IOC Report
qjrOWCCE58

loading gif

Files

File Path
Type
Category
Malicious
qjrOWCCE58.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_qjrOWCCE58.exe_455362eeffb32f0bf40f06cd73c56872c5d9440_dba93c7d_0c0c0928\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_qjrOWCCE58.exe_455362eeffb32f0bf40f06cd73c56872c5d9440_dba93c7d_10d822ca\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_qjrOWCCE58.exe_455362eeffb32f0bf40f06cd73c56872c5d9440_dba93c7d_1167fbca\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_qjrOWCCE58.exe_455362eeffb32f0bf40f06cd73c56872c5d9440_dba93c7d_12a3eeab\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_qjrOWCCE58.exe_455362eeffb32f0bf40f06cd73c56872c5d9440_dba93c7d_12a4344f\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_qjrOWCCE58.exe_455362eeffb32f0bf40f06cd73c56872c5d9440_dba93c7d_181043fe\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_qjrOWCCE58.exe_455362eeffb32f0bf40f06cd73c56872c5d9440_dba93c7d_19545302\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1DD9.tmp.dmp
Mini DuMP crash report, 14 streams, Thu May 5 12:40:26 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER20D7.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER21C3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2CBD.tmp.dmp
Mini DuMP crash report, 14 streams, Thu May 5 12:40:29 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER30D5.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER329B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER38A.tmp.dmp
Mini DuMP crash report, 14 streams, Thu May 5 12:40:19 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3EED.tmp.dmp
Mini DuMP crash report, 14 streams, Thu May 5 12:40:34 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER41DC.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4306.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4C2C.tmp.dmp
Mini DuMP crash report, 14 streams, Thu May 5 12:40:38 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5015.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER51AC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER63B.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER774.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE842.tmp.dmp
Mini DuMP crash report, 14 streams, Thu May 5 12:40:12 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WEREC5A.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERED84.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF726.tmp.dmp
Mini DuMP crash report, 14 streams, Thu May 5 12:40:16 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF9A8.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERFAD2.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
There are 19 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\qjrOWCCE58.exe
"C:\Users\user\Desktop\qjrOWCCE58.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 656
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 772
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 796
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 628
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 900
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 908
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 916
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c taskkill /im "qjrOWCCE58.exe" /f & erase "C:\Users\user\Desktop\qjrOWCCE58.exe" & exit
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\taskkill.exe
taskkill /im "qjrOWCCE58.exe" /f
There are 1 hidden processes, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
\REGISTRY\A\{4fd15eff-38dc-1bed-78ce-61b9ff404261}\Root\InventoryApplicationFile\qjrowcce58.exe|2dcf57a5
ProgramId
\REGISTRY\A\{4fd15eff-38dc-1bed-78ce-61b9ff404261}\Root\InventoryApplicationFile\qjrowcce58.exe|2dcf57a5
FileId
\REGISTRY\A\{4fd15eff-38dc-1bed-78ce-61b9ff404261}\Root\InventoryApplicationFile\qjrowcce58.exe|2dcf57a5
LowerCaseLongPath
\REGISTRY\A\{4fd15eff-38dc-1bed-78ce-61b9ff404261}\Root\InventoryApplicationFile\qjrowcce58.exe|2dcf57a5
LongPathHash
\REGISTRY\A\{4fd15eff-38dc-1bed-78ce-61b9ff404261}\Root\InventoryApplicationFile\qjrowcce58.exe|2dcf57a5
Name
\REGISTRY\A\{4fd15eff-38dc-1bed-78ce-61b9ff404261}\Root\InventoryApplicationFile\qjrowcce58.exe|2dcf57a5
Publisher
\REGISTRY\A\{4fd15eff-38dc-1bed-78ce-61b9ff404261}\Root\InventoryApplicationFile\qjrowcce58.exe|2dcf57a5
Version
\REGISTRY\A\{4fd15eff-38dc-1bed-78ce-61b9ff404261}\Root\InventoryApplicationFile\qjrowcce58.exe|2dcf57a5
BinFileVersion
\REGISTRY\A\{4fd15eff-38dc-1bed-78ce-61b9ff404261}\Root\InventoryApplicationFile\qjrowcce58.exe|2dcf57a5
BinaryType
\REGISTRY\A\{4fd15eff-38dc-1bed-78ce-61b9ff404261}\Root\InventoryApplicationFile\qjrowcce58.exe|2dcf57a5
ProductName
\REGISTRY\A\{4fd15eff-38dc-1bed-78ce-61b9ff404261}\Root\InventoryApplicationFile\qjrowcce58.exe|2dcf57a5
ProductVersion
\REGISTRY\A\{4fd15eff-38dc-1bed-78ce-61b9ff404261}\Root\InventoryApplicationFile\qjrowcce58.exe|2dcf57a5
LinkDate
\REGISTRY\A\{4fd15eff-38dc-1bed-78ce-61b9ff404261}\Root\InventoryApplicationFile\qjrowcce58.exe|2dcf57a5
BinProductVersion
\REGISTRY\A\{4fd15eff-38dc-1bed-78ce-61b9ff404261}\Root\InventoryApplicationFile\qjrowcce58.exe|2dcf57a5
Size
\REGISTRY\A\{4fd15eff-38dc-1bed-78ce-61b9ff404261}\Root\InventoryApplicationFile\qjrowcce58.exe|2dcf57a5
Language
\REGISTRY\A\{4fd15eff-38dc-1bed-78ce-61b9ff404261}\Root\InventoryApplicationFile\qjrowcce58.exe|2dcf57a5
IsPeFile
\REGISTRY\A\{4fd15eff-38dc-1bed-78ce-61b9ff404261}\Root\InventoryApplicationFile\qjrowcce58.exe|2dcf57a5
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
unkown
page execute and read and write
malicious
820000
direct allocation
page execute and read and write
malicious
820000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
820000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
820000
direct allocation
page execute and read and write
malicious
820000
direct allocation
page execute and read and write
malicious
820000
direct allocation
page execute and read and write
malicious
860000
direct allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
