IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_de576c89c85d95f63177b89249eef622329cc21c_49e505fd_04c767ce-8044-484e-881b-81c50735fe8e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4B9B.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Nov 22 11:03:32 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4D71.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4DC0.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 --field-trial-handle=2324,i,14367847056113753818,18281237657679557093,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 504 -s 1108

URLs

Name
IP
Malicious
"home.fvtekk5pn.top
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/Char9e3
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://issuetracker.google.com/161903006
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347lse
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://fvtekk5pn.top/v1/upload.phpynamic
unknown
http://anglebug.com/5371
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347D
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
34.116.198.130
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
analforeverlovyu.top
QUERY|rd|AAAA|IN|home.fvtekk5pn.top
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://calendar.google.com/calendar/u/0/r/eventedit?usp=chrome_actionshttps://docs.google.com/prese
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fvtekk5pn.top
34.116.198.130
www.google.com
142.250.181.100
fp2e7a.wpc.phicdn.net
192.229.221.95
fvtekk5pn.top
34.116.198.130

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
34.116.198.130
home.fvtekk5pn.top
United States
127.0.0.1
unknown
unknown
142.250.181.100
www.google.com
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{cbad300d-4592-3678-df00-8dfac0d38398}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProgramId
malicious
\REGISTRY\A\{cbad300d-4592-3678-df00-8dfac0d38398}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
FileId
malicious
\REGISTRY\A\{cbad300d-4592-3678-df00-8dfac0d38398}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LowerCaseLongPath
malicious
\REGISTRY\A\{cbad300d-4592-3678-df00-8dfac0d38398}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LongPathHash
malicious
\REGISTRY\A\{cbad300d-4592-3678-df00-8dfac0d38398}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Name
malicious
\REGISTRY\A\{cbad300d-4592-3678-df00-8dfac0d38398}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
OriginalFileName
malicious
\REGISTRY\A\{cbad300d-4592-3678-df00-8dfac0d38398}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Publisher
malicious
\REGISTRY\A\{cbad300d-4592-3678-df00-8dfac0d38398}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Version
malicious
\REGISTRY\A\{cbad300d-4592-3678-df00-8dfac0d38398}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinFileVersion
malicious
\REGISTRY\A\{cbad300d-4592-3678-df00-8dfac0d38398}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinaryType
malicious
\REGISTRY\A\{cbad300d-4592-3678-df00-8dfac0d38398}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProductName
malicious
\REGISTRY\A\{cbad300d-4592-3678-df00-8dfac0d38398}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProductVersion
malicious
\REGISTRY\A\{cbad300d-4592-3678-df00-8dfac0d38398}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LinkDate
malicious
\REGISTRY\A\{cbad300d-4592-3678-df00-8dfac0d38398}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinProductVersion
malicious
\REGISTRY\A\{cbad300d-4592-3678-df00-8dfac0d38398}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
AppxPackageFullName
malicious
\REGISTRY\A\{cbad300d-4592-3678-df00-8dfac0d38398}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
AppxPackageRelativeId
malicious
\REGISTRY\A\{cbad300d-4592-3678-df00-8dfac0d38398}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Size
malicious
\REGISTRY\A\{cbad300d-4592-3678-df00-8dfac0d38398}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Language
malicious
\REGISTRY\A\{cbad300d-4592-3678-df00-8dfac0d38398}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1371000
heap
page read and write
malicious
14C9000
heap
page read and write
malicious
1356000
heap
page read and write
malicious
2BB4002ED000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF0001AC000
trusted library allocation
page read and write
6731000
heap
page read and write
1F6EDE33000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
14E0000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6EDE95000
heap
page read and write
2BF000210000
trusted library allocation
page read and write
7104000
heap
page read and write
706C000
heap
page read and write
6731000
heap
page read and write
2BF000EDC000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000078000
trusted library allocation
page read and write
1F6EDB30000
heap
page read and write
6731000
heap
page read and write
2BB400250000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000380000
trusted library allocation
page read and write
6731000
heap
page read and write
2BB4002F4000
trusted library allocation
page read and write
2BF000E64000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000EC4000
trusted library allocation
page read and write
6731000
heap
page read and write
196000201000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BB400354000
trusted library allocation
page read and write
1F6F45F2000
trusted library section
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6AE000303000
direct allocation
page read and write
6731000
heap
page read and write
6E40000
direct allocation
page execute and read and write
808EFFE000
unkown
page readonly
6731000
heap
page read and write
2BF0001A0000
trusted library allocation
page read and write
2BB4006EC000
trusted library allocation
page read and write
6731000
heap
page read and write
7106000
heap
page read and write
6731000
heap
page read and write
2BF0012C0000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000454000
trusted library allocation
page read and write
71C1000
heap
page read and write
6731000
heap
page read and write
2BF00017C000
trusted library allocation
page read and write
2BF00020C000
trusted library allocation
page read and write
7106000
heap
page read and write
134A000
heap
page read and write
6731000
heap
page read and write
2BF00014C000
trusted library allocation
page read and write
1382000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000330000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1366000
heap
page read and write
2BF0001B4000
trusted library allocation
page read and write
2BF001114000
trusted library allocation
page read and write
7109000
heap
page read and write
DA0000
unkown
page readonly
6731000
heap
page read and write
DAE000
unkown
page write copy
1F6EDE56000
heap
page read and write
2BF000ED0000
trusted library allocation
page read and write
6731000
heap
page read and write
1F6EDED6000
heap
page read and write
1F6F4A80000
trusted library section
page read and write
710A000
heap
page read and write
2BF0001AC000
trusted library allocation
page read and write
706B000
heap
page read and write
6731000
heap
page read and write
13A1000
heap
page read and write
6E30000
direct allocation
page execute and read and write
2BF000C14000
trusted library allocation
page read and write
DAA000
unkown
page readonly
6AE0002E4000
direct allocation
page read and write
6E40000
direct allocation
page execute and read and write
6731000
heap
page read and write
2BF000B64000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
7101000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6EDEC3000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
171000
unkown
page execute and write copy
2BF000BD8000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BB40020C000
trusted library allocation
page read and write
8094FFE000
unkown
page readonly
6731000
heap
page read and write
2BF0002A4000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1366000
heap
page read and write
808A7FE000
unkown
page read and write
2BF000380000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000454000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1366000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6EA280000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
7100000
heap
page read and write
6E40000
direct allocation
page execute and read and write
2BF0001F0000
trusted library allocation
page read and write
80A8FFE000
unkown
page readonly
6731000
heap
page read and write
2BF001174000
trusted library allocation
page read and write
1F6EA44A000
heap
page read and write
2BF0010A8000
trusted library allocation
page read and write
1F6EDE30000
heap
page read and write
6731000
heap
page read and write
2BF0002B8000
trusted library allocation
page read and write
2BF00129C000
trusted library allocation
page read and write
6731000
heap
page read and write
1960002B0000
trusted library allocation
page read and write
6731000
heap
page read and write
FFE000
stack
page read and write
2BF0004BC000
trusted library allocation
page read and write
7105000
heap
page read and write
70CB000
heap
page read and write
6A0BA000
direct allocation
page read and write
6731000
heap
