IOC Report
R40XD2LfcZ.exe

loading gif

Files

File Path
Type
Category
Malicious
R40XD2LfcZ.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_R40XD2LfcZ.exe_78205d759938c32ebb275dbc5423e6c683a9fc54_ee6ce8fc_5f87af5b-1e35-4e4b-b88b-504b79c6e9b7\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\VSminERrlSkyavRAgpvj.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD0A.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Oct 27 12:01:45 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE34.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE83.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 51
ASCII text, with very long lines (792)
downloaded
Chrome Cache Entry: 52
ASCII text
downloaded
Chrome Cache Entry: 53
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 54
ASCII text
downloaded
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\R40XD2LfcZ.exe
"C:\Users\user\Desktop\R40XD2LfcZ.exe"
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2496 --field-trial-handle=2208,i,8231713063724163316,18025195405327759724,262144 /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5960 -s 1064

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
http://anglebug.com/34524
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
https://anglebug.com/73209
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://anglebug.com/7369#
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
http://anglebug.com/68766
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://docs.google.com/presentation/
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
http://anglebug.com/57508
unknown
https://chrome.google.com/webstore?hl=en3
unknown
https://issuetracker.google.com/161903006
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://chrome.google.com/webstore?hl=en8
unknown
https://drive-daily-1.corp.google.com/
unknown
http://anglebug.com/5881~
unknown
https://www.youtube.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://docs.google.com/spreadsheets/
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/6141g
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://drive-daily-4.c
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
http://anglebug.com/4551I
unknown
https://clients4.google.com/chrome-sync
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=b8
unknown
http://html4/loose.dtd
unknown
https://chromium-i18n.appspot.com/ssl-aggregate-address/fetch
unknown
http://anglebug.com/6692
unknown
https://anglebug.com/71611
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
https://anglebug.com/7847Y
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
http://anglebug.com/5430H
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fiveji5ht.top
34.175.139.104
malicious
home.fiveji5ht.top
34.175.139.104
malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45
www.google.com
172.217.18.4

IPs

IP
Domain
Country
Malicious
34.175.139.104
fiveji5ht.top
United States
malicious
239.255.255.250
unknown
Reserved
172.217.18.4
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{d2453284-809f-9b6a-7596-f0c7ce09e2d0}\Root\InventoryApplicationFile\r40xd2lfcz.exe|59a0a52c4fec742
ProgramId
\REGISTRY\A\{d2453284-809f-9b6a-7596-f0c7ce09e2d0}\Root\InventoryApplicationFile\r40xd2lfcz.exe|59a0a52c4fec742
FileId
\REGISTRY\A\{d2453284-809f-9b6a-7596-f0c7ce09e2d0}\Root\InventoryApplicationFile\r40xd2lfcz.exe|59a0a52c4fec742
LowerCaseLongPath
\REGISTRY\A\{d2453284-809f-9b6a-7596-f0c7ce09e2d0}\Root\InventoryApplicationFile\r40xd2lfcz.exe|59a0a52c4fec742
LongPathHash
\REGISTRY\A\{d2453284-809f-9b6a-7596-f0c7ce09e2d0}\Root\InventoryApplicationFile\r40xd2lfcz.exe|59a0a52c4fec742
Name
\REGISTRY\A\{d2453284-809f-9b6a-7596-f0c7ce09e2d0}\Root\InventoryApplicationFile\r40xd2lfcz.exe|59a0a52c4fec742
OriginalFileName
\REGISTRY\A\{d2453284-809f-9b6a-7596-f0c7ce09e2d0}\Root\InventoryApplicationFile\r40xd2lfcz.exe|59a0a52c4fec742
Publisher
\REGISTRY\A\{d2453284-809f-9b6a-7596-f0c7ce09e2d0}\Root\InventoryApplicationFile\r40xd2lfcz.exe|59a0a52c4fec742
Version
\REGISTRY\A\{d2453284-809f-9b6a-7596-f0c7ce09e2d0}\Root\InventoryApplicationFile\r40xd2lfcz.exe|59a0a52c4fec742
BinFileVersion
\REGISTRY\A\{d2453284-809f-9b6a-7596-f0c7ce09e2d0}\Root\InventoryApplicationFile\r40xd2lfcz.exe|59a0a52c4fec742
BinaryType
\REGISTRY\A\{d2453284-809f-9b6a-7596-f0c7ce09e2d0}\Root\InventoryApplicationFile\r40xd2lfcz.exe|59a0a52c4fec742
ProductName
\REGISTRY\A\{d2453284-809f-9b6a-7596-f0c7ce09e2d0}\Root\InventoryApplicationFile\r40xd2lfcz.exe|59a0a52c4fec742
ProductVersion
\REGISTRY\A\{d2453284-809f-9b6a-7596-f0c7ce09e2d0}\Root\InventoryApplicationFile\r40xd2lfcz.exe|59a0a52c4fec742
LinkDate
\REGISTRY\A\{d2453284-809f-9b6a-7596-f0c7ce09e2d0}\Root\InventoryApplicationFile\r40xd2lfcz.exe|59a0a52c4fec742
BinProductVersion
\REGISTRY\A\{d2453284-809f-9b6a-7596-f0c7ce09e2d0}\Root\InventoryApplicationFile\r40xd2lfcz.exe|59a0a52c4fec742
AppxPackageFullName
\REGISTRY\A\{d2453284-809f-9b6a-7596-f0c7ce09e2d0}\Root\InventoryApplicationFile\r40xd2lfcz.exe|59a0a52c4fec742
AppxPackageRelativeId
\REGISTRY\A\{d2453284-809f-9b6a-7596-f0c7ce09e2d0}\Root\InventoryApplicationFile\r40xd2lfcz.exe|59a0a52c4fec742
Size
\REGISTRY\A\{d2453284-809f-9b6a-7596-f0c7ce09e2d0}\Root\InventoryApplicationFile\r40xd2lfcz.exe|59a0a52c4fec742
Language
\REGISTRY\A\{d2453284-809f-9b6a-7596-f0c7ce09e2d0}\Root\InventoryApplicationFile\r40xd2lfcz.exe|59a0a52c4fec742
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
388003038000
trusted library allocation
page read and write
8F391FE000
stack
page read and write
5F0000
unkown
page readonly
6CA58000
unkown
page readonly
5F1000
unkown
page execute read
25A40070C000
trusted library allocation
page read and write
3880030BC000
trusted library allocation
page read and write
3880024CC000
trusted library allocation
page read and write
38800280C000
trusted library allocation
page read and write
25A400404000
trusted library allocation
page read and write
388002F6C000
trusted library allocation
page read and write
3570000
heap
page read and write
DFE000
stack
page read and write
388003234000
trusted library allocation
page read and write
25A400220000
trusted library allocation
page read and write
22185F15000
heap
page read and write
388002EA4000
trusted library allocation
page read and write
3880024A4000
trusted library allocation
page read and write
25A400960000
trusted library allocation
page read and write
25A4006E8000
trusted library allocation
page read and write
8F3D1FE000
stack
page read and write
38800234C000
trusted library allocation
page read and write
3880022D0000
trusted library allocation
page read and write
3634000
heap
page read and write
A24002F0000
trusted library allocation
page read and write
6CA59000
