IOC Report
RFQ 034-1008-AG.exe

loading gif

Files

File Path
Type
Category
Malicious
RFQ 034-1008-AG.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\directory\name.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
data
modified
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER29D9.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Oct 10 09:25:44 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2BAF.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2BFE.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3d5a3yj0.lxc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a3fozadp.pia.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bt3v3aoh.rmf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eonkvjer.1bo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hay1ophj.ae3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_inwqutlj.5j5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rwgar223.n3e.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sgzccz1u.3i0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t0sa01dx.toc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_umq0hwqt.xoo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_up5y2yeg.gim.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zdmwc1nk.pcg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\silvexes
data
modified
C:\Users\user\AppData\Roaming\RegSvcs.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 13 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RFQ 034-1008-AG.exe
"C:\Users\user\Desktop\RFQ 034-1008-AG.exe"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\Desktop\RFQ 034-1008-AG.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\RFQ 034-1008-AG.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'RegSvcs.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\RegSvcs.exe'
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
malicious
C:\Users\user\AppData\Local\directory\name.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\AppData\Local\directory\name.exe"
malicious
C:\Users\user\AppData\Roaming\RegSvcs.exe
"C:\Users\user\AppData\Roaming\RegSvcs.exe"
malicious
C:\Users\user\AppData\Roaming\RegSvcs.exe
"C:\Users\user\AppData\Roaming\RegSvcs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5772 -s 2000
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
aarsallc.duckdns.org
malicious
http://nuget.org/NuGet.exe
unknown
http://crl.micro
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://aka.ms/pscore6lB
unknown
http://crl.microsoft
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://go.microsoft.c
unknown
http://go.microsoft.c(
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 7 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
aarsallc.duckdns.org
103.161.133.94
malicious

IPs

IP
Domain
Country
Malicious
103.161.133.94
aarsallc.duckdns.org
unknown
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RegSvcs
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
ProgramId
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
FileId
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
LowerCaseLongPath
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
LongPathHash
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
Name
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
OriginalFileName
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
Publisher
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
Version
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
BinFileVersion
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
BinaryType
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
ProductName
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
ProductVersion
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
LinkDate
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
BinProductVersion
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
AppxPackageFullName
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
AppxPackageRelativeId
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
Size
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
Language
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
IsOsComponent
\REGISTRY\A\{e39b607e-8ffe-1b0d-f9aa-5c472904c99f}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2941000
trusted library allocation
page read and write
malicious
4846000
trusted library allocation
page read and write
malicious
2E70000
direct allocation
page read and write
malicious
45E6000
trusted library allocation
page read and write
malicious
AA0000
direct allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
4C16000
trusted library allocation
page read and write
malicious
4AB000
unkown
page readonly
BC2000
trusted library allocation
page read and write
8014000
heap
page read and write
1500000
trusted library allocation
page read and write
98E000
stack
page read and write
4230000
direct allocation
page read and write
3D2F000
heap
page read and write
3EB1000
heap
page read and write
556F000
stack
page read and write
6CBB000
stack
page read and write
9A000
stack
page read and write
482000
unkown
page readonly
6ECC000
heap
page read and write
135000
heap
page read and write
2F88000
heap
page read and write
3E81000
heap
page read and write
1206000
heap
page read and write
750F000
heap
page read and write
E3E000
stack
page read and write
74EF000
heap
page read and write
3E31000
heap
page read and write
800000
heap
page read and write
3D6F000
heap
page read and write
4AC1000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page execute and read and write
8A7D000
stack
page read and write
3074000
heap
page read and write
56C0000
trusted library allocation
page read and write
433D000
stack
page read and write
7180000
trusted library allocation
page read and write
5D1D000
stack
page read and write
7120000
trusted library allocation
page read and write
80E3000
trusted library allocation
page read and write
7190000
trusted library allocation
page read and write
7CE0000
trusted library allocation
page read and write
7460000
heap
page read and write
C9C000
stack
page read and write
3E81000
heap
page read and write
2CD0000
heap
page readonly
4FB2000
trusted library allocation
page read and write
3D2F000
heap
page read and write
7C30000
trusted library allocation
page read and write
4579000
direct allocation
page read and write
88A0000
trusted library allocation
page read and write
3E31000
heap
page read and write
FD7000
heap
page read and write
498000
stack
page read and write
2E60000
heap
page read and write
3D2F000
heap
page read and write
85EE000
stack
page read and write
3D6F000
heap
page read and write
288FA761000
heap
page read and write
6F3E000
stack
page read and write
19E000
stack
page read and write
2BB8000
stack
page read and write
3D6F000
heap
page read and write
801C000
heap
page read and write
3D2F000
heap
page read and write
3D6F000
heap
page read and write
3D2F000
heap
page read and write
2C9F000
stack
page read and write
9B0000
heap
page read and write
124E000
stack
page read and write
A68000
heap
page read and write
8562000
trusted library allocation
