IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB2DF.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Nov 22 04:00:36 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB476.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB4E4.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2496 --field-trial-handle=2344,i,554225903763573679,10568711165825227446,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6904 -s 1284

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.icoionNames)
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
http://anglebug.com/82295
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actionsA
unknown
http://unisolated.invalid/
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
http://anglebug.com/7761DM
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
http://anglebug.com/6876)
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/250706693allowCompressedFormats
unknown
https://chrome.google.com/webstore?hl=en4
unknown
https://issuetracker.google.com/161903006
unknown
http://anglebug.com/5658pH
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
34.116.198.130
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://unisolated.invalid/a
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
http://anglebug.com/7036fl
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/35022
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.icoing
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
https://google-ohttp-relay-join.fastly-edge.com/hj
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fvtekk5pn.top
34.116.198.130
www.google.com
142.250.181.100
fvtekk5pn.top
34.116.198.130

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
34.116.198.130
home.fvtekk5pn.top
United States
127.0.0.1
unknown
unknown
142.250.181.100
www.google.com
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
malicious
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
malicious
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
malicious
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
malicious
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
malicious
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
malicious
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
malicious
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
malicious
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
malicious
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
malicious
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
malicious
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
malicious
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
malicious
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
malicious
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
malicious
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
malicious
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
malicious
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
malicious
\REGISTRY\A\{9f35a9b2-93bc-572a-9c05-d6b8b308b277}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
ABA27FE000
unkown
page readonly
CE00256C000
trusted library allocation
page read and write
26104074000
heap
page read and write
AB95FFD000
stack
page read and write
CE00256C000
trusted library allocation
page read and write
26107546000
heap
page read and write
56D000700000
trusted library allocation
page read and write
26107552000
heap
page read and write
56D000724000
trusted library allocation
page read and write
26107541000
heap
page read and write
CE0031F0000
trusted library allocation
page read and write
56D000694000
trusted library allocation
page read and write
2610E263000
trusted library section
page read and write
BC0000
heap
page read and write
56D00020C000
trusted library allocation
page read and write
2610E230000
trusted library section
page read and write
8078000
heap
page read and write
2610754A000
heap
page read and write
CE00268C000
trusted library allocation
page read and write
7FD5000
heap
page read and write
CE002E70000
trusted library allocation
page read and write
AB9AFFE000
stack
page read and write
CE0031B4000
trusted library allocation
page read and write
56D000620000
trusted library allocation
page read and write
CE0026F4000
trusted library allocation
page read and write
26107552000
heap
page read and write
5324002C0000
trusted library allocation
page read and write
CE0030B8000
trusted library allocation
page read and write
CE002E28000
trusted library allocation
page read and write
2610756C000
heap
page read and write
7FC7000
heap
page read and write
26107531000
heap
page read and write
AB8BFFA000
stack
page read and write
CE00251C000
trusted library allocation
page read and write
7EAA000
heap
page read and write
56D000668000
trusted library allocation
page read and write
26107600000
trusted library section
page readonly
26107546000
heap
page read and write
ABF99FE000
unkown
page read and write
CE002F74000
trusted library allocation
page read and write
CE002494000
trusted library allocation
page read and write
2610753F000
heap
page read and write
73E1000
heap
page read and write
56D000784000
trusted library allocation
page read and write
81DE000
heap
page read and write
AB857FE000
unkown
page readonly
5324002BC000
trusted library allocation
page read and write
CE002394000
trusted library allocation
page read and write
26107546000
heap
page read and write
CE002F84000
trusted library allocation
page read and write
26107540000
heap
page read and write
26107552000
heap
page read and write
6624002DC000
direct allocation
page read and write
73E1000
heap
page read and write
B21000
unkown
page readonly
26107536000
heap
page read and write
ABA17FE000
unkown
page readonly
CE0024BC000
trusted library allocation
page read and write
AB817FE000
unkown
page readonly
2610753F000
heap
page read and write
56D000230000
trusted library allocation
page read and write
AB8DFFE000
stack
page read and write
26107552000
heap
page read and write
CE003090000
trusted library allocation
page read and write
7EA2000
heap
page read and write
2610D720000
heap
page read and write
56D0006AC000
trusted library allocation
page read and write
26107546000
heap
page read and write
7AD0000
direct allocation
page execute and read and write
56D0006B4000
trusted library allocation
page read and write
CE002EF8000
trusted library allocation
page read and write
662400290000
direct allocation
page read and write
26107552000
heap
page read and write
26107543000
heap
page read and write
AB94FFC000
stack
page read and write
2150000
direct allocation
page read and write
80E8000
heap
page read and write
2610D6A7000
unclassified section
page read and write
2B3D000
stack
page read and write
56D0006C4000
trusted library allocation
page read and write
56D000201000
trusted library allocation
page read and write
26107541000
heap
page read and write
56D000368000
trusted library allocation
page read and write
56D000354000
trusted library allocation
page read and write
CE002528000
trusted library allocation
page read and write
56D000348000
trusted library allocation
page read and write
B1A000
unkown
page readonly
56D000744000
trusted library allocation
page read and write
73E1000
heap
page read and write
2610753E000
heap
page read and write
CE0031B4000
trusted library allocation
page read and write
7F52000
heap
page read and write
26107532000
heap
page read and write
26107552000
heap
page read and write
7820000
trusted library allocation
page read and write
CE002801000
trusted library allocation
page read and write
CE00247C000
trusted library allocation
page read and write
CE002880000
trusted library allocation
page read and write
B11000
unkown
page execute read
ABF89EF000
stack
page read and write
2610753B000
heap
page read and write
AB8AFFD000
stack