unkown
page read and write
3880029B8000
trusted library allocation
page read and write
388002EC0000
trusted library allocation
page read and write
388002AD4000
trusted library allocation
page read and write
A2400278000
trusted library allocation
page read and write
3718000
heap
page read and write
388002E84000
trusted library allocation
page read and write
388002D4C000
trusted library allocation
page read and write
388002580000
trusted library allocation
page read and write
2218996B000
heap
page read and write
2E1E000
stack
page read and write
A24002A0000
trusted library allocation
page read and write
3679000
heap
page read and write
22189410000
heap
page read and write
25A4006E0000
trusted library allocation
page read and write
2218F547000
unclassified section
page read and write
25A400874000
trusted library allocation
page read and write
3880023B4000
trusted library allocation
page read and write
8F449FE000
unkown
page readonly
3880033C8000
trusted library allocation
page read and write
3880032A0000
trusted library allocation
page read and write
25A400898000
trusted library allocation
page read and write
2218FEF3000
trusted library section
page read and write
8F231FC000
stack
page read and write
3880022F0000
trusted library allocation
page read and write
388002C14000
trusted library allocation
page read and write
3570000
heap
page read and write
221899E9000
heap
page read and write
388002960000
trusted library allocation
page read and write
E8C000
stack
page read and write
12D0000
heap
page read and write
388003118000
trusted library allocation
page read and write
1280000
heap
page read and write
22189A18000
heap
page read and write
221899E6000
heap
page read and write
388002594000
trusted library allocation
page read and write
25A400974000
trusted library allocation
page read and write
3880032DC000
trusted library allocation
page read and write
388003124000
trusted library allocation
page read and write
221899E2000
heap
page read and write
2BDA000
heap
page read and write
388002318000
trusted library allocation
page read and write
25A40027C000
trusted library allocation
page read and write
38800293D000
trusted library allocation
page read and write
5F0000
unkown
page readonly
601000
unkown
page readonly
22185E30000
heap
page read and write
2218944C000
heap
page read and write
388002BF4000
trusted library allocation
page read and write
2218945D000
heap
page read and write
2219045D000
trusted library section
page read and write
601000
unkown
page readonly
38800255C000
trusted library allocation
page read and write
7B5C00201000
direct allocation
page read and write
38800338C000
trusted library allocation
page read and write
2218944C000
heap
page read and write
25A4007A0000
trusted library allocation
page read and write
388002E01000
trusted library allocation
page read and write
357B000
heap
page read and write
22189436000
heap
page read and write
388002D88000
trusted library allocation
page read and write
25A400884000
trusted library allocation
page read and write
8F1C1FE000
stack
page read and write
388002568000
trusted library allocation
page read and write
3606000
heap
page read and write
2218943A000
heap
page read and write
369B000
heap
page read and write
22188790000
unkown
page read and write
388003294000
trusted library allocation
page read and write
D1C000
stack
page read and write
36D6000
heap
page read and write
6DE000
unkown
page write copy
6CA0F000
unkown
page readonly
2218945D000
heap
page read and write
8F301FD000
stack
page read and write
3880025A8000
trusted library allocation
page read and write
2218D73E000
heap
page read and write
3880031D8000
trusted library allocation
page read and write
3683000
heap
page read and write
3699000
heap
page read and write
11A0000
heap
page read and write
25A4002D4000
trusted library allocation
page read and write
A24002C8000
trusted library allocation
page read and write
8F299FE000
unkown
page readonly
7B5C00294000
direct allocation
page read and write
388002C70000
trusted library allocation
page read and write
37DB000
heap
page read and write
25A400788000
trusted library allocation
page read and write
22189433000
heap
page read and write
8F239FE000
unkown
page readonly
3880028DE000
trusted library allocation
page read and write
3799000
heap
page read and write
3575000
heap
page read and write
2218942C000
heap
page read and write
22189992000
heap
page read and write
8F1E9FE000
unkown
page readonly
38800247C000
trusted library allocation
page read and write
357B000
heap
page read and write
25A40025C000
trusted library allocation
page read and write
388002594000
trusted library allocation
page read and write
388002CAD000
trusted library allocation
page read and write
11DA000
heap
page read and write
3880023CC000
trusted library allocation
page read and write
3880031C8000
trusted library allocation
page read and write
8F341FC000
stack
page read and write
A2400235000
trusted library allocation
page read and write
2218E290000
heap
page read and write
601000
unkown
page readonly
2EE0000
heap
page read and write
8F249FE000
unkown
page readonly
3880028C4000
trusted library allocation
page read and write
388000601000
trusted library allocation
page read and write
38800320C000
trusted library allocation
page read and write
22189A2F000
heap
page read and write
25A4002B0000
trusted library allocation
page read and write
388002C20000
trusted library allocation
page read and write
22189439000
heap
page read and write
3780000
heap
page read and write
388002A18000
trusted library allocation
page read and write
388002EF0000
trusted library allocation
page read and write
36F3000
heap
page read and write
22185F55000
heap
page read and write
388003144000
trusted library allocation
page read and write
22189436000
heap
page read and write
388003064000
trusted library allocation
page read and write
2A9A000
stack
page read and write
25A4002ED000
trusted library allocation
page read and write
25A400920000
trusted library allocation
page read and write
3571000
heap
page read and write
3880023EC000
trusted library allocation
page read and write
388002410000
trusted library allocation
page read and write
388000C82000
trusted library allocation
page read and write
388002D4C000
trusted library allocation
page read and write
3575000
heap
page read and write
357E000
heap
page read and write
6D7000
unkown
page readonly
22190452000
trusted library section
page read and write
388002D10000
trusted library allocation
page read and write
3880028DB000
trusted library allocation
page read and write
388002801000
trusted library allocation
page read and write
36FC000
heap
page read and write
388002933000
trusted library allocation
page read and write
388002A94000