page read and write
196000288000
trusted library allocation
page read and write
2BF000BEC000
trusted library allocation
page read and write
2BF000054000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF001124000
trusted library allocation
page read and write
2BF000230000
trusted library allocation
page read and write
2BF0002B8000
trusted library allocation
page read and write
71DA000
heap
page read and write
1366000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
8096FFE000
unkown
page readonly
6731000
heap
page read and write
6731000
heap
page read and write
1960002C0000
trusted library allocation
page read and write
710C000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000344000
trusted library allocation
page read and write
2BF000454000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF0006F8000
trusted library allocation
page read and write
19600020C000
trusted library allocation
page read and write
80AB7FD000
stack
page read and write
1960002BC000
trusted library allocation
page read and write
340000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
71EE000
heap
page read and write
2BB40078C000
trusted library allocation
page read and write
6731000
heap
page read and write
1F6F3B60000
heap
page read and write
2BB4006F0000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000B0C000
trusted library allocation
page read and write
13E4000
heap
page read and write
1F6ED8AE000
heap
page read and write
6731000
heap
page read and write
2BF000704000
trusted library allocation
page read and write
1F6EA490000
heap
page read and write
702B000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6EDE87000
heap
page read and write
6731000
heap
page read and write
2BB400248000
trusted library allocation
page read and write
11713000
heap
page read and write
6731000
heap
page read and write
2BF001054000
trusted library allocation
page read and write
2BF0004E8000
trusted library allocation
page read and write
80A57FD000
stack
page read and write
706C000
heap
page read and write
2BF00000C000
trusted library allocation
page read and write
2BB400714000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000EC4000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6ED8B3000
heap
page read and write
7E84000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000CE0000
trusted library allocation
page read and write
6731000
heap
page read and write
28F0000
heap
page read and write
7227000
heap
page read and write
720E000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000124000
trusted library allocation
page read and write
720F000
heap
page read and write
808CFFE000
unkown
page readonly
80B9FFE000
unkown
page readonly
1F6EDE48000
heap
page read and write
6731000
heap
page read and write
2BB4006C8000
trusted library allocation
page read and write
7104000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
DB1000
unkown
page readonly
707C000
heap
page read and write
6731000
heap
page read and write
1F6EA48B000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BB400720000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6ED8B7000
heap
page read and write
171000
unkown
page execute and write copy
2BF0001D0000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6AE000230000
direct allocation
page read and write
1F6EA487000
heap
page read and write
6731000
heap
page read and write
2BF0006F8000
trusted library allocation
page read and write
8A3B000
heap
page read and write
1304000
heap
page read and write
1F6EA483000
heap
page read and write
2BF000B1C000
trusted library allocation
page read and write
1F6F3CC0000
trusted library section
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6EE0C0000
trusted library section
page read and write
2BB400678000
trusted library allocation
page read and write
80AC7FE000
stack
page read and write
6731000
heap
page read and write
2BF000FAC000
trusted library allocation
page read and write
2BF000BB8000
trusted library allocation
page read and write
1F6ED890000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1960002B0000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF00087C000
trusted library allocation
page read and write
70C0000
heap
page read and write
6731000
heap
page read and write
2BF0012A8000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000370000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6AE0002AC000
direct allocation
page read and write
80A77FC000
stack
page read and write
1F6EDE42000
heap
page read and write
2BF00001C000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6EDE9C000
heap
page read and write
6731000
heap
page read and write
2BF000C68000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6F44B0000
trusted library section
page read and write
2BF0004EC000
trusted library allocation
page read and write
1F6EDEED000
heap
page read and write
7106000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF0004E8000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6EDE51000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
80ABFFE000
unkown
page readonly
6731000
heap
page read and write
2BF0005C0000
trusted library allocation
page read and write
8090FFE000
unkown
page readonly
1590000
heap
page read and write
C5C000
stack
page read and write
6731000
heap
page read and write
80B37FA000
stack
page read and write
6E40000
direct allocation
page execute and read and write
6731000
heap
page read and write
80A4FFE000
unkown
page readonly
6731000
heap
page read and write
2BF000A1C000
trusted library allocation
page read and write
6731000
heap
page read and write
6BC0000
direct allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000B78000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000D34000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF0004F4000
trusted library allocation
page read and write
196000278000
trusted library allocation
page read and write
1302000
heap
page read and write
6731000
heap
page read and write
1F6EA4B0000
heap
page read and write
2BF000D50000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF00080C000
trusted library allocation
page read and write
2B90000
heap
page read and write
6731000
heap
page read and write
1F6F1C2C000
heap
page read and write
196000235000
trusted library allocation
page read and write
6AE000294000
direct allocation
page read and write
2BB40027C000
trusted library allocation
page read and write
2BF0007CC000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
13E4000
heap
page read and write
6731000
heap
page read and write
80A5FFE000
unkown
page readonly
2BF000A20000
trusted library allocation
page read and write
80997FD000
stack
page read and write
2BB400624000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6F4510000
trusted library section
page read and write
71DD000
heap
page read and write
1381000
heap
page read and write
1F6EDE42000
heap
page read and write
707C000
heap
page read and write
6731000
heap
page read and write
1F6EDEC8000
heap
page read and write
1470000
heap
page read and write
13E4000
heap
page read and write
6731000
heap
page read and write
709A000
heap
page read and write
2BF000224000
trusted library allocation
page read and write
2BF0007C1000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF0000B4000
trusted library allocation
page read and write
6731000
heap
page read and write
1F6EDECC000
heap
page read and write
6731000
heap
page read and write
1960002C0000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF00016C000
trusted library allocation
page read and write
1F6EDEA5000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1366000
heap
page read and write
1352000
heap
page read and write
2BF0002B4000
trusted library allocation
page read and write
1381000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6F3D67000
unclassified section
page read and write
2BB4006E8000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6F45FD000
trusted library section
page read and write
1319000
heap
page read and write
6731000
heap
page read and write
1960002BC000
trusted library allocation
page read and write
1F6EA425000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BB4002B8000
trusted library allocation
page read and write
2BF000D3C000
trusted library allocation
page read and write
1F6EDEED000
heap
page read and write
DB1000
unkown
page readonly
6731000
heap
page read and write
6731000
heap
page read and write
1960002C0000
trusted library allocation
page read and write
6731000
heap
page read and write
7198000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000C80000
trusted library allocation
page read and write
6731000
heap
page read and write
6AE00020C000
direct allocation
page read and write
6731000
heap
page read and write
2BF000D84000
trusted library allocation
page read and write
2BB4007E0000
trusted library allocation
page read and write
6731000
heap
page read and write
13E4000
heap
page read and write
707C000
heap
page read and write
1F6EA487000
heap
page read and write
2BF000FE0000
trusted library allocation
page read and write
6731000
heap
page read and write
6E40000
direct allocation
page execute and read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF0008EC000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6EDE99000
