IOC Report
RFQ__637456464647.exe

loading gif

Files

File Path
Type
Category
Malicious
RFQ__637456464647.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RFQ__63745646464_94dd9d68755d61cc97c9e42d0ec1b28c5989ec6_083b13b0_1b958159\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7284.tmp.dmp
Mini DuMP crash report, 15 streams, Tue May 24 02:00:21 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER78ED.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7A56.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\chrome.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RFQ__637456464647.exe
"C:\Users\user\Desktop\RFQ__637456464647.exe"
malicious
C:\Users\user\Desktop\RFQ__637456464647.exe
C:\Users\user\Desktop\RFQ__637456464647.exe
malicious
C:\Users\user\AppData\Local\Temp\chrome.exe
"C:\Users\user\AppData\Local\Temp\chrome.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6312 -s 1296

URLs

Name
IP
Malicious
http://checkip.dyndns.org/
132.226.8.169
malicious
https://dsssdsa.fa)Uri
unknown
https://crashpad.chromium.org/
unknown
https://api.telegram.org/bot
unknown
https://crashpad.chromium.org/bug/new
unknown
http://checkip.dyndns.org/q
unknown
http://sawebservice.red-gate.com/
unknown
http://www.smartassembly.com/webservices/Reporting/UploadReport2
unknown
https://dsssdsa.fa
unknown
http://checkip.dyndns.org
unknown
http://www.smartassembly.com/webservices/Reporting/
unknown
http://checkip.dyndns.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://crashpad.chromium.org/https://crashpad.chromium.org/bug/new
unknown
http://www.smartassembly.com/webservices/UploadReportLogin/
unknown
http://www.smartassembly.com/webservices/UploadReportLogin/GetServerURL
unknown
http://checkip.dyndns.org4Jk
unknown
There are 7 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
checkip.dyndns.com
132.226.8.169
malicious
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
132.226.8.169
checkip.dyndns.com
United States
malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ__637456464647_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
ProgramId
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
FileId
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
LowerCaseLongPath
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
LongPathHash
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
Name
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
Publisher
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
Version
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
BinFileVersion
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
BinaryType
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
ProductName
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
ProductVersion
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
LinkDate
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
BinProductVersion
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
Size
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
Language
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
IsPeFile
\REGISTRY\A\{8db74139-9b4a-e3e1-0313-53ba814e9f14}\Root\InventoryApplicationFile\rfq__63745646464|983115d
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
0018800453F4626F
There are 29 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
47A4000
trusted library allocation
page read and write
malicious
47A4000
trusted library allocation
page read and write
malicious
42C9000
trusted library allocation
page read and write
malicious
4504000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
402000
remote allocation
page execute and read and write
malicious
42C9000
trusted library allocation
page read and write
malicious
4504000
trusted library allocation
page read and write
malicious
47A4000
trusted library allocation
page read and write
malicious
4504000
trusted library allocation
page read and write
malicious
42C9000
trusted library allocation
page read and write
malicious
422000
remote allocation
page execute and read and write
9F2CAFA000
stack
page read and write
2DB0000
trusted library allocation
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
2F30000
trusted library allocation
page read and write
10F4000
heap
page read and write
647E000
stack
page read and write
1F95C351000
trusted library allocation
page read and write
5B11000
trusted library allocation
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
11E4CB30000
heap
page read and write
6B3C000
stack
page read and write
296DF2A3000
heap
page read and write
14EE000
stack
page read and write
1573000
trusted library allocation
page execute and read and write
10F4000
heap
page read and write
1F95BAA9000
heap
page read and write
10F4000
heap
page read and write
2DB0000
trusted library allocation
page read and write
127D000
heap
page read and write
53C4000
trusted library allocation
page read and write
10F4000
heap
page read and write
5B3F000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
257B6F50000
heap
page read and write
27B29E67000
heap
page read and write
10F4000
heap
page read and write
2DB0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
27B29D30000
heap
page read and write
32C1000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
1F95BB02000
heap
page read and write
62DE000
stack
page read and write
22A9B400000
heap
page read and write
11E4D402000
trusted library allocation
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
1F95C321000
trusted library allocation
page read and write
36DD3EA000
stack
page read and write
A7A9AFF000
stack
page read and write
7FF7A8CAA000
unkown
page readonly
11C0000
heap
page read and write
2DB0000
trusted library allocation
page read and write
296E4940000
trusted library allocation
page read and write
19B0000
trusted library allocation
page read and write
10F4000
heap
page read and write
8F2000
unkown
page readonly
2DB0000
trusted library allocation
page read and write
637E000
stack
page read and write
11E4CB20000
heap
page read and write
2DA0000
trusted library allocation
page read and write
10F4000
heap
page read and write
177C000
heap
page read and write
296E4A3C000
heap
page read and write
296E4900000
trusted library allocation
page read and write
22A9B502000
heap
page read and write
10F4000
heap
page read and write
296DFB00000
heap
page read and write
10F4000
heap
page read and write
2DB0000
trusted library allocation
page read and write
26CC7713000
heap
page read and write
10F4000
heap
page read and write
64A0000
trusted library allocation
page read and write
17CE000
heap
page read and write
10F4000
heap
page read and write
17CA000
heap
page read and write
1249000
heap
page read and write
BCEDBFB000
stack
page read and write
2DB0000
trusted library allocation
page read and write
F60000
remote allocation
page read and write
1CB5A2F0000
heap
page read and write
22A9B1A0000
heap
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
24DEB813000
heap
page read and write
296E4A14000
heap
page read and write
665D000
stack
page read and write
11E4CC3C000
heap
page read and write
26CC7654000
heap
page read and write
296E02D0000
trusted library section
page readonly
2F30000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
10F4000
heap
page read and write
27B29E47000
heap
page read and write
27B29E4D000
heap
page read and write
24DEB85D000
heap
page read and write
2F30000
trusted library allocation
page read and write
10F4000
heap
