IOC Report
9xNI7vE1XO.exe

loading gif

Files

File Path
Type
Category
Malicious
9xNI7vE1XO.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_9xNI7vE1XO.exe_c06fa4b91387f416a53f72b421d9ec613c20fbc9_e96a7e40_8a9a4df9-0459-43c7-ab06-e3790a96dc66\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8746.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Oct 28 18:07:27 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER894B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER89F8.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\gAyLaylSYmFkGzQujoEc.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\9xNI7vE1XO.exe
"C:\Users\user\Desktop\9xNI7vE1XO.exe"
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2656 --field-trial-handle=2412,i,8244738278220938971,4279238056225373594,262144 /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 432 -s 548

URLs

Name
IP
Malicious
http://thirtjo13vt.top/v1/upload.php
46.173.214.92
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
http://anglebug.com/3832;
unknown
http://anglebug.com/3965;
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
http://anglebug.com/4836;
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://anglebug.com/7488;
unknown
http://unisolated.invalid/
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/3586;
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
http://anglebug.com/6048;
unknown
http://anglebug.com/8229;
unknown
http://anglebug.com/5371;
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://issuetracker.google.com/issues/1664752735
unknown
http://anglebug.com/4551;
unknown
http://anglebug.com/6439;
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/5055;
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
http://anglebug.com/3584;
unknown
https://drive-preprod.corp.google.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icoK
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
http://anglebug.com/5421;
unknown
http://anglebug.com/5881;
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://anglebug.com/6141;
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
thirtjo13vt.top
46.173.214.92
malicious
home.thirtjo13vt.top
46.173.214.92
malicious
www.google.com
142.250.184.228

IPs

IP
Domain
Country
Malicious
46.173.214.92
thirtjo13vt.top
Russian Federation
malicious
239.255.255.250
unknown
Reserved
142.250.184.228
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
ProgramId
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
FileId
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
LowerCaseLongPath
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
LongPathHash
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
Name
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
OriginalFileName
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
Publisher
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
Version
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
BinFileVersion
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
BinaryType
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
ProductName
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
ProductVersion
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
LinkDate
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
BinProductVersion
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
AppxPackageFullName
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
AppxPackageRelativeId
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
Size
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
Language
\REGISTRY\A\{73e9ead4-e883-b433-3fce-9bd5b6bc2fb7}\Root\InventoryApplicationFile\9xni7ve1xo.exe|c0c2bc86fee1bd12
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
DF37000
heap
page read and write
4BB0001B4000
trusted library allocation
page read and write
4BB0002A4000
trusted library allocation
page read and write
3508006D4000
trusted library allocation
page read and write
327A000
stack
page read and write
4BB000D58000
trusted library allocation
page read and write
2429D383000
heap
page read and write
4BB000ECC000
trusted library allocation
page read and write
4BB000719000
trusted library allocation
page read and write
35080025C000
trusted library allocation
page read and write
2429CDB3000
heap
page read and write
4BB000CB4000
trusted library allocation
page read and write
584E000
heap
page read and write
4BB000850000
trusted library allocation
page read and write
4BB000F8C000
trusted library allocation
page read and write
14A0000
heap
page read and write
3B3B000
heap
page read and write
399F000
heap
page read and write
4BB000C78000
trusted library allocation
page read and write
3A79000
heap
page read and write
4BB0001E4000
trusted library allocation
page read and write
4BB000E10000
trusted library allocation
page read and write
3360000
heap
page read and write
4BB000310000
trusted library allocation
page read and write
4BB00106C000
trusted library allocation
page read and write
3A9E000
heap
page read and write
4BB000C74000
trusted library allocation
page read and write
4BB000B78000
trusted library allocation
page read and write
3508006B4000
trusted library allocation
page read and write
7A5EFFE000
unkown
page readonly
7A427FE000
stack
page read and write
3994000
heap
page read and write
4BB0002CC000
trusted library allocation
page read and write
2429993C000
heap
page read and write
242A1470000
trusted library section
page read and write
399C000
heap
page read and write
4BB000801000
trusted library allocation
page read and write
242A3A4E000
trusted library section
page read and write
1A6C000
heap
page read and write
7A5FFFE000
unkown
page readonly
7A5DFFE000
unkown
page readonly
350800354000
trusted library allocation
page read and write
7A527FC000
stack
page read and write
2429D33D000
heap
page read and write
3B5C000
heap
page read and write
7A397FE000
stack
page read and write
350800248000
trusted library allocation
page read and write
7A39FFE000
unkown
page readonly
4BB000370000
trusted library allocation
page read and write
16A0000
heap
