IOC Report
xLgTQcFdIJ.exe

loading gif

Files

File Path
Type
Category
Malicious
xLgTQcFdIJ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\EHDHDHIECG.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\Google\Chrome\updater.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_xLgTQcFdIJ.exe_dd6ea0e2c09e1c1bded28d521c1295fa3317e372_f2215a07_be74a088-061c-47ad-b527-a61f1d2ac303\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\chrome.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\chrome_131[1].exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\System32\drivers\etc\hosts
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\BGIJJKKJ
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\DBAEGCGC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\ECAKKKKJDBKKFIEBKEHDGCAFCB
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\GCGDGHCBGDHJJKECAECB
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KFBFCAFCBKFIEBFHIDBA
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\KFIDAFBFBKFHJJKEHIEGIEHDAF
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KKFCAAKFBAEHJJJJDHIE
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xed2ffad7, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERADFB.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Nov 1 12:42:32 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAFF0.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB04E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB05C.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB0DA.tmp.txt
data
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4lxn3pxg.ghy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4xwb3vns.trm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k4jokapo.lug.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z42qrlkd.3sd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 100
ASCII text, with very long lines (1302)
downloaded
Chrome Cache Entry: 101
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 95
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 96
ASCII text, with very long lines (2287)
downloaded
Chrome Cache Entry: 97
ASCII text, with very long lines (785)
downloaded
Chrome Cache Entry: 98
ASCII text
downloaded
Chrome Cache Entry: 99
ASCII text, with very long lines (65531)
downloaded
There are 42 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\xLgTQcFdIJ.exe
"C:\Users\user\Desktop\xLgTQcFdIJ.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 --field-trial-handle=2260,i,8336973660302099987,9170347431899203215,262144 /prefetch:8
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\ProgramData\EHDHDHIECG.exe"
malicious
C:\ProgramData\EHDHDHIECG.exe
"C:\ProgramData\EHDHDHIECG.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop UsoSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop WaaSMedicSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop wuauserv
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop bits
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop dosvc
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop eventlog
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"
malicious
C:\ProgramData\Google\Chrome\updater.exe
C:\ProgramData\Google\Chrome\updater.exe
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 6956 -ip 6956
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6956 -s 2296
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wusa.exe
wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 33 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://95.215.207.176/70d63ca8a5be6cc3/freebl3.dll
95.215.207.176
malicious
http://95.215.207.176/70d63ca8a5be6cc3/softokn3.dll
95.215.207.176
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://google-ohttp-relay-join.fastly-edge.com/.
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://google-ohttp-relay-join.fastly-edge.com/1
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://google-ohttp-relay-join.fastly-edge.com/;
unknown
https://issuetracker.google.com/284462263
unknown
https://google-ohttp-relay-join.fastly-edge.com/8
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://google-ohttp-relay-join.fastly-edge.com/B
unknown
https://publickeyservice.gcp.privacysandboxservices.com
unknown
https://google-ohttp-relay-join.fastly-edge.com/G
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://google-ohttp-relay-join.fastly-edge.com/E
unknown
https://publickeyservice.pa.aws.privacysandboxservices.com
unknown
https://g.live.com/odclientsettings/Prod.C:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
https://google-ohttp-relay-join.fastly-edge.com/O
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://google-ohttp-relay-join.fastly-edge.com/Q
unknown
https://www.google.com/chrome/tips/
unknown
https://google-ohttp-relay-join.fastly-edge.com/V
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
https://google-ohttp-relay-join.fastly-edge.com/T
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
https://google-ohttp-relay-join.fastly-edge.com/Y
unknown
http://anglebug.com/6929
unknown
https://google-ohttp-relay-join.fastly-edge.com/c
unknown
http://anglebug.com/5281
unknown
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
unknown
https://www.youtube.com/?feature=ytca
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://95.215.207.176=0
unknown
https://google-ohttp-relay-join.fastly-edge.com/e
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/34980
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview
unknown
https://www.google.com/tools/feedback/chrome/__submit0
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.ver)
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://issuetracker.google.com/161903006
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17mluIFdhbGxldHxmbmpobWtoaG1rYm
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://chrome.google.com/webstore?hl=en;
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://95.215.207.176/70d63ca8a5be6cc3/vcruntime140.dllP
unknown
http://anglebug.com/5375
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SGzW6IeCawI.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AACA/rs=AHpOoo-5biO9jua-6zCEovdoDJ8SLzd6sw/cb=gapi.loaded_0
142.250.186.46
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
http://95.215.207.176d8ddb681db736e16.phption:
unknown
https://clients4.google.com/chrome-sync
unknown
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
https://google-ohttp-relay-join.fastly-edge.com/$
unknown
http://unisolated.invalid/a
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17WdsYWhtbmRlZHwxfDB8MHxab2hvIF
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEklyCreate
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
apis.google.com
unknown
malicious
plus.l.google.com
142.250.186.46
play.google.com
142.250.185.142
www.google.com
172.217.18.100
perseverclinic.com
87.106.236.48

IPs

IP
Domain
Country
Malicious
192.168.2.4
unknown
unknown
malicious
95.215.207.176
unknown
Ukraine
malicious
142.250.186.46
plus.l.google.com
United States
87.106.236.48
perseverclinic.com
Germany
239.255.255.250
unknown
Reserved
142.250.185.142
play.google.com
United States
127.0.0.1
unknown
unknown
172.217.18.100
www.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT
DontOfferThroughWUAU
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\6956
Terminator
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\6956
Reason
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\6956
CreationTime
\REGISTRY\A\{cccaff6f-3add-327c-fe1d-f8a6ed957155}\Root\InventoryApplicationFile\xlgtqcfdij.exe|fc86273a3bf9b1c9
ProgramId
\REGISTRY\A\{cccaff6f-3add-327c-fe1d-f8a6ed957155}\Root\InventoryApplicationFile\xlgtqcfdij.exe|fc86273a3bf9b1c9
FileId
\REGISTRY\A\{cccaff6f-3add-327c-fe1d-f8a6ed957155}\Root\InventoryApplicationFile\xlgtqcfdij.exe|fc86273a3bf9b1c9
LowerCaseLongPath
\REGISTRY\A\{cccaff6f-3add-327c-fe1d-f8a6ed957155}\Root\InventoryApplicationFile\xlgtqcfdij.exe|fc86273a3bf9b1c9
LongPathHash
\REGISTRY\A\{cccaff6f-3add-327c-fe1d-f8a6ed957155}\Root\InventoryApplicationFile\xlgtqcfdij.exe|fc86273a3bf9b1c9
Name
\REGISTRY\A\{cccaff6f-3add-327c-fe1d-f8a6ed957155}\Root\InventoryApplicationFile\xlgtqcfdij.exe|fc86273a3bf9b1c9
OriginalFileName
\REGISTRY\A\{cccaff6f-3add-327c-fe1d-f8a6ed957155}\Root\InventoryApplicationFile\xlgtqcfdij.exe|fc86273a3bf9b1c9
Publisher
\REGISTRY\A\{cccaff6f-3add-327c-fe1d-f8a6ed957155}\Root\InventoryApplicationFile\xlgtqcfdij.exe|fc86273a3bf9b1c9
Version
\REGISTRY\A\{cccaff6f-3add-327c-fe1d-f8a6ed957155}\Root\InventoryApplicationFile\xlgtqcfdij.exe|fc86273a3bf9b1c9
BinFileVersion
\REGISTRY\A\{cccaff6f-3add-327c-fe1d-f8a6ed957155}\Root\InventoryApplicationFile\xlgtqcfdij.exe|fc86273a3bf9b1c9
BinaryType
\REGISTRY\A\{cccaff6f-3add-327c-fe1d-f8a6ed957155}\Root\InventoryApplicationFile\xlgtqcfdij.exe|fc86273a3bf9b1c9
ProductName
\REGISTRY\A\{cccaff6f-3add-327c-fe1d-f8a6ed957155}\Root\InventoryApplicationFile\xlgtqcfdij.exe|fc86273a3bf9b1c9
ProductVersion
\REGISTRY\A\{cccaff6f-3add-327c-fe1d-f8a6ed957155}\Root\InventoryApplicationFile\xlgtqcfdij.exe|fc86273a3bf9b1c9
LinkDate
\REGISTRY\A\{cccaff6f-3add-327c-fe1d-f8a6ed957155}\Root\InventoryApplicationFile\xlgtqcfdij.exe|fc86273a3bf9b1c9
BinProductVersion
\REGISTRY\A\{cccaff6f-3add-327c-fe1d-f8a6ed957155}\Root\InventoryApplicationFile\xlgtqcfdij.exe|fc86273a3bf9b1c9
AppxPackageFullName
\REGISTRY\A\{cccaff6f-3add-327c-fe1d-f8a6ed957155}\Root\InventoryApplicationFile\xlgtqcfdij.exe|fc86273a3bf9b1c9
AppxPackageRelativeId
\REGISTRY\A\{cccaff6f-3add-327c-fe1d-f8a6ed957155}\Root\InventoryApplicationFile\xlgtqcfdij.exe|fc86273a3bf9b1c9
Size
\REGISTRY\A\{cccaff6f-3add-327c-fe1d-f8a6ed957155}\Root\InventoryApplicationFile\xlgtqcfdij.exe|fc86273a3bf9b1c9
Language
\REGISTRY\A\{cccaff6f-3add-327c-fe1d-f8a6ed957155}\Root\InventoryApplicationFile\xlgtqcfdij.exe|fc86273a3bf9b1c9
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4880000
direct allocation
page execute and read and write
malicious
4960000
direct allocation
page read and write
malicious
2F69000
heap
page read and write
malicious
400000
unkown
page execute and read and write
malicious
307C00C30000
trusted library allocation
page read and write
307C01C54000
trusted library allocation
page read and write
307C002A4000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
307C02C01000
trusted library allocation
page read and write
307C00D7C000
trusted library allocation
page read and write
9B9787F000
stack
page read and write
1D6182EB000
heap
page read and write
1D618861000
heap
page read and write
1D6182DA000
heap
page read and write
1D6182EB000
heap
page read and write
23435000
heap
page read and write
307C0079D000
trusted library allocation
page read and write
1A81440E000
heap
page read and write
1D6182EB000
heap
page read and write
1D6182DA000
heap
page read and write
169BC3A0000
heap
page read and write
18FCFA9E000
heap
page read and write
DB582CC000
stack
page read and write
2E543180000
direct allocation
page read and write
2A859210000
heap
page read and write
238A0000
remote allocation
page read and write
307C01D94000
trusted library allocation
page read and write
1D6182E0000
heap
page read and write
4284002FC000
trusted library allocation
page read and write
7FF6D4372000
unkown
page readonly
307C01AC0000
trusted library allocation
page read and write
307C01ABC000
trusted library allocation
page read and write
307C008C4000
trusted library allocation
page read and write
1D6182EB000
heap
page read and write
307C002C4000
trusted library allocation
page read and write
1D6182DA000
heap
page read and write
1D6182E0000
heap
page read and write
381CC7E000
unkown
page readonly
20DC8B90000
heap
page read and write
1D6182DD000
heap
page read and write
307C00601000
trusted library allocation
page read and write
FDFA8DD000
stack
page read and write
18FD0113000
heap
page read and write
307C00F4C000
trusted library allocation
page read and write
307C01394000
trusted library allocation
page read and write
307C01848000
trusted library allocation
page read and write
1D6182DA000
heap
page read and write
1203FE000
unkown
page readonly
307C01C84000
trusted library allocation
page read and write
10A3FE000
unkown
page readonly
23424000
heap
page read and write
307C00C30000
trusted library allocation
page read and write
11FBFD000
stack
page read and write
307C0160C000
trusted library allocation
page read and write
23425000
heap
page read and write
2340D000
heap
page read and write
307C01668000
trusted library allocation
page read and write
18FCF910000
heap
page read and write
18FD5107000
trusted library allocation
page read and write
11B3FE000
unkown
page readonly
1D6182EB000
heap
page read and write
297E94E0000
heap
page read and write
1D61EEE3000
trusted library section
page read and write
307C00630000
trusted library allocation
page read and write
307C016B4000
trusted library allocation
page read and write
307C01830000
trusted library allocation
page read and write
24AF9B00000
heap
page read and write
307C00960000
trusted library allocation
page read and write
428400644000
trusted library allocation
page read and write
419AAFF000
stack
page read and write
307C0161C000
trusted library allocation
page read and write
1D6182DD000
heap
page read and write
307C00374000
trusted library allocation
page read and write
1D6182E0000
heap
page read and write
307C00B30000
trusted library allocation
page read and write
428400668000
trusted library allocation
