IOC Report
fyTwP4SHWF.exe

loading gif

Files

File Path
Type
Category
Malicious
fyTwP4SHWF.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\rnixgfly.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
data
dropped
malicious
C:\Users\user\AppData\Roaming\ilkqegcy\jfcarlsrvb.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_jfcarlsrvb.exe_f36b28a8e4f7e8b0d66d5d37aab64913222e2789_70c0d770_117b1399\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_jfcarlsrvb.exe_f36b28a8e4f7e8b0d66d5d37aab64913222e2789_70c0d770_17471e38\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER14E1.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Feb 1 13:14:32 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1705.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER17A2.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER31E.tmp.dmp
Mini DuMP crash report, 14 streams, Wed Feb 1 13:14:27 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER571.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5A1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsvBAAC.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\somvwkehjlp.rt
data
dropped
C:\Users\user\AppData\Local\Temp\vvnwaf.f
data
dropped
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
data
dropped
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
data
dropped
C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
data
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\fyTwP4SHWF.exe
C:\Users\user\Desktop\fyTwP4SHWF.exe
malicious
C:\Users\user\AppData\Local\Temp\rnixgfly.exe
"C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\AppData\Local\Temp\somvwkehjlp.rt
malicious
C:\Users\user\AppData\Local\Temp\rnixgfly.exe
C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe
malicious
C:\Users\user\AppData\Roaming\ilkqegcy\jfcarlsrvb.exe
"C:\Users\user\AppData\Roaming\ilkqegcy\jfcarlsrvb.exe" "C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4528 -s 656
C:\Users\user\AppData\Roaming\ilkqegcy\jfcarlsrvb.exe
"C:\Users\user\AppData\Roaming\ilkqegcy\jfcarlsrvb.exe" "C:\Users\user~1\AppData\Local\Temp\rnixgfly.exe" C:\Users\user~1\
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5880 -s 628

URLs

Name
IP
Malicious
boele.duckdns.org
malicious
http://nsis.sf.net/NSIS_ErrorError
unknown
http://google.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
boele.duckdns.org
45.137.65.132
malicious

IPs

IP
Domain
Country
Malicious
45.137.65.132
boele.duckdns.org
Netherlands
malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
ryhcwrfexidnfv
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
001840097DD1D03E
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags

Memdumps

Base Address
Regiontype
Protect
Malicious
35E1000
trusted library allocation
page read and write
malicious
5C8000
heap
page read and write
malicious
4F62000
direct allocation
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
58C0000
trusted library section
page read and write
malicious
2210000
direct allocation
page read and write
malicious
2490000
trusted library section
page read and write
malicious
5BD1000
heap
page read and write
5A21000
heap
page read and write
6F9C000
stack
page read and write
1D564E30000
heap
page read and write
1D564465000
heap
page read and write
5D70000
trusted library allocation
page read and write
12EC0E5B000
heap
page read and write
5A5B000
heap
page read and write
4C8000
heap
page read and write
6FDF000
heap
page read and write
6830000
trusted library allocation
page read and write
A6B000
trusted library allocation
page execute and read and write
5BB2000
heap
page read and write
5120000
trusted library allocation
page read and write
1750E2E9000
heap
page read and write
5A4B000
heap
page read and write
21993B90000
remote allocation
page read and write
5120000
trusted library allocation
page read and write
A70000
heap
page read and write
6FDF000
heap
page read and write
64E000
stack
page read and write
5A5B000
heap
page read and write
6A90000
trusted library allocation
page read and write
5BB2000
heap
page read and write
5490000
trusted library allocation
page read and write
6FBE000
heap
page read and write
6850000
trusted library allocation
page read and write
6FD8000
heap
page read and write
6CF0000
trusted library allocation
page read and write
6FDF000
heap
page read and write
5B61000
heap
page read and write
21993B60000
trusted library allocation
page read and write
6FC0000
heap
page read and write
53A0000
trusted library allocation
page read and write
5BB2000
heap
page read and write
5BA6000
heap
page read and write
5BB2000
heap
page read and write
6C20000
trusted library allocation
page read and write
5BA2000
heap
page read and write
5A26000
trusted library allocation
page read and write
6FDF000
heap
page read and write
1448DE61000
heap
page read and write
6FDF000
heap
page read and write
5BB2000
heap
page read and write
5390000
trusted library allocation
page read and write
414000
unkown
page write copy
7A5C000
stack
page read and write
5BBE000
heap
page read and write
1448DC20000
heap
page read and write
6640000
trusted library allocation
page read and write
5A4B000
heap
page read and write
5250000
trusted library allocation
page read and write
1448DE76000
heap
page read and write
1A6EF000
direct allocation
page read and write
5A21000
heap
page read and write
530000
heap
page read and write
5BA6000
heap
page read and write
6C10000
trusted library allocation
page read and write
5B83000
heap
page read and write
5A31000
heap
page read and write
5100000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
5BB2000
heap
page read and write
1448DE29000
heap
page read and write
58A0000
trusted library allocation
page read and write
5A5B000
heap
page read and write
5A21000
heap
page read and write
32909FE000
stack
page read and write
5A5B000
heap
page read and write
67C0000
trusted library section
page read and write
30000
heap
page read and write
5B83000
heap
page read and write
6D00000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
2836000
trusted library allocation
page read and write
5BA5000
heap
page read and write
5BB2000
heap
page read and write
8CF000
stack
page read and write
24FD000
trusted library allocation
page read and write
1D564350000
trusted library allocation
page read and write
9E1A7E000
stack
page read and write
5A4B000
heap
page read and write
5BB2000
heap
page read and write
5260000
trusted library allocation
page read and write
17201DF0000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
5D60000
trusted library allocation
page read and write
5A4B000
heap
page read and write
5390000
trusted library allocation
page read and write
400000
unkown
page readonly
6FB5000
heap
page read and write
1D564230000
heap
page read and write
5A5B000
heap
page read and write
645000
heap
page read and write
5BA8000
heap
page read and write
66A000
heap
page read and write
579C000
stack
page read and write
6FDF000
heap
page read and write
4FB0000
trusted library allocation
page read and write
5A64000
heap
page read and write
5BB2000
heap
page read and write
5A5B000
heap
page read and write
6830000
trusted library allocation
page read and write
1720200D000
unkown
page read and write
2486000
direct allocation
page read and write
464E000
stack
page read and write
410000
unkown
page readonly
5BBE000
heap
page read and write
1A6EF000