page read and write
D3D000
heap
page read and write
2D2C000
heap
page read and write
3EB1000
heap
page read and write
7D92000
heap
page read and write
1143000
heap
page read and write
82D0000
trusted library allocation
page read and write
3D55000
heap
page read and write
7523000
heap
page read and write
7480000
trusted library allocation
page read and write
3EC7000
heap
page read and write
8C0000
heap
page read and write
45DE000
stack
page read and write
4450000
direct allocation
page read and write
A74000
trusted library allocation
page read and write
6D42000
heap
page read and write
4E04000
trusted library allocation
page read and write
4420000
direct allocation
page read and write
884000
trusted library allocation
page read and write
3E81000
heap
page read and write
BCEE5FB000
stack
page read and write
807F000
heap
page read and write
132D000
trusted library allocation
page execute and read and write
4420000
direct allocation
page read and write
3D6F000
heap
page read and write
6CF0000
heap
page execute and read and write
93E000
stack
page read and write
4975000
trusted library allocation
page execute and read and write
3D6F000
heap
page read and write
A70000
trusted library allocation
page read and write
2D70000
heap
page read and write
13CE000
stack
page read and write
7F8E000
stack
page read and write
ADE000
stack
page read and write
4EBC000
trusted library allocation
page read and write
70FB000
stack
page read and write
11A0000
trusted library allocation
page read and write
14A0000
heap
page read and write
6F80000
trusted library allocation
page read and write
3D6F000
heap
page read and write
7FFB23B25000
unkown
page readonly
3BDB000
heap
page read and write
457D000
direct allocation
page read and write
2930000
heap
page execute and read and write
490000
unkown
page read and write
940000
heap
page read and write
A2C000
stack
page read and write
3D9E000
heap
page read and write
7571000
heap
page read and write
8880000
trusted library allocation
page read and write
4940000
trusted library allocation
page read and write
7930000
heap
page read and write
53C000
stack
page read and write
3E31000
heap
page read and write
100000
heap
page read and write
490000
unkown
page write copy
7430000
trusted library allocation
page read and write
3D6F000
heap
page read and write
3E81000
heap
page read and write
554E000
stack
page read and write
6E82000
heap
page read and write
3D9E000
heap
page read and write
3E81000
heap
page read and write
7E80000
trusted library allocation
page read and write
FA0000
heap
page read and write
8AF000
stack
page read and write
BCEE1FE000
stack
page read and write
17A0000
direct allocation
page read and write
7486000
heap
page read and write
2972000
trusted library allocation
page read and write
4579000
direct allocation
page read and write
A70000
heap
page read and write
5719000
trusted library allocation
page read and write
C99000
heap
page read and write
F8B000
trusted library allocation
page execute and read and write
2E3E000
stack
page read and write
70D0000
trusted library allocation
page read and write
3D6F000
heap
page read and write
80C0000
heap
page read and write
82E0000
trusted library allocation
page read and write
86AE000
stack
page read and write
713E000
stack
page read and write
7C8E000
stack
page read and write
78C0000
trusted library allocation
page read and write
4549000
direct allocation
page read and write
73C86000
unkown
page readonly
4E40000
heap
page read and write
3D9E000
heap
page read and write
14ED000
trusted library allocation
page execute and read and write
4E3E000
stack
page read and write
3E94000
heap
page read and write
496A000
trusted library allocation
page execute and read and write
7D4000
heap
page read and write
14DD000
trusted library allocation
page execute and read and write
3EB1000
heap
page read and write
960000
heap
page read and write
4579000
direct allocation
page read and write
2BE1000
trusted library allocation
page read and write
5C67000
trusted library allocation
page read and write
3EF7000
heap
page read and write
400000
unkown
page readonly
6C4F000
stack
page read and write
120F000
stack
page read and write
3030000
heap
page read and write
72DE000
stack
page read and write
3E81000
heap
page read and write
589F000
trusted library allocation
page read and write
7B90000
trusted library allocation
page read and write
3BFF000
stack
page read and write
3EE1000
trusted library allocation
page read and write
3EB1000
heap
page read and write
7E33000
heap
page read and write
53CC000
stack
page read and write
400000
unkown
page readonly
A20000
heap
page read and write
12B0000
heap
page read and write
990000
heap
page read and write
C5B000
stack
page read and write
57D000
stack
page read and write
32F0000
heap
page read and write
4990000
trusted library allocation
page read and write
156E000
stack
page read and write
7280000
trusted library allocation
page read and write
771E000
stack
page read and write
7830000
trusted library allocation
page read and write
8230000
trusted library allocation
page execute and read and write
150B000
trusted library allocation
page execute and read and write
447E000
stack
page read and write
400000
unkown
page readonly
584E000
stack
page read and write
6E30000
heap
page read and write
45EE000
direct allocation
page read and write
7FD30000
trusted library allocation
page execute and read and write
3D2F000
heap
page read and write
4420000
direct allocation
page read and write
A94000
heap
page read and write
3D6F000
heap
page read and write
4A3F000
stack
page read and write
940000
heap
page read and write
14D4000
trusted library allocation
page read and write
77E0000
trusted library allocation
page read and write
9EC000
stack
page read and write
2B90000
heap
page execute and read and write
3E31000
heap
page read and write
7C0E000
stack
page read and write
D22000
heap
page read and write
3E31000
heap
page read and write
6E6B000
heap
page read and write
6FAF000
stack
page read and write
494D000
trusted library allocation
page execute and read and write
3CB7000
heap
page read and write
3D9E000
heap
page read and write
538E000
stack
page read and write
510A000
trusted library allocation
page read and write
3D9E000
heap
page read and write
32FA000
heap
page read and write
49E0000
heap
page readonly
149F000
stack
page read and write
69DB000
stack
page read and write
3D2F000
heap
page read and write
2CF8000
heap
page read and write
7DB8000
heap
page read and write
8B4000
stack
page read and write
3EB1000
heap
page read and write
5C6A000
trusted library allocation
page read and write
B5A000
unkown
page readonly
2E90000
heap
page read and write
2CC0000
trusted library allocation
page read and write
65E000
stack
page read and write
1520000
trusted library allocation
page read and write
4280000
direct allocation
page read and write
3EB1000
heap
page read and write
490000
unkown
page write copy
3D2F000
heap
page read and write
3E81000
heap
page read and write
1244000
heap
page read and write
2B7C000
stack
page read and write
82BE000
stack
page read and write
3D6F000
heap