page read and write
26107541000
heap
page read and write
CE0031C0000
trusted library allocation
page read and write
5324002BC000
trusted library allocation
page read and write
26105CD0000
heap
page read and write
26107552000
heap
page read and write
CE002D30000
trusted library allocation
page read and write
26107552000
heap
page read and write
AB957FE000
unkown
page readonly
56D0002D4000
trusted library allocation
page read and write
26107552000
heap
page read and write
73E1000
heap
page read and write
CE0022F0000
trusted library allocation
page read and write
26107552000
heap
page read and write
B21000
unkown
page readonly
CE0032AC000
trusted library allocation
page read and write
18DB000
unkown
page execute and write copy
26107544000
heap
page read and write
CE00242C000
trusted library allocation
page read and write
73E1000
heap
page read and write
CE000001000
trusted library allocation
page read and write
7AE0000
direct allocation
page execute and read and write
26107552000
heap
page read and write
CE002D94000
trusted library allocation
page read and write
CE002E84000
trusted library allocation
page read and write
26107BB2000
heap
page read and write
CE002F34000
trusted library allocation
page read and write
26107543000
heap
page read and write
B21000
unkown
page readonly
2610756C000
heap
page read and write
2610D950000
trusted library section
page read and write
CE003018000
trusted library allocation
page read and write
5324002BC000
trusted library allocation
page read and write
5324002E4000
trusted library allocation
page read and write
CE002498000
trusted library allocation
page read and write
5324002D8000
trusted library allocation
page read and write
CE00298C000
trusted library allocation
page read and write
CE0026A0000
trusted library allocation
page read and write
CE002B0C000
trusted library allocation
page read and write
26107532000
heap
page read and write
73E1000
heap
page read and write
2610BE10000
heap
page read and write
CE0024E0000
trusted library allocation
page read and write
26103F50000
trusted library allocation
page read and write
2610754C000
heap
page read and write
AB89FFE000
stack
page read and write
CE0024A4000
trusted library allocation
page read and write
CE0023E8000
trusted library allocation
page read and write
ACE000
stack
page read and write
56D0007D0000
trusted library allocation
page read and write
CE003020000
trusted library allocation
page read and write
7AE0000
direct allocation
page execute and read and write
A6C000
stack
page read and write
CE002958000
trusted library allocation
page read and write
AB937FE000
unkown
page readonly
AB997FE000
unkown
page readonly
CE002280000
trusted library allocation
page read and write
CE002AE8000
trusted library allocation
page read and write
CE002ED0000
trusted library allocation
page read and write
CE002414000
trusted library allocation
page read and write
26107541000
heap
page read and write
56D000310000
trusted library allocation
page read and write
56D000330000
trusted library allocation
page read and write
2150000
direct allocation
page read and write
CE002C0C000
trusted library allocation
page read and write
CE00256C000
trusted library allocation
page read and write
AB86FFE000
stack
page read and write
8B0000
heap
page read and write
73E1000
heap
page read and write
ABA5FFE000
stack
page read and write
532400264000
trusted library allocation
page read and write
1B34000
heap
page read and write
CE002D10000
trusted library allocation
page read and write
CE00240C000
trusted library allocation
page read and write
56D0006EC000
trusted library allocation
page read and write
ABA37FE000
unkown
page readonly
56D000601000
trusted library allocation
page read and write
2610E5AE000
trusted library section
page read and write
CE0023AC000
trusted library allocation
page read and write
26107541000
heap
page read and write
CE00301C000
trusted library allocation
page read and write
26107BAD000
heap
page read and write
CE002A48000
trusted library allocation
page read and write
CE002430000
trusted library allocation
page read and write
1B34000
heap
page read and write
CE002228000
trusted library allocation
page read and write
2610B802000
trusted library allocation
page read and write
7860000
direct allocation
page read and write
AB85FFC000
stack
page read and write
CE0024F0000
trusted library allocation
page read and write
CE003080000
trusted library allocation
page read and write
7EAA000
heap
page read and write
2610753F000
heap
page read and write
1B34000
heap
page read and write
56D0006FC000
trusted library allocation
page read and write
56D00039C000
trusted library allocation
page read and write
CE002C44000
trusted library allocation
page read and write
CE0023AC000
trusted library allocation
page read and write
8084000
heap
page read and write
5324002B0000
trusted library allocation
page read and write
CE002E01000
trusted library allocation
page read and write
26107B61000
heap
page read and write
CE002494000
trusted library allocation
page read and write
AB81FFE000
stack
page read and write
AB877FE000
unkown
page readonly
CE002F08000
trusted library allocation
page read and write
56D000418000
trusted library allocation
page read and write
662400230000
direct allocation
page read and write
26107546000
heap
page read and write
AB80FFB000
stack
page read and write
26107546000
heap
page read and write
ABFF9FB000
stack
page read and write
56D000754000
trusted library allocation
page read and write
CE0028E4000
trusted library allocation
page read and write
CE003001000
trusted library allocation
page read and write
7F57000
heap
page read and write
73E1000
heap
page read and write
80CB000
heap
page read and write
26107BAA000
heap
page read and write
CE0026DC000
trusted library allocation
page read and write
7EAB000
heap
page read and write
26107552000
heap
page read and write
812E000
heap
page read and write
CE002E98000
trusted library allocation
page read and write
26107546000
heap
page read and write
26107550000
heap
page read and write
26107549000
heap
page read and write
26107552000
heap
page read and write
662400215000
direct allocation
page read and write
56D0006B8000
trusted library allocation
page read and write
26107541000
heap
page read and write
CE002418000
trusted library allocation
page read and write
CE000601000
trusted library allocation
page read and write
CE00296C000
trusted library allocation
page read and write
CE00284C000
trusted library allocation
page read and write
7EAA000
heap
page read and write
26107546000
heap
page read and write
7EA8000
heap
page read and write
56D000250000
trusted library allocation
page read and write
26107549000
heap
page read and write
7F69000
heap
page read and write
CE00293C000
trusted library allocation
page read and write
26107BA0000
heap
page read and write
26107552000
heap
page read and write
73E1000
heap
page read and write
AB927FE000
unkown
page readonly
73E1000
heap
page read and write
1B34000
heap
page read and write
CE002F24000
trusted library allocation
page read and write
ABA77FE000
unkown
page readonly
CE0023DC000
trusted library allocation
page read and write
CE002664000
trusted library allocation
page read and write
73E1000
heap
page read and write
CE002F58000
trusted library allocation
page read and write
ABA7FFE000
stack
page read and write
2610753F000
heap
page read and write
26107BDC000
heap
page read and write
AB82FFA000
stack
page read and write
56D000801000
trusted library allocation
page read and write
2610D912000
trusted library section
page read and write
A40000
heap
page read and write
7FC0000
heap
page read and write
CE00299C000
trusted library allocation
page read and write
26107541000
heap
page read and write
6C0D1000
unkown
page execute read
CE0023B4000
trusted library allocation
page read and write