direct allocation
page read and write
63FD000
stack
page read and write
5A5B000
heap
page read and write
4BC000
heap
page read and write
5BA4000
heap
page read and write
1D564E00000
heap
page read and write
6FDF000
heap
page read and write
68E0000
trusted library allocation
page read and write
2360000
heap
page read and write
5B91000
heap
page read and write
6800000
trusted library section
page read and write
613F000
stack
page read and write
5BB2000
heap
page read and write
21993B90000
remote allocation
page read and write
660000
heap
page read and write
1448DE6C000
heap
page read and write
960000
heap
page read and write
687000
heap
page read and write
A10000
trusted library section
page read and write
414000
unkown
page read and write
6860000
trusted library section
page read and write
5B91000
heap
page read and write
2370000
direct allocation
page read and write
6CF0000
trusted library allocation
page read and write
1448DE7A000
heap
page read and write
795D000
stack
page read and write
5100000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
5BBA000
heap
page read and write
A77000
heap
page read and write
271EFEB000
stack
page read and write
1A5D0000
direct allocation
page read and write
5BBE000
heap
page read and write
1E9F842F000
heap
page read and write
5BC1000
heap
page read and write
5260000
trusted library allocation
page read and write
5A5B000
heap
page read and write
490000
heap
page read and write
2500000
heap
page read and write
1D564DB1000
heap
page read and write
12EC0F02000
heap
page read and write
5BA4000
heap
page read and write
68D0000
trusted library allocation
page read and write
5A47000
heap
page read and write
B37000
heap
page read and write
6FFE000
heap
page read and write
5BBE000
heap
page read and write
5BCF000
heap
page read and write
1A6EF000
direct allocation
page read and write
5BB2000
heap
page read and write
5BC1000
heap
page read and write
6FDF000
heap
page read and write
253F000
trusted library allocation
page read and write
2370000
direct allocation
page read and write
50A1000
trusted library allocation
page read and write
68C0000
trusted library allocation
page read and write
5B8D000
heap
page read and write
5A64000
heap
page read and write
5A5B000
heap
page read and write
67C5000
trusted library allocation
page read and write
5A5B000
heap
page read and write
5BB2000
heap
page read and write
6FDF000
heap
page read and write
5A4B000
heap
page read and write
5BB2000
heap
page read and write
17202065000
heap
page read and write
3A86000
trusted library allocation
page read and write
45E000
stack
page read and write
1D564443000
heap
page read and write
5A5B000
heap
page read and write
3B3B000
trusted library allocation
page read and write
5A64000
heap
page read and write
6FDF000
heap
page read and write
5BAD000
heap
page read and write
39AC000
trusted library allocation
page read and write
5A21000
heap
page read and write
364D000
trusted library allocation
page read and write
5A21000
heap
page read and write
5BB2000
heap
page read and write
5A21000
heap
page read and write
5EFE000
stack
page read and write
4E90000
trusted library allocation
page execute and read and write
5A31000
heap
page read and write
1A6EF000
direct allocation
page read and write
58B0000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
5490000
trusted library allocation
page read and write
ADE000
stack
page read and write
5BB2000
heap
page read and write
A52000
trusted library allocation
page read and write
1A5859E000
stack
page read and write
5A4B000
heap
page read and write
5B83000
heap
page read and write
57A4000
trusted library allocation
page read and write
5B73000
heap
page read and write
5BB2000
heap
page read and write
1D56458E000
heap
page read and write
5BBE000
heap
page read and write
5A5B000
heap
page read and write
5BAD000
heap
page read and write
39BC000
trusted library allocation
page read and write
5BBD000
heap
page read and write
5BB2000
heap
page read and write
5BB2000
heap
page read and write
5BC1000
heap
page read and write
9E197F000
stack
page read and write
5260000
heap
page read and write
5A4B000
heap
page read and write
62D000
heap
page read and write
5BB2000
heap
page read and write
645000
heap
page read and write
4DE000
stack
page read and write
6A25000
unkown
page read and write
5BBF000
heap
page read and write
17202115000
trusted library allocation
page read and write
5BC6000
heap
page read and write
5BAB000
heap
page read and write
58A8000
unkown
page read and write
5060000
trusted library allocation
page read and write
5BBE000
heap
page read and write
5820000
trusted library allocation
page read and write
3A66000
trusted library allocation
page read and write
21993C00000
heap
page read and write
5A4B000
heap
page read and write
414000
unkown
page read and write
1E9F8402000
heap
page read and write
4F50000
trusted library allocation
page read and write
401000
unkown
page execute read
5A91000
heap
page read and write
2500000
trusted library allocation
page read and write
2520000
trusted library allocation
page read and write
5BA6000
heap
page read and write
19C000
stack
page read and write
BC0000
heap
page read and write
5820000
trusted library allocation
page read and write
5A4B000
heap
page read and write
6CF0000
trusted library allocation
page read and write
5A64000
heap
page read and write
5A4B000
heap
page read and write
1448DE57000
heap
page read and write
6D00000
trusted library allocation
page read and write
1750E2CD000
heap
page read and write
58B0000
trusted library section
page read and write
5BB2000
heap
page read and write
5A41000
heap
page read and write
2370000
direct allocation
page read and write
1D564474000
heap
page read and write
A40000
trusted library allocation
page read and write
5A5B000
heap
page read and write
6501000
trusted library allocation
page read and write
5A4B000
heap
page read and write
5BB2000
heap
page read and write
5A5B000
heap
page read and write
5BB2000
heap
page read and write
5B8C000
heap
page read and write
500000
heap
page read and write
5A4F000
heap
page read and write
410000
unkown
page readonly
5BB2000
heap
page read and write
5A21000
heap
page read and write
4B0000
heap
page read and write
5A4B000
heap
page read and write
6D00000
trusted library allocation
page read and write
50E0000
trusted library allocation
page execute and read and write
661000
heap
page read and write
5A64000
heap
page read and write
6FDF000
heap
page read and write
5A90000
heap
page read and write
1448DF02000
heap
page read and write
400000
unkown
page readonly
5B83000
heap
page read and write
5BBE000
heap
page read and write
1448DE13000
heap
page read and write
5A30000
heap
page read and write
5BC6000
heap
page read and write
4C8000
heap
page read and write
1A5887E000
stack
page read and write
24F4000
trusted library allocation
page read and write
6FBE000
heap
page read and write
5100000
trusted library allocation
page read and write
475000
heap
page read and write
5100000
trusted library allocation
page read and write
434F4FD000
stack
page read and write
17202202000
heap
page read and write
1750E313000
heap
page read and write
6C00000
trusted library allocation
page read and write
9D000
stack
page read and write
5BB2000
heap
page read and write
49D000
heap
page read and write
5490000
trusted library allocation
page read and write
5A21000
heap
page read and write