trusted library allocation
page read and write
25A400844000
trusted library allocation
page read and write
22189437000
heap
page read and write
25A4008C8000
trusted library allocation
page read and write
388002EAC000
trusted library allocation
page read and write
8F419FE000
unkown
page readonly
8F1A9FE000
unkown
page readonly
2218FED0000
trusted library section
page read and write
22186205000
heap
page read and write
3574000
heap
page read and write
7B5C0020C000
direct allocation
page read and write
388002F80000
trusted library allocation
page read and write
25A40078C000
trusted library allocation
page read and write
3880023D0000
trusted library allocation
page read and write
3880026B0000
trusted library allocation
page read and write
22189A2B000
heap
page read and write
2218D6F0000
heap
page read and write
2A5D000
stack
page read and write
3572000
heap
page read and write
3880024A4000
trusted library allocation
page read and write
25A400880000
trusted library allocation
page read and write
586000
unkown
page write copy
388002BB0000
trusted library allocation
page read and write
388002394000
trusted library allocation
page read and write
3880026E0000
trusted library allocation
page read and write
A24002E4000
trusted library allocation
page read and write
A2400238000
trusted library allocation
page read and write
2DDE000
stack
page read and write
38800296C000
trusted library allocation
page read and write
3880031AC000
trusted library allocation
page read and write
388002C58000
trusted library allocation
page read and write
378A000
heap
page read and write
38800300C000
trusted library allocation
page read and write
8F389FE000
unkown
page readonly
25A4006D4000
trusted library allocation
page read and write
388002230000
trusted library allocation
page read and write
25A4008A8000
trusted library allocation
page read and write
3880023A0000
trusted library allocation
page read and write
8F309FE000
unkown
page readonly
357D000
heap
page read and write
25A400778000
trusted library allocation
page read and write
3880023AC000
trusted library allocation
page read and write
388002260000
trusted library allocation
page read and write
388002BA0000
trusted library allocation
page read and write
36AF000
heap
page read and write
388002E7C000
trusted library allocation
page read and write
2218FE27000
unclassified section
page read and write
388003328000
trusted library allocation
page read and write
5FE000
unkown
page write copy
A24002F4000
trusted library allocation
page read and write
A24002BC000
trusted library allocation
page read and write
8F459FE000
unkown
page readonly
388002328000
trusted library allocation
page read and write
25A400840000
trusted library allocation
page read and write
A24002B0000
trusted library allocation
page read and write
25A400948000
trusted library allocation
page read and write
3880033C4000
trusted library allocation
page read and write
38800308C000
trusted library allocation
page read and write
25A400964000
trusted library allocation
page read and write
38800350C000
trusted library allocation
page read and write
25A400248000
trusted library allocation
page read and write
8F1C9FE000
unkown
page readonly
388002DEC000
trusted library allocation
page read and write
388003048000
trusted library allocation
page read and write
388002714000
trusted library allocation
page read and write
3880023AC000
trusted library allocation
page read and write
1250000
heap
page read and write
388003294000
trusted library allocation
page read and write
8F349FE000
unkown
page readonly
22189A2D000
heap
page read and write
388003530000
trusted library allocation
page read and write
357C000
heap
page read and write
38800322C000
trusted library allocation
page read and write
36DF000
heap
page read and write
2218943B000
heap
page read and write
7B5C0024C000
direct allocation
page read and write
38800261C000
trusted library allocation
page read and write
388002E78000
trusted library allocation
page read and write
1260000
heap
page read and write
362B000
heap
page read and write
388002B2C000
trusted library allocation
page read and write
3880030BC000
trusted library allocation
page read and write
38800235C000
trusted library allocation
page read and write
8F2F1FD000
stack
page read and write
7B5C0023C000
direct allocation
page read and write
25A4007AC000
trusted library allocation
page read and write
38800346C000
trusted library allocation
page read and write
388002D80000
trusted library allocation
page read and write
388002F90000
trusted library allocation
page read and write
8F269FE000
unkown
page readonly
388002288000
trusted library allocation
page read and write
6CA0D000
unkown
page read and write
2B10000
heap
page read and write
3880028E4000
trusted library allocation
page read and write
8F191FE000
stack
page read and write
3880024F0000
trusted library allocation
page read and write
38800259C000
trusted library allocation
page read and write
388003194000
trusted library allocation
page read and write
22189433000
heap
page read and write
8F2E1FB000
stack
page read and write
25A4006C8000
trusted library allocation
page read and write
5FA000
unkown
page readonly
22190287000
unclassified section
page read and write
388002E38000
trusted library allocation
page read and write
360C000
heap
page read and write
25A4007C4000
trusted library allocation
page read and write
D1000
unkown
page execute read
A2400260000
trusted library allocation
page read and write
388002E28000
trusted library allocation
page read and write
2218F5B3000
trusted library section
page read and write
A24002BC000
trusted library allocation
page read and write
388003104000
trusted library allocation
page read and write
25A40080C000
trusted library allocation
page read and write
2218942F000
heap
page read and write
388002CD0000
trusted library allocation
page read and write
38800312D000
trusted library allocation
page read and write
22189433000
heap
page read and write
388003201000
trusted library allocation
page read and write
7B5C002A8000
direct allocation
page read and write
3880023DC000
trusted library allocation
page read and write
22189A40000
heap
page read and write
25A400860000
trusted library allocation
page read and write
3880023F8000
trusted library allocation
page read and write
5FE000
unkown
page write copy
25A40085C000
trusted library allocation
page read and write
22185F60000
heap
page read and write
A24002D8000
trusted library allocation
page read and write
38800241C000
trusted library allocation
page read and write
221861F0000
trusted library section
page readonly
38800292C000
trusted library allocation
page read and write
25A40060C000
trusted library allocation
page read and write
38800301C000