56D0006F0000
trusted library allocation
page read and write
73E1000
heap
page read and write
CE0024EB000
trusted library allocation
page read and write
CE002D70000
trusted library allocation
page read and write
848000
heap
page read and write
CE002528000
trusted library allocation
page read and write
56D0007C8000
trusted library allocation
page read and write
56D000630000
trusted library allocation
page read and write
26107552000
heap
page read and write
CE002CD8000
trusted library allocation
page read and write
CE002293000
trusted library allocation
page read and write
7AE0000
direct allocation
page execute and read and write
2150000
direct allocation
page read and write
2610753E000
heap
page read and write
56D00033C000
trusted library allocation
page read and write
ABA3FFE000
stack
page read and write
26107552000
heap
page read and write
26107524000
heap
page read and write
56D00035C000
trusted library allocation
page read and write
26107541000
heap
page read and write
56D000320000
trusted library allocation
page read and write
2610753F000
heap
page read and write
CE0022E0000
trusted library allocation
page read and write
662400280000
direct allocation
page read and write
CE002EF0000
trusted library allocation
page read and write
73E1000
heap
page read and write
CE002584000
trusted library allocation
page read and write
26107552000
heap
page read and write
CE00309C000
trusted library allocation
page read and write
2E40000
heap
page read and write
CE003120000
trusted library allocation
page read and write
2610753F000
heap
page read and write
CBA000
heap
page read and write
26103F00000
heap
page read and write
2610B7E4000
trusted library allocation
page read and write
7AE0000
direct allocation
page execute and read and write
CE003180000
trusted library allocation
page read and write
2610E187000
unclassified section
page read and write
CE00253C000
trusted library allocation
page read and write
56D000788000
trusted library allocation
page read and write
2610753E000
heap
page read and write
2150000
direct allocation
page read and write
532400278000
trusted library allocation
page read and write
7AE0000
direct allocation
page execute and read and write
ABFA1FE000
unkown
page readonly
800F000
heap
page read and write
CE0030E8000
trusted library allocation
page read and write
CE000801000
trusted library allocation
page read and write
CE0023E4000
trusted library allocation
page read and write
AB9FFFE000
stack
page read and write
81F5000
heap
page read and write
26107546000
heap
page read and write
CE0024F0000
trusted library allocation
page read and write
7F75000
heap
page read and write
2610E360000
trusted library section
page read and write
56D0002B0000
trusted library allocation
page read and write
2610753F000
heap
page read and write
CE002670000
trusted library allocation
page read and write
CE002D2C000
trusted library allocation
page read and write
7EA7000
heap
page read and write
26107552000
heap
page read and write
26107DC0000
trusted library section
page read and write
26107A40000
trusted library section
page read and write
662400220000
direct allocation
page read and write
1B34000
heap
page read and write
CE002298000
trusted library allocation
page read and write
26107552000
heap
page read and write
804E000
heap
page read and write
7AC0000
direct allocation
page execute and read and write
B1E000
unkown
page read and write
26107542000
heap
page read and write
813E000
heap
page read and write
ABFE1FE000
unkown
page readonly
FFC000
stack
page read and write
7EA9000
heap
page read and write
56D000644000
trusted library allocation
page read and write
2150000
direct allocation
page read and write
CE002E50000
trusted library allocation
page read and write
2610753D000
heap
page read and write
26107BC4000
heap
page read and write
AB8D7FE000
unkown
page readonly
CE002F94000
trusted library allocation
page read and write
AB8E7FE000
unkown
page readonly
AB9BFFE000
stack
page read and write
26107549000
heap
page read and write
ABFB9FE000
stack
page read and write
53240020C000
trusted library allocation
page read and write
CE002550000
trusted library allocation
page read and write
2610756C000
heap
page read and write
56D000354000
trusted library allocation
page read and write
2610753F000
heap
page read and write
662400250000
direct allocation
page read and write
7FAE000
heap
page read and write
CE00240C000
trusted library allocation
page read and write
2610753F000
heap
page read and write
CE002B94000
trusted library allocation
page read and write
CE002528000
trusted library allocation
page read and write
CE0023C8000
trusted library allocation
page read and write
26107541000
heap
page read and write
26107BE9000
heap
page read and write
CE0023A0000
trusted library allocation
page read and write
CE002601000
trusted library allocation
page read and write
26107B9E000
heap
page read and write
26107526000
heap
page read and write
26107BC4000
heap
page read and write
26107BB8000
heap
page read and write
26107BB2000
heap
page read and write
CE0025A4000
trusted library allocation
page read and write
26107541000
heap
page read and write
CE002664000
trusted library allocation
page read and write
56D000704000
trusted library allocation
page read and write
CE002548000
trusted library allocation
page read and write
73E1000
heap
page read and write
2610E097000
unclassified section
page read and write
7EA6000
heap
page read and write
AB9CFFE000
stack
page read and write
26107552000
heap
page read and write
26107541000
heap
page read and write
AB8A7FE000
unkown
page readonly
CE0024C0000
trusted library allocation
page read and write
26107549000
heap
page read and write
CE002688000
trusted library allocation
page read and write
CE002A70000
trusted library allocation
page read and write
CE002AD4000
trusted library allocation
page read and write
7EA0000
heap
page read and write
7EA4000
heap
page read and write
26107546000
heap
page read and write
2610D717000
unclassified section
page read and write
26107552000
heap
page read and write
56D0003EC000
trusted library allocation
page read and write
CE0028E4000
trusted library allocation
page read and write
7FBE000
heap
page read and write
26107552000
heap
page read and write
CE002AFC000
trusted library allocation
page read and write
7EA4000
heap
page read and write
7FE7000
heap
page read and write
2150000
direct allocation
page read and write
CE003190000
trusted library allocation
page read and write
CE003068000
trusted library allocation
page read and write
AB907FE000
unkown
page readonly
26107B96000
heap
page read and write
CE002F38000
trusted library allocation
page read and write
26107548000
heap
page read and write
B1A000
unkown
page readonly
2150000
direct allocation
page read and write
AB917FA000
stack
page read and write
26107BB8000
heap
page read and write
7AE0000
direct allocation
page execute and read and write
CE00253C000
trusted library allocation
page read and write
CE003110000
trusted library allocation
page read and write
56D000320000
trusted library allocation
page read and write
7AE0000
direct allocation
page execute and read and write
56D000654000
trusted library allocation
page read and write
CE002E7C000
trusted library allocation
page read and write
6624002D0000
direct allocation
page read and write
8069000
heap
page read and write
26107552000
heap
page read and write
CE00323C000
trusted library allocation
page read and write
56D000248000
trusted library allocation
page read and write
2610756C000
heap
page read and write
CE00241C000
trusted library allocation
page read and write
AB987FE000
unkown
page readonly
56D00078C000
trusted library allocation
page read and write
56D00033C000
trusted library allocation
page read and write
26107BA2000
heap
page read and write
26107546000
heap
