IOC Report
y1X5s1Oz0Q.exe

loading gif

Files

File Path
Type
Category
Malicious
y1X5s1Oz0Q.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local:26-03-2024
HTML document, ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Ujqqnhnbwgz.vbs
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Ujqqnhnbwgz.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Ujqqnhnbwgz.exe_c4d75fa89ebf83f3de8957e7062eda2926d9984_de14591a_465e2937-b166-4332-bf7f-80c602615e79\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB4F6.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Mar 26 14:24:38 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB545.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB594.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Ujqqnhnbwgz.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\y1X5s1Oz0Q.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Ujqqnhnbwgz.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\y1X5s1Oz0Q.exe
"C:\Users\user\Desktop\y1X5s1Oz0Q.exe"
malicious
C:\Users\user\Desktop\y1X5s1Oz0Q.exe
"C:\Users\user\Desktop\y1X5s1Oz0Q.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Ujqqnhnbwgz.vbs"
malicious
C:\Users\user\AppData\Roaming\Ujqqnhnbwgz.exe
"C:\Users\user\AppData\Roaming\Ujqqnhnbwgz.exe"
malicious
C:\Users\user\AppData\Roaming\Ujqqnhnbwgz.exe
"C:\Users\user\AppData\Roaming\Ujqqnhnbwgz.exe"
malicious
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 200

URLs

Name
IP
Malicious
https://github.com/mgravell/protobuf-net
unknown
https://cdn.discordapp.com/attachments/1217028370865455188/1222062384437526538/Fdliipctaw.mp3?ex=661
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://cdn.discordapp.com
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
https://curl.haxx.se/docs/http-cookies.html
unknown
https://cdn.discordapp.com/attachments/1217028370865455188/1222062384437526538/Fdliipctaw.mp3?ex=6614d949&is=66026449&hm=76c14076f197408a74d02bd5e16b3cfd0651a02372cd195e0f28026e0e131609&
162.159.133.233
There are 1 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cdn.discordapp.com
162.159.133.233

IPs

IP
Domain
Country
Malicious
103.153.182.247
unknown
unknown
malicious
162.159.133.233
cdn.discordapp.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\y1X5s1Oz0Q_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum
Version
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Install name
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ujqqnhnbwgz_RASMANCS
FileDirectory
There are 39 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2CFA000
trusted library allocation
page read and write
malicious
4422000
trusted library allocation
page read and write
malicious
2E42000
trusted library allocation
page read and write
malicious
3261000
trusted library allocation
page read and write
malicious
2E87000
trusted library allocation
page read and write
malicious
33BF000
trusted library allocation
page read and write
malicious
3CC1000
trusted library allocation
page read and write
malicious
76F0000
trusted library section
page read and write
malicious
8471000
trusted library allocation
page read and write
malicious
601000
remote allocation
page execute read
malicious
7323000
trusted library allocation
page read and write
malicious
2CB1000
trusted library allocation
page read and write
malicious
4719000
trusted library allocation
page read and write
malicious
4FAB000
trusted library allocation
page read and write
malicious
5DD0000
trusted library section
page read and write
malicious
2F70000
trusted library allocation
page read and write
malicious
3584000
trusted library allocation
page read and write
malicious
1FE7146C000
heap
page read and write
518D000
stack
page read and write
2294FBD6000
heap
page read and write
2294FCC5000
heap
page read and write
8E5DC87000
stack
page read and write
55CE000
stack
page read and write
1FE6EDAC000
heap
page read and write
1FE6CCB7000
heap
page read and write
2294FBF1000
heap
page read and write
61B0000
trusted library allocation
page read and write
2294FBBB000
heap
page read and write
1FE6ED8E000
heap
page read and write
2294FBFA000
heap
page read and write
1FE6EC68000
heap
page read and write
1FE6ED9A000
heap
page read and write
22952380000
heap
page read and write
2294FBA9000
heap
page read and write
1FE6ED21000
heap
page read and write
592E000
stack
page read and write
2294F5B0000
heap
page read and write
2294FD37000
heap
page read and write
6291000
heap
page read and write
2294FBDB000
heap
page read and write
4093000
heap
page read and write
5E6E000
stack
page read and write
2294FBD2000
heap
page read and write
1568000
heap
page read and write
1FE6EDC6000
heap
page read and write
32A5000
trusted library allocation
page read and write
FF0000
heap
page read and write
3B7F000
stack
page read and write
3DFF000
stack
page read and write
12F7000
stack
page read and write
1FE6ED9B000
heap
page read and write
6787000
trusted library allocation
page read and write
2133CD45000
heap
page read and write
1FE6ED0E000
heap
page read and write
2294FBEC000
heap
page read and write
1FE6EDC1000
heap
page read and write
1FE7146C000
heap
page read and write
1FE6EDA6000
heap
page read and write
582E000
stack
page read and write
FB0000
heap
page read and write
1FE6EDB1000
heap
page read and write
1494000
trusted library allocation
page read and write
229523A1000
heap
page read and write
2294FC06000
heap
page read and write
1FE6ED9B000
heap
page read and write
2294FBEC000
heap
page read and write
1FE6CD60000
heap
page read and write
1FE6ECEE000
heap
page read and write
36D8DFE000
stack
page read and write
2294FBE1000
heap
page read and write
2294FBFE000
heap
page read and write
1FE6EDB9000
heap
page read and write
2294FBDB000
heap
page read and write
