IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_de576c89c85d95f63177b89249eef622329cc21c_49e505fd_941f7b0f-5cf6-4fd5-933b-c46e72475a4a\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBC70.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Nov 20 16:48:07 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC0E6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC154.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 --field-trial-handle=2156,i,15042374084107540991,13338194139832377864,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7160 -s 752

URLs

Name
IP
Malicious
kk5pfvtekk5pn.top
malicious
QUERY|rd|AAAA|IN|home.fvtekk5pn.top
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/Char9e3
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347fff::3
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icoc5)
unknown
https://issuetracker.google.com/161903006
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
34.116.198.130
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
https://www.google.com/search?q=$
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fvtekk5pn.top
34.116.198.130
www.google.com
216.58.208.228
fvtekk5pn.top
34.116.198.130

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
216.58.208.228
www.google.com
United States
34.116.198.130
home.fvtekk5pn.top
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{0f3a7e40-07a7-cf30-39e8-11e75748d4fd}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProgramId
malicious
\REGISTRY\A\{0f3a7e40-07a7-cf30-39e8-11e75748d4fd}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
FileId
malicious
\REGISTRY\A\{0f3a7e40-07a7-cf30-39e8-11e75748d4fd}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LowerCaseLongPath
malicious
\REGISTRY\A\{0f3a7e40-07a7-cf30-39e8-11e75748d4fd}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LongPathHash
malicious
\REGISTRY\A\{0f3a7e40-07a7-cf30-39e8-11e75748d4fd}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Name
malicious
\REGISTRY\A\{0f3a7e40-07a7-cf30-39e8-11e75748d4fd}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
OriginalFileName
malicious
\REGISTRY\A\{0f3a7e40-07a7-cf30-39e8-11e75748d4fd}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Publisher
malicious
\REGISTRY\A\{0f3a7e40-07a7-cf30-39e8-11e75748d4fd}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Version
malicious
\REGISTRY\A\{0f3a7e40-07a7-cf30-39e8-11e75748d4fd}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinFileVersion
malicious
\REGISTRY\A\{0f3a7e40-07a7-cf30-39e8-11e75748d4fd}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinaryType
malicious
\REGISTRY\A\{0f3a7e40-07a7-cf30-39e8-11e75748d4fd}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProductName
malicious
\REGISTRY\A\{0f3a7e40-07a7-cf30-39e8-11e75748d4fd}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProductVersion
malicious
\REGISTRY\A\{0f3a7e40-07a7-cf30-39e8-11e75748d4fd}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LinkDate
malicious
\REGISTRY\A\{0f3a7e40-07a7-cf30-39e8-11e75748d4fd}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinProductVersion
malicious
\REGISTRY\A\{0f3a7e40-07a7-cf30-39e8-11e75748d4fd}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
AppxPackageFullName
malicious
\REGISTRY\A\{0f3a7e40-07a7-cf30-39e8-11e75748d4fd}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
AppxPackageRelativeId
malicious
\REGISTRY\A\{0f3a7e40-07a7-cf30-39e8-11e75748d4fd}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Size
malicious
\REGISTRY\A\{0f3a7e40-07a7-cf30-39e8-11e75748d4fd}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Language
malicious
\REGISTRY\A\{0f3a7e40-07a7-cf30-39e8-11e75748d4fd}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
73C5000
heap
page read and write
malicious
1765000
heap
page read and write
malicious
17CE000
heap
page read and write
malicious
732F000
heap
page read and write
malicious
67497FE000
unkown
page readonly
1CEC00F2C000
trusted library allocation
page read and write
1AA40020C000
trusted library allocation
page read and write
74EC000
heap
page read and write
6951000
heap
page read and write
7423000
heap
page read and write
1CEC00CF8000
trusted library allocation
page read and write
E3A000
unkown
page readonly
6951000
heap
page read and write
1CEC00390000
trusted library allocation
page read and write
E31000
unkown
page execute read
6951000
heap
page read and write
1773000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
20B6328F000
heap
page read and write
20B636E0000
heap
page read and write
6951000
heap
page read and write
1CEC00E1C000
trusted library allocation
page read and write
7429000
heap
page read and write
6951000
heap
page read and write
67427FE000
unkown
page readonly
6951000
heap
page read and write
6951000
heap
page read and write
1CEC001AC000
trusted library allocation
page read and write
1AA4002A0000
trusted library allocation
page read and write
6951000
heap
page read and write
72A1000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6743FFE000
stack
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
72A1000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
20B6329B000
heap
page read and write
1BBC007B4000
trusted library allocation
page read and write
E30000
unkown
page readonly
6951000
heap
page read and write
1CEC0037C000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1AA4002BC000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00CA0000
trusted library allocation
page read and write
1CEC00300000
trusted library allocation
page read and write
7427000
heap
page read and write
6951000
heap
page read and write
1719000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00FC0000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1AA400260000
trusted library allocation
page read and write
E3E000
unkown
page read and write
1BBC00648000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1BBC00684000
trusted library allocation
page read and write
1CEC002A4000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC00220000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC009E0000
trusted library allocation
page read and write
20B67CC2000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC00338000
trusted library allocation
page read and write
1CEC00BAC000
trusted library allocation
page read and write
6749FFE000
stack
page read and write
1CEC00A0C000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC00F98000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
20B6A472000
trusted library section
page read and write
6951000
heap
page read and write
7429000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC0050C000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1726000
heap
page read and write
6951000
heap
page read and write
1CEC002F0000
trusted library allocation
page read and write
1CEC00230000
trusted library allocation
page read and write
1CEC00E90000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1BBC007C8000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
E31000
unkown
page execute read
1100000
heap
page read and write
742C000
heap
page read and write
1BBC00644000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
67237FE000
unkown
page readonly
6951000
heap
page read and write
1CEC001E4000
trusted library allocation
page read and write
72A1000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1BBC0060C000
trusted library allocation
page read and write
1CEC005E0000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC0015C000
trusted library allocation
page read and write
1CEC008F8000
trusted library allocation
page read and write
6951000
heap
page read and write
1AA4002B0000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC00C0C000
trusted library allocation
page read and write
6951000
heap
page read and write
752A000
heap
page read and write
6951000
heap
page read and write
1CEC011A8000
trusted library allocation
page read and write
20B63720000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
20B637C1000
heap
page read and write
6951000
heap
page read and write
20B67AD5000
heap
page read and write
46E0002D0000
direct allocation
page read and write
6951000
heap
page read and write
20B68C7D000
trusted library section
page read and write
6951000
heap
page read and write
1CEC00708000
trusted library allocation
page read and write
77E000
unkown
page read and write
6951000
heap
page read and write
1CEC00218000
trusted library allocation
page read and write
6951000
heap
page read and write
E41000
unkown
page readonly
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00714000
trusted library allocation
page read and write
46E000210000