page read and write
7910000
heap
page read and write
1148000
heap
page read and write
89F000
stack
page read and write
BB6000
trusted library allocation
page execute and read and write
4280000
direct allocation
page read and write
80E7000
heap
page read and write
A40000
trusted library allocation
page read and write
74B5000
heap
page read and write
7E70000
trusted library allocation
page read and write
D26000
heap
page read and write
6F90000
trusted library allocation
page read and write
2DDB000
trusted library allocation
page read and write
482000
unkown
page readonly
2DFD000
trusted library allocation
page read and write
27FC000
stack
page read and write
6FE1000
heap
page read and write
46DE000
stack
page read and write
7FFB23B01000
unkown
page execute read
3E81000
heap
page read and write
1125000
heap
page read and write
73D0000
trusted library allocation
page read and write
6FEE000
stack
page read and write
7BB000
heap
page read and write
5897000
trusted library allocation
page read and write
C6A000
heap
page read and write
4615000
heap
page execute and read and write
A9A000
trusted library allocation
page execute and read and write
3D9E000
heap
page read and write
1340000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
3EB1000
heap
page read and write
A4E000
stack
page read and write
6E7A000
heap
page read and write
4280000
direct allocation
page read and write
3D6F000
heap
page read and write
43D3000
direct allocation
page read and write
4B91000
trusted library allocation
page read and write
401000
unkown
page execute read
7503000
heap
page read and write
3D6F000
heap
page read and write
4E77000
trusted library allocation
page read and write
F00000
heap
page read and write
6EE5000
heap
page read and write
3D9E000
heap
page read and write
8700000
heap
page read and write
3E81000
heap
page read and write
77F0000
trusted library allocation
page execute and read and write
169F000
stack
page read and write
6ED0000
heap
page read and write
86F5000
heap
page read and write
C76000
heap
page read and write
FA8000
heap
page read and write
482000
unkown
page readonly
750000
heap
page read and write
3EB1000
heap
page read and write
3D9E000
heap
page read and write
45BE000
direct allocation
page read and write
4930000
trusted library allocation
page read and write
A30000
trusted library allocation
page execute and read and write
4AB000
unkown
page readonly
42B0000
direct allocation
page read and write
7F70000
trusted library allocation
page read and write
8430000
trusted library allocation
page read and write
3070000
heap
page read and write
8024000
heap
page read and write
154C000
stack
page read and write
F53000
trusted library allocation
page execute and read and write
6E9A000
heap
page read and write
110000
heap
page read and write
49F0000
heap
page read and write
970000
heap
page read and write
3EB1000
heap
page read and write
4E43000
heap
page read and write
84EF000
stack
page read and write
3EB1000
heap
page read and write
C2E000
stack
page read and write
7D54000
heap
page read and write
2F9E000
stack
page read and write
3D6F000
heap
page read and write
4753000
trusted library allocation
page read and write
3E31000
heap
page read and write
43A3000
direct allocation
page read and write
A10000
heap
page read and write
443E000
stack
page read and write
706E000
stack
page read and write
3DA0000
heap
page read and write
8570000
heap
page read and write
6EAB000
heap
page read and write
51D7000
trusted library allocation
page read and write
713D000
heap
page read and write
A0F000
stack
page read and write
3EC4000
heap
page read and write
3E81000
heap
page read and write
F54000
trusted library allocation
page read and write
809000
heap
page read and write
4A53000
trusted library allocation
page read and write
733E000
stack
page read and write
838E000
stack
page read and write
3D9E000
heap
page read and write
5025000
trusted library allocation
page read and write
6EBE000
stack
page read and write
8604000
heap
page read and write
7150000
trusted library allocation
page read and write
7460000
trusted library allocation
page read and write
8B0000
trusted library allocation
page read and write
45EE000
direct allocation
page read and write
7075000
heap
page execute and read and write
540E000
stack
page read and write
150000
heap
page read and write
155000
heap
page read and write
6C8E000
stack
page read and write
400000
unkown
page readonly
11C0000
heap
page read and write
3D2F000
heap
page read and write
B1C000
unkown
page read and write
AAE000
heap
page read and write
401000
unkown
page execute read
802C000
heap
page read and write
4E9A000
trusted library allocation
page read and write
4B1A000
trusted library allocation
page read and write
576F000
stack
page read and write
6DE000
stack
page read and write
5491000
trusted library allocation
page read and write
100000
heap
page read and write
4091000
trusted library allocation
page read and write
9B4000
heap
page read and write
7E7B000
trusted library allocation
page read and write
3E81000
heap
page read and write
1DE000
stack
page read and write
8B4000
stack
page read and write
7820000
trusted library allocation
page read and write
4549000
direct allocation
page read and write
43D3000
direct allocation
page read and write
7F50000
trusted library allocation
page execute and read and write
7B70000
heap
page read and write
7F200000
trusted library allocation
page execute and read and write
8092000
heap
page read and write
7FD48000
trusted library allocation
page execute and read and write
2ED0000
heap
page execute and read and write
1507000
trusted library allocation
page execute and read and write
9F0000
heap
page read and write
6F1B000
heap
page read and write
A60000
heap
page read and write
5A0000
heap
page read and write
8550000
trusted library allocation
page read and write
920000
heap
page read and write
2E85000
heap
page read and write
3D6F000
heap
page read and write
3D2F000
heap
page read and write
5995000
trusted library allocation
page read and write
3D6F000
heap
page read and write
717E000
stack
page read and write
73C0000
trusted library allocation
page read and write
7DB6000
heap
page read and write
6E8F000
heap
page read and write
8C2E000
stack
page read and write
7110000
trusted library allocation
page read and write
7DA8000
heap
page read and write
870000
trusted library allocation
page read and write
71DC000
heap
page read and write
F7A000
trusted library allocation
page execute and read and write
44F1000
trusted library allocation
page read and write
71D1000
heap
page read and write
ABE000
heap
page read and write
3E81000
heap
page read and write
42B0000
direct allocation
page read and write
6EAE000
heap
page read and write
288FAA35000
heap
page read and write
3D6F000
heap
page read and write
3D9E000
heap
page read and write
699E000
stack
page read and write
CB6000
heap
page read and write
5440000
heap
page execute and read and write
30AA000
heap
page read and write
4488000
trusted library allocation
page read and write
288FA6B0000
heap
page read and write
46E0000
heap
page execute and read and write
717B000