2294DC11000
heap
page read and write
1FE6ED3D000
heap
page read and write
1FE6ED85000
heap
page read and write
2294DC3C000
heap
page read and write
2294FBFA000
heap
page read and write
12BE000
stack
page read and write
2294DBE4000
heap
page read and write
2294FBDE000
heap
page read and write
1535000
heap
page read and write
1FE6EC87000
heap
page read and write
2294FC9B000
heap
page read and write
1FE6ED2C000
heap
page read and write
2294DBB5000
heap
page read and write
409D000
heap
page read and write
2294FBF6000
heap
page read and write
1FE6EDAE000
heap
page read and write
2294FBFA000
heap
page read and write
1FE6CC50000
heap
page read and write
C3C000
stack
page read and write
229523A1000
heap
page read and write
2294DC3E000
heap
page read and write
2294FBF6000
heap
page read and write
1FE6ED89000
heap
page read and write
15B5000
heap
page read and write
1FE6ED8E000
heap
page read and write
1FE6ED20000
heap
page read and write
2294FBCA000
heap
page read and write
1FE6ED29000
heap
page read and write
2294FBE1000
heap
page read and write
1FE6EC83000
heap
page read and write
594E000
stack
page read and write
2294FBD2000
heap
page read and write
229526D0000
heap
page read and write
175E000
stack
page read and write
14C2000
trusted library allocation
page read and write
1FE71458000
heap
page read and write
2294FCD2000
heap
page read and write
1FE6ED9B000
heap
page read and write
FD0000
heap
page read and write
1FE6EDB9000
heap
page read and write
2294FBF6000
heap
page read and write
2294FD37000
heap
page read and write
5CD0000
heap
page read and write
2294FCCD000
heap
page read and write
2294FBEC000
heap
page read and write
2294FD1F000
heap
page read and write
5270000
trusted library allocation
page read and write
8E5E07E000
stack
page read and write
1FE6EC7F000
heap
page read and write
F20000
trusted library allocation
page read and write
1FE6EC5F000
heap
page read and write
2294DBFE000
heap
page read and write
36D94FE000
stack
page read and write
2294FBE1000
heap
page read and write
4DEE000
stack
page read and write
1FE6CCEF000
heap
page read and write
2294FBF6000
heap
page read and write
5BAF000
stack
page read and write
1FE6EDAC000
heap
page read and write
1FE6ED8E000
heap
page read and write
2294DC3C000
heap
page read and write
8058157000
stack
page read and write
176C000
stack
page read and write
1FE6EDA6000
heap
page read and write
2F60000
heap
page read and write
401000
remote allocation
page execute and read and write
1FE6EDB5000
heap
page read and write
1FE6ECE1000
heap
page read and write
1FE6EC8C000
heap
page read and write
1FE6ED7F000
heap
page read and write
2294FBF6000
heap
page read and write
2294FBEC000
heap
page read and write
10B6000
heap
page read and write
1FE6EDA6000
heap
page read and write
318E000
stack
page read and write
22952388000
heap
page read and write
2294FBD1000
heap
page read and write
1FE6EDC5000
heap
page read and write
1FE6EDA1000
heap
page read and write
229523A1000
heap
page read and write
2294FCAF000
heap
page read and write
1480000
trusted library allocation
page read and write
5BEE000
stack
page read and write
1FE6EDC5000
heap
page read and write
2294FC02000
heap
page read and write
328E000
trusted library allocation
page read and write
1FE6ED83000
heap
page read and write
2294DBF7000
heap
page read and write
2294FBC3000
heap
page read and write
2133CCE8000
heap
page read and write
229523A5000
heap
page read and write
2294FBF6000
heap
page read and write
2294FBAB000
heap
page read and write
1FE6EDC5000
heap
page read and write
5D35000
heap
page read and write
6EA000
remote allocation
page execute and read and write
2294FBEC000
heap
page read and write
1FE6CD1F000
heap
page read and write
2294FBE1000
heap
page read and write
2294FBEC000
heap
page read and write
4084000
heap
page read and write
1FE6EC8B000
heap
page read and write
3521000
trusted library allocation
page read and write
1FE6EDB5000
heap
page read and write
2294FBE1000
heap
page read and write
1FE6CD4E000
heap
page read and write
2294FBF1000
heap
page read and write
61B2000
trusted library allocation
page read and write
2294FBE5000
heap
page read and write
1FE6EDAC000
heap
page read and write
2294FD42000
heap
page read and write
22952381000
heap
page read and write
2294FD42000
heap
page read and write
1FE6ED96000
heap
page read and write
36D90FF000
stack
page read and write
1FE6EDBD000
heap
page read and write
1FE6CD5A000
heap
page read and write
63FD000
trusted library allocation
page read and write
2CEA000
trusted library allocation
page read and write
1FE6ED9A000
heap
page read and write
53B000
remote allocation
page execute and read and write
2294FBB4000
heap
page read and write
1FE6EDB5000
heap
page read and write
2294FBFE000
heap
page read and write
2294FBBF000
heap
page read and write
1FE71478000
heap
page read and write
6789000
trusted library allocation
page read and write
1FE6ED2C000
heap
page read and write
2294FBEC000
heap
page read and write
D80000
heap
page read and write
2294FBDB000
heap
page read and write
1FE6EDA8000
heap
page read and write
2294FBFA000
heap
page read and write
2294DC2E000
heap
page read and write
2294FBA7000
heap
page read and write
2294FBFA000
heap
page read and write
2294FBEE000
heap
page read and write
2294FBC3000
heap
page read and write
1FE6EDA6000
heap
page read and write
F6B000
trusted library allocation
page execute and read and write
682A000
trusted library allocation
page read and write
805867E000
stack
page read and write
2294FBE1000
heap
page read and write
1FE6EDB1000
heap
page read and write
13C0000
trusted library allocation
page read and write
2294FBFA000
heap
page read and write
6942000
trusted library allocation
page read and write
229523A5000
heap
page read and write
