusted library allocation
page read and write
72A000
heap
page read and write
373A000
heap
page read and write
1CFE1B22000
heap
page read and write
1CFE53B9000
trusted library allocation
page read and write
1CFE1B4E000
heap
page read and write
1CFC7830000
trusted library allocation
page read and write
39F1000
trusted library allocation
page read and write
1CFC7654000
heap
page read and write
295E000
stack
page read and write
7FF9A57FC000
trusted library allocation
page execute and read and write
22CD000
stack
page read and write
38D5000
trusted library allocation
page read and write
1CFE5F87000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B3F000
heap
page read and write
43F000
unkown
page execute and read and write
B19000
heap
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFC7839000
trusted library allocation
page read and write
1CFE1B64000
heap
page read and write
1CFE1B4E000
heap
page read and write
7FF9A5856000
trusted library allocation
page read and write
1CFE1B4E000
heap
page read and write
720000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B4E000
heap
page read and write
680000
heap
page read and write
1CFE1A44000
heap
page read and write
1CFE1B80000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFE1BE0000
trusted library allocation
page read and write
2FEE000
stack
page read and write
1CFE1D1A000
trusted library allocation
page read and write
75F000
heap
page read and write
7F4000
heap
page read and write
1CFC7771000
trusted library allocation
page read and write
1CFE1B32000
heap
page read and write
2B5E000
stack
page read and write
1CFE1B4B000
heap
page read and write
591000
unkown
page readonly
1CFE1B4E000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE1B4A000
heap
page read and write
1CFE1C50000
trusted library allocation
page read and write
2350000
heap
page read and write
1CFE1B30000
heap
page read and write
1CFE1B68000
heap
page read and write
1CFE6761000
trusted library allocation
page read and write
1CFC7830000
trusted library allocation
page read and write
23BF000
stack
page read and write
91F000
stack
page read and write
2270000
heap
page read and write
1CFE2D47000
heap
page read and write
1CFE1BB0000
trusted library allocation
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B36000
heap
page read and write
2EB0000
remote allocation
page read and write
1CFE1B63000
heap
page read and write
A1B0CFE000
stack
page read and write
1CFE1B4A000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE3703000
trusted library allocation
page read and write
1160000
unkown
page read and write
1CFE1AA0000
trusted library allocation
page read and write
1F0000
trusted library allocation
page read and write
1CFE1B65000
heap
page read and write
1140000
unkown
page readonly
1CFE1B51000
heap
page read and write
1CFE1B66000
heap
page read and write
1CFE1B4A000
heap
page read and write
3956000
heap
page read and write
19B000
stack
page read and write
6CE000
stack
page read and write
9D000
stack
page read and write
1CFE1B63000
heap
page read and write
75F000
heap
page read and write
1CFE1B2C000
heap
page read and write
1CFC766B000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE1B65000
heap
page read and write
1CFE36E0000
trusted library allocation
page read and write
1CFE3440000
trusted library allocation
page read and write
D66000
heap
page read and write
590000
unkown
page read and write
1CFE1B6D000
heap
page read and write
1CFE1A08000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE33E0000
trusted library allocation
page read and write
1CFE1FE0000
trusted library allocation
page read and write
1CFC7860000
trusted library allocation
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B4E000
heap
page read and write
23BF000
stack
page read and write
1CFE1AF0000
trusted library allocation
page read and write
22CD000
stack
page read and write
1CFC7510000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B28000
heap
page read and write
1CFE1B50000
heap
page read and write
3841000
trusted library allocation
page read and write
2C5E000
stack
page read and write
A4F000
unkown
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFE1B42000
heap
page read and write
1CFE1B65000
heap
page read and write
1CFE1B4B000
heap
page read and write
30000
unkown
page read and write
1CFE1B26000
heap
page read and write
25AA084A000
heap
page read and write
1CFE1B39000
heap
page read and write
900000
heap
page read and write
6CE000
stack
page read and write
1CFE1B30000
heap
page read and write
1CFE1B60000
trusted library allocation
page read and write
1CFC7780000
trusted library allocation
page read and write
1CFE1B5D000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFC77B0000
trusted library allocation
page read and write
1CFE1B4F000
heap
page read and write
1CFE1B39000
heap
page read and write
2410000
heap
page read and write
1CFE1B68000
heap
page read and write
1CFE3714000
trusted library allocation
page read and write
1CFE1B2E000
heap
page read and write
1CFE1B2A000
heap
page read and write
7F4000
heap
page read and write
1CFC77B0000
heap
page execute and read and write
1CFE3490000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B30000
heap
page read and write
1CFE1B66000
heap
page read and write
1CFE1B4A000
heap
page read and write
1CFE3400000
trusted library allocation
page read and write
1CFE1B66000
heap
page read and write
1CFE1B65000
heap
page read and write
2A5E000
stack
page read and write
25AA0D13000
heap
page read and write
1CFE1B51000
heap
page read and write
1CFE2095000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B26000
heap
page read and write
1CFE1B4E000
heap
page read and write
2350000
heap
page read and write
1CFE1B63000
heap
page read and write
3713000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE1B4E000
heap
page read and write
680000
heap
page read and write
1CFE1B81000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE1B4E000
heap
page read and write
2350000
heap
page read and write
3B46000
trusted library allocation
page read and write
3B1B000
trusted library allocation
page read and write
43F000
unkown
page execute and read and write
1CFE1B66000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1A90000
trusted library allocation
page read and write
720000
heap
page read and write
3952000
trusted library allocation
page read and write
7FF9A57AD000
trusted library allocation
page execute and read and write
1CFE1B63000
heap
page read and write
1CFE1B84000
heap
page read and write
1CFE1B2E000
heap
page read and write
38A4000
trusted library allocation
page read and write
7E2000
heap
page read and write
1CFE1B65000
heap
page read and write
1CFE1B29000
heap
page read and write
1CFE1B67000
heap
page read and write
1CFE1B28000
heap
page read and write
75F000
heap
page read and write
2350000
trusted library allocation
page read and write
720000
heap
page read and write
1CFE1B4A000
heap
page read and write
1CFE1B3F000
heap
page read and write
1CFE1B1D000
heap
page read and write
1CFE1B4E000
heap
page read and write
2410000
heap
page read and write
1CFE1B65000
heap
page read and write
1CFE1B39000
heap
page read and write
1CFE1CF0000
trusted library allocation
page read and write
1CFC77E0000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B10000
heap
page read and write
1CFE6525000
heap
page read and write
7FF9A57B0000
trusted library allocation
page read and write
72A000
heap
page read and write
1CFC77E0000
trusted library allocation
page read and write
75F000
heap
page read and write
75F000
heap
page read and write
1CFE1B4D000
heap
page read and write
38FD000
trusted library allocation
page read and write