820000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
820000
direct allocation
page execute and read and write
malicious
820000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
820000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
820000
direct allocation
page execute and read and write
malicious
820000
direct allocation
page execute and read and write
malicious
820000
direct allocation
page execute and read and write
malicious
820000
direct allocation
page execute and read and write
malicious
820000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
2ACFBE88000
heap
page read and write
26F37DB6000
heap
page read and write
251456F5000
heap
page read and write
81F000
stack
page read and write
251456A6000
heap
page read and write
27724C4B000
heap
page read and write
451000
unkown
page read and write
563000
heap
page execute and read and write
48F000
unkown
page read and write
26F37E50000
heap
page read and write
211F8340000
heap
page read and write
9C000
stack
page read and write
198000
stack
page read and write
25140000000
heap
page read and write
27AD000
stack
page read and write
2DFF000
stack
page read and write
27724C7A000
heap
page read and write
27724CAC000
heap
page read and write
5B2000
heap
page read and write
A80000
heap
page read and write
9044EFB000
stack
page read and write
2B7D000
stack
page read and write
2760000
heap
page read and write
20059ABB000
heap
page read and write
589000
heap
page read and write
1F0000
trusted library allocation
page read and write
52E000
stack
page read and write
9C000
stack
page read and write
880000
heap
page read and write
4E5000
heap
page read and write
4E5000
heap
page read and write
5C3B18F000
stack
page read and write
25145614000
heap
page read and write
4C5537B000
stack
page read and write
81F000
stack
page read and write
21568C70000
heap
page read and write
778000
heap
page read and write
13658A53000
heap
page read and write
26F37F80000
heap
page read and write
1E53C380000
heap
page read and write
25140815000
heap
page read and write
211F8467000
heap
page read and write
5B2000
heap
page read and write
2ACFBE2A000
heap
page read and write
27724C70000
heap
page read and write
27724B70000
heap
page read and write
27725586000
heap
page read and write
265D000
stack
page read and write
2DFF000
stack
page read and write
870000
heap
page read and write
26F37E4E000
heap
page read and write
198000
stack
page read and write
277255B6000
heap
page read and write
4E0000
heap
page read and write
492000
unkown
page readonly
28ED000
stack
page read and write
25145544000
trusted library allocation
page read and write
28ED000
stack
page read and write
880000
heap
page read and write
2B3E000
stack
page read and write
27725A02000
heap
page read and write
D947FFC000
stack
page read and write
2513FFC0000
trusted library allocation
page read and write
1F0000
trusted library allocation
page read and write
589000
heap
page read and write
563000
heap
page execute and read and write
2513FEC0000
heap
page read and write
78C72FD000
stack
page read and write
27725588000
heap
page read and write
4DE000
stack
page read and write
19CC7D80000
trusted library allocation
page read and write
27725A02000
heap
page read and write
451000
unkown
page read and write
19CC8602000
trusted library allocation
page read and write
277255B6000
heap
page read and write
211F8C02000
trusted library allocation
page read and write
2B7D000
stack
page read and write
8E8757B000
stack
page read and write
451000
unkown
page read and write
20059A00000
heap
page read and write
2DBF000
stack
page read and write
2B3E000
stack
page read and write
1E53C390000
heap
page read and write
2772556E000
heap
page read and write
904507B000
stack
page read and write
451000
unkown
page read and write
2B40000
remote allocation
page read and write
2CBF000
stack
page read and write
29EE000
stack
page read and write
19CC7E54000
heap
page read and write
20059A30000
heap
page read and write
F0B00FB000
stack
page read and write
2DBE000
stack
page read and write
25140918000
heap
page read and write
19CC7F02000
heap
page read and write
25140078000
heap
page read and write
81F000
stack
page read and write
211F843B000
heap
page read and write
9BF000
stack
page read and write
5A2000
heap
page read and write
2C7E000
stack
page read and write
4E0000
heap
page read and write
27724CEB000
heap
page read and write
55A000
heap
page read and write
25141010000
trusted library section
page readonly
78C6E7E000
stack
page read and write
26F37D70000
heap
page read and write
25145655000
heap
page read and write
451000
unkown
page read and write
275E000
stack
page read and write
25145880000
remote allocation
page read and write
9045177000
stack
page read and write
9BF000
stack
page read and write
5A2000
heap
page read and write
26F37D78000
heap
page read and write
277255A5000
heap
page read and write
5A2000
heap
page read and write
2F00000
remote allocation
page read and write
211F846E000
heap
page read and write
589000
heap
page read and write
251456F7000
heap
page read and write
25170602000
heap
page read and write
789000
heap
page read and write
25140113000
heap
page read and write
1E53C413000
heap
page read and write
13658B08000
heap
page read and write
8E871DF000
stack
page read and write
27AD000
stack
page read and write
25140958000
heap
page read and write
550000
heap
page read and write
26F37E6A000
heap
page read and write
441000
unkown
page write copy
1E53C43C000
heap
page read and write
1D9C51CE000
heap
page read and write
21568F13000
heap
page read and write
25140056000
heap
page read and write
880000
heap
page read and write
52E000
stack
page read and write
30000
unkown
page read and write
2760000
heap
page read and write
2514009D000
heap
page read and write
870000
heap
page read and write
8B0000
heap
page read and write
2514552E000
trusted library allocation
page read and write
28AE000
stack
page read and write
5C15AFF000
stack
page read and write
5C158FF000
stack
page read and write
9C000
stack
page read and write
5A2000
heap
page read and write
211F8413000
heap
page read and write
2C7E000
stack
page read and write
