IOC Report
2QPrBtk3J8.exe

loading gif

Files

File Path
Type
Category
Malicious
2QPrBtk3J8.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_2QPrBtk3J8.exe_eb63329b6d25945896617e113334af7b2c37b673_ae19b59a_de73c167-acf2-4bd6-a8f0-ac3d6b3dcc3f\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9BA7.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Oct 27 12:01:39 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9CC1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9CE2.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\cldWJFEgUeiMCAqhDGGW.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
modified
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 53
ASCII text, with very long lines (792)
downloaded
Chrome Cache Entry: 54
ASCII text
downloaded
Chrome Cache Entry: 55
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 56
ASCII text
downloaded
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\2QPrBtk3J8.exe
"C:\Users\user\Desktop\2QPrBtk3J8.exe"
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user~1\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user~1\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user~1\AppData\Local\Temp\/service123.exe
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2456 --field-trial-handle=2192,i,4602064398198838241,12730818304677146910,262144 /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6648 -s 724

URLs

Name
IP
Malicious
http://home.tventji20ht.top/axNhXgnGYoPSgajZFkaQ1729862659
147.45.48.137
malicious
http://tventji20ht.top/v1/upload.php
147.45.48.137
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://anglebug.com/7320%
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://csp.withgoogle.com/csp/clientupdate-aus/1Cache-Control:
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/74884
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
http://anglebug.com/3577rm
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/6141M
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/5881/
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
https://issuetracker.google.com/issues/166475273d
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
http://home.tventji20ht.top/axNhXgnGYoPSgajZFkaQ59
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
https://chrome.google.com/webstore2BJCKUe4=
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
https://www.google.com/search?q=$
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
http://anglebug.com/4937
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
tventji20ht.top
147.45.48.137
malicious
home.tventji20ht.top
147.45.48.137
malicious
s-part-0036.t-0009.t-msedge.net
13.107.246.64
www.google.com
142.250.185.164
time.windows.com
unknown

IPs

IP
Domain
Country
Malicious
147.45.48.137
tventji20ht.top
Russian Federation
malicious
239.255.255.250
unknown
Reserved
142.250.185.164
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{78582011-7fca-1ee7-e942-ade8d1bd6fc1}\Root\InventoryApplicationFile\2qprbtk3j8.exe|1a80262fe63df64e
ProgramId
\REGISTRY\A\{78582011-7fca-1ee7-e942-ade8d1bd6fc1}\Root\InventoryApplicationFile\2qprbtk3j8.exe|1a80262fe63df64e
FileId
\REGISTRY\A\{78582011-7fca-1ee7-e942-ade8d1bd6fc1}\Root\InventoryApplicationFile\2qprbtk3j8.exe|1a80262fe63df64e
LowerCaseLongPath
\REGISTRY\A\{78582011-7fca-1ee7-e942-ade8d1bd6fc1}\Root\InventoryApplicationFile\2qprbtk3j8.exe|1a80262fe63df64e
LongPathHash
\REGISTRY\A\{78582011-7fca-1ee7-e942-ade8d1bd6fc1}\Root\InventoryApplicationFile\2qprbtk3j8.exe|1a80262fe63df64e
Name
\REGISTRY\A\{78582011-7fca-1ee7-e942-ade8d1bd6fc1}\Root\InventoryApplicationFile\2qprbtk3j8.exe|1a80262fe63df64e
OriginalFileName
\REGISTRY\A\{78582011-7fca-1ee7-e942-ade8d1bd6fc1}\Root\InventoryApplicationFile\2qprbtk3j8.exe|1a80262fe63df64e
Publisher
\REGISTRY\A\{78582011-7fca-1ee7-e942-ade8d1bd6fc1}\Root\InventoryApplicationFile\2qprbtk3j8.exe|1a80262fe63df64e
Version
\REGISTRY\A\{78582011-7fca-1ee7-e942-ade8d1bd6fc1}\Root\InventoryApplicationFile\2qprbtk3j8.exe|1a80262fe63df64e
BinFileVersion
\REGISTRY\A\{78582011-7fca-1ee7-e942-ade8d1bd6fc1}\Root\InventoryApplicationFile\2qprbtk3j8.exe|1a80262fe63df64e
BinaryType
\REGISTRY\A\{78582011-7fca-1ee7-e942-ade8d1bd6fc1}\Root\InventoryApplicationFile\2qprbtk3j8.exe|1a80262fe63df64e
ProductName
\REGISTRY\A\{78582011-7fca-1ee7-e942-ade8d1bd6fc1}\Root\InventoryApplicationFile\2qprbtk3j8.exe|1a80262fe63df64e
ProductVersion
\REGISTRY\A\{78582011-7fca-1ee7-e942-ade8d1bd6fc1}\Root\InventoryApplicationFile\2qprbtk3j8.exe|1a80262fe63df64e
LinkDate
\REGISTRY\A\{78582011-7fca-1ee7-e942-ade8d1bd6fc1}\Root\InventoryApplicationFile\2qprbtk3j8.exe|1a80262fe63df64e
BinProductVersion
\REGISTRY\A\{78582011-7fca-1ee7-e942-ade8d1bd6fc1}\Root\InventoryApplicationFile\2qprbtk3j8.exe|1a80262fe63df64e
AppxPackageFullName
\REGISTRY\A\{78582011-7fca-1ee7-e942-ade8d1bd6fc1}\Root\InventoryApplicationFile\2qprbtk3j8.exe|1a80262fe63df64e
AppxPackageRelativeId
\REGISTRY\A\{78582011-7fca-1ee7-e942-ade8d1bd6fc1}\Root\InventoryApplicationFile\2qprbtk3j8.exe|1a80262fe63df64e
Size
\REGISTRY\A\{78582011-7fca-1ee7-e942-ade8d1bd6fc1}\Root\InventoryApplicationFile\2qprbtk3j8.exe|1a80262fe63df64e
Language
\REGISTRY\A\{78582011-7fca-1ee7-e942-ade8d1bd6fc1}\Root\InventoryApplicationFile\2qprbtk3j8.exe|1a80262fe63df64e
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
EC0000
unkown
page readonly
3F6000408000
trusted library allocation
page read and write
61D8002BC000
trusted library allocation
page read and write
301C00C68000
trusted library allocation
page read and write
301C00580000
trusted library allocation
page read and write
3F6000201000
trusted library allocation
page read and write
3751000
heap
page read and write
301C0051C000
trusted library allocation
page read and write
301C00AD0000
trusted library allocation
page read and write
B346FFA000
stack
page read and write
ED1000
unkown
page readonly
D32000
unkown
page write copy
2603B403000
heap
page read and write
B3597FE000
unkown
page readonly
3F6000788000
trusted library allocation
page read and write
61D8002A0000
trusted library allocation
page read and write
ED1000
unkown
page readonly
301C0006A000
trusted library allocation
page read and write
301C011A0000
trusted library allocation
page read and write
301C00ABC000
trusted library allocation
page read and write
EA0000
heap
page read and write
301C00AF4000
trusted library allocation
page read and write
B34DFFE000
stack
page read and write
301C001F4000
trusted library allocation
page read and write
301C00F64000
trusted library allocation
page read and write
301C00671000
trusted library allocation
