IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_de576c89c85d95f63177b89249eef622329cc21c_49e505fd_111ff96f-8348-4c35-ad6a-0f8819650c51\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBF5.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Nov 19 21:42:13 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDAC.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDDC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 --field-trial-handle=2348,i,5763843533842623752,7360464993323251828,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7292 -s 1088

URLs

Name
IP
Malicious
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
34.116.198.130
malicious
QUERY|rd|AAAA|IN|home.fvtekk5pn.top
malicious
CTR-DRBG.top
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://anglebug.com/7246)
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://anglebug.com/3452F
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
http://fvtekk5pn.top/v1/upload.php9e-f466f42035a1
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
http://anglebug.com/6876B
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/3586:
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
http://anglebug.com/67557
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
http://anglebug.com/8229N
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://anglebug.com/3498?
unknown
https://issuetracker.google.com/161903006
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://unisolated.invalid/a
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEklyCreate
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW17320193476963
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/7036T
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
http://fvtekk5pn.top/v1/upload.b39e
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/2162V
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://anglebug.com/3502I
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fvtekk5pn.top
34.116.198.130
malicious
www.google.com
142.250.185.196
fvtekk5pn.top
34.116.198.130

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
142.250.185.196
www.google.com
United States
34.116.198.130
home.fvtekk5pn.top
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{d2299d6b-6eae-4bcd-8b91-c6d70929ef0b}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
malicious
\REGISTRY\A\{d2299d6b-6eae-4bcd-8b91-c6d70929ef0b}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
malicious
\REGISTRY\A\{d2299d6b-6eae-4bcd-8b91-c6d70929ef0b}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
malicious
\REGISTRY\A\{d2299d6b-6eae-4bcd-8b91-c6d70929ef0b}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
malicious
\REGISTRY\A\{d2299d6b-6eae-4bcd-8b91-c6d70929ef0b}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
malicious
\REGISTRY\A\{d2299d6b-6eae-4bcd-8b91-c6d70929ef0b}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
malicious
\REGISTRY\A\{d2299d6b-6eae-4bcd-8b91-c6d70929ef0b}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
malicious
\REGISTRY\A\{d2299d6b-6eae-4bcd-8b91-c6d70929ef0b}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
malicious
\REGISTRY\A\{d2299d6b-6eae-4bcd-8b91-c6d70929ef0b}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
malicious
\REGISTRY\A\{d2299d6b-6eae-4bcd-8b91-c6d70929ef0b}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
malicious
\REGISTRY\A\{d2299d6b-6eae-4bcd-8b91-c6d70929ef0b}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
malicious
\REGISTRY\A\{d2299d6b-6eae-4bcd-8b91-c6d70929ef0b}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
malicious
\REGISTRY\A\{d2299d6b-6eae-4bcd-8b91-c6d70929ef0b}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
malicious
\REGISTRY\A\{d2299d6b-6eae-4bcd-8b91-c6d70929ef0b}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
malicious
\REGISTRY\A\{d2299d6b-6eae-4bcd-8b91-c6d70929ef0b}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
malicious
\REGISTRY\A\{d2299d6b-6eae-4bcd-8b91-c6d70929ef0b}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
malicious
\REGISTRY\A\{d2299d6b-6eae-4bcd-8b91-c6d70929ef0b}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
malicious
\REGISTRY\A\{d2299d6b-6eae-4bcd-8b91-c6d70929ef0b}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
malicious
\REGISTRY\A\{d2299d6b-6eae-4bcd-8b91-c6d70929ef0b}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1738000
heap
page read and write
malicious
1738000
heap
page read and write
malicious
1704000
heap
page read and write
malicious
1704000
heap
page read and write
malicious
1704000
heap
page read and write
malicious
1723000
heap
page read and write
malicious
1719000
heap
page read and write
malicious
1738000
heap
page read and write
malicious
16EE000
heap
page read and write
malicious
1738000
heap
page read and write
malicious
1738000
heap
page read and write
malicious
6A11000
heap
page read and write
5D00001DC000
trusted library allocation
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
5D0000678000
trusted library allocation
page read and write
6A11000
heap
page read and write
8315000
heap
page read and write
2F800418000
trusted library allocation
page read and write
21FDB742000
heap
page read and write
6A11000
heap
page read and write
21FE17B7000
unclassified section
page read and write
5D000037C000
trusted library allocation
page read and write
5D0000EEC000
trusted library allocation
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
2F800760000
trusted library allocation
page read and write
ED8000
unkown
page execute and write copy
21FDBD13000
heap
page read and write
7CF8002B0000
trusted library allocation
page read and write
5D00001F0000
trusted library allocation
page read and write
43C00230000
direct allocation
page read and write
5D000077C000
trusted library allocation
page read and write
21FDB74C000
heap
page read and write
1719000
heap
page read and write
21FDB73B000
heap
page read and write
16F2000
heap
page read and write
5D00001AC000
trusted library allocation
page read and write
1184000
heap
page read and write
5D00001F4000
trusted library allocation
page read and write
6A11000
heap
page read and write
5BCEDFD000
stack
page read and write
6A11000
heap
page read and write
2F8006B8000
trusted library allocation
page read and write
5D00008C4000
trusted library allocation
page read and write
2F800248000
trusted library allocation
page read and write
100E000
unkown
page read and write
5BC2DFE000
stack
page read and write
6A11000
heap
page read and write
21FDBCA9000
heap
page read and write
11ADE000
heap
page read and write
21FDB72E000
heap
page read and write
1001000
unkown
page execute read
6A11000
heap
page read and write
21FDB73B000
heap
page read and write
21FDB746000
heap
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
16DC000
heap
page read and write
2F800714000
trusted library allocation
page read and write
7672000
heap
page read and write
1184000
heap
page read and write
8316000
heap
page read and write
5D00001B4000
trusted library allocation
page read and write
5D0000F4C000
trusted library allocation
page read and write
21FDB746000
heap
page read and write
21FDBCF4000
heap
page read and write
21FDB73B000
heap
page read and write
7CF8002BC000
trusted library allocation
page read and write
761A000
heap
page read and write
768B000
heap
page read and write
21FDFB42000
trusted library allocation
page read and write
6A11000
heap
page read and write
2F8007C8000
trusted library allocation
page read and write
7595000
heap
page read and write
761E000
heap
page read and write
6A11000
heap
page read and write
7401000
heap
page read and write
21FDB746000
heap
page read and write
21FDB72E000
heap
page read and write
6A11000
heap
page read and write
100A000
unkown
page readonly
5BE45FE000
unkown
page readonly
6A11000
heap
page read and write
6A11000
heap
page read and write
5BD9DFC000
stack
page read and write
1001000
unkown
page execute read
6A11000
heap
page read and write
21FDB742000
heap
page read and write
7402000
heap
page read and write
5D0000F38000
trusted library allocation
page read and write
831B000
heap
page read and write
21FDB74D000
heap
page read and write
1011000
unkown
page readonly
6A11000
heap
page read and write
5D000097C000
trusted library allocation
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
21FDB767000
heap
page read and write
21FDB729000
heap
page read and write
5BCDDFE000
stack
page read and write
770C000
heap
page read and write
5D0000CA4000
trusted library allocation
page read and write
21FDB72E000
heap
page read and write
6A11000
heap
page read and write
5D00004E8000
trusted library allocation
page read and write
21FDB746000
heap
page read and write
5D0000A54000
trusted library allocation
page read and write
21FDB742000
heap
page read and write
5D00002B0000
trusted library allocation
page read and write
830B000
heap
page read and write
6A11000
heap
page read and write
8315000
heap
page read and write
5D0000318000
trusted library allocation
page read and write
7CF800288000
trusted library allocation
page read and write
21FDB767000
heap
page read and write
6A6F8000
direct allocation
page read and write
21FDB733000
heap
page read and write
117FB000
heap
page read and write
3150000
heap
page read and write
5D00004BC000
trusted library allocation
page read and write
7120000
direct allocation
page execute and read and write
7501000
heap
page read and write
21FDBC9F000
heap
page read and write
5BC4DFD000
stack
page read and write
2F800744000
trusted library allocation
page read and write
21FDB744000
heap
page read and write
5D0000EAC000
trusted library allocation
page read and write
6A11000
heap
page read and write
21FDB742000
heap
page read and write
6A11000
heap
page read and write
8332000
heap