25170420000
heap
page read and write
52E000
stack
page read and write
55A000
heap
page read and write
27725A02000
heap
page read and write
880000
heap
page read and write
277255A5000
heap
page read and write
2772556E000
heap
page read and write
F0AFEF7000
stack
page read and write
30000
unkown
page read and write
492000
unkown
page readonly
880000
heap
page read and write
26F37DD5000
heap
page read and write
19CC7E5E000
heap
page read and write
492000
unkown
page readonly
2DBF000
stack
page read and write
9044B7E000
stack
page read and write
26F387A0000
heap
page read and write
870000
heap
page read and write
A8397D000
stack
page read and write
5C15277000
stack
page read and write
2C7E000
stack
page read and write
880000
heap
page read and write
25140913000
heap
page read and write
13658A76000
heap
page read and write
441000
unkown
page write copy
D9480FF000
stack
page read and write
8B0000
heap
page read and write
27725586000
heap
page read and write
4E5000
heap
page read and write
1D9C51C1000
heap
page read and write
997DDFC000
stack
page read and write
29EE000
stack
page read and write
265D000
stack
page read and write
27725582000
heap
page read and write
251456D9000
heap
page read and write
211F83A0000
heap
page read and write
2B40000
remote allocation
page read and write
4C5507C000
stack
page read and write
1D9C51B6000
heap
page read and write
26F37E50000
heap
page read and write
27725581000
heap
page read and write
D9482FD000
stack
page read and write
5B2000
heap
page read and write
26F38430000
remote allocation
page read and write
F0AF9BE000
stack
page read and write
27725A62000
heap
page read and write
1D9C51B1000
heap
page read and write
2B3E000
stack
page read and write
48F000
unkown
page read and write
441000
unkown
page write copy
28324E02000
trusted library allocation
page read and write
9C000
stack
page read and write
451000
unkown
page read and write
5C767B000
stack
page read and write
451000
unkown
page read and write
27725A00000
heap
page read and write
211F843D000
heap
page read and write
27725330000
trusted library allocation
page read and write
26F37E03000
heap
page read and write
2F00000
remote allocation
page read and write
4E0000
heap
page read and write
1E53C400000
heap
page read and write
251705B0000
remote allocation
page read and write
4DE000
stack
page read and write
21568E02000
heap
page read and write
1E53C502000
heap
page read and write
29EE000
stack
page read and write
2772554F000
heap
page read and write
2760000
trusted library allocation
page read and write
283247E0000
trusted library allocation
page read and write
2EFE000
stack
page read and write
997DCFB000
stack
page read and write
2EFF000
stack
page read and write
27725581000
heap
page read and write
28C0000
remote allocation
page read and write
27724C51000
heap
page read and write
F0AFD7B000
stack
page read and write
8B0000
heap
page read and write
28AE000
stack
page read and write
DD3487D000
stack
page read and write
27725570000
heap
page read and write
770000
heap
page read and write
26F37E63000
heap
page read and write
55A000
heap
page read and write
27724CDA000
heap
page read and write
2EFF000
stack
page read and write
200599E0000
heap
page read and write
F0AF93C000
stack
page read and write
277255A6000
heap
page read and write
25145880000
remote allocation
page read and write
26F37E4E000
heap
page read and write
251456A3000
heap
page read and write
26F37DB6000
heap
page read and write
5B2000
heap
page read and write
1E53C508000
heap
page read and write
D9483FF000
stack
page read and write
EF2E3FE000
stack
page read and write
5C154FA000
stack
page read and write
4E0000
heap
page read and write
2ACFBF02000
heap
page read and write
265D000
stack
page read and write
25140FD0000
trusted library section
page readonly
2DFD000
stack
page read and write
1D9C51C6000
heap
page read and write
4E0000
heap
page read and write
5C157FF000
stack
page read and write
28324913000
heap
page read and write
880000
heap
page read and write
2A3D000
stack
page read and write
29EE000
stack
page read and write
9BF000
stack
page read and write
570000
unkown
page readonly
21568E56000
heap
page read and write
550000
heap
page read and write
9C000
stack
page read and write
55A000
heap
page read and write
492000
unkown
page readonly
9C000
stack
page read and write
A80000
heap
page read and write
27724D02000
heap
page read and write
25145670000
trusted library allocation
page read and write
265D000
stack
page read and write
F0B047C000
stack
page read and write
19CC7C80000
heap
page read and write
27725A02000
heap
page read and write
550000
heap
page read and write
211F845C000
heap
page read and write
F0B037E000
unkown
page read and write
25140073000
heap
page read and write
13658A71000
heap
page read and write
441000
unkown
page write copy
199000
stack
page read and write
8B0000
heap
page read and write
27725596000
heap
page read and write
25140EE0000
trusted library allocation
page read and write
DD3467C000
stack
page read and write
27725B02000
heap
page read and write
277255A5000
heap
page read and write
789000
heap
page read and write
30000
unkown
page read and write
27725574000
heap
page read and write
2C7E000
stack
page read and write
9044BFE000
stack
page read and write
27AD000
stack
page read and write
2B3E000
stack
page read and write
1E53CB50000
trusted library allocation
page read and write
2F00000
remote allocation
page read and write
48F000
unkown
page read and write
211F8465000
heap
page read and write
1D9C51AB000
heap
page read and write
211F8440000
heap
page read and write
25145860000
trusted library allocation
page read and write
8B0000
heap
page read and write
5A2000
heap
page read and write
251705B0000
remote allocation
page read and write
277253F0000
remote allocation
page read and write
27724C81000
heap
page read and write
55A000
heap
page read and write
1D9C51C0000
heap
page read and write
B42000
heap
page read and write
27AD000
stack
page read and write
5A2000
heap
page read and write
1D9C5160000
heap
page read and write
5A2000
heap
page read and write
26F37E0D000
heap
page read and write
19CC7E29000