page read and write
B343FFE000
stack
page read and write
301C00304000
trusted library allocation
page read and write
3F6000288000
trusted library allocation
page read and write
2603B3FF000
heap
page read and write
301C006F8000
trusted library allocation
page read and write
301C001B4000
trusted library allocation
page read and write
301C00840000
trusted library allocation
page read and write
61D8002A0000
trusted library allocation
page read and write
301C004CC000
trusted library allocation
page read and write
3F6000734000
trusted library allocation
page read and write
3751000
heap
page read and write
301C00294000
trusted library allocation
page read and write
3816000
heap
page read and write
260380F0000
heap
page read and write
301C0015C000
trusted library allocation
page read and write
301C00380000
trusted library allocation
page read and write
1108002D0000
direct allocation
page read and write
301C00D3C000
trusted library allocation
page read and write
3F600020C000
trusted library allocation
page read and write
375C000
heap
page read and write
2350000
heap
page read and write
301C002A4000
trusted library allocation
page read and write
3F600027C000
trusted library allocation
page read and write
301C00D50000
trusted library allocation
page read and write
301C001AC000
trusted library allocation
page read and write
B35EFFE000
stack
page read and write
301C00454000
trusted library allocation
page read and write
B34D7FE000
unkown
page readonly
61D8002C0000
trusted library allocation
page read and write
3F6000644000
trusted library allocation
page read and write
2603FC90000
heap
page read and write
3750000
heap
page read and write
301C01088000
trusted library allocation
page read and write
26037F92000
heap
page read and write
B36F7FE000
unkown
page readonly
301C00C44000
trusted library allocation
page read and write
10DC000
stack
page read and write
301C00E20000
trusted library allocation
page read and write
301C00390000
trusted library allocation
page read and write
110800234000
direct allocation
page read and write
ED1000
unkown
page readonly
301C00B24000
trusted library allocation
page read and write
3757000
heap
page read and write
3F60006EC000
trusted library allocation
page read and write
301C00344000
trusted library allocation
page read and write
2603A640000
unkown
page read and write
2603FA90000
trusted library allocation
page read and write
3F6000250000
trusted library allocation
page read and write
2603B406000
heap
page read and write
301C006D4000
trusted library allocation
page read and write
3752000
heap
page read and write
301C00BC0000
trusted library allocation
page read and write
BD0000
heap
page read and write
301C00CEC000
trusted library allocation
page read and write
26037F8F000
heap
page read and write
297B000
heap
page read and write
3F60002E4000
trusted library allocation
page read and write
301C001A0000
trusted library allocation
page read and write
26037F34000
heap
page read and write
301C00220000
trusted library allocation
page read and write
2603B984000
heap
page read and write
260402CE000
trusted library section
page read and write
301C01094000
trusted library allocation
page read and write
301C001AC000
trusted library allocation
page read and write
301C007D3000
trusted library allocation
page read and write
110800210000
direct allocation
page read and write
301C00978000
trusted library allocation
page read and write
B3497FE000
unkown
page readonly
2603D897000
unclassified section
page read and write
301C00C70000
trusted library allocation
page read and write
301C002F0000
trusted library allocation
page read and write
61D8002C0000
trusted library allocation
page read and write
389F000
heap
page read and write
ED1000
unkown
page readonly
61D8002B0000
trusted library allocation
page read and write
3755000
heap
page read and write
3F6000744000
trusted library allocation
page read and write
EC1000
unkown
page execute read
B3537FE000
unkown
page readonly
301C009C3000
trusted library allocation
page read and write
301C00454000
trusted library allocation
page read and write
2604107D000
trusted library section
page read and write
3937000
heap
page read and write
2603B3FA000
heap
page read and write
110800250000
direct allocation
page read and write
301C00AE8000
trusted library allocation
page read and write
B6C000
stack
page read and write
3F60007C8000
trusted library allocation
page read and write
301C0120C000
trusted library allocation
page read and write
301C00725000
trusted library allocation
page read and write
BC0000
heap
page read and write
3F60006E8000
trusted library allocation
page read and write
2603B975000
heap
page read and write
ECE000
unkown
page read and write
301C00B88000
trusted library allocation
page read and write
3F60003EC000
trusted library allocation
page read and write
61D8002B0000
trusted library allocation
page read and write
301C00A70000
trusted library allocation
page read and write
301C00344000
trusted library allocation
page read and write
1108002DC000
direct allocation
page read and write
301C00510000
trusted library allocation
page read and write
6CC3C000
unkown
page readonly
3F600035C000
trusted library allocation
page read and write
3F60006BC000
trusted library allocation
page read and write
301C00C5E000
trusted library allocation
page read and write
301C00ED4000
trusted library allocation
page read and write
2603B96C000
heap
page read and write
301C00230000
trusted library allocation
page read and write
23E0000
heap
page read and write
301C00940000
trusted library allocation
page read and write
EC1000
unkown
page execute read
301C00128000
trusted library allocation
page read and write
3F6000754000
trusted library allocation
page read and write
B35BFFD000
stack
page read and write
301C010F4000
trusted library allocation
page read and write
301C001F8000
trusted library allocation
page read and write
B36E7FE000
unkown
page readonly
3F6000430000
trusted library allocation
page read and write
301C00CCC000
trusted library allocation
page read and write
110800201000
direct allocation
page read and write
301C00D74000
trusted library allocation
page read and write
375B000
heap
page read and write
301C00F95000
trusted library allocation
page read and write
301C0033C000
trusted library allocation
page read and write
26040F42000
trusted library section
page read and write
301C00ED4000
trusted library allocation
page read and write
301C00E84000
trusted library allocation
page read and write
301C00E40000
trusted library allocation
page read and write
301C00DD8000
trusted library allocation
page read and write
61D8002BC000
