IOC Report
LkCinYWgNh.exe

loading gif

Files

File Path
Type
Category
Malicious
LkCinYWgNh.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_LkCinYWgNh.exe_b78ee6e1254ac013b6759d849c766ab0c674b17_827300c8_171ce87b-9a06-400e-a499-b0f4ffd39415\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6174.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Oct 27 12:12:29 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER62BE.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER62ED.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\jwDqhXNxeUGDiYzIXhpX.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 57
ASCII text, with very long lines (810)
downloaded
Chrome Cache Entry: 58
ASCII text
downloaded
Chrome Cache Entry: 59
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 60
ASCII text
downloaded
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LkCinYWgNh.exe
"C:\Users\user\Desktop\LkCinYWgNh.exe"
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2512 --field-trial-handle=2412,i,7128520521350205955,4672858383650437130,262144 /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 760

URLs

Name
IP
Malicious
QUERY|rd|AAAA|IN|home.tventji20vs.top
malicious
http://tventji20vs.top/v1/upload.php
147.45.48.137
malicious
tventji20vs.top
malicious
ventji20vs.top
malicious
QUERY|rd|A|IN|home.tventji20vs.top
malicious
.1.1home.tventji20vs.top
malicious
analforeverlovyu.top
malicious
http://home.tventji20vs.top/NWYJPzCYEvZpxoyKvBIK1729953292
147.45.48.137
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/Char9e3
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
http://anglebug.com/4324%
unknown
http://anglebug.com/7724B
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://anglebug.com/6439il
unknown
https://crbug.com/368855.)
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
https://anglebug.com/4966n
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
HTTP://tventji20vs.top/v1/upload.php
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://issuetracker.google.com/161903006
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://chrome.google.com/webstore?hl=en%
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.tventji20vs.top
147.45.48.137
malicious
tventji20vs.top
147.45.48.137
malicious
www.google.com
172.217.16.196

IPs

IP
Domain
Country
Malicious
147.45.48.137
home.tventji20vs.top
Russian Federation
malicious
239.255.255.250
unknown
Reserved
172.217.16.196
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
ProgramId
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
FileId
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
LowerCaseLongPath
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
LongPathHash
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
Name
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
OriginalFileName
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
Publisher
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
Version
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
BinFileVersion
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
BinaryType
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
ProductName
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
ProductVersion
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
LinkDate
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
BinProductVersion
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
AppxPackageFullName
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
AppxPackageRelativeId
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
Size
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
Language
\REGISTRY\A\{6c16a822-f6f6-e940-3241-b2e4703c0624}\Root\InventoryApplicationFile\lkcinywgnh.exe|fe78ae020f73120a
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3E73000
heap
page read and write
malicious
4F0000760000
trusted library allocation
page read and write
275DFFE0000
trusted library section
page read and write
3BB002710000
trusted library allocation
page read and write
3BB003034000
trusted library allocation
page read and write
3BB002854000
trusted library allocation
page read and write
38DE000
stack
page read and write
19FC000
heap
page read and write
D3AC7FE000
unkown
page readonly
3BB0034AC000
trusted library allocation
page read and write
4F0000614000
trusted library allocation
page read and write
BDC000
unkown
page write copy
3BB000001000
trusted library allocation
page read and write
1558000
heap
page read and write
3BB00253C000
trusted library allocation
page read and write
3BB00253C000
trusted library allocation
page read and write
275D5A60000
heap
page read and write
1981000
heap
page read and write
14FF000
heap
page read and write
1DBC00278000
trusted library allocation
page read and write
3BB002F94000
trusted library allocation
page read and write
4F0000390000
trusted library allocation
page read and write
4F0000330000
trusted library allocation
page read and write
69CC1000
direct allocation
page execute read
3BB00042E000
trusted library allocation
page read and write
D398FFC000
stack
page read and write
3BB0028EC000
trusted library allocation
page read and write
1AC1000
heap
page read and write
1555000
heap
page read and write
4F00002F4000
trusted library allocation
page read and write
1576000
heap
page read and write
3CFC000
heap
page read and write
D38B7FE000
unkown
page readonly
3AE6000
heap
page read and write
275D94F0000
trusted library section
page read and write
D3957FE000
unkown
page readonly
3AE5000
heap
page read and write
275DFB90000
trusted library section
page read and write
275D5AE5000
heap
page read and write
3BC3000
heap
page read and write
1A14000
heap
page read and write
6A2BE000
direct allocation
page read and write
3BB0029AC000
trusted library allocation
page read and write
6C741000
unkown
page execute read
3BB003120000
trusted library allocation
page read and write
4F0000418000
trusted library allocation
page read and write
D389FFB000
stack
page read and write
D3847FE000
unkown
page readonly
3B83000
heap
page read and write
3BBF000
heap
page read and write
4F000080C000
trusted library allocation
page read and write
4F000035C000
trusted library allocation
page read and write
3BB003058000
trusted library allocation
page read and write
3BB00253C000
trusted library allocation
page read and write
4F000033C000
trusted library allocation
page read and write
3AE2000
heap
page read and write
3AE1000
heap
page read and write
FC0000
heap
page read and write
117800250000
direct allocation
page read and write
275D80A0000
unkown
page read and write
D39CFFC000
stack
page read and write
D3A17FE000
unkown
page readonly
D39AFFB000
stack
page read and write
1557000
heap
page read and write
D380FFD000
unkown
page read and write
3BB0031B4000
trusted library allocation
page read and write
3BB003158000
trusted library allocation
page read and write
1DBC00288000
trusted library allocation
page read and write
1DBC002BC000
trusted library allocation
page read and write
155A000
heap
page read and write
3BB003314000
trusted library allocation
page read and write
3BB003258000
trusted library allocation
page read and write
3AED000
heap
page read and write
275D588C000
heap
page read and write
1DBC0020C000
trusted library allocation
page read and write
3BB000A01000
trusted library allocation
page read and write
