IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_de576c89c85d95f63177b89249eef622329cc21c_49e505fd_a51a8195-1db9-4f6b-a339-8e7aa23c1c20\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
modified
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER187.tmp.dmp
Mini DuMP crash report, 15 streams, Thu Nov 21 17:22:32 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER32E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER514.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2568 --field-trial-handle=2480,i,2786554931970826557,11658264274216271163,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user~1\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user~1\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user~1\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user~1\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 1796
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=bP
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
http://anglebug.com/4324;
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://google-ohttp-relay-query.fastly-edge.com/x
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEklyP
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://chrome.google.com/webstore?hl=en3
unknown
https://issuetracker.google.com/161903006
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
34.116.198.130
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
https://www.google.com/search?q=$
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/29706
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
http://anglebug.com/4937
unknown
https://issuetracker.google.com/166809097
unknown
http://issuetracker.google.com/200067929
unknown
https://anglebug.com/7847
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fvtekk5pn.top
34.116.198.130
www.google.com
142.250.181.100
fvtekk5pn.top
34.116.198.130

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
34.116.198.130
home.fvtekk5pn.top
United States
127.0.0.1
unknown
unknown
142.250.181.100
www.google.com
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProgramId
malicious
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
FileId
malicious
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LowerCaseLongPath
malicious
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LongPathHash
malicious
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Name
malicious
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
OriginalFileName
malicious
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Publisher
malicious
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Version
malicious
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinFileVersion
malicious
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinaryType
malicious
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProductName
malicious
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProductVersion
malicious
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LinkDate
malicious
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinProductVersion
malicious
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
AppxPackageFullName
malicious
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
AppxPackageRelativeId
malicious
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Size
malicious
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Language
malicious
\REGISTRY\A\{a9cf1e76-6759-288f-b06e-c42b8224b888}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5C4000230000
direct allocation
page read and write
724C002A0000
trusted library allocation
page read and write
501C02580000
trusted library allocation
page read and write
501C023E0000
trusted library allocation
page read and write
CE1000
unkown
page execute read
7125000
heap
page read and write
501C0297C000
trusted library allocation
page read and write
46C000
stack
page read and write
6731000
heap
page read and write
7256000
heap
page read and write
7275000
heap
page read and write
9E727FE000
stack
page read and write
501C031A0000
trusted library allocation
page read and write
6720000
direct allocation
page read and write
9E08FFE000
unkown
page readonly
7353000
heap
page read and write
501C023DC000
trusted library allocation
page read and write
501C02C50000
trusted library allocation
page read and write
CEE000
unkown
page write copy
501C02324000
trusted library allocation
page read and write
11FC000
stack
page read and write
146C000
stack
page read and write
501C02E8C000
trusted library allocation
page read and write
CF1000
unkown
page readonly
78C800330000
trusted library allocation
page read and write
CE1000
unkown
page execute read
724C00260000
trusted library allocation
page read and write
501C0278C000
trusted library allocation
page read and write
78C80027C000
trusted library allocation
page read and write
501C0340C000
trusted library allocation
page read and write
7223000
heap
page read and write
6731000
heap
page read and write
78C800310000
trusted library allocation
page read and write
CEA000
unkown
page readonly
501C02FD0000
trusted library allocation
page read and write
501C032D4000
trusted library allocation
page read and write
501C03401000
trusted library allocation
page read and write
9E7FFFE000
unkown
page readonly
6E40000
direct allocation
page execute and read and write
1B810A58000
heap
page read and write
FE0000
heap
page read and write
501C03564000
trusted library allocation
page read and write
9E06FFE000
unkown
page readonly
501C02510000
trusted library allocation
page read and write
78C800320000
trusted library allocation
page read and write
9E68FFE000
unkown
page readonly
724C00250000
trusted library allocation
page read and write
CEE000
unkown
page write copy
724C002BC000
trusted library allocation
page read and write
D3E000
stack
page read and write
CF1000
unkown
page readonly
724C002C0000
trusted library allocation
page read and write
B7C000
stack
page read and write
1B812890000
heap
page read and write
7238000
heap
page read and write
6731000
heap
page read and write
501C0293D000
trusted library allocation
page read and write
724C002C0000
trusted library allocation
page read and write
DE0000
heap
page read and write
190000
heap
page read and write
501C023B4000
trusted library allocation
page read and write
501C0308C000
trusted library allocation
page read and write
724C00278000
trusted library allocation
page read and write
6720000
direct allocation
page read and write
72D8000
heap
page read and write
1B814041000
heap
page read and write
6B70000
trusted library allocation
page read and write
501C024F0000
trusted library allocation
page read and write
1B814041000
heap
page read and write
501C030C8000
trusted library allocation
page read and write
CE1000
unkown
page execute read
501C02E8C000
trusted library allocation
page read and write
71C1000
heap
page read and write
78C8006B8000
trusted library allocation
page read and write
501C023F0000
trusted library allocation
page read and write
78C800770000
trusted library allocation
page read and write
501C00A01000
trusted library allocation
page read and write
501C02F1C000
trusted library allocation