heap
page read and write
3E31000
heap
page read and write
43A3000
direct allocation
page read and write
8B2000
trusted library allocation
page read and write
843D000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
685B000
stack
page read and write
2FCE000
stack
page read and write
401000
unkown
page execute read
43FE000
stack
page read and write
EF6000
heap
page read and write
5F0000
heap
page read and write
14E0000
trusted library allocation
page read and write
3D26000
heap
page read and write
100F000
heap
page read and write
596E000
trusted library allocation
page read and write
1114000
trusted library allocation
page read and write
3EB1000
heap
page read and write
131F000
stack
page read and write
812E000
stack
page read and write
3941000
trusted library allocation
page read and write
3D2F000
heap
page read and write
3D9E000
heap
page read and write
73BE000
stack
page read and write
723D000
stack
page read and write
74C6000
heap
page read and write
1185000
heap
page read and write
8018000
heap
page read and write
3D2F000
heap
page read and write
3E30000
heap
page read and write
BCEDEFF000
stack
page read and write
3C2F000
stack
page read and write
BCEDBFF000
stack
page read and write
14E4000
trusted library allocation
page read and write
5A1F000
stack
page read and write
7860000
trusted library allocation
page read and write
1030000
heap
page read and write
3EB0000
heap
page read and write
3D2F000
heap
page read and write
3D2E000
heap
page read and write
2EA0000
trusted library allocation
page read and write
4420000
direct allocation
page read and write
4579000
direct allocation
page read and write
5964000
trusted library allocation
page read and write
860C000
heap
page read and write
5AC9000
trusted library allocation
page read and write
3D2F000
heap
page read and write
589E000
stack
page read and write
30E5000
heap
page read and write
3D9E000
heap
page read and write
80E1000
heap
page read and write
457D000
direct allocation
page read and write
4A01000
trusted library allocation
page read and write
3E31000
heap
page read and write
3EB1000
heap
page read and write
7100000
trusted library allocation
page read and write
288FA77F000
heap
page read and write
3D2E000
heap
page read and write
6A5A000
stack
page read and write
70B0000
trusted library allocation
page read and write
8D7000
heap
page read and write
9EE000
stack
page read and write
564E000
stack
page read and write
45EE000
direct allocation
page read and write
1055000
heap
page read and write
8B4000
stack
page read and write
7F4E000
stack
page read and write
11D0000
heap
page read and write
89F000
stack
page read and write
507E000
stack
page read and write
58A7000
trusted library allocation
page read and write
84BD000
stack
page read and write
1AE000
stack
page read and write
4450000
direct allocation
page read and write
A95000
heap
page read and write
7FFB23B20000
unkown
page read and write
528E000
stack
page read and write
1390000
heap
page read and write
4450000
direct allocation
page read and write
3EB1000
heap
page read and write
7920000
trusted library allocation
page execute and read and write
6CFD000
stack
page read and write
C48000
heap
page read and write
32D0000
heap
page read and write
4943000
trusted library allocation
page execute and read and write
510000
heap
page read and write
45EE000
direct allocation
page read and write
71F0000
heap
page execute and read and write
3EF7000
heap
page read and write
1155000
heap
page read and write
454D000
direct allocation
page read and write
3EB1000
heap
page read and write
A80000
direct allocation
page read and write
4CCE000
stack
page read and write
8590000
trusted library allocation
page read and write
1290000
heap
page read and write
10DE000
stack
page read and write
160F000
stack
page read and write
17A0000
heap
page read and write
4E25000
trusted library allocation
page read and write
D28000
heap
page read and write
3E31000
heap
page read and write
735E000
stack
page read and write
1810000
heap
page read and write
3CF6000
heap
page read and write
CFD000
heap
page read and write
7CD0000
trusted library allocation
page read and write
8E0000
trusted library allocation
page read and write
76C0000
trusted library allocation
page read and write
1128000
heap
page read and write
6A6E000
stack
page read and write
3E31000
heap
page read and write
288FAA3E000
heap
page read and write
400000
unkown
page readonly
787000
heap
page read and write
11F3000
heap
page read and write
4549000
direct allocation
page read and write
82C0000
trusted library allocation
page read and write
3D6F000
heap
page read and write
718C000
heap
page read and write
7B80000
trusted library allocation
page execute and read and write
7850000
trusted library allocation
page read and write
BCEDFFE000
stack
page read and write
6B3B000
stack
page read and write
7153000
heap
page read and write
70E0000
trusted library allocation
page read and write
3EB1000
heap
page read and write
B52000
unkown
page readonly
3E31000
heap
page read and write
7DCA000
heap
page read and write
5EE000
stack
page read and write
443D000
stack
page read and write
3D9E000
heap
page read and write
ED0000
heap
page read and write
8890000
trusted library allocation
page read and write
A8D000
trusted library allocation
page execute and read and write
4AB0000
heap
page execute and read and write
EF0000
heap
page read and write
4BCD000
trusted library allocation
page read and write
7FC0000
trusted library allocation
page read and write
9F5000
heap
page read and write
45EE000
direct allocation
page read and write
7430000
trusted library allocation
page read and write
7C10000
heap
page read and write
5600000
heap
page execute and read and write
2D1B000
heap
page read and write
A3E000
stack
page read and write
69D000
stack
page read and write
BC7000
trusted library allocation
page execute and read and write
3D2F000
heap
page read and write
D06000
heap
page read and write
4AB000
unkown
page readonly
ADC000
heap
page read and write
7890000
trusted library allocation
page read and write
8631000
heap
page read and write
3E31000
heap
page read and write
3CD6000
heap
page read and write
6BBF000
stack
page read and write
F05000
heap
page read and write
7EF0000
heap
page read and write
3D6E000
heap
page read and write
3E80000
heap
page read and write
4BAA000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
4450000
direct allocation
page read and write
779E000
stack
page read and write
8072000
heap
page read and write
30D0000
heap
page read and write
54AE000
stack
page read and write
7200000
trusted library allocation
page read and write
3C54000
heap
page read and write
749C000
heap
page read and write
490000
unkown
page read and write
6A1D000
stack
page read and write
76BA000
trusted library allocation
page read and write
3EC7000
heap
page read and write
AA0000
trusted library allocation
page read and write
465D000
stack
page read and write
8A00000
trusted library allocation
page read and write
73F0000
trusted library allocation
page read and write
1C0000
heap
page read and write
28FD000
stack
page read and write
3E31000