4F0000640000
trusted library allocation
page read and write
1A22000
heap
page read and write
6A6F8000
direct allocation
page read and write
9A1000
unkown
page execute read
3BB002EF4000
trusted library allocation
page read and write
3BB0024A4000
trusted library allocation
page read and write
3BB000166000
trusted library allocation
page read and write
3BB002BB0000
trusted library allocation
page read and write
3BB0023D8000
trusted library allocation
page read and write
3BB0025CC000
trusted library allocation
page read and write
3BB000801000
trusted library allocation
page read and write
3BB0026D0000
trusted library allocation
page read and write
3BB003104000
trusted library allocation
page read and write
6A0F9000
direct allocation
page read and write
3BB0023F0000
trusted library allocation
page read and write
3BB003120000
trusted library allocation
page read and write
D3A67FE000
unkown
page readonly
275D5903000
heap
page read and write
4F00006EC000
trusted library allocation
page read and write
D38BFFC000
stack
page read and write
275DF43D000
trusted library section
page read and write
3B8F000
heap
page read and write
324B000
heap
page read and write
4F00006D0000
trusted library allocation
page read and write
1DBC002C8000
trusted library allocation
page read and write
3BB002414000
trusted library allocation
page read and write
3BB0026A4000
trusted library allocation
page read and write
3BDE000
heap
page read and write
E53000
unkown
page write copy
3BB002504000
trusted library allocation
page read and write
19FB000
heap
page read and write
3BA6000
heap
page read and write
3BB0024A4000
trusted library allocation
page read and write
3AED000
heap
page read and write
1981000
heap
page read and write
6C869000
unkown
page read and write
4F00006D4000
trusted library allocation
page read and write
19EB000
heap
page read and write
117800303000
direct allocation
page read and write
3AE0000
heap
page read and write
3BB0024A4000
trusted library allocation
page read and write
E52000
unkown
page write copy
4F0000230000
trusted library allocation
page read and write
3BB00221C000
trusted library allocation
page read and write
3BB0026A4000
trusted library allocation
page read and write
4F0000404000
trusted library allocation
page read and write
3BB002B6F000
trusted library allocation
page read and write
117800234000
direct allocation
page read and write
275D8EA9000
heap
page read and write
1543000
heap
page read and write
4F0000730000
trusted library allocation
page read and write
3BB00292D000
trusted library allocation
page read and write
3D2F000
heap
page read and write
275DF8D0000
trusted library section
page read and write
D3927FE000
unkown
page readonly
3AEB000
heap
page read and write
3BB0023EC000
trusted library allocation
page read and write
EAE000
stack
page read and write
153D000
heap
page read and write
275D587B000
heap
page read and write
D394FFE000
stack
page read and write
3BB002E8C000
trusted library allocation
page read and write
3BB000A94000
trusted library allocation
page read and write
3B9A000
heap
page read and write
D399FFA000
stack
page read and write
587F000
stack
page read and write
275DCFB0000
trusted library section
page read and write
3BB002994000
trusted library allocation
page read and write
1981000
heap
page read and write
3BB002F30000
trusted library allocation
page read and write
3BB00260C000
trusted library allocation
page read and write
3BB00229C000
trusted library allocation
page read and write
D3A5FFD000
stack
page read and write
1543000
heap
page read and write
3BB0024B8000
trusted library allocation
page read and write
1A0A000
heap
page read and write
4F0000750000
trusted library allocation
page read and write
C3C000
stack
page read and write
3BB002AC0000
trusted library allocation
page read and write
D3A97FE000
stack
page read and write
3BB0026A4000
trusted library allocation
page read and write
13EE000
stack
page read and write
3BB002500000
trusted library allocation
page read and write
4F0000354000
trusted library allocation
page read and write
1576000
heap
page read and write
275DDE43000
heap
page read and write
275DD1D2000
trusted library allocation
page read and write
4F0000658000
trusted library allocation
page read and write
D3A6FFE000
stack
page read and write
1490000
heap
page read and write
275DDE40000
heap
page read and write
3BB0022DC000
trusted library allocation
page read and write
275D5870000
heap
page read and write
4F0000248000
trusted library allocation
page read and write
3BB003220000
trusted library allocation
page read and write
3C1F000
heap
page read and write
1B8E000
heap
page read and write
3BB002A9C000
trusted library allocation
page read and write
3BB00235C000
trusted library allocation
page read and write
3BB003320000
trusted library allocation
page read and write
3BB003314000
trusted library allocation
page read and write
3BB0023F4000
trusted library allocation
page read and write
3BB0029F0000
trusted library allocation
page read and write
6C81F000
unkown
page readonly
1576000
heap
page read and write
3BB003120000
trusted library allocation
page read and write
275D7650000
heap
page read and write
3BB0026A4000
trusted library allocation
page read and write
3BB002580000
trusted library allocation
page read and write
11780025C000
direct allocation
page read and write
D3817FE000
unkown
page readonly
3BB002B38000
trusted library allocation
page read and write
3BB003390000
trusted library allocation
page read and write
275D93A0000
heap
page read and write
4F0000330000
trusted library allocation
page read and write
4280000
heap
page read and write
3AE1000
heap
page read and write
9AE000
unkown
page read and write
D3A57FE000
unkown
page readonly
E3D000
unkown
page readonly
4F0000704000
trusted library allocation
page read and write
1981000
heap
page read and write
4F00006CC000
trusted library allocation
page read and write
1BF0000
heap
page read and write
1BFA000
heap
page read and write
275DFBF0000
trusted library section
page read and write
117800284000
direct allocation
page read and write
19FA000
heap
page read and write
ED0000
heap
page read and write
3BB002530000
trusted library allocation
page read and write
3BB002E84000
trusted library allocation
page read and write
3AEC000
heap
page read and write
9FC000
stack
page read and write
D3887FE000
unkown
page readonly
3BB0028F0000
trusted library allocation
page read and write
3BB002D3C000
trusted library allocation
page read and write
3BB002B1C000
trusted library allocation
page read and write
D3947FE000
unkown
page readonly
3BB002E68000
trusted library allocation
page read and write
3BB0028A4000
trusted library allocation
page read and write
3BB002905000
trusted library allocation
page read and write
1546000
heap
page read and write
F80000
heap
page read and write
780000
unkown
page readonly
11780024C000
direct allocation
page read and write
6A629000
direct allocation
page readonly
1545000
heap
page read and write
275D8EB2000
heap
page read and write
3BB003164000
trusted library allocation
page read and write
3BB0023E0000
trusted library allocation
page read and write
D39EFFB000
stack
page read and write
3BB0026A4000
trusted library allocation
page read and write
3BB002430000
trusted library allocation
page read and write
4F0000648000
trusted library allocation
page read and write
3BB0028F0000
