IOC Report
MOUSE DRIVER V628M Setup.exe

loading gif

Files

File Path
Type
Category
Malicious
MOUSE DRIVER V628M Setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\Monitor.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\Option.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\MOUSE DRIVER V628M\MOUSE DRIVER V628M.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Wed Nov 20 11:20:00 2024, mtime=Wed Nov 20 11:20:01 2024, atime=Tue Aug 21 22:16:44 2018, length=614400, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\MOUSE DRIVER V628M\Uinstall.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Wed Nov 20 11:20:00 2024, mtime=Wed Nov 20 11:20:00 2024, atime=Wed Nov 20 11:19:54 2024, length=1654643, window=hide
dropped
C:\Users\Public\Desktop\MOUSE DRIVER V628M.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Wed Nov 20 11:20:00 2024, mtime=Wed Nov 20 11:20:00 2024, atime=Tue Aug 21 22:16:44 2018, length=614400, window=hide
dropped
C:\Users\user\AppData\Local\Temp\is-4D2H9.tmp\MOUSE DRIVER V628M Setup.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-L9A6D.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\~DF033F16C61FA641F7.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\Config.ini
Generic INItialization configuration [HidAccessCode]
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\Config\Default0.gmp
ASCII text, with very long lines (1601), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\Config\Default1.gmp
ASCII text, with very long lines (1601), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\Config\Default2.gmp
ASCII text, with very long lines (1601), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\Config\Default3.gmp
ASCII text, with very long lines (1601), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\Config\Default4.gmp
ASCII text, with very long lines (1601), with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\Config\is-7HD9G.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\Config\is-CKQ07.tmp
ASCII text, with very long lines (1601), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\Config\is-EPILT.tmp
ASCII text, with very long lines (1601), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\Config\is-KPUN2.tmp
ASCII text, with very long lines (1601), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\Config\is-U09GP.tmp
ASCII text, with very long lines (1601), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\Config\is-UEOCA.tmp
ASCII text, with very long lines (1601), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\Config\sequence.dat
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\Icon.ico (copy)
MS Windows icon resource - 9 icons, 256x256, 32 bits/pixel, -128x-128, 32 bits/pixel
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\KBHook.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\Uninstall.ico (copy)
MS Windows icon resource - 1 icon, 32x32, 32 colors
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\is-02EQK.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\is-0HRNP.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\is-19LTP.tmp
MS Windows icon resource - 1 icon, 32x32, 32 colors
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\is-I3H6T.tmp
MS Windows icon resource - 9 icons, 256x256, 32 bits/pixel, -128x-128, 32 bits/pixel
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\is-JTU91.tmp
Generic INItialization configuration [HidAccessCode]
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\is-L6EBJ.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\is-NNK05.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\is-RFBE3.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\lan.dll (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\Click_Warn_down.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=150, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=475], baseline, precision 8, 475x150, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\Click_Warn_normal.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=150, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=475], baseline, precision 8, 475x150, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\Click_Warn_over.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=150, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=475], baseline, precision 8, 475x150, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\Config_down.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=484, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=645], baseline, precision 8, 645x484, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\Config_over.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=484, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=645], baseline, precision 8, 645x484, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\Macro_manager_down.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=332, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=338], baseline, precision 8, 338x332, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\Macro_manager_mask.bmp (copy)
PC bitmap, Windows 3.x format, 338 x 332 x 24, image size 337312, cbSize 337366, bits offset 54
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\Macro_manager_normal.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=332, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=338], baseline, precision 8, 338x332, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\Macro_manager_over.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=332, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=338], baseline, precision 8, 338x332, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\config_mask.bmp (copy)
PC bitmap, Windows 3.x format, 645 x 484 x 24, image size 937024, resolution 2835 x 2835 px/m, cbSize 937078, bits offset 54
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\config_normal.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=484, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=645], baseline, precision 8, 645x484, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\double_click.avi (copy)
RIFF (little-endian) data, AVI, 102 x 57, 24.00 fps, video: uncompressed
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\double_click.bmp (copy)
PC bitmap, Windows 3.x format, 102 x 57 x 24, image size 17558, resolution 2834 x 2834 px/m, cbSize 17612, bits offset 54
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\double_click.wav (copy)
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-1MLMT.tmp
Generic INItialization configuration [BUTTONPOS]
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-2HA7L.tmp
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=150, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=475], baseline, precision 8, 475x150, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-669UE.tmp
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=332, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=338], baseline, precision 8, 338x332, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-844QC.tmp
PC bitmap, Windows 3.x format, 102 x 57 x 24, image size 17558, resolution 2834 x 2834 px/m, cbSize 17612, bits offset 54
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-860HA.tmp
PC bitmap, Windows 3.x format, 11 x 19 x 24, image size 686, resolution 2834 x 2834 px/m, cbSize 740, bits offset 54
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-8A3IV.tmp
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=484, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=645], baseline, precision 8, 645x484, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-8B7HJ.tmp
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=484, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=645], baseline, precision 8, 645x484, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-8M6IJ.tmp
RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 44100 Hz
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-8VTUC.tmp
PC bitmap, Windows 3.x format, 475 x 150 x 24, image size 214200, cbSize 214254, bits offset 54
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-A4TPS.tmp
PC bitmap, Windows 3.x format, 475 x 150 x 24, image size 214200, cbSize 214254, bits offset 54
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-BFLBE.tmp
PC bitmap, Windows 3.x format, 338 x 332 x 24, image size 337312, cbSize 337366, bits offset 54
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-C7BE0.tmp
RIFF (little-endian) data, AVI, 102 x 57, 24.00 fps, video: uncompressed
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-CDLJN.tmp
Generic INItialization configuration [BUTTONPOS]
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-DFGT7.tmp
Generic INItialization configuration [BUTTONPOS]
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-GEU9C.tmp
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=150, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=475], baseline, precision 8, 475x150, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-GH0EO.tmp
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=150, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=475], baseline, precision 8, 475x150, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-HSNE9.tmp
Generic INItialization configuration [BUTTONPOS]
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-JK3B6.tmp
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=150, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=475], baseline, precision 8, 475x150, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-KUET8.tmp
Generic INItialization configuration [BUTTONPOS]
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-LMPDF.tmp
Generic INItialization configuration [BUTTONPOS]