page read and write
6A11000
heap
page read and write
21FDB733000
heap
page read and write
7626000
heap
page read and write
75D1000
heap
page read and write
21FDB73B000
heap
page read and write
5D00009D8000
trusted library allocation
page read and write
5D0000E74000
trusted library allocation
page read and write
21FDB733000
heap
page read and write
5D0000F5C000
trusted library allocation
page read and write
5BD7DFC000
stack
page read and write
6A11000
heap
page read and write
21FDB73B000
heap
page read and write
7CF8002B0000
trusted library allocation
page read and write
6A11000
heap
page read and write
21FDB73B000
heap
page read and write
5D0000F80000
trusted library allocation
page read and write
6A11000
heap
page read and write
2F80033C000
trusted library allocation
page read and write
6A11000
heap
page read and write
5D0000CCC000
trusted library allocation
page read and write
5D0000EB8000
trusted library allocation
page read and write
5D0000214000
trusted library allocation
page read and write
21FDB746000
heap
page read and write
1723000
heap
page read and write
21FDB744000
heap
page read and write
FA0000
heap
page read and write
21FDB746000
heap
page read and write
21FDB74C000
heap
page read and write
21FDB741000
heap
page read and write
21FE1FE0000
trusted library section
page read and write
5D00003EC000
trusted library allocation
page read and write
6EA0000
direct allocation
page read and write
1AC000
stack
page read and write
7CF8002BC000
trusted library allocation
page read and write
7656000
heap
page read and write
21FDB73B000
heap
page read and write
6A11000
heap
page read and write
21FDB742000
heap
page read and write
21FDB746000
heap
page read and write
6A11000
heap
page read and write
2F8007B4000
trusted library allocation
page read and write
6A11000
heap
page read and write
5BC65FE000
unkown
page readonly
5D0000A80000
trusted library allocation
page read and write
75B8000
heap
page read and write
5D0000C48000
trusted library allocation
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
21FDB73B000
heap
page read and write
21FDB74C000
heap
page read and write
2F800640000
trusted library allocation
page read and write
21FDB742000
heap
page read and write
8316000
heap
page read and write
21FDB736000
heap
page read and write
2F800220000
trusted library allocation
page read and write
21FDB756000
heap
page read and write
21FDB742000
heap
page read and write
2F800724000
trusted library allocation
page read and write
5D00006F8000
trusted library allocation
page read and write
6A11000
heap
page read and write
2F800704000
trusted library allocation
page read and write
21FD80A0000
heap
page readonly
1707000
heap
page read and write
21FE1A12000
trusted library section
page read and write
6EA0000
direct allocation
page read and write
5D0000E61000
trusted library allocation
page read and write
5D0000494000
trusted library allocation
page read and write
2F8006B0000
trusted library allocation
page read and write
21FDB742000
heap
page read and write
21FDB742000
heap
page read and write
7406000
heap
page read and write
167E000
heap
page read and write
6A11000
heap
page read and write
21FDB746000
heap
page read and write
16EE000
heap
page read and write
21FDB74C000
heap
page read and write
6A00000
direct allocation
page read and write
5D0000082000
trusted library allocation
page read and write
5D00001EC000
trusted library allocation
page read and write
6A11000
heap
page read and write
2F8006D4000
trusted library allocation
page read and write
112E000
stack
page read and write
21FDB742000
heap
page read and write
5D00005B0000
trusted library allocation
page read and write
21FDB742000
heap
page read and write
5BDF5FE000
unkown
page readonly
390000
heap
page read and write
1011000
unkown
page readonly
21FDB73B000
heap
page read and write
21FDB733000
heap
page read and write
21FDB744000
heap
page read and write
5D0000910000
trusted library allocation
page read and write
5D0000B80000
trusted library allocation
page read and write
2F800601000
trusted library allocation
page read and write
6A11000
heap
page read and write
21FDB733000
heap
page read and write
21FD80B0000
heap
page read and write
7CF8002A0000
trusted library allocation
page read and write
5D000015C000
trusted library allocation
page read and write
16EE000
heap
page read and write
172D000
heap
page read and write
5D0000F4C000
trusted library allocation
page read and write
6A11000
heap
page read and write
1719000
heap
page read and write
6A11000
heap
page read and write
75EC000
heap
page read and write
5D0000F4C000
trusted library allocation
page read and write
21FDB73B000
heap
page read and write
777D000
heap
page read and write
8360000
heap
page read and write
1011000
unkown
page readonly
5D000061C000
trusted library allocation
page read and write
6A11000
heap
page read and write
5D0000CDC000
trusted library allocation
page read and write
21FDB73B000
heap
page read and write
5BCFDFA000
stack
page read and write
21FDBD09000
heap
page read and write
1184000
heap
page read and write
1160000
heap
page read and write
6A11000
heap
page read and write
2EC000
stack
page read and write
21FDB742000
heap
page read and write
2F800694000
trusted library allocation
page read and write
2F800684000
trusted library allocation
page read and write
1184000
heap
page read and write
6A11000
heap
page read and write
100A000
unkown
page readonly
21FE1A73000
trusted library section
page read and write
766A000
heap
page read and write
5D0000D4C000
trusted library allocation
page read and write
21FE23B0000
trusted library section
page read and write
11BEA000
heap
page read and write
43C00201000
direct allocation
page read and write
5D000043D000
trusted library allocation
page read and write
6C0C1000
unkown
page execute read
5D0000A18000
trusted library allocation
page read and write
6A11000
heap
page read and write
1184000
heap
page read and write
21FD8090000
heap
page read and write
6A11000
heap
page read and write
21FDB746000
heap
page read and write
21FDB746000
heap
page read and write
6A11000
heap
page read and write
21FDB74C000
heap
page read and write
21FDB73C000
heap
page read and write
12067000
heap
page read and write
5D0000D20000
trusted library allocation
page read and write
6A11000
heap
page read and write
2F80025C000
trusted library allocation
page read and write
6A11000
heap
page read and write
2F8002F4000
trusted library allocation
page read and write
1184000
heap
page read and write
7505000
heap
page read and write
21FDB74C000
heap
page read and write
21FDB74C000
heap
page read and write
319F000
stack
page read and write
21FDB746000
heap
page read and write
6A11000
heap
page read and write
5BCCDFE000
stack
page read and write
5BC35FE000
unkown
page readonly
2F800238000
trusted library allocation
page read and write
21FDB746000
heap
page read and write
5D000021C000
trusted library allocation
page read and write
7CF800201000
trusted library allocation
page read and write
21FDB73B000
heap
page read and write
6A11000
heap
page read and write
7507000
heap
page read and write
5D000022C000
trusted library allocation
page read and write
21FDB73B000
heap
page read and write
2F800230000
trusted library allocation
page read and write
7501000
heap
page read and write
21FE273E000
trusted library section
page read and write
21FDBC40000
heap
page read and write
21FDB74C000
heap
page read and write
21FDB744000
heap
page read and write
5BD85FE000
unkown
page readonly
21FDB74C000
heap
page read and write
21FDB733000
heap
page read and write
6A00000
direct allocation
page read and write
2F800374000
trusted library allocation
page read and write
6A11000
heap
page read and write
5D00000F0000
trusted library allocation
page read and write
21FDB733000
heap
page read and write
21FDBCA7000
heap
page read and write
21FDB73B000
heap
page read and write
21FDB746000
heap
page read and write
21FDB74C000
heap
page read and write
75A9000
direct allocation
page read and write
21FDBC91000
heap
page read and write
5BCBDFE000
stack
page read and write
5D00001F8000
trusted library allocation
page read and write
5D00000D0000
trusted library allocation
page read and write
6A11000
heap
page read and write
21FDB744000
heap
page read and write
2F8006FC000
trusted library allocation
page read and write
6A11000
heap
page read and write
21FDBCC3000
heap
page read and write
8332000
heap
page read and write
7CF8002F4000
trusted library allocation
page read and write
7120000
direct allocation
page execute and read and write
6A11000
heap
page read and write
2F800210000
trusted library allocation
page read and write
5D00007E8000
trusted library allocation
page read and write
5D00001AC000
trusted library allocation
page read and write
21FDB742000
heap
page read and write
7600000
heap
page read and write
21FDB73B000
heap
page read and write
21FDB733000
heap
page read and write
16DE000
heap
page read and write
43C00250000
direct allocation
page read and write
6A11000
heap
page read and write
5D000063C000
trusted library allocation
page read and write
21FDB744000
heap
page read and write
7506000
heap
page read and write
6C1EC000
unkown
page readonly
21FE24E0000
trusted library section
page read and write
2F800330000
trusted library allocation
page read and write
21FDB74C000
heap
page read and write
6A11000
heap
page read and write
34BE000
heap
page read and write
100A000
unkown
page readonly
21FDB733000
heap
page read and write
5D0000DD0000
trusted library allocation
page read and write
831C000
heap
page read and write
5D0000C5C000
trusted library allocation
page read and write
5D0000060000
trusted library allocation
page read and write
21FDB73B000
heap
page read and write
5BD15FE000
unkown
page readonly
6A11000
heap
page read and write
6C0C0000
unkown