trusted library allocation
page read and write
3BB002EFC000
trusted library allocation
page read and write
3B72000
heap
page read and write
3BB002CE0000
trusted library allocation
page read and write
58BB000
stack
page read and write
275D9470000
heap
page read and write
3BB003288000
trusted library allocation
page read and write
1569000
heap
page read and write
3BB002F60000
trusted library allocation
page read and write
154A000
heap
page read and write
154A000
heap
page read and write
154C000
heap
page read and write
3BB0024A4000
trusted library allocation
page read and write
1DBC002B0000
trusted library allocation
page read and write
4F00007B4000
trusted library allocation
page read and write
EDA000
heap
page read and write
4F0000348000
trusted library allocation
page read and write
3BDD000
heap
page read and write
3E5E000
stack
page read and write
4F0000788000
trusted library allocation
page read and write
1178002DC000
direct allocation
page read and write
1178002D0000
direct allocation
page read and write
D3977FE000
unkown
page readonly
1DBC002A0000
trusted library allocation
page read and write
3BB002550000
trusted library allocation
page read and write
3BB0028FC000
trusted library allocation
page read and write
1DBC00250000
trusted library allocation
page read and write
D390FFA000
stack
page read and write
3BB002580000
trusted library allocation
page read and write
3BB0030FC000
trusted library allocation
page read and write
3BB002924000
trusted library allocation
page read and write
4F0000310000
trusted library allocation
page read and write
4F0000210000
trusted library allocation
page read and write
3BB00240C000
trusted library allocation
page read and write
3BB002FD4000
trusted library allocation
page read and write
1558000
heap
page read and write
3BB002F0C000
trusted library allocation
page read and write
3BB0032F0000
trusted library allocation
page read and write
3BB002434000
trusted library allocation
page read and write
D38DFFE000
stack
page read and write
D39F7FE000
unkown
page readonly
275E01E0000
trusted library section
page read and write
3BB0027B8000
trusted library allocation
page read and write
275D9415000
heap
page read and write
275DFFEE000
trusted library section
page read and write
4F0000734000
trusted library allocation
page read and write
14FD000
heap
page read and write
3BB0026A4000
trusted library allocation
page read and write
19F6000
heap
page read and write
6A0BA000
direct allocation
page read and write
4F0000374000
trusted library allocation
page read and write
3BB002E64000
trusted library allocation
page read and write
D38E7FE000
unkown
page readonly
275D7653000
heap
page read and write
3BB00318C000
trusted library allocation
page read and write
275D9470000
heap
page read and write
D38FFFD000
stack
page read and write
3BB002FE0000
trusted library allocation
page read and write
D38EFFE000
stack
page read and write
4F00006E4000
trusted library allocation
page read and write
D3A3FFD000
stack
page read and write
D3AEFFD000
stack
page read and write
ED7000
heap
page read and write
D387FFC000
stack
page read and write
9AA000
unkown
page readonly
3BE6000
heap
page read and write
3BB0031DC000
trusted library allocation
page read and write
4F0000610000
trusted library allocation
page read and write
D3917FE000
unkown
page readonly
3BB0024A8000
trusted library allocation
page read and write
275D5A40000
heap
page read and write
3BB002564000
trusted library allocation
page read and write
19F6000
heap
page read and write
D38D7FE000
unkown
page readonly
4F0000401000
trusted library allocation
page read and write
3BB002CCC000
trusted library allocation
page read and write
3AED000
heap
page read and write
38E1000
heap
page read and write
1DBC002BC000
trusted library allocation
page read and write
18BE000
stack
page read and write
3BB0024B4000
trusted library allocation
page read and write
1541000
heap
page read and write
D382FFE000
stack
page read and write
3BB0027E0000
trusted library allocation
page read and write
275D5925000
heap
page read and write
D38C7FE000
unkown
page readonly
4F0000724000
trusted library allocation
page read and write
472B000
heap
page read and write
3BB002D1C000
trusted library allocation
page read and write
3BB0025D1000
trusted library allocation
page read and write
1576000
heap
page read and write
3BB0028F0000
trusted library allocation
page read and write
3BB002D58000
trusted library allocation
page read and write
1A1D000
heap
page read and write
275D9460000
heap
page read and write
3BB002980000
trusted library allocation
page read and write
4F0000684000
trusted library allocation
page read and write
275D9451000
heap
page read and write
275D9424000
heap
page read and write
3BB002E01000
trusted library allocation
page read and write
3BB0023A0000
trusted library allocation
page read and write
3BB002BF4000
trusted library allocation
page read and write
275D9405000
heap
page read and write
275DFCDD000
trusted library section
page read and write
3BB002C30000
trusted library allocation
page read and write
275D5907000
heap
page read and write
3BB0030D0000
trusted library allocation
page read and write
D3A07FE000
unkown
page readonly
1A11000
heap
page read and write
3E70000
heap
page read and write
3BB002D98000
trusted library allocation
page read and write
275D5920000
heap
page read and write
3BB0003AA000
trusted library allocation
page read and write
D3A0FFE000
stack
page read and write
3AE5000
heap
page read and write
3BB003110000
trusted library allocation
page read and write
3BB002510000
trusted library allocation
page read and write
EB16000
heap
page read and write
4F0000330000
trusted library allocation
page read and write
3BB0028F0000
trusted library allocation
page read and write
D3A4FFE000
stack
page read and write
1576000
heap
page read and write
1568000
heap
page read and write
1540000
heap
page read and write
3BB002401000
trusted library allocation
page read and write
1A08000
heap
page read and write
3BB002884000
trusted library allocation
page read and write
159C000
heap
page read and write
4F0000601000
trusted library allocation
page read and write
D3A9FFE000
unkown
page readonly
3BB00349C000
trusted library allocation
page read and write
3BB002420000
trusted library allocation
page read and write
475E000
stack
page read and write
1A1A000
heap
page read and write
3BB0024A4000
trusted library allocation
page read and write
3AE3000
heap
page read and write
3BB000401000
trusted library allocation
page read and write
EDE000
heap
page read and write
3BB0030D8000
trusted library allocation
page read and write
D3A77FE000
unkown
page readonly
4F0000758000
trusted library allocation
page read and write
19EC000
heap
page read and write
275D945F000
heap
page read and write
3BB9000
heap
page read and write
3BB002F94000
trusted library allocation
page read and write
3BB002B5C000
trusted library allocation
page read and write
1BF4000
heap
page read and write
153E000
heap
page read and write
3AED000
heap
page read and write
3BB002F40000
trusted library allocation
page read and write
9AA000
unkown
page readonly
3BB00255C000
trusted library allocation
page read and write
3BB002324000
trusted library allocation
page read and write
1DBC002BC000
trusted library allocation
page read and write
275DF393000
trusted library section
page read and write
3BAE000
heap
page read and write