1CFE1B39000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B65000
heap
page read and write
1CFE1B32000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE654B000
heap
page read and write
1CFE2D80000
trusted library allocation
page read and write
1CFE1B22000
heap
page read and write
1CFC7810000
trusted library section
page readonly
1CFC9175000
trusted library allocation
page read and write
1CFE1AE0000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
384A000
trusted library allocation
page read and write
1CFE1B65000
heap
page read and write
1CFE1A59000
heap
page read and write
1CFE2050000
trusted library allocation
page read and write
1CFE1B68000
heap
page read and write
2EED000
stack
page read and write
1CFE1B4E000
heap
page read and write
1CFC95EA000
trusted library allocation
page read and write
1CFE36CE000
trusted library allocation
page read and write
1CFE36AA000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B39000
heap
page read and write
1CFE1B63000
heap
page read and write
72A000
heap
page read and write
2C5E000
stack
page read and write
1CFC77E0000
trusted library allocation
page read and write
1CFE1B68000
heap
page read and write
1CFC7800000
trusted library allocation
page read and write
30000
unkown
page read and write
1CFE1B2E000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFC7830000
trusted library allocation
page read and write
D66000
heap
page read and write
1CFE1B25000
heap
page read and write
1CFE1B66000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFE1B2A000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B29000
heap
page read and write
1CFE1B6B000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE1B4E000
heap
page read and write
2FF0000
remote allocation
page read and write
2B5E000
stack
page read and write
1CFE1B39000
heap
page read and write
22CD000
stack
page read and write
1150000
unkown
page readonly
1CFE1B4B000
heap
page read and write
1CFC9130000
trusted library allocation
page read and write
1CFE6451000
heap
page read and write
25AA0848000
heap
page read and write
251E000
stack
page read and write
1CFE1B32000
heap
page read and write
2EAE000
stack
page read and write
1CFE1B66000
heap
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFC7820000
heap
page read and write
1CFC7875000
heap
page read and write
1CFE1B63000
heap
page read and write
591000
unkown
page readonly
1CFE1B30000
heap
page read and write
1CFE64B4000
heap
page read and write
22CD000
stack
page read and write
2270000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B4B000
heap
page read and write
2EAE000
stack
page read and write
23C0000
remote allocation
page read and write
19B000
stack
page read and write
25AA0900000
trusted library allocation
page read and write
1CFC77A0000
trusted library allocation
page read and write
1CFE1B29000
heap
page read and write
1CFE1B65000
heap
page read and write
7E2000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B30000
heap
page read and write
1CFE1B43000
heap
page read and write
1CFE1B39000
heap
page read and write
1CFE1B4E000
heap
page read and write
739000
heap
page execute and read and write
1CFE1B66000
heap
page read and write
1CFC91A0000
trusted library allocation
page read and write
3AC7000
trusted library allocation
page read and write
2C5E000
stack
page read and write
19B000
stack
page read and write
1CFE1B4B000
heap
page read and write
3872000
trusted library allocation
page read and write
3956000
heap
page read and write
2A5E000
stack
page read and write
1CFE19F1000
heap
page read and write
1F0000
trusted library allocation
page read and write
91F000
stack
page read and write
1CFC77E0000
trusted library allocation
page read and write
1CFE1B63000
heap
page read and write
43F000
unkown
page execute and read and write
1CFE1B63000
heap
page read and write
1CFC9170000
trusted library allocation
page read and write
3985000
trusted library allocation
page read and write
1CFE1B66000
heap
page read and write
391A000
trusted library allocation
page read and write
1CFE1BAF000
trusted library allocation
page read and write
6CE000
stack
page read and write
1CFE1B2F000
heap
page read and write
43F000
unkown
page execute and read and write
1CFC91A0000
trusted library allocation
page read and write
9D000
stack
page read and write
1CFE1B30000
heap
page read and write
1CFE1B4A000
heap
page read and write
1CFE1B64000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFC95BB000
trusted library allocation
page read and write
1CFE5EF9000
heap
page read and write
590000
unkown
page read and write
1CFE1D80000
trusted library allocation
page read and write
251E000
stack
page read and write
1CFE1B67000
heap
page read and write
2A5E000
stack
page read and write
72A000
heap
page read and write
1CFE1B4B000
heap
page read and write
2410000
heap
page read and write
9D000
stack
page read and write
7FF9A57A3000
trusted library allocation
page execute and read and write
1CFE1B4A000
heap
page read and write
19B000
stack
page read and write
1CFE2010000
trusted library allocation
page read and write
1CFE1B68000
heap
page read and write
295E000
stack
page read and write
2410000
heap
page read and write
37D5000
trusted library allocation
page read and write
37AD000
trusted library allocation
page read and write
1CFE1B30000
heap
page read and write
1CFE1A5C000
heap
page read and write
590000
unkown
page read and write
38C0000
trusted library allocation
page read and write
590000
unkown
page read and write
1F0000
trusted library allocation
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE1B3B000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE1B4D000
heap
page read and write
70E000
stack
page read and write
2B5E000
stack
page read and write
1CFE1C0D000
trusted library allocation
page read and write
1CFE1B30000
heap
page read and write
1CFE1B65000
heap
page read and write
1CFE1E60000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B4E000
heap
page read and write
70E000
stack
page read and write
1CFE19FF000
heap
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFE1B23000
heap
page read and write
1CFE1B30000
heap
page read and write
1CFE1B00000
trusted library allocation
page read and write
1CFC7834000
trusted library allocation
page read and write
1CFE1B28000
heap
page read and write
1CFE1B65000
heap
page read and write
3713000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFC9150000
trusted library allocation
page read and write
A1F000
stack
page read and write
2270000
heap
page read and write
590000
unkown
page read and write
1CFE1B69000
heap
page read and write
1CFE1B2F000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B2A000
heap
page read and write
387F000
trusted library allocation
page read and write
1CFE1B4A000
heap
page read and write
1CFE1B81000
heap
page read and write
B08000
heap
page read and write
1CFE64CC000
heap
page read and write
1CFE1B50000
heap
page read and write
1CFE1B4A000
heap
page read and write
1CFE1B2F000
heap
page read and write
1CFE1B4A000
heap
page read and write
1CFE1A80000
trusted library allocation
page read and write
1CFE1B63000
heap
page read and write
1CFE1AF0000
trusted library allocation
page read and write
223D000
stack
page read and write
1CFD91CD000
trusted library allocation
page read and write
1CFE1B66000
heap
page read and write
2350000
heap
page read and write
590000
unkown
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B51000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B25000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B23000
heap
page read and write
1CFE1B6C000
heap
page read and write
1CFC91A0000
remote allocation
page read and write