page read and write
4BB000830000
trusted library allocation
page read and write
4BB00063C000
trusted library allocation
page read and write
242A1AB7000
unclassified section
page read and write
7A387FE000
stack
page read and write
4BB00020C000
trusted library allocation
page read and write
350800784000
trusted library allocation
page read and write
4BB000710000
trusted library allocation
page read and write
350800648000
trusted library allocation
page read and write
4BB000C0C000
trusted library allocation
page read and write
5D44002C0000
trusted library allocation
page read and write
350800250000
trusted library allocation
page read and write
4BB0007C8000
trusted library allocation
page read and write
2429D313000
heap
page read and write
4BB000EB4000
trusted library allocation
page read and write
4BB00033C000
trusted library allocation
page read and write
242999A0000
heap
page read and write
7A49FFE000
unkown
page readonly
1650000
heap
page read and write
4BB000D80000
trusted library allocation
page read and write
4BB000DC4000
trusted library allocation
page read and write
350800668000
trusted library allocation
page read and write
4BB0002A8000
trusted library allocation
page read and write
3990000
heap
page read and write
2429D3BA000
heap
page read and write
4BB000B38000
trusted library allocation
page read and write
4BB0002AC000
trusted library allocation
page read and write
4BB0007B4000
trusted library allocation
page read and write
5D44002BC000
trusted library allocation
page read and write
3996000
heap
page read and write
4BB000690000
trusted library allocation
page read and write
4BB000201000
trusted library allocation
page read and write
2429CDC0000
heap
page read and write
350800620000
trusted library allocation
page read and write
F11000
unkown
page readonly
4BB00097C000
trusted library allocation
page read and write
7A4FFFE000
unkown
page readonly
2429D327000
heap
page read and write
4BB0004B0000
trusted library allocation
page read and write
242A1578000
heap
page read and write
4BB00035C000
trusted library allocation
page read and write
7A38FFE000
unkown
page readonly
5D44002BC000
trusted library allocation
page read and write
4BB0004B0000
trusted library allocation
page read and write
4BB00000C000
trusted library allocation
page read and write
4BB000EC0000
trusted library allocation
page read and write
788000290000
direct allocation
page read and write
5D44002BC000
trusted library allocation
page read and write
5D44002A0000
trusted library allocation
page read and write
4BB000224000
trusted library allocation
page read and write
3B21000
heap
page read and write
788000230000
direct allocation
page read and write
E1C000
stack
page read and write
4BB00061C000
trusted library allocation
page read and write
242A2EE2000
trusted library section
page read and write
7A40FFE000
unkown
page readonly
7A377FF000
stack
page read and write
3993000
heap
page read and write
4BB000924000
trusted library allocation
page read and write
350800610000
trusted library allocation
page read and write
4BB0004A4000
trusted library allocation
page read and write
4BB000B9C000
trusted library allocation
page read and write
350800320000
trusted library allocation
page read and write
4BB00054C000
trusted library allocation
page read and write
4BB000C24000
trusted library allocation
page read and write
4BB00087C000
trusted library allocation
page read and write
4BB0001B4000
trusted library allocation
page read and write
5D44002C0000
trusted library allocation
page read and write
F0A000
unkown
page readonly
2429CDBE000
heap
page read and write
7A64FFE000
unkown
page readonly
7A3D7FC000
stack
page read and write
4BB000BC0000
trusted library allocation
page read and write
4BB000074000
trusted library allocation
page read and write
6C81F000
unkown
page readonly
3B2F000
heap
page read and write
78800024C000
direct allocation
page read and write
2429D34B000
heap
page read and write
3AD6000
heap
page read and write
350800237000
trusted library allocation
page read and write
147E000
stack
page read and write
5D44002F8000
trusted library allocation
page read and write
3ADD000
heap
page read and write
242A2FE2000
trusted library section
page read and write
3B00000
heap
page read and write
4BB0001D4000
trusted library allocation
page read and write
3508006EC000
trusted library allocation
page read and write
7A497FE000
stack
page read and write
4BB000544000
trusted library allocation
page read and write
3310000
heap
page read and write
24299895000
heap
page read and write
3C99000
heap
page read and write
788000220000
direct allocation
page read and write
7A55FFE000
unkown
page readonly
350800744000
trusted library allocation
page read and write
242A380E000
trusted library section
page read and write
4BB000FE0000
trusted library allocation
page read and write
4BB000E78000
trusted library allocation
page read and write
4BB00080C000
trusted library allocation
page read and write
3A96000
heap
page read and write
242A3CD1000
trusted library section
page read and write
7A647FE000
stack
page read and write
4BB001030000
trusted library allocation
page read and write
4BB000D14000
trusted library allocation
page read and write
4BB000454000
trusted library allocation
page read and write
4BB0002A4000
trusted library allocation
page read and write
4BB000787000
trusted library allocation
page read and write
4BB0009D8000
trusted library allocation
page read and write
4BB000C20000
trusted library allocation
page read and write
3998000
heap
page read and write
24299AB0000
heap
page read and write
7A4BFFE000
unkown
page readonly
4BB000DAC000
trusted library allocation
page read and write
7A597FD000
stack
page read and write
EF0000
heap
page read and write
15B0000
heap
page read and write
5D44002BC000
trusted library allocation
page read and write
4BB000B34000
trusted library allocation
page read and write
3B2A000
heap
page read and write
35CF000
stack
page read and write
3508002C4000
trusted library allocation
page read and write
4BB0001E0000
trusted library allocation
page read and write
7A457FD000
stack