heap
page read and write
6A0F9000
direct allocation
page read and write
2BF000001000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF0001C4000
trusted library allocation
page read and write
DAA000
unkown
page readonly
350000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF00129C000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6E40000
direct allocation
page execute and read and write
318E000
heap
page read and write
2BF0001DC000
trusted library allocation
page read and write
6731000
heap
page read and write
6A2BE000
direct allocation
page read and write
6731000
heap
page read and write
8095FFE000
unkown
page readonly
2BB400364000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF00107C000
trusted library allocation
page read and write
1960002BC000
trusted library allocation
page read and write
1F6ED8BC000
heap
page read and write
6731000
heap
page read and write
726D000
heap
page read and write
2BF0002A8000
trusted library allocation
page read and write
13E4000
heap
page read and write
8091FFE000
unkown
page readonly
2BB40040C000
trusted library allocation
page read and write
7093000
heap
page read and write
2BF000FD4000
trusted library allocation
page read and write
701A000
heap
page read and write
6731000
heap
page read and write
809E7FE000
stack
page read and write
6731000
heap
page read and write
808DFFE000
unkown
page readonly
808D7FE000
stack
page read and write
2BF0012B8000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6F467E000
trusted library section
page read and write
6731000
heap
page read and write
2BF000F6C000
trusted library allocation
page read and write
11F86000
heap
page read and write
808C7FE000
stack
page read and write
6731000
heap
page read and write
2BF000F05000
trusted library allocation
page read and write
2BF000300000
trusted library allocation
page read and write
196000274000
trusted library allocation
page read and write
2BB400770000
trusted library allocation
page read and write
6731000
heap
page read and write
1018000
heap
page read and write
8098FFE000
unkown
page readonly
6E40000
direct allocation
page execute and read and write
15DE000
stack
page read and write
1010000
heap
page read and write
2BF000350000
trusted library allocation
page read and write
550000
heap
page read and write
6AE000234000
direct allocation
page read and write
2BF00009F000
trusted library allocation
page read and write
6731000
heap
page read and write
1960002BC000
trusted library allocation
page read and write
6AE000210000
direct allocation
page read and write
6731000
heap
page read and write
1304000
heap
page read and write
6731000
heap
page read and write
2BF000344000
trusted library allocation
page read and write
2BF000CD4000
trusted library allocation
page read and write
2BF000F48000
trusted library allocation
page read and write
6731000
heap
page read and write
1960002BC000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6AE000290000
direct allocation
page read and write
2BF00040C000
trusted library allocation
page read and write
80B3FFE000
unkown
page readonly
6731000
heap
page read and write
2BB4006FC000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000938000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF0002F3000
trusted library allocation
page read and write
2BF0002A4000
trusted library allocation
page read and write
2BF0006C0000
trusted library allocation
page read and write
2BF0004CC000
trusted library allocation
page read and write
2BF000C64000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BB4006CC000
trusted library allocation
page read and write
45D000
stack
page read and write
2BF0002A4000
trusted library allocation
page read and write
80907FB000
stack
page read and write
6731000
heap
page read and write
2BB400430000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF00100C000
trusted library allocation
page read and write
80977FE000
stack
page read and write
1171B000
heap
page read and write
6C6DC000
unkown
page readonly
2BF000FD4000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF0000AC000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6AE000270000
direct allocation
page read and write
1960002E4000
trusted library allocation
page read and write
103E000
stack
page read and write
6E40000
direct allocation
page execute and read and write
6731000
heap
page read and write
12E8000
heap
page read and write
6731000
heap
page read and write
80A1FFE000
unkown
page readonly
2A2E000
stack
page read and write
DAA000
unkown
page readonly
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
71EF000
heap
page read and write
80987FE000
stack
page read and write
DB1000
unkown
page readonly
6731000
heap
page read and write
71D4000
heap
page read and write
2BF000198000
trusted library allocation
page read and write
6731000
heap
page read and write
1F6EA560000
heap
page read and write
196000250000
trusted library allocation
page read and write
6731000
heap
page read and write
DA0000
unkown
page readonly
6731000
heap
page read and write
6731000
heap
page read and write
6720000
direct allocation
page read and write
6731000
heap
page read and write
2BF0002A4000
trusted library allocation
page read and write
2BB40035C000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000EC4000
trusted library allocation
page read and write
2BF0003AB000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6B70000
trusted library allocation
page read and write
18AF000
stack
page read and write
1F6EA483000
heap
page read and write
2BF000218000
trusted library allocation
page read and write
6731000
heap
page read and write
2BB400320000
trusted library allocation
page read and write
1F6EDE51000
heap
page read and write
80AF7FE000
stack
page read and write
2BF000534000
trusted library allocation
page read and write
6731000
heap
page read and write
706C000
heap
page read and write
6720000
direct allocation
page read and write
2BF0009C0000
trusted library allocation
page read and write
7104000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6AE000217000
direct allocation
page read and write
6731000
heap
page read and write
2BF000D0C000
trusted library allocation
page read and write
809BFFE000
unkown
page readonly
6731000
heap
page read and write
2BF00108C000
trusted library allocation
page read and write
6731000
heap
page read and write
1F6EA570000
heap
page read and write
13E4000
heap
page read and write
7109000
heap
page read and write
80A07FC000
stack
page read and write
7218000
heap
page read and write
7009000
heap
page read and write
6731000
heap
page read and write
2BF0000DC000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BB400310000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
49A000
stack
page read and write
2BF000A20000
trusted library allocation
page read and write
11711000
heap
page read and write
2BF000528000
trusted library allocation
page read and write
2BB4007CC000
trusted library allocation
page read and write
2BF000D24000
trusted library allocation
page read and write
134A000
heap
page read and write
6731000
heap
page read and write
2BF000E7C000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000401000
trusted library allocation
page read and write
2BB4006AC000
trusted library allocation
page read and write
6731000
heap
page read and write
2BB400248000
trusted library allocation
page read and write
6731000
heap
page read and write
7001000
heap
page read and write
6731000
heap
page read and write
1F6EDE23000
heap
page read and write
2BB4002D4000
trusted library allocation
page read and write
196000260000
trusted library allocation
page read and write
80B0FFE000
unkown
page readonly
2BB4006E4000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000E24000
trusted library allocation
page read and write
721D000
heap
page read and write
2BF000854000
trusted library allocation
page read and write
80B07FE000
stack
page read and write
6731000
heap
page read and write
2BB400788000
trusted library allocation
page read and write
1F6EDE54000
heap
page read and write
6731000
heap
page read and write
13E4000
heap
page read and write
70B2000
heap
page read and write
6731000
heap
page read and write
138F000
heap
page read and write
1F6F43D7000
unclassified section
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF0001F4000
trusted library allocation
page read and write
7207000
heap
page read and write
710D000
heap
page read and write
318B000
heap
page read and write
318E000
heap
page read and write
6731000
heap
page read and write
6A326000
direct allocation
page read and write
6731000
heap
page read and write
13A1000
heap
page read and write
2BF0000FC000
trusted library allocation
page read and write
720E000
heap
page read and write
80897EF000
stack
page read and write
1F6F3AC3000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF0006F8000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF0005A0000
trusted library allocation
page read and write
2BF001048000
trusted library allocation
page read and write
2BB400404000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
730D000
heap
page read and write
2BB4003EC000
trusted library allocation
page read and write
6731000
heap
page read and write
71EC000
heap