page read and write
307C008EC000
trusted library allocation
page read and write
56E000
unkown
page execute and read and write
307C009C3000
trusted library allocation
page read and write
1BA80285000
heap
page read and write
C1FD5CD000
stack
page read and write
307C01B40000
trusted library allocation
page read and write
1D129000
heap
page read and write
307C0008C000
trusted library allocation
page read and write
307C00B00000
trusted library allocation
page read and write
18FD5190000
remote allocation
page read and write
307C02EE8000
trusted library allocation
page read and write
307C018B4000
trusted library allocation
page read and write
7FF6D4A41000
unkown
page readonly
11CBFC000
stack
page read and write
307C002B4000
trusted library allocation
page read and write
307C014C4000
trusted library allocation
page read and write
4284007C8000
trusted library allocation
page read and write
198000
stack
page read and write
307C01064000
trusted library allocation
page read and write
307C00824000
trusted library allocation
page read and write
18FD50A3000
trusted library allocation
page read and write
1D6182EB000
heap
page read and write
18FD4EC8000
heap
page read and write
4284007D0000
trusted library allocation
page read and write
1D61C4D0000
heap
page read and write
104BFE000
stack
page read and write
23530000
heap
page read and write
307C00F58000
trusted library allocation
page read and write
307C01880000
trusted library allocation
page read and write
307C015F0000
trusted library allocation
page read and write
1D6182FD000
heap
page read and write
24AF9B13000
heap
page read and write
3994002AC000
direct allocation
page read and write
18FD5018000
trusted library allocation
page read and write
124BFD000
stack
page read and write
11E3FE000
unkown
page readonly
307C00EB8000
trusted library allocation
page read and write
307C00633000
trusted library allocation
page read and write
307C00390000
trusted library allocation
page read and write
1D6182DD000
heap
page read and write
307C002F3000
trusted library allocation
page read and write
307C01BA8000
trusted library allocation
page read and write
399400210000
direct allocation
page read and write
7FF7D0872000
unkown
page readonly
307C010E4000
trusted library allocation
page read and write
1293FE000
unkown
page readonly
307C00EE8000
trusted library allocation
page read and write
7FF6D4D0D000
unkown
page execute and read and write
4284006D4000
trusted library allocation
page read and write
307C006D8000
trusted library allocation
page read and write
307C00360000
trusted library allocation
page read and write
4B40000
heap
page read and write
211D0450000
heap
page read and write
307C00354000
trusted library allocation
page read and write
307C0034C000
trusted library allocation
page read and write
1BA80050000
heap
page read and write
307C026BD000
trusted library allocation
page read and write
307C00422000
trusted library allocation
page read and write
307C00C34000
trusted library allocation
page read and write
307C01C50000
trusted library allocation
page read and write
1333FE000
unkown
page readonly
1D6182DE000
heap
page read and write
23918000
heap
page read and write
7FF7D0F3E000
unkown
page readonly
307C00FDD000
trusted library allocation
page read and write
132BFE000
stack
page read and write
307C001B4000
trusted library allocation
page read and write
307C00C9C000
trusted library allocation
page read and write
399400220000
direct allocation
page read and write
2A92F000
heap
page read and write
1053FE000
unkown
page readonly
307C01401000
trusted library allocation
page read and write
307C01C1C000
trusted library allocation
page read and write
1D6182E5000
heap
page read and write
307C013DC000
trusted library allocation
page read and write
307C0000C000
trusted library allocation
page read and write
428400248000
trusted library allocation
page read and write
1D6182EB000
heap
page read and write
2E543200000
heap
page read and write
307C00304000
trusted library allocation
page read and write
307C02A34000
trusted library allocation
page read and write
307C00728000
trusted library allocation
page read and write
18FD0000000
heap
page read and write
23432000
heap
page read and write
307C001D8000
trusted library allocation
page read and write
307C0261A000
trusted library allocation
page read and write
307C01AFC000
trusted library allocation
page read and write
1D61E513000
trusted library section
page read and write
1D6182DD000
heap
page read and write
1D6182E5000
heap
page read and write
18FD50D0000
trusted library allocation
page read and write
307C00D8C000
trusted library allocation
page read and write
307C009CC000
trusted library allocation
page read and write
1AE003E0000
heap
page read and write
18FD4DF0000
trusted library allocation
page read and write
7FF6D4360000
unkown
page readonly
1D618304000
heap
page read and write
307C0204F000
trusted library allocation
page read and write
25319EF0000
heap
page read and write
307C027E6000
trusted library allocation
page read and write
1D6182DD000
heap
page read and write
307C01430000
trusted library allocation
page read and write
1D6182EB000
heap
page read and write
307C00F14000
trusted library allocation
page read and write
18FCFA94000
heap
page read and write
12D3FE000
unkown
page readonly
307C016E4000
trusted library allocation
page read and write
307C01774000
trusted library allocation
page read and write
307C01928000
trusted library allocation
page read and write
1D6182E0000
heap
page read and write
1D6182EB000
heap
page read and write
4284006D0000
trusted library allocation
page read and write
428400760000
trusted library allocation
page read and write
419ABFF000
stack
page read and write
2FC4000
heap
page read and write
3994002EC000
direct allocation
page read and write
1D618304000
heap
page read and write
1A249268000
heap
page read and write
1CE9F000
stack
page read and write
1D61E572000
trusted library section
page read and write
1D6182DA000
heap
page read and write
7FF7D0F3E000
unkown
page readonly
307C01B04000
trusted library allocation
page read and write
307C01D08000
trusted library allocation
page read and write
307C02EDC000
trusted library allocation
page read and write
18FD4EE6000
heap
page read and write
1D6182E3000
heap
page read and write
1D6182E0000
heap
page read and write
18FD0015000
heap
page read and write
307C010F0000
trusted library allocation
page read and write
24AF9B02000
heap
page read and write
1D6182E3000
heap
page read and write
1D6182DD000
heap
page read and write
23432000
heap
page read and write
106BFD000
stack
page read and write
1D6182E0000
heap
page read and write
18FD5002000
trusted library allocation
page read and write
2343C000
heap
page read and write
1D61C4FB000
heap
page read and write
1E132260000
heap
page read and write
307C01754000
trusted library allocation
page read and write
307C00201000
trusted library allocation
page read and write
1D6182EB000
heap
page read and write
11D3FE000
unkown
page readonly
307C012A8000
trusted library allocation
page read and write
1D6182E0000
heap
page read and write
307C01C58000
trusted library allocation
page read and write
307C0034C000
trusted library allocation
page read and write
C8F167E000
stack
page read and write
1D6182DA000
heap
page read and write
307C00900000
trusted library allocation
page read and write
1E132265000
heap
page read and write
307C01814000
trusted library allocation
page read and write
1CEDE000
stack
page read and write
1D6182EB000
heap
page read and write
18FD4E4F000
heap
page read and write
3828002C8000
trusted library allocation
page read and write
307C0112C000
trusted library allocation
page read and write
1D6182DD000
heap
page read and write
3994002A8000
direct allocation
page read and write
307C0191C000
trusted library allocation
page read and write
1D61830F000
heap
page read and write
1A814610000
direct allocation
page read and write
20DC8B85000
heap
page read and write
24AF9A00000
heap
page read and write
1D6182DA000
heap
page read and write
307C00B94000
trusted library allocation
page read and write
118BFC000
stack
page read and write
307C012BC000
trusted library allocation
page read and write
1D6182E3000
heap
page read and write
307C00DA1000
trusted library allocation
page read and write
1CD9E000
stack
page read and write
307C02AD8000
trusted library allocation
page read and write
1D6187EB000
heap
page read and write
1D614E70000
trusted library allocation
page read and write
1D6182E5000
heap
page read and write
381BA7D000
stack
page read and write
307C01AC5000
trusted library allocation
page read and write
307C00F08000
trusted library allocation
page read and write
1D6182E3000
heap
page read and write
1D6182E0000
heap
page read and write
307C0187C000
trusted library allocation
page read and write
4ADF000
stack
page read and write
307C01D4C000
trusted library allocation
page read and write
381C57E000
unkown
page readonly
307C0034C000
trusted library allocation
page read and write
1D6182D3000
heap
page read and write
211D0178000
heap
page read and write
307C01AF8000
trusted library allocation
page read and write
307C01108000
trusted library allocation
page read and write
23427000
heap
page read and write
428400664000
trusted library allocation
page read and write
307C01D70000
trusted library allocation
page read and write
1D618304000
heap
page read and write
7FF6D4D0A000
unkown
page execute and read and write
1A814610000
direct allocation
page read and write
307C003A4000
trusted library allocation
page read and write
307C017A0000
trusted library allocation
page read and write
3D753FF000
stack
page read and write
61ED3000
direct allocation
page read and write
1D6182DD000
heap
page read and write
1D6182FF000
heap
page read and write
66E000
unkown
page execute and read and write
DAEF3DD000
stack
page read and write
307C00780000
trusted library allocation
page read and write
23400000
heap
page read and write
1D6182DD000
heap
page read and write
307C0034C000
trusted library allocation
page read and write
307C01488000
trusted library allocation
page read and write
1D6182DA000
heap
page read and write
7FF7D12C2000
unkown
page execute and read and write
2D67000
heap
page read and write
307C016D8000
trusted library allocation
page read and write
1D6182EB000
heap
page read and write
307C002A4000
trusted library allocation
page read and write
307C0057C000
trusted library allocation
page read and write
307C02EF4000
trusted library allocation
page read and write
DB586FE000
stack
page read and write
2E543180000
direct allocation
page read and write
307C017B4000
trusted library allocation
page read and write
307C01924000
trusted library allocation
page read and write
1D6182E0000
heap
page read and write
1A814610000
direct allocation
page read and write
1A24926F000
heap
page read and write
307C0185C000
trusted library allocation
page read and write
1D6182DA000
heap
page read and write
307C00080000
trusted library allocation
page read and write
307C00C54000
trusted library allocation
page read and write
307C006F8000
trusted library allocation
page read and write
307C02C74000
trusted library allocation
page read and write
428400320000
trusted library allocation
page read and write
307C0073C000
trusted library allocation
page read and write
1D618837000
heap
page read and write
2531A020000
heap
page read and write
307C01468000
trusted library allocation
page read and write
307C00C60000
trusted library allocation
page read and write
1D61EADC000
trusted library section
page read and write
307C00C34000
trusted library allocation
page read and write
C8F157E000
stack
page read and write
381D77E000
unkown
page readonly
307C00D44000
trusted library allocation
page read and write
307C014C4000
trusted library allocation
page read and write
428400320000
trusted library allocation
page read and write
307C018C8000
trusted library allocation
page read and write
9B000
stack
page read and write
1D6182EB000
heap
page read and write
1063FE000
unkown
page readonly
1D6182DD000
heap
page read and write
2D60000
heap
page read and write
307C01D11000
trusted library allocation
page read and write
18FD0104000
heap
page read and write
FDFA95F000
stack
page read and write
1D6182EB000
heap
page read and write
307C01730000
trusted library allocation
page read and write
4284006AC000
trusted library allocation
page read and write
307C0034C000
trusted library allocation
page read and write
1D6182DA000
heap
page read and write
1D6182E3000
heap
page read and write
307C00750000
trusted library allocation
page read and write
307C001E4000
trusted library allocation
page read and write
6F871000
unkown
page execute read
307C01328000
trusted library allocation
page read and write
1D61E5CD000
trusted library section
page read and write
1D120000
heap
page read and write
382800250000
trusted library allocation
page read and write
307C01038000
trusted library allocation
page read and write
307C00F9C000
trusted library allocation
page read and write
18FD50E0000
trusted library allocation
page read and write
428400630000
trusted library allocation
page read and write
1D6182DD000
heap
page read and write
1D6182E3000
heap
page read and write
1D6182E5000
heap
page read and write
307C00A3C000
trusted library allocation
page read and write
23400000
trusted library allocation
page read and write
1A249250000
heap
page read and write
1A2491C0000
heap
page read and write
2340D000
heap
page read and write
307C00988000
trusted library allocation
page read and write
1D6182DD000
heap
page read and write
