Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
RFQ- 7075-T6.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RFQ- 7075-T6.exe_556ec1e08761a72764f19ea896e990ee5ce7d04d_f7717559_1730b38f\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RFQ- 7075-T6.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER277B.tmp.dmp
|
Mini DuMP crash report, 14 streams, Mon Aug 8 20:21:13 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2941.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2A6B.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\RFQ- 7075-T6.exe
|
"C:\Users\user\Desktop\RFQ- 7075-T6.exe"
|
||
C:\Users\user\Desktop\RFQ- 7075-T6.exe
|
C:\Users\user\Desktop\RFQ- 7075-T6.exe
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5432 -s 172
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://109.206.241.81/htdocs/qWDXb.exe
|
109.206.241.81
|
||
www.lafuriaroja.team/jn86/
|
|||
https://cdn.discordapp.com/attachments/1005703293437235255/1005705055426588785/RealProxyFlagsBadSignature.dll
|
162.159.135.233
|
||
https://cdn.discordapp.com/attachments/1005703293437235255/1005705055426588785/RealProxyFlagsBadSign
|
unknown
|
||
http://109.206.241.814
|
unknown
|
||
https://cdn.discordapp.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
cdn.discordapp.com
|
162.159.135.233
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.1
|
unknown
|
unknown
|
||
109.206.241.81
|
unknown
|
Germany
|
||
162.159.135.233
|
cdn.discordapp.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ- 7075-T6_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHivePermissionsCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHiveOwnerCorrect
|
||
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
|
ProgramId
|
||
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
|
FileId
|
||
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
|
LowerCaseLongPath
|
||
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
|
LongPathHash
|
||
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
|
Name
|
||
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
|
Publisher
|
||
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
|
Version
|
||
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
|
BinFileVersion
|
||
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
|
BinaryType
|
||
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
|
ProductName
|
||
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
|
ProductVersion
|
||
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
|
LinkDate
|
||
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
|
BinProductVersion
|
||
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
|
Size
|
||
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
|
Language
|
||
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
|
IsPeFile
|
||
\REGISTRY\A\{d43aea88-df7c-1b73-a04e-7fadf60da59f}\Root\InventoryApplicationFile\rfq- 7075-t6.exe|8f732014
|
IsOsComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
00184006417502B9
|
There are 29 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3C1000
|
remote allocation
|
page execute and read and write
|
||
3619000
|
trusted library allocation
|
page read and write
|
||
35F9000
|
trusted library allocation
|
page read and write
|
||
1D84EF9C000
|
heap
|
page read and write
|
||
1EC687F0000
|
trusted library allocation
|
page read and write
|
||
2862000
|
trusted library allocation
|
page read and write
|
||
26178447000
|
heap
|
page read and write
|
||
E7EB1FF000
|
stack
|
page read and write
|
||
4B8E000
|
stack
|
page read and write
|
||
2586000
|
trusted library allocation
|
page read and write
|
||
13AEFE000
|
stack
|
page read and write
|
||
1D84EF99000
|
heap
|
page read and write
|
||
2634000
|
trusted library allocation
|
page read and write
|
||
1EC69A50000
|
trusted library section
|
page readonly
|
||
1D84EFAA000
|
heap
|
page read and write
|
||
178174A0000
|
heap
|
page read and write
|
||
E7EA6FA000
|
stack
|
page read and write
|
||
2B09000
|
trusted library allocation
|
page read and write
|
||
E7EAD7F000
|
stack
|
page read and write
|
||
28F2000
|
trusted library allocation
|
page read and write
|
||
503E000
|
stack
|
page read and write
|
||
1A975C48000
|
heap
|
page read and write
|
||
1D84EF93000
|
heap
|
page read and write
|
||
2AF6000
|
trusted library allocation
|
page read and write
|
||
27FF000
|
trusted library allocation
|
page read and write
|
||
26DCE500000
|
heap
|
page read and write
|
||
16EF8088000
|
heap
|
page read and write
|
||
2B0B000
|
trusted library allocation
|
page read and write
|
||
1D84E6C7000
|
heap
|
page read and write
|
||
1EC69860000
|
trusted library allocation
|
page read and write
|
||
17819200000
|
trusted library allocation
|
page read and write
|
||
22E68C28000
|
heap
|
page read and write
|
||
1A975C45000
|
heap
|
page read and write
|
||
16EF8002000
|
heap
|
page read and write
|
||
2919000
|
trusted library allocation
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
1D84E613000
|
heap
|
page read and write
|
||
1D84EF74000
|
heap
|
page read and write
|
||
2819000
|
trusted library allocation
|
page read and write
|
||
1D84E6A3000
|
heap
|
page read and write
|
||
1EC6E24B000
|
heap
|
page read and write
|
||
2617847C000
|
heap
|
page read and write
|
||
16EF7F80000
|
heap
|
page read and write
|
||
22E68C7C000
|
heap
|
page read and write
|
||
35F1000
|
trusted library allocation
|
page read and write
|
||
13AFFB000
|
stack
|
page read and write
|
||
1EC69DF0000
|
trusted library allocation
|
page read and write
|
||
25D0000
|
trusted library allocation
|
page read and write
|
||
2B88000
|
trusted library allocation
|
page read and write
|
||
2A9F000
