IOC Report
RFQ -PO.20571-0001-QBMS-PRQ-0200140.js

loading gif

Files

File Path
Type
Category
Malicious
RFQ -PO.20571-0001-QBMS-PRQ-0200140.js
ASCII text, with very long lines (65438), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\build.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\neworigin.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\server_BTC.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\x.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TrojanAIbot.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\build.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\server_BTC.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b11kihth.5ta.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jd1lijec.d5l.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lds3gji3.elb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xxg3ntfa.rlf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\surmount
data
dropped
C:\Users\user\AppData\Local\Temp\tmp6964.tmp.cmd
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TrojanAIbot.exe.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Icon number=0, Archive, ctime=Thu Sep 26 06:21:42 2024, mtime=Thu Sep 26 06:21:42 2024, atime=Thu Sep 26 06:21:39 2024, length=231936, window=
dropped
C:\Users\user\AppData\Roaming\bb5c1732d3a25be8.bin
data
dropped
\Device\Null
ASCII text, with CRLF line terminators, with overstriking
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\RFQ -PO.20571-0001-QBMS-PRQ-0200140.js"
malicious
C:\Users\user\AppData\Local\Temp\x.exe
"C:\Users\user\AppData\Local\Temp\x.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\AppData\Local\Temp\x.exe"
malicious
C:\Users\user\AppData\Local\Temp\x.exe
"C:\Users\user\AppData\Local\Temp\x.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\AppData\Local\Temp\x.exe"
malicious
C:\Users\user\AppData\Local\Temp\x.exe
"C:\Users\user\AppData\Local\Temp\x.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\AppData\Local\Temp\x.exe"
malicious
C:\Users\user\AppData\Local\Temp\x.exe
"C:\Users\user\AppData\Local\Temp\x.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\AppData\Local\Temp\x.exe"
malicious
C:\Users\user\AppData\Local\Temp\x.exe
"C:\Users\user\AppData\Local\Temp\x.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\AppData\Local\Temp\x.exe"
malicious
C:\Users\user\AppData\Local\Temp\x.exe
"C:\Users\user\AppData\Local\Temp\x.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\AppData\Local\Temp\x.exe"
malicious
C:\Users\user\AppData\Local\Temp\server_BTC.exe
"C:\Users\user\AppData\Local\Temp\server_BTC.exe"
malicious
C:\Users\user\AppData\Local\Temp\neworigin.exe
"C:\Users\user\AppData\Local\Temp\neworigin.exe"
malicious
C:\Users\user\AppData\Local\Temp\build.exe
"C:\Users\user\AppData\Local\Temp\build.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\ACCApi'
malicious
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /create /tn AccSys /tr "C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe" /st 03:26 /du 23:59 /sc daily /ri 1 /f
malicious
C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe
"C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe"
malicious
C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe
C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe
malicious
C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe
"C:\Users\user\AppData\Roaming\ACCApi\TrojanAIbot.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmp6964.tmp.cmd""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout 6
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
There are 17 hidden processes, click here to show them.

URLs

Name
IP
Malicious
212.162.149.53:2049
malicious
https://api.ipify.org/
104.26.13.205

Domains

Name
IP
Malicious
s82.gocheapweb.com
51.195.88.199
malicious
pywolwnvd.biz
54.244.188.177
api.ipify.org
104.26.13.205

IPs

IP
Domain
Country
Malicious
51.195.88.199
s82.gocheapweb.com
France
malicious
212.162.149.53
unknown
Netherlands
malicious
104.26.13.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\neworigin_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3189000
heap
page read and write
malicious
E62000
unkown
page readonly
malicious
3112000
heap
page read and write
malicious
32D6000
trusted library allocation
page read and write
malicious
F42000
unkown
page readonly
malicious
FBF000
stack
page read and write
56B9000
trusted library allocation
page read and write
490000
unkown
page write copy
16FE000
stack
page read and write
47C8000
heap
page read and write
4802000
heap
page read and write
3C82000
heap
page read and write
920000
heap
page read and write
273E000
unkown
page read and write
5E5B000
trusted library allocation
page read and write
9B8000
heap
page read and write
9B0000
heap
page read and write
15FE000
stack
page read and write
35F4000
trusted library allocation
page read and write
7DF0000
heap
page read and write
170000
heap
page read and write
492000
unkown
page read and write
192DB4F1000
heap
page read and write
7380000
heap
page read and write
47D4000
heap
page read and write
429C000
stack
page read and write
512E000
direct allocation
page read and write
49AB000
heap
page read and write
BF0000
heap
page read and write
48C2000
heap
page read and write
5930000
heap
page read and write
1410000
heap
page read and write
4868000
heap
page read and write
14CD000
heap
page read and write
4400000
trusted library allocation
page read and write
577E000
trusted library allocation
page read and write
32D0000
heap
page read and write
1337000
stack
page read and write
192DCCF8000
heap
page read and write
2DEE000
stack
page read and write
75E4000
trusted library allocation
page read and write
46A6000
trusted library allocation
page read and write
30BF000
heap
page read and write
6A7D000
stack
page read and write
37FC000
trusted library allocation
page read and write
4811000
heap
page read and write
395F000
stack
page read and write
5053000
heap
page read and write
4983000
heap
page read and write
5025000
trusted library allocation
page read and write
192DE46B000
heap
page read and write
47A1000
heap
page read and write
1050000
heap
page read and write
766D000
stack
page read and write
192E037D000
heap
page read and write
2920000
heap
page read and write
5143000
heap
page read and write
481E000
heap
page read and write
9E0000
heap
page read and write
50B9000
direct allocation
page read and write
3C6D000
direct allocation
page read and write
4477000
trusted library allocation
page read and write
473A000
heap
page read and write
3617000
trusted library allocation
page read and write
7170000
trusted library allocation
page read and write
A2D000
heap
page read and write
192DDB8B000
heap
page read and write
192DE93D000
heap
page read and write
692C000
stack
page read and write
4400000
heap
page read and write
100000
heap
page read and write
49E2000
heap
page read and write
4668000
trusted library allocation
page read and write
3258000
trusted library allocation
page read and write
517D000
direct allocation
page read and write
49D5000
heap
page read and write
4CC000
stack
page read and write
69BE000
stack
page read and write
3C86000
heap
page read and write
526E000
stack
page read and write
2893000
trusted library allocation
page execute and read and write
3FAA000
heap
page read and write
48A1000
heap
page read and write
3850000
heap
page read and write
6ECC000
heap
page read and write
820E000
stack
page read and write
43CD000
trusted library allocation
page read and write
7425000
heap
page read and write
4FD0000
trusted library allocation
page read and write
192E0845000
heap
page read and write
578D000
trusted library allocation
page read and write
490000
unkown
page read and write
46CF000
trusted library allocation
page read and write
5C5E000
stack
page read and write
64B0000
trusted library allocation
page execute and read and write
A08000
heap
page read and write
3AC3000
direct allocation
page read and write
36EB000
trusted library allocation
page read and write
506D000
direct allocation
page read and write
4A04000
heap
page read and write
1B5000
heap
page read and write
4F9B000
heap
page read and write
47AA000
heap
page read and write
4AEA000
heap
page read and write
7C20000
trusted library allocation
page execute and read and write
401000
unkown
page execute read
1FE000
stack
page read and write
461A000
trusted library allocation
page read and write
391A000
heap
page read and write
192D961B000
heap
page read and write
4550000
heap
page read and write
75F5000
trusted library allocation
page read and write
6AFE000
stack
page read and write
70E0000
heap
page read and write
5832000
trusted library allocation
page read and write
4A8000
unkown
page read and write
7EA2000
heap
page read and write
2B20000
heap
page read and write
3084000
heap
page read and write
401000
unkown
page execute read
4C80000
direct allocation
page read and write
1410000
heap
page read and write
67A7000
heap
page read and write
FFE000
stack
page read and write
33F2000
trusted library allocation
page read and write
