IOC Report

loading gif

Files

File Path
Type
Category
Malicious
qpwx2wT5ky.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\qpwx2wT5ky.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_LaunchWinApp.exe_774587b722d421177778692fbd3ea27ebb729dee_d75afd38_16ec8da7\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER118.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6C6.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREDED.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Jan 29 08:13:37 2022, 0x1205a4 type
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\qpwx2wT5ky.exe
"C:\Users\user\Desktop\qpwx2wT5ky.exe"
malicious
C:\Windows\SysWOW64\LaunchWinApp.exe
C:\Windows\SysWOW64\LaunchWinApp.exe
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5980 -s 796

URLs

Name
IP
Malicious
http://91.219.236.139/hdm3prapor
malicious
http://185.163.204.22/hdm3prapor
malicious
http://194.180.174.147/hdm3prapor
194.180.174.147
malicious
http://185.3.95.153/hdm3prapor
malicious
http://188.166.1.115/hdm3prapor
188.166.1.115
malicious
http://upx.sf.net
unknown
http://159.223.25.220/
159.223.25.220
https://t.me/hdm3prapor

IPs

IP
Domain
Country
Malicious
188.166.1.115
unknown
Netherlands
malicious
194.180.174.147
unknown
unknown
malicious
91.219.236.139
unknown
Hungary
malicious
159.223.25.220
unknown
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
\REGISTRY\A\{a61c5c46-e8fd-436c-3504-8be320ff9699}\Root\InventoryApplicationFile\launchwinapp.exe|ed89ab84
ProgramId
\REGISTRY\A\{a61c5c46-e8fd-436c-3504-8be320ff9699}\Root\InventoryApplicationFile\launchwinapp.exe|ed89ab84
FileId
\REGISTRY\A\{a61c5c46-e8fd-436c-3504-8be320ff9699}\Root\InventoryApplicationFile\launchwinapp.exe|ed89ab84
LowerCaseLongPath
\REGISTRY\A\{a61c5c46-e8fd-436c-3504-8be320ff9699}\Root\InventoryApplicationFile\launchwinapp.exe|ed89ab84
LongPathHash
\REGISTRY\A\{a61c5c46-e8fd-436c-3504-8be320ff9699}\Root\InventoryApplicationFile\launchwinapp.exe|ed89ab84
Name
\REGISTRY\A\{a61c5c46-e8fd-436c-3504-8be320ff9699}\Root\InventoryApplicationFile\launchwinapp.exe|ed89ab84
Publisher
\REGISTRY\A\{a61c5c46-e8fd-436c-3504-8be320ff9699}\Root\InventoryApplicationFile\launchwinapp.exe|ed89ab84
Version
\REGISTRY\A\{a61c5c46-e8fd-436c-3504-8be320ff9699}\Root\InventoryApplicationFile\launchwinapp.exe|ed89ab84
BinFileVersion
\REGISTRY\A\{a61c5c46-e8fd-436c-3504-8be320ff9699}\Root\InventoryApplicationFile\launchwinapp.exe|ed89ab84
BinaryType
\REGISTRY\A\{a61c5c46-e8fd-436c-3504-8be320ff9699}\Root\InventoryApplicationFile\launchwinapp.exe|ed89ab84
ProductName
\REGISTRY\A\{a61c5c46-e8fd-436c-3504-8be320ff9699}\Root\InventoryApplicationFile\launchwinapp.exe|ed89ab84
ProductVersion
\REGISTRY\A\{a61c5c46-e8fd-436c-3504-8be320ff9699}\Root\InventoryApplicationFile\launchwinapp.exe|ed89ab84
LinkDate
\REGISTRY\A\{a61c5c46-e8fd-436c-3504-8be320ff9699}\Root\InventoryApplicationFile\launchwinapp.exe|ed89ab84
BinProductVersion
\REGISTRY\A\{a61c5c46-e8fd-436c-3504-8be320ff9699}\Root\InventoryApplicationFile\launchwinapp.exe|ed89ab84
Size
\REGISTRY\A\{a61c5c46-e8fd-436c-3504-8be320ff9699}\Root\InventoryApplicationFile\launchwinapp.exe|ed89ab84
Language
\REGISTRY\A\{a61c5c46-e8fd-436c-3504-8be320ff9699}\Root\InventoryApplicationFile\launchwinapp.exe|ed89ab84
IsPeFile
\REGISTRY\A\{a61c5c46-e8fd-436c-3504-8be320ff9699}\Root\InventoryApplicationFile\launchwinapp.exe|ed89ab84
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018800453F4626F
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
4271000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
4615000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3170000
trusted library section
page read and write
malicious
468C000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
452D000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
5962000
trusted library allocation
page read and write
malicious
20C9E7B8000
unkown
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
14AE8F40000
trusted library allocation
page read and write
3347000
heap
page read and write
29F0000
remote allocation
page read and write
34B6000
trusted library allocation
page read and write
1C29CDC9000
heap
page read and write
1450000
heap
page read and write
20C79660000
heap
page read and write
2E8FB77000
stack
page read and write
AC9E28C000
stack
page read and write
14AE3AF9000
unkown
page read and write
20C9E790000
unkown
page read and write
14AE9262000
unkown
page read and write
32DD000
trusted library allocation
page read and write
3347000
heap
page read and write
345C000
trusted library allocation
page read and write
E50000
heap
page read and write
3347000
heap
page read and write
53B6000
trusted library allocation
page read and write
336F000
trusted library allocation
page read and write
2442803C000
unkown
page read and write
34FD000
heap
page read and write
20C9E796000
unkown
page read and write
34F6000
trusted library allocation
page read and write
34FD000
heap
page read and write
14AE4A00000
trusted library section
page readonly
3100000
trusted library allocation
page read and write
14D087B000
stack
page read and write
3170000
trusted library allocation
page read and write
E89A07E000
stack
page read and write
1FE7F190000
unkown
page read and write
42B7000
trusted library allocation
page read and write
34FD000
heap
page read and write
31C0000
trusted library allocation
page read and write
6C00000
trusted library allocation
page read and write
30E0000
trusted library allocation
page read and write
1FE7EC47000
unkown
page read and write
3110000
trusted library allocation
page read and write
3334000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
29F0000
remote allocation
page read and write
3100000
trusted library allocation
page read and write
334E000
heap
page read and write
3422000
trusted library allocation
page read and write
20C9DE53000
unkown
page read and write
3347000
heap
page read and write
14AE3A8E000
unkown
page read and write
248E1C36000
unkown
page read and write
34FD000
heap
page read and write
1770000
trusted library allocation
page execute and read and write
14AE8FF0000
trusted library allocation
page read and write
48C000
remote allocation
page execute and read and write
20C9E7B4000
unkown
page read and write
3330000
trusted library allocation
page read and write
24428070000
unkown
page read and write
20C79900000
unkown
page read and write
31E0000
trusted library allocation
page read and write
20C9E4C0000
remote allocation
page read and write
5760000
trusted library allocation
page read and write
20C79800000
unkown
page read and write
20C9DE3C000
unkown
page read and write
53B2000
trusted library allocation
page read and write
334E000
heap
page read and write
400000
remote allocation
page execute and read and write
2F80000
unkown
page read and write
5359000
trusted library allocation
page read and write
3481000
trusted library allocation
page read and write
334E000
heap
page read and write
3100000
trusted library allocation
page read and write
533F000
trusted library allocation
page read and write
14AE929D000
unkown
page read and write
20C79908000
unkown
page read and write
20C9DE51000
unkown
page read and write
248E19A0000
heap
page read and write
E899DFB000
stack
page read and write
32E7000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
1C29CE30000
heap
page read and write
3336000
trusted library allocation
page read and write
334E000
heap
page read and write
14AE39C0000
unkown
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
187C8F00000
heap
page read and write
3347000
heap
page read and write
3100000
trusted library allocation
page read and write
2442804F000
unkown
page read and write
299C000
stack
page read and write
34EC000
trusted library allocation
page read and write
20C9E77D000
unkown
page read and write
20C9EC00000
unkown
page read and write
48C000
remote allocation
page execute and read and write
31A0000
trusted library allocation
page read and write
473E000
trusted library allocation
page read and write
E89A97E000
stack
page read and write
358F000
trusted library allocation
page read and write
E76247D000
stack
page read and write
30B0000
trusted library allocation
page read and write
36A4FE000
stack
page read and write
5762000
trusted library allocation
page read and write
353E000
trusted library allocation
page read and write
334E000
heap
page read and write
EBC000
stack
page read and write
3080000
heap
page read and write
338E000
trusted library allocation
page read and write
3347000
heap
page read and write
336B000
trusted library allocation
page read and write
34D1000
trusted library allocation
page read and write
2E906FE000
stack
page read and write
