IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_5c68b29bb6b465bad180a68d35c62438a01da7_fff46f69_ec5e8cc4-da29-4dcd-9f55-dbe6e1ad8662\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER20B3.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Nov 30 04:01:55 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER222B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER22B9.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\rnCMinwLHbrEjcomyVjl.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 --field-trial-handle=2340,i,1016166225095006826,12192068235695981454,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 1844
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
http://home.fvtekx5pt.top/RrlNvinfLqYZQoxgChZr17
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://crbug.com/368855.)
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
https://www.google.com/speech-api/v2/synthesize?
unknown
http://unisolated.invalid/
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/35862
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
http://home.fvtekx5pt.top/RrlNvinfLqYZQoxgChZr1732768478
141.8.197.146
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://httpbin.org/ipbefore
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://unisolated.invalid/a
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
https://google-ohttp-relay-join.fastly-edge.com/hj
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
http://anglebug.com/4937
unknown
https://issuetracker.google.com/166809097
unknown
http://issuetracker.google.com/200067929
unknown
https://lens.google.com/v3/2
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fvtekx5pt.top
141.8.197.146
www.google.com
142.250.181.100
httpbin.org
18.208.8.205
home.fvtekx5pt.top
141.8.197.146

IPs

IP
Domain
Country
Malicious
18.208.8.205
httpbin.org
United States
239.255.255.250
unknown
Reserved
141.8.197.146
fvtekx5pt.top
Russian Federation
127.0.0.1
unknown
unknown
142.250.181.100
www.google.com
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{cab63a25-d8ca-7478-a506-524a988ffc9a}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
malicious
\REGISTRY\A\{cab63a25-d8ca-7478-a506-524a988ffc9a}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
malicious
\REGISTRY\A\{cab63a25-d8ca-7478-a506-524a988ffc9a}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
malicious
\REGISTRY\A\{cab63a25-d8ca-7478-a506-524a988ffc9a}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
malicious
\REGISTRY\A\{cab63a25-d8ca-7478-a506-524a988ffc9a}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
malicious
\REGISTRY\A\{cab63a25-d8ca-7478-a506-524a988ffc9a}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
malicious
\REGISTRY\A\{cab63a25-d8ca-7478-a506-524a988ffc9a}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
malicious
\REGISTRY\A\{cab63a25-d8ca-7478-a506-524a988ffc9a}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
malicious
\REGISTRY\A\{cab63a25-d8ca-7478-a506-524a988ffc9a}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
malicious
\REGISTRY\A\{cab63a25-d8ca-7478-a506-524a988ffc9a}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
malicious
\REGISTRY\A\{cab63a25-d8ca-7478-a506-524a988ffc9a}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
malicious
\REGISTRY\A\{cab63a25-d8ca-7478-a506-524a988ffc9a}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
malicious
\REGISTRY\A\{cab63a25-d8ca-7478-a506-524a988ffc9a}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
malicious
\REGISTRY\A\{cab63a25-d8ca-7478-a506-524a988ffc9a}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
malicious
\REGISTRY\A\{cab63a25-d8ca-7478-a506-524a988ffc9a}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
malicious
\REGISTRY\A\{cab63a25-d8ca-7478-a506-524a988ffc9a}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
malicious
\REGISTRY\A\{cab63a25-d8ca-7478-a506-524a988ffc9a}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
malicious
\REGISTRY\A\{cab63a25-d8ca-7478-a506-524a988ffc9a}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
malicious
\REGISTRY\A\{cab63a25-d8ca-7478-a506-524a988ffc9a}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
73F000408000
trusted library allocation
page read and write
73F000678000
trusted library allocation
page read and write
7BE000CD0000
trusted library allocation
page read and write
18303600000
heap
page read and write
7BE000F78000
trusted library allocation
page read and write
7221000
heap
page read and write
7221000
heap
page read and write
73F0006B4000
trusted library allocation
page read and write
2610002BC000
trusted library allocation
page read and write
8297000
heap
page read and write
73F0007CC000
trusted library allocation
page read and write
7BE000ED8000
trusted library allocation
page read and write
7221000
heap
page read and write
1BD000
stack
page read and write
7BE000CE0000
trusted library allocation
page read and write
38899FE000
unkown
page readonly
18303610000
heap
page read and write
183030C0000
heap
page read and write
7BE0002A4000
trusted library allocation
page read and write
183030C0000
heap
page read and write
38841FE000
unkown
page read and write
7BE00084C000
trusted library allocation
page read and write
B20000
heap
page read and write
183030B4000
heap
page read and write
600000
heap
page read and write
183030C5000
heap
page read and write
7221000
heap
page read and write
18303646000
heap
page read and write
389C1FC000
stack
page read and write
82AC000
heap
page read and write
81F3000
heap
page read and write
1830363B000
heap
page read and write
73F000238000
trusted library allocation
page read and write
19F000270000
direct allocation
page read and write
7BE000CE8000
trusted library allocation
page read and write
183030C0000
heap
page read and write
81FD000
heap
page read and write
73F00080C000
trusted library allocation
page read and write