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-LT5ET.tmp
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=150, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=475], baseline, precision 8, 475x150, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-MVLQB.tmp
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=484, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=645], baseline, precision 8, 645x484, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-O4PQK.tmp
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=332, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=338], baseline, precision 8, 338x332, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-PAMCP.tmp
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=150, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=475], baseline, precision 8, 475x150, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-QK389.tmp
Generic INItialization configuration [BUTTONPOS]
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-RS3J9.tmp
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=150, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=475], baseline, precision 8, 475x150, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-SO901.tmp
Generic INItialization configuration [BUTTONPOS]
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-TH8A3.tmp
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=332, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=338], baseline, precision 8, 338x332, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-U8QCU.tmp
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=150, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=475], baseline, precision 8, 475x150, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-UE596.tmp
PC bitmap, Windows 3.x format, 645 x 484 x 24, image size 937024, resolution 2835 x 2835 px/m, cbSize 937078, bits offset 54
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\is-VPN2R.tmp
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=150, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=475], baseline, precision 8, 475x150, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\key_shortcut_down.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=150, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=475], baseline, precision 8, 475x150, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\key_shortcut_normal.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=150, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=475], baseline, precision 8, 475x150, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\key_shortcut_over.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=150, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=475], baseline, precision 8, 475x150, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\reset_warn_mask.bmp (copy)
PC bitmap, Windows 3.x format, 475 x 150 x 24, image size 214200, cbSize 214254, bits offset 54
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\scroll.bmp (copy)
PC bitmap, Windows 3.x format, 11 x 19 x 24, image size 686, resolution 2834 x 2834 px/m, cbSize 740, bits offset 54
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\single_key_down.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=150, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=475], baseline, precision 8, 475x150, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\single_key_normal.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=150, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=475], baseline, precision 8, 475x150, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\single_key_over.jpg (copy)
JPEG image data, Exif standard: [TIFF image data, big-endian, direntries=12, height=150, bps=0, PhotometricIntepretation=RGB, orientation=upper-left, width=475], baseline, precision 8, 475x150, components 3
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\skin_click_warn.ini (copy)
Generic INItialization configuration [BUTTONPOS]
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\skin_delete_macro_warn.ini (copy)
Generic INItialization configuration [BUTTONPOS]
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\skin_macro_manager.ini (copy)
Generic INItialization configuration [BUTTONPOS]
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\skin_macro_set_warn.ini (copy)
Generic INItialization configuration [BUTTONPOS]
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\skin_main.ini (copy)
Generic INItialization configuration [BUTTONPOS]
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\skin_reset_warn.ini (copy)
Generic INItialization configuration [BUTTONPOS]
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\skin_shortcut.ini (copy)
Generic INItialization configuration [BUTTONPOS]
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\skin_single_key.ini (copy)
Generic INItialization configuration [BUTTONPOS]
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\skins\small_popup_mask.bmp (copy)
PC bitmap, Windows 3.x format, 475 x 150 x 24, image size 214200, cbSize 214254, bits offset 54
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\unins000.dat
InnoSetup Log MOUSE DRIVER V628M {865865F2-6748-4710-99DC-5248204D8FD4}, version 0x418, 15914 bytes, 888683\37\user\376, C:\Users\user\AppData\Roaming\MOUSE DRIVE
dropped
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
There are 88 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\Monitor.exe
"C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\Monitor.exe" 1
malicious
C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\Option.exe
"C:\Users\user\AppData\Roaming\MOUSE DRIVER V628M\Option.exe"
malicious
C:\Users\user\Desktop\MOUSE DRIVER V628M Setup.exe
"C:\Users\user\Desktop\MOUSE DRIVER V628M Setup.exe"
C:\Users\user\AppData\Local\Temp\is-4D2H9.tmp\MOUSE DRIVER V628M Setup.tmp
"C:\Users\user\AppData\Local\Temp\is-4D2H9.tmp\MOUSE DRIVER V628M Setup.tmp" /SL5="$10472,1195863,572928,C:\Users\user\Desktop\MOUSE DRIVER V628M Setup.exe"

URLs

Name
IP
Malicious
http://www.innosetup.com/
unknown
http://www.fontbureau.com/designersH
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.jiyu-kobo.co.jp/Y0Q
unknown
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
http://www.tiro.com
unknown
http://www.aulacn.com
unknown
http://www.monotype.c
unknown
http://www.fontbureau.com/designers
unknown
http://www.kngstr.com/?PreDefines.ishAbout
unknown
http://www.goodfont.co.kr
unknown
http://www.jiyu-kobo.co.jp/oi
unknown
http://www.jiyu-kobo.co.jp/jp/
unknown
http://www.fontbureau.coma
unknown
http://www.jiyu-kobo.co.jp/=
unknown
http://www.jiyu-kobo.co.jp/~
unknown
http://www.carterandcone.coml
unknown
http://www.jiyu-kobo.co.jp/jp/=
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.zhongyicts.co
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.kngstr.com/?PreDefines.ish
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/v
unknown
http://www.aulacn.com4443523938BUTTONPOS37skins
unknown
http://www.jiyu-kobo.co.jp/o
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.fontbureau.com/
unknown
http://www.jiyu-kobo.co.jp/TF
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.remobjects.com/ps
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.jiyu-kobo.co.jp/ueZ
unknown
http://www.sakkal.com
unknown
http://www.jiyu-kobo.co.jp/TTF
unknown
There are 38 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
MOSUE DRIVER V628M
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{865865F2-6748-4710-99DC-5248204D8FD4}_is1
Inno Setup: Setup Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{865865F2-6748-4710-99DC-5248204D8FD4}_is1
Inno Setup: App Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{865865F2-6748-4710-99DC-5248204D8FD4}_is1
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{865865F2-6748-4710-99DC-5248204D8FD4}_is1
Inno Setup: Icon Group
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{865865F2-6748-4710-99DC-5248204D8FD4}_is1
Inno Setup: User
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{865865F2-6748-4710-99DC-5248204D8FD4}_is1
Inno Setup: Selected Tasks
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{865865F2-6748-4710-99DC-5248204D8FD4}_is1
Inno Setup: Deselected Tasks
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{865865F2-6748-4710-99DC-5248204D8FD4}_is1
Inno Setup: Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{865865F2-6748-4710-99DC-5248204D8FD4}_is1
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{865865F2-6748-4710-99DC-5248204D8FD4}_is1
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{865865F2-6748-4710-99DC-5248204D8FD4}_is1
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{865865F2-6748-4710-99DC-5248204D8FD4}_is1
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{865865F2-6748-4710-99DC-5248204D8FD4}_is1
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{865865F2-6748-4710-99DC-5248204D8FD4}_is1
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{865865F2-6748-4710-99DC-5248204D8FD4}_is1
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{865865F2-6748-4710-99DC-5248204D8FD4}_is1
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{865865F2-6748-4710-99DC-5248204D8FD4}_is1
MajorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{865865F2-6748-4710-99DC-5248204D8FD4}_is1
MinorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{865865F2-6748-4710-99DC-5248204D8FD4}_is1
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{865865F2-6748-4710-99DC-5248204D8FD4}_is1
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{865865F2-6748-4710-99DC-5248204D8FD4}_is1
EstimatedSize
HKEY_CURRENT_USER\??????????p
WheelScrollLines
HKEY_CURRENT_USER\Control Panel\Mouse
MouseThreshold1
HKEY_CURRENT_USER\Control Panel\Mouse
MouseThreshold2