page read and write
54E8000
trusted library allocation
page read and write
1800000
heap
page read and write
1AF0000
trusted library allocation
page read and write
19A0000
trusted library allocation
page read and write
56D0000
trusted library allocation
page read and write
1ABD7E8D000
heap
page read and write
1540000
heap
page read and write
655E000
stack
page read and write
171E000
stack
page read and write
422000
remote allocation
page execute and read and write
1809000
heap
page read and write
A7A997B000
stack
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
1800000
heap
page read and write
296DF120000
heap
page read and write
67DE000
stack
page read and write
56D0000
trusted library allocation
page read and write
296E4A00000
heap
page read and write
10F4000
heap
page read and write
64A0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
1AE0000
heap
page execute and read and write
2DB0000
trusted library allocation
page read and write
10F4000
heap
page read and write
54E0000
trusted library allocation
page read and write
10F4000
heap
page read and write
1ABD7E29000
heap
page read and write
2DB0000
trusted library allocation
page read and write
59AE000
stack
page read and write
1996000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
21CFD53A000
heap
page read and write
2DB0000
trusted library allocation
page read and write
1F95BADF000
heap
page read and write
57A4000
trusted library allocation
page read and write
1F95BA88000
heap
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
1285000
heap
page read and write
10F4000
heap
page read and write
67A807F000
stack
page read and write
10F4000
heap
page read and write
11F2000
heap
page read and write
2DB0000
trusted library allocation
page read and write
27B29E49000
heap
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
26CC75C0000
trusted library allocation
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
158D000
trusted library allocation
page execute and read and write
64C0000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
27B29F02000
heap
page read and write
152E000
stack
page read and write
24DEB5E0000
heap
page read and write
1CB5A440000
heap
page read and write
1ABD7F02000
heap
page read and write
10B0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
1ACE000
stack
page read and write
27B29E60000
heap
page read and write
36DD6FF000
stack
page read and write
296DF213000
heap
page read and write
1809000
heap
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
5B19000
trusted library allocation
page read and write
257B7002000
heap
page read and write
2DB0000
trusted library allocation
page read and write
219D9B60000
trusted library allocation
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
1ABD7C70000
heap
page read and write
2DB0000
trusted library allocation
page read and write
1980000
trusted library allocation
page read and write
22A9B459000
heap
page read and write
10F4000
heap
page read and write
181D000
heap
page read and write
66F35FB000
stack
page read and write
7FF7A8C32000
unkown
page readonly
10F4000
heap
page read and write
219D9D00000
heap
page read and write
1ACE000
stack
page read and write
59F0000
trusted library allocation
page read and write
59EE000
stack
page read and write
10F4000
heap
page read and write
56E0000
heap
page execute and read and write
126D000
heap
page read and write
1ABD7E3F000
heap
page read and write
56D0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
21CFCEC2000
heap
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
1ABD7E8C000
heap
page read and write
2DB0000
trusted library allocation
page read and write
11E4CC2A000
heap
page read and write
A1B7B7E000
stack
page read and write
53B5000
trusted library allocation
page read and write
219D9C88000
heap
page read and write
19AB000
trusted library allocation
page read and write
1F95B880000
heap
page read and write
10F4000
heap
page read and write
A7A967A000
stack
page read and write
F60000
remote allocation
page read and write
400000
remote allocation
page execute and read and write
5390000
trusted library allocation
page read and write
10F4000
heap
page read and write
59F0000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
17C2000
heap
page read and write
1F95BA27000
heap
page read and write
56D0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
1F95C302000
trusted library allocation
page read and write
1200000
unkown
page read and write
10F4000
heap
page read and write
2F10000
trusted library allocation
page read and write
10F4000
heap
page read and write
174A000
heap
page read and write
10F4000
heap
page read and write
67A7D7F000
stack
page read and write
59F0000
trusted library allocation
page read and write
11E4CB90000
heap
page read and write
66F3AFB000
stack
page read and write
26CC7E02000
trusted library allocation
page read and write
BCEDEFE000
stack
page read and write
10F4000
heap
page read and write
52C8000
trusted library allocation
page read and write
651E000
stack
page read and write
2DB0000
trusted library allocation
page read and write
54F0000
heap
page read and write
1F95C34D000
trusted library allocation
page read and write
1154000
trusted library allocation
page read and write
53AD000
trusted library allocation
page read and write
F60000
remote allocation
page read and write
7990677000
stack
page read and write
11E4CC4C000
heap
page read and write
10F4000
heap
page read and write
53A7000
trusted library allocation
page read and write
296DFA15000
heap
page read and write
56CD000
stack
page read and write
27B29E7E000
heap
page read and write
27B29E7A000
heap
page read and write
57B4000
trusted library allocation
page read and write
24DEB908000
heap
page read and write
A7A977A000
stack
page read and write
7FF7A8C32000
unkown
page readonly
10F4000
heap
page read and write
219D9AD0000
heap
page read and write
400000
remote allocation
page execute and read and write
1574000
trusted library allocation
page read and write
57A4000
trusted library allocation
page read and write
1F95BAE9000
heap
page read and write
152E000
stack
page read and write
16D0000
trusted library allocation
page read and write
42C5000
trusted library allocation
page read and write
1597000
trusted library allocation
page execute and read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
2DB0000
trusted library allocation
page read and write
171E000
stack
page read and write
10F4000
heap
page read and write
1249000
heap
page read and write
17CE000
heap
page read and write
296E4811000
trusted library allocation
page read and write
2F10000
trusted library allocation
page read and write
10F4000
heap
page read and write
56D0000
trusted library allocation
page read and write
1266000
heap
page read and write
10F4000
heap
page read and write
296E4820000
trusted library allocation
page read and write
1200000
unkown
page read and write
5B4B000
trusted library allocation
page read and write
1200000
heap
page read and write
8F2000
unkown
page readonly
11B0000
trusted library allocation
page execute and read and write
11F6000
heap
page read and write
13E0000
trusted library allocation
page read and write
63DE000
stack
page read and write
1584000
trusted library allocation
page read and write
8F2000
unkown
page readonly
17C6000
heap
page read and write
5B4B000
trusted library allocation
page read and write
2F30000
trusted library allocation
page read and write
10F4000
heap
page read and write