7BE000290000
trusted library allocation
page read and write
7221000
heap
page read and write
7BE0002FB000
trusted library allocation
page read and write
183030C0000
heap
page read and write
183030C0000
heap
page read and write
73F000364000
trusted library allocation
page read and write
7BE00095C000
trusted library allocation
page read and write
7920000
direct allocation
page execute and read and write
7221000
heap
page read and write
7BE000A4C000
trusted library allocation
page read and write
26100020C000
trusted library allocation
page read and write
183036EF000
heap
page read and write
73F000668000
trusted library allocation
page read and write
211E000
heap
page read and write
7BE000C88000
trusted library allocation
page read and write
7BE000001000
trusted library allocation
page read and write
73F000658000
trusted library allocation
page read and write
7221000
heap
page read and write
76B0000
direct allocation
page read and write
211C000
heap
page read and write
81FC000
heap
page read and write
7221000
heap
page read and write
7BE00035C000
trusted library allocation
page read and write
CFC000
stack
page read and write
183030C0000
heap
page read and write
7A61000
heap
page read and write
DFC000
stack
page read and write
7BE000894000
trusted library allocation
page read and write
71A000
heap
page read and write
7BE0002A4000
trusted library allocation
page read and write
1830362A000
heap
page read and write
7BE000D48000
trusted library allocation
page read and write
18309E6D000
trusted library section
page read and write
183030C0000
heap
page read and write
81FC000
heap
page read and write
7221000
heap
page read and write
81F9000
heap
page read and write
183030CC000
heap
page read and write
7BE000F9C000
trusted library allocation
page read and write
183030B4000
heap
page read and write
7BE000B70000
trusted library allocation
page read and write
7221000
heap
page read and write
183030C0000
heap
page read and write
19A2000
unkown
page execute and write copy
183030B4000
heap
page read and write
38981FE000
stack
page read and write
7BE0001DC000
trusted library allocation
page read and write
18303669000
heap
page read and write
7221000
heap
page read and write
183030AE000
heap
page read and write
83A0000
heap
page read and write
7BE000210000
trusted library allocation
page read and write
2610002BC000
trusted library allocation
page read and write
19F0002A8000
direct allocation
page read and write
183030D0000
heap
page read and write
183030C0000
heap
page read and write
7BE0000E0000
trusted library allocation
page read and write
7BE0005D8000
trusted library allocation
page read and write
73F00060C000
trusted library allocation
page read and write
38A11FB000
stack
page read and write
18301893000
heap
page read and write
7BE0006BC000
trusted library allocation
page read and write
7221000
heap
page read and write
183745F0000
heap
page read and write
7BE0008D4000
trusted library allocation
page read and write
18303300000
heap
page read and write
66E000
stack
page read and write
7221000
heap
page read and write
7BE0002A4000
trusted library allocation
page read and write
1830369B000
heap
page read and write
183022E0000
unkown
page read and write
7221000
heap
page read and write
183030A3000
heap
page read and write
7BE000DF4000
trusted library allocation
page read and write
7221000
heap
page read and write
18303652000
heap
page read and write
18374427000
heap
page read and write
183030C0000
heap
page read and write
73F0002F4000
trusted library allocation
page read and write
2610002F0000
trusted library allocation
page read and write
51000
unkown
page execute read
7BE0006FC000
trusted library allocation
page read and write
51000
unkown
page execute read
7BE00062C000
trusted library allocation
page read and write
183030AE000
heap
page read and write
7BE0007E8000
trusted library allocation
page read and write
7BE0002C4000
trusted library allocation
page read and write
183030C0000
heap
page read and write
2610002C0000
trusted library allocation
page read and write
7940000
direct allocation
page execute and read and write
183030B4000
heap
page read and write
7221000
heap
page read and write
183030C0000
heap
page read and write
183030C0000
heap
page read and write
7BE000A34000
trusted library allocation
page read and write
1830363D000
heap
page read and write
7221000
heap
page read and write
7BE000B10000
trusted library allocation
page read and write
73F0006E8000
trusted library allocation
page read and write
7221000
heap
page read and write
7BE000060000
trusted library allocation
page read and write
7BE0002C0000
trusted library allocation
page read and write
7BE00080C000
trusted library allocation
page read and write
7BE000742000
trusted library allocation
page read and write
6C24F000
unkown
page readonly
7BE0002AA000
trusted library allocation
page read and write
61000
unkown
page readonly
19F0002D0000
direct allocation
page read and write
8375000
heap
page read and write
7BE000D80000
trusted library allocation
page read and write
61000
unkown
page readonly
842D000
heap
page read and write
7BE000690000
trusted library allocation
page read and write
1830309F000
heap
page read and write
7BE000E60000
trusted library allocation
page read and write
183744CD000
heap
page read and write
7221000
heap
page read and write
7BE000918000
trusted library allocation
page read and write
73F000601000
trusted library allocation
page read and write
1830309F000
heap
page read and write
183030AE000
heap
page read and write
183030AE000
heap
page read and write
7BE000FC0000
trusted library allocation
page read and write
183030DA000
heap
page read and write
183030C0000
heap
page read and write
183030B5000
heap
page read and write
38891FD000
stack
page read and write
7BE0001D0000
trusted library allocation
page read and write
7BE000B80000
trusted library allocation
page read and write
7BE0001E0000
trusted library allocation