direct allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00D2C000
trusted library allocation
page read and write
1CEC00428000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC00C44000
trusted library allocation
page read and write
1CEC00F54000
trusted library allocation
page read and write
6951000
heap
page read and write
8CB000
heap
page read and write
742A000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00BB8000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC00340000
trusted library allocation
page read and write
1CEC0037C000
trusted library allocation
page read and write
3420000
direct allocation
page read and write
1CEC00990000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1AA400235000
trusted library allocation
page read and write
6722FFE000
stack
page read and write
1BBC002EE000
trusted library allocation
page read and write
20B63785000
heap
page read and write
6951000
heap
page read and write
1268A000
heap
page read and write
6951000
heap
page read and write
1CEC00F48000
trusted library allocation
page read and write
1BBC00320000
trusted library allocation
page read and write
1CEC00C34000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
729C000
heap
page read and write
20B6A3D3000
trusted library section
page read and write
7050000
direct allocation
page execute and read and write
6951000
heap
page read and write
6951000
heap
page read and write
1BBC00330000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC00940000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
20B5FD48000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
20B68B30000
trusted library section
page read and write
1CEC000B4000
trusted library allocation
page read and write
6951000
heap
page read and write
3420000
direct allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
7229000
heap
page read and write
1CEC00708000
trusted library allocation
page read and write
1CEC00708000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC0034C000
trusted library allocation
page read and write
67437FE000
unkown
page readonly
1774000
heap
page read and write
1CEC006B8000
trusted library allocation
page read and write
6951000
heap
page read and write
46E0002AC000
direct allocation
page read and write
724B000
heap
page read and write
754D000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
7221000
heap
page read and write
1BBC00784000
trusted library allocation
page read and write
1CEC00C80000
trusted library allocation
page read and write
1BBC00364000
trusted library allocation
page read and write
6738FFC000
stack
page read and write
1CEC0119C000
trusted library allocation
page read and write
12F0000
heap
page read and write
1712000
heap
page read and write
6727FFE000
stack
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
20B63736000
heap
page read and write
6951000
heap
page read and write
20B68B80000
trusted library section
page read and write
7428000
heap
page read and write
E31000
unkown
page execute read
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00DD0000
trusted library allocation
page read and write
6951000
heap
page read and write
7551000
heap
page read and write
6951000
heap
page read and write
1BBC00770000
trusted library allocation
page read and write
1BBC002E4000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC00AD0000
trusted library allocation
page read and write
1CEC012AC000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
E3E000
unkown
page read and write
1CEC0020C000
trusted library allocation
page read and write
6951000
heap
page read and write
67297FE000
unkown
page readonly
B9C000
stack
page read and write
6951000
heap
page read and write
1CEC00FC0000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00E1C000
trusted library allocation
page read and write
104C000
stack
page read and write
7429000
heap
page read and write
1CEC01001000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1AA4002C0000
trusted library allocation
page read and write
20B68C72000
trusted library section
page read and write
6951000
heap
page read and write
3420000
direct allocation
page read and write
6951000
heap
page read and write
1CEC002F0000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1774000
heap
page read and write
6951000
heap
page read and write
1CEC00F64000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1BBC00760000
trusted library allocation
page read and write
767B000
heap
page read and write
1CEC00B18000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
3420000
direct allocation
page read and write
6951000
heap
page read and write
1CEC003A8000
trusted library allocation
page read and write
6951000
heap
page read and write
20B68C56000
trusted library section
page read and write
7557000
heap
page read and write
6951000
heap
page read and write
7050000
direct allocation
page execute and read and write
6C69D000
unkown
page read and write
6951000
heap
page read and write
1CEC00ADC000
trusted library allocation
page read and write
1CEC00DC0000
trusted library allocation
page read and write
6951000
heap
page read and write
67487FE000
unkown
page readonly
6951000
heap
page read and write
742B000
heap
page read and write
6951000
heap
page read and write
1725000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
73C5000
heap
page read and write
1BBC00310000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC0014C000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6740FFC000
stack
page read and write
6741FFE000
stack
page read and write
1CEC007D4000
trusted library allocation
page read and write
1CEC010C0000
trusted library allocation
page read and write
1AA4002C0000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC00C34000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
74BD000
heap
page read and write
20B68B90000
trusted library section
page read and write
7422000
heap
page read and write
6951000
heap
page read and write
1CEC00C70000
trusted library allocation
page read and write
7050000
direct allocation
page execute and read and write
20B632A2000
heap
page read and write
1BBC00368000
trusted library allocation
page read and write
15F0000
heap
page read and write
1CEC0032C000
trusted library allocation
page read and write
672DFFE000
stack
page read and write
6951000
heap
page read and write
6744FFE000
stack
page read and write
1BBC00788000
trusted library allocation
page read and write
1CEC00340000
trusted library allocation
page read and write
1BBC00230000
trusted library allocation
page read and write
1CEC00F98000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC001CC000
trusted library allocation
page read and write
7516000
heap
page read and write
1CEC00C54000
trusted library allocation
page read and write
3420000
direct allocation
page read and write
1CEC00778000
trusted library allocation
page read and write
1CEC0120C000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC002A8000
trusted library allocation
page read and write
1BBC00698000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1BBC0078C000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC010EC000
trusted library allocation
page read and write
6951000
heap
page read and write
83E000
stack
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
20B5FD19000
heap
page read and write
1CEC00F1C000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1BBC00210000
trusted library allocation
page read and write
20B65790000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
728C000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC0034C000
trusted library allocation
page read and write
73FC000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
3420000
direct allocation
page read and write
6951000
heap
page read and write
1BE0000
heap
page read and write
1CEC005CC000
trusted library allocation
page read and write
175F000
stack
page read and write
6951000
heap
page read and write
72C3000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
7541000
heap
page read and write
6951000
heap
page read and write
1BBC002F0000
trusted library allocation
page read and write
1CEC002FB000
trusted library allocation
page read and write
72D0000
heap
page read and write
1CEC00484000
trusted library allocation
page read and write
20B5FC20000
trusted library allocation
page read and write
1CEC008D4000
trusted library allocation
page read and write
1BBC00248000
trusted library allocation
page read and write
672F7FE000
unkown
page readonly
6951000
heap
page read and write
1CEC005B8000
trusted library allocation
page read and write
1CEC00D71000
trusted library allocation
page read and write
7654000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
7296000
heap
page read and write