page read and write
1F6F3C03000
trusted library section
page read and write
2BF000CC4000
trusted library allocation
page read and write
2BF00089C000
trusted library allocation
page read and write
80A9FFE000
unkown
page readonly
6731000
heap
page read and write
70CB000
heap
page read and write
6731000
heap
page read and write
6C5B0000
unkown
page readonly
707B000
heap
page read and write
7107000
heap
page read and write
59F000
unkown
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6EDECE000
heap
page read and write
2BF000AF4000
trusted library allocation
page read and write
80AFFFE000
unkown
page readonly
7106000
heap
page read and write
92A000
heap
page read and write
7105000
heap
page read and write
6731000
heap
page read and write
6AE000201000
direct allocation
page read and write
2BF0004AC000
trusted library allocation
page read and write
80B2FFE000
unkown
page readonly
DA0000
unkown
page readonly
6731000
heap
page read and write
80B7FFE000
unkown
page readonly
731D000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF0001D4000
trusted library allocation
page read and write
729C000
heap
page read and write
6AE00023C000
direct allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BB400614000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF0001D8000
trusted library allocation
page read and write
2BB400330000
trusted library allocation
page read and write
2BF00049C000
trusted library allocation
page read and write
2BF000EF8000
trusted library allocation
page read and write
2BF0005B0000
trusted library allocation
page read and write
6AE0002D0000
direct allocation
page read and write
DAA000
unkown
page readonly
6731000
heap
page read and write
71CF000
heap
page read and write
6731000
heap
page read and write
1F6EDE95000
heap
page read and write
6731000
heap
page read and write
2BF000A34000
trusted library allocation
page read and write
706C000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6A31B000
direct allocation
page read and write
2BF0004BC000
trusted library allocation
page read and write
2BB400668000
trusted library allocation
page read and write
2BB400368000
trusted library allocation
page read and write
709A000
heap
page read and write
6731000
heap
page read and write
7100000
heap
page read and write
1F6EDECA000
heap
page read and write
2BB400320000
trusted library allocation
page read and write
2BF000330000
trusted library allocation
page read and write
71E2000
heap
page read and write
2BF000D00000
trusted library allocation
page read and write
2BF000D14000
trusted library allocation
page read and write
6731000
heap
page read and write
2BB400408000
trusted library allocation
page read and write
7191000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1385000
heap
page read and write
1F6EDEA5000
heap
page read and write
DB1000
unkown
page readonly
6731000
heap
page read and write
2BF0003A8000
trusted library allocation
page read and write
1318000
heap
page read and write
707B000
heap
page read and write
2BF000F8C000
trusted library allocation
page read and write
1F6F3D90000
trusted library section
page read and write
6731000
heap
page read and write
2BF000C84000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000304000
trusted library allocation
page read and write
2BB400310000
trusted library allocation
page read and write
6731000
heap
page read and write
808AFFE000
unkown
page readonly
6731000
heap
page read and write
6731000
heap
page read and write
17DF000
stack
page read and write
6731000
heap
page read and write
1F6ED8AE000
heap
page read and write
7019000
heap
page read and write
1365000
heap
page read and write
2BF000988000
trusted library allocation
page read and write
2BF0001F8000
trusted library allocation
page read and write
1960002A0000
trusted library allocation
page read and write
6731000
heap
page read and write
196000230000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF001138000
trusted library allocation
page read and write
71D2000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BB400348000
trusted library allocation
page read and write
2BF000E01000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000A13000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000D2C000
trusted library allocation
page read and write
2BB40060C000
trusted library allocation
page read and write
1F6EDEA5000
heap
page read and write
2BF0004BC000
trusted library allocation
page read and write
710B000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000350000
trusted library allocation
page read and write
809D7FE000
stack
page read and write
80A0FFE000
unkown
page readonly
6731000
heap
page read and write
6731000
heap
page read and write
70CB000
heap
page read and write
6731000
heap
page read and write
13FC000
stack
page read and write
2BF0001E0000
trusted library allocation
page read and write
71D9000
heap
page read and write
6731000
heap
page read and write
1F6F3BC2000
trusted library section
page read and write
2BF0003B4000
trusted library allocation
page read and write
2BB400238000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BB4007C8000
trusted library allocation
page read and write
DA1000
unkown
page execute read
2BF000E0C000
trusted library allocation
page read and write
1171B000
heap
page read and write
6731000
heap
page read and write
2BF000190000
trusted library allocation
page read and write
6731000
heap
page read and write
2BB4006B4000
trusted library allocation
page read and write
70A8000
heap
page read and write
710D000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF00062C000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
80A27FB000
stack
page read and write
1F6ED980000
trusted library section
page readonly
2BF00117C000
trusted library allocation
page read and write
2BF000D5C000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6EDEBB000
heap
page read and write
2BF0006D8000
trusted library allocation
page read and write
2BB4006B8000
trusted library allocation
page read and write
2BF0005D4000
trusted library allocation
page read and write
6731000
heap
page read and write
1F6F3BCE000
trusted library section
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF0007E8000
trusted library allocation
page read and write
2BF000801000
trusted library allocation
page read and write
6731000
heap
page read and write
6E40000
direct allocation
page execute and read and write
6731000
heap
page read and write
71A8000
heap
page read and write
2BB400630000
trusted library allocation
page read and write
1960002A0000
trusted library allocation
page read and write
2BF000328000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6F488E000
trusted library section
page read and write
6731000
heap
page read and write
2BF000E18000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000ED0000
trusted library allocation
page read and write
2BB400288000
trusted library allocation
page read and write
2BF00006C000
trusted library allocation
page read and write
7101000
heap
page read and write
2BF000C01000
trusted library allocation
page read and write
72C9000
direct allocation
page read and write
2BF000E3E000
trusted library allocation
page read and write
80A37FC000
stack
page read and write
2BF000E88000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000F64000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000BB8000
trusted library allocation
page read and write
2BF000D74000
trusted library allocation
page read and write
6731000
heap
page read and write
11714000
heap
page read and write
6731000
heap
page read and write
2BF000268000
trusted library allocation
page read and write
DAA000
unkown
page readonly
1140000
heap
page read and write
2BF0001B4000
trusted library allocation
page read and write
2BF001068000
trusted library allocation
page read and write
2BF000F28000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000A4C000
trusted library allocation
page read and write
150F000
stack
page read and write
135A000
heap
page read and write
6731000
heap
page read and write
808B7FE000
stack
page read and write
6731000
heap
page read and write
DA0000
unkown
page readonly
2BF000344000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000A80000
trusted library allocation
page read and write
6E40000
direct allocation
page execute and read and write
2BF000350000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000D14000
trusted library allocation
page read and write
80A97FB000
stack
page read and write
6720000
direct allocation
page read and write
2BB4002E4000
trusted library allocation
page read and write
7218000
heap
page read and write
1143A000
heap
page read and write
7101000
heap
page read and write
6731000
heap
page read and write
1F6F4407000
unclassified section
page read and write
6731000
heap
page read and write
70AF000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1372000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
80ACFFE000
unkown
page readonly
2BB400320000
trusted library allocation
page read and write
2BF000EDC000
trusted library allocation
page read and write
2BF000D68000
trusted library allocation
page read and write
2BB400330000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
7190000
heap
page read and write