page readonly
761E000
heap
page read and write
21FDB74C000
heap
page read and write
43C00274000
direct allocation
page read and write
6A11000
heap
page read and write
6C1E8000
unkown
page readonly
21FDB733000
heap
page read and write
21FDB743000
heap
page read and write
5BE4DFD000
stack
page read and write
21FDB742000
heap
page read and write
5D00002F0000
trusted library allocation
page read and write
1000000
unkown
page readonly
21FDB733000
heap
page read and write
21FE2530000
trusted library section
page read and write
5D0000CF4000
trusted library allocation
page read and write
21FD81BC000
heap
page read and write
21FDB744000
heap
page read and write
7CF8002C0000
trusted library allocation
page read and write
6A11000
heap
page read and write
43C00270000
direct allocation
page read and write
21FDB742000
heap
page read and write
5D000030C000
trusted library allocation
page read and write
5D0000854000
trusted library allocation
page read and write
6A11000
heap
page read and write
1001000
unkown
page execute read
21FDB74C000
heap
page read and write
6A11000
heap
page read and write
5D0000078000
trusted library allocation
page read and write
6A11000
heap
page read and write
5D0000738000
trusted library allocation
page read and write
1719000
heap
page read and write
2F8007CC000
trusted library allocation
page read and write
21FDB767000
heap
page read and write
5D0000390000
trusted library allocation
page read and write
21FDB73B000
heap
page read and write
5BCADFC000
stack
page read and write
1720000
heap
page read and write
12067000
heap
page read and write
70F0000
direct allocation
page execute and read and write
21FDBC89000
heap
page read and write
16EE000
heap
page read and write
5D00007B4000
trusted library allocation
page read and write
21FDB74C000
heap
page read and write
21FDB744000
heap
page read and write
21FDB733000
heap
page read and write
5D0000E01000
trusted library allocation
page read and write
21FDB73B000
heap
page read and write
6A11000
heap
page read and write
1184000
heap
page read and write
5D0000CDC000
trusted library allocation
page read and write
8312000
heap
page read and write
5D0000C50000
trusted library allocation
page read and write
21FDB746000
heap
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
21FDB744000
heap
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
5D000071C000
trusted library allocation
page read and write
5BD3DFE000
stack
page read and write
5BDEDFB000
stack
page read and write
6A00000
direct allocation
page read and write
7501000
heap
page read and write
5D0000298000
trusted library allocation
page read and write
EA0000
heap
page read and write
7654000
heap
page read and write
21FE1860000
heap
page read and write
5D00002B4000
trusted library allocation
page read and write
5D0000B30000
trusted library allocation
page read and write
6A11000
heap
page read and write
5D0000CB4000
trusted library allocation
page read and write
7683000
heap
page read and write
43C00217000
direct allocation
page read and write
5D0000CEC000
trusted library allocation
page read and write
5D0000B74000
trusted library allocation
page read and write
6A00000
direct allocation
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
5D000008F000
trusted library allocation
page read and write
768A000
heap
page read and write
6A11000
heap
page read and write
2F800788000
trusted library allocation
page read and write
8327000
heap
page read and write
5D0000F0C000
trusted library allocation
page read and write
21FDB746000
heap
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
5D0000F78000
trusted library allocation
page read and write
21FDB73B000
heap
page read and write
76D9000
heap
page read and write
21FDB72E000
heap
page read and write
21FDB73B000
heap
page read and write
5D00008A4000
trusted library allocation
page read and write
100A000
unkown
page readonly
2F800348000
trusted library allocation
page read and write
5D0000B34000
trusted library allocation
page read and write
6A11000
heap
page read and write
5D00009A4000
trusted library allocation
page read and write
750A000
heap
page read and write
43C00290000
direct allocation
page read and write
21FDB742000
heap
page read and write
12467000
heap
page read and write
2F800330000
trusted library allocation
page read and write
5D00003EC000
trusted library allocation
page read and write
2F800688000
trusted library allocation
page read and write
21FDB735000
heap
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
21FE24A2000
trusted library section
page read and write
1011000
unkown
page readonly
7402000
heap
page read and write
2F800288000
trusted library allocation
page read and write
100A000
unkown
page readonly
6A11000
heap
page read and write
5D0000715000
trusted library allocation
page read and write
43C00220000
direct allocation
page read and write
75EF000
heap
page read and write
21FDB74C000
heap
page read and write
7120000
direct allocation
page execute and read and write
6A11000
heap
page read and write
5D0000294000
trusted library allocation
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
21FDB733000
heap
page read and write
5BCC5FE000
unkown
page readonly
6A11000
heap
page read and write
21FDB73B000
heap
page read and write
5D0000D10000
trusted library allocation
page read and write
21FDF730000
trusted library section
page read and write
5D0000D10000
trusted library allocation
page read and write
5D00005D8000
trusted library allocation
page read and write
5BC05FE000
unkown
page readonly
1001000
unkown
page execute read
5D0000B14000
trusted library allocation
page read and write
21FDB733000
heap
page read and write
830C000
heap
page read and write
7120000
direct allocation
page execute and read and write
1715000
heap
page read and write
2F80035C000
trusted library allocation
page read and write
5D000034C000
trusted library allocation
page read and write
21FDB72C000
heap
page read and write
8338000
heap
page read and write
82F0000
heap
page read and write
5D0000224000
trusted library allocation
page read and write
43C00280000
direct allocation
page read and write
16EE000
heap
page read and write
5BD8DFB000
stack
page read and write
16DD000
heap
page read and write
5BDB5FE000
unkown
page readonly
1720000
heap
page read and write
830C000
heap
page read and write
7600000
heap
page read and write
6A11000
heap
page read and write
21FDBC82000
heap
page read and write
21FDBC97000
heap
page read and write
2F800320000
trusted library allocation
page read and write
2F800368000
trusted library allocation
page read and write
5BCD5FE000
unkown
page readonly
5D0000830000
trusted library allocation
page read and write
21FDB733000
heap
page read and write
6A11000
heap
page read and write
21FE19A0000
heap
page read and write
100E000
unkown
page write copy
5D00006E8000
trusted library allocation
page read and write
5FC000
stack
page read and write
6A11000
heap
page read and write
21FDB733000
heap
page read and write
5D0000DD8000
trusted library allocation
page read and write
8339000
heap
page read and write
21FDB742000
heap
page read and write
21FDB73B000
heap
page read and write
21FDB73B000
heap
page read and write
6A11000
heap
page read and write
21FDB749000
heap
page read and write
21FDB733000
heap
page read and write
6A11000
heap
page read and write
6A0000
heap
page read and write
21FDB72E000
heap
page read and write
6A11000
heap
page read and write
21FDBCBD000
heap
page read and write
770D000
heap
page read and write
21FDB733000
heap
page read and write
5D0000CA0000
trusted library allocation
page read and write
5BD65FE000
unkown
page readonly
21FDB746000
heap
page read and write
5D0000C94000
trusted library allocation
page read and write
5BECDFE000
stack
page read and write
831C000
heap
page read and write
5D000007E000
trusted library allocation
page read and write
7506000
heap
page read and write
21FD8415000
heap
page read and write
2F800784000
trusted library allocation
page read and write
21FDB73B000
heap
page read and write
6A11000
heap
page read and write
7CF800220000
trusted library allocation
page read and write
5D0000E68000
trusted library allocation
page read and write
6A11000
heap
page read and write
5D0000D8C000
trusted library allocation
page read and write
64E000
stack
page read and write
77ED000
heap
page read and write
5D000017C000
trusted library allocation
page read and write
21FDB744000
heap
page read and write
21FDB74C000
heap
page read and write
6A11000
heap
page read and write
21FDB742000
heap
page read and write
7CF800270000
trusted library allocation
page read and write
21FDB73B000
heap
page read and write
21FDB73B000
heap
page read and write
7F67000
heap
page read and write
2F800700000
trusted library allocation
page read and write
2F800380000
trusted library allocation
page read and write
2F800310000
trusted library allocation
page read and write
21FDB730000
heap
page read and write
5D0000D74000
trusted library allocation
page read and write
7503000
heap
page read and write
7120000
direct allocation
page execute and read and write
21FDB733000
heap
page read and write
6A00000
direct allocation
page read and write
5D00007A0000
trusted library allocation
page read and write
5D000080C000
trusted library allocation
page read and write
75D4000
heap
page read and write
6A11000
heap
page read and write
21FDB72E000
heap
page read and write
7501000
heap
page read and write
5D0000AF4000
trusted library allocation
page read and write
440000
unkown
page readonly
5D0001001000
trusted library allocation
page read and write
7120000
direct allocation
page execute and read and write
21FE2486000
trusted library section
page read and write
7120000
direct allocation
page execute and read and write
5D0000340000
trusted library allocation
page read and write
75AE000
heap
