IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_c53b2fc9a1ffa4aae2b84b74286e467c848ba0_440dec59_054230ad\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_c53b2fc9a1ffa4aae2b84b74286e467c848ba0_440dec59_06fdd724\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_c53b2fc9a1ffa4aae2b84b74286e467c848ba0_440dec59_0831a7e6\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_c53b2fc9a1ffa4aae2b84b74286e467c848ba0_440dec59_0ba59066\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_c53b2fc9a1ffa4aae2b84b74286e467c848ba0_440dec59_10519f99\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_c53b2fc9a1ffa4aae2b84b74286e467c848ba0_440dec59_1209c12b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_c53b2fc9a1ffa4aae2b84b74286e467c848ba0_440dec59_121597e8\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_c53b2fc9a1ffa4aae2b84b74286e467c848ba0_440dec59_1745ca23\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_c53b2fc9a1ffa4aae2b84b74286e467c848ba0_440dec59_17858673\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_e5c8e0fd69b3d1364c1ea6934df3966ffe947bd_440dec59_140eaddc\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\G62TDH9B\soft[1]
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\gVbgwXdNtgMn\Bunifu_UI_v1.5.3.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\gVbgwXdNtgMn\Cleaner.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_05057d34\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_0789c3c3\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_0fa97499\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_0fb9b83a\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_14062c50\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_1431a86b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_17918727\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_17c5cdc5\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_43a044097e5f3ef507ce7a9f19c0e6d280fb_440dec59_17e1912a\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_83ec7e94952b3dcbb61bd30e98682b9f65d64_440dec59_0e4aaad7\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4PB7FJMT\soft[1]
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\dll[1]
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\6clvSx8en71SUl1hUuzQ6n56lWM0\Bunifu_UI_v1.5.3.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\6clvSx8en71SUl1hUuzQ6n56lWM0\Cleaner.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2CC5.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:42:39 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2FB4.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3052.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8385.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:41:55 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER857A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8618.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8D78.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:41:58 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8F6D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER900A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER94FA.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:42:00 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER96EF.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER978C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9C6C.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:42:02 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9EA0.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9F2D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA536.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:42:04 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA72B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA78A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA939.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:43:11 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERACE3.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAD52.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB6DA.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:42:10 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC060.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC0CF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC5CE.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:42:12 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC8FC.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC989.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD2AF.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:42:16 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD5FC.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD699.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3Y2ADQKS\dll[1]
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3Y2ADQKS\library[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3Y2ADQKS\ping[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9QTQHWWN\fuckingdllENCR[1].dll
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9QTQHWWN\ping[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\G62TDH9B\library[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OTUW0Q90\ping[1].htm
ASCII text, with no line terminators
dropped
C:\Users\user\Desktop\Cleaner.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Icon number=0, Archive, ctime=Mon Oct 3 23:42:37 2022, mtime=Mon Oct 3 23:42:37 2022, atime=Mon Oct 3 23:42:37 2022, length=3947920, window=hide
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER276E.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:30:19 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2A00.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2ACC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER70B1.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:32 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER72A6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7334.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER790E.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:35 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7B03.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7BA0.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8245.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:37 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER84A8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8545.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8C48.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:40 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8E7B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8F09.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER957F.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:43 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9D7F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA4CC.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:30:52 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA550.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA77D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA849.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB28D.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:50 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB608.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB6A5.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBE54.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:53 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC1DF.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC26D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC980.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 4 00:29:55 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCC01.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCC9E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4PB7FJMT\library[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\fuckingdllENCR[1].dll
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\ping[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NUEPGTR9\ping[1].htm
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\library[1].htm
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\ping[1].htm
very short file (no magic)
dropped
There are 92 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
C:\Users\user\Desktop\file.exe
malicious
C:\Users\user\AppData\Local\Temp\gVbgwXdNtgMn\Cleaner.exe
"C:\Users\user\AppData\Local\Temp\gVbgwXdNtgMn\Cleaner.exe"
malicious
C:\Users\user\AppData\Local\Temp\6clvSx8en71SUl1hUuzQ6n56lWM0\Cleaner.exe
"C:\Users\user\AppData\Local\Temp\6clvSx8en71SUl1hUuzQ6n56lWM0\Cleaner.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 532
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 700
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 700
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 720
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 776
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 868
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 880
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 976
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 1268
C:\Windows\SysWOW64\cmd.exe
C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\user\AppData\Local\Temp\gVbgwXdNtgMn\Cleaner.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6136 -s 1556
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c taskkill /im "file.exe" /f & erase "C:\Users\user\Desktop\file.exe" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /im "file.exe" /f
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 528
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 700
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 724
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 760
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 768
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 848
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 840
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 1032
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 1292
C:\Windows\SysWOW64\cmd.exe
C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\user\AppData\Local\Temp\6clvSx8en71SUl1hUuzQ6n56lWM0\Cleaner.exe
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3196 -s 1552
There are 19 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://208.67.104.97/powfhxhxcjzx/ping.php?sub=NOSUB&stream=start&substream=mixinte
208.67.104.97
malicious
http://208.67.104.97/powfhxhxcjzx/ping.php?sub=NOSUB&stream=mixtwo&substream=mixinte
208.67.104.97
malicious
http://208.67.104.97/powfhxhxcjzx/ping.php?sub=NOSUB&stream=start&substream=mixinteIN
unknown
malicious
http://85.31.46.167/software.php
85.31.46.167
malicious
http://208.67.104.97/powfhxhxcjzx/ping.php?sub=NOSUB&stream=start&subst
unknown
malicious
http://171.22.30.106/library.php
171.22.30.106
malicious
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://ctldl.windowsup
unknown
http://www.fontbureau.com/designers?
unknown
http://www.fontbureau.comitu8
unknown
https://take.rdrct-now.online/go/ZWKA?p78705p298845p1174
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.com
unknown
http://www.fontbureau.com/designersiva
unknown
http://www.sakkal.comx
unknown
http://www.carterandcone.com.
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.sajatypeworks.comb.
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://fontfabrik.com
unknown
http://www.fontbureau.com.
unknown
http://www.jiyu-kobo.co.jp/.
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.urwpp.de
unknown
http://www.zhongyicts.com.cn
unknown
http://107.182.129.235/storage/ping.php
107.182.129.235
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
http://www.typography.net.
unknown
http://www.fontbureau.comF.
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.comH
unknown
http://www.zhongyicts.com.cno.X
unknown
http://www.fontbureau.comvaRegular
unknown
http://107.182.129.235/storage/extension.php
107.182.129.235
http://www.jiyu-kobo.co.jp/H
unknown
http://www.ccleaner.comqhttps://take.rdrct-now.online/go/ZWKA?p78705p298845p1174
unknown
http://www.jiyu-kobo.co.jp/jp/
unknown
https://iplogger.org
unknown
https://iplogger.orgx
unknown
http://www.carterandcone.coml
unknown
http://www.sandoll.co.kralRegular
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.jiyu-kobo.co.jp/F.
unknown
http://www.typography.netTTF.
unknown
http://iplogger.org
unknown
http://www.founder.com.cn/cn
unknown
http://www.jiyu-kobo.co.jp/x
unknown
http://www.fontbureau.com/designers/frere-jones.html
unknown
http://www.fontbureau.com/designers/cabarga.html
unknown
http://www.founder.com.cn/cn8
unknown
https://g-cleanit.hk
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.typography.netF.
unknown
http://www.zhongyicts.com.cno.
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fontbureau.com/designers/cabarga.htmlll.
unknown
https://iplogger.org/1Pz8p7
148.251.234.83
http://www.fontbureau.com/designers/
unknown
http://www.jiyu-kobo.co.jp/ho
unknown
http://www.sajatypeworks.com-
unknown
http://www.sajatypeworks.como2
unknown
http://www.founder.com.cn/cn/cn
unknown
http://www.jiyu-kobo.co.jp/jp/ho
unknown
http://www.jiyu-kobo.co.jp/Y0ho
unknown
http://www.jiyu-kobo.co.jp/.T
unknown
http://www.zhongyicts.com.cn.TTF
unknown
http://www.fontbureau.com(
unknown
http://www.typography.net
unknown
http://www.sajatypeworks.comtr
unknown
http://www.fontbureau.com/designersp
unknown
http://www.fontbureau.com/designerso
unknown
http://www.jiyu-kobo.co.jp/.TTC
unknown
http://www.fontbureau.comH_
unknown
http://www.sakkal.comI
unknown
http://www.tiro.comq
unknown
http://www.jiyu-kobo.co.jp/F
unknown
http://www.sajatypeworks.comd:
unknown
http://www.founder.com.cn/cn/
unknown
http://www.typography.netad
unknown
http://www.sajatypeworks.comcom
unknown
http://www.monotype.9
unknown
There are 82 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
iplogger.org
148.251.234.83

IPs

IP
Domain
Country
Malicious
208.67.104.97