heap
page read and write
589000
heap
page read and write
27725599000
heap
page read and write
A80000
heap
page read and write
2832486C000
heap
page read and write
30000
unkown
page read and write
198000
stack
page read and write
211F8478000
heap
page read and write
52E000
stack
page read and write
2ACFC602000
heap
page read and write
78C707D000
stack
page read and write
81F000
stack
page read and write
550000
heap
page read and write
25145600000
heap
page read and write
589000
heap
page read and write
30000
heap
page read and write
451000
unkown
page read and write
28324902000
heap
page read and write
277255A5000
heap
page read and write
1E53C3F0000
heap
page read and write
29EE000
stack
page read and write
2513FE60000
heap
page read and write
997DEFE000
stack
page read and write
1D9C51C1000
heap
page read and write
8E875FE000
stack
page read and write
2B40000
remote allocation
page read and write
B40000
heap
page read and write
27724C13000
heap
page read and write
48F000
unkown
page read and write
198000
stack
page read and write
2A3D000
stack
page read and write
28AE000
stack
page read and write
25145390000
trusted library allocation
page read and write
8B0000
heap
page read and write
27725596000
heap
page read and write
211F8431000
heap
page read and write
13658B00000
heap
page read and write
4DE000
stack
page read and write
2760000
heap
page read and write
48F000
unkown
page read and write
13658A4C000
heap
page read and write
27725581000
heap
page read and write
B46000
heap
page read and write
5C3B4FF000
stack
page read and write
2780000
remote allocation
page read and write
563000
heap
page execute and read and write
4DE000
stack
page read and write
2ACFBE44000
heap
page read and write
27725586000
heap
page read and write
880000
heap
page read and write
904527E000
stack
page read and write
589000
heap
page read and write
25170625000
heap
page read and write
25145550000
trusted library allocation
page read and write
1E53C48A000
heap
page read and write
5B2000
heap
page read and write
441000
unkown
page write copy
277255A5000
heap
page read and write
2ACFBF13000
heap
page read and write
4E0000
heap
page read and write
19CC7E13000
heap
page read and write
A80000
heap
page read and write
25140029000
heap
page read and write
1E53C42A000
heap
page read and write
A8314D000
stack
page read and write
25140FE0000
trusted library section
page readonly
27725B00000
heap
page read and write
27AD000
stack
page read and write
26F38430000
remote allocation
page read and write
5C3B08A000
stack
page read and write
19CC7E00000
heap
page read and write
441000
unkown
page write copy
265D000
stack
page read and write
277255BB000
heap
page read and write
630000
heap
page read and write
55A000
heap
page read and write
81F000
stack
page read and write
550000
heap
page read and write
48F000
unkown
page read and write
21568F02000
heap
page read and write
55A000
heap
page read and write
27725581000
heap
page read and write
9BF000
stack
page read and write
28AE000
stack
page read and write
4DE000
stack
page read and write
2B3E000
stack
page read and write
4C555FE000
stack
page read and write
981000
trusted library allocation
page read and write
451000
unkown
page read and write
21568E64000
heap
page read and write
198000
stack
page read and write
492000
unkown
page readonly
2772556E000
heap
page read and write
52E000
stack
page read and write
2760000
heap
page read and write
25170629000
heap
page read and write
550000
heap
page read and write
2A3E000
stack
page read and write
52E000
stack
page read and write
4E0000
heap
page read and write
8B0000
heap
page read and write
27724C4C000
heap
page read and write
25145400000
trusted library allocation
page read and write
EF2E27E000
stack
page read and write
265D000
stack
page read and write
30000
unkown
page read and write
870000
heap
page read and write
2DFF000
stack
page read and write
5B2000
heap
page read and write
2760000
heap
page read and write
880000
heap
page read and write
25170410000
heap
page read and write
20059AB0000
heap
page read and write
4E5000
heap
page read and write
2B7D000
stack
page read and write
27725581000
heap
page read and write
2A3D000
stack
page read and write
27725B02000
heap
page read and write
52E000
stack
page read and write
DD33CAB000
stack
page read and write
27725B19000
heap
page read and write
4DE000
stack
page read and write
2513FFD0000
trusted library section
page read and write
27725582000
heap
page read and write
55A000
heap
page read and write
563000
heap
page execute and read and write
275E000
stack
page read and write
550000
heap
page read and write
30000
unkown
page read and write
19CC7C20000
heap
page read and write
26F37E0D000
heap
page read and write
4E0000
heap
page read and write
275E000
stack
page read and write
265D000
stack
page read and write
19CC7E63000
heap
page read and write
48F000
unkown
page read and write
2EFC000
stack
page read and write
492000
unkown
page readonly
26F37CF0000
heap
page read and write
30000
unkown
page read and write
DD340FB000
stack
page read and write
78C694B000
stack
page read and write
8E8715E000
stack
page read and write
2C7E000
stack
page read and write
211F8502000
heap
page read and write
DD3427E000
stack
page read and write
25140102000
heap
page read and write
26F37F75000
heap
page read and write
4E5000
heap
page read and write
2772559E000
heap
page read and write
4E0000
heap
page read and write
27725B02000
heap
page read and write
1D9C51CE000
heap
page read and write
1D9C51C1000
heap
page read and write
30000
unkown
page read and write
9BF000
stack
page read and write
880000
heap
page read and write
275E000
stack
page read and write
5B2000
heap
page read and write
2DFD000
stack
page read and write
589000
heap
page read and write
5C155FE000
stack
page read and write
5C3B479000
stack
page read and write
2ACFBD60000
heap
page read and write
2ACFC732000
heap
page read and write
492000
unkown
page readonly
2772556E000
heap
page read and write
27725596000
heap
page read and write
451000
unkown
page read and write
9C000
stack
page read and write
1D9C51C4000
heap
page read and write