page read and write
2F80080C000
trusted library allocation
page read and write
21FDBCD5000
heap
page read and write
5D00001E0000
trusted library allocation
page read and write
5BC25FE000
unkown
page readonly
21FDB744000
heap
page read and write
5BE7DFE000
stack
page read and write
21FDB733000
heap
page read and write
21FDB742000
heap
page read and write
6A11000
heap
page read and write
21FDB756000
heap
page read and write
5D00002BC000
trusted library allocation
page read and write
6A11000
heap
page read and write
E90000
heap
page read and write
D30000
heap
page read and write
21FDB74B000
heap
page read and write
5D0001074000
trusted library allocation
page read and write
5D0000298000
trusted library allocation
page read and write
75B0000
heap
page read and write
5D0000760000
trusted library allocation
page read and write
5D0000300000
trusted library allocation
page read and write
5D0000FC4000
trusted library allocation
page read and write
5BE65FE000
unkown
page readonly
2F8006EC000
trusted library allocation
page read and write
8321000
heap
page read and write
5D00006DD000
trusted library allocation
page read and write
5BCA5FE000
unkown
page readonly
1719000
heap
page read and write
5BCF5FE000
unkown
page readonly
1011000
unkown
page readonly
5D0000A38000
trusted library allocation
page read and write
21FDB736000
heap
page read and write
5D000016C000
trusted library allocation
page read and write
6A11000
heap
page read and write
2F800758000
trusted library allocation
page read and write
1000000
unkown
page readonly
21FDBCB4000
heap
page read and write
21FDB73B000
heap
page read and write
2F800664000
trusted library allocation
page read and write
5D00009C8000
trusted library allocation
page read and write
21FDB73F000
heap
page read and write
21FDB742000
heap
page read and write
5D0001050000
trusted library allocation
page read and write
6A11000
heap
page read and write
2F8002B0000
trusted library allocation
page read and write
21FDB742000
heap
page read and write
5D0000E30000
trusted library allocation
page read and write
5D0000401000
trusted library allocation
page read and write
6A00000
direct allocation
page read and write
21FDBCA5000
heap
page read and write
5D0000088000
trusted library allocation
page read and write
2F800320000
trusted library allocation
page read and write
21FDB729000
heap
page read and write
6A11000
heap
page read and write
75D3000
heap
page read and write
5D00001D0000
trusted library allocation
page read and write
5D000014C000
trusted library allocation
page read and write
16EA000
heap
page read and write
7500000
heap
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
5BD75FE000
unkown
page readonly
21FDB746000
heap
page read and write
7120000
direct allocation
page execute and read and write
16EC000
heap
page read and write
5BDBDFB000
stack
page read and write
6A11000
heap
page read and write
5D0000490000
trusted library allocation
page read and write
21FDB744000
heap
page read and write
21FDB74C000
heap
page read and write
5D00000E0000
trusted library allocation
page read and write
5BD45FE000
unkown
page readonly
6A11000
heap
page read and write
21FDB767000
heap
page read and write
5BCE5FE000
unkown
page readonly
6A11000
heap
page read and write
75B3000
heap
page read and write
5BE9DFA000
stack
page read and write
100E000
unkown
page read and write
16F5000
heap
page read and write
21FDB744000
heap
page read and write
6A11000
heap
page read and write
750B000
heap
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
21FE2372000
trusted library section
page read and write
6A11000
heap
page read and write
2DCE000
unkown
page read and write
21FDB746000
heap
page read and write
6A11000
heap
page read and write
21FDB742000
heap
page read and write
5D0000C0C000
trusted library allocation
page read and write
7735000
heap
page read and write
6A11000
heap
page read and write
5D0000E38000
trusted library allocation
page read and write
21FDB73B000
heap
page read and write
21FDB74C000
heap
page read and write
21FDB746000
heap
page read and write
6A11000
heap
page read and write
5D0000230000
trusted library allocation
page read and write
5D0000BA8000
trusted library allocation
page read and write
21FDB74C000
heap
page read and write
2F8002D4000
trusted library allocation
page read and write
5D00008F4000
trusted library allocation
page read and write
6A11000
heap
page read and write
7500000
heap
page read and write
21FDFB24000
trusted library allocation
page read and write
6A11000
heap
page read and write
16A8000
heap
page read and write
12067000
heap
page read and write
5D0000F40000
trusted library allocation
page read and write
5D0000D98000
trusted library allocation
page read and write
21FDB742000
heap
page read and write
1091000
unkown
page execute and write copy
6A11000
heap
page read and write
750F000
heap
page read and write
2F8006E0000
trusted library allocation
page read and write
5BD5DFC000
stack
page read and write
21FDB749000
heap
page read and write
121C000
stack
page read and write
832B000
heap
page read and write
5D0000294000
trusted library allocation
page read and write
2F800310000
trusted library allocation
page read and write
11AE000
stack
page read and write
5D0000044000
trusted library allocation
page read and write
5D00006CA000
trusted library allocation
page read and write
21FDBCCE000
heap
page read and write
7CF8002A0000
trusted library allocation
page read and write
5D0000DBC000
trusted library allocation
page read and write
5D00009CF000
trusted library allocation
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
21FDB729000
heap
page read and write
7FC000
stack
page read and write
2F8006AC000
trusted library allocation
page read and write
21FDB733000
heap
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
5D000036C000
trusted library allocation
page read and write
100E000
unkown
page read and write
21FDB746000
heap
page read and write
7CF8002F0000
trusted library allocation
page read and write
21FE2360000
trusted library section
page read and write
5BEADFC000
stack
page read and write
6A11000
heap
page read and write
21FDB74C000
heap
page read and write
5D0000713000
trusted library allocation
page read and write
21FDB73A000
heap
page read and write
5BE85FE000
unkown
page readonly
6A11000
heap
page read and write
6A11000
heap
page read and write
1001000
unkown
page execute read
5D0000874000
trusted library allocation
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
310F000
unkown
page read and write
5D0000E50000
trusted library allocation
page read and write
1001000
unkown
page execute read
5D00001B4000
trusted library allocation
page read and write
21FDB744000
heap
page read and write
21FDB746000
heap
page read and write
21FDB733000
heap
page read and write
5D0000300000
trusted library allocation
page read and write
5D0000E1C000
trusted library allocation
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
6C0000
heap
page read and write
21FDB747000
heap
page read and write
5BC5DFB000
stack
page read and write
5BE95FE000
unkown
page readonly
21FDB742000
heap
page read and write
21FE23E3000
trusted library section
page read and write
43C0020C000
direct allocation
page read and write
21FDB730000
heap
page read and write
8316000
heap
page read and write
6A11000
heap
page read and write
7775000
heap
page read and write
7120000
direct allocation
page execute and read and write
82F3000
heap
page read and write
2F8002FC000
trusted library allocation
page read and write
2F800354000
trusted library allocation
page read and write
21FDB744000
heap
page read and write
5D0000801000
trusted library allocation
page read and write
21FDB74C000
heap
page read and write
6A11000
heap
page read and write
2F80039C000
trusted library allocation
page read and write
6A11000
heap
page read and write
5D000001C000
trusted library allocation
page read and write
21FDB74C000
heap
page read and write
21FDB742000
heap
page read and write
2F800624000
trusted library allocation
page read and write
763A000
heap
page read and write
16F5000
heap
page read and write
7CF8002BC000
trusted library allocation
page read and write
5D00006C4000
trusted library allocation
page read and write
7501000
heap
page read and write
7CF800260000
trusted library allocation
page read and write
6A11000
heap
page read and write
21FDB767000
heap
page read and write
7505000
heap
page read and write
21FDB73B000
heap
page read and write
750A000
heap
page read and write
8314000
heap
page read and write
43C00303000
direct allocation
page read and write
5BE25FE000
unkown
page readonly
5D0000D44000
trusted library allocation
page read and write
5D000100C000
trusted library allocation
page read and write
21FDB739000
heap
page read and write
6A11000
heap
page read and write
5D0000C1C000
trusted library allocation
page read and write
6A11000
heap
page read and write
21FD8410000
heap
page read and write
5D000059C000
trusted library allocation
page read and write
5BC55FE000
unkown
page readonly
5D00002F0000
trusted library allocation
page read and write
5D0000904000
trusted library allocation
page read and write
5D00002A4000
trusted library allocation
page read and write
3550000
heap
page read and write
7110000
direct allocation
page execute and read and write
21FDB73B000
heap
page read and write
7CF8002C8000
trusted library allocation
page read and write
21FDB73B000
heap
page read and write
6A11000
heap
page read and write
21FDB74D000
heap
page read and write
21FDBD31000
heap
page read and write
6A11000
heap
page read and write
5D000037C000
trusted library allocation
page read and write
6A11000
heap
page read and write
2F8006D0000
trusted library allocation
page read and write
6A11000
heap
page read and write
2F800668000
trusted library allocation
page read and write