1CFE1AB0000
trusted library allocation
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B1E000
heap
page read and write
1CFE1B38000
heap
page read and write
1CFE2000000
trusted library allocation
page read and write
1CFC7830000
trusted library allocation
page read and write
30000
unkown
page read and write
7FF4BC590000
trusted library allocation
page execute and read and write
2350000
heap
page read and write
1CFC7550000
trusted library allocation
page read and write
739000
heap
page execute and read and write
1CFE1B90000
trusted library allocation
page read and write
590000
unkown
page read and write
1F0000
trusted library allocation
page read and write
1CFE1B28000
heap
page read and write
1CFE196E000
unkown
page readonly
1CFE1B4E000
heap
page read and write
680000
heap
page read and write
1CFC91A0000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFE33D0000
trusted library allocation
page read and write
80D000
heap
page read and write
1CFE1B29000
heap
page read and write
25AA080D000
unkown
page read and write
1CFE2CDC000
heap
page read and write
1CFE1B20000
heap
page read and write
1CFE20D0000
trusted library allocation
page read and write
1CFE2140000
trusted library allocation
page read and write
25AA0D13000
heap
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFC91A0000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFE1D30000
trusted library allocation
page read and write
1CFE1D40000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
3B63000
trusted library allocation
page read and write
75F000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE1B51000
heap
page read and write
590000
unkown
page read and write
25AA0849000
heap
page read and write
30000
unkown
page read and write
23FD000
stack
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B4B000
heap
page read and write
2EB0000
remote allocation
page read and write
1CFE1B4A000
heap
page read and write
1CFE1980000
heap
page read and write
1CFE1B87000
heap
page read and write
A1B04FF000
stack
page read and write
1CFE1B63000
heap
page read and write
1CFE1B53000
heap
page read and write
1CFE1BD0000
trusted library allocation
page read and write
1CFE2CEF000
heap
page read and write
25AA06F0000
heap
page read and write
1CFE1B22000
heap
page read and write
A1F000
stack
page read and write
1CFE36FC000
trusted library allocation
page read and write
680000
heap
page read and write
3913000
trusted library allocation
page read and write
1CFE1B28000
heap
page read and write
1CFE1AE1000
trusted library allocation
page read and write
72A000
heap
page read and write
3AEF000
trusted library allocation
page read and write
7F4000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE64F9000
heap
page read and write
1CFE1B4F000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFC9190000
trusted library allocation
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B4E000
heap
page read and write
223D000
stack
page read and write
739000
heap
page execute and read and write
2A5E000
stack
page read and write
720000
heap
page read and write
70E000
stack
page read and write
1CFE5BF0000
heap
page read and write
1CFE1B4B000
heap
page read and write
43F000
unkown
page execute and read and write
720000
heap
page read and write
1CFE34A0000
trusted library allocation
page read and write
1CFE1EA0000
trusted library allocation
page read and write
1CFE1B66000
heap
page read and write
3956000
heap
page read and write
1CFE1B30000
heap
page read and write
1CFE1B25000
heap
page read and write
A1B02FE000
stack
page read and write
1CFE1B42000
heap
page read and write
1CFE1B65000
heap
page read and write
1CFE1B19000
heap
page read and write
1CFE1B2E000
heap
page read and write
1CFE1B53000
heap
page read and write
1CFE3707000
trusted library allocation
page read and write
1CFE1B68000
heap
page read and write
1CFE1B26000
heap
page read and write
1CFE1B30000
heap
page read and write
1CFE1ED0000
trusted library allocation
page read and write
1CFE1A2A000
heap
page read and write
1CFE1AD0000
trusted library allocation
page read and write
5B0000
unkown
page readonly
1CFE1B4B000
heap
page read and write
2DAD000
stack
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B30000
heap
page read and write
680000
heap
page read and write
91F000
stack
page read and write
1CFE1B4B000
heap
page read and write
1CFC9189000
trusted library allocation
page read and write
1F0000
trusted library allocation
page read and write
1CFE1B25000
heap
page read and write
70E000
stack
page read and write
3934000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B37000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE1B22000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B81000
heap
page read and write
38A7000
trusted library allocation
page read and write
1CFE3A89000
trusted library allocation
page read and write
1CFE1B63000
heap
page read and write
2A5E000
stack
page read and write
1CFE1B4E000
heap
page read and write
25AA0D02000
heap
page read and write
1CFE1B63000
heap
page read and write
40D000
unkown
page execute read
1CFE1B4B000
heap
page read and write
680000
heap
page read and write
5A0000
unkown
page readonly
591000
unkown
page readonly
30000
unkown
page read and write
223D000
stack
page read and write
1CFE1B4E000
heap
page read and write
2B5E000
stack
page read and write
386A000
trusted library allocation
page read and write
234D000
stack
page read and write
2270000
heap
page read and write
1CFE2D70000
heap
page read and write
1CFE1CD0000
trusted library allocation
page read and write
2DAD000
stack
page read and write
1CFC7740000
trusted library allocation
page read and write
1CFE1B4A000
heap
page read and write
223D000
stack
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B84000
heap
page read and write
1CFE3750000
trusted library allocation
page read and write
1CFC72F0000
unkown
page readonly
7FF9A5960000
trusted library allocation
page read and write
1CFE1B64000
heap
page read and write
1CFE1B4A000
heap
page read and write
1CFC95F8000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFE2D01000
heap
page read and write
1CFE1B3A000
heap
page read and write
1CFE1B64000
heap
page read and write
1CFE1B53000
heap
page read and write
1CFE1B65000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1AF7000
heap
page read and write
234D000
stack
page read and write
591000
unkown
page readonly
1CFE1B65000
heap
page read and write
2C5E000
stack
page read and write
1CFE1B2F000
heap
page read and write
1CFE1B52000
heap
page read and write
1CFE1B30000
heap
page read and write
1CFE19F2000
heap
page read and write
A1F000
stack
page read and write
3711000
trusted library allocation
page read and write
1CFE1B64000
heap
page read and write
1CFE1B30000
heap
page read and write
30000
unkown
page read and write
1CFE1B4B000
heap
page read and write
3937000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
234F000
stack
page read and write
25AA0D15000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B64000
heap
page read and write
A1F000
stack
page read and write
1CFE1B66000
heap
page read and write
1CFE1B2D000
heap
page read and write
1CFE1E20000
trusted library allocation
page read and write
1CFE1B86000
heap
page read and write
D62000
heap
page read and write
1CFC91C1000
trusted library allocation
page read and write
25AA084A000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE2130000
trusted library allocation
page read and write
1CFE5C33000
heap
page read and write
234D000
stack
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B66000
heap
page read and write
22F0000
remote allocation
page read and write
1CFE1B4B000
heap
page read and write