page read and write
501C02F18000
trusted library allocation
page read and write
1B81B1E6000
trusted library section
page read and write
CF1000
unkown
page readonly
501C032DC000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
7124000
heap
page read and write
777000
heap
page read and write
1B812893000
heap
page read and write
501C02EC0000
trusted library allocation
page read and write
501C0240C000
trusted library allocation
page read and write
1B81459E000
heap
page read and write
F50000
heap
page read and write
501C02990000
trusted library allocation
page read and write
9E6F7FE000
stack
page read and write
501C0241C000
trusted library allocation
page read and write
9E667FB000
stack
page read and write
501C03264000
trusted library allocation
page read and write
501C02C34000
trusted library allocation
page read and write
7227000
heap
page read and write
6E10000
direct allocation
page execute and read and write
5C400023C000
direct allocation
page read and write
6720000
direct allocation
page read and write
F04000
unkown
page execute and write copy
712E000
heap
page read and write
7125000
heap
page read and write
173F000
stack
page read and write
501C03238000
trusted library allocation
page read and write
CEE000
unkown
page read and write
501C031E8000
trusted library allocation
page read and write
9E7DFFE000
unkown
page readonly
9E60FFE000
unkown
page readonly
6731000
heap
page read and write
9E057FD000
stack
page read and write
1B81404E000
heap
page read and write
CE1000
unkown
page execute read
8B7000
heap
page read and write
9E72FFE000
unkown
page readonly
501C034B4000
trusted library allocation
page read and write
501C0253C000
trusted library allocation
page read and write
501C02690000
trusted library allocation
page read and write
501C0261C000
trusted library allocation
page read and write
5C4000303000
direct allocation
page read and write
19DF000
stack
page read and write
6E40000
direct allocation
page execute and read and write
1B81AA50000
trusted library section
page read and write
501C02922000
trusted library allocation
page read and write
6731000
heap
page read and write
5C40002DC000
direct allocation
page read and write
5C400026C000
direct allocation
page read and write
1B81AAD0000
trusted library section
page read and write
6E30000
direct allocation
page execute and read and write
9E0FFFE000
unkown
page readonly
760000
heap
page read and write
5F0000
heap
page read and write
501C0271B000
trusted library allocation
page read and write
13FC000
stack
page read and write
78C800368000
trusted library allocation
page read and write
501C03578000
trusted library allocation
page read and write
78C8007CC000
trusted library allocation
page read and write
9E747FE000
stack
page read and write
501C024B4000
trusted library allocation
page read and write
5C4000215000
direct allocation
page read and write
14C0000
heap
page read and write
501C00180000
trusted library allocation
page read and write
78C800714000
trusted library allocation
page read and write
501C02880000
trusted library allocation
page read and write
501C03018000
trusted library allocation
page read and write
6E40000
direct allocation
page execute and read and write
501C02504000
trusted library allocation
page read and write
7D0000
heap
page read and write
9E78FFE000
unkown
page readonly
501C02550000
trusted library allocation
page read and write
5C40002A8000
direct allocation
page read and write
71FA000
heap
page read and write
501C03248000
trusted library allocation
page read and write
1B81876D000
heap
page read and write
501C023D4000
trusted library allocation
page read and write
501C02EA4000
trusted library allocation
page read and write
9E6C7FB000
stack
page read and write
CEA000
unkown
page readonly
78C800648000
trusted library allocation
page read and write
9E697FB000
stack
page read and write
CF1000
unkown
page readonly
1B81A0E7000
unclassified section
page read and write
1B810C45000
heap
page read and write
501C02494000
trusted library allocation
page read and write
1B8109A0000
heap
page read and write
72D5000
heap
page read and write
724C002F0000
trusted library allocation
page read and write
501C02550000
trusted library allocation
page read and write
501C00FCC000
trusted library allocation
page read and write
501C023EC000
trusted library allocation
page read and write
9E7E7FD000
stack
page read and write
1B81ACA0000
trusted library section
page read and write
9E02FFE000
unkown
page readonly
501C02334000
trusted library allocation
page read and write
1B81ABF0000
trusted library section
page read and write
501C03310000
trusted library allocation
page read and write
78C80075C000
trusted library allocation
page read and write
CE0000
unkown
page readonly
9E07FFE000
unkown
page readonly
501C032AC000
trusted library allocation
page read and write
6E40000
direct allocation
page execute and read and write
481000
unkown
page execute and write copy
501C02504000
trusted library allocation
page read and write
9E097FE000
stack
page read and write
7128000
heap
page read and write
9E00FFE000
unkown
page readonly
78C80060C000
trusted library allocation
page read and write
CF1000
unkown
page readonly
1B81AAC0000
trusted library section
page read and write
501C0300C000
trusted library allocation
page read and write
6731000
heap
page read and write
11FC000
stack
page read and write
1B814589000
heap
page read and write
501C02908000
trusted library allocation
page read and write
6731000
heap
page read and write
FDE000
stack
page read and write
6731000
heap
page read and write
CEE000
unkown
page read and write
501C03140000
trusted library allocation
page read and write
745E000
heap
page read and write
72CD000
heap
page read and write
78C8002B8000
trusted library allocation
page read and write
712B000
heap
page read and write
9E657FD000
stack
page read and write
6731000
heap
page read and write
9E047FE000
stack
page read and write
72BC000
heap
page read and write
155F000
stack
page read and write
9E04FFE000
unkown
page readonly
9E74FFE000
unkown
page readonly
501C026FC000
trusted library allocation
page read and write
501C03028000
trusted library allocation
page read and write
6E40000
direct allocation
page execute and read and write
5C40002EC000
direct allocation
page read and write
501C02528000
trusted library allocation
page read and write
501C025D8000
trusted library allocation
page read and write
501C03238000
trusted library allocation
page read and write
501C02908000
trusted library allocation
page read and write
78C800620000
trusted library allocation
page read and write
1B81B14E000
trusted library section
page read and write
501C02664000
trusted library allocation
page read and write
1B814038000
heap
page read and write
1B81ABBD000
trusted library section
page read and write
78C800630000
trusted library allocation
page read and write
78C8002FC000
trusted library allocation
page read and write
501C02D24000
trusted library allocation
page read and write
501C023C4000
trusted library allocation
page read and write
6731000
heap
page read and write
9E69FFE000
unkown
page readonly
78C800698000
trusted library allocation
page read and write
1B81404D000
heap
page read and write