1CEC001F4000
trusted library allocation
page read and write
1CEC00484000
trusted library allocation
page read and write
20B637BB000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
344E000
heap
page read and write
730000
heap
page read and write
1CEC00F3C000
trusted library allocation
page read and write
7594000
heap
page read and write
1CEC00D24000
trusted library allocation
page read and write
20B6379B000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
20B63294000
heap
page read and write
1BBC007D0000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
751E000
heap
page read and write
1CEC011A8000
trusted library allocation
page read and write
1BBC00288000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
117E000
stack
page read and write
6951000
heap
page read and write
20B6A4F0000
trusted library section
page read and write
6951000
heap
page read and write
7429000
heap
page read and write
6951000
heap
page read and write
1CEC00E38000
trusted library allocation
page read and write
1BBC00620000
trusted library allocation
page read and write
20B5FC77000
heap
page read and write
1060000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
755A000
heap
page read and write
1BBC00320000
trusted library allocation
page read and write
6951000
heap
page read and write
6721FFE000
stack
page read and write
1CEC00CF8000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC00708000
trusted library allocation
page read and write
1CEC00FBC000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1797000
heap
page read and write
72A1000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
72B2000
heap
page read and write
6951000
heap
page read and write
7421000
heap
page read and write
672EFFE000
stack
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
20B5FFC0000
heap
page read and write
6951000
heap
page read and write
20B6A4B0000
trusted library section
page read and write
69CC0000
direct allocation
page read and write
672A7FE000
unkown
page readonly
6951000
heap
page read and write
1CEC000EC000
trusted library allocation
page read and write
7221000
heap
page read and write
6951000
heap
page read and write
1CEC00F64000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
67257FE000
unkown
page readonly
6728FFB000
stack
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00CAC000
trusted library allocation
page read and write
20B637B9000
heap
page read and write
729B000
heap
page read and write
6735FFC000
stack
page read and write
6951000
heap
page read and write
1BBC00348000
trusted library allocation
page read and write
6951000
heap
page read and write
1BBC00720000
trusted library allocation
page read and write
46E000217000
direct allocation
page read and write
764B000
heap
page read and write
1BBC0080C000
trusted library allocation
page read and write
6951000
heap
page read and write
674CFFE000
stack
page read and write
6951000
heap
page read and write
1CEC0041F000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00C60000
trusted library allocation
page read and write
1CEC002D0000
trusted library allocation
page read and write
1CEC00338000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00F54000
trusted library allocation
page read and write
20B632A0000
heap
page read and write
6951000
heap
page read and write
1759000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
674EFFE000
stack
page read and write
7324000
heap
page read and write
6951000
heap
page read and write
6731FFE000
stack
page read and write
1AA4002D8000
trusted library allocation
page read and write
20B6329C000
heap
page read and write
1BBC002EC000
trusted library allocation
page read and write
72D0000
heap
page read and write
6951000
heap
page read and write
6747FFE000
stack
page read and write
6951000
heap
page read and write
E3E000
unkown
page read and write
7529000
heap
page read and write
6951000
heap
page read and write
7050000
direct allocation
page execute and read and write
1CEC006F8000
trusted library allocation
page read and write
6951000
heap
page read and write
7050000
direct allocation
page execute and read and write
6951000
heap
page read and write
1CEC001B4000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
7423000
heap
page read and write
719A000
heap
page read and write
20B5FD47000
heap
page read and write
1CEC00B40000
trusted library allocation
page read and write
1AA4002BC000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
20B63726000
heap
page read and write
1CEC00C30000
trusted library allocation
page read and write
728C000
heap
page read and write
1BBC00714000
trusted library allocation
page read and write
753B000
heap
page read and write
7296000
heap
page read and write
1BBC00320000
trusted library allocation
page read and write
7519000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
674BFFE000
stack
page read and write
1BBC00730000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC00FE4000
trusted library allocation
page read and write
20B5FBB0000
heap
page readonly
6951000
heap
page read and write
1CEC00BC0000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6DD0000
direct allocation
page read and write
6951000
heap
page read and write
20B636FF000
heap
page read and write
6951000
heap
page read and write
46E000215000
direct allocation
page read and write
6951000
heap
page read and write
1CEC00338000
trusted library allocation
page read and write
6951000
heap
page read and write
20B61AE3000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00A14000
trusted library allocation
page read and write
6746FFA000
stack
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC000FC000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1AA4002BC000
trusted library allocation
page read and write
20B636EB000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00E78000
trusted library allocation
page read and write
1CEC00BB0000
trusted library allocation
page read and write
1CEC00C30000
trusted library allocation
page read and write
6951000
heap
page read and write
1AA4002BC000
trusted library allocation
page read and write
7C0000
heap
page read and write
46E000234000
direct allocation
page read and write
20B5FC68000
heap
page read and write
6951000
heap
page read and write
6745FFE000
stack
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
E41000
unkown
page readonly
1BBC00610000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC006E8000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC00FD0000
trusted library allocation
page read and write
1BBC006B4000
trusted library allocation
page read and write
1CEC00468000
trusted library allocation
page read and write
1AA400201000
trusted library allocation
page read and write
1BBC006C4000
trusted library allocation
page read and write
7050000
direct allocation
page execute and read and write
72AC000
heap
page read and write
1CEC00E44000
trusted library allocation
page read and write
20B5FC50000
trusted library section
page readonly
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6CA000
stack
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1BBC00700000
trusted library allocation
page read and write
E31000
unkown
page execute read
6951000
heap
page read and write
46E000270000
direct allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00670000
trusted library allocation
page read and write
1CEC0034C000
trusted library allocation
page read and write
3420000
direct allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
767A000
heap
page read and write
1BBC006E4000
trusted library allocation
page read and write
1CEC00001000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC00EF0000
trusted library allocation
page read and write
6951000
heap
page read and write
46E00026C000
direct allocation
page read and write
728B000
heap
page read and write
6951000
heap
page read and write
1CEC01190000
trusted library allocation
page read and write
6733FFC000
stack
page read and write
1CEC00090000
trusted library allocation
page read and write
1CEC00360000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC0129C000
trusted library allocation
page read and write
7428000
heap
page read and write
1CEC007B4000
trusted library allocation
page read and write
6C6E8000
unkown
page readonly
673A7FE000
unkown
page readonly
6951000
heap
page read and write
6951000
heap
page read and write
7426000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00624000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC001AC000
trusted library allocation
page read and write
6951000
heap
page read and write
1AA4002E4000
trusted library allocation
page read and write
20B6373D000
heap
page read and write
7221000
heap
page read and write