49D000
stack
page read and write
23FD000
stack
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B2A000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B68000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B67000
heap
page read and write
1CFE1B28000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B4E000
heap
page read and write
23BF000
stack
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFC7830000
trusted library allocation
page read and write
680000
heap
page read and write
1CFE6508000
heap
page read and write
1CFE1B4E000
heap
page read and write
680000
heap
page read and write
1CFC9140000
trusted library allocation
page read and write
1CFE1B4A000
heap
page read and write
22CD000
stack
page read and write
1CFE1B63000
heap
page read and write
1CFE1B65000
heap
page read and write
1CFE1B67000
heap
page read and write
1CFE1B30000
heap
page read and write
1CFE1B4A000
heap
page read and write
1CFE1B68000
heap
page read and write
739000
heap
page execute and read and write
1CFE1B68000
heap
page read and write
2EED000
stack
page read and write
1CFE1A52000
heap
page read and write
2410000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE1B50000
heap
page read and write
2270000
heap
page read and write
1CFE1B4B000
heap
page read and write
230D000
stack
page read and write
1CFE1B52000
heap
page read and write
1CFE3B46000
trusted library allocation
page read and write
7FF9A57A4000
trusted library allocation
page read and write
1CFE1EB0000
trusted library allocation
page read and write
1CFE2060000
trusted library allocation
page read and write
1CFE1B4E000
heap
page read and write
1CFE3420000
trusted library allocation
page read and write
70E000
stack
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B4B000
heap
page read and write
80D000
heap
page read and write
2A5E000
stack
page read and write
1CFE1B30000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B30000
heap
page read and write
1CFE1B28000
heap
page read and write
739000
heap
page execute and read and write
1CFC7651000
heap
page read and write
23BD000
stack
page read and write
1CFE1B20000
heap
page read and write
2410000
heap
page read and write
1CFE1B66000
heap
page read and write
3A73000
trusted library allocation
page read and write
1CFC7570000
heap
page read and write
1CFE1B51000
heap
page read and write
1CFC7840000
heap
page read and write
1CFE1B6D000
heap
page read and write
1CFE1B67000
heap
page read and write
1CFE1B21000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE1B48000
heap
page read and write
1CFE1B4E000
heap
page read and write
680000
heap
page read and write
1CFE36F5000
trusted library allocation
page read and write
A1B0BFE000
stack
page read and write
1CFE20F0000
trusted library allocation
page read and write
1CFE1B21000
heap
page read and write
251E000
stack
page read and write
1CFE1B67000
heap
page read and write
591000
unkown
page readonly
1CFE1B2F000
heap
page read and write
1CFE3BCB000
trusted library allocation
page read and write
1CFC7599000
heap
page read and write
23BD000
stack
page read and write
1CFE1B30000
heap
page read and write
43F000
unkown
page execute and read and write
72A000
heap
page read and write
1CFE1BF0000
trusted library allocation
page read and write
1CFE1B26000
heap
page read and write
72A000
heap
page read and write
1CFE1B20000
heap
page read and write
1CFE1B68000
heap
page read and write
1CFE2030000
trusted library allocation
page read and write
25AA0D02000
heap
page read and write
1160000
unkown
page read and write
1CFE1B2F000
heap
page read and write
5C0000
unkown
page read and write
3730000
heap
page read and write
7E2000
heap
page read and write
1CFE1B39000
heap
page read and write
7F4000
heap
page read and write
1CFE1B2F000
heap
page read and write
1CFE1B4D000
heap
page read and write
70E000
stack
page read and write
1CFE6492000
heap
page read and write
1CFE1B6D000
heap
page read and write
1CFE2070000
trusted library allocation
page read and write
1CFE1B4A000
heap
page read and write
43F000
unkown
page execute and read and write
80D000
heap
page read and write
75F000
heap
page read and write
25AA0D02000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B4B000
heap
page read and write
43F000
unkown
page execute and read and write
80D000
heap
page read and write
1CFE1B64000
heap
page read and write
1CFE1D20000
trusted library allocation
page read and write
1CFE1A80000
trusted library allocation
page read and write
25AA0C00000
heap
page read and write
1CFE1B30000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B4B000
heap
page read and write
2250000
remote allocation
page read and write
70E000
stack
page read and write
1CFE1B67000
heap
page read and write
591000
unkown
page readonly
1CFE1A67000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B26000
heap
page read and write
1CFE1B2D000
heap
page read and write
2C5E000
stack
page read and write
25AA0C02000
heap
page read and write
7FF9A57CD000
trusted library allocation
page execute and read and write
1CFE2CAD000
heap
page read and write
1CFC7831000
trusted library allocation
page read and write
2C5E000
stack
page read and write
680000
heap
page read and write
1CFE36F2000
trusted library allocation
page read and write
1CFE4FB0000
trusted library allocation
page read and write
1CFE1B63000
heap
page read and write
1CFE1B26000
heap
page read and write
1CFE1B2A000
heap
page read and write
1CFE370E000
trusted library allocation
page read and write
2410000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B4A000
heap
page read and write
1CFE1B2F000
heap
page read and write
720000
heap
page read and write
1CFE2080000
trusted library allocation
page read and write
91F000
stack
page read and write
1CFE1B52000
heap
page read and write
72A000
heap
page read and write
1CFE1B81000
heap
page read and write
C11000
trusted library allocation
page read and write
1CFE1B67000
heap
page read and write
1CFE1B4A000
heap
page read and write
1CFE1B30000
heap
page read and write
1CFC9160000
trusted library allocation
page read and write
1CFE1B52000
heap
page read and write
1CFC7760000
trusted library allocation
page read and write
1CFE1B4A000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE6517000
heap
page read and write
1CFC764D000
heap
page read and write
1CFE1B21000
heap
page read and write
391C000
trusted library allocation
page read and write
251E000
stack
page read and write
2270000
heap
page read and write
1CFE1B6B000
heap
page read and write
1CFE3410000
trusted library allocation
page read and write
3950000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B66000
heap
page read and write
295E000
stack
page read and write
1CFE1F20000
trusted library allocation
page read and write
1CFE5C30000
heap
page read and write
6CE000
stack
page read and write
3849000
trusted library allocation
page read and write
1CFE1B26000
heap
page read and write
23BF000
stack
page read and write
3864000
trusted library allocation
page read and write
1CFC91A0000
trusted library allocation
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B30000
heap
page read and write
3713000
trusted library allocation
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B29000
heap
page read and write
1CFE1B26000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B4E000
heap
page read and write
25AA0C13000
heap
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFE3450000
trusted library allocation
page read and write
2DAD000
stack
page read and write
1CFE1B39000
heap
page read and write
1CFE1A39000
heap
page read and write
91F000
stack
page read and write
1CFE64A2000
heap
page read and write
1CFE1B6D000
heap
page read and write