2F800630000
trusted library allocation
page read and write
6A11000
heap
page read and write
16F5000
heap
page read and write
21FDB742000
heap
page read and write
21FDB73B000
heap
page read and write
5D0000708000
trusted library allocation
page read and write
5D0000D54000
trusted library allocation
page read and write
E3C000
stack
page read and write
5D0000B08000
trusted library allocation
page read and write
21FDB73B000
heap
page read and write
21FDB742000
heap
page read and write
6A11000
heap
page read and write
21FDB733000
heap
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
5BC6DFA000
stack
page read and write
15FC000
stack
page read and write
21FE1A1E000
trusted library section
page read and write
6A11000
heap
page read and write
7401000
heap
page read and write
21FD81B8000
heap
page read and write
21FDB733000
heap
page read and write
5D0000338000
trusted library allocation
page read and write
21FE22D7000
unclassified section
page read and write
7CF800235000
trusted library allocation
page read and write
2F800201000
trusted library allocation
page read and write
21FDB744000
heap
page read and write
21FE2351000
trusted library section
page read and write
5D0000210000
trusted library allocation
page read and write
5D00001D4000
trusted library allocation
page read and write
2F800364000
trusted library allocation
page read and write
16EE000
heap
page read and write
5D0000294000
trusted library allocation
page read and write
21FDB742000
heap
page read and write
7405000
heap
page read and write
6A11000
heap
page read and write
75B9000
heap
page read and write
6A11000
heap
page read and write
43C00210000
direct allocation
page read and write
5D0000B24000
trusted library allocation
page read and write
21FDB742000
heap
page read and write
6A11000
heap
page read and write
5D0000988000
trusted library allocation
page read and write
5D0000FA8000
trusted library allocation
page read and write
21FDB73B000
heap
page read and write
6A11000
heap
page read and write
831C000
heap
page read and write
21FDB73F000
heap
page read and write
6A11000
heap
page read and write
690000
heap
page read and write
1184000
heap
page read and write
7CF800264000
trusted library allocation
page read and write
21FDB742000
heap
page read and write
21FDB73B000
heap
page read and write
5D0000FB4000
trusted library allocation
page read and write
5D0000564000
trusted library allocation
page read and write
5D000095C000
trusted library allocation
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
21FDB74C000
heap
page read and write
21FDB746000
heap
page read and write
830C000
heap
page read and write
5D0000BF8000
trusted library allocation
page read and write
6A11000
heap
page read and write
21FDB744000
heap
page read and write
1814000
heap
page read and write
5D00002A4000
trusted library allocation
page read and write
5D0000D80000
trusted library allocation
page read and write
8305000
heap
page read and write
21FDB742000
heap
page read and write
2F800658000
trusted library allocation
page read and write
6A11000
heap
page read and write
21FDB73B000
heap
page read and write
7120000
direct allocation
page execute and read and write
5BD0DFE000
stack
page read and write
5D0000C34000
trusted library allocation
page read and write
8321000
heap
page read and write
21FDB747000
heap
page read and write
6EA0000
direct allocation
page read and write
6A11000
heap
page read and write
831C000
heap
page read and write
21FDB742000
heap
page read and write
5BEB5FE000
unkown
page readonly
21FDB742000
heap
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
21FDB72F000
heap
page read and write
6A11000
heap
page read and write
12067000
heap
page read and write
6A11000
heap
page read and write
1001000
unkown
page execute read
7120000
direct allocation
page execute and read and write
7636000
heap
page read and write
5D00004E0000
trusted library allocation
page read and write
7CF8002E4000
trusted library allocation
page read and write
5D00002FB000
trusted library allocation
page read and write
6A11000
heap
page read and write
7601000
heap
page read and write
21FDB735000
heap
page read and write
1000000
unkown
page readonly
1000000
unkown
page readonly
21FDB73B000
heap
page read and write
6A11000
heap
page read and write
5D00006E2000
trusted library allocation
page read and write
21FDB73B000
heap
page read and write
2F800734000
trusted library allocation
page read and write
5D0000340000
trusted library allocation
page read and write
21FDB74C000
heap
page read and write
34BA000
heap
page read and write
6A11000
heap
page read and write
43C002DC000
direct allocation
page read and write
43C0023C000
direct allocation
page read and write
6A00000
direct allocation
page read and write
5D000006C000
trusted library allocation
page read and write
21FDB74C000
heap
page read and write
21FDB742000
heap
page read and write
43C00294000
direct allocation
page read and write
6A11000
heap
page read and write
832D000
heap
page read and write
6A11000
heap
page read and write
5D0000D6C000
trusted library allocation
page read and write
21FDB742000
heap
page read and write
2F800430000
trusted library allocation
page read and write
5D0000EF0000
trusted library allocation
page read and write
5D0000358000
trusted library allocation
page read and write
6A11000
heap
page read and write
21FDB74B000
heap
page read and write
6A11000
heap
page read and write
21FDB749000
heap
page read and write
21FDB73B000
heap
page read and write
21FDB746000
heap
page read and write
2F80020C000
trusted library allocation
page read and write
21FDB742000
heap
page read and write
5D0000C01000
trusted library allocation
page read and write
21FDB744000
heap
page read and write
21FDBC86000
heap
page read and write
5D000020C000
trusted library allocation
page read and write
5BD6DFC000
stack
page read and write
7503000
heap
page read and write
7661000
heap
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
21FDB730000
heap
page read and write
6A11000
heap
page read and write
6C19F000
unkown
page readonly
5D0000C44000
trusted library allocation
page read and write
1691000
heap
page read and write
1738000
heap
page read and write
7100000
direct allocation
page execute and read and write
5D0000E9A000
trusted library allocation
page read and write
2F8007D0000
trusted library allocation
page read and write
5D0000D04000
trusted library allocation
page read and write
43C002E4000
direct allocation
page read and write
5D00002F3000
trusted library allocation
page read and write
21FDB735000
heap
page read and write
5D0000C84000
trusted library allocation
page read and write
21FDB73B000
heap
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
21FDB73F000
heap
page read and write
21FE19C7000
unclassified section
page read and write
16F0000
heap
page read and write
16F3000
heap
page read and write
11F18000
heap
page read and write
6A11000
heap
page read and write
1600000
heap
page read and write
7500000
heap
page read and write
6A11000
heap
page read and write
5D0000228000
trusted library allocation
page read and write
5BE35FE000
unkown
page readonly
21FDB742000
heap
page read and write
750C000
heap
page read and write
5D00003EC000
trusted library allocation
page read and write
21FDB730000
heap
page read and write
5D0000E28000
trusted library allocation
page read and write
5D00005C4000
trusted library allocation
page read and write
5D0000A01000
trusted library allocation
page read and write
2F80035C000
trusted library allocation
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
75D8000
heap
page read and write
21FDBCAD000
heap
page read and write
8321000
heap
page read and write
6A11000
heap
page read and write
21FE1A00000
trusted library section
page read and write
5D0000AB8000
trusted library allocation
page read and write
21FDB730000
heap
page read and write
7CF8002BC000
trusted library allocation
page read and write
5BC95FE000
unkown
page readonly
5D0000B88000
trusted library allocation
page read and write
7505000
heap
page read and write
21FE1FEC000
trusted library section
page read and write
6A11000
heap
page read and write
21FDB742000
heap
page read and write
21FDB744000
heap
page read and write
750E000
heap
page read and write
21FDB73B000
heap
page read and write
5BE2DFE000
stack
page read and write
21FDB742000
heap
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
21FE23C0000
trusted library section
page read and write
6A11000
heap
page read and write
21FDB73B000
heap
page read and write
21FDB742000
heap
page read and write
5D00008D8000
trusted library allocation
page read and write
5D00010C4000
trusted library allocation
page read and write
5D000018C000
trusted library allocation
page read and write
21FDB742000
heap
page read and write
A30000
heap
page read and write
2F800250000
trusted library allocation
page read and write
21FDB74C000
heap
page read and write
1000000
unkown
page readonly
6A11000
heap
page read and write
5D00004F0000
trusted library allocation
page read and write
5D0000E5C000
trusted library allocation
page read and write
2F8002E4000
trusted library allocation
page read and write
6A11000
heap
page read and write
5BBEDEF000
stack
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
5D0000A28000
trusted library allocation
page read and write
16EA000
heap
page read and write
5D0000D34000
trusted library allocation
page read and write
5D0000EFC000
trusted library allocation
page read and write
6A11000
heap
page read and write
5D000073C000
trusted library allocation
page read and write
6A11000
heap
page read and write
600000
heap
page read and write
43C00215000
direct allocation
page read and write
82F5000
heap
page read and write
43C002AC000
direct allocation
page read and write
7500000
heap
page read and write
6A11000
heap