20B5FBC0000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
671EFEF000
stack
page read and write
6951000
heap
page read and write
831000
unkown
page execute and write copy
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1AA400264000
trusted library allocation
page read and write
6951000
heap
page read and write
74DE000
heap
page read and write
6951000
heap
page read and write
7568000
heap
page read and write
20B68BA1000
trusted library section
page read and write
6951000
heap
page read and write
6736FFC000
stack
page read and write
1712000
heap
page read and write
1CEC0030C000
trusted library allocation
page read and write
1BBC00430000
trusted library allocation
page read and write
6951000
heap
page read and write
12FE000
heap
page read and write
6951000
heap
page read and write
1BBC006D4000
trusted library allocation
page read and write
6951000
heap
page read and write
742B000
heap
page read and write
6951000
heap
page read and write
20B67A88000
heap
page read and write
20B68490000
trusted library section
page read and write
6951000
heap
page read and write
672B7FE000
unkown
page readonly
6951000
heap
page read and write
6951000
heap
page read and write
1AA4002BC000
trusted library allocation
page read and write
1CEC00DF0000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC0036C000
trusted library allocation
page read and write
1CEC00CF8000
trusted library allocation
page read and write
1AA400274000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00340000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
67337FE000
unkown
page readonly
1BBC00664000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC00084000
trusted library allocation
page read and write
67377FE000
unkown
page readonly
751F000
heap
page read and write
6951000
heap
page read and write
1CEC00044000
trusted library allocation
page read and write
1CEC00B94000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC00D1C000
trusted library allocation
page read and write
46E00025C000
direct allocation
page read and write
6951000
heap
page read and write
1CEC00D00000
trusted library allocation
page read and write
72AB000
heap
page read and write
1CEC00484000
trusted library allocation
page read and write
72A8000
heap
page read and write
1BBC0033C000
trusted library allocation
page read and write
14E0000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
7428000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
67247FE000
unkown
page readonly
7297000
heap
page read and write
6951000
heap
page read and write
20B637BF000
heap
page read and write
6951000
heap
page read and write
20B680B7000
unclassified section
page read and write
6951000
heap
page read and write
E30000
unkown
page readonly
6951000
heap
page read and write
6951000
heap
page read and write
1CEC009D4000
trusted library allocation
page read and write
6951000
heap
page read and write
20B6A37E000
trusted library section
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
46E000250000
direct allocation
page read and write
1CEC00F48000
trusted library allocation
page read and write
7422000
heap
page read and write
1BBC006CC000
trusted library allocation
page read and write
6739FFD000
stack
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
7634000
heap
page read and write
6951000
heap
page read and write
E3A000
unkown
page readonly
6951000
heap
page read and write
1CEC0022C000
trusted library allocation
page read and write
20B6A372000
trusted library section
page read and write
1CEC00CCC000
trusted library allocation
page read and write
674E7FE000
unkown
page readonly
1AA4002A0000
trusted library allocation
page read and write
729C000
heap
page read and write
7330000
heap
page read and write
7296000
heap
page read and write
673F7FE000
unkown
page readonly
1CEC001C4000
trusted library allocation
page read and write
1CEC00F0C000
trusted library allocation
page read and write
72AD000
heap
page read and write
1BBC00354000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
E30000
unkown
page readonly
6951000
heap
page read and write
6951000
heap
page read and write
673C7FE000
unkown
page readonly
728D000
heap
page read and write
20B63293000
heap
page read and write
20B6328A000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00E54000
trusted library allocation
page read and write
1580000
heap
page read and write
752B000
heap
page read and write
7330000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1BBC00704000
trusted library allocation
page read and write
1CEC00EAC000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1761000
heap
page read and write
1CEC00E18000
trusted library allocation
page read and write
1CEC01201000
trusted library allocation
page read and write
7330000
heap
page read and write
6951000
heap
page read and write
7520000
heap
page read and write
DF0000
heap
page read and write
1CEC0108C000
trusted library allocation
page read and write
E3A000
unkown
page readonly
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1BBC006EC000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC003A8000
trusted library allocation
page read and write
1CEC00194000
trusted library allocation
page read and write
6951000
heap
page read and write
7020000
direct allocation
page execute and read and write
1CEC00A14000
trusted library allocation
page read and write
46E000220000
direct allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
672C7FE000
unkown
page readonly
1BBC00320000
trusted library allocation
page read and write
1268000
heap
page read and write
E1E000
stack
page read and write
17FE000
stack
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC001D8000
trusted library allocation
page read and write
6951000
heap
page read and write
7E0000
heap
page read and write
1CEC00B24000
trusted library allocation
page read and write
6951000
heap
page read and write
20B63293000
heap
page read and write
1CEC00A01000
trusted library allocation
page read and write
1726000
heap
page read and write
E41000
unkown
page readonly
72C0000
heap
page read and write
1CEC00458000
trusted library allocation
page read and write
68D000
stack
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
20B68B21000
trusted library section
page read and write
1CEC01024000
trusted library allocation
page read and write
344B000
heap
page read and write
1CEC01024000
trusted library allocation
page read and write
7330000
heap
page read and write
6951000
heap
page read and write
7050000
direct allocation
page execute and read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00698000
trusted library allocation
page read and write
6951000
heap
page read and write
E3E000
unkown
page write copy
67287FE000
unkown
page readonly
6951000
heap
page read and write
7508000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1BBC006AC000
trusted library allocation
page read and write
7424000
heap
page read and write
6951000
heap
page read and write
6725FFA000
stack
page read and write
7BF000
unkown
page read and write
6951000
heap
page read and write
1CEC002B8000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00CB0000
trusted library allocation
page read and write
46E000201000
direct allocation
page read and write
945A000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1920000
heap
page read and write
1CEC00D50000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
19FF000
stack
page read and write
7321000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00CF8000
trusted library allocation
page read and write
6951000
heap
page read and write
E3E000
unkown
page write copy
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1BBC00201000
trusted library allocation
page read and write
20B632A0000
heap
page read and write
1BBC00250000
trusted library allocation
page read and write
75CD000
heap
page read and write
6951000
heap
page read and write
74C3000
heap
page read and write
FF0000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC0032C000
trusted library allocation
page read and write
6951000
heap
page read and write
7291000
heap
page read and write
1CEC001D0000
trusted library allocation
page read and write
6951000
heap
page read and write
DD0000
heap
page read and write
20B5FFC5000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
7424000
heap
page read and write
E30000
unkown
page readonly
6951000
heap
page read and write
1CEC00D00000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC00228000
trusted library allocation
page read and write
20B5FD22000
heap
page read and write
6951000
heap
page read and write
1CEC00870000
trusted library allocation
page read and write
1BBC006B0000
trusted library allocation
page read and write