page read and write
389E9FE000
unkown
page readonly
38AC9FE000
unkown
page readonly
73F00040C000
trusted library allocation
page read and write
7221000
heap
page read and write
7BE00000C000
trusted library allocation
page read and write
1830365E000
heap
page read and write
2040000
direct allocation
page read and write
81F1000
heap
page read and write
183030B5000
heap
page read and write
81F2000
heap
page read and write
7940000
direct allocation
page execute and read and write
7BE000E80000
trusted library allocation
page read and write
7BE000044000
trusted library allocation
page read and write
7221000
heap
page read and write
183030C0000
heap
page read and write
8295000
heap
page read and write
10D0000
heap
page read and write
7221000
heap
page read and write
8394000
heap
page read and write
38871FE000
stack
page read and write
183030A3000
heap
page read and write
7BE0001E4000
trusted library allocation
page read and write
183030D0000
heap
page read and write
7BE0002A4000
trusted library allocation
page read and write
183072E0000
heap
page read and write
210D000
heap
page read and write
388A9FE000
unkown
page readonly
7BE0006F4000
trusted library allocation
page read and write
18303659000
heap
page read and write
1830363D000
heap
page read and write
19F000250000
direct allocation
page read and write
389D9FE000
unkown
page readonly
183030AD000
heap
page read and write
7BE0001C4000
trusted library allocation
page read and write
7BE000801000
trusted library allocation
page read and write
83A7000
heap
page read and write
7221000
heap
page read and write
7BE0002AA000
trusted library allocation
page read and write
7221000
heap
page read and write
73F000390000
trusted library allocation
page read and write
7BE0001AC000
trusted library allocation
page read and write
7BE000E54000
trusted library allocation
page read and write
389F1FC000
stack
page read and write
20F6000
heap
page read and write
7221000
heap
page read and write
7BE00005A000
trusted library allocation
page read and write
1830364D000
heap
page read and write
73F000664000
trusted library allocation
page read and write
261000248000
trusted library allocation
page read and write
183030B4000
heap
page read and write
7221000
heap
page read and write
61000
unkown
page readonly
183030C0000
heap
page read and write
2108000
heap
page read and write
7221000
heap
page read and write
183030AA000
heap
page read and write
790000
heap
page read and write
18303662000
heap
page read and write
124A000
heap
page read and write
81F3000
heap
page read and write
7930000
direct allocation
page execute and read and write
F8E000
stack
page read and write
7221000
heap
page read and write
7BE0008E8000
trusted library allocation
page read and write
81F2000
heap
page read and write
7BE000401000
trusted library allocation
page read and write
183030C5000
heap
page read and write
1830368C000
heap
page read and write
2610002C0000
trusted library allocation
page read and write
1830364D000
heap
page read and write
7BE000508000
trusted library allocation
page read and write
183030C0000
heap
page read and write
183030C0000
heap
page read and write
18301870000
trusted library section
page readonly
18309E62000
trusted library section
page read and write
183030AA000
heap
page read and write
7F0000
heap
page read and write
38A21FC000
stack
page read and write
7BE0002CB000
trusted library allocation
page read and write
183030AE000
heap
page read and write
7BE000EF0000
trusted library allocation
page read and write
7BE0002B4000
trusted library allocation
page read and write
73F000644000
trusted library allocation
page read and write
7221000
heap
page read and write
7BE000BA8000
trusted library allocation
page read and write
18309333000
trusted library section
page read and write
7221000
heap
page read and write
7BE0008C0000
trusted library allocation
page read and write
389A1FA000
stack
page read and write
7BE0002B4000
trusted library allocation
page read and write
183030AE000
heap
page read and write
7221000
heap
page read and write
7221000
heap
page read and write
7221000
heap
page read and write
7BE000844000
trusted library allocation
page read and write
183030B4000
heap
page read and write
183744D3000
heap
page read and write
7221000
heap
page read and write
1830364A000
heap
page read and write
7BE000C79000
trusted library allocation
page read and write
84FC000
heap
page read and write
7221000
heap
page read and write
7221000
heap
page read and write
1FA000
stack
page read and write
20EC000
heap
page read and write
F8E000
stack
page read and write
38AE9FE000
unkown
page readonly
50000
unkown
page readonly
7221000
heap
page read and write
81FF000
heap
page read and write
183030B4000
heap
page read and write
7BE00033C000
trusted library allocation
page read and write
7221000
heap
page read and write
7221000
heap
page read and write
7221000
heap
page read and write
7BE000CE0000
trusted library allocation
page read and write
82C6000
heap
page read and write
7221000
heap
page read and write
183030A6000
heap
page read and write
81F6000
heap
page read and write
83A7000
heap
page read and write
18303652000
heap
page read and write
83ED000
heap
page read and write
73F000700000
trusted library allocation
page read and write
7BE0006CA000
trusted library allocation
page read and write
7BE000370000
trusted library allocation
page read and write
7221000
heap
page read and write
7BE000418000
trusted library allocation
page read and write
7BE000A28000
trusted library allocation
page read and write
183030A3000
heap
page read and write
7221000
heap
page read and write
183030C0000
heap
page read and write
7BE000C84000
trusted library allocation
page read and write
183036E4000
heap
page read and write
7221000
heap
page read and write
83B6000
heap
page read and write
7221000
heap
page read and write
7BE000C6C000
trusted library allocation
page read and write
2610002F4000