5B2000
heap
page read and write
55A000
heap
page read and write
997D9DE000
stack
page read and write
30000
unkown
page read and write
1F0000
trusted library allocation
page read and write
28AE000
stack
page read and write
265D000
stack
page read and write
211F846C000
heap
page read and write
28AE000
stack
page read and write
401000
unkown
page execute read
25140A01000
trusted library allocation
page read and write
25145684000
heap
page read and write
5A2000
heap
page read and write
81F000
stack
page read and write
27725586000
heap
page read and write
441000
unkown
page write copy
55A000
heap
page read and write
1D9C5010000
heap
page read and write
211F8444000
heap
page read and write
D947D7B000
stack
page read and write
13658A13000
heap
page read and write
26F37DEA000
heap
page read and write
81F000
stack
page read and write
5A2000
heap
page read and write
9BF000
stack
page read and write
25141380000
trusted library allocation
page read and write
275E000
stack
page read and write
9BF000
stack
page read and write
9BF000
stack
page read and write
5C1577E000
stack
page read and write
5B2000
heap
page read and write
A80000
heap
page read and write
EF2E4FE000
stack
page read and write
A80000
heap
page read and write
5C15A7E000
stack
page read and write
9C000
stack
page read and write
1F0000
trusted library allocation
page read and write
870000
heap
page read and write
1E53C513000
heap
page read and write
870000
heap
page read and write
880000
heap
page read and write
26F37E50000
heap
page read and write
870000
heap
page read and write
26F37E4E000
heap
page read and write
492000
unkown
page readonly
13658A4E000
heap
page read and write
F0B01FF000
stack
page read and write
27724CA5000
heap
page read and write
26F37E01000
heap
page read and write
211F846A000
heap
page read and write
27725402000
heap
page read and write
2772556E000
heap
page read and write
451000
unkown
page read and write
25145520000
trusted library allocation
page read and write
13658A00000
heap
page read and write
2B3E000
stack
page read and write
78C71FD000
stack
page read and write
9BF000
stack
page read and write
19CC7E68000
heap
page read and write
2517063D000
heap
page read and write
600000
trusted library allocation
page read and write
48F000
unkown
page read and write
880000
heap
page read and write
1E53C47D000
heap
page read and write
27725A02000
heap
page read and write
880000
heap
page read and write
D9481FE000
stack
page read and write
211F8463000
heap
page read and write
9BF000
stack
page read and write
29EE000
stack
page read and write
9C000
stack
page read and write
28AE000
stack
page read and write
5A2000
heap
page read and write
52E000
stack
page read and write
211F847C000
heap
page read and write
580000
unkown
page read and write
29EE000
stack
page read and write
21568E79000
heap
page read and write
25140013000
heap
page read and write
2DBE000
stack
page read and write
4E5000
heap
page read and write
13658930000
heap
page read and write
1D9C51DD000
heap
page read and write
27724CB2000
heap
page read and write
26F387B4000
heap
page read and write
1F0000
trusted library allocation
page read and write
2F00000
remote allocation
page read and write
52E000
stack
page read and write
997D8DA000
stack
page read and write
5C3B5F9000
stack
page read and write
A83777000
stack
page read and write
563000
heap
page execute and read and write
25170702000
heap
page read and write
A80000
heap
page read and write
277255A3000
heap
page read and write
27724C00000
heap
page read and write
8E870DC000
stack
page read and write
28ED000
stack
page read and write
D9486FF000
stack
page read and write
25145564000
trusted library allocation
page read and write
28324848000
heap
page read and write
1F0000
heap
page read and write
580000
unkown
page read and write
25145520000
trusted library allocation
page read and write
870000
heap
page read and write
25140075000
heap
page read and write
5C15EFE000
stack
page read and write
81F000
stack
page read and write
5C7AF7000
stack
page read and write
27725586000
heap
page read and write
1D9C5140000
heap
page read and write
28324813000
heap
page read and write
211F845A000
heap
page read and write
277255A5000
heap
page read and write
1F0000
trusted library allocation
page read and write
580000
unkown
page read and write
81F000
stack
page read and write
2A3E000
stack
page read and write
2514564C000
heap
page read and write
492000
unkown
page readonly
A8387F000
stack
page read and write
52E000
stack
page read and write
5B2000
heap
page read and write
28AE000
stack
page read and write
2514003F000
heap
page read and write
27AD000
stack
page read and write
589000
heap
page read and write
DD3497F000
stack
page read and write
55A000
heap
page read and write
277255A5000
heap
page read and write
492000
unkown
page readonly
2ACFBE00000
heap
page read and write
5A2000
heap
page read and write
2B3F000
stack
page read and write
136589A0000
heap
page read and write
27725511000
heap
page read and write
25140959000
heap
page read and write
25170E02000
trusted library allocation
page read and write
52E000
stack
page read and write
8B0000
heap
page read and write
2780000
remote allocation
page read and write
550000
heap
page read and write
5A2000
heap
page read and write
8B0000
heap
page read and write
5C78FE000
stack
page read and write
4DE000
stack
page read and write
1E53C449000
heap
page read and write
27725594000
heap
page read and write
277253F0000
remote allocation
page read and write
2CBF000
stack
page read and write
27724C52000
heap
page read and write
30000
unkown
page read and write
25145880000
remote allocation
page read and write
1D9C51C7000
heap
page read and write
26F387A2000
heap
page read and write
48F000
unkown
page read and write
2DFF000
stack
page read and write
26F37DFC000
heap
page read and write
4E5000
heap
page read and write
28C0000
remote allocation
page read and write
211F843A000
heap
page read and write
1E53C470000
heap
page read and write
27725581000
heap
page read and write
30000
unkown
page read and write
441000
unkown
page write copy
81F000
stack
page read and write
27724CB6000