334E000
heap
page read and write
20C9E773000
unkown
page read and write
34C1000
heap
page read and write
30B0000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
20C9E78C000
unkown
page read and write
49D0000
heap
page read and write
5315000
trusted library allocation
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
5790000
trusted library allocation
page read and write
348C000
heap
page read and write
14AE4A10000
trusted library section
page readonly
2F60000
unkown
page readonly
3423000
heap
page read and write
2F1C000
stack
page read and write
4C9E000
stack
page read and write
5741000
trusted library allocation
page read and write
14AE924C000
unkown
page read and write
30B0000
trusted library allocation
page read and write
5349000
trusted library allocation
page read and write
30E0000
trusted library allocation
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
34D4000
heap
page read and write
34F7000
heap
page read and write
334E000
heap
page read and write
160E000
stack
page read and write
3347000
heap
page read and write
E89A5FA000
stack
page read and write
334E000
heap
page read and write
14AE3A6C000
unkown
page read and write
3347000
heap
page read and write
3460000
trusted library allocation
page read and write
6BD8000
trusted library allocation
page read and write
3309000
trusted library allocation
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
1FE7EC13000
unkown
page read and write
187C8F8A000
heap
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
14AE92AE000
unkown
page read and write
351A000
trusted library allocation
page read and write
14AE4318000
unkown
page read and write
3100000
trusted library allocation
page read and write
3250000
trusted library allocation
page read and write
3347000
heap
page read and write
350B000
trusted library allocation
page read and write
32F6000
trusted library allocation
page read and write
33A5000
trusted library allocation
page read and write
A9E5B77000
stack
page read and write
341D000
heap
page read and write
36A7F9000
stack
page read and write
3347000
heap
page read and write
20C9E786000
unkown
page read and write
5B2F000
stack
page read and write
2E9007E000
stack
page read and write
43CB000
trusted library allocation
page read and write
29F0000
remote allocation
page read and write
AC9E7FB000
stack
page read and write
36E0000
trusted library allocation
page read and write
248E1A10000
heap
page read and write
5980000
heap
page read and write
348E000
trusted library allocation
page read and write
33F4000
trusted library allocation
page read and write
29F0000
remote allocation
page read and write
3347000
heap
page read and write
33EA000
trusted library allocation
page read and write
32FF000
trusted library allocation
page read and write
20C9E7D2000
unkown
page read and write
14AE3A87000
unkown
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
334E000
heap
page read and write
14AE92F6000
unkown
page read and write
20C9DEEA000
unkown
page read and write
4B5E000
stack
page read and write
338E000
stack
page read and write
14AE3A13000
unkown
page read and write
E7629F9000
stack
page read and write
3490000
heap
page read and write
20C9E778000
unkown
page read and write
3170000
trusted library allocation
page read and write
4B60000
remote allocation
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
20C9E773000
unkown
page read and write
187C8F91000
heap
page read and write
3347000
heap
page read and write
53D5000
trusted library allocation
page read and write
3492000
heap
page read and write
3347000
heap
page read and write
35AC000
trusted library allocation
page read and write
334E000
heap
page read and write
20C9E7B2000
unkown
page read and write
3347000
heap
page read and write
14AE8F20000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
2CC1000
heap
page read and write
34D3000
trusted library allocation
page read and write
2C91000
heap
page read and write
2DE5000
heap
page read and write
20C9E7CA000
unkown
page read and write
E76257E000
stack
page read and write
3347000
heap
page read and write
13F0000
trusted library allocation
page read and write
20C9E784000
unkown
page read and write
32C8000
trusted library allocation
page read and write
3347000
heap
page read and write
14AE92F5000
unkown
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
360A000
trusted library allocation
page read and write
334E000
heap
page read and write
20C9DE56000
unkown
page read and write
1FE7EC88000
unkown
page read and write
34FD000
heap
page read and write
AC9EBFF000
stack
page read and write
A9E597C000
stack
page read and write
334E000
heap
page read and write
1FE7EC70000
unkown
page read and write
34F7000
heap
page read and write
1C29CFD0000
trusted library allocation
page read and write
57B0000
trusted library section
page read and write
30E0000
trusted library allocation
page read and write
52F1000
trusted library allocation
page read and write
3401000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
33CF000
trusted library allocation
page read and write
52FB000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
2E8FBFE000
stack
page read and write
1C29CF10000
trusted library allocation
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
1C29CFE9000
heap
page read and write
3473000
trusted library allocation
page read and write
3416000
trusted library allocation
page read and write
14AE8F60000
trusted library allocation
page read and write
2930000
unkown
page read and write
35F7000
trusted library allocation
page read and write
34FD000
heap
page read and write
30A5000
trusted library allocation
page read and write
334E000
heap
page read and write
1C29CF70000
trusted library allocation
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
350D000
trusted library allocation
page read and write
20C9E4C0000
remote allocation
page read and write
20C9E782000
unkown
page read and write
33A7000
trusted library allocation
page read and write
3423000
heap
page read and write
14AE3AA8000
unkown
page read and write
20C9E728000
unkown
page read and write
20C9E790000
unkown
page read and write
5790000
trusted library allocation
page execute and read and write
334E000
heap
page read and write
141A000
heap
page read and write
20C9E734000
unkown
page read and write
3347000
heap
page read and write
334E000
heap
page read and write
14AE3A3D000
unkown
page read and write
14AE9229000
unkown
page read and write
5750000
trusted library allocation
page read and write
32CE000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
E23000
unkown
page readonly
341E000
trusted library allocation
page read and write
35BD000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
3521000
trusted library allocation
page read and write
5349000
trusted library allocation
page read and write
33AB000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
E7627FF000
stack
page read and write
35F9000
trusted library allocation
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
59E0000
heap
page read and write
3492000
heap
page read and write
331C000
trusted library allocation
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
3140000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
20C9E78F000
unkown
page read and write
34F0000
trusted library allocation
page read and write
334E000
heap
page read and write
20C9DE29000
unkown
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
4C9E000
stack
page read and write
2F70000
unkown
page readonly
3484000
trusted library allocation
page read and write
48C000
remote allocation
page execute and read and write
3100000
trusted library allocation
page read and write
334E000
heap
page read and write
5367000
trusted library allocation
page read and write
3345000
heap
page read and write
3409000
trusted library allocation
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
334E000
heap
page read and write
33F0000
trusted library allocation
page read and write
32CC000
trusted library allocation
page read and write
3347000
heap
page read and write
2C30000
trusted library allocation
page read and write
3347000
heap
page read and write
20C9E777000
unkown
page read and write
187C8F7F000
heap
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
14AE9200000
unkown
page read and write
3399000
trusted library allocation
page read and write
3315000
trusted library allocation
page read and write
14AE3B02000
unkown
page read and write
3392000
trusted library allocation
page read and write
14AE92F4000
unkown
page read and write
334E000
heap
page read and write
1343000
trusted library allocation
page execute and read and write
3408000
heap
page read and write
D12000
unkown
page readonly
5750000