unknown
United States
malicious
85.31.46.167
unknown
Germany
malicious
148.251.234.83
iplogger.org
Germany
107.182.129.235
unknown
Reserved
171.22.30.106
unknown
Germany

Registry

Path
Value
Malicious
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
ProgramId
malicious
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
FileId
malicious
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
LowerCaseLongPath
malicious
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
LongPathHash
malicious
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
Name
malicious
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
Publisher
malicious
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
Version
malicious
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
BinFileVersion
malicious
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
BinaryType
malicious
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
ProductName
malicious
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
ProductVersion
malicious
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
LinkDate
malicious
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
BinProductVersion
malicious
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
Size
malicious
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
Language
malicious
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
IsPeFile
malicious
\REGISTRY\A\{f78cdcce-a412-b89c-8798-8986512f1b7e}\Root\InventoryApplicationFile\file.exe|92928141
IsOsComponent
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
ProgramId
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
FileId
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
LowerCaseLongPath
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
LongPathHash
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
Name
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
Publisher
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
Version
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
BinFileVersion
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
BinaryType
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
ProductName
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
ProductVersion
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
LinkDate
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
BinProductVersion
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
Size
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
Language
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
IsPeFile
malicious
\REGISTRY\A\{0915b99c-5c81-9258-6540-6c801691a571}\Root\InventoryApplicationFile\file.exe|a871503c
IsOsComponent
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Cleaner_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Software\GCleaner\Trial
Count
HKEY_CURRENT_USER\Software\GCleaner\License
License
HKEY_CURRENT_USER\Software\GCleaner\Install
Postcheck
There are 44 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
21D0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
21D0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
21D0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
21D0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
21D0000
direct allocation
page execute and read and write
malicious
21D0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
21D0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
21D0000
direct allocation
page execute and read and write
malicious
21D0000
direct allocation
page execute and read and write
malicious
21D0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
2210000
direct allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
21D0000
direct allocation
page execute and read and write
malicious
21D0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
21D0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
21D0000
direct allocation
page execute and read and write
malicious
21D0000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
21D0000
direct allocation
page execute and read and write
malicious
22E6B036000
heap
page read and write
38C0000
trusted library allocation
page read and write
22E6B062000
heap
page read and write
224D000
stack
page read and write
22E6AEE0000
heap
page read and write
21F3C229000
heap
page read and write
5DE000
heap
page read and write
22E6B063000
heap
page read and write
400000
unkown
page readonly
22E6B068000
heap
page read and write
21F3C269000
heap
page read and write
19B000
stack
page read and write
6DE000
stack
page read and write
6DE000
stack
page read and write
22E6B260000
trusted library allocation
page read and write
22E6FA0F000
heap
page read and write
22E6FA57000
heap
page read and write
2EF6000
heap
page read and write
19510B90000
heap
page read and write
22E6B040000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B026000
heap
page read and write
22E6B05D000
heap
page read and write
22E68CF1000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
22E6FAB3000
heap
page read and write
7FFCA0B80000
trusted library allocation
page read and write
22E6B05B000
heap
page read and write
22E6F31D000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B06F000
heap
page read and write
7C28CFE000
stack
page read and write
43F000
unkown
page execute and read and write
22E6C253000
heap
page read and write
2D7E000
stack
page read and write
22E6B070000
heap
page read and write
22E6B040000
heap
page read and write
19510C00000
heap
page read and write
22E6B030000
heap
page read and write
22E6B040000
heap
page read and write
22E6B05D000
heap
page read and write
1CE5E865000
heap
page read and write
22E6B5B5000
trusted library allocation
page read and write
22E6B07A000
heap
page read and write
37C9000
trusted library allocation
page read and write
21F3C313000
heap
page read and write
2A3E000
stack
page read and write
22E6B068000
heap
page read and write
22E6B05B000
heap
page read and write
22BD000
stack
page read and write
3920000
trusted library allocation
page read and write
7FFCA0CA0000
trusted library allocation
page read and write
3733000
trusted library allocation
page read and write
24F0000
heap
page read and write
22E6B05B000
heap
page read and write
246D000
stack
page read and write
22E68B8A000
heap
page read and write
22E6B5C0000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
22E6B05D000
heap
page read and write
2A3E000
stack
page read and write
22E6B03F000
heap
page read and write
19B000
stack
page read and write
22E6B030000
heap
page read and write
22E6F670000
trusted library allocation
page read and write
19511800000
heap
page read and write
22E6B037000
heap
page read and write
275F56E000
stack
page read and write
22E6F633000
trusted library allocation
page read and write
22E6B025000
heap
page read and write
242E000
stack
page read and write
22E6C276000
heap
page read and write
22E6B069000
heap
page read and write
2975EE43000
heap
page read and write
22E6B03F000
heap
page read and write
8EF000
stack
page read and write
22E6B1F0000
trusted library allocation
page read and write
22E6B05B000
heap
page read and write
19511754000
heap
page read and write
22E6B068000
heap
page read and write
22E6F688000
trusted library allocation
page read and write
22E6B330000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
22E6F321000
heap
page read and write
22E6B2A0000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
2E9517E000
stack
page read and write
22E6AE90000
unkown
page readonly
2FA0000
unkown
page readonly
22E6B05B000
heap
page read and write
22E6B063000
heap
page read and write
246D000
stack
page read and write
1CE5E85A000
heap
page read and write
22E6B03E000
heap
page read and write
22E6B3C0000
trusted library allocation
page read and write
222FC05D000
heap
page read and write
5A0000
heap
page read and write
22E6D130000
heap
page read and write
22E6B052000
heap
page read and write
1F0000
trusted library allocation
page read and write
22E6B068000
heap
page read and write
401000
unkown
page execute read
3B66000
trusted library allocation
page read and write
19511602000
heap
page read and write
22E6B053000
heap
page read and write
22E6B03E000
heap
page read and write
22E6B05B000
heap
page read and write
22E6AEE1000
heap
page read and write
22E6B05D000
heap
page read and write
24F0000
heap
page read and write
6DE000
stack
page read and write
22E6FA48000
heap
page read and write
92E000
stack
page read and write
222FC058000
heap
page read and write
2C7D000
stack
page read and write
2320000
heap
page read and write
22E6B04A000
heap
page read and write
22E6B03B000
heap
page read and write
22E6B068000
heap
page read and write
22E6B069000
heap
page read and write
22E6B026000
heap
page read and write
22E6B066000
heap
page read and write
2ECE000
stack
page read and write
19511700000
heap
page read and write
2751A66A000
heap
page read and write
22E6B090000
trusted library allocation
page read and write
22E6B040000
trusted library allocation
page read and write
22E6B040000
heap
page read and write
5A0000
heap
page read and write
19B000
stack
page read and write
663000
heap
page read and write
663000
heap
page read and write
5A0000
heap
page read and write
710000
heap
page read and write
1CE5E861000
heap
page read and write
5B8000
heap
page execute and read and write
AFEB8FC000
stack
page read and write
22E6A6B0000
trusted library allocation
page read and write
22E6FA39000
heap
page read and write
43F000
unkown
page execute and read and write
19510C73000
heap
page read and write
22E6B03B000
heap
page read and write
19510C89000
heap
page read and write
710000
heap
page read and write
22E6B042000
heap
page read and write
22E6AFF0000
trusted library allocation
page read and write
22E68BB9000
heap
page read and write
22E6CC5D000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
5A0000
heap
page read and write
22E6CFEB000
trusted library allocation
page read and write
22E68D00000
trusted library allocation
page read and write
22E6A664000
trusted library allocation
page read and write
22E6B039000
heap
page read and write
22E6B05B000
heap
page read and write
6DE000
stack
page read and write
22E6B05D000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B05B000
heap
page read and write
22E6B030000
heap
page read and write
710000
heap
page read and write
22E6C891000
trusted library allocation
page read and write
590000
unkown
page read and write
9D000
stack
page read and write
3A28000
trusted library allocation
page read and write
5B8000
heap
page execute and read and write
22E6FA1E000
heap
page read and write
22E6C287000
heap
page read and write
22E6B068000
heap
page read and write
9D000
stack
page read and write
22E6C890000
trusted library allocation
page read and write
92E000
stack
page read and write
22E6CC60000
trusted library allocation
page read and write
386E000
trusted library allocation
page read and write
222FC013000
heap
page read and write
22E6CC51000
trusted library allocation
page read and write
22E6B06C000
heap
page read and write
22E6B05B000
heap
page read and write
22E6B05B000
heap
page read and write
22E6B040000
heap
page read and write
22E6C8C0000
trusted library allocation
page read and write
22E6B06B000
heap
page read and write
22E6B020000
heap
page read and write
22E6CC80000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
22E6B05B000
heap
page read and write
22E6D0FC000
heap
page read and write
22E6B05D000
heap
page read and write
2A2E000
unkown
page read and write
22E68D20000
heap
page read and write
22E0042A000
trusted library allocation
page read and write
22E6B06C000
heap
page read and write
22E6B025000
heap
page read and write
22E6B068000
heap
page read and write
3735000
trusted library allocation
page read and write
22E6B05B000
heap
page read and write
22E6C2B4000
heap
page read and write
22E6C970000
trusted library allocation
page read and write
22E6B075000
heap
page read and write
7C28AFF000
stack
page read and write
22E6B05D000
heap
page read and write
22E6C8C0000
trusted library allocation
page read and write
22E6C8D0000
trusted library allocation
page read and write
222FC062000
heap
page read and write
1CE5E84F000
heap
page read and write
22E6B062000
heap
page read and write
2B3E000
stack
page read and write
22E68BB6000
heap
page read and write
2310000
heap
page read and write
22E6B063000
heap
page read and write
22E6C990000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
2EF6000
heap
page read and write
2CE0000
heap
page read and write
22E6CEF0000
trusted library allocation
page read and write
22E6B062000
heap
page read and write
22E6B063000
heap
page read and write
2EF6000
heap
page read and write
8EF000
stack
page read and write
22E6B05D000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B670000
trusted library allocation
page read and write
2310000
heap
page read and write
2310000
heap
page read and write
22E6C21C000
heap
page read and write
7FFCA0B90000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
22E6B05B000
heap
page read and write
22E6B05B000
heap
page read and write
22E6C8C0000
trusted library allocation
page read and write
22E6CFF6000
trusted library allocation
page read and write
43F000
unkown
page execute and read and write
22E6CC51000
trusted library allocation
page read and write
22E6B040000
heap
page read and write
90F6AFF000
stack
page read and write
22E6B05D000
heap
page read and write
22E6B03B000
heap
page read and write
22E6B03B000
heap
page read and write
25C0000
unkown
page readonly
1CE5E800000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B05D000
heap
page read and write
22BD000
stack
page read and write
22E6B05D000
heap
page read and write
22E6B05D000
heap
page read and write
22BD000
stack
page read and write
22E6CC82000
trusted library allocation
page read and write
92E000
stack
page read and write
22E6B05B000
heap
page read and write
22E6B070000
heap
page read and write
22E6C980000
trusted library allocation
page read and write
222FC100000
heap
page read and write
22E6B05D000
heap
page read and write
A2C000
stack
page read and write
2E9547C000