501C02410000
trusted library allocation
page read and write
CE0000
unkown
page readonly
1B81AC87000
unclassified section
page read and write
6731000
heap
page read and write
1B814500000
heap
page read and write
730C000
heap
page read and write
501C00E01000
trusted library allocation
page read and write
6E40000
direct allocation
page execute and read and write
724C002C8000
trusted library allocation
page read and write
1B8109C0000
heap
page read and write
1B810A7E000
heap
page read and write
724C00238000
trusted library allocation
page read and write
6E40000
direct allocation
page execute and read and write
CE1000
unkown
page execute read
501C0242C000
trusted library allocation
page read and write
9E71FFE000
unkown
page readonly
9E6FFFE000
unkown
page readonly
7416000
heap
page read and write
15A0000
heap
page read and write
501C00816000
trusted library allocation
page read and write
CE1000
unkown
page execute read
7248000
heap
page read and write
6731000
heap
page read and write
501C0249A000
trusted library allocation
page read and write
1B81452B000
heap
page read and write
501C026F0000
trusted library allocation
page read and write
6731000
heap
page read and write
9E0EFFE000
unkown
page readonly
501C006F0000
trusted library allocation
page read and write
7128000
heap
page read and write
6BC0000
direct allocation
page read and write
6731000
heap
page read and write
CEA000
unkown
page readonly
1B814564000
heap
page read and write
13FE000
stack
page read and write
71FA000
heap
page read and write
501C02AE0000
trusted library allocation
page read and write
CE0000
unkown
page readonly
7268000
heap
page read and write
501C02690000
trusted library allocation
page read and write
CE0000
unkown
page readonly
1B818202000
trusted library allocation
page read and write
1B81AF4E000
trusted library section
page read and write
1B816730000
trusted library allocation
page read and write
CEA000
unkown
page readonly
78C800380000
trusted library allocation
page read and write
712D000
heap
page read and write
501C02401000
trusted library allocation
page read and write
123C000
stack
page read and write
9E7F7FB000
stack
page read and write
501C02A1C000
trusted library allocation
page read and write
1B81A1E7000
unclassified section
page read and write
CEE000
unkown
page write copy
78C80035C000
trusted library allocation
page read and write
9E617FE000
stack
page read and write
1B810C20000
trusted library section
page readonly
5C4000201000
direct allocation
page read and write
1B814010000
heap
page read and write
9E627FE000
stack
page read and write
6731000
heap
page read and write
501C024F0000
trusted library allocation
page read and write
724C002F8000
trusted library allocation
page read and write
501C033A8000
trusted library allocation
page read and write
501C026CC000
trusted library allocation
page read and write
501C02E0C000
trusted library allocation
page read and write
1B81459C000
heap
page read and write
501C03420000
trusted library allocation
page read and write
CF1000
unkown
page readonly
712A000
heap
page read and write
501C02B30000
trusted library allocation
page read and write
6731000
heap
page read and write
9E62FFE000
unkown
page readonly
501C02664000
trusted library allocation
page read and write
501C027C4000
trusted library allocation
page read and write
733F000
heap
page read and write
7305000
heap
page read and write
1B81403C000
heap
page read and write
1B8145BD000
heap
page read and write
18E000
stack
page read and write
501C03068000
trusted library allocation
page read and write
6720000
direct allocation
page read and write
CE1000
unkown
page execute read
501C024B0000
trusted library allocation
page read and write
722C000
heap
page read and write
9E007FE000
stack
page read and write
501C03254000
trusted library allocation
page read and write
CEA000
unkown
page readonly
501C0225F000
trusted library allocation
page read and write
501C0237C000
trusted library allocation
page read and write
9E647FE000
stack
page read and write
7307000
heap
page read and write
9E0D7FC000
stack
page read and write
9E6EFFE000
unkown
page readonly
501C02FBC000
trusted library allocation
page read and write
501C02550000
trusted library allocation
page read and write
12C0000
heap
page read and write
6731000
heap
page read and write
501C0292C000
trusted library allocation
page read and write
78C8002F4000
trusted library allocation
page read and write
78C800320000
trusted library allocation
page read and write
7296000
heap
page read and write
1B810BF0000
trusted library allocation
page read and write
CEA000
unkown
page readonly
12A000
stack
page read and write
501C02ED4000
trusted library allocation
page read and write
724C00274000
trusted library allocation
page read and write
501C0312C000
trusted library allocation
page read and write
501C03201000
trusted library allocation
page read and write
7124000
heap
page read and write
78C800430000
trusted library allocation
page read and write
5C4000280000
direct allocation
page read and write
501C03228000
trusted library allocation
page read and write
1B8109CB000
heap
page read and write
7127000
heap
page read and write
501C02D08000
trusted library allocation
page read and write
501C02C24000
trusted library allocation
page read and write
501C02430000
trusted library allocation
page read and write
78C800238000
trusted library allocation
page read and write
78C8006F0000
trusted library allocation
page read and write
7121000
heap
page read and write
EEC000
stack
page read and write
9E0C7FB000
stack
page read and write
78C800348000
trusted library allocation
page read and write
73B8000
heap
page read and write
501C034C0000
trusted library allocation
page read and write
501C0319C000
trusted library allocation
page read and write
501C02714000
trusted library allocation
page read and write
78C800668000
trusted library allocation
page read and write
501C03104000
trusted library allocation
page read and write
501C02664000
trusted library allocation
page read and write
724C0020C000
trusted library allocation
page read and write
9E6D7FD000
stack
page read and write
6731000
heap
page read and write
6720000
direct allocation
page read and write
501C02720000
trusted library allocation
page read and write
78C8007B4000
trusted library allocation
page read and write
6731000
heap
page read and write
9E717FA000
stack
page read and write
501C02494000
trusted library allocation
page read and write
501C02FDC000
trusted library allocation
page read and write
78C80033C000
trusted library allocation
page read and write
6731000
heap
page read and write
501C0282C000
trusted library allocation
page read and write
5C40002E4000
direct allocation
page read and write
501C024E0000
trusted library allocation
page read and write
78C800390000
trusted library allocation
page read and write
501C02D14000
trusted library allocation
page read and write
78C800424000
trusted library allocation
page read and write
501C023AC000
trusted library allocation
page read and write
5C400020C000
direct allocation
page read and write
78C800248000
trusted library allocation
page read and write
78C8006B4000
trusted library allocation