1FE6EDA1000
heap
page read and write
1490000
trusted library allocation
page read and write
16EF000
stack
page read and write
2294FBE5000
heap
page read and write
4ED000
remote allocation
page execute and read and write
1FE73450000
heap
page read and write
229523A5000
heap
page read and write
49C000
remote allocation
page execute and read and write
14B0000
trusted library allocation
page read and write
22952398000
heap
page read and write
2294FBEE000
heap
page read and write
1FE6EDC1000
heap
page read and write
2294FBF6000
heap
page read and write
8E5E57B000
stack
page read and write
1FE6ED2E000
heap
page read and write
2294DBED000
heap
page read and write
2294FBE6000
heap
page read and write
2294FD1F000
heap
page read and write
80584FF000
stack
page read and write
596E000
stack
page read and write
22952397000
heap
page read and write
2294FBFA000
heap
page read and write
1FE6EDB5000
heap
page read and write
D70000
heap
page read and write
61FF000
stack
page read and write
1FE6EDC6000
heap
page read and write
2294FBF6000
heap
page read and write
6210000
trusted library allocation
page read and write
2294FBE8000
heap
page read and write
1FE6ECF9000
heap
page read and write
2C7F000
stack
page read and write
1FE6EDB1000
heap
page read and write
56CE000
stack
page read and write
2294FBF4000
heap
page read and write
14FE000
heap
page read and write
1FE6EC50000
heap
page read and write
1FE6ED83000
heap
page read and write
8E5DD8F000
stack
page read and write
1FE6EDC6000
heap
page read and write
1FE6EDB1000
heap
page read and write
1FE7145F000
heap
page read and write
2294FBEC000
heap
page read and write
14B2000
trusted library allocation
page read and write
2294FC06000
heap
page read and write
2294FD1F000
heap
page read and write
6230000
trusted library allocation
page read and write
8E5E4FD000
stack
page read and write
728000
remote allocation
page execute and read and write
1FE6EDB1000
heap
page read and write
1440000
heap
page read and write
2294FCD2000
heap
page read and write
2294FBC9000
heap
page read and write
2294FD37000
heap
page read and write
6780000
trusted library allocation
page read and write
1FE6ECE4000
heap
page read and write
6220000
heap
page read and write
1FE6EDB5000
heap
page read and write
1FE6ED9A000
heap
page read and write
1575000
heap
page read and write
2294FBDB000
heap
page read and write
978000
unkown
page readonly
22952390000
heap
page read and write
2294DBD9000
heap
page read and write
6930000
trusted library allocation
page execute and read and write
61C2000
trusted library allocation
page read and write
3484000
heap
page read and write
1FE6CD35000
heap
page read and write
2294FBC9000
heap
page read and write
FC8000
heap
page read and write
2294DBFA000
heap
page read and write
1FE6EDA1000
heap
page read and write
5A4E000
stack
page read and write
2294FD1F000
heap
page read and write
48A5000
trusted library allocation
page read and write
1FE6EDBD000
heap
page read and write
1FE6EDC1000
heap
page read and write
1FE6EDA6000
heap
page read and write
2294F635000
heap
page read and write
8E5E17D000
stack
page read and write
5D2E000
stack
page read and write
2294FCC5000
heap
page read and write
36D8FFF000
stack
page read and write
60AF000
stack
page read and write
13D0000
heap
page read and write
1FE6EDB5000
heap
page read and write
2294FBF1000
heap
page read and write
FC0000
heap
page read and write
2294FC02000
heap
page read and write
1FE6ED97000
heap
page read and write
1FE6ED2E000
heap
page read and write
2295239C000
heap
page read and write
2133CCA0000
heap
page read and write
69F2000
trusted library allocation
page read and write
2294FD1F000
heap
page read and write
2294FBDB000
heap
page read and write
1FE6EC9E000
heap
page read and write
1FE6EDB5000
heap
page read and write
1FE6ECE4000
heap
page read and write
61D0000
trusted library allocation
page read and write
2294FBB7000
heap
page read and write
2294FD42000
heap
page read and write
2294FBC5000
heap
page read and write
2294FCA8000
heap
page read and write
F4D000
trusted library allocation
page execute and read and write
FF5000
heap
page read and write
1FE6EDA1000
heap
page read and write
1FE73920000
trusted library allocation
page read and write
621B000
trusted library allocation
page read and write
2294FCC5000
heap
page read and write
507000
remote allocation
page execute and read and write
346B000
stack
page read and write
805897B000
stack
page read and write
1FE6ED79000
heap
page read and write
6784000
trusted library allocation
page read and write
1FE6E6A3000
heap
page read and write
5E2E000
stack
page read and write
1FE6ED77000
heap
page read and write
1FE6ED7A000
heap
page read and write
1FE6ED92000
heap
page read and write
1FE6ED96000
heap
page read and write
3BBE000
stack
page read and write
2133CCB0000
heap
page read and write
80588FD000
stack
page read and write
2294FC02000
heap
page read and write
1FE6ED29000
heap
page read and write
3CFE000
stack
page read and write
1390000
trusted library allocation
page read and write
FE7000
heap
page read and write
158D000
heap
page read and write
2294DC07000
heap
page read and write
36D8CFE000
stack
page read and write
2294FBDB000
heap
page read and write
2294FD57000
heap
page read and write
1FE6EDC6000
heap
page read and write
5AAD000
stack
page read and write
46C1000
trusted library allocation
page read and write
1FE6ED7F000
heap
page read and write
2294FBC3000
heap
page read and write
1FE6ED65000
heap
page read and write
1FE6ED96000
heap
page read and write
E10000
heap
page read and write
2294FBE1000
heap
page read and write
63F0000
trusted library allocation
page read and write
1FE6EDB9000
heap
page read and write
5D77000
heap
page read and write
2294FBF3000
heap
page read and write
2294FBF6000