trusted library allocation
page read and write
1830366E000
heap
page read and write
7221000
heap
page read and write
7BE000DA8000
trusted library allocation
page read and write
183030C0000
heap
page read and write
7221000
heap
page read and write
7BE000C10000
trusted library allocation
page read and write
7BE000A28000
trusted library allocation
page read and write
620000
heap
page read and write
7940000
direct allocation
page execute and read and write
7221000
heap
page read and write
73F00033C000
trusted library allocation
page read and write
7940000
direct allocation
page execute and read and write
388E9FE000
unkown
page readonly
261000274000
trusted library allocation
page read and write
2040000
direct allocation
page read and write
7940000
direct allocation
page execute and read and write
7BE000DA0000
trusted library allocation
page read and write
38961FE000
stack
page read and write
2610002BC000
trusted library allocation
page read and write
183030DA000
heap
page read and write
FF0000
heap
page read and write
38B01FC000
stack
page read and write
7BE000780000
trusted library allocation
page read and write
7BE0003A4000
trusted library allocation
page read and write
7BE000304000
trusted library allocation
page read and write
38A29FE000
unkown
page readonly
73F000250000
trusted library allocation
page read and write
7BE0002F3000
trusted library allocation
page read and write
7940000
direct allocation
page execute and read and write
7221000
heap
page read and write
388A1FB000
stack
page read and write
2610002C0000
trusted library allocation
page read and write
C20000
heap
page read and write
7221000
heap
page read and write
7BE0003AA000
trusted library allocation
page read and write
261000294000
trusted library allocation
page read and write
7BE000BB0000
trusted library allocation
page read and write
38B11FE000
stack
page read and write
183030B4000
heap
page read and write
183030C0000
heap
page read and write
7940000
direct allocation
page execute and read and write
7BE000310000
trusted library allocation
page read and write
7221000
heap
page read and write
7AD0000
heap
page read and write
2610002BC000
trusted library allocation
page read and write
81FC000
heap
page read and write
183030C0000
heap
page read and write
7221000
heap
page read and write
83C2000
heap
page read and write
7221000
heap
page read and write
7BE0002AC000
trusted library allocation
page read and write
E3E000
stack
page read and write
183030C0000
heap
page read and write
7BE000F14000
trusted library allocation
page read and write
73F0006EC000
trusted library allocation
page read and write
18303666000
heap
page read and write
18303610000
heap
page read and write
7BE000775000
trusted library allocation
page read and write
7BE00033C000
trusted library allocation
page read and write
73F000330000
trusted library allocation
page read and write
7221000
heap
page read and write
73F0006CC000
trusted library allocation
page read and write
73F0002FC000
trusted library allocation
page read and write
183030CB000
heap
page read and write
7BE000683000
trusted library allocation
page read and write
50000
unkown
page readonly
183030C0000
heap
page read and write
7BE0002F0000
trusted library allocation
page read and write
18307312000
heap
page read and write
7BE000D04000
trusted library allocation
page read and write
81FE000
heap
page read and write
73F000750000
trusted library allocation
page read and write
7221000
heap
page read and write
7BE00086C000
trusted library allocation
page read and write
7BE000DD0000
trusted library allocation
page read and write
73F0002B0000
trusted library allocation
page read and write
73F000310000
trusted library allocation
page read and write
183030B5000
heap
page read and write
2114000
heap
page read and write
8587000
heap
page read and write
7BE0001B4000
trusted library allocation
page read and write
7DF1000
direct allocation
page read and write
38879FE000
unkown
page readonly
7BE000590000
trusted library allocation
page read and write
2610002E4000
trusted library allocation
page read and write
7BE000C98000
trusted library allocation
page read and write
7940000
direct allocation
page execute and read and write
81FB000
heap
page read and write
7221000
heap
page read and write
29E0000
heap
page read and write
7BE000EE8000
trusted library allocation
page read and write
183030AE000
heap
page read and write
38989FE000
unkown
page readonly
7BE0001AC000
trusted library allocation
page read and write
7BE000B2C000
trusted library allocation
page read and write
7BE000908000
trusted library allocation
page read and write
19F000303000
direct allocation
page read and write
F4F000
stack
page read and write
7221000
heap
page read and write
19F000290000
direct allocation
page read and write
19F0002E4000
direct allocation
page read and write
183030C0000
heap
page read and write
830C000
heap
page read and write
73F00035C000
trusted library allocation
page read and write
7BE000C48000
trusted library allocation
page read and write
183030DA000
heap
page read and write
7940000
direct allocation
page execute and read and write
183030C0000
heap
page read and write
183030B4000
heap
page read and write
388B9FE000
unkown
page readonly
183030B0000
heap
page read and write
7BE00031C000
trusted library allocation
page read and write
183030C0000
heap
page read and write
7BE000CD0000
trusted library allocation
page read and write
38911FE000
stack
page read and write
7221000
heap
page read and write
7BE0006C5000
trusted library allocation
page read and write
2040000
direct allocation
page read and write
38A81FE000
stack
page read and write
183030C0000
heap
page read and write
7221000
heap
page read and write
5E000
unkown
page write copy
6AE000
stack
page read and write
183030A8000
heap
page read and write
2040000
direct allocation
page read and write
7BE000ED4000
trusted library allocation
page read and write
51000