4F0000744000
trusted library allocation
page read and write
3BB0024A8000
trusted library allocation
page read and write
3BB002A0C000
trusted library allocation
page read and write
D39A7FE000
unkown
page readonly
3BB002F23000
trusted library allocation
page read and write
3BB002E8C000
trusted library allocation
page read and write
4F00002ED000
trusted library allocation
page read and write
4F00006B8000
trusted library allocation
page read and write
275D9455000
heap
page read and write
3BB002418000
trusted library allocation
page read and write
19AB000
heap
page read and write
1A1F000
heap
page read and write
4F0000354000
trusted library allocation
page read and write
1AC1000
heap
page read and write
3AE0000
heap
page read and write
3BB003378000
trusted library allocation
page read and write
6A6EE000
direct allocation
page read and write
1178002A8000
direct allocation
page read and write
3BB0023B4000
trusted library allocation
page read and write
D3AB7FE000
unkown
page readonly
1BA7000
heap
page read and write
3BB0023D4000
trusted library allocation
page read and write
3BB002F20000
trusted library allocation
page read and write
1DBC002BD000
trusted library allocation
page read and write
3BB003138000
trusted library allocation
page read and write
275D8EB3000
heap
page read and write
3BB003048000
trusted library allocation
page read and write
E57000
unkown
page readonly
3BB0029A0000
trusted library allocation
page read and write
3BB002F0C000
trusted library allocation
page read and write
1574000
heap
page read and write
3080000
heap
page read and write
781000
unkown
page execute read
3BB000F7C000
trusted library allocation
page read and write
3BB0032B4000
trusted library allocation
page read and write
4F00002FC000
trusted library allocation
page read and write
3BB0033C0000
trusted library allocation
page read and write
275DF320000
trusted library section
page read and write
D38AFFB000
stack
page read and write
3AE4000
heap
page read and write
275DFC13000
trusted library section
page read and write
3BB002428000
trusted library allocation
page read and write
6A321000
direct allocation
page read and write
780000
unkown
page readonly
3BB1000
heap
page read and write
D02000
unkown
page write copy
3BB0024A4000
trusted library allocation
page read and write
3BB002410000
trusted library allocation
page read and write
D39DFFD000
stack
page read and write
4F000075C000
trusted library allocation
page read and write
1178002E4000
direct allocation
page read and write
D3A87FD000
stack
page read and write
3BB0024AA000
trusted library allocation
page read and write
3BB0025DC000
trusted library allocation
page read and write
3B9C000
heap
page read and write
4F00006E0000
trusted library allocation
page read and write
CFC000
unkown
page write copy
4F000033C000
trusted library allocation
page read and write
1DBC00294000
trusted library allocation
page read and write
3AE1000
heap
page read and write
9A0000
unkown
page readonly
11780020C000
direct allocation
page read and write
9A0000
unkown
page readonly
1DBC002A0000
trusted library allocation
page read and write
117800280000
direct allocation
page read and write
3BB0025A4000
trusted library allocation
page read and write
4F0000770000
trusted library allocation
page read and write
6A326000
direct allocation
page read and write
3BB002801000
trusted library allocation
page read and write
3BB002530000
trusted library allocation
page read and write
1DBC00220000
trusted library allocation
page read and write
1579000
heap
page read and write
1AC1000
heap
page read and write
3E60000
heap
page read and write
4F00007CC000
trusted library allocation
page read and write
275DF432000
trusted library section
page read and write
14ED000
heap
page read and write
1558000
heap
page read and write
3BB003104000
trusted library allocation
page read and write
3BB0024B8000
trusted library allocation
page read and write
3BB003148000
trusted library allocation
page read and write
D386FFB000
stack
page read and write
4F0000320000
trusted library allocation
page read and write
3BB0022EC000
trusted library allocation
page read and write
4F0000368000
trusted library allocation
page read and write
3BB0024F3000
trusted library allocation
page read and write
1DBC002C0000
trusted library allocation
page read and write
4F0000664000
trusted library allocation
page read and write
1BA1000
heap
page read and write
1980000
heap
page read and write
3BB9000
heap
page read and write
3AEE000
heap
page read and write
3BB002F6C000
trusted library allocation
page read and write
4F000069C000
trusted library allocation
page read and write
4F00002E4000
trusted library allocation
page read and write
3BB0025D7000
trusted library allocation
page read and write
3C04000
heap
page read and write
D3A47FE000
unkown
page readonly
6A309000
direct allocation
page read and write
D3AF7FE000
unkown
page readonly
3BB0023F4000
trusted library allocation
page read and write
3BB0026EC000
trusted library allocation
page read and write
D3AAFFE000
unkown
page readonly
14BE000
heap
page read and write
1558000
heap
page read and write
19F7000
heap
page read and write
3BB002E0C000
trusted library allocation
page read and write
3BB00340C000
trusted library allocation
page read and write
D3897FE000
unkown
page readonly
4F0000380000
trusted library allocation
page read and write
38E0000
heap
page read and write
117800290000
direct allocation
page read and write
1576000
heap
page read and write
3BB002EF4000
trusted library allocation
page read and write
3BB002544000
trusted library allocation
page read and write
D3ABFFB000
stack
page read and write
14DF000
stack
page read and write
D3937FE000
unkown
page readonly
3BE7000
heap
page read and write
275DFB70000
trusted library section
page read and write
3BB002EC8000
trusted library allocation
page read and write
F1B000
stack
page read and write
3BB000201000
trusted library allocation
page read and write
154C000
heap
page read and write
1178002EC000
direct allocation
page read and write
3AE5000
heap
page read and write
4F00007C8000
trusted library allocation
page read and write
3AE4000
heap
page read and write
3BB0024A4000
trusted library allocation
page read and write
3AE6000
heap
page read and write
4781000
heap
page read and write
3BB002934000
trusted library allocation
page read and write
3BB00305C000
trusted library allocation
page read and write
275DD6E0000
heap
page read and write
3AEF000
heap
page read and write
E60000
heap
page read and write
3BB002894000
trusted library allocation
page read and write
3BB002929000
trusted library allocation
page read and write
1576000
heap
page read and write
275D947F000
heap
page read and write
2E9A000
stack
page read and write
D04000
unkown
page readonly
1A3C000
heap
page read and write
3BB002BE8000
trusted library allocation
page read and write
3B9B000
heap
page read and write
3BB003024000
trusted library allocation
page read and write
1DBC00264000
trusted library allocation
page read and write
275DF2F0000
trusted library section
page read and write
3BB002B78000
trusted library allocation
page read and write
DFC000
stack
page read and write
117800217000
direct allocation
page read and write
1568000
heap
page read and write
154A000
heap
page read and write
3D2B000
heap
page read and write
117800294000
direct allocation
page read and write
3BB0023E4000