27B29E64000
heap
page read and write
1AD1000
trusted library allocation
page read and write
296E0300000
trusted library section
page readonly
1597000
trusted library allocation
page execute and read and write
66F3CFF000
stack
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
2DB0000
trusted library allocation
page read and write
10F4000
heap
page read and write
1580000
trusted library allocation
page read and write
5B0D000
trusted library allocation
page read and write
21CFCE24000
heap
page read and write
14EE000
stack
page read and write
2DB0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
64A0000
trusted library allocation
page read and write
10F4000
heap
page read and write
1ABD7E13000
heap
page read and write
13F0000
heap
page read and write
11E4CC74000
heap
page read and write
10F4000
heap
page read and write
F60000
remote allocation
page read and write
27B29D90000
heap
page read and write
14A0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
5AC0000
remote allocation
page read and write
10F4000
heap
page read and write
B0857FB000
stack
page read and write
2FF4000
trusted library allocation
page read and write
27B29E61000
heap
page read and write
2F30000
trusted library allocation
page read and write
64A0000
trusted library allocation
page read and write
1F95BA3C000
heap
page read and write
177F000
heap
page read and write
10F4000
heap
page read and write
B085AFC000
stack
page read and write
1ABD7C60000
heap
page read and write
651E000
stack
page read and write
67A7E7F000
stack
page read and write
6490000
trusted library allocation
page read and write
26CC7600000
heap
page read and write
1740000
heap
page read and write
17D2000
heap
page read and write
2DB0000
trusted library allocation
page read and write
10F4000
heap
page read and write
7FF7A8C8E000
unkown
page write copy
27B29E45000
heap
page read and write
8F2000
unkown
page readonly
A1B9F7E000
stack
page read and write
2F0D000
stack
page read and write
2DB0000
trusted library allocation
page read and write
21CFD512000
heap
page read and write
1ABD7CD0000
heap
page read and write
26CC7649000
heap
page read and write
22A9B513000
heap
page read and write
A1BA27E000
stack
page read and write
57C8000
trusted library allocation
page read and write
2F20000
trusted library allocation
page read and write
1281000
heap
page read and write
24DEC002000
trusted library allocation
page read and write
57C5000
trusted library allocation
page read and write
1B10000
heap
page read and write
197D000
stack
page read and write
15AB000
trusted library allocation
page execute and read and write
24DEB650000
heap
page read and write
32E2000
trusted library allocation
page read and write
1187000
trusted library allocation
page execute and read and write
171E000
stack
page read and write
19C0000
heap
page read and write
24DEB86E000
heap
page read and write
A7AA07F000
stack
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
7FF7A8A71000
unkown
page execute read
6B50000
trusted library allocation
page read and write
10F4000
heap
page read and write
1CB5A4A0000
heap
page read and write
219D9C3C000
heap
page read and write
26CC7708000
heap
page read and write
181D000
heap
page read and write
296DF2A1000
heap
page read and write
799097E000
stack
page read and write
1F95C100000
remote allocation
page read and write
2DB0000
trusted library allocation
page read and write
2F30000
trusted library allocation
page read and write
2F30000
trusted library allocation
page read and write
8F2000
unkown
page readonly
3048000
trusted library allocation
page read and write
1F95B870000
heap
page read and write
56D0000
trusted library allocation
page read and write
1990000
trusted library allocation
page read and write
16BE000
stack
page read and write
27B29E4B000
heap
page read and write
1275000
heap
page read and write
6480000
trusted library allocation
page execute and read and write
303F000
trusted library allocation
page read and write
1367000
stack
page read and write
1740000
heap
page read and write
6490000
trusted library allocation
page read and write
219D9AC0000
heap
page read and write
5AF5000
trusted library allocation
page read and write
629E000
stack
page read and write
2DBA000
trusted library allocation
page read and write
32E2000
trusted library allocation
page read and write
665D000
stack
page read and write
10F4000
heap
page read and write
16BE000
stack
page read and write
1176000
trusted library allocation
page execute and read and write
296DFA00000
heap
page read and write
2F30000
trusted library allocation
page read and write
679D000
stack
page read and write
67A7B7E000
stack
page read and write
56D0000
trusted library allocation
page read and write
10F4000
heap
page read and write
68DE000
stack
page read and write
1182000
trusted library allocation
page read and write
2F10000
trusted library allocation
page read and write
10F4000
heap
page read and write
27B2A602000
trusted library allocation
page read and write
296E0100000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
10F4000
heap
page read and write
16D0000
trusted library allocation
page read and write
10F4000
heap
page read and write
2DB0000
trusted library allocation
page read and write
17DA000
heap
page read and write
26CC764B000
heap
page read and write
53AA000
trusted library allocation
page read and write
21CFD3A0000
trusted library allocation
page read and write
10F4000
heap
page read and write
665D000
stack
page read and write
2DB0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
1F95C202000
trusted library allocation
page read and write
A1BA1FD000
stack
page read and write
296DF313000
heap
page read and write
A1B9FFE000
stack
page read and write
64A0000
trusted library allocation
page read and write
296DF27C000
heap
page read and write
68DE000
stack
page read and write
219D9C63000
heap
page read and write
10F4000
heap
page read and write
56D0000
trusted library allocation
page read and write
296E4AA0000
heap
page read and write
10F4000
heap
page read and write
56D0000
trusted library allocation
page read and write
10F4000
heap
page read and write
257B7750000
remote allocation
page read and write
A7A9B7F000
stack
page read and write
2F30000
trusted library allocation
page read and write
24DEB87F000
heap
page read and write
8F0000
unkown
page readonly
5FFE000
stack
page read and write
10F4000
heap
page read and write
15B0000
heap
page read and write
296E4820000
trusted library allocation
page read and write
44C2000
trusted library allocation
page read and write
D22000
unkown
page readonly
42C1000
trusted library allocation
page read and write
1CB5A780000
heap
page read and write
19BD000
trusted library allocation
page read and write
21CFCECA000
heap
page read and write
2DB0000
trusted library allocation
page read and write
1F95BA13000
heap
page read and write
296E4AEE000
heap
page read and write
21CFCF13000
heap
page read and write
64A0000
trusted library allocation
page read and write
10F4000
heap
page read and write
54D0000
trusted library allocation
page read and write
10F4000
heap
page read and write
296E02F0000
trusted library section
page readonly
6490000
trusted library allocation
page read and write
A1B7D7F000
stack
page read and write
2DB0000
trusted library allocation
page read and write
296DFB18000
heap
page read and write
B085C7B000
stack
page read and write
493CF7000
stack
page read and write
2DB0000
trusted library allocation