unkown
page execute read
73F000418000
trusted library allocation
page read and write
7BE0001CC000
trusted library allocation
page read and write
7BE000888000
trusted library allocation
page read and write
183074D4000
trusted library allocation
page read and write
38889FE000
unkown
page readonly
7BE000490000
trusted library allocation
page read and write
2610002A0000
trusted library allocation
page read and write
7221000
heap
page read and write
7BE00062C000
trusted library allocation
page read and write
73F00035C000
trusted library allocation
page read and write
183030C0000
heap
page read and write
7BE0001B4000
trusted library allocation
page read and write
18303659000
heap
page read and write
7221000
heap
page read and write
261000288000
trusted library allocation
page read and write
7BE0001F0000
trusted library allocation
page read and write
73F000210000
trusted library allocation
page read and write
7940000
direct allocation
page execute and read and write
73F0002ED000
trusted library allocation
page read and write
18303620000
heap
page read and write
7221000
heap
page read and write
7BE000988000
trusted library allocation
page read and write
183030C0000
heap
page read and write
38AF1FA000
stack
page read and write
7221000
heap
page read and write
38B29FE000
unkown
page readonly
7BE0001B4000
trusted library allocation
page read and write
18309197000
unclassified section
page read and write
7BE000AE0000
trusted library allocation
page read and write
183030C0000
heap
page read and write
5E000
unkown
page read and write
183030AE000
heap
page read and write
183030A6000
heap
page read and write
81F1000
heap
page read and write
7221000
heap
page read and write
2040000
direct allocation
page read and write
7BE000CB8000
trusted library allocation
page read and write
5A000
unkown
page readonly
2040000
direct allocation
page read and write
A7C000
stack
page read and write
183030B4000
heap
page read and write
183030C0000
heap
page read and write
183030C6000
heap
page read and write
1830A300000
trusted library allocation
page read and write
1830364F000
heap
page read and write
7BE000330000
trusted library allocation
page read and write
18309C4E000
trusted library section
page read and write
38A59FE000
unkown
page readonly
7221000
heap
page read and write
73F00033C000
trusted library allocation
page read and write
183096A0000
trusted library section
page read and write
20F6000
heap
page read and write
388B1FB000
stack
page read and write
73F000698000
trusted library allocation
page read and write
81F6000
heap
page read and write
5A000
unkown
page readonly
6B0000
heap
page read and write
7BE000E48000
trusted library allocation
page read and write
7221000
heap
page read and write
18303099000
heap
page read and write
7221000
heap
page read and write
7BE000BB8000
trusted library allocation
page read and write
183030C0000
heap
page read and write
7BE000E42000
trusted library allocation
page read and write
18309EF0000
trusted library section
page read and write
82ED000
heap
page read and write
73F000354000
trusted library allocation
page read and write
19F0002EC000
direct allocation
page read and write
7221000
heap
page read and write
5E000
unkown
page write copy
1830A0FE000
trusted library section
page read and write
183030C0000
heap
page read and write
38A99FE000
unkown
page readonly
5A000
unkown
page readonly
18307320000
heap
page read and write
18309167000
unclassified section
page read and write
183074F2000
trusted library allocation
page read and write
1830369D000
heap
page read and write
7BE000E6C000
trusted library allocation
page read and write
38B21FE000
stack
page read and write
2610002B0000
trusted library allocation
page read and write
18309B67000
unclassified section
page read and write
7221000
heap
page read and write
261000264000
trusted library allocation
page read and write
7BE000CF8000
trusted library allocation
page read and write
7BE000C0C000
trusted library allocation
page read and write
18309D56000
trusted library section
page read and write
183030B0000
heap
page read and write
7221000
heap
page read and write
73F00027C000
trusted library allocation
page read and write
7BE0001B4000
trusted library allocation
page read and write
7BE00033C000
trusted library allocation
page read and write
7221000
heap
page read and write
38A49FE000
unkown
page readonly
1830365B000
heap
page read and write
7BE0001F4000
trusted library allocation
page read and write
7BE000F58000
trusted library allocation
page read and write
20EA000
heap
page read and write
7221000
heap
page read and write
183098F0000
trusted library section
page read and write
261000250000
trusted library allocation
page read and write
11FC000
stack
page read and write
73F000368000
trusted library allocation
page read and write
7221000
heap
page read and write
7940000
direct allocation
page execute and read and write
20E8000
heap
page read and write
7221000
heap
page read and write
7BE00008C000
trusted library allocation
page read and write
7221000
heap
page read and write
183030C0000
heap
page read and write
38A89FE000
unkown
page readonly
5A000
unkown
page readonly
19F000215000
direct allocation
page read and write
2610002F8000
trusted library allocation
page read and write
18303080000
heap
page read and write
7221000
heap
page read and write
1830369F000
heap
page read and write
7BE0001F8000
trusted library allocation
page read and write
73F000654000
trusted library allocation
page read and write
7221000
heap
page read and write
183035B0000
trusted library section
page read and write
2610002D8000
trusted library allocation
page read and write
7221000
heap
page read and write
73F0007B4000
trusted library allocation
page read and write
E50000
heap
page read and write
183030AE000
heap
page read and write
18309EFE000
trusted library section
page read and write
7BE000798000
trusted library allocation
page read and write