There are 20 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2CBC000
heap
page read and write
2A86000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
2CCC000
heap
page read and write
2986000
trusted library allocation
page read and write
235C000
direct allocation
page read and write
2300000
heap
page read and write
2980000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2418000
direct allocation
page read and write
2CE6000
heap
page read and write
2A86000
trusted library allocation
page read and write
5F82000
direct allocation
page read and write
2CBC000
heap
page read and write
2980000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2625000
heap
page read and write
82B000
heap
page read and write
2A86000
trusted library allocation
page read and write
7FE24000
direct allocation
page read and write
2A80000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2346000
direct allocation
page read and write
2986000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CBC000
heap
page read and write
6384000
direct allocation
page read and write
2A86000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
400000
unkown
page readonly
31EE000
stack
page read and write
2986000
trusted library allocation
page read and write
2CCB000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CCF000
heap
page read and write
46F2000
trusted library allocation
page read and write
2CC8000
heap
page read and write
2986000
trusted library allocation
page read and write
86B000
heap
page read and write
2986000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2603000
heap
page read and write
2980000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
5D0000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CBE000
heap
page read and write
2CCC000
heap
page read and write
2A86000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
9AD000
direct allocation
page read and write
2986000
trusted library allocation
page read and write
2CE6000
unkown
page read and write
2A80000
trusted library allocation
page read and write
2CCB000
heap
page read and write
2CBC000
heap
page read and write
5F32000
direct allocation
page read and write
2986000
trusted library allocation
page read and write
872000
heap
page read and write
2A80000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2980000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
6068000
direct allocation
page read and write
24D3000
direct allocation
page read and write
998000
direct allocation
page read and write
2CDD000
heap
page read and write
500000
unkown
page execute read
400000
unkown
page readonly
2986000
trusted library allocation
page read and write
2CD2000
heap
page read and write
2986000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2A80000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CB6000
heap
page read and write
2A80000
trusted library allocation
page read and write
860000
heap
page read and write
3390000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CCD000
heap
page read and write
2CDD000
heap
page read and write
332C000
direct allocation
page read and write
2A80000
trusted library allocation
page read and write
2F4E000
stack
page read and write
85B000
heap
page read and write
752000
heap
page read and write
2980000
trusted library allocation
page read and write
4CCF000
stack
page read and write
2CB6000
heap
page read and write
2980000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2A86000
trusted library allocation
page read and write
49B000
unkown
page readonly
2986000
trusted library allocation
page read and write
878000
heap
page read and write
2980000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2CE5000
heap
page read and write
24AC000
heap
page read and write
2CEF000
heap
page read and write
2CB8000
heap
page read and write
9F5000
direct allocation
page read and write
2CE6000
heap
page read and write
2CB6000
heap
page read and write
2CEF000
heap
page read and write
2CD2000
heap
page read and write
10001000
unkown
page execute read
2CCB000
heap
page read and write
2CD2000
heap
page read and write
2CB8000
heap
page read and write
2CB6000
heap
page read and write
2980000
trusted library allocation
page read and write
24A6000
heap
page read and write
34B1000
heap
page read and write
2A86000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CCD000
heap
page read and write
2CBC000
heap
page read and write
2A80000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2490000
heap
page read and write
2CE6000
heap
page read and write
2A80000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
A3F000
stack
page read and write
2986000
trusted library allocation
page read and write
24A0000
heap
page read and write
2CCD000
heap
page read and write
2A86000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
83A000
heap
page read and write
2A80000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2320000
direct allocation
page read and write
2A86000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2A86000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
882000
heap
page read and write
2CD4000
heap
page read and write
449000
unkown
page readonly
2986000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2CD4000
heap
page read and write
3390000
trusted library allocation
page read and write
34B1000
heap
page read and write
2CB6000
heap
page read and write
2CCC000
heap
page read and write
2CE6000
heap
page read and write
2986000
trusted library allocation
page read and write
2CCD000
heap
page read and write
2CB6000
heap
page read and write
2986000
trusted library allocation
page read and write
2CCC000
heap
page read and write
2CBC000
heap
page read and write
93F000
stack
page read and write
334F000
direct allocation
page read and write
5C0000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CC7000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CEF000
heap
page read and write
2CBC000
heap
page read and write
2986000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2CE5000
heap
page read and write
2CB6000
heap
page read and write
2CD4000
heap
page read and write
2CD4000
heap
page read and write
2CB9000
heap
page read and write
2CE6000
heap
page read and write
2CEE000
heap
page read and write
2CBC000
heap
page read and write
2CE6000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2CD4000
heap
page read and write
2510000
heap
page read and write
2A86000
trusted library allocation
page read and write
600000
heap
page read and write
2986000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
9BC000
direct allocation
page read and write
2CE6000
heap
page read and write
5F26000
direct allocation
page read and write
2CCD000
heap
page read and write
2CEF000
heap
page read and write
2CE6000
heap
page read and write
85F000
heap
page read and write
9FE000
direct allocation
page read and write
2CCD000
heap
page read and write
2CCC000
heap
page read and write
2980000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
A1B000
direct allocation
page read and write
2CCB000
heap
page read and write
49B000
unkown
page readonly
3390000
trusted library allocation
page read and write
2CDD000
heap
page read and write
2CB8000
heap
page read and write
2CD2000
heap
page read and write
4DF000
unkown
page readonly
2CE6000
heap
page read and write
2A86000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CC7000
heap
page read and write
2980000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2986000
trusted library allocation
page read and write
2CBC000
heap
page read and write
3390000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2360000
heap
page read and write
2986000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CB6000
heap
page read and write
2CCB000
heap
page read and write
98000
stack
page read and write
2CCD000
heap
page read and write
2CC6000
heap
page read and write
2CE6000
heap
page read and write
2CB8000
heap
page read and write
2A80000
trusted library allocation
page read and write
4EE000
unkown
page readonly
2CEF000
heap
page read and write
2CEF000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CB8000
heap
page read and write
2986000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
3361000
direct allocation
page read and write
2980000
trusted library allocation
page read and write
2CDD000
heap
page read and write
2980000
trusted library allocation
page read and write
37BE000
stack
page read and write
2CE6000
heap
page read and write
242D000
direct allocation
page read and write
2CC7000
heap
page read and write
2986000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2CCD000
heap
page read and write
2A86000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2CD2000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2F0F000
stack
page read and write
2980000
trusted library allocation
page read and write
2CC5000
heap
page read and write
2980000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2A80000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2CE6000
heap
page read and write
2CE6000
heap
page read and write
445000
unkown
page read and write
2A86000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2980000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
21B0000
unkown
page readonly
2980000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
866000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CEF000
heap
page read and write
2CE6000
heap
page read and write
2986000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2CD4000
heap
page read and write
21B6000
unkown
page readonly
2986000
trusted library allocation
page read and write
2426000
direct allocation
page read and write
2980000
trusted library allocation
page read and write
2B8E000
stack
page read and write
2986000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2CEF000
heap
page read and write
2986000
trusted library allocation