trusted library allocation
page read and write
22189429000
heap
page read and write
388002CA4000
trusted library allocation
page read and write
8F2C9FE000
unkown
page readonly
38800259C000
trusted library allocation
page read and write
38800226C000
trusted library allocation
page read and write
A24002A0000
trusted library allocation
page read and write
388002F6C000
trusted library allocation
page read and write
3880022E0000
trusted library allocation
page read and write
2218945D000
heap
page read and write
2218D910000
trusted library allocation
page read and write
388002500000
trusted library allocation
page read and write
8F2A1FE000
stack
page read and write
22189400000
heap
page read and write
357E000
heap
page read and write
3880026BC000
trusted library allocation
page read and write
1330000
heap
page read and write
3880033CC000
trusted library allocation
page read and write
25A4006F4000
trusted library allocation
page read and write
388002B21000
trusted library allocation
page read and write
7B5C002D0000
direct allocation
page read and write
22189968000
heap
page read and write
8F339FE000
unkown
page readonly
3880023D4000
trusted library allocation
page read and write
22189434000
heap
page read and write
25A400728000
trusted library allocation
page read and write
8F2E9FE000
unkown
page readonly
3880031E4000
trusted library allocation
page read and write
3578000
heap
page read and write
388002EE1000
trusted library allocation
page read and write
22189439000
heap
page read and write
388002334000
trusted library allocation
page read and write
388002401000
trusted library allocation
page read and write
25A400894000
trusted library allocation
page read and write
A24002A0000
trusted library allocation
page read and write
25A400700000
trusted library allocation
page read and write
A240020D000
trusted library allocation
page read and write
51B000
unkown
page write copy
370F000
heap
page read and write
A24002F8000
trusted library allocation
page read and write
22189437000
heap
page read and write
3880023E8000
trusted library allocation
page read and write
388002AF0000
trusted library allocation
page read and write
25A400830000
trusted library allocation
page read and write
2218DC32000
trusted library allocation
page read and write
3578000
heap
page read and write
2218F560000
trusted library section
page read and write
388000401000
trusted library allocation
page read and write
8F351FD000
stack
page read and write
25A4006BC000
trusted library allocation
page read and write
25A40095C000
trusted library allocation
page read and write
221899F3000
heap
page read and write
388003090000
trusted library allocation
page read and write
A24002C0000
trusted library allocation
page read and write
3880024C4000
trusted library allocation
page read and write
3880024D0000
trusted library allocation
page read and write
5FE000
unkown
page read and write
388000801000
trusted library allocation
page read and write
A24002BC000
trusted library allocation
page read and write
388002E7C000
trusted library allocation
page read and write
36FC000
heap
page read and write
8F2C1FC000
stack
page read and write
38800254C000
trusted library allocation
page read and write
3880031B8000
trusted library allocation
page read and write
DFC000
stack
page read and write
22189440000
heap
page read and write
2218FEE1000
trusted library section
page read and write
38800255C000
trusted library allocation
page read and write
7B5C00280000
direct allocation
page read and write
3725000
heap
page read and write
365C000
heap
page read and write
25A40071C000
trusted library allocation
page read and write
388002935000
trusted library allocation
page read and write
38800254C000
trusted library allocation
page read and write
22189B80000
trusted library section
page read and write
8F219FE000
unkown
page readonly
3880024A8000
trusted library allocation
page read and write
22185F54000
heap
page read and write
22190490000
trusted library section
page read and write
6E3000
unkown
page readonly
3878000
heap
page read and write
388002690000
trusted library allocation
page read and write
3571000
heap
page read and write
2218E177000
unclassified section
page read and write
8F409FE000
unkown
page readonly
25A4002CC000
trusted library allocation
page read and write
388002E0C000
trusted library allocation
page read and write
388002A40000
trusted library allocation
page read and write
2218D720000
heap
page read and write
3880025D8000
trusted library allocation
page read and write
8F221FB000
stack
page read and write
3880025B4000
trusted library allocation
page read and write
7B5C002AC000
direct allocation
page read and write
3800000
heap
page read and write
2B5E000
unkown
page read and write
388002F80000
trusted library allocation
page read and write
11FC000
stack
page read and write
7B5C00260000
direct allocation
page read and write
388002FD8000
trusted library allocation
page read and write
7B5C00284000
direct allocation
page read and write
25A4006E8000
trusted library allocation
page read and write
38800259C000
trusted library allocation
page read and write
22189A31000
heap
page read and write
5F1000
unkown
page execute read
25A40084C000
trusted library allocation
page read and write
3617000
heap
page read and write
2B00000
heap
page read and write
388002AA4000
trusted library allocation
page read and write
2218D703000
heap
page read and write
8F1A1FE000
stack
page read and write
388002AE4000
trusted library allocation
page read and write
5F0000
unkown
page readonly
25A4007E0000
trusted library allocation
page read and write
7B5C00215000
direct allocation
page read and write
22189428000
heap
page read and write
1430000
heap
page read and write
388002414000
trusted library allocation
page read and write
388002AB8000
trusted library allocation
page read and write
388002FC4000
trusted library allocation
page read and write
A2400248000
trusted library allocation
page read and write
8F3C9FE000
unkown
page readonly
388002FBC000
trusted library allocation
page read and write
3620000
heap
page read and write
A24002BC000
trusted library allocation
page read and write
38800272C000
trusted library allocation
page read and write
8F271FE000
stack
page read and write
3880023E0000
trusted library allocation
page read and write
388002278000
trusted library allocation
page read and write
388003188000
trusted library allocation
page read and write
25A400238000
trusted library allocation
page read and write
1270000
heap
page read and write
A24002C0000
trusted library allocation
page read and write
3880027F4000
trusted library allocation
page read and write
22185E50000
trusted library allocation
page read and write
25A400868000
trusted library allocation
page read and write