page read and write
CE002530000
trusted library allocation
page read and write
26107B9C000
heap
page read and write
26107546000
heap
page read and write
56D000238000
trusted library allocation
page read and write
CE002FA0000
trusted library allocation
page read and write
7AE0000
direct allocation
page execute and read and write
26107545000
heap
page read and write
7F33000
heap
page read and write
CE002528000
trusted library allocation
page read and write
CE002A80000
trusted library allocation
page read and write
26107527000
heap
page read and write
2150000
direct allocation
page read and write
CE002664000
trusted library allocation
page read and write
26107546000
heap
page read and write
26103FC0000
heap
page read and write
26107548000
heap
page read and write
56D0002B8000
trusted library allocation
page read and write
CE002774000
trusted library allocation
page read and write
6624002EC000
direct allocation
page read and write
26107552000
heap
page read and write
CE002F40000
trusted library allocation
page read and write
7EAC000
heap
page read and write
ABA57FE000
unkown
page readonly
CE0031F0000
trusted library allocation
page read and write
56D000658000
trusted library allocation
page read and write
56D000288000
trusted library allocation
page read and write
73E1000
heap
page read and write
26107549000
heap
page read and write
B1E000
unkown
page write copy
840000
heap
page read and write
CE000A01000
trusted library allocation
page read and write
26107565000
heap
page read and write
7F34000
heap
page read and write
CE002A5C000
trusted library allocation
page read and write
56D000624000
trusted library allocation
page read and write
26107552000
heap
page read and write
2610D91D000
trusted library section
page read and write
7860000
direct allocation
page read and write
CE0028E4000
trusted library allocation
page read and write
CE0031B4000
trusted library allocation
page read and write
73E1000
heap
page read and write
26107546000
heap
page read and write
5324002A0000
trusted library allocation
page read and write
7F84000
heap
page read and write
26103F70000
heap
page read and write
26107510000
heap
page read and write
AB8EFFE000
stack
page read and write
26107552000
heap
page read and write
30AE000
stack
page read and write
2610753B000
heap
page read and write
56D0002CC000
trusted library allocation
page read and write
26107552000
heap
page read and write
CE002900000
trusted library allocation
page read and write
8118000
heap
page read and write
26107549000
heap
page read and write
CE002D8C000
trusted library allocation
page read and write
26107541000
heap
page read and write
CE0032B8000
trusted library allocation
page read and write
2610754A000
heap
page read and write
B21000
unkown
page readonly
CE0024F0000
trusted library allocation
page read and write
CE002238000
trusted library allocation
page read and write
CE0023AC000
trusted library allocation
page read and write
CE00290C000
trusted library allocation
page read and write
2610753F000
heap
page read and write
7EA3000
heap
page read and write
26107552000
heap
page read and write
B21000
unkown
page readonly
CE002E58000
trusted library allocation
page read and write
990000
heap
page read and write
AB91FFE000
unkown
page readonly
532400235000
trusted library allocation
page read and write
26107541000
heap
page read and write
1098000
heap
page read and write
26107552000
heap
page read and write
5324002A0000
trusted library allocation
page read and write
1090000
heap
page read and write
CE0029D8000
trusted library allocation
page read and write
26107550000
heap
page read and write
26103F90000
trusted library allocation
page read and write
804B000
heap
page read and write
CE00255C000
trusted library allocation
page read and write
26107552000
heap
page read and write
CE002A28000
trusted library allocation
page read and write
26107BA2000
heap
page read and write
CE0031C0000
trusted library allocation
page read and write
CE002428000
trusted library allocation
page read and write
AB9DFFD000
stack
page read and write
ABFC1FE000
unkown
page readonly
8028000
heap
page read and write
26107554000
heap
page read and write
ABA47FE000
unkown
page readonly
1B34000
heap
page read and write
2150000
direct allocation
page read and write
7AE0000
direct allocation
page execute and read and write
CE002954000
trusted library allocation
page read and write
CE002EF0000
trusted library allocation
page read and write
56D000320000
trusted library allocation
page read and write
63C000
stack
page read and write
2610E306000
trusted library section
page read and write
CE0031B4000
trusted library allocation
page read and write
B10000
unkown
page readonly
CE002498000
trusted library allocation
page read and write
56D00025C000
trusted library allocation
page read and write
CE0031C0000
trusted library allocation
page read and write
1B34000
heap
page read and write
CE002490000
trusted library allocation
page read and write
CE002338000
trusted library allocation
page read and write
CE002410000
trusted library allocation
page read and write
CE0024E0000
trusted library allocation
page read and write
CE0024E3000
trusted library allocation
page read and write
CE002420000
trusted library allocation
page read and write
AB84FFB000
stack
page read and write
7EA1000
heap
page read and write
26107546000
heap
page read and write
26107552000
heap
page read and write
CE002508000
trusted library allocation
page read and write
CE0028B0000
trusted library allocation
page read and write
CE00256C000
trusted library allocation
page read and write
CE00305C000
trusted library allocation
page read and write
818B000
heap
page read and write
CE002FB5000
trusted library allocation
page read and write
5324002BC000
trusted library allocation
page read and write
CE003294000
trusted library allocation
page read and write
CE002664000
trusted library allocation
page read and write
7F6B000
direct allocation
page read and write
2610D8F6000
trusted library section
page read and write
CE002CBC000
trusted library allocation
page read and write
CE002FC4000
trusted library allocation
page read and write
ABA67FE000
unkown
page readonly
56D000714000
trusted library allocation
page read and write
2610754C000
heap
page read and write
CE002EF3000
trusted library allocation
page read and write
7EAA000
heap
page read and write
73E1000
heap
page read and write
AB887FE000
unkown
page readonly
CE002E60000
trusted library allocation
page read and write
26107550000
heap
page read and write
CE0023C4000
trusted library allocation
page read and write
CE002664000
trusted library allocation
page read and write
26107538000
heap
page read and write
CE002C54000
trusted library allocation
page read and write
26107B6D000
heap
page read and write
CE00253C000
trusted library allocation
page read and write
ABA6FFE000
stack
page read and write
26107545000
heap
page read and write
AB99FFC000
stack
page read and write
2610753F000
heap
page read and write
6C0D0000
unkown
page readonly
26107541000
heap
page read and write
56D000330000
trusted library allocation
page read and write
73E1000
heap
page read and write
73E1000
heap
page read and write
ABFE9FD000
stack
page read and write
CE002698000
trusted library allocation
page read and write
80FF000
heap
page read and write
26107549000
heap
page read and write
6C1F8000
unkown
page readonly
83C000
stack
page read and write
2610753F000
heap
page read and write
1770000
heap
page read and write
CE002870000
trusted library allocation
page read and write
CE0023B4000
trusted library allocation
page read and write
73E1000
heap
page read and write
B11000
unkown
page execute read
26107541000
heap
page read and write
26107552000
heap
page read and write
D2F000
stack
page read and write
2610753E000
heap
page read and write
2610753F000
heap
page read and write