307C00001000
trusted library allocation
page read and write
7FF6D4A3E000
unkown
page readonly
2FD7000
heap
page read and write
428400310000
trusted library allocation
page read and write
18FD4E61000
heap
page read and write
1D614F93000
heap
page read and write
428400698000
trusted library allocation
page read and write
1E131E70000
heap
page read and write
1D6182EB000
heap
page read and write
3828002A0000
trusted library allocation
page read and write
905767E000
stack
page read and write
307C01AC7000
trusted library allocation
page read and write
307C00EE4000
trusted library allocation
page read and write
42840027C000
trusted library allocation
page read and write
514000
unkown
page execute and read and write
1D6182EB000
heap
page read and write
307C01680000
trusted library allocation
page read and write
6C84F000
unkown
page readonly
307C00E50000
trusted library allocation
page read and write
1D6182E5000
heap
page read and write
23438000
heap
page read and write
2E54320C000
heap
page read and write
42840025C000
trusted library allocation
page read and write
307C0277C000
trusted library allocation
page read and write
307C00B3C000
trusted library allocation
page read and write
1D6187CA000
heap
page read and write
1D6182E0000
heap
page read and write
1D61F4B0000
trusted library section
page read and write
307C01BC4000
trusted library allocation
page read and write
115BFE000
stack
page read and write
23423000
heap
page read and write
3828002C0000
trusted library allocation
page read and write
428400750000
trusted library allocation
page read and write
307C0020C000
trusted library allocation
page read and write
307C013DC000
trusted library allocation
page read and write
18FD0D60000
trusted library allocation
page read and write
307C00C1C000
trusted library allocation
page read and write
307C00BA8000
trusted library allocation
page read and write
11F3FE000
unkown
page readonly
784AEFF000
stack
page read and write
7FF7D120A000
unkown
page execute and read and write
307C01C44000
trusted library allocation
page read and write
18FD011A000
heap
page read and write
307C01770000
trusted library allocation
page read and write
307C00F4C000
trusted library allocation
page read and write
1D6182EB000
heap
page read and write
1BA80280000
heap
page read and write
1D6182E3000
heap
page read and write
1A814610000
direct allocation
page read and write
18FD5056000
trusted library allocation
page read and write
2E80000
heap
page read and write
307C02EE0000
trusted library allocation
page read and write
18FD50C2000
trusted library allocation
page read and write
1093FE000
unkown
page readonly
1D6182E5000
heap
page read and write
307C0262C000
trusted library allocation
page read and write
1D61EFE0000
trusted library section
page read and write
307C00648000
trusted library allocation
page read and write
18FCFA00000
heap
page read and write
307C00CB0000
trusted library allocation
page read and write
307C001AC000
trusted library allocation
page read and write
125BFD000
stack
page read and write
307C00B80000
trusted library allocation
page read and write
29D824F5000
heap
page read and write
1D6182E5000
heap
page read and write
18FCFAFE000
heap
page read and write
1D6182E5000
heap
page read and write
1D6182E0000
heap
page read and write
307C02B27000
trusted library allocation
page read and write
18FD4D60000
trusted library allocation
page read and write
1D6182E5000
heap
page read and write
2E543180000
direct allocation
page read and write
307C0080C000
trusted library allocation
page read and write
307C01190000
trusted library allocation
page read and write
307C00F9C000
trusted library allocation
page read and write
C8F147D000
stack
page read and write
307C00128000
trusted library allocation
page read and write
12A3FE000
unkown
page readonly
307C02F10000
trusted library allocation
page read and write
1D6182E5000
heap
page read and write
1D61C4D1000
heap
page read and write
2A8591A0000
heap
page read and write
184F1130000
heap
page read and write
75298FE000
stack
page read and write
1D618305000
heap
page read and write
1A2491A0000
heap
page read and write
307C00320000
trusted library allocation
page read and write
307C01318000
trusted library allocation
page read and write
307C012C8000
trusted library allocation
page read and write
307C0090C000
trusted library allocation
page read and write
1D6182EB000
heap
page read and write
38280020C000
trusted library allocation
page read and write
307C01AEC000
trusted library allocation
page read and write
2341E000
heap
page read and write
307C014F4000
trusted library allocation
page read and write
1D618890000
trusted library section
page read and write
1D6182E3000
heap
page read and write
307C01908000
trusted library allocation
page read and write
307C00924000
trusted library allocation
page read and write
307C00308000
trusted library allocation
page read and write
307C00F78000
trusted library allocation
page read and write
307C01024000
trusted library allocation
page read and write
18FD50C0000
trusted library allocation
page read and write
307C0182C000
trusted library allocation
page read and write
428400250000
trusted library allocation
page read and write
307C00230000
trusted library allocation
page read and write
307C00F4C000
trusted library allocation
page read and write
307C001E8000
trusted library allocation
page read and write
307C017B8000
trusted library allocation
page read and write
381C17E000
unkown
page readonly
428400640000
trusted library allocation
page read and write
1D6182E5000
heap
page read and write
6F870000
unkown
page readonly
307C00E14000
trusted library allocation
page read and write
307C01BE0000
trusted library allocation
page read and write
307C012D4000
trusted library allocation
page read and write
3D754FF000
stack
page read and write
1A814510000
heap
page read and write
233A0000
heap
page read and write
307C02AB2000
trusted library allocation
page read and write
18FD5190000
remote allocation
page read and write
5AA000
unkown
page execute and read and write
428400724000
trusted library allocation
page read and write
7FF6D4375000
unkown
page read and write
428400718000
trusted library allocation
page read and write
1D6182FD000
heap
page read and write
307C017C0000
trusted library allocation
page read and write
307C0027C000
trusted library allocation
page read and write
307C026E7000
trusted library allocation
page read and write
307C0111C000
trusted library allocation
page read and write
307C0171C000
trusted library allocation
page read and write
6CFF0000
unkown
page readonly
1D6182DA000
heap
page read and write
3828002A0000
trusted library allocation
page read and write
24AF9802000
unkown
page read and write
307C0273E000
trusted library allocation
page read and write
307C00360000
trusted library allocation
page read and write
1D6182EB000
heap
page read and write
307C01B1C000
trusted library allocation
page read and write
428400658000
trusted library allocation
page read and write
3828002D8000
trusted library allocation
page read and write
307C0034C000
trusted library allocation
page read and write
23500000
heap
page read and write
307C0143C000
trusted library allocation
page read and write
18FCFA3F000
heap
page read and write
20DC8B50000
heap
page read and write
1D6182E3000
heap
page read and write
307C014A8000
trusted library allocation
page read and write
24AF9B13000
heap
page read and write
23920000
heap
page read and write
307C01ABC000
trusted library allocation
page read and write
1A814610000
direct allocation
page read and write
307C00F24000
trusted library allocation
page read and write
428400694000
trusted library allocation
page read and write
307C01D70000
trusted library allocation
page read and write
307C0145C000
trusted library allocation
page read and write
307C00688000
trusted library allocation
page read and write
1A814D50000
direct allocation
page read and write
18FCFA70000
heap
page read and write
399400303000
direct allocation
page read and write
1D61C53B000
heap
page read and write
307C02A21000
trusted library allocation
page read and write
307C00360000
trusted library allocation
page read and write
2344C000
heap
page read and write
307C01BE4000
trusted library allocation
page read and write
2344C000
heap
page read and write
1D6182DA000
heap
page read and write
61E01000
direct allocation
page execute read
307C00A58000
trusted library allocation
page read and write
12DBFA000
stack
page read and write
307C01048000
trusted library allocation
page read and write
307C00A40000
trusted library allocation
page read and write
307C00E2C000
trusted library allocation
page read and write
307C018EC000
trusted library allocation
page read and write
18FCFA2B000
heap
page read and write
307C01C84000
trusted library allocation
page read and write
1D6182DD000
heap
page read and write
307C018D0000
trusted library allocation
page read and write
1D6182E3000
heap
page read and write
1D6182CE000
heap
page read and write
307C002AC000
trusted library allocation
page read and write
7FF6D4FBE000
unkown
page execute read
307C00304000
trusted library allocation
page read and write
1D61E3A0000
heap
page read and write
307C00CD8000
trusted library allocation
page read and write
307C007C8000
trusted library allocation
page read and write
2E543180000
direct allocation
page read and write
428400201000
trusted library allocation
page read and write
DAEFB79000
stack
page read and write
307C00380000
trusted library allocation
page read and write
1A814610000
direct allocation
page read and write
120BFD000
stack
page read and write
3828002C0000
trusted library allocation
page read and write
24AF9900000
trusted library allocation
page read and write
1D6182E3000
heap
page read and write
18FD4E1F000
heap
page read and write
1133FE000
unkown
page readonly
307C01D70000
trusted library allocation
page read and write
428400230000
trusted library allocation
page read and write
307C00A01000
trusted library allocation
page read and write
18FD50F0000
trusted library allocation
page read and write
428400354000
trusted library allocation
page read and write
1D6182E3000
heap
page read and write
307C00C3C000
trusted library allocation
page read and write
1D6182E3000
heap
page read and write
1163FE000
unkown
page readonly
18FCFFA0000
trusted library allocation
page read and write
428400330000
trusted library allocation
page read and write
2341E000
heap
page read and write
119BFC000
stack
page read and write
1193FE000
unkown
page readonly
61ED0000
direct allocation
page read and write
18FD4EF1000
heap
page read and write
3828002C0000
trusted library allocation
page read and write
2A8591D0000
heap
page read and write
307C018E8000
trusted library allocation
page read and write
18D06FF000
stack
page read and write
2333D000
heap
page read and write
307C0140C000
trusted library allocation
page read and write
110BFD000
stack
page read and write
2344B000
heap
page read and write
428400248000
trusted library allocation
page read and write
307C00228000
trusted library allocation
page read and write
307C01CA4000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
2B91000
unkown
page readonly
1D6182E5000
heap
page read and write
307C02648000
trusted library allocation
page read and write
1D6182DB000
heap
page read and write
23432000
heap
page read and write
2EEE000
heap
page read and write
307C001D4000
trusted library allocation
page read and write
1BA80060000
heap
page read and write
1233FE000
unkown
page readonly
39940024C000
direct allocation
page read and write
10E3FE000
unkown
page readonly
307C0143D000
trusted library allocation
page read and write
4B43000
heap
page read and write
1D6182E3000
heap
page read and write
399400270000
direct allocation
page read and write
1D6182FD000
heap
page read and write
1A814610000
direct allocation
page read and write
307C00360000
trusted library allocation
page read and write
307C004F0000
trusted library allocation
page read and write
307C00C30000
trusted library allocation
page read and write
4284007B4000
trusted library allocation
page read and write
382800248000
trusted library allocation
page read and write
7FF7D0F46000
unkown
page execute and read and write
2E544F60000
unkown
page read and write
307C02A96000
trusted library allocation
page read and write
7FF7D0861000
unkown
page execute read
2E543211000
heap
page read and write
307C00030000
trusted library allocation
page read and write
4284006E0000
trusted library allocation
page read and write
61EB4000
direct allocation
page read and write
18FD5008000
trusted library allocation
page read and write
10ABFB000
stack
page read and write
2E54321F000
heap
page read and write
25319D28000
heap
page read and write
1D6182DD000
heap
page read and write
307C01C10000
trusted library allocation
page read and write
2E543130000
heap
page read and write
307C001B4000
trusted library allocation
page read and write
1F03AD00000
heap
page read and write
307C01801000
trusted library allocation
page read and write
24AF9800000
unkown
page read and write
307C004A0000
trusted library allocation
page read and write
307C00710000
trusted library allocation
page read and write
101BFE000
unkown
page read and write
307C0000C000
trusted library allocation
page read and write
307C01D0C000
trusted library allocation
page read and write
1D6182E3000
heap
page read and write
1D61C772000
trusted library allocation
page read and write
24AF9902000
trusted library allocation
page read and write
22CBA8F0000
heap
page read and write
1D614FB0000
heap