388003098000
trusted library allocation
page read and write
25A400904000
trusted library allocation
page read and write
388003250000
trusted library allocation
page read and write
2218FE82000
trusted library section
page read and write
7B5C00290000
direct allocation
page read and write
8F3F9FE000
unkown
page readonly
3880028FC000
trusted library allocation
page read and write
22185F3E000
heap
page read and write
22185E60000
trusted library allocation
page read and write
22185F44000
heap
page read and write
388002CC4000
trusted library allocation
page read and write
10F0000
heap
page read and write
365D000
heap
page read and write
25A400890000
trusted library allocation
page read and write
8F2B9FE000
unkown
page readonly
38800290C000
trusted library allocation
page read and write
22189440000
heap
page read and write
11DE000
heap
page read and write
8F1D9FE000
unkown
page readonly
22187D43000
heap
page read and write
8F2A9FE000
unkown
page readonly
388002C14000
trusted library allocation
page read and write
388002704000
trusted library allocation
page read and write
388002690000
trusted library allocation
page read and write
3570000
heap
page read and write
A24002A0000
trusted library allocation
page read and write
3880027A8000
trusted library allocation
page read and write
3621000
heap
page read and write
388002A0C000
trusted library allocation
page read and write
22189433000
heap
page read and write
2AF0000
heap
page read and write
25A4002F4000
trusted library allocation
page read and write
388003334000
trusted library allocation
page read and write
5FA000
unkown
page readonly
5FE000
unkown
page read and write
22185F60000
heap
page read and write
3571000
heap
page read and write
2218945D000
heap
page read and write
3880032C0000
trusted library allocation
page read and write
388002644000
trusted library allocation
page read and write
25A4008B8000
trusted library allocation
page read and write
388003028000
trusted library allocation
page read and write
22189A38000
heap
page read and write
388003104000
trusted library allocation
page read and write
25A400288000
trusted library allocation
page read and write
3880025EC000
trusted library allocation
page read and write
5FE000
unkown
page write copy
388002E94000
trusted library allocation
page read and write
22189433000
heap
page read and write
388002588000
trusted library allocation
page read and write
388002E7C000
trusted library allocation
page read and write
7B5C00234000
direct allocation
page read and write
2218E1C7000
unclassified section
page read and write
3880024B4000
trusted library allocation
page read and write
22185E70000
heap
page read and write
22185E8E000
heap
page read and write
8F321FC000
stack
page read and write
10B7000
heap
page read and write
38800238C000
trusted library allocation
page read and write
1090000
heap
page read and write
8F3D9FE000
unkown
page readonly
388002690000
trusted library allocation
page read and write
388003274000
trusted library allocation
page read and write
3579000
heap
page read and write
388002FB0000
trusted library allocation
page read and write
8F3F1FE000
stack
page read and write
388002490000
trusted library allocation
page read and write
388002F20000
trusted library allocation
page read and write
388002428000
trusted library allocation
page read and write
388003104000
trusted library allocation
page read and write
388002F14000
trusted library allocation
page read and write
388002B4C000
trusted library allocation
page read and write
367B000
heap
page read and write
388002E50000
trusted library allocation
page read and write
1410000
heap
page read and write
8F2D1FC000
stack
page read and write
22189444000
heap
page read and write
8F2B1FE000
stack
page read and write
5FA000
unkown
page readonly
388002788000
trusted library allocation
page read and write
388002C14000
trusted library allocation
page read and write
25A4008F4000
trusted library allocation
page read and write
2218FE61000
trusted library section
page read and write
5F1000
unkown
page execute read
221904EE000
trusted library section
page read and write
A24002BC000
trusted library allocation
page read and write
388003001000
trusted library allocation
page read and write
22189434000
heap
page read and write
2218FEC0000
trusted library section
page read and write
5FA000
unkown
page readonly
3880024F3000
trusted library allocation
page read and write
8F189FE000
unkown
page readonly
25A4007E4000
trusted library allocation
page read and write
388002F80000
trusted library allocation
page read and write
25A4008E4000
trusted library allocation
page read and write
3574000
heap
page read and write
3880032B0000
trusted library allocation
page read and write
22189A20000
heap
page read and write
3880025D8000
trusted library allocation
page read and write
7B5C00250000
direct allocation
page read and write
22189960000
heap
page read and write
391B000
heap
page read and write
38800315C000
trusted library allocation
page read and write
3880023B4000
trusted library allocation
page read and write
8F401FE000
stack
page read and write
25A4006C8000
trusted library allocation
page read and write
38800260C000
trusted library allocation
page read and write
A24002BC000
trusted library allocation
page read and write
38800255C000
trusted library allocation
page read and write
3880024C4000
trusted library allocation
page read and write
25A400828000
trusted library allocation
page read and write
22189A0A000
heap
page read and write
3570000
heap
page read and write
8F171EF000
stack
page read and write
8F441FE000
stack
page read and write
38800237C000
trusted library allocation
page read and write
2B9F000
unkown
page read and write
22185F64000
heap
page read and write
389E000
heap
page read and write
10AB000
heap
page read and write
36C2000
heap
page read and write
8F469FE000
unkown
page readonly
388003340000
trusted library allocation
page read and write
7B5C00270000
direct allocation
page read and write
11D0000
heap
page read and write
3574000
heap
page read and write
388002C01000
trusted library allocation
page read and write
38800281C000
trusted library allocation
page read and write
3630000
heap
page read and write
3880023F0000
trusted library allocation
page read and write
8F3A9FE000
unkown
page readonly
388002EE3000
trusted library allocation
page read and write
388003358000
trusted library allocation
page read and write
2218FE50000
trusted library section
page read and write
22189434000
heap
page read and write
3880030BC000
trusted library allocation
page read and write
388002E7C000
trusted library allocation
page read and write
374F000
heap
page read and write
388003508000
trusted library allocation
page read and write
5F1000
unkown