26107536000
heap
page read and write
2610DDA0000
trusted library section
page read and write
2610E1D1000
trusted library section
page read and write
960000
heap
page read and write
CE002C78000
trusted library allocation
page read and write
CE00237C000
trusted library allocation
page read and write
2610BE18000
heap
page read and write
2610D6E0000
heap
page read and write
26107552000
heap
page read and write
26107552000
heap
page read and write
7F81000
heap
page read and write
CE002201000
trusted library allocation
page read and write
5324002BC000
trusted library allocation
page read and write
7EA3000
heap
page read and write
ABFD9FE000
stack
page read and write
CE0024F0000
trusted library allocation
page read and write
2610E1C0000
trusted library section
page read and write
56D000408000
trusted library allocation
page read and write
2BC0000
heap
page read and write
26107530000
heap
page read and write
ABA2FFA000
stack
page read and write
56D00060C000
trusted library allocation
page read and write
CE003038000
trusted library allocation
page read and write
CE0024F0000
trusted library allocation
page read and write
CE0026B4000
trusted library allocation
page read and write
532400288000
trusted library allocation
page read and write
26107546000
heap
page read and write
662400210000
direct allocation
page read and write
CE002300000
trusted library allocation
page read and write
7EAE000
heap
page read and write
C20000
heap
page read and write
2610E3AE000
trusted library section
page read and write
AB8F7FE000
unkown
page readonly
56D000424000
trusted library allocation
page read and write
26107543000
heap
page read and write
CE0026EA000
trusted library allocation
page read and write
CE00322C000
trusted library allocation
page read and write
56D000678000
trusted library allocation
page read and write
26107552000
heap
page read and write
807C000
heap
page read and write
26107BAD000
heap
page read and write
2610753F000
heap
page read and write
26107542000
heap
page read and write
7EA4000
heap
page read and write
F2F000
stack
page read and write
26107552000
heap
page read and write
56D000688000
trusted library allocation
page read and write
ABFA9FE000
stack
page read and write
CE0023F0000
trusted library allocation
page read and write
56D0007B4000
trusted library allocation
page read and write
2610753F000
heap
page read and write
B11000
unkown
page execute read
CE002D20000
trusted library allocation
page read and write
2E67000
heap
page read and write
800E000
heap
page read and write
56D000760000
trusted library allocation
page read and write
56D0006E8000
trusted library allocation
page read and write
B10000
unkown
page readonly
26104063000
heap
page read and write
2150000
direct allocation
page read and write
7F63000
heap
page read and write
73E1000
heap
page read and write
80AC000
heap
page read and write
2610753E000
heap
page read and write
AB9A7FE000
unkown
page readonly
CE003158000
trusted library allocation
page read and write
662400303000
direct allocation
page read and write
73E1000
heap
page read and write
8036000
heap
page read and write
CE002EB8000
trusted library allocation
page read and write
AB83FFB000
stack
page read and write
26107538000
heap
page read and write
CE0023E0000
trusted library allocation
page read and write
26107565000
heap
page read and write
CE0028F0000
trusted library allocation
page read and write
CE00274C000
trusted library allocation
page read and write
26107546000
heap
page read and write
1B34000
heap
page read and write
26107552000
heap
page read and write
7AE0000
direct allocation
page execute and read and write
80AA000
heap
page read and write
820F000
heap
page read and write
CE002845000
trusted library allocation
page read and write
2150000
direct allocation
page read and write
CE002530000
trusted library allocation
page read and write
7FA6000
heap
page read and write
6624002A8000
direct allocation
page read and write
CE0029B8000
trusted library allocation
page read and write
7EA7000
heap
page read and write
26103F20000
heap
page read and write
CE002E0C000
trusted library allocation
page read and write
CE002EE0000
trusted library allocation
page read and write
532400270000
trusted library allocation
page read and write
26104055000
heap
page read and write
CE0031D0000
trusted library allocation
page read and write
7AE0000
direct allocation
page execute and read and write
56D000320000
trusted library allocation
page read and write
8075000
heap
page read and write
80A4000
heap
page read and write
26107541000
heap
page read and write
CE002E24000
trusted library allocation
page read and write
AB97FFB000
stack
page read and write
26107546000
heap
page read and write
AB9C7FE000
unkown
page readonly
B1E000
unkown
page write copy
56D000330000
trusted library allocation
page read and write
662400260000
direct allocation
page read and write
CE00249A000
trusted library allocation
page read and write
26107541000
heap
page read and write
3140000
heap
page read and write
B1E000
unkown
page read and write
26107552000
heap
page read and write
CE0032B4000
trusted library allocation
page read and write
2610E32D000
trusted library section
page read and write
CE00297C000
trusted library allocation
page read and write
26107549000
heap
page read and write
CE002FDC000
trusted library allocation
page read and write
CE002EF0000
trusted library allocation
page read and write
26107B5D000
heap
page read and write
AB9EFFD000
stack
page read and write
2610E1FE000
trusted library section
page read and write
532400250000
trusted library allocation
page read and write
56D000401000
trusted library allocation
page read and write
CE00235C000
trusted library allocation
page read and write
73E1000
heap
page read and write
CE002860000
trusted library allocation
page read and write
CE003030000
trusted library allocation
page read and write
56D000758000
trusted library allocation
page read and write
AB897FE000
unkown
page readonly
26107552000
heap
page read and write
2150000
direct allocation
page read and write
CE0030C4000
trusted library allocation
page read and write
73E1000
heap
page read and write
CE0030E0000
trusted library allocation
page read and write
30EF000
stack
page read and write
AB837FE000
unkown
page readonly
AB977FE000
unkown
page readonly
26107552000
heap
page read and write
2610754D000
heap
page read and write
2610E322000
trusted library section
page read and write
26107540000
heap
page read and write
7AE0000
direct allocation
page execute and read and write
CE002C34000
trusted library allocation
page read and write
2610753F000
heap
page read and write
7F69000
direct allocation
page read and write
CE002BCC000
trusted library allocation
page read and write
26107BAA000
heap
page read and write
26107552000
heap
page read and write
26107542000
heap
page read and write
73E1000
heap
page read and write
2B7A000
stack
page read and write
AB9D7FE000
unkown
page readonly
7EA2000
heap
page read and write
2610D85E000
trusted library section
page read and write
26107552000
heap
page read and write
CE002DB8000
trusted library allocation
page read and write
CE002FF0000
trusted library allocation
page read and write
817E000
heap
page read and write
AB827FE000
unkown
page readonly
CE00220C000
trusted library allocation
page read and write
532400201000
trusted library allocation
page read and write
7FD9000
heap
page read and write
26107548000
heap
page read and write
1B34000
heap
page read and write
73E1000
heap
page read and write
56D000390000
trusted library allocation
page read and write
56D0006D4000
trusted library allocation
page read and write
AB98FFB000
stack
page read and write
2610756C000
heap
page read and write
CE0022B8000
trusted library allocation
page read and write
CE003050000
trusted library allocation
page read and write