page read and write
1D6182EB000
heap
page read and write
381CB7E000
stack
page read and write
1D6182E0000
heap
page read and write
1D6182D3000
heap
page read and write
1D6182DA000
heap
page read and write
307C01D1D000
trusted library allocation
page read and write
399400244000
direct allocation
page read and write
1D6182DA000
heap
page read and write
3828002C0000
trusted library allocation
page read and write
307C016C8000
trusted library allocation
page read and write
307C00824000
trusted library allocation
page read and write
122BFE000
stack
page read and write
7FF7D17E5000
unkown
page readonly
126BFD000
stack
page read and write
307C01870000
trusted library allocation
page read and write
307C00508000
trusted library allocation
page read and write
1D6182EB000
heap
page read and write
307C01C0C000
trusted library allocation
page read and write
381BB7E000
unkown
page readonly
307C01818000
trusted library allocation
page read and write
1AE00405000
heap
page read and write
18FD50E5000
trusted library allocation
page read and write
2C80000
heap
page read and write
1D6182E0000
heap
page read and write
1D614F60000
trusted library section
page readonly
419A7CD000
stack
page read and write
2E5431A0000
unkown
page read and write
307C026A3000
trusted library allocation
page read and write
307C017A4000
trusted library allocation
page read and write
5A7000
unkown
page execute and read and write
307C00218000
trusted library allocation
page read and write
307C009E8000
trusted library allocation
page read and write
307C00A3C000
trusted library allocation
page read and write
307C00CD8000
trusted library allocation
page read and write
1D6182D2000
heap
page read and write
307C002A4000
trusted library allocation
page read and write
307C008A4000
trusted library allocation
page read and write
1F03ADE0000
heap
page read and write
307C016A0000
trusted library allocation
page read and write
307C01B78000
trusted library allocation
page read and write
307C0195C000
trusted library allocation
page read and write
1D61E450000
heap
page read and write
18FD0002000
heap
page read and write
307C01D08000
trusted library allocation
page read and write
1D6182E0000
heap
page read and write
7FF6D4A45000
unkown
page readonly
1D6182E3000
heap
page read and write
2341E000
heap
page read and write
1BA80250000
heap
page read and write
1D6182DD000
heap
page read and write
428400430000
trusted library allocation
page read and write
307C01D38000
trusted library allocation
page read and write
307C000E0000
trusted library allocation
page read and write
399400274000
direct allocation
page read and write
307C0017C000
trusted library allocation
page read and write
307C01338000
trusted library allocation
page read and write
3828002F4000
trusted library allocation
page read and write
4284006B8000
trusted library allocation
page read and write
307C015E0000
trusted library allocation
page read and write
18FD6000000
heap
page read and write
1D614C30000
heap
page read and write
400000
unkown
page readonly
11DBFC000
stack
page read and write
18FD5020000
trusted library allocation
page read and write
307C01318000
trusted library allocation
page read and write
399400201000
direct allocation
page read and write
307C00304000
trusted library allocation
page read and write
23443000
heap
page read and write
7FF7D0F43000
unkown
page write copy
4284002F0000
trusted library allocation
page read and write
23510000
heap
page read and write
114BFE000
stack
page read and write
399400215000
direct allocation
page read and write
307C01480000
trusted library allocation
page read and write
307C00F9C000
trusted library allocation
page read and write
307C01708000
trusted library allocation
page read and write
307C00CCC000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
307C02E0C000
trusted library allocation
page read and write
1D6182E3000
heap
page read and write
11EBFC000
stack
page read and write
1D6182E3000
heap
page read and write
381CF7E000
unkown
page readonly
307C00638000
trusted library allocation
page read and write
307C002D0000
trusted library allocation
page read and write
307C00CF0000
trusted library allocation
page read and write
307C01918000
trusted library allocation
page read and write
1D618810000
heap
page read and write
382800260000
trusted library allocation
page read and write
2A290000
heap
page read and write
1D6182E0000
heap
page read and write
1D6182DA000
heap
page read and write
307C018E0000
trusted library allocation
page read and write
307C002B4000
trusted library allocation
page read and write
428400700000
trusted library allocation
page read and write
20DC8B20000
heap
page read and write
3828002B0000
trusted library allocation
page read and write
18FD4E83000
heap
page read and write
184F11C8000
heap
page read and write
307C02EE8000
trusted library allocation
page read and write
381B18E000
stack
page read and write
1D6182D2000
heap
page read and write
307C002FB000
trusted library allocation
page read and write
307C00E74000
trusted library allocation
page read and write
1D6182E5000
heap
page read and write
307C01890000
trusted library allocation
page read and write
10C3FE000
unkown
page readonly
1D61C754000
trusted library allocation
page read and write
307C001AC000
trusted library allocation
page read and write
12ABFE000
stack
page read and write
4284002B8000
trusted library allocation
page read and write
1CFDE000
stack
page read and write
113BFE000
stack
page read and write
6D051000
unkown
page readonly
1D614E50000
heap
page read and write
18FD0910000
trusted library allocation
page read and write
18FD4E54000
heap
page read and write
381C4FF000
stack
page read and write
1263FE000
unkown
page readonly
307C01C94000
trusted library allocation
page read and write
307C00E90000
trusted library allocation
page read and write
381B08B000
stack
page read and write
25319D20000
heap
page read and write
1F03AE00000
heap
page read and write
307C01184000
trusted library allocation
page read and write
2E5457AD000
unkown
page read and write
3994002E4000
direct allocation
page read and write
2E6E000
stack
page read and write
307C01634000
trusted library allocation
page read and write
2341E000
heap
page read and write
1D6182E3000
heap
page read and write
307C001B4000
trusted library allocation
page read and write
2A75C000
stack
page read and write
1253FE000
unkown
page readonly
1D61EDF7000
unclassified section
page read and write
1D6182DA000
heap
page read and write
211D0290000
heap
page read and write
1A8143FC000
heap
page read and write
23423000
heap
page read and write
307C00C80000
trusted library allocation
page read and write
307C017F0000
trusted library allocation
page read and write
7FF6D4372000
unkown
page readonly
307C016CC000
trusted library allocation
page read and write
1D6182E0000
heap
page read and write
307C003B0000
trusted library allocation
page read and write
1D6182EB000
heap
page read and write
9B212AD000
stack
page read and write
307C00E14000
trusted library allocation
page read and write
307C0049C000
trusted library allocation
page read and write
307C00BC0000
trusted library allocation
page read and write
307C00428000
trusted library allocation
page read and write
307C00A0C000
trusted library allocation
page read and write
1D397000
heap
page read and write
1D6182DD000
heap
page read and write
42840039C000
trusted library allocation
page read and write
1D6182E0000
heap
page read and write
1D6182DC000
heap
page read and write
307C00E24000
trusted library allocation
page read and write
2A859570000
heap
page read and write
1A249260000
heap
page read and write
59B000
unkown
page execute and read and write
307C00360000
trusted library allocation
page read and write
307C01BAC000
trusted library allocation
page read and write
2E5431B0000
unkown
page read and write
4284006F0000
trusted library allocation
page read and write
112BFE000
stack
page read and write
29D822D0000
heap
page read and write
307C00824000
trusted library allocation
page read and write
399400290000
direct allocation
page read and write
1143FE000
unkown
page readonly
1D618870000
heap
page read and write
307C01A0C000
trusted library allocation
page read and write
307C00320000
trusted library allocation
page read and write
1D6182E0000
heap
page read and write
1A249255000
heap
page read and write
42840035C000
trusted library allocation
page read and write
1D6182E0000
heap
page read and write
307C00F08000
trusted library allocation
page read and write
1D6182DA000
heap
page read and write
1D6182E4000
heap
page read and write
307C02798000
trusted library allocation
page read and write
2531A025000
heap
page read and write
307C00390000
trusted library allocation
page read and write
307C00FC0000
trusted library allocation
page read and write
307C01948000
trusted library allocation
page read and write
12F3FE000
unkown
page readonly
307C00888000
trusted library allocation
page read and write
1A814310000
heap
page read and write
307C014F4000
trusted library allocation
page read and write
18FD5020000
trusted library allocation
page read and write
307C004A4000
trusted library allocation
page read and write
18FD0650000
trusted library allocation
page read and write
307C001DC000
trusted library allocation
page read and write
307C016DC000
trusted library allocation
page read and write
381D07B000
stack
page read and write
1D6182FD000
heap
page read and write
307C026BF000
trusted library allocation
page read and write
307C01640000
trusted library allocation
page read and write
307C014B8000
trusted library allocation
page read and write
307C0166C000
trusted library allocation
page read and write
2E544F60000
direct allocation
page read and write
18FD4E2C000
heap
page read and write
307C00EE8000
trusted library allocation
page read and write
3828002A0000
trusted library allocation
page read and write
23435000
heap
page read and write
307C00B80000
trusted library allocation
page read and write
C1FD8FF000
stack
page read and write
1D6182EB000
heap
page read and write
22CBA5B0000
heap
page read and write
42840069C000
trusted library allocation
page read and write
307C014D4000
trusted library allocation
page read and write
382800278000
trusted library allocation
page read and write
7FF7D0875000
unkown
page write copy
7FF6D52E5000
unkown
page readonly
130BFD000
stack
page read and write
4284002CC000
trusted library allocation
page read and write
307C00F24000
trusted library allocation
page read and write
307C0183C000
trusted library allocation
page read and write
18FD50BA000
trusted library allocation
page read and write
307C002A4000
trusted library allocation
page read and write
123BFE000
stack
page read and write
7FF6D4D78000
unkown
page execute and read and write
3D74F8D000
stack
page read and write
2D69000
heap
page read and write
23880000
trusted library allocation
page read and write
307C01C6C000
trusted library allocation
page read and write
1D61E2F7000
unclassified section
page read and write
3828002C0000
trusted library allocation
page read and write
307C00D4C000
trusted library allocation
page read and write
307C01C24000
trusted library allocation
page read and write
307C02ADA000
trusted library allocation
page read and write
10D3FE000
unkown
page readonly
1D61EE6E000
trusted library section
page read and write
1D6182DA000
heap
page read and write
1D6182DD000
heap
page read and write
1D6182C9000
heap
page read and write
1153FE000
unkown
page readonly
57B000
unkown
page execute and read and write
307C010C4000
trusted library allocation
page read and write
307C001D0000
trusted library allocation
page read and write
1D61883B000
heap
page read and write
1D6182E0000
heap
page read and write
307C02B2B000
trusted library allocation
page read and write
307C01098000
trusted library allocation
page read and write
1D614DDB000
heap
page read and write
1D6182E0000
heap
page read and write
6F902000
unkown
page readonly
382800264000
trusted library allocation
page read and write
307C00E10000
trusted library allocation
page read and write
18FD5001000
trusted library allocation
page read and write
2344B000
heap
page read and write
24AF9680000
heap
page read and write
1D6182E5000
heap
page read and write
307C00D00000
trusted library allocation
page read and write
307C004A8000
trusted library allocation
page read and write
307C01A01000
trusted library allocation
page read and write
307C00838000
trusted library allocation
page read and write
1D6182D2000
heap
page read and write
1D6187FA000
heap
page read and write
307C00EA4000
trusted library allocation
page read and write
1D6182EB000
heap
page read and write
1D6182E0000
heap
page read and write
1D6182EB000
heap
page read and write
1D6182E5000
heap
page read and write
1A814610000
direct allocation
page read and write
307C01BC8000
trusted library allocation
page read and write
1183FE000
unkown
page readonly
4284006BC000
trusted library allocation
page read and write
4284003EC000
trusted library allocation
page read and write
235BC000
heap
page read and write
24AF9A02000
heap
page read and write
2A65C000
stack
page read and write
BEA08FE000
stack
page read and write
1D6182EB000
heap
page read and write
1D6182E5000
heap
page read and write
428400320000
trusted library allocation
page read and write
18FD5150000
trusted library allocation
page read and write
307C00C2C000
trusted library allocation
page read and write
307C01504000
trusted library allocation
page read and write
169BC350000
heap
page read and write
824F1FE000
stack
page read and write
1D6182EB000
heap