3AA1000
trusted library allocation
page read and write
5E80000
direct allocation
page read and write
4AB000
unkown
page readonly
57D0000
trusted library allocation
page read and write
4241000
trusted library allocation
page read and write
491000
unkown
page write copy
51EE000
direct allocation
page read and write
9E0000
heap
page read and write
8FE000
stack
page read and write
5933000
heap
page read and write
3F8E000
direct allocation
page read and write
192DB3F5000
heap
page read and write
44BC000
trusted library allocation
page read and write
5E00000
trusted library allocation
page read and write
3320000
heap
page execute and read and write
6774000
heap
page read and write
292E000
stack
page read and write
308A000
heap
page read and write
2980000
heap
page read and write
42E0000
trusted library allocation
page read and write
401000
unkown
page execute read
49A0000
heap
page read and write
6CD000
stack
page read and write
67E0000
trusted library allocation
page execute and read and write
DF8000
heap
page read and write
455D000
stack
page read and write
369B000
trusted library allocation
page read and write
3CB4000
heap
page read and write
140F000
heap
page read and write
4AEB000
heap
page read and write
158F000
stack
page read and write
5E60000
trusted library allocation
page read and write
5248000
trusted library allocation
page read and write
5E31000
trusted library allocation
page read and write
8B4000
stack
page read and write
1C0000
heap
page read and write
4A6D000
heap
page read and write
56F5000
trusted library allocation
page read and write
19E000
stack
page read and write
192D9613000
heap
page read and write
355E000
stack
page read and write
66F1000
heap
page read and write
A39000
heap
page read and write
37DE000
trusted library allocation
page read and write
1432000
heap
page read and write
49AA000
heap
page read and write
505B000
heap
page read and write
47F1000
heap
page read and write
4F40000
direct allocation
page read and write
454F000
stack
page read and write
4785000
heap
page read and write
4870000
heap
page read and write
489D000
heap
page read and write
6ABB000
stack
page read and write
4868000
heap
page read and write
3D73000
direct allocation
page read and write
313E000
stack
page read and write
531E000
stack
page read and write
192D966D000
heap
page read and write
951000
heap
page read and write
393E000
stack
page read and write
16E0000
heap
page read and write
48A8000
heap
page read and write
14E000
stack
page read and write
34AE000
trusted library allocation
page read and write
192E0978000
heap
page read and write
17F0000
trusted library allocation
page read and write
48C6000
heap
page read and write
91B000
stack
page read and write
3856000
trusted library allocation
page read and write
71F0000
trusted library allocation
page read and write
C40000
heap
page read and write
3F70000
direct allocation
page read and write
44C3000
trusted library allocation
page read and write
3288000
trusted library allocation
page read and write
4060000
heap
page read and write
55F0000
direct allocation
page read and write
74B4000
heap
page read and write
3B0E000
heap
page read and write
48C7000
heap
page read and write
5ADE000
stack
page read and write
5660000
trusted library allocation
page read and write
1810000
trusted library allocation
page read and write
335F000
trusted library allocation
page read and write
4A6D000
heap
page read and write
15E0000
heap
page read and write
4935000
heap
page read and write
76C0000
trusted library allocation
page read and write
4FE2000
trusted library allocation
page read and write
145000
heap
page read and write
5666000
trusted library allocation
page read and write
4225000
trusted library allocation
page read and write
337000
stack
page read and write
4400000
heap
page read and write
4D26000
trusted library allocation
page read and write
2ACC000
heap
page read and write
1440000
heap
page read and write
4937000
heap
page read and write
4AEC000
heap
page read and write
50BE000
stack
page read and write
7F9B0000
trusted library allocation
page execute and read and write
17EA000
trusted library allocation
page execute and read and write
8B4000
stack
page read and write
4868000
heap
page read and write
4939000
heap
page read and write
317E000
stack
page read and write
339B000
trusted library allocation
page read and write
2910000
trusted library allocation
page read and write
490000
unkown
page write copy
370E000
stack
page read and write
498B000
heap
page read and write
1830000
trusted library allocation
page read and write
1560000
heap
page read and write
9F0000
heap
page readonly
841E000
stack
page read and write
8AF000
stack
page read and write
15AF000
stack
page read and write
4AB000
unkown
page readonly
1840000
trusted library allocation
page execute and read and write
29A0000
heap
page read and write
997000
heap
page read and write
3B58000
heap
page read and write
192DDC2C000
heap
page read and write
29CB000
heap
page read and write
570000
heap
page read and write
123A000
stack
page read and write
4590000
heap
page read and write
47DA000
heap
page read and write
49D8000
heap
page read and write
320E000
stack
page read and write
71A0000
trusted library allocation
page read and write
5C9E000
stack
page read and write
F10000
heap
page read and write
930000
heap
page read and write
736D000
stack
page read and write
2620000
heap
page read and write
162E000
stack
page read and write
3286000
trusted library allocation
page read and write
47FA000
heap
page read and write
482000
unkown
page readonly
38AD000
trusted library allocation
page read and write
3C80000
direct allocation
page read and write
5BE000
stack
page read and write
DA4000
trusted library allocation
page read and write
5814000
trusted library allocation
page read and write
192E083E000
heap
page read and write
3D45000
heap
page read and write
2AB0000
heap
page read and write
175F000
stack
page read and write
6A3A000
stack
page read and write
9A1000
heap
page read and write
A10000
heap
page read and write
3872000
trusted library allocation
page read and write
959000
stack
page read and write
58DE000
stack
page read and write
F70000
direct allocation
page execute and read and write
28C0000
trusted library allocation
page read and write
3850000
direct allocation
page read and write
83BE000
stack
page read and write
96D000
heap
page read and write
3100000
heap
page read and write
940000
heap
page read and write
32C0000
trusted library allocation
page read and write
37EB000
trusted library allocation
page read and write
13F0000
heap
page read and write
6CBF000
stack
page read and write
3236000
trusted library allocation
page read and write
3D45000
heap
page read and write
490000
unkown
page write copy
81CE000
stack
page read and write
7220000
trusted library allocation
page read and write
4849000
heap
page read and write
192DE2DD000
heap
page read and write
37E7000
trusted library allocation
page read and write
3F23000
direct allocation
page read and write
995000
heap
page read and write
17E0000
trusted library allocation
page read and write
4650000
trusted library allocation
page read and write
674E000
heap
page read and write
54CE000
stack
page read and write
3315000
trusted library allocation
page read and write
4540000
trusted library allocation
page read and write
7EF60000
trusted library allocation
page execute and read and write
3D25000
heap
page read and write
192E08B2000
heap
page read and write
53AE000
stack
page read and write
192D9608000
heap
page read and write
46EF000
heap
page read and write
4867000
heap
page read and write
593E000
stack
page read and write
400000
unkown
page readonly
44AF000
trusted library allocation
page read and write
57A5000
trusted library allocation
page read and write
8A5E000
stack
page read and write
192DBA33000
heap
page read and write
4495000
trusted library allocation
page read and write
45C9000
trusted library allocation
page read and write
491000
unkown
page write copy
6B7C000
heap
page read and write
7A7E000
stack
page read and write
409D000
direct allocation
page read and write
F6E000
stack
page read and write
96D000
stack
page read and write
36F2000
trusted library allocation
page read and write
75B2000
trusted library allocation
page read and write
97B000
heap
page read and write
1690000
heap
page read and write
145000
heap
page read and write
14EE000
heap
page read and write
11EF000
stack
page read and write
3CCD000
heap
page read and write
682C000
stack
page read and write
6755000
heap
page read and write
3C50000
direct allocation
page read and write
1040000
trusted library allocation
page execute and read and write
192DC20E000
heap
page read and write
676F000
heap
page read and write
4C7E000
stack
page read and write
994000
heap
page read and write
3E73000
direct allocation
page read and write
4030000
direct allocation
page read and write
400000
unkown
page readonly
5CFC000
stack
page read and write
DB4000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
49FE000
heap
page read and write
454B000
trusted library allocation