page read and write
501C03078000
trusted library allocation
page read and write
72B2000
heap
page read and write
724C002B0000
trusted library allocation
page read and write
1B8145A0000
heap
page read and write
15DE000
stack
page read and write
739F000
heap
page read and write
501C0341C000
trusted library allocation
page read and write
1B810AB5000
heap
page read and write
501C02A0C000
trusted library allocation
page read and write
6731000
heap
page read and write
501C031D4000
trusted library allocation
page read and write
6731000
heap
page read and write
123E000
stack
page read and write
501C03264000
trusted library allocation
page read and write
6E40000
direct allocation
page execute and read and write
6E40000
direct allocation
page execute and read and write
501C0317C000
trusted library allocation
page read and write
740E000
heap
page read and write
501C02580000
trusted library allocation
page read and write
501C03120000
trusted library allocation
page read and write
1A9F000
stack
page read and write
CEE000
unkown
page write copy
181F000
stack
page read and write
1B818640000
trusted library section
page read and write
501C02EC4000
trusted library allocation
page read and write
5C4000294000
direct allocation
page read and write
501C025A4000
trusted library allocation
page read and write
501C03248000
trusted library allocation
page read and write
501C02424000
trusted library allocation
page read and write
729F000
heap
page read and write
6731000
heap
page read and write
CEA000
unkown
page readonly
6BC0000
direct allocation
page read and write
9E7EFFE000
unkown
page readonly
CEE000
unkown
page write copy
1B814583000
heap
page read and write
50F000
unkown
page read and write
501C03488000
trusted library allocation
page read and write
1B81B20D000
trusted library section
page read and write
CEA000
unkown
page readonly
78C80020C000
trusted library allocation
page read and write
501C02CE8000
trusted library allocation
page read and write
9E777FD000
stack
page read and write
501C023AC000
trusted library allocation
page read and write
1B8132E0000
unkown
page read and write
CEE000
unkown
page read and write
7290000
heap
page read and write
501C02550000
trusted library allocation
page read and write
501C0292C000
trusted library allocation
page read and write
501C02498000
trusted library allocation
page read and write
501C02280000
trusted library allocation
page read and write
6731000
heap
page read and write
6E40000
direct allocation
page execute and read and write
5C4000270000
direct allocation
page read and write
1B81B142000
trusted library section
page read and write
501C02F1C000
trusted library allocation
page read and write
9E64FFE000
unkown
page readonly
CF1000
unkown
page readonly
9E0B7FD000
stack
page read and write
126C000
stack
page read and write
5C40002D0000
direct allocation
page read and write
501C03324000
trusted library allocation
page read and write
7129000
heap
page read and write
501C030AC000
trusted library allocation
page read and write
724C00264000
trusted library allocation
page read and write
6731000
heap
page read and write
501C00601000
trusted library allocation
page read and write
501C03584000
trusted library allocation
page read and write
501C02C70000
trusted library allocation
page read and write
501C02A70000
trusted library allocation
page read and write
9E6AFFE000
unkown
page readonly
CE1000
unkown
page execute read
501C02F3C000
trusted library allocation
page read and write
9E65FFE000
unkown
page readonly
6731000
heap
page read and write
501C0249A000
trusted library allocation
page read and write
9E607FE000
unkown
page read and write
CEE000
unkown
page read and write
1B8186D7000
unclassified section
page read and write
501C02B7C000
trusted library allocation
page read and write
1B81B202000
trusted library section
page read and write
501C0328C000
trusted library allocation
page read and write
CF1000
unkown
page readonly
1440000
heap
page read and write
9E0F7FE000
stack
page read and write
501C00401000
trusted library allocation
page read and write
78C8006BC000
trusted library allocation
page read and write
9E73FFE000
unkown
page readonly
501C03018000
trusted library allocation
page read and write
72CB000
direct allocation
page read and write
7235000
heap
page read and write
501C023D8000
trusted library allocation
page read and write
501C023AC000
trusted library allocation
page read and write
78C8007E0000
trusted library allocation
page read and write
1B814567000
heap
page read and write
CD0000
heap
page read and write
6731000
heap
page read and write
66D000
stack
page read and write
724C002BC000
trusted library allocation
page read and write
9E7B7FD000
stack
page read and write
CE1000
unkown
page execute read
7172000
direct allocation
page read and write
501C028B0000
trusted library allocation
page read and write
501C02D40000
trusted library allocation
page read and write
1B814599000
heap
page read and write
501C02E01000
trusted library allocation
page read and write
501C022DC000
trusted library allocation
page read and write
1260000
heap
page read and write
7125000
heap
page read and write
770000
heap
page read and write
501C03170000
trusted library allocation
page read and write
78C800614000
trusted library allocation
page read and write
78C800700000
trusted library allocation
page read and write
501C0328C000
trusted library allocation
page read and write
501C0240C000
trusted library allocation
page read and write
501C027B0000
trusted library allocation
page read and write
501C02B14000
trusted library allocation
page read and write
501C03248000
trusted library allocation
page read and write
18E0000
heap
page read and write
6E40000
direct allocation
page execute and read and write
501C03374000
trusted library allocation
page read and write
CEA000
unkown
page readonly
1B81AB96000
trusted library section
page read and write
501C02C48000
trusted library allocation
page read and write
6720000
direct allocation
page read and write
72E6000
heap
page read and write
78C800704000
trusted library allocation
page read and write
501C02C34000
trusted library allocation
page read and write
501C0220C000
trusted library allocation
page read and write
501C03190000
trusted library allocation
page read and write
78C8006EC000
trusted library allocation
page read and write
1B81AEA0000
trusted library section
page read and write
7280000
heap
page read and write
7258000
heap
page read and write
6E40000
direct allocation
page execute and read and write
78C800788000
trusted library allocation
page read and write
6731000
heap
page read and write
1B81404A000
heap
page read and write
724C00220000
trusted library allocation
page read and write
501C02AAB000
trusted library allocation
page read and write
5C4000284000
direct allocation
page read and write
72AE000
heap
page read and write
1B81AA70000
trusted library section
page read and write
501C02B54000
trusted library allocation
page read and write
78C800734000
trusted library allocation
page read and write
1E0000
heap
page read and write
501C02428000
trusted library allocation
page read and write
724C00235000
trusted library allocation
page read and write
CEA000
unkown