page read and write
296E4AF5000
heap
page read and write
10F4000
heap
page read and write
3FAA000
trusted library allocation
page read and write
57C5000
trusted library allocation
page read and write
1590000
trusted library allocation
page read and write
58A0000
heap
page execute and read and write
157D000
trusted library allocation
page execute and read and write
10F4000
heap
page read and write
54D0000
trusted library allocation
page read and write
641E000
stack
page read and write
4762000
trusted library allocation
page read and write
24DEB88A000
heap
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
5AF5000
trusted library allocation
page read and write
10F4000
heap
page read and write
296E0310000
trusted library section
page readonly
67A73BC000
stack
page read and write
10F4000
heap
page read and write
59F0000
trusted library allocation
page read and write
64A0000
trusted library allocation
page read and write
219D9C64000
heap
page read and write
2DB0000
trusted library allocation
page read and write
17D2000
heap
page read and write
19B0000
trusted library allocation
page read and write
4751000
trusted library allocation
page read and write
10F4000
heap
page read and write
22A9B413000
heap
page read and write
24DEB851000
heap
page read and write
10F4000
heap
page read and write
1AE0000
heap
page execute and read and write
10F4000
heap
page read and write
14A0000
trusted library allocation
page read and write
296E47F8000
trusted library allocation
page read and write
64A0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
67A817F000
stack
page read and write
2DC0000
heap
page read and write
400000
remote allocation
page execute and read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
257B7058000
heap
page read and write
10F4000
heap
page read and write
A4587F7000
stack
page read and write
10F4000
heap
page read and write
2F51000
trusted library allocation
page read and write
26CC7681000
heap
page read and write
10F4000
heap
page read and write
5C2E000
stack
page read and write
2DB0000
trusted library allocation
page read and write
21CFCE13000
heap
page read and write
296E01F0000
trusted library allocation
page read and write
22A9B3E0000
trusted library allocation
page read and write
42C5000
trusted library allocation
page read and write
799027C000
stack
page read and write
36DD779000
stack
page read and write
10F4000
heap
page read and write
2DB0000
trusted library allocation
page read and write
5AF5000
trusted library allocation
page read and write
36DD7F9000
stack
page read and write
2F40000
heap
page execute and read and write
2DB0000
trusted library allocation
page read and write
67A7A7E000
stack
page read and write
56D0000
trusted library allocation
page read and write
1580000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
32C1000
trusted library allocation
page read and write
44B1000
trusted library allocation
page read and write
1ABD7E67000
heap
page read and write
6B3C000
stack
page read and write
296E47F0000
trusted library allocation
page read and write
1F95C300000
trusted library allocation
page read and write
24DEB5F0000
heap
page read and write
10F4000
heap
page read and write
1730000
heap
page read and write
10F4000
heap
page read and write
296E46D0000
trusted library allocation
page read and write
219D9C00000
heap
page read and write
124B000
heap
page read and write
64A0000
trusted library allocation
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
2DB0000
trusted library allocation
page read and write
42C5000
trusted library allocation
page read and write
10F4000
heap
page read and write
6490000
trusted library allocation
page execute and read and write
2F30000
trusted library allocation
page read and write
10F4000
heap
page read and write
7FF7A8C85000
unkown
page write copy
10F4000
heap
page read and write
2DB0000
trusted library allocation
page read and write
A7A9BFF000
stack
page read and write
2DB0000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
10F4000
heap
page read and write
27B29E77000
heap
page read and write
2DB0000
trusted library allocation
page read and write
67A797D000
stack
page read and write
296DFB59000
heap
page read and write
174A000
heap
page read and write
1ABD7E8E000
heap
page read and write
10F4000
heap
page read and write
4762000
trusted library allocation
page read and write
5B19000
trusted library allocation
page read and write
7FF7A8C3A000
unkown
page readonly
296E02E0000
trusted library section
page readonly
257B7025000
heap
page read and write
9F2CF7F000
unkown
page read and write
10F4000
heap
page read and write
1160000
trusted library allocation
page read and write
1730000
heap
page read and write
10F4000
heap
page read and write
2FF7000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
22A9B1B0000
heap
page read and write
10F4000
heap
page read and write
1271000
heap
page read and write
1F95BAE6000
heap
page read and write
26CC7629000
heap
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
26CC7650000
heap
page read and write
B08607E000
stack
page read and write
1F95C380000
trusted library allocation
page read and write
177C000
heap
page read and write
27B29DC0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
64E0000
trusted library allocation
page read and write
27B29E40000
heap
page read and write
2DB0000
trusted library allocation
page read and write
257B6F60000
heap
page read and write
15A7000
trusted library allocation
page execute and read and write
D22000
unkown
page readonly
66F3DFE000
stack
page read and write
8F0000
unkown
page readonly
F60000
remote allocation
page read and write
10F4000
heap
page read and write
2DB0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
257B7802000
trusted library allocation
page read and write
19B0000
trusted library allocation
page read and write
669E000
stack
page read and write
10F4000
heap
page read and write
257B703D000
heap
page read and write
53A4000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
10F4000
heap
page read and write
57A4000
trusted library allocation
page read and write
56D0000
trusted library allocation
page read and write
1560000
trusted library allocation
page read and write
7FF7A8C4A000
unkown
page readonly
13C0000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
10F4000
heap
page read and write
1F95C100000
remote allocation
page read and write
8F2000
unkown
page readonly
8F2000
unkown
page readonly
24DEB89D000
heap
page read and write
F60000
remote allocation
page read and write
66F38FE000
stack
page read and write
26CC7590000
heap
page read and write
26CC764C000
heap
page read and write
10F4000
heap
page read and write
17C6000
heap
page read and write
1B00000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
57C5000
trusted library allocation
page read and write
10F4000
heap
page read and write
5C60000
trusted library allocation
page read and write
58A0000
heap
page execute and read and write
56D0000
trusted library allocation
page read and write
193E000
stack
page read and write
296E0320000
trusted library section
page readonly
67A7C7D000
stack
page read and write
10F4000
heap
page read and write
D20000
unkown
page readonly
2F10000
trusted library allocation
page read and write
1980000
trusted library allocation
page read and write
296DF295000
heap
page read and write
296DF272000
heap
page read and write
2DB0000
trusted library allocation
page read and write
545E000
stack
page read and write