39DC000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
58AD000
trusted library allocation
page read and write
470000
heap
page read and write
58A0000
trusted library allocation
page read and write
5A64000
heap
page read and write
67C0000
trusted library allocation
page read and write
A7C000
heap
page read and write
50D0000
trusted library allocation
page read and write
5BB2000
heap
page read and write
A33000
trusted library allocation
page execute and read and write
17202002000
unkown
page read and write
5A4B000
heap
page read and write
A0F000
stack
page read and write
6CF0000
trusted library allocation
page read and write
A30000
trusted library allocation
page read and write
16127AC000
stack
page read and write
5BCD000
heap
page read and write
5BB2000
heap
page read and write
4C4000
heap
page read and write
5BAC000
heap
page read and write
5B7A000
heap
page read and write
67D0000
trusted library allocation
page read and write
10007B000
stack
page read and write
5B83000
heap
page read and write
5A4B000
heap
page read and write
6FDF000
heap
page read and write
195000
stack
page read and write
1E9F843A000
heap
page read and write
2486000
direct allocation
page read and write
5490000
trusted library allocation
page read and write
9E157F000
stack
page read and write
271F97C000
stack
page read and write
1448DE46000
heap
page read and write
434F27E000
stack
page read and write
5A4B000
heap
page read and write
5A64000
heap
page read and write
1448DE5A000
heap
page read and write
6A10000
trusted library allocation
page read and write
624000
heap
page read and write
6FD7000
heap
page read and write
5101000
trusted library allocation
page read and write
5BB2000
heap
page read and write
BF0000
heap
page read and write
7CE000
stack
page read and write
1E9F8413000
heap
page read and write
434F67D000
stack
page read and write
1448DE00000
heap
page read and write
57A0000
trusted library allocation
page read and write
100AFF000
stack
page read and write
1E9F8502000
heap
page read and write
5BC1000
heap
page read and write
5D65000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
5A4B000
heap
page read and write
67B0000
heap
page read and write
5B5E000
heap
page read and write
5A41000
heap
page read and write
1720201F000
unkown
page read and write
8CE000
stack
page read and write
1D5641D0000
heap
page read and write
17202300000
heap
page read and write
1A6EB000
direct allocation
page read and write
5A21000
heap
page read and write
1A58CFE000
stack
page read and write
5825000
trusted library allocation
page read and write
2370000
direct allocation
page read and write
6A20000
trusted library allocation
page read and write
12EC0E00000
heap
page read and write
6A10000
trusted library allocation
page read and write
5A21000
heap
page read and write
641000
heap
page read and write
5D60000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
1A5D0000
direct allocation
page read and write
5BB2000
heap
page read and write
5A90000
heap
page read and write
5B63000
heap
page read and write
6C00000
trusted library allocation
page read and write
5BB2000
heap
page read and write
5260000
trusted library allocation
page read and write
3B4B000
trusted library allocation
page read and write
5A21000
heap
page read and write
5A5B000
heap
page read and write
6840000
trusted library allocation
page read and write
5A21000
heap
page read and write
40A000
unkown
page write copy
6BE0000
trusted library allocation
page read and write
63E000
heap
page read and write
427000
unkown
page read and write
5BB2000
heap
page read and write
5A4A000
heap
page read and write
67B7000
trusted library allocation
page read and write
5BBE000
heap
page read and write
5A21000
heap
page read and write
A56000
trusted library allocation
page execute and read and write
1448DE24000
heap
page read and write
5A21000
heap
page read and write
5A4B000
heap
page read and write
5BB2000
heap
page read and write
6830000
trusted library section
page read and write
22E8000
trusted library allocation
page read and write
9B000
stack
page read and write
1E9F8454000
heap
page read and write
401000
unkown
page execute read
6660000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
5BB2000
heap
page read and write
89F000
stack
page read and write
17202313000
heap
page read and write
1448DE45000
heap
page read and write
68C0000
trusted library allocation
page read and write
5A5B000
heap
page read and write
5FFF000
stack
page read and write
410000
unkown
page readonly
5A4B000
heap
page read and write
6CF0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6A20000
trusted library allocation
page read and write
5A64000
heap
page read and write
5BBE000
heap
page read and write
397C000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
5BB2000
heap
page read and write
6C00000
trusted library allocation
page read and write
21993C13000
heap
page read and write
6860000
trusted library allocation
page read and write
5BB2000
heap
page read and write
5BB2000
heap
page read and write
9E1B7E000
stack
page read and write
5A21000
heap
page read and write
5BA4000
heap
page read and write
2370000
heap
page read and write
5BCD000
heap
page read and write
5A64000
heap
page read and write
1D564C02000
heap
page read and write
5250000
trusted library allocation
page read and write
5A21000
heap
page read and write
50D0000
trusted library allocation
page read and write
5B61000
heap
page read and write
1448DE31000
heap
page read and write
591D000
stack
page read and write
5A5B000
heap
page read and write
6FDF000
heap
page read and write
1750E2E1000
heap
page read and write
5BB2000
heap
page read and write
5A5B000
heap
page read and write
5A5B000
heap
page read and write
5B9A000
heap
page read and write
58B0000
trusted library allocation
page read and write
5B8C000
heap
page read and write
5A4B000
heap
page read and write
32908FF000
stack
page read and write
5A64000
heap
page read and write
1448DE42000
heap
page read and write
5BBE000
heap
page read and write
5D70000
trusted library allocation
page execute and read and write
5BA2000
heap
page read and write
26B4000
trusted library allocation
page read and write
6FDF000
heap
page read and write
5BA6000
heap
page read and write
5B8C000
heap
page read and write
9E1D7F000
stack
page read and write
5A21000
heap
page read and write
5100000
trusted library allocation
page read and write
1A6EB000
direct allocation
page read and write
400000
unkown
page readonly
365D000
trusted library allocation
page read and write
3A96000
trusted library allocation
page read and write
3E51000
trusted library allocation
page read and write
5A90000
heap
page read and write
6CF5000
trusted library allocation
page read and write
5A4A000
heap
page read and write
5A64000
heap
page read and write
1D564D94000
heap
page read and write
27E0000
trusted library allocation
page read and write
5A5B000
heap
page read and write
401000
unkown
page execute read
5BC1000
heap
page read and write
A5A000
trusted library allocation
page execute and read and write
1750E200000
heap
page read and write
5BA6000
heap
page read and write
5A92000
heap
page read and write
5A4B000
heap
page read and write
5A5B000
heap
page read and write
1D564D02000
heap
page read and write
17202102000
trusted library allocation
page read and write
5A21000
heap
page read and write
5B8C000
heap
page read and write
755C000
stack
page read and write
A3D000