page read and write
3F8E000
direct allocation
page read and write
6E49000
heap
page read and write
5BFB000
stack
page read and write
17B0000
trusted library allocation
page read and write
4B5C000
heap
page read and write
283F000
stack
page read and write
31CB000
heap
page read and write
48B2000
heap
page read and write
377C000
trusted library allocation
page read and write
482000
unkown
page readonly
97B000
heap
page read and write
400000
unkown
page readonly
5694000
trusted library allocation
page read and write
192E0960000
heap
page read and write
3331000
trusted library allocation
page read and write
16A0000
heap
page read and write
42F0000
heap
page read and write
48E2000
heap
page read and write
4ADA000
heap
page read and write
32C4000
trusted library allocation
page read and write
56A4000
trusted library allocation
page read and write
500E000
trusted library allocation
page read and write
379E000
trusted library allocation
page read and write
17F7000
trusted library allocation
page execute and read and write
3600000
trusted library allocation
page read and write
7E04000
heap
page read and write
4822000
heap
page read and write
56C3000
trusted library allocation
page read and write
7EBB000
trusted library allocation
page read and write
2F70000
heap
page read and write
4C5000
system
page execute and read and write
192DEDBB000
heap
page read and write
17A6000
trusted library allocation
page execute and read and write
181B000
trusted library allocation
page execute and read and write
491D000
heap
page read and write
970000
heap
page read and write
5030000
trusted library allocation
page read and write
4489000
trusted library allocation
page read and write
310F000
stack
page read and write
449A000
trusted library allocation
page read and write
3CDE000
direct allocation
page read and write
4584000
trusted library allocation
page read and write
4788000
heap
page read and write
7230000
trusted library allocation
page read and write
4A8000
unkown
page read and write
338E000
trusted library allocation
page read and write
8AF000
stack
page read and write
34B9000
trusted library allocation
page read and write
45D4000
trusted library allocation
page read and write
424F000
trusted library allocation
page read and write
2FF4000
heap
page read and write
490000
unkown
page read and write
475A000
heap
page read and write
3EF3000
direct allocation
page read and write
192E0779000
heap
page read and write
7E32000
heap
page read and write
6706000
heap
page read and write
400000
unkown
page readonly
192DDBE4000
heap
page read and write
5BBE000
stack
page read and write
45E0000
trusted library allocation
page read and write
674A000
heap
page read and write
157E000
stack
page read and write
37E9000
trusted library allocation
page read and write
192DE12A000
heap
page read and write
13B0000
heap
page read and write
192E06B2000
heap
page read and write
6A90000
trusted library allocation
page read and write
4A8000
unkown
page read and write
358E000
stack
page read and write
192E07FD000
heap
page read and write
192E07BA000
heap
page read and write
448E000
stack
page read and write
192E097B000
heap
page read and write
352A000
trusted library allocation
page read and write
8B4000
stack
page read and write
2AFF000
heap
page read and write
960000
heap
page read and write
43DA000
trusted library allocation
page read and write
4798000
heap
page read and write
1580000
heap
page read and write
E60000
unkown
page readonly
56D0000
trusted library allocation
page read and write
4283000
trusted library allocation
page read and write
401000
unkown
page execute read
192DDBA2000
heap
page read and write
455B000
trusted library allocation
page read and write
64BE000
stack
page read and write
71D0000
trusted library allocation
page read and write
401000
unkown
page execute read
45A8000
trusted library allocation
page read and write
192DDBA3000
heap
page read and write
75B5000
trusted library allocation
page read and write
4F90000
direct allocation
page read and write
192DDC37000
heap
page read and write
576B000
trusted library allocation
page read and write
482000
unkown
page readonly
4A8000
unkown
page read and write
3090000
heap
page read and write
1A0000
heap
page read and write
33D3000
trusted library allocation
page read and write
1820000
heap
page read and write
37F7000
trusted library allocation
page read and write
192E08B3000
heap
page read and write
192DDB61000
heap
page read and write
3100000
heap
page read and write
3607000
trusted library allocation
page read and write
441F000
trusted library allocation
page read and write
4568000
trusted library allocation
page read and write
385C000
heap
page read and write
3C04000
heap
page read and write
49C8000
heap
page read and write
5069000
direct allocation
page read and write
313D000
heap
page read and write
3E90000
direct allocation
page read and write
5E80000
trusted library allocation
page read and write
4832000
heap
page read and write
17E6000
trusted library allocation
page execute and read and write
4470000
heap
page read and write
192D9628000
heap
page read and write
76E0000
trusted library allocation
page read and write
43E7000
trusted library allocation
page read and write
4940000
heap
page read and write
4AA4000
heap
page read and write
8AF000
stack
page read and write
71B0000
trusted library allocation
page read and write
44CF000
trusted library allocation
page read and write
4A07000
trusted library allocation
page read and write
192E08F4000
heap
page read and write
44A5000
trusted library allocation
page read and write
3888000
trusted library allocation
page read and write
410E000
direct allocation
page read and write
3AC3000
direct allocation
page read and write
367F000
trusted library allocation
page read and write
9D0000
heap
page read and write
3766000
trusted library allocation
page read and write
51EC000
stack
page read and write
4A77000
heap
page read and write
4AD9000
heap
page read and write
17C0000
trusted library allocation
page read and write
3CB9000
heap
page read and write
28E0000
trusted library allocation
page read and write
18E000
stack
page read and write
3F19000
direct allocation
page read and write
3C0D000
heap
page read and write
4331000
trusted library allocation
page read and write
4AB000
unkown
page readonly
5ABE000
stack
page read and write
400000
unkown
page readonly
465A000
trusted library allocation
page read and write
277E000
unkown
page read and write
3998000
heap
page read and write
45E0000
heap
page execute and read and write
4451000
trusted library allocation
page read and write
7F9C8000
trusted library allocation
page execute and read and write
5CCE000
stack
page read and write
7412000
heap
page read and write
3E73000
direct allocation
page read and write
C90000
heap
page read and write
365F000
trusted library allocation
page read and write
2FF0000
heap
page read and write
192E08F4000
heap
page read and write
2DCF000
unkown
page read and write
36DC000
trusted library allocation
page read and write
5831000
trusted library allocation
page read and write
50BD000
direct allocation
page read and write
6D6E000
stack
page read and write
27F0000
heap
page read and write
4340000
heap
page read and write
6794000
heap
page read and write
5824000
trusted library allocation
page read and write
5E22000
trusted library allocation
page read and write
4763000
heap
page read and write
298F000
stack
page read and write
46AD000
trusted library allocation
page read and write
2AEE000
heap
page read and write
3D40000
direct allocation
page read and write
75B9000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
28B0000
trusted library allocation
page read and write
3220000
trusted library allocation
page read and write
44C6000
trusted library allocation
page read and write
5750000
heap
page read and write
36D2000
trusted library allocation
page read and write
6A6C000
stack
page read and write
6AB0000
heap
page read and write
192DCB68000
heap
page read and write
100000
heap
page read and write
C80000
heap
page read and write
E30000
heap
page read and write
7D70000
trusted library allocation
page read and write
7730000
trusted library allocation
page execute and read and write
67BB000
heap
page read and write
5392000
heap
page read and write
57E0000
heap
page execute and read and write
5D0E000
stack
page read and write
482000
unkown
page readonly
3DB0000
direct allocation
page read and write
2F6F000
stack
page read and write
30A3000
heap
page read and write
93E000
stack
page read and write
3E90000
direct allocation
page read and write
3883000
trusted library allocation
page read and write
48BB000
heap
page read and write
15EE000
heap
page read and write
33E7000
trusted library allocation
page read and write
192DDF9C000
heap
page read and write
2FCF000
stack
page read and write
4A01000
heap
page read and write
3309000
trusted library allocation
page read and write
57A9000
trusted library allocation
page read and write
507E000
stack
page read and write
5011000
trusted library allocation
page read and write
3654000
trusted library allocation