1960002C0000
trusted library allocation
page read and write
809AFFE000
unkown
page readonly
2BB400320000
trusted library allocation
page read and write
6E40000
direct allocation
page execute and read and write
2BF0002A4000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
70C6000
heap
page read and write
710F000
heap
page read and write
2BB40069C000
trusted library allocation
page read and write
80B1FFE000
unkown
page readonly
2BB400374000
trusted library allocation
page read and write
2BF001150000
trusted library allocation
page read and write
6731000
heap
page read and write
DAE000
unkown
page write copy
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
DA1000
unkown
page execute read
DAE000
unkown
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000CB4000
trusted library allocation
page read and write
6731000
heap
page read and write
7001000
heap
page read and write
2BF000A64000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
7088000
heap
page read and write
6731000
heap
page read and write
71D2000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
80937FB000
stack
page read and write
13E4000
heap
page read and write
196000270000
trusted library allocation
page read and write
6731000
heap
page read and write
7104000
heap
page read and write
6731000
heap
page read and write
DA1000
unkown
page execute read
1F6EDE34000
heap
page read and write
196000294000
trusted library allocation
page read and write
6731000
heap
page read and write
6BC0000
direct allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
7104000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF00033C000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000734000
trusted library allocation
page read and write
13E4000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
300000
heap
page read and write
69CC0000
direct allocation
page read and write
80A3FFE000
unkown
page readonly
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
DAE000
unkown
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
80A17FC000
stack
page read and write
2BF000AD0000
trusted library allocation
page read and write
2BF000290000
trusted library allocation
page read and write
2BF000380000
trusted library allocation
page read and write
196000220000
trusted library allocation
page read and write
134C000
heap
page read and write
2BF00100C000
trusted library allocation
page read and write
6731000
heap
page read and write
1F3F000
stack
page read and write
6731000
heap
page read and write
2BF000AA4000
trusted library allocation
page read and write
6731000
heap
page read and write
318B000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
FFE000
stack
page read and write
6731000
heap
page read and write
2BF000601000
trusted library allocation
page read and write
6731000
heap
page read and write
7104000
heap
page read and write
DA1000
unkown
page execute read
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6EDE56000
heap
page read and write
6731000
heap
page read and write
706C000
heap
page read and write
DA0000
unkown
page readonly
2BB400220000
trusted library allocation
page read and write
196000264000
trusted library allocation
page read and write
6731000
heap
page read and write
170000
unkown
page readonly
6731000
heap
page read and write
171000
unkown
page execute and read and write
1290000
heap
page read and write
6731000
heap
page read and write
1F6EDECC000
heap
page read and write
6731000
heap
page read and write
2BF000E70000
trusted library allocation
page read and write
2BB400401000
trusted library allocation
page read and write
2BF000F78000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000C8C000
trusted library allocation
page read and write
92E000
heap
page read and write
6AE000250000
direct allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF0002F0000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
7587000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6720000
direct allocation
page read and write
6731000
heap
page read and write
6E40000
direct allocation
page execute and read and write
6731000
heap
page read and write
2BF000344000
trusted library allocation
page read and write
2BB400694000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000DF8000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
28FB000
heap
page read and write
7071000
heap
page read and write
2BF000F10000
trusted library allocation
page read and write
6731000
heap
page read and write
707C000
heap
page read and write
2BF00033C000
trusted library allocation
page read and write
2BF00033C000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF0002C4000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6EDE9C000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
DAE000
unkown
page read and write
6731000
heap
page read and write
809B7FE000
stack
page read and write
2BF001001000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1366000
heap
page read and write
7100000
heap
page read and write
6731000
heap
page read and write
2BF00091C000
trusted library allocation
page read and write
2BF000350000
trusted library allocation
page read and write
2BF000C64000
trusted library allocation
page read and write
6731000
heap
page read and write
70A2000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
DA0000
unkown
page readonly
6731000
heap
page read and write
6E10000
direct allocation
page execute and read and write
2BF000A5C000
trusted library allocation
page read and write
1F6EDE87000
heap
page read and write
2BF000B4C000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF0002A4000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000394000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000904000
trusted library allocation
page read and write
1F6EDE42000
heap
page read and write
2BF000C0C000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF0006F8000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
13A1000
heap
page read and write
2BF000214000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6EDE55000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
71E2000
heap
page read and write
71B0000
heap
page read and write
2BB40039C000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BB400664000
trusted library allocation
page read and write
2BF00071A000
trusted library allocation
page read and write
6731000
heap
page read and write
1F6EA48B000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF0008B7000
trusted library allocation
page read and write
6731000
heap
page read and write
6E40000
direct allocation
page execute and read and write
6731000
heap
page read and write
2BF000FD4000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
71F0000
heap
page read and write
1F6EA360000
heap
page readonly
809FFFE000
unkown
page readonly
6731000
heap
page read and write
FBC000
stack
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6F1C00000
heap
page read and write
709A000
heap
page read and write
2BF00079A000
trusted library allocation
page read and write
6C68D000
unkown
page read and write
6731000
heap
page read and write
2BF000BC4000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF0010DC000
trusted library allocation
page read and write
7071000
heap
page read and write
79BF000
heap
page read and write
80B8FFE000
unkown
page readonly
2BF000EA4000
trusted library allocation
page read and write
2BF0006F8000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000454000
trusted library allocation
page read and write
6731000
heap
page read and write
1F6ED880000
heap
page read and write
1F6ED8B6000
heap
page read and write
6C6D9000
unkown
page read and write
80ADFFE000
unkown
page readonly
170000
unkown
page read and write
6731000
heap
page read and write
2BF000380000
trusted library allocation
page read and write
920000
heap
page read and write
721B000
heap
page read and write
6731000
heap
page read and write
2BF0001CC000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000F1C000
trusted library allocation
page read and write
DAA000
unkown
page readonly
6731000
heap
page read and write
6731000
heap
page read and write
1318000
heap
page read and write
2BF0002F0000
trusted library allocation
page read and write
2BF0009B4000
trusted library allocation
page read and write
7107000
heap
page read and write
6731000
heap
page read and write
1F6EDE51000
heap
page read and write
DA1000
unkown
page execute read
6731000
heap
page read and write
2BF0004BC000
trusted library allocation
page read and write
2BF000480000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF001168000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000364000
trusted library allocation
page read and write
6731000
heap
page read and write
2BB4006D4000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
DB1000
unkown
page readonly
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
80B97FE000
stack
page read and write
6731000
heap
page read and write
2BB400424000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1960002F4000
trusted library allocation
page read and write
6731000
heap
page read and write
1F6EDEC6000
heap
page read and write
6731000
heap
page read and write
1F6EDE87000
heap
page read and write
6731000
heap
page read and write