heap
page read and write
2294DC07000
heap
page read and write
542000
remote allocation
page execute and read and write
2294FD42000
heap
page read and write
2294FBDE000
heap
page read and write
734000
remote allocation
page execute and read and write
6710000
trusted library allocation
page read and write
1FE6EDC1000
heap
page read and write
5B8E000
stack
page read and write
1FE6EDA6000
heap
page read and write
1FE6EDB1000
heap
page read and write
D37000
stack
page read and write
2294FCE3000
heap
page read and write
1FE71460000
heap
page read and write
1FE6ED61000
heap
page read and write
2294FBEC000
heap
page read and write
2294FCD2000
heap
page read and write
2294FD7B000
heap
page read and write
1FE6ECBE000
heap
page read and write
618000
remote allocation
page execute and read and write
2C90000
trusted library allocation
page read and write
2294FBE2000
heap
page read and write
1FE71463000
heap
page read and write
2294FBFE000
heap
page read and write
14F8000
heap
page read and write
1FE6EDB9000
heap
page read and write
1FE6EDBD000
heap
page read and write
172E000
stack
page read and write
69B0000
trusted library allocation
page execute and read and write
1FE6ED2E000
heap
page read and write
1FE6ECF9000
heap
page read and write
6831000
trusted library allocation
page read and write
1FE6EDAC000
heap
page read and write
1FE6EDC2000
heap
page read and write
2294FBE1000
heap
page read and write
2F40000
heap
page read and write
2294FD42000
heap
page read and write
6C41000
trusted library allocation
page read and write
1FE6ED88000
heap
page read and write
1FE6CD76000
heap
page read and write
2294FBD1000
heap
page read and write
17E0000
heap
page read and write
2294FD7B000
heap
page read and write
1FE6ECDA000
heap
page read and write
678E000
trusted library allocation
page read and write
149D000
trusted library allocation
page execute and read and write
1FE6ECB4000
heap
page read and write
2294DC3D000
heap
page read and write
2294FBF1000
heap
page read and write
1FE6EDAC000
heap
page read and write
1FE6E7B5000
heap
page read and write
2294DC2A000
heap
page read and write
14C0000
trusted library allocation
page read and write
14BA000
trusted library allocation
page execute and read and write
13CE000
stack
page read and write
600000
remote allocation
page execute and read and write
2294FBE5000
heap
page read and write
36D89CA000
stack
page read and write
2294FBFA000
heap
page read and write
1FE6EC93000
heap
page read and write
E0E000
stack
page read and write
749000
remote allocation
page execute and read and write
1FE6EC8B000
heap
page read and write
1FE6EDA1000
heap
page read and write
1FE6ED9A000
heap
page read and write
2294DC3C000
heap
page read and write
1FE6EC87000
heap
page read and write
1445000
heap
page read and write
1FE6ED2E000
heap
page read and write
1395000
heap
page read and write
1FE6ED89000
heap
page read and write
60FE000
stack
page read and write
2294FBE6000
heap
page read and write
1FE6ED9A000
heap
page read and write
8E5E47E000
stack
page read and write
1FE6EC71000
heap
page read and write
148E000
stack
page read and write
1FE6ED96000
heap
page read and write
11BE000
stack
page read and write
6810000
trusted library allocation
page execute and read and write
31C5000
trusted library allocation
page read and write
2294DBD8000
heap
page read and write
2294FD1F000
heap
page read and write
42E1000
trusted library allocation
page read and write
1FE6CD44000
heap
page read and write
2294FBE1000
heap
page read and write
C60000
heap
page read and write
2294FBEC000
heap
page read and write
133B000
stack
page read and write
1FE6EDC1000
heap
page read and write
2CA0000
heap
page execute and read and write
2294FBF1000
heap
page read and write
3420000
heap
page read and write
1FE6EDA1000
heap
page read and write
1FE6ED96000
heap
page read and write
1FE71465000
heap
page read and write
1FE6EDB1000
heap
page read and write
1FE6ED9A000
heap
page read and write
1FE6EDB9000
heap
page read and write
2294DBD8000
heap
page read and write
498000
remote allocation
page execute and read and write
2294FBB2000
heap
page read and write
6700000
trusted library allocation
page read and write
2294FBEC000
heap
page read and write
149A000
heap
page read and write
40AF000
heap
page read and write
AD0000
heap
page read and write
1FE6EDB5000
heap
page read and write
F34000
trusted library allocation
page read and write
1FE6EDB1000
heap
page read and write
63C0000
trusted library allocation
page execute and read and write
1FE6ED80000
heap
page read and write
2294FBDB000
heap
page read and write
2294FCCD000
heap
page read and write
2294FC07000
heap
page read and write
1FE6CD4E000
heap
page read and write
2294FBC6000
heap
page read and write
2294FBD2000
heap
page read and write
3E3D000
stack
page read and write
2294DBEB000
heap
page read and write
2294FBB1000
heap
page read and write
F90000
heap
page read and write
17B0000
trusted library allocation
page read and write
629D000
heap
page read and write
5280000
heap
page execute and read and write
1FE71450000
heap
page read and write
1FE6EC71000
heap
page read and write
2294FBD6000
heap
page read and write
2294FBFF000
heap
page read and write
2294FBCE000
heap
page read and write
36D95FB000
stack
page read and write
2294FBEC000
heap
page read and write
306E000
stack
page read and write
1FE7146C000
heap
page read and write
1FE6ED9A000
heap
page read and write
2294FBA1000
heap
page read and write
2294DC27000
heap
page read and write
6713000
trusted library allocation
page read and write
1FE6EDC6000
heap
page read and write
303B000
trusted library allocation
page read and write
3CE000
stack
page read and write
670A000
trusted library allocation
page read and write
1FE6EDC1000
heap
page read and write
2294DBE3000
