IOC Report
LicitacionelectronicaPLACSP.jnlp

loading gifFilesProcessesURLsDomainsRegistryMemdumps1,00010010Label

Files

File Path
Type
Category
Malicious
Download
LicitacionelectronicaPLACSP.jnlp
XML 1.0 document, Unicode text, UTF-8 text
initial sample
C:\ProgramData\Oracle\Java\.oracle_jre_usage\b5820291038aa69c.timestamp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\LocalLow\Sun\Java\Deployment\deployment.properties
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\common[1]
ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\host[1]
Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\auwelcome_en[1]
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\rtutils[1]
Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\runtime[1]
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\l10n[1]
HTML document, Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\masthead_left[1]
PNG image data, 208 x 57, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\auwelcome[1]
HTML document, Unicode text, UTF-8 text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\layout[1]
Unicode text, UTF-8 (with BOM) text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\masthead_fill[1]
PNG image data, 172 x 57, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\au-descriptor-1.8.0_401-b10.xml
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\hsperfdata_user\2668
data
dropped
C:\Users\user\AppData\Local\Temp\hsperfdata_user\3116
data
dropped
C:\Users\user\AppData\Local\Temp\hsperfdata_user\6716
data
dropped
C:\Users\user\AppData\Local\Temp\hsperfdata_user\6768
data
dropped
C:\Users\user\AppData\Local\Temp\jawshtml.html
HTML document, ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\jusched.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\83aa4cc77f591dfc2374580bbd95f6ba_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
There are 13 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Java\jre-1.8\bin\jp2launcher.exe
C:\Program Files (x86)\Java\jre-1.8\bin\jp2launcher.exe" -securejws "C:\Users\user\Desktop\LicitacionelectronicaPLACSP.jnlp
C:\Program Files (x86)\Java\jre-1.8\bin\javaws.exe
C:\Program Files (x86)\Java\jre-1.8\bin\javaws.exe" "C:\Users\user\Desktop\LicitacionelectronicaPLACSP.jnlp
C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -cp "C:\PROGRA~2\Java\jre-1.8\lib\deploy.jar" com.sun.deploy.panel.ControlPanel -userConfig "deployment.expiration.decision.11.381.2" "update
C:\Windows\SysWOW64\icacls.exe
C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -cp "C:\PROGRA~2\Java\jre-1.8\lib\deploy.jar" com.sun.deploy.panel.ControlPanel -userConfig "deployment.expiration.decision.timestamp.11.381.2" "1709215408
C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe" -cp "C:\PROGRA~2\Java\jre-1.8\lib\deploy.jar" com.sun.deploy.panel.ControlPanel -userConfig "deployment.expiration.decision.suppression.11.381.2" "false
C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe
C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe
C:\Program Files (x86)\Java\jre-1.8\bin\javaws.exe
"C:\Program Files (x86)\Java\jre-1.8\bin\javaws.exe" -J-Djdk.disableLastUsageTracking=true -SSVBaselineUpdate
C:\Program Files (x86)\Java\jre-1.8\bin\jp2launcher.exe
"C:\Program Files (x86)\Java\jre-1.8\bin\jp2launcher.exe" -secure -javaws -jre "C:\Program Files (x86)\Java\jre-1.8" -vma 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 -ma LVNTVkJhc2VsaW5lVXBkYXRlAC1ub3RXZWJKYXZh

URLs

Name
IP
Malicious
https://javadl-esd-secure.oracle.come
unknown
http://repository.swisssign.com/sp
unknown
https://javadl-esd-secure.oracle.com/update/1
unknown
http://crl.chambersign.org/chambersroot.crl0
unknown
https://javadl-esd-secure.or
unknown
https://javadl-esd-secure.oracle.co
unknown
http://stackoverflow.com/a/15123777)
unknown
http://www.chambersign.org1
unknown
http://repository.swisssign.com/0
unknown
http://javaweb.sfbay.sun.com/~hj156752/awtless/fx/installer/fxinstaller.jnlpbd
unknown
http://policy.camerfirma.comK
unknown
http://repository.swisssign.com/3
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d245f941845490c91360409ecffb3b4/
unknown
https://ocsp.quovadisoffshore.com
unknown
https://rps-svcs.oracle.com/services/countrylookup
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d245f941845490c913
unknown
http://www.computerhope.com/forum
unknown
http://stackoverflow.com/a/1465386/4224163
unknown
http://www.tutorialspoint.com/javascript/array_map.htm
unknown
http://policy.camerfirma.com;
unknown
http://repository.swisssign.com/c
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d245f941845490c91360409ecffb3b
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d245f941845490c91360409ecffb3b4/au-desc
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d245f941845
unknown
http://crl.xrampsecurity.com/XGCA.crlS
unknown
http://es5.github.io/#x15.4.4.21
unknown
https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/String/startsWith
unknown
http://policy.camerfirma.com0
unknown
https://javadl-esd-secure.ora
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/map-m-1.8.0.xml8M
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d245f941845490c91360409ecffb3b4/au-de
unknown
https://javadl-esd-secure.oracle.com/update/1z
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d245f941845490c
unknown
https://javadl-esd-secure.oracle.com/u
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/map-m-1.8.0.xml
unknown
https://javadl-esd-secure.oracle.com/up
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d245f94184549
unknown
https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Array/filter
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d245f9
unknown
http://bugreport.sun.com/bugreport/
unknown
http://crl.mic
unknown
http://java.oracle.com/
unknown
http://null.oracle.com/
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d245f941845490c91360
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d245f941845490c91360409ecffb3b4/au-descrip
unknown
https://rps-svcs.oracle.com/services/countrylookupS
unknown
http://javaweb.sfbay.sun.com/~hj156752/awtless/fx/installer/fxinstaller.jnlprint
unknown
https://javadl-esd-secure.oracle.com/
unknown
http://cps.chambersign.org/cps/chambersroot.html
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d24
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d2
unknown
https://support.oracle.com
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d245f941
unknown
https://javadl-esd-secure.oracle.com/update/
unknown
http://crl.securetrust.com/STCA.crl
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d245f941845490c9136040
unknown
http://crl.xrampsecurity.com/XGCA.crl0
unknown
https://javadl-esd-secure.oracle.
unknown
http://crl.securetrust.com/STCA.crlc
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d245f941845490c91360409ecffb3b4/au
unknown
http://stackoverflow.com/questions/1068834/object-comparison-in-javascript
unknown
http://www.quovadis.bm0
unknown
https://javadl-esd-secure.oracle.c
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/
unknown
http://javaweb.sfbay.sun.com/~hj156752/awtless/fx/installer/fxinstaller.jnlp
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d245f941845490c91360409ecffb3b4/au-descri
unknown
http://dl.javafx.com/javafx-cache.jnlpd
unknown
https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Array/indexOf
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d245f941845490c91360409ecffb3b4/au-descr
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d245f941845490c91
unknown
https://developer.mozilla.org/en/docs/Web/JavaScript/Reference/Global_Objects/String/endsWith
unknown
http://java.sun.com/products/autodl/j2se$
unknown
http://javaweb.sfbay.sun.com/~hj156752/awtless/fx/installer/fxinstaller.jnlpb
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d245f941845490c91360409ecffb3b4/au-descriptor-1.8
unknown
https://repository.luxtrust.lu0
unknown
http://www.computerhope.com/forumhp?topic=76293.0
unknown
http://cps.chambersign.org/cps/chambersroot.html0
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d245f941845490c91360409ecffb3b4/a
unknown
https://javadl-esd-secure.oracle.com
unknown
https://javadl-esd-secure.oracle.com/update/1.8.