page readonly
6731000
heap
page read and write
501C03094000
trusted library allocation
page read and write
724C002BC000
trusted library allocation
page read and write
6731000
heap
page read and write
501C0229C000
trusted library allocation
page read and write
78C800601000
trusted library allocation
page read and write
78C800658000
trusted library allocation
page read and write
78C800784000
trusted library allocation
page read and write
501C024BA000
trusted library allocation
page read and write
501C00001000
trusted library allocation
page read and write
1380000
heap
page read and write
501C03060000
trusted library allocation
page read and write
1B814650000
trusted library section
page read and write
501C030E0000
trusted library allocation
page read and write
501C03158000
trusted library allocation
page read and write
501C023F8000
trusted library allocation
page read and write
6731000
heap
page read and write
501C031C0000
trusted library allocation
page read and write
78C800724000
trusted library allocation
page read and write
9E637FE000
stack
page read and write
501C02494000
trusted library allocation
page read and write
724C002C0000
trusted library allocation
page read and write
6720000
direct allocation
page read and write
78C800401000
trusted library allocation
page read and write
501C025F9000
trusted library allocation
page read and write
726B000
heap
page read and write
1B81B1A3000
trusted library section
page read and write
712C000
heap
page read and write
9E5F7EF000
stack
page read and write
712B000
heap
page read and write
9E6E7FD000
stack
page read and write
501C02F6C000
trusted library allocation
page read and write
78C800364000
trusted library allocation
page read and write
501C02550000
trusted library allocation
page read and write
9E707FE000
stack
page read and write
501C0281C000
trusted library allocation
page read and write
CE0000
unkown
page readonly
78C800330000
trusted library allocation
page read and write
9E7CFFE000
unkown
page readonly
1B814042000
heap
page read and write
CE0000
unkown
page readonly
501C03184000
trusted library allocation
page read and write
1B810A5C000
heap
page read and write
123F000
stack
page read and write
501C02EE8000
trusted library allocation
page read and write
501C023B4000
trusted library allocation
page read and write
501C02550000
trusted library allocation
page read and write
501C026AC000
trusted library allocation
page read and write
501C02544000
trusted library allocation
page read and write
74FD000
heap
page read and write
9E037FE000
stack
page read and write
6731000
heap
page read and write
1B814591000
heap
page read and write
CE0000
unkown
page readonly
78C8006FC000
trusted library allocation
page read and write
501C028F4000
trusted library allocation
page read and write
CE1000
unkown
page execute read
7120000
heap
page read and write
501C02564000
trusted library allocation
page read and write
724C002C0000
trusted library allocation
page read and write
501C029A9000
trusted library allocation
page read and write
6731000
heap
page read and write
CF1000
unkown
page readonly
501C023A0000
trusted library allocation
page read and write
501C02498000
trusted library allocation
page read and write
161E000
stack
page read and write
501C03018000
trusted library allocation
page read and write
78C800201000
trusted library allocation
page read and write
7121000
heap
page read and write
7121000
heap
page read and write
CE1000
unkown
page execute read
501C030A0000
trusted library allocation
page read and write
501C00801000
trusted library allocation
page read and write
6731000
heap
page read and write
78C800310000
trusted library allocation
page read and write
7A0000
heap
page read and write
DF0000
heap
page read and write
6731000
heap
page read and write
1B8145A2000
heap
page read and write
727C000
heap
page read and write
501C02778000
trusted library allocation
page read and write
78C8006D0000
trusted library allocation
page read and write
1B81456C000
heap
page read and write
501C0234C000
trusted library allocation
page read and write
9E70FFE000
unkown
page readonly
501C03330000
trusted library allocation
page read and write
501C02BCC000
trusted library allocation
page read and write
1B81A113000
heap
page read and write
8B0000
heap
page read and write
CEA000
unkown
page readonly
72FD000
heap
page read and write
730F000
heap
page read and write
78C800320000
trusted library allocation
page read and write
501C02420000
trusted library allocation
page read and write
D7E000
stack
page read and write
501C029DC000
trusted library allocation
page read and write
501C02CD8000
trusted library allocation
page read and write
6731000
heap
page read and write
724C002B0000
trusted library allocation
page read and write
501C02680000
trusted library allocation
page read and write
7437000
heap
page read and write
501C02274000
trusted library allocation
page read and write
501C024A4000
trusted library allocation
page read and write
78C800688000
trusted library allocation
page read and write
480000
unkown
page readonly
501C02AF8000
trusted library allocation
page read and write
5C400024C000
direct allocation
page read and write
1327000
heap
page read and write
501C03044000
trusted library allocation
page read and write
9E0A7FE000
stack
page read and write
1B81A640000
trusted library section
page read and write
78C800418000
trusted library allocation
page read and write
1B81AAF3000
trusted library section
page read and write
9E7C7FB000
stack
page read and write
501C02F3F000
trusted library allocation
page read and write
501C024C0000
trusted library allocation
page read and write
724C002BC000
trusted library allocation
page read and write
78C8002E4000
trusted library allocation
page read and write
1B814559000
heap
page read and write
6720000
direct allocation
page read and write
501C02670000
trusted library allocation
page read and write
CEE000
unkown
page write copy
78C800210000
trusted library allocation
page read and write
CF1000
unkown
page readonly
501C03018000
trusted library allocation
page read and write
501C02390000
trusted library allocation
page read and write
501C028A0000
trusted library allocation
page read and write
9E027FE000
stack
page read and write
501C02664000
trusted library allocation
page read and write
6731000
heap
page read and write
78C800730000
trusted library allocation
page read and write
5FC000
stack
page read and write
501C02544000
trusted library allocation
page read and write
724C00294000
trusted library allocation
page read and write
1B8145A4000
heap
page read and write
6731000
heap
page read and write
7122000
heap
page read and write
CEE000
unkown
page read and write
9E6BFFE000
unkown
page readonly
9E077FD000
stack
page read and write
F9E000
stack
page read and write
1CAF000
stack
page read and write
6731000
heap
page read and write
5C4000217000
direct allocation
page read and write
78C800320000
trusted library allocation
page read and write
501C02FA8000
trusted library allocation
page read and write
501C02F8C000
trusted library allocation
page read and write
54E000
stack
page read and write
501C032C8000
trusted library allocation
page read and write
712B000