1CEC002A4000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
3420000
direct allocation
page read and write
7559000
heap
page read and write
1CEC01084000
trusted library allocation
page read and write
E3A000
unkown
page readonly
1CEC00494000
trusted library allocation
page read and write
6951000
heap
page read and write
20B63747000
heap
page read and write
1BBC006F0000
trusted library allocation
page read and write
6C69F000
unkown
page readonly
6730FFE000
stack
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
72B7000
heap
page read and write
1769000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
20B5FD58000
heap
page read and write
6951000
heap
page read and write
20B63450000
heap
page read and write
1BBC00368000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
753E000
heap
page read and write
6951000
heap
page read and write
1CEC00848000
trusted library allocation
page read and write
1130000
heap
page read and write
1CEC00A58000
trusted library allocation
page read and write
6951000
heap
page read and write
20B637CE000
heap
page read and write
6951000
heap
page read and write
46E00023C000
direct allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00801000
trusted library allocation
page read and write
3420000
direct allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1AA400270000
trusted library allocation
page read and write
6951000
heap
page read and write
73FC000
heap
page read and write
6951000
heap
page read and write
1AA4002A0000
trusted library allocation
page read and write
6951000
heap
page read and write
6729FFB000
stack
page read and write
6951000
heap
page read and write
20B63270000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1AA4002C0000
trusted library allocation
page read and write
765B000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00338000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC0080C000
trusted library allocation
page read and write
1CEC002C4000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC0002C000
trusted library allocation
page read and write
1CEC001AC000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1BBC002B0000
trusted library allocation
page read and write
1BBC003EC000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00720000
trusted library allocation
page read and write
1BBC002FC000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
752F000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6720FFE000
stack
page read and write
3420000
direct allocation
page read and write
1CEC002C4000
trusted library allocation
page read and write
1BBC00754000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC00EA0000
trusted library allocation
page read and write
6951000
heap
page read and write
F5E000
stack
page read and write
6951000
heap
page read and write
1CEC00F48000
trusted library allocation
page read and write
1CEC00300000
trusted library allocation
page read and write
1CEC0034C000
trusted library allocation
page read and write
E20000
heap
page read and write
7330000
heap
page read and write
7050000
direct allocation
page execute and read and write
6951000
heap
page read and write
7425000
heap
page read and write
673AFFB000
stack
page read and write
14E8000
heap
page read and write
1CEC001A0000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
7050000
direct allocation
page execute and read and write
6951000
heap
page read and write
1BBC0035C000
trusted library allocation
page read and write
1CEC00FBC000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
729B000
heap
page read and write
6951000
heap
page read and write
742D000
heap
page read and write
1725000
heap
page read and write
7427000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
674B7FE000
unkown
page readonly
753B000
heap
page read and write
20B6371E000
heap
page read and write
1BBC00694000
trusted library allocation
page read and write
E31000
unkown
page execute read
1CEC00ED0000
trusted library allocation
page read and write
75FC000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
20B637AD000
heap
page read and write
7424000
heap
page read and write
1CEC00324000
trusted library allocation
page read and write
E3E000
unkown
page write copy
6951000
heap
page read and write
1CEC00760000
trusted library allocation
page read and write
7F0000
heap
page read and write
6951000
heap
page read and write
1CEC00134000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00DE4000
trusted library allocation
page read and write
1CEC012A0000
trusted library allocation
page read and write
1BBC00724000
trusted library allocation
page read and write
6951000
heap
page read and write
1AA4002F8000
trusted library allocation
page read and write
14C0000
heap
page read and write
6951000
heap
page read and write
7297000
heap
page read and write
1BBC0027C000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
E30000
unkown
page readonly
20B63960000
trusted library section
page read and write
754C000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
742E000
heap
page read and write
67407FE000
unkown
page readonly
1CEC00644000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
67267FE000
unkown
page readonly
72C5000
heap
page read and write
6951000
heap
page read and write
67367FE000
unkown
page readonly
6951000
heap
page read and write
1AA400294000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
7514000
heap
page read and write
20B6A360000
trusted library section
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00401000
trusted library allocation
page read and write
1CEC005A8000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC008B0000
trusted library allocation
page read and write
1CEC00214000
trusted library allocation
page read and write
7423000
heap
page read and write
6951000
heap
page read and write
7239000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1AA400278000
trusted library allocation
page read and write
1BBC00424000
trusted library allocation
page read and write
7421000
heap
page read and write
6951000
heap
page read and write
1CEC006A8000
trusted library allocation
page read and write
1CEC0100C000
trusted library allocation
page read and write
7050000
direct allocation
page execute and read and write
E3A000
unkown
page readonly
1CEC00D8D000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
7050000
direct allocation
page execute and read and write
46E0002E4000
direct allocation
page read and write
6951000
heap
page read and write
1CEC00ABC000
trusted library allocation
page read and write
6951000
heap
page read and write
13FC000
stack
page read and write
20B63294000
heap
page read and write
673FFFD000
stack
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1BBC00734000
trusted library allocation
page read and write
6951000
heap
page read and write
E3E000
unkown
page read and write
6951000
heap
page read and write
7050000
direct allocation
page execute and read and write
6951000
heap
page read and write
20B637BD000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00D64000
trusted library allocation
page read and write
1CEC003A0000
trusted library allocation
page read and write
6951000
heap
page read and write
1BBC0039C000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
20B65770000
heap
page read and write
20B68B42000
trusted library section
page read and write
6951000
heap
page read and write
1769000
heap
page read and write
7553000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6DD0000
direct allocation
page read and write
7557000
heap
page read and write
1CEC00708000
trusted library allocation
page read and write
67387FE000
unkown
page readonly
1CEC007EC000
trusted library allocation
page read and write
6951000
heap
page read and write
6737FFC000
stack
page read and write
6951000
heap
page read and write
1BBC006D0000
trusted library allocation
page read and write
6951000
heap
page read and write
20B5FD37000
heap
page read and write
1CEC00594000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
7426000
heap
page read and write
6951000
heap
page read and write
674C7FE000
unkown
page readonly
1CEC00E0C000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC01180000
trusted library allocation
page read and write
6951000
heap
page read and write
20B5FD37000
heap
page read and write
20B5FD58000
heap
page read and write
E31000
unkown
page execute read
20B63260000
heap
page read and write
1CEC010D0000
trusted library allocation
page read and write
72CB000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC008C0000
trusted library allocation
page read and write
1CEC001D4000
trusted library allocation
page read and write
20B62530000
unkown
page read and write
6951000
heap
page read and write
763C000
heap