heap
page read and write
590F000
stack
page read and write
2294DC07000
heap
page read and write
57E0000
heap
page execute and read and write
2294FBF6000
heap
page read and write
14CB000
trusted library allocation
page execute and read and write
1FE7145B000
heap
page read and write
1380000
heap
page read and write
3041000
trusted library allocation
page read and write
1FE6ED6B000
heap
page read and write
1FE6EDB5000
heap
page read and write
2294FD62000
heap
page read and write
2294FBE5000
heap
page read and write
40A3000
heap
page read and write
13E0000
heap
page read and write
1FE6ECB0000
heap
page read and write
1FE6CD47000
heap
page read and write
2294FCC5000
heap
page read and write
2294FD37000
heap
page read and write
2294FD59000
heap
page read and write
F30000
trusted library allocation
page read and write
1FE6EC9E000
heap
page read and write
2294FBE5000
heap
page read and write
1FE71440000
heap
page read and write
13D0000
heap
page read and write
22951DE0000
trusted library allocation
page read and write
2294FC02000
heap
page read and write
1790000
heap
page read and write
2294FBE1000
heap
page read and write
1FE6ED89000
heap
page read and write
2294FBEC000
heap
page read and write
1FE6ED9A000
heap
page read and write
2294FBC9000
heap
page read and write
2294FCC5000
heap
page read and write
1FE6EDB9000
heap
page read and write
1FE6ED9A000
heap
page read and write
12FE000
stack
page read and write
1FE6ED83000
heap
page read and write
F5C000
stack
page read and write
31AC000
stack
page read and write
1FE7146C000
heap
page read and write
2294FBF1000
heap
page read and write
2294FBDB000
heap
page read and write
2294FBD5000
heap
page read and write
1FE6ED0E000
heap
page read and write
2F67000
heap
page read and write
2294FBD2000
heap
page read and write
2294FBF1000
heap
page read and write
62C0000
trusted library allocation
page execute and read and write
2294DC00000
heap
page read and write
2294FBEC000
heap
page read and write
1FE6CD45000
heap
page read and write
2294FD37000
heap
page read and write
970000
unkown
page readonly
1FE6ED89000
heap
page read and write
2294FCCD000
heap
page read and write
2294DC40000
heap
page read and write
1FE6EDB9000
heap
page read and write
2294FBCD000
heap
page read and write
9A6000
remote allocation
page readonly
2294FD42000
heap
page read and write
F5A000
trusted library allocation
page execute and read and write
2294FBCD000
heap
page read and write
8E5DD0D000
stack
page read and write
6480000
trusted library allocation
page read and write
2294FBF6000
heap
page read and write
1FE6ED9A000
heap
page read and write
4CEC000
stack
page read and write
1FE6ED60000
heap
page read and write
1FE6EC81000
heap
page read and write
2294FB90000
heap
page read and write
2294FC02000
heap
page read and write
1FE6ED92000
heap
page read and write
1FE6ED92000
heap
page read and write
1FE6EDC5000
heap
page read and write
524E000
stack
page read and write
1FE6ED2C000
heap
page read and write
54CE000
stack
page read and write
F3D000
trusted library allocation
page execute and read and write
1FE6CD1F000
heap
page read and write
1FE6ED96000
heap
page read and write
2294FBFA000
heap
page read and write
1FE6EC89000
heap
page read and write
1FE6EDC1000
heap
page read and write
32AD000
stack
page read and write
2294FBD6000
heap
page read and write
1FE6ED92000
heap
page read and write
1FE71680000
heap
page read and write
1FE6ED96000
heap
page read and write
1FE6EC5D000
heap
page read and write
2294FBDB000
heap
page read and write
2294FBBF000
heap
page read and write
4E9A000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
604000
remote allocation
page execute and read and write
1FE6ED96000
heap
page read and write
2294FC90000
heap
page read and write
63E0000
trusted library allocation
page execute and read and write
1FE6EC77000
heap
page read and write
2294FBE5000
heap
page read and write
2294FBCD000
heap
page read and write
2294FBE6000
heap
page read and write
1FE6ECE4000
heap
page read and write
1FE6EDB5000
heap
page read and write
78C000
remote allocation
page execute and read and write
2294FBBF000
heap
page read and write
6269000
heap
page read and write
2294FBE7000
heap
page read and write
1FE6ED7F000
heap
page read and write
1FE6EDB1000
heap
page read and write
2294FBF6000
heap
page read and write
14AA000
heap
page read and write
1FE6CD12000
heap
page read and write
1FE6CD41000
heap
page read and write
2294DBE5000
heap
page read and write
3480000
heap
page read and write
2294FCD2000
heap
page read and write
18EF000
stack
page read and write
2294FBBF000
heap
page read and write
2294FD7B000
heap
page read and write
6210000
trusted library allocation
page read and write
1FE71458000
heap
page read and write
2294FD37000
heap
page read and write
36D93FE000
stack
page read and write
2294FBD1000
heap
page read and write
32A9000
trusted library allocation
page read and write
2294FBF1000
heap
page read and write
36D92FD000
stack
page read and write
1FE6EDC5000
heap
page read and write
2294FD6C000
heap
page read and write
1FE6CD15000
heap
page read and write
229523A5000
heap
page read and write
2294FBFA000
heap
page read and write
1FE6EC71000
heap
page read and write
1FE6EC93000
heap
page read and write
2294FBBA000
heap
page read and write
72A000
remote allocation
page execute and read and write
2294FD57000
heap
page read and write
2294DBE1000
heap
page read and write
1FE6ECEE000
heap
page read and write
2294FBE6000
heap
page read and write
6F3000
remote allocation
page execute and read and write
2294FD61000
heap
page read and write
1FE6ED7F000
heap
page read and write
1FE6EDAC000
heap
page read and write
2294FC06000
heap
page read and write
1493000
trusted library allocation
page execute and read and write
2294FC0D000