page read and write
4BB0002C4000
trusted library allocation
page read and write
2429CD80000
heap
page read and write
5D4400270000
trusted library allocation
page read and write
78800025C000
direct allocation
page read and write
7A63FFE000
unkown
page readonly
4BB000F48000
trusted library allocation
page read and write
4BB000740000
trusted library allocation
page read and write
4BB000BF8000
trusted library allocation
page read and write
358E000
stack
page read and write
7A517FC000
stack
page read and write
16A2000
heap
page read and write
4BB00109C000
trusted library allocation
page read and write
7A58FFE000
unkown
page readonly
7A487FE000
stack
page read and write
7A5BFFE000
unkown
page readonly
3B3B000
heap
page read and write
3508002B0000
trusted library allocation
page read and write
35080027C000
trusted library allocation
page read and write
4BB000C35000
trusted library allocation
page read and write
6C81D000
unkown
page read and write
4BB000E01000
trusted library allocation
page read and write
4BB0002B8000
trusted library allocation
page read and write
4BB000454000
trusted library allocation
page read and write
7A3CFFE000
unkown
page readonly
4BB000D6C000
trusted library allocation
page read and write
F01000
unkown
page execute read
16D0000
heap
page read and write
5D4400260000
trusted library allocation
page read and write
4BB0002A4000
trusted library allocation
page read and write
3A82000
heap
page read and write
3991000
heap
page read and write
350800750000
trusted library allocation
page read and write
4BB000304000
trusted library allocation
page read and write
4BB00033C000
trusted library allocation
page read and write
2429D336000
heap
page read and write
7A52FFE000
unkown
page readonly
16A0000
heap
page read and write
7A43FFE000
unkown
page readonly
5D4400264000
trusted library allocation
page read and write
3995000
heap
page read and write
7A46FFE000
unkown
page readonly
4BB000690000
trusted library allocation
page read and write
4BB000FB8000
trusted library allocation
page read and write
4BB000AFC000
trusted library allocation
page read and write
4BB000F3C000
trusted library allocation
page read and write
4BB00103C000
trusted library allocation
page read and write
4BB00018C000
trusted library allocation
page read and write
350800704000
trusted library allocation
page read and write
3380000
heap
page read and write
7A59FFE000
unkown
page readonly
4BB0000EC000
trusted library allocation
page read and write
4BB000782000
trusted library allocation
page read and write
242A1B33000
heap
page read and write
4BB000B88000
trusted library allocation
page read and write
5D4400238000
trusted library allocation
page read and write
5D44002C0000
trusted library allocation
page read and write
1BCF000
stack
page read and write
4BB000A28000
trusted library allocation
page read and write
4BB000194000
trusted library allocation
page read and write
1699000
heap
page read and write
4BB000494000
trusted library allocation
page read and write
4BB000210000
trusted library allocation
page read and write
4BB0000B4000
trusted library allocation
page read and write
350800418000
trusted library allocation
page read and write
3A9B000
heap
page read and write
242A2F86000
trusted library section
page read and write
242A2EEE000
trusted library section
page read and write
242A2FED000
trusted library section
page read and write
16A6000
heap
page read and write
4BB000C6C000
trusted library allocation
page read and write
DA1000
unkown
page write copy
4BB000304000
trusted library allocation
page read and write
350800288000
trusted library allocation
page read and write
7A61FFE000
unkown
page readonly
3B3A000
heap
page read and write
4BB0009D3000
trusted library allocation
page read and write
7A3AFFE000
unkown
page readonly
4BB0000DC000
trusted library allocation
page read and write
4BB000938000
trusted library allocation
page read and write
3AE7000
heap
page read and write
2429CDAE000
heap
page read and write
3508003EC000
trusted library allocation
page read and write
13FC000
stack
page read and write
4BB00069C000
trusted library allocation
page read and write
2429D2E0000
heap
page read and write
3AB1000
heap
page read and write
7A3EFFE000
unkown
page readonly
DD26000
heap
page read and write
3993000
heap
page read and write
788000294000
direct allocation
page read and write
5D44002F4000
trusted library allocation
page read and write
4BB000DF0000
trusted library allocation
page read and write
3B8E000
heap
page read and write
350800310000
trusted library allocation
page read and write
E7A8000
heap
page read and write
4BB000E58000
trusted library allocation
page read and write
2429D398000
heap
page read and write
3993000
heap
page read and write
5D4400248000
trusted library allocation
page read and write
7A437FE000
stack
page read and write
7A557FB000
stack
page read and write
2429D389000
heap
page read and write
4BB000FB8000
trusted library allocation
page read and write
2429CDAE000
heap
page read and write
4BB0002F7000
trusted library allocation
page read and write
242A2EB0000
heap
page read and write
4BB000FC8000
trusted library allocation
page read and write
4BB0007E8000
trusted library allocation
page read and write
350800684000
trusted library allocation
page read and write
350800730000
trusted library allocation
page read and write
1B0D000
heap
page read and write
16CE000
heap
page read and write
350800380000
trusted library allocation
page read and write
F0A000
unkown
page readonly
7A44FFE000
unkown
page readonly
4BB00017C000
trusted library allocation
page read and write
4BB0003A0000
trusted library allocation
page read and write
4BB001104000
trusted library allocation
page read and write
4BB00021C000
trusted library allocation
page read and write
35080035C000
trusted library allocation
page read and write
4BB0002C4000
trusted library allocation
page read and write
D46000
unkown
page write copy
7A3A7FE000
stack
page read and write
F0E000
unkown
page write copy
4E4E000
heap
page read and write
3508007D0000
trusted library allocation
page read and write
788000234000