trusted library allocation
page read and write
3BA8000
heap
page read and write
D3AD7FE000
unkown
page readonly
275D8EB6000
heap
page read and write
275D5A80000
trusted library allocation
page read and write
275D9483000
heap
page read and write
3BB003278000
trusted library allocation
page read and write
3BB000601000
trusted library allocation
page read and write
275DFBA2000
trusted library section
page read and write
154A000
heap
page read and write
4F0000688000
trusted library allocation
page read and write
3BB0023C4000
trusted library allocation
page read and write
1543000
heap
page read and write
4F000078C000
trusted library allocation
page read and write
3BB002658000
trusted library allocation
page read and write
69CC0000
direct allocation
page read and write
3AE7000
heap
page read and write
4F00006C8000
trusted library allocation
page read and write
3CD9000
heap
page read and write
3BB00247C000
trusted library allocation
page read and write
4F0000310000
trusted library allocation
page read and write
1AC1000
heap
page read and write
304F000
unkown
page read and write
3BB0026A4000
trusted library allocation
page read and write
3AEE000
heap
page read and write
4F000020C000
trusted library allocation
page read and write
14EC000
heap
page read and write
4F00006E8000
trusted library allocation
page read and write
3BB002918000
trusted library allocation
page read and write
1DBC002C0000
trusted library allocation
page read and write
3BB002814000
trusted library allocation
page read and write
3BB002E48000
trusted library allocation
page read and write
3BB0023DC000
trusted library allocation
page read and write
3BB002504000
trusted library allocation
page read and write
6C740000
unkown
page readonly
3AE5000
heap
page read and write
275DFB67000
unclassified section
page read and write
9A0000
unkown
page readonly
154A000
heap
page read and write
4F0000320000
trusted library allocation
page read and write
3BB002AF0000
trusted library allocation
page read and write
3BB002EB0000
trusted library allocation
page read and write
3BB002490000
trusted library allocation
page read and write
3BB003104000
trusted library allocation
page read and write
3BB0027CC000
trusted library allocation
page read and write
D396FFC000
stack
page read and write
3BB003138000
trusted library allocation
page read and write
1576000
heap
page read and write
9AE000
unkown
page write copy
19FB000
heap
page read and write
D04000
unkown
page readonly
3BB002F14000
trusted library allocation
page read and write
4F0000250000
trusted library allocation
page read and write
275D592A000
heap
page read and write
3BB00304C000
trusted library allocation
page read and write
6C86C000
unkown
page readonly
19F7000
heap
page read and write
3BB002C64000
trusted library allocation
page read and write
3BB002E30000
trusted library allocation
page read and write
1576000
heap
page read and write
3BB0031B4000
trusted library allocation
page read and write
275D941B000
heap
page read and write
1576000
heap
page read and write
E50000
heap
page read and write
3BB00265C000
trusted library allocation
page read and write
D3A37FE000
unkown
page readonly
3AE4000
heap
page read and write
EA0000
heap
page read and write
3AE7000
heap
page read and write
3210000
heap
page read and write
3BB0028F0000
trusted library allocation
page read and write
3BB002B73000
trusted library allocation
page read and write
3BB002A2C000
trusted library allocation
page read and write
1DBC00270000
trusted library allocation
page read and write
3BB002D98000
trusted library allocation
page read and write
3CDF000
unkown
page read and write
14F5000
heap
page read and write
3BB00280C000
trusted library allocation
page read and write
3BB002D04000
trusted library allocation
page read and write
3BB00237C000
trusted library allocation
page read and write
3AE1000
heap
page read and write
4F0000288000
trusted library allocation
page read and write
ED0000
heap
page read and write
3AED000
heap
page read and write
3BB002601000
trusted library allocation
page read and write
2EF0000
heap
page read and write
3240000
heap
page read and write
3BB002550000
trusted library allocation
page read and write
4F00007E0000
trusted library allocation
page read and write
275D9468000
heap
page read and write
3AE7000
heap
page read and write
3BB002CCC000
trusted library allocation
page read and write
6A31B000
direct allocation
page read and write
275DF33E000
trusted library section
page read and write
3BB002A54000
trusted library allocation
page read and write
275DF4F7000
unclassified section
page read and write
3BDB000
heap
page read and write
3BB002EE4000
trusted library allocation
page read and write
3BB000C01000
trusted library allocation
page read and write
3BB0026D0000
trusted library allocation
page read and write
4F0000320000
trusted library allocation
page read and write
3AEB000
heap
page read and write
FA0000
heap
page read and write
3BB002504000
trusted library allocation
page read and write
E30000
heap
page read and write
3BB0023F8000
trusted library allocation
page read and write
3BB0033D4000
trusted library allocation
page read and write
E3D000
unkown
page readonly
1DBC00274000
trusted library allocation
page read and write
117800201000
direct allocation
page read and write
4F0000700000
trusted library allocation
page read and write
3BDB000
heap
page read and write
4F0000694000
trusted library allocation
page read and write
14DF000
heap
page read and write
1568000
heap
page read and write
3BB003148000
trusted library allocation
page read and write
3BB0022FC000
trusted library allocation
page read and write
199A000
heap
page read and write
3BB003401000
trusted library allocation
page read and write
D384FFE000
stack
page read and write
9AE000
unkown
page read and write
3BB0033A0000
trusted library allocation
page read and write
3BB002550000
trusted library allocation
page read and write
3BB0029D0000
trusted library allocation
page read and write
3BB0024A8000
trusted library allocation
page read and write
3BB002C01000
trusted library allocation
page read and write
D3B07FE000
unkown
page readonly
3BB002DA4000
trusted library allocation
page read and write
19EB000
heap
page read and write
3BB002E64000
trusted library allocation
page read and write
3BB0024D0000
trusted library allocation
page read and write
3B74000
heap
page read and write
14E3000
heap
page read and write
D3AE7FE000
unkown
page readonly
D3837FE000
unkown
page readonly
19F6000
heap
page read and write
3BB00238C000
trusted library allocation
page read and write
275DB660000
trusted library allocation
page read and write
4F00002B8000
trusted library allocation
page read and write
3BB0030C8000
trusted library allocation
page read and write
275D9417000
heap
page read and write
4F0000248000
trusted library allocation
page read and write
3BB002CF0000
trusted library allocation
page read and write
3BE7000
heap
page read and write
3BB002398000
trusted library allocation
page read and write
9B1000
unkown
page readonly
4F00002B0000
trusted library allocation
page read and write
3BB002B28000
trusted library allocation
page read and write
3CED000
heap
page read and write
117800230000
direct allocation
page read and write
3BB0030A8000
trusted library allocation
page read and write
D3997FE000
unkown
page readonly
3BB002FEC000
trusted library allocation