stack
page read and write
22E6B05B000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B03B000
heap
page read and write
5AA000
heap
page read and write
22E6FE50000
trusted library allocation
page read and write
2250000
remote allocation
page read and write
22E6F62C000
trusted library allocation
page read and write
22E6B061000
heap
page read and write
22E6B04A000
heap
page read and write
22E6B160000
trusted library allocation
page read and write
2310000
heap
page read and write
22E6B05D000
heap
page read and write
1CE5E760000
heap
page read and write
22E6FA4A000
heap
page read and write
22E6A700000
trusted library allocation
page read and write
22E6B6AC000
trusted library allocation
page read and write
22E6CC80000
trusted library allocation
page read and write
242E000
stack
page read and write
22E6A6C0000
trusted library allocation
page read and write
6DE000
stack
page read and write
22E6B061000
heap
page read and write
27EC3113000
heap
page read and write
24BD000
stack
page read and write
5AA000
heap
page read and write
590000
unkown
page read and write
5B8000
heap
page execute and read and write
22E6B068000
heap
page read and write
22E6B068000
heap
page read and write
22E6B068000
heap
page read and write
22E6B068000
heap
page read and write
22E6B03F000
heap
page read and write
22E6C8D0000
trusted library allocation
page read and write
22E6B040000
heap
page read and write
5DE000
heap
page read and write
22E6B030000
heap
page read and write
22E6B05B000
heap
page read and write
3960000
trusted library allocation
page read and write
22E6B06B000
heap
page read and write
22E6C971000
trusted library allocation
page read and write
1CE5E833000
heap
page read and write
5AA000
heap
page read and write
2ECE000
stack
page read and write
22E6B038000
heap
page read and write
22E6B068000
heap
page read and write
22E6CC90000
trusted library allocation
page read and write
22E6B06F000
heap
page read and write
22E6A6F0000
trusted library allocation
page read and write
22E00001000
trusted library allocation
page read and write
710000
heap
page read and write
2310000
heap
page read and write
22E6B069000
heap
page read and write
22E10011000
trusted library allocation
page read and write
22E6B037000
heap
page read and write
29A40002000
heap
page read and write
8EF000
stack
page read and write
27EC3088000
heap
page read and write
22E6A6E0000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
373F000
trusted library allocation
page read and write
22E6B05B000
heap
page read and write
22E6AFA1000
heap
page read and write
22E6B02B000
heap
page read and write
22E6B06F000
heap
page read and write
2751A510000
heap
page read and write
21F3C274000
heap
page read and write
2C3F000
stack
page read and write
22E6B05D000
heap
page read and write
22E6FA28000
heap
page read and write
222FC03D000
heap
page read and write
1F0000
trusted library allocation
page read and write
24F0000
heap
page read and write
22E6B03F000
heap
page read and write
22E6B04A000
heap
page read and write
29A407F0000
remote allocation
page read and write
1CE5E6F0000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B068000
heap
page read and write
293E000
stack
page read and write
22E6B280000
trusted library allocation
page read and write
663000
heap
page read and write
43F000
unkown
page execute and read and write
22E6B03B000
heap
page read and write
22E6EC56000
trusted library allocation
page read and write
22E6B070000
heap
page read and write
22E6B040000
heap
page read and write
2A3E000
stack
page read and write
22E6B068000
heap
page read and write
22E6B068000
heap
page read and write
22E6B05B000
heap
page read and write
22E6B068000
heap
page read and write
22E6B05B000
heap
page read and write
710000
heap
page read and write
30000
unkown
page read and write
22E6B061000
heap
page read and write
242E000
stack
page read and write
22E6B05D000
heap
page read and write
2FA0000
unkown
page readonly
5A0000
heap
page read and write
22E6B02F000
heap
page read and write
22E6F65E000
trusted library allocation
page read and write
1CE5E86C000
heap
page read and write
22E6B05D000
heap
page read and write
90F6F7F000
stack
page read and write
22E6C890000
trusted library allocation
page read and write
22E6B060000
heap
page read and write
19511823000
heap
page read and write
710000
heap
page read and write
22E6B040000
heap
page read and write
AFEB9FE000
stack
page read and write
22E6B063000
heap
page read and write
34F0000
heap
page read and write
22E6B05B000
heap
page read and write
22E6B03E000
heap
page read and write
5AA000
heap
page read and write
22E6B060000
heap
page read and write
22E6B02D000
heap
page read and write
242E000
stack
page read and write
2320000
heap
page read and write
22E6B02A000
heap
page read and write
22E68CD0000
trusted library allocation
page read and write
19510DE5000
heap
page read and write
22E6B05D000
heap
page read and write
8EF000
stack
page read and write
22E6C1EA000
heap
page read and write
5AA000
heap
page read and write
22E6B069000
heap
page read and write
222FC000000
heap
page read and write
22E6B05D000
heap
page read and write
27EC3000000
heap
page read and write
8CBE4FB000
stack
page read and write
22E6B500000
trusted library allocation
page read and write
224D000
stack
page read and write
21F3C213000
heap
page read and write
22E6B040000
heap
page read and write
22E6B05B000
heap
page read and write
1CE5E858000
heap
page read and write
2C3E000
stack
page read and write
90F6C79000
stack
page read and write
224D000
stack
page read and write
222FD9F0000
remote allocation
page read and write
19510C52000
heap
page read and write
7C289FF000
stack
page read and write
22E6B25D000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
22E6AEE3000
heap
page read and write
22E6C295000
heap
page read and write
22E6B03F000
heap
page read and write
22E6A6A0000
trusted library allocation
page read and write
2751A602000
heap
page read and write
AD125FC000
stack
page read and write
68C000
heap
page read and write
9D000
stack
page read and write
22E6B06D000
heap
page read and write
2751A600000
heap
page read and write
22E6B05E000
heap
page read and write
22E6B1A0000
trusted library allocation
page read and write
22E6B068000
heap
page read and write
30000
unkown
page read and write
27EC2F90000
trusted library allocation
page read and write
ACA25FA000
stack
page read and write
373C000
trusted library allocation
page read and write
19510D8E000
heap
page read and write
224D000
stack
page read and write
22E6B037000
heap
page read and write
22E6B068000
heap
page read and write
224D000
stack
page read and write
22E6B042000
heap
page read and write
22E6B032000
heap
page read and write
222FBFE0000
trusted library allocation
page read and write
22E6B03F000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B040000
heap
page read and write
1F0000
trusted library allocation
page read and write
2320000
heap
page read and write
22E6B05D000
heap
page read and write
22E6AFAD000
heap
page read and write
22E6B03F000
heap
page read and write
3331000
trusted library allocation
page read and write
22E6F620000
trusted library allocation
page read and write
22E6B4F0000
trusted library allocation
page read and write
1CE5E864000
heap
page read and write
2DCD000
stack
page read and write
22E0040E000
trusted library allocation
page read and write
22E6B05B000
heap
page read and write
22E6B040000
heap
page read and write
22E6B068000
heap
page read and write
22E6B070000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B040000
heap
page read and write
A2C000
stack
page read and write
24F0000
heap
page read and write
27EC30BA000
heap
page read and write
293E000
stack
page read and write
5AA000
heap
page read and write
90F707F000
stack
page read and write
22E6B05D000
heap
page read and write
22E6B05D000
heap
page read and write
195117C6000
heap
page read and write
22E6B05D000
heap
page read and write
31EF000
trusted library allocation
page read and write
19B000
stack
page read and write
22E6C8F0000
trusted library allocation
page read and write
663000
heap
page read and write
22E6B03C000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B02F000
heap
page read and write
591000
unkown
page readonly
590000
unkown
page read and write
30000
unkown
page read and write
22E6B05B000
heap
page read and write
242E000
stack
page read and write
22E6B068000
heap
page read and write
22E6B05D000
heap
page read and write
22BD000
stack
page read and write
7C283FB000
stack
page read and write
1F0000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
24C0000
heap
page read and write
22E6B041000
heap
page read and write
22E6B061000
heap
page read and write
5A0000
heap
page read and write
22E6B068000
heap
page read and write
22E6C1C0000
heap
page read and write
22E6B05B000
heap
page read and write
7FFCA0BA0000
trusted library allocation
page read and write
22E6F9C3000
heap
page read and write
590000
unkown
page read and write
22E6B040000
heap
page read and write
22E6B05D000
heap
page read and write
5DE000
heap
page read and write
19511813000
heap
page read and write
22E68862000
unkown
page readonly
22E6B05B000
heap
page read and write
224D000
stack
page read and write
34F6000
heap
page read and write
22E6B069000
heap
page read and write
22E6B05B000
heap
page read and write
22E6B28A000
trusted library allocation
page read and write
22E6B037000
heap
page read and write
22E6B630000
trusted library allocation
page read and write
22E6F944000
trusted library allocation
page read and write
22E6B02E000
heap
page read and write
24BD000
stack
page read and write
22E6B02F000
heap
page read and write
25E0000
unkown
page read and write
19B000
stack
page read and write
22E6B068000
heap
page read and write
19510C6D000
heap
page read and write
22E6B690000
trusted library allocation
page read and write
22E6B150000
trusted library allocation
page read and write
2C3E000
stack
page read and write
22E6FCA1000
trusted library allocation
page read and write
22E68D50000
trusted library allocation
page read and write
22E6B120000
trusted library allocation
page read and write
246D000
stack
page read and write
19B000
stack
page read and write
22E689C0000
heap
page read and write
22E6B068000
heap
page read and write
22E6B040000
heap
page read and write
5B8000
heap
page execute and read and write
53FF0FD000
stack
page read and write
68C000
heap
page read and write
3361000
trusted library allocation
page read and write
22E6B06B000
heap
page read and write
22E6B068000
heap
page read and write
591000
unkown
page readonly
2C3F000
stack
page read and write
22E6B05B000
heap
page read and write
22E6B061000
heap
page read and write
22E6CE00000
trusted library allocation
page read and write
8EF000
stack
page read and write
22E6B068000
heap
page read and write
30000
unkown
page read and write
242E000
stack
page read and write
22E68CC0000
heap
page execute and read and write
22E6B05D000
heap
page read and write
22E6F9D2000
heap
page read and write
22E6C2A2000
heap
page read and write
22E6C9A0000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
22E6B03E000
heap
page read and write
22E6B030000
heap
page read and write
22E6A6F0000
trusted library allocation
page read and write
22E6B11F000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
5DE000
heap
page read and write
22E00438000
trusted library allocation
page read and write
22E6B560000
trusted library allocation
page read and write
22FD000
stack
page read and write
7FFCA0D40000
trusted library allocation
page read and write
2250000
remote allocation
page read and write
22E6B05D000
heap
page read and write
6DE000
stack
page read and write
24F0000
heap
page read and write
22E6AF99000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B040000
heap
page read and write
37F8000
trusted library allocation
page read and write
22E68AD0000
heap
page read and write
22E6B570000
trusted library allocation
page read and write
22E6B060000
heap
page read and write
ACA208B000
stack
page read and write
19510C43000
heap
page read and write
9D000
stack
page read and write
30C0000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B063000
heap
page read and write
19511722000
heap
page read and write
22E6F62F000
trusted library allocation
page read and write
22E6B03D000
heap
page read and write
22E6B02C000
heap
page read and write
22E6B070000
heap
page read and write
22E6AF8B000
heap
page read and write
22E6B03F000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B137000
heap
page read and write
22E6B082000
trusted library allocation
page read and write
22E6D139000
heap
page read and write
22E6CC60000
trusted library allocation
page read and write
A2C000
stack
page read and write
715000
heap
page read and write
22E6B030000
heap
page read and write
2975EE3B000
heap
page read and write
222FC058000
heap
page read and write
A2C000
stack
page read and write
5B8000
heap
page execute and read and write
22E6B068000
heap
page read and write
22E68B10000
heap
page read and write
22E6B040000
heap
page read and write
22E6B06D000
heap
page read and write
22E6B05D000
heap
page read and write
22E6C28C000
heap
page read and write
22E6B063000
heap
page read and write
22E6B010000
trusted library allocation
page read and write
22E6F665000
trusted library allocation
page read and write
22E6B05B000
heap
page read and write
222FD9B0000
trusted library allocation
page read and write
222FC02A000
heap
page read and write
19510B20000
heap
page read and write
1CE5E790000
trusted library allocation
page read and write
22E6B02F000
heap
page read and write
22E6B246000
trusted library allocation
page read and write
29A40000000
heap
page read and write
22E6AEEA000
heap
page read and write
22E6B073000
heap
page read and write
22E6C2A7000
heap
page read and write
22E6F946000
trusted library allocation
page read and write
22E6B1C0000
trusted library allocation
page read and write
22E6C970000
trusted library allocation
page read and write
30000
unkown
page read and write
22E6B05D000
heap
page read and write
22E6B03F000
heap
page read and write
22E6B025000
heap