trusted library allocation
page read and write
301C000DC000
trusted library allocation
page read and write
301C001B4000
trusted library allocation
page read and write
B35E7FE000
unkown
page readonly
B34BFFC000
stack
page read and write
301C00CCC000
trusted library allocation
page read and write
B3437FE000
unkown
page readonly
6CC39000
unkown
page read and write
301C00294000
trusted library allocation
page read and write
EC0000
unkown
page readonly
B36D7FE000
unkown
page readonly
301C0129C000
trusted library allocation
page read and write
301C01144000
trusted library allocation
page read and write
38B7000
heap
page read and write
3960000
heap
page read and write
301C0080C000
trusted library allocation
page read and write
B3617FE000
unkown
page readonly
B36B7FE000
unkown
page readonly
680000
unkown
page readonly
3F60006E4000
trusted library allocation
page read and write
B3657FE000
unkown
page readonly
1070000
heap
page read and write
B359FFC000
stack
page read and write
301C00F00000
trusted library allocation
page read and write
3F60006B4000
trusted library allocation
page read and write
301C00D34000
trusted library allocation
page read and write
301C00F85000
trusted library allocation
page read and write
61D800230000
trusted library allocation
page read and write
301C00390000
trusted library allocation
page read and write
301C00D04000
trusted library allocation
page read and write
3F6000714000
trusted library allocation
page read and write
15AD000
heap
page read and write
301C002A4000
trusted library allocation
page read and write
301C00665000
trusted library allocation
page read and write
301C006B4000
trusted library allocation
page read and write
ECE000
unkown
page write copy
26040F90000
trusted library section
page read and write
61D800274000
trusted library allocation
page read and write
2603B408000
heap
page read and write
38E0000
heap
page read and write
B357FFD000
stack
page read and write
3752000
heap
page read and write
3F60007CC000
trusted library allocation
page read and write
301C001C4000
trusted library allocation
page read and write
3F60006D4000
trusted library allocation
page read and write
301C007B4000
trusted library allocation
page read and write
301C0009C000
trusted library allocation
page read and write
301C00EE0000
trusted library allocation
page read and write
B348FFE000
stack
page read and write
2603B9B0000
heap
page read and write
301C0104C000
trusted library allocation
page read and write
301C00958000
trusted library allocation
page read and write
301C00228000
trusted library allocation
page read and write
385B000
heap
page read and write
301C01068000
trusted library allocation
page read and write
B345FFD000
stack
page read and write
26037EA0000
heap
page read and write
2603B91F000
heap
page read and write
301C00390000
trusted library allocation
page read and write
3F6000424000
trusted library allocation
page read and write
301C00F8C000
trusted library allocation
page read and write
301C002F0000
trusted library allocation
page read and write
301C0033C000
trusted library allocation
page read and write
301C0027C000
trusted library allocation
page read and write
301C007C0000
trusted library allocation
page read and write
B36AFFC000
stack
page read and write
11080026C000
direct allocation
page read and write
301C003B6000
trusted library allocation
page read and write
37F8000
heap
page read and write
301C00194000
trusted library allocation
page read and write
26040FA1000
trusted library section
page read and write
B36CFFE000
stack
page read and write
301C00BB8000
trusted library allocation
page read and write
2970000
heap
page read and write
301C00350000
trusted library allocation
page read and write
B33FFEF000
stack
page read and write
301C00F6C000
trusted library allocation
page read and write
3F60002D4000
trusted library allocation
page read and write
26040C20000
trusted library section
page read and write
301C004D4000
trusted library allocation
page read and write
26040F21000
trusted library section
page read and write
301C00294000
trusted library allocation
page read and write
6DC000
stack
page read and write
3754000
heap
page read and write
301C00F98000
trusted library allocation
page read and write
B35A7FE000
unkown
page readonly
301C0003C000
trusted library allocation
page read and write
301C00DC0000
trusted library allocation
page read and write
26037F6E000
heap
page read and write
301C00DB8000
trusted library allocation
page read and write
301C00C44000
trusted library allocation
page read and write
2603B407000
heap
page read and write
BFC000
stack
page read and write
3F6000720000
trusted library allocation
page read and write
301C001F0000
trusted library allocation
page read and write
3F6000320000
trusted library allocation
page read and write
15B8000
heap
page read and write
3AE0000
heap
page read and write
B366FFD000
stack
page read and write
26038115000
heap
page read and write
38A2000
heap
page read and write
3757000
heap
page read and write
2603FCB1000
heap
page read and write
38AE000
heap
page read and write
3F60006C8000
trusted library allocation
page read and write
301C00CAC000
trusted library allocation
page read and write
B35DFFB000
stack
page read and write
110800280000
direct allocation
page read and write
301C00224000
trusted library allocation
page read and write
ECA000
unkown
page readonly
61D800260000
trusted library allocation
page read and write
301C00350000
trusted library allocation
page read and write
3F6000364000
trusted library allocation
page read and write
301C0067C000
trusted library allocation
page read and write
37E2000
heap
page read and write
ECE000
unkown
page read and write
301C00E70000
trusted library allocation
page read and write
301C005B8000
trusted library allocation
page read and write
301C00F98000
trusted library allocation
page read and write
3AB5000
heap
page read and write
B3667FE000
unkown
page readonly
3F600033C000
trusted library allocation
page read and write
26038000000
trusted library allocation
page read and write
301C0035C000
trusted library allocation
page read and write
3758000
heap
page read and write
2603D980000
heap
page read and write
11080020C000
direct allocation
page read and write
301C00350000
trusted library allocation
page read and write
1461000
heap
page read and write
2603B40B000
heap
page read and write
301C01150000
trusted library allocation
page read and write
3F6000684000
trusted library allocation
page read and write
301C00EC0000
trusted library allocation
page read and write
3F60006CC000
trusted library allocation
page read and write
260409B0000
trusted library section