heap
page read and write
55A000
heap
page read and write
1F0000
trusted library allocation
page read and write
589000
heap
page read and write
198000
stack
page read and write
492000
unkown
page readonly
55A000
heap
page read and write
27724C3C000
heap
page read and write
19CC7E88000
heap
page read and write
251456E0000
heap
page read and write
563000
heap
page execute and read and write
78C70FF000
stack
page read and write
28324862000
heap
page read and write
4DE000
stack
page read and write
275E000
stack
page read and write
136589D0000
trusted library allocation
page read and write
277255C9000
heap
page read and write
2514009F000
heap
page read and write
2514561E000
heap
page read and write
21568E3C000
heap
page read and write
27AD000
stack
page read and write
13658A29000
heap
page read and write
27724C29000
heap
page read and write
8B0000
heap
page read and write
25145528000
trusted library allocation
page read and write
492000
unkown
page readonly
4E5000
heap
page read and write
8B0000
heap
page read and write
1D9C51DC000
heap
page read and write
277255A5000
heap
page read and write
563000
heap
page execute and read and write
25140900000
heap
page read and write
D94790B000
stack
page read and write
DD3437E000
stack
page read and write
19CC7E3C000
heap
page read and write
251400AE000
heap
page read and write
25170580000
trusted library allocation
page read and write
26F37DF7000
heap
page read and write
30000
unkown
page read and write
2ACFBDC0000
heap
page read and write
13659202000
trusted library allocation
page read and write
5B2000
heap
page read and write
2772558A000
heap
page read and write
28ED000
stack
page read and write
251705B0000
remote allocation
page read and write
78C6F7E000
stack
page read and write
277255A5000
heap
page read and write
198000
stack
page read and write
283245B0000
heap
page read and write
199000
stack
page read and write
2EFF000
stack
page read and write
4DE000
stack
page read and write
9C000
stack
page read and write
2DBE000
stack
page read and write
81F000
stack
page read and write
28AE000
stack
page read and write
880000
heap
page read and write
570000
unkown
page readonly
211F844E000
heap
page read and write
25145830000
trusted library allocation
page read and write
A8357F000
stack
page read and write
27725586000
heap
page read and write
D947EFF000
stack
page read and write
21568E68000
heap
page read and write
5C1587F000
stack
page read and write
27724D13000
heap
page read and write
B46000
heap
page read and write
2CBD000
stack
page read and write
275E000
stack
page read and write
A80000
heap
page read and write
2760000
heap
page read and write
52E000
stack
page read and write
21568C10000
heap
page read and write
2B3E000
stack
page read and write
2CBD000
stack
page read and write
81F000
stack
page read and write
4E0000
heap
page read and write
28AE000
stack
page read and write
26F37F40000
heap
page read and write
B46000
heap
page read and write
21568E13000
heap
page read and write
4C5547F000
stack
page read and write
25141000000
trusted library section
page readonly
28324875000
heap
page read and write
589000
heap
page read and write
1E53C402000
heap
page read and write
25145687000
heap
page read and write
21568F00000
heap
page read and write
19CC7E80000
heap
page read and write
26F387A3000
heap
page read and write
27724C4A000
heap
page read and write
441000
unkown
page write copy
4E5000
heap
page read and write
275E000
stack
page read and write
265D000
stack
page read and write
277255A5000
heap
page read and write
5C7CFE000
stack
page read and write
1F0000
trusted library allocation
page read and write
25140902000
heap
page read and write
589000
heap
page read and write
26F37E4E000
heap
page read and write
4E0000
heap
page read and write
265D000
stack
page read and write
275E000
stack
page read and write
2EFF000
stack
page read and write
2CBD000
stack
page read and write
251456F7000
heap
page read and write
27AD000
stack
page read and write
5B2000
heap
page read and write
441000
unkown
page write copy
2ACFBDF0000
trusted library allocation
page read and write
1D9C51CE000
heap
page read and write
5C7BFF000
stack
page read and write
211F8457000
heap
page read and write
251456F1000
heap
page read and write
20059A35000
heap
page read and write
4E0000
heap
page read and write
2A3D000
stack
page read and write
5C156FB000
stack
page read and write
880000
heap
page read and write
5A2000
heap
page read and write
A80000
heap
page read and write
48F000
unkown
page read and write
25145662000
heap
page read and write
211F845F000
heap
page read and write
560000
unkown
page readonly
5C153FB000
stack
page read and write
275E000
stack
page read and write
277255C6000
heap
page read and write
199000
stack
page read and write
2EFE000
stack
page read and write
2760000
heap
page read and write
A80000
heap
page read and write
20059ADF000
heap
page read and write
1F0000
trusted library allocation
page read and write
2514008B000
heap
page read and write
2ACFC700000
heap
page read and write
451000
unkown
page read and write
2760000
heap
page read and write
1F0000
trusted library allocation
page read and write
52E000
stack
page read and write
96F000
stack
page read and write
265D000
stack
page read and write
441000
unkown
page write copy
55A000
heap
page read and write
441000
unkown
page write copy
52E000
stack
page read and write
19CC7C10000
heap
page read and write
870000
heap
page read and write
4E5000
heap
page read and write
F0AFC7E000
stack
page read and write
8B0000
heap
page read and write
2ACFBE6D000
heap
page read and write
28ED000
stack
page read and write
A831CF000
stack
page read and write
45D000
stack
page read and write
4DE000
stack
page read and write
589000
heap
page read and write
19CC7E59000
heap
page read and write
2A3D000
stack
page read and write
25141361000
trusted library allocation
page read and write
9BF000
stack
page read and write
2B7D000
stack
page read and write
21569602000
trusted library allocation
page read and write
9BF000
stack
page read and write
26F37E6A000
heap
page read and write
277255A5000
heap
page read and write
26F37E0D000