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d245
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d245f941845490c91360409ec
unknown
http://java.sun.com/products/autodl/j2se
unknown
http://www.computerhope.com/forum/index.php?topic=76293.0
unknown
http://javaweb.sfbay.sun.com/~hj156752/awtless/fx/installer/fxinstaller.jnlpt
unknown
http://bugs.sun.com
unknown
http://policy.camerfirma.com
unknown
http://cps.chambersign.org/cps/chambersroot.html;
unknown
https://javadl-esd-secure.oracle.com/updat
unknown
http://crl.securetrust.com/STCA.crl0
unknown
https://javadl-esd-secure.oracle.com/#&
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d245f941845490c9136
unknown
https://www.oracle.com/technetwork/java/javase/downloads
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d245f941845490c91360409ecffb3b4/au-descriptor-1.
unknown
http://cps.chambersign.org/cps/chambersroot.htmlK
unknown
http://www.quovadisglobal.com/cps0
unknown
http://java.sun.com/products/autodl/j2seL
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d245f941845490c913604
unknown
https://javadl-esd-secure.oracl
unknown
https://javadl-esd-secure.oracle.com/update/1.8.0/4d245f941845490c91360409ecff
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
javadl-esd-secure.oracle.com
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.roaming.profile
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.version
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.expired.version
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.browser.path
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.expiration.decision.11.381.2
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.browser.path
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.modified.timestamp
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.expiration.decision.11.381.2
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.roaming.profile
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.version
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.expired.version
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.browser.path
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.modified.timestamp
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.expiration.decision.11.381.2
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.roaming.profile
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.version
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.expired.version
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.expiration.decision.timestamp.11.381.2
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.browser.path
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.modified.timestamp
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.expiration.decision.11.381.2
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.roaming.profile
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.version
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.expired.version
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.expiration.decision.timestamp.11.381.2
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.browser.path
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.modified.timestamp
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.expiration.decision.suppression.11.381.2
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.expiration.decision.11.381.2
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.version
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.expired.version
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.expiration.decision.timestamp.11.381.2
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.browser.path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\JavaSoft\Java Update\Policy\jucheck
Method
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\JavaSoft\Java Update\Policy\jucheck
LastUDCheckTime
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\JavaSoft\Java Update\Policy\jucheck
VersionXmlURL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\JavaSoft\Java Update\Policy\jucheck
VersionXmlChecksum
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\JavaSoft\Java Update\Policy\jucheck
LocalFileName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\JavaSoft\Java Update\Policy\jucheck
InstallOptions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\JavaSoft\Java Update\Policy\jucheck
UpdateDescription
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\JavaSoft\Java Update\Policy\jucheck
UpdateMoreInfoUrl
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\JavaSoft\Java Update\Policy\jucheck
BalloonTitle
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\JavaSoft\Java Update\Policy\jucheck
BalloonTip
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\JavaSoft\Java Update\Policy\jucheck
UpdateTitle1
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\JavaSoft\Java Update\Policy\jucheck
DlgCaption
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\JavaSoft\Java Update\Policy\jucheck
MoreInfoTxt
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\JavaSoft\Java Update\Policy\jucheck
PreDownldStatus
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\JavaSoft\Java Update\Policy\jucheck
BalloonVisible
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\JavaSoft\Java Update\Policy\jucheck
LastUpdateBeginTime
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.modified.timestamp
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.expiration.decision.suppression.11.381.2
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.expiration.decision.11.381.2
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.roaming.profile
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.version
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.expired.version
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.expiration.decision.timestamp.11.381.2
HKEY_CURRENT_USER\SOFTWARE\JavaSoft\DeploymentProperties
deployment.browser.path
There are 47 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
2FA1000
heap
page read and write
2FA1000
heap
page read and write
449C000
trusted library allocation
page read and write
4020000
trusted library allocation
page read and write
4517000
heap
page read and write
9D0000
heap
page read and write
4546000
heap
page read and write
486D000
trusted library allocation
page read and write
478F000
stack
page read and write
48F5000
trusted library allocation
page read and write
D4A000
heap
page read and write
DAD000
heap
page read and write
BA4000
heap
page read and write
BF0000
heap
page read and write
13C0000
heap
page read and write
BA4000
heap
page read and write
5CBB000
trusted library allocation
page read and write
16B5E000
unkown
page read and write
BA4000
heap
page read and write
A76000
heap
page read and write
450D000
heap
page read and write
2FA1000
heap
page read and write
2FA1000
heap
page read and write
D74000
heap
page read and write
3A47000
heap
page read and write
26AC000
trusted library allocation
page execute and read and write
486C000
trusted library allocation
page read and write
164D0000
trusted library allocation
page read and write
2FA1000
heap
page read and write
BA5000
heap
page read and write
E20000
heap
page read and write
4836000
trusted library allocation
page read and write
DCC000
heap
page read and write
2FA1000
heap
page read and write
17EFE000
stack
page read and write
BA5000
heap
page read and write
449E000
trusted library allocation
page read and write
4517000
heap
page read and write
16C25000
heap
page read and write
450D000
heap
page read and write
8E0000
heap
page read and write
7FC54000
trusted library allocation
page execute read
53BD000
trusted library allocation
page read and write
13C5000
heap
page read and write
3F72000
trusted library allocation
page read and write
DAA000
heap
page read and write
2FA1000
heap
page read and write
481D000
trusted library allocation
page read and write
AFE6000
trusted library allocation
page read and write
4859000
trusted library allocation
page read and write
172FD000
unkown
page read and write
2FA1000
heap
page read and write
4507000
heap
page read and write
13C0000
heap
page read and write
16A94000
heap
page read and write
3FC8000
trusted library allocation
page read and write
16A88000
heap
page read and write
3100000
heap
page read and write
D74000
heap
page read and write
6CB7A000
unkown
page readonly
485E000
trusted library allocation
page read and write
D20000
heap
page read and write
BA4000
heap
page read and write
D7E000
heap
page read and write
4BE5000
trusted library allocation
page read and write
4800000