heap
page read and write
56D7000
trusted library allocation
page read and write
883E000
stack
page read and write
43A3000
direct allocation
page read and write
3E31000
heap
page read and write
7DD0000
heap
page read and write
2ED0000
heap
page read and write
A83000
trusted library allocation
page execute and read and write
1100000
trusted library allocation
page read and write
7D64000
heap
page read and write
2A37000
trusted library allocation
page read and write
8028000
heap
page read and write
8BEC000
stack
page read and write
3E31000
heap
page read and write
7167000
heap
page read and write
307E000
stack
page read and write
3E31000
heap
page read and write
3D9E000
heap
page read and write
3CE6000
heap
page read and write
7070000
heap
page execute and read and write
54B1000
trusted library allocation
page read and write
76AE000
stack
page read and write
7F69000
trusted library allocation
page read and write
73C8D000
unkown
page read and write
6EA4000
heap
page read and write
6BFD000
stack
page read and write
8600000
heap
page read and write
469C000
stack
page read and write
5F0000
heap
page read and write
3EF5000
heap
page read and write
27A0000
trusted library allocation
page read and write
827E000
stack
page read and write
3D9E000
heap
page read and write
4935000
trusted library allocation
page read and write
3EB1000
heap
page read and write
3E81000
heap
page read and write
3D9E000
heap
page read and write
4530000
heap
page read and write
A50000
heap
page execute and read and write
12AF000
stack
page read and write
3E81000
heap
page read and write
5AC1000
trusted library allocation
page read and write
5970000
trusted library allocation
page read and write
6ECA000
heap
page read and write
8AA000
trusted library allocation
page execute and read and write
4A80000
trusted library allocation
page read and write
288FA7B4000
heap
page read and write
9AD000
stack
page read and write
3D6F000
heap
page read and write
279E000
stack
page read and write
3E31000
heap
page read and write
3EB1000
heap
page read and write
7840000
trusted library allocation
page read and write
3E31000
heap
page read and write
51F3000
trusted library allocation
page read and write
1239000
heap
page read and write
4AB000
unkown
page readonly
7FA90000
trusted library allocation
page execute and read and write
3E31000
heap
page read and write
F40000
trusted library allocation
page read and write
D31000
heap
page read and write
866E000
stack
page read and write
5AE9000
trusted library allocation
page read and write
3E31000
heap
page read and write
73C8D000
unkown
page read and write
3D6F000
heap
page read and write
3D26000
heap
page read and write
3D9D000
heap
page read and write
4F4E000
stack
page read and write
76B7000
trusted library allocation
page read and write
4450000
direct allocation
page read and write
301F000
stack
page read and write
4A50000
heap
page read and write
2E8C000
stack
page read and write
6C3A000
stack
page read and write
73A0000
trusted library allocation
page read and write
4420000
direct allocation
page read and write
6EC0000
heap
page read and write
3C87000
heap
page read and write
10F0000
heap
page read and write
42B0000
direct allocation
page read and write
F50000
heap
page read and write
7410000
trusted library allocation
page read and write
8620000
heap
page read and write
7FB0000
trusted library allocation
page read and write
45BE000
direct allocation
page read and write
3E44000
heap
page read and write
482000
unkown
page readonly
3C3D000
heap
page read and write
8580000
trusted library allocation
page read and write
AB0000
heap
page read and write
71F000
stack
page read and write
A84000
trusted library allocation
page read and write
7CF2000
trusted library allocation
page read and write
7FFB23B22000
unkown
page readonly
948000
heap
page read and write
578E000
stack
page read and write
3D2E000
heap
page read and write
30E0000
heap
page read and write
73C8D000
unkown
page read and write
150000
heap
page read and write
71E3000
heap
page read and write
7170000
trusted library allocation
page read and write
FC9000
heap
page read and write
6F6E000
stack
page read and write
BCEDAFA000
stack
page read and write
44DC000
stack
page read and write
71FA000
stack
page read and write
482000
unkown
page readonly
42C4000
direct allocation
page read and write
1E0000
heap
page read and write
51FE000
stack
page read and write
518A000
trusted library allocation
page read and write
401000
unkown
page execute read
4BCB000
trusted library allocation
page read and write
C79000
heap
page read and write
43D3000
direct allocation
page read and write
3E40000
heap
page execute and read and write
68DE000
stack
page read and write
74E8000
heap
page read and write
7519000
heap
page read and write
887E000
stack
page read and write
52FE000
stack
page read and write
7DE7000
heap
page read and write
5886000
trusted library allocation
page read and write
454D000
direct allocation
page read and write
85B0000
trusted library allocation
page execute and read and write
7660000
trusted library allocation
page execute and read and write
3D6F000
heap
page read and write
155000
heap
page read and write
726E000
stack
page read and write
7FA0000
trusted library allocation
page read and write
3D9E000
heap
page read and write
11C0000
trusted library allocation
page read and write
870D000
heap
page read and write
3D6F000
heap
page read and write
43A3000
direct allocation
page read and write
2E90000
trusted library allocation
page read and write
3EB1000
heap
page read and write
3D2F000
heap
page read and write
3D9E000
heap
page read and write
5645000
trusted library allocation
page read and write
54D9000
trusted library allocation
page read and write
AA5000
trusted library allocation
page execute and read and write
3700000
heap
page read and write
3E81000
heap
page read and write
70F0000
heap
page read and write
6B7E000
stack
page read and write
EE0000
trusted library allocation
page read and write
DB0000
heap
page read and write
BE0000
trusted library allocation
page read and write
401000
unkown
page execute read
3D2F000
heap
page read and write
3E81000
heap
page read and write
1324000
trusted library allocation
page read and write
86FE000
heap
page read and write
6D00000
trusted library allocation
page read and write
4A57000
heap
page read and write
B20000
heap
page read and write
42FE000
stack
page read and write
5C77000
trusted library allocation
page read and write
45BE000
direct allocation
page read and write
4A40000
trusted library allocation
page execute and read and write
3E81000
heap
page read and write
3E31000
heap
page read and write
451C000
stack
page read and write
8663000
heap
page read and write
3E31000
heap
page read and write
454D000
direct allocation
page read and write
45BE000
direct allocation
page read and write
4579000
direct allocation
page read and write
3EB1000
heap
page read and write
3D2F000
heap
page read and write
7420000
trusted library allocation
page read and write
56F1000
trusted library allocation
page read and write
288FC2F0000
heap
page read and write
3C00000
heap
page read and write