page read and write
22E6B05B000
heap
page read and write
22E6E959000
trusted library allocation
page read and write
22E6B02E000
heap
page read and write
25D0000
unkown
page readonly
2751A4B0000
heap
page read and write
591000
unkown
page readonly
22E6B6A0000
trusted library allocation
page read and write
2B3E000
stack
page read and write
22E6B05B000
heap
page read and write
29A3FEB0000
heap
page read and write
19510C76000
heap
page read and write
22E6FA65000
heap
page read and write
22E6CC50000
trusted library allocation
page read and write
2E94AAB000
stack
page read and write
22E6D0F1000
heap
page read and write
7FFCA0B92000
trusted library allocation
page read and write
22E6B03A000
heap
page read and write
2F90000
unkown
page readonly
22E6FA13000
heap
page read and write
22E6B05B000
heap
page read and write
2A3E000
stack
page read and write
22E6B068000
heap
page read and write
92E000
stack
page read and write
293E000
stack
page read and write
22E6CC50000
trusted library allocation
page read and write
2F8D000
stack
page read and write
22E6F9ED000
heap
page read and write
22E6AE92000
unkown
page readonly
3B95000
trusted library allocation
page read and write
3844000
trusted library allocation
page read and write
22E6B06B000
heap
page read and write
22E6F681000
trusted library allocation
page read and write
2320000
heap
page read and write
30000
unkown
page read and write
590000
unkown
page read and write
27EC3912000
heap
page read and write
663000
heap
page read and write
22E68A50000
heap
page read and write
22E6B06D000
heap
page read and write
22E6B05D000
heap
page read and write
22FD000
stack
page read and write
22E6B069000
heap
page read and write
22E6C8A0000
trusted library allocation
page read and write
22E6FE40000
trusted library allocation
page read and write
22E6C1D7000
heap
page read and write
22E6B05B000
heap
page read and write
22E6B06D000
heap
page read and write
25D0000
unkown
page readonly
22E6CC50000
trusted library allocation
page read and write
22E6A6F9000
trusted library allocation
page read and write
22E6B036000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B040000
heap
page read and write
25C0000
unkown
page readonly
2C7D000
stack
page read and write
24BF000
stack
page read and write
22E6B068000
heap
page read and write
22E6B02B000
heap
page read and write
22E6B05F000
heap
page read and write
22E6B05E000
heap
page read and write
22E6B05D000
heap
page read and write
22E6C890000
trusted library allocation
page read and write
22E6B068000
heap
page read and write
22E6E550000
trusted library allocation
page read and write
2C7D000
stack
page read and write
22E6B039000
heap
page read and write
2975EF02000
heap
page read and write
22E6B042000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B03B000
heap
page read and write
30000
unkown
page read and write
22E6B040000
heap
page read and write
6DE000
stack
page read and write
1F0000
trusted library allocation
page read and write
2B3E000
stack
page read and write
22E6FA5A000
heap
page read and write
3350000
trusted library allocation
page read and write
22E6B063000
heap
page read and write
22E6B06F000
heap
page read and write
22E6B068000
heap
page read and write
2B3E000
stack
page read and write
22E6B05D000
heap
page read and write
AD122FE000
stack
page read and write
22E6B061000
heap
page read and write
3737000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
1CE5F202000
trusted library allocation
page read and write
7FFCA0C66000
trusted library allocation
page execute and read and write
22E6A700000
trusted library section
page readonly
22E6B03F000
heap
page read and write
22E68BB6000
heap
page read and write
22E6A710000
heap
page read and write
22E6B040000
heap
page read and write
224D000
stack
page read and write
22E6B061000
heap
page read and write
22BD000
stack
page read and write
22E6B040000
heap
page read and write
2C3E000
stack
page read and write
22E6B026000
heap
page read and write
5B8000
heap
page execute and read and write
22E6B05D000
heap
page read and write
22E6B05B000
heap
page read and write
7FFCA0BAD000
trusted library allocation
page execute and read and write
5AA000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B05B000
heap
page read and write
22E6B06A000
heap
page read and write
22E6B03B000
heap
page read and write
22E6B06B000
heap
page read and write
590000
unkown
page read and write
22E6B06A000
heap
page read and write
22E6B3D0000
trusted library allocation
page read and write
22E6B069000
heap
page read and write
22E6B068000
heap
page read and write
710000
heap
page read and write
22E6A650000
trusted library allocation
page read and write
24F0000
heap
page read and write
22E6B040000
heap
page read and write
22FD000
stack
page read and write
5AA000
heap
page read and write
22E6B2B8000
trusted library allocation
page read and write
390E000
trusted library allocation
page read and write
22E6B061000
heap
page read and write
21F3C200000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B05D000
heap
page read and write
90F6FFF000
stack
page read and write
663000
heap
page read and write
22E6B4B0000
trusted library allocation
page read and write
2DCD000
stack
page read and write
22E6D2F0000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
43F000
unkown
page execute and read and write
22E6B040000
heap
page read and write
22E6B06D000
heap
page read and write
3AF9000
trusted library allocation
page read and write
22E6B040000
heap
page read and write
22E6B040000
heap
page read and write
22E6F2B8000
trusted library allocation
page read and write
22E6A700000
trusted library allocation
page read and write
3010000
remote allocation
page read and write
22E6AF66000
heap
page read and write
22E6B040000
heap
page read and write
293E000
stack
page read and write
387B000
trusted library allocation
page read and write
43F000
unkown
page execute and read and write
22E6B062000
heap
page read and write
1CE5E827000
heap
page read and write
22E6B040000
heap
page read and write
22E6B068000
heap
page read and write
AFEBBFF000
stack
page read and write
22E6B036000
heap
page read and write
222FC002000
heap
page read and write
22E6B075000
heap
page read and write
224D000
stack
page read and write
22E6B03A000
heap
page read and write
22E6B05B000
heap
page read and write
22E6D0F1000
heap
page read and write
22E6B07C000
heap
page read and write
22E6B060000
heap
page read and write
22E6B062000
heap
page read and write
22E6B040000
heap
page read and write
43F000
unkown
page execute and read and write
22E6B038000
heap
page read and write
22E6B05B000
heap
page read and write
90F6D7A000
stack
page read and write
2F90000
unkown
page readonly
5AA000
heap
page read and write
22E6B041000
heap
page read and write
22E6B640000
trusted library allocation
page read and write
1951176F000
heap
page read and write
22E6B310000
trusted library allocation
page read and write
246D000
stack
page read and write
22E6B05D000
heap
page read and write
AD1247D000
stack
page read and write
22E6B320000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
242E000
stack
page read and write
22E6B03E000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B400000
trusted library allocation
page read and write
30000
unkown
page read and write
24C0000
remote allocation
page read and write
22E68BAA000
heap
page read and write
1CE5E849000
heap
page read and write
30000
unkown
page read and write
590000
unkown
page read and write
22E6B05D000
heap
page read and write
22E6B069000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B05B000
heap
page read and write
A2C000
stack
page read and write
242E000
stack
page read and write
22E6FA0C000
heap
page read and write
22E6B075000
heap
page read and write
29A407F0000
remote allocation
page read and write
90F697A000
stack
page read and write
22E6FE30000
trusted library allocation
page read and write
27EC306D000
heap
page read and write
22E6B025000
heap
page read and write
22E6B05B000
heap
page read and write
222FC118000
heap
page read and write
22E6B05B000
heap
page read and write
22E6B069000
heap
page read and write
22E6B05D000
heap
page read and write
22E6F51F000
trusted library allocation
page read and write
22E6B068000
heap
page read and write
22E68B82000
heap
page read and write
7C284FD000
stack
page read and write
3943000
trusted library allocation
page read and write
22E6B4D0000
trusted library allocation
page read and write
22E6B061000
heap
page read and write
22E6CC80000
trusted library allocation
page read and write
22E6B067000
heap
page read and write
22E6B075000
heap
page read and write
22E6D161000
heap
page read and write
390F000
trusted library allocation
page read and write
7FFCA0D50000
trusted library allocation
page execute and read and write
8EF000
stack
page read and write
22E6FA8B000
heap
page read and write
22E6B06F000
heap
page read and write
6DE000
stack
page read and write
275F4EC000
stack
page read and write
AFEAF1B000
stack
page read and write
22E6B052000
heap
page read and write
22E6B040000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B460000
trusted library allocation
page read and write
22E6B530000
trusted library allocation
page read and write
22E6B660000
trusted library allocation
page read and write
373E000
trusted library allocation
page read and write
22E6B030000
trusted library allocation
page read and write
22E6F199000
trusted library allocation
page read and write
22E6B068000
heap
page read and write
22E6B05B000
heap
page read and write
22E6C8C0000
trusted library allocation
page read and write
22E6B06F000
heap
page read and write
2751A65A000
heap
page read and write
715000
heap
page read and write
275FC7F000
stack
page read and write
590000
unkown
page read and write
22E6B069000
heap
page read and write
22E6B06B000
heap
page read and write
326A000
heap
page read and write
7C285FD000
stack
page read and write
22E6AF22000
heap
page read and write
22E6C970000
trusted library allocation
page read and write
7FF4A40D0000
trusted library allocation
page execute and read and write
22E6B05D000
heap
page read and write
22E6B520000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
22E6B02A000
heap
page read and write
22E6D07B000
trusted library allocation
page read and write
19511743000
heap
page read and write
3946000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
22E6B03B000
heap
page read and write
53FEAFF000
stack
page read and write
22E6B062000
heap
page read and write
22E6B042000
heap
page read and write
22E6B068000
heap
page read and write
22E6B069000
heap
page read and write
7FFCA0D60000
trusted library allocation
page execute and read and write
22E6B05D000
heap
page read and write
224D000
stack
page read and write
22E6F920000
trusted library allocation
page read and write
21F3C060000
heap
page read and write
22E6B06B000
heap
page read and write
591000
unkown
page readonly
22E6B068000
heap
page read and write
9D000
stack
page read and write
92E000
stack
page read and write
2B3F000
stack
page read and write
29A40020000
heap
page read and write
25BD000
stack
page read and write
22E6B110000
heap
page read and write
3734000
trusted library allocation
page read and write
22E6D155000
heap
page read and write
22E6A6DA000
trusted library allocation
page read and write
27EC30C3000
heap
page read and write
22E6B270000
trusted library allocation
page read and write
22E6B040000
heap
page read and write
22E6B05B000
heap
page read and write
2C3E000
stack
page read and write
22E6A660000
trusted library allocation
page read and write
22E6B069000
heap
page read and write
19510C8C000
heap
page read and write
22E6B05B000
heap
page read and write
22E6B05B000
heap
page read and write
2E1E000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
1CE5E842000
heap
page read and write
22E6B068000
heap
page read and write
2310000
heap
page read and write
22E6B03B000
heap
page read and write
2C1F000
unkown
page read and write
22E6B300000
trusted library allocation
page read and write
22E6C2AB000
heap
page read and write
22E6B036000
heap
page read and write
22E6B04A000
heap
page read and write
22E6CC50000
trusted library allocation
page read and write
22E6B06C000
heap
page read and write
22E6B05D000
heap
page read and write
222FDC00000
trusted library allocation
page read and write
5DE000
heap
page read and write
8EF000
stack
page read and write
A2C000
stack
page read and write
22E6B05B000
heap
page read and write
24BD000
stack
page read and write
22E6B068000
heap
page read and write
22E6F991000
heap
page read and write
22E6B600000
trusted library allocation
page read and write
22E6D15F000
heap
page read and write
3A4E000
trusted library allocation
page read and write
22E6B068000
heap
page read and write
22E6F66C000
trusted library allocation
page read and write
24BD000
stack
page read and write
6DE000
stack
page read and write
22E6F64C000
trusted library allocation
page read and write
2751ADB0000
trusted library allocation
page read and write
22E6B010000
heap
page read and write
22E6B240000
trusted library allocation
page read and write
22E6B068000
heap
page read and write
22E6B06D000
heap
page read and write
8CBDFBC000
stack
page read and write
AD120FE000
stack
page read and write
22E6B026000
heap
page read and write
5B8000
heap
page execute and read and write
22E6EAEA000
trusted library allocation
page read and write
2320000
heap
page read and write
2310000
heap
page read and write
590000
unkown
page read and write
22E6B040000
heap
page read and write
22E6FCAF000
trusted library allocation
page read and write
22E6B068000
heap
page read and write
3732000
trusted library allocation
page read and write
22E6B06F000
heap
page read and write
92E000
stack
page read and write
22E6C8E0000
trusted library allocation
page read and write
22E6B05C000
heap
page read and write
22E6B360000
trusted library allocation
page read and write
92E000
stack
page read and write
22E6A6E5000
trusted library allocation
page read and write
22E6AFF0000
trusted library allocation
page read and write
90F656B000
stack
page read and write
22E6B040000
heap
page read and write