trusted library allocation
page read and write
1674D000
stack
page read and write
50EE000
trusted library allocation
page read and write
1657D000
stack
page read and write
3FC4000
trusted library allocation
page read and write
4BB3000
trusted library allocation
page read and write
E27000
heap
page read and write
86EF000
heap
page read and write
16BAE000
unkown
page read and write
483A000
trusted library allocation
page read and write
7D8D000
trusted library allocation
page read and write
AF56000
trusted library allocation
page read and write
4896000
trusted library allocation
page read and write
D8E000
stack
page read and write
1814D000
stack
page read and write
482D000
trusted library allocation
page read and write
7F80000
trusted library allocation
page read and write
433F000
stack
page read and write
1681D000
stack
page read and write
D74000
heap
page read and write
BA4000
heap
page read and write
D79000
heap
page read and write
15E1D000
stack
page read and write
BA4000
heap
page read and write
2FA1000
heap
page read and write
86C000
stack
page read and write
4507000
heap
page read and write
2FA1000
heap
page read and write
7F90000
trusted library allocation
page read and write
2EDE000
stack
page read and write
3F7E000
trusted library allocation
page read and write
3F50000
heap
page read and write
2FA1000
heap
page read and write
F26000
heap
page read and write
2E1E000
stack
page read and write
4516000
heap
page read and write
DAB000
heap
page read and write
16B1D000
unkown
page read and write
6CB90000
unkown
page readonly
4010000
trusted library allocation
page read and write
16440000
trusted library allocation
page read and write
2EEA000
trusted library allocation
page execute and read and write
2BD1000
heap
page read and write
3633000
trusted library allocation
page execute and read and write
4507000
heap
page read and write
1818E000
stack
page read and write
D74000
heap
page read and write
2660000
trusted library allocation
page execute and read and write
4514000
heap
page read and write
DA0000
heap
page read and write
2FA1000
heap
page read and write
B1A8000
trusted library allocation
page read and write
53D2000
trusted library allocation
page read and write
DC0000
heap
page read and write
4866000
trusted library allocation
page read and write
16ACD000
stack
page read and write
449F000
trusted library allocation
page read and write
D75000
heap
page read and write
2BD1000
heap
page read and write
4FFB000
stack
page read and write
26BA000
trusted library allocation
page execute and read and write
44A9000
heap
page read and write
4509000
heap
page read and write
4840000
trusted library allocation
page read and write
2FA1000
heap
page read and write
404E000
trusted library allocation
page read and write
4857000
trusted library allocation
page read and write
25BE000
stack
page read and write
BA4000
heap
page read and write
4822000
trusted library allocation
page read and write
4514000
heap
page read and write
4BD5000
trusted library allocation
page read and write
486A000
trusted library allocation
page read and write
4855000
trusted library allocation
page read and write
4864000
trusted library allocation
page read and write
D74000
heap
page read and write
D78000
heap
page read and write
7FD0000
heap
page read and write
C40000
heap
page read and write
6F5AA000
unkown
page readonly
BA4000
heap
page read and write
4870000
trusted library allocation
page read and write
2FA1000
heap
page read and write
5061000
trusted library allocation
page read and write
DCD000
heap
page read and write
1703E000
unkown
page read and write
2FA1000
heap
page read and write
3A33000
heap
page read and write
BA4000
heap
page read and write
2FA1000
heap
page read and write
D74000
heap
page read and write
3A47000
heap
page read and write
13C5000
heap
page read and write
D74000
heap
page read and write
423F000
stack
page read and write
4507000
heap
page read and write
EFE000
stack
page read and write
2EB0000
trusted library allocation
page execute and read and write
35E2000
trusted library allocation
page execute and read and write
13C5000
heap
page read and write
4888000
trusted library allocation
page read and write
2FA1000
heap
page read and write
1738E000
unkown
page read and write
2FA1000
heap
page read and write
DBC000
heap
page read and write
2FA1000
heap
page read and write
13FC000
heap
page read and write
171FD000
stack
page read and write
486E000
trusted library allocation
page read and write
BA5000
heap
page read and write
117E000
heap
page read and write
39F1000
heap
page read and write
2FA1000
heap
page read and write
4800000
trusted library allocation
page read and write
D7A000
heap
page read and write
AD81000
trusted library allocation
page read and write
2F4F000
stack
page read and write
D95000
heap
page read and write
1667E000
unkown
page read and write
D81000
heap
page read and write
4823000
trusted library allocation
page read and write
5284000
trusted library allocation
page read and write
15800000
trusted library allocation
page read and write
3F1C000
unkown
page read and write
2FA1000
heap
page read and write
48EE000
trusted library allocation
page read and write
BA4000
heap
page read and write
880000
heap
page read and write
3A47000
heap
page read and write
8E6000
heap
page read and write
483D000
trusted library allocation
page read and write
873E000
heap
page read and write
404E000
trusted library allocation
page read and write
450D000
heap
page read and write
115D000
heap
page read and write
DC7000
heap
page read and write
BA4000
heap
page read and write
2FA1000
heap
page read and write
1185000
heap
page read and write
4821000
trusted library allocation
page read and write
2BDF000
stack
page read and write
E03000
heap
page read and write
F24000
heap
page read and write
BA4000
heap
page read and write
F22000
heap
page read and write
2FA1000
heap
page read and write
4028000
trusted library allocation
page read and write
4507000
heap
page read and write
3FCE000
trusted library allocation
page read and write
56F0000
trusted library allocation
page read and write
171A0000
heap
page read and write
3FEA000
trusted library allocation
page read and write
1749A000
trusted library allocation
page read and write
1678D000
stack
page read and write
4516000
heap
page read and write
BA4000
heap
page read and write
58B000
stack
page read and write
2FA1000
heap
page read and write
4BD4000
trusted library allocation
page read and write
B31000
stack
page read and write
6CB40000
unkown
page readonly
AA0000
heap
page read and write
2FA1000
heap
page read and write
167DE000
unkown
page read and write
7FC56000
trusted library allocation
page execute read
1360000
heap
page read and write
13C5000
heap
page read and write
2FA1000
heap
page read and write
39D5000
heap
page read and write
35DA000
heap
page read and write
2FA1000
heap
page read and write
16C80000
heap
page read and write
3D3F000
heap
page read and write
11AD000
heap
page read and write
4516000
heap
page read and write
2ADE000
stack
page read and write
182C8000
heap
page read and write
D89000
heap
page read and write
174DD000
stack
page read and write
486A000
trusted library allocation
page read and write
B3B000
stack
page read and write
2F54000
trusted library allocation
page execute and read and write
E2A000
heap
page read and write
D74000
heap
page read and write
12FA000
stack
page read and write
13C5000
heap
page read and write
2FA1000
heap
page read and write
DB0000
heap
page read and write
16A8F000
unkown
page read and write
4016000
trusted library allocation
page read and write
DF2000
heap
page read and write
16DBD000
stack
page read and write
B7C000
stack
page read and write
1496000
heap
page read and write
2650000
unkown
page read and write
1290000
heap
page read and write
13C5000
heap
page read and write
4880000
trusted library allocation
page read and write
3F78000
trusted library allocation
page read and write
5033000
trusted library allocation
page read and write
50C3000
trusted library allocation
page read and write
1183000
heap
page read and write
2FA1000
heap
page read and write
4897000
trusted library allocation
page read and write
BA5000
heap
page read and write
7F80000
trusted library allocation
page read and write
2FB0000
heap
page read and write
BA4000
heap
page read and write
BE0000
heap
page read and write
2FA1000
heap
page read and write
17A0000
unkown
page read and write
69AE000
stack
page read and write
4541000
heap
page read and write
44A4000
heap
page read and write
39EA000
heap
page read and write
6CB41000
unkown
page execute read
123C000
stack
page read and write
5CFF000
trusted library allocation