trusted library allocation
page execute and read and write
1A6EF000
direct allocation
page read and write
5B80000
heap
page read and write
1750EB00000
heap
page read and write
5B5A000
heap
page read and write
5BBE000
heap
page read and write
6FA0000
heap
page read and write
635000
heap
page read and write
5D60000
trusted library allocation
page read and write
3AA6000
trusted library allocation
page read and write
5A21000
heap
page read and write
5260000
trusted library allocation
page read and write
5A4B000
heap
page read and write
5A5B000
heap
page read and write
271FB7D000
stack
page read and write
22A0000
heap
page read and write
5BB2000
heap
page read and write
5B9A000
heap
page read and write
1448DE62000
heap
page read and write
5BC5000
heap
page read and write
6FDF000
heap
page read and write
1D564481000
heap
page read and write
5A4B000
heap
page read and write
5BB2000
heap
page read and write
6BD0000
trusted library allocation
page read and write
68D4000
trusted library allocation
page read and write
6D10000
trusted library allocation
page read and write
1750E040000
heap
page read and write
1D564493000
heap
page read and write
5260000
trusted library allocation
page read and write
5810000
trusted library section
page read and write
5A5B000
heap
page read and write
6FDF000
heap
page read and write
1D56447B000
heap
page read and write
1A6EF000
direct allocation
page read and write
6CF0000
trusted library allocation
page read and write
6FB5000
heap
page read and write
5C5D000
stack
page read and write
1448DE47000
heap
page read and write
5BD9000
heap
page read and write
603E000
stack
page read and write
21993C27000
heap
page read and write
645000
heap
page read and write
6830000
trusted library allocation
page read and write
589F000
stack
page read and write
1A6EB000
direct allocation
page read and write
30000
heap
page read and write
17201DE0000
heap
page read and write
B20000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
5BB2000
heap
page read and write
396C000
trusted library allocation
page read and write
4F45000
trusted library allocation
page read and write
1750E271000
heap
page read and write
5BB2000
heap
page read and write
5B7F000
heap
page read and write
5A21000
heap
page read and write
1D5641C0000
heap
page read and write
5BB2000
heap
page read and write
643000
heap
page read and write
5D60000
trusted library allocation
page read and write
5A5B000
heap
page read and write
4FB0000
trusted library allocation
page read and write
5A64000
heap
page read and write
5A4B000
heap
page read and write
5A21000
heap
page read and write
5BB2000
heap
page read and write
5A4B000
heap
page read and write
523C000
stack
page read and write
398C000
trusted library allocation
page read and write
5BC1000
heap
page read and write
538E000
stack
page read and write
5070000
heap
page read and write
6CF0000
trusted library allocation
page read and write
B30000
heap
page read and write
6FB5000
heap
page read and write
5490000
trusted library allocation
page read and write
5BC1000
heap
page read and write
5A64000
heap
page read and write
1E9F83A0000
trusted library allocation
page read and write
5B83000
heap
page read and write
5B91000
heap
page read and write
67B0000
unkown
page read and write
5A4B000
heap
page read and write
5BB2000
heap
page read and write
12EC0F13000
heap
page read and write
50D0000
trusted library allocation
page read and write
1448DE5F000
heap
page read and write
1D564D54000
heap
page read and write
5BB2000
heap
page read and write
5A21000
heap
page read and write
271F6FC000
stack
page read and write
6FD7000
heap
page read and write
5D60000
trusted library allocation
page read and write
5A21000
heap
page read and write
5490000
trusted library allocation
page read and write
3A0C000
trusted library allocation
page read and write
1A5D0000
direct allocation
page read and write
480000
direct allocation
page execute and read and write
1A6EB000
direct allocation
page read and write
5820000
trusted library allocation
page read and write
6FD7000
heap
page read and write
5B8C000
heap
page read and write
6D00000
trusted library allocation
page read and write
A4D000
trusted library allocation
page execute and read and write
5A5B000
heap
page read and write
5A90000
heap
page read and write
54A0000
trusted library allocation
page read and write
641000
heap
page read and write
58B0000
trusted library allocation
page read and write
5BB2000
heap
page read and write
271F57F000
stack
page read and write
49E000
stack
page read and write
684A000
trusted library allocation
page read and write
1E9F843C000
heap
page read and write
6FDF000
heap
page read and write
435000
unkown
page read and write
5100000
trusted library allocation
page read and write
410000
unkown
page readonly
1612E7F000
stack
page read and write
17202123000
heap
page read and write
6FDF000
heap
page read and write
5D60000
trusted library allocation
page read and write
50D0000
trusted library allocation
page read and write
480000
heap
page read and write
5BBE000
heap
page read and write
5BCF000
heap
page read and write
1D564D6F000
heap
page read and write
6830000
trusted library allocation
page read and write
5B80000
heap
page read and write
5A4B000
heap
page read and write
5BC1000
heap
page read and write
1750E229000
heap
page read and write
5A21000
heap
page read and write
67B0000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
17202000000
unkown
page read and write
5BC1000
heap
page read and write
6FDF000
heap
page read and write
6D00000
trusted library allocation
page read and write
5BB2000
heap
page read and write
64B000
heap
page read and write
58A0000
trusted library allocation
page read and write
5A4B000
heap
page read and write
5D60000
trusted library allocation
page read and write
5A4B000
heap
page read and write
6830000
trusted library allocation
page read and write
19C000
stack
page read and write
5BA6000
heap
page read and write
5BB2000
heap
page read and write
32906FE000
stack
page read and write
6FDF000
heap
page read and write
5A5B000
heap
page read and write
50F0000
trusted library allocation
page read and write
5A31000
heap
page read and write
21993C3C000
heap
page read and write
5BB2000
heap
page read and write
5BB2000
heap
page read and write
5BC1000
heap
page read and write
58C0000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
4A0000
heap
page read and write
5A4B000
heap
page read and write
5BC1000
heap
page read and write
5BA6000
heap
page read and write
5BBE000
heap
page read and write
6FDF000
heap
page read and write
5BCF000
heap
page read and write
5A5B000
heap
page read and write
97F000
stack
page read and write
535000
heap
page read and write
6FDF000
heap
page read and write
7CE000
stack
page read and write
1448DBC0000
heap
page read and write
5A64000
heap
page read and write
5A5B000
heap
page read and write
5BB2000
heap
page read and write
585E000
stack
page read and write
9E1C7F000
stack
page read and write
6A30000
trusted library allocation
page read and write
6FDF000
heap
page read and write
1D564E02000
heap
page read and write
5A21000
heap
page read and write
5BB2000
heap
page read and write
67C0000
trusted library allocation
page read and write
3AD6000
trusted library allocation
page read and write
1750DFE0000
heap
page read and write
58C6000
trusted library allocation
page read and write
17201E50000
heap
page read and write