|
trusted library allocation
|
page read and write
|
||
58AF000
|
stack
|
page read and write
|
||
26178459000
|
heap
|
page read and write
|
||
1D84E64E000
|
heap
|
page read and write
|
||
281D000
|
trusted library allocation
|
page read and write
|
||
143CA666000
|
heap
|
page read and write
|
||
1CBB7A52000
|
heap
|
page read and write
|
||
16EF8069000
|
heap
|
page read and write
|
||
2847000
|
trusted library allocation
|
page read and write
|
||
16EF8113000
|
heap
|
page read and write
|
||
7A2B8FA000
|
stack
|
page read and write
|
||
1EC6889D000
|
heap
|
page read and write
|
||
1D84F41A000
|
heap
|
page read and write
|
||
1CBB7A50000
|
heap
|
page read and write
|
||
1CBB7A29000
|
heap
|
page read and write
|
||
16EF8108000
|
heap
|
page read and write
|
||
16EF8065000
|
heap
|
page read and write
|
||
1D84EF91000
|
heap
|
page read and write
|
||
2617847E000
|
heap
|
page read and write
|
||
2934000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
trusted library allocation
|
page read and write
|
||
1D84E658000
|
heap
|
page read and write
|
||
1D84E6EB000
|
heap
|
page read and write
|
||
660000
|
heap
|
page read and write
|
||
D193D7B000
|
stack
|
page read and write
|
||
CFDB87F000
|
stack
|
page read and write
|
||
1D84E5D0000
|
remote allocation
|
page read and write
|
||
17817440000
|
heap
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
4498FFE000
|
stack
|
page read and write
|
||
1D84E5D0000
|
remote allocation
|
page read and write
|
||
2AD9000
|
trusted library allocation
|
page read and write
|
||
25D0000
|
trusted library allocation
|
page read and write
|
||
F4D8FFB000
|
stack
|
page read and write
|
||
1D84E3A0000
|
heap
|
page read and write
|
||
22B2000
|
trusted library allocation
|
page read and write
|
||
143CA713000
|
heap
|
page read and write
|
||
56AE000
|
stack
|
page read and write
|
||
2580000
|
trusted library allocation
|
page read and write
|
||
25E0000
|
heap
|
page execute and read and write
|
||
E7EA7FB000
|
stack
|
page read and write
|
||
23E5000
|
trusted library allocation
|
page read and write
|
||
1EC68891000
|
heap
|
page read and write
|
||
2964000
|
trusted library allocation
|
page read and write
|
||
2983000
|
trusted library allocation
|
page read and write
|
||
1CBB7A62000
|
heap
|
page read and write
|
||
2949000
|
trusted library allocation
|
page read and write
|
||
26178448000
|
heap
|
page read and write
|
||
1EC69A60000
|
trusted library section
|
page readonly
|
||
17814FF000
|
stack
|
page read and write
|
||
25D0000
|
remote allocation
|
page read and write
|
||
D1940FE000
|
stack
|
page read and write
|
||
26DCE508000
|
heap
|
page read and write
|
||
2915000
|
trusted library allocation
|
page read and write
|
||
1EC6E21E000
|
heap
|
page read and write
|
||
2ABE000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
trusted library allocation
|
page read and write
|
||
1D84EF97000
|
heap
|
page read and write
|
||
2966000
|
trusted library allocation
|
page read and write
|
||
5C6E000
|
stack
|
page read and write
|
||
61D647C000
|
stack
|
page read and write
|
||
242B33B0000
|
remote allocation
|
page read and write
|
||
1C87C740000
|
heap
|
page read and write
|
||
26DCE47B000
|
heap
|
page read and write
|
||
2AC0000
|
trusted library allocation
|
page read and write
|
||
1A975C52000
|
heap
|
page read and write
|
||
261782D0000
|
heap
|
page read and write
|
||
D193C7B000
|
stack
|
page read and write
|
||
2945000
|
trusted library allocation
|
page read and write
|
||
1D84E600000
|
heap
|
page read and write
|
||
2AD5000
|
trusted library allocation
|
page read and write
|
||
2AF4860D000
|
heap
|
page read and write
|
||
242B2C2A000
|
heap
|
page read and write
|
||
25D0000
|
trusted library allocation
|
page read and write
|
||
2289BFF000
|
stack
|
page read and write
|
||
1D84F421000
|
heap
|
page read and write
|
||
296E000
|
trusted library allocation
|
page read and write
|
||
1781764B000
|
heap
|
page read and write
|
||
CFDB67A000
|
stack
|
page read and write
|
||
16EF8880000
|
trusted library allocation
|
page read and write
|
||
2B11000
|
trusted library allocation
|
page read and write
|
||
28F4000
|
trusted library allocation
|
page read and write
|
||
22E68D13000
|
heap
|
page read and write
|
||
D193B7E000
|
stack
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
D193A7C000
|
stack
|
page read and write
|
||
27F6000
|
trusted library allocation
|
page read and write
|
||
98E000
|
stack
|
page read and write
|
||
E7EA9FB000
|
stack
|
page read and write
|
||
1EC6DF81000
|
trusted library allocation
|
page read and write
|
||
56C0BDB000
|
stack
|
page read and write
|
||
1A976602000
|
trusted library allocation
|
page read and write
|
||
1EC6E2F1000
|
heap
|
page read and write
|
||
22897FF000
|
stack
|
page read and write
|
||
143CA666000
|
heap
|
page read and write
|
||
2AF48607000
|
heap
|
page read and write
|
||
1EC6E304000
|
heap
|
page read and write
|
||
2ADB000
|
trusted library allocation
|
page read and write
|
||
16EF8102000
|
heap
|
page read and write
|
||
1CBB7A3C000
|
heap
|
page read and write
|
||
1EC6E030000
|
trusted library allocation
|
page read and write
|
||
1D84EF6E000
|
heap
|
page read and write
|
||
1EC6887A000
|
heap
|
page read and write
|
||
1CBB7A5A000
|
heap
|
page read and write
|
||
2864000
|
trusted library allocation
|
page read and write
|
||
61D69FF000
|
stack
|
page read and write
|
||
1A975C23000
|
heap
|
page read and write
|
||
1EC69170000
|
trusted library section
|
page read and write
|
||
1D84EFB2000
|
heap
|
page read and write
|
||
E7EAFFB000
|
stack
|
page read and write
|
||
1C87D313000
|
heap
|
page read and write
|
||
22E68C56000
|
heap