page read and write
D38CFFE000
stack
page read and write
3BB00307C000
trusted library allocation
page read and write
D3A27FE000
unkown
page readonly
147E000
stack
page read and write
3BB00242C000
trusted library allocation
page read and write
19F1000
heap
page read and write
275D8E90000
heap
page read and write
D391FFE000
stack
page read and write
1543000
heap
page read and write
1BFA000
heap
page read and write
3BB00225B000
trusted library allocation
page read and write
3BB003048000
trusted library allocation
page read and write
55DF000
stack
page read and write
156D000
heap
page read and write
3BB002CCC000
trusted library allocation
page read and write
3BB002201000
trusted library allocation
page read and write
3BB002570000
trusted library allocation
page read and write
4F0000678000
trusted library allocation
page read and write
117800210000
direct allocation
page read and write
D3ACFFC000
stack
page read and write
3BB002E68000
trusted library allocation
page read and write
4F0000620000
trusted library allocation
page read and write
3BB0034BC000
trusted library allocation
page read and write
3BB002F7C000
trusted library allocation
page read and write
4F00006FC000
trusted library allocation
page read and write
275D93D5000
heap
page read and write
3BB003250000
trusted library allocation
page read and write
3BB002860000
trusted library allocation
page read and write
3BB002580000
trusted library allocation
page read and write
3BB00253C000
trusted library allocation
page read and write
3BB0034C0000
trusted library allocation
page read and write
3AE3000
heap
page read and write
D39B7FE000
unkown
page readonly
D397FFC000
stack
page read and write
275D8EAE000
heap
page read and write
3BB0023AC000
trusted library allocation
page read and write
D3907FE000
unkown
page readonly
3BB0026A4000
trusted library allocation
page read and write
3BB003190000
trusted library allocation
page read and write
1DBC002F4000
trusted library allocation
page read and write
3C97000
heap
page read and write
275DFC01000
trusted library section
page read and write
19EB000
heap
page read and write
D39C7FE000
unkown
page readonly
D38A7FE000
unkown
page readonly
3BB002278000
trusted library allocation
page read and write
3C3F000
heap
page read and write
EC0000
heap
page read and write
D39E7FE000
unkown
page readonly
1AFA000
heap
page read and write
3AEB000
heap
page read and write
1558000
heap
page read and write
6A5BE000
direct allocation
page read and write
D38F7FE000
unkown
page readonly
3BB002DE8000
trusted library allocation
page read and write
CFB000
unkown
page read and write
275DDE57000
unclassified section
page read and write
300E000
unkown
page read and write
3C5B000
heap
page read and write
D39BFFD000
stack
page read and write
4F0000220000
trusted library allocation
page read and write
3BB00226B000
trusted library allocation
page read and write
1576000
heap
page read and write
19FC000
heap
page read and write
3BB0030B4000
trusted library allocation
page read and write
1A04000
heap
page read and write
3BB00253C000
trusted library allocation
page read and write
275D942F000
heap
page read and write
275DFB81000
trusted library section
page read and write
3BB0028C8000
trusted library allocation
page read and write
4F0000424000
trusted library allocation
page read and write
310F000
stack
page read and write
3B90000
heap
page read and write
4F000060C000
trusted library allocation
page read and write
3BB00284A000
trusted library allocation
page read and write
3B7F000
heap
page read and write
3BB00318C000
trusted library allocation
page read and write
19F6000
heap
page read and write
159C000
heap
page read and write
9B1000
unkown
page readonly
275DF332000
trusted library section
page read and write
19FD000
heap
page read and write
275D94A0000
trusted library section
page read and write
D381FFE000
stack
page read and write
3AE0000
heap
page read and write
3BB002824000
trusted library allocation
page read and write
3BB003264000
trusted library allocation
page read and write
9B1000
unkown
page readonly
1DBC002C0000
trusted library allocation
page read and write
3BB0030F0000
trusted library allocation
page read and write
153D000
heap
page read and write
275DF470000
trusted library section
page read and write
D39FFFA000
stack
page read and write
11780023C000
direct allocation
page read and write
3BB00320C000
trusted library allocation
page read and write
3BBE000
heap
page read and write
3BB003378000
trusted library allocation
page read and write
1DBC00238000
trusted library allocation
page read and write
154A000
heap
page read and write
3C6A000
heap
page read and write
275D9419000
heap
page read and write
3AEA000
heap
page read and write
3BB003098000
trusted library allocation
page read and write
3BB0025B0000
trusted library allocation
page read and write
3BB002ADC000
trusted library allocation
page read and write
3BB002DD0000
trusted library allocation
page read and write
D393FFE000
stack
page read and write
153B000
heap
page read and write
3BB9000
heap
page read and write
275D8EB2000
heap
page read and write
3BB002544000
trusted library allocation
page read and write
3BCA000
heap
page read and write
4F000039C000
trusted library allocation
page read and write
1BFA000
heap
page read and write
4F0000720000
trusted library allocation
page read and write
4F0000754000
trusted library allocation
page read and write
1178002AC000
direct allocation
page read and write
1555000
heap
page read and write
3BB003238000
trusted library allocation
page read and write
1558000
heap
page read and write
3BB002D2C000
trusted library allocation
page read and write
3BB0028F0000
trusted library allocation
page read and write
117800215000
direct allocation
page read and write
3BB002E98000
trusted library allocation
page read and write
4F0000364000
trusted library allocation
page read and write
1A15000
heap
page read and write
3F49000
heap
page read and write
3BB002AAC000
trusted library allocation
page read and write
275D5A90000
trusted library allocation
page read and write
1A03000
heap
page read and write
3BB002CB8000
trusted library allocation
page read and write
4F0000430000
trusted library allocation
page read and write
1DBC002BC000
trusted library allocation
page read and write
1545000
heap
page read and write
3D21000
heap
page read and write
507E000
heap
page read and write
1543000
heap
page read and write
3BB002954000
trusted library allocation
page read and write
275D8EBB000
heap
page read and write
3BB002504000
trusted library allocation
page read and write
4F00006AC000
trusted library allocation
page read and write
1568000
heap
page read and write
19FD000
heap
page read and write
6C868000
unkown
page readonly
4F00007D0000
trusted library allocation
page read and write
3BD8000
heap
page read and write
3BB00271C000
trusted library allocation
page read and write
18FE000
stack
page read and write
4F0000368000
trusted library allocation
page read and write
4360000
heap
page read and write
1546000
heap
page read and write
FC5000
heap
page read and write
1DBC002BC000
trusted library allocation
page read and write
3BB002907000
trusted library allocation
page read and write
D392FFE000
stack
page read and write
4F00006F0000
trusted library allocation
page read and write
3BB002504000
trusted library allocation
page read and write
1B8F000
heap
page read and write