page read and write
307C00FCC000
trusted library allocation
page read and write
1AE003B0000
heap
page read and write
2A859575000
heap
page read and write
307C004E8000
trusted library allocation
page read and write
307C01D08000
trusted library allocation
page read and write
1D6182DD000
heap
page read and write
307C01858000
trusted library allocation
page read and write
307C01744000
trusted library allocation
page read and write
428400288000
trusted library allocation
page read and write
399400234000
direct allocation
page read and write
2E543180000
direct allocation
page read and write
307C00134000
trusted library allocation
page read and write
9B216FF000
stack
page read and write
1D614D20000
heap
page read and write
18FD0102000
heap
page read and write
307C01DDD000
trusted library allocation
page read and write
382800288000
trusted library allocation
page read and write
100BEF000
stack
page read and write
381CE7C000
stack
page read and write
307C01024000
trusted library allocation
page read and write
1AE00410000
heap
page read and write
39940020C000
direct allocation
page read and write
307C0151C000
trusted library allocation
page read and write
1D6182E0000
heap
page read and write
307C00AEC000
trusted library allocation
page read and write
307C01720000
trusted library allocation
page read and write
1BA80230000
heap
page read and write
307C00290000
trusted library allocation
page read and write
307C010CC000
trusted library allocation
page read and write
428400348000
trusted library allocation
page read and write
18FD5000000
trusted library allocation
page read and write
1D6182DA000
heap
page read and write
1A814610000
direct allocation
page read and write
7FF7D14BE000
unkown
page execute read
381B4FE000
stack
page read and write
1D6182DA000
heap
page read and write
1D6182E5000
heap
page read and write
307C00ACC000
trusted library allocation
page read and write
307C00F14000
trusted library allocation
page read and write
307C01B30000
trusted library allocation
page read and write
12C3FE000
unkown
page readonly
7FF7D1242000
unkown
page execute and read and write
307C0129C000
trusted library allocation
page read and write
23435000
heap
page read and write
307C00FB4000
trusted library allocation
page read and write
40E000
unkown
page execute read
307C0016C000
trusted library allocation
page read and write
1D61C54C000
heap
page read and write
18FD0D31000
trusted library allocation
page read and write
307C01C84000
trusted library allocation
page read and write
1D61C4DB000
heap
page read and write
307C00390000
trusted library allocation
page read and write
1D6182EB000
heap
page read and write
4E6000
unkown
page execute and read and write
307C01BB8000
trusted library allocation
page read and write
2332B000
heap
page read and write
307C014F4000
trusted library allocation
page read and write
1D6182D2000
heap
page read and write
1023FE000
unkown
page readonly
307C00B80000
trusted library allocation
page read and write
307C027A4000
trusted library allocation
page read and write
1D61C6D0000
trusted library section
page read and write
307C01884000
trusted library allocation
page read and write
307C01B5C000
trusted library allocation
page read and write
238A0000
remote allocation
page read and write
307C00D70000
trusted library allocation
page read and write
1D6182E0000
heap
page read and write
307C00D30000
trusted library allocation
page read and write
307C00FD2000
trusted library allocation
page read and write
1D61E4B2000
trusted library section
page read and write
307C001AC000
trusted library allocation
page read and write
24AF9824000
unkown
page read and write
307C016B8000
trusted library allocation
page read and write
307C01038000
trusted library allocation
page read and write
1D6182E5000
heap
page read and write
1D6182E0000
heap
page read and write
24AF9660000
heap
page read and write
307C00340000
trusted library allocation
page read and write
23422000
heap
page read and write
307C0036C000
trusted library allocation
page read and write
307C00A3C000
trusted library allocation
page read and write
6C895000
unkown
page readonly
1CC1F000
stack
page read and write
307C00360000
trusted library allocation
page read and write
307C026A5000
trusted library allocation
page read and write
428400758000
trusted library allocation
page read and write
307C00BDC000
trusted library allocation
page read and write
307C01D90000
trusted library allocation
page read and write
307C00CE8000
trusted library allocation
page read and write
428400380000
trusted library allocation
page read and write
23326000
heap
page read and write
2EF3000
heap
page execute and read and write
1D6182DA000
heap
page read and write
307C01D70000
trusted library allocation
page read and write
3828002F0000
trusted library allocation
page read and write
1D61CB57000
unclassified section
page read and write
6CFF1000
unkown
page execute read
1D6182EB000
heap
page read and write
307C013B8000
trusted library allocation
page read and write
307C02A5C000
trusted library allocation
page read and write
307C02AB0000
trusted library allocation
page read and write
307C00ABC000
trusted library allocation
page read and write
169BC428000
heap
page read and write
307C018AC000
trusted library allocation
page read and write
307C01D4C000
trusted library allocation
page read and write
1D6182E0000
heap
page read and write
192000
stack
page read and write
29D82110000
heap
page read and write
128BFE000
stack
page read and write
307C01698000
trusted library allocation
page read and write
307C00194000
trusted library allocation
page read and write
1273FE000
unkown
page readonly
1D614D28000
heap
page read and write
7FF7D17E5000
unkown
page readonly
2E543180000
direct allocation
page read and write
307C01BD4000
trusted library allocation
page read and write
1113FE000
unkown
page readonly
7FF7D0860000
unkown
page readonly
1D6182DD000
heap
page read and write
307C00A2C000
trusted library allocation
page read and write
307C00E80000
trusted library allocation
page read and write
399400260000
direct allocation
page read and write
18D03DE000
stack
page read and write
307C00558000
trusted library allocation
page read and write
1043FE000
unkown
page readonly
307C002CA000
trusted library allocation
page read and write
1D25E000
stack
page read and write
307C018CC000
trusted library allocation
page read and write
307C00074000
trusted library allocation
page read and write
102BFF000
stack
page read and write
1D6182E3000
heap
page read and write
1D6182EB000
heap
page read and write
488000
unkown
page readonly
1D6182DA000
heap
page read and write
1D6182DA000
heap
page read and write
1D6182E3000
heap
page read and write
1AE00400000
heap
page read and write
307C001CC000
trusted library allocation
page read and write
1D6182FD000
heap
page read and write
307C00723000
trusted library allocation
page read and write
399400280000
direct allocation
page read and write
307C01AEC000
trusted library allocation
page read and write
499E000
stack
page read and write
307C017C4000
trusted library allocation
page read and write
1A8143F0000
heap
page read and write
1123FE000
unkown
page readonly
131BF9000
stack
page read and write
18FD5091000
trusted library allocation
page read and write
307C002F0000
trusted library allocation
page read and write
1D6182EB000
heap
page read and write
1D614F90000
heap
page read and write
1D618869000
heap
page read and write
1D61E647000
unclassified section
page read and write
307C014A0000
trusted library allocation
page read and write
307C01001000
trusted library allocation
page read and write
381D17E000
unkown
page readonly
307C00D54000
trusted library allocation
page read and write
307C01944000
trusted library allocation
page read and write
307C01C70000
trusted library allocation
page read and write
29D824F0000
heap
page read and write
428400424000
trusted library allocation
page read and write
1D6182E5000
heap
page read and write
10DBFE000
stack
page read and write
307C004E0000
trusted library allocation
page read and write
307C00F24000
trusted library allocation
page read and write
307C000A0000
trusted library allocation
page read and write
307C01BCC000
trusted library allocation
page read and write
1D6182E0000
heap
page read and write
428400320000
trusted library allocation
page read and write
307C00AF8000
trusted library allocation
page read and write
307C017B0000
trusted library allocation
page read and write
211D0080000
heap
page read and write
7FF6D4361000
unkown
page execute read
307C01C90000
trusted library allocation
page read and write
1D617510000
unkown
page read and write
307C00354000
trusted library allocation
page read and write
307C01428000
trusted library allocation
page read and write
238E0000
heap
page read and write
18FD50E0000
trusted library allocation
page read and write
307C00DD4000
trusted library allocation
page read and write
1D61C4FB000
heap
page read and write
307C002A8000
trusted library allocation
page read and write
1D6182DD000
heap
page read and write
1D6182DD000
heap
page read and write
428400310000
trusted library allocation
page read and write
381BD7E000
unkown
page readonly
18FCFA6B000
heap
page read and write
7FF7D12C8000
unkown
page execute and read and write
F64EF1D000
stack
page read and write
307C02708000
trusted library allocation
page read and write
4284006EC000
trusted library allocation
page read and write
1D6182EB000
heap
page read and write
7FF6D4A43000
unkown
page write copy
307C01201000
trusted library allocation
page read and write
307C017DC000
trusted library allocation
page read and write
307C01C68000
trusted library allocation
page read and write
1D6182E3000
heap
page read and write
22CBA8F5000
heap
page read and write
307C012C4000
trusted library allocation
page read and write
1D6182C8000
heap
page read and write
307C00C01000
trusted library allocation
page read and write
428400678000
trusted library allocation
page read and write
307C01D30000
trusted library allocation
page read and write
307C0034C000
trusted library allocation
page read and write
1D61AA90000
trusted library allocation
page read and write
3828002E4000
trusted library allocation
page read and write
307C00214000
trusted library allocation
page read and write
1D6182D7000
heap
page read and write
2B91000
unkown
page readonly
824F0FF000
stack
page read and write
1D6182FD000
heap
page read and write
1D6182E0000
heap
page read and write
307C00360000
trusted library allocation
page read and write
1D6182E0000
heap
page read and write
1D6182E0000
heap
page read and write
1D6182E0000
heap
page read and write
1D6182E0000
heap
page read and write
1D6182E0000
heap
page read and write
307C007F4000
trusted library allocation
page read and write
7FF6D4A45000
unkown
page readonly
42840033C000
trusted library allocation
page read and write
307C0005F000
trusted library allocation
page read and write
1D618877000
heap
page read and write
307C01470000
trusted library allocation
page read and write
307C02B41000
trusted library allocation
page read and write
1D61E556000
trusted library section
page read and write
1D6182F4000
heap
page read and write
18FD50E8000
trusted library allocation
page read and write
307C013B8000
trusted library allocation
page read and write
1D6182E5000
heap
page read and write
1D6182EB000
heap
page read and write
668000
unkown
page execute and read and write
307C01520000
trusted library allocation
page read and write
2349B000
heap
page read and write
307C0034C000
trusted library allocation
page read and write
22CBA658000
heap
page read and write
382800270000
trusted library allocation
page read and write
307C0120C000
trusted library allocation
page read and write
1243FE000
unkown
page readonly
211D0455000
heap
page read and write
307C00760000
trusted library allocation
page read and write
7FF7D0861000
unkown
page execute read
18FD4DE0000
trusted library allocation
page read and write
307C018B0000
trusted library allocation
page read and write
307C01CA8000
trusted library allocation
page read and write
4284006C8000
trusted library allocation
page read and write
307C00F68000
trusted library allocation
page read and write
307C00338000
trusted library allocation
page read and write
307C00F78000
trusted library allocation
page read and write
307C02656000
trusted library allocation
page read and write
1A814675000
heap
page read and write
25319F10000
heap
page read and write
428400401000
trusted library allocation
page read and write
24AF981B000
unkown
page read and write
1E131E50000
heap
page read and write
297E90D0000
heap
page read and write
23432000
heap
page read and write
307C016B0000
trusted library allocation
page read and write
23927000
heap
page read and write
307C010A0000
trusted library allocation
page read and write
1D6182E5000
heap
page read and write
428400714000
trusted library allocation
page read and write
2E543180000
direct allocation
page read and write
307C01DA8000
trusted library allocation
page read and write
307C00E38000
trusted library allocation
page read and write
1D618839000
heap
page read and write
307C00BC8000
trusted library allocation
page read and write
1D6187C7000
heap
page read and write
1173FE000
unkown
page readonly
23435000
heap
page read and write
1D6182DA000
heap
page read and write
18FCFA8F000
heap
page read and write
9B213AF000
stack
page read and write
1D614DC4000
heap
page read and write
1D6182E3000
heap
page read and write
307C01E04000
trusted library allocation
page read and write
23416000
heap
page read and write