1CFE6561000
heap
page read and write
1CFE1B26000
heap
page read and write
1CFE5246000
trusted library allocation
page read and write
19B000
stack
page read and write
1CFE1B4D000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B53000
heap
page read and write
A1F000
stack
page read and write
1CFE1B4E000
heap
page read and write
2B5E000
stack
page read and write
1CFE1B4E000
heap
page read and write
1CFE1A94000
trusted library allocation
page read and write
2410000
heap
page read and write
1CFE1B35000
heap
page read and write
1CFE1B4B000
heap
page read and write
91F000
stack
page read and write
23BD000
stack
page read and write
720000
heap
page read and write
720000
heap
page read and write
1CFC91A0000
trusted library allocation
page read and write
1CFE1B26000
heap
page read and write
1CFE1B29000
heap
page read and write
1CFE1B30000
heap
page read and write
1CFE1B30000
heap
page read and write
3D3A000
trusted library allocation
page read and write
A1F000
stack
page read and write
1CFC7830000
trusted library allocation
page read and write
680000
heap
page read and write
1CFE1B6D000
heap
page read and write
1CFE3C49000
trusted library allocation
page read and write
1CFE1B67000
heap
page read and write
1CFE1B64000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B2F000
heap
page read and write
A1B05FE000
stack
page read and write
1CFE1B65000
heap
page read and write
1CFE6546000
heap
page read and write
1CFE3718000
trusted library allocation
page read and write
A1AFD84000
stack
page read and write
1CFC7800000
trusted library allocation
page read and write
1CFE1B81000
heap
page read and write
1CFC9190000
trusted library allocation
page read and write
1CFE33B0000
trusted library allocation
page read and write
1CFE2D3F000
heap
page read and write
680000
heap
page read and write
30000
unkown
page read and write
22CD000
stack
page read and write
39DE000
trusted library allocation
page read and write
2C5F000
stack
page read and write
3876000
trusted library allocation
page read and write
1CFC7651000
heap
page read and write
31C8000
trusted library allocation
page read and write
2270000
heap
page read and write
1CFE1B65000
heap
page read and write
7FF9A5860000
trusted library allocation
page execute and read and write
1CFE1B4B000
heap
page read and write
1CFE1B21000
heap
page read and write
2270000
heap
page read and write
1CFE1B4D000
heap
page read and write
1CFE3683000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
234D000
stack
page read and write
1CFE1B4B000
heap
page read and write
7F4000
heap
page read and write
1CFE1B66000
heap
page read and write
23FD000
stack
page read and write
A1B03FD000
stack
page read and write
1CFE1B4E000
heap
page read and write
1CFE2D51000
heap
page read and write
1CFE1B4B000
heap
page read and write
B19000
heap
page read and write
1CFE1B64000
heap
page read and write
1CFE1B65000
heap
page read and write
1CFE1B28000
heap
page read and write
1CFE1B23000
heap
page read and write
70E000
stack
page read and write
1CFE1B26000
heap
page read and write
1CFE1A61000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B63000
heap
page read and write
6CE000
stack
page read and write
1CFE1B4B000
heap
page read and write
1CFC916A000
trusted library allocation
page read and write
2A5E000
stack
page read and write
1CFC91A0000
trusted library allocation
page read and write
590000
unkown
page read and write
739000
heap
page execute and read and write
3924000
trusted library allocation
page read and write
1CFE68F0000
trusted library allocation
page read and write
1CFE1B3B000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE64AD000
heap
page read and write
25AA084A000
heap
page read and write
223D000
stack
page read and write
A1F000
stack
page read and write
1CFE1B30000
heap
page read and write
739000
heap
page execute and read and write
1CFE1B4B000
heap
page read and write
1CFE3750000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFC9180000
trusted library allocation
page read and write
43F000
unkown
page execute and read and write
3823000
trusted library allocation
page read and write
1CFC7830000
trusted library allocation
page read and write
91F000
stack
page read and write
1CFE1F10000
trusted library allocation
page read and write
1CFE1B4A000
heap
page read and write
1CFC91A0000
trusted library allocation
page read and write
6CE000
stack
page read and write
1CFE1B69000
heap
page read and write
739000
heap
page execute and read and write
1140000
unkown
page readonly
230D000
stack
page read and write
1CFE1B30000
heap
page read and write
1CFE1B4A000
heap
page read and write
1CFE1B17000
heap
page read and write
1CFE66CB000
trusted library allocation
page read and write
590000
unkown
page read and write
1CFE1B66000
heap
page read and write
1CFE2CF8000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1AE0000
trusted library allocation
page read and write
6CE000
stack
page read and write
75F000
heap
page read and write
3713000
trusted library allocation
page read and write
7FF9A57C4000
trusted library allocation
page read and write
43F000
unkown
page execute and read and write
1CFC7770000
trusted library allocation
page read and write
19B000
stack
page read and write
1CFE64C7000
heap
page read and write
251E000
stack
page read and write
1CFE1B4E000
heap
page read and write
2D70000
remote allocation
page read and write
91F000
stack
page read and write
1CFE1B4E000
heap
page read and write
36FF000
unkown
page read and write
1CFE1B30000
heap
page read and write
1CFC91A0000
trusted library allocation
page read and write
1CFE1B28000
heap
page read and write
223D000
stack
page read and write
3956000
heap
page read and write
1CFE66C3000
trusted library allocation
page read and write
22CD000
stack
page read and write
1CFC7839000
trusted library allocation
page read and write
1CFE1B4E000
heap
page read and write
1CFC72F2000
unkown
page readonly
1CFE1B50000
trusted library allocation
page read and write
1CFE1B4E000
heap
page read and write
30000
unkown
page read and write
1CFE1B28000
heap
page read and write
1CFE1B6D000
heap
page read and write
1140000
unkown
page readonly
251E000
stack
page read and write
720000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B6D000
heap
page read and write
739000
heap
page execute and read and write
2B5E000
stack
page read and write
1CFE2D55000
heap
page read and write
1CFE36CA000
trusted library allocation
page read and write
1CFE1B48000
heap
page read and write
371C000
trusted library allocation
page read and write
1CFE370A000
trusted library allocation
page read and write
1CFE1B67000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B43000
heap
page read and write
1CFE1B34000
heap
page read and write
3A21000
trusted library allocation
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B3A000
heap
page read and write
1CFE33B0000
trusted library allocation
page read and write
1CFE1CE0000
trusted library allocation
page read and write
1CFE1B4E000
heap
page read and write
1CFE3B3B000
trusted library allocation
page read and write
1CFC7832000
trusted library allocation
page read and write
1CFC9150000
trusted library allocation
page read and write
1CFE2090000
trusted library allocation
page read and write
2EAE000
stack
page read and write
1CFE1B67000
heap
page read and write
7FF9A58C0000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
23C0000
remote allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFC91A0000
trusted library allocation
page read and write
A1B0AFE000
stack
page read and write
1CFE1B4E000
heap
page read and write
1CFE1FF0000
trusted library allocation
page read and write
1CFE1B64000
heap