heap
page read and write
560000
unkown
page readonly
29EE000
stack
page read and write
277255A5000
heap
page read and write
25145410000
trusted library allocation
page read and write
78C6CFF000
stack
page read and write
F0AFDFE000
stack
page read and write
211F8445000
heap
page read and write
13658B13000
heap
page read and write
27725A02000
heap
page read and write
27724C4F000
heap
page read and write
25170613000
heap
page read and write
2772556E000
heap
page read and write
19CC7E5B000
heap
page read and write
251407F3000
trusted library allocation
page read and write
550000
heap
page read and write
26F37DD5000
heap
page read and write
4E5000
heap
page read and write
25140918000
heap
page read and write
26F387B4000
heap
page read and write
13658B02000
heap
page read and write
2ACFBE13000
heap
page read and write
1E53C500000
heap
page read and write
26F37E6A000
heap
page read and write
27725586000
heap
page read and write
2514563F000
heap
page read and write
8B0000
heap
page read and write
275E000
stack
page read and write
A80000
heap
page read and write
870000
heap
page read and write
251456FC000
heap
page read and write
27725B03000
heap
page read and write
28ED000
stack
page read and write
4E5000
heap
page read and write
870000
heap
page read and write
9C000
stack
page read and write
550000
heap
page read and write
26F37E0D000
heap
page read and write
211F8460000
heap
page read and write
27725B21000
heap
page read and write
4E0000
heap
page read and write
27AD000
stack
page read and write
2F00000
remote allocation
page read and write
DD3477E000
stack
page read and write
1F0000
trusted library allocation
page read and write
81F000
stack
page read and write
251456F9000
heap
page read and write
27724CE1000
heap
page read and write
1D9C5430000
heap
page read and write
26F37DDB000
heap
page read and write
563000
heap
page execute and read and write
251407F0000
trusted library allocation
page read and write
28AE000
stack
page read and write
441000
unkown
page write copy
DD3457B000
stack
page read and write
2ACFBD50000
heap
page read and write
5B2000
heap
page read and write
D9485FF000
stack
page read and write
27725594000
heap
page read and write
870000
heap
page read and write
265D000
stack
page read and write
550000
heap
page read and write
30000
unkown
page read and write
1D9C51E4000
heap
page read and write
27725562000
heap
page read and write
550000
heap
page read and write
5A2000
heap
page read and write
78C6DFE000
stack
page read and write
21568C00000
heap
page read and write
19CC7E5C000
heap
page read and write
997DE7E000
stack
page read and write
25145560000
trusted library allocation
page read and write
25145541000
trusted library allocation
page read and write
27724C54000
heap
page read and write
5C15BFA000
stack
page read and write
25140800000
heap
page read and write
A80000
heap
page read and write
A80000
heap
page read and write
1F0000
trusted library allocation
page read and write
5B2000
heap
page read and write
1D9C51DE000
heap
page read and write
589000
heap
page read and write
19CC7F13000
heap
page read and write
52E000
stack
page read and write
25145680000
trusted library allocation
page read and write
2772556E000
heap
page read and write
997DD7C000
stack
page read and write
2A3D000
stack
page read and write
277255D0000
heap
page read and write
19CC7F08000
heap
page read and write
1D9C51C2000
heap
page read and write
4E5000
heap
page read and write
5C76FE000
stack
page read and write
9BF000
stack
page read and write
13658940000
heap
page read and write
870000
heap
page read and write
20059ABE000
heap
page read and write
27724CF3000
heap
page read and write
26F37DEA000
heap
page read and write
27725581000
heap
page read and write
275E000
stack
page read and write
25145380000
trusted library allocation
page read and write
211F8400000
heap
page read and write
A8367B000
stack
page read and write
27AD000
stack
page read and write
25140FF0000
trusted library section
page readonly
1E53C44E000
heap
page read and write
2DBE000
stack
page read and write
A830CC000
stack
page read and write
198000
stack
page read and write
277253F0000
remote allocation
page read and write
D9484FF000
stack
page read and write
283245A0000
heap
page read and write
2C7E000
stack
page read and write
27724CC2000
heap
page read and write
265D000
stack
page read and write
563000
heap
page execute and read and write
2B3F000
stack
page read and write
27724C4E000
heap
page read and write
1E53C44C000
heap
page read and write
30000
unkown
page read and write
275E000
stack
page read and write
26F37E05000
heap
page read and write
198000
stack
page read and write
563000
heap
page execute and read and write
550000
heap
page read and write
211F847F000
heap
page read and write
2832483F000
heap
page read and write
9C000
stack
page read and write
589000
heap
page read and write
26F37E6A000
heap
page read and write
28AE000
stack
page read and write
25145702000
heap
page read and write
29EE000
stack
page read and write
492000
unkown
page readonly
55D000
stack
page read and write
DD344FE000
stack
page read and write
26F387A1000
heap
page read and write
28324802000
heap
page read and write
EF2DF1B000
stack
page read and write
589000
heap
page read and write
211F8447000
heap
page read and write
9C000
stack
page read and write
26F37DB2000
heap
page read and write
1D9C51DF000
heap
page read and write
997DC7E000
stack
page read and write
570000
unkown
page readonly
DD343FC000
stack
page read and write
4DE000
stack
page read and write
5B2000
heap
page read and write
8E874FE000
stack
page read and write
870000
heap
page read and write
2B3E000
stack
page read and write
27AD000
stack
page read and write
27724D16000
heap
page read and write
275E000
stack
page read and write
28AE000
stack
page read and write
2B40000
remote allocation
page read and write
550000
heap
page read and write
441000
unkown
page write copy
2B3E000
stack
page read and write
8B0000
heap
page read and write
5A2000
heap
page read and write
4DE000
stack
page read and write
2DBE000
stack
page read and write
2ACFBEC4000
heap
page read and write
26F37E1C000