8339000
heap
page read and write
183030B0000
heap
page read and write
2104000
heap
page read and write
183030B0000
heap
page read and write
73F000718000
trusted library allocation
page read and write
7BE000790000
trusted library allocation
page read and write
7BE000644000
trusted library allocation
page read and write
7BE000F68000
trusted library allocation
page read and write
710000
heap
page read and write
1830363B000
heap
page read and write
183030C0000
heap
page read and write
18374410000
heap
page read and write
38869FE000
unkown
page readonly
6C24D000
unkown
page read and write
7BE000A0C000
trusted library allocation
page read and write
183030C0000
heap
page read and write
7BE0007C0000
trusted library allocation
page read and write
73F00075C000
trusted library allocation
page read and write
73F0006AC000
trusted library allocation
page read and write
38929FE000
unkown
page readonly
389F9FE000
unkown
page readonly
7BE000064000
trusted library allocation
page read and write
183030C0000
heap
page read and write
7221000
heap
page read and write
183030C0000
heap
page read and write
38A09FE000
unkown
page readonly
7221000
heap
page read and write
853C000
heap
page read and write
7221000
heap
page read and write
7BE000F24000
trusted library allocation
page read and write
8348000
heap
page read and write
7221000
heap
page read and write
38939FE000
unkown
page readonly
7221000
heap
page read and write
1830365B000
heap
page read and write
7221000
heap
page read and write
18301890000
heap
page read and write
81F5000
heap
page read and write
7221000
heap
page read and write
7A0000
heap
page read and write
5E000
unkown
page write copy
183030C0000
heap
page read and write
7BE000C40000
trusted library allocation
page read and write
81F0000
heap
page read and write
7221000
heap
page read and write
38AA9FE000
unkown
page readonly
18303683000
heap
page read and write
7221000
heap
page read and write
7221000
heap
page read and write
7221000
heap
page read and write
7BE00020C000
trusted library allocation
page read and write
183030C0000
heap
page read and write
81F4000
heap
page read and write
18303666000
heap
page read and write
13E0000
heap
page read and write
7221000
heap
page read and write
7BE000201000
trusted library allocation
page read and write
183030DA000
heap
page read and write
7221000
heap
page read and write
7BE000EB8000
trusted library allocation
page read and write
7BE00001C000
trusted library allocation
page read and write
18303070000
heap
page read and write
7BE000A28000
trusted library allocation
page read and write
7BE0001AC000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
183030C0000
heap
page read and write
7221000
heap
page read and write
84AF000
heap
page read and write
81F3000
heap
page read and write
7221000
heap
page read and write
7221000
heap
page read and write
389B1FC000
stack
page read and write
7BE000650000
trusted library allocation
page read and write
7BE000A1C000
trusted library allocation
page read and write
7940000
direct allocation
page execute and read and write
DD0000
heap
page read and write
183030AE000
heap
page read and write
8294000
heap
page read and write
7BE000FCC000
trusted library allocation
page read and write
18303700000
trusted library section
page read and write
7221000
heap
page read and write
7BE000344000
trusted library allocation
page read and write
183092D2000
trusted library section
page read and write
38901FA000
stack
page read and write
38B31FE000
stack
page read and write
7BE000A01000
trusted library allocation
page read and write
183030B4000
heap
page read and write
64E000
stack
page read and write
2105000
heap
page read and write
183030C0000
heap
page read and write
18303657000
heap
page read and write
7BE0009E8000
trusted library allocation
page read and write
1830362A000
heap
page read and write
84CF000
heap
page read and write
7BE0002D0000
trusted library allocation
page read and write
7940000
direct allocation
page execute and read and write
7BE000E1C000
trusted library allocation
page read and write
73F000248000
trusted library allocation
page read and write
5E000
unkown
page read and write
7BE0006AC000
trusted library allocation
page read and write
183030B4000
heap
page read and write
38999FE000
unkown
page readonly
B1E000
stack
page read and write
7221000
heap
page read and write
7940000
direct allocation
page execute and read and write
7BE0005A4000
trusted library allocation
page read and write
7BE000350000
trusted library allocation
page read and write
7940000
direct allocation
page execute and read and write
18303652000
heap
page read and write
38909FE000
unkown
page readonly
183747C5000
heap
page read and write
7BE000220000
trusted library allocation
page read and write
7221000
heap
page read and write
183030C0000
heap
page read and write
5A000
unkown
page readonly
68F000
stack
page read and write
183030C0000
heap
page read and write
7221000
heap
page read and write
183030C0000
heap
page read and write
7BE000568000
trusted library allocation
page read and write
7BE000B04000
trusted library allocation
page read and write
183030B4000
heap
page read and write
19F0002AC000
direct allocation
page read and write
1830309D000
heap
page read and write
7BE0006E0000
trusted library allocation
page read and write
183030C0000
heap
page read and write
51000
unkown
page execute read
7221000
heap
page read and write
7221000
heap
page read and write
19F000230000
direct allocation
page read and write
852E000
heap
page read and write
73F000424000
trusted library allocation
page read and write
61000
unkown
page readonly
6C298000
unkown
page readonly
1830365B000
heap
page read and write
183030B4000
heap
page read and write
7221000
heap
page read and write
388F9FE000
unkown
page readonly
18303099000
heap
page read and write
183058D0000
trusted library section
page read and write
7221000
heap
page read and write
5E000
unkown