page read and write
48CC000
trusted library allocation
page read and write
13C5000
heap
page read and write
4BEB000
trusted library allocation
page read and write
16CA0000
trusted library allocation
page read and write
D75000
heap
page read and write
DCA000
heap
page read and write
16900000
heap
page read and write
13C5000
heap
page read and write
3F7A000
trusted library allocation
page read and write
3F70000
trusted library allocation
page read and write
8190000
trusted library allocation
page read and write
2E9C000
stack
page read and write
DDA000
heap
page read and write
52F0000
trusted library allocation
page read and write
8D0000
heap
page read and write
3A39000
heap
page read and write
4822000
trusted library allocation
page read and write
450D000
heap
page read and write
4630000
trusted library allocation
page read and write
4516000
heap
page read and write
2FA1000
heap
page read and write
4898000
trusted library allocation
page read and write
16A3E000
unkown
page read and write
BA4000
heap
page read and write
DE4000
heap
page read and write
4862000
trusted library allocation
page read and write
4507000
heap
page read and write
16B0D000
stack
page read and write
13C5000
heap
page read and write
397A000
heap
page read and write
4020000
trusted library allocation
page read and write
4516000
heap
page read and write
4B00000
trusted library allocation
page read and write
C46000
heap
page read and write
4514000
heap
page read and write
BA4000
heap
page read and write
2E20000
heap
page read and write
1613E000
unkown
page read and write
BA4000
heap
page read and write
151E000
stack
page read and write
4507000
heap
page read and write
D0B000
stack
page read and write
4008000
trusted library allocation
page read and write
EF0000
heap
page read and write
D91000
heap
page read and write
167CD000
stack
page read and write
4800000
heap
page read and write
12D0000
heap
page read and write
16A39000
heap
page read and write
AFF5000
trusted library allocation
page read and write
2FA1000
heap
page read and write
48EC000
trusted library allocation
page read and write
4010000
trusted library allocation
page read and write
4833000
trusted library allocation
page read and write
1775D000
stack
page read and write
1643E000
unkown
page read and write
2FA1000
heap
page read and write
6F570000
unkown
page readonly
1828F000
stack
page read and write
4010000
trusted library allocation
page read and write
1799E000
unkown
page read and write
404E000
trusted library allocation
page read and write
2814000
trusted library allocation
page execute and read and write
3A39000
heap
page read and write
2FA1000
heap
page read and write
48A2000
trusted library allocation
page read and write
6CB7A000
unkown
page readonly
1520000
trusted library allocation
page read and write
D74000
heap
page read and write
BA4000
heap
page read and write
48C4000
trusted library allocation
page read and write
3A16000
heap
page read and write
11A1000
heap
page read and write
16C40000
heap
page read and write
AF5D000
trusted library allocation
page read and write
E18000
heap
page read and write
4861000
trusted library allocation
page read and write
339F000
stack
page read and write
1724E000
unkown
page read and write
BA4000
heap
page read and write
DF0000
heap
page read and write
4867000
trusted library allocation
page read and write
360F000
stack
page read and write
13C5000
heap
page read and write
4BE3000
trusted library allocation
page read and write
117D000
heap
page read and write
E0E000
heap
page read and write
8731000
heap
page read and write
361A000
trusted library allocation
page execute and read and write
BA4000
heap
page read and write
173A0000
trusted library allocation
page read and write
3987000
heap
page read and write
404E000
trusted library allocation
page read and write
86F1000
heap
page read and write
27FA000
trusted library allocation
page execute and read and write
44A0000
heap
page read and write
483E000
trusted library allocation
page read and write
315E000
stack
page read and write
4811000
trusted library allocation
page read and write
DF9000
heap
page read and write
4525000
heap
page read and write
17250000
heap
page read and write
BA4000
heap
page read and write
34CF000
stack
page read and write
D74000
heap
page read and write
16F5D000
stack
page read and write
15060000
trusted library allocation
page read and write
4509000
heap
page read and write
1748E000
unkown
page read and write
34DD000
stack
page read and write
13C9000
heap
page read and write
D97000
heap
page read and write
1804D000
stack
page read and write
2EF5000
trusted library allocation
page execute and read and write
3A39000
heap
page read and write
1296000
heap
page read and write
2FA1000
heap
page read and write
449D000
trusted library allocation
page read and write
3A33000
heap
page read and write
4893000
trusted library allocation
page read and write
4507000
heap
page read and write
39F6000
heap
page read and write
DCC000
heap
page read and write
8745000
heap
page read and write
F2A000
heap
page read and write
13C5000
heap
page read and write
450E000
heap
page read and write
4861000
trusted library allocation
page read and write
2FA1000
heap
page read and write
BA4000
heap
page read and write
BA4000
heap
page read and write
482C000
trusted library allocation
page read and write
15EBD000
heap
page read and write
DB4000
heap
page read and write
2FA1000
heap
page read and write
2F5E000
stack
page read and write
188B0000
trusted library allocation
page read and write
128C000
stack
page read and write
288D000
stack
page read and write
4517000
heap
page read and write
4828000
trusted library allocation
page read and write
3FDC000
trusted library allocation
page read and write
B90000
heap
page read and write
9B0000
heap
page read and write
BA4000
heap
page read and write
B03C000
trusted library allocation
page read and write
7F80000
trusted library allocation
page read and write
8690000
heap
page read and write
14890000
trusted library allocation
page read and write
2FA1000
heap
page read and write
7FC58000
trusted library allocation
page execute read
D80000
heap
page read and write
6CB90000
unkown
page readonly
39DD000
heap
page read and write
2FA1000
heap
page read and write
4871000
trusted library allocation
page read and write
4507000
heap
page read and write
B01A000
trusted library allocation
page read and write
4872000
trusted library allocation
page read and write
FA0000
heap
page read and write
5800000
trusted library allocation
page read and write
3994000
heap
page read and write
2FA1000
heap
page read and write
3B5D000
stack
page read and write
3FE7000
trusted library allocation
page read and write
4514000
heap
page read and write
9E2C000
trusted library allocation
page read and write
BA4000
heap
page read and write
16000000
trusted library allocation
page read and write
11A4000
heap
page read and write
2FA1000
heap
page read and write
4507000
heap
page read and write
2FA1000
heap
page read and write
13C0000
heap
page read and write
5022000
trusted library allocation
page read and write
4507000
heap
page read and write
3970000
heap
page read and write
BA4000
heap
page read and write
16EBE000
unkown
page read and write
2CDE000
stack
page read and write
2FA1000
heap
page read and write
450D000
heap
page read and write
4516000
heap
page read and write
166FD000
stack
page read and write
BA4000
heap
page read and write
179DD000
stack
page read and write
2FA1000
heap
page read and write
7F80000
trusted library allocation
page read and write
E06000
unkown
page read and write
DD1000
heap
page read and write
4516000
heap
page read and write
D74000
heap
page read and write
D74000
heap
page read and write
2FA1000
heap
page read and write
3FB4000
trusted library allocation
page read and write
2FA1000
heap
page read and write
3FEA000
trusted library allocation
page read and write
4517000
heap
page read and write
5CFD000
trusted library allocation
page read and write
BA4000
heap
page read and write
B4C000
stack
page read and write
9FD000
stack
page read and write
2FA1000
heap
page read and write
4016000
trusted library allocation
page read and write
E2E000
heap
page read and write
48A6000
trusted library allocation
page read and write
2FA1000
heap
page read and write
2805000
trusted library allocation
page execute and read and write
D74000
heap
page read and write
1748D000
stack
page read and write
DF4000
heap
page read and write
DF0000
heap
page read and write
6CB8F000
unkown
page read and write
17A76000
heap
page read and write
A45000
stack
page read and write
9E2C000
trusted library allocation
page read and write
AFF2000
trusted library allocation