1ABD7E00000
heap
page read and write
19A0000
trusted library allocation
page read and write
B085BFC000
stack
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
1590000
trusted library allocation
page read and write
19C0000
heap
page read and write
296DF9E0000
trusted library allocation
page read and write
199F000
trusted library allocation
page read and write
296DF23E000
heap
page read and write
54E0000
trusted library allocation
page read and write
22A9BA02000
trusted library allocation
page read and write
5C2E000
stack
page read and write
8F0000
unkown
page readonly
219D9C68000
heap
page read and write
10F4000
heap
page read and write
59AE000
stack
page read and write
21CFCE6F000
heap
page read and write
10F4000
heap
page read and write
B085D7C000
stack
page read and write
2DB0000
trusted library allocation
page read and write
19B0000
trusted library allocation
page read and write
53D1000
heap
page read and write
14A0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
257B7013000
heap
page read and write
3038000
trusted library allocation
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
296E4A49000
heap
page read and write
64A0000
trusted library allocation
page read and write
1F95C100000
remote allocation
page read and write
9F2C87E000
stack
page read and write
64A0000
trusted library allocation
page read and write
545E000
stack
page read and write
10F4000
heap
page read and write
56D0000
trusted library allocation
page read and write
57D4000
trusted library allocation
page read and write
1720000
trusted library allocation
page execute and read and write
296DFB02000
heap
page read and write
10F4000
heap
page read and write
11E4CC00000
heap
page read and write
9F2C54B000
stack
page read and write
17C2000
heap
page read and write
11E4CD13000
heap
page read and write
2F30000
trusted library allocation
page read and write
10F4000
heap
page read and write
799057B000
stack
page read and write
177F000
heap
page read and write
BCEDDFB000
stack
page read and write
10F4000
heap
page read and write
7FF7A8C85000
unkown
page write copy
6480000
trusted library allocation
page read and write
799037F000
stack
page read and write
504E000
stack
page read and write
64B0000
trusted library allocation
page read and write
296DF130000
heap
page read and write
2DB0000
trusted library allocation
page read and write
10F4000
heap
page read and write
64D0000
trusted library allocation
page read and write
24DEB84A000
heap
page read and write
2F30000
trusted library allocation
page read and write
1AD0000
trusted library allocation
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
A1B797E000
stack
page read and write
59F0000
trusted library allocation
page read and write
1F95B8E0000
heap
page read and write
10F4000
heap
page read and write
174A000
heap
page read and write
44B1000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
A1BA0FE000
stack
page read and write
1F95BA29000
heap
page read and write
296DF258000
heap
page read and write
22A9B469000
heap
page read and write
1B10000
heap
page read and write
7FF7A8C3A000
unkown
page readonly
5B17000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
193E000
stack
page read and write
10F4000
heap
page read and write
8F0000
unkown
page readonly
2F30000
trusted library allocation
page read and write
1F95BA6B000
heap
page read and write
545E000
stack
page read and write
56D0000
trusted library allocation
page read and write
582E000
stack
page read and write
10F4000
heap
page read and write
21CFD402000
heap
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
27B29D20000
heap
page read and write
10F4000
heap
page read and write
11E4CD08000
heap
page read and write
A1B7C7E000
stack
page read and write
21CFCBE0000
heap
page read and write
10F4000
heap
page read and write
219D9C7D000
heap
page read and write
655E000
stack
page read and write
15AB000
trusted library allocation
page execute and read and write
24DEB84F000
heap
page read and write
11E4CD00000
heap
page read and write
633E000
stack
page read and write
11E4CC81000
heap
page read and write
2DB0000
trusted library allocation
page read and write
27B29E5F000
heap
page read and write
10F4000
heap
page read and write
27B29E2A000
heap
page read and write
B0853BC000
stack
page read and write
56D0000
trusted library allocation
page read and write
296E4A22000
heap
page read and write
10F4000
heap
page read and write
6B3C000
stack
page read and write
A4586FB000
stack
page read and write
10F4000
heap
page read and write
A1B78FE000
stack
page read and write
11E4CC70000
heap
page read and write
5B3F000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
62DE000
stack
page read and write
2DB0000
trusted library allocation
page read and write
219D9D02000
heap
page read and write
10F4000
heap
page read and write
2F30000
trusted library allocation
page read and write
2F30000
trusted library allocation
page read and write
10F4000
heap
page read and write
27B29E7B000
heap
page read and write
67A77FB000
stack
page read and write
22A9B210000
heap
page read and write
157D000
trusted library allocation
page execute and read and write
493BFB000
stack
page read and write
1AD1000
trusted library allocation
page read and write
126C000
stack
page read and write
422000
remote allocation
page execute and read and write
177F000
heap
page read and write
2DB0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
125A000
heap
page read and write
10F4000
heap
page read and write
669E000
stack
page read and write
2DB0000
trusted library allocation
page read and write
1281000
heap
page read and write
A4588FF000
stack
page read and write
9F2CBFC000
stack
page read and write
1ABD7F13000
heap
page read and write
400000
remote allocation
page execute and read and write
10F0000
heap
page read and write
10F4000
heap
page read and write
56D0000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
24DEB829000
heap
page read and write
1CB5A785000
heap
page read and write
2DB0000
trusted library allocation
page read and write
54D0000
trusted library allocation
page execute and read and write
66F3BF7000
stack
page read and write
15B0000
heap
page read and write
62DE000
stack
page read and write
21CFCF02000
heap
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
5AF0000
trusted library allocation
page read and write
27B29E44000
heap
page read and write
296DF302000
heap
page read and write
10F4000
heap
page read and write
296DF229000
heap
page read and write
6A3E000
stack
page read and write
10F4000
heap
page read and write
2DB0000
trusted library allocation
page read and write
10F4000
heap
page read and write
1AF0000
trusted library allocation
page read and write
10F4000
heap
page read and write
57B4000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
19AB000
trusted library allocation
page read and write
588E000
stack
page read and write
197D000
stack
page read and write
2DB0000
trusted library allocation
page read and write
27B29E84000
heap
page read and write
1273000
heap
page read and write
5B17000
trusted library allocation
page read and write
219D9C54000
heap
page read and write
2DB0000
trusted library allocation
page read and write
3F51000
trusted library allocation
page read and write
296DFB58000
heap
page read and write
64A0000
trusted library allocation
page read and write
1153000
trusted library allocation
page execute and read and write
153E000
stack
page read and write
2DB0000
trusted library allocation