58A0000
unkown
page read and write
5B81000
heap
page read and write
5A63000
heap
page read and write
434F2FE000
stack
page read and write
5A21000
heap
page read and write
6FFD000
heap
page read and write
62B000
heap
page read and write
6FA1000
heap
page read and write
1D56446C000
heap
page read and write
5A90000
heap
page read and write
1E9F8E02000
trusted library allocation
page read and write
5A4B000
heap
page read and write
6FDF000
heap
page read and write
64B000
heap
page read and write
5B5D000
heap
page read and write
5240000
trusted library allocation
page read and write
5A64000
heap
page read and write
6FDF000
heap
page read and write
5D60000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
1E9F8429000
heap
page read and write
1750E213000
heap
page read and write
A20000
trusted library allocation
page read and write
6C00000
trusted library allocation
page read and write
5A21000
heap
page read and write
5A5B000
heap
page read and write
6870000
trusted library allocation
page read and write
6C00000
trusted library allocation
page read and write
5BB2000
heap
page read and write
50F0000
trusted library allocation
page read and write
401000
unkown
page execute read
5A31000
heap
page read and write
5A21000
heap
page read and write
1E9F8370000
heap
page read and write
5A5B000
heap
page read and write
79E000
stack
page read and write
50D0000
trusted library allocation
page read and write
2540000
heap
page execute and read and write
68C0000
trusted library allocation
page execute and read and write
5A4B000
heap
page read and write
1D564488000
heap
page read and write
6FBE000
heap
page read and write
50D0000
trusted library allocation
page read and write
410000
unkown
page readonly
5D60000
trusted library section
page read and write
4FB5000
trusted library allocation
page read and write
68D0000
trusted library allocation
page read and write
1D564E27000
heap
page read and write
5D60000
trusted library allocation
page read and write
1A6EB000
direct allocation
page read and write
5A4B000
heap
page read and write
395C000
trusted library allocation
page read and write
6FDF000
heap
page read and write
68D0000
trusted library allocation
page read and write
5A5B000
heap
page read and write
400000
unkown
page readonly
6CF0000
trusted library allocation
page read and write
58B8000
trusted library allocation
page read and write
A50000
trusted library allocation
page read and write
6BD0000
trusted library allocation
page read and write
9E127B000
stack
page read and write
6FBE000
heap
page read and write
1448DE69000
heap
page read and write
5BB2000
heap
page read and write
5A41000
heap
page read and write
5BB2000
heap
page read and write
19A000
stack
page read and write
4FB0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
5BA6000
heap
page read and write
296C000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
5A4B000
heap
page read and write
5A5B000
heap
page read and write
5B9A000
heap
page read and write
5BCD000
heap
page read and write
250C000
trusted library allocation
page read and write
271FC7F000
stack
page read and write
2486000
direct allocation
page read and write
50A0000
trusted library allocation
page read and write
645000
heap
page read and write
6840000
trusted library allocation
page read and write
6C00000
trusted library allocation
page read and write
408000
unkown
page readonly
5BC5000
heap
page read and write
401000
unkown
page execute read
6D00000
trusted library allocation
page read and write
12EC0C90000
heap
page read and write
5BB2000
heap
page read and write
401000
unkown
page execute read
617E000
stack
page read and write
1448DBB0000
heap
page read and write
5820000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
9B000
stack
page read and write
5A21000
heap
page read and write
1008FA000
stack
page read and write
22FE000
stack
page read and write
670000
heap
page read and write
17202302000
heap
page read and write
539D000
trusted library allocation
page read and write
5490000
trusted library allocation
page read and write
6FDF000
heap
page read and write
5BB2000
heap
page read and write
1001F9000
stack
page read and write
5A4B000
heap
page read and write
1750EB13000
heap
page read and write
5A5B000
heap
page read and write
50D0000
trusted library allocation
page read and write
5490000
trusted library allocation
page read and write
5B8D000
heap
page read and write
329031D000
stack
page read and write
21993A00000
heap
page read and write
62B000
heap
page read and write
5A64000
heap
page read and write
3A3C000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
1D564477000
heap
page read and write
5BBA000
heap
page read and write
5BC1000
heap
page read and write
362D000
trusted library allocation
page read and write
6FDF000
heap
page read and write
68D0000
unkown
page read and write
5260000
trusted library allocation
page read and write
17202039000
heap
page read and write
61E000
heap
page read and write
6D00000
trusted library allocation
page read and write
5A4B000
heap
page read and write
5BB2000
heap
page read and write
5BA4000
heap
page read and write
6FD7000
heap
page read and write
5A5B000
heap
page read and write
50E0000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
5BA9000
heap
page read and write
5A5B000
heap
page read and write
5A20000
heap
page read and write
6FDF000
heap
page read and write
6C00000
trusted library allocation
page read and write
2387000
heap
page read and write
5BCF000
heap
page read and write
5A5B000
heap
page read and write
414000
unkown
page write copy
1006FB000
stack
page read and write
5A21000
heap
page read and write
1448E602000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
5A64000
heap
page read and write
5A48000
heap
page read and write
58B0000
trusted library allocation
page read and write
488000
heap
page read and write
1448DD20000
trusted library allocation
page read and write
5A41000
heap
page read and write
5B95000
heap
page read and write
5BB2000
heap
page read and write
627F000
stack
page read and write
5270000
trusted library allocation
page read and write
2370000
direct allocation
page read and write
5260000
trusted library allocation
page read and write
5BB5000
heap
page read and write
A0E000
stack
page read and write
5A4B000
heap
page read and write
6CF0000
trusted library allocation
page read and write
5BB2000
heap
page read and write
5B4D000
heap
page read and write
5A8F000
heap
page read and write
5A8F000
heap
page read and write
5B91000
heap
page read and write
5A21000
heap
page read and write
401000
unkown
page execute read
5A5B000
heap
page read and write
5A4B000
heap
page read and write
1750E140000
trusted library allocation
page read and write
5A4B000
heap
page read and write
6CF0000
trusted library allocation
page read and write
1448DE5E000
heap
page read and write
5A4B000
heap
page read and write
5490000
trusted library allocation
page read and write
5BDF000
heap
page read and write
6FDF000
heap
page read and write
5A21000
heap
page read and write
1448DE83000
heap
page read and write
5260000
trusted library allocation
page read and write
43B000
unkown
page readonly
5390000
heap
page read and write
5495000
trusted library allocation
page read and write
5BB2000
heap
page read and write
4C4000
heap
page read and write
6FDF000
heap
page read and write
271F3FC000
stack
page read and write
5A4B000
heap
page read and write
1612F7F000
stack