page read and write
1BBC0033C000
trusted library allocation
page read and write
1708000
heap
page read and write
6951000
heap
page read and write
7324000
heap
page read and write
6951000
heap
page read and write
67327FE000
unkown
page readonly
104C000
stack
page read and write
1CEC0060C000
trusted library allocation
page read and write
6951000
heap
page read and write
1AA4002C0000
trusted library allocation
page read and write
175A000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1050000
heap
page read and write
6951000
heap
page read and write
1BBC00408000
trusted library allocation
page read and write
1CEC01184000
trusted library allocation
page read and write
7330000
heap
page read and write
69CC1000
direct allocation
page execute read
1AA400238000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC009CB000
trusted library allocation
page read and write
1CEC00D7C000
trusted library allocation
page read and write
74DB000
direct allocation
page read and write
7050000
direct allocation
page execute and read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC001F0000
trusted library allocation
page read and write
7426000
heap
page read and write
1CEC0000C000
trusted library allocation
page read and write
7296000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1AA400250000
trusted library allocation
page read and write
1478000
unkown
page execute and write copy
20B5FBF0000
heap
page read and write
1CEC001F8000
trusted library allocation
page read and write
7324000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6D90000
trusted library allocation
page read and write
1CEC00601000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC0021C000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC00B00000
trusted library allocation
page read and write
3420000
direct allocation
page read and write
20B6370F000
heap
page read and write
12C3000
unkown
page execute and write copy
1CEC00478000
trusted library allocation
page read and write
1CEC01164000
trusted library allocation
page read and write
1CEC00C68000
trusted library allocation
page read and write
673EFFE000
stack
page read and write
7677000
heap
page read and write
1CEC009B4000
trusted library allocation
page read and write
1BBC0025C000
trusted library allocation
page read and write
7330000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
755D000
heap
page read and write
6951000
heap
page read and write
674A7FE000
unkown
page readonly
673CFFC000
stack
page read and write
6951000
heap
page read and write
7531000
heap
page read and write
6C6EC000
unkown
page readonly
1BBC00614000
trusted library allocation
page read and write
1CEC0129C000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
20B6328F000
heap
page read and write
10C0000
heap
page read and write
67227FE000
unkown
page readonly
46E000230000
direct allocation
page read and write
6951000
heap
page read and write
1CEC00580000
trusted library allocation
page read and write
1BBC007CC000
trusted library allocation
page read and write
6951000
heap
page read and write
1BBC0040C000
trusted library allocation
page read and write
6951000
heap
page read and write
E41000
unkown
page readonly
6951000
heap
page read and write
1773000
heap
page read and write
E00000
heap
page read and write
6951000
heap
page read and write
7310000
heap
page read and write
6951000
heap
page read and write
20B6A47D000
trusted library section
page read and write
6951000
heap
page read and write
1CEC00744000
trusted library allocation
page read and write
1CEC002F3000
trusted library allocation
page read and write
8C0000
heap
page read and write
72D8000
heap
page read and write
754B000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00F1C000
trusted library allocation
page read and write
6951000
heap
page read and write
13FC000
stack
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
763D000
heap
page read and write
1CEC0016C000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC003F0000
trusted library allocation
page read and write
674F7FE000
unkown
page readonly
1CEC0030C000
trusted library allocation
page read and write
46E00024C000
direct allocation
page read and write
769C000
heap
page read and write
72B2000
heap
page read and write
6951000
heap
page read and write
E41000
unkown
page readonly
6C5C1000
unkown
page execute read
1CEC004B0000
trusted library allocation
page read and write
1CEC00201000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
72A1000
heap
page read and write
1CEC00EF8000
trusted library allocation
page read and write
6951000
heap
page read and write
1BBC00374000
trusted library allocation
page read and write
1CEC002B4000
trusted library allocation
page read and write
1AA400230000
trusted library allocation
page read and write
1CEC010B8000
trusted library allocation
page read and write
20B63610000
trusted library section
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
672BFFE000
stack
page read and write
1BBC002D4000
trusted library allocation
page read and write
1BBC00238000
trusted library allocation
page read and write
1CEC00484000
trusted library allocation
page read and write
74D3000
heap
page read and write
BF0000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
7050000
direct allocation
page execute and read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC001E8000
trusted library allocation
page read and write
7429000
heap
page read and write
1794000
heap
page read and write
6951000
heap
page read and write
1CEC00702000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1BBC00744000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC00054000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00E60000
trusted library allocation
page read and write
1CEC00F0C000
trusted library allocation
page read and write
830000
unkown
page readonly
20B5FC60000
heap
page read and write
20B65793000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00318000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC01194000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
344B000
heap
page read and write
72B4000
heap
page read and write
1CEC00014000
trusted library allocation
page read and write
20B639F7000
unclassified section
page read and write
67277FE000
unkown
page readonly
46E000284000
direct allocation
page read and write
6951000
heap
page read and write
1CEC00D94000
trusted library allocation
page read and write
20B68EF0000
trusted library section
page read and write
7420000
heap
page read and write
6951000
heap
page read and write
46E00020C000
direct allocation
page read and write
6951000
heap
page read and write
1BBC00330000
trusted library allocation
page read and write
7330000
heap
page read and write
20B68CB0000
trusted library section
page read and write
674D7FE000
unkown
page readonly
6951000
heap
page read and write
672CFFE000
stack
page read and write
67477FE000
unkown
page readonly
6951000
heap
page read and write
67417FE000
unkown
page readonly
6951000
heap
page read and write
D7C000
stack
page read and write
16FD000
heap
page read and write
1CEC007DC000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
723A000
heap
page read and write
E30000
unkown
page readonly
674DFFE000
stack
page read and write
46E000303000
direct allocation
page read and write
1BBC00380000
trusted library allocation
page read and write
1AA4002C8000
trusted library allocation
page read and write
6C5C0000
unkown
page readonly
67207FE000
unkown
page readonly
6951000
heap
page read and write
7050000
direct allocation
page execute and read and write
20B6329C000
heap
page read and write
1794000
heap
page read and write
1CEC0090C000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC002A4000
trusted library allocation
page read and write
72D0000
heap
page read and write
1CEC002B8000
trusted library allocation
page read and write
6951000
heap
page read and write
E31000
unkown
page execute read
6951000
heap
page read and write
1BBC007E0000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
74D9000
direct allocation
page read and write
6951000
heap
page read and write
1BBC00624000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC0078C000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00300000
trusted library allocation
page read and write
6951000
heap
page read and write
74B2000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1AA4002F4000
trusted library allocation
page read and write
1CEC00D34000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
87F000
stack
page read and write
1CEC00358000
trusted library allocation
page read and write
6723FFE000
stack
page read and write
1CEC00964000
trusted library allocation
page read and write
6951000
heap