page read and write
2FA1000
heap
page read and write
E1B000
heap
page read and write
BB0000
heap
page read and write
48AB000
trusted library allocation
page read and write
5028000
trusted library allocation
page read and write
DCD000
heap
page read and write
1330000
heap
page read and write
167EA000
heap
page read and write
2FA1000
heap
page read and write
13C5000
heap
page read and write
2FA1000
heap
page read and write
86F4000
heap
page read and write
166AC000
stack
page read and write
86FF000
heap
page read and write
4A84000
trusted library allocation
page read and write
4480000
trusted library allocation
page read and write
D40000
heap
page read and write
13C5000
heap
page read and write
DF2000
heap
page read and write
3FB2000
trusted library allocation
page read and write
3A16000
heap
page read and write
4873000
trusted library allocation
page read and write
173E8000
trusted library allocation
page read and write
2954000
heap
page read and write
F5C000
heap
page read and write
3860000
heap
page read and write
18BCE000
unkown
page read and write
16FBE000
heap
page read and write
17A40000
heap
page read and write
E1F000
heap
page read and write
D76000
heap
page read and write
4895000
trusted library allocation
page read and write
BA4000
heap
page read and write
BA4000
heap
page read and write
399A000
heap
page read and write
450D000
heap
page read and write
DCC000
heap
page read and write
16090000
trusted library allocation
page read and write
3D36000
heap
page read and write
2FA1000
heap
page read and write
D90000
heap
page read and write
2FA1000
heap
page read and write
4030000
trusted library allocation
page read and write
37AF000
stack
page read and write
2FA1000
heap
page read and write
2FA1000
heap
page read and write
2FA1000
heap
page read and write
BA4000
heap
page read and write
4507000
heap
page read and write
4514000
heap
page read and write
483B000
trusted library allocation
page read and write
2FA1000
heap
page read and write
9E30000
trusted library allocation
page read and write
115E000
heap
page read and write
6AB0000
trusted library section
page readonly
6CB40000
unkown
page readonly
3E40000
heap
page read and write
8030000
heap
page read and write
13C5000
heap
page read and write
BC0000
heap
page read and write
D2E000
stack
page read and write
2E6F000
stack
page read and write
BA4000
heap
page read and write
2FA1000
heap
page read and write
B09C000
trusted library allocation
page read and write
2856000
trusted library allocation
page execute and read and write
482F000
trusted library allocation
page read and write
4514000
heap
page read and write
112A000
heap
page read and write
1161000
heap
page read and write
2FA1000
heap
page read and write
BA4000
heap
page read and write
2FA1000
heap
page read and write
4883000
trusted library allocation
page read and write
7FB0000
trusted library allocation
page read and write
325F000
stack
page read and write
44E1000
heap
page read and write
4B63000
trusted library allocation
page read and write
4516000
heap
page read and write
BA5000
heap
page read and write
4828000
trusted library allocation
page read and write
174DE000
unkown
page read and write
2FA1000
heap
page read and write
450D000
heap
page read and write
2FA1000
heap
page read and write
13C5000
heap
page read and write
488C000
trusted library allocation
page read and write
3FF1000
trusted library allocation
page read and write
488A000
trusted library allocation
page read and write
3FF7000
trusted library allocation
page read and write
4528000
heap
page read and write
2FA1000
heap
page read and write
3374000
heap
page read and write
45DE000
stack
page read and write
BA4000
heap
page read and write
539A000
trusted library allocation
page read and write
DD6000
heap
page read and write
BA4000
heap
page read and write
BA4000
heap
page read and write
17C7D000
stack
page read and write
404E000
trusted library allocation
page read and write
8693000
heap
page read and write
486B000
trusted library allocation
page read and write
2FA1000
heap
page read and write
5F0000
heap
page read and write
102C000
heap
page read and write
1681E000
unkown
page read and write
501D000
trusted library allocation
page read and write
EAC000
heap
page read and write
DCB000
heap
page read and write
2F4D000
trusted library allocation
page execute and read and write
2FA1000
heap
page read and write
437B000
stack
page read and write
404E000
trusted library allocation
page read and write
2FA1000
heap
page read and write
BA4000
heap
page read and write
489F000
trusted library allocation
page read and write
15400000
trusted library allocation
page read and write
4660000
trusted library allocation
page read and write
4524000
heap
page read and write
156F000
stack
page read and write
DB0000
heap
page read and write
18790000
trusted library allocation
page read and write
4507000
heap
page read and write
6CB40000
unkown
page readonly
2861000
trusted library allocation
page execute and read and write
16A3D000
stack
page read and write
13C5000
heap
page read and write
2FA1000
heap
page read and write
3A43000
heap
page read and write
3FDA000
trusted library allocation
page read and write
2FA1000
heap
page read and write
D9A000
heap
page read and write
450E000
heap
page read and write
BA4000
heap
page read and write
400A000
trusted library allocation
page read and write
2EFC000
trusted library allocation
page execute and read and write
48D2000
trusted library allocation
page read and write
4008000
trusted library allocation
page read and write
482F000
trusted library allocation
page read and write
3F98000
trusted library allocation
page read and write
4827000
trusted library allocation
page read and write
48EE000
trusted library allocation
page read and write
DED000
heap
page read and write
BA4000
heap
page read and write
4485000
trusted library allocation
page read and write
2FA1000
heap
page read and write
BA4000
heap
page read and write
1733D000
stack
page read and write
37D0000
heap
page read and write
4507000
heap
page read and write
4034000
trusted library allocation
page read and write
2F04000
trusted library allocation
page execute and read and write
4517000
heap
page read and write
39D8000
heap
page read and write
F9E000
stack
page read and write
3E70000
heap
page read and write
3A43000
heap
page read and write
4016000
trusted library allocation
page read and write
2EA0000
unkown
page read and write
487A000
trusted library allocation
page read and write
329E000
stack
page read and write
3971000
heap
page read and write
449A000
trusted library allocation
page read and write
ABC000
heap
page read and write
4520000
heap
page read and write
D74000
heap
page read and write
3A27000
heap
page read and write
463B000
trusted library allocation
page read and write
D80000
heap
page read and write
16B5D000
stack
page read and write
3A6C000
heap
page read and write
A3D000
stack
page read and write
91E2000
trusted library allocation
page read and write
2FA1000
heap
page read and write
A70000
heap
page read and write
399D000
heap
page read and write
7F90000
trusted library allocation
page read and write
48AD000
trusted library allocation
page read and write
57CD000
stack
page read and write
116E000
heap
page read and write
171AD000
stack
page read and write
50EC000
trusted library allocation
page read and write
4BD8000
trusted library allocation
page read and write
3FA7000
trusted library allocation
page read and write
3A5B000
heap
page read and write
86FB000
heap
page read and write
2E80000
heap
page read and write
39E7000
heap
page read and write
450D000
heap
page read and write
BA4000
heap
page read and write
C2C000
stack
page read and write
4838000
trusted library allocation
page read and write
502F000
trusted library allocation
page read and write
2FA1000
heap
page read and write
17200000
heap
page read and write
16B60000
heap
page read and write
DCA000
heap
page read and write
2FA1000
heap
page read and write
3676000
trusted library allocation
page execute and read and write
1789D000
stack
page read and write
48A9000
trusted library allocation
page read and write
2FA1000
heap
page read and write
6F5BF000
unkown
page read and write
11C3000
heap
page read and write
DD1000
heap
page read and write
2962000
heap
page read and write
4910000
trusted library allocation
page read and write
2FA1000
heap
page read and write
462F000
stack
page read and write
12DE000
stack
page read and write
17420000
heap
page read and write
15E40000
heap
page read and write
4514000
heap
page read and write
BA4000
heap
page read and write
DCE000
stack
page read and write
2FA1000
heap
page read and write
16ACD000
unkown
page read and write