|
page read and write
|
||
1EC6E2FD000
|
heap
|
page read and write
|
||
1EC6DE50000
|
trusted library allocation
|
page read and write
|
||
1D84F402000
|
heap
|
page read and write
|
||
22E68C63000
|
heap
|
page read and write
|
||
4498BDB000
|
stack
|
page read and write
|
||
1EC6DFA4000
|
trusted library allocation
|
page read and write
|
||
320000
|
unkown
|
page read and write
|
||
212000
|
unkown
|
page readonly
|
||
242B2C13000
|
heap
|
page read and write
|
||
2328000
|
trusted library allocation
|
page read and write
|
||
242B2BE0000
|
trusted library allocation
|
page read and write
|
||
17817430000
|
heap
|
page read and write
|
||
26178464000
|
heap
|
page read and write
|
||
5090000
|
trusted library allocation
|
page read and write
|
||
E7EAAFF000
|
stack
|
page read and write
|
||
17817729000
|
heap
|
page read and write
|
||
1D84EFA6000
|
heap
|
page read and write
|
||
17813FD000
|
stack
|
page read and write
|
||
1CBB7A02000
|
heap
|
page read and write
|
||
2AF4861E000
|
heap
|
page read and write
|
||
1D84EF97000
|
heap
|
page read and write
|
||
1D84EF8A000
|
heap
|
page read and write
|
||
2941000
|
trusted library allocation
|
page read and write
|
||
1CBB7A82000
|
heap
|
page read and write
|
||
2AA1000
|
trusted library allocation
|
page read and write
|
||
13AC7B000
|
stack
|
page read and write
|
||
25D0000
|
trusted library allocation
|
page read and write
|
||
1D84E702000
|
heap
|
page read and write
|
||
1EC69215000
|
heap
|
page read and write
|
||
2289CFF000
|
stack
|
page read and write
|
||
4CA0000
|
trusted library allocation
|
page read and write
|
||
2B0F000
|
trusted library allocation
|
page read and write
|
||
17817659000
|
heap
|
page read and write
|
||
6BC000
|
heap
|
page read and write
|
||
261D000
|
trusted library allocation
|
page read and write
|
||
1D84F400000
|
heap
|
page read and write
|
||
E7EAB7F000
|
stack
|
page read and write
|
||
2AF485F6000
|
heap
|
page read and write
|
||
26178442000
|
heap
|
page read and write
|
||
25D0000
|
trusted library allocation
|
page read and write
|
||
2AF48604000
|
heap
|
page read and write
|
||
1EC68913000
|
heap
|
page read and write
|
||
1D84F402000
|
heap
|
page read and write
|
||
26178400000
|
heap
|
page read and write
|
||
1C87C83D000
|
heap
|
page read and write
|
||
17817700000
|
heap
|
page read and write
|
||
143CA678000
|
heap
|
page read and write
|
||
1D84EFA4000
|
heap
|
page read and write
|
||
1A975C00000
|
heap
|
page read and write
|
||
1EC6E2F5000
|
heap
|
page read and write
|
||
1C87C800000
|
heap
|
page read and write
|
||
1D84F402000
|
heap
|
page read and write
|
||
26DCE320000
|
heap
|
page read and write
|
||
22E68C00000
|
heap
|
page read and write
|
||
25D0000
|
trusted library allocation
|
page read and write
|
||
4B0D000
|
stack
|
page read and write
|
||
4CA0000
|
trusted library allocation
|
page read and write
|
||
2A9B000
|
trusted library allocation
|
page read and write
|
||
270A000
|
trusted library allocation
|
page read and write
|
||
1EC69AA0000
|
trusted library section
|
page readonly
|
||
5A2E000
|
stack
|
page read and write
|
||
4EBF000
|
stack
|
page read and write
|
||
920000
|
remote allocation
|
page read and write
|
||
1EC691F0000
|
trusted library allocation
|
page read and write
|
||
1EC68829000
|
heap
|
page read and write
|
||
1D84EF13000
|
heap
|
page read and write
|
||
1A975BF0000
|
trusted library allocation
|
page read and write
|
||
1EC6DF60000
|
trusted library allocation
|
page read and write
|
||
449977C000
|
stack
|
page read and write
|
||
13B2FE000
|
stack
|
page read and write
|
||
22BB000
|
trusted library allocation
|
page execute and read and write
|
||
1EC687C0000
|
heap
|
page read and write
|
||
2AF48626000
|
heap
|
page read and write
|
||
56C12FC000
|
stack
|
page read and write
|
||
1D84EF00000
|
heap
|
page read and write
|
||
56C127F000
|
stack
|
page read and write
|
||
1D84E64B000
|
heap
|
page read and write
|
||
2F1170B000
|
stack
|
page read and write
|
||
1D84F402000
|
heap
|
page read and write
|
||
CFDB7F9000
|
stack
|
page read and write
|
||
1C87C8C1000
|
heap
|
page read and write
|
||
26178465000
|
heap
|
page read and write
|
||
26178443000
|
heap
|
page read and write
|
||
27F0000
|
trusted library allocation
|
page read and write
|
||
1EC6DF6E000
|
trusted library allocation
|
page read and write
|
||
22E69402000
|
trusted library allocation
|
page read and write
|
||
143CA5D0000
|
trusted library allocation
|
page read and write
|
||
17811F7000
|
stack
|
page read and write
|
||
1D84EFAB000
|
heap
|
page read and write
|
||
26178469000
|
heap
|
page read and write
|
||
61D667F000
|
stack
|
page read and write
|
||
469F37F000
|
stack
|
page read and write
|
||
449947C000
|
stack
|
page read and write
|
||
143CB002000
|
trusted library allocation
|
page read and write
|
||
3A9000
|
stack
|
page read and write
|
||
1A975C13000
|
heap
|
page read and write
|
||
1CBB7B08000
|
heap
|
page read and write
|
||
4CA0000
|
trusted library allocation
|
page read and write
|
||
1EC6E300000
|
heap
|
page read and write
|
||
22894FB000
|
stack
|
page read and write
|
||
1D84EF95000
|
heap
|
page read and write
|
||
143CA613000
|
heap
|
page read and write
|
||
38E000
|
stack
|
page read and write
|
||
294E000
|
trusted library allocation
|
page read and write
|
||
25D0000
|
trusted library allocation
|
page read and write
|
||
61D68FE000
|
stack
|
page read and write
|
||
1780F7B000
|
stack
|
page read and write
|
||
E7EA8FE000
|
stack
|
page read and write
|
||
1EC69A80000
|
trusted library section
|
page readonly
|
||
1CBB8202000
|
trusted library allocation
|
page read and write
|
||
1A975B60000
|
heap
|
page read and write