page read and write
2F8E000
stack
page read and write
3ED3000
direct allocation
page read and write
192D9616000
heap
page read and write
1720000
heap
page read and write
44F0000
heap
page read and write
46A3000
heap
page read and write
597E000
stack
page read and write
63BE000
stack
page read and write
5E5E000
trusted library allocation
page read and write
3012000
heap
page read and write
460C000
heap
page read and write
48D4000
heap
page read and write
443C000
trusted library allocation
page read and write
1810000
trusted library allocation
page read and write
17BB000
trusted library allocation
page execute and read and write
3DF0000
direct allocation
page read and write
7DC2000
trusted library allocation
page read and write
4AB000
unkown
page readonly
6B40000
heap
page read and write
3DD0000
direct allocation
page read and write
446A000
trusted library allocation
page read and write
6720000
heap
page read and write
46CB000
trusted library allocation
page read and write
4850000
heap
page read and write
7A3E000
stack
page read and write
452E000
trusted library allocation
page read and write
3989000
trusted library allocation
page read and write
15EE000
stack
page read and write
2AFE000
heap
page read and write
66BE000
stack
page read and write
8000000
trusted library allocation
page read and write
6B3B000
stack
page read and write
409D000
direct allocation
page read and write
4444000
trusted library allocation
page read and write
48E4000
heap
page read and write
5CFE000
stack
page read and write
7398000
heap
page read and write
192E0736000
heap
page read and write
140000
heap
page read and write
673F000
heap
page read and write
4577000
trusted library allocation
page read and write
741E000
heap
page read and write
4A37000
heap
page read and write
490E000
heap
page read and write
4442000
trusted library allocation
page read and write
A37000
heap
page read and write
4540000
heap
page read and write
3700000
trusted library allocation
page read and write
2900000
trusted library allocation
page read and write
337A000
trusted library allocation
page read and write
7E08000
heap
page read and write
1530000
heap
page read and write
401000
unkown
page execute read
7CFD000
trusted library allocation
page read and write
14E000
stack
page read and write
4641000
trusted library allocation
page read and write
46C5000
trusted library allocation
page read and write
14CF000
heap
page read and write
192E0979000
heap
page read and write
482000
unkown
page readonly
2AA1000
trusted library allocation
page read and write
46BD000
trusted library allocation
page read and write
5BBF000
stack
page read and write
C3E000
stack
page read and write
959000
heap
page read and write
3B45000
heap
page read and write
3094000
heap
page read and write
56B6000
trusted library allocation
page read and write
5760000
trusted library allocation
page read and write
4939000
heap
page read and write
7D20000
trusted library allocation
page read and write
3300000
trusted library allocation
page read and write
581B000
trusted library allocation
page read and write
485B000
heap
page read and write
4B59000
heap
page execute and read and write
4EAE000
trusted library allocation
page read and write
4AEC000
heap
page read and write
5845000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
3C50000
direct allocation
page read and write
150000
heap
page read and write
94F000
heap
page read and write
192E06F4000
heap
page read and write
17B7000
trusted library allocation
page execute and read and write
1445000
heap
page read and write
7D10000
trusted library allocation
page read and write
71C0000
trusted library allocation
page read and write
58F0000
trusted library allocation
page read and write
70DE000
stack
page read and write
4B58000
heap
page execute and read and write
427B000
trusted library allocation
page read and write
4770000
heap
page read and write
835D000
stack
page read and write
4AB000
unkown
page readonly
385F000
trusted library allocation
page read and write
2FC5000
heap
page read and write
456C000
trusted library allocation
page read and write
3048000
heap
page read and write
376B000
trusted library allocation
page read and write
3F1D000
direct allocation
page read and write
492000
unkown
page read and write
49CB000
heap
page read and write
50C000
stack
page read and write
2894000
trusted library allocation
page read and write
6E6B000
heap
page read and write
56C5000
trusted library allocation
page read and write
482000
unkown
page readonly
1784000
trusted library allocation
page read and write
130000
heap
page read and write
3DB0000
direct allocation
page read and write
6EF1000
heap
page read and write
44CC000
trusted library allocation
page read and write
45C0000
heap
page execute and read and write
3463000
trusted library allocation
page read and write
491000
unkown
page write copy
3603000
trusted library allocation
page read and write
4AB000
unkown
page readonly
166F000
heap
page read and write
35F1000
trusted library allocation
page read and write
4290000
heap
page read and write
4846000
heap
page read and write
998000
heap
page read and write
1420000
heap
page read and write
75F0000
trusted library allocation
page read and write
37F5000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
447E000
trusted library allocation
page read and write
2ED0000
heap
page read and write
482000
unkown
page readonly
5EC0000
trusted library allocation
page read and write
5A7E000
stack
page read and write
4931000
heap
page read and write
7ECF000
heap
page read and write
4436000
trusted library allocation
page read and write
5C0000
heap
page read and write
15D7000
heap
page read and write
192D981B000
heap
page read and write
366D000
trusted library allocation
page read and write
37D5000
trusted library allocation
page read and write
EA0000
unkown
page readonly
2EA0000
heap
page read and write
990000
heap
page read and write
4B5E000
heap
page read and write
4F90000
direct allocation
page read and write
4656000
heap
page read and write
45B5000
trusted library allocation
page read and write
15E8000
heap
page read and write
4B6D000
trusted library allocation
page read and write
130000
heap
page read and write
467A000
trusted library allocation
page read and write
4655000
trusted library allocation
page read and write
5E41000
trusted library allocation
page read and write
192E02E3000
heap
page read and write
49DE000
heap
page read and write
3399000
trusted library allocation
page read and write
9E0000
heap
page read and write
4517000
trusted library allocation
page read and write
4A6E000
heap
page read and write
75DF000
trusted library allocation
page read and write
28A0000
trusted library allocation
page read and write
EA2000
unkown
page readonly
2E1A000
heap
page read and write
5409000
heap
page read and write
3C86000
heap
page read and write
7BFE000
stack
page read and write
3D59000
heap
page read and write
4686000
trusted library allocation
page read and write
50B9000
direct allocation
page read and write
4030000
direct allocation
page read and write
3F1D000
direct allocation
page read and write
3DD0000
direct allocation
page read and write
45E5000
trusted library allocation
page read and write
192E0378000
heap
page read and write
192DB4BD000
heap
page read and write
5629000
trusted library allocation
page read and write
44CE000
stack
page read and write
75DA000
trusted library allocation
page read and write
4407000
heap
page read and write
1600000
heap
page read and write
CC0000
heap
page read and write
3276000
trusted library allocation
page read and write
58FA000
trusted library allocation
page read and write
66C0000
heap
page read and write
4B7E000
stack
page read and write
4340000
heap
page read and write
DE9000
heap
page read and write
4F4E000
heap
page read and write
400000
system
page execute and read and write
497F000
heap
page read and write
5692000
trusted library allocation
page read and write
5370000
direct allocation
page read and write
3D73000
direct allocation
page read and write
7D1A000
trusted library allocation
page read and write
3E18000
heap
page read and write
400000
unkown
page readonly
4099000
direct allocation
page read and write
5D70000
direct allocation
page read and write
83DD000
stack
page read and write
3D50000
direct allocation
page read and write
4A94000
heap
page read and write
45FA000
trusted library allocation
page read and write
47F2000
heap
page read and write
75B0000
trusted library allocation
page read and write
2A8D000
heap
page read and write
336D000
trusted library allocation
page read and write
66DA000
heap
page read and write
7D7E000
stack
page read and write
3B40000
direct allocation
page read and write
9A000
stack
page read and write
100000
heap
page read and write
3E3A000
heap
page read and write
7CF0000
trusted library allocation
page read and write
47E9000
heap
page read and write
49C3000
heap
page read and write
900000
heap
page read and write
41CE000
direct allocation
page read and write
4849000
heap
page read and write
53B5000
heap
page read and write
3E64000
heap