page read and write
3F6000418000
trusted library allocation
page read and write
375F000
heap
page read and write
301C008A0000
trusted library allocation
page read and write
3F60002F4000
trusted library allocation
page read and write
2603BC30000
trusted library section
page read and write
301C002B4000
trusted library allocation
page read and write
301C00624000
trusted library allocation
page read and write
2603BCC7000
unclassified section
page read and write
3F600075C000
trusted library allocation
page read and write
301C001EC000
trusted library allocation
page read and write
301C01188000
trusted library allocation
page read and write
B35C7FE000
unkown
page readonly
2603B407000
heap
page read and write
301C00214000
trusted library allocation
page read and write
375A000
heap
page read and write
301C002F3000
trusted library allocation
page read and write
3758000
heap
page read and write
301C00A0C000
trusted library allocation
page read and write
B3567FE000
unkown
page readonly
301C00401000
trusted library allocation
page read and write
3759000
heap
page read and write
2603B3D0000
heap
page read and write
301C00BEC000
trusted library allocation
page read and write
301C004B0000
trusted library allocation
page read and write
3F60002B0000
trusted library allocation
page read and write
61D8002BC000
trusted library allocation
page read and write
B341FFE000
stack
page read and write
B358FFC000
stack
page read and write
301C0072A000
trusted library allocation
page read and write
23DF000
unkown
page read and write
B3487FE000
unkown
page readonly
B3677FE000
unkown
page readonly
301C00B24000
trusted library allocation
page read and write
301C010FC000
trusted library allocation
page read and write
D20000
heap
page read and write
301C00DAC000
trusted library allocation
page read and write
395B000
heap
page read and write
B34EFFE000
stack
page read and write
3F6000620000
trusted library allocation
page read and write
61D800220000
trusted library allocation
page read and write
B355FFC000
stack
page read and write
13EE000
heap
page read and write
260380E0000
trusted library section
page readonly
1108002AC000
direct allocation
page read and write
2603B890000
trusted library section
page read and write
3F6000610000
trusted library allocation
page read and write
26040F10000
trusted library section
page read and write
301C00118000
trusted library allocation
page read and write
3F60002B8000
trusted library allocation
page read and write
301C00378000
trusted library allocation
page read and write
26040382000
trusted library section
page read and write
301C0100C000
trusted library allocation
page read and write
301C00F44000
trusted library allocation
page read and write
B3467FE000
unkown
page readonly
B36BFFE000
stack
page read and write
301C00754000
trusted library allocation
page read and write
301C00090000
trusted library allocation
page read and write
26041072000
trusted library section
page read and write
301C01104000
trusted library allocation
page read and write
B349FFC000
stack
page read and write
3758000
heap
page read and write
301C01001000
trusted library allocation
page read and write
2603FA50000
heap
page read and write
2603FCE6000
heap
page read and write
3F6000401000
trusted library allocation
page read and write
301C005A4000
trusted library allocation
page read and write
61D8002BC000
trusted library allocation
page read and write
301C00E48000
trusted library allocation
page read and write
301C00928000
trusted library allocation
page read and write
26037F99000
heap
page read and write
301C00304000
trusted library allocation
page read and write
301C004EC000
trusted library allocation
page read and write
301C01030000
trusted library allocation
page read and write
3F6000770000
trusted library allocation
page read and write
301C00798000
trusted library allocation
page read and write
301C004CC000
trusted library allocation
page read and write
301C002A4000
trusted library allocation
page read and write
61D8002A0000
trusted library allocation
page read and write
301C00E18000
trusted library allocation
page read and write
301C008DC000
trusted library allocation
page read and write
2603B936000
heap
page read and write
26038110000
heap
page read and write
3A59000
heap
page read and write
3F6000348000
trusted library allocation
page read and write
2603B403000
heap
page read and write
BDB000
unkown
page write copy
2603B939000
heap
page read and write
301C00CFC000
trusted library allocation
page read and write
301C00368000
trusted library allocation
page read and write
3752000
heap
page read and write
681000
unkown
page execute read
3F600040C000
trusted library allocation
page read and write
301C00300000
trusted library allocation
page read and write
3F60007D0000
trusted library allocation
page read and write
26037E90000
heap
page readonly
301C00C24000
trusted library allocation
page read and write
260410B0000
trusted library section
page read and write
B361FFD000
stack
page read and write
3F600025C000
trusted library allocation
page read and write
B36C7FE000
unkown
page readonly
301C00718000
trusted library allocation
page read and write
2603B936000
heap
page read and write
3F60007E0000
trusted library allocation
page read and write
B340FFE000
unkown
page read and write
3F6000750000
trusted library allocation
page read and write
301C00344000
trusted library allocation
page read and write
301C001B4000
trusted library allocation
page read and write
B368FFD000
stack
page read and write
3F6000724000
trusted library allocation
page read and write
301C003BB000
trusted library allocation
page read and write
3956000
heap
page read and write
3940000
heap
page read and write
3F6000368000
trusted library allocation
page read and write
301C00F98000
trusted library allocation
page read and write
2603B8E3000
heap
page read and write
301C0040C000
trusted library allocation
page read and write
375D000
heap
page read and write
301C00AA4000
trusted library allocation
page read and write
1108002E4000
direct allocation
page read and write
26040F30000
trusted library section
page read and write
301C00801000
trusted library allocation
page read and write
301C00D58000
trusted library allocation
page read and write
301C004CC000
trusted library allocation
page read and write
301C01194000
trusted library allocation
page read and write
3F60002FC000
trusted library allocation
page read and write
38AD000
heap
page read and write
301C01030000
trusted library allocation
page read and write
37EC000
heap
page read and write
301C00001000
trusted library allocation
page read and write
3933000
heap
page read and write