7FF7D120D000
unkown
page execute and read and write
18FD4F02000
heap
page read and write
24AF9839000
heap
page read and write
23427000
heap
page read and write
307C0129C000
trusted library allocation
page read and write
307C0175C000
trusted library allocation
page read and write
428400330000
trusted library allocation
page read and write
117BFB000
stack
page read and write
FDFA9DF000
stack
page read and write
307C002A4000
trusted library allocation
page read and write
4284002F4000
trusted library allocation
page read and write
307C0097C000
trusted library allocation
page read and write
307C003B0000
trusted library allocation
page read and write
1A814610000
direct allocation
page read and write
307C01D14000
trusted library allocation
page read and write
1D6182DD000
heap
page read and write
1CD5F000
stack
page read and write
1283FE000
unkown
page readonly
307C00354000
trusted library allocation
page read and write
307C01358000
trusted library allocation
page read and write
F64F4FF000
stack
page read and write
2349B000
heap
page read and write
9B9758E000
stack
page read and write
307C0032C000
trusted library allocation
page read and write
18FCF830000
heap
page read and write
307C02ACC000
trusted library allocation
page read and write
307C0173C000
trusted library allocation
page read and write
4284006CC000
trusted library allocation
page read and write
428400364000
trusted library allocation
page read and write
428400704000
trusted library allocation
page read and write
307C00354000
trusted library allocation
page read and write
23422000
heap
page read and write
1D618305000
heap
page read and write
307C018F0000
trusted library allocation
page read and write
307C01D18000
trusted library allocation
page read and write
1D61EEC0000
trusted library section
page read and write
307C004BC000
trusted library allocation
page read and write
307C01C14000
trusted library allocation
page read and write
1F03B115000
heap
page read and write
307C0014C000
trusted library allocation
page read and write
1D6182EB000
heap
page read and write
307C001A0000
trusted library allocation
page read and write
DB583CE000
stack
page read and write
381BF7E000
unkown
page readonly
307C018F4000
trusted library allocation
page read and write
307C00A3C000
trusted library allocation
page read and write
6C6B1000
unkown
page execute read
DAEF97E000
stack
page read and write
1D6182E5000
heap
page read and write
307C001B4000
trusted library allocation
page read and write
1D618920000
trusted library section
page read and write
307C017F4000
trusted library allocation
page read and write
18FD011A000
heap
page read and write
1D6182FF000
heap
page read and write
307C014F4000
trusted library allocation
page read and write
307C00CD8000
trusted library allocation
page read and write
307C00360000
trusted library allocation
page read and write
18FD50A0000
trusted library allocation
page read and write
307C00590000
trusted library allocation
page read and write
1D61E57D000
trusted library section
page read and write
18D02DC000
stack
page read and write
6E8000
unkown
page execute and read and write
307C0021C000
trusted library allocation
page read and write
23424000
heap
page read and write
307C00390000
trusted library allocation
page read and write
1D6182EB000
heap
page read and write
1D6182FF000
heap
page read and write
129BFE000
stack
page read and write
307C000D0000
trusted library allocation
page read and write
109BFC000
stack
page read and write
18FD5190000
remote allocation
page read and write
24AF9760000
trusted library allocation
page read and write
307C00C0C000
trusted library allocation
page read and write
307C017EC000
trusted library allocation
page read and write
307C01670000
trusted library allocation
page read and write
1D6182DD000
heap
page read and write
7FF7D0872000
unkown
page readonly
307C002A4000
trusted library allocation
page read and write
18FCFB17000
heap
page read and write
307C007A8000
trusted library allocation
page read and write
307C018F8000
trusted library allocation
page read and write
307C00118000
trusted library allocation
page read and write
23427000
heap
page read and write
1D61E4A0000
trusted library section
page read and write
399400294000
direct allocation
page read and write
18FD50FF000
trusted library allocation
page read and write
18FD0390000
trusted library allocation
page read and write
307C01684000
trusted library allocation
page read and write
18FD4E00000
heap
page read and write
4284006B4000
trusted library allocation
page read and write
18FD50F4000
trusted library allocation
page read and write
24AF9A13000
heap
page read and write
1D6182E0000
heap
page read and write
307C01894000
trusted library allocation
page read and write
23526000
heap
page read and write
3828002A0000
trusted library allocation
page read and write
18FCFA13000
heap
page read and write
1D61E600000
trusted library section
page read and write
18FD4F00000
heap
page read and write
428400624000
trusted library allocation
page read and write
1D6182E0000
heap
page read and write
1D6182E3000
heap
page read and write
428400238000
trusted library allocation
page read and write
10FBFE000
stack
page read and write
307C014B8000
trusted library allocation
page read and write
18FD50F1000
trusted library allocation
page read and write
307C01750000
trusted library allocation
page read and write
381B677000
stack
page read and write
1D6182DD000
heap
page read and write
428400620000
trusted library allocation
page read and write
184F14C5000
heap
page read and write
18FD504D000
trusted library allocation
page read and write
184F14C0000
heap
page read and write
307C01064000
trusted library allocation
page read and write
1D6182E3000
heap
page read and write
1D6182D9000
heap
page read and write
307C002A8000
trusted library allocation
page read and write
1D6182EB000
heap
page read and write
399400284000
direct allocation
page read and write
307C01048000
trusted library allocation
page read and write
1D6182E0000
heap
page read and write
4B4C000
heap
page read and write
307C01810000
trusted library allocation
page read and write
307C00F78000
trusted library allocation
page read and write
18FD506F000
trusted library allocation
page read and write
307C00040000
trusted library allocation
page read and write
2E90000
heap
page read and write
428400210000
trusted library allocation
page read and write
1E131E40000
heap
page read and write
1D6182E3000
heap
page read and write
307C00D28000
trusted library allocation
page read and write
1D6182E5000
heap
page read and write
18FD5064000
trusted library allocation
page read and write
307C00801000
trusted library allocation
page read and write
1D6182DC000
heap
page read and write
307C0041F000
trusted library allocation
page read and write
1D6182DA000
heap
page read and write
307C005D8000
trusted library allocation
page read and write
18FD5072000
trusted library allocation
page read and write
307C00DF0000
trusted library allocation
page read and write
307C01BF8000
trusted library allocation
page read and write
22CBA650000
heap
page read and write
307C01518000
trusted library allocation
page read and write
1D6182DA000
heap
page read and write
184F11C0000
heap
page read and write
18FD506C000
trusted library allocation
page read and write
7FF7D1278000
unkown
page execute and read and write
2E543180000
direct allocation
page read and write
307C017D4000
trusted library allocation
page read and write
18FD5460000
trusted library allocation
page read and write
399400250000
direct allocation
page read and write
3828002A0000
trusted library allocation
page read and write
297E91B0000
heap
page read and write
7FF6D4360000
unkown
page readonly
1D618852000
heap
page read and write
2E543150000
heap
page read and write
42840020C000
trusted library allocation
page read and write
428400788000
trusted library allocation
page read and write
428400418000
trusted library allocation
page read and write
4284002D4000
trusted library allocation
page read and write
307C01D90000
trusted library allocation
page read and write
428400684000
trusted library allocation
page read and write
307C00401000
trusted library allocation
page read and write
1D618846000
heap
page read and write
428400610000
trusted library allocation
page read and write
307C0034C000
trusted library allocation
page read and write
307C0176C000
trusted library allocation
page read and write
307C0040C000
trusted library allocation
page read and write
1D6182E0000
heap
page read and write
307C01B54000
trusted library allocation
page read and write
307C00CE8000
trusted library allocation
page read and write
1D6182E7000
heap
page read and write
2E543180000
direct allocation
page read and write
307C01CB8000
trusted library allocation
page read and write
307C0034C000
trusted library allocation
page read and write
18FD53C0000
trusted library allocation
page read and write
307C01BB4000
trusted library allocation
page read and write
307C0094C000
trusted library allocation
page read and write
401000
unkown
page execute read
23926000
heap
page read and write
4284002B0000
trusted library allocation
page read and write
307C018A8000
trusted library allocation
page read and write
307C00ECC000
trusted library allocation
page read and write
1D6182E3000
heap
page read and write
7FF6D4DC8000
unkown
page execute and read and write
307C013B8000
trusted library allocation
page read and write
18FCF810000
heap
page read and write
307C002A8000
trusted library allocation
page read and write
307C02654000
trusted library allocation
page read and write
1D6182DA000
heap
page read and write
18FCFAB2000
heap
page read and write
1D6182DA000
heap
page read and write
307C00EE8000
trusted library allocation
page read and write
18FCFA59000
heap
page read and write
1D61879C000
heap
page read and write
307C01444000
trusted library allocation
page read and write
4284002E4000
trusted library allocation
page read and write
3828002B0000
trusted library allocation
page read and write
1D61C4F9000
heap
page read and write
1D6182DA000
heap
page read and write
307C00B8C000
trusted library allocation
page read and write
1D6182E5000
heap
page read and write
307C00C90000
trusted library allocation
page read and write
307C01694000
trusted library allocation
page read and write
18FD500E000
trusted library allocation
page read and write
23427000
heap
page read and write
4284002ED000
trusted library allocation
page read and write
307C018D4000
trusted library allocation
page read and write
2341E000
heap
page read and write
307C02B6B000
trusted library allocation
page read and write
307C00B14000
trusted library allocation
page read and write
1D61EE62000
trusted library section
page read and write
1F03B110000
heap
page read and write
3828002A4000
trusted library allocation
page read and write
1D6182E0000
heap
page read and write
7FF6D4A43000
unkown
page read and write
307C0005A000
trusted library allocation
page read and write
1D6182E5000
heap
page read and write
1D614E80000
trusted library allocation
page read and write
307C02B64000
trusted library allocation
page read and write
2340D000
heap
page read and write
1D614DD5000
heap
page read and write
1D6182DA000
heap
page read and write
24AF9B00000
heap
page read and write
307C00F58000
trusted library allocation
page read and write
307C00F9C000
trusted library allocation
page read and write
11C3FE000
unkown
page readonly
307C0178C000
trusted library allocation
page read and write
18FD4ED3000
heap
page read and write
307C01D48000
trusted library allocation
page read and write
307C00064000
trusted library allocation
page read and write
307C00F08000
trusted library allocation
page read and write
307C01C40000
trusted library allocation
page read and write
238A0000
remote allocation
page read and write
307C01638000
trusted library allocation
page read and write
1D6182DD000
heap
page read and write
307C026E0000
trusted library allocation
page read and write
18FD511A000
trusted library allocation
page read and write
11BBFA000
stack
page read and write
2E543475000
heap
page read and write
307C00300000
trusted library allocation
page read and write
1D61EE50000
trusted library section
page read and write
1303FE000
unkown
page readonly
307C010C8000
trusted library allocation
page read and write
307C00FDC000
trusted library allocation
page read and write
307C01D70000
trusted library allocation
page read and write
784AE7D000
stack
page read and write
307C01780000
trusted library allocation
page read and write
381B87E000
stack
page read and write
307C00F9C000
trusted library allocation
page read and write
18FD4DF0000
trusted library allocation
page read and write
6C6B0000
unkown
page readonly
307C01B2C000
trusted library allocation
page read and write
307C02E01000
trusted library allocation
page read and write
307C02A8F000
trusted library allocation
page read and write
18FD5015000
trusted library allocation
page read and write
1D6182DA000
heap
page read and write
307C01184000
trusted library allocation
page read and write
7FF7D0F43000
unkown
page read and write
1D6182E3000
heap
page read and write
1D6182E5000
heap
page read and write
1313FE000
unkown
page readonly
111BFA000
stack
page read and write
307C0071D000
trusted library allocation
page read and write
49D0000
heap
page read and write
4B1E000
stack
page read and write
307C015EC000
trusted library allocation
page read and write
307C00698000
trusted library allocation
page read and write
1BA80068000
heap
page read and write
238EB000
heap
page read and write
23422000