trusted library allocation
page read and write
20C9E790000
unkown
page read and write
20C79880000
unkown
page read and write
20C9E791000
unkown
page read and write
35CB000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
20C7989B000
unkown
page read and write
20C9E7B2000
unkown
page read and write
4B5E000
stack
page read and write
35B6000
trusted library allocation
page read and write
334E000
heap
page read and write
34BA000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
2C96000
heap
page read and write
353B000
trusted library allocation
page read and write
34FD000
heap
page read and write
563E000
stack
page read and write
3347000
heap
page read and write
1C29CE22000
heap
page read and write
3498000
trusted library allocation
page read and write
32D2000
trusted library allocation
page read and write
4953000
trusted library allocation
page read and write
5349000
trusted library allocation
page read and write
334E000
heap
page read and write
5AEE000
stack
page read and write
5329000
trusted library allocation
page read and write
34D4000
heap
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
340B000
trusted library allocation
page read and write
34D9000
trusted library allocation
page read and write
20C9DE00000
unkown
page read and write
3554000
trusted library allocation
page read and write
334E000
heap
page read and write
3345000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
3573000
trusted library allocation
page read and write
34DD000
trusted library allocation
page read and write
A9E5E7F000
stack
page read and write
2C66000
heap
page read and write
3100000
trusted library allocation
page read and write
3313000
trusted library allocation
page read and write
3492000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write
3593000
trusted library allocation
page read and write
1C29CFC0000
heap
page readonly
20C9E4C0000
remote allocation
page read and write
3550000
trusted library allocation
page read and write
187C8F50000
heap
page read and write
34D4000
heap
page read and write
3347000
heap
page read and write
3260000
heap
page execute and read and write
49D0000
heap
page read and write
3347000
heap
page read and write
334E000
heap
page read and write
35D1000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
14AE8F2E000
trusted library allocation
page read and write
24428113000
unkown
page read and write
2442808F000
unkown
page read and write
5E1E000
stack
page read and write
20C9E7A6000
unkown
page read and write
3349000
trusted library allocation
page read and write
2CAE000
heap
page read and write
334E000
heap
page read and write
3597000
trusted library allocation
page read and write
AC9E8F7000
stack
page read and write
32F8000
trusted library allocation
page read and write
35D6000
heap
page read and write
34BE000
trusted library allocation
page read and write
1330000
trusted library allocation
page read and write
3347000
heap
page read and write
20C9E790000
unkown
page read and write
14AE9050000
trusted library allocation
page read and write
3180000
trusted library allocation
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
5307000
trusted library allocation
page read and write
3477000
trusted library allocation
page read and write
53AB000
trusted library allocation
page read and write
14AE8E00000
trusted library allocation
page read and write
334E000
heap
page read and write
248E1C23000
unkown
page read and write
334E000
heap
page read and write
3305000
trusted library allocation
page read and write
49A0000
heap
page read and write
20C9E7A4000
unkown
page read and write
170E000
stack
page read and write
20C9E700000
unkown
page read and write
1350000
trusted library allocation
page read and write
334E000
heap
page read and write
34AD000
trusted library allocation
page read and write
334E000
heap
page read and write
51F1000
heap
page read and write
5D1E000
stack
page read and write
33F2000
trusted library allocation
page read and write
E0E000
unkown
page readonly
3494000
trusted library allocation
page read and write
334E000
heap
page read and write
3100000
trusted library allocation
page read and write
4B1E000
stack
page read and write
3347000
heap
page read and write
D10000
unkown
page readonly
31D0000
trusted library allocation
page read and write
20C9E738000
unkown
page read and write
334E000
heap
page read and write
35CD000
trusted library allocation
page read and write
6BD5000
trusted library allocation
page read and write
334E000
heap
page read and write
187C8F61000
heap
page read and write
334E000
heap
page read and write
1C29CF00000
trusted library allocation
page read and write
34B8000
trusted library allocation
page read and write
2E8FEFF000
stack
page read and write
334E000
heap
page read and write
24428050000
unkown
page read and write
E7624FE000
stack
page read and write
5660000
remote allocation
page read and write
14AE92EF000
unkown
page read and write
3373000
trusted library allocation
page read and write
3347000
heap
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
49A0000
heap
page read and write
2F52000
stack
page read and write
20C7982A000
unkown
page read and write
35F1000
trusted library allocation
page read and write
14AE92FA000
unkown
page read and write
5307000
trusted library allocation
page read and write
35C9000
trusted library allocation
page read and write
34AF000
trusted library allocation
page read and write
2C66000
heap
page read and write
5790000
trusted library allocation
page read and write
248E1C13000
unkown
page read and write
2E8FDF9000
stack
page read and write
30F0000
trusted library allocation
page read and write
14AE9302000
unkown
page read and write
248E1E00000
unkown
page read and write
32BB000
trusted library allocation
page read and write
20C9DDA0000
unkown
page read and write
53D5000
trusted library allocation
page read and write
334E000
heap
page read and write
20C9E790000
unkown
page read and write
AC9E30F000
stack
page read and write
3347000
heap
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
1FE7ED02000
unkown
page read and write
334E000
heap
page read and write
3595000
trusted library allocation
page read and write
4B1E000
stack
page read and write
1C29CDC0000
heap
page read and write
3322000
trusted library allocation
page read and write
34D4000
heap
page read and write
3200000
trusted library allocation
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
34FD000
heap
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
E23000
unkown
page readonly
14AE49F0000
trusted library section
page readonly
20C9E796000
unkown
page read and write
35CE000
stack
page read and write
20C79853000
unkown
page read and write
29DB000
stack
page read and write
14AE9060000
trusted library allocation
page read and write
5750000
trusted library allocation
page read and write
A9E5C7F000
stack
page read and write
20C9DEBE000
unkown
page read and write
334E000
heap
page read and write
24428108000
unkown
page read and write
20C9E796000
unkown
page read and write
14AE4300000
unkown
page read and write
2442807C000
unkown
page read and write
1C29CE11000
heap
page read and write
20C9E7A7000
unkown
page read and write
14AE8F28000
trusted library allocation
page read and write
14AE4202000
unkown
page read and write
5960000
trusted library allocation
page read and write
35B0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
187C8E90000
heap
page read and write
3380000
trusted library allocation
page read and write
3347000
heap
page read and write
20C9E775000
unkown
page read and write
248E1C00000
unkown
page read and write
334E000
heap
page read and write
34C8000
heap
page read and write
3347000
heap
page read and write
20C7989E000
unkown
page read and write
334E000
heap
page read and write
356F000
trusted library allocation
page read and write
3348000
heap
page read and write
6AA1000
trusted library allocation
page read and write
32D4000
trusted library allocation
page read and write
2EB0000
heap
page read and write
33B6000
trusted library allocation
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
20C9E7D2000
unkown
page read and write
20C9E773000
unkown
page read and write
20C9E773000
unkown
page read and write
20C9E784000
unkown
page read and write
6BF0000
trusted library allocation
page read and write
53AB000
trusted library allocation
page read and write
3347000
heap
page read and write
20C7983C000
unkown
page read and write
3347000
heap
page read and write
334E000
heap
page read and write
14AE3AA0000
unkown
page read and write
460E000
trusted library allocation
page read and write
53C8000
trusted library allocation
page read and write
53AB000
trusted library allocation
page read and write
34C3000