3F6000760000
trusted library allocation
page read and write
3758000
heap
page read and write
B354FFC000
stack
page read and write
22EA000
stack
page read and write
301C00760000
trusted library allocation
page read and write
3755000
heap
page read and write
3906000
heap
page read and write
ECE000
unkown
page read and write
301C00084000
trusted library allocation
page read and write
61D800278000
trusted library allocation
page read and write
110800284000
direct allocation
page read and write
B3647FE000
unkown
page readonly
2900000
heap
page read and write
301C000EC000
trusted library allocation
page read and write
301C00590000
trusted library allocation
page read and write
11080024C000
direct allocation
page read and write
3F6000658000
trusted library allocation
page read and write
ECE000
unkown
page write copy
301C001D0000
trusted library allocation
page read and write
2603B8E0000
heap
page read and write
3F6000694000
trusted library allocation
page read and write
3F6000310000
trusted library allocation
page read and write
276F000
stack
page read and write
3F6000648000
trusted library allocation
page read and write
61D80020C000
trusted library allocation
page read and write
301C00A30000
trusted library allocation
page read and write
D20000
heap
page read and write
301C00014000
trusted library allocation
page read and write
B36EFFE000
stack
page read and write
37F2000
heap
page read and write
26037DB0000
heap
page read and write
61D8002BC000
trusted library allocation
page read and write
11F0000
heap
page read and write
78C000
stack
page read and write
301C00C01000
trusted library allocation
page read and write
3753000
heap
page read and write
B35AFFC000
stack
page read and write
26037EAB000
heap
page read and write
301C00328000
trusted library allocation
page read and write
301C00304000
trusted library allocation
page read and write
2603B40F000
heap
page read and write
3F600080C000
trusted library allocation
page read and write
38E1000
heap
page read and write
301C00CA0000
trusted library allocation
page read and write
B34FFFE000
stack
page read and write
2603B3FA000
heap
page read and write
3F6000238000
trusted library allocation
page read and write
3A0B000
heap
page read and write
ECE000
unkown
page write copy
301C00910000
trusted library allocation
page read and write
22AD000
stack
page read and write
B3507FE000
unkown
page readonly
2603B922000
heap
page read and write
61D8002BC000
trusted library allocation
page read and write
EC0000
unkown
page readonly
301C00AB0000
trusted library allocation
page read and write
3755000
heap
page read and write
39C7000
heap
page read and write
301C007A0000
trusted library allocation
page read and write
301C0118C000
trusted library allocation
page read and write
301C00E4B000
trusted library allocation
page read and write
301C00FB4000
trusted library allocation
page read and write
375C000
heap
page read and write
301C00B10000
trusted library allocation
page read and write
301C00614000
trusted library allocation
page read and write
61D8002E4000
trusted library allocation
page read and write
301C004CC000
trusted library allocation
page read and write
3F6000758000
trusted library allocation
page read and write
239E000
unkown
page read and write
2603B9A1000
heap
page read and write
EC0000
unkown
page readonly
3885000
heap
page read and write
B347FFA000
stack
page read and write
B35CFFB000
stack
page read and write
B34CFFD000
stack
page read and write
301C002B0000
trusted library allocation
page read and write
301C00F98000
trusted library allocation
page read and write
301C00E94000
trusted library allocation
page read and write
3A98000
heap
page read and write
301C00C58000
trusted library allocation
page read and write
301C0060C000
trusted library allocation
page read and write
301C00CAC000
trusted library allocation
page read and write
301C00294000
trusted library allocation
page read and write
2603B660000
heap
page read and write
2603B3FF000
heap
page read and write
B3697FE000
unkown
page readonly
301C00660000
trusted library allocation
page read and write
110800303000
direct allocation
page read and write
301C00CF8000
trusted library allocation
page read and write
301C008CC000
trusted library allocation
page read and write
301C00B24000
trusted library allocation
page read and write
375E000
heap
page read and write
3F60007B4000
trusted library allocation
page read and write
301C008A3000
trusted library allocation
page read and write
301C01030000
trusted library allocation
page read and write
301C00F04000
trusted library allocation
page read and write
3753000
heap
page read and write
2603B3E0000
heap
page read and write
301C005E0000
trusted library allocation
page read and write
301C00A14000
trusted library allocation
page read and write
BFC000
stack
page read and write
301C0020C000
trusted library allocation
page read and write
E60000
heap
page read and write
301C0016C000
trusted library allocation
page read and write
B3557FE000
unkown
page readonly
3F60006B0000
trusted library allocation
page read and write
3750000
heap
page read and write
301C00744000
trusted library allocation
page read and write
26040F80000
trusted library section
page read and write
26037F7A000
heap
page read and write
3F6000688000
trusted library allocation
page read and write
301C00B38000
trusted library allocation
page read and write
3F6000320000
trusted library allocation
page read and write
301C00748000
trusted library allocation
page read and write
301C00F34000
trusted library allocation
page read and write
1077000
heap
page read and write
301C00F98000
trusted library allocation
page read and write
301C00B44000
trusted library allocation
page read and write
B34E7FE000
unkown
page readonly
301C00344000
trusted library allocation
page read and write
ECA000
unkown
page readonly
ECA000
unkown
page readonly
3815000
heap
page read and write
3F60002F0000
trusted library allocation
page read and write
301C00730000
trusted library allocation
page read and write
301C00EA0000
trusted library allocation
page read and write
301C00E34000
trusted library allocation
page read and write
730000
heap
page read and write
301C00494000
trusted library allocation
page read and write
3F60006B8000
trusted library allocation
page read and write
61D8002F8000
trusted library allocation
page read and write
301C00F70000
trusted library allocation
page read and write
110800294000
direct allocation
page read and write
2603B9A5000
heap
page read and write
3F6000404000
trusted library allocation
page read and write
26041056000
trusted library section
page read and write
301C0033C000