heap
page read and write
55D000
remote allocation
page execute and read and write
2294FBEC000
heap
page read and write
1FE6EDA1000
heap
page read and write
1FE6EDB1000
heap
page read and write
40B9000
heap
page read and write
1FE6EDA1000
heap
page read and write
80585FD000
stack
page read and write
2294FBEC000
heap
page read and write
1FE6EDB9000
heap
page read and write
2294FD57000
heap
page read and write
2294F500000
heap
page read and write
1FE6EDB5000
heap
page read and write
2294FBDB000
heap
page read and write
123C000
stack
page read and write
3F3D000
stack
page read and write
2294FBD2000
heap
page read and write
1FE6EDAC000
heap
page read and write
2294FBF1000
heap
page read and write
626D000
heap
page read and write
2294FCAF000
heap
page read and write
1FE6EDBD000
heap
page read and write
1FE6CD30000
heap
page read and write
5CEE000
stack
page read and write
2294FC06000
heap
page read and write
42BF000
stack
page read and write
1FE6CC10000
heap
page read and write
1FE6EC83000
heap
page read and write
2294FC06000
heap
page read and write
22954492000
trusted library allocation
page read and write
2294FBF7000
heap
page read and write
1FE6EDB1000
heap
page read and write
2294FBB9000
heap
page read and write
2294FCB2000
heap
page read and write
8E5E0FE000
stack
page read and write
5BCE000
stack
page read and write
2294DBE6000
heap
page read and write
2294FBF1000
heap
page read and write
2294FBD2000
heap
page read and write
1FE6EC93000
heap
page read and write
6920000
trusted library allocation
page execute and read and write
2294DBD8000
heap
page read and write
32C0000
heap
page read and write
5D51000
heap
page read and write
62D0000
trusted library allocation
page read and write
1FE6EDA6000
heap
page read and write
F62000
trusted library allocation
page read and write
2294FD57000
heap
page read and write
4261000
trusted library allocation
page read and write
1FE6ED9B000
heap
page read and write
2294FBCD000
heap
page read and write
2294FBE6000
heap
page read and write
14A0000
trusted library allocation
page read and write
2294FCB4000
heap
page read and write
2294FD09000
heap
page read and write
2294DBE3000
heap
page read and write
1FE6CD5B000
heap
page read and write
1FE6ED3D000
heap
page read and write
10AC000
heap
page read and write
672B000
trusted library allocation
page read and write
1FE6EDB5000
heap
page read and write
FA0000
trusted library allocation
page execute and read and write
1FE6EDB9000
heap
page read and write
2294FBF1000
heap
page read and write
2294FBE5000
heap
page read and write
2294FBF6000
heap
page read and write
1FE6EDBD000
heap
page read and write
1FE6EC7F000
heap
page read and write
5FAE000
stack
page read and write
1FE6ED50000
heap
page read and write
61BF000
trusted library allocation
page read and write
1FE6CD12000
heap
page read and write
3421000
trusted library allocation
page read and write
1FE6EDB1000
heap
page read and write
2CD000
stack
page read and write
2294FC02000
heap
page read and write
2133D070000
heap
page read and write
1FE6EC85000
heap
page read and write
1FE6ED3D000
heap
page read and write
2133E6A0000
heap
page read and write
62F0000
trusted library allocation
page read and write
2294FBDB000
heap
page read and write
1FE71479000
heap
page read and write
51CD000
stack
page read and write
1FE6ED92000
heap
page read and write
2294DC3C000
heap
page read and write
1FE6EDB9000
heap
page read and write
2294FC92000
heap
page read and write
22952390000
heap
page read and write
2CDF000
trusted library allocation
page read and write
2294FCA3000
heap
page read and write
2294FC06000
heap
page read and write
2133CD10000
heap
page read and write
80581DE000
stack
page read and write
2294FD37000
heap
page read and write
3A3F000
stack
page read and write
301D000
trusted library allocation
page read and write
1FE6EDB9000
heap
page read and write
1FE6EC9E000
heap
page read and write
E15000
heap
page read and write
6940000
trusted library allocation
page read and write
F67000
trusted library allocation
page execute and read and write
F33000
trusted library allocation
page execute and read and write
2294FBE6000
heap
page read and write
5A6F000
stack
page read and write
694D000
trusted library allocation
page read and write
2CF6000
trusted library allocation
page read and write
69D0000
trusted library allocation
page read and write
2294FCCD000
heap
page read and write
2294DC22000
heap
page read and write
1FE7145F000
heap
page read and write
6770000
trusted library allocation
page execute and read and write
14AD000
trusted library allocation
page execute and read and write
1FE7145F000
heap
page read and write
2294DBE3000
heap
page read and write
A00000
heap
page read and write
2294FC06000
heap
page read and write
1FE6EDAE000
heap
page read and write
2294FBF1000
heap
page read and write
229523A7000
heap
page read and write
2294FCAF000
heap
page read and write
3CB1000
trusted library allocation
page read and write
1FE6ECEE000
heap
page read and write
2294FD1F000
heap
page read and write
229523A5000
heap
page read and write
2294DC02000
heap
page read and write
2294DBE5000
heap
page read and write
658F000
stack
page read and write
2294FC02000
heap
page read and write
2294FCD9000
heap
page read and write
1FE6CD66000
heap
page read and write
1FE6EDBD000
heap
page read and write
301F000
trusted library allocation
page read and write
1FE6CC00000
heap
page read and write
2294DC3C000
heap
page read and write
7E60000
heap
page read and write
1FE6EDB1000
heap
page read and write
1FE6EDBD000
heap
page read and write
229523A5000
heap
page read and write
2294FD57000
heap
page read and write
62B0000
trusted library allocation
page read and write
1FE6EC81000
heap
page read and write
63D0000
trusted library allocation