page read and write
5A21000
heap
page read and write
72DC000
stack
page read and write
5A52000
heap
page read and write
6FDF000
heap
page read and write
5D0000
heap
page read and write
366D000
trusted library allocation
page read and write
401000
unkown
page execute read
5A5B000
heap
page read and write
434F77D000
stack
page read and write
5BB2000
heap
page read and write
5B80000
heap
page read and write
67E0000
heap
page read and write
6CF0000
trusted library allocation
page read and write
1D564D22000
heap
page read and write
30000
heap
page read and write
58A0000
trusted library allocation
page read and write
BE0000
heap
page read and write
5A4B000
heap
page read and write
58B7000
trusted library allocation
page read and write
500000
heap
page read and write
5A64000
heap
page read and write
67F0000
trusted library section
page read and write
5BB2000
heap
page read and write
6810000
trusted library section
page read and write
5A5B000
heap
page read and write
40A000
unkown
page read and write
B1E000
stack
page read and write
410000
unkown
page readonly
4FA0000
trusted library allocation
page read and write
5BAC000
heap
page read and write
434F3FF000
stack
page read and write
5A21000
heap
page read and write
5BAA000
heap
page read and write
5820000
trusted library allocation
page read and write
5A21000
heap
page read and write
5A64000
heap
page read and write
5BB2000
heap
page read and write
58B0000
trusted library allocation
page read and write
3290AF9000
stack
page read and write
630000
heap
page read and write
639000
heap
page read and write
3B0D000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
58B5000
trusted library allocation
page read and write
6BF0000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
A62000
trusted library allocation
page read and write
5A21000
heap
page read and write
1448DE3A000
heap
page read and write
71DD000
stack
page read and write
1D564429000
heap
page read and write
363D000
trusted library allocation
page read and write
22C0000
heap
page read and write
5D60000
trusted library allocation
page read and write
1750E241000
heap
page read and write
67D7000
trusted library allocation
page read and write
5BD9000
heap
page read and write
271F87B000
stack
page read and write
6FDF000
heap
page read and write
5260000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
6870000
trusted library section
page read and write
2486000
direct allocation
page read and write
4F40000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
2BAA000
trusted library allocation
page read and write
759D000
stack
page read and write
5A4B000
heap
page read and write
24D0000
heap
page execute and read and write
5A20000
trusted library allocation
page read and write
5A5B000
heap
page read and write
5100000
trusted library allocation
page read and write
5A4B000
heap
page read and write
5B91000
heap
page read and write
1750EA02000
heap
page read and write
569D000
stack
page read and write
769C000
stack
page read and write
1F0000
heap
page read and write
39FC000
trusted library allocation
page read and write
5BA6000
heap
page read and write
5A4B000
heap
page read and write
5B96000
heap
page read and write
5A5B000
heap
page read and write
5A4B000
heap
page read and write
4C8000
heap
page read and write
1A5D0000
direct allocation
page read and write
5A21000
heap
page read and write
1D564E13000
heap
page read and write
5BB2000
heap
page read and write
94D000
stack
page read and write
5BB2000
heap
page read and write
21993C29000
heap
page read and write
5A5B000
heap
page read and write
57A0000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
5A21000
heap
page read and write
9D000
stack
page read and write
5A21000
heap
page read and write
1448DE40000
heap
page read and write
6830000
trusted library allocation
page read and write
1A589FE000
stack
page read and write
394C000
trusted library allocation
page read and write
414000
unkown
page write copy
5A21000
heap
page read and write
5BBE000
heap
page read and write
5260000
trusted library allocation
page read and write
5BB2000
heap
page read and write
5260000
trusted library allocation
page read and write
5A21000
heap
page read and write
1D564D22000
heap
page read and write
1E9F8310000
heap
page read and write
5A5B000
heap
page read and write
5A64000
heap
page read and write
50D0000
trusted library allocation
page read and write
1448DE66000
heap
page read and write
40C000
unkown
page read and write
5100000
trusted library allocation
page read and write
6CF000
unkown
page read and write
5A4B000
heap
page read and write
9D000
stack
page read and write
253C000
trusted library allocation
page read and write
6640000
trusted library section
page read and write
4F82000
direct allocation
page execute and read and write
5133000
heap
page read and write
400000
unkown
page readonly
2B25000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
5BB2000
heap
page read and write
6FDF000
heap
page read and write
68C5000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
5A5B000
heap
page read and write
5A5B000
heap
page read and write
6CF6000
trusted library allocation
page read and write
401000
unkown
page execute read
67C0000
trusted library allocation
page read and write
5A21000
heap
page read and write
1750E2BE000
heap
page read and write
2730000
trusted library allocation
page read and write
5B86000
heap
page read and write
526A000
trusted library allocation
page read and write
1F0000
heap
page read and write
5810000
trusted library allocation
page read and write
5A21000
heap
page read and write
2370000
direct allocation
page read and write
5B8C000
heap
page read and write
58B0000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
1A5D0000
direct allocation
page read and write
6FDF000
heap
page read and write
5B20000
heap
page read and write
400000
unkown
page readonly
4BD000
heap
page read and write
5A4B000
heap
page read and write
5A21000
heap
page read and write
1D564DCB000
heap
page read and write
6FD6000
heap
page read and write
271F67E000
stack
page read and write
6FD6000
heap
page read and write
12EC0C30000
heap
page read and write
5BBE000
heap
page read and write
6A20000
unkown
page read and write
3AC6000
trusted library allocation
page read and write
636000
heap
page read and write
27BF000
stack
page read and write
5BB2000
heap
page read and write
5BB2000
heap
page read and write
1D564427000
heap
page read and write
5A5B000
heap
page read and write
6FDD000
heap
page read and write
21994402000
trusted library allocation
page read and write
5BA6000
heap
page read and write
5100000
trusted library allocation
page read and write
6FDF000
heap
page read and write
5A5B000
heap
page read and write
5A21000
heap
page read and write
5A64000
heap
page read and write
5BC7000
heap
page read and write
6BCF000
stack
page read and write
414000
unkown
page write copy
5BB2000
heap
page read and write
5A4B000
heap
page read and write
6820000
trusted library section
page read and write
1448DE6A000
heap
page read and write
5A21000
heap
page read and write
5BA2000
heap
page read and write
12EC0E41000
heap
page read and write
1D56443C000
heap
page read and write
1A5851B000
stack
page read and write
3575000
trusted library allocation
page read and write
5BBE000
heap
page read and write
1A6EB000
direct allocation
page read and write
9E187D000
stack
page read and write
5BB2000
heap
page read and write