trusted library allocation
page read and write
14AE8F44000
trusted library allocation
page read and write
3347000
heap
page read and write
5722000
heap
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
348C000
heap
page read and write
3347000
heap
page read and write
E89A0FE000
stack
page read and write
3347000
heap
page read and write
FB8000
stack
page read and write
330E000
stack
page read and write
20C9E77A000
unkown
page read and write
2F008FD000
stack
page read and write
3347000
heap
page read and write
335A000
trusted library allocation
page read and write
36A5FE000
stack
page read and write
2CAA000
heap
page read and write
3570000
trusted library allocation
page read and write
3347000
heap
page read and write
337C000
trusted library allocation
page read and write
FF0000
trusted library allocation
page read and write
32EF000
trusted library allocation
page read and write
3347000
heap
page read and write
14AE3A2A000
unkown
page read and write
3100000
trusted library allocation
page read and write
144E000
heap
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
20C9E777000
unkown
page read and write
34BC000
heap
page read and write
24428013000
unkown
page read and write
3347000
heap
page read and write
3130000
trusted library allocation
page read and write
3347000
heap
page read and write
5312000
trusted library allocation
page read and write
148C000
heap
page read and write
334E000
heap
page read and write
345A000
trusted library allocation
page read and write
14AE9030000
trusted library allocation
page read and write
20C9DE4C000
unkown
page read and write
3484000
heap
page read and write
334E000
heap
page read and write
31A0000
trusted library allocation
page read and write
356B000
trusted library allocation
page read and write
E18000
unkown
page readonly
3375000
trusted library allocation
page read and write
13F2000
trusted library allocation
page read and write
36A6F9000
stack
page read and write
248E1D00000
unkown
page read and write
32D6000
trusted library allocation
page read and write
3347000
heap
page read and write
20C9E78B000
unkown
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
334E000
heap
page read and write
1FE7EC3C000
unkown
page read and write
53B2000
trusted library allocation
page read and write
3347000
heap
page read and write
2F80000
unkown
page read and write
2C66000
heap
page read and write
4B60000
remote allocation
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
1FE7ED13000
unkown
page read and write
4B90000
heap
page read and write
24427DE0000
heap
page read and write
35E0000
trusted library allocation
page read and write
340D000
trusted library allocation
page read and write
334D000
trusted library allocation
page read and write
20C9E782000
unkown
page read and write
34F4000
trusted library allocation
page read and write
20C9DE4E000
unkown
page read and write
14AE4359000
unkown
page read and write
3700000
heap
page read and write
14AE923F000
unkown
page read and write
334E000
heap
page read and write
34F1000
heap
page read and write
334E000
heap
page read and write
332C000
trusted library allocation
page read and write
3347000
heap
page read and write
1C29CE0A000
heap
page read and write
334E000
heap
page read and write
29F0000
remote allocation
page read and write
3347000
heap
page read and write
34EB000
heap
page read and write
32E1000
trusted library allocation
page read and write
20C9E76F000
unkown
page read and write
3100000
trusted library allocation
page read and write
1780000
heap
page read and write
3535000
trusted library allocation
page read and write
20C9DCA0000
heap
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
5301000
trusted library allocation
page read and write
343D000
heap
page read and write
248E1D02000
unkown
page read and write
20C9E794000
unkown
page read and write
334E000
heap
page read and write
20C9E792000
unkown
page read and write
334E000
heap
page read and write
2C30000
trusted library allocation
page read and write
331E000
trusted library allocation
page read and write
5AAB000
stack
page read and write
A9E557C000
stack
page read and write
3311000
trusted library allocation
page read and write
33B3000
trusted library allocation
page read and write
334E000
heap
page read and write
2F00779000
stack
page read and write
5BDE000
stack
page read and write
14AE4A40000
trusted library section
page readonly
3347000
heap
page read and write
2D60000
remote allocation
page read and write
35F5000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
30D8000
trusted library allocation
page read and write
511E000
stack
page read and write
148D000
heap
page read and write
20C9DE55000
unkown
page read and write
2CAA000
heap
page read and write
2CB3000
heap
page read and write
6BB4000
trusted library allocation
page read and write
334E000
heap
page read and write
14AE9255000
unkown
page read and write
3405000
trusted library allocation
page read and write
3347000
heap
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
3120000
trusted library allocation
page read and write
334E000
heap
page read and write
24428000000
unkown
page read and write
501E000
stack
page read and write
3347000
heap
page read and write
51F1000
heap
page read and write
35B4000
trusted library allocation
page read and write
334E000
heap
page read and write
349A000
trusted library allocation
page read and write
334E000
heap
page read and write
3100000
trusted library allocation
page read and write
3410000
trusted library allocation
page read and write
5850000
heap
page read and write
33E2000
trusted library allocation
page read and write
36A57D000
stack
page read and write
334E000
heap
page read and write
3407000
trusted library allocation
page read and write
3478000
heap
page read and write
6C22000
trusted library allocation
page read and write
33EC000
trusted library allocation
page read and write
578E000
stack
page read and write
35ED000
trusted library allocation
page read and write
20C796C0000
heap
page read and write
14AE9080000
remote allocation
page read and write
1C29CFB0000
trusted library allocation
page read and write
1405000
trusted library allocation
page execute and read and write
3347000
heap
page read and write
3347000
heap
page read and write
53AB000
trusted library allocation
page read and write
3347000
heap
page read and write
14AE3A74000
unkown
page read and write
14D0CF7000
stack
page read and write
3347000
heap
page read and write
2E8F7DE000
stack
page read and write
5349000
trusted library allocation
page read and write
3347000
heap
page read and write
5A2F000
stack
page read and write
20C9E73E000
unkown
page read and write
3456000
trusted library allocation
page read and write
6AB0000
heap
page read and write
20C9E790000
unkown
page read and write
334E000
heap
page read and write
34EB000
heap
page read and write
3414000
trusted library allocation
page read and write
20C9E790000
unkown
page read and write
334E000
heap
page read and write
5C2D000
stack
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
3539000
trusted library allocation
page read and write
2C60000
heap
page read and write
248E1E02000
unkown
page read and write
3388000
trusted library allocation
page read and write
D12000
unkown
page readonly
6BC4000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
306D000
stack
page read and write
334E000
heap
page read and write
5A6D000
stack
page read and write
3347000
heap
page read and write
3129000
trusted library allocation
page read and write
5367000
trusted library allocation
page read and write
34FD000
heap
page read and write
29DB000
stack
page read and write
3100000
trusted library allocation
page read and write
32ED000
trusted library allocation
page read and write
501E000
stack
page read and write
14AE9040000
trusted library allocation
page read and write
6970000
trusted library allocation
page read and write
3347000
heap
page read and write
20C9E793000
unkown
page read and write
20C9E790000
unkown
page read and write
299C000
stack
page read and write
14AE8F50000
trusted library allocation
page read and write
57A0000
heap
page execute and read and write
334E000
heap
page read and write
34D7000
trusted library allocation
page read and write
20C9E7C3000
unkown
page read and write
32E5000
trusted library allocation
page read and write
32F4000
trusted library allocation
page read and write
24428091000
unkown
page read and write
33A3000
trusted library allocation
page read and write
20C79902000
unkown
page read and write
2DE5000
heap
page read and write
2F007FA000
stack
page read and write
34D5000
trusted library allocation
page read and write
3347000
heap
page read and write
2CAE000
heap