page execute and read and write
2294FBF6000
heap
page read and write
1FE6ED74000
heap
page read and write
1FE6EDBE000
heap
page read and write
1FE6EDB9000
heap
page read and write
41BE000
stack
page read and write
1FE6ED2C000
heap
page read and write
2294FBD1000
heap
page read and write
2294FBE6000
heap
page read and write
2294FBF1000
heap
page read and write
2294FBC0000
heap
page read and write
1FE6EDAC000
heap
page read and write
1FE6CD4B000
heap
page read and write
2294FC06000
heap
page read and write
1FE6ECE1000
heap
page read and write
1FE6EC74000
heap
page read and write
1FE6ED92000
heap
page read and write
2294FBCD000
heap
page read and write
F50000
trusted library allocation
page read and write
2CE8000
trusted library allocation
page read and write
1FE6EDAC000
heap
page read and write
229523A1000
heap
page read and write
6702000
trusted library allocation
page read and write
1335000
trusted library allocation
page read and write
2294FD57000
heap
page read and write
56B000
remote allocation
page execute and read and write
2294FBBF000
heap
page read and write
2294FBEC000
heap
page read and write
1FE6ED85000
heap
page read and write
2294DBCE000
heap
page read and write
2294FBDB000
heap
page read and write
1FE6EDB9000
heap
page read and write
6220000
trusted library allocation
page execute and read and write
2294FD57000
heap
page read and write
1FE6EC71000
heap
page read and write
2294FBB5000
heap
page read and write
2133D075000
heap
page read and write
1FE6ED89000
heap
page read and write
2294FCE4000
heap
page read and write
8E0000
remote allocation
page readonly
98C000
remote allocation
page execute and read and write
5F4000
remote allocation
page execute and read and write
1FE6EDAC000
heap
page read and write
1FE6CD0D000
heap
page read and write
229523A1000
heap
page read and write
4FA1000
trusted library allocation
page read and write
2294FBE1000
heap
page read and write
2294DB40000
heap
page read and write
1FE6CD4A000
heap
page read and write
2294FBC4000
heap
page read and write
2294DBF6000
heap
page read and write
1FE6CD4C000
heap
page read and write
805857E000
stack
page read and write
2294FBFA000
heap
page read and write
2294FBF1000
heap
page read and write
322A000
trusted library allocation
page read and write
1FE6ED7F000
heap
page read and write
1FE6EDAC000
heap
page read and write
57CE000
stack
page read and write
17D0000
trusted library allocation
page read and write
2294FBFA000
heap
page read and write
2294DD20000
heap
page read and write
1FE6CD62000
heap
page read and write
2294FC02000
heap
page read and write
6460000
trusted library allocation
page execute and read and write
2294FBDB000
heap
page read and write
2294FBCE000
heap
page read and write
1FE6ED92000
heap
page read and write
80586FB000
stack
page read and write
1FE6ED96000
heap
page read and write
2294FBEC000
heap
page read and write
2294FBBB000
heap
page read and write
2294DBD8000
heap
page read and write
62E1000
trusted library allocation
page read and write
1FE7145F000
heap
page read and write
1FE6CD1D000
heap
page read and write
1FE6ED96000
heap
page read and write
1FE6EDAC000
heap
page read and write
2294FBC3000
heap
page read and write
2294FBFA000
heap
page read and write
2294FBDB000
heap
page read and write
2294DBEA000
heap
page read and write
2295239A000
heap
page read and write
2294FBFE000
heap
page read and write
2294FBF1000
heap
page read and write
535E000
stack
page read and write
2294FBF6000
heap
page read and write
1FE6EDB5000
heap
page read and write
1FE6CD19000
heap
page read and write
739000
remote allocation
page execute and read and write
1FE6CD31000
heap
page read and write
2F3C000
stack
page read and write
1FE6CD7A000
heap
page read and write
152E000
heap
page read and write
1FE738F0000
heap
page read and write
6800000
trusted library allocation
page read and write
580E000
stack
page read and write
1FE70EA0000
trusted library allocation
page read and write
2294FD6B000
heap
page read and write
2294FC06000
heap
page read and write
1FE73930000
heap
page readonly
9A9000
remote allocation
page readonly
1780000
trusted library allocation
page execute and read and write
2294FD42000
heap
page read and write
1490000
heap
page read and write
1FE6CD53000
heap
page read and write
8E5E1FE000
stack
page read and write
1FE6EDA1000
heap
page read and write
2294FBF1000
heap
page read and write
1FE6EDA3000
heap
page read and write
1340000
trusted library section
page read and write
2294FBF6000
heap
page read and write
F52000
trusted library allocation
page read and write
972000
unkown
page readonly
2294FBD2000
heap
page read and write
1FE6ED9B000
heap
page read and write
FC0000
heap
page read and write
705000
remote allocation
page execute and read and write
13A0000
heap
page read and write
2294FCC5000
heap
page read and write
2294FBFA000
heap
page read and write
1FE6CC80000
heap
page read and write
69E0000
trusted library allocation
page read and write
2294FBFA000
heap
page read and write
8E5E27C000
stack
page read and write
2294FD37000
heap
page read and write
3220000
trusted library allocation
page read and write
407F000
stack
page read and write
2294FC06000
heap
page read and write
1FE6EC93000
heap
page read and write
2294FBD1000
heap
page read and write
1FE6E7B0000
heap
page read and write
133E000
stack
page read and write
1FE6CD2F000
heap
page read and write
1FE6EDA6000
heap
page read and write
14E0000
trusted library allocation
page read and write
2294FBFA000
heap
page read and write
1FE6E6A0000
heap
page read and write
6946000
trusted library allocation
page read and write
2294DC04000
heap
page read and write
2294FBFF000
heap
page read and write
68A0000
trusted library allocation
page execute and read and write
2294FBDB000
heap