direct allocation
page read and write
7A5C7FE000
stack
page read and write
16E0000
heap
page read and write
4BB000ECC000
trusted library allocation
page read and write
2429F550000
trusted library allocation
page read and write
5D44002F0000
trusted library allocation
page read and write
242A3DAD000
trusted library section
page read and write
350800320000
trusted library allocation
page read and write
3508006F0000
trusted library allocation
page read and write
4BB000EC0000
trusted library allocation
page read and write
350800788000
trusted library allocation
page read and write
350800201000
trusted library allocation
page read and write
350800368000
trusted library allocation
page read and write
4BB0001E8000
trusted library allocation
page read and write
4BB001080000
trusted library allocation
page read and write
4BB000A0C000
trusted library allocation
page read and write
3990000
heap
page read and write
4BB000DE0000
trusted library allocation
page read and write
3508006E4000
trusted library allocation
page read and write
F11000
unkown
page readonly
3AE9000
heap
page read and write
350800364000
trusted library allocation
page read and write
2429B723000
heap
page read and write
242A1B30000
heap
page read and write
5D44002E4000
trusted library allocation
page read and write
4BB000EAC000
trusted library allocation
page read and write
5D44002C8000
trusted library allocation
page read and write
7A45FFE000
unkown
page readonly
4BB00078C000
trusted library allocation
page read and write
4BB000E0C000
trusted library allocation
page read and write
350800390000
trusted library allocation
page read and write
788000303000
direct allocation
page read and write
3996000
heap
page read and write
4BB000954000
trusted library allocation
page read and write
4BB000CE0000
trusted library allocation
page read and write
3993000
heap
page read and write
5D4400220000
trusted library allocation
page read and write
F0E000
unkown
page read and write
242A3C51000
trusted library section
page read and write
4BB000A30000
trusted library allocation
page read and write
4BB000218000
trusted library allocation
page read and write
2429D387000
heap
page read and write
788000270000
direct allocation
page read and write
350800310000
trusted library allocation
page read and write
F0E000
unkown
page write copy
4BB00040C000
trusted library allocation
page read and write
F0A000
unkown
page readonly
4BB000B14000
trusted library allocation
page read and write
7A567FB000
stack
page read and write
4BB0007D8000
trusted library allocation
page read and write
4BB000CB4000
trusted library allocation
page read and write
7A5A7FD000
stack
page read and write
7A65FFE000
unkown
page readonly
4BB000EEC000
trusted library allocation
page read and write
350800694000
trusted library allocation
page read and write
7A4D7FC000
stack
page read and write
35080020C000
trusted library allocation
page read and write
4BB000CB4000
trusted library allocation
page read and write
5D4400294000
trusted library allocation
page read and write
3AA1000
heap
page read and write
4BB000E44000
trusted library allocation
page read and write
F01000
unkown
page execute read
4BB000D48000
trusted library allocation
page read and write
4BB000330000
trusted library allocation
page read and write
4BB000C40000
trusted library allocation
page read and write
4BB000E6D000
trusted library allocation
page read and write
4BB0010B8000
trusted library allocation
page read and write
788000250000
direct allocation
page read and write
5D44002BD000
trusted library allocation
page read and write
4BB0009CB000
trusted library allocation
page read and write
4BB000E68000
trusted library allocation
page read and write
2429D3E0000
trusted library section
page read and write
5D44002A0000
trusted library allocation
page read and write
E9C000
stack
page read and write
4BB0001AC000
trusted library allocation
page read and write
4BB00031C000
trusted library allocation
page read and write
7A367FE000
unkown
page read and write
1A01000
heap
page read and write
3995000
heap
page read and write
4BB000228000
trusted library allocation
page read and write
7A5B7FD000
stack
page read and write
4BB000044000
trusted library allocation
page read and write
7A48FFE000
unkown
page readonly
4BB000FE4000
trusted library allocation
page read and write
399C000
heap
page read and write
3508006AC000
trusted library allocation
page read and write
E70000
heap
page read and write
6C868000
unkown
page readonly
7880002AC000
direct allocation
page read and write
3508002B8000
trusted library allocation
page read and write
4BB000D17000
trusted library allocation
page read and write
4BB001044000
trusted library allocation
page read and write
4BB000BC8000
trusted library allocation
page read and write
4BB000785000
trusted library allocation
page read and write
7A417FC000
stack
page read and write
7A4C7FD000
stack
page read and write
4BB000988000
trusted library allocation
page read and write
4BB000908000
trusted library allocation
page read and write
4BB0004C0000
trusted library allocation
page read and write
4BB000E3C000
trusted library allocation
page read and write
3508007E0000
trusted library allocation
page read and write
143E000
stack
page read and write
7880002EC000
direct allocation
page read and write
5D4400235000
trusted library allocation
page read and write
4BB0001C4000
trusted library allocation
page read and write
1699000
heap
page read and write
4BB0002F3000
trusted library allocation
page read and write
7A53FFE000
unkown
page readonly
3A5F000
heap
page read and write
4BB0005D8000
trusted library allocation
page read and write
4BB000454000
trusted library allocation
page read and write
5D4400274000
trusted library allocation
page read and write
4BB000D3C000
trusted library allocation
page read and write
4BB000380000
trusted library allocation
page read and write
350800330000
trusted library allocation
page read and write
242A3800000
trusted library section
page read and write
4BB000F0C000
trusted library allocation
page read and write
7A407FB000
stack
page read and write
4BB000CF8000