heap
page read and write
1B8145AB000
heap
page read and write
1620000
heap
page read and write
18C0000
heap
page read and write
78C800248000
trusted library allocation
page read and write
7122000
heap
page read and write
501C03478000
trusted library allocation
page read and write
501C02230000
trusted library allocation
page read and write
712D000
heap
page read and write
78C8002B0000
trusted library allocation
page read and write
501C03164000
trusted library allocation
page read and write
6720000
direct allocation
page read and write
501C02988000
trusted library allocation
page read and write
16E0000
heap
page read and write
78C8006D4000
trusted library allocation
page read and write
501C0319C000
trusted library allocation
page read and write
73D7000
heap
page read and write
9E05FFE000
unkown
page readonly
501C03494000
trusted library allocation
page read and write
78C800624000
trusted library allocation
page read and write
1B818744000
heap
page read and write
501C0253C000
trusted library allocation
page read and write
7125000
heap
page read and write
7126000
heap
page read and write
1B814600000
trusted library section
page read and write
7121000
heap
page read and write
6720000
direct allocation
page read and write
7125000
heap
page read and write
CE1000
unkown
page execute read
501C023F4000
trusted library allocation
page read and write
1457000
heap
page read and write
78C800684000
trusted library allocation
page read and write
9E7D7FC000
stack
page read and write
501C031A0000
trusted library allocation
page read and write
6731000
heap
page read and write
501C023E4000
trusted library allocation
page read and write
501C027A0000
trusted library allocation
page read and write
501C02ECC000
trusted library allocation
page read and write
7120000
heap
page read and write
724C002B0000
trusted library allocation
page read and write
1260000
heap
page read and write
501C02BD3000
trusted library allocation
page read and write
78C8006E8000
trusted library allocation
page read and write
501C00B08000
trusted library allocation
page read and write
724C002BC000
trusted library allocation
page read and write
501C02A40000
trusted library allocation
page read and write
CEE000
unkown
page write copy
78C800758000
trusted library allocation
page read and write
724C002A0000
trusted library allocation
page read and write
1B81AAE1000
trusted library section
page read and write
501C0246C000
trusted library allocation
page read and write
501C02F74000
trusted library allocation
page read and write
9E6A7FB000
stack
page read and write
501C0253C000
trusted library allocation
page read and write
501C02B3C000
trusted library allocation
page read and write
501C034AC000
trusted library allocation
page read and write
1447000
heap
page read and write
501C033BC000
trusted library allocation
page read and write
501C023E8000
trusted library allocation
page read and write
501C03118000
trusted library allocation
page read and write
74B6000
heap
page read and write
78C8006C8000
trusted library allocation
page read and write
7121000
heap
page read and write
1B810A78000
heap
page read and write
501C02494000
trusted library allocation
page read and write
501C0280C000
trusted library allocation
page read and write
1B81A1C0000
heap
page read and write
501C02434000
trusted library allocation
page read and write
72E1000
heap
page read and write
501C0235C000
trusted library allocation
page read and write
6720000
direct allocation
page read and write
501C022EC000
trusted library allocation
page read and write
501C0225A000
trusted library allocation
page read and write
501C0292C000
trusted library allocation
page read and write
9E767FB000
stack
page read and write
501C02580000
trusted library allocation
page read and write
501C02C0C000
trusted library allocation
page read and write
501C0328C000
trusted library allocation
page read and write
1B814560000
heap
page read and write
501C02530000
trusted library allocation
page read and write
9E087FE000
stack
page read and write
78C800678000
trusted library allocation
page read and write
78C800374000
trusted library allocation
page read and write
7128000
heap
page read and write
6E40000
direct allocation
page execute and read and write
78C800368000
trusted library allocation
page read and write
501C022C4000
trusted library allocation
page read and write
501C0329C000
trusted library allocation
page read and write
1B810A90000
heap
page read and write
501C02926000
trusted library allocation
page read and write
724C00248000
trusted library allocation
page read and write
501C02664000
trusted library allocation
page read and write
6E40000
direct allocation
page execute and read and write
724C00288000
trusted library allocation
page read and write
501C02EAC000
trusted library allocation
page read and write
78C800694000
trusted library allocation
page read and write
CE0000
unkown
page readonly
71B5000
heap
page read and write
9E6CFFE000
unkown
page readonly
501C03138000
trusted library allocation
page read and write
137E000
stack
page read and write
BD0000
heap
page read and write
58F000
stack
page read and write
501C034C8000
trusted library allocation
page read and write
724C002E4000
trusted library allocation
page read and write
CEE000
unkown
page read and write
78C800230000
trusted library allocation
page read and write
6731000
heap
page read and write
501C03478000
trusted library allocation
page read and write
501C02580000
trusted library allocation
page read and write
103C000
stack
page read and write
501C02C01000
trusted library allocation
page read and write
501C03348000
trusted library allocation
page read and write
71D5000
heap
page read and write
501C02948000
trusted library allocation
page read and write
1B814045000
heap
page read and write
78C800354000
trusted library allocation
page read and write
9E01FFE000
unkown
page readonly
501C02490000
trusted library allocation
page read and write
501C02FF0000
trusted library allocation
page read and write
724C00230000
trusted library allocation
page read and write
501C02504000
trusted library allocation
page read and write
9E017FE000
stack
page read and write
501C025CD000
trusted library allocation
page read and write
9E677FC000
stack
page read and write
72C9000
direct allocation
page read and write
501C02601000
trusted library allocation
page read and write
175F000
stack
page read and write
501C03248000
trusted library allocation
page read and write
5C4000234000
direct allocation
page read and write
501C03220000
trusted library allocation
page read and write
501C029E8000
trusted library allocation
page read and write
501C0320C000
trusted library allocation
page read and write
6731000
heap
page read and write
501C032DC000
trusted library allocation
page read and write
15A8000
heap
page read and write
501C02961000
trusted library allocation
page read and write
ED000
stack
page read and write
712D000
heap
page read and write
7348000
heap
page read and write
6731000
heap
page read and write
CF1000
unkown
page readonly
501C02914000
trusted library allocation
page read and write
6731000
heap
page read and write
19E0000
heap
page read and write
1B810C40000
heap
page read and write