26107561000
heap
page read and write
CE0030A8000
trusted library allocation
page read and write
662400234000
direct allocation
page read and write
CE000E01000
trusted library allocation
page read and write
26107B92000
heap
page read and write
73E1000
heap
page read and write
CE002A01000
trusted library allocation
page read and write
CE0022A0000
trusted library allocation
page read and write
73E1000
heap
page read and write
26107541000
heap
page read and write
56D000248000
trusted library allocation
page read and write
26107549000
heap
page read and write
CE002494000
trusted library allocation
page read and write
2610753E000
heap
page read and write
2610754A000
heap
page read and write
26107552000
heap
page read and write
26107541000
heap
page read and write
26107552000
heap
page read and write
532400230000
trusted library allocation
page read and write
B10000
unkown
page readonly
CE002EE0000
trusted library allocation
page read and write
CE0028D4000
trusted library allocation
page read and write
56D00080C000
trusted library allocation
page read and write
26103F60000
heap
page read and write
26106720000
unkown
page read and write
CE00308E000
trusted library allocation
page read and write
CE0024F0000
trusted library allocation
page read and write
26107552000
heap
page read and write
26107546000
heap
page read and write
8255000
heap
page read and write
56D000730000
trusted library allocation
page read and write
26107D20000
trusted library section
page read and write
532400260000
trusted library allocation
page read and write
2610E240000
trusted library section
page read and write
AB8B7FE000
unkown
page readonly
56D000310000
trusted library allocation
page read and write
CE002EA4000
trusted library allocation
page read and write
CE00280C000
trusted library allocation
page read and write
56D000718000
trusted library allocation
page read and write
56D000380000
trusted library allocation
page read and write
26107541000
heap
page read and write
26107541000
heap
page read and write
AB92FFC000
stack
page read and write
73E1000
heap
page read and write
CE002906000
trusted library allocation
page read and write
26107541000
heap
page read and write
CE002CEC000
trusted library allocation
page read and write
261077B0000
heap
page read and write
26105CD3000
heap
page read and write
B1A000
unkown
page readonly
26107541000
heap
page read and write
AC0000
heap
page read and write
7EA9000
heap
page read and write
CE002401000
trusted library allocation
page read and write
56D0002FC000
trusted library allocation
page read and write
7AE0000
direct allocation
page execute and read and write
E31000
unkown
page execute and write copy
7AE0000
direct allocation
page execute and read and write
5324002A0000
trusted library allocation
page read and write
26107BAD000
heap
page read and write
CE002494000
trusted library allocation
page read and write
26107546000
heap
page read and write
26107550000
heap
page read and write
73E1000
heap
page read and write
56D000430000
trusted library allocation
page read and write
801E000
heap
page read and write
73E1000
heap
page read and write
26107541000
heap
page read and write
CE003201000
trusted library allocation
page read and write
B70000
heap
page read and write
CE002580000
trusted library allocation
page read and write
532400294000
trusted library allocation
page read and write
CE00260C000
trusted library allocation
page read and write
5324002B0000
trusted library allocation
page read and write
CE002A0C000
trusted library allocation
page read and write
CE002EF0000
trusted library allocation
page read and write
CE002890000
trusted library allocation
page read and write
CE002784000
trusted library allocation
page read and write
CE000201000
trusted library allocation
page read and write
2610753F000
heap
page read and write
2610753F000
heap
page read and write
CE0028CD000
trusted library allocation
page read and write
AB96FFB000
stack
page read and write
2BF0000
heap
page read and write
AB967FE000
unkown
page readonly
CE003148000
trusted library allocation
page read and write
73E1000
heap
page read and write
7EA9000
heap
page read and write
26107541000
heap
page read and write
85C000
stack
page read and write
AB9B7FE000
unkown
page readonly
73E1000
heap
page read and write
CE0030F8000
trusted library allocation
page read and write
26107BA5000
heap
page read and write
AB847FE000
unkown
page readonly
73E1000
heap
page read and write
CE00238C000
trusted library allocation
page read and write
56D000734000
trusted library allocation
page read and write
CE002434000
trusted library allocation
page read and write
CE002694000
trusted library allocation
page read and write
2610753F000
heap
page read and write
2610752C000
heap
page read and write
26107538000
heap
page read and write
56D00035C000
trusted library allocation
page read and write
5324002C0000
trusted library allocation
page read and write
26107541000
heap
page read and write
73E1000
heap
page read and write
CE00229E000
trusted library allocation
page read and write
8183000
heap
page read and write
73E1000
heap
page read and write
73E1000
heap
page read and write
CE003020000
trusted library allocation
page read and write
56D00027C000
trusted library allocation
page read and write
CE00253C000
trusted library allocation
page read and write
2610753B000
heap
page read and write
2150000
direct allocation
page read and write
CE0024FC000
trusted library allocation
page read and write
CE002F7C000
trusted library allocation
page read and write
2610D852000
trusted library section
page read and write
CE003110000
trusted library allocation
page read and write
26107552000
heap
page read and write
ABA4FFC000
stack
page read and write
CE00249A000
trusted library allocation
page read and write
26107552000
heap
page read and write
26107565000
heap
page read and write
2610756C000
heap
page read and write
CE0024B0000
trusted library allocation
page read and write
CE0032BC000
trusted library allocation
page read and write
B0E000
stack
page read and write
CE00312C000
trusted library allocation
page read and write
8082000
heap
page read and write
56D000404000
trusted library allocation
page read and write
AB947FE000
unkown
page readonly
56D0006B0000
trusted library allocation
page read and write
B1A000
unkown
page readonly
73E1000
heap
page read and write
26107552000
heap
page read and write
26107552000
heap
page read and write
7EAD000
heap
page read and write
6C1F9000
unkown
page read and write
56D00075C000
trusted library allocation
page read and write
AB8FFFB000
stack
page read and write
CE002508000
trusted library allocation
page read and write
26107BB2000
heap
page read and write
56D00040C000
trusted library allocation
page read and write
ABFD1FE000
unkown
page readonly
26107552000
heap
page read and write
CE002424000
trusted library allocation
page read and write
26107546000
heap
page read and write
7EA7000
heap
page read and write
26107B98000
heap
page read and write
26107551000
heap
page read and write
662400274000
direct allocation
page read and write
662400217000
direct allocation
page read and write
CE002EF8000
trusted library allocation
page read and write
2610754C000
heap
page read and write
CE002A5C000
trusted library allocation
page read and write
CE002E48000
trusted library allocation
page read and write
26107552000
heap
page read and write
5324002F8000
trusted library allocation
page read and write
8032000
heap
page read and write
73E1000
heap
page read and write
CE003054000
trusted library allocation
page read and write
CE002594000
trusted library allocation
page read and write
66240024C000
direct allocation
page read and write
CBE000
heap
page read and write
26107547000
heap
page read and write
26107549000
heap
page read and write
56D000640000
trusted library allocation