heap
page read and write
307C0041C000
trusted library allocation
page read and write
61ECC000
direct allocation
page read and write
307C00F14000
trusted library allocation
page read and write
1223FE000
unkown
page readonly
307C005A4000
trusted library allocation
page read and write
307C00D34000
trusted library allocation
page read and write
18FCFAFE000
heap
page read and write
1103FE000
unkown
page readonly
297E9240000
heap
page read and write
307C000F0000
trusted library allocation
page read and write
7FF6D4A41000
unkown
page readonly
42840033C000
trusted library allocation
page read and write
235D0000
heap
page read and write
42840040C000
trusted library allocation
page read and write
307C00E68000
trusted library allocation
page read and write
307C0034C000
trusted library allocation
page read and write
2341E000
heap
page read and write
1D6182DD000
heap
page read and write
1D61E880000
trusted library section
page read and write
23300000
heap
page read and write
307C01BD0000
trusted library allocation
page read and write
1D6182DA000
heap
page read and write
23432000
heap
page read and write
307C01704000
trusted library allocation
page read and write
307C01C01000
trusted library allocation
page read and write
381C97E000
unkown
page readonly
428400744000
trusted library allocation
page read and write
307C013B8000
trusted library allocation
page read and write
307C01B58000
trusted library allocation
page read and write
1D6182EB000
heap
page read and write
428400654000
trusted library allocation
page read and write
12E3FE000
unkown
page readonly
307C01498000
trusted library allocation
page read and write
307C01740000
trusted library allocation
page read and write
307C0034C000
trusted library allocation
page read and write
2387F000
stack
page read and write
307C02204000
trusted library allocation
page read and write
382800220000
trusted library allocation
page read and write
2E543180000
direct allocation
page read and write
12B3FE000
unkown
page readonly
307C0034C000
trusted library allocation
page read and write
307C0169C000
trusted library allocation
page read and write
1D6182EB000
heap
page read and write
18FCFB02000
heap
page read and write
1D61EAD0000
trusted library section
page read and write
18FD50C0000
trusted library allocation
page read and write
F73A94F000
stack
page read and write
381B57E000
unkown
page readonly
1D6182E3000
heap
page read and write
23337000
heap
page read and write
307C01934000
trusted library allocation
page read and write
307C02B8C000
trusted library allocation
page read and write
307C008D8000
trusted library allocation
page read and write
1D6182DA000
heap
page read and write
307C01700000
trusted library allocation
page read and write
307C00F08000
trusted library allocation
page read and write
235C3000
heap
page read and write
428400354000
trusted library allocation
page read and write
307C00CD8000
trusted library allocation
page read and write
307C01C84000
trusted library allocation
page read and write
1D6182DA000
heap
page read and write
BEA058D000
stack
page read and write
9B9750C000
stack
page read and write
1D6182CB000
heap
page read and write
1D11D000
stack
page read and write
381C07B000
stack
page read and write
307C027ED000
trusted library allocation
page read and write
428400614000
trusted library allocation
page read and write
1D61EED1000
trusted library section
page read and write
18FCFB06000
heap
page read and write
307C01B08000
trusted library allocation
page read and write
307C014B8000
trusted library allocation
page read and write
307C01828000
trusted library allocation
page read and write
824EDFD000
stack
page read and write
2CCE000
stack
page read and write
307C00C74000
trusted library allocation
page read and write
2E543180000
direct allocation
page read and write
18FD5140000
trusted library allocation
page read and write
307C00898000
trusted library allocation
page read and write
10B3FE000
unkown
page readonly
1D6182CE000
heap
page read and write
307C0015C000
trusted library allocation
page read and write
1D61C4EA000
heap
page read and write
2D0E000
stack
page read and write
307C00A68000
trusted library allocation
page read and write
307C00220000
trusted library allocation
page read and write
307C00DBC000
trusted library allocation
page read and write
307C016E0000
trusted library allocation
page read and write
23440000
heap
page read and write
307C00E0C000
trusted library allocation
page read and write
1D614DB9000
heap
page read and write
2E543050000
heap
page read and write
307C01B94000
trusted library allocation
page read and write
307C01B88000
trusted library allocation
page read and write
18FCFB29000
heap
page read and write
307C015E0000
trusted library allocation
page read and write
3828002A4000
trusted library allocation
page read and write
307C0162C000
trusted library allocation
page read and write
1A814610000
direct allocation
page read and write
307C01C2C000
trusted library allocation
page read and write
29D822D8000
heap
page read and write
307C012EC000
trusted library allocation
page read and write
F64F2FF000
stack
page read and write
307C02F00000
trusted library allocation
page read and write
18FD5120000
trusted library allocation
page read and write
428400734000
trusted library allocation
page read and write
12BBFE000
stack
page read and write
23422000
heap
page read and write
307C001E0000
trusted library allocation
page read and write
23423000
heap
page read and write
307C0084C000
trusted library allocation
page read and write
1D6182FD000
heap
page read and write
1D6182DD000
heap
page read and write
10EBFE000
stack
page read and write
307C01718000
trusted library allocation
page read and write
1D618849000
heap
page read and write
1D6182A0000
heap
page read and write
307C0180C000
trusted library allocation
page read and write
2EEA000
heap
page read and write
3828002C0000
trusted library allocation
page read and write
1F03AE60000
heap
page read and write
307C01618000
trusted library allocation
page read and write
1D6182E0000
heap
page read and write
18FD50FC000
trusted library allocation
page read and write
23330000
heap
page read and write
7FF7D0F41000
unkown
page readonly
42840078C000
trusted library allocation
page read and write
3994002DC000
direct allocation
page read and write
1D6182DD000
heap
page read and write
307C0061C000
trusted library allocation
page read and write
307C00310000
trusted library allocation
page read and write
1AE003C0000
heap
page read and write
1D61F240000
trusted library section
page read and write
1D6182E0000
heap
page read and write
307C001F0000
trusted library allocation
page read and write
1D6182DD000
heap
page read and write
1D61EEB0000
trusted library section
page read and write
2A8591B0000
heap
page read and write
1D6182E5000
heap
page read and write
307C01AD0000
trusted library allocation
page read and write
307C00F08000
trusted library allocation
page read and write
1D61F040000
trusted library section
page read and write
307C010A8000
trusted library allocation
page read and write
1D61E5C2000
trusted library section
page read and write
1D6182DD000
heap
page read and write
211D0170000
heap
page read and write
18FD4EF7000
heap
page read and write
1D614E20000
heap
page read and write
1D6182E5000
heap
page read and write
4284006E4000
trusted library allocation
page read and write
381BE7C000
stack
page read and write
1F03AE69000
heap
page read and write
1D61C4E4000
heap
page read and write
23404000
heap
page read and write
1D6182E0000
heap
page read and write
307C002F0000
trusted library allocation
page read and write
307C0018C000
trusted library allocation
page read and write
307C00C30000
trusted library allocation
page read and write
184F1150000
heap
page read and write
307C00304000
trusted library allocation
page read and write
307C02AF4000
trusted library allocation
page read and write
23400000
trusted library allocation
page read and write
1D61F04E000
trusted library section
page read and write
307C0034C000
trusted library allocation
page read and write
2D65000
heap
page read and write
24AF9813000
unkown
page read and write
307C00D9C000
trusted library allocation
page read and write
1D6182E8000
heap
page read and write
1D614DB5000
heap
page read and write
307C01B70000
trusted library allocation
page read and write
3828002A4000
trusted library allocation
page read and write
2341B000
heap
page read and write
1D6182DA000
heap
page read and write
3828002F8000
trusted library allocation
page read and write
307C007B4000
trusted library allocation
page read and write
307C01D74000
trusted library allocation
page read and write
307C0100C000
trusted library allocation
page read and write
18FCFA66000
heap
page read and write
307C013B8000
trusted library allocation
page read and write
1D614D37000
heap
page read and write
25319D00000
heap
page read and write
3828002A0000
trusted library allocation
page read and write
307C01530000
trusted library allocation
page read and write
297E9248000
heap
page read and write
307C00FA8000
trusted library allocation
page read and write
307C00F14000
trusted library allocation
page read and write
307C00C30000
trusted library allocation
page read and write
428400688000
trusted library allocation
page read and write
7FF6D4A3E000
unkown
page readonly
1D6182E0000
heap
page read and write
1D618804000
heap
page read and write
307C01B0C000
trusted library allocation
page read and write
11ABFD000
stack
page read and write
238DE000
stack
page read and write
307C00EC4000
trusted library allocation
page read and write
1D390000
trusted library allocation
page read and write
307C02A49000
trusted library allocation
page read and write
399400217000
direct allocation
page read and write
307C00304000
trusted library allocation
page read and write
307C001F4000
trusted library allocation
page read and write
1D35D000
stack
page read and write
307C006CC000
trusted library allocation
page read and write
1D6182B0000
heap
page read and write
1073FE000
unkown
page readonly
1D6182DD000
heap
page read and write
18FD4F0B000
heap
page read and write
307C01D1F000
trusted library allocation
page read and write
F64EF2D000
stack
page read and write
307C013DC000
trusted library allocation
page read and write
1D6182DA000
heap
page read and write
3D752FF000
stack
page read and write
307C02EF4000
trusted library allocation
page read and write
1D6187B2000
heap
page read and write
307C01B3C000
trusted library allocation
page read and write
2341E000
heap
page read and write
42840060C000
trusted library allocation
page read and write
307C00360000
trusted library allocation
page read and write
381B47E000
unkown
page readonly
F73A9CF000
stack
page read and write
7FF6D4A46000
unkown
page execute and read and write
20DC8B98000
heap
page read and write
23422000
heap
page read and write
307C00340000
trusted library allocation
page read and write
2349C000
heap
page read and write
307C01914000
trusted library allocation
page read and write
1D6182E0000
heap
page read and write
307C00E01000
trusted library allocation
page read and write
297E94E5000
heap
page read and write
DAEFA7E000
stack
page read and write
1A8144F0000
heap
page read and write
307C01DD8000
trusted library allocation
page read and write
2391F000
heap
page read and write
307C00FDC000
trusted library allocation
page read and write
307C01ABC000
trusted library allocation
page read and write
307C00DA8000
trusted library allocation
page read and write
24AF9924000
heap
page read and write
1D6182E5000
heap
page read and write
297E91D0000
heap
page read and write
307C01904000
trusted library allocation
page read and write
29D82210000
heap
page read and write
1D6182DD000
heap
page read and write
307C00824000
trusted library allocation
page read and write
2E543180000
direct allocation
page read and write
1D61E3A3000
heap
page read and write
1AE00418000
heap
page read and write
428400390000
trusted library allocation
page read and write
307C00844000
trusted library allocation
page read and write
307C004E6000
trusted library allocation
page read and write
307C012B8000
trusted library allocation
page read and write
6D099000
unkown
page readonly
307C01920000
trusted library allocation
page read and write
1D6182E3000
heap
page read and write
1213FE000
unkown
page readonly
7FF6D4FBE000
unkown
page execute read
6F8ED000
unkown
page readonly
307C00210000
trusted library allocation
page read and write
307C01394000
trusted library allocation
page read and write
307C014F8000
trusted library allocation
page read and write
381C87D000
stack
page read and write
307C010C8000
trusted library allocation
page read and write
307C0060C000
trusted library allocation
page read and write
307C005EC000
trusted library allocation
page read and write
307C02670000
trusted library allocation
page read and write
121BFB000
stack
page read and write
1D6182DD000
heap
page read and write
211D0270000
heap
page read and write
1F0000
heap
page read and write
1D6182E5000
heap
page read and write
428400784000
trusted library allocation
page read and write
24AF982B000
heap
page read and write
307C01601000
trusted library allocation
page read and write
6C890000
unkown
page read and write
307C02C0C000
trusted library allocation
page read and write
307C005B8000
trusted library allocation
page read and write
29D821F0000
heap
page read and write
428400220000
trusted library allocation
page read and write
42840075C000
trusted library allocation
page read and write
307C0056C000
trusted library allocation