trusted library allocation
page read and write
301C000FC000
trusted library allocation
page read and write
3757000
heap
page read and write
38ED000
heap
page read and write
301C001DC000
trusted library allocation
page read and write
3918000
heap
page read and write
26037F85000
heap
page read and write
EC1000
unkown
page execute read
301C00A64000
trusted library allocation
page read and write
301C001E0000
trusted library allocation
page read and write
260403F0000
trusted library section
page read and write
301C0081C000
trusted library allocation
page read and write
3F6000330000
trusted library allocation
page read and write
38AD000
heap
page read and write
EC1000
unkown
page execute read
301C00210000
trusted library allocation
page read and write
3757000
heap
page read and write
301C001E4000
trusted library allocation
page read and write
301C00D90000
trusted library allocation
page read and write
D37000
unkown
page readonly
61D800294000
trusted library allocation
page read and write
B352FFE000
stack
page read and write
38CC000
heap
page read and write
3F60006FC000
trusted library allocation
page read and write
3B3C000
heap
page read and write
3F6000320000
trusted library allocation
page read and write
3F6000310000
trusted library allocation
page read and write
387E000
heap
page read and write
26037F74000
heap
page read and write
61D8002BC000
trusted library allocation
page read and write
2603B903000
heap
page read and write
301C0014C000
trusted library allocation
page read and write
B35B7FE000
unkown
page readonly
110800230000
direct allocation
page read and write
1108002A8000
direct allocation
page read and write
301C001E8000
trusted library allocation
page read and write
301C00880000
trusted library allocation
page read and write
301C00748000
trusted library allocation
page read and write
B353FFB000
stack
page read and write
2603B9E0000
trusted library section
page read and write
301C008B4000
trusted library allocation
page read and write
301C009E4000
trusted library allocation
page read and write
3956000
heap
page read and write
14A0000
heap
page read and write
301C00EB4000
trusted library allocation
page read and write
B3627FE000
unkown
page readonly
B34AFFB000
stack
page read and write
301C00CAC000
trusted library allocation
page read and write
2603B98B000
heap
page read and write
301C00310000
trusted library allocation
page read and write
3917000
heap
page read and write
301C00E58000
trusted library allocation
page read and write
301C00748000
trusted library allocation
page read and write
B3477FE000
unkown
page readonly
61D800235000
trusted library allocation
page read and write
301C00D6C000
trusted library allocation
page read and write
38D3000
heap
page read and write
301C00D14000
trusted library allocation
page read and write
ECA000
unkown
page readonly
2604110E000
trusted library section
page read and write
301C0000C000
trusted library allocation
page read and write
301C00074000
trusted library allocation
page read and write
6CBEF000
unkown
page readonly
395D000
heap
page read and write
2603B3FF000
heap
page read and write
FD7000
heap
page read and write
301C006C8000
trusted library allocation
page read and write
301C00648000
trusted library allocation
page read and write
301C00FA4000
trusted library allocation
page read and write
301C002E0000
trusted library allocation
page read and write
3828000
heap
page read and write
2603D8C7000
unclassified section
page read and write
301C00D28000
trusted library allocation
page read and write
301C00A01000
trusted library allocation
page read and write
6CBED000
unkown
page read and write
301C00C74000
trusted library allocation
page read and write
3F6000354000
trusted library allocation
page read and write
301C0031C000
trusted library allocation
page read and write
2603B967000
heap
page read and write
3A3C000
heap
page read and write
301C00BD8000
trusted library allocation
page read and write
387C000
heap
page read and write
3F60002ED000
trusted library allocation
page read and write
26040323000
trusted library section
page read and write
301C007DC000
trusted library allocation
page read and write
26037FB0000
heap
page read and write
B369FFA000
stack
page read and write
3F6000614000
trusted library allocation
page read and write
301C00294000
trusted library allocation
page read and write
301C00E64000
trusted library allocation
page read and write
301C006F8000
trusted library allocation
page read and write
301C00218000
trusted library allocation
page read and write
301C012B8000
trusted library allocation
page read and write
26037F38000
heap
page read and write
301C0066A000
trusted library allocation
page read and write
2603BCB7000
unclassified section
page read and write
ECA000
unkown
page readonly
61D800201000
trusted library allocation
page read and write
26040FB3000
trusted library section
page read and write
301C001AC000
trusted library allocation
page read and write
3938000
heap
page read and write
61D800238000
trusted library allocation
page read and write
61D800250000
trusted library allocation
page read and write
B3637FE000
unkown
page readonly
6CC38000
unkown
page readonly
387E000
heap
page read and write
3907000
heap
page read and write
301C0022C000
trusted library allocation
page read and write
2603FCA1000
heap
page read and write
3F6000248000
trusted library allocation
page read and write
13E0000
heap
page read and write
3F6000330000
trusted library allocation
page read and write
B34F7FE000
unkown
page readonly
301C00EF0000
trusted library allocation
page read and write
301C00B00000
trusted library allocation
page read and write
301C01170000
trusted library allocation
page read and write
3757000
heap
page read and write
301C0033C000
trusted library allocation
page read and write
3F60006F0000
trusted library allocation
page read and write
B3607FE000
unkown
page readonly
61D800270000
trusted library allocation
page read and write
3F60006E0000
trusted library allocation
page read and write
ED1000
unkown
page readonly
EC0000
unkown
page readonly
301C00350000
trusted library allocation
page read and write
301C00C90000
trusted library allocation
page read and write
301C00058000
trusted library allocation
page read and write
61D800248000
trusted library allocation
page read and write
EC1000
unkown
page execute read
301C0091C000
trusted library allocation
page read and write
3F6000698000
trusted library allocation
page read and write
301C003B4000
trusted library allocation
page read and write
3758000
heap
page read and write
B363FFD000
stack
page read and write
301C001B4000
trusted library allocation