page read and write
7190000
trusted library allocation
page read and write
51EE000
direct allocation
page read and write
13FE000
heap
page read and write
387E000
trusted library allocation
page read and write
4350000
heap
page read and write
5E50000
trusted library allocation
page read and write
34C4000
trusted library allocation
page read and write
9D9000
heap
page read and write
351E000
stack
page read and write
192DDB0C000
heap
page read and write
4405000
trusted library allocation
page read and write
5601000
heap
page read and write
192DDD19000
heap
page read and write
192E0845000
heap
page read and write
7390000
heap
page read and write
5AB0000
heap
page read and write
7180000
trusted library allocation
page read and write
30CE000
stack
page read and write
7478000
heap
page read and write
192DDC26000
heap
page read and write
349C000
trusted library allocation
page read and write
472B000
heap
page read and write
FD0000
heap
page read and write
17A0000
trusted library allocation
page read and write
7670000
trusted library allocation
page execute and read and write
2A92000
heap
page read and write
2B30000
heap
page read and write
DC0000
heap
page read and write
192E07BA000
heap
page read and write
48C2000
heap
page read and write
715D000
stack
page read and write
44F4000
heap
page read and write
54CB000
heap
page read and write
7D50000
trusted library allocation
page read and write
47DE000
heap
page read and write
4261000
trusted library allocation
page read and write
33C8000
trusted library allocation
page read and write
4426000
trusted library allocation
page read and write
490000
unkown
page write copy
311E000
stack
page read and write
1790000
trusted library allocation
page read and write
7E3B000
heap
page read and write
44A6000
heap
page read and write
474C000
heap
page read and write
711E000
stack
page read and write
4535000
trusted library allocation
page read and write
123F000
stack
page read and write
569B000
trusted library allocation
page read and write
B87000
stack
page read and write
50BD000
direct allocation
page read and write
5E3A000
trusted library allocation
page read and write
192E0671000
heap
page read and write
190000
heap
page read and write
4D22000
trusted library allocation
page read and write
492000
unkown
page read and write
900000
heap
page read and write
4415000
trusted library allocation
page read and write
4320000
heap
page read and write
7EBA000
heap
page read and write
32FF000
stack
page read and write
8B4000
stack
page read and write
705E000
stack
page read and write
5764000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
5050000
direct allocation
page read and write
1584000
heap
page read and write
2890000
trusted library allocation
page read and write
36FB000
trusted library allocation
page read and write
44DA000
trusted library allocation
page read and write
4939000
heap
page read and write
140E000
stack
page read and write
39A0000
direct allocation
page read and write
468B000
trusted library allocation
page read and write
960000
heap
page read and write
1F0000
heap
page read and write
337E000
trusted library allocation
page read and write
7D00000
trusted library allocation
page execute and read and write
DE3000
heap
page read and write
FD3000
direct allocation
page execute and read and write
4611000
trusted library allocation
page read and write
2E60000
heap
page read and write
4A6E000
heap
page read and write
400000
unkown
page readonly
9A1000
heap
page read and write
5791000
trusted library allocation
page read and write
900000
heap
page read and write
82D0000
trusted library allocation
page execute and read and write
110000
heap
page read and write
57B0000
trusted library allocation
page read and write
7E00000
heap
page read and write
990000
heap
page read and write
6DD0000
trusted library allocation
page read and write
5D80000
direct allocation
page read and write
3214000
trusted library allocation
page read and write
494B000
heap
page read and write
30F0000
trusted library allocation
page read and write
7E4F000
heap
page read and write
451A000
heap
page read and write
192D981E000
heap
page read and write
65A0000
trusted library allocation
page read and write
3CBE000
heap
page read and write
7409000
heap
page read and write
4140000
heap
page read and write
4940000
heap
page read and write
3B0F000
heap
page read and write
95E000
stack
page read and write
3361000
trusted library allocation
page read and write
4983000
heap
page read and write
491000
unkown
page write copy
192DF982000
heap
page read and write
8B4000
stack
page read and write
75A0000
trusted library allocation
page read and write
4987000
heap
page read and write
4120000
heap
page read and write
33B4000
trusted library allocation
page read and write
3243000
trusted library allocation
page read and write
5816000
trusted library allocation
page read and write
1B0000
heap
page read and write
3858000
heap
page read and write
100000
heap
page read and write
48E2000
heap
page read and write
D5000
heap
page read and write
8180000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
4C7E000
stack
page read and write
3D45000
heap
page read and write
2A1E000
heap
page read and write
50BD000
direct allocation
page read and write
8FE000
stack
page read and write
401000
unkown
page execute read
1567000
heap
page read and write
8FE000
stack
page read and write
5A8F000
stack
page read and write
482000
unkown
page readonly
5E70000
trusted library allocation
page read and write
9A000
stack
page read and write
950000
heap
page read and write
4575000
trusted library allocation
page read and write
597B000
unkown
page read and write
4848000
heap
page read and write
311F000
stack
page read and write
18DE000
stack
page read and write
47C0000
heap
page read and write
11FE000
stack
page read and write
4552000
heap
page read and write
192E0937000
heap
page read and write
17DF000
stack
page read and write
589E000
stack
page read and write
7BBE000
stack
page read and write
192DDBE4000
heap
page read and write
6550000
trusted library allocation
page read and write
192E02E8000
heap
page read and write
414E000
heap
page read and write
47D0000
heap
page read and write
4AB000
unkown
page readonly
3780000
trusted library allocation
page read and write
381F000
trusted library allocation
page read and write
A37000
heap
page read and write
4A8000
unkown
page read and write
192E096B000
heap
page read and write
375E000
trusted library allocation
page read and write
582E000
trusted library allocation
page read and write
4985000
heap
page read and write
A00000
heap
page read and write
30E0000
trusted library allocation
page read and write
5786000
trusted library allocation
page read and write
178D000
trusted library allocation
page execute and read and write
4938000
heap
page read and write
192E097B000
heap
page read and write
4F25000
heap
page read and write
6E71000
heap
page read and write
1CE000
stack
page read and write
390B000
heap
page read and write
2990000
trusted library allocation
page execute and read and write
7C30000
trusted library allocation
page read and write
45F0000
heap
page execute and read and write
512E000
direct allocation
page read and write
17B2000
trusted library allocation
page read and write
16F0000
heap
page read and write
486F000
heap
page read and write
5460000
heap
page read and write
4902000
heap
page read and write
5084000
trusted library allocation
page read and write
490000
unkown
page read and write
1800000
heap
page read and write
34BF000
trusted library allocation
page read and write
2AFE000
heap
page read and write
3190000
heap
page read and write
494D000
heap
page read and write
7E7F000
heap
page read and write
15C3000
trusted library allocation
page execute and read and write
162E000
stack
page read and write
839E000
stack
page read and write
A8B000
stack
page read and write
48E6000
heap
page read and write
8020000
trusted library allocation
page read and write
9A000
stack
page read and write
EB4000
unkown
page readonly
8010000
trusted library allocation
page read and write
47F5000
heap
page read and write
18E000
stack
page read and write
3CB0000
direct allocation
page read and write
4FF6000
trusted library allocation
page read and write
4AA0000
direct allocation
page read and write
58E0000
trusted library allocation
page execute and read and write
192DDFA9000
heap
page read and write
2914000
trusted library allocation
page read and write
176E000
stack
page read and write
73E2000
heap
page read and write
35AB000
trusted library allocation
page read and write
4991000
heap
page read and write
5B8E000
stack
page read and write
5BDE000
stack
page read and write
6710000
heap
page read and write
6560000
trusted library allocation
page execute and read and write
3A63000
heap
page read and write
75CA000
trusted library allocation
page read and write
3FA0000
heap
page read and write
4AA3000
heap
page read and write
2BC0000
heap
page read and write
6E95000
heap
page read and write
4490000
trusted library allocation
page read and write
4916000
heap
page read and write
45C5000
heap