heap
page read and write
EF2DF9E000
stack
page read and write
2DFD000
stack
page read and write
2760000
heap
page read and write
28324610000
heap
page read and write
29EE000
stack
page read and write
D9487FE000
stack
page read and write
2514008D000
heap
page read and write
9C000
stack
page read and write
2760000
heap
page read and write
563000
heap
page execute and read and write
2514006E000
heap
page read and write
25140FC0000
trusted library section
page readonly
5FE000
stack
page read and write
20059AD6000
heap
page read and write
28324800000
heap
page read and write
9C000
stack
page read and write
2B7D000
stack
page read and write
25170480000
heap
page read and write
451000
unkown
page read and write
28324850000
heap
page read and write
8B0000
heap
page read and write
2760000
trusted library allocation
page read and write
13658A3C000
heap
page read and write
27725500000
heap
page read and write
5C3B57E000
stack
page read and write
26F38430000
remote allocation
page read and write
2B7D000
stack
page read and write
9BF000
stack
page read and write
28ED000
stack
page read and write
48F000
unkown
page read and write
251400FC000
heap
page read and write
870000
heap
page read and write
26F37DD8000
heap
page read and write
A83A7A000
stack
page read and write
265D000
stack
page read and write
1F0000
trusted library allocation
page read and write
1D9C5435000
heap
page read and write
5C15CFA000
stack
page read and write
2F00000
remote allocation
page read and write
211F8446000
heap
page read and write
198000
stack
page read and write
5C3B10E000
stack
page read and write
13658A48000
heap
page read and write
1D9C51E6000
heap
page read and write
211F83D0000
trusted library allocation
page read and write
81F000
stack
page read and write
5C777E000
stack
page read and write
1F0000
trusted library allocation
page read and write
25145840000
trusted library allocation
page read and write
492000
unkown
page readonly
27AD000
stack
page read and write
563000
heap
page execute and read and write
27724CC8000
heap
page read and write
26F37E50000
heap
page read and write
2514562C000
heap
page read and write
2760000
heap
page read and write
29EE000
stack
page read and write
1F0000
trusted library allocation
page read and write
F0B02F8000
stack
page read and write
27AD000
stack
page read and write
19CC7F00000
heap
page read and write
28ED000
stack
page read and write
2760000
heap
page read and write
13658A82000
heap
page read and write
25140054000
heap
page read and write
9044AFB000
stack
page read and write
A80000
heap
page read and write
5C1507B000
stack
page read and write
5C79FB000
stack
page read and write
28ED000
stack
page read and write
27725B03000
heap
page read and write
81F000
stack
page read and write
EF2E6FE000
stack
page read and write
42C000
unkown
page write copy
1D9C51B6000
heap
page read and write
275E000
stack
page read and write
2517065C000
heap
page read and write
27725596000
heap
page read and write
2CBD000
stack
page read and write
492000
unkown
page readonly
277255BB000
heap
page read and write
25145540000
trusted library allocation
page read and write
26F37F70000
heap
page read and write
2513FE50000
heap
page read and write
2ACFBEBA000
heap
page read and write
27725513000
heap
page read and write
1D9C51A0000
heap
page read and write
451000
unkown
page read and write
200598A0000
heap
page read and write
27725B02000
heap
page read and write
25140802000
heap
page read and write
277255B6000
heap
page read and write
2A3D000
stack
page read and write
251455F0000
trusted library allocation
page read and write
48F000
unkown
page read and write
2C7E000
stack
page read and write
1E53C453000
heap
page read and write
4E5000
heap
page read and write
25140091000
heap
page read and write
4E0000
heap
page read and write
48F000
unkown
page read and write
48F000
unkown
page read and write
2A3D000
stack
page read and write
198000
stack
page read and write
211F8458000
heap
page read and write
21568E00000
heap
page read and write
4DE000
stack
page read and write
5C159FB000
stack
page read and write
211F8442000
heap
page read and write
48F000
unkown
page read and write
9044F7E000
stack
page read and write
27725A62000
heap
page read and write
2ACFBECB000
heap
page read and write
4DE000
stack
page read and write
EF2E5FF000
stack
page read and write
211F8429000
heap
page read and write
563000
heap
page execute and read and write
2760000
heap
page read and write
997D95E000
stack
page read and write
981000
trusted library allocation
page read and write
28324829000
heap
page read and write
25145850000
trusted library allocation
page read and write
2A3D000
stack
page read and write
563000
heap
page execute and read and write
4E0000
heap
page read and write
211F847B000
heap
page read and write
26F37E1B000
heap
page read and write
211F8462000
heap
page read and write
26F37DB2000
heap
page read and write
441000
unkown
page write copy
211F8330000
heap
page read and write
2B7D000
stack
page read and write
904537F000
stack
page read and write
400000
unkown
page readonly
25145550000
trusted library allocation
page read and write
1E53CC02000
trusted library allocation
page read and write
492000
unkown
page readonly
4DE000
stack
page read and write
211F8485000
heap
page read and write
27724B60000
heap
page read and write
9BF000
stack
page read and write
27724BD0000
heap
page read and write
560000
unkown
page readonly
55A000
heap
page read and write
25170600000
heap
page read and write
28ED000
stack
page read and write
27725540000
heap
page read and write
28ED000
stack
page read and write
563000
heap
page execute and read and write
550000
heap
page read and write
A80000
heap
page read and write
26F37E03000
heap
page read and write
27724D08000
heap
page read and write
451000
unkown
page read and write
2CBD000
stack
page read and write
F0AFFF7000
stack
page read and write
4E5000
heap
page read and write
265D000
stack
page read and write
21568E28000
heap
page read and write
199000
stack
page read and write
21568D70000
trusted library allocation
page read and write
There are 1169 hidden memdumps, click here to show them.