page read and write
21FDB746000
heap
page read and write
6A11000
heap
page read and write
21FDB742000
heap
page read and write
5D00009F4000
trusted library allocation
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
5D0000294000
trusted library allocation
page read and write
2F800610000
trusted library allocation
page read and write
6A11000
heap
page read and write
1696000
heap
page read and write
7CF8002C0000
trusted library allocation
page read and write
5D0000128000
trusted library allocation
page read and write
5D0000601000
trusted library allocation
page read and write
21FDB733000
heap
page read and write
7CF800250000
trusted library allocation
page read and write
21FDB74C000
heap
page read and write
5D0001090000
trusted library allocation
page read and write
5D000050C000
trusted library allocation
page read and write
21FD8110000
trusted library allocation
page read and write
5D00000A8000
trusted library allocation
page read and write
75E7000
heap
page read and write
7685000
heap
page read and write
21FDB733000
heap
page read and write
6A11000
heap
page read and write
21FDB742000
heap
page read and write
21FDBCF4000
heap
page read and write
7CF8002BC000
trusted library allocation
page read and write
21FDB742000
heap
page read and write
2F800390000
trusted library allocation
page read and write
21FDB741000
heap
page read and write
21FDB73B000
heap
page read and write
6A11000
heap
page read and write
2F8006CC000
trusted library allocation
page read and write
6A11000
heap
page read and write
76AD000
heap
page read and write
21FDFFC0000
heap
page read and write
21FDB750000
heap
page read and write
7594000
heap
page read and write
5BDDDFD000
stack
page read and write
5D0000CF4000
trusted library allocation
page read and write
21FDB700000
heap
page read and write
5D00001C8000
trusted library allocation
page read and write
7501000
heap
page read and write
5BDC5FE000
unkown
page readonly
100E000
unkown
page read and write
5D000078C000
trusted library allocation
page read and write
1000000
unkown
page readonly
6A11000
heap
page read and write
2F800401000
trusted library allocation
page read and write
5D000037C000
trusted library allocation
page read and write
5D0000CDC000
trusted library allocation
page read and write
16EE000
heap
page read and write
5D000032C000
trusted library allocation
page read and write
7CF8002BC000
trusted library allocation
page read and write
5D0000294000
trusted library allocation
page read and write
7508000
heap
page read and write
21FDB744000
heap
page read and write
7CF800294000
trusted library allocation
page read and write
5D0000201000
trusted library allocation
page read and write
5BE5DFE000
stack
page read and write
6A00000
direct allocation
page read and write
5D0000A5C000
trusted library allocation
page read and write
21FDB735000
heap
page read and write
5D0000EC4000
trusted library allocation
page read and write
5D0000F40000
trusted library allocation
page read and write
5D0000324000
trusted library allocation
page read and write
5D000027C000
trusted library allocation
page read and write
FD0000
heap
page read and write
5D0000BB0000
trusted library allocation
page read and write
764E000
heap
page read and write
6E50000
trusted library allocation
page read and write
7CF800248000
trusted library allocation
page read and write
2F8006B4000
trusted library allocation
page read and write
5D0000F6C000
trusted library allocation
page read and write
21FDB72B000
heap
page read and write
1000000
unkown
page readonly
7507000
heap
page read and write
2F800424000
trusted library allocation
page read and write
34BA000
heap
page read and write
6A11000
heap
page read and write
1715000
heap
page read and write
21FDB750000
heap
page read and write
6A11000
heap
page read and write
21FDBBF0000
trusted library section
page read and write
100A000
unkown
page readonly
5D0000218000
trusted library allocation
page read and write
21FDDF20000
trusted library allocation
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
5D000037C000
trusted library allocation
page read and write
21FDB742000
heap
page read and write
6A11000
heap
page read and write
5D0000A38000
trusted library allocation
page read and write
75E9000
heap
page read and write
1130000
heap
page read and write
68E000
stack
page read and write
12067000
heap
page read and write
6A11000
heap
page read and write
5D000060C000
trusted library allocation
page read and write
21FDB756000
heap
page read and write
75C1000
heap
page read and write
2F8006C8000
trusted library allocation
page read and write
5D000032C000
trusted library allocation
page read and write
21FDB744000
heap
page read and write
2F800320000
trusted library allocation
page read and write
1691000
heap
page read and write
75CB000
heap
page read and write
16EC000
heap
page read and write
5BDD5FE000
unkown
page readonly
21FDB73B000
heap
page read and write
7506000
heap
page read and write
6A11000
heap
page read and write
21FDB742000
heap
page read and write
5D00001A0000
trusted library allocation
page read and write
12067000
heap
page read and write
6A11000
heap
page read and write
1184000
heap
page read and write
32BA000
heap
page read and write
1735000
heap
page read and write
5BC45FE000
unkown
page readonly
1BFF000
stack
page read and write
2F800644000
trusted library allocation
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
172D000
heap
page read and write
5D00001C4000
trusted library allocation
page read and write
8310000
heap
page read and write
5D0000360000
trusted library allocation
page read and write
16DD000
heap
page read and write
5D0000ED4000
trusted library allocation
page read and write
21FDB746000
heap
page read and write
6A11000
heap
page read and write
2F80078C000
trusted library allocation
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
12067000
heap
page read and write
21FDB73F000
heap
page read and write
21FDB742000
heap
page read and write
EAE000
heap
page read and write
5D00002E0000
trusted library allocation
page read and write
970000
heap
page read and write
314E000
stack
page read and write
5D0000711000
trusted library allocation
page read and write
21FDB742000
heap
page read and write
21FDA0A3000
heap
page read and write
6A11000
heap
page read and write
5D00002C0000
trusted library allocation
page read and write
21FDB74C000
heap
page read and write
2F80060C000
trusted library allocation
page read and write
8326000
heap
page read and write
5BBFDFE000
unkown
page read and write
21FDB73B000
heap
page read and write
5D00003A4000
trusted library allocation
page read and write
82BA000
heap
page read and write
21FDB742000
heap
page read and write
43C002A8000
direct allocation
page read and write
21FDB73A000
heap
page read and write
5BDCDFC000
stack
page read and write
5D00003EC000
trusted library allocation
page read and write
16EE000
heap
page read and write
2F8006E8000
trusted library allocation
page read and write
16E7000
heap
page read and write
7672000
heap
page read and write
21FDB742000
heap
page read and write
21FDB73B000
heap
page read and write
8311000
heap
page read and write
75A6000
heap
page read and write
6A11000
heap
page read and write
21FDB74C000
heap
page read and write
21FDB742000
heap
page read and write
6A11000
heap
page read and write
830B000
heap
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
21FDB742000
heap
page read and write
6A11000
heap
page read and write
5D0000A38000
trusted library allocation
page read and write
6A11000
heap
page read and write
5D0000920000
trusted library allocation
page read and write
2F800320000
trusted library allocation
page read and write
8333000
heap
page read and write
5D00001E8000
trusted library allocation
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
21FDB746000
heap
page read and write
773E000
heap
page read and write
21FE1DE0000
trusted library section
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
21FDB74C000
heap
page read and write
21FDB742000
heap
page read and write
7795000
heap
page read and write
21FDB742000
heap
page read and write
5D0000E24000
trusted library allocation
page read and write
82CC000
heap
page read and write
6A11000
heap
page read and write
1720000
heap
page read and write
7507000
heap
page read and write
21FDB742000
heap
page read and write
21FDB72E000
heap
page read and write
5D0000294000
trusted library allocation
page read and write
21FE23D1000
trusted library section
page read and write
5BD05FE000
unkown
page readonly
7503000
heap
page read and write
5D0000E9C000
trusted library allocation
page read and write
5D0000444000
trusted library allocation
page read and write
8312000
heap
page read and write
21FE1ADD000
trusted library section
page read and write
6A11000
heap
page read and write
12067000
heap
page read and write
77CB000
heap
page read and write
21FDB74C000
heap
page read and write
21FDB74C000
heap
page read and write
21FE2340000
trusted library section
page read and write
5D0000A44000
trusted library allocation
page read and write
6A11000
heap
page read and write
21FDBCAB000
heap
page read and write
5D0000FC4000
trusted library allocation
page read and write
5D0000220000
trusted library allocation
page read and write
5BCB5FE000
unkown
page readonly
6A11000
heap
page read and write
21FDB742000
heap
page read and write
6A11000
heap
page read and write
21FDB74C000
heap
page read and write
2D1A000
stack
page read and write
12067000
heap
page read and write
6A11000
heap
page read and write
21FDB767000
heap
page read and write
5D0000194000
trusted library allocation
page read and write
2F800678000
trusted library allocation
page read and write
6A11000
heap
page read and write
5BE3DFE000
stack
page read and write
21FDB74C000
heap
page read and write
21FDB762000
heap
page read and write