27C0000
trusted library allocation
page execute and read and write
13C5000
heap
page read and write
2FA1000
heap
page read and write
BA5000
heap
page read and write
BA4000
heap
page read and write
269A000
trusted library allocation
page execute and read and write
33CE000
stack
page read and write
2FA1000
heap
page read and write
4887000
trusted library allocation
page read and write
4A8A000
trusted library allocation
page read and write
12F1000
stack
page read and write
39F1000
heap
page read and write
2CD0000
trusted library allocation
page read and write
2FA1000
heap
page read and write
2FA1000
heap
page read and write
26FA000
trusted library allocation
page execute and read and write
4BAD000
trusted library allocation
page read and write
450E000
heap
page read and write
C3E000
stack
page read and write
2FA1000
heap
page read and write
C40000
heap
page read and write
3FF1000
trusted library allocation
page read and write
3140000
heap
page read and write
D74000
heap
page read and write
2FA1000
heap
page read and write
1695D000
stack
page read and write
3A33000
heap
page read and write
13C5000
heap
page read and write
3640000
heap
page read and write
4882000
trusted library allocation
page read and write
4830000
trusted library allocation
page read and write
16A70000
trusted library allocation
page read and write
BA4000
heap
page read and write
6CB41000
unkown
page execute read
4878000
trusted library allocation
page read and write
17D5E000
stack
page read and write
2646000
unkown
page read and write
489B000
trusted library allocation
page read and write
11B3000
heap
page read and write
48B2000
trusted library allocation
page read and write
5011000
trusted library allocation
page read and write
2FA1000
heap
page read and write
2F20000
trusted library allocation
page read and write
39EC000
heap
page read and write
4030000
trusted library allocation
page read and write
2FA0000
heap
page read and write
BA4000
heap
page read and write
FEE000
stack
page read and write
450D000
heap
page read and write
2F46000
trusted library allocation
page execute and read and write
2FA1000
heap
page read and write
7F20000
trusted library allocation
page read and write
4030000
trusted library allocation
page read and write
167FD000
stack
page read and write
13C5000
heap
page read and write
168FE000
unkown
page read and write
305E000
stack
page read and write
18A8F000
unkown
page read and write
2FA1000
heap
page read and write
449B000
trusted library allocation
page read and write
39DD000
heap
page read and write
4AF0000
heap
page read and write
2FA1000
heap
page read and write
482E000
trusted library allocation
page read and write
47FB000
stack
page read and write
7F10000
heap
page read and write
16798000
heap
page read and write
4894000
trusted library allocation
page read and write
E20000
trusted library allocation
page read and write
116D000
heap
page read and write
13CA000
heap
page read and write
DEB000
heap
page read and write
DBB000
heap
page read and write
EC6000
heap
page read and write
13B0000
heap
page read and write
DD0000
heap
page read and write
BA4000
heap
page read and write
17D9E000
stack
page read and write
2FA1000
heap
page read and write
DDD000
heap
page read and write
3FFD000
trusted library allocation
page read and write
4016000
trusted library allocation
page read and write
319E000
stack
page read and write
B023000
trusted library allocation
page read and write
350E000
stack
page read and write
4BB1000
trusted library allocation
page read and write
16B91000
heap
page read and write
39F6000
heap
page read and write
4034000
trusted library allocation
page read and write
367D000
trusted library allocation
page execute and read and write
D74000
heap
page read and write
6CB7A000
unkown
page readonly
117E000
heap
page read and write
2FA1000
heap
page read and write
175DE000
unkown
page read and write
4020000
trusted library allocation
page read and write
3FC2000
trusted library allocation
page read and write
3FDC000
trusted library allocation
page read and write
4AF0000
trusted library allocation
page read and write
4EB0000
trusted library allocation
page read and write
13C5000
heap
page read and write
1158000
heap
page read and write
4010000
trusted library allocation
page read and write
1673D000
stack
page read and write
CD0000
heap
page read and write
2950000
heap
page read and write
6F5C0000
unkown
page readonly
7EC2000
trusted library allocation
page read and write
4811000
trusted library allocation
page read and write
4800000
trusted library allocation
page read and write
4B64000
trusted library allocation
page read and write
D74000
heap
page read and write
2FA1000
heap
page read and write
2FA1000
heap
page read and write
53C7000
trusted library allocation
page read and write
172AD000
stack
page read and write
D74000
heap
page read and write
2FA1000
heap
page read and write
183C2000
heap
page read and write
CCE000
stack
page read and write
5396000
trusted library allocation
page read and write
11A4000
heap
page read and write
4496000
trusted library allocation
page read and write
16C81000
heap
page read and write
BA5000
heap
page read and write
A3C000
stack
page read and write
1678E000
unkown
page read and write
BA4000
heap
page read and write
3A5B000
heap
page read and write
D9A000
heap
page read and write
2E21000
heap
page read and write
E09000
unkown
page read and write
13C5000
heap
page read and write
26A0000
trusted library allocation
page execute and read and write
482F000
trusted library allocation
page read and write
DB9000
heap
page read and write
3978000
heap
page read and write
D53000
heap
page read and write
3622000
trusted library allocation
page execute and read and write
DB7000
heap
page read and write
3D30000
heap
page read and write
3FFD000
trusted library allocation
page read and write
11D2000
heap
page read and write
2FA1000
heap
page read and write
BA4000
heap
page read and write
151E000
stack
page read and write
4A90000
trusted library allocation
page read and write
D76000
heap
page read and write
483F000
trusted library allocation
page read and write
16210000
trusted library allocation
page read and write
17A3E000
unkown
page read and write
4868000
trusted library allocation
page read and write
B0C7000
trusted library allocation
page read and write
11D2000
heap
page read and write
2662000
trusted library allocation
page execute and read and write
6CB90000
unkown
page readonly
468E000
stack
page read and write
2FA1000
heap
page read and write
2FA1000
heap
page read and write
17CCE000
unkown
page read and write
2FA1000
heap
page read and write
2F8E000
stack
page read and write
BA4000
heap
page read and write
53E9000
trusted library allocation
page read and write
B0C1000
trusted library allocation
page read and write
BA4000
heap
page read and write
1189000
heap
page read and write
4877000
trusted library allocation
page read and write
2FA1000
heap
page read and write
39D5000
heap
page read and write
1726F000
unkown
page read and write
36AE000
stack
page read and write
4497000
trusted library allocation
page read and write
450D000
heap
page read and write
7FC52000
trusted library allocation
page execute read
397E000
heap
page read and write
2FA1000
heap
page read and write
3660000
heap
page read and write
BA4000
heap
page read and write
528A000
trusted library allocation
page read and write
BA4000
heap
page read and write
4034000
trusted library allocation
page read and write
17B1E000
stack
page read and write
55E0000
trusted library allocation
page read and write
DF4000
heap
page read and write
3A5B000
heap
page read and write
452F000
heap
page read and write
13C5000
heap
page read and write
454F000
heap
page read and write
2FA1000
heap
page read and write
6CB41000
unkown
page execute read
DAB000
heap
page read and write
3973000
heap
page read and write
BA4000
heap
page read and write
EBD000
stack
page read and write
4535000
heap
page read and write
158B000
heap
page read and write
101B000
heap
page read and write
13C5000
heap
page read and write
17C5E000
stack
page read and write
BA5000
heap
page read and write
4891000
trusted library allocation
page read and write
4020000
trusted library allocation
page read and write
280C000
trusted library allocation
page execute and read and write
BA0000
heap
page read and write
BA4000
heap
page read and write
4824000
trusted library allocation
page read and write
18494000
heap
page read and write
404E000
trusted library allocation
page read and write
D9A000
heap
page read and write
115E000
heap
page read and write
17F8000
heap
page read and write
4008000
trusted library allocation
page read and write
2FA1000