7FFCA0B83000
trusted library allocation
page execute and read and write
22E6B03B000
heap
page read and write
2F90000
unkown
page readonly
22E6B05D000
heap
page read and write
22E6B0E0000
trusted library allocation
page read and write
22E6C910000
trusted library allocation
page read and write
22E6B04A000
heap
page read and write
1F0000
trusted library allocation
page read and write
22E6B026000
heap
page read and write
22E6B05D000
heap
page read and write
43F000
unkown
page execute and read and write
22E6B037000
heap
page read and write
22E6B06C000
heap
page read and write
22E6B05B000
heap
page read and write
2B3F000
stack
page read and write
22E6B05F000
heap
page read and write
22E6B062000
heap
page read and write
22E6C970000
trusted library allocation
page read and write
22E6B05B000
heap
page read and write
28FD000
stack
page read and write
24BF000
stack
page read and write
591000
unkown
page readonly
22E6B070000
trusted library allocation
page read and write
2975EE52000
heap
page read and write
22E6B05B000
heap
page read and write
22E6B02C000
heap
page read and write
2751A613000
heap
page read and write
22E6C8A0000
trusted library allocation
page read and write
222FC102000
heap
page read and write
22E6B05B000
heap
page read and write
22E6B03E000
heap
page read and write
24C0000
heap
page read and write
22E6B02A000
heap
page read and write
92E000
stack
page read and write
22E6B040000
heap
page read and write
22E6F922000
trusted library allocation
page read and write
22E6AF6E000
heap
page read and write
22E6B05B000
heap
page read and write
68C000
heap
page read and write
2A3E000
stack
page read and write
22E6B03E000
heap
page read and write
22FD000
stack
page read and write
7C287FD000
stack
page read and write
A2C000
stack
page read and write
22E6B03B000
heap
page read and write
2751AE02000
trusted library allocation
page read and write
22E6B040000
heap
page read and write
24F0000
heap
page read and write
710000
heap
page read and write
22E6B05B000
heap
page read and write
22E6B03F000
heap
page read and write
2A3E000
stack
page read and write
43F000
unkown
page execute and read and write
22E6B05B000
heap
page read and write
22E6B068000
heap
page read and write
2320000
heap
page read and write
1CE5E876000
heap
page read and write
22E6B027000
heap
page read and write
8EF000
stack
page read and write
22E6B05B000
heap
page read and write
22E6B040000
heap
page read and write
1CE5E85B000
heap
page read and write
1CE5E860000
heap
page read and write
715000
heap
page read and write
22E6B06D000
heap
page read and write
27EC3029000
heap
page read and write
2C7D000
stack
page read and write
22E68D10000
trusted library allocation
page read and write
22E6B05B000
heap
page read and write
2FB0000
unkown
page read and write
195117B0000
heap
page read and write
22E6B068000
heap
page read and write
22E6B2E0000
trusted library allocation
page read and write
ACA26FE000
stack
page read and write
19B000
stack
page read and write
242E000
stack
page read and write
22E6B03E000
heap
page read and write
22E6B02E000
heap
page read and write
22E6B05D000
heap
page read and write
25D0000
unkown
page readonly
3820000
trusted library allocation
page read and write
22E6B06A000
heap
page read and write
22E6CC50000
trusted library allocation
page read and write
7C288FF000
stack
page read and write
22E6C291000
heap
page read and write
8EF000
stack
page read and write
22E6C950000
trusted library allocation
page read and write
22E6B03C000
heap
page read and write
2D90000
remote allocation
page read and write
22E6B05B000
heap
page read and write
22E6AF8D000
heap
page read and write
22E6B250000
trusted library allocation
page read and write
2A3E000
stack
page read and write
22E6B620000
trusted library allocation
page read and write
22E6B06B000
heap
page read and write
22E6B2B0000
trusted library allocation
page read and write
22E6B06B000
heap
page read and write
22E6FAA9000
heap
page read and write
22E6B067000
heap
page read and write
22BD000
stack
page read and write
22E6FBB3000
trusted library allocation
page read and write
22E68D40000
heap
page execute and read and write
22E6F293000
heap
page read and write
22E6C890000
trusted library allocation
page read and write
27EC3900000
heap
page read and write
22E6B062000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B040000
heap
page read and write
22E6F9BA000
heap
page read and write
22E6B068000
heap
page read and write
22E6B05D000
heap
page read and write
22E68D50000
trusted library allocation
page read and write
22E6A6B0000
trusted library allocation
page read and write
2320000
heap
page read and write
22E6E8A3000
trusted library allocation
page read and write
9D000
stack
page read and write
1CE5E875000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B062000
heap
page read and write
22E6B06B000
heap
page read and write
38E2000
trusted library allocation
page read and write
53FEBFE000
stack
page read and write
591000
unkown
page readonly
22E6B05B000
heap
page read and write
24F0000
heap
page read and write
22E6C2C0000
trusted library allocation
page read and write
2975F602000
trusted library allocation
page read and write
19B000
stack
page read and write
22E6B061000
heap
page read and write
2F0D000
stack
page read and write
22E6A6D0000
trusted library allocation
page read and write
22E6D105000
heap
page read and write
22E6B068000
heap
page read and write
22E6B05D000
heap
page read and write
22E6C890000
trusted library allocation
page read and write
3939000
trusted library allocation
page read and write
22E6B130000
heap
page read and write
2B10000
heap
page read and write
90F6BFB000
stack
page read and write
22E6B052000
heap
page read and write
22E6B05D000
heap
page read and write
2ECE000
stack
page read and write
710000
heap
page read and write
22E6B068000
heap
page read and write
2310000
heap
page read and write
5B8000
heap
page execute and read and write
A2C000
stack
page read and write
22E6B05E000
heap
page read and write
22E6B06A000
heap
page read and write
22E6B03B000
heap
page read and write
19510B30000
heap
page read and write
22E6B05D000
heap
page read and write
9D000
stack
page read and write
90F6E7E000
stack
page read and write
22E6B03E000
heap
page read and write
22E6B05B000
heap
page read and write
24F0000
heap
page read and write
22E6F9FA000
heap
page read and write
2310000
heap
page read and write
22E6B068000
heap
page read and write
22E6B062000
heap
page read and write
19510BC0000
trusted library allocation
page read and write
22E6B061000
heap
page read and write
224D000
stack
page read and write
22E6B026000
heap
page read and write
293E000
stack
page read and write
30000
unkown
page read and write
3736000
trusted library allocation
page read and write
22E6B450000
trusted library allocation
page read and write
22E6F637000
trusted library allocation
page read and write
22E6B06D000
heap
page read and write
22E6B036000
heap
page read and write
5A0000
heap
page read and write
2975EE2F000
heap
page read and write
2DCD000
stack
page read and write
22E6FC03000
trusted library allocation
page read and write
22E6B03B000
heap
page read and write
710000
heap
page read and write
19B000
stack
page read and write
246D000
stack
page read and write
22E6C22F000
heap
page read and write
ACA27FF000
stack
page read and write
22E6B040000
heap
page read and write
22E6B05D000
heap
page read and write
24BD000
stack
page read and write
22E6B068000
heap
page read and write
34F2000
heap
page read and write
19510C90000
heap
page read and write
2EF6000
heap
page read and write
22E6B550000
trusted library allocation
page read and write
22E6C979000
trusted library allocation
page read and write
22E6B03F000
heap
page read and write
19511702000
heap
page read and write
715000
heap
page read and write
222FBE50000
heap
page read and write
392E000
trusted library allocation
page read and write
22E6B037000
heap
page read and write
22E6B05D000
heap
page read and write
30000
unkown
page read and write
22E6B068000
heap
page read and write
22E6FA07000
heap
page read and write
22E6B027000
heap
page read and write
2EF0000
heap
page read and write
2310000
heap
page read and write
22E6B04A000
heap
page read and write
1CE5E83E000
heap
page read and write
22E6F645000
trusted library allocation
page read and write
373D000
trusted library allocation
page read and write
22E6B068000
heap
page read and write
22E6B05B000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B370000
trusted library allocation
page read and write
22E6C970000
trusted library allocation
page read and write
373D000
trusted library allocation
page read and write
22E6F988000
heap
page read and write
591000
unkown
page readonly
22E6B03F000
heap
page read and write
22E6B05D000
heap
page read and write
22E6CC89000
trusted library allocation
page read and write
22E6B04A000
heap
page read and write
22E6B062000
heap
page read and write
22E6B063000
heap
page read and write
3A9B000
trusted library allocation
page read and write
22BD000
stack
page read and write
22E6B040000
heap
page read and write
2C3F000
stack
page read and write
22E6B068000
heap
page read and write
22E6B030000
heap
page read and write
19510C91000
heap
page read and write
8EF000
stack
page read and write
19510C65000
heap
page read and write
22E6B040000
heap
page read and write
22E6CC90000
trusted library allocation
page read and write
22E68D73000
heap
page read and write
5DE000
heap
page read and write
22E6B031000
heap
page read and write
5DE000
heap
page read and write
2320000
heap
page read and write
2DF1000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
22E6B040000
heap
page read and write
39BC000
trusted library allocation
page read and write
24C0000
remote allocation
page read and write
22E6F325000
heap
page read and write
591000
unkown
page readonly
22E6B05D000
heap
page read and write
22E6AF98000
heap
page read and write
22E6B073000
heap
page read and write
22E6B069000
heap
page read and write
22E6B05B000
heap
page read and write
43F000
unkown
page execute and read and write
22E6B03F000
heap
page read and write
22E6B06D000
heap
page read and write
22E6F684000
trusted library allocation
page read and write
2320000
heap
page read and write
22E6B03A000
heap
page read and write
222FD9F0000
remote allocation
page read and write
22E6B05D000
heap
page read and write
222FC057000
heap
page read and write
591000
unkown
page readonly
22E6B068000
heap
page read and write
224D000
stack
page read and write
2CEA000
heap
page read and write
22E6B03C000
heap
page read and write
3010000
remote allocation
page read and write
22E6A6D0000
trusted library allocation
page read and write
22E1000D000
trusted library allocation
page read and write
3951000
trusted library allocation
page read and write
246D000
stack
page read and write
22E6B061000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B063000
heap
page read and write
22BD000
stack
page read and write
22E6B05B000
heap
page read and write
22E68CD4000
trusted library allocation
page read and write
22E6B05B000
heap
page read and write
373D000
trusted library allocation
page read and write
22E6B025000
heap
page read and write
246D000
stack
page read and write
22E6B1B0000
trusted library allocation
page read and write
22E6B05B000
heap
page read and write
A2C000
stack
page read and write
1CE5E85D000
heap
page read and write
5A0000
heap
page read and write
2320000
heap
page read and write
22FD000
stack
page read and write
22E6B05B000
heap
page read and write
22E6B5A0000
trusted library allocation
page read and write
22E6B03B000
heap
page read and write
2975EBB0000
heap
page read and write
22E6B06B000
heap
page read and write
22E6A65D000
trusted library allocation
page read and write
22E6B2F0000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
22E6B068000
heap
page read and write
A2C000
stack
page read and write
22E6B03B000
heap
page read and write
22E6B068000
heap
page read and write
22E6A640000
trusted library allocation
page read and write
22FD000
stack
page read and write
22E6B06F000
heap
page read and write
22E6B068000
heap
page read and write
22E6B040000
trusted library allocation
page read and write
22E6B068000
heap
page read and write
22E6B03C000
heap
page read and write
22E6B430000
trusted library allocation
page read and write
6DE000
stack
page read and write
22E6B053000
heap
page read and write
9D000
stack
page read and write
22E68BB0000
heap
page read and write
590000
unkown
page read and write
22E6B040000
heap
page read and write
3946000
trusted library allocation
page read and write
22E68D50000
trusted library allocation
page read and write
22E6B068000
heap
page read and write
29A407F0000
remote allocation
page read and write
22E6B03F000
heap
page read and write
22E6B040000
heap
page read and write
2310000
heap
page read and write
2320000
heap
page read and write
8CBE7FE000
stack
page read and write
1F0000
trusted library allocation
page read and write
7FFCA0BAB000
trusted library allocation
page execute and read and write
7C28BFF000
stack
page read and write
22E6B053000
heap
page read and write
22E6B4C0000
trusted library allocation
page read and write
22E6B332000
trusted library allocation
page read and write
22E6F67A000
trusted library allocation
page read and write
22E6F980000
heap
page read and write
22E6C940000
trusted library allocation
page read and write
8EF000
stack
page read and write
22E6B070000
heap
page read and write
222FC048000
heap
page read and write
19510C3C000
heap
page read and write
22E689B2000
unkown
page readonly
5A0000
heap
page read and write
19B000
stack
page read and write
53FF1FE000
stack
page read and write
92E000
stack
page read and write
22E6B068000
heap
page read and write
22E6A690000
trusted library allocation
page read and write
22E6B0D0000
trusted library allocation
page read and write
19510C13000
heap
page read and write
2975EE02000
heap
page read and write
22E6B02A000
heap
page read and write
22E6AFE0000
trusted library section
page read and write
22E6B03B000
heap
page read and write
22E6CF39000
trusted library allocation