page read and write
2630000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CEB000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CEB000
heap
page read and write
2CB6000
heap
page read and write
3210000
direct allocation
page read and write
2A80000
trusted library allocation
page read and write
502000
unkown
page write copy
2986000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CBC000
heap
page read and write
6258000
direct allocation
page read and write
2980000
trusted library allocation
page read and write
2CB4000
heap
page read and write
2CBC000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2A80000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2CB8000
heap
page read and write
2CCB000
heap
page read and write
2A86000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2CBC000
heap
page read and write
2CEE000
heap
page read and write
61E000
heap
page read and write
2A80000
trusted library allocation
page read and write
88E000
heap
page read and write
2CC9000
heap
page read and write
843000
heap
page read and write
2CCB000
heap
page read and write
4AD0000
heap
page read and write
2CD2000
heap
page read and write
2CE5000
heap
page read and write
2CBC000
heap
page read and write
2CBC000
heap
page read and write
2A86000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
66E000
stack
page read and write
2A80000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CCB000
heap
page read and write
2CCD000
heap
page read and write
2CE6000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CCD000
heap
page read and write
2986000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2720000
trusted library allocation
page read and write
4A5000
unkown
page readonly
2CE6000
heap
page read and write
2986000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
769000
heap
page read and write
2980000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2980000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2CD2000
heap
page read and write
A05000
direct allocation
page read and write
2CE6000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CE7000
unkown
page read and write
2372000
direct allocation
page read and write
2980000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
9A6000
direct allocation
page read and write
2980000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2CE6000
heap
page read and write
3390000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CE6000
heap
page read and write
6124000
direct allocation
page read and write
2980000
trusted library allocation
page read and write
7FE41000
direct allocation
page read and write
2986000
trusted library allocation
page read and write
2CB6000
heap
page read and write
700000
heap
page read and write
41B000
unkown
page readonly
7FE0C000
direct allocation
page read and write
2CD2000
heap
page read and write
2986000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CEF000
heap
page read and write
2986000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CCB000
heap
page read and write
2A80000
trusted library allocation
page read and write
449000
unkown
page readonly
2CBE000
heap
page read and write
890000
heap
page read and write
2CEE000
heap
page read and write
236A000
direct allocation
page read and write
880000
heap
page read and write
4DC000
unkown
page readonly
2CCD000
heap
page read and write
890000
heap
page read and write
A0C000
direct allocation
page read and write
2CB6000
heap
page read and write
2980000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2A86000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2CBC000
heap
page read and write
3390000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2CDD000
heap
page read and write
2A80000
trusted library allocation
page read and write
708000
heap
page read and write
2CD4000
heap
page read and write
2CB6000
heap
page read and write
2980000
trusted library allocation
page read and write
2CB6000
heap
page read and write
2CC2000
heap
page read and write
2CE5000
heap
page read and write
2986000
trusted library allocation
page read and write
34B1000
heap
page read and write
24C0000
heap
page read and write
2CCB000
heap
page read and write
2980000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
10005000
unkown
page readonly
2986000
trusted library allocation
page read and write
2CCD000
heap
page read and write
2980000
trusted library allocation
page read and write
758000
heap
page read and write
5F38000
direct allocation
page read and write
2A80000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
400000
unkown
page readonly
2A86000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
83E000
heap
page read and write
2980000
trusted library allocation
page read and write
50D000
unkown
page write copy
2A80000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CB6000
heap
page read and write
10005000
unkown
page readonly
2986000
trusted library allocation
page read and write
868000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CCB000
heap
page read and write
10006000
unkown
page read and write
A6C000
direct allocation
page read and write
2986000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CCC000
heap
page read and write
244A000
direct allocation
page read and write
2CCD000
heap
page read and write
2986000
trusted library allocation
page read and write
2CCD000
heap
page read and write
2CCB000
heap
page read and write
2CE6000
heap
page read and write
2CC7000
heap
page read and write
4ADE000
heap
page read and write
2CE6000
heap
page read and write
2980000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2CEF000
heap
page read and write
421000
unkown
page read and write
2980000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2CC7000
heap
page read and write
2CB6000
heap
page read and write
2A80000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
81A000
heap
page read and write
2CB8000
heap
page read and write
2CE5000
heap
page read and write
2986000
trusted library allocation
page read and write
2720000
trusted library allocation
page read and write
2CC7000
heap
page read and write
2CEF000
unkown
page read and write
3390000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CB8000
heap
page read and write
2A86000
trusted library allocation
page read and write
710000
heap
page read and write
2CBC000
heap
page read and write
2CE6000
heap
page read and write
2986000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
5F7F000
direct allocation
page read and write
2CC7000
heap
page read and write
2980000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2CE5000
heap
page read and write
2986000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2CCC000
heap
page read and write
2CE6000
heap
page read and write
2310000
heap
page read and write
2CCD000
heap
page read and write
2CB6000
heap
page read and write
2CB8000
heap
page read and write
2986000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
5F20000
direct allocation
page read and write
48A000
unkown
page readonly
2CD2000
heap
page read and write
2CB8000
heap
page read and write
3390000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CB6000
heap
page read and write
2CB8000
heap
page read and write
2980000
trusted library allocation
page read and write
2319000
heap
page read and write
2CD4000
heap
page read and write
2CE6000
heap
page read and write
2980000
trusted library allocation
page read and write
2CD2000
heap
page read and write
2980000
trusted library allocation
page read and write
2CEF000
heap
page read and write
2CC7000
heap
page read and write
2980000
trusted library allocation
page read and write
7FDD0000
direct allocation
page read and write
2A80000
trusted library allocation
page read and write
6F5000
heap
page read and write
2CB4000
heap
page read and write
50E000
unkown
page readonly
9E7000
direct allocation
page read and write
3531000
heap
page read and write
2980000
trusted library allocation
page read and write
840000
heap
page read and write
2CCC000
heap
page read and write
2CCD000
heap
page read and write
2A86000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CCD000
heap
page read and write
2A80000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2CD2000
heap
page read and write
2CE5000
heap
page read and write
3390000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2CB8000
heap
page read and write
2980000
trusted library allocation
page read and write
5F46000
direct allocation
page read and write
2CE6000
heap
page read and write
2980000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
7FE1C000
direct allocation
page read and write
3390000
trusted library allocation
page read and write
2CEC000
heap
page read and write
2986000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
886000
heap
page read and write
2CEB000
heap
page read and write
2CCB000
heap
page read and write
2A80000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
5A0000
heap
page read and write
2CDD000
heap
page read and write
2980000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
602B000
direct allocation
page read and write
93000
stack
page read and write
2986000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
2CCA000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CC5000
heap
page read and write
28A5000
trusted library allocation
page read and write
853000
heap
page read and write
2CB0000
heap
page read and write
83E000
stack
page read and write
2A86000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CCB000
heap
page read and write
2CCB000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CB8000
heap
page read and write
2A86000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
2CB8000
heap
page read and write
2CE6000
heap
page read and write
2CBC000
heap
page read and write
2A80000
trusted library allocation
page read and write
71A000