A80000
trusted library allocation
page read and write
7432000
trusted library allocation
page read and write
73C8F000
unkown
page readonly
43D3000
direct allocation
page read and write
91E000
stack
page read and write
5C56000
trusted library allocation
page read and write
490000
unkown
page write copy
3CA1000
trusted library allocation
page read and write
3D2F000
heap
page read and write
3D2F000
heap
page read and write
49F7000
trusted library allocation
page read and write
70AD000
stack
page read and write
502F000
trusted library allocation
page read and write
B50000
unkown
page readonly
5460000
heap
page execute and read and write
3E31000
heap
page read and write
3E31000
heap
page read and write
2E4E000
stack
page read and write
3D2F000
heap
page read and write
6F87000
trusted library allocation
page read and write
6F30000
trusted library allocation
page execute and read and write
7B9D000
trusted library allocation
page read and write
4970000
trusted library allocation
page read and write
96D000
heap
page read and write
6A60000
heap
page read and write
A89000
trusted library allocation
page read and write
288FAA30000
heap
page read and write
6C0E000
stack
page read and write
1580000
heap
page read and write
86CC000
heap
page read and write
3EB1000
heap
page read and write
6C7E000
stack
page read and write
150E000
stack
page read and write
3D6E000
heap
page read and write
A40000
heap
page read and write
A47000
heap
page read and write
100D000
heap
page read and write
689E000
stack
page read and write
4420000
direct allocation
page read and write
45BE000
direct allocation
page read and write
88D000
trusted library allocation
page execute and read and write
3E81000
heap
page read and write
712E000
heap
page read and write
400000
system
page execute and read and write
454D000
direct allocation
page read and write
4AB000
unkown
page readonly
2F77000
heap
page read and write
288FA750000
heap
page read and write
74F2000
heap
page read and write
7512000
heap
page read and write
4A7000
unkown
page read and write
998000
trusted library allocation
page read and write
42B0000
direct allocation
page read and write
7FFB23B16000
unkown
page readonly
3EB1000
heap
page read and write
4E15000
trusted library allocation
page read and write
7F2C8000
trusted library allocation
page execute and read and write
56D0000
trusted library allocation
page read and write
3C6C000
heap
page read and write
6E60000
heap
page read and write
1380000
trusted library allocation
page read and write
4610000
heap
page execute and read and write
8230000
trusted library allocation
page execute and read and write
5A20000
trusted library allocation
page read and write
54B9000
trusted library allocation
page read and write
83CE000
stack
page read and write
C30000
trusted library allocation
page execute and read and write
AAA000
heap
page read and write
71BE000
stack
page read and write
92E000
stack
page read and write
6E30000
heap
page read and write
123B000
heap
page read and write
42B0000
direct allocation
page read and write
9FE000
stack
page read and write
834D000
stack
page read and write
490000
unkown
page read and write
7E29000
heap
page read and write
1550000
trusted library allocation
page read and write
54B7000
trusted library allocation
page read and write
3D6F000
heap
page read and write
3D6F000
heap
page read and write
401000
unkown
page execute read
3D9E000
heap
page read and write
3D2F000
heap
page read and write
8606000
heap
page read and write
BBA000
trusted library allocation
page execute and read and write
400000
unkown
page readonly
3E31000
heap
page read and write
7800000
trusted library allocation
page read and write
610000
heap
page read and write
111D000
trusted library allocation
page execute and read and write
2E20000
heap
page read and write
A90000
heap
page read and write
70BD000
stack
page read and write
4440000
heap
page execute and read and write
70C0000
trusted library allocation
page execute and read and write
14CF000
stack
page read and write
454D000
direct allocation
page read and write
3E90000
heap
page execute and read and write
11AE000
stack
page read and write
1050000
heap
page read and write
10E0000
heap
page read and write
7549000
heap
page read and write
8625000
heap
page read and write
16A8000
heap
page read and write
6EFE000
stack
page read and write
C40000
heap
page read and write
3CCC000
heap
page read and write
51F7000
trusted library allocation
page read and write
1113000
trusted library allocation
page execute and read and write
3CF8000
heap
page read and write
4480000
heap
page read and write
457D000
direct allocation
page read and write
BCEE2FE000
stack
page read and write
1210000
heap
page read and write
3D2F000
heap
page read and write
437B000
stack
page read and write
6DEE000
stack
page read and write
45BE000
direct allocation
page read and write
3EB1000
heap
page read and write
5638000
trusted library allocation
page read and write
14D3000
trusted library allocation
page execute and read and write
3D6F000
heap
page read and write
3D9E000
heap
page read and write
7CCE000
stack
page read and write
7C40000
heap
page read and write
72FC000
stack
page read and write
F10000
heap
page read and write
27B0000
heap
page read and write
6EB8000
heap
page read and write
748C000
heap
page read and write
4FAE000
stack
page read and write
6E97000
heap
page read and write
7D68000
heap
page read and write
AAE000
stack
page read and write
120E000
stack
page read and write
550B000
stack
page read and write
8212000
trusted library allocation
page read and write
1120000
heap
page read and write
3E81000
heap
page read and write
880000
trusted library allocation
page read and write
4944000
trusted library allocation
page read and write
2B65000
trusted library allocation
page read and write
3E81000
heap
page read and write
A70000
trusted library allocation
page read and write
2CF0000
heap
page read and write
816E000
stack
page read and write
940000
heap
page read and write
4FE0000
heap
page execute and read and write
91E000
stack
page read and write
3D2F000
heap
page read and write
46F1000
trusted library allocation
page read and write
E48000
trusted library allocation
page read and write
5C1C000
stack
page read and write
7FFB23B00000
unkown
page readonly
457D000
direct allocation
page read and write
853E000
stack
page read and write
827E000
stack
page read and write
73C70000
unkown
page readonly
56CB000
trusted library allocation
page read and write
16B6000
heap
page read and write
7472000
heap
page read and write
73C71000
unkown
page execute read
11B0000
trusted library allocation
page execute and read and write
2B60000
trusted library allocation
page read and write
78B0000
trusted library allocation
page read and write
862C000
stack
page read and write
3EC5000
heap
page read and write
3E81000
heap
page read and write
457D000
direct allocation
page read and write
8702000
heap
page read and write
3E81000
heap
page read and write
7164000
heap
page read and write
49DE000
stack
page read and write
727B000
stack
page read and write
3D9E000
heap
page read and write
5670000