page read and write
7221000
heap
page read and write
183030AE000
heap
page read and write
38941FE000
stack
page read and write
7221000
heap
page read and write
183030C0000
heap
page read and write
7BE00040C000
trusted library allocation
page read and write
7C8E000
direct allocation
page read and write
183030AC000
heap
page read and write
7221000
heap
page read and write
73F000744000
trusted library allocation
page read and write
7BE000D24000
trusted library allocation
page read and write
388C1FE000
stack
page read and write
183030C0000
heap
page read and write
38A01FC000
stack
page read and write
7221000
heap
page read and write
7BE000E25000
trusted library allocation
page read and write
7221000
heap
page read and write
183030AE000
heap
page read and write
73F000758000
trusted library allocation
page read and write
7BE000C14000
trusted library allocation
page read and write
18309230000
heap
page read and write
7BE000310000
trusted library allocation
page read and write
19F000294000
direct allocation
page read and write
1510000
heap
page read and write
7BE000D3C000
trusted library allocation
page read and write
7BE00031C000
trusted library allocation
page read and write
183030AE000
heap
page read and write
81F0000
heap
page read and write
BFC000
stack
page read and write
183030AD000
heap
page read and write
7BE000710000
trusted library allocation
page read and write
7221000
heap
page read and write
7BE000230000
trusted library allocation
page read and write
7BE0003A4000
trusted library allocation
page read and write
7221000
heap
page read and write
7BE0002C4000
trusted library allocation
page read and write
2106000
heap
page read and write
389A9FE000
unkown
page readonly
57E000
unkown
page read and write
7940000
direct allocation
page execute and read and write
73F000754000
trusted library allocation
page read and write
7221000
heap
page read and write
7221000
heap
page read and write
7BE0004E8000
trusted library allocation
page read and write
7221000
heap
page read and write
7BE000764000
trusted library allocation
page read and write
61000
unkown
page readonly
261000230000
trusted library allocation
page read and write
1480000
heap
page read and write
7BE000C34000
trusted library allocation
page read and write
73F0003EC000
trusted library allocation
page read and write
82FC000
heap
page read and write
183030AE000
heap
page read and write
183030C0000
heap
page read and write
C9F000
stack
page read and write
38919FE000
unkown
page readonly
460000
heap
page read and write
7BE000CA4000
trusted library allocation
page read and write
38AA1FE000
stack
page read and write
73F00025C000
trusted library allocation
page read and write
2610002C0000
trusted library allocation
page read and write
183030A4000
heap
page read and write
7BE000364000
trusted library allocation
page read and write
73F000404000
trusted library allocation
page read and write
183030C0000
heap
page read and write
7221000
heap
page read and write
7BE0004BC000
trusted library allocation
page read and write
7BE000330000
trusted library allocation
page read and write
2610002B0000
trusted library allocation
page read and write
2610002A0000
trusted library allocation
page read and write
5E000
unkown
page write copy
183030AE000
heap
page read and write
7BE0002A8000
trusted library allocation
page read and write
1830364A000
heap
page read and write
18309C30000
trusted library section
page read and write
18303647000
heap
page read and write
183030B5000
heap
page read and write
7BE0006DB000
trusted library allocation
page read and write
7BE000074000
trusted library allocation
page read and write
7221000
heap
page read and write
836C000
heap
page read and write
73F000330000
trusted library allocation
page read and write
389D1FD000
stack
page read and write
183030AE000
heap
page read and write
73F000374000
trusted library allocation
page read and write
51000
unkown
page execute read
18309233000
heap
page read and write
20EE000
heap
page read and write
183072D0000
heap
page read and write
7BE000D90000
trusted library allocation
page read and write
82E5000
heap
page read and write
C50000
heap
page read and write
183030C0000
heap
page read and write
7BE000DE4000
trusted library allocation
page read and write
183030B5000
heap
page read and write
7BE000E01000
trusted library allocation
page read and write
183030AE000
heap
page read and write
7221000
heap
page read and write
51000
unkown
page execute read
AD0000
heap
page read and write
2040000
direct allocation
page read and write
7221000
heap
page read and write
7BE0007CC000
trusted library allocation
page read and write
7BE000CD0000
trusted library allocation
page read and write
1830364F000
heap
page read and write
7BE000AC8000
trusted library allocation
page read and write
20E7000
heap
page read and write
73F0006B8000
trusted library allocation
page read and write
7BE000380000
trusted library allocation
page read and write
18303601000
heap
page read and write
7BE000F04000
trusted library allocation
page read and write
7BE0002A8000
trusted library allocation
page read and write
7AD0000
heap
page read and write
1830365E000
heap
page read and write
1830365B000
heap
page read and write
183030B4000
heap
page read and write
18309C10000
trusted library section
page read and write
7221000
heap
page read and write
183036AE000
heap
page read and write
51000
unkown
page execute read
19F00023C000
direct allocation
page read and write
7BE00022C000
trusted library allocation
page read and write
7BE0000D0000
trusted library allocation
page read and write
183030B4000
heap
page read and write
73F000614000
trusted library allocation
page read and write
7BE000118000
trusted library allocation
page read and write
389B9FE000
unkown
page readonly
18303633000
heap
page read and write
1617000
unkown
page write copy
8371000
heap
page read and write
183743D0000
heap
page read and write
38AB1FE000
stack