page read and write
7428000
heap
page read and write
1CEC001AC000
trusted library allocation
page read and write
6951000
heap
page read and write
1BBC0020C000
trusted library allocation
page read and write
1CEC0027C000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC00EB8000
trusted library allocation
page read and write
46E000290000
direct allocation
page read and write
7422000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC001E0000
trusted library allocation
page read and write
E41000
unkown
page readonly
1CEC00338000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1BBC00354000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1BBC00658000
trusted library allocation
page read and write
1CEC00EC4000
trusted library allocation
page read and write
E3A000
unkown
page readonly
6951000
heap
page read and write
674AFFE000
stack
page read and write
20B637C8000
heap
page read and write
1CEC00E01000
trusted library allocation
page read and write
1CEC001B4000
trusted library allocation
page read and write
6951000
heap
page read and write
74FB000
heap
page read and write
6C6E9000
unkown
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC001B4000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00B34000
trusted library allocation
page read and write
6951000
heap
page read and write
1AA4002C0000
trusted library allocation
page read and write
6951000
heap
page read and write
E41000
unkown
page readonly
1CEC003F0000
trusted library allocation
page read and write
1CEC00B44000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
7190000
heap
page read and write
1CEC00F44000
trusted library allocation
page read and write
46E0002A8000
direct allocation
page read and write
20B63726000
heap
page read and write
20B68B4E000
trusted library section
page read and write
673BFFB000
stack
page read and write
1CEC00318000
trusted library allocation
page read and write
1CEC00D88000
trusted library allocation
page read and write
6951000
heap
page read and write
6A6F8000
direct allocation
page read and write
1BBC006E0000
trusted library allocation
page read and write
6726FFA000
stack
page read and write
6951000
heap
page read and write
1CEC00E6C000
trusted library allocation
page read and write
20B67AA3000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC001DC000
trusted library allocation
page read and write
6951000
heap
page read and write
751A000
heap
page read and write
1BBC00678000
trusted library allocation
page read and write
67457FE000
unkown
page readonly
6742FFE000
stack
page read and write
6951000
heap
page read and write
1BBC00220000
trusted library allocation
page read and write
7382000
direct allocation
page read and write
1CEC0085C000
trusted library allocation
page read and write
1774000
heap
page read and write
1AA4002B0000
trusted library allocation
page read and write
1CEC00F70000
trusted library allocation
page read and write
1CEC0037C000
trusted library allocation
page read and write
6951000
heap
page read and write
72B8000
heap
page read and write
6951000
heap
page read and write
20B5FD20000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
20B6A416000
trusted library section
page read and write
6951000
heap
page read and write
1CEC00338000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00210000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
753F000
heap
page read and write
6951000
heap
page read and write
E3E000
unkown
page write copy
20B5FC7E000
heap
page read and write
6951000
heap
page read and write
E3A000
unkown
page readonly
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
20B68947000
unclassified section
page read and write
20B68EFE000
trusted library section
page read and write
20B67840000
trusted library allocation
page read and write
1CEC00A14000
trusted library allocation
page read and write
673E7FE000
unkown
page readonly
1CEC00920000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC00CC0000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC00B80000
trusted library allocation
page read and write
20B68CFE000
trusted library section
page read and write
6951000
heap
page read and write
7420000
heap
page read and write
6951000
heap
page read and write
1BBC006E8000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC00708000
trusted library allocation
page read and write
6951000
heap
page read and write
1BBC00750000
trusted library allocation
page read and write
E30000
unkown
page readonly
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
7321000
heap
page read and write
1CEC00679000
trusted library allocation
page read and write
20B68B10000
trusted library section
page read and write
20B68BB3000
trusted library section
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
11BE000
stack
page read and write
6951000
heap
page read and write
67397FE000
unkown
page readonly
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
672D7FE000
unkown
page readonly
7330000
heap
page read and write
6951000
heap
page read and write
1CEC00500000
trusted library allocation
page read and write
20B67A80000
heap
page read and write
1AA4002BC000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC003F0000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00C90000
trusted library allocation
page read and write
1CEC003F0000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC0037C000
trusted library allocation
page read and write
7421000
heap
page read and write
1CEC0006A000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC002A4000
trusted library allocation
page read and write
1CEC01154000
trusted library allocation
page read and write
6951000
heap
page read and write
67357FE000
unkown
page readonly
6951000
heap
page read and write
1CEC01144000
trusted library allocation
page read and write
6951000
heap
page read and write
1BBC00310000
trusted library allocation
page read and write
1CEC001EC000
trusted library allocation
page read and write
20B6328A000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
72BD000
heap
page read and write
20B635B0000
trusted library section
page read and write
6732FFB000
stack
page read and write
6951000
heap
page read and write
1CEC00E84000
trusted library allocation
page read and write
7421000
heap
page read and write
7420000
heap
page read and write
7050000
direct allocation
page execute and read and write
6951000
heap
page read and write
1BBC00640000
trusted library allocation
page read and write
1BBC00390000
trusted library allocation
page read and write
6951000
heap
page read and write
67317FE000
unkown
page readonly
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00708000
trusted library allocation
page read and write
20B5FBA0000
heap
page read and write
729B000
heap
page read and write
7050000
direct allocation
page execute and read and write
6951000
heap
page read and write
20B5FC10000
trusted library allocation
page read and write
6951000
heap
page read and write
7040000
direct allocation
page execute and read and write
67467FE000
unkown
page readonly
1CEC00118000
trusted library allocation
page read and write
1CEC00074000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC0017C000
trusted library allocation
page read and write
1CEC01144000
trusted library allocation
page read and write
1CEC00D10000
trusted library allocation
page read and write
46E000280000
direct allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
E41000
unkown
page readonly
1CEC00684000
trusted library allocation
page read and write
67447FE000
unkown
page readonly
1CEC0009C000
trusted library allocation
page read and write
6951000
heap
page read and write
73CD000
heap
page read and write
3420000
direct allocation
page read and write
729A000
heap
page read and write
20B677A7000
unclassified section
page read and write
E00000
heap
page read and write
1AA400220000
trusted library allocation
page read and write
6951000
heap
page read and write
7050000
direct allocation
page execute and read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6DD0000
direct allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
7422000
heap
page read and write
1CEC007A4000
trusted library allocation
page read and write
1CEC00A98000
trusted library allocation
page read and write
1BBC002B8000
trusted library allocation
page read and write
1BBC002CC000
trusted library allocation
page read and write
6951000
heap
page read and write
753E000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
729B000
heap
page read and write
12FA000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00614000
trusted library allocation
page read and write
20B68CF0000
trusted library section
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00970000