page read and write
32B9000
trusted library allocation
page read and write
3347000
heap
page read and write
334E000
heap
page read and write
3479000
trusted library allocation
page read and write
3490000
trusted library allocation
page read and write
3355000
trusted library allocation
page read and write
2DE5000
heap
page read and write
24428602000
unkown
page read and write
33E0000
trusted library allocation
page read and write
A9E5D7C000
stack
page read and write
3347000
heap
page read and write
20C9E797000
unkown
page read and write
3347000
heap
page read and write
48E000
remote allocation
page execute and read and write
5760000
trusted library allocation
page read and write
248E1E13000
unkown
page read and write
53BD000
trusted library allocation
page read and write
334E000
heap
page read and write
53C8000
trusted library allocation
page read and write
31F0000
trusted library allocation
page read and write
334E000
heap
page read and write
32C6000
trusted library allocation
page read and write
334E000
heap
page read and write
2F0087E000
stack
page read and write
2E8FCFA000
stack
page read and write
334E000
heap
page read and write
248E1F02000
unkown
page read and write
3340000
heap
page read and write
3550000
trusted library allocation
page read and write
20C9DE84000
unkown
page read and write
595E000
stack
page read and write
3371000
trusted library allocation
page read and write
334E000
heap
page read and write
53AB000
trusted library allocation
page read and write
2E9027F000
stack
page read and write
334E000
heap
page read and write
302E000
stack
page read and write
248E1C29000
unkown
page read and write
20C9DC40000
heap
page read and write
6AB0000
trusted library allocation
page read and write
14AE3A00000
unkown
page read and write
3486000
heap
page read and write
3347000
heap
page read and write
53D5000
trusted library allocation
page read and write
53AB000
trusted library allocation
page read and write
511E000
stack
page read and write
3347000
heap
page read and write
3343000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
2FFE000
stack
page read and write
20C9DE13000
unkown
page read and write
14AE4200000
unkown
page read and write
5751000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
51F0000
heap
page read and write
20C9DF02000
unkown
page read and write
334E000
heap
page read and write
E0E000
unkown
page readonly
3494000
heap
page read and write
3347000
heap
page read and write
32DB000
trusted library allocation
page read and write
5961000
trusted library allocation
page read and write
597F000
stack
page read and write
334E000
heap
page read and write
2E8FFFB000
stack
page read and write
3347000
heap
page read and write
14AE8D90000
trusted library allocation
page read and write
20C9E7BD000
unkown
page read and write
2E8FA7D000
stack
page read and write
3100000
trusted library allocation
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
3599000
trusted library allocation
page read and write
3610000
trusted library allocation
page read and write
14AE41F3000
trusted library allocation
page read and write
334E000
heap
page read and write
20C9E7A6000
unkown
page read and write
334E000
heap
page read and write
34DA000
heap
page read and write
14AE8F20000
trusted library allocation
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
32BD000
trusted library allocation
page read and write
3347000
heap
page read and write
3537000
trusted library allocation
page read and write
334E000
heap
page read and write
E7626FE000
stack
page read and write
3347000
heap
page read and write
3563000
trusted library allocation
page read and write
33C2000
trusted library allocation
page read and write
A9E55FD000
stack
page read and write
5312000
trusted library allocation
page read and write
176E000
stack
page read and write
1C29CFF0000
trusted library allocation
page read and write
187C8D60000
heap
page read and write
5A5E000
stack
page read and write
3170000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
14AE3A57000
unkown
page read and write
53B2000
trusted library allocation
page read and write
501E000
stack
page read and write
334E000
heap
page read and write
354E000
trusted library allocation
page read and write
35C7000
trusted library allocation
page read and write
13FA000
trusted library allocation
page execute and read and write
E89AA7E000
stack
page read and write
1FE7ED08000
unkown
page read and write
2442804D000
unkown
page read and write
334E000
heap
page read and write
2930000
unkown
page read and write
3556000
trusted library allocation
page read and write
3347000
heap
page read and write
35F3000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page execute and read and write
348C000
heap
page read and write
14AE4A30000
trusted library section
page readonly
4A1E000
stack
page read and write
342A000
trusted library allocation
page read and write
29F0000
remote allocation
page read and write
20C9DE5A000
unkown
page read and write
2C60000
heap
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
334E000
heap
page read and write
20C9E732000
unkown
page read and write
20C9E792000
unkown
page read and write
3386000
trusted library allocation
page read and write
14AE921B000
unkown
page read and write
34D4000
heap
page read and write
5720000
heap
page read and write
30F0000
trusted library allocation
page read and write
370C000
heap
page read and write
14AE3AB7000
unkown
page read and write
53CD000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
5349000
trusted library allocation
page read and write
35D0000
heap
page read and write
48C000
remote allocation
page execute and read and write
5960000
trusted library allocation
page read and write
3517000
trusted library allocation
page read and write
32B5000
trusted library allocation
page read and write
14D0B7B000
stack
page read and write
3489000
heap
page read and write
A9E5A7B000
stack
page read and write
3100000
trusted library allocation
page read and write
1FE7EA30000
heap
page read and write
2F80000
unkown
page read and write
5349000
trusted library allocation
page read and write
351C000
trusted library allocation
page read and write
20C9DF13000
unkown
page read and write
3482000
heap
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
187C8F66000
heap
page read and write
34FD000
heap
page read and write
3347000
heap
page read and write
31B0000
trusted library allocation
page read and write
338A000
trusted library allocation
page read and write
5329000
trusted library allocation
page read and write
334E000
heap
page read and write
14AE9080000
remote allocation
page read and write
3347000
heap
page read and write
5CBE000
stack
page read and write
1325000
heap
page read and write
1FE7EC02000
unkown
page read and write
334E000
heap
page read and write
AC9EAFD000
stack
page read and write
34CD000
heap
page read and write
3110000
trusted library allocation
page read and write
3531000
trusted library allocation
page read and write
334F000
trusted library allocation
page read and write
34EB000
heap
page read and write
3486000
heap
page read and write
34F1000
heap
page read and write
34FD000
heap
page read and write
3347000
heap
page read and write
14AE8F41000
trusted library allocation
page read and write
14D0DFF000
stack
page read and write
34BC000
heap
page read and write
3303000
trusted library allocation
page read and write
334E000
heap
page read and write
3319000
trusted library allocation
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
6AA0000
trusted library allocation
page read and write
248E1F00000
unkown
page read and write
53B2000
trusted library allocation
page read and write
53C8000
trusted library allocation
page read and write
20C9E77A000
unkown
page read and write
3347000
heap
page read and write
334E000
heap
page read and write
1FE7EC7E000
unkown
page read and write
20C9E7A3000
unkown
page read and write
53CD000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
334E000
heap
page read and write
36A77E000
stack
page read and write
3347000
heap
page read and write
E89A3F7000
stack
page read and write
1FE7E9C0000
heap
page read and write
35AE000
trusted library allocation
page read and write
359D000
trusted library allocation
page read and write
6C10000
trusted library allocation
page read and write
20C9DF16000
unkown
page read and write
333B000
trusted library allocation
page read and write
20C797C0000
unkown
page read and write
3190000
trusted library allocation
page read and write
3347000
heap
page read and write
148C000
heap
page read and write
E7628FE000
stack
page read and write
334E000
heap
page read and write
34C8000
heap
page read and write
2DE0000
heap
page read and write