heap
page read and write
2CC8000
heap
page read and write
2986000
trusted library allocation
page read and write
2CB8000
heap
page read and write
10006000
unkown
page read and write
2740000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2CBC000
heap
page read and write
28A0000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CC7000
heap
page read and write
2986000
trusted library allocation
page read and write
2CC6000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2CB6000
heap
page read and write
513000
unkown
page readonly
2A80000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CCB000
heap
page read and write
2986000
trusted library allocation
page read and write
2CB6000
heap
page read and write
2CCB000
heap
page read and write
2A86000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2986000
trusted library allocation
page read and write
239E000
direct allocation
page read and write
2CE6000
heap
page read and write
401000
unkown
page execute read
21BB000
unkown
page readonly
2CB6000
heap
page read and write
2CB8000
heap
page read and write
2980000
trusted library allocation
page read and write
2CCB000
heap
page read and write
2986000
trusted library allocation
page read and write
2CCD000
heap
page read and write
2CE6000
heap
page read and write
2980000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CEF000
heap
page read and write
21B7000
unkown
page read and write
2980000
trusted library allocation
page read and write
18E000
stack
page read and write
25F0000
direct allocation
page read and write
3210000
heap
page read and write
4A3000
unkown
page readonly
884000
heap
page read and write
2CE6000
heap
page read and write
2CE6000
heap
page read and write
3390000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
400000
unkown
page readonly
2A80000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CCA000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2980000
trusted library allocation
page read and write
24E0000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
2CCB000
heap
page read and write
2986000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2980000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
21A0000
heap
page read and write
2CCB000
heap
page read and write
85C000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CB6000
heap
page read and write
2980000
trusted library allocation
page read and write
2CCB000
heap
page read and write
2CBB000
heap
page read and write
2CCB000
heap
page read and write
2410000
direct allocation
page read and write
2CBC000
heap
page read and write
2CBC000
heap
page read and write
2CCB000
heap
page read and write
2A86000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2337000
direct allocation
page read and write
86A000
heap
page read and write
2CB8000
heap
page read and write
2986000
trusted library allocation
page read and write
2CCB000
heap
page read and write
2CE6000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CB6000
heap
page read and write
2986000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2CE5000
heap
page read and write
2986000
trusted library allocation
page read and write
2388000
direct allocation
page read and write
2A80000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2CCB000
heap
page read and write
2CBB000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CC7000
heap
page read and write
49B000
unkown
page readonly
48A000
unkown
page readonly
2CE5000
heap
page read and write
4A3000
unkown
page readonly
2986000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2390000
direct allocation
page read and write
2CD4000
heap
page read and write
2CEF000
heap
page read and write
2CD2000
heap
page read and write
2CEE000
heap
page read and write
6A6000
heap
page read and write
2634000
heap
page read and write
2CE6000
heap
page read and write
2986000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2CB6000
heap
page read and write
2A86000
trusted library allocation
page read and write
4DC000
unkown
page readonly
2CE6000
heap
page read and write
41B000
unkown
page readonly
2A80000
trusted library allocation
page read and write
412000
unkown
page write copy
2A86000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CEE000
heap
page read and write
2880000
trusted library allocation
page readonly
2CB8000
heap
page read and write
34B3000
heap
page read and write
2CD2000
heap
page read and write
2980000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
55CF000
stack
page read and write
3390000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2A86000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
866000
heap
page read and write
2A80000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2720000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
2CCD000
heap
page read and write
2CE6000
heap
page read and write
2980000
trusted library allocation
page read and write
2CD4000
heap
page read and write
2CB6000
heap
page read and write
2CE6000
heap
page read and write
2980000
trusted library allocation
page read and write
401000
unkown
page execute read
2CE6000
heap
page read and write
48D000
unkown
page readonly
2986000
trusted library allocation
page read and write
5F3E000
direct allocation
page read and write
2CEF000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CE5000
heap
page read and write
2380000
heap
page read and write
A5D000
direct allocation
page read and write
5BE000
stack
page read and write
2A80000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
24E0000
trusted library allocation
page read and write
2CD2000
heap
page read and write
2980000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2A80000
trusted library allocation
page read and write
21C0000
heap
page read and write
2CE6000
heap
page read and write
2CDD000
heap
page read and write
2A80000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2C8E000
stack
page read and write
3390000
trusted library allocation
page read and write
10000000
unkown
page readonly
2CD2000
heap
page read and write
19C000
stack
page read and write
2CE6000
heap
page read and write
2CEE000
heap
page read and write
2A86000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2980000
trusted library allocation
page read and write
2CEF000
heap
page read and write
2CB6000
heap
page read and write
2CBC000
heap
page read and write
2CC4000
heap
page read and write
3390000
trusted library allocation
page read and write
3630000
direct allocation
page read and write
2CBC000
heap
page read and write
3390000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
412000
unkown
page read and write
2CDD000
heap
page read and write
2370000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2CE6000
heap
page read and write
2CCD000
heap
page read and write
99F000
direct allocation
page read and write
2434000
direct allocation
page read and write
2CE6000
heap
page read and write
23C0000
direct allocation
page read and write
2986000
trusted library allocation
page read and write
2CD2000
heap
page read and write
2CB8000
heap
page read and write
2A80000
trusted library allocation
page read and write
769000
heap
page read and write
A88000
direct allocation
page read and write
2CCB000
heap
page read and write
2986000
trusted library allocation
page read and write
2CD2000
heap
page read and write
2A86000
trusted library allocation
page read and write
6DF000
stack
page read and write
2443000
direct allocation
page read and write
23B4000
direct allocation
page read and write
2986000
trusted library allocation
page read and write
A28000
direct allocation
page read and write
2CBC000
heap
page read and write
84C000
heap
page read and write
2545000
direct allocation
page read and write
93000
stack
page read and write
2986000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2CD2000
heap
page read and write
A4F000
direct allocation
page read and write
450000
unkown
page readonly
2A86000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2A86000
trusted library allocation
page read and write
2380000
direct allocation
page read and write
2986000
trusted library allocation
page read and write
1000A000
unkown
page readonly
2986000
trusted library allocation
page read and write
2CE5000
heap
page read and write
2A86000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CE7000
unkown
page read and write
2A80000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2A80000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
7FE09000
direct allocation
page read and write
2CBC000
heap
page read and write
2980000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2CBC000
heap
page read and write
2CD4000
heap
page read and write
2CD4000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CDD000
heap
page read and write
2A86000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2CD4000
heap
page read and write
2CE6000
heap
page read and write
2A86000
trusted library allocation
page read and write
472000
unkown
page read and write
2A86000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
4DF000
unkown
page readonly
2741000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2CC5000
heap
page read and write
2CD4000
heap
page read and write
2986000
trusted library allocation
page read and write
2CE6000
heap
page read and write
850000
heap
page read and write
2A80000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2363000
direct allocation
page read and write
A13000
direct allocation
page read and write
9B5000
direct allocation
page read and write
2CE6000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CE6000
heap
page read and write
3390000
trusted library allocation
page read and write
558000
unkown
page readonly
2CD4000
heap
page read and write
2CE6000
heap
page read and write
2E0E000
stack
page read and write
2A80000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2CEC000