page read and write
5324002C0000
trusted library allocation
page read and write
AB8CFFE000
stack
page read and write
B11000
unkown
page execute read
26107500000
heap
page read and write
B11000
unkown
page execute read
CE0024B9000
trusted library allocation
page read and write
532400248000
trusted library allocation
page read and write
26107546000
heap
page read and write
26107532000
heap
page read and write
2610E251000
trusted library section
page read and write
26103F10000
heap
page readonly
CE002B88000
trusted library allocation
page read and write
26107549000
heap
page read and write
26107552000
heap
page read and write
2610753F000
heap
page read and write
5324002C0000
trusted library allocation
page read and write
56D000664000
trusted library allocation
page read and write
7DA1000
heap
page read and write
8010000
heap
page read and write
7AE0000
direct allocation
page execute and read and write
7AB0000
direct allocation
page execute and read and write
56D000614000
trusted library allocation
page read and write
CE003074000
trusted library allocation
page read and write
26107550000
heap
page read and write
CE0026D8000
trusted library allocation
page read and write
2610405A000
heap
page read and write
26107546000
heap
page read and write
CE002AA0000
trusted library allocation
page read and write
165F000
stack
page read and write
7AE0000
direct allocation
page execute and read and write
56D000750000
trusted library allocation
page read and write
B6E000
stack
page read and write
26107552000
heap
page read and write
5324002F4000
trusted library allocation
page read and write
CE002EE0000
trusted library allocation
page read and write
26107552000
heap
page read and write
AB93FFD000
stack
page read and write
26107546000
heap
page read and write
2610753E000
heap
page read and write
26107552000
heap
page read and write
CE002A34000
trusted library allocation
page read and write
CE002248000
trusted library allocation
page read and write
26107BA0000
heap
page read and write
56D000698000
trusted library allocation
page read and write
CE003158000
trusted library allocation
page read and write
B10000
unkown
page readonly
56D0002ED000
trusted library allocation
page read and write
56D000610000
trusted library allocation
page read and write
7FA6000
heap
page read and write
B11000
unkown
page execute read
CE00261C000
trusted library allocation
page read and write
CE002344000
trusted library allocation
page read and write
26107552000
heap
page read and write
26107BC4000
heap
page read and write
2610754C000
heap
page read and write
2610753F000
heap
page read and write
5324002BC000
trusted library allocation
page read and write
5324002C0000
trusted library allocation
page read and write
2610753F000
heap
page read and write
1B34000
heap
page read and write
662400284000
direct allocation
page read and write
CE00251C000
trusted library allocation
page read and write
CE0027A8000
trusted library allocation
page read and write
56D000770000
trusted library allocation
page read and write
ABA87FE000
unkown
page readonly
26107BAA000
heap
page read and write
26107546000
heap
page read and write
26107549000
heap
page read and write
CE002D08000
trusted library allocation
page read and write
26107552000
heap
page read and write
7AE0000
direct allocation
page execute and read and write
AB90FFC000
stack
page read and write
26107552000
heap
page read and write
26107541000
heap
page read and write
73E1000
heap
page read and write
CE002CFC000
trusted library allocation
page read and write
FB0000
heap
page read and write
662400270000
direct allocation
page read and write
CE00320C000
trusted library allocation
page read and write
26107543000
heap
page read and write
E30000
unkown
page readonly
CE003258000
trusted library allocation
page read and write
1B34000
heap
page read and write
ABFC9FE000
stack
page read and write
CE002F60000
trusted library allocation
page read and write
2610754B000
heap
page read and write
2610753A000
heap
page read and write
26107565000
heap
page read and write
73E1000
heap
page read and write
2610754A000
heap
page read and write
2610DB50000
trusted library section
page read and write
662400201000
direct allocation
page read and write
CE0023EC000
trusted library allocation
page read and write
145F000
stack
page read and write
56D00069C000
trusted library allocation
page read and write
CE003180000
trusted library allocation
page read and write
26107552000
heap
page read and write
66240023C000
direct allocation
page read and write
26107552000
heap
page read and write
26107550000
heap
page read and write
56D0006E4000
trusted library allocation
page read and write
CE002F50000
trusted library allocation
page read and write
1B34000
heap
page read and write
56D0002F4000
trusted library allocation
page read and write
26107550000
heap
page read and write
26107552000
heap
page read and write
822F000
heap
page read and write
CE002BC3000
trusted library allocation
page read and write
CE0028E4000
trusted library allocation
page read and write
26107B00000
heap
page read and write
5324002F0000
trusted library allocation
page read and write
7860000
direct allocation
page read and write
826E000
heap
page read and write
CE0024A4000
trusted library allocation
page read and write
2610753F000
heap
page read and write
CE002274000
trusted library allocation
page read and write
532400220000
trusted library allocation
page read and write
CB0000
heap
page read and write
26107546000
heap
page read and write
73E1000
heap
page read and write
73E1000
heap
page read and write
CE002D80000
trusted library allocation
page read and write
800A000
heap
page read and write
56D000364000
trusted library allocation
page read and write
26107552000
heap
page read and write
CE002328000
trusted library allocation
page read and write
73E1000
heap
page read and write
26107541000
heap
page read and write
26107552000
heap
page read and write
6624002AC000
direct allocation
page read and write
26107BB8000
heap
page read and write
7EA9000
heap
page read and write
73E1000
heap
page read and write
26107546000
heap
page read and write
A8E000
stack
page read and write
CE002514000
trusted library allocation
page read and write
1B34000
heap
page read and write
56D000684000
trusted library allocation
page read and write
26107552000
heap
page read and write
7E12000
direct allocation
page read and write
7EA2000
heap
page read and write
26107552000
heap
page read and write
ABA07FE000
unkown
page readonly
26107B9A000
heap
page read and write
7EAC000
heap
page read and write
73E1000
heap
page read and write
CE002694000
trusted library allocation
page read and write
26107546000
heap
page read and write
56D0007CC000
trusted library allocation
page read and write
7FE1000
heap
page read and write
2610E3A0000
trusted library section
page read and write
6C1AD000
unkown
page read and write
CE001001000
trusted library allocation
page read and write
2E3E000
unkown
page read and write
7EA3000
heap
page read and write
2610753E000
heap
page read and write
7EA5000
heap
page read and write
CE002710000
trusted library allocation
page read and write
CE002494000
trusted library allocation
page read and write
AB9E7FE000
unkown
page readonly
B1A000
unkown
page readonly
2E60000
heap
page read and write
7EAF000
heap
page read and write
26107546000
heap
page read and write
CE0024B4000
trusted library allocation
page read and write
5324002A0000
trusted library allocation
page read and write
532400274000
trusted library allocation
page read and write
2610753F000
heap
page read and write
26107B9E000
heap
page read and write
7EA1000
heap
page read and write
CE002820000
trusted library allocation
page read and write
CE002934000
trusted library allocation
page read and write
73E1000
heap
page read and write
2610E1F2000