14AE4910000
trusted library allocation
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
33FF000
trusted library allocation
page read and write
2930000
heap
page read and write
33A9000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
3347000
heap
page read and write
34F9000
trusted library allocation
page read and write
E04000
unkown
page readonly
333D000
trusted library allocation
page read and write
33E8000
trusted library allocation
page read and write
5CDE000
stack
page read and write
3444000
heap
page read and write
53D5000
trusted library allocation
page read and write
34EB000
heap
page read and write
34FD000
heap
page read and write
3426000
trusted library allocation
page read and write
3490000
heap
page read and write
E89A2FB000
stack
page read and write
3515000
trusted library allocation
page read and write
3347000
heap
page read and write
14AE41F0000
trusted library allocation
page read and write
33F0000
trusted library allocation
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
3396000
trusted library allocation
page read and write
59BE000
stack
page read and write
332E000
trusted library allocation
page read and write
2E902FF000
stack
page read and write
34F1000
heap
page read and write
29F0000
remote allocation
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
3100000
trusted library allocation
page read and write
20C9E780000
unkown
page read and write
49A0000
heap
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
3475000
trusted library allocation
page read and write
1C29D8D0000
trusted library allocation
page read and write
53AB000
trusted library allocation
page read and write
1C29DB30000
trusted library allocation
page read and write
334E000
heap
page read and write
20C9E796000
unkown
page read and write
14AE4215000
unkown
page read and write
334E000
heap
page read and write
3332000
trusted library allocation
page read and write
334E000
heap
page read and write
14D08FE000
stack
page read and write
330F000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
3571000
trusted library allocation
page read and write
334E000
heap
page read and write
20C9E792000
unkown
page read and write
33CB000
trusted library allocation
page read and write
E89A87B000
stack
page read and write
20C9E602000
unkown
page read and write
336D000
trusted library allocation
page read and write
20C9DEDF000
unkown
page read and write
31B0000
trusted library allocation
page read and write
3347000
heap
page read and write
3428000
trusted library allocation
page read and write
34CE000
heap
page read and write
3307000
trusted library allocation
page read and write
E89A1FC000
stack
page read and write
6BB0000
trusted library allocation
page read and write
A9E587E000
stack
page read and write
34F1000
heap
page read and write
3347000
heap
page read and write
2E903FB000
stack
page read and write
14AE8F64000
trusted library allocation
page read and write
3347000
heap
page read and write
34E0000
trusted library allocation
page read and write
334E000
heap
page read and write
30B0000
trusted library allocation
page read and write
187C8F76000
heap
page read and write
13EE000
stack
page read and write
20C9E70F000
unkown
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
20C9EC02000
unkown
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
1407000
trusted library allocation
page execute and read and write
3347000
heap
page read and write
3347000
heap
page read and write
36A47B000
stack
page read and write
4A1E000
stack
page read and write
187C8F8A000
heap
page read and write
34F7000
heap
page read and write
53B8000
trusted library allocation
page read and write
3347000
heap
page read and write
334E000
heap
page read and write
E89A77E000
stack
page read and write
3100000
trusted library allocation
page read and write
5750000
trusted library allocation
page read and write
34F7000
heap
page read and write
334E000
heap
page read and write
187C8F7F000
heap
page read and write
20C9EC02000
unkown
page read and write
3347000
heap
page read and write
3341000
trusted library allocation
page read and write
3326000
trusted library allocation
page read and write
31A6000
trusted library allocation
page read and write
2CC1000
heap
page read and write
3100000
trusted library allocation
page read and write
3317000
trusted library allocation
page read and write
334E000
heap
page read and write
2DE0000
heap
page read and write
334E000
heap
page read and write
20C9EC02000
unkown
page read and write
334E000
heap
page read and write
34F7000
heap
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
3170000
trusted library allocation
page read and write
248E1D15000
unkown
page read and write
20C9E790000
unkown
page read and write
1FE7EC55000
unkown
page read and write
3421000
heap
page read and write
3100000
trusted library allocation
page read and write
3347000
heap
page read and write
20C9E7BE000
unkown
page read and write
334E000
heap
page read and write
5CFF000
stack
page read and write
5730000
heap
page read and write
3489000
heap
page read and write
20C9EC02000
unkown
page read and write
14AE4313000
unkown
page read and write
24427DD0000
heap
page read and write
34AB000
trusted library allocation
page read and write
14AE4A20000
trusted library section
page readonly
34DA000
heap
page read and write
187C8F77000
heap
page read and write
35CF000
trusted library allocation
page read and write
29F0000
remote allocation
page read and write
5740000
trusted library allocation
page read and write
248E19B0000
unkown
page read and write
33CF000
stack
page read and write
2C96000
heap
page read and write
20C9E7AC000
unkown
page read and write
1FE7E9D0000
heap
page read and write
33EE000
trusted library allocation
page read and write
334E000
heap
page read and write
53B2000
trusted library allocation
page read and write
533F000
trusted library allocation
page read and write
20C9E790000
unkown
page read and write
536E000
stack
page read and write
20C9DEE7000
unkown
page read and write
511E000
stack
page read and write
3347000
heap
page read and write
2D60000
remote allocation
page read and write
360E000
trusted library allocation
page read and write
2CC1000
heap
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
1FE7EC29000
unkown
page read and write
35D4000
trusted library allocation
page read and write
3390000
trusted library allocation
page read and write
334E000
heap
page read and write
20C9DEA0000
unkown
page read and write
3480000
heap
page read and write
3100000
trusted library allocation
page read and write
14AE39D0000
trusted library section
page read and write
3347000
heap
page read and write
3100000
trusted library allocation
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
30A0000
trusted library allocation
page read and write
34EE000
trusted library allocation
page read and write
20C79650000
heap
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
3347000
trusted library allocation
page read and write
34AF000
heap
page read and write
20C9E76F000
unkown
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
32DF000
trusted library allocation
page read and write
3347000
heap
page read and write
5310000
trusted library allocation
page read and write
AC9E9FE000
stack
page read and write
1C29DAE0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
347B000
trusted library allocation
page read and write
E76267B000
stack
page read and write
14AE4D90000
trusted library allocation
page read and write
3377000
trusted library allocation
page read and write
2D60000
remote allocation
page read and write
35BA000
trusted library allocation
page read and write
187C8EB0000
heap
page read and write
52F5000
trusted library allocation
page read and write
20C9EC02000
unkown
page read and write
3490000
heap
page read and write
24428029000
unkown
page read and write
140B000
trusted library allocation
page execute and read and write
3347000
heap
page read and write
53CD000
trusted library allocation
page read and write
334E000
heap
page read and write
2C30000
trusted library allocation
page read and write
1320000
heap
page read and write
360C000
trusted library allocation
page read and write
3496000
trusted library allocation
page read and write
20C9E7B4000
unkown
page read and write
20C9E75C000
unkown
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
30B0000
trusted library allocation
page read and write
2F0039A000
stack
page read and write
334E000
heap
page read and write
1C29CCA0000
heap
page read and write
3190000
trusted library allocation
page read and write
2E905FD000
stack
page read and write
5315000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
1C29CE11000
heap
page read and write
3347000
heap