trusted library allocation
page read and write
3AE2000
heap
page read and write
2429D430000
trusted library section
page read and write
4BB000F2C000
trusted library allocation
page read and write
4BB0002D0000
trusted library allocation
page read and write
242A3C7E000
trusted library section
page read and write
4BB000658000
trusted library allocation
page read and write
3BD6000
heap
page read and write
4BB000DC8000
trusted library allocation
page read and write
350800330000
trusted library allocation
page read and write
16DE000
heap
page read and write
4BB000AE0000
trusted library allocation
page read and write
3BBD000
heap
page read and write
242A156B000
heap
page read and write
5D4400250000
trusted library allocation
page read and write
4BB000124000
trusted library allocation
page read and write
350800248000
trusted library allocation
page read and write
350800770000
trusted library allocation
page read and write
350800348000
trusted library allocation
page read and write
4BB0008B4000
trusted library allocation
page read and write
5D4400201000
trusted library allocation
page read and write
F0E000
unkown
page write copy
8D0000
unkown
page readonly
4BB000DC8000
trusted library allocation
page read and write
335F000
unkown
page read and write
7A3E7FD000
stack
page read and write
5D44002B0000
trusted library allocation
page read and write
3990000
heap
page read and write
4BB000F8C000
trusted library allocation
page read and write
78800026C000
direct allocation
page read and write
EF8000
unkown
page write copy
6C741000
unkown
page execute read
3508006D0000
trusted library allocation
page read and write
24299888000
heap
page read and write
7A507FC000
stack
page read and write
350800688000
trusted library allocation
page read and write
4BB0001EC000
trusted library allocation
page read and write
4BB000B78000
trusted library allocation
page read and write
4BB000DD4000
trusted library allocation
page read and write
4BB000C01000
trusted library allocation
page read and write
4BB000FB8000
trusted library allocation
page read and write
323D000
stack
page read and write
F0A000
unkown
page readonly
242A3C72000
trusted library section
page read and write
4BB0008E0000
trusted library allocation
page read and write
24299860000
heap
page readonly
350800624000
trusted library allocation
page read and write
3991000
heap
page read and write
4BB000F8C000
trusted library allocation
page read and write
7A47FFE000
unkown
page readonly
7A4F7FD000
stack
page read and write
4BB0001AC000
trusted library allocation
page read and write
4BB0001F0000
trusted library allocation
page read and write
4BB000484000
trusted library allocation
page read and write
3A78000
heap
page read and write
7A60FFE000
unkown
page readonly
7A3FFFE000
unkown
page readonly
F00000
unkown
page readonly
350800754000
trusted library allocation
page read and write
4BB000AB0000
trusted library allocation
page read and write
4BB000344000
trusted library allocation
page read and write
4BB0006D0000
trusted library allocation
page read and write
4BB00031C000
trusted library allocation
page read and write
3508002F2000
trusted library allocation
page read and write
7A4AFFE000
unkown
page readonly
4BB000EA0000
trusted library allocation
page read and write
13FC000
stack
page read and write
399A000
heap
page read and write
4BB000001000
trusted library allocation
page read and write
5D44002D8000
trusted library allocation
page read and write
4BB000E72000
trusted library allocation
page read and write
5D44002BC000
trusted library allocation
page read and write
1692000
heap
page read and write
399F000
heap
page read and write
399F000
heap
page read and write
7A537FB000
stack
page read and write
2429D374000
heap
page read and write
242A3C40000
trusted library section
page read and write
16CE000
heap
page read and write
4BB000ECC000
trusted library allocation
page read and write
3AF4000
heap
page read and write
4BB000798000
trusted library allocation
page read and write
350800714000
trusted library allocation
page read and write
4BB000401000
trusted library allocation
page read and write
4BB00038C000
trusted library allocation
page read and write
242A3A17000
unclassified section
page read and write
4BB0000FC000
trusted library allocation
page read and write
4BB0001B4000
trusted library allocation
page read and write
350800644000
trusted library allocation
page read and write
4BB000A38000
trusted library allocation
page read and write
3AA5000
heap
page read and write
4BB0006AC000
trusted library allocation
page read and write
16CE000
heap
page read and write
4BB000F18000
trusted library allocation
page read and write
4BB000EC0000
trusted library allocation
page read and write
350800630000
trusted library allocation
page read and write
4BB0006DC000
trusted library allocation
page read and write
35080075C000
trusted library allocation
page read and write
4BB000080000
trusted library allocation
page read and write
399A000
heap
page read and write
24299880000
heap
page read and write
3508007CC000
trusted library allocation
page read and write
3508006E0000
trusted library allocation
page read and write
3508007B4000
trusted library allocation
page read and write
4BB000CCC000
trusted library allocation
page read and write
4BB00100C000
trusted library allocation
page read and write
4BB0003BD000
trusted library allocation
page read and write
16CE000
heap
page read and write
350800368000
trusted library allocation
page read and write
1695000
heap
page read and write
24299980000
heap
page read and write
350800640000
trusted library allocation
page read and write
7A41FFE000
unkown
page readonly
3AB4000
heap
page read and write
3A5E000
heap
page read and write
F00000
unkown
page readonly
2429D390000
heap
page read and write
4BB000E48000
trusted library allocation
page read and write
3991000
heap
page read and write
EC0000
heap
page read and write
7A447FE000
stack
page read and write
3610000
heap
page read and write
4BB000D90000
trusted library allocation
page read and write
5D44002BC000
trusted library allocation
page read and write