page read and write
126C000
stack
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
22A9B47B000
heap
page read and write
2DB0000
trusted library allocation
page read and write
10F4000
heap
page read and write
296DF9F0000
trusted library allocation
page read and write
27B29E00000
heap
page read and write
296DF28C000
heap
page read and write
422000
remote allocation
page execute and read and write
193E000
stack
page read and write
10F4000
heap
page read and write
6B50000
trusted library allocation
page read and write
1ABD7E8E000
heap
page read and write
296E4814000
trusted library allocation
page read and write
493DFF000
stack
page read and write
5C60000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
15AB000
trusted library allocation
page execute and read and write
10F4000
heap
page read and write
1980000
trusted library allocation
page read and write
A1BA47D000
stack
page read and write
5AC0000
remote allocation
page read and write
15A7000
trusted library allocation
page execute and read and write
2DA0000
trusted library allocation
page read and write
1ABD7E8C000
heap
page read and write
124B000
heap
page read and write
10F4000
heap
page read and write
5AF0000
trusted library allocation
page read and write
157D000
trusted library allocation
page execute and read and write
2DB0000
trusted library allocation
page read and write
8F0000
unkown
page readonly
257B7750000
remote allocation
page read and write
2DA0000
trusted library allocation
page read and write
19B0000
trusted library allocation
page read and write
36DD67F000
stack
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
296DF9E3000
trusted library allocation
page read and write
52C8000
trusted library allocation
page read and write
296DF2B5000
heap
page read and write
59F0000
trusted library allocation
page read and write
49373E000
stack
page read and write
17D6000
heap
page read and write
117A000
trusted library allocation
page execute and read and write
10F4000
heap
page read and write
63DE000
stack
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
24DEB849000
heap
page read and write
629E000
stack
page read and write
1F95B9E0000
trusted library allocation
page read and write
1ABD7E71000
heap
page read and write
7FF7A8A71000
unkown
page execute read
5B11000
trusted library allocation
page read and write
D22000
unkown
page readonly
3027000
trusted library allocation
page read and write
10F4000
heap
page read and write
5B11000
trusted library allocation
page read and write
1F95BAF7000
heap
page read and write
15B0000
heap
page read and write
67A7F7E000
stack
page read and write
10F4000
heap
page read and write
26CC7613000
heap
page read and write
11E4CC53000
heap
page read and write
10F4000
heap
page read and write
27B29E62000
heap
page read and write
10F4000
heap
page read and write
A7A9C7F000
stack
page read and write
24DEB84C000
heap
page read and write
10F4000
heap
page read and write
A4584FE000
stack
page read and write
296E0670000
trusted library allocation
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
2DB0000
trusted library allocation
page read and write
10F4000
heap
page read and write
1281000
heap
page read and write
24DEB800000
heap
page read and write
296E4A63000
heap
page read and write
10F4000
heap
page read and write
27B29E3A000
heap
page read and write
56D0000
trusted library allocation
page read and write
44C2000
trusted library allocation
page read and write
10F4000
heap
page read and write
58A0000
heap
page execute and read and write
10F4000
heap
page read and write
A7A917B000
stack
page read and write
10F4000
heap
page read and write
24DEB750000
trusted library allocation
page read and write
7FF7A8C98000
unkown
page readonly
2F30000
trusted library allocation
page read and write
6A3E000
stack
page read and write
11CA000
heap
page read and write
1990000
trusted library allocation
page read and write
32E2000
trusted library allocation
page read and write
68DE000
stack
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
56D0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
10F4000
heap
page read and write
59AE000
stack
page read and write
8F2000
unkown
page readonly
21CFCC40000
heap
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
57EE000
stack
page read and write
27B29E48000
heap
page read and write
26CC7702000
heap
page read and write
2DB0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
16BE000
stack
page read and write
296E46E0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
219DA402000
trusted library allocation
page read and write
11E4CBC0000
trusted library allocation
page read and write
A7A9A7B000
stack
page read and write
2F30000
trusted library allocation
page read and write
10F4000
heap
page read and write
257B7029000
heap
page read and write
10F4000
heap
page read and write
1AD0000
trusted library allocation
page read and write
36DD8FC000
stack
page read and write
4751000
trusted library allocation
page read and write
1ABD7E6D000
heap
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
8F0000
unkown
page readonly
19B0000
trusted library allocation
page read and write
6490000
trusted library allocation
page read and write
588E000
stack
page read and write
22A9B441000
heap
page read and write
27B29E69000
heap
page read and write
10F4000
heap
page read and write
21CFCBD0000
heap
page read and write
10F4000
heap
page read and write
D20000
unkown
page readonly
24DEB902000
heap
page read and write
1367000
stack
page read and write
296E4930000
trusted library allocation
page read and write
296E4AE9000
heap
page read and write
296E4950000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
158D000
trusted library allocation
page execute and read and write
2DB0000
trusted library allocation
page read and write
27B29E6B000
heap
page read and write
57B4000
trusted library allocation
page read and write
7FF7A8A70000
unkown
page readonly
64A0000
trusted library allocation
page read and write
296DF28F000
heap
page read and write
1740000
heap
page read and write
9F2C97C000
stack
page read and write
D20000
unkown
page readonly
A7A987E000
stack
page read and write
B08597F000
stack
page read and write
1996000
trusted library allocation
page read and write
655E000
stack
page read and write
1ACE000
stack
page read and write
1ABD7E02000
heap
page read and write
4751000
trusted library allocation
page read and write
10F4000
heap
page read and write
296DF2FE000
heap
page read and write
26CC7520000
heap
page read and write
17D6000
heap
page read and write
64A0000
trusted library allocation
page read and write
42C1000
trusted library allocation
page read and write
15A0000
trusted library allocation
page read and write
1824000
heap
page read and write
799077D000
stack
page read and write
5B4B000
trusted library allocation
page read and write
493EFF000
stack
page read and write
10F4000
heap
page read and write
1140000
trusted library allocation
page read and write
53A2000
trusted library allocation
page read and write
10F4000
heap
page read and write
2DB0000
trusted library allocation
page read and write
1ABD7E88000
heap
page read and write
2DB0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
64D0000
trusted library allocation
page read and write
1824000
heap
page read and write
10F4000
heap
page read and write
A1BA37D000
stack
page read and write
10F4000
heap
page read and write
17C2000
heap
page read and write
10F4000
heap
page read and write