75C0000
heap
page read and write
5D000101C000
trusted library allocation
page read and write
21FDB74E000
heap
page read and write
21FDB746000
heap
page read and write
5BE0DFE000
stack
page read and write
6A11000
heap
page read and write
780D000
heap
page read and write
2F800750000
trusted library allocation
page read and write
21FDB74C000
heap
page read and write
5BEA5FE000
unkown
page readonly
82A1000
heap
page read and write
21FDB730000
heap
page read and write
6A11000
heap
page read and write
7120000
direct allocation
page execute and read and write
5D0000338000
trusted library allocation
page read and write
16D9000
heap
page read and write
21FE237E000
trusted library section
page read and write
21FDB742000
heap
page read and write
5D000041C000
trusted library allocation
page read and write
21FDB734000
heap
page read and write
82A9000
heap
page read and write
6A11000
heap
page read and write
7502000
heap
page read and write
2F8006C4000
trusted library allocation
page read and write
6A11000
heap
page read and write
7CF8002A0000
trusted library allocation
page read and write
7CF800274000
trusted library allocation
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
21FDB742000
heap
page read and write
7CF8002F8000
trusted library allocation
page read and write
5D0000E44000
trusted library allocation
page read and write
2F80040C000
trusted library allocation
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
21FDB73B000
heap
page read and write
21FDB744000
heap
page read and write
6A11000
heap
page read and write
21FDBD40000
trusted library section
page read and write
21FE2730000
trusted library section
page read and write
5D0000B74000
trusted library allocation
page read and write
5D00006B0000
trusted library allocation
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
16EC000
heap
page read and write
5D0000D10000
trusted library allocation
page read and write
5BDADFD000
stack
page read and write
21FDB73B000
heap
page read and write
5D00001AC000
trusted library allocation
page read and write
5D0000F80000
trusted library allocation
page read and write
5D0000E28000
trusted library allocation
page read and write
21FDB73B000
heap
page read and write
6A11000
heap
page read and write
21FDB73B000
heap
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
21FDA0A0000
heap
page read and write
21FD81D7000
heap
page read and write
43C002EC000
direct allocation
page read and write
21FDB73B000
heap
page read and write
5D0000338000
trusted library allocation
page read and write
5D0000AE4000
trusted library allocation
page read and write
5D0000578000
trusted library allocation
page read and write
5BDFDFE000
stack
page read and write
6A11000
heap
page read and write
21FDB73B000
heap
page read and write
A37000
heap
page read and write
7402000
heap
page read and write
6A11000
heap
page read and write
340000
heap
page read and write
5BD35FE000
unkown
page readonly
C8F000
stack
page read and write
21FDB73B000
heap
page read and write
43C00234000
direct allocation
page read and write
16E3000
heap
page read and write
8321000
heap
page read and write
21FDB73B000
heap
page read and write
6C19D000
unkown
page read and write
21FD81C4000
heap
page read and write
5D0000894000
trusted library allocation
page read and write
21FDB74C000
heap
page read and write
6A11000
heap
page read and write
2F800698000
trusted library allocation
page read and write
16DC000
heap
page read and write
5D00001B4000
trusted library allocation
page read and write
5D0000940000
trusted library allocation
page read and write
21FDB733000
heap
page read and write
5D0000508000
trusted library allocation
page read and write
6A00000
direct allocation
page read and write
11F18000
heap
page read and write
7504000
heap
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
6A00000
direct allocation
page read and write
5BD2DFE000
stack
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
1000000
unkown
page readonly
34BE000
heap
page read and write
5BEC5FE000
unkown
page readonly
21FDB742000
heap
page read and write
21FDB730000
heap
page read and write
76DA000
heap
page read and write
21FDBD34000
heap
page read and write
21FE19A3000
heap
page read and write
8315000
heap
page read and write
5BC7DFE000
stack
page read and write
21FDB73B000
heap
page read and write
5D0000E80000
trusted library allocation
page read and write
6A11000
heap
page read and write
16A7000
heap
page read and write
21FDB742000
heap
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
21FDB746000
heap
page read and write
5D0001020000
trusted library allocation
page read and write
7650000
heap
page read and write
21FDB733000
heap
page read and write
5D0000EA8000
trusted library allocation
page read and write
82A1000
heap
page read and write
6A11000
heap
page read and write
5D0000E0C000
trusted library allocation
page read and write
21FDB742000
heap
page read and write
21FD8128000
heap
page read and write
6A11000
heap
page read and write
5D0000298000
trusted library allocation
page read and write
100A000
unkown
page readonly
6A11000
heap
page read and write
21FE1AD2000
trusted library section
page read and write
21FDB733000
heap
page read and write
2F8002ED000
trusted library allocation
page read and write
7CF8002BC000
trusted library allocation
page read and write
5D0000134000
trusted library allocation
page read and write
43C00284000
direct allocation
page read and write
5D00001D8000
trusted library allocation
page read and write
2F800718000
trusted library allocation
page read and write
5BC3DFE000
stack
page read and write
FF0000
heap
page read and write
21FDB742000
heap
page read and write
7120000
direct allocation
page execute and read and write
43C002D0000
direct allocation
page read and write
7CF8002C0000
trusted library allocation
page read and write
2F8003EC000
trusted library allocation
page read and write
100E000
unkown
page write copy
5D0000770000
trusted library allocation
page read and write
5BE1DFD000
stack
page read and write
12067000
heap
page read and write
82A1000
heap
page read and write
21FDB737000
heap
page read and write
7120000
direct allocation
page execute and read and write
5D0000E8C000
trusted library allocation
page read and write
1689000
heap
page read and write
8315000
heap
page read and write
5D000049C000
trusted library allocation
page read and write
6A11000
heap
page read and write
21FDB73B000
heap
page read and write
6A11000
heap
page read and write
12067000
heap
page read and write
5D00007D8000
trusted library allocation
page read and write
6A11000
heap
page read and write
82A1000
heap
page read and write
5D0000648000
trusted library allocation
page read and write
7CF800278000
trusted library allocation
page read and write
7500000
heap
page read and write
7120000
direct allocation
page execute and read and write
21FDB730000
heap
page read and write
21FDB744000
heap
page read and write
5D0000BA0000
trusted library allocation
page read and write
21FDB73B000
heap
page read and write
21FDB742000
heap
page read and write
21FD81DD000
heap
page read and write
5D0000338000
trusted library allocation
page read and write
5D0000294000
trusted library allocation
page read and write
21FDFFC8000
heap
page read and write
21FDB74C000
heap
page read and write
5D0000DEC000
trusted library allocation
page read and write
5D000030C000
trusted library allocation
page read and write
2F80075C000
trusted library allocation
page read and write
11D0000
heap
page read and write
16F2000
heap
page read and write
21FDB742000
heap
page read and write
8316000
heap
page read and write
21FDBCD1000
heap
page read and write
43C00260000
direct allocation
page read and write
5BC9DFC000
stack
page read and write
6A11000
heap
page read and write
5D0000F40000
trusted library allocation
page read and write
5D00003EC000
trusted library allocation
page read and write
6A11000
heap
page read and write
21FDB744000
heap
page read and write
2F80069C000
trusted library allocation
page read and write
8312000
heap
page read and write
5D0000C70000
trusted library allocation
page read and write
2F800654000
trusted library allocation
page read and write
21FDB733000
heap
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
7CF8002A0000
trusted library allocation
page read and write
5D0000484000
trusted library allocation
page read and write
6A11000
heap
page read and write
19FF000
stack
page read and write
5BEBDFE000
stack
page read and write
21FDB73B000
heap
page read and write
16F8000
heap
page read and write
21FDB742000
heap
page read and write
21FE1AB6000
trusted library section
page read and write
6A11000
heap
page read and write
EAA000
heap
page read and write
100E000
unkown
page write copy
2CDD000
stack
page read and write
21FDB742000
heap
page read and write
21FDB746000
heap
page read and write
6A11000
heap
page read and write
5D000029C000
trusted library allocation
page read and write
21FD80E0000
heap
page read and write
5BED5FE000
unkown
page readonly
21FD8120000
heap
page read and write
5D0000318000
trusted library allocation
page read and write
21FDB73B000
heap
page read and write
5D00002B4000
trusted library allocation
page read and write
21FDB74C000
heap
page read and write
5D000020C000
trusted library allocation
page read and write
82F8000
heap
page read and write
2F80033C000
trusted library allocation
page read and write
6A11000
heap
page read and write
21FDB742000
heap
page read and write
6A11000
heap
page read and write
2F800770000
trusted library allocation
page read and write
1184000
heap
page read and write
21FDB742000
heap
page read and write
5D00007E8000
trusted library allocation
page read and write
5D0000E98000
trusted library allocation
page read and write
21FDB73B000
heap
page read and write
1184000
heap
page read and write