page execute and read and write
42F4000
heap
page read and write
3314000
trusted library allocation
page read and write
4735000
heap
page execute and read and write
7200000
trusted library allocation
page read and write
4248000
trusted library allocation
page read and write
192E07BA000
heap
page read and write
5CBE000
stack
page read and write
76D0000
trusted library allocation
page read and write
3385000
trusted library allocation
page read and write
3CDE000
direct allocation
page read and write
50DE000
direct allocation
page read and write
46A0000
trusted library allocation
page read and write
9A000
stack
page read and write
4335000
trusted library allocation
page read and write
192E07FC000
heap
page read and write
4A01000
heap
page read and write
5920000
trusted library allocation
page read and write
490B000
heap
page read and write
4AEB000
heap
page read and write
1666000
heap
page read and write
15EE000
stack
page read and write
3DB0000
direct allocation
page read and write
5179000
direct allocation
page read and write
4D67000
trusted library allocation
page read and write
43A2000
heap
page read and write
50EE000
stack
page read and write
3482000
trusted library allocation
page read and write
6C7E000
stack
page read and write
4760000
heap
page read and write
6DAE000
stack
page read and write
94E000
heap
page read and write
149C000
heap
page read and write
342C000
trusted library allocation
page read and write
15D0000
trusted library allocation
page read and write
3030000
heap
page read and write
479B000
heap
page read and write
A2A000
heap
page read and write
4AE8000
heap
page read and write
29D7000
heap
page read and write
38CD000
trusted library allocation
page read and write
32C7000
trusted library allocation
page read and write
3DF0000
direct allocation
page read and write
1770000
trusted library allocation
page read and write
6520000
trusted library allocation
page read and write
466F000
trusted library allocation
page read and write
192E0736000
heap
page read and write
4950000
heap
page read and write
3DAB000
heap
page read and write
400000
unkown
page readonly
4571000
trusted library allocation
page read and write
3D71000
heap
page read and write
48F2000
heap
page read and write
3772000
trusted library allocation
page read and write
2A6F000
stack
page read and write
583D000
stack
page read and write
48E6000
heap
page read and write
4817000
heap
page read and write
398F000
stack
page read and write
3133000
heap
page read and write
192E083E000
heap
page read and write
48E6000
heap
page read and write
3F98000
heap
page read and write
322E000
trusted library allocation
page read and write
6EB6000
heap
page read and write
11AE000
stack
page read and write
7DA5000
heap
page read and write
3769000
trusted library allocation
page read and write
4F96000
heap
page read and write
45F0000
trusted library allocation
page read and write
1625000
heap
page read and write
4A44000
heap
page read and write
192DB8A3000
heap
page read and write
2AB7000
heap
page read and write
3C50000
direct allocation
page read and write
192DFB1A000
heap
page read and write
1375000
heap
page read and write
192DC204000
heap
page read and write
7C10000
heap
page read and write
6EB2000
heap
page read and write
159A000
heap
page read and write
4842000
heap
page execute and read and write
5DD0000
remote allocation
page read and write
3967000
heap
page read and write
3221000
trusted library allocation
page read and write
4751000
trusted library allocation
page read and write
445D000
trusted library allocation
page read and write
44EE000
trusted library allocation
page read and write
3E00000
direct allocation
page read and write
3775000
trusted library allocation
page read and write
F77000
unkown
page readonly
3035000
heap
page read and write
3C00000
direct allocation
page read and write
482000
unkown
page readonly
3FB3000
direct allocation
page read and write
4AB000
unkown
page readonly
160F000
stack
page read and write
15EF000
stack
page read and write
1780000
trusted library allocation
page read and write
4A05000
heap
page read and write
6E4B000
heap
page read and write
5179000
direct allocation
page read and write
192D9619000
heap
page read and write
4AB000
unkown
page readonly
192E0778000
heap
page read and write
646E000
stack
page read and write
4927000
heap
page read and write
5C1E000
stack
page read and write
36E5000
trusted library allocation
page read and write
2840000
heap
page read and write
56B1000
trusted library allocation
page read and write
400000
unkown
page readonly
4AD0000
heap
page read and write
4A5B000
heap
page read and write
A60000
heap
page read and write
308A000
heap
page read and write
4AC8000
heap
page read and write
29A8000
heap
page read and write
4696000
trusted library allocation
page read and write
28C5000
trusted library allocation
page execute and read and write
4159000
direct allocation
page read and write
6728000
heap
page read and write
192DDBBE000
heap
page read and write
6DFE000
heap
page read and write
4740000
heap
page read and write
978000
heap
page read and write
192DB3F1000
heap
page read and write
9AA000
stack
page read and write
462A000
trusted library allocation
page read and write
49F8000
heap
page read and write
4F45000
heap
page read and write
3F23000
direct allocation
page read and write
140000
heap
page read and write
71E0000
trusted library allocation
page read and write
5145000
heap
page read and write
DA3000
trusted library allocation
page execute and read and write
8AF000
stack
page read and write
3C8A000
heap
page read and write
360C000
trusted library allocation
page read and write
1CE000
stack
page read and write
15B0000
trusted library allocation
page read and write
482000
unkown
page readonly
7EB8000
trusted library allocation
page read and write
DDE000
heap
page read and write
3D50000
direct allocation
page read and write
179D000
trusted library allocation
page execute and read and write
4F7F000
trusted library allocation
page read and write
4847000
heap
page read and write
1674000
heap
page read and write
33A7000
trusted library allocation
page read and write
4842000
heap
page read and write
289D000
trusted library allocation
page execute and read and write
28BA000
trusted library allocation
page execute and read and write
4A00000
heap
page read and write
17D6000
heap
page read and write
482000
unkown
page readonly
6E52000
heap
page read and write
57A2000
trusted library allocation
page read and write
75CF000
trusted library allocation
page read and write
1817000
trusted library allocation
page execute and read and write
9C0000
heap
page read and write
3DF0000
direct allocation
page read and write
7CDE000
stack
page read and write
302E000
heap
page read and write
50DE000
direct allocation
page read and write
9B0000
heap
page read and write
490B000
heap
page read and write
49DD000
heap
page read and write
3BF0000
heap
page read and write
895E000
stack
page read and write
2AFE000
heap
page read and write
42DC000
stack
page read and write
482000
unkown
page readonly
1783000
trusted library allocation
page execute and read and write
3080000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
443F000
trusted library allocation
page read and write
2AA0000
heap
page read and write
522E000
stack
page read and write
401000
unkown
page execute read
48BB000
heap
page read and write
5D60000
heap
page read and write
3093000
heap
page read and write
192D9628000
heap
page read and write
3476000
trusted library allocation
page read and write
490000
unkown
page write copy
4AB000
unkown
page readonly
4449000
stack
page read and write
A29000
heap
page read and write
4AB000
unkown
page readonly
3754000
trusted library allocation
page read and write
34DA000
trusted library allocation
page read and write
3B1F000
heap
page read and write
4AB000
unkown
page readonly
48A3000
heap
page read and write
461F000
trusted library allocation
page read and write
4B5D000
heap
page read and write
118E000
stack
page read and write
17DC000
heap
page read and write
155000
heap
page read and write
2E90000
heap
page read and write
1030000
trusted library allocation
page read and write
45DB000
trusted library allocation
page read and write
1720000
heap
page read and write
56F0000
trusted library allocation
page read and write
47D2000
heap
page read and write
32A0000
heap
page read and write
15F0000
heap
page read and write
155E000
stack
page read and write
33E2000
trusted library allocation
page read and write
531C000
stack
page read and write
5820000
heap
page read and write
15C0000
trusted library allocation
page read and write
192DB6F2000
heap
page read and write
47CC000
heap
page read and write
5A6E000
stack
page read and write
4433000
trusted library allocation
page read and write
5E55000
trusted library allocation
page read and write
400000
unkown
page readonly
329E000
stack
page read and write
4099000
direct allocation
page read and write
D0000
heap
page read and write
46B7000
trusted library allocation
page read and write
73EF000
heap
page read and write
16AA000
heap
page read and write