page execute read
25A4002B8000
trusted library allocation
page read and write
388002D64000
trusted library allocation
page read and write
172F000
stack
page read and write
388003178000
trusted library allocation
page read and write
38800220C000
trusted library allocation
page read and write
388002639000
trusted library allocation
page read and write
3880025A8000
trusted library allocation
page read and write
A2400274000
trusted library allocation
page read and write
388002E78000
trusted library allocation
page read and write
388002A64000
trusted library allocation
page read and write
388003294000
trusted library allocation
page read and write
388002D78000
trusted library allocation
page read and write
25A4007BC000
trusted library allocation
page read and write
D1000
unkown
page execute read
37CA000
heap
page read and write
1720000
heap
page read and write
8F229FE000
unkown
page readonly
22189429000
heap
page read and write
36E7000
heap
page read and write
148E000
stack
page read and write
388003278000
trusted library allocation
page read and write
22185F64000
heap
page read and write
3880026A0000
trusted library allocation
page read and write
8F369FE000
unkown
page readonly
22189440000
heap
page read and write
388002F6C000
trusted library allocation
page read and write
2218942A000
heap
page read and write
22187D40000
heap
page read and write
8F259FE000
unkown
page readonly
388002B6C000
trusted library allocation
page read and write
25A40020C000
trusted library allocation
page read and write
1438000
heap
page read and write
3570000
heap
page read and write
3471000
heap
page read and write
25A400401000
trusted library allocation
page read and write
388002EE0000
trusted library allocation
page read and write
388002B3C000
trusted library allocation
page read and write
10E0000
heap
page read and write
388003244000
trusted library allocation
page read and write
38800229E000
trusted library allocation
page read and write
221898C0000
trusted library section
page read and write
A24002B0000
trusted library allocation
page read and write
3880025D8000
trusted library allocation
page read and write
3880023B4000
trusted library allocation
page read and write
25A4008EC000
trusted library allocation
page read and write
22189440000
heap
page read and write
388002594000
trusted library allocation
page read and write
388003348000
trusted library allocation
page read and write
36D2000
heap
page read and write
A24002C0000
trusted library allocation
page read and write
388000201000
trusted library allocation
page read and write
388002854000
trusted library allocation
page read and write
2218998E000
heap
page read and write
2218E2D3000
heap
page read and write
388002944000
trusted library allocation
page read and write
388002E38000
trusted library allocation
page read and write
388002C14000
trusted library allocation
page read and write
3571000
heap
page read and write
8F439FE000
unkown
page readonly
388002601000
trusted library allocation
page read and write
22185F11000
heap
page read and write
388003464000
trusted library allocation
page read and write
25A400864000
trusted library allocation
page read and write
A2400250000
trusted library allocation
page read and write
357C000
heap
page read and write
25A40081C000
trusted library allocation
page read and write
38800240C000
trusted library allocation
page read and write
388002848000
trusted library allocation
page read and write
3880023D8000
trusted library allocation
page read and write
388002EE0000
trusted library allocation
page read and write
388002FA0000
trusted library allocation
page read and write
22189A33000
heap
page read and write
2218998A000
heap
page read and write
357A000
heap
page read and write
3880034FC000
trusted library allocation
page read and write
369A000
heap
page read and write
8F3E9FE000
unkown
page readonly
388002A2C000
trusted library allocation
page read and write
3880023AC000
trusted library allocation
page read and write
8F201FE000
stack
page read and write
2218943C000
heap
page read and write
D70000
heap
page read and write
7B5C00303000
direct allocation
page read and write
388002E9C000
trusted library allocation
page read and write
8F211FA000
stack
page read and write
A2400270000
trusted library allocation
page read and write
388002E7C000
trusted library allocation
page read and write
25A40040C000
trusted library allocation
page read and write
8F319FE000
unkown
page readonly
25A400918000
trusted library allocation
page read and write
388000A01000
trusted library allocation
page read and write
3880028B4000
trusted library allocation
page read and write
388002B28000
trusted library allocation
page read and write
25A400790000
trusted library allocation
page read and write
6CA5C000
unkown
page readonly
38C9000
heap
page read and write
8F291FA000
stack
page read and write
3574000
heap
page read and write
388002240000
trusted library allocation
page read and write
36D3000
heap
page read and write
36D0000
heap
page read and write
388002F80000
trusted library allocation
page read and write
25A4006AC000
trusted library allocation
page read and write
388002C14000
trusted library allocation
page read and write
5F1000
unkown
page execute read
25A4008B4000
trusted library allocation
page read and write
2218998C000
heap
page read and write
A2400264000
trusted library allocation
page read and write
168F000
stack
page read and write
8F2D9FE000
unkown
page readonly
8F381FE000
stack
page read and write
3880023C4000
trusted library allocation
page read and write
3880028D9000
trusted library allocation
page read and write
25A4006AC000
trusted library allocation
page read and write
3572000
heap
page read and write
38800351C000
trusted library allocation
page read and write
22185DE0000
heap
page read and write
6C930000
unkown
page readonly
8F461FE000
stack
page read and write
388003274000
trusted library allocation
page read and write
3573000
heap
page read and write
357E000
heap
page read and write
8F329FE000
unkown
page readonly
388000001000
trusted library allocation
page read and write
38EF000
heap
page read and write
22189C60000
trusted library section
page read and write
388002B00000
trusted library allocation
page read and write
1750000
heap
page read and write
38800240C000
trusted library allocation
page read and write
8F1E1FB000
stack
page read and write
388002978000
trusted library allocation
page read and write
3880022A8000
trusted library allocation
page read and write
388002774000
trusted library allocation
page read and write
5F0000
unkown
page readonly
388003054000
trusted library allocation
page read and write
38800296E000
trusted library allocation
page read and write
8F1F1FB000
stack
page read and write
388000E01000