heap
page read and write
288FA6D0000
heap
page read and write
116D000
stack
page read and write
930000
heap
page readonly
3D2F000
heap
page read and write
3D2F000
heap
page read and write
4A68000
trusted library allocation
page read and write
7E07000
heap
page read and write
5A40000
trusted library allocation
page read and write
6A70000
heap
page read and write
8AF000
stack
page read and write
5083000
trusted library allocation
page read and write
8713000
heap
page read and write
84F0000
heap
page read and write
7D50000
heap
page read and write
2E80000
heap
page read and write
4280000
direct allocation
page read and write
55EE000
stack
page read and write
A90000
heap
page read and write
BCEE4FE000
stack
page read and write
3D6F000
heap
page read and write
80D0000
trusted library allocation
page read and write
6EEC000
heap
page read and write
1E0000
heap
page read and write
7277000
trusted library allocation
page read and write
3E31000
heap
page read and write
4549000
direct allocation
page read and write
3D2F000
heap
page read and write
4E02000
trusted library allocation
page read and write
890000
trusted library allocation
page read and write
862D000
heap
page read and write
5400000
trusted library allocation
page execute and read and write
BCEDCFF000
stack
page read and write
3038000
heap
page read and write
160000
heap
page read and write
4FD0000
heap
page read and write
7450000
trusted library allocation
page read and write
8470000
trusted library allocation
page execute and read and write
130000
heap
page read and write
43D3000
direct allocation
page read and write
6FBE000
stack
page read and write
14E000
stack
page read and write
3E31000
heap
page read and write
1320000
trusted library allocation
page read and write
7FAA8000
trusted library allocation
page execute and read and write
70F0000
trusted library allocation
page read and write
51D5000
trusted library allocation
page read and write
3E31000
heap
page read and write
4A7000
unkown
page read and write
8077000
heap
page read and write
843B000
trusted library allocation
page read and write
574E000
stack
page read and write
540C000
stack
page read and write
3D2F000
heap
page read and write
80E0000
trusted library allocation
page read and write
1590000
heap
page read and write
883000
trusted library allocation
page execute and read and write
568E000
stack
page read and write
51BE000
stack
page read and write
9CE000
stack
page read and write
8020000
heap
page read and write
4549000
direct allocation
page read and write
14C0000
heap
page read and write
6AFD000
stack
page read and write
11D8000
heap
page read and write
7880000
trusted library allocation
page read and write
F64000
trusted library allocation
page read and write
7F60000
trusted library allocation
page read and write
C5E000
heap
page read and write
3E77000
heap
page read and write
8BAE000
stack
page read and write
775E000
stack
page read and write
AA2000
trusted library allocation
page read and write
305A000
heap
page read and write
459E000
stack
page read and write
5649000
stack
page read and write
77A000
heap
page read and write
84AE000
stack
page read and write
2EE1000
trusted library allocation
page read and write
3D6F000
heap
page read and write
7420000
heap
page execute and read and write
5F0000
heap
page read and write
3D2F000
heap
page read and write
8635000
heap
page read and write
45EE000
direct allocation
page read and write
3D2F000
heap
page read and write
9A000
stack
page read and write
5499000
trusted library allocation
page read and write
3D9E000
heap
page read and write
95F000
stack
page read and write
4280000
direct allocation
page read and write
3EB1000
heap
page read and write
43BE000
stack
page read and write
8010000
heap
page read and write
A73000
trusted library allocation
page execute and read and write
727A000
trusted library allocation
page read and write
5635000
trusted library allocation
page read and write
43A3000
direct allocation
page read and write
70F2000
trusted library allocation
page read and write
7F80000
trusted library allocation
page read and write
3E0E000
heap
page read and write
3EB1000
heap
page read and write
3EB1000
heap
page read and write
5F6000
heap
page read and write
5300000
heap
page read and write
731E000
stack
page read and write
49D000
stack
page read and write
5624000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
8B5000
trusted library allocation
page execute and read and write
109E000
stack
page read and write
830E000
stack
page read and write
8052000
heap
page read and write
1347000
trusted library allocation
page execute and read and write
72BE000
stack
page read and write
4D42000
trusted library allocation
page read and write
3DDF000
heap
page read and write
55AE000
stack
page read and write
8AF000
stack
page read and write
7D6C000
heap
page read and write
1370000
trusted library allocation
page execute and read and write
7E60000
trusted library allocation
page execute and read and write
3EB1000
heap
page read and write
7176000
heap
page read and write
8440000
trusted library allocation
page read and write
482000
unkown
page readonly
543E000
stack
page read and write
6E72000
heap
page read and write
2E40000
heap
page read and write
3E81000
heap
page read and write
4960000
trusted library allocation
page read and write
3D9E000
heap
page read and write
3D6F000
heap
page read and write
7D5C000
heap
page read and write
288FA6A0000
heap
page read and write
86D3000
heap
page read and write
7171000
heap
page read and write
3CBF000
heap
page read and write
F87000
trusted library allocation
page execute and read and write
4F63000
trusted library allocation
page read and write
7D58000
heap
page read and write
1000000
heap
page read and write
59DD000
stack
page read and write
4950000
trusted library allocation
page read and write
3D9E000
heap
page read and write
5D5C000
stack
page read and write
7E7D000
trusted library allocation
page read and write
53FE000
stack
page read and write
85A9000
stack
page read and write
129E000
stack
page read and write
119F000
stack
page read and write
BA0000
trusted library allocation
page read and write
3D6F000
heap
page read and write
43D3000
direct allocation
page read and write
3D2F000
heap
page read and write
6B3C000
stack
page read and write
7480000
heap
page read and write
4AB000
unkown
page readonly
3D2F000
heap
page read and write
8A03000
trusted library allocation
page read and write
D9A000
stack
page read and write
7140000
trusted library allocation
page read and write
3E81000
heap
page read and write
702F000
stack
page read and write
7B9B000
trusted library allocation
page read and write
3E75000
heap
page read and write
3E41000
heap
page read and write
3E81000
heap
page read and write
73C8D000
unkown
page read and write
3BBF000
stack
page read and write
605E000
stack
page read and write
3C30000
heap
page read and write
D24000
heap
page read and write
4537000
heap
page read and write
695A000
stack
page read and write
6ED8000
heap
page read and write
7E35000
heap
page read and write
2DB6000
trusted library allocation
page read and write
4520000
heap