heap
page read and write
A00000
trusted library allocation
page read and write
13C6000
heap
page read and write
2FA1000
heap
page read and write
48C0000
trusted library allocation
page read and write
4514000
heap
page read and write
2D9D000
stack
page read and write
488E000
trusted library allocation
page read and write
2FA1000
heap
page read and write
3A43000
heap
page read and write
33DB000
stack
page read and write
3FCC000
trusted library allocation
page read and write
162A0000
trusted library allocation
page read and write
398A000
heap
page read and write
3E4A000
heap
page read and write
2FA1000
heap
page read and write
450D000
heap
page read and write
39E7000
heap
page read and write
6AAC000
stack
page read and write
6CB41000
unkown
page execute read
D9D000
heap
page read and write
BA4000
heap
page read and write
4831000
trusted library allocation
page read and write
BA5000
heap
page read and write
40FF000
stack
page read and write
2F0E000
stack
page read and write
2FA1000
heap
page read and write
16C7E000
heap
page read and write
3A3D000
heap
page read and write
BA4000
heap
page read and write
4499000
trusted library allocation
page read and write
13C5000
heap
page read and write
BA4000
heap
page read and write
BA4000
heap
page read and write
1010000
heap
page read and write
15490000
trusted library allocation
page read and write
2FA1000
heap
page read and write
D96000
heap
page read and write
481D000
trusted library allocation
page read and write
3E42000
heap
page read and write
16F1D000
stack
page read and write
450D000
heap
page read and write
48C3000
trusted library allocation
page read and write
17E9D000
stack
page read and write
AF4D000
trusted library allocation
page read and write
17451000
heap
page read and write
1580000
heap
page read and write
86EA000
heap
page read and write
B0BC000
trusted library allocation
page read and write
487D000
trusted library allocation
page read and write
450D000
heap
page read and write
53C1000
trusted library allocation
page read and write
17F0000
heap
page read and write
DCD000
heap
page read and write
17ADE000
unkown
page read and write
164A000
heap
page read and write
D90000
heap
page read and write
BA5000
heap
page read and write
3370000
heap
page read and write
B3C000
stack
page read and write
2DD9000
unkown
page read and write
BB0000
heap
page read and write
44F8000
heap
page read and write
13C5000
heap
page read and write
2EB2000
trusted library allocation
page execute and read and write
18365000
heap
page read and write
4828000
trusted library allocation
page read and write
DA1000
heap
page read and write
3640000
remote allocation
page read and write
3A5B000
heap
page read and write
4884000
trusted library allocation
page read and write
8120000
heap
page read and write
2FA1000
heap
page read and write
4509000
heap
page read and write
4876000
trusted library allocation
page read and write
4BE2000
trusted library allocation
page read and write
1721D000
stack
page read and write
451E000
heap
page read and write
4874000
trusted library allocation
page read and write
EF9000
stack
page read and write
4509000
heap
page read and write
252E000
stack
page read and write
D7F000
heap
page read and write
16A7D000
stack
page read and write
2FA1000
heap
page read and write
450D000
heap
page read and write
2FA1000
heap
page read and write
3FF7000
trusted library allocation
page read and write
15EB4000
heap
page read and write
6CB8F000
unkown
page read and write
AD50000
trusted library allocation
page read and write
BA4000
heap
page read and write
4855000
trusted library allocation
page read and write
38AE000
heap
page read and write
8F7000
stack
page read and write
DA8000
heap
page read and write
447E000
stack
page read and write
3997000
heap
page read and write
BA4000
heap
page read and write
4863000
trusted library allocation
page read and write
4BD9000
trusted library allocation
page read and write
D5E000
stack
page read and write
3E47000
heap
page read and write
D74000
heap
page read and write
5000000
trusted library allocation
page read and write
114F000
heap
page read and write
11A4000
heap
page read and write
14800000
trusted library allocation
page read and write
1603E000
unkown
page read and write
2FA1000
heap
page read and write
3A5B000
heap
page read and write
15C60000
heap
page read and write
DC1000
heap
page read and write
3640000
remote allocation
page read and write
4517000
heap
page read and write
BA4000
heap
page read and write
16A17000
heap
page read and write
16B3D000
stack
page read and write
35E0000
trusted library allocation
page execute and read and write
16FAE000
unkown
page read and write
B014000
trusted library allocation
page read and write
3E50000
trusted library allocation
page read and write
D70000
heap
page read and write
E27000
heap
page read and write
115B000
heap
page read and write
3FF1000
trusted library allocation
page read and write
4030000
trusted library allocation
page read and write
48E0000
trusted library allocation
page execute
4BE6000
trusted library allocation
page read and write
4899000
trusted library allocation
page read and write
DCC000
heap
page read and write
4514000
heap
page read and write
4826000
trusted library allocation
page read and write
450D000
heap
page read and write
2FA1000
heap
page read and write
2FA1000
heap
page read and write
2FA1000
heap
page read and write
4511000
heap
page read and write
1350000
heap
page read and write
4832000
trusted library allocation
page read and write
BA4000
heap
page read and write
450E000
heap
page read and write
2FA1000
heap
page read and write
4833000
trusted library allocation
page read and write
BA4000
heap
page read and write
183B1000
heap
page read and write
4498000
trusted library allocation
page read and write
BA4000
heap
page read and write
4825000
trusted library allocation
page read and write
ADA2000
trusted library allocation
page read and write
3FF7000
trusted library allocation
page read and write
D74000
heap
page read and write
2FA1000
heap
page read and write
3060000
heap
page read and write
FF8000
heap
page read and write
BA5000
heap
page read and write
361E000
trusted library allocation
page execute and read and write
2E21000
heap
page read and write
BA4000
heap
page read and write
4516000
heap
page read and write
2F20000
trusted library allocation
page read and write
4820000
trusted library allocation
page read and write
4516000
heap
page read and write
3FE7000
trusted library allocation
page read and write
285D000
trusted library allocation
page execute and read and write
2FCF000
stack
page read and write
B80000
heap
page read and write
26A5000
trusted library allocation
page execute and read and write
413B000
stack
page read and write
BA4000
heap
page read and write
4636000
trusted library allocation
page read and write
2FA1000
heap
page read and write
1120000
heap
page read and write
482B000
trusted library allocation
page read and write
3D34000
heap
page read and write
BA4000
heap
page read and write
1727B000
heap
page read and write
450A000
heap
page read and write
3290000
heap
page read and write
2800000
trusted library allocation
page execute and read and write
4829000
trusted library allocation
page read and write
13C5000
heap
page read and write
DD1000
heap
page read and write
4869000
trusted library allocation
page read and write
7FB0000
trusted library allocation
page read and write
2FA1000
heap
page read and write
453A000
heap
page read and write
2FA1000
heap
page read and write
7FC0000
trusted library allocation
page read and write
1653D000
unkown
page read and write
486F000
trusted library allocation
page read and write
169ED000
stack
page read and write
D74000
heap
page read and write
4516000
heap
page read and write
2FA1000
heap
page read and write
1169000
heap
page read and write
40AE000
stack
page read and write
869B000
heap
page read and write
9E30000
trusted library allocation
page read and write
BA5000
heap
page read and write
4839000
trusted library allocation
page read and write
DDA000
heap
page read and write
13C5000
heap
page read and write
BA4000
heap
page read and write
4535000
heap
page read and write
4835000
trusted library allocation
page read and write
6CB40000
unkown
page readonly
B1A4000
trusted library allocation
page read and write
4516000
heap
page read and write
400A000
trusted library allocation
page read and write
6CB8F000
unkown
page read and write
16860000
trusted library allocation
page read and write
D95000
heap
page read and write
4875000
trusted library allocation
page read and write
7FC5A000
trusted library allocation
page execute read
3684000
trusted library allocation