page read and write
22E6FBE2000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
2E20000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B04A000
heap
page read and write
1CE5E859000
heap
page read and write
5AA000
heap
page read and write
1CE5E902000
heap
page read and write
2E9567E000
stack
page read and write
293E000
stack
page read and write
22E6B05B000
heap
page read and write
22E6F997000
heap
page read and write
5AA000
heap
page read and write
2310000
heap
page read and write
2310000
heap
page read and write
22E6B05B000
heap
page read and write
2320000
heap
page read and write
22E6B05D000
heap
page read and write
22E6FA30000
heap
page read and write
22E6AF93000
heap
page read and write
22E6B069000
heap
page read and write
22E68AB5000
heap
page read and write
3827000
trusted library allocation
page read and write
663000
heap
page read and write
1F0000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
22E6B05B000
heap
page read and write
22E6A650000
trusted library allocation
page read and write
22E6C241000
heap
page read and write
22E6B068000
heap
page read and write
246D000
stack
page read and write
2A3E000
stack
page read and write
22E6B042000
heap
page read and write
22E6B420000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
22E6B440000
trusted library allocation
page read and write
1CE5E700000
heap
page read and write
591000
unkown
page readonly
A2C000
stack
page read and write
2B3E000
stack
page read and write
24F0000
heap
page read and write
22E6B05D000
heap
page read and write
22E6AF3C000
heap
page read and write
5DE000
heap
page read and write
3907000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
2751A713000
heap
page read and write
22E6B040000
heap
page read and write
22E6B05D000
heap
page read and write
53FE8FE000
stack
page read and write
22E6B026000
heap
page read and write
591000
unkown
page readonly
22E6B06A000
heap
page read and write
22E6B040000
heap
page read and write
22E6C8B0000
trusted library allocation
page read and write
3733000
trusted library allocation
page read and write
22E6B025000
heap
page read and write
22E6CC70000
trusted library allocation
page read and write
590000
unkown
page read and write
8CBE5FB000
stack
page read and write
22E6B5E0000
trusted library allocation
page read and write
22E6B068000
heap
page read and write
6DE000
stack
page read and write
222FD9F0000
remote allocation
page read and write
22E6B060000
heap
page read and write
7FFCA0C30000
trusted library allocation
page read and write
22E6B05B000
heap
page read and write
2D7E000
stack
page read and write
22E6B06A000
heap
page read and write
5DE000
heap
page read and write
22E6B17D000
trusted library allocation
page read and write
2C7D000
stack
page read and write
246F000
stack
page read and write
22E6B068000
heap
page read and write
22E6B05D000
heap
page read and write
22E6CC80000
trusted library allocation
page read and write
22E6B040000
heap
page read and write
1CE5E862000
heap
page read and write
22E6FC0B000
trusted library allocation
page read and write
3A0F000
trusted library allocation
page read and write
22E6B052000
heap
page read and write
22E68860000
unkown
page readonly
715000
heap
page read and write
22E6B03E000
heap
page read and write
22E6B042000
heap
page read and write
22E6B05F000
heap
page read and write
22E6B03D000
heap
page read and write
1CE5E87B000
heap
page read and write
22E6B068000
heap
page read and write
22E6B069000
heap
page read and write
6DE000
stack
page read and write
22E6B05B000
heap
page read and write
22E0000
remote allocation
page read and write
AFEB67C000
stack
page read and write
22E6B3A0000
trusted library allocation
page read and write
22E6B062000
heap
page read and write
1F0000
trusted library allocation
page read and write
22E6B05B000
heap
page read and write
293E000
stack
page read and write
1F0000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
22E6B050000
trusted library allocation
page read and write
2E9557E000
stack
page read and write
1CE5E845000
heap
page read and write
22E6B05B000
heap
page read and write
3269000
heap
page read and write
22E6C894000
trusted library allocation
page read and write
22E6B03A000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B05D000
heap
page read and write
2B3E000
stack
page read and write
22E6B05D000
heap
page read and write
22E6B060000
heap
page read and write
22E6B031000
heap
page read and write
19511827000
heap
page read and write
24C0000
remote allocation
page read and write
22E6FE31000
trusted library allocation
page read and write
22E6F9A3000
heap
page read and write
22E6B05D000
heap
page read and write
22E6CC80000
trusted library allocation
page read and write
22E68CF0000
trusted library allocation
page read and write
22E6B3B0000
trusted library allocation
page read and write
22E6B040000
heap
page read and write
68C000
heap
page read and write
22E6B03D000
heap
page read and write
24C0000
remote allocation
page read and write
22E6F39C000
trusted library allocation
page read and write
22E6C8B0000
trusted library allocation
page read and write
22E6B068000
heap
page read and write
22E6B068000
heap
page read and write
22E6B040000
heap
page read and write
710000
heap
page read and write
22E6B061000
heap
page read and write
22E6B05B000
heap
page read and write
22E6B03B000
heap
page read and write
22E6B06C000
heap
page read and write
22E68B39000
heap
page read and write
24C0000
heap
page read and write
2B3E000
stack
page read and write
22E68B0C000
heap
page read and write
715000
heap
page read and write
5A0000
heap
page read and write
22E6A6E2000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
22E6AF89000
heap
page read and write
22E6B063000
heap
page read and write
22E6B05D000
heap
page read and write
22E6C8C0000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
663000
heap
page read and write
22E6B05B000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B06D000
heap
page read and write
22E6B05B000
heap
page read and write
22E6B05B000
heap
page read and write
22E6FAA1000
heap
page read and write
242E000
stack
page read and write
22E6B02C000
heap
page read and write
22E6B061000
heap
page read and write
22E6B060000
trusted library allocation
page read and write
68C000
heap
page read and write
22E6A640000
trusted library allocation
page read and write
22E6D2F0000
trusted library allocation
page read and write
22E6B05B000
heap
page read and write
22E6B05B000
heap
page read and write
22E6B040000
heap
page read and write
6DE000
stack
page read and write
22E6B05D000
heap
page read and write
22E6B020000
trusted library allocation
page read and write
7FFCA0B9D000
trusted library allocation
page execute and read and write
242E000
stack
page read and write
22E6B05B000
heap
page read and write
22E6B05B000
heap
page read and write
590000
unkown
page read and write
5A0000
heap
page read and write
22E6B05D000
heap
page read and write
591000
unkown
page readonly
293E000
stack
page read and write
22E6B06A000
heap
page read and write
22E68860000
unkown
page readonly
2FB0000
unkown
page read and write
22E6B130000
trusted library allocation
page read and write
22E68A70000
heap
page read and write
2975EBC0000
heap
page read and write
22E6B068000
heap
page read and write
6DE000
stack
page read and write
22E6C970000
trusted library allocation
page read and write
24BF000
stack
page read and write
663000
heap
page read and write
22E6B040000
heap
page read and write
2975EE13000
heap
page read and write
22E6D16A000
heap
page read and write
22E6B068000
heap
page read and write
22E6B040000
heap
page read and write
3269000
heap
page read and write
22E6B05B000
heap
page read and write
22E68D50000
trusted library allocation
page read and write
22E6EF20000
trusted library allocation
page read and write
22E6AEE1000
heap
page read and write
19B000
stack
page read and write
22BD000
stack
page read and write
22E6C27F000
heap
page read and write
22E6B05B000
heap
page read and write
22E6B062000
heap
page read and write
22E6B068000
heap
page read and write
1CE5E885000
heap
page read and write
385E000
trusted library allocation
page read and write
22E6B05B000
heap
page read and write
22E6B2C0000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
22E6B05B000
heap
page read and write
591000
unkown
page readonly
22E6B06D000
heap
page read and write
22E6B06B000
heap
page read and write
22E6F63A000
trusted library allocation
page read and write
22E6B06C000
heap
page read and write
22BD000
stack
page read and write
22E6B03F000
heap
page read and write
5B8000
heap
page execute and read and write
22E6B05D000
heap
page read and write
22E6B068000
heap
page read and write
22E6AF46000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B03F000
heap
page read and write
22E6B05B000
heap
page read and write
A2C000
stack
page read and write
22E6AF7D000
heap
page read and write
591000
unkown
page readonly
22E6B140000
trusted library allocation
page read and write
663000
heap
page read and write
22E6B053000
heap
page read and write
22E6B04A000
heap
page read and write
2310000
heap
page read and write
22E6B470000
trusted library allocation
page read and write
40D000
unkown
page execute read
22E6B063000
heap
page read and write
22E68AB0000
heap
page read and write
92E000
stack
page read and write
22E6B05B000
heap
page read and write
21F3C256000
heap
page read and write
222FC089000
heap
page read and write
27EC3102000
heap
page read and write
22E6B068000
heap
page read and write
19B000
stack
page read and write
22E6B05B000
heap
page read and write
22E6B220000
trusted library allocation
page read and write
5AA000
heap
page read and write
22E6CC80000
trusted library allocation
page read and write
22E6B063000
heap
page read and write
22E6B05D000
heap
page read and write
22E68CE0000
trusted library allocation
page read and write
22E68BAC000
heap
page read and write
195117BE000
heap
page read and write
22E6B05B000
heap
page read and write
21F3C302000
heap
page read and write
22E6B05D000
heap
page read and write
710000
heap
page read and write
22E6AFF4000
trusted library allocation
page read and write
21F3C240000
heap
page read and write
24BF000
stack
page read and write
22E6B410000
trusted library allocation
page read and write
22E00418000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
22E6B072000
heap
page read and write
22E6B010000
trusted library allocation
page read and write
3730000
trusted library allocation
page read and write
22E6B025000
heap
page read and write
3737000
trusted library allocation
page read and write
2C7D000
stack
page read and write
22E6B027000
heap
page read and write
53FE9FD000
stack
page read and write
24C0000
heap
page read and write
34F6000
heap
page read and write
2975EC10000
heap
page read and write
22E6C920000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
3DA7000
trusted library allocation
page read and write
22E6B000000
trusted library allocation
page read and write
22E6A670000
trusted library allocation
page read and write
2D7E000
stack
page read and write
27EC2E20000
heap
page read and write
AFEB7FB000
stack
page read and write
1CE5E83C000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B02E000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B040000
heap
page read and write
22E6B068000
heap
page read and write
22E6F9D4000
heap
page read and write
22E6B05D000
heap
page read and write
22E68AC0000
trusted library allocation
page read and write
22E6CC50000
trusted library allocation
page read and write
22E6B03D000
heap
page read and write
224D000
stack
page read and write
22E6B068000
heap
page read and write
21F3C070000
heap
page read and write
7FFCA0B84000
trusted library allocation
page read and write
710000
heap
page read and write
1CE5E86E000
heap
page read and write
22E6B030000
heap
page read and write
22E6AEEC000
heap
page read and write
22E6B05D000
heap
page read and write
22E6F677000
trusted library allocation
page read and write
22E6CC50000
trusted library allocation
page read and write
22E6B05C000
heap
page read and write
22E6B040000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B069000
heap
page read and write
22E6FE30000
trusted library allocation
page read and write
22E6B068000
heap
page read and write
21F3CA02000
trusted library allocation
page read and write
21F3C300000
heap
page read and write
22E6B040000
heap
page read and write
2751A702000
heap
page read and write
2E94EFE000
stack
page read and write
388F000
trusted library allocation
page read and write
22E6B05B000
heap
page read and write
22E6B480000
trusted library allocation
page read and write
53FF2FF000
stack
page read and write
22E6B052000
heap
page read and write
19510DB9000
heap
page read and write
22E6B061000
heap
page read and write
22E6FA88000
heap
page read and write
22E6B02D000
heap
page read and write
2FB0000
unkown
page read and write
22E6B068000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B06B000
heap
page read and write
22E6A660000
trusted library allocation
page read and write
22E6C211000
heap
page read and write
22E6B063000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B042000
heap
page read and write
22E6B068000
heap
page read and write
43F000
unkown
page execute and read and write
22E6B040000
heap
page read and write
22E6AF86000
heap
page read and write
22E6B041000
heap
page read and write
1CE5E829000
heap
page read and write
22E6B068000
heap
page read and write
22E6B036000
heap
page read and write
2E9507F000
stack
page read and write
38AE000
trusted library allocation
page read and write
373E000
trusted library allocation
page read and write
22E6B027000
heap
page read and write
1F0000
trusted library allocation
page read and write
92E000
stack
page read and write
293E000
stack
page read and write
22E6B068000
heap
page read and write
22E6B03B000
heap
page read and write
22E6B040000
heap
page read and write
2C3E000
stack
page read and write
22E6B036000
heap
page read and write
22E6B032000
heap
page read and write
22E6F5F3000
trusted library allocation
page read and write
22E6B038000
heap
page read and write