6A11000
heap
page read and write
21FDBC4F000
heap
page read and write
21FDBD29000
heap
page read and write
1719000
heap
page read and write
5D0000D2C000
trusted library allocation
page read and write
21FDB746000
heap
page read and write
7120000
direct allocation
page execute and read and write
1184000
heap
page read and write
5D0000A0C000
trusted library allocation
page read and write
5D0000FD0000
trusted library allocation
page read and write
7508000
heap
page read and write
1184000
heap
page read and write
21FDB73B000
heap
page read and write
5BE8DFE000
stack
page read and write
21FE253E000
trusted library section
page read and write
5D0000F2C000
trusted library allocation
page read and write
8328000
heap
page read and write
775A000
heap
page read and write
5D0000DAD000
trusted library allocation
page read and write
7500000
heap
page read and write
21FDB746000
heap
page read and write
21FDB742000
heap
page read and write
21FDB742000
heap
page read and write
21FDB731000
heap
page read and write
2F8002F0000
trusted library allocation
page read and write
7120000
direct allocation
page execute and read and write
5D0000290000
trusted library allocation
page read and write
7120000
direct allocation
page execute and read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
21FDB746000
heap
page read and write
21FDB76A000
heap
page read and write
6C1E9000
unkown
page read and write
A8F000
stack
page read and write
21FDB733000
heap
page read and write
6A11000
heap
page read and write
5D0000690000
trusted library allocation
page read and write
6A11000
heap
page read and write
21FDB742000
heap
page read and write
6A11000
heap
page read and write
7CF800238000
trusted library allocation
page read and write
6A11000
heap
page read and write
5D00006CC000
trusted library allocation
page read and write
1206B000
heap
page read and write
21FDAAF0000
unkown
page read and write
21FDB73B000
heap
page read and write
2D80000
heap
page read and write
7504000
heap
page read and write
2F800754000
trusted library allocation
page read and write
16E3000
heap
page read and write
21FDB746000
heap
page read and write
5D000034C000
trusted library allocation
page read and write
6A11000
heap
page read and write
5BC0DFE000
stack
page read and write
5D00007CE000
trusted library allocation
page read and write
21FD83C0000
trusted library section
page readonly
5D0000C40000
trusted library allocation
page read and write
1011000
unkown
page readonly
8967000
heap
page read and write
5BE55FE000
unkown
page readonly
5D000040C000
trusted library allocation
page read and write
6A11000
heap
page read and write
100E000
unkown
page write copy
F9C000
stack
page read and write
75CD000
heap
page read and write
5D0000F5C000
trusted library allocation
page read and write
2F8002B8000
trusted library allocation
page read and write
6A11000
heap
page read and write
12067000
heap
page read and write
5BC8DFA000
stack
page read and write
21FDB73B000
heap
page read and write
6A11000
heap
page read and write
21FD8100000
trusted library allocation
page read and write
21FDB73B000
heap
page read and write
21FDB742000
heap
page read and write
5D0000A38000
trusted library allocation
page read and write
7404000
heap
page read and write
5D0000CEC000
trusted library allocation
page read and write
6A11000
heap
page read and write
5D0000F18000
trusted library allocation
page read and write
7CF80020C000
trusted library allocation
page read and write
5D000102C000
trusted library allocation
page read and write
21FDB733000
heap
page read and write
7452000
direct allocation
page read and write
5BDA5FE000
unkown
page readonly
7503000
heap
page read and write
6A11000
heap
page read and write
21FDB742000
heap
page read and write
5D0000118000
trusted library allocation
page read and write
21FDB741000
heap
page read and write
2F80027C000
trusted library allocation
page read and write
E90000
heap
page read and write
6A11000
heap
page read and write
5BE6DFE000
stack
page read and write
7CF8002B0000
trusted library allocation
page read and write
8326000
heap
page read and write
6A11000
heap
page read and write
2F8002CC000
trusted library allocation
page read and write
5BD1DFE000
stack
page read and write
16F3000
heap
page read and write
5D0000AC8000
trusted library allocation
page read and write
2F800730000
trusted library allocation
page read and write
5D0000CEF000
trusted library allocation
page read and write
7508000
heap
page read and write
5BD25FE000
unkown
page readonly
21FDB742000
heap
page read and write
100A000
unkown
page readonly
21FE1917000
unclassified section
page read and write
750B000
heap
page read and write
6A11000
heap
page read and write
5BE75FE000
unkown
page readonly
5BC75FE000
unkown
page readonly
21FDB742000
heap
page read and write
6A11000
heap
page read and write
5BC85FE000
unkown
page readonly
5BD95FE000
unkown
page readonly
5D0001038000
trusted library allocation
page read and write
21FDB733000
heap
page read and write
5D00002A4000
trusted library allocation
page read and write
2F800330000
trusted library allocation
page read and write
6A11000
heap
page read and write
21FDB73B000
heap
page read and write
75D0000
heap
page read and write
6A11000
heap
page read and write
7502000
heap
page read and write
5D0000001000
trusted library allocation
page read and write
21FDBCCF000
heap
page read and write
1011000
unkown
page readonly
5D0000300000
trusted library allocation
page read and write
21FDB744000
heap
page read and write
7624000
heap
page read and write
6A11000
heap
page read and write
32B0000
heap
page read and write
21FDB73B000
heap
page read and write
21FDB742000
heap
page read and write
16DE000
heap
page read and write
21FE24AD000
trusted library section
page read and write
21FDB73B000
heap
page read and write
21FDB73B000
heap
page read and write
21FDB756000
heap
page read and write
21FDB73B000
heap
page read and write
7401000
heap
page read and write
21FDB74B000
heap
page read and write
8321000
heap
page read and write
6A11000
heap
page read and write
1700000
heap
page read and write
6A11000
heap
page read and write
21FDB742000
heap
page read and write
2F8006E4000
trusted library allocation
page read and write
21FDB742000
heap
page read and write
2F800354000
trusted library allocation
page read and write
21FDB746000
heap
page read and write
6A11000
heap
page read and write
7402000
heap
page read and write
6A11000
heap
page read and write
82BA000
heap
page read and write
5BD55FE000
unkown
page readonly
5D0000748000
trusted library allocation
page read and write
5D000034C000
trusted library allocation
page read and write
77BA000
heap
page read and write
5D00001E4000
trusted library allocation
page read and write
7120000
direct allocation
page execute and read and write
11CE2000
heap
page read and write
7CF8002C0000
trusted library allocation
page read and write
6A11000
heap
page read and write
6A11000
heap
page read and write
21FDB73B000
heap
page read and write
6A11000
heap
page read and write
7505000
heap
page read and write
6A11000
heap
page read and write
21FDB73B000
heap
page read and write
11F18000
heap
page read and write
2F800614000
trusted library allocation
page read and write
21FDB73B000
heap
page read and write
5BE05FE000
unkown
page readonly
8326000
heap
page read and write
6A00000
direct allocation
page read and write
5D0000C44000
trusted library allocation
page read and write
5D0000514000
trusted library allocation
page read and write
5D000058C000
trusted library allocation
page read and write
5BE15FE000
unkown
page readonly
6A00000
direct allocation
page read and write
5BC1DFE000
stack
page read and write
21FDB746000
heap
page read and write
21FDB746000
heap
page read and write
21FDB744000
heap
page read and write
763E000
heap
page read and write
75AB000
direct allocation
page read and write
1011000
unkown
page readonly
6A00000
direct allocation
page read and write
43C0024C000
direct allocation
page read and write
21FDA080000
heap
page read and write
1714000
heap
page read and write
21FDB74C000
heap
page read and write
21FDB730000
heap
page read and write
6A11000
heap
page read and write
2F800620000
trusted library allocation
page read and write
7120000
direct allocation
page execute and read and write
5D000000C000
trusted library allocation
page read and write
11BE0000
heap
page read and write
5BDE5FE000
unkown
page readonly
6A11000
heap
page read and write
7CF8002C0000
trusted library allocation
page read and write
21FDB744000
heap
page read and write
2F800408000
trusted library allocation
page read and write
441000
unkown
page execute and write copy
6A11000
heap
page read and write
21FDB742000
heap
page read and write
1184000
heap
page read and write
5D00006D4000
trusted library allocation
page read and write
5D0001064000
trusted library allocation
page read and write
5D0000DB4000
trusted library allocation
page read and write
6A11000
heap
page read and write
6A00000
direct allocation
page read and write
2F800248000
trusted library allocation
page read and write
6C8000
heap
page read and write
1001000
unkown
page execute read
773C000
heap
page read and write
21FDB744000
heap
page read and write
2DD0000
heap
page read and write
21FDB733000
heap
page read and write
2F800404000
trusted library allocation
page read and write
5D0000E20000
trusted library allocation
page read and write
7CF800230000
trusted library allocation
page read and write
7CF8002D8000
trusted library allocation
page read and write
5BD4DFD000
stack
page read and write
2F8006F0000
trusted library allocation
page read and write
6A11000
heap
page read and write
21FDB73B000
heap
page read and write
21FDB710000
heap
page read and write
1184000
heap
page read and write
There are 1750 hidden memdumps, click here to show them.