|
||
13AE7C000
|
stack
|
page read and write
|
||
1C87C8CC000
|
heap
|
page read and write
|
||
2845000
|
trusted library allocation
|
page read and write
|
||
143CA66F000
|
heap
|
page read and write
|
||
449927E000
|
stack
|
page read and write
|
||
1D84EF99000
|
heap
|
page read and write
|
||
26DCE3C0000
|
trusted library allocation
|
page read and write
|
||
22A6000
|
trusted library allocation
|
page execute and read and write
|
||
ACF000
|
stack
|
page read and write
|
||
2AEA000
|
trusted library allocation
|
page read and write
|
||
50A0000
|
trusted library allocation
|
page read and write
|
||
1EC68856000
|
heap
|
page read and write
|
||
2817000
|
trusted library allocation
|
page read and write
|
||
46EE000
|
stack
|
page read and write
|
||
1C87C913000
|
heap
|
page read and write
|
||
1D84E708000
|
heap
|
page read and write
|
||
26178435000
|
heap
|
page read and write
|
||
16EF8000000
|
heap
|
page read and write
|
||
178175F0000
|
remote allocation
|
page read and write
|
||
1A975B70000
|
heap
|
page read and write
|
||
22896FE000
|
stack
|
page read and write
|
||
2AD7000
|
trusted library allocation
|
page read and write
|
||
1EC6E287000
|
heap
|
page read and write
|
||
88E000
|
stack
|
page read and write
|
||
26DCE502000
|
heap
|
page read and write
|
||
26DCE513000
|
heap
|
page read and write
|
||
1EC6DE40000
|
trusted library allocation
|
page read and write
|
||
1D84E657000
|
heap
|
page read and write
|
||
1EC6E302000
|
heap
|
page read and write
|
||
1C87C887000
|
heap
|
page read and write
|
||
2843000
|
trusted library allocation
|
page read and write
|
||
2928000
|
trusted library allocation
|
page read and write
|
||
2617845B000
|
heap
|
page read and write
|
||
1EC6889F000
|
heap
|
page read and write
|
||
469F2FE000
|
stack
|
page read and write
|
||
143CA672000
|
heap
|
page read and write
|
||
143CA654000
|
heap
|
page read and write
|
||
1EC6DF80000
|
trusted library allocation
|
page read and write
|
||
1EC6E070000
|
trusted library allocation
|
page read and write
|
||
2930000
|
trusted library allocation
|
page read and write
|
||
1EC68750000
|
heap
|
page read and write
|
||
26DCE44F000
|
heap
|
page read and write
|
||
1D84EFAA000
|
heap
|
page read and write
|
||
C73000
|
trusted library allocation
|
page read and write
|
||
449917E000
|
stack
|
page read and write
|
||
143CA664000
|
heap
|
page read and write
|
||
143CA602000
|
heap
|
page read and write
|
||
4BA0000
|
heap
|
page read and write
|
||
2AB6000
|
trusted library allocation
|
page read and write
|
||
D193FFE000
|
stack
|
page read and write
|
||
1D84E653000
|
heap
|
page read and write
|
||
1D84EF91000
|
heap
|
page read and write
|
||
26178445000
|
heap
|
page read and write
|
||
2F11A7E000
|
stack
|
page read and write
|
||
242B2D02000
|
heap
|
page read and write
|
||
26178458000
|
heap
|
page read and write
|
||
1EC6DF90000
|
trusted library allocation
|
page read and write
|
||
27F2000
|
trusted library allocation
|
page read and write
|
||
2AF4000
|
trusted library allocation
|
page read and write
|
||
1EC69401000
|
trusted library allocation
|
page read and write
|
||
2815000
|
trusted library allocation
|
page read and write
|
||
16EF803C000
|
heap
|
page read and write
|
||
2AF8000
|
trusted library allocation
|
page read and write
|
||
1D84F421000
|
heap
|
page read and write
|
||
2AC000
|
stack
|
page read and write
|
||
4FBE000
|
stack
|
page read and write
|
||
22E68C68000
|
heap
|
page read and write
|
||
2B13000
|
trusted library allocation
|
page read and write
|
||
16EF8013000
|
heap
|
page read and write
|
||
1EC688B1000
|
heap
|
page read and write
|
||
CFDB77F000
|
stack
|
page read and write
|
||
2617842A000
|
heap
|
page read and write
|
||
1EC69A70000
|
trusted library section
|
page readonly
|
||
9CE000
|
stack
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
1781765B000
|
heap
|
page read and write
|
||
4DBE000
|
stack
|
page read and write
|
||
1D84E6AA000
|
heap
|
page read and write
|
||
1EC68875000
|
heap
|
page read and write
|
||
2981000
|
trusted library allocation
|
page read and write
|
||
1EC6E302000
|
heap
|
page read and write
|
||
1C87D339000
|
heap
|
page read and write
|
||
1EC68800000
|
heap
|
page read and write
|
||
178175F0000
|
remote allocation
|
page read and write
|
||
1CBB79C0000
|
trusted library allocation
|
page read and write
|
||
2288F4B000
|
stack
|
page read and write
|
||
7A2B3EB000
|
stack
|
page read and write
|
||
26DCE43C000
|
heap
|
page read and write
|
||
17819002000
|
trusted library allocation
|
page read and write
|
||
2979000
|
trusted library allocation
|
page read and write
|
||
17817602000
|
heap
|
page read and write
|
||
E7EA11B000
|
stack
|
page read and write
|
||
26178446000
|
heap
|
page read and write
|
||
25D0000
|
trusted library allocation
|
page read and write
|
||
4CA0000
|
trusted library allocation
|
page read and write
|
||
1D84F444000
|
heap
|
page read and write
|
||
16EF8081000
|
heap
|
page read and write
|
||
2B8A000
|
trusted library allocation
|
page read and write
|
||
282C000
|
trusted library allocation
|
page read and write
|
||
2617845D000
|
heap
|
page read and write
|
||
2617846B000
|
heap
|
page read and write
|
||
26178270000
|
heap
|
page read and write
|
||
1D84E64A000
|
heap
|
page read and write
|
||
1EC6E2FC000
|
heap
|
page read and write
|
||
1D84F402000
|
heap
|
page read and write
|
||
25D0000
|
remote allocation
|
page read and write
|
||
6FD000
|
stack
|
page read and write
|
||
28F8000
|
trusted library allocation
|
page read and write
|
||
26DCE390000
|
heap
|
page read and write
|
||
449937E000
|
stack
|
page read and write
|
||
2A9D000
|
trusted library allocation