page read and write
6840000
trusted library allocation
page read and write
1FE6EC85000
heap
page read and write
2133CCE0000
heap
page read and write
1FE6ED29000
heap
page read and write
6760000
trusted library allocation
page read and write
15E3000
heap
page read and write
22952397000
heap
page read and write
1770000
heap
page read and write
2294FBEC000
heap
page read and write
1FE6EDC6000
heap
page read and write
1FE6ED49000
heap
page read and write
531000
remote allocation
page execute and read and write
1FE6ED29000
heap
page read and write
2295239C000
heap
page read and write
1FE6EDA6000
heap
page read and write
1FE6ED48000
heap
page read and write
70B000
remote allocation
page execute and read and write
2294FD42000
heap
page read and write
2294FBF6000
heap
page read and write
1FE6CD57000
heap
page read and write
1FE6ECC5000
heap
page read and write
14B6000
trusted library allocation
page execute and read and write
3297000
trusted library allocation
page read and write
2294FBE5000
heap
page read and write
3CBE000
stack
page read and write
602000
remote allocation
page execute and read and write
1FE6ECE1000
heap
page read and write
3250000
heap
page execute and read and write
5CCE000
stack
page read and write
520D000
stack
page read and write
2294F630000
heap
page read and write
1FE7147B000
heap
page read and write
2294FBA0000
heap
page read and write
341C000
trusted library allocation
page read and write
2294FBFA000
heap
page read and write
1FE6ED75000
heap
page read and write
2294FBD6000
heap
page read and write
1FE6EDC1000
heap
page read and write
2294FD1F000
heap
page read and write
1FE6EDA6000
heap
page read and write
2294FBD6000
heap
page read and write
2294FCDA000
heap
page read and write
61DB000
trusted library allocation
page read and write
14F0000
heap
page read and write
4A3000
remote allocation
page execute and read and write
FCE000
heap
page read and write
340C000
stack
page read and write
638E000
stack
page read and write
1FE6CD34000
heap
page read and write
2294DC06000
heap
page read and write
2294FD07000
heap
page read and write
1FE6ECF9000
heap
page read and write
2294FCD2000
heap
page read and write
2294FD57000
heap
page read and write
2294FD5C000
heap
page read and write
1FE71451000
heap
page read and write
3299000
trusted library allocation
page read and write
1FE6EDC1000
heap
page read and write
F56000
trusted library allocation
page execute and read and write
1FE6EC9E000
heap
page read and write
1FE6EDB1000
heap
page read and write
3A7E000
stack
page read and write
F40000
trusted library allocation
page read and write
1002000
heap
page read and write
1FE6ED3D000
heap
page read and write
2294FBDB000
heap
page read and write
1524000
heap
page read and write
2294FBF7000
heap
page read and write
1FE6EDB5000
heap
page read and write
330C000
stack
page read and write
7935000
trusted library allocation
page read and write
2294FCCD000
heap
page read and write
1038000
heap
page read and write
5FC000
remote allocation
page execute and read and write
316A000
stack
page read and write
2294FBE6000
heap
page read and write
22952397000
heap
page read and write
1533000
heap
page read and write
1FE7146C000
heap
page read and write
2294DC3C000
heap
page read and write
1FE6EDB5000
heap
page read and write
1FE6EDB5000
heap
page read and write
1FE6EDCE000
heap
page read and write
6300000
trusted library section
page read and write
2294FBCE000
heap
page read and write
2294FBDB000
heap
page read and write
60A000
remote allocation
page execute and read and write
6720000
trusted library allocation
page read and write
514000
remote allocation
page execute and read and write
2133CEB0000
heap
page read and write
2294FBE5000
heap
page read and write
2294DBF0000
heap
page read and write
2294FBFA000
heap
page read and write
2294FBEC000
heap
page read and write
14C7000
trusted library allocation
page execute and read and write
6C20000
trusted library allocation
page execute and read and write
2294FBDB000
heap
page read and write
5A8E000
stack
page read and write
137E000
stack
page read and write
1FE6ED8B000
heap
page read and write
1FE6ED0E000
heap
page read and write
2294FC02000
heap
page read and write
2294FCD2000
heap
page read and write
2294DBF9000
heap
page read and write
62C3000
heap
page read and write
2294DBE5000
heap
page read and write
4CF000
remote allocation
page execute and read and write
1FE6CD4D000
heap
page read and write
2294FBD1000
heap
page read and write
1FE6EDB9000
heap
page read and write
7DF47F7A1000
trusted library allocation
page execute read
1FE6EDB9000
heap
page read and write
DCE000
stack
page read and write
1FE6CD19000
heap
page read and write
3F7E000
stack
page read and write
1FE6EDAC000
heap
page read and write
2294FBFA000
heap
page read and write
2294FBF6000
heap
page read and write
1390000
heap
page read and write
2294FBE5000
heap
page read and write
805847E000
stack
page read and write
1FE6EC89000
heap
page read and write
229523A1000
heap
page read and write
1FE6CD1F000
heap
page read and write
494000
remote allocation
page execute and read and write
1FE6EDBA000
heap
page read and write
1FE6CCFA000
heap
page read and write
1FE6EDB9000
heap
page read and write
1FE6EDC6000
heap
page read and write
1FE6CD35000
heap
page read and write
5F6E000
stack
page read and write
1FE6EDC7000
heap
page read and write
61B8000
trusted library allocation
page read and write
71E000
remote allocation
page execute and read and write
1FE6ED96000
heap
page read and write
1FE6ECDB000
heap
page read and write
5D19000
heap
page read and write
2294FC06000
heap
page read and write
1FE6ED9B000
heap
page read and write
66D0000
trusted library allocation
page execute and read and write
There are 1072 hidden memdumps, click here to show them.