2429D030000
heap
page read and write
2429CDBF000
heap
page read and write
3508006E8000
trusted library allocation
page read and write
350800354000
trusted library allocation
page read and write
4BB00092C000
trusted library allocation
page read and write
2429D36C000
heap
page read and write
4BB0000AC000
trusted library allocation
page read and write
4BB00005F000
trusted library allocation
page read and write
4BB000BB4000
trusted library allocation
page read and write
3A7F000
heap
page read and write
168D000
heap
page read and write
242A0FE2000
trusted library allocation
page read and write
7A51FFE000
unkown
page readonly
F01000
unkown
page execute read
5D4400278000
trusted library allocation
page read and write
16CE000
heap
page read and write
2429CDBB000
heap
page read and write
4BB001090000
trusted library allocation
page read and write
2429CDB6000
heap
page read and write
2429D300000
heap
page read and write
4BB000E34000
trusted library allocation
page read and write
6C869000
unkown
page read and write
4BB000310000
trusted library allocation
page read and write
7A4DFFC000
stack
page read and write
788000280000
direct allocation
page read and write
4BB000CBC000
trusted library allocation
page read and write
242A34C0000
trusted library allocation
page read and write
4BB0004E8000
trusted library allocation
page read and write
4BB000FD4000
trusted library allocation
page read and write
4BB0002B4000
trusted library allocation
page read and write
3994000
heap
page read and write
4BB000C8C000
trusted library allocation
page read and write
8D1000
unkown
page execute read
7A3B7FD000
stack
page read and write
2429D304000
heap
page read and write
32C0000
heap
page read and write
4BB001030000
trusted library allocation
page read and write
4BB0002F0000
trusted library allocation
page read and write
2429CD90000
heap
page read and write
4BB000F94000
trusted library allocation
page read and write
350800720000
trusted library allocation
page read and write
7880002A8000
direct allocation
page read and write
4BB000A01000
trusted library allocation
page read and write
3C4A000
heap
page read and write
35080069C000
trusted library allocation
page read and write
4BB000EDC000
trusted library allocation
page read and write
350800374000
trusted library allocation
page read and write
163B000
heap
page read and write
5D44002BC000
trusted library allocation
page read and write
1645000
heap
page read and write
5D44002A0000
trusted library allocation
page read and write
399D000
heap
page read and write
3508002CC000
trusted library allocation
page read and write
4BB0005C8000
trusted library allocation
page read and write
35080040C000
trusted library allocation
page read and write
6A6F8000
direct allocation
page read and write
3A55000
heap
page read and write
35080035C000
trusted library allocation
page read and write
35080033C000
trusted library allocation
page read and write
4BB000CB4000
trusted library allocation
page read and write
242A3DA2000
trusted library section
page read and write
4BB000304000
trusted library allocation
page read and write
350800320000
trusted library allocation
page read and write
350800404000
trusted library allocation
page read and write
242A3020000
trusted library section
page read and write
4BB0002A4000
trusted library allocation
page read and write
4BB000DB8000
trusted library allocation
page read and write
F0E000
unkown
page read and write
7880002E4000
direct allocation
page read and write
788000217000
direct allocation
page read and write
7880002D0000
direct allocation
page read and write
4BB0009AC000
trusted library allocation
page read and write
4BB000330000
trusted library allocation
page read and write
350800424000
trusted library allocation
page read and write
3996000
heap
page read and write
5D4400230000
trusted library allocation
page read and write
4BB0001DC000
trusted library allocation
page read and write
4BB000550000
trusted library allocation
page read and write
4BB0004DC000
trusted library allocation
page read and write
3508002DC000
trusted library allocation
page read and write
7880002DC000
direct allocation
page read and write
2429D31A000
heap
page read and write
3508006CC000
trusted library allocation
page read and write
4BB000D10000
trusted library allocation
page read and write
4BB0002A4000
trusted library allocation
page read and write
4BB000F08000
trusted library allocation
page read and write
4BB00052C000
trusted library allocation
page read and write
4BB0010EC000
trusted library allocation
page read and write
4BB000220000
trusted library allocation
page read and write
4BB00022C000
trusted library allocation
page read and write
F11000
unkown
page readonly
2429991E000
heap
page read and write
2429991A000
heap
page read and write
350800230000
trusted library allocation
page read and write
4BB00015C000
trusted library allocation
page read and write
4BB0001AC000
trusted library allocation
page read and write
3991000
heap
page read and write
4BB000E20000
trusted library allocation
page read and write
2429CE80000
trusted library section
page readonly
350800401000
trusted library allocation
page read and write
4BB00008C000
trusted library allocation
page read and write
788000210000
direct allocation
page read and write
35080033C000
trusted library allocation
page read and write
350800210000
trusted library allocation
page read and write
4BB001060000
trusted library allocation
page read and write
4BB000454000
trusted library allocation
page read and write
4BB000C50000
trusted library allocation
page read and write
35080060C000
trusted library allocation
page read and write
FF0000
heap
page read and write
4BB000E90000
trusted library allocation
page read and write
350800614000
trusted library allocation
page read and write
7A587FE000
stack
page read and write
4BB0003B1000
trusted library allocation
page read and write
242A3CC0000
trusted library section
page read and write
7A57FFE000
unkown
page readonly
242A1AE7000
unclassified section
page read and write
4BB000D24000
trusted library allocation
page read and write
4BB000750000