trusted library allocation
page read and write
6951000
heap
page read and write
20B67ADF000
heap
page read and write
6951000
heap
page read and write
1CEC00290000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC00C01000
trusted library allocation
page read and write
6951000
heap
page read and write
BDC000
stack
page read and write
6951000
heap
page read and write
1BBC00758000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00E2C000
trusted library allocation
page read and write
72A5000
heap
page read and write
1CEC00484000
trusted library allocation
page read and write
6951000
heap
page read and write
754F000
heap
page read and write
1BBC006FC000
trusted library allocation
page read and write
6951000
heap
page read and write
1BBC00668000
trusted library allocation
page read and write
6951000
heap
page read and write
20B6329E000
heap
page read and write
6951000
heap
page read and write
1CEC0018C000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1260000
heap
page read and write
1AA400248000
trusted library allocation
page read and write
20B65717000
unclassified section
page read and write
1CEC00B80000
trusted library allocation
page read and write
6951000
heap
page read and write
155F000
stack
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1BBC002F4000
trusted library allocation
page read and write
1BBC0069C000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC002AA000
trusted library allocation
page read and write
671FFFE000
unkown
page read and write
6951000
heap
page read and write
7421000
heap
page read and write
6951000
heap
page read and write
1CEC0034C000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
3420000
direct allocation
page read and write
1CEC002C4000
trusted library allocation
page read and write
7515000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
20B636E7000
heap
page read and write
1CEC0020C000
trusted library allocation
page read and write
1CEC0109C000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
E30000
unkown
page readonly
1CEC00DF4000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC00F48000
trusted library allocation
page read and write
6951000
heap
page read and write
74ED000
heap
page read and write
1CEC00D48000
trusted library allocation
page read and write
6951000
heap
page read and write
46E0002EC000
direct allocation
page read and write
1CEC00224000
trusted library allocation
page read and write
46E000294000
direct allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6724FFD000
stack
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
672FFFA000
stack
page read and write
1CEC00530000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC00484000
trusted library allocation
page read and write
6951000
heap
page read and write
754D000
heap
page read and write
6951000
heap
page read and write
1BBC0075C000
trusted library allocation
page read and write
1BBC006C8000
trusted library allocation
page read and write
7330000
heap
page read and write
7615000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC01034000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC003F0000
trusted library allocation
page read and write
7321000
heap
page read and write
1BBC00688000
trusted library allocation
page read and write
1AA4002BC000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
7030000
direct allocation
page execute and read and write
1AA4002F0000
trusted library allocation
page read and write
6951000
heap
page read and write
20B61AE0000
heap
page read and write
6734FFC000
stack
page read and write
1CEC00A28000
trusted library allocation
page read and write
6951000
heap
page read and write
E3A000
unkown
page readonly
6951000
heap
page read and write
1CEC00A68000
trusted library allocation
page read and write
7050000
direct allocation
page execute and read and write
1CEC00FBC000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC004B0000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
E31000
unkown
page execute read
6951000
heap
page read and write
1BBC00401000
trusted library allocation
page read and write
6951000
heap
page read and write
7684000
heap
page read and write
1CEC00898000
trusted library allocation
page read and write
20B637A8000
heap
page read and write
75B2000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1AA4002BC000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC000DC000
trusted library allocation
page read and write
6951000
heap
page read and write
1BBC00601000
trusted library allocation
page read and write
20B637B3000
heap
page read and write
1CEC00AAC000
trusted library allocation
page read and write
1CEC0040C000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC004C8000
trusted library allocation
page read and write
1CEC00524000
trusted library allocation
page read and write
6951000
heap
page read and write
672AFFC000
stack
page read and write
6951000
heap
page read and write
73FC000
heap
page read and write
1587000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1AA4002BD000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
75F3000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1BBC006B8000
trusted library allocation
page read and write
6951000
heap
page read and write
1BBC00248000
trusted library allocation
page read and write
6951000
heap
page read and write
672E7FE000
unkown
page readonly
6951000
heap
page read and write
6951000
heap
page read and write
74F2000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1AA4002A0000
trusted library allocation
page read and write
1CEC00B0C000
trusted library allocation
page read and write
1CEC0034C000
trusted library allocation
page read and write
6951000
heap
page read and write
7513000
heap
page read and write
1BBC00630000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
7423000
heap
page read and write
20B67AC5000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
7050000
direct allocation
page execute and read and write
D9C000
stack
page read and write
67347FE000
unkown
page readonly
6951000
heap
page read and write
3420000
direct allocation
page read and write
6951000
heap
page read and write
752B000
heap
page read and write
46E0002DC000
direct allocation
page read and write
73DC000
heap
page read and write
1BBC00404000
trusted library allocation
page read and write
6951000
heap
page read and write
729B000
heap
page read and write
6951000
heap
page read and write
1CEC00B8C000
trusted library allocation
page read and write
67307FE000
unkown
page readonly
1BBC00330000
trusted library allocation
page read and write
1CEC004BC000
trusted library allocation
page read and write
1CEC00B1A000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
1CEC0034C000
trusted library allocation
page read and write
6951000
heap
page read and write
1CEC00CFB000
trusted library allocation
page read and write
6951000
heap
page read and write
673B7FE000
unkown
page readonly
6951000
heap
page read and write
6951000
heap
page read and write
20B6379E000
heap
page read and write
6748FFC000
stack
page read and write
6951000
heap
page read and write
20B68690000
trusted library section
page read and write
1CEC01050000
trusted library allocation
page read and write
6951000
heap
page read and write
673DFFB000
stack
page read and write
6951000
heap
page read and write
7426000
heap
page read and write
6951000
heap
page read and write
673D7FE000
unkown
page readonly
1CEC00820000
trusted library allocation
page read and write
1CEC00AFC000
trusted library allocation
page read and write
6951000
heap
page read and write
72A6000
heap
page read and write
1CEC00900000
trusted library allocation
page read and write
6951000
heap
page read and write
1BBC0035C000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
8A5A000
heap
page read and write
6951000
heap
page read and write
1AA400288000
trusted library allocation
page read and write
6951000
heap
page read and write
7330000
heap
page read and write
20B63293000
heap
page read and write
1CEC0052B000
trusted library allocation
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
6951000
heap
page read and write
7420000
heap
page read and write
1CEC00750000
trusted library allocation
page read and write
1CEC006C4000
trusted library allocation
page read and write
73C5000
heap
page read and write
6951000
heap
page read and write
1CEC00128000
trusted library allocation
page read and write
1CEC00CE0000
trusted library allocation
page read and write
6951000
heap
page read and write
1BBC00418000
trusted library allocation
page read and write
20B68110000
trusted library allocation
page read and write
1CEC004DC000
trusted library allocation
page read and write
There are 2009 hidden memdumps, click here to show them.