page read and write
B34A7FE000
unkown
page readonly
3A18000
heap
page read and write
3750000
heap
page read and write
B36A7FE000
unkown
page readonly
61D8002B0000
trusted library allocation
page read and write
301C00534000
trusted library allocation
page read and write
301C001D8000
trusted library allocation
page read and write
301C00ECC000
trusted library allocation
page read and write
375A000
heap
page read and write
EC0000
unkown
page readonly
301C00E0C000
trusted library allocation
page read and write
3F60002CC000
trusted library allocation
page read and write
301C0029E000
trusted library allocation
page read and write
301C00294000
trusted library allocation
page read and write
110800290000
direct allocation
page read and write
EC1000
unkown
page execute read
301C004CF000
trusted library allocation
page read and write
301C00B9C000
trusted library allocation
page read and write
260402B0000
trusted library section
page read and write
3F600069C000
trusted library allocation
page read and write
27A0000
heap
page read and write
2603B3FB000
heap
page read and write
301C00C40000
trusted library allocation
page read and write
301C002FB000
trusted library allocation
page read and write
6CB10000
unkown
page readonly
301C00CAC000
trusted library allocation
page read and write
3F6000230000
trusted library allocation
page read and write
301C0040C000
trusted library allocation
page read and write
3F600060C000
trusted library allocation
page read and write
391B000
heap
page read and write
301C005CC000
trusted library allocation
page read and write
B3527FE000
unkown
page readonly
3750000
heap
page read and write
301C00F28000
trusted library allocation
page read and write
3750000
heap
page read and write
2603B9B6000
heap
page read and write
26037F48000
heap
page read and write
26037F88000
heap
page read and write
301C001AC000
trusted library allocation
page read and write
301C01201000
trusted library allocation
page read and write
FD0000
heap
page read and write
38D0000
heap
page read and write
260407B0000
trusted library section
page read and write
3F6000664000
trusted library allocation
page read and write
2603B3F8000
heap
page read and write
3F600078C000
trusted library allocation
page read and write
301C00708000
trusted library allocation
page read and write
2603B97A000
heap
page read and write
301C002B9000
trusted library allocation
page read and write
301C003A4000
trusted library allocation
page read and write
301C00B94000
trusted library allocation
page read and write
260402C2000
trusted library section
page read and write
301C00454000
trusted library allocation
page read and write
260405F0000
trusted library section
page read and write
301C01064000
trusted library allocation
page read and write
301C004A4000
trusted library allocation
page read and write
3F6000630000
trusted library allocation
page read and write
301C00294000
trusted library allocation
page read and write
301C0031C000
trusted library allocation
page read and write
301C00294000
trusted library allocation
page read and write
301C00D84000
trusted library allocation
page read and write
26040C2E000
trusted library section
page read and write
2603B404000
heap
page read and write
301C0100C000
trusted library allocation
page read and write
301C00CAC000
trusted library allocation
page read and write
B3417FE000
unkown
page readonly
110800270000
direct allocation
page read and write
2603B9D8000
heap
page read and write
2603FCE3000
heap
page read and write
D1D000
unkown
page readonly
301C0006F000
trusted library allocation
page read and write
301C01114000
trusted library allocation
page read and write
3F600035C000
trusted library allocation
page read and write
61D8002A0000
trusted library allocation
page read and write
301C00C40000
trusted library allocation
page read and write
301C00BB0000
trusted library allocation
page read and write
301C00D48000
trusted library allocation
page read and write
B362FFD000
stack
page read and write
3F6000354000
trusted library allocation
page read and write
B34B7FE000
unkown
page readonly
301C00E90000
trusted library allocation
page read and write
301C00350000
trusted library allocation
page read and write
3F6000320000
trusted library allocation
page read and write
301C00134000
trusted library allocation
page read and write
B3447FE000
unkown
page readonly
301C003A8000
trusted library allocation
page read and write
2603B411000
heap
page read and write
301C00290000
trusted library allocation
page read and write
B3517FE000
unkown
page readonly
301C009F4000
trusted library allocation
page read and write
3841000
heap
page read and write
2603B96E000
heap
page read and write
3832000
heap
page read and write
B35D7FE000
unkown
page readonly
3B1C000
heap
page read and write
301C0117C000
trusted library allocation
page read and write
61D8002D8000
trusted library allocation
page read and write
B360FFE000
stack
page read and write
301C00601000
trusted library allocation
page read and write
301C00B88000
trusted library allocation
page read and write
301C01124000
trusted library allocation
page read and write
301C00F54000
trusted library allocation
page read and write
61D8002C0000
trusted library allocation
page read and write
3F6000784000
trusted library allocation
page read and write
301C00E01000
trusted library allocation
page read and write
3F60006D0000
trusted library allocation
page read and write
2603B8E1000
heap
page read and write
11080025C000
direct allocation
page read and write
110800220000
direct allocation
page read and write
3F60006AC000
trusted library allocation
page read and write
301C00298000
trusted library allocation
page read and write
301C00304000
trusted library allocation
page read and write
301C00EA7000
trusted library allocation
page read and write
2603B9A8000
heap
page read and write
B35F7FE000
unkown
page readonly
61D800288000
trusted library allocation
page read and write
61D8002C8000
trusted library allocation
page read and write
301C00CDC000
trusted library allocation
page read and write
301C0018C000
trusted library allocation
page read and write
3F6000678000
trusted library allocation
page read and write
301C00330000
trusted library allocation
page read and write
B36DFFE000
stack
page read and write
B344FFE000
stack
page read and write
26037FF0000
trusted library allocation
page read and write
2603B40F000
heap
page read and write
301C0020C000
trusted library allocation
page read and write
301C010C0000
trusted library allocation
page read and write
301C00298000
trusted library allocation
page read and write
3F6000368000
trusted library allocation
page read and write