heap
page read and write
566000
unkown
page readonly
2CBC000
heap
page read and write
2A86000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
856000
heap
page read and write
2CC7000
heap
page read and write
2CD2000
heap
page read and write
2A80000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
610000
heap
page read and write
2CE6000
heap
page read and write
471000
unkown
page write copy
2A80000
trusted library allocation
page read and write
4EE000
unkown
page readonly
2980000
trusted library allocation
page read and write
2CC6000
heap
page read and write
34B1000
heap
page read and write
2986000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CD2000
heap
page read and write
4AEF000
heap
page read and write
2986000
trusted library allocation
page read and write
A90000
heap
page read and write
3530000
heap
page read and write
2A86000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CE6000
heap
page read and write
7FE1A000
direct allocation
page read and write
2A86000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2980000
trusted library allocation
page read and write
2CEF000
heap
page read and write
2A80000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
58D000
unkown
page readonly
2980000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
3348000
direct allocation
page read and write
24D0000
heap
page read and write
2E40000
heap
page read and write
2CE6000
heap
page read and write
9CA000
direct allocation
page read and write
2980000
trusted library allocation
page read and write
2CB8000
heap
page read and write
2986000
trusted library allocation
page read and write
9E0000
direct allocation
page read and write
2CE6000
heap
page read and write
5F0000
heap
page read and write
235C000
stack
page read and write
23C0000
direct allocation
page read and write
2980000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2CB6000
heap
page read and write
2CEF000
heap
page read and write
2986000
trusted library allocation
page read and write
10008000
unkown
page read and write
2310000
heap
page read and write
48D000
unkown
page readonly
2CB6000
heap
page read and write
2980000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2890000
heap
page read and write
7FCC0000
direct allocation
page read and write
2CB8000
heap
page read and write
2CCD000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CCD000
heap
page read and write
2A80000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2CE6000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CB8000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CE5000
heap
page read and write
2CBC000
heap
page read and write
38BF000
stack
page read and write
28B0000
heap
page read and write
2CE6000
heap
page read and write
2980000
trusted library allocation
page read and write
611A000
direct allocation
page read and write
530000
heap
page read and write
2CE6000
heap
page read and write
2CBC000
heap
page read and write
2A80000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
4C0000
heap
page read and write
2986000
trusted library allocation
page read and write
2CC2000
heap
page read and write
2986000
trusted library allocation
page read and write
34F3000
heap
page read and write
2A80000
trusted library allocation
page read and write
2451000
direct allocation
page read and write
2980000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
800000
heap
page read and write
2980000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
401000
unkown
page execute read
2A80000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2980000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
7FE3C000
direct allocation
page read and write
3390000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
2CEF000
heap
page read and write
2A80000
trusted library allocation
page read and write
243C000
direct allocation
page read and write
2CBC000
heap
page read and write
2986000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2CB4000
heap
page read and write
2986000
trusted library allocation
page read and write
2CE8000
heap
page read and write
2A80000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2980000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CB8000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CF0000
heap
page read and write
2986000
trusted library allocation
page read and write
261E000
stack
page read and write
417000
unkown
page read and write
2980000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CBC000
heap
page read and write
9D1000
direct allocation
page read and write
2CD2000
heap
page read and write
2980000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2458000
direct allocation
page read and write
2CCB000
heap
page read and write
2980000
trusted library allocation
page read and write
9C3000
direct allocation
page read and write
2CBB000
heap
page read and write
2CB8000
heap
page read and write
2CF1000
heap
page read and write
2986000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2CD2000
heap
page read and write
680000
heap
page read and write
2A86000
trusted library allocation
page read and write
23A5000
direct allocation
page read and write
2986000
trusted library allocation
page read and write
2CCB000
heap
page read and write
2CEF000
heap
page read and write
318F000
stack
page read and write
2397000
direct allocation
page read and write
2CE6000
heap
page read and write
2CCD000
heap
page read and write
2A86000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2986000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CCB000
heap
page read and write
401000
unkown
page execute read
2986000
trusted library allocation
page read and write
86E000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CE5000
heap
page read and write
2CD4000
heap
page read and write
2986000
trusted library allocation
page read and write
2CC5000
heap
page read and write
2A80000
trusted library allocation
page read and write
2510000
direct allocation
page read and write
2CBC000
heap
page read and write
2A86000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
1000A000
unkown
page readonly
2CC7000
heap
page read and write
2CB6000
heap
page read and write
2986000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2CDD000
heap
page read and write
2CD4000
heap
page read and write
2A86000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2CBC000
heap
page read and write
808000
heap
page read and write
2CE8000
heap
page read and write
2CBC000
heap
page read and write
2380000
direct allocation
page read and write
7EF000
stack
page read and write
2A86000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CEE000
heap
page read and write
850000
heap
page read and write
2980000
trusted library allocation
page read and write
2CEF000
heap
page read and write
2980000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2980000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2CD2000
heap
page read and write
2986000
trusted library allocation
page read and write
2CCD000
heap
page read and write
2A80000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
980000
direct allocation
page read and write
2CCB000
heap
page read and write
2980000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2CB6000
heap
page read and write
34F0000
heap
page read and write
23AC000
direct allocation
page read and write
A39000
direct allocation
page read and write
2CEE000
heap
page read and write
2A86000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
308E000
stack
page read and write
2CCD000
heap
page read and write
304F000
stack
page read and write
6F0000
heap
page read and write
2CF0000
unkown
page read and write
2CB6000
heap
page read and write
2CCB000
heap
page read and write
2CCD000
heap
page read and write
2A80000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2528000
direct allocation
page read and write
2980000
trusted library allocation
page read and write
2620000
heap
page read and write
21D0000
direct allocation
page read and write
2986000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2CCD000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CD2000
heap
page read and write
2CCB000
heap
page read and write
25F0000
direct allocation
page read and write
1F0000
heap
page read and write
2CB8000
heap
page read and write
5F91000
direct allocation
page read and write
2980000
trusted library allocation
page read and write
330F000
direct allocation
page read and write
2CE6000
heap
page read and write
2CB6000
heap
page read and write
34B1000
heap
page read and write
2CE6000
heap
page read and write
3390000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2CD2000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CD2000
heap
page read and write
2A80000
trusted library allocation
page read and write
367E000
stack
page read and write
2CE5000
heap
page read and write
2CCB000
heap
page read and write
2CCB000
heap
page read and write
535000
heap
page read and write
2986000
trusted library allocation
page read and write
2CEC000
heap
page read and write
2CCC000
heap
page read and write
2CE6000
heap
page read and write
45E000
unkown
page readonly
2A80000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
24A4000
heap
page read and write
2986000
trusted library allocation
page read and write
2CEE000
heap
page read and write
2CBC000
heap
page read and write
2986000
trusted library allocation
page read and write
2CBC000
heap
page read and write
10001000
unkown
page execute read
2980000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CEF000
heap
page read and write
6EE000
stack
page read and write
2A80000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2986000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2CC7000
heap
page read and write
2986000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2CB8000
heap
page read and write