|
page read and write
|
||
282E000
|
trusted library allocation
|
page read and write
|
||
1EC6E2B0000
|
heap
|
page read and write
|
||
22B0000
|
trusted library allocation
|
page read and write
|
||
35F7000
|
trusted library allocation
|
page read and write
|
||
16EF8062000
|
heap
|
page read and write
|
||
1D84E6EE000
|
heap
|
page read and write
|
||
57AF000
|
stack
|
page read and write
|
||
290D000
|
trusted library allocation
|
page read and write
|
||
26178461000
|
heap
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
2AC4000
|
trusted library allocation
|
page read and write
|
||
1D84F402000
|
heap
|
page read and write
|
||
4CA0000
|
trusted library allocation
|
page read and write
|
||
284F000
|
trusted library allocation
|
page read and write
|
||
242B33B0000
|
remote allocation
|
page read and write
|
||
2544000
|
trusted library allocation
|
page read and write
|
||
1D84EF4F000
|
heap
|
page read and write
|
||
26DCE413000
|
heap
|
page read and write
|
||
1781768C000
|
heap
|
page read and write
|
||
22E68C02000
|
heap
|
page read and write
|
||
27FC000
|
trusted library allocation
|
page read and write
|
||
C64000
|
trusted library allocation
|
page read and write
|
||
1EC691F3000
|
trusted library allocation
|
page read and write
|
||
2F11D77000
|
stack
|
page read and write
|
||
E7EACFE000
|
stack
|
page read and write
|
||
26178466000
|
heap
|
page read and write
|
||
2574000
|
trusted library allocation
|
page read and write
|
||
2870000
|
trusted library allocation
|
page read and write
|
||
22E68C3C000
|
heap
|
page read and write
|
||
1D84E650000
|
heap
|
page read and write
|
||
2AF485F1000
|
heap
|
page read and write
|
||
1D84E6EE000
|
heap
|
page read and write
|
||
2AF48610000
|
heap
|
page read and write
|
||
2913000
|
trusted library allocation
|
page read and write
|
||
1CBB7860000
|
heap
|
page read and write
|
||
13B47F000
|
unkown
|
page read and write
|
||
25D0000
|
trusted library allocation
|
page read and write
|
||
1781763F000
|
heap
|
page read and write
|
||
178175F0000
|
remote allocation
|
page read and write
|
||
38D000
|
stack
|
page read and write
|
||
70A000
|
heap
|
page read and write
|
||
CFDB6FF000
|
stack
|
page read and write
|
||
1A975C29000
|
heap
|
page read and write
|
||
1D84E670000
|
heap
|
page read and write
|
||
1CBB7B13000
|
heap
|
page read and write
|
||
2617844E000
|
heap
|
page read and write
|
||
76D000
|
heap
|
page read and write
|
||
17817649000
|
heap
|
page read and write
|
||
25D0000
|
trusted library allocation
|
page read and write
|
||
242B2A70000
|
heap
|
page read and write
|
||
1C87C902000
|
heap
|
page read and write
|
||
2617843E000
|
heap
|
page read and write
|
||
143CA540000
|
heap
|
page read and write
|
||
4CA0000
|
trusted library allocation
|
page read and write
|
||
56C147B000
|
stack
|
page read and write
|
||
1D84EF9B000
|
heap
|
page read and write
|
||
1EC69313000
|
heap
|
page read and write
|
||
26178485000
|
heap
|
page read and write
|
||
1EC68877000
|
heap
|
page read and write
|
||
1EC6DF60000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
trusted library allocation
|
page read and write
|
||
1D84EF74000
|
heap
|
page read and write
|
||
27F8000
|
trusted library allocation
|
page read and write
|
||
E7EABFF000
|
stack
|
page read and write
|
||
16EF7F70000
|
heap
|
page read and write
|
||
1D84E6F6000
|
heap
|
page read and write
|
||
3F0000
|
trusted library allocation
|
page read and write
|
||
2AF488D0000
|
heap
|
page read and write
|
||
469F07E000
|
stack
|
page read and write
|
||
178175C0000
|
trusted library allocation
|
page read and write
|
||
26DCE455000
|
heap
|
page read and write
|
||
143CA600000
|
heap
|
page read and write
|
||
2813000
|
trusted library allocation
|
page read and write
|
||
290B000
|
trusted library allocation
|
page read and write
|
||
25D0000
|
remote allocation
|
page read and write
|
||
2AB8000
|
trusted library allocation
|
page read and write
|
||
4CA0000
|
trusted library allocation
|
page read and write
|
||
1A975C2E000
|
heap
|
page read and write
|
||
26178502000
|
heap
|
page read and write
|
||
1EC688FC000
|
heap
|
page read and write
|
||
26178413000
|
heap
|
page read and write
|
||
2866000
|
trusted library allocation
|
page read and write
|
||
13AD7E000
|
stack
|
page read and write
|
||
178107B000
|
stack
|
page read and write
|
||
CFDB8FF000
|
stack
|
page read and write
|
||
F4D90FE000
|
stack
|
page read and write
|
||
287D000
|
trusted library allocation
|
page read and write
|
||
61D67FE000
|
stack
|
page read and write
|
||
2617845A000
|
heap
|
page read and write
|
||
2AF4860D000
|
heap
|
page read and write
|
||
297F000
|
trusted library allocation
|
page read and write
|
||
56C13FD000
|
stack
|
page read and write
|
||
1EC6DF68000
|
trusted library allocation
|
page read and write
|
||
1EC6DF84000
|
trusted library allocation
|
page read and write
|
||
22E68A30000
|
heap
|
page read and write
|
||
1D84F402000
|
heap
|
page read and write
|
||
1D84EF97000
|
heap
|
page read and write
|
||
26178432000
|
heap
|
page read and write
|
||
296C000
|
trusted library allocation
|
page read and write
|
||
3B0000
|
remote allocation
|
page read and write
|
||
22E689C0000
|
heap
|
page read and write
|
||
26178463000
|
heap
|
page read and write
|
||
1D84F402000
|
heap
|
page read and write
|
||
D193AFE000
|
stack
|
page read and write
|
||
17817613000
|
heap
|
page read and write
|
||
2F1178E000
|
stack
|
page read and write
|
||
4B90000
|
trusted library section
|
page read and write
|
||
1EC6F000000
|
heap
|
page read and write
|
||
23D0000
|
trusted library allocation
|
page read and write
|
||
242B2C24000
|
heap
|
page read and write