22E6B05D000
heap
page read and write
AD1237E000
stack
page read and write
22E6B068000
heap
page read and write
2B3E000
stack
page read and write
22E6B2D0000
trusted library allocation
page read and write
92E000
stack
page read and write
22E6B03B000
heap
page read and write
3D78000
trusted library allocation
page read and write
22E6CC50000
trusted library allocation
page read and write
22E6B05B000
heap
page read and write
22E6C960000
trusted library allocation
page read and write
24BD000
stack
page read and write
22E6B05D000
heap
page read and write
24C0000
remote allocation
page read and write
22E6B1E0000
trusted library allocation
page read and write
22E6B068000
heap
page read and write
29A3FF20000
heap
page read and write
22E6B040000
heap
page read and write
22E6AF36000
heap
page read and write
3981000
trusted library allocation
page read and write
22E68BBD000
heap
page read and write
22E6B063000
heap
page read and write
242E000
stack
page read and write
19510BE0000
trusted library allocation
page read and write
22E6B040000
heap
page read and write
22E6B03E000
heap
page read and write
275F97E000
stack
page read and write
22E6F9A0000
heap
page read and write
22E6B027000
heap
page read and write
2D7E000
stack
page read and write
22E6B069000
heap
page read and write
22E6B05B000
heap
page read and write
224D000
stack
page read and write
22E6B062000
heap
page read and write
22E6B068000
heap
page read and write
22E6B3F0000
trusted library allocation
page read and write
242E000
stack
page read and write
5B8000
heap
page execute and read and write
7FFCA0B8D000
trusted library allocation
page execute and read and write
22E6B064000
heap
page read and write
22E6B03E000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B06B000
heap
page read and write
5A0000
heap
page read and write
22E6B030000
heap
page read and write
22E6F9E8000
heap
page read and write
AD1207F000
stack
page read and write
222FC113000
heap
page read and write
8EF000
stack
page read and write
22E6B037000
heap
page read and write
22E6B040000
heap
page read and write
22E6B040000
heap
page read and write
22E6B068000
heap
page read and write
275FA7E000
stack
page read and write
22E6B040000
heap
page read and write
22E6B05D000
heap
page read and write
29A40029000
heap
page read and write
22E6CC82000
trusted library allocation
page read and write
22E6B000000
trusted library allocation
page read and write
7FFCA0BDC000
trusted library allocation
page execute and read and write
AFEBAFF000
stack
page read and write
22E6B05D000
heap
page read and write
591000
unkown
page readonly
43F000
unkown
page execute and read and write
2C3E000
stack
page read and write
22E6B042000
heap
page read and write
22E6D153000
heap
page read and write
22E6B05D000
heap
page read and write
3732000
trusted library allocation
page read and write
22E6B05B000
heap
page read and write
22E6B05B000
heap
page read and write
30D0000
heap
page read and write
22FD000
stack
page read and write
5A0000
heap
page read and write
663000
heap
page read and write
22E6B5F0000
trusted library allocation
page read and write
1F0000
trusted library allocation
page read and write
22E6A6A0000
trusted library allocation
page read and write
2E9527F000
stack
page read and write
29A407C0000
trusted library allocation
page read and write
22E6F194000
heap
page read and write
22E6B037000
heap
page read and write
30000
unkown
page read and write
22E6B068000
heap
page read and write
22E6B04A000
heap
page read and write
22E6F662000
trusted library allocation
page read and write
22E6B05B000
heap
page read and write
22E6B069000
heap
page read and write
22E6B03B000
heap
page read and write
7FFCA0D30000
trusted library allocation
page read and write
22E6B020000
trusted library allocation
page read and write
22E6AF02000
heap
page read and write
22E6B05B000
heap
page read and write
27EC3013000
heap
page read and write
5B8000
heap
page execute and read and write
7FFCA0C3C000
trusted library allocation
page execute and read and write
5AA000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B052000
heap
page read and write
22E6B05B000
heap
page read and write
30000
unkown
page read and write
27EC2E30000
heap
page read and write
22E6B080000
trusted library allocation
page read and write
590000
unkown
page read and write
22E6B03F000
heap
page read and write
22E6C8B0000
trusted library allocation
page read and write
22E6B07A000
heap
page read and write
22E6B650000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
22E6B075000
heap
page read and write
224D000
stack
page read and write
22E6B069000
heap
page read and write
5AA000
heap
page read and write
22E6B068000
heap
page read and write
710000
heap
page read and write
22E68D85000
heap
page read and write
53FEDFC000
stack
page read and write
22E6C25C000
heap
page read and write
590000
unkown
page read and write
22E6B039000
heap
page read and write
293E000
stack
page read and write
22E6B05B000
heap
page read and write
22E6B040000
heap
page read and write
27EC303E000
heap
page read and write
2D7E000
stack
page read and write
2F0D000
stack
page read and write
21F3C1D0000
trusted library allocation
page read and write
2751A675000
heap
page read and write
22E6B03E000
heap
page read and write
22E6B080000
trusted library allocation
page read and write
27EC2E90000
heap
page read and write
2ED0000
remote allocation
page read and write
22E6B040000
heap
page read and write
22E6B05C000
heap
page read and write
22E6B037000
heap
page read and write
663000
heap
page read and write
22E6B05B000
heap
page read and write
224D000
stack
page read and write
22E6B05D000
heap
page read and write
22E6B03F000
heap
page read and write
30000
unkown
page read and write
22E6B05D000
heap
page read and write
22E6CE10000
trusted library allocation
page read and write
22E6C892000
trusted library allocation
page read and write
22E6B03B000
heap
page read and write
22E68A30000
heap
page read and write
19511830000
heap
page read and write
3258000
heap
page read and write
22E6B027000
heap
page read and write
3735000
trusted library allocation
page read and write
3938000
trusted library allocation
page read and write
22E6B04A000
heap
page read and write
246D000
stack
page read and write
2A3E000
stack
page read and write
5A0000
heap
page read and write
22E6B06A000
heap
page read and write
22E6B068000
heap
page read and write
2FA0000
unkown
page readonly
22E6D0F0000
heap
page read and write
22E6B06A000
heap
page read and write
22E6FA86000
heap
page read and write
19B000
stack
page read and write
2D7E000
stack
page read and write
22E6AF52000
heap
page read and write
22E6B062000
heap
page read and write
22E6B064000
heap
page read and write
9D000
stack
page read and write
22E6B06B000
heap
page read and write
7FFCA0C36000
trusted library allocation
page read and write
22E6B05B000
heap
page read and write
2975EE3E000
heap
page read and write
30000
unkown
page read and write
22E6B062000
heap
page read and write
24BD000
stack
page read and write
222FC047000
heap
page read and write
25E0000
unkown
page read and write
22E6B068000
heap
page read and write
22E6B067000
trusted library allocation
page read and write
43F000
unkown
page execute and read and write
22E6B061000
heap
page read and write
22FD000
stack
page read and write
22E6B042000
heap
page read and write
3B47000
trusted library allocation
page read and write
22E6B040000
heap
page read and write
22E6B068000
heap
page read and write
5B8000
heap
page execute and read and write
22E6B03E000
heap
page read and write
19510D13000
heap
page read and write
22E6B040000
heap
page read and write
22E6C238000
heap
page read and write
5DE000
heap
page read and write
22E68ADD000
heap
page read and write
22E6B068000
heap
page read and write
22E6B068000
heap
page read and write
22E6F6C1000
trusted library allocation
page read and write
22E6B590000
trusted library allocation
page read and write
22E6B060000
heap
page read and write
22E6B037000
heap
page read and write
22E6B610000
trusted library allocation
page read and write
22E6F995000
heap
page read and write
29A40054000
heap
page read and write
22E6B03F000
heap
page read and write
22E6F985000
heap
page read and write
22E6C930000
trusted library allocation
page read and write
22E6B068000
heap
page read and write
22E6B037000
heap
page read and write
22E6B068000
heap
page read and write
22E6CC90000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
30000
unkown
page read and write
43F000
unkown
page execute and read and write
1CE5E87E000
heap
page read and write
2DCD000
stack
page read and write
25C0000
unkown
page readonly
22E6C900000
trusted library allocation
page read and write
22E6CC92000
trusted library allocation
page read and write
22E6B063000
heap
page read and write
22E6CC51000
trusted library allocation
page read and write
22E6B062000
heap
page read and write
293E000
stack
page read and write
22E68D70000
heap
page read and write
22E6F673000
trusted library allocation
page read and write
22E6B026000
heap
page read and write
2D90000
remote allocation
page read and write
22BD000
stack
page read and write
22E68BAE000
heap
page read and write
22E6B03B000
heap
page read and write
3B2B000
trusted library allocation
page read and write
1CE5E846000
heap
page read and write
242E000
stack
page read and write
410000
unkown
page write copy
22E6B063000
heap
page read and write
5DE000
heap
page read and write
22E6B040000
heap
page read and write
242E000
stack
page read and write
22E6B05B000
heap
page read and write
22E6F669000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
710000
heap
page read and write
22E6B068000
heap
page read and write
22E68BA7000
heap
page read and write
3739000
trusted library allocation
page read and write
2975ED10000
trusted library allocation
page read and write
2320000
heap
page read and write
29A40102000
heap
page read and write
22E6B03C000
heap
page read and write
22E6B03C000
heap
page read and write
22E6B068000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B05D000
heap
page read and write
590000
unkown
page read and write
22E6B05B000
heap
page read and write
29A3FEC0000
heap
page read and write
22E6FE60000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
22E6B200000
trusted library allocation
page read and write
22E6AFE0000
trusted library allocation
page read and write
22E6CC90000
trusted library allocation
page read and write
2751A63D000
heap
page read and write
275F5EE000
stack
page read and write
22E6FA2D000
heap
page read and write
22E68D50000
trusted library allocation
page read and write
22E6C8F0000
trusted library allocation
page read and write
3735000
trusted library allocation
page read and write
22E6B510000
trusted library allocation
page read and write
8EF000
stack
page read and write
3B72000
trusted library allocation
page read and write
22E6B068000
heap
page read and write
22E6B040000
heap
page read and write
22E6B05D000
heap
page read and write
2751A629000
heap
page read and write
22BD000
stack
page read and write
AFEB77D000
stack
page read and write
22E6FAAB000
heap
page read and write
22E6C8C0000
trusted library allocation
page read and write
22BD000
stack
page read and write
22E6B06D000
heap
page read and write
A2C000
stack
page read and write
22E6B030000
heap
page read and write
22E6B290000
trusted library allocation
page read and write
19B000
stack
page read and write
22E6F9F4000
heap
page read and write
22E6B03C000
heap
page read and write
22E6B063000
heap
page read and write
22E6B040000
heap
page read and write
22E6B069000
heap
page read and write
710000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B068000
heap
page read and write
24F0000
heap
page read and write
5B8000
heap
page execute and read and write
293E000
stack
page read and write
22E6B026000
heap
page read and write
22E6C8A0000
trusted library allocation
page read and write
22E68D20000
trusted library allocation
page read and write
5A0000
heap
page read and write
22E6B040000
heap
page read and write
22E6CC80000
trusted library allocation
page read and write
2C3F000
stack
page read and write
19511794000
heap
page read and write
22E6B068000
heap
page read and write
38E8000
trusted library allocation
page read and write
37F1000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
22E6B040000
heap
page read and write
22E6B05B000
heap
page read and write
1CE5E878000
heap
page read and write
22E6AECE000
unkown
page readonly
22E6B027000
heap
page read and write
22E6B05D000
heap
page read and write
22E10001000
trusted library allocation
page read and write
27EC3802000
heap
page read and write
22E6B069000
heap
page read and write
22E6B06D000
heap
page read and write
22E6B06B000
heap
page read and write
8EF000
stack
page read and write
24F0000
heap
page read and write
22E6B027000
heap
page read and write
22E6C8E0000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
6DE000
stack
page read and write
22E6B075000
heap
page read and write
22E6B05D000
heap
page read and write
38B5000
trusted library allocation
page read and write
22FD000
stack
page read and write
22E6B060000
trusted library allocation
page read and write
22E6B3E0000
trusted library allocation
page read and write
22E6B062000
heap
page read and write
5AA000
heap
page read and write
1CE5E843000
heap
page read and write
3D6A000
trusted library allocation
page read and write
1F0000
trusted library allocation
page read and write
24F0000
heap
page read and write
22E6B025000
heap
page read and write
22E6B05B000
heap
page read and write
22E6B037000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B036000
heap
page read and write
22E6B6B0000
trusted library allocation
page read and write
22E6B061000
heap
page read and write
22E6B05B000
heap
page read and write
9D000
stack
page read and write
22E6B05B000
heap
page read and write
22E6B075000
heap
page read and write
22E68BBE000
heap
page read and write
22E6B03F000
heap
page read and write
5DE000
heap
page read and write
22E6C2E2000
trusted library allocation
page read and write
22E6B073000
heap
page read and write
53FEFFE000