trusted library allocation
page read and write
7A62FFE000
unkown
page readonly
2429D341000
heap
page read and write
3CE4000
heap
page read and write
F11000
unkown
page readonly
4BB000520000
trusted library allocation
page read and write
4BB0001F4000
trusted library allocation
page read and write
2429989D000
heap
page read and write
7A617FA000
stack
page read and write
2429D311000
heap
page read and write
1B06000
heap
page read and write
2429B720000
heap
page read and write
3B17000
heap
page read and write
4BB000BCC000
trusted library allocation
page read and write
4BB000746000
trusted library allocation
page read and write
5D440020C000
trusted library allocation
page read and write
4BB000350000
trusted library allocation
page read and write
4BB0005B4000
trusted library allocation
page read and write
7A5AFFE000
unkown
page readonly
5D44002A0000
trusted library allocation
page read and write
350800320000
trusted library allocation
page read and write
F0A000
unkown
page readonly
242A3A40000
trusted library section
page read and write
4BB0001D8000
trusted library allocation
page read and write
EFD000
unkown
page readonly
7A4EFFE000
unkown
page readonly
4BB00020C000
trusted library allocation
page read and write
3BFB000
heap
page read and write
4BB0005EC000
trusted library allocation
page read and write
3B63000
heap
page read and write
350800724000
trusted library allocation
page read and write
4BB0001B4000
trusted library allocation
page read and write
4BB00009F000
trusted library allocation
page read and write
1651000
heap
page read and write
4BB000690000
trusted library allocation
page read and write
3C79000
heap
page read and write
338B000
heap
page read and write
4BB000F64000
trusted library allocation
page read and write
4BB000300000
trusted library allocation
page read and write
4BB000454000
trusted library allocation
page read and write
7A467FA000
stack
page read and write
2429D385000
heap
page read and write
4BB000601000
trusted library allocation
page read and write
4BB000E84000
trusted library allocation
page read and write
4BB000ABC000
trusted library allocation
page read and write
19CE000
stack
page read and write
4BB00038C000
trusted library allocation
page read and write
3AC1000
heap
page read and write
4BB000D60000
trusted library allocation
page read and write
4BB000C74000
trusted library allocation
page read and write
F00000
unkown
page readonly
24299937000
heap
page read and write
4BB00033C000
trusted library allocation
page read and write
4BB0006F0000
trusted library allocation
page read and write
163F000
heap
page read and write
4BB000CF0000
trusted library allocation
page read and write
3999000
heap
page read and write
4BB0002A8000
trusted library allocation
page read and write
4BB000F20000
trusted library allocation
page read and write
4BB00038C000
trusted library allocation
page read and write
DAA000
unkown
page readonly
4BB000CE8000
trusted library allocation
page read and write
4BB000304000
trusted library allocation
page read and write
3992000
heap
page read and write
4BB0001F8000
trusted library allocation
page read and write
3998000
heap
page read and write
4BB000214000
trusted library allocation
page read and write
2429D2F7000
heap
page read and write
4BB00001C000
trusted library allocation
page read and write
4BB000344000
trusted library allocation
page read and write
F0A000
unkown
page readonly
2429CDB2000
heap
page read and write
4BB000328000
trusted library allocation
page read and write
4BB0004E0000
trusted library allocation
page read and write
3995000
heap
page read and write
3A3A000
heap
page read and write
6C86C000
unkown
page readonly
16DA000
heap
page read and write
788000284000
direct allocation
page read and write
399B000
heap
page read and write
2429C170000
unkown
page read and write
4BB000EFC000
trusted library allocation
page read and write
4BB00060C000
trusted library allocation
page read and write
788000201000
direct allocation
page read and write
4BB000068000
trusted library allocation
page read and write
4BB0002B8000
trusted library allocation
page read and write
24299780000
heap
page read and write
4BB000680000
trusted library allocation
page read and write
4BB0001CC000
trusted library allocation
page read and write
35080080C000
trusted library allocation
page read and write
350800220000
trusted library allocation
page read and write
242A13F0000
trusted library section
page read and write
4BB000A6C000
trusted library allocation
page read and write
4BB0004B0000
trusted library allocation
page read and write
4BB0004B0000
trusted library allocation
page read and write
350800700000
trusted library allocation
page read and write
3A8D000
heap
page read and write
3990000
heap
page read and write
F00000
unkown
page readonly
5D44002C0000
trusted library allocation
page read and write
7A50FFE000
unkown
page readonly
24299AB5000
heap
page read and write
5D44002BC000
trusted library allocation
page read and write
350800698000
trusted library allocation
page read and write
164F000
heap
page read and write
4BB0001A0000
trusted library allocation
page read and write
242A3DE0000
trusted library section
page read and write
3AF6000
heap
page read and write
4BB000547000
trusted library allocation
page read and write
350800734000
trusted library allocation
page read and write
4BB001050000
trusted library allocation
page read and write
3ADE000
heap
page read and write
4BB00016C000
trusted library allocation
page read and write
4BB0004B0000
trusted library allocation
page read and write
5D44002C0000
trusted library allocation
page read and write
4BB00074C000
trusted library allocation
page read and write
3508007C8000
trusted library allocation
page read and write
3C2B000
heap
page read and write
3B00000
heap
page read and write
4BB000B94000
trusted library allocation
page read and write
4BB000890000
trusted library allocation
page read and write
3508002FC000
trusted library allocation
page read and write
F11000
unkown
page readonly
3A53000
heap
page read and write
7A577FE000
stack
page read and write
3BAA000
heap