501C00C01000
trusted library allocation
page read and write
501C02544000
trusted library allocation
page read and write
6E40000
direct allocation
page execute and read and write
1B81877A000
heap
page read and write
78C80069C000
trusted library allocation
page read and write
9E7BFFE000
unkown
page readonly
501C0255C000
trusted library allocation
page read and write
501C02240000
trusted library allocation
page read and write
6BC0000
direct allocation
page read and write
CE1000
unkown
page execute read
6731000
heap
page read and write
700000
heap
page read and write
501C03254000
trusted library allocation
page read and write
501C03044000
trusted library allocation
page read and write
1B81AA8E000
trusted library section
page read and write
78C8003EC000
trusted library allocation
page read and write
6720000
direct allocation
page read and write
CF1000
unkown
page readonly
501C031C4000
trusted library allocation
page read and write
9E7A7FA000
stack
page read and write
78C800720000
trusted library allocation
page read and write
501C02D30000
trusted library allocation
page read and write
1B81A267000
unclassified section
page read and write
6731000
heap
page read and write
501C02500000
trusted library allocation
page read and write
501C031DD000
trusted library allocation
page read and write
16E7000
heap
page read and write
501C030B8000
trusted library allocation
page read and write
501C0228F000
trusted library allocation
page read and write
7298000
heap
page read and write
501C02F4C000
trusted library allocation
page read and write
501C0296C000
trusted library allocation
page read and write
501C031B0000
trusted library allocation
page read and write
1B8145E8000
heap
page read and write
501C02801000
trusted library allocation
page read and write
CF1000
unkown
page readonly
5C400025C000
direct allocation
page read and write
501C02B00000
trusted library allocation
page read and write
501C0284C000
trusted library allocation
page read and write
78C800664000
trusted library allocation
page read and write
501C02570000
trusted library allocation
page read and write
501C0251C000
trusted library allocation
page read and write
78C800330000
trusted library allocation
page read and write
501C02C18000
trusted library allocation
page read and write
501C0253C000
trusted library allocation
page read and write
724C00270000
trusted library allocation
page read and write
501C00201000
trusted library allocation
page read and write
726B000
heap
page read and write
501C02BAC000
trusted library allocation
page read and write
501C024F3000
trusted library allocation
page read and write
9E0CFFE000
unkown
page readonly
CE0000
unkown
page readonly
6E40000
direct allocation
page execute and read and write
6E40000
direct allocation
page execute and read and write
501C024FB000
trusted library allocation
page read and write
CEA000
unkown
page readonly
71FF000
heap
page read and write
501C02A68000
trusted library allocation
page read and write
6E40000
direct allocation
page execute and read and write
6731000
heap
page read and write
501C0314C000
trusted library allocation
page read and write
501C02938000
trusted library allocation
page read and write
7126000
heap
page read and write
501C0253C000
trusted library allocation
page read and write
724C002A0000
trusted library allocation
page read and write
501C029C4000
trusted library allocation
page read and write
1268000
heap
page read and write
5C4000210000
direct allocation
page read and write
D8C000
stack
page read and write
78C800744000
trusted library allocation
page read and write
9E63FFE000
unkown
page readonly
7122000
heap
page read and write
9E0DFFE000
unkown
page readonly
9E797FC000
stack
page read and write
501C025B0000
trusted library allocation
page read and write
CE0000
unkown
page readonly
7375000
heap
page read and write
78C8006AC000
trusted library allocation
page read and write
9E79FFE000
unkown
page readonly
9E6DFFE000
unkown
page readonly
78C80033C000
trusted library allocation
page read and write
501C02BB4000
trusted library allocation
page read and write
501C02504000
trusted library allocation
page read and write
501C02CCC000
trusted library allocation
page read and write
501C03001000
trusted library allocation
page read and write
6731000
heap
page read and write
71D9000
heap
page read and write
CF1000
unkown
page readonly
7477000
heap
page read and write
78C800288000
trusted library allocation
page read and write
501C02418000
trusted library allocation
page read and write
501C02594000
trusted library allocation
page read and write
501C03254000
trusted library allocation
page read and write
C6E000
stack
page read and write
1B81A840000
trusted library section
page read and write
501C0261C000
trusted library allocation
page read and write
CE0000
unkown
page readonly
1B81A290000
trusted library section
page read and write
501C02A78000
trusted library allocation
page read and write
501C023B4000
trusted library allocation
page read and write
501C031B0000
trusted library allocation
page read and write
770000
heap
page read and write
78C80078C000
trusted library allocation
page read and write
1B81403D000
heap
page read and write
501C01001000
trusted library allocation
page read and write
724C002D8000
trusted library allocation
page read and write
78C80080C000
trusted library allocation
page read and write
5C4000250000
direct allocation
page read and write
78C800760000
trusted library allocation
page read and write
1B81AA61000
trusted library section
page read and write
724C002BC000
trusted library allocation
page read and write
CE1000
unkown
page execute read
501C02F6C000
trusted library allocation
page read and write
7122000
heap
page read and write
724C002B0000
trusted library allocation
page read and write
78C800220000
trusted library allocation
page read and write
78C8006E4000
trusted library allocation
page read and write
CE0000
unkown
page readonly
71BA000
heap
page read and write
6E40000
direct allocation
page execute and read and write
7120000
heap
page read and write
748A000
heap
page read and write
501C03018000
trusted library allocation
page read and write
CF1000
unkown
page readonly
501C00640000
trusted library allocation
page read and write
1ACF000
stack
page read and write
501C02FC0000
trusted library allocation
page read and write
127E000
stack
page read and write
78C8006E0000
trusted library allocation
page read and write
1B81A110000
heap
page read and write
724C002BC000
trusted library allocation
page read and write
501C028D4000
trusted library allocation
page read and write
1630000
heap
page read and write
13B0000
heap
page read and write
9E75FFE000
unkown
page readonly
6C0000
heap
page read and write
501C028D8000
trusted library allocation
page read and write
78C8006CC000
trusted library allocation
page read and write
501C029AC000
trusted library allocation
page read and write
501C02494000
trusted library allocation
page read and write
F30000
heap
page read and write
CB0000
heap
page read and write
5C4000290000
direct allocation
page read and write
9E66FFE000
unkown
page readonly
501C03038000
trusted library allocation
page read and write
1AA0000
heap
page read and write