1A58AFE000
stack
page read and write
39CC000
trusted library allocation
page read and write
5D60000
trusted library allocation
page read and write
1F0000
heap
page read and write
6C10000
trusted library allocation
page read and write
6FD6000
heap
page read and write
5B3D000
heap
page read and write
5A5B000
heap
page read and write
5BA9000
heap
page read and write
5D60000
trusted library allocation
page read and write
1612D79000
stack
page read and write
5A4B000
heap
page read and write
5BB2000
heap
page read and write
1D56447D000
heap
page read and write
68C0000
trusted library allocation
page read and write
5A49000
heap
page read and write
68C0000
trusted library allocation
page read and write
5A5B000
heap
page read and write
5490000
trusted library allocation
page read and write
590000
heap
page read and write
6FDF000
heap
page read and write
1D564456000
heap
page read and write
6FBE000
heap
page read and write
6CF0000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
5A21000
heap
page read and write
50C0000
heap
page read and write
1D564413000
heap
page read and write
1448DE3D000
heap
page read and write
6D10000
trusted library allocation
page execute and read and write
9E177F000
stack
page read and write
5B80000
heap
page read and write
408000
unkown
page readonly
1448DE5C000
heap
page read and write
3851000
trusted library allocation
page read and write
2798000
trusted library allocation
page read and write
84E000
stack
page read and write
24EB000
trusted library allocation
page read and write
5A64000
heap
page read and write
5B81000
heap
page read and write
5BCF000
heap
page read and write
5100000
trusted library allocation
page read and write
399C000
trusted library allocation
page read and write
6FDD000
heap
page read and write
54CE000
stack
page read and write
5A5B000
heap
page read and write
5B8C000
heap
page read and write
1448DE96000
heap
page read and write
5A5B000
heap
page read and write
5A21000
heap
page read and write
1D564DBD000
heap
page read and write
5A5B000
heap
page read and write
5A4B000
heap
page read and write
3AB6000
trusted library allocation
page read and write
68C0000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
1D564400000
heap
page read and write
22B0000
heap
page read and write
17202065000
heap
page read and write
5A21000
heap
page read and write
5A5B000
heap
page read and write
5D60000
trusted library allocation
page read and write
6BE0000
trusted library allocation
page read and write
5A5E000
heap
page read and write
50D0000
trusted library allocation
page read and write
5A64000
heap
page read and write
5A4B000
heap
page read and write
5260000
trusted library allocation
page read and write
5130000
heap
page read and write
5BB2000
heap
page read and write
17202313000
heap
page read and write
5BA2000
heap
page read and write
1448DE4E000
heap
page read and write
5BB2000
heap
page read and write
5BA4000
heap
page read and write
248F000
stack
page read and write
5A21000
heap
page read and write
5A21000
heap
page read and write
5250000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
5A64000
heap
page read and write
6BE0000
trusted library allocation
page read and write
5A5B000
heap
page read and write
1D5645E5000
heap
page read and write
5A5B000
heap
page read and write
1D5645B9000
heap
page read and write
A34000
trusted library allocation
page read and write
68E0000
trusted library allocation
page read and write
12EC0E13000
heap
page read and write
6FCB000
heap
page read and write
28BF000
stack
page read and write
6FDF000
heap
page read and write
5A4B000
heap
page read and write
1D564330000
trusted library allocation
page read and write
2A88000
trusted library allocation
page read and write
5A5B000
heap
page read and write
3A76000
trusted library allocation
page read and write
5B8C000
heap
page read and write
53B0000
trusted library allocation
page read and write
9E167C000
stack
page read and write
2551000
trusted library allocation
page read and write
5A64000
heap
page read and write
5B4A000
heap
page read and write
5D60000
trusted library allocation
page read and write
19C000
stack
page read and write
223E000
stack
page read and write
5A21000
heap
page read and write
5BB2000
heap
page read and write
68A0000
trusted library allocation
page read and write
5D80000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
1007FF000
stack
page read and write
675000
heap
page read and write
39EC000
trusted library allocation
page read and write
5490000
trusted library allocation
page read and write
434F7FE000
stack
page read and write
5BBE000
heap
page read and write
21993C5C000
heap
page read and write
50E0000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
5A4B000
heap
page read and write
68B0000
trusted library section
page read and write
5A4B000
heap
page read and write
5BB2000
heap
page read and write
6E9D000
stack
page read and write
6FAC000
heap
page read and write
6FDF000
heap
page read and write
1A58BFF000
stack
page read and write
5BBA000
heap
page read and write
5BBE000
heap
page read and write
78F000
stack
page read and write
5BB2000
heap
page read and write
5B61000
heap
page read and write
410000
unkown
page readonly
6FD8000
heap
page read and write
12EC0C20000
heap
page read and write
5A4B000
heap
page read and write
6CF0000
trusted library allocation
page read and write
6FDD000
heap
page read and write
2511000
trusted library allocation
page read and write
641000
heap
page read and write
6A10000
trusted library allocation
page read and write
5DBD000
stack
page read and write
5A5B000
heap
page read and write
64FC000
stack
page read and write
6BE0000
trusted library allocation
page read and write
5A4B000
heap
page read and write
1750E2CF000
heap
page read and write
6FD7000
heap
page read and write
9E147B000
stack
page read and write
67C0000
trusted library allocation
page read and write
5A5B000
heap
page read and write
5A5B000
heap
page read and write
58B0000
trusted library allocation
page read and write
5A5B000
heap
page read and write
5B8D000
heap
page read and write
1D564E23000
heap
page read and write
2486000
direct allocation
page read and write
5A5B000
heap
page read and write
6840000
trusted library allocation
page read and write
5090000
trusted library allocation
page read and write
1F0000
heap
page read and write
70D000
unkown
page read and write
5BB2000
heap
page read and write
2380000
heap
page read and write
5B8C000
heap
page read and write
624000
heap
page read and write
17202213000
heap
page read and write
6850000
trusted library allocation
page read and write
5BAB000
heap
page read and write
1D564513000
heap
page read and write
5100000
trusted library allocation
page read and write
12EC0E75000
heap
page read and write
5A21000
heap
page read and write
5BB2000
heap
page read and write
219939F0000
heap
page read and write
63C000
heap
page read and write
87D000
stack
page read and write
5A4B000
heap
page read and write
6FBF000
heap
page read and write
745D000
stack
page read and write
12EC1602000
trusted library allocation
page read and write
12EC0E02000
heap
page read and write
1E9F8320000
heap
page read and write
5A21000
heap
page read and write
25CF000
trusted library allocation
page read and write
450000
heap
page read and write
5BB2000
heap
page read and write
5B21000
heap
page read and write
90E000
stack
page read and write
5A21000
heap
page read and write