|
||
16EF805D000
|
heap
|
page read and write
|
||
178175A0000
|
trusted library allocation
|
page read and write
|
||
1EC68870000
|
heap
|
page read and write
|
||
1C87C8C9000
|
heap
|
page read and write
|
||
296A000
|
trusted library allocation
|
page read and write
|
||
22898FD000
|
stack
|
page read and write
|
||
1D84EF91000
|
heap
|
page read and write
|
||
143CA62A000
|
heap
|
page read and write
|
||
297B000
|
trusted library allocation
|
page read and write
|
||
25D0000
|
trusted library allocation
|
page read and write
|
||
2AF485A0000
|
heap
|
page read and write
|
||
1EC69970000
|
trusted library allocation
|
page read and write
|
||
16EF8A02000
|
trusted library allocation
|
page read and write
|
||
507E000
|
stack
|
page read and write
|
||
1EC69200000
|
heap
|
page read and write
|
||
1EC6DF90000
|
trusted library allocation
|
page read and write
|
||
242B2AE0000
|
heap
|
page read and write
|
||
2868000
|
trusted library allocation
|
page read and write
|
||
1D84EE02000
|
heap
|
page read and write
|
||
292A000
|
trusted library allocation
|
page read and write
|
||
26178470000
|
heap
|
page read and write
|
||
2AF4861D000
|
heap
|
page read and write
|
||
284D000
|
trusted library allocation
|
page read and write
|
||
28FC000
|
trusted library allocation
|
page read and write
|
||
2617843B000
|
heap
|
page read and write
|
||
1EC6E254000
|
heap
|
page read and write
|
||
17818FA0000
|
trusted library allocation
|
page read and write
|
||
2AF4860D000
|
heap
|
page read and write
|
||
1A975C02000
|
heap
|
page read and write
|
||
22A2000
|
trusted library allocation
|
page read and write
|
||
2F11B7B000
|
stack
|
page read and write
|
||
59EE000
|
stack
|
page read and write
|
||
2ABA000
|
trusted library allocation
|
page read and write
|
||
28F6000
|
trusted library allocation
|
page read and write
|
||
2A99000
|
trusted library allocation
|
page read and write
|
||
25D0000
|
trusted library allocation
|
page read and write
|
||
231E000
|
stack
|
page read and write
|
||
2AF48610000
|
heap
|
page read and write
|
||
1EC6E22C000
|
heap
|
page read and write
|
||
1D84EF74000
|
heap
|
page read and write
|
||
1D84EF99000
|
heap
|
page read and write
|
||
2811000
|
trusted library allocation
|
page read and write
|
||
1D84EF93000
|
heap
|
page read and write
|
||
449957C000
|
stack
|
page read and write
|
||
1D84EFDA000
|
heap
|
page read and write
|
||
26178460000
|
heap
|
page read and write
|
||
242B33B0000
|
remote allocation
|
page read and write
|
||
1D84E6DA000
|
heap
|
page read and write
|
||
1EC691D1000
|
trusted library allocation
|
page read and write
|
||
242B2A80000
|
heap
|
page read and write
|
||
1EC68841000
|
heap
|
page read and write
|
||
2911000
|
trusted library allocation
|
page read and write
|
||
210000
|
unkown
|
page readonly
|
||
2932000
|
trusted library allocation
|
page read and write
|
||
1CBB7A66000
|
heap
|
page read and write
|
||
1D84EF87000
|
heap
|
page read and write
|
||
290F000
|
trusted library allocation
|
page read and write
|
||
293F000
|
trusted library allocation
|
page read and write
|
||
1D84EFAF000
|
heap
|
page read and write
|
||
1EC69300000
|
heap
|
page read and write
|
||
22895FF000
|
stack
|
page read and write
|
||
16EF8045000
|
heap
|
page read and write
|
||
C70000
|
trusted library allocation
|
page read and write
|
||
469F47D000
|
stack
|
page read and write
|
||
2852000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
trusted library allocation
|
page read and write
|
||
2AEE000
|
trusted library allocation
|
page read and write
|
||
280F000
|
trusted library allocation
|
page read and write
|
||
1EC69A90000
|
trusted library section
|
page readonly
|
||
13B0F8000
|
stack
|
page read and write
|
||
1D84E6B4000
|
heap
|
page read and write
|
||
2AA3000
|
trusted library allocation
|
page read and write
|
||
1D84E6C0000
|
heap
|
page read and write
|
||
4B4E000
|
stack
|
page read and write
|
||
1EC6E2B2000
|
heap
|
page read and write
|
||
D193DFE000
|
stack
|
page read and write
|
||
292C000
|
trusted library allocation
|
page read and write
|
||
1D84E716000
|
heap
|
page read and write
|
||
1CBB7A57000
|
heap
|
page read and write
|
||
22AA000
|
trusted library allocation
|
page execute and read and write
|
||
1CBB78C0000
|
heap
|
page read and write
|
||
1C87D300000
|
heap
|
page read and write
|
||
25F1000
|
trusted library allocation
|
page read and write
|
||
22B7000
|
trusted library allocation
|
page execute and read and write
|
||
1CBB7A13000
|
heap
|
page read and write
|
||
16EF8029000
|
heap
|
page read and write
|
||
26178C02000
|
trusted library allocation
|
page read and write
|
||
1D84EF74000
|
heap
|
page read and write
|
||
1D84E5D0000
|
remote allocation
|
page read and write
|
||
2917000
|
trusted library allocation
|
page read and write
|
||
2617846C000
|
heap
|
page read and write
|
||
1EC6E23E000
|
heap
|
page read and write
|
||
1D84EF99000
|
heap
|
page read and write
|
||
1D84F418000
|
heap
|
page read and write
|
||
26178441000
|
heap
|
page read and write
|
||
1781764B000
|
heap
|
page read and write
|
||
2985000
|
trusted library allocation
|
page read and write
|
||
242B3402000
|
trusted library allocation
|
page read and write
|
||
287F000
|
trusted library allocation
|
page read and write
|
||
7A2BAFE000
|
stack
|
page read and write
|
||
1C87C750000
|
heap
|
page read and write
|
||
26178475000
|
heap
|
page read and write
|
||
26DCE400000
|
heap
|
page read and write
|
||
F4D89EC000
|
stack
|
page read and write
|
||
1D84EF95000
|
heap
|
page read and write
|
||
1D84EFB6000
|
heap
|
page read and write
|
||
1EC69302000
|
heap
|
page read and write
|
||
4FFE000
|
stack
|