189F000
stack
page read and write
501C0236C000
trusted library allocation
page read and write
501C02908000
trusted library allocation
page read and write
1B81AF40000
trusted library section
page read and write
1BEF000
stack
page read and write
CEA000
unkown
page readonly
501C02F18000
trusted library allocation
page read and write
501C02E98000
trusted library allocation
page read and write
501C029B4000
trusted library allocation
page read and write
970000
heap
page read and write
6720000
direct allocation
page read and write
78C800354000
trusted library allocation
page read and write
73EF000
heap
page read and write
6731000
heap
page read and write
724C002A0000
trusted library allocation
page read and write
501C02494000
trusted library allocation
page read and write
501C02868000
trusted library allocation
page read and write
71C7000
heap
page read and write
501C02264000
trusted library allocation
page read and write
501C02414000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
7125000
heap
page read and write
6731000
heap
page read and write
501C023D0000
trusted library allocation
page read and write
501C032BC000
trusted library allocation
page read and write
1B810BE0000
trusted library allocation
page read and write
5C40002AC000
direct allocation
page read and write
501C02550000
trusted library allocation
page read and write
501C02904000
trusted library allocation
page read and write
78C80035C000
trusted library allocation
page read and write
501C02504000
trusted library allocation
page read and write
501C03254000
trusted library allocation
page read and write
78C80039C000
trusted library allocation
page read and write
501C02494000
trusted library allocation
page read and write
501C03310000
trusted library allocation
page read and write
501C02CA4000
trusted library allocation
page read and write
501C02C34000
trusted library allocation
page read and write
1B810BA0000
heap
page read and write
501C03054000
trusted library allocation
page read and write
501C033CC000
trusted library allocation
page read and write
501C03588000
trusted library allocation
page read and write
1B81878E000
heap
page read and write
9E0E7FD000
stack
page read and write
9E737FE000
stack
page read and write
CE0000
unkown
page readonly
9E0AFFE000
unkown
page readonly
501C024A4000
trusted library allocation
page read and write
501C02AC4000
trusted library allocation
page read and write
CEE000
unkown
page read and write
1B814020000
heap
page read and write
1B8109B0000
heap
page readonly
724C002F4000
trusted library allocation
page read and write
6E20000
direct allocation
page execute and read and write
501C02398000
trusted library allocation
page read and write
78C800750000
trusted library allocation
page read and write
501C027D8000
trusted library allocation
page read and write
9E787FC000
stack
page read and write
EC000
stack
page read and write
78C800644000
trusted library allocation
page read and write
72A7000
heap
page read and write
9E687FE000
stack
page read and write
140000
heap
page read and write
501C02201000
trusted library allocation
page read and write
1B81ACAE000
trusted library section
page read and write
7125000
heap
page read and write
501C024A4000
trusted library allocation
page read and write
1B8145B3000
heap
page read and write
78C800250000
trusted library allocation
page read and write
9E6B7FC000
stack
page read and write
501C03028000
trusted library allocation
page read and write
6E40000
direct allocation
page execute and read and write
CE1000
unkown
page execute read
501C03574000
trusted library allocation
page read and write
501C026A0000
trusted library allocation
page read and write
9E067FD000
stack
page read and write
724C00201000
trusted library allocation
page read and write
501C02664000
trusted library allocation
page read and write
1B812860000
heap
page read and write
9E67FFE000
unkown
page readonly
14C0000
heap
page read and write
501C03248000
trusted library allocation
page read and write
5C4000220000
direct allocation
page read and write
CEA000
unkown
page readonly
501C032EC000
trusted library allocation
page read and write
501C028E8000
trusted library allocation
page read and write
501C0260C000
trusted library allocation
page read and write
CEA000
unkown
page readonly
CE0000
unkown
page readonly
78C800754000
trusted library allocation
page read and write
9E757FE000
stack
page read and write
501C026B4000
trusted library allocation
page read and write
9E76FFE000
unkown
page readonly
501C02494000
trusted library allocation
page read and write
501C02D44000
trusted library allocation
page read and write
78C8006B0000
trusted library allocation
page read and write
720C000
heap
page read and write
78C80025C000
trusted library allocation
page read and write
501C022FC000
trusted library allocation
page read and write
977000
heap
page read and write
78C800408000
trusted library allocation
page read and write
501C02C30000
trusted library allocation
page read and write
501C03070000
trusted library allocation
page read and write
9E77FFE000
unkown
page readonly
710000
heap
page read and write
7223000
heap
page read and write
1B810BC0000
heap
page read and write
1DE000
stack
page read and write
190000
heap
page read and write
9E09FFE000
unkown
page readonly
78C800610000
trusted library allocation
page read and write
501C03358000
trusted library allocation
page read and write
501C034D4000
trusted library allocation
page read and write
6731000
heap
page read and write
78C800640000
trusted library allocation
page read and write
6731000
heap
page read and write
501C02BDC000
trusted library allocation
page read and write
1DE000
unkown
page read and write
501C03018000
trusted library allocation
page read and write
501C023B4000
trusted library allocation
page read and write
501C02A01000
trusted library allocation
page read and write
1450000
heap
page read and write
712F000
heap
page read and write
78C8002CC000
trusted library allocation
page read and write
78C8007C8000
trusted library allocation
page read and write
CEE000
unkown
page write copy
7122000
heap
page read and write
501C02530000
trusted library allocation
page read and write
78C8002ED000
trusted library allocation
page read and write
72E5000
heap
page read and write
1B81AA82000
trusted library section
page read and write
78C8002D4000
trusted library allocation
page read and write
6720000
direct allocation
page read and write
9E03FFE000
unkown
page readonly
501C02F5C000
trusted library allocation
page read and write
9E0BFFE000
unkown
page readonly
501C02AB8000
trusted library allocation
page read and write
CE0000
unkown
page readonly
78C80040C000
trusted library allocation
page read and write
6731000
heap
page read and write
501C02F1C000
trusted library allocation
page read and write
78C8007D0000
trusted library allocation
page read and write
501C032EC000
trusted library allocation
page read and write
9E7AFFE000
unkown
page readonly
501C033E8000
trusted library allocation
page read and write
1B81ABB2000
trusted library section
page read and write
78C800404000
trusted library allocation
page read and write
There are 1111 hidden memdumps, click here to show them.