219D9B30000
heap
page read and write
2DA0000
trusted library allocation
page read and write
56D0000
trusted library allocation
page read and write
10F4000
heap
page read and write
15A0000
trusted library allocation
page read and write
10F4000
heap
page read and write
1F95BAAB000
heap
page read and write
57D4000
trusted library allocation
page read and write
11E4CC13000
heap
page read and write
7FF7A8C98000
unkown
page readonly
2DB0000
trusted library allocation
page read and write
26CC7700000
heap
page read and write
9F2CCF7000
stack
page read and write
2DB0000
trusted library allocation
page read and write
26CC763C000
heap
page read and write
152E000
stack
page read and write
126C000
stack
page read and write
1270000
heap
page read and write
2F30000
trusted library allocation
page read and write
19B0000
trusted library allocation
page read and write
296E4B00000
heap
page read and write
67DE000
stack
page read and write
59F0000
trusted library allocation
page read and write
B085F7D000
stack
page read and write
641E000
stack
page read and write
10F4000
heap
page read and write
2DB0000
trusted library allocation
page read and write
2F30000
trusted library allocation
page read and write
10F4000
heap
page read and write
27B29E46000
heap
page read and write
296E4B03000
heap
page read and write
10F4000
heap
page read and write
2DB0000
trusted library allocation
page read and write
11E4CC48000
heap
page read and write
400000
remote allocation
page execute and read and write
296E4A2E000
heap
page read and write
2DB0000
trusted library allocation
page read and write
26CC766A000
heap
page read and write
1ABD7DD0000
trusted library allocation
page read and write
21CFD500000
heap
page read and write
11E4CC4E000
heap
page read and write
296DFB18000
heap
page read and write
9F2C9FE000
stack
page read and write
21CFCE43000
heap
page read and write
2DB0000
trusted library allocation
page read and write
11E7000
heap
page read and write
1CB5A4D1000
heap
page read and write
27B29E3D000
heap
page read and write
8F0000
unkown
page readonly
296DF1C0000
trusted library allocation
page read and write
14EE000
stack
page read and write
10F4000
heap
page read and write
27B29E6D000
heap
page read and write
BCEDCFE000
stack
page read and write
10F4000
heap
page read and write
27B29E13000
heap
page read and write
1584000
trusted library allocation
page read and write
1996000
trusted library allocation
page read and write
10F4000
heap
page read and write
19B0000
trusted library allocation
page read and write
8F0000
unkown
page readonly
10F4000
heap
page read and write
1170000
trusted library allocation
page read and write
64B0000
trusted library allocation
page read and write
22A9B464000
heap
page read and write
199F000
trusted library allocation
page read and write
7FF7A8C8E000
unkown
page write copy
11E4CD02000
heap
page read and write
2DB0000
trusted library allocation
page read and write
57D4000
trusted library allocation
page read and write
302C000
trusted library allocation
page read and write
57C8000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
10F4000
heap
page read and write
17CA000
heap
page read and write
10F4000
heap
page read and write
296E4834000
trusted library allocation
page read and write
10F4000
heap
page read and write
1F95BAE9000
heap
page read and write
7FF7A8C4A000
unkown
page readonly
257B7102000
heap
page read and write
219D9C90000
heap
page read and write
56D0000
trusted library allocation
page read and write
1CB5A420000
heap
page read and write
1824000
heap
page read and write
219D9C5E000
heap
page read and write
10F4000
heap
page read and write
2F30000
trusted library allocation
page read and write
10F4000
heap
page read and write
63DE000
stack
page read and write
219D9C29000
heap
page read and write
57C8000
trusted library allocation
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
21CFCE00000
heap
page read and write
1F95C317000
trusted library allocation
page read and write
A7A9D7F000
stack
page read and write
6490000
trusted library allocation
page read and write
1990000
trusted library allocation
page read and write
10F4000
heap
page read and write
799087F000
stack
page read and write
61FE000
stack
page read and write
F60000
remote allocation
page read and write
1273000
heap
page read and write
A4589FF000
stack
page read and write
10F4000
heap
page read and write
2F30000
trusted library allocation
page read and write
296E4910000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
8F2000
unkown
page readonly
5C2E000
stack
page read and write
54EE000
trusted library allocation
page read and write
1720000
trusted library allocation
page execute and read and write
257B7750000
remote allocation
page read and write
10F4000
heap
page read and write
296DF291000
heap
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
1573000
trusted library allocation
page execute and read and write
11E4CC67000
heap
page read and write
10F4000
heap
page read and write
8F2000
unkown
page readonly
6490000
trusted library allocation
page read and write
118B000
trusted library allocation
page execute and read and write
2DBC000
trusted library allocation
page read and write
56D0000
trusted library allocation
page read and write
79902FE000
stack
page read and write
2F10000
trusted library allocation
page read and write
5C60000
heap
page read and write
BCED6FC000
stack
page read and write
13D0000
trusted library allocation
page read and write
64A0000
trusted library allocation
page read and write
5B0D000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
159A000
trusted library allocation
page execute and read and write
6490000
trusted library allocation
page read and write
10F4000
heap
page read and write
67DE000
stack
page read and write
296DF1D0000
trusted library section
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
296DFB13000
heap
page read and write
296DF9C1000
trusted library allocation
page read and write
16D0000
trusted library allocation
page read and write
17D2000
heap
page read and write
116D000
trusted library allocation
page execute and read and write
A7A9E7A000
stack
page read and write
679D000
stack
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
8F0000
unkown
page readonly
296E4AFB000
heap
page read and write
5B0D000
trusted library allocation
page read and write
24DEB900000
heap
page read and write
10F4000
heap
page read and write
59F0000
trusted library allocation
page read and write
9F2CDFE000
stack
page read and write
10F4000
heap
page read and write
1720000
trusted library allocation
page execute and read and write
17D6000
heap
page read and write
296DF190000
heap
page read and write
177C000
heap
page read and write
4762000
trusted library allocation
page read and write
296E4950000
remote allocation
page read and write
641E000
stack
page read and write
115D000
trusted library allocation
page execute and read and write
10F4000
heap
page read and write
D22000
unkown
page readonly
52C8000
trusted library allocation
page read and write
32C1000
trusted library allocation
page read and write
296E47FE000
trusted library allocation
page read and write
9F2CEFF000
stack
page read and write
10F4000
heap
page read and write
3045000
trusted library allocation
page read and write
24DEB83C000
heap
page read and write
296DF200000
heap
page read and write
8F0000
unkown
page readonly
10F4000
heap
page read and write
219D9D13000
heap
page read and write