page execute and read and write
2FA1000
heap
page read and write
15C60000
trusted library allocation
page read and write
13C5000
heap
page read and write
3A27000
heap
page read and write
488B000
trusted library allocation
page read and write
3FA0000
trusted library allocation
page read and write
3F62000
trusted library allocation
page read and write
BA4000
heap
page read and write
4890000
trusted library allocation
page read and write
488D000
trusted library allocation
page read and write
400A000
trusted library allocation
page read and write
3FFD000
trusted library allocation
page read and write
3640000
remote allocation
page read and write
D74000
heap
page read and write
18290000
heap
page read and write
7B8C000
stack
page read and write
2DD6000
unkown
page read and write
114B000
heap
page read and write
3995000
heap
page read and write
D74000
heap
page read and write
4028000
trusted library allocation
page read and write
17FFF000
stack
page read and write
4BDF000
trusted library allocation
page read and write
13C5000
heap
page read and write
BA4000
heap
page read and write
2FA1000
heap
page read and write
BA4000
heap
page read and write
4648000
trusted library allocation
page read and write
256E000
stack
page read and write
8037000
heap
page read and write
3A47000
heap
page read and write
2FA1000
heap
page read and write
C8E000
stack
page read and write
18ACD000
stack
page read and write
1785E000
unkown
page read and write
2FA1000
heap
page read and write
53CB000
trusted library allocation
page read and write
13C5000
heap
page read and write
450B000
heap
page read and write
16FED000
stack
page read and write
7EF0000
heap
page read and write
1780000
heap
page read and write
A20000
trusted library allocation
page read and write
7C8F000
stack
page read and write
4BDE000
trusted library allocation
page read and write
115A000
heap
page read and write
BA4000
heap
page read and write
7CC000
stack
page read and write
450B000
heap
page read and write
14DE000
stack
page read and write
169AE000
unkown
page read and write
487C000
trusted library allocation
page read and write
3FEA000
trusted library allocation
page read and write
27C2000
trusted library allocation
page execute and read and write
3FC0000
trusted library allocation
page read and write
2FA1000
heap
page read and write
2FA1000
heap
page read and write
11A4000
heap
page read and write
25FB000
stack
page read and write
2FA1000
heap
page read and write
DB6000
heap
page read and write
488F000
trusted library allocation
page read and write
4516000
heap
page read and write
4516000
heap
page read and write
362B000
trusted library allocation
page execute and read and write
870000
heap
page read and write
BA4000
heap
page read and write
1686E000
unkown
page read and write
450D000
heap
page read and write
7DC000
stack
page read and write
E10000
unkown
page read and write
5B87000
trusted library allocation
page read and write
48C8000
trusted library allocation
page read and write
3D44000
heap
page read and write
4892000
trusted library allocation
page read and write
2FA1000
heap
page read and write
13C5000
heap
page read and write
2FA1000
heap
page read and write
7FC50000
trusted library allocation
page execute read
400A000
trusted library allocation
page read and write
EFA000
heap
page read and write
BA4000
heap
page read and write
4860000
trusted library allocation
page read and write
4834000
trusted library allocation
page read and write
BA4000
heap
page read and write
39EC000
heap
page read and write
A70000
heap
page read and write
BA4000
heap
page read and write
3A3D000
heap
page read and write
4495000
trusted library allocation
page read and write
D74000
heap
page read and write
450D000
heap
page read and write
11A4000
heap
page read and write
2FA1000
heap
page read and write
D95000
heap
page read and write
18890000
trusted library allocation
page read and write
2FA1000
heap
page read and write
AF63000
trusted library allocation
page read and write
F20000
heap
page read and write
188C0000
trusted library allocation
page read and write
39EA000
heap
page read and write
B15C000
trusted library allocation
page read and write
BA4000
heap
page read and write
15E0000
heap
page read and write
2FA1000
heap
page read and write
171FE000
unkown
page read and write
1739A000
trusted library allocation
page read and write
4833000
trusted library allocation
page read and write
B030000
trusted library allocation
page read and write
3A28000
heap
page read and write
3A3D000
heap
page read and write
578D000
stack
page read and write
4A8A000
trusted library allocation
page read and write
1888D000
trusted library allocation
page read and write
1717E000
stack
page read and write
AAB000
heap
page read and write
2FA1000
heap
page read and write
2FA1000
heap
page read and write
483C000
trusted library allocation
page read and write
3F84000
trusted library allocation
page read and write
6CB8F000
unkown
page read and write
86E8000
heap
page read and write
15DDD000
stack
page read and write
4028000
trusted library allocation
page read and write
DA0000
heap
page read and write
2701000
trusted library allocation
page execute and read and write
4865000
trusted library allocation
page read and write
15CC000
stack
page read and write
BA4000
heap
page read and write
E7F000
stack
page read and write
BA5000
heap
page read and write
7FA0000
heap
page read and write
4634000
trusted library allocation
page read and write
2EF0000
trusted library allocation
page execute and read and write
48CA000
trusted library allocation
page read and write
D74000
heap
page read and write
6F571000
unkown
page execute read
2FA1000
heap
page read and write
1743D000
stack
page read and write
3A2D000
heap
page read and write
13C5000
heap
page read and write
2FA1000
heap
page read and write
E18000
heap
page read and write
172A0000
trusted library allocation
page read and write
15E30000
heap
page read and write
173E2000
trusted library allocation
page read and write
8180000
heap
page read and write
2FA1000
heap
page read and write
A10000
trusted library allocation
page read and write
4509000
heap
page read and write
4837000
trusted library allocation
page read and write
EC9000
heap
page read and write
39B7000
heap
page read and write
3870000
heap
page read and write
3F90000
trusted library allocation
page read and write
1158000
heap
page read and write
1004000
heap
page read and write
179ED000
stack
page read and write
BA5000
heap
page read and write
D8D000
heap
page read and write
BA5000
heap
page read and write
140F000
heap
page read and write
77C000
stack
page read and write
3846000
stack
page read and write
2FA1000
heap
page read and write
F20000
heap
page read and write
4BAF000
trusted library allocation
page read and write
BA5000
heap
page read and write
2649000
unkown
page read and write
7FC0000
trusted library allocation
page read and write
2FDF000
stack
page read and write
450D000
heap
page read and write
F5E000
stack
page read and write
17C1F000
stack
page read and write
2FA1000
heap
page read and write
F6F000
heap
page read and write
11B0000
heap
page read and write
6CB7A000
unkown
page readonly
18690000
trusted library allocation
page read and write
BA4000
heap
page read and write
10FE000
stack
page read and write
BA4000
heap
page read and write
DC3000
heap
page read and write
2E21000
heap
page read and write
DC0000
heap
page read and write
3FB8000
trusted library allocation
page read and write
ADCB000
trusted library allocation
page read and write
B02A000
trusted library allocation
page read and write
BA4000
heap
page read and write
D6C000
stack
page read and write
11B5000
heap
page read and write
3FCA000
trusted library allocation
page read and write
39B7000
heap
page read and write
13C5000
heap
page read and write
4008000
trusted library allocation
page read and write
53CE000
trusted library allocation
page read and write
4879000
trusted library allocation
page read and write
D74000
heap
page read and write
3FDA000
trusted library allocation
page read and write
39D8000
heap
page read and write
16C3D000
unkown
page read and write
4034000
trusted library allocation
page read and write
2BD0000
heap
page read and write
4028000
trusted library allocation
page read and write
BA4000
heap
page read and write
BA4000
heap
page read and write
9FE000
stack
page read and write
14B8000
heap
page read and write
3867000
heap
page read and write
13C5000
heap
page read and write
FEC000
stack
page read and write
6CB90000
unkown
page readonly
26B4000
trusted library allocation
page execute and read and write
177E000
stack
page read and write
There are 1351 hidden memdumps, click here to show them.