36E9000
trusted library allocation
page read and write
3ED3000
direct allocation
page read and write
401000
unkown
page execute read
4891000
heap
page read and write
46C2000
trusted library allocation
page read and write
2880000
trusted library allocation
page read and write
47D9000
heap
page read and write
726B000
stack
page read and write
158B000
heap
page read and write
14D2000
heap
page read and write
5BCE000
stack
page read and write
296F000
stack
page read and write
4607000
trusted library allocation
page read and write
A5E000
unkown
page read and write
41CE000
direct allocation
page read and write
3D3F000
stack
page read and write
11A7000
stack
page read and write
5696000
trusted library allocation
page read and write
354D000
trusted library allocation
page read and write
44D4000
trusted library allocation
page read and write
151F000
stack
page read and write
4562000
trusted library allocation
page read and write
17E4000
trusted library allocation
page read and write
2987000
heap
page read and write
7DE0000
heap
page read and write
772E000
stack
page read and write
A10000
heap
page read and write
179E000
stack
page read and write
29E0000
heap
page read and write
4B5D000
heap
page read and write
4798000
heap
page read and write
FE0000
heap
page read and write
56D7000
trusted library allocation
page read and write
57B1000
trusted library allocation
page read and write
5601000
trusted library allocation
page read and write
2780000
heap
page read and write
487F000
heap
page read and write
192E06F5000
heap
page read and write
48B5000
heap
page read and write
845E000
stack
page read and write
4720000
heap
page read and write
6EDD000
heap
page read and write
4811000
heap
page read and write
3010000
heap
page read and write
75C8000
trusted library allocation
page read and write
17FB000
trusted library allocation
page execute and read and write
4154000
heap
page read and write
195000
heap
page read and write
F0E000
stack
page read and write
2D00000
heap
page read and write
2D04000
heap
page read and write
438F000
stack
page read and write
76BE000
stack
page read and write
76DC000
trusted library allocation
page read and write
15A0000
heap
page read and write
2CCE000
unkown
page read and write
7CE0000
heap
page read and write
459C000
trusted library allocation
page read and write
43EE000
trusted library allocation
page read and write
3800000
trusted library allocation
page read and write
4681000
trusted library allocation
page read and write
75D5000
trusted library allocation
page read and write
29B0000
heap
page read and write
541B000
stack
page read and write
5DD0000
remote allocation
page read and write
1670000
heap
page read and write
5DD0000
remote allocation
page read and write
45C2000
trusted library allocation
page read and write
1415000
heap
page read and write
388E000
trusted library allocation
page read and write
56E9000
trusted library allocation
page read and write
5E0B000
trusted library allocation
page read and write
3679000
trusted library allocation
page read and write
457A000
trusted library allocation
page read and write
5DFE000
stack
page read and write
532D000
stack
page read and write
410E000
direct allocation
page read and write
3ED3000
direct allocation
page read and write
401000
unkown
page execute read
2E90000
heap
page read and write
7D17000
trusted library allocation
page read and write
F72000
unkown
page readonly
296E000
stack
page read and write
6EA1000
heap
page read and write
3960000
heap
page read and write
481B000
heap
page read and write
401000
unkown
page execute read
2AC0000
heap
page read and write
34A3000
trusted library allocation
page read and write
3FB3000
direct allocation
page read and write
12F7000
stack
page read and write
48E2000
heap
page read and write
49FA000
heap
page read and write
6A70000
trusted library allocation
page execute and read and write
192E0871000
heap
page read and write
479A000
heap
page read and write
3C6D000
direct allocation
page read and write
4AC7000
heap
page read and write
192E06B2000
heap
page read and write
49F2000
heap
page read and write
2E20000
heap
page read and write
406D000
heap
page read and write
2AEE000
heap
page read and write
499A000
heap
page read and write
4123000
heap
page read and write
13D0000
heap
page read and write
5050000
direct allocation
page read and write
2F4F000
unkown
page read and write
3C69000
direct allocation
page read and write
2E0E000
stack
page read and write
444A000
trusted library allocation
page read and write
6E91000
heap
page read and write
4D2B000
trusted library allocation
page read and write
3210000
heap
page execute and read and write
5ED0000
trusted library allocation
page read and write
CC5000
heap
page read and write
400000
unkown
page readonly
54AF000
stack
page read and write
536E000
stack
page read and write
470D000
heap
page read and write
192DDAFE000
heap
page read and write
39A0000
direct allocation
page read and write
73AC000
heap
page read and write
1630000
heap
page read and write
7B7E000
stack
page read and write
459B000
stack
page read and write
6784000
heap
page read and write
308D000
heap
page read and write
F40000
unkown
page readonly
5708000
trusted library allocation
page read and write
15FF000
stack
page read and write
4F26000
heap
page read and write
58F5000
trusted library allocation
page read and write
94A000
heap
page read and write
3CB5000
heap
page read and write
7DFC000
heap
page read and write
192DDBE4000
heap
page read and write
35FC000
trusted library allocation
page read and write
5069000
direct allocation
page read and write
7600000
trusted library allocation
page read and write
373E000
stack
page read and write
4617000
trusted library allocation
page read and write
F6B000
stack
page read and write
9A000
stack
page read and write
415D000
direct allocation
page read and write
4A76000
heap
page read and write
192D9649000
heap
page read and write
67D4000
trusted library allocation
page read and write
346C000
trusted library allocation
page read and write
6716000
heap
page read and write
3C69000
direct allocation
page read and write
3B08000
heap
page read and write
9B0000
heap
page read and write
4718000
heap
page read and write
492000
unkown
page read and write
10AB000
stack
page read and write
67FE000
stack
page read and write
7CFB000
trusted library allocation
page read and write
309B000
heap
page read and write
4935000
heap
page read and write
4849000
heap
page read and write
83DF000
stack
page read and write
73C8000
heap
page read and write
5830000
trusted library allocation
page read and write
3B0F000
stack
page read and write
5158000
heap
page read and write
28C2000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
7392000
heap
page read and write
6AA0000
trusted library allocation
page read and write
3777000
trusted library allocation
page read and write
192E08F4000
heap
page read and write
46BD000
heap
page read and write
4765000
heap
page read and write
384E000
stack
page read and write
442C000
trusted library allocation
page read and write
49B2000
heap
page read and write
371D000
trusted library allocation
page read and write
4221000
trusted library allocation
page read and write
415D000
direct allocation
page read and write
150000
heap
page read and write
50B9000
direct allocation
page read and write
7EB0000
trusted library allocation
page read and write
18E000
stack
page read and write
489A000
heap
page read and write
482C000
heap
page read and write
290F000
stack
page read and write
3E43000
heap
page read and write
4FE0000
heap
page read and write
4601000
trusted library allocation
page read and write
75F2000
trusted library allocation
page read and write
2A90000
heap
page execute and read and write
9D4000
heap
page read and write
36F7000
trusted library allocation
page read and write
469D000
heap
page read and write
8AF000
stack
page read and write
192DE7AF000
heap
page read and write
192E0736000
heap
page read and write
5AAE000
stack
page read and write
15A4000
heap
page read and write
7D90000
heap
page read and write
4646000
heap
page read and write
506D000
direct allocation
page read and write
4938000
heap
page read and write
4FC9000
trusted library allocation
page read and write
3BA1000
heap
page read and write
30D0000
trusted library allocation
page execute and read and write
492000
unkown
page read and write
3294000
trusted library allocation
page read and write
742E000
heap
page read and write
5020000
direct allocation
page read and write
192DD970000
heap
page read and write
3E00000
direct allocation
page read and write
473A000
heap
page read and write
3B3F000
stack
page read and write
192E0936000
heap
page read and write
15C4000
trusted library allocation
page read and write
490000
unkown
page read and write
56A0000
trusted library allocation
page read and write
831E000
stack
page read and write
4971000
heap
page read and write
5820000
trusted library allocation
page read and write
33DD000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
5E2E000
trusted library allocation
page read and write
110000