page read and write
42840080C000
trusted library allocation
page read and write
18FD4EC0000
heap
page read and write
307C01714000
trusted library allocation
page read and write
307C01B44000
trusted library allocation
page read and write
307C01515000
trusted library allocation
page read and write
18FCFB02000
heap
page read and write
23419000
heap
page read and write
169BC360000
heap
page read and write
18FD4DD0000
trusted library allocation
page read and write
1D6182E3000
heap
page read and write
184F1120000
heap
page read and write
1D6182E5000
heap
page read and write
307C00A98000
trusted library allocation
page read and write
307C01C18000
trusted library allocation
page read and write
307C00F78000
trusted library allocation
page read and write
307C01B60000
trusted library allocation
page read and write
1D6182EB000
heap
page read and write
48B000
unkown
page write copy
18FD5450000
trusted library allocation
page read and write
307C013DC000
trusted library allocation
page read and write
1D6182DD000
heap
page read and write
1D6182DA000
heap
page read and write
307C00D68000
trusted library allocation
page read and write
2EE0000
heap
page read and write
307C02756000
trusted library allocation
page read and write
307C01C80000
trusted library allocation
page read and write
382800274000
trusted library allocation
page read and write
307C0177C000
trusted library allocation
page read and write
648000
unkown
page execute and read and write
24AF9915000
trusted library allocation
page read and write
DAEF7FB000
stack
page read and write
1D6182EB000
heap
page read and write
24AF9810000
unkown
page read and write
307C01048000
trusted library allocation
page read and write
382800201000
trusted library allocation
page read and write
1D6182E3000
heap
page read and write
1D6182EB000
heap
page read and write
307C017BC000
trusted library allocation
page read and write
2E543180000
direct allocation
page read and write
2A859218000
heap
page read and write
1A814610000
direct allocation
page read and write
307C018E4000
trusted library allocation
page read and write
1D6182EB000
heap
page read and write
382800238000
trusted library allocation
page read and write
307C01C3C000
trusted library allocation
page read and write
1A814670000
heap
page read and write
1D6182DD000
heap
page read and write
24AF9B02000
heap
page read and write
1D6182EB000
heap
page read and write
18FCFB13000
heap
page read and write
1D6182FD000
heap
page read and write
18FD4E58000
heap
page read and write
4284006FC000
trusted library allocation
page read and write
1D6182DA000
heap
page read and write
1D618790000
heap
page read and write
1D61E337000
unclassified section
page read and write
C1FD87F000
stack
page read and write
307C00360000
trusted library allocation
page read and write
169BC390000
heap
page read and write
12CBFE000
stack
page read and write
12FBFE000
stack
page read and write
1D6182DA000
heap
page read and write
307C0034C000
trusted library allocation
page read and write
1323FE000
unkown
page readonly
1A249190000
heap
page read and write
307C0022C000
trusted library allocation
page read and write
307C01864000
trusted library allocation
page read and write
23443000
heap
page read and write
549000
unkown
page execute and read and write
307C00B40000
trusted library allocation
page read and write
18FD4F13000
heap
page read and write
307C012C8000
trusted library allocation
page read and write
307C02744000
trusted library allocation
page read and write
1D6182E0000
heap
page read and write
307C01758000
trusted library allocation
page read and write
307C01D7C000
trusted library allocation
page read and write
18FCFA8D000
heap
page read and write
428400601000
trusted library allocation
page read and write
381B97E000
unkown
page readonly
1D61EE41000
trusted library section
page read and write
30DF000
stack
page read and write
1D6182DD000
heap
page read and write
307C0262E000
trusted library allocation
page read and write
1D6182E5000
heap
page read and write
307C00A48000
trusted library allocation
page read and write
18FD4E42000
heap
page read and write
381D6FE000
stack
page read and write
428400754000
trusted library allocation
page read and write
382800235000
trusted library allocation
page read and write
307C00F08000
trusted library allocation
page read and write
7FF6D52E5000
unkown
page readonly
18FD5034000
trusted library allocation
page read and write
307C01860000
trusted library allocation
page read and write
4284006B0000
trusted library allocation
page read and write
307C00705000
trusted library allocation
page read and write
7FF6D4361000
unkown
page execute read
307C01C20000
trusted library allocation
page read and write
18FD4EF3000
heap
page read and write
4284007CC000
trusted library allocation
page read and write
307C00FC4000
trusted library allocation
page read and write
1D6187D1000
heap
page read and write
307C0034C000
trusted library allocation
page read and write
10BBFC000
stack
page read and write
18FD5030000
trusted library allocation
page read and write
307C02601000
trusted library allocation
page read and write
1D6182DA000
heap
page read and write
1D6182DA000
heap
page read and write
116BFE000
stack
page read and write
4284006E8000
trusted library allocation
page read and write
7FF6D4375000
unkown
page write copy
307C01C18000
trusted library allocation
page read and write
1D61F24E000
trusted library section
page read and write
307C00484000
trusted library allocation
page read and write
307C017D8000
trusted library allocation
page read and write
307C0062D000
trusted library allocation
page read and write
307C01BE8000
trusted library allocation
page read and write
1E131ED8000
heap
page read and write
307C00390000
trusted library allocation
page read and write
61E00000
direct allocation
page execute and read and write
307C01650000
trusted library allocation
page read and write
307C014A8000
trusted library allocation
page read and write
307C0163C000
trusted library allocation
page read and write
127BFD000
stack
page read and write
105BFE000
stack
page read and write
1D6182E0000
heap
page read and write
1D6182EB000
heap
page read and write
1D162000
heap
page read and write
428400770000
trusted library allocation
page read and write
6D097000
unkown
page read and write
307C00F08000
trusted library allocation
page read and write
307C01C28000
trusted library allocation
page read and write
307C01898000
trusted library allocation
page read and write
307C00224000
trusted library allocation
page read and write
307C01630000
trusted library allocation
page read and write
1D6182DD000
heap
page read and write
307C01B00000
trusted library allocation
page read and write
307C01844000
trusted library allocation
page read and write
1D6182E5000
heap
page read and write
307C00E68000
trusted library allocation
page read and write
6C88F000
unkown
page write copy
428400404000
trusted library allocation
page read and write
307C017C8000
trusted library allocation
page read and write
7FF6D4DC2000
unkown
page execute and read and write
2344C000
heap
page read and write
6C88E000
unkown
page read and write
103BFE000
stack
page read and write
7FF7D0875000
unkown
page read and write
307C00C68000
trusted library allocation
page read and write
307C01394000
trusted library allocation
page read and write
307C00E44000
trusted library allocation
page read and write
1D6182DF000
heap
page read and write
307C001C4000
trusted library allocation
page read and write
4B4E000
heap
page read and write
307C02A0F000
trusted library allocation
page read and write
3994002D0000
direct allocation
page read and write
1D6182E0000
heap
page read and write
42840035C000
trusted library allocation
page read and write
382800230000
trusted library allocation
page read and write
307C0179C000
trusted library allocation
page read and write
1D6182E5000
heap
page read and write
307C027B0000
trusted library allocation
page read and write
12EBFC000
stack
page read and write
1CC5E000
stack
page read and write
1D6182E5000
heap
page read and write
22CBA5C0000
heap
page read and write
307C01840000
trusted library allocation
page read and write
307C02B43000
trusted library allocation
page read and write
307C00304000
trusted library allocation
page read and write
382800294000
trusted library allocation
page read and write
2341F000
heap
page read and write
23440000
heap
page read and write
1D6182E5000
heap
page read and write
307C01B20000
trusted library allocation
page read and write
10F3FE000
unkown
page readonly
307C01B74000
trusted library allocation
page read and write
428400374000
trusted library allocation
page read and write
307C0165C000
trusted library allocation
page read and write
307C00354000
trusted library allocation
page read and write
381BC7C000
stack
page read and write
F73A8CD000
stack
page read and write
20DC8B80000
heap
page read and write
1A814403000
heap
page read and write
235CD000
heap
page read and write
18FD4D70000
trusted library allocation
page read and write
428400330000
trusted library allocation
page read and write
307C01525000
trusted library allocation
page read and write
1D6182E0000
heap
page read and write
428400408000
trusted library allocation
page read and write
784AF7F000
stack
page read and write
1083FE000
unkown
page readonly
307C02D44000
trusted library allocation
page read and write
307C00D1C000
trusted library allocation
page read and write
1D61C4C3000
heap
page read and write
7FF7D0860000
unkown
page readonly
307C01B98000
trusted library allocation
page read and write
1D6182E3000
heap
page read and write
307C0020C000
trusted library allocation
page read and write
307C02EE4000
trusted library allocation
page read and write
1D6182DA000
heap
page read and write
307C00CEE000
trusted library allocation
page read and write
307C01D58000
trusted library allocation
page read and write
24AF9875000
heap
page read and write
11A3FE000
unkown
page readonly
307C02770000
trusted library allocation
page read and write
307C001F8000
trusted library allocation
page read and write
1D6182DA000
heap
page read and write
307C00EF8000
trusted library allocation
page read and write
7FF7D0F45000
unkown
page readonly
307C02A01000
trusted library allocation
page read and write
1D01E000
stack
page read and write
1D614FE0000
heap
page read and write
307C001EC000
trusted library allocation
page read and write
23443000
heap
page read and write
307C01958000
trusted library allocation
page read and write
905747C000
stack
page read and write
1D6182DD000
heap
page read and write
428400368000
trusted library allocation
page read and write
18FD4EED000
heap
page read and write
1D61E4BE000
trusted library section
page read and write
2377E000
stack
page read and write
307C00CD8000
trusted library allocation
page read and write
307C016F4000
trusted library allocation
page read and write
22CBA5E0000
heap
page read and write
307C006BC000
trusted library allocation
page read and write
307C00C34000
trusted library allocation
page read and write
18FD0100000
heap
page read and write
2E543470000
heap
page read and write
3828002A0000
trusted library allocation
page read and write
307C01D13000
trusted library allocation
page read and write
1D614D10000
heap
page readonly
307C01BF4000
trusted library allocation
page read and write
7FF7D14BE000
unkown
page execute read
7FF7D0F41000
unkown
page readonly
1D614FE5000
heap
page read and write
20DC8B30000
heap
page read and write
10CBFC000
stack
page read and write
1E131ED0000
heap
page read and write
6F8FE000
unkown
page read and write
307C002C0000
trusted library allocation
page read and write
307C01D20000
trusted library allocation
page read and write
169BC395000
heap
page read and write
307C000A8000
trusted library allocation
page read and write
1D6182E5000
heap
page read and write
F64F3FF000
stack
page read and write
307C01778000
trusted library allocation
page read and write
752948C000
stack
page read and write
307C002A4000
trusted library allocation
page read and write
307C0034C000
trusted library allocation
page read and write
1D6182E5000
heap
page read and write
235BE000
heap
page read and write
1D61EE30000
trusted library section
page read and write
7FF7D0F45000
unkown
page readonly
399400230000
direct allocation
page read and write
905757E000
stack
page read and write
307C0067C000
trusted library allocation
page read and write
18FD5000000
trusted library allocation
page read and write
307C0244F000
trusted library allocation
page read and write
2A39F000
stack
page read and write
1D6182DD000
heap
page read and write
18FD508E000
trusted library allocation
page read and write
1D6182DA000
heap
page read and write
1D6182E0000
heap
page read and write
307C0087C000
trusted library allocation
page read and write
1D6182DD000
heap
page read and write
307C01C7C000
trusted library allocation
page read and write
1D6182EB000
heap
page read and write
752958F000
stack
page read and write
18FCFA5B000
heap
page read and write
2FA7000
heap
page read and write
108BFB000
stack
page read and write
7FF6D4D42000
unkown
page execute and read and write
307C017F8000
trusted library allocation
page read and write
107BFB000
stack
page read and write
18FD5130000
trusted library allocation
page read and write
1D6182E5000
heap
page read and write
1D6182DD000
heap
page read and write
169BC420000
heap
page read and write
297EACB0000
heap
page read and write
428400730000
trusted library allocation
page read and write
381B77E000
unkown
page readonly
There are 2009 hidden memdumps, click here to show them.