page read and write
|
||
1EC6888C000
|
heap
|
page read and write
|
||
22D0000
|
trusted library allocation
|
page read and write
|
||
6FD000
|
stack
|
page read and write
|
||
4CA0000
|
trusted library allocation
|
page read and write
|
||
17817667000
|
heap
|
page read and write
|
||
4CA0000
|
trusted library allocation
|
page read and write
|
||
469F1FE000
|
stack
|
page read and write
|
||
16EF805F000
|
heap
|
page read and write
|
||
F4D8EFB000
|
stack
|
page read and write
|
||
143CA5A0000
|
heap
|
page read and write
|
||
242B2C02000
|
heap
|
page read and write
|
||
16EF805C000
|
heap
|
page read and write
|
||
27F4000
|
trusted library allocation
|
page read and write
|
||
23C0000
|
trusted library allocation
|
page execute and read and write
|
||
292E000
|
trusted library allocation
|
page read and write
|
||
CFDB978000
|
stack
|
page read and write
|
||
143CA530000
|
heap
|
page read and write
|
||
2962000
|
trusted library allocation
|
page read and write
|
||
26DCE330000
|
heap
|
page read and write
|
||
22E68C13000
|
heap
|
page read and write
|
||
1D84E64D000
|
heap
|
page read and write
|
||
E7EA578000
|
stack
|
page read and write
|
||
25D0000
|
trusted library allocation
|
page read and write
|
||
2AF48627000
|
heap
|
page read and write
|
||
469F0FF000
|
stack
|
page read and write
|
||
56C177C000
|
stack
|
page read and write
|
||
1EC6E2F9000
|
heap
|
page read and write
|
||
5080000
|
trusted library allocation
|
page read and write
|
||
2565000
|
trusted library allocation
|
page read and write
|
||
26DCE429000
|
heap
|
page read and write
|
||
1EC69318000
|
heap
|
page read and write
|
||
469EBCB000
|
stack
|
page read and write
|
||
2AEC000
|
trusted library allocation
|
page read and write
|
||
1EC6E090000
|
trusted library allocation
|
page read and write
|
||
23E0000
|
trusted library allocation
|
page read and write
|
||
1D84EFAA000
|
heap
|
page read and write
|
||
2F11F7E000
|
stack
|
page read and write
|
||
56C187F000
|
stack
|
page read and write
|
||
1D84E713000
|
heap
|
page read and write
|
||
2AF4861C000
|
heap
|
page read and write
|
||
1D84EF99000
|
heap
|
page read and write
|
||
1D84E649000
|
heap
|
page read and write
|
||
17817600000
|
heap
|
page read and write
|
||
61D66FE000
|
stack
|
page read and write
|
||
143CA702000
|
heap
|
page read and write
|
||
E7EADFF000
|
stack
|
page read and write
|
||
1C87C7E0000
|
trusted library allocation
|
page read and write
|
||
5B6E000
|
stack
|
page read and write
|
||
22E68D02000
|
heap
|
page read and write
|
||
1EC6E080000
|
trusted library allocation
|
page read and write
|
||
1EC6E261000
|
heap
|
page read and write
|
||
5B2E000
|
stack
|
page read and write
|
||
2F11E7F000
|
stack
|
page read and write
|
||
2AF48602000
|
heap
|
page read and write
|
||
2AF2000
|
trusted library allocation
|
page read and write
|
||
1D84EF99000
|
heap
|
page read and write
|
||
26DCEE02000
|
trusted library allocation
|
page read and write
|
||
5080000
|
trusted library allocation
|
page read and write
|
||
284B000
|
trusted library allocation
|
page read and write
|
||
1EC69318000
|
heap
|
page read and write
|
||
D193EF7000
|
stack
|
page read and write
|
||
28FA000
|
trusted library allocation
|
page read and write
|
||
25D0000
|
trusted library allocation
|
page read and write
|
||
1D84EF74000
|
heap
|
page read and write
|
||
1A975BC0000
|
heap
|
page read and write
|
||
1D84E655000
|
heap
|
page read and write
|
||
22899FE000
|
stack
|
page read and write
|
||
1781762A000
|
heap
|
page read and write
|
||
26178476000
|
heap
|
page read and write
|
||
1D84EF74000
|
heap
|
page read and write
|
||
1EC6E200000
|
heap
|
page read and write
|
||
2AF488D5000
|
heap
|
page read and write
|
||
2849000
|
trusted library allocation
|
page read and write
|
||
1D84E629000
|
heap
|
page read and write
|
||
2AF485C0000
|
heap
|
page read and write
|
||
295E000
|
trusted library allocation
|
page read and write
|
||
1D84F41A000
|
heap
|
page read and write
|
||
1C87C86F000
|
heap
|
page read and write
|
||
2AF48620000
|
heap
|
page read and write
|
||
920000
|
remote allocation
|
page read and write
|
||
286E000
|
trusted library allocation
|
page read and write
|
||
1D84EF99000
|
heap
|
page read and write
|
||
6B1000
|
heap
|
page read and write
|
||
58EE000
|
stack
|
page read and write
|
||
1CBB7A00000
|
heap
|
page read and write
|
||
1D84EFD9000
|
heap
|
page read and write
|
||
5090000
|
trusted library allocation
|
page read and write
|
||
1C87C7B0000
|
heap
|
page read and write
|
||
1C87C8BB000
|
heap
|
page read and write
|
||
143CA65B000
|
heap
|
page read and write
|
||
1D84EF70000
|
heap
|
page read and write
|
||
1CBB7A8C000
|
heap
|
page read and write
|
||
13ACFE000
|
stack
|
page read and write
|
||
56C117F000
|
stack
|
page read and write
|
||
4CB0000
|
heap
|
page execute and read and write
|
||
22E68B30000
|
trusted library allocation
|
page read and write
|
||
25D0000
|
trusted library allocation
|
page read and write
|
||
1EC68925000
|
heap
|
page read and write
|
||
1EC6E0A0000
|
trusted library allocation
|
page read and write
|
||
1EC68902000
|
heap
|
page read and write
|
||
469EF7E000
|
stack
|
page read and write
|
||
56C0FFC000
|
stack
|
page read and write
|
||
2568000
|
trusted library allocation
|
page read and write
|
||
242B2C00000
|
heap
|
page read and write
|
||
2AF48470000
|
heap
|
page read and write
|
||
7A2B9FF000
|
stack
|
page read and write
|
||
709000
|
heap
|
page read and write
|
||
61D657E000
|
stack
|
page read and write
|
||
26DCE471000
|
heap
|
page read and write
|
||
22E68D00000
|
heap
|
page read and write
|
||
297D000
|
trusted library allocation
|
page read and write
|
||