trusted library allocation
page read and write
388002574000
trusted library allocation
page read and write
8F411FA000
stack
page read and write
388002C98000
trusted library allocation
page read and write
25A40091C000
trusted library allocation
page read and write
8F289FE000
unkown
page readonly
22189964000
heap
page read and write
3880033B4000
trusted library allocation
page read and write
2218944C000
heap
page read and write
38800337C000
trusted library allocation
page read and write
3880031AC000
trusted library allocation
page read and write
3571000
heap
page read and write
8F1D1FD000
stack
page read and write
A2400288000
trusted library allocation
page read and write
6C931000
unkown
page execute read
221904E0000
trusted library section
page read and write
8F3C1FD000
stack
page read and write
388002E78000
trusted library allocation
page read and write
2218FFB0000
trusted library section
page read and write
388002E18000
trusted library allocation
page read and write
388003220000
trusted library allocation
page read and write
25A4007D4000
trusted library allocation
page read and write
3880024A4000
trusted library allocation
page read and write
3880026B0000
trusted library allocation
page read and write
3880023B4000
trusted library allocation
page read and write
8F331FC000
stack
page read and write
388002588000
trusted library allocation
page read and write
388002BD8000
trusted library allocation
page read and write
388002F80000
trusted library allocation
page read and write
388002A01000
trusted library allocation
page read and write
5FA000
unkown
page readonly
388003464000
trusted library allocation
page read and write
388002420000
trusted library allocation
page read and write
7B5C00210000
direct allocation
page read and write
2218F57E000
trusted library section
page read and write
22186200000
heap
page read and write
38800227E000
trusted library allocation
page read and write
5F0000
unkown
page readonly
8F1F9FE000
unkown
page readonly
38800340C000
trusted library allocation
page read and write
388003150000
trusted library allocation
page read and write
388002684000
trusted library allocation
page read and write
388003168000
trusted library allocation
page read and write
388002D04000
trusted library allocation
page read and write
8F251FE000
stack
page read and write
374A000
heap
page read and write
8F399FE000
unkown
page readonly
3572000
heap
page read and write
25A4006F0000
trusted library allocation
page read and write
388002FCC000
trusted library allocation
page read and write
5F1000
unkown
page execute read
25A400878000
trusted library allocation
page read and write
3880034FC000
trusted library allocation
page read and write
388002418000
trusted library allocation
page read and write
3880025C8000
trusted library allocation
page read and write
388003294000
trusted library allocation
page read and write
388002ECC000
trusted library allocation
page read and write
388002F50000
trusted library allocation
page read and write
2218F610000
trusted library section
page read and write
4A2E000
heap
page read and write
22185F64000
heap
page read and write
8F3A1FE000
stack
page read and write
25A40082C000
trusted library allocation
page read and write
25A4008F0000
trusted library allocation
page read and write
36B0000
heap
page read and write
388002BC8000
trusted library allocation
page read and write
388002880000
trusted library allocation
page read and write
22189440000
heap
page read and write
3718000
heap
page read and write
192E000
stack
page read and write
2218FB20000
trusted library section
page read and write
8F421FC000
stack
page read and write
22185DF0000
heap
page readonly
357D000
heap
page read and write
25A40079C000
trusted library allocation
page read and write
3579000
heap
page read and write
25A4009D0000
trusted library allocation
page read and write
36BD000
heap
page read and write
A24002C0000
trusted library allocation
page read and write
388002594000
trusted library allocation
page read and write
2218943D000
heap
page read and write
367B000
heap
page read and write
8F281FD000
stack
page read and write
25A400601000
trusted library allocation
page read and write
367A000
heap
page read and write
388002948000
trusted library allocation
page read and write
2218943B000
heap
page read and write
22189A0D000
heap
page read and write
8F379FE000
unkown
page readonly
5FE000
unkown
page read and write
394C000
heap
page read and write
22190436000
trusted library section
page read and write
25A400248000
trusted library allocation
page read and write
8F1B9FE000
unkown
page readonly
22185F6E000
heap
page read and write
388003064000
trusted library allocation
page read and write
25A400424000
trusted library allocation
page read and write
388002C0C000
trusted library allocation
page read and write
25A4006AC000
trusted library allocation
page read and write
25A4008C4000
trusted library allocation
page read and write
25A400818000
trusted library allocation
page read and write
25A400210000
trusted library allocation
page read and write
22189A4A000
heap
page read and write
601000
unkown
page readonly
388002E7C000
trusted library allocation
page read and write
8F241FE000
stack
page read and write
601000
unkown
page readonly
388003318000
trusted library allocation
page read and write
3880000BA000
trusted library allocation
page read and write
38800339C000
trusted library allocation
page read and write
3880023F4000
trusted library allocation
page read and write
25A400801000
trusted library allocation
page read and write
A24002B0000
trusted library allocation
page read and write
3880026B4000
trusted library allocation
page read and write
221899D3000
heap
page read and write
3615000
heap
page read and write
36B5000
heap
page read and write
25A4007C0000
trusted library allocation
page read and write
388002A78000
trusted library allocation
page read and write
25A400201000
trusted library allocation
page read and write
25A400418000
trusted library allocation
page read and write
38800285C000
trusted library allocation
page read and write
22185F42000
heap
page read and write
3576000
heap
page read and write
7B5C002E4000
direct allocation
page read and write
3880029DC000
trusted library allocation
page read and write
25A40087C000
trusted library allocation
page read and write
601000
unkown
page readonly
22189440000
heap
page read and write
7B5C00230000
direct allocation
page read and write
388002594000
trusted library allocation
page read and write
22189433000
heap
page read and write
388002690000
trusted library allocation
page read and write
3754000
heap
page read and write
388002CB8000
trusted library allocation
page read and write
3841000
heap
page read and write
388002C34000
trusted library allocation