55CC000
stack
page read and write
5A4B000
heap
page read and write
5250000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
5BA6000
heap
page read and write
5BB2000
heap
page read and write
5491000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
50A000
heap
page read and write
4F60000
direct allocation
page execute and read and write
2505000
trusted library allocation
page read and write
17202039000
heap
page read and write
1612BFF000
stack
page read and write
5A4B000
heap
page read and write
1A6EF000
direct allocation
page read and write
647000
heap
page read and write
68D0000
trusted library allocation
page read and write
6FDF000
heap
page read and write
5A4B000
heap
page read and write
5BA6000
heap
page read and write
68E000
stack
page read and write
5A64000
heap
page read and write
1A5D0000
direct allocation
page read and write
4BC000
heap
page read and write
1448DE64000
heap
page read and write
5B91000
heap
page read and write
5BB2000
heap
page read and write
6A10000
trusted library allocation
page read and write
2486000
direct allocation
page read and write
5A21000
heap
page read and write
5A21000
heap
page read and write
5A5B000
heap
page read and write
63F000
heap
page read and write
5BA4000
heap
page read and write
17202013000
unkown
page read and write
B3C000
heap
page read and write
24E0000
trusted library allocation
page read and write
6FA1000
heap
page read and write
5A21000
heap
page read and write
58B0000
trusted library allocation
page read and write
5EBD000
stack
page read and write
5BB2000
heap
page read and write
1D564D00000
heap
page read and write
5A21000
heap
page read and write
5B83000
heap
page read and write
5A1A000
stack
page read and write
1009FF000
stack
page read and write
6ACE000
stack
page read and write
57E000
stack
page read and write
5A4B000
heap
page read and write
5BB2000
heap
page read and write
BA0000
direct allocation
page read and write
12EC0D90000
trusted library allocation
page read and write
1448DE58000
heap
page read and write
63F000
heap
page read and write
24F7000
trusted library allocation
page read and write
17202028000
heap
page read and write
434F57F000
stack
page read and write
68C0000
trusted library allocation
page read and write
5A5B000
heap
page read and write
30000
heap
page read and write
1448DE7D000
heap
page read and write
5A5B000
heap
page read and write
5BB2000
heap
page read and write
5BA6000
heap
page read and write
5B7B000
heap
page read and write
2180000
heap
page read and write
30000
heap
page read and write
4FB0000
trusted library allocation
page read and write
1750DFD0000
heap
page read and write
50D0000
trusted library allocation
page read and write
7FE50000
trusted library allocation
page execute and read and write
5A4B000
heap
page read and write
6A10000
trusted library allocation
page read and write
5A4B000
heap
page read and write
5D5C000
stack
page read and write
6840000
trusted library allocation
page read and write
6840000
trusted library section
page read and write
1A6EB000
direct allocation
page read and write
5260000
trusted library allocation
page read and write
50D0000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
6A15000
trusted library allocation
page read and write
1A5D0000
direct allocation
page read and write
6FF6000
heap
page read and write
90E000
stack
page read and write
598000
heap
page read and write
425000
unkown
page read and write
5BB2000
heap
page read and write
12EC0E29000
heap
page read and write
28CE000
heap
page read and write
5120000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
5BB2000
heap
page read and write
1448DE79000
heap
page read and write
5820000
trusted library allocation
page read and write
43B000
unkown
page readonly
21993C02000
heap
page read and write
400000
unkown
page readonly
1750E2C5000
heap
page read and write
5BB2000
heap
page read and write
6FDF000
heap
page read and write
6A10000
trusted library allocation
page read and write
2486000
direct allocation
page read and write
5BBE000
heap
page read and write
1D564D43000
heap
page read and write
5A5B000
heap
page read and write
393C000
trusted library allocation
page read and write
271FA7F000
stack
page read and write
45E000
stack
page read and write
5BAB000
heap
page read and write
271F7FD000
stack
page read and write
5270000
trusted library allocation
page execute and read and write
3551000
trusted library allocation
page read and write
5A8F000
heap
page read and write
5A64000
heap
page read and write
6FDF000
heap
page read and write
5B92000
heap
page read and write
680000
heap
page read and write
5A5B000
heap
page read and write
6FDF000
heap
page read and write
A67000
trusted library allocation
page execute and read and write
50D0000
trusted library allocation
page read and write
5A64000
heap
page read and write
68C0000
trusted library allocation
page read and write
5A20000
trusted library allocation
page read and write
1004FB000
stack
page read and write
17202100000
trusted library allocation
page read and write
6FDF000
heap
page read and write
1E9F844B000
heap
page read and write
6830000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
21993A60000
heap
page read and write
1005FF000
stack
page read and write
5BA6000
heap
page read and write
5BB2000
heap
page read and write
5110000
trusted library allocation
page read and write
5A5B000
heap
page read and write
434EDDB000
stack
page read and write
5A4B000
heap
page read and write
54E000
stack
page read and write
5BA2000
heap
page read and write
1E9F8400000
heap
page read and write
6830000
trusted library allocation
page read and write
5B63000
heap
page read and write
2530000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
63F000
heap
page read and write
17202302000
heap
page read and write
5A21000
heap
page read and write
5D60000
trusted library allocation
page read and write
5A5B000
heap
page read and write
5BBE000
heap
page read and write
21993B90000
remote allocation
page read and write
1750E28A000
heap
page read and write
100A7F000
stack
page read and write
5A64000
heap
page read and write
5BB2000
heap
page read and write
5B21000
heap
page read and write
5A21000
heap
page read and write
6FC9000
heap
page read and write
5B3C000
heap
page read and write
5280000
heap
page read and write
80D000
stack
page read and write
641000
heap
page read and write
5BBA000
heap
page read and write
400000
unkown
page readonly
5BB2000
heap
page read and write
5A21000
heap
page read and write
414000
unkown
page read and write
580000
trusted library section
page read and write
5BBE000
heap
page read and write
1750E302000
heap
page read and write
2524000
trusted library allocation
page read and write
2370000
direct allocation
page read and write
5A64000
heap
page read and write
5BB2000
heap
page read and write
5B8D000
heap
page read and write
5A21000
heap
page read and write
58B5000
trusted library allocation
page read and write
5A64000
heap
page read and write
5B63000
heap
page read and write
400000
unkown
page readonly
1E9F8447000
heap
page read and write
5B71000
heap
page read and write
5BDA000
heap
page read and write
5BCD000
heap
page read and write
21993D02000
heap
page read and write
6510000
trusted library allocation
page read and write
5A64000
heap
page read and write
5A4B000
heap
page read and write
5B4F000
heap
page read and write
There are 1450 hidden memdumps, click here to show them.