page read and write
3418000
trusted library allocation
page read and write
3503000
trusted library allocation
page read and write
3347000
heap
page read and write
3100000
trusted library allocation
page read and write
3382000
trusted library allocation
page read and write
29DB000
stack
page read and write
5350000
trusted library allocation
page read and write
53B2000
trusted library allocation
page read and write
1C29CB70000
trusted library allocation
page read and write
3458000
trusted library allocation
page read and write
14AE3850000
heap
page read and write
24427E40000
heap
page read and write
3347000
heap
page read and write
334E000
heap
page read and write
20C9DEC5000
unkown
page read and write
34B4000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
20C9E76F000
unkown
page read and write
2E904FE000
stack
page read and write
6C20000
trusted library allocation
page read and write
20C9E7A3000
unkown
page read and write
30B0000
trusted library allocation
page read and write
3347000
heap
page read and write
334E000
heap
page read and write
34BC000
trusted library allocation
page read and write
334E000
heap
page read and write
248E1C02000
unkown
page read and write
334E000
heap
page read and write
20C9E76F000
unkown
page read and write
33D1000
trusted library allocation
page read and write
334E000
heap
page read and write
20C79848000
unkown
page read and write
3347000
heap
page read and write
334E000
heap
page read and write
53B0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
14D0BFE000
stack
page read and write
3347000
heap
page read and write
2C96000
heap
page read and write
20C9E78B000
unkown
page read and write
356D000
trusted library allocation
page read and write
3347000
heap
page read and write
34F1000
heap
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
14AE9080000
remote allocation
page read and write
20C9DE71000
unkown
page read and write
20C9E7BE000
unkown
page read and write
3347000
heap
page read and write
14AE929F000
unkown
page read and write
35FB000
trusted library allocation
page read and write
3347000
heap
page read and write
2E901FE000
stack
page read and write
32D9000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
187C8F7F000
heap
page read and write
3351000
trusted library allocation
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
33D7000
trusted library allocation
page read and write
334E000
heap
page read and write
31CE000
trusted library allocation
page read and write
30B4000
trusted library allocation
page read and write
3347000
heap
page read and write
20C7987D000
unkown
page read and write
36A0000
trusted library allocation
page read and write
334E000
heap
page read and write
2442804B000
unkown
page read and write
334E000
heap
page read and write
187C8F90000
heap
page read and write
2CC1000
heap
page read and write
48E000
remote allocation
page execute and read and write
3100000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
3484000
heap
page read and write
334E000
heap
page read and write
3180000
trusted library allocation
page read and write
20C9E789000
unkown
page read and write
334E000
heap
page read and write
335C000
trusted library allocation
page read and write
2E900FF000
stack
page read and write
341D000
heap
page read and write
3347000
heap
page read and write
5794000
trusted library allocation
page read and write
248E1D23000
heap
page read and write
30B0000
trusted library allocation
page read and write
49D0000
heap
page read and write
20C9DEAB000
unkown
page read and write
20C9DE50000
unkown
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
355B000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
53AC000
trusted library allocation
page read and write
44EC000
trusted library allocation
page read and write
32F1000
trusted library allocation
page read and write
E89A4FF000
stack
page read and write
3482000
heap
page read and write
32FC000
trusted library allocation
page read and write
334E000
heap
page read and write
3100000
trusted library allocation
page read and write
14AE9070000
trusted library allocation
page read and write
34FD000
heap
page read and write
5660000
remote allocation
page read and write
33CD000
trusted library allocation
page read and write
5728000
heap
page read and write
2F60000
unkown
page readonly
20C9E787000
unkown
page read and write
4B60000
remote allocation
page read and write
3347000
heap
page read and write
1402000
trusted library allocation
page read and write
34EB000
heap
page read and write
14D097E000
stack
page read and write
AC9E38F000
stack
page read and write
1360000
heap
page read and write
34CE000
heap
page read and write
20C79913000
unkown
page read and write
4EF5000
trusted library allocation
page read and write
33B8000
trusted library allocation
page read and write
3347000
heap
page read and write
14AE8F50000
trusted library allocation
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
3708000
heap
page read and write
334E000
heap
page read and write
33B1000
trusted library allocation
page read and write
20C9DE8B000
unkown
page read and write
20C9E77A000
unkown
page read and write
24428102000
unkown
page read and write
334E000
heap
page read and write
1FE7F202000
unkown
page read and write
2F60000
unkown
page readonly
3100000
trusted library allocation
page read and write
33E4000
trusted library allocation
page read and write
347D000
heap
page read and write
343D000
heap
page read and write
13F6000
trusted library allocation
page execute and read and write
53B0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
35B2000
trusted library allocation
page read and write
53C8000
trusted library allocation
page read and write
2C60000
heap
page read and write
334E000
heap
page read and write
14AE38C0000
heap
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
334E000
heap
page read and write
34DA000
heap
page read and write
3170000
trusted library allocation
page read and write
5BED000
stack
page read and write
1FE7EC48000
unkown
page read and write
30B0000
trusted library allocation
page read and write
32B7000
trusted library allocation
page read and write
4B5E000
stack
page read and write
2F006FF000
stack
page read and write
3310000
trusted library allocation
page read and write
334E000
heap
page read and write
4C9E000
stack
page read and write
4B90000
heap
page read and write
347D000
trusted library allocation
page read and write
14AE92DE000
unkown
page read and write
2DE0000
heap
page read and write
34C1000
heap
page read and write
3552000
trusted library allocation
page read and write
3347000
heap
page read and write
3100000
trusted library allocation
page read and write
3569000
trusted library allocation
page read and write
4A1E000
stack
page read and write
34F7000
heap
page read and write
1FE7ED00000
unkown
page read and write
344C000
trusted library allocation
page read and write
334E000
heap
page read and write
2C96000
heap
page read and write
20C9E777000
unkown
page read and write
3347000
heap
page read and write
53CD000
trusted library allocation
page read and write
334E000
heap
page read and write
369E000
stack
page read and write
313E000
stack
page read and write
36A679000
stack
page read and write
3347000
heap
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
34CD000
heap
page read and write
20C9DEB1000
unkown
page read and write
3347000
heap
page read and write
3465000
trusted library allocation
page read and write
14AE4318000
unkown
page read and write
345E000
trusted library allocation
page read and write
14AE3A71000
unkown
page read and write
34D4000
heap
page read and write
2F70000
unkown
page readonly
3347000
heap
page read and write
4B1E000
stack
page read and write
3347000
heap
page read and write
29F0000
remote allocation
page read and write
3347000
heap
page read and write
347B000
heap
page read and write
1340000
trusted library allocation
page read and write
2E8F75B000
stack
page read and write
14AE8E10000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
3347000
heap
page read and write
6BB0000
trusted library allocation
page read and write
334E000
heap
page read and write
1400000
trusted library allocation
page read and write
5B9E000
stack
page read and write
14AE3860000
heap
page read and write
3509000
trusted library allocation
page read and write
2F0067E000
stack
page read and write
20C9DE59000
unkown
page read and write
3379000
trusted library allocation
page read and write
24428059000
unkown
page read and write
14AE3A76000
unkown
page read and write
30B0000
trusted library allocation
page read and write
3530000
heap
page read and write
20C7986A000
unkown
page read and write
1C29CFE5000
heap
page read and write
4B90000