3BB003138000
trusted library allocation
page read and write
3BD9000
heap
page read and write
1DBC002B0000
trusted library allocation
page read and write
3BB00300C000
trusted library allocation
page read and write
3BB0024A4000
trusted library allocation
page read and write
12DE000
stack
page read and write
3BB0026A4000
trusted library allocation
page read and write
3BB002264000
trusted library allocation
page read and write
3BB0023E8000
trusted library allocation
page read and write
3BB003040000
trusted library allocation
page read and write
D3FF9EF000
stack
page read and write
3BB00312C000
trusted library allocation
page read and write
153B000
heap
page read and write
3BB003120000
trusted library allocation
page read and write
BDE000
unkown
page read and write
3BB002504000
trusted library allocation
page read and write
14F9000
heap
page read and write
3BB00290C000
trusted library allocation
page read and write
3B7C000
heap
page read and write
4F0000320000
trusted library allocation
page read and write
275D5840000
heap
page read and write
D3867FE000
unkown
page readonly
1DBC002BC000
trusted library allocation
page read and write
129F000
stack
page read and write
1576000
heap
page read and write
4F000040C000
trusted library allocation
page read and write
D388FFE000
stack
page read and write
154A000
heap
page read and write
3BB003001000
trusted library allocation
page read and write
BDC000
unkown
page read and write
275D5AE0000
heap
page read and write
3BB00322C000
trusted library allocation
page read and write
1DBC002BC000
trusted library allocation
page read and write
3EDA000
heap
page read and write
3BB002594000
trusted library allocation
page read and write
3BC3000
heap
page read and write
1550000
heap
page read and write
3BB002EF7000
trusted library allocation
page read and write
3BB0024F7000
trusted library allocation
page read and write
BDD000
unkown
page write copy
3BB002648000
trusted library allocation
page read and write
3BB002784000
trusted library allocation
page read and write
D3A1FFE000
stack
page read and write
3BB002B14000
trusted library allocation
page read and write
14BA000
heap
page read and write
3BBA000
heap
page read and write
3BDF000
heap
page read and write
3BEA000
heap
page read and write
9AA000
unkown
page readonly
3BB2000
heap
page read and write
69FB4000
direct allocation
page read and write
3AEF000
heap
page read and write
3B9A000
heap
page read and write
4F0000408000
trusted library allocation
page read and write
275DF3D6000
trusted library section
page read and write
1DBC002F0000
trusted library allocation
page read and write
275DF6D0000
trusted library section
page read and write
3BB002EFC000
trusted library allocation
page read and write
275D940A000
heap
page read and write
3AE0000
heap
page read and write
3D20000
heap
page read and write
3AE8000
heap
page read and write
3BA9000
heap
page read and write
3BB000E01000
trusted library allocation
page read and write
3BB00307C000
trusted library allocation
page read and write
4F0000644000
trusted library allocation
page read and write
9A1000
unkown
page execute read
3BB002C0C000
trusted library allocation
page read and write
3B92000
heap
page read and write
3BB0031DC000
trusted library allocation
page read and write
4F00006B4000
trusted library allocation
page read and write
3BB001001000
trusted library allocation
page read and write
3BB002C24000
trusted library allocation
page read and write
6C81D000
unkown
page read and write
9B1000
unkown
page readonly
143E000
stack
page read and write
1576000
heap
page read and write
1DBC00230000
trusted library allocation
page read and write
3C1F000
heap
page read and write
F70000
heap
page read and write
1DBC002C0000
trusted library allocation
page read and write
14ED000
heap
page read and write
3BB002638000
trusted library allocation
page read and write
1999000
heap
page read and write
3BB0023C8000
trusted library allocation
page read and write
E50000
heap
page read and write
3BB002EF0000
trusted library allocation
page read and write
1558000
heap
page read and write
275D9402000
heap
page read and write
275DFD90000
trusted library section
page read and write
4F000035C000
trusted library allocation
page read and write
9A1000
unkown
page execute read
3BB002334000
trusted library allocation
page read and write
275D8EBE000
heap
page read and write
4F000027C000
trusted library allocation
page read and write
3BB002DF8000
trusted library allocation
page read and write
275DF187000
unclassified section
page read and write
3CA5000
heap
page read and write
3BB003138000
trusted library allocation
page read and write
3BB002254000
trusted library allocation
page read and write
3BB0023AC000
trusted library allocation
page read and write
D3AFFFE000
stack
page read and write
3BB0024C4000
trusted library allocation
page read and write
6A2FF000
direct allocation
page read and write
1DBC002A0000
trusted library allocation
page read and write
275DFD10000
trusted library section
page read and write
275DFCB6000
trusted library section
page read and write
3BB00234C000
trusted library allocation
page read and write
3BB0023AC000
trusted library allocation
page read and write
3BB00265C000
trusted library allocation
page read and write
3BB002F38000
trusted library allocation
page read and write
19FC000
heap
page read and write
3BB002550000
trusted library allocation
page read and write
3BB002C88000
trusted library allocation
page read and write
275D9479000
heap
page read and write
1A08000
heap
page read and write
1A04000
heap
page read and write
CFB000
unkown
page write copy
3BB0027A4000
trusted library allocation
page read and write
275D90F0000
heap
page read and write
6A6F3000
direct allocation
page read and write
3BB0031DC000
trusted library allocation
page read and write
275DFBE0000
trusted library section
page read and write
E57000
unkown
page readonly
9A1000
unkown
page execute read
1540000
heap
page read and write
117800220000
direct allocation
page read and write
1548000
heap
page read and write
3BB00311C000
trusted library allocation
page read and write
3BB002DC0000
trusted library allocation
page read and write
3BE8000
heap
page read and write
D3967FE000
unkown
page readonly
3BB002B94000
trusted library allocation
page read and write
1545000
heap
page read and write
D3ADFFE000
stack
page read and write
3BB002D48000
trusted library allocation
page read and write
275D8E80000
heap
page read and write
3BB002424000
trusted library allocation
page read and write
275D9412000
heap
page read and write
D3AA7F4000
stack
page read and write
3ED0000
heap
page read and write
275DD127000
unclassified section
page read and write
117800270000
direct allocation
page read and write
3BB003070000
trusted library allocation
page read and write
155E000
heap
page read and write
4F00002D4000
trusted library allocation
page read and write
4F0000698000
trusted library allocation
page read and write
E4E000
unkown
page read and write
275DFD9E000
trusted library section
page read and write
3BB003300000
trusted library allocation
page read and write
19FD000
heap
page read and write
1AC1000
heap
page read and write
3BB0024C4000
trusted library allocation
page read and write
19ED000
heap
page read and write
1DBC00235000
trusted library allocation
page read and write
3BB0023B4000
trusted library allocation
page read and write