page read and write
3508006B8000
trusted library allocation
page read and write
4BB0005A0000
trusted library allocation
page read and write
4BB000C24000
trusted library allocation
page read and write
242A3D86000
trusted library section
page read and write
3B11000
heap
page read and write
3BCD000
heap
page read and write
F00000
unkown
page readonly
4BB000F64000
trusted library allocation
page read and write
3993000
heap
page read and write
7A4A7FE000
stack
page read and write
4BB000CA8000
trusted library allocation
page read and write
242999D0000
trusted library allocation
page read and write
4BB000230000
trusted library allocation
page read and write
350800658000
trusted library allocation
page read and write
3995000
heap
page read and write
1B00000
heap
page read and write
3891000
heap
page read and write
F01000
unkown
page execute read
4BB000D2C000
trusted library allocation
page read and write
4BB000AD0000
trusted library allocation
page read and write
350800408000
trusted library allocation
page read and write
4BB000B08000
trusted library allocation
page read and write
2429D318000
heap
page read and write
7A4CFFE000
unkown
page readonly
2429D37C000
heap
page read and write
4BB000734000
trusted library allocation
page read and write
7A56FFE000
unkown
page readonly
1727000
heap
page read and write
242999C0000
trusted library allocation
page read and write
7A5E7FE000
stack
page read and write
4BB000A90000
trusted library allocation
page read and write
1720000
heap
page read and write
4BB000134000
trusted library allocation
page read and write
F11000
unkown
page readonly
4BB00033C000
trusted library allocation
page read and write
7A3BFFE000
unkown
page readonly
3508006FC000
trusted library allocation
page read and write
4BB001001000
trusted library allocation
page read and write
4BB0008F4000
trusted library allocation
page read and write
78800023C000
direct allocation
page read and write
242A1487000
unclassified section
page read and write
7A657FB000
stack
page read and write
35080078C000
trusted library allocation
page read and write
7A42FFE000
unkown
page readonly
350800758000
trusted library allocation
page read and write
7A54FFE000
unkown
page readonly
7A5D7FE000
stack
page read and write
4BB000724000
trusted library allocation
page read and write
4BB000E20000
trusted library allocation
page read and write
7A547FD000
stack
page read and write
4BB000AEC000
trusted library allocation
page read and write
3508006C4000
trusted library allocation
page read and write
7A4E7FE000
unkown
page readonly
4BB000044000
trusted library allocation
page read and write
4BB000CB7000
trusted library allocation
page read and write
788000215000
direct allocation
page read and write
4BB000874000
trusted library allocation
page read and write
7A357EF000
stack
page read and write
350800430000
trusted library allocation
page read and write
4BB0010F4000
trusted library allocation
page read and write
350800760000
trusted library allocation
page read and write
35080039C000
trusted library allocation
page read and write
4BB0004DC000
trusted library allocation
page read and write
4BB000DC8000
trusted library allocation
page read and write
F0E000
unkown
page write copy
6C740000
unkown
page readonly
3B1F000
heap
page read and write
3A9E000
heap
page read and write
3508002EC000
trusted library allocation
page read and write
2429CDB2000
heap
page read and write
7A4B7FA000
stack
page read and write
3993000
heap
page read and write
3508002F4000
trusted library allocation
page read and write
7A637FE000
stack
page read and write
F01000
unkown
page execute read
242A2F43000
trusted library section
page read and write
3AA8000
heap
page read and write
F01000
unkown
page execute read
5D4400288000
trusted library allocation
page read and write
4BB00014C000
trusted library allocation
page read and write
7A3C7FB000
stack
page read and write
1650000
heap
page read and write
7A5CFFE000
unkown
page readonly
7A607FE000
stack
page read and write
350800678000
trusted library allocation
page read and write
2429D381000
heap
page read and write
4BB0001D0000
trusted library allocation
page read and write
F00000
unkown
page readonly
242A3CB0000
trusted library section
page read and write
5D44002B0000
trusted library allocation
page read and write
242A1540000
heap
page read and write
4BB0004FC000
trusted library allocation
page read and write
350800330000
trusted library allocation
page read and write
2429CDA9000
heap
page read and write
1692000
heap
page read and write
242A3C60000
trusted library section
page read and write
7A3DFFE000
unkown
page readonly
3508006B0000
trusted library allocation
page read and write
4BB001018000
trusted library allocation
page read and write
399A000
heap
page read and write
242A35C0000
trusted library section
page read and write
4BB000364000
trusted library allocation
page read and write
399C000
heap
page read and write
4BB000290000
trusted library allocation
page read and write
350800664000
trusted library allocation
page read and write
4BB00066C000
trusted library allocation
page read and write
78800020C000
direct allocation
page read and write
7A3F7FA000
stack
page read and write
4BB000760000
trusted library allocation
page read and write
1B07000
heap
page read and write
350800601000
trusted library allocation
page read and write
7A627FC000
stack
page read and write
7A5F7FE000
stack
page read and write
3CBE000
heap
page read and write
1540000
heap
page read and write
3B34000
heap
page read and write
242A3CE3000
trusted library section
page read and write
1BA3000
heap
page read and write
4BB00027C000
trusted library allocation
page read and write
4BB0008C4000
trusted library allocation
page read and write
330E000
unkown
page read and write
3C63000
heap
page read and write
7A477FE000
stack
page read and write
3508006C8000
trusted library allocation
page read and write
399C000
heap
page read and write
399F000
heap
page read and write
4BB000B28000
trusted library allocation
page read and write
399D000
heap
page read and write
There are 901 hidden memdumps, click here to show them.