page read and write
A80000
trusted library allocation
page read and write
1203000
heap
page read and write
7192000
trusted library allocation
page read and write
3D6F000
heap
page read and write
D57000
stack
page read and write
56F9000
trusted library allocation
page read and write
3E81000
heap
page read and write
ABA000
heap
page read and write
3EB1000
heap
page read and write
F76000
trusted library allocation
page execute and read and write
89F000
stack
page read and write
2E30000
heap
page read and write
4959000
trusted library allocation
page read and write
7E1D000
heap
page read and write
2E45000
heap
page read and write
3E81000
heap
page read and write
454D000
direct allocation
page read and write
730000
heap
page read and write
737F000
stack
page read and write
4C53000
trusted library allocation
page read and write
70D0000
heap
page read and write
3D6F000
heap
page read and write
6FFE000
stack
page read and write
4E23000
trusted library allocation
page read and write
3E81000
heap
page read and write
3E31000
heap
page read and write
73E0000
trusted library allocation
page read and write
589A000
trusted library allocation
page read and write
8F8000
stack
page read and write
6F8A000
trusted library allocation
page read and write
56CD000
trusted library allocation
page read and write
2DBC000
heap
page read and write
76B0000
trusted library allocation
page read and write
4BAC000
trusted library allocation
page read and write
6E2E000
stack
page read and write
7BA0000
trusted library allocation
page read and write
100000
heap
page read and write
74DB000
heap
page read and write
15A0000
heap
page read and write
5B2B000
trusted library allocation
page read and write
382E000
stack
page read and write
134B000
trusted library allocation
page execute and read and write
A50000
trusted library allocation
page read and write
1360000
trusted library allocation
page read and write
54F9000
trusted library allocation
page read and write
2CE0000
trusted library allocation
page execute and read and write
43A3000
direct allocation
page read and write
ECE000
stack
page read and write
4579000
direct allocation
page read and write
3D6F000
heap
page read and write
37BE000
stack
page read and write
7270000
trusted library allocation
page read and write
8B6B000
stack
page read and write
3E77000
heap
page read and write
3EB1000
heap
page read and write
7870000
trusted library allocation
page read and write
3EC1000
heap
page read and write
78A0000
trusted library allocation
page read and write
8D0000
heap
page read and write
3EB1000
heap
page read and write
4540000
trusted library allocation
page read and write
AE8000
heap
page read and write
128E000
stack
page read and write
554C000
stack
page read and write
EF9000
stack
page read and write
3CC8000
heap
page read and write
948000
heap
page read and write
3D9E000
heap
page read and write
8440000
trusted library allocation
page read and write
50E8000
trusted library allocation
page read and write
BA3000
trusted library allocation
page read and write
A90000
heap
page read and write
3E81000
heap
page read and write
7100000
heap
page read and write
89F0000
trusted library allocation
page read and write
5E5A000
stack
page read and write
56E0000
heap
page read and write
8085000
heap
page read and write
4445000
heap
page execute and read and write
3BF2000
heap
page read and write
288FA787000
heap
page read and write
3E31000
heap
page read and write
82B9000
stack
page read and write
3E81000
heap
page read and write
544E000
stack
page read and write
2CA9000
trusted library allocation
page read and write
3D9D000
heap
page read and write
71E5000
heap
page read and write
11F8000
heap
page read and write
73FE000
stack
page read and write
899000
trusted library allocation
page read and write
3EB1000
heap
page read and write
863D000
heap
page read and write
3D9E000
heap
page read and write
616000
heap
page read and write
5AE1000
trusted library allocation
page read and write
2B5F000
stack
page read and write
16AF000
stack
page read and write
4280000
direct allocation
page read and write
4549000
direct allocation
page read and write
691E000
stack
page read and write
9A000
stack
page read and write
7F2B0000
trusted library allocation
page execute and read and write
7F00000
heap
page read and write
77DD000
stack
page read and write
BEC000
stack
page read and write
5455000
trusted library allocation
page read and write
3D9E000
heap
page read and write
73B0000
trusted library allocation
page execute and read and write
7220000
trusted library allocation
page execute and read and write
739D000
stack
page read and write
2F5D000
stack
page read and write
3E31000
heap
page read and write
3091000
trusted library allocation
page read and write
42B0000
direct allocation
page read and write
45C000
stack
page read and write
4491000
trusted library allocation
page read and write
4A7000
unkown
page read and write
570F000
stack
page read and write
7E21000
heap
page read and write
1120000
heap
page read and write
53B000
stack
page read and write
3067000
heap
page read and write
8FE000
stack
page read and write
563D000
trusted library allocation
page read and write
8679000
heap
page read and write
566F000
stack
page read and write
6AFC000
stack
page read and write
5F5E000
stack
page read and write
12A0000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
2FDE000
stack
page read and write
3CFE000
heap
page read and write
2CA1000
trusted library allocation
page read and write
578000
stack
page read and write
4450000
direct allocation
page read and write
FC3000
heap
page read and write
BCB000
trusted library allocation
page execute and read and write
3080000
heap
page execute and read and write
BCEE3FE000
stack
page read and write
3D9E000
heap
page read and write
8056000
heap
page read and write
1193000
heap
page read and write
1570000
trusted library allocation
page execute and read and write
AA0000
heap
page read and write
3E91000
heap
page read and write
A7D000
trusted library allocation
page execute and read and write
2BBD000
stack
page read and write
3D9E000
heap
page read and write
3D9E000
heap
page read and write
8430000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
6F79000
stack
page read and write
7470000
trusted library allocation
page read and write
3EC0000
heap
page execute and read and write
457D000
direct allocation
page read and write
36FE000
stack
page read and write
6CCF000
stack
page read and write
3EB1000
heap
page read and write
8C6E000
stack
page read and write
7EED000
stack
page read and write
3BC0000
heap
page read and write
5C6E000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
8443000
trusted library allocation
page read and write
2F50000
heap
page read and write
758000
heap
page read and write
3D9E000
heap
page read and write
6D3B000
stack
page read and write
6F7E000
stack
page read and write
3D9E000
heap
page read and write
3E81000
heap
page read and write
8A30000
trusted library allocation
page execute and read and write
4972000
trusted library allocation
page read and write
There are 1305 hidden memdumps, click here to show them.