2A86000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
400000
unkown
page readonly
2CC7000
heap
page read and write
6076000
direct allocation
page read and write
2CBC000
heap
page read and write
2A86000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CD4000
heap
page read and write
2CD2000
heap
page read and write
241F000
direct allocation
page read and write
50D000
unkown
page read and write
90F000
stack
page read and write
2980000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2CCD000
heap
page read and write
2CCA000
heap
page read and write
2A86000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CCB000
heap
page read and write
2CEF000
heap
page read and write
2CEF000
heap
page read and write
676000
heap
page read and write
2CE5000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CEE000
heap
page read and write
A81000
direct allocation
page read and write
2986000
trusted library allocation
page read and write
2CCB000
heap
page read and write
3390000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2CCB000
heap
page read and write
2CC6000
heap
page read and write
2CE5000
heap
page read and write
2980000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
856000
heap
page read and write
3077000
unkown
page read and write
2CEE000
heap
page read and write
2986000
trusted library allocation
page read and write
45E000
unkown
page readonly
2A80000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2980000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
49B000
unkown
page readonly
2A86000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2CC7000
heap
page read and write
2CDD000
heap
page read and write
6431000
direct allocation
page read and write
2CCB000
heap
page read and write
2980000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
87D000
heap
page read and write
81D000
heap
page read and write
2CD4000
heap
page read and write
2986000
trusted library allocation
page read and write
2CCD000
heap
page read and write
32F0000
heap
page read and write
2A80000
trusted library allocation
page read and write
555000
unkown
page readonly
2A86000
trusted library allocation
page read and write
2CB4000
heap
page read and write
2CBC000
heap
page read and write
2A80000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2720000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2CE6000
heap
page read and write
2986000
trusted library allocation
page read and write
2CBC000
heap
page read and write
849000
heap
page read and write
2A80000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2CC7000
heap
page read and write
2A86000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2CCB000
heap
page read and write
93E000
stack
page read and write
85C000
heap
page read and write
2980000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CC6000
heap
page read and write
2980000
trusted library allocation
page read and write
2CEE000
heap
page read and write
2A80000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
5F2C000
direct allocation
page read and write
2A80000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
6FD000
heap
page read and write
2980000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
322E000
stack
page read and write
2980000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
A31000
direct allocation
page read and write
2CCC000
heap
page read and write
2CC7000
heap
page read and write
2CBC000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CB8000
heap
page read and write
769000
heap
page read and write
2CCD000
heap
page read and write
2A80000
trusted library allocation
page read and write
63D6000
direct allocation
page read and write
2986000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2A7F000
stack
page read and write
2CCD000
heap
page read and write
2CB6000
heap
page read and write
2CB8000
heap
page read and write
2A80000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
492000
unkown
page readonly
471000
unkown
page write copy
2A80000
trusted library allocation
page read and write
3334000
direct allocation
page read and write
2A86000
trusted library allocation
page read and write
2513000
heap
page read and write
2A86000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2CCB000
heap
page read and write
2CBC000
heap
page read and write
2CDD000
heap
page read and write
3390000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
333D000
direct allocation
page read and write
2980000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CE6000
unkown
page read and write
2A86000
trusted library allocation
page read and write
2CE5000
heap
page read and write
A40000
direct allocation
page read and write
2A80000
trusted library allocation
page read and write
87A000
heap
page read and write
2A86000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
A56000
direct allocation
page read and write
2CBC000
heap
page read and write
2CDD000
heap
page read and write
2986000
trusted library allocation
page read and write
2CA0000
heap
page read and write
2986000
trusted library allocation
page read and write
2190000
heap
page read and write
2A86000
trusted library allocation
page read and write
4A5000
unkown
page readonly
2980000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CD2000
heap
page read and write
10008000
unkown
page read and write
2CE6000
heap
page read and write
2A80000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CD4000
heap
page read and write
2A86000
trusted library allocation
page read and write
766000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CCD000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2980000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2CE6000
heap
page read and write
2CEC000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CE5000
heap
page read and write
2A86000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2A80000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
64A000
heap
page read and write
2CE6000
heap
page read and write
2CEF000
heap
page read and write
2CB6000
heap
page read and write
2CEF000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CEF000
heap
page read and write
2CDD000
heap
page read and write
2A80000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2CB6000
heap
page read and write
2A86000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2CB6000
heap
page read and write
2CE6000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CD5000
heap
page read and write
2A86000
trusted library allocation
page read and write
377F000
stack
page read and write
2980000
trusted library allocation
page read and write
2460000
direct allocation
page execute and read and write
2CC6000
heap
page read and write
1F0000
heap
page read and write
2CCA000
heap
page read and write
2CBC000
heap
page read and write
2CE6000
heap
page read and write
83A000
heap
page read and write
2CEE000
heap
page read and write
821000
heap
page read and write
2CE6000
heap
page read and write
2980000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2CEF000
heap
page read and write
2CCA000
heap
page read and write
2CB6000
heap
page read and write
2980000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
50E000
unkown
page readonly
2CEE000
heap
page read and write
2986000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2CEE000
heap
page read and write
3390000
trusted library allocation
page read and write
2CEB000
heap
page read and write
2980000
trusted library allocation
page read and write
A64000
direct allocation
page read and write
2CE6000
heap
page read and write
2CF0000
heap
page read and write
2CCB000
heap
page read and write
2720000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2CD2000
heap
page read and write
2CE6000
heap
page read and write
2CE6000
heap
page read and write
2A80000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
250C000
direct allocation
page read and write
2CE6000
heap
page read and write
2A80000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CEC000
heap
page read and write
2402000
direct allocation
page read and write
2986000
trusted library allocation
page read and write
2CB6000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CC7000
heap
page read and write
3390000
trusted library allocation
page read and write
23EC000
direct allocation
page read and write
2CE6000
heap
page read and write
2986000
trusted library allocation
page read and write
2CC6000
heap
page read and write
2384000
heap
page read and write
2720000
trusted library allocation
page read and write
3210000
direct allocation
page read and write
2A86000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
635000
heap
page read and write
2A86000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CB8000
heap
page read and write
2CBC000
heap
page read and write
23E5000
direct allocation
page read and write
2CB8000
heap
page read and write
2CBC000
heap
page read and write
2CE6000
heap
page read and write
460000
unkown
page readonly
2980000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2980000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
A73000
direct allocation
page read and write
2CBC000
heap
page read and write
2DCF000
stack
page read and write
2A86000
trusted library allocation
page read and write
2CEF000
heap
page read and write
2A80000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
2CCB000
heap
page read and write
2CB8000
heap
page read and write
9EE000
direct allocation
page read and write
2CCB000
heap
page read and write
2A10000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
34F1000
heap
page read and write
2CB6000
heap
page read and write
2A86000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CE6000
heap
page read and write
19A000
stack
page read and write
2986000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
856000
heap
page read and write