36DD87F000
stack
page read and write
296E4950000
remote allocation
page read and write
2DB0000
trusted library allocation
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
4937BE000
stack
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
296E4830000
trusted library allocation
page read and write
219D9C13000
heap
page read and write
10F4000
heap
page read and write
1ABD7E5A000
heap
page read and write
27B29E41000
heap
page read and write
1367000
stack
page read and write
10F4000
heap
page read and write
15A7000
trusted library allocation
page execute and read and write
1180000
trusted library allocation
page read and write
7FF7A8CAA000
unkown
page readonly
669E000
stack
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
42C1000
trusted library allocation
page read and write
2F30000
trusted library allocation
page read and write
11E4CC67000
heap
page read and write
1ABD8602000
trusted library allocation
page read and write
296E4810000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
2F30000
trusted library allocation
page read and write
27B29E63000
heap
page read and write
1573000
trusted library allocation
page execute and read and write
A1B9E7E000
stack
page read and write
17CE000
heap
page read and write
5B3F000
trusted library allocation
page read and write
1809000
heap
page read and write
2F10000
trusted library allocation
page read and write
1F95BAB3000
heap
page read and write
10F4000
heap
page read and write
623E000
stack
page read and write
257B7000000
heap
page read and write
2DB0000
trusted library allocation
page read and write
158D000
trusted library allocation
page execute and read and write
2D90000
trusted library allocation
page read and write
1584000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
1F95BAC5000
heap
page read and write
296DF278000
heap
page read and write
22A9B500000
heap
page read and write
22A9B428000
heap
page read and write
6A3E000
stack
page read and write
2DB6000
trusted library allocation
page read and write
2F30000
trusted library allocation
page read and write
1274000
heap
page read and write
69F0000
trusted library allocation
page read and write
60FE000
stack
page read and write
2DBF000
trusted library allocation
page read and write
10F4000
heap
page read and write
2F30000
trusted library allocation
page read and write
BD0000
heap
page read and write
2DB0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
A7A9CFF000
stack
page read and write
2ECE000
stack
page read and write
26CC7530000
heap
page read and write
257B6FC0000
heap
page read and write
66F39FC000
stack
page read and write
1ABD7E8E000
heap
page read and write
A45847E000
stack
page read and write
F37000
stack
page read and write
10F4000
heap
page read and write
22A9B402000
heap
page read and write
A7A9577000
stack
page read and write
10F4000
heap
page read and write
296E47F0000
trusted library allocation
page read and write
53C1000
trusted library allocation
page read and write
10F4000
heap
page read and write
1560000
trusted library allocation
page read and write
5B19000
trusted library allocation
page read and write
10F4000
heap
page read and write
27B29E2F000
heap
page read and write
E3B000
stack
page read and write
10F4000
heap
page read and write
1AD1000
trusted library allocation
page read and write
19AB000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
10F4000
heap
page read and write
296DFA02000
heap
page read and write
10F4000
heap
page read and write
2DB0000
trusted library allocation
page read and write
A1B9A9C000
stack
page read and write
629E000
stack
page read and write
26CC7648000
heap
page read and write
1590000
trusted library allocation
page read and write
10F4000
heap
page read and write
17DA000
heap
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
54E0000
trusted library allocation
page read and write
1F95BA00000
heap
page read and write
1574000
trusted library allocation
page read and write
10F4000
heap
page read and write
296E4920000
trusted library allocation
page read and write
B085A7E000
stack
page read and write
2DB0000
trusted library allocation
page read and write
26CC7677000
heap
page read and write
199F000
trusted library allocation
page read and write
24DEB913000
heap
page read and write
3021000
trusted library allocation
page read and write
10F4000
heap
page read and write
197D000
stack
page read and write
651E000
stack
page read and write
10F4000
heap
page read and write
592F000
stack
page read and write
2F30000
trusted library allocation
page read and write
53BC000
trusted library allocation
page read and write
3F79000
trusted library allocation
page read and write
596E000
stack
page read and write
54D0000
trusted library allocation
page read and write
10F4000
heap
page read and write
D20000
unkown
page readonly
296E4950000
remote allocation
page read and write
2DB0000
trusted library allocation
page read and write
64B0000
trusted library allocation
page read and write
1F95BB13000
heap
page read and write
64A0000
trusted library allocation
page read and write
27B29E38000
heap
page read and write
1574000
trusted library allocation
page read and write
10F4000
heap
page read and write
11A0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
4936BB000
stack
page read and write
7FF7A8A70000
unkown
page readonly
1597000
trusted library allocation
page execute and read and write
A4581AC000
stack
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
6490000
trusted library allocation
page read and write
10F4000
heap
page read and write
1730000
heap
page read and write
159A000
trusted library allocation
page execute and read and write
F60000
remote allocation
page read and write
159A000
trusted library allocation
page execute and read and write
10F4000
heap
page read and write
5B17000
trusted library allocation
page read and write
44B1000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
53D1000
heap
page read and write
2DB0000
trusted library allocation
page read and write
24DEB85C000
heap
page read and write
10F4000
heap
page read and write
17DA000
heap
page read and write
19C0000
heap
page read and write
59F0000
trusted library allocation
page read and write
1B10000
heap
page read and write
54EF000
trusted library allocation
page read and write
296E48C0000
trusted library allocation
page read and write
1F95BABF000
heap
page read and write
1580000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
1560000
trusted library allocation
page read and write
A1B787B000
stack
page read and write
257B6FF0000
trusted library allocation
page read and write
B085E7E000
stack
page read and write
44C2000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
53D0000
heap
page read and write
10F4000
heap
page read and write
10F4000
heap
page read and write
296E4AAC000
heap
page read and write
21CFCEB9000
heap
page read and write
1AE0000
heap
page execute and read and write
679D000
stack
page read and write
9F2C5CE000
stack
page read and write
27B29E42000
heap
page read and write
1800000
heap
page read and write
539B000
trusted library allocation
page read and write
19A0000
trusted library allocation
page read and write
10F4000
heap
page read and write
219D9D08000
heap
page read and write
17C6000
heap
page read and write
181D000
heap
page read and write
27B29E4E000
heap
page read and write
66F387E000
stack
page read and write
17CA000
heap
page read and write
There are 1399 hidden memdumps, click here to show them.