2637000
|
trusted library allocation
|
page read and write
|
||
294B000
|
trusted library allocation
|
page read and write
|
||
16EF7FE0000
|
heap
|
page read and write
|
||
2617846E000
|
heap
|
page read and write
|
||
1EC6E0C0000
|
remote allocation
|
page read and write
|
||
261783D0000
|
trusted library allocation
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
1A975D02000
|
heap
|
page read and write
|
||
2960000
|
trusted library allocation
|
page read and write
|
||
670000
|
trusted library allocation
|
page read and write
|
||
253E000
|
stack
|
page read and write
|
||
1780B1B000
|
stack
|
page read and write
|
||
3C0000
|
remote allocation
|
page execute and read and write
|
||
1780B9E000
|
stack
|
page read and write
|
||
13B3F9000
|
stack
|
page read and write
|
||
1EC6E0C0000
|
trusted library allocation
|
page read and write
|
||
2B0D000
|
trusted library allocation
|
page read and write
|
||
2289AFE000
|
stack
|
page read and write
|
||
17812FE000
|
stack
|
page read and write
|
||
6BF000
|
heap
|
page read and write
|
||
2289DFE000
|
stack
|
page read and write
|
||
1CBB7850000
|
heap
|
page read and write
|
||
228937B000
|
stack
|
page read and write
|
||
2947000
|
trusted library allocation
|
page read and write
|
||
17817702000
|
heap
|
page read and write
|
||
1EC6E215000
|
heap
|
page read and write
|
||
1D84E6E2000
|
heap
|
page read and write
|
||
2AA7000
|
trusted library allocation
|
page read and write
|
||
1D84E67E000
|
heap
|
page read and write
|
||
C63000
|
trusted library allocation
|
page execute and read and write
|
||
2968000
|
trusted library allocation
|
page read and write
|
||
17817713000
|
heap
|
page read and write
|
||
242B2C58000
|
heap
|
page read and write
|
||
1CBB7B00000
|
heap
|
page read and write
|
||
61D64FE000
|
stack
|
page read and write
|
||
13B1F7000
|
stack
|
page read and write
|
||
1C87C82A000
|
heap
|
page read and write
|
||
2F11C7B000
|
stack
|
page read and write
|
||
1EC68760000
|
heap
|
page read and write
|
||
469F57D000
|
stack
|
page read and write
|
||
2590000
|
trusted library allocation
|
page read and write
|
||
C6D000
|
trusted library allocation
|
page execute and read and write
|
||
1D84EF89000
|
heap
|
page read and write
|
||
24FE000
|
stack
|
page read and write
|
||
1CBB7B02000
|
heap
|
page read and write
|
||
242B2C3D000
|
heap
|
page read and write
|
||
56C157D000
|
stack
|
page read and write
|
||
4CA1000
|
trusted library allocation
|
page read and write
|
||
2B15000
|
trusted library allocation
|
page read and write
|
||
16EF8072000
|
heap
|
page read and write
|
||
286C000
|
trusted library allocation
|
page read and write
|
||
1D84EFB6000
|
heap
|
page read and write
|
||
143CA641000
|
heap
|
page read and write
|
||
7A2B7FE000
|
stack
|
page read and write
|
||
1A975C3C000
|
heap
|
page read and write
|
||
27FA000
|
trusted library allocation
|
page read and write
|
||
26DCE487000
|
heap
|
page read and write
|
||
1EC69870000
|
trusted library allocation
|
page read and write
|
||
1D84E63C000
|
heap
|
page read and write
|
||
1D84EF97000
|
heap
|
page read and write
|
||
2AF48610000
|
heap
|
page read and write
|
||
1781765B000
|
heap
|
page read and write
|
||
1D84E510000
|
trusted library allocation
|
page read and write
|
||
240000
|
heap
|
page read and write
|
||
1EC6E0C0000
|
remote allocation
|
page read and write
|
||
1C87C813000
|
heap
|
page read and write
|
||
2834000
|
trusted library allocation
|
page read and write
|
||
16EF8057000
|
heap
|
page read and write
|
||
2AF0000
|
trusted library allocation
|
page read and write
|
||
16EF8100000
|
heap
|
page read and write
|
||
1780E7E000
|
stack
|
page read and write
|
||
17817676000
|
heap
|
page read and write
|
||
2626000
|
trusted library allocation
|
page read and write
|
||
22A0000
|
trusted library allocation
|
page read and write
|
||
2554000
|
trusted library allocation
|
page read and write
|
||
22E689D0000
|
heap
|
page read and write
|
||
2AF48606000
|
heap
|
page read and write
|
||
26178260000
|
heap
|
page read and write
|
||
26178462000
|
heap
|
page read and write
|
||
1D84EF76000
|
heap
|
page read and write
|
||
1EC6E2E9000
|
heap
|
page read and write
|
||
2617847F000
|
heap
|
page read and write
|
||
E7EAEF9000
|
stack
|
page read and write
|
||
1EC6E0C0000
|
remote allocation
|
page read and write
|
||
1EC69202000
|
heap
|
page read and write
|
||
449967E000
|
stack
|
page read and write
|
||
1D84E410000
|
heap
|
page read and write
|
||
1D84EF99000
|
heap
|
page read and write
|
||
1CBB7A5E000
|
heap
|
page read and write
|
||
2AF485E0000
|
heap
|
page read and write
|
||
1C87D202000
|
heap
|
page read and write
|
||
1D84EFB5000
|
heap
|
page read and write
|
||
56C167E000
|
stack
|
page read and write
|
||
1D84E6B0000
|
heap
|
page read and write
|
||
286A000
|
trusted library allocation
|
page read and write
|
||
1D84EFA5000
|
heap
|
page read and write
|
||
1EC6E0B0000
|
trusted library allocation
|
page read and write
|
||
1EC68813000
|
heap
|
page read and write
|
||
1D84EF8F000
|
heap
|
page read and write
|
||
2AFA000
|
trusted library allocation
|
page read and write
|
||
1EC6DFA0000
|
trusted library allocation
|
page read and write
|
||
16EF8054000
|
heap
|
page read and write
|
||
1D84EF10000
|
heap
|
page read and write
|
||
1D84EF91000
|
heap
|
page read and write
|
||
1D84E686000
|
heap
|
page read and write
|
||
1D84E3B0000
|
heap
|
page read and write
|
||
2AF485F6000
|
heap
|
page read and write
|
||
17810FF000
|
stack
|
page read and write
|
||
1A975C1F000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
E7EAA7E000
|
stack
|
page read and write
|
There are 813 hidden memdumps, click here to show them.