heap
page read and write
334E000
heap
page read and write
20C9E792000
unkown
page read and write
1720000
trusted library allocation
page read and write
343F000
trusted library allocation
page read and write
334E000
heap
page read and write
1FE7EC4F000
unkown
page read and write
3567000
trusted library allocation
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
53B3000
trusted library allocation
page read and write
34DA000
heap
page read and write
3424000
trusted library allocation
page read and write
5A9E000
stack
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
53CD000
trusted library allocation
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
3271000
trusted library allocation
page read and write
2E9017F000
stack
page read and write
53C8000
trusted library allocation
page read and write
248E1C61000
unkown
page read and write
334E000
heap
page read and write
29F0000
remote allocation
page read and write
3412000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
14AE9210000
unkown
page read and write
34BC000
heap
page read and write
20C9EC63000
unkown
page read and write
1344000
trusted library allocation
page read and write
3347000
heap
page read and write
148C000
heap
page read and write
334E000
heap
page read and write
14AE3A9B000
unkown
page read and write
3420000
heap
page read and write
3347000
heap
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
1410000
heap
page read and write
24428055000
unkown
page read and write
20C9DED2000
unkown
page read and write
20C79813000
unkown
page read and write
334E000
heap
page read and write
35DA000
heap
page read and write
3100000
trusted library allocation
page read and write
2CAA000
heap
page read and write
20C9DE4D000
unkown
page read and write
35E6000
trusted library allocation
page read and write
20C9E789000
unkown
page read and write
20C9E784000
unkown
page read and write
3347000
heap
page read and write
3150000
trusted library allocation
page read and write
14D0EFE000
stack
page read and write
3431000
trusted library allocation
page read and write
1C29CE12000
heap
page read and write
33BC000
trusted library allocation
page read and write
53AB000
trusted library allocation
page read and write
334E000
heap
page read and write
20C9E792000
unkown
page read and write
1C29CE0B000
heap
page read and write
1C29CFE0000
heap
page read and write
3347000
heap
page read and write
34DA000
heap
page read and write
3347000
heap
page read and write
34C1000
heap
page read and write
34FD000
heap
page read and write
3585000
trusted library allocation
page read and write
20C9E7BD000
unkown
page read and write
334E000
heap
page read and write
3100000
trusted library allocation
page read and write
3347000
heap
page read and write
30D0000
trusted library allocation
page read and write
20C7984E000
unkown
page read and write
20C9E789000
unkown
page read and write
3347000
heap
page read and write
34B6000
heap
page read and write
6AB0000
trusted library allocation
page read and write
14AE4302000
unkown
page read and write
24428100000
unkown
page read and write
5725000
heap
page read and write
3492000
heap
page read and write
5960000
trusted library allocation
page read and write
34CE000
heap
page read and write
3576000
trusted library allocation
page read and write
34EB000
heap
page read and write
24428052000
unkown
page read and write
20C9E789000
unkown
page read and write
334E000
heap
page read and write
34C8000
heap
page read and write
338C000
trusted library allocation
page read and write
1C29CB60000
heap
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
34FD000
heap
page read and write
4717000
trusted library allocation
page read and write
2CAE000
heap
page read and write
14AE9080000
trusted library allocation
page read and write
20C9E7A1000
unkown
page read and write
33D3000
trusted library allocation
page read and write
E04000
unkown
page readonly
333F000
trusted library allocation
page read and write
20C9DEF8000
unkown
page read and write
5750000
trusted library allocation
page read and write
3347000
heap
page read and write
334E000
heap
page read and write
20C9DF08000
unkown
page read and write
334E000
heap
page read and write
3347000
heap
page read and write
1FE7EC00000
unkown
page read and write
3347000
heap
page read and write
30C0000
heap
page read and write
349C000
trusted library allocation
page read and write
334E000
heap
page read and write
20C9E71B000
unkown
page read and write
187C8F05000
heap
page read and write
34EB000
heap
page read and write
53D5000
trusted library allocation
page read and write
3347000
heap
page read and write
6BE4000
trusted library allocation
page read and write
20C9DC30000
heap
page read and write
20C9E7C3000
unkown
page read and write
14AE9300000
unkown
page read and write
20C7984B000
unkown
page read and write
34DB000
trusted library allocation
page read and write
20C9EC02000
unkown
page read and write
14AE4801000
trusted library allocation
page read and write
24428088000
unkown
page read and write
3347000
heap
page read and write
2F70000
unkown
page readonly
334E000
heap
page read and write
30B0000
trusted library allocation
page read and write
3347000
heap
page read and write
14AE4820000
trusted library allocation
page read and write
1C29CCC0000
heap
page read and write
48E000
remote allocation
page execute and read and write
3394000
trusted library allocation
page read and write
2CAA000
heap
page read and write
34CD000
heap
page read and write
3100000
trusted library allocation
page read and write
20C7A002000
unkown
page read and write
2CAE000
heap
page read and write
14AE3A99000
unkown
page read and write
20C9DEA7000
unkown
page read and write
334E000
heap
page read and write
299C000
stack
page read and write
351E000
trusted library allocation
page read and write
20C9E782000
unkown
page read and write
248E1F13000
unkown
page read and write
4832000
trusted library allocation
page read and write
33D5000
trusted library allocation
page read and write
3347000
heap
page read and write
34F2000
trusted library allocation
page read and write
341A000
trusted library allocation
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
3591000
trusted library allocation
page read and write
14AE3B13000
unkown
page read and write
33AD000
trusted library allocation
page read and write
3511000
trusted library allocation
page read and write
34C0000
trusted library allocation
page read and write
32FA000
trusted library allocation
page read and write
3353000
trusted library allocation
page read and write
3367000
trusted library allocation
page read and write
32BF000
trusted library allocation
page read and write
3347000
heap
page read and write
35E8000
trusted library allocation
page read and write
E89A6F8000
stack
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
20C9E71B000
unkown
page read and write
3420000
trusted library allocation
page read and write
244285A0000
unkown
page read and write
3347000
heap
page read and write
20C9DE58000
unkown
page read and write
3558000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
14AE4359000
unkown
page read and write
187C8F8A000
heap
page read and write
334E000
heap
page read and write
334E000
heap
page read and write
20C9DEE9000
unkown
page read and write
5660000
remote allocation
page read and write
5728000
heap
page read and write
52F0000
trusted library allocation
page read and write
34FB000
trusted library allocation
page read and write
33F7000
trusted library allocation
page read and write
3347000
heap
page read and write
3347000
heap
page read and write
334E000
heap
page read and write
51F1000
heap
page read and write
3170000
trusted library allocation
page read and write
3400000
heap
page read and write
32EB000
trusted library allocation
page read and write
35EF000
trusted library allocation
page read and write
334E000
heap
page read and write
20C9E790000
unkown
page read and write
3347000
heap
page read and write
E18000
unkown
page readonly
32D0000
trusted library allocation
page read and write
13AE000
stack
page read and write
33AF000
trusted library allocation
page read and write
33DA000
trusted library allocation
page read and write
42B4000
trusted library allocation
page read and write
350F000
trusted library allocation
page read and write
335F000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
534A000
trusted library allocation
page read and write
20C9E790000
unkown
page read and write
32E9000
trusted library allocation
page read and write
33C7000
trusted library allocation
page read and write
334B000
trusted library allocation
page read and write
D10000
unkown
page readonly
There are 1661 hidden memdumps, click here to show them.