301C00294000
trusted library allocation
page read and write
38F2000
heap
page read and write
26037FD0000
heap
page read and write
B3577FE000
unkown
page readonly
B342FFE000
stack
page read and write
3F6000374000
trusted library allocation
page read and write
260380F3000
heap
page read and write
26040F4E000
trusted library section
page read and write
26040366000
trusted library section
page read and write
26037F69000
heap
page read and write
301C001D4000
trusted library allocation
page read and write
B356FFC000
stack
page read and write
B350FFA000
stack
page read and write
BE4000
unkown
page readonly
3852000
heap
page read and write
301C000B4000
trusted library allocation
page read and write
301C009CC000
trusted library allocation
page read and write
2604038D000
trusted library section
page read and write
3F6000390000
trusted library allocation
page read and write
6CB11000
unkown
page execute read
301C00F14000
trusted library allocation
page read and write
301C00F80000
trusted library allocation
page read and write
381B000
heap
page read and write
3F6000380000
trusted library allocation
page read and write
2603B9BE000
heap
page read and write
3F6000248000
trusted library allocation
page read and write
301C00F70000
trusted library allocation
page read and write
3F6000704000
trusted library allocation
page read and write
301C00638000
trusted library allocation
page read and write
301C00454000
trusted library allocation
page read and write
B3457FE000
unkown
page readonly
260403C7000
unclassified section
page read and write
301C0017C000
trusted library allocation
page read and write
3885000
heap
page read and write
3F6000624000
trusted library allocation
page read and write
3944000
heap
page read and write
3753000
heap
page read and write
301C0103C000
trusted library allocation
page read and write
39AC000
heap
page read and write
301C00330000
trusted library allocation
page read and write
B364FFE000
stack
page read and write
1108002EC000
direct allocation
page read and write
B351FFE000
stack
page read and write
11080023C000
direct allocation
page read and write
2603FED2000
trusted library allocation
page read and write
301C0033C000
trusted library allocation
page read and write
301C00C40000
trusted library allocation
page read and write
301C001C8000
trusted library allocation
page read and write
301C0021C000
trusted library allocation
page read and write
301C00C84000
trusted library allocation
page read and write
301C012AC000
trusted library allocation
page read and write
110800217000
direct allocation
page read and write
375E000
heap
page read and write
13EA000
heap
page read and write
301C00FA4000
trusted library allocation
page read and write
301C00DA0000
trusted library allocation
page read and write
2603B403000
heap
page read and write
301C00748000
trusted library allocation
page read and write
301C0029A000
trusted library allocation
page read and write
301C003C0000
trusted library allocation
page read and write
301C00201000
trusted library allocation
page read and write
301C00EAC000
trusted library allocation
page read and write
B35FFFE000
stack
page read and write
301C00B48000
trusted library allocation
page read and write
301C00390000
trusted library allocation
page read and write
301C00A54000
trusted library allocation
page read and write
301C002C0000
trusted library allocation
page read and write
3836000
heap
page read and write
B3587FE000
unkown
page readonly
301C00CAC000
trusted library allocation
page read and write
272E000
stack
page read and write
301C00350000
trusted library allocation
page read and write
61D8002F0000
trusted library allocation
page read and write
3903000
heap
page read and write
301C004C0000
trusted library allocation
page read and write
301C00748000
trusted library allocation
page read and write
3F6000601000
trusted library allocation
page read and write
61D8002F4000
trusted library allocation
page read and write
301C00294000
trusted library allocation
page read and write
301C00C0C000
trusted library allocation
page read and write
301C01064000
trusted library allocation
page read and write
301C00298000
trusted library allocation
page read and write
301C0029E000
trusted library allocation
page read and write
ECA000
unkown
page readonly
61D800264000
trusted library allocation
page read and write
B3547FE000
unkown
page readonly
B365FFD000
stack
page read and write
3F600039C000
trusted library allocation
page read and write
301C00728000
trusted library allocation
page read and write
301C00FB4000
trusted library allocation
page read and write
3A71000
heap
page read and write
301C0107C000
trusted library allocation
page read and write
301C00FA4000
trusted library allocation
page read and write
3F6000220000
trusted library allocation
page read and write
B13000
unkown
page write copy
3F6000730000
trusted library allocation
page read and write
61D8002B0000
trusted library allocation
page read and write
301C012BC000
trusted library allocation
page read and write
26037EB7000
heap
page read and write
2603D983000
heap
page read and write
3F6000700000
trusted library allocation
page read and write
301C00E94000
trusted library allocation
page read and write
3F6000668000
trusted library allocation
page read and write
B3687FE000
unkown
page readonly
375E000
heap
page read and write
780000
heap
page read and write
7E0000
heap
page read and write
61D8002C0000
trusted library allocation
page read and write
B34C7FE000
unkown
page readonly
301C00310000
trusted library allocation
page read and write
301C00C44000
trusted library allocation
page read and write
ED1000
unkown
page readonly
301C010A4000
trusted library allocation
page read and write
2603B93C000
heap
page read and write
301C00998000
trusted library allocation
page read and write
3F6000210000
trusted library allocation
page read and write
301C00CBC000
trusted library allocation
page read and write
3F6000330000
trusted library allocation
page read and write
301C00454000
trusted library allocation
page read and write
301C0129C000
trusted library allocation
page read and write
7F0000
heap
page read and write
3753000
heap
page read and write
3F600033C000
trusted library allocation
page read and write
301C008F0000
trusted library allocation
page read and write
26041100000
trusted library section
page read and write
3F6000640000
trusted library allocation
page read and write
B367FFC000
stack
page read and write
301C00350000
trusted library allocation
page read and write
110800215000
direct allocation
page read and write
3881000
heap
page read and write
There are 940 hidden memdumps, click here to show them.