D3A7FFD000
stack
page read and write
30CE000
stack
page read and write
275D5AC0000
trusted library section
page readonly
1558000
heap
page read and write
275D93CC000
heap
page read and write
3AE1000
heap
page read and write
3BB0033AC000
trusted library allocation
page read and write
D395FFB000
stack
page read and write
3BB0026B4000
trusted library allocation
page read and write
3BB0024F0000
trusted library allocation
page read and write
3C8C000
heap
page read and write
3BB002FA4000
trusted library allocation
page read and write
3BB002A68000
trusted library allocation
page read and write
1569000
heap
page read and write
427F000
stack
page read and write
1AF9000
heap
page read and write
9A0000
unkown
page readonly
3BB003064000
trusted library allocation
page read and write
1576000
heap
page read and write
3BB002580000
trusted library allocation
page read and write
1BFA000
heap
page read and write
275D9453000
heap
page read and write
3BB00349C000
trusted library allocation
page read and write
D383FFE000
stack
page read and write
1DBC002D8000
trusted library allocation
page read and write
187F000
stack
page read and write
4F0000668000
trusted library allocation
page read and write
53DE000
stack
page read and write
4F00003EC000
trusted library allocation
page read and write
406F000
stack
page read and write
1DBC002A0000
trusted library allocation
page read and write
3BB0032E8000
trusted library allocation
page read and write
3BB002284000
trusted library allocation
page read and write
9AE000
unkown
page write copy
19FD000
heap
page read and write
3AE4000
heap
page read and write
4F00006B0000
trusted library allocation
page read and write
3BB002544000
trusted library allocation
page read and write
D39D7FE000
unkown
page readonly
D03000
unkown
page read and write
3BB002BC0000
trusted library allocation
page read and write
3BB003120000
trusted library allocation
page read and write
3BB002D5C000
trusted library allocation
page read and write
3BB002528000
trusted library allocation
page read and write
158D000
heap
page read and write
781000
unkown
page execute read
4F0000201000
trusted library allocation
page read and write
1DBC00201000
trusted library allocation
page read and write
1A02000
heap
page read and write
19FC000
heap
page read and write
1DBC002F8000
trusted library allocation
page read and write
3BB002EF4000
trusted library allocation
page read and write
4F0000784000
trusted library allocation
page read and write
6A310000
direct allocation
page read and write
3BB002794000
trusted library allocation
page read and write
3BB00251C000
trusted library allocation
page read and write
3BB00241C000
trusted library allocation
page read and write
3BB003201000
trusted library allocation
page read and write
4F0000238000
trusted library allocation
page read and write
4F00006C4000
trusted library allocation
page read and write
3BB002CC8000
trusted library allocation
page read and write
3BB00304C000
trusted library allocation
page read and write
3AE1000
heap
page read and write
154A000
heap
page read and write
3BB002E68000
trusted library allocation
page read and write
D3A8FFE000
unkown
page readonly
3BB002F88000
trusted library allocation
page read and write
3BB002DC8000
trusted library allocation
page read and write
3BB003298000
trusted library allocation
page read and write
1AC1000
heap
page read and write
1DBC00248000
trusted library allocation
page read and write
3BB00240C000
trusted library allocation
page read and write
3BB0024AC000
trusted library allocation
page read and write
1A0F000
heap
page read and write
E90000
heap
page read and write
3BB002DAC000
trusted library allocation
page read and write
275D8EAE000
heap
page read and write
3BB002A01000
trusted library allocation
page read and write
CFD000
unkown
page read and write
3BB00283C000
trusted library allocation
page read and write
4F0000624000
trusted library allocation
page read and write
3BA3000
heap
page read and write
275D5850000
heap
page readonly
3BB0023B4000
trusted library allocation
page read and write
3AEC000
heap
page read and write
3BB002290000
trusted library allocation
page read and write
4BB9000
heap
page read and write
3D1E000
stack
page read and write
3BB002C44000
trusted library allocation
page read and write
13F2000
stack
page read and write
275DFBAE000
trusted library section
page read and write
1543000
heap
page read and write
3BB002A7C000
trusted library allocation
page read and write
3BB0029BC000
trusted library allocation
page read and write
E3C000
stack
page read and write
3BB00236C000
trusted library allocation
page read and write
1ABE000
stack
page read and write
3BB0026D4000
trusted library allocation
page read and write
D3987FE000
unkown
page readonly
D385FFD000
stack
page read and write
275DFCD2000
trusted library section
page read and write
FC7000
heap
page read and write
3BB0026A4000
trusted library allocation
page read and write
4F0000714000
trusted library allocation
page read and write
3BB0022B4000
trusted library allocation
page read and write
3BB002734000
trusted library allocation
page read and write
3BB003088000
trusted library allocation
page read and write
1DBC002E4000
trusted library allocation
page read and write
3BB002550000
trusted library allocation
page read and write
4F00002CC000
trusted library allocation
page read and write
3AEC000
heap
page read and write
3BB003190000
trusted library allocation
page read and write
3AEC000
heap
page read and write
19F6000
heap
page read and write
154E000
heap
page read and write
275D8EBF000
heap
page read and write
19FB000
heap
page read and write
D3857FE000
unkown
page readonly
275D941D000
heap
page read and write
D3877FE000
unkown
page readonly
3050000
heap
page read and write
2E5D000
stack
page read and write
E52000
unkown
page read and write
3BB002BCC000
trusted library allocation
page read and write
9AA000
unkown
page readonly
1989000
heap
page read and write
D3A2FFC000
stack
page read and write
3BB00220C000
trusted library allocation
page read and write
1BF4000
heap
page read and write
3BB0026DC000
trusted library allocation
page read and write
3BB0024AC000
trusted library allocation
page read and write
153D000
heap
page read and write
1DBC002BC000
trusted library allocation
page read and write
3C9D000
heap
page read and write
14B0000
heap
page read and write
3BB0031C4000
trusted library allocation
page read and write
1A28000
heap
page read and write
19FD000
heap
page read and write
275DF1B0000
heap
page read and write
3B90000
heap
page read and write
19FB000
heap
page read and write
14A0000
heap
page read and write
1DBC00260000
trusted library allocation
page read and write
3BB002AB3000
trusted library allocation
page read and write
3B9D000
heap
page read and write
5ABC000
stack
page read and write
4F000025C000
trusted library allocation
page read and write
1556000
heap
page read and write
11780026C000
direct allocation
page read and write
1AC0000
heap
page read and write
1DBC002C0000
trusted library allocation
page read and write
3BB002F48000
trusted library allocation
page read and write
4F0000630000
trusted library allocation
page read and write
3BB002FF8000
trusted library allocation
page read and write
3BF2000
heap
page read and write
3BB002ED4000
trusted library allocation
page read and write
There are 1154 hidden memdumps, click here to show them.