710F000
heap
page read and write
2BF00033C000
trusted library allocation
page read and write
80927FE000
stack
page read and write
2BF000DA0000
trusted library allocation
page read and write
708C000
heap
page read and write
6731000
heap
page read and write
2BF000E48000
trusted library allocation
page read and write
2BF000201000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6EA3A7000
heap
page read and write
2BF000EEC000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
7108000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
7001000
heap
page read and write
6731000
heap
page read and write
6A5BE000
direct allocation
page read and write
6731000
heap
page read and write
2BF000720000
trusted library allocation
page read and write
808FFFE000
unkown
page readonly
6F40000
heap
page read and write
2BF000A20000
trusted library allocation
page read and write
6731000
heap
page read and write
80A87FD000
stack
page read and write
80967FA000
stack
page read and write
6C6D8000
unkown
page readonly
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000D64000
trusted library allocation
page read and write
6731000
heap
page read and write
2BB400784000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
8099FFE000
unkown
page readonly
11927000
heap
page read and write
6731000
heap
page read and write
2BB400758000
trusted library allocation
page read and write
71CF000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF0005E8000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6F3FA0000
trusted library section
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BB400704000
trusted library allocation
page read and write
DAE000
unkown
page write copy
13A1000
heap
page read and write
13E4000
heap
page read and write
6731000
heap
page read and write
2BF0006B4000
trusted library allocation
page read and write
2BF000060000
trusted library allocation
page read and write
2BF000790000
trusted library allocation
page read and write
FBC000
stack
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
3A0000
heap
page read and write
72CB000
direct allocation
page read and write
1F6EDEC8000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
72D5000
heap
page read and write
2BF000DD4000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
71EA000
heap
page read and write
19F0000
heap
page read and write
120BF000
heap
page read and write
2BF000AFC000
trusted library allocation
page read and write
1F6EA444000
heap
page read and write
2BF000344000
trusted library allocation
page read and write
134D000
heap
page read and write
1F6EDE34000
heap
page read and write
6731000
heap
page read and write
1381000
heap
page read and write
2BF0007AC000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000454000
trusted library allocation
page read and write
6731000
heap
page read and write
DB1000
unkown
page readonly
6731000
heap
page read and write
71D8000
heap
page read and write
2BF0004BC000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000F7C000
trusted library allocation
page read and write
2BF0006F4000
trusted library allocation
page read and write
6731000
heap
page read and write
70BB000
heap
page read and write
7277000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
12F8000
heap
page read and write
2BF00021C000
trusted library allocation
page read and write
1F6EDE53000
heap
page read and write
1F6F21D2000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000715000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000E38000
trusted library allocation
page read and write
2BF000F9C000
trusted library allocation
page read and write
6731000
heap
page read and write
14E7000
heap
page read and write
80B67FE000
stack
page read and write
6A309000
direct allocation
page read and write
809F7FB000
stack
page read and write
2BF000134000
trusted library allocation
page read and write
6720000
direct allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1960002C8000
trusted library allocation
page read and write
706C000
heap
page read and write
2BF001188000
trusted library allocation
page read and write
6731000
heap
page read and write
80B87FE000
stack
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
80B17FE000
stack
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF00097C000
trusted library allocation
page read and write
6720000
direct allocation
page read and write
2BB400750000
trusted library allocation
page read and write
6E40000
direct allocation
page execute and read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6EDE06000
heap
page read and write
2BF000304000
trusted library allocation
page read and write
2BF000DAC000
trusted library allocation
page read and write
6AE000284000
direct allocation
page read and write
54E000
unkown
page read and write
13E4000
heap
page read and write
130E000
heap
page read and write
1318000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000AB4000
trusted library allocation
page read and write
2BF000A01000
trusted library allocation
page read and write
7106000
heap
page read and write
2BF000654000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
7205000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
80B4FFE000
unkown
page readonly
6731000
heap
page read and write
6731000
heap
page read and write
6AE00024C000
direct allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF0001E4000
trusted library allocation
page read and write
2BB400354000
trusted library allocation
page read and write
1F6F45D6000
trusted library section
page read and write
2BB400640000
trusted library allocation
page read and write
2BF00060C000
trusted library allocation
page read and write
7172000
direct allocation
page read and write
6720000
direct allocation
page read and write
6731000
heap
page read and write
2BF00092C000
trusted library allocation
page read and write
6731000
heap
page read and write
1F6F3D50000
trusted library section
page read and write
6731000
heap
page read and write
2BF000EDC000
trusted library allocation
page read and write
1F6EA47D000
heap
page read and write
143E000
stack
page read and write
2BF000EC4000
trusted library allocation
page read and write
6731000
heap
page read and write
C3C000
stack
page read and write
2BB400610000
trusted library allocation
page read and write
1F6F3C82000
trusted library section
page read and write
7218000
heap
page read and write
6E20000
direct allocation
page execute and read and write
6731000
heap
page read and write
80B5FFE000
unkown
page readonly
6731000
heap
page read and write
6731000
heap
page read and write
6AE00025C000
direct allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000B74000
trusted library allocation
page read and write
6731000
heap
page read and write
13E4000
heap
page read and write
1F6EA380000
trusted library allocation
page read and write
6731000
heap
page read and write
FD0000
heap
page read and write
1960002BC000
trusted library allocation
page read and write
1309000
heap
page read and write
2BF0008A4000
trusted library allocation
page read and write
6A6EE000
direct allocation
page read and write
1F6ECAA0000
unkown
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6EDE56000
heap
page read and write
1F6F1C03000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000504000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2DC000
stack
page read and write
2BB400754000
trusted library allocation
page read and write
6731000
heap
page read and write
1F6EDEC6000
heap
page read and write
7108000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF0007D8000
trusted library allocation
page read and write
1F6EDE54000
heap
page read and write
6731000
heap
page read and write
6AE0002EC000
direct allocation
page read and write
7106000
heap
page read and write
2BB4006C4000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000F54000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
D90000
heap
page read and write
6731000
heap
page read and write
2BB400648000
trusted library allocation
page read and write
80B77FE000
stack
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BB400730000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6AE0002A8000
direct allocation
page read and write
720C000
heap
page read and write
80947FB000
stack
page read and write
2BB400230000
trusted library allocation
page read and write
1F6EDF00000
trusted library section
page read and write
6731000
heap
page read and write
2BF00033C000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000228000
trusted library allocation
page read and write
2BB400760000
trusted library allocation
page read and write
1F6EDEBB000
heap
page read and write
2BF000454000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
DA1000
unkown
page execute read
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
11710000
heap
page read and write
6731000
heap
page read and write
14BE000
stack
page read and write
6731000
heap
page read and write
707C000
heap
page read and write
6731000
heap
page read and write
80A7FFE000
unkown
page readonly
6731000
heap
page read and write
6731000
heap
page read and write
1F6F4630000
trusted library section
page read and write
1F6EDE9C000
heap
page read and write
7FC000
stack
page read and write
7107000
heap