page read and write
22185E78000
heap
page read and write
3880031A4000
trusted library allocation
page read and write
3571000
heap
page read and write
8F181FD000
unkown
page read and write
8F3E1FE000
stack
page read and write
DBE000
stack
page read and write
388003401000
trusted library allocation
page read and write
8F311FD000
stack
page read and write
A2400201000
trusted library allocation
page read and write
388002430000
trusted library allocation
page read and write
22189440000
heap
page read and write
7B5C002EC000
direct allocation
page read and write
5F0000
unkown
page readonly
8F361FB000
stack
page read and write
365B000
heap
page read and write
8F279FE000
unkown
page readonly
22189437000
heap
page read and write
8F429FE000
unkown
page readonly
388002F3C000
trusted library allocation
page read and write
2218FFBE000
trusted library section
page read and write
388002201000
trusted library allocation
page read and write
388002A54000
trusted library allocation
page read and write
11FD000
stack
page read and write
388003310000
trusted library allocation
page read and write
25A40039C000
trusted library allocation
page read and write
25A400850000
trusted library allocation
page read and write
25A4008D8000
trusted library allocation
page read and write
388001001000
trusted library allocation
page read and write
388002F04000
trusted library allocation
page read and write
A2400220000
trusted library allocation
page read and write
36A8000
heap
page read and write
388002798000
trusted library allocation
page read and write
2218945D000
heap
page read and write
388003098000
trusted library allocation
page read and write
7B5C00274000
direct allocation
page read and write
388002E7C000
trusted library allocation
page read and write
388002690000
trusted library allocation
page read and write
388003528000
trusted library allocation
page read and write
3880032A0000
trusted library allocation
page read and write
22189A16000
heap
page read and write
25A400848000
trusted library allocation
page read and write
388002424000
trusted library allocation
page read and write
25A4002E4000
trusted library allocation
page read and write
8F209FE000
unkown
page readonly
38800325C000
trusted library allocation
page read and write
25A400230000
trusted library allocation
page read and write
25A40039C000
trusted library allocation
page read and write
38800255C000
trusted library allocation
page read and write
8F1B1FE000
stack
page read and write
357F000
heap
page read and write
388003104000
trusted library allocation
page read and write
2218FE70000
trusted library section
page read and write
8F431FE000
stack
page read and write
38800291C000
trusted library allocation
page read and write
22185E00000
heap
page read and write
8F2F9FE000
unkown
page readonly
38800310C000
trusted library allocation
page read and write
8F451FD000
stack
page read and write
372D000
heap
page read and write
3880027D8000
trusted library allocation
page read and write
3880024A8000
trusted library allocation
page read and write
3880024A8000
trusted library allocation
page read and write
388003104000
trusted library allocation
page read and write
38800254C000
trusted library allocation
page read and write
5FA000
unkown
page readonly
7B5C002DC000
direct allocation
page read and write
2218E2D0000
heap
page read and write
8F371FB000
stack
page read and write
3880024F0000
trusted library allocation
page read and write
2218D71A000
heap
page read and write
388003112000
trusted library allocation
page read and write
22185F1D000
heap
page read and write
D0000
unkown
page readonly
108C000
stack
page read and write
25A400408000
trusted library allocation
page read and write
38800220C000
trusted library allocation
page read and write
3579000
heap
page read and write
388002D5C000
trusted library allocation
page read and write
1287000
heap
page read and write
388002FC4000
trusted library allocation
page read and write
8F3B9FE000
unkown
page readonly
3880024C8000
trusted library allocation
page read and write
3880030BC000
trusted library allocation
page read and write
3880027C0000
trusted library allocation
page read and write
388002B97000
trusted library allocation
page read and write
38800236C000
trusted library allocation
page read and write
8F3B1FE000
stack
page read and write
A24002C0000
trusted library allocation
page read and write
3578000
heap
page read and write
8F359FE000
unkown
page readonly
3880023E4000
trusted library allocation
page read and write
388002ED8000
trusted library allocation
page read and write
22189A1E000
heap
page read and write
3880024A4000
trusted library allocation
page read and write
388002BE4000
trusted library allocation
page read and write
38800308C000
trusted library allocation
page read and write
357D000
heap
page read and write
7B5C00220000
direct allocation
page read and write
36B5000
heap
page read and write
7B5C00217000
direct allocation
page read and write
22189690000
heap
page read and write
375D000
heap
page read and write
38800242C000
trusted library allocation
page read and write
22189A28000
heap
page read and write
374A000
heap
page read and write
2218FE8E000
trusted library section
page read and write
388003194000
trusted library allocation
page read and write
25A400430000
trusted library allocation
page read and write
10AD000
heap
page read and write
388003138000
trusted library allocation
page read and write
22189440000
heap
page read and write
2218F920000
trusted library section
page read and write
3880024B8000
trusted library allocation
page read and write
25A4008E8000
trusted library allocation
page read and write
22189A3A000
heap
page read and write
3880025BC000
trusted library allocation
page read and write
A2400230000
trusted library allocation
page read and write
388000C01000
trusted library allocation
page read and write
388003284000
trusted library allocation
page read and write
A2400294000
trusted library allocation
page read and write
2BD0000
heap
page read and write
25A400250000
trusted library allocation
page read and write
388002FEC000
trusted library allocation
page read and write
3880023AC000
trusted library allocation
page read and write
2218F572000
trusted library section
page read and write
38800270C000
trusted library allocation
page read and write
3705000
heap
page read and write
388003370000
trusted library allocation
page read and write
58F000
unkown
page readonly
22185F60000
heap
page read and write
A24002BC000
trusted library allocation
page read and write
8F261FE000
stack
page read and write
25A4002FC000
trusted library allocation
page read and write
3880024A4000
trusted library allocation
page read and write
There are 971 hidden memdumps, click here to show them.