trusted library section
page read and write
CE002E1C000
trusted library allocation
page read and write
7EAA000
heap
page read and write
CE0027EC000
trusted library allocation
page read and write
2610D8B3000
trusted library section
page read and write
CE000401000
trusted library allocation
page read and write
801A000
heap
page read and write
26107552000
heap
page read and write
CE0024D0000
trusted library allocation
page read and write
CE002B2C000
trusted library allocation
page read and write
2610753F000
heap
page read and write
CE002CAC000
trusted library allocation
page read and write
AD0000
heap
page read and write
CE002E88000
trusted library allocation
page read and write
26107552000
heap
page read and write
CE003220000
trusted library allocation
page read and write
CE0023F4000
trusted library allocation
page read and write
26107538000
heap
page read and write
26107552000
heap
page read and write
56D000220000
trusted library allocation
page read and write
2610753F000
heap
page read and write
6C1AF000
unkown
page readonly
B1E000
unkown
page read and write
56D0006C8000
trusted library allocation
page read and write
CE0023D8000
trusted library allocation
page read and write
CE002841000
trusted library allocation
page read and write
CE002CB0000
trusted library allocation
page read and write
7F8E000
heap
page read and write
CE002DA8000
trusted library allocation
page read and write
26107546000
heap
page read and write
CE002B68000
trusted library allocation
page read and write
CE003044000
trusted library allocation
page read and write
26107546000
heap
page read and write
AB9F7FE000
unkown
page readonly
CE0023F8000
trusted library allocation
page read and write
2610407B000
heap
page read and write
2610D723000
heap
page read and write
7EA4000
heap
page read and write
5324002C8000
trusted library allocation
page read and write
66240020C000
direct allocation
page read and write
8049000
heap
page read and write
56D00088C000
trusted library allocation
page read and write
26107546000
heap
page read and write
306F000
unkown
page read and write
CE0030DC000
trusted library allocation
page read and write
CE002C01000
trusted library allocation
page read and write
CE0032CC000
trusted library allocation
page read and write
CE002BE8000
trusted library allocation
page read and write
26107552000
heap
page read and write
26103F65000
heap
page read and write
CE002EFE000
trusted library allocation
page read and write
56D000374000
trusted library allocation
page read and write
2610753F000
heap
page read and write
26107561000
heap
page read and write
2610753F000
heap
page read and write
26107549000
heap
page read and write
26107B9C000
heap
page read and write
CE00310C000
trusted library allocation
page read and write
CE002C1C000
trusted library allocation
page read and write
26107548000
heap
page read and write
26107552000
heap
page read and write
CE00313C000
trusted library allocation
page read and write
56D0006CC000
trusted library allocation
page read and write
26107541000
heap
page read and write
2610E1E0000
trusted library section
page read and write
AB88FFE000
stack
page read and write
CE002E28000
trusted library allocation
page read and write
803E000
heap
page read and write
CE000C01000
trusted library allocation
page read and write
CE0031D8000
trusted library allocation
page read and write
532400238000
trusted library allocation
page read and write
2610753F000
heap
page read and write
CE00305C000
trusted library allocation
page read and write
26107552000
heap
page read and write
26107541000
heap
page read and write
2610753F000
heap
page read and write
7EA5000
heap
page read and write
26107B9A000
heap
page read and write
CE00329C000
trusted library allocation
page read and write
ABA0FFE000
stack
page read and write
7F59000
heap
page read and write
26107552000
heap
page read and write
7F32000
heap
page read and write
6624002E4000
direct allocation
page read and write
CE002494000
trusted library allocation
page read and write
26107543000
heap
page read and write
2610AF80000
trusted library allocation
page read and write
26107546000
heap
page read and write
6C1FC000
unkown
page readonly
CE00328C000
trusted library allocation
page read and write
970000
heap
page read and write
26107546000
heap
page read and write
CE0027BC000
trusted library allocation
page read and write
26107B98000
heap
page read and write
CE0023B4000
trusted library allocation
page read and write
1B34000
heap
page read and write
CE002FBC000
trusted library allocation
page read and write
73E1000
heap
page read and write
26107549000
heap
page read and write
26107561000
heap
page read and write
56D0006E0000
trusted library allocation
page read and write
CE002498000
trusted library allocation
page read and write
CE002528000
trusted library allocation
page read and write
CE0023D4000
trusted library allocation
page read and write
2610753F000
heap
page read and write
CE002D70000
trusted library allocation
page read and write
B10000
unkown
page readonly
7AE0000
direct allocation
page execute and read and write
73E1000
heap
page read and write
26103FC8000
heap
page read and write
CE002F18000
trusted library allocation
page read and write
CE002BAC000
trusted library allocation
page read and write
7EA4000
heap
page read and write
2150000
direct allocation
page read and write
CE00228E000
trusted library allocation
page read and write
CE00300C000
trusted library allocation
page read and write
26107561000
heap
page read and write
56D0002E4000
trusted library allocation
page read and write
1B34000
heap
page read and write
5324002B0000
trusted library allocation
page read and write
73E1000
heap
page read and write
B1A000
unkown
page readonly
26107552000
heap
page read and write
26107552000
heap
page read and write
7FC8000
heap
page read and write
8055000
heap
page read and write
CE002A24000
trusted library allocation
page read and write
CE002794000
trusted library allocation
page read and write
65C000
stack
page read and write
56D000210000
trusted library allocation
page read and write
AB807FE000
unkown
page readonly
CE00236C000
trusted library allocation
page read and write
26107552000
heap
page read and write
CE002AC0000
trusted library allocation
page read and write
7EA8000
heap
page read and write
26107552000
heap
page read and write
CE0028C0000
trusted library allocation
page read and write
AB867FE000
unkown
page readonly
73E1000
heap
page read and write
2610E5A0000
trusted library section
page read and write
5324002BC000
trusted library allocation
page read and write
73E1000
heap
page read and write
7EA8000
heap
page read and write
CE002A94000
trusted library allocation
page read and write
56D0006D0000
trusted library allocation
page read and write
CE002DB0000
trusted library allocation
page read and write
B21000
unkown
page readonly
AB8C7FE000
unkown
page readonly
26107B8B000
heap
page read and write
662400294000
direct allocation
page read and write
26107546000
heap
page read and write
CE0030C0000
trusted library allocation
page read and write
7AE0000
direct allocation
page execute and read and write
ABA1FFE000
stack
page read and write
73E1000
heap
page read and write
26107552000
heap
page read and write
26107C00000
trusted library section
page read and write
7EAF000
heap
page read and write
ABFF1FE000
unkown
page readonly
B1E000
unkown
page write copy
CE002B48000
trusted library allocation
page read and write
7AE0000
direct allocation
page execute and read and write
B10000
unkown
page readonly
CE003180000
trusted library allocation
page read and write
AB87FFE000
stack
page read and write
26107552000
heap
page read and write
CE002EE0000
trusted library allocation
page read and write
CE0024FC000
trusted library allocation
page read and write
There are 1274 hidden memdumps, click here to show them.