page read and write
1CFE1B2E000
heap
page read and write
1CFE651A000
heap
page read and write
223D000
stack
page read and write
A1F000
stack
page read and write
223D000
stack
page read and write
72A000
heap
page read and write
1CFE656B000
heap
page read and write
1CFE1B30000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B30000
heap
page read and write
1CFE1B64000
heap
page read and write
9D000
stack
page read and write
75F000
heap
page read and write
2350000
heap
page read and write
1CFE1B20000
heap
page read and write
1CFE1B65000
heap
page read and write
9D000
stack
page read and write
1CFE1B66000
heap
page read and write
2A5E000
stack
page read and write
1CFE1B4E000
heap
page read and write
25AA0813000
unkown
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B39000
heap
page read and write
2270000
heap
page read and write
1CFE1B4B000
heap
page read and write
2B5E000
stack
page read and write
1CFE1B39000
heap
page read and write
E62917E000
stack
page read and write
1CFE1D70000
trusted library allocation
page read and write
91F000
stack
page read and write
1CFC75E5000
heap
page read and write
392A000
trusted library allocation
page read and write
7E2000
heap
page read and write
230D000
stack
page read and write
1CFE1B39000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B70000
heap
page read and write
1CFE1B6D000
heap
page read and write
1CFE1B87000
heap
page read and write
25AA0D02000
heap
page read and write
1CFE1B3C000
heap
page read and write
400000
unkown
page readonly
1CFE2045000
trusted library allocation
page read and write
1CFE1DC2000
trusted library allocation
page read and write
1CFE1B24000
heap
page read and write
2D5E000
stack
page read and write
1CFE36BF000
trusted library allocation
page read and write
1CFE1B6B000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE64CF000
heap
page read and write
1CFE1B30000
heap
page read and write
5A0000
unkown
page readonly
1CFC7831000
trusted library allocation
page read and write
1CFE1F70000
trusted library allocation
page read and write
1CFE1B63000
heap
page read and write
3710000
trusted library allocation
page read and write
1CFE2D67000
heap
page read and write
1CFE1AE0000
trusted library allocation
page read and write
9D000
stack
page read and write
1CFE64F0000
heap
page read and write
1CFE1B4E000
heap
page read and write
5B0000
unkown
page readonly
230D000
stack
page read and write
1CFC74E0000
heap
page read and write
1CFC7837000
trusted library allocation
page read and write
1CFC95FC000
trusted library allocation
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFE1A3F000
heap
page read and write
1CFE1B2F000
heap
page read and write
1CFE1B66000
heap
page read and write
1CFC7830000
trusted library allocation
page read and write
43F000
unkown
page execute and read and write
251E000
stack
page read and write
1CFE1B66000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE1B30000
heap
page read and write
1CFE1B28000
heap
page read and write
1CFE1EE0000
trusted library allocation
page read and write
1CFE1B2A000
heap
page read and write
1CFE1B66000
heap
page read and write
1CFE1B20000
trusted library allocation
page read and write
295E000
stack
page read and write
1CFE1B64000
heap
page read and write
1CFE6445000
heap
page read and write
70E000
stack
page read and write
1CFE1B30000
heap
page read and write
19B000
stack
page read and write
1CFE1B29000
heap
page read and write
230D000
stack
page read and write
384D000
trusted library allocation
page read and write
1CFE1B2F000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B68000
heap
page read and write
3D67000
trusted library allocation
page read and write
5C0000
unkown
page read and write
7FF9A585C000
trusted library allocation
page execute and read and write
19B000
stack
page read and write
1CFE1B26000
heap
page read and write
1CFE1B4A000
heap
page read and write
1CFE1B4B000
heap
page read and write
6CE000
stack
page read and write
1CFE1B4B000
heap
page read and write
1CFC7649000
heap
page read and write
223D000
stack
page read and write
1CFE1B30000
heap
page read and write
30000
unkown
page read and write
1CFC91A0000
trusted library allocation
page read and write
1CFE1B30000
heap
page read and write
7FF9A58D0000
trusted library allocation
page execute and read and write
1CFE1B6B000
heap
page read and write
2350000
heap
page read and write
1CFE1B2F000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE2D36000
heap
page read and write
1CFE5C53000
heap
page read and write
1CFE1B12000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFE6494000
heap
page read and write
295E000
stack
page read and write
1CFE1B21000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE36B5000
trusted library allocation
page read and write
1CFE1B2A000
heap
page read and write
1CFE1B00000
trusted library allocation
page read and write
1CFE1B63000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE1B6A000
heap
page read and write
1CFE1B50000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE1B63000
heap
page read and write
371C000
trusted library allocation
page read and write
72A000
heap
page read and write
7F4000
heap
page read and write
23BD000
stack
page read and write
251E000
stack
page read and write
1CFE1B4E000
heap
page read and write
3892000
trusted library allocation
page read and write
25AA0848000
heap
page read and write
1CFE1B4E000
heap
page read and write
3B28000
trusted library allocation
page read and write
25AA0D13000
heap
page read and write
1CFE1B42000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE1B4D000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE1B26000
heap
page read and write
1CFC77E0000
trusted library allocation
page read and write
30000
unkown
page read and write
9D000
stack
page read and write
1CFE5C3E000
heap
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFE1B30000
heap
page read and write
251E000
stack
page read and write
1CFE1B20000
heap
page read and write
7FF9A5850000
trusted library allocation
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B25000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B2E000
heap
page read and write
6CE000
stack
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFE1B27000
heap
page read and write
1CFE1B26000
heap
page read and write
1CFC7832000
trusted library allocation
page read and write
371B000
trusted library allocation
page read and write
1CFE33B1000
trusted library allocation
page read and write
1CFE20E0000
trusted library allocation
page read and write
1CFE6181000
trusted library allocation
page read and write
1CFE1B63000
heap
page read and write
1CFE1B30000
heap
page read and write
1CFE64E8000
heap
page read and write
230D000
stack
page read and write
1CFE1B42000
heap
page read and write
1CFE1B66000
heap
page read and write
1CFE1B32000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE607F000
trusted library allocation
page read and write
75F000
heap
page read and write
2C5E000
stack
page read and write
223D000
stack
page read and write
1CFE6440000
heap
page read and write
1CFE1B2A000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B26000
heap
page read and write
25AA0915000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
591000
unkown
page readonly
1CFE1B6D000
heap
page read and write
3718000
trusted library allocation
page read and write
1CFE5DFD000
heap
page read and write
1CFE1B66000
heap
page read and write
1CFE1B4E000
heap
page read and write
7F4000
heap
page read and write
1CFE1C40000
trusted library allocation
page read and write
1CFE1B4A000
heap
page read and write
295E000
stack
page read and write
1CFE1B63000
heap
page read and write
720000