stack
page read and write
22E6D133000
heap
page read and write
22E6B068000
heap
page read and write
9D000
stack
page read and write
37DB000
trusted library allocation
page read and write
22E6B068000
heap
page read and write
8CBE6FB000
stack
page read and write
22E6A6C0000
trusted library allocation
page read and write
22E6B03E000
heap
page read and write
1CE5E86B000
heap
page read and write
22E6B06F000
heap
page read and write
19510C55000
heap
page read and write
8EF000
stack
page read and write
22E6B05D000
heap
page read and write
22E6B05B000
heap
page read and write
22E6B05D000
heap
page read and write
34F6000
heap
page read and write
22E6B052000
heap
page read and write
9D000
stack
page read and write
2310000
heap
page read and write
22E6B070000
heap
page read and write
24C0000
remote allocation
page read and write
22E6B068000
heap
page read and write
22E6B036000
heap
page read and write
22E6B02A000
heap
page read and write
8EF000
stack
page read and write
22E6A640000
trusted library allocation
page read and write
22E0043C000
trusted library allocation
page read and write
2E9537C000
stack
page read and write
3361000
trusted library allocation
page read and write
22BD000
stack
page read and write
1CE5E847000
heap
page read and write
22E6A670000
trusted library allocation
page read and write
22E6B040000
heap
page read and write
22E6B05B000
heap
page read and write
1F0000
trusted library allocation
page read and write
25E0000
unkown
page read and write
22E6B06A000
heap
page read and write
222FBE60000
heap
page read and write
22E6B040000
heap
page read and write
300E000
stack
page read and write
22E6B05D000
heap
page read and write
22E6F930000
trusted library allocation
page read and write
22E68BB0000
heap
page read and write
6DE000
stack
page read and write
22E6B026000
heap
page read and write
22E6B037000
heap
page read and write
22E6B580000
trusted library allocation
page read and write
22E6F9E2000
heap
page read and write
2EF2000
heap
page read and write
22E6B063000
heap
page read and write
321F000
unkown
page read and write
246F000
stack
page read and write
22E6F625000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
22E6F63E000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
22E6C24A000
heap
page read and write
A2C000
stack
page read and write
5DE000
heap
page read and write
2ED0000
remote allocation
page read and write
22E6B05B000
heap
page read and write
22E6B05B000
heap
page read and write
591000
unkown
page readonly
2C3E000
stack
page read and write
2751A4A0000
heap
page read and write
22E6B03B000
heap
page read and write
22E68D80000
heap
page read and write
22E6F67E000
trusted library allocation
page read and write
311E000
unkown
page read and write
22E6B05B000
heap
page read and write
22E6B4E0000
trusted library allocation
page read and write
22E6B03C000
heap
page read and write
7C27F8C000
stack
page read and write
92E000
stack
page read and write
222FBEC0000
heap
page read and write
1F0000
trusted library allocation
page read and write
22E6B05B000
heap
page read and write
1CE5E841000
heap
page read and write
7FFCA0BA4000
trusted library allocation
page read and write
24BD000
stack
page read and write
9D000
stack
page read and write
92E000
stack
page read and write
AFEB5FE000
stack
page read and write
22E6B380000
trusted library allocation
page read and write
22E6AFE0000
trusted library allocation
page read and write
22E6B05B000
heap
page read and write
22E6C900000
trusted library allocation
page read and write
19511722000
heap
page read and write
29A40013000
heap
page read and write
22E6B062000
heap
page read and write
22E6E7E6000
trusted library allocation
page read and write
22E6B05B000
heap
page read and write
2320000
heap
page read and write
22E6C2B0000
heap
page read and write
22E6B071000
heap
page read and write
2320000
heap
page read and write
2B3E000
stack
page read and write
7FFCA0CB0000
trusted library allocation
page execute and read and write
22E6B680000
trusted library allocation
page read and write
22E6CC80000
trusted library allocation
page read and write
2320000
heap
page read and write
24C0000
heap
page read and write
22E6C1ED000
heap
page read and write
22E6B040000
heap
page read and write
22E6B05D000
heap
page read and write
21F3C0D0000
heap
page read and write
22E6CC80000
trusted library allocation
page read and write
22E6B025000
heap
page read and write
22E6CC80000
trusted library allocation
page read and write
22E6B05B000
heap
page read and write
22E6B0B0000
trusted library allocation
page read and write
2C3E000
stack
page read and write
293E000
stack
page read and write
22E6B05D000
heap
page read and write
5AA000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B037000
heap
page read and write
22E6B390000
trusted library allocation
page read and write
22E6B070000
heap
page read and write
242E000
stack
page read and write
22E6B043000
heap
page read and write
2A30000
trusted library allocation
page read and write
22E6C977000
trusted library allocation
page read and write
663000
heap
page read and write
3895000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
22E6FA9C000
heap
page read and write
22E6B0F0000
trusted library allocation
page read and write
22E6B063000
heap
page read and write
22E6B03B000
heap
page read and write
22E6B041000
heap
page read and write
22E6B063000
heap
page read and write
3D99000
trusted library allocation
page read and write
22E6C8D0000
trusted library allocation
page read and write
22E6B052000
heap
page read and write
22E6B036000
heap
page read and write
300E000
stack
page read and write
22E6B068000
heap
page read and write
22E6B063000
heap
page read and write
AD121FE000
stack
page read and write
22E6AEED000
heap
page read and write
389A000
trusted library allocation
page read and write
22E68D50000
trusted library allocation
page read and write
246D000
stack
page read and write
22E6B068000
heap
page read and write
22E6B210000
trusted library allocation
page read and write
22E6B069000
heap
page read and write
3732000
trusted library allocation
page read and write
19B000
stack
page read and write
22E6B02E000
heap
page read and write
22E6B068000
heap
page read and write
1CE5E813000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B1D0000
trusted library allocation
page read and write
22E6B5D0000
trusted library allocation
page read and write
22E6B03A000
heap
page read and write
663000
heap
page read and write
22E6B030000
heap
page read and write
22E6B040000
heap
page read and write
22E6B068000
heap
page read and write
A2C000
stack
page read and write
92E000
stack
page read and write
22E6B07C000
heap
page read and write
22E6B068000
heap
page read and write
22E6CC50000
trusted library allocation
page read and write
22E6ED13000
trusted library allocation
page read and write
43F000
unkown
page execute and read and write
22E6B061000
heap
page read and write
22E6B068000
heap
page read and write
293E000
stack
page read and write
22E6B061000
heap
page read and write
22E6CC80000
trusted library allocation
page read and write
22E6B068000
heap
page read and write
AFEB4FE000
stack
page read and write
22E6B070000
trusted library allocation
page read and write
22E6B026000
heap
page read and write
22E6B4A0000
trusted library allocation
page read and write
9D000
stack
page read and write
3250000
heap
page read and write
22E6B03F000
heap
page read and write
2A3E000
stack
page read and write
29A40040000
heap
page read and write
22E6F657000
trusted library allocation
page read and write
1CE5E869000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B05B000
heap
page read and write
1CE5E87C000
heap
page read and write
43F000
unkown
page execute and read and write
9D000
stack
page read and write
22E6B069000
heap
page read and write
22E0000
remote allocation
page read and write
22E6B063000
heap
page read and write
9D000
stack
page read and write
22E6F190000
heap
page read and write
275FB7E000
stack
page read and write
22E6B062000
heap
page read and write
53FEEFE000
stack
page read and write
22E6B05B000
heap
page read and write
19511802000
heap
page read and write
22E6B040000
heap
page read and write
22E6A6E0000
trusted library allocation
page read and write
22E6FA03000
heap
page read and write
22E6B034000
heap
page read and write
22E6AFA3000
heap
page read and write
22E6B030000
heap
page read and write
22E6B05B000
heap
page read and write
22E6CC80000
trusted library allocation
page read and write
7FFCA0C40000
trusted library allocation
page execute and read and write
22E6B068000
heap
page read and write
92E000
stack
page read and write
22E6CC50000
trusted library allocation
page read and write
22E6B068000
heap
page read and write
22E6B068000
heap
page read and write
5DE000
heap
page read and write
53FE395000
stack
page read and write
22E6CC80000
trusted library allocation
page read and write
22E6B03C000
heap
page read and write
22E6B490000
trusted library allocation
page read and write
22E6B061000
heap
page read and write
22E6B035000
trusted library allocation
page read and write
22E6CC82000
trusted library allocation
page read and write
2ECE000
stack
page read and write
22E6F9AD000
heap
page read and write
2DF1000
trusted library allocation
page read and write
22E6CC80000
trusted library allocation
page read and write
22E6B05B000
heap
page read and write
22FD000
stack
page read and write
22E6FA76000
heap
page read and write
222FDA02000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
22E6D2F0000
trusted library allocation
page read and write
222FBFC0000
trusted library allocation
page read and write
A2C000
stack
page read and write
22E6B190000
trusted library allocation
page read and write
22E68CB0000
trusted library allocation
page read and write
22E6B0A0000
trusted library allocation
page read and write
22E6B340000
trusted library allocation
page read and write
22E6A650000
trusted library allocation
page read and write
AFEB37C000
stack
page read and write
22E68D50000
trusted library allocation
page read and write
22E6B068000
heap
page read and write
22E6B068000
heap
page read and write
22E6B05B000
heap
page read and write
22E6CC51000
trusted library allocation
page read and write
22E6B03C000
heap
page read and write
22E6B040000
heap
page read and write
2A3E000
stack
page read and write
21F3C279000
heap
page read and write
22E6D137000
heap
page read and write
27EC30CB000
heap
page read and write
22E6B0C0000
trusted library allocation
page read and write
22E6B040000
heap
page read and write
22E6CC53000
trusted library allocation
page read and write
22E6C26B000
heap
page read and write
22FD000
stack
page read and write
24F0000
trusted library allocation
page read and write
22E6C9B0000
trusted library allocation
page read and write
5B8000
heap
page execute and read and write
22E6B06B000
heap
page read and write
22E6B068000
heap
page read and write
22E6F61A000
trusted library allocation
page read and write
3736000
trusted library allocation
page read and write
22E6A680000
heap
page read and write
5A0000
heap
page read and write
5B8000
heap
page execute and read and write
2550000
heap
page read and write
22E6C890000
trusted library allocation
page read and write
5DE000
heap
page read and write
22E6F650000
trusted library allocation
page read and write
22E6B05D000
heap
page read and write
22E6FA5C000
heap
page read and write
29A40802000
trusted library allocation
page read and write
22E6B05B000
heap
page read and write
68C000
heap
page read and write
AD11BEB000
stack
page read and write
2975EE00000
heap
page read and write
2310000
heap
page read and write
21F3C202000
heap
page read and write
22E6B039000
heap
page read and write
22E6B05B000
heap
page read and write
19510C29000
heap
page read and write
1CE5E863000
heap
page read and write
22E6B037000
heap
page read and write
22E6B036000
heap
page read and write
22E6B040000
heap
page read and write
22E6B05B000
heap
page read and write
5B8000
heap
page execute and read and write
22E6A640000
trusted library allocation
page read and write
22E6B026000
heap
page read and write
22E6B068000
heap
page read and write
22E6B05B000
heap
page read and write
2E8D000
stack
page read and write
1F0000
trusted library allocation
page read and write
24C0000
heap
page read and write
22E6B05D000
heap
page read and write
22E6B06D000
heap
page read and write
24F0000
heap
page read and write
224D000
stack
page read and write
2975EE29000
heap
page read and write
19B000
stack
page read and write
22E6B05D000
heap
page read and write
222FC048000
heap
page read and write
22E6B05D000
heap
page read and write
591000
unkown
page readonly
22E6B05B000
heap
page read and write
7FFCA0CA2000
trusted library allocation
page read and write
22E6D2F0000
trusted library allocation
page read and write
22E6B036000
heap
page read and write
22E6B05B000
heap
page read and write
22E6FE40000
trusted library allocation
page read and write
22E6B050000
trusted library allocation
page read and write
1CE5E866000
heap
page read and write
22E6B068000
heap
page read and write
22E6B038000
heap
page read and write
22E6B540000
trusted library allocation
page read and write
22E6B350000
trusted library allocation
page read and write
3B64000
trusted library allocation
page read and write
2B3E000
stack
page read and write
22E6CC80000
trusted library allocation
page read and write
22FD000
stack
page read and write
22E6B068000
heap
page read and write
22E6D2F0000
trusted library allocation
page read and write
2A3E000
stack
page read and write
22E6C8E0000
trusted library allocation
page read and write
22E6B180000
trusted library allocation
page read and write
3939000
trusted library allocation
page read and write
22E6B100000
trusted library allocation
page read and write
22E6A690000
trusted library allocation
page read and write
22E6F628000
trusted library allocation
page read and write
590000
unkown
page read and write
22E6B068000
heap
page read and write
2DE0000
trusted library allocation
page read and write
5DE000
heap
page read and write
There are 2367 hidden memdumps, click here to show them.