heap
page read and write
110000
heap
page read and write
48D2000
heap
page read and write
1017000
trusted library allocation
page execute and read and write
15D2000
heap
page read and write
49EF000
heap
page read and write
3F1D000
direct allocation
page read and write
3F8E000
direct allocation
page read and write
7210000
trusted library allocation
page read and write
491B000
heap
page read and write
64C0000
trusted library allocation
page execute and read and write
34CF000
trusted library allocation
page read and write
3D73000
direct allocation
page read and write
4555000
trusted library allocation
page read and write
66FE000
stack
page read and write
6570000
trusted library allocation
page execute and read and write
990000
heap
page read and write
7EAA000
heap
page read and write
1DE000
stack
page read and write
192DD97E000
heap
page read and write
4450000
heap
page read and write
2970000
heap
page readonly
43C1000
trusted library allocation
page read and write
490C000
heap
page read and write
33C1000
trusted library allocation
page read and write
7FF0000
trusted library allocation
page execute and read and write
46B0000
heap
page read and write
7CD000
stack
page read and write
43F9000
trusted library allocation
page read and write
490000
unkown
page write copy
43CD000
stack
page read and write
192DF98C000
heap
page read and write
5CDD000
stack
page read and write
496A000
heap
page read and write
4974000
heap
page read and write
3180000
trusted library allocation
page read and write
5609000
trusted library allocation
page read and write
44B6000
trusted library allocation
page read and write
15CD000
trusted library allocation
page execute and read and write
1F0000
heap
page read and write
308D000
heap
page read and write
3D49000
heap
page read and write
49C8000
heap
page read and write
4AEC000
heap
page read and write
39F6000
heap
page read and write
162E000
stack
page read and write
17D0000
heap
page read and write
48BB000
heap
page read and write
8B4000
stack
page read and write
2FC000
stack
page read and write
491000
unkown
page write copy
5E16000
trusted library allocation
page read and write
5781000
trusted library allocation
page read and write
3BCC000
heap
page read and write
517D000
direct allocation
page read and write
192DC394000
heap
page read and write
5850000
trusted library allocation
page read and write
492000
unkown
page read and write
464D000
trusted library allocation
page read and write
3030000
heap
page read and write
2AB0000
heap
page read and write
28A9000
trusted library allocation
page read and write
3D40000
heap
page read and write
1425000
heap
page read and write
7D60000
trusted library allocation
page read and write
3F19000
direct allocation
page read and write
401000
unkown
page execute read
300E000
stack
page read and write
42BF000
trusted library allocation
page read and write
13A0000
heap
page read and write
1687000
heap
page read and write
17E0000
trusted library allocation
page read and write
928000
heap
page read and write
696E000
stack
page read and write
697E000
stack
page read and write
EA0000
unkown
page readonly
101B000
trusted library allocation
page execute and read and write
64D0000
trusted library allocation
page read and write
434E000
stack
page read and write
27EE000
stack
page read and write
14DA000
heap
page read and write
4819000
heap
page read and write
46B0000
heap
page read and write
3F70000
direct allocation
page read and write
192DFB10000
heap
page read and write
65BF000
stack
page read and write
4FD5000
trusted library allocation
page read and write
33FE000
trusted library allocation
page read and write
6530000
trusted library allocation
page execute and read and write
56AE000
trusted library allocation
page read and write
3241000
trusted library allocation
page read and write
46C0000
trusted library allocation
page read and write
5792000
trusted library allocation
page read and write
3623000
trusted library allocation
page read and write
990000
heap
page read and write
491000
unkown
page write copy
2E95000
heap
page read and write
3071000
heap
page read and write
CB0000
trusted library allocation
page read and write
4709000
heap
page read and write
6E58000
heap
page read and write
4934000
heap
page execute and read and write
6DE0000
heap
page read and write
2A64000
heap
page read and write
4A8000
unkown
page read and write
48E5000
heap
page read and write
6E64000
heap
page read and write
3093000
heap
page read and write
3474000
trusted library allocation
page read and write
453B000
trusted library allocation
page read and write
6DB0000
trusted library allocation
page read and write
1680000
heap
page read and write
4F40000
direct allocation
page read and write
55C7000
heap
page read and write
6E86000
heap
page read and write
DC8000
heap
page read and write
17A2000
trusted library allocation
page read and write
46B3000
trusted library allocation
page read and write
4D33000
trusted library allocation
page read and write
455E000
heap
page read and write
5410000
direct allocation
page read and write
27F5000
heap
page read and write
5E90000
trusted library allocation
page execute and read and write
4790000
heap
page read and write
1F5000
heap
page read and write
3C05000
heap
page read and write
512E000
direct allocation
page read and write
2FC0000
heap
page read and write
69FE000
stack
page read and write
4F90000
direct allocation
page read and write
701E000
stack
page read and write
4159000
direct allocation
page read and write
100000
heap
page read and write
4606000
heap
page read and write
47FC000
heap
page read and write
4AD3000
heap
page read and write
4014000
heap
page read and write
6739000
heap
page read and write
3B40000
direct allocation
page read and write
8FE000
stack
page read and write
2B35000
heap
page read and write
4966000
heap
page read and write
4601000
trusted library allocation
page read and write
66E1000
heap
page read and write
17D3000
trusted library allocation
page execute and read and write
195F000
stack
page read and write
31F0000
heap
page read and write
8183000
trusted library allocation
page read and write
9A000
stack
page read and write
115F000
stack
page read and write
7160000
trusted library allocation
page execute and read and write
3000000
heap
page read and write
2917000
trusted library allocation
page read and write
36F5000
trusted library allocation
page read and write
3200000
trusted library allocation
page execute and read and write
DB0000
trusted library allocation
page read and write
490000
unkown
page read and write
192D981A000
heap
page read and write
3E60000
heap
page read and write
31FC000
stack
page read and write
192DC39E000
heap
page read and write
7740000
trusted library allocation
page execute and read and write
3854000
heap
page read and write
4390000
heap
page read and write
400000
unkown
page readonly
348F000
trusted library allocation
page read and write
192DDF14000
heap
page read and write
17AA000
trusted library allocation
page execute and read and write
4625000
trusted library allocation
page read and write
30B1000
heap
page read and write
970000
heap
page read and write
6540000
trusted library allocation
page read and write
440A000
trusted library allocation
page read and write
490000
unkown
page read and write
4580000
trusted library allocation
page read and write
64A0000
trusted library allocation
page read and write
461D000
trusted library allocation
page read and write
1370000
heap
page read and write
3F19000
direct allocation
page read and write
37F2000
trusted library allocation
page read and write
5A7C000
unkown
page read and write
44D2000
trusted library allocation
page read and write
17D4000
trusted library allocation
page read and write
110000
heap
page read and write
7C9D000
stack
page read and write
3EF3000
direct allocation
page read and write
2E10000
heap
page read and write
1609000
heap
page read and write
3230000
heap
page execute and read and write
418B000
heap
page read and write
1850000
heap
page read and write
8170000
trusted library allocation
page read and write
8AF000
stack
page read and write
434F000
heap
page read and write
4FC0000
trusted library allocation
page read and write
3210000
trusted library allocation
page read and write
7DF4000
heap
page read and write
3AA5000
trusted library allocation
page read and write
C02000
heap
page read and write
31F4000
heap
page read and write
460E000
trusted library allocation
page read and write
192D966B000
heap
page read and write
48DF000
heap
page read and write
49A6000
heap
page execute and read and write
F86000
unkown
page readonly
120F000
stack
page read and write
130000
heap
page read and write
30A9000
heap
page read and write
DFE000
heap
page read and write
17B5000
trusted library allocation
page execute and read and write
3B00000
direct allocation
page read and write
4FFB000
trusted library allocation
page read and write
294E000
stack
page read and write
56E0000
trusted library allocation
page read and write
709E000
stack
page read and write
There are 1663 hidden memdumps, click here to show them.