2600000
heap
page read and write
2CCB000
heap
page read and write
2CD4000
heap
page read and write
2CBC000
heap
page read and write
2CE6000
heap
page read and write
2CCD000
heap
page read and write
401000
unkown
page execute read
2A86000
trusted library allocation
page read and write
2CDD000
heap
page read and write
2315000
heap
page read and write
2CBE000
heap
page read and write
2A80000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2390000
direct allocation
page read and write
2A80000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2CB8000
heap
page read and write
2980000
trusted library allocation
page read and write
2CCA000
heap
page read and write
2986000
trusted library allocation
page read and write
2CBC000
heap
page read and write
197000
stack
page read and write
2CE6000
heap
page read and write
251E000
direct allocation
page read and write
2A80000
trusted library allocation
page read and write
2CDD000
heap
page read and write
2CBC000
heap
page read and write
41C000
unkown
page readonly
3390000
trusted library allocation
page read and write
423000
unkown
page readonly
2986000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2CCA000
heap
page read and write
2CCB000
heap
page read and write
2A86000
trusted library allocation
page read and write
506000
unkown
page read and write
3390000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2CCB000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CCD000
heap
page read and write
23DD000
direct allocation
page read and write
2980000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
85C000
heap
page read and write
3430000
heap
page read and write
2CE6000
heap
page read and write
2CCD000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CCF000
heap
page read and write
2CEB000
heap
page read and write
2A86000
trusted library allocation
page read and write
9D9000
direct allocation
page read and write
2980000
trusted library allocation
page read and write
2CD4000
heap
page read and write
2980000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2A86000
trusted library allocation
page read and write
61A000
heap
page read and write
2CEF000
heap
page read and write
2CEF000
heap
page read and write
6A7000
heap
page read and write
2CD2000
heap
page read and write
2CEE000
heap
page read and write
236C000
stack
page read and write
2980000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2986000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
858000
heap
page read and write
9B000
stack
page read and write
24B0000
heap
page read and write
2980000
trusted library allocation
page read and write
400000
unkown
page readonly
2A80000
trusted library allocation
page read and write
860000
heap
page read and write
2CEF000
heap
page read and write
2980000
trusted library allocation
page read and write
2355000
direct allocation
page read and write
401000
unkown
page execute read
2986000
trusted library allocation
page read and write
2CD2000
heap
page read and write
2CB6000
heap
page read and write
2CEC000
heap
page read and write
2A86000
trusted library allocation
page read and write
21B1000
unkown
page execute read
2CE6000
heap
page read and write
2CBC000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2CCD000
heap
page read and write
2CC7000
heap
page read and write
2CEC000
heap
page read and write
2980000
trusted library allocation
page read and write
2CEC000
heap
page read and write
2CC7000
heap
page read and write
25E0000
heap
page read and write
2379000
direct allocation
page read and write
2986000
trusted library allocation
page read and write
2CEF000
heap
page read and write
2986000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CEB000
heap
page read and write
3390000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CBA000
heap
page read and write
2CE6000
heap
page read and write
23CA000
direct allocation
page read and write
2A80000
trusted library allocation
page read and write
2CC5000
heap
page read and write
2CEE000
heap
page read and write
2980000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2CEF000
heap
page read and write
2CE5000
heap
page read and write
6A0000
heap
page read and write
A7A000
direct allocation
page read and write
2CE6000
heap
page read and write
2CCB000
heap
page read and write
2980000
trusted library allocation
page read and write
2CE5000
heap
page read and write
2986000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2CDD000
heap
page read and write
85F000
heap
page read and write
2CEF000
heap
page read and write
2CE6000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CE5000
heap
page read and write
34F3000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2CBC000
heap
page read and write
840000
heap
page read and write
2CE6000
heap
page read and write
641F000
direct allocation
page read and write
2CCB000
heap
page read and write
2720000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2A80000
trusted library allocation
page read and write
450000
unkown
page readonly
2CCB000
heap
page read and write
3390000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2CEF000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2CEF000
heap
page read and write
2A86000
trusted library allocation
page read and write
23FB000
direct allocation
page read and write
2CE6000
heap
page read and write
2980000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2CE6000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CCB000
heap
page read and write
419000
unkown
page write copy
2CCB000
heap
page read and write
2CC5000
heap
page read and write
2CC6000
heap
page read and write
2CEE000
heap
page read and write
6108000
direct allocation
page read and write
2540000
direct allocation
page read and write
2409000
direct allocation
page read and write
46E000
unkown
page readonly
51C000
unkown
page readonly
2A80000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CC9000
heap
page read and write
2CBC000
heap
page read and write
2980000
trusted library allocation
page read and write
2CCB000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CCB000
heap
page read and write
2986000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2CDD000
heap
page read and write
24E0000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CC8000
heap
page read and write
2CCE000
stack
page read and write
2A80000
trusted library allocation
page read and write
23D2000
direct allocation
page read and write
886000
heap
page read and write
2CCB000
heap
page read and write
2980000
trusted library allocation
page read and write
496000
unkown
page read and write
6064000
direct allocation
page read and write
71E000
heap
page read and write
2A80000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CCB000
heap
page read and write
45C000
unkown
page readonly
2CB8000
heap
page read and write
2CEF000
heap
page read and write
2980000
trusted library allocation
page read and write
2CEF000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CD2000
heap
page read and write
2A86000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
50A000
unkown
page read and write
2CCB000
heap
page read and write
2CE6000
heap
page read and write
2A80000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
421000
unkown
page write copy
3390000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
2CEB000
heap
page read and write
2980000
trusted library allocation
page read and write
2CE6000
heap
page read and write
2A80000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2CB5000
heap
page read and write
2980000
trusted library allocation
page read and write
2CDD000
heap
page read and write
2CC6000
heap
page read and write
2A86000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
10000000
unkown
page readonly
2A80000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2CD2000
heap
page read and write
2CC7000
heap
page read and write
4A0000
heap
page read and write
2CB6000
heap
page read and write
502000
unkown
page read and write
2980000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
335F000
direct allocation
page read and write
2CE5000
heap
page read and write
60CF000
direct allocation
page read and write
2CB6000
heap
page read and write
2CCB000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CD2000
heap
page read and write
2A86000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CC7000
heap
page read and write
2CBC000
heap
page read and write
2986000
trusted library allocation
page read and write
232F000
direct allocation
page read and write
2986000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2CE5000
heap
page read and write
6096000
direct allocation
page read and write
2986000
trusted library allocation
page read and write
2CBC000
heap
page read and write
2A80000
trusted library allocation
page read and write
2CB8000
heap
page read and write
199000
stack
page read and write
2A86000
trusted library allocation
page read and write
2CCA000
heap
page read and write
2A86000
trusted library allocation
page read and write
2980000
trusted library allocation
page read and write
2A80000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
610C000
direct allocation
page read and write
2CB6000
heap
page read and write
3390000
trusted library allocation
page read and write
2CE5000
heap
page read and write
48E000
unkown
page readonly
2A80000
trusted library allocation
page read and write
2A86000
trusted library allocation
page read and write
2CD4000
heap
page read and write
2A86000
trusted library allocation
page read and write
2CDD000
heap
page read and write
2986000
trusted library allocation
page read and write
2CB6000
heap
page read and write
2A86000
trusted library allocation
page read and write
2986000
trusted library allocation
page read and write
2CB8000
heap
page read and write
There are 1839 hidden memdumps, click here to show them.