heap
page read and write
37D0000
trusted library allocation
page read and write
1CFE1B30000
heap
page read and write
43F000
unkown
page execute and read and write
1CFE1B30000
heap
page read and write
43F000
unkown
page execute and read and write
1CFE1E40000
trusted library allocation
page read and write
30000
unkown
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFC7839000
trusted library allocation
page read and write
1CFE1B2F000
heap
page read and write
1CFE1B2D000
heap
page read and write
2B5E000
stack
page read and write
1CFE1B27000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1AE0000
trusted library allocation
page read and write
7E2000
heap
page read and write
2410000
heap
page read and write
1CFE1B36000
heap
page read and write
1CFC7860000
trusted library allocation
page read and write
234D000
stack
page read and write
1CFE1B4B000
heap
page read and write
1CFE1EF0000
trusted library allocation
page read and write
1CFE1B2F000
heap
page read and write
1CFE1B30000
heap
page read and write
6CE000
stack
page read and write
1CFE64D3000
heap
page read and write
1CFC91A0000
trusted library allocation
page read and write
591000
unkown
page readonly
1CFE1B63000
heap
page read and write
7F4000
heap
page read and write
1CFE1D60000
trusted library allocation
page read and write
1CFC7589000
heap
page read and write
1CFE1B65000
heap
page read and write
1CFE1B28000
heap
page read and write
1CFE64A8000
heap
page read and write
1CFC91A0000
trusted library allocation
page read and write
1CFE1B21000
heap
page read and write
1CFC762E000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFC75DC000
heap
page read and write
25AA0848000
unkown
page read and write
1CFE1B66000
heap
page read and write
251E000
stack
page read and write
1CFE1B67000
heap
page read and write
1CFE1B20000
heap
page read and write
91F000
stack
page read and write
401000
unkown
page execute read
1CFE5BFC000
heap
page read and write
25AA0800000
unkown
page read and write
1CFE1AE0000
trusted library allocation
page read and write
9D000
stack
page read and write
739000
heap
page execute and read and write
1CFE6569000
heap
page read and write
2350000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFE1B67000
heap
page read and write
1CFE1B30000
heap
page read and write
1CFE1B2F000
heap
page read and write
720000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B39000
heap
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFC9140000
trusted library allocation
page read and write
1CFE5E18000
trusted library allocation
page read and write
1CFE1B4E000
heap
page read and write
1CFE1E30000
trusted library allocation
page read and write
230D000
stack
page read and write
1CFE1B30000
heap
page read and write
1CFE1B68000
heap
page read and write
1CFC9160000
trusted library allocation
page read and write
1CFE1B42000
heap
page read and write
1CFE3430000
trusted library allocation
page read and write
1CFE1B20000
heap
page read and write
2350000
trusted library allocation
page read and write
1CFE1B39000
heap
page read and write
1CFE1B42000
heap
page read and write
1CFE2D1C000
heap
page read and write
1CFC7654000
heap
page read and write
A1F000
stack
page read and write
1CFE6455000
heap
page read and write
1CFE1F30000
trusted library allocation
page read and write
591000
unkown
page readonly
230D000
stack
page read and write
1CFE2CD1000
heap
page read and write
1CFE1B2E000
heap
page read and write
30000
unkown
page read and write
1CFE5BF1000
heap
page read and write
1CFE1B4B000
heap
page read and write
30000
unkown
page read and write
1CFE1B64000
heap
page read and write
1CFE1B65000
heap
page read and write
1CFE1B28000
heap
page read and write
1CFE1B2A000
heap
page read and write
1CFE1B4B000
heap
page read and write
223D000
stack
page read and write
1CFE1B63000
heap
page read and write
7F4000
heap
page read and write
3718000
trusted library allocation
page read and write
1CFE33F0000
trusted library allocation
page read and write
1CFD91C1000
trusted library allocation
page read and write
1CFC7505000
heap
page read and write
2350000
heap
page read and write
1CFE1B4E000
heap
page read and write
7E2000
heap
page read and write
1CFE1B2F000
heap
page read and write
1CFE3750000
trusted library allocation
page read and write
1CFE1AF7000
trusted library allocation
page read and write
1CFE36B0000
trusted library allocation
page read and write
1CFC9170000
trusted library allocation
page read and write
30000
unkown
page read and write
223D000
stack
page read and write
1CFE1B63000
heap
page read and write
37F1000
trusted library allocation
page read and write
7E2000
heap
page read and write
590000
unkown
page read and write
1CFE1B2B000
heap
page read and write
1CFE1B53000
heap
page read and write
1CFE1B29000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE1DF0000
trusted library allocation
page read and write
1CFE1B4E000
heap
page read and write
A1F000
stack
page read and write
23C0000
remote allocation
page read and write
1CFE1B20000
heap
page read and write
1CFE19A2000
heap
page read and write
25AA084A000
heap
page read and write
1CFE1B2F000
heap
page read and write
1CFE1B38000
heap
page read and write
1CFE3D52000
trusted library allocation
page read and write
75F000
heap
page read and write
1CFE1B2B000
heap
page read and write
326E000
unkown
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B27000
heap
page read and write
1CFE1E90000
trusted library allocation
page read and write
1CFE1B4E000
heap
page read and write
430000
heap
page read and write
2A5E000
stack
page read and write
9D000
stack
page read and write
1CFE19AA000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B81000
heap
page read and write
1CFE1B6D000
heap
page read and write
113D000
stack
page read and write
1CFE1B63000
heap
page read and write
1CFC783D000
trusted library allocation
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFE1B30000
heap
page read and write
591000
unkown
page readonly
1CFC7850000
trusted library allocation
page read and write
1CFE1B26000
heap
page read and write
1CFE1AB0000
trusted library section
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B4E000
heap
page read and write
80D000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B52000
heap
page read and write
1F0000
trusted library allocation
page read and write
1CFE1B6D000
heap
page read and write
1CFE1B4C000
heap
page read and write
23BD000
stack
page read and write
1CFE1B23000
heap
page read and write
9D000
stack
page read and write
1CFC75DA000
heap
page read and write
1CFE1B4B000
heap
page read and write
3830000
trusted library allocation
page read and write
230D000
stack
page read and write
1CFE198C000
heap
page read and write
22F0000
remote allocation
page read and write
1CFE1F80000
trusted library allocation
page read and write
2250000
remote allocation
page read and write
1CFE1B28000
heap
page read and write
1CFE1B30000
heap
page read and write
7E2000
heap
page read and write
1CFE1B68000
heap
page read and write
E629279000
stack
page read and write
1CFE1B64000
heap
page read and write
1CFE1B64000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE1B66000
heap
page read and write
1CFE1B18000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B66000
heap
page read and write
1CFE1B4A000
heap
page read and write
1CFE1B30000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFC7810000
trusted library allocation
page read and write
1CFE1B30000
heap
page read and write
1CFE1E70000
trusted library allocation
page read and write
43F000
unkown
page execute and read and write
1CFC75AC000
heap
page read and write
1CFE5F8B000
heap
page read and write
1CFE651C000