page read and write
6731000
heap
page read and write
1F6EDE99000
heap
page read and write
6731000
heap
page read and write
2BB4006E0000
trusted library allocation
page read and write
6731000
heap
page read and write
6BC0000
direct allocation
page read and write
6731000
heap
page read and write
13E4000
heap
page read and write
8092FFE000
unkown
page readonly
2BF00022C000
trusted library allocation
page read and write
130E000
stack
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BB40033C000
trusted library allocation
page read and write
CA0000
heap
page read and write
2BF000F6C000
trusted library allocation
page read and write
1F6EA563000
heap
page read and write
DA0000
unkown
page readonly
11711000
heap
page read and write
808F7FD000
stack
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
138D000
heap
page read and write
7101000
heap
page read and write
12E0000
heap
page read and write
6731000
heap
page read and write
6AE00026C000
direct allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
7254000
heap
page read and write
2BB400698000
trusted library allocation
page read and write
71CB000
heap
page read and write
6731000
heap
page read and write
2BB400368000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
CB0000
heap
page read and write
6731000
heap
page read and write
2BB400658000
trusted library allocation
page read and write
2BB400684000
trusted library allocation
page read and write
2BF000ED0000
trusted library allocation
page read and write
1F6EE157000
unclassified section
page read and write
2BF000ED0000
trusted library allocation
page read and write
1F6EDEB3000
heap
page read and write
13E4000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF0007A0000
trusted library allocation
page read and write
6A321000
direct allocation
page read and write
1F6EDEFE000
heap
page read and write
706F000
heap
page read and write
2BF0001EC000
trusted library allocation
page read and write
2BF0009EC000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000CF4000
trusted library allocation
page read and write
1F6F44CE000
trusted library section
page read and write
710F000
heap
page read and write
6731000
heap
page read and write
1F6EDE99000
heap
page read and write
80A6FFE000
unkown
page readonly
2BF0006F8000
trusted library allocation
page read and write
80B47FE000
stack
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
69CC1000
direct allocation
page execute read
6731000
heap
page read and write
DA0000
unkown
page readonly
6731000
heap
page read and write
706C000
heap
page read and write
2BF0009A8000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000350000
trusted library allocation
page read and write
6731000
heap
page read and write
1F6EA575000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000ED0000
trusted library allocation
page read and write
70B8000
heap
page read and write
6A629000
direct allocation
page readonly
6731000
heap
page read and write
13A1000
heap
page read and write
6731000
heap
page read and write
2BF000EBC000
trusted library allocation
page read and write
1F6F3B97000
unclassified section
page read and write
7205000
heap
page read and write
1366000
heap
page read and write
6A310000
direct allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6F4533000
trusted library section
page read and write
1F6EDE0C000
heap
page read and write
2BF0003A5000
trusted library allocation
page read and write
12ED000
heap
page read and write
6731000
heap
page read and write
1960002BD000
trusted library allocation
page read and write
C04000
unkown
page execute and write copy
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BB4007B4000
trusted library allocation
page read and write
71E4000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6EDE20000
heap
page read and write
6731000
heap
page read and write
1F6EA460000
heap
page read and write
2BF00082D000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000BD0000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
7109000
heap
page read and write
80957FC000
stack
page read and write
7107000
heap
page read and write
6AE000215000
direct allocation
page read and write
6731000
heap
page read and write
8093FFE000
unkown
page readonly
6731000
heap
page read and write
6731000
heap
page read and write
2BF000220000
trusted library allocation
page read and write
2BF00074C000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6EA483000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
71D9000
heap
page read and write
6731000
heap
page read and write
2BB40025C000
trusted library allocation
page read and write
1F6F1E70000
trusted library allocation
page read and write
2BF000ED0000
trusted library allocation
page read and write
7001000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BB4002FC000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
F6C000
stack
page read and write
7103000
heap
page read and write
6731000
heap
page read and write
DAA000
unkown
page readonly
6720000
direct allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6E40000
direct allocation
page execute and read and write
6731000
heap
page read and write
2BB400390000
trusted library allocation
page read and write
6A6F3000
direct allocation
page read and write
2BB400724000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000FE0000
trusted library allocation
page read and write
2BF000350000
trusted library allocation
page read and write
6731000
heap
page read and write
1F6ED8A9000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF0001B4000
trusted library allocation
page read and write
6731000
heap
page read and write
2BB400380000
trusted library allocation
page read and write
6AE0002DC000
direct allocation
page read and write
2BF000350000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6F4521000
trusted library section
page read and write
2BF000770000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF001048000
trusted library allocation
page read and write
2BF000FE0000
trusted library allocation
page read and write
1F6EDECE000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
80AD7FE000
stack
page read and write
1F6F4670000
trusted library section
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000FE0000
trusted library allocation
page read and write
2BF0006A0000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BB400688000
trusted library allocation
page read and write
2BF0002A4000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BB400201000
trusted library allocation
page read and write
70BE000
heap
page read and write
80B27FE000
stack
page read and write
6731000
heap
page read and write
2BF0002A4000
trusted library allocation
page read and write
2BF001201000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF0010E4000
trusted library allocation
page read and write
2BF000E98000
trusted library allocation
page read and write
6731000
heap
page read and write
11713000
heap
page read and write
2BB400734000
trusted library allocation
page read and write
1F6F41D0000
trusted library section
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
DB1000
unkown
page readonly
2BB400620000
trusted library allocation
page read and write
2BB4002CC000
trusted library allocation
page read and write
709C000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BB400601000
trusted library allocation
page read and write
1F6EDE00000
heap
page read and write
2BF0002FB000
trusted library allocation
page read and write
6731000
heap
page read and write
1F6F4490000
trusted library section
page read and write
1960002F8000
trusted library allocation
page read and write
6731000
heap
page read and write
6F4A000
heap
page read and write
72A9000
heap
page read and write
2BF00120C000
trusted library allocation
page read and write
6E40000
direct allocation
page execute and read and write
2BF00054C000
trusted library allocation
page read and write
1F6F1C08000
heap
page read and write
6731000
heap
page read and write
6AE000220000
direct allocation
page read and write
11720000
heap
page read and write
6731000
heap
page read and write
1F6F3AC0000
heap
page read and write
6731000
heap
page read and write
6720000
direct allocation
page read and write
2BF000FD4000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
13A1000
heap
page read and write
7206000
heap
page read and write
6731000
heap
page read and write
7338000
heap
page read and write
6731000
heap
page read and write
7231000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF0010FC000
trusted library allocation
page read and write
1171B000
heap
page read and write
6731000
heap
page read and write
2BF00035C000
trusted library allocation
page read and write
6731000
heap
page read and write
1F6EDEB1000
heap
page read and write
2BB4007D0000
trusted library allocation
page read and write
1F6F44C2000
trusted library section
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF0010EC000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6E40000
direct allocation
page execute and read and write
6731000
heap
page read and write
2BF000454000
trusted library allocation
page read and write
6731000
heap
page read and write
2BB40075C000
trusted library allocation
page read and write
DA1000
unkown
page execute read