heap
page read and write
6CE000
stack
page read and write
2A5E000
stack
page read and write
1CFE1B64000
heap
page read and write
1CFE1B30000
heap
page read and write
1CFE1AE0000
trusted library allocation
page read and write
1CFE1B30000
heap
page read and write
1CFE1B4A000
heap
page read and write
1CFE1B10000
trusted library allocation
page read and write
75F000
heap
page read and write
1CFE1B2A000
heap
page read and write
70E000
stack
page read and write
1CFE1BC0000
trusted library allocation
page read and write
1CFE1B66000
heap
page read and write
23FD000
stack
page read and write
1CFE5DFA000
heap
page read and write
3716000
trusted library allocation
page read and write
1CFE1B63000
heap
page read and write
7FF9A5886000
trusted library allocation
page execute and read and write
3A40000
trusted library allocation
page read and write
23C0000
remote allocation
page read and write
1CFE1B30000
heap
page read and write
1CFE2CAA000
heap
page read and write
72A000
heap
page read and write
1CFE1B2F000
heap
page read and write
6CE000
stack
page read and write
1CFE1A47000
heap
page read and write
1CFE5BF1000
heap
page read and write
1CFE1B4F000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE19BC000
heap
page read and write
1CFE1B30000
heap
page read and write
A1F000
stack
page read and write
1CFE1B21000
heap
page read and write
1CFE1B4A000
heap
page read and write
1CFE1B66000
heap
page read and write
1CFE2100000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFE5303000
trusted library allocation
page read and write
1CFE1CB0000
trusted library allocation
page read and write
32B0000
heap
page read and write
1CFE1B4B000
heap
page read and write
2270000
heap
page read and write
1CFE1B4E000
heap
page read and write
7FF9A57BD000
trusted library allocation
page execute and read and write
1CFE63E2000
trusted library allocation
page read and write
1F0000
trusted library allocation
page read and write
1CFE1DD0000
trusted library allocation
page read and write
1CFE1B26000
heap
page read and write
1CFE1B67000
heap
page read and write
591000
unkown
page readonly
1CFC7450000
heap
page read and write
1CFE3D40000
trusted library allocation
page read and write
1CFE1B30000
heap
page read and write
2270000
heap
page read and write
1CFC765F000
heap
page read and write
FD0000
heap
page read and write
1CFE1B4E000
heap
page read and write
590000
unkown
page read and write
25AA0D00000
heap
page read and write
1CFE1B52000
heap
page read and write
2B5E000
stack
page read and write
1CFE1B4E000
heap
page read and write
591000
unkown
page readonly
C11000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFE1B4E000
heap
page read and write
72A000
heap
page read and write
1CFE1B66000
heap
page read and write
251E000
stack
page read and write
2C5E000
stack
page read and write
72A000
heap
page read and write
1CFE20C0000
trusted library allocation
page read and write
1CFE1B4D000
heap
page read and write
23C0000
remote allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFC757C000
heap
page read and write
80D000
heap
page read and write
1CFE1FD0000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B15000
heap
page read and write
1CFE1B30000
heap
page read and write
1CFE5773000
trusted library allocation
page read and write
739000
heap
page execute and read and write
1CFE1B4B000
heap
page read and write
295E000
stack
page read and write
A1F000
stack
page read and write
1CFE1B6D000
heap
page read and write
22CD000
stack
page read and write
1CFE1B39000
heap
page read and write
1CFE1B36000
heap
page read and write
19B000
stack
page read and write
1CFE1B4B000
heap
page read and write
23BD000
stack
page read and write
2D5E000
stack
page read and write
1CFE56B6000
trusted library allocation
page read and write
1CFE1B64000
heap
page read and write
1F0000
trusted library allocation
page read and write
1CFE3A40000
trusted library allocation
page read and write
1CFE650A000
heap
page read and write
25AA0760000
heap
page read and write
1CFE1F60000
trusted library allocation
page read and write
1CFE1B4B000
heap
page read and write
234D000
stack
page read and write
1CFE1B29000
heap
page read and write
5B0000
unkown
page readonly
1CFE1B4C000
heap
page read and write
1CFE1AE0000
trusted library allocation
page read and write
1CFE1B30000
heap
page read and write
9D000
stack
page read and write
1CFE1B22000
heap
page read and write
1CFE1AD0000
trusted library allocation
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE2D2B000
heap
page read and write
75F000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFC95CE000
trusted library allocation
page read and write
1CFE1DE0000
trusted library allocation
page read and write
1CFE1B66000
heap
page read and write
1CFE1B64000
heap
page read and write
3080000
trusted library allocation
page read and write
295E000
stack
page read and write
1CFE2D4C000
heap
page read and write
70E000
stack
page read and write
1CFE1D48000
trusted library allocation
page read and write
25AA0D02000
heap
page read and write
2A5E000
stack
page read and write
1CFE1C10000
trusted library allocation
page read and write
1CFE1B63000
heap
page read and write
1CFE1B2A000
heap
page read and write
91F000
stack
page read and write
1CFC7665000
heap
page read and write
D60000
heap
page read and write
1CFE1B20000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B30000
heap
page read and write
22CD000
stack
page read and write
590000
unkown
page read and write
1CFE1B63000
heap
page read and write
739000
heap
page execute and read and write
1CFE1B28000
heap
page read and write
1CFC7830000
trusted library allocation
page read and write
1CFE1AE0000
trusted library allocation
page read and write
1CFE6536000
heap
page read and write
6CE000
stack
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B4D000
heap
page read and write
22CD000
stack
page read and write
7FF9A5980000
trusted library allocation
page execute and read and write
1CFE1B64000
heap
page read and write
72A000
heap
page read and write
1CFE1B30000
heap
page read and write
1CFE1B4B000
heap
page read and write
2C5F000
stack
page read and write
1CFE1B51000
heap
page read and write
1CFE1982000
heap
page read and write
2D5E000
stack
page read and write
1CFE1B4E000
heap
page read and write
230D000
stack
page read and write
739000
heap
page execute and read and write
1CFC7830000
trusted library allocation
page read and write
75F000
heap
page read and write
1CFC7442000
unkown
page readonly
1CFE5EFC000
trusted library allocation
page read and write
2D5E000
stack
page read and write
1CFE1E80000
trusted library allocation
page read and write
2270000
heap
page read and write
1CFE2C80000
heap
page read and write
1CFE1A1D000
heap
page read and write
1CFE1B4A000
heap
page read and write
1CFE1B4B000
heap
page read and write
1CFE1B63000
heap
page read and write
1CFE2D0A000
heap
page read and write
1CFE1B4B000
heap
page read and write
72A000
heap
page read and write
1CFE1B28000
heap
page read and write
25AA0D13000
heap
page read and write
25AA0902000
trusted library allocation
page read and write
1CFE1B2F000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE2DA2000
trusted library allocation
page read and write
25AA0849000
heap
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B22000
heap
page read and write
1CFE1B2A000
heap
page read and write
2D70000
remote allocation
page read and write
1CFE5C04000
heap
page read and write
223D000
stack
page read and write
1CFE1B4E000
heap
page read and write
1CFE1B4E000
heap
page read and write
2270000
heap
page read and write
1CFE1B39000
heap
page read and write
There are 2193 hidden memdumps, click here to show them.