6731000
heap
page read and write
6720000
direct allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6EA39B000
heap
page read and write
DAE000
unkown
page write copy
6731000
heap
page read and write
2BF000350000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000EAC000
trusted library allocation
page read and write
80AAFFE000
unkown
page readonly
6E40000
direct allocation
page execute and read and write
80A67FB000
stack
page read and write
2BB400210000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF00040C000
trusted library allocation
page read and write
2BF000B3C000
trusted library allocation
page read and write
6731000
heap
page read and write
1F6EDE95000
heap
page read and write
6731000
heap
page read and write
6A6F8000
direct allocation
page read and write
2BF000B58000
trusted library allocation
page read and write
5A0000
heap
page read and write
943B000
heap
page read and write
6731000
heap
page read and write
71CA000
heap
page read and write
DB1000
unkown
page readonly
2BF00008F000
trusted library allocation
page read and write
13E4000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6E40000
direct allocation
page execute and read and write
6731000
heap
page read and write
6731000
heap
page read and write
DAE000
unkown
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
809C7FE000
stack
page read and write
FC0000
heap
page read and write
2BF001030000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF00020C000
trusted library allocation
page read and write
72C9000
heap
page read and write
6731000
heap
page read and write
1F6EDE48000
heap
page read and write
1F6EA487000
heap
page read and write
6720000
direct allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
196000238000
trusted library allocation
page read and write
1960002A0000
trusted library allocation
page read and write
12087000
heap
page read and write
2BF000F8C000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF0004BC000
trusted library allocation
page read and write
1F6EDEC3000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF00031C000
trusted library allocation
page read and write
2A6F000
stack
page read and write
2BF000690000
trusted library allocation
page read and write
2BF000310000
trusted library allocation
page read and write
6731000
heap
page read and write
1F6ED8C0000
heap
page read and write
2BF00015C000
trusted library allocation
page read and write
6731000
heap
page read and write
809DFFE000
unkown
page readonly
80AE7FE000
stack
page read and write
1960002F0000
trusted library allocation
page read and write
6731000
heap
page read and write
C60000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BB4006D0000
trusted library allocation
page read and write
6731000
heap
page read and write
135A000
heap
page read and write
2BF000DBC000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6F4500000
trusted library section
page read and write
D80000
heap
page read and write
7099000
heap
page read and write
2BB40033C000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BB400418000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
196000248000
trusted library allocation
page read and write
71F2000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6ED8C0000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
DAA000
unkown
page readonly
1F6EDDB0000
trusted library section
page read and write
2BF000350000
trusted library allocation
page read and write
709A000
heap
page read and write
1F6F4880000
trusted library section
page read and write
CAE000
stack
page read and write
7103000
heap
page read and write
71BF000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6EDED6000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BB40035C000
trusted library allocation
page read and write
1F6EDE1E000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6720000
direct allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000234000
trusted library allocation
page read and write
80917FA000
stack
page read and write
2BF0002D0000
trusted library allocation
page read and write
1960002D8000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000F6C000
trusted library allocation
page read and write
80AA7FE000
stack
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BB4002F0000
trusted library allocation
page read and write
6731000
heap
page read and write
2BB400744000
trusted library allocation
page read and write
6731000
heap
page read and write
6C68F000
unkown
page readonly
808E7FE000
stack
page read and write
1F6EA390000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000640000
trusted library allocation
page read and write
1171B000
heap
page read and write
6731000
heap
page read and write
809EFFE000
unkown
page readonly
2BF000768000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6C5B1000
unkown
page execute read
6731000
heap
page read and write
1960002BC000
trusted library allocation
page read and write
1F6EA48B000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000ED0000
trusted library allocation
page read and write
2BF000E30000
trusted library allocation
page read and write
6731000
heap
page read and write
7101000
heap
page read and write
6731000
heap
page read and write
2BB40080C000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000C68000
trusted library allocation
page read and write
2BB400330000
trusted library allocation
page read and write
1F6EA466000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
71B7000
heap
page read and write
706B000
heap
page read and write
6720000
direct allocation
page read and write
1F6F3C8D000
trusted library section
page read and write
1F6F3D26000
trusted library section
page read and write
1F6EDE51000
heap
page read and write
707C000
heap
page read and write
2BB400644000
trusted library allocation
page read and write
2BF0000EC000
trusted library allocation
page read and write
1960002BC000
trusted library allocation
page read and write
1F6EA466000
heap
page read and write
6731000
heap
page read and write
2BF0001AC000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1F6EDECA000
heap
page read and write
1F6EA4D0000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000948000
trusted library allocation
page read and write
80AEFFE000
unkown
page readonly
1171B000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1960002A0000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BB4006B0000
trusted library allocation
page read and write
1F6F1C1E000
heap
page read and write
6731000
heap
page read and write
809A7FE000
stack
page read and write
500000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
1302000
heap
page read and write
1960002C0000
trusted library allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000EAC000
trusted library allocation
page read and write
8097FFE000
unkown
page readonly
DA1000
unkown
page execute read
2BB4002B0000
trusted library allocation
page read and write
6731000
heap
page read and write
7081000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
710F000
heap
page read and write
7077000
heap
page read and write
6731000
heap
page read and write
2BF000C78000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF000D94000
trusted library allocation
page read and write
6731000
heap
page read and write
1F6EDEEC000
heap
page read and write
1F6EDEB7000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000780000
trusted library allocation
page read and write
2BF0002A8000
trusted library allocation
page read and write
7105000
heap
page read and write
2BF0001E8000
trusted library allocation
page read and write
6AE000280000
direct allocation
page read and write
2BF0008D0000
trusted library allocation
page read and write
6731000
heap
page read and write
2BF00033C000
trusted library allocation
page read and write
6731000
heap
page read and write
6A2FF000
direct allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF0004BC000
trusted library allocation
page read and write
1171B000
heap
page read and write
1F6F44A1000
trusted library section
page read and write
6731000
heap
page read and write
7107000
heap
page read and write
13A0000
heap
page read and write
809CFFE000
unkown
page readonly
80A47FC000
stack
page read and write
6731000
heap
page read and write
6720000
direct allocation
page read and write
1F6ED8B3000
heap
page read and write
80A2FFE000
unkown
page readonly
1F6EA429000
heap
page read and write
6731000
heap
page read and write
69FB4000
direct allocation
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000E58000
trusted library allocation
page read and write
1F6EDE48000
heap
page read and write
72ED000
heap
page read and write
80B57FC000
stack
page read and write
2BF000098000
trusted library allocation
page read and write
7086000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
2BF000FAC000
trusted library allocation
page read and write
6731000
heap
page read and write
80B6FFE000
unkown
page readonly
6E40000
direct allocation
page execute and read and write
6731000
heap
page read and write
2BF0008C4000
trusted library allocation
page read and write
71C6000
heap
page read and write
2BB400700000
trusted library allocation
page read and write
There are 2100 hidden memdumps, click here to show them.