page read and write
50000
unkown
page readonly
81FE000
heap
page read and write
183030C0000
heap
page read and write
1830362F000
heap
page read and write
18309CA1000
trusted library section
page read and write
7221000
heap
page read and write
183030AC000
heap
page read and write
7BE00049C000
trusted library allocation
page read and write
183030A3000
heap
page read and write
18303657000
heap
page read and write
5E000
unkown
page read and write
7BE000E7F000
trusted library allocation
page read and write
81F1000
heap
page read and write
7BE000134000
trusted library allocation
page read and write
73F0002E4000
trusted library allocation
page read and write
7BE000224000
trusted library allocation
page read and write
73F000330000
trusted library allocation
page read and write
7BE0005B8000
trusted library allocation
page read and write
7BE0002A4000
trusted library allocation
page read and write
7BE000428000
trusted library allocation
page read and write
7221000
heap
page read and write
842C000
heap
page read and write
51000
unkown
page execute read
7BE000128000
trusted library allocation
page read and write
73F0006D0000
trusted library allocation
page read and write
183092A0000
heap
page read and write
7221000
heap
page read and write
7221000
heap
page read and write
38971FE000
stack
page read and write
19F000280000
direct allocation
page read and write
7940000
direct allocation
page execute and read and write
183030C6000
heap
page read and write
81F4000
heap
page read and write
82D9000
heap
page read and write
2106000
heap
page read and write
73F000380000
trusted library allocation
page read and write
20EA000
heap
page read and write
7221000
heap
page read and write
7BE000D58000
trusted library allocation
page read and write
183030A3000
heap
page read and write
7EF1000
heap
page read and write
183030B5000
heap
page read and write
18303657000
heap
page read and write
183030B4000
heap
page read and write
9F0000
heap
page read and write
7660000
trusted library allocation
page read and write
7221000
heap
page read and write
183030B4000
heap
page read and write
183030C0000
heap
page read and write
7221000
heap
page read and write
18309CB3000
trusted library section
page read and write
18303657000
heap
page read and write
7221000
heap
page read and write
20EE000
heap
page read and write
82F1000
heap
page read and write
5A000
unkown
page readonly
73F000704000
trusted library allocation
page read and write
2040000
direct allocation
page read and write
7221000
heap
page read and write
7221000
heap
page read and write
388E1FB000
stack
page read and write
1830365E000
heap
page read and write
81F3000
heap
page read and write
50000
unkown
page readonly
7BE000484000
trusted library allocation
page read and write
7BE000F90000
trusted library allocation
page read and write
183030C0000
heap
page read and write
73F000688000
trusted library allocation
page read and write
183030C0000
heap
page read and write
7BE000B8C000
trusted library allocation
page read and write
38A79FE000
unkown
page readonly
81F4000
heap
page read and write
183030B4000
heap
page read and write
7221000
heap
page read and write
20FF000
heap
page read and write
183030B4000
heap
page read and write
183030A8000
heap
page read and write
183030C0000
heap
page read and write
D8E000
stack
page read and write
18303659000
heap
page read and write
73F000230000
trusted library allocation
page read and write
8498000
heap
page read and write
7BE00057C000
trusted library allocation
page read and write
18303652000
heap
page read and write
1830362C000
heap
page read and write
73F000610000
trusted library allocation
page read and write
7221000
heap
page read and write
7221000
heap
page read and write
7221000
heap
page read and write
7FF1000
heap
page read and write
50000
unkown
page readonly
7BE000494000
trusted library allocation
page read and write
DD7000
heap
page read and write
7BE000AC4000
trusted library allocation
page read and write
388D9FE000
unkown
page readonly
183030AE000
heap
page read and write
7BE000C10000
trusted library allocation
page read and write
7BE000020000
trusted library allocation
page read and write
183030C0000
heap
page read and write
5A000
unkown
page readonly
7BE00073C000
trusted library allocation
page read and write
18303601000
heap
page read and write
7BE000F84000
trusted library allocation
page read and write
183030C0000
heap
page read and write
183030B4000
heap
page read and write
7221000
heap
page read and write
7221000
heap
page read and write
8356000
heap
page read and write
83F7000
heap
page read and write
7BE00009F000
trusted library allocation
page read and write
D50000
heap
page read and write
19F000220000
direct allocation
page read and write
183030B5000
heap
page read and write
7BE000638000
trusted library allocation
page read and write
7BE000194000
trusted library allocation
page read and write
73F00069C000
trusted library allocation
page read and write
388F1FC000
stack
page read and write
7BE0009CC000
trusted library allocation
page read and write
7BE0004E0000
trusted library allocation
page read and write
38851FE000
stack
page read and write
183030AE000
heap
page read and write
7BE000EB4000
trusted library allocation
page read and write
7BE000C01000
trusted library allocation
page read and write
183030B5000
heap
page read and write
7BE000558000
trusted library allocation
page read and write
7BE000218000
trusted library allocation
page read and write
7221000
heap
page read and write
183030AC000
heap
page read and write
2110000
heap
page read and write
7A8000
heap
page read and write
2040000
direct allocation
page read and write
7BE000CE0000
trusted library allocation
page read and write
183030C0000
heap
page read and write
7221000
heap
page read and write
7BE0000A8000
trusted library allocation
page read and write
1CC000
stack
page read and write
7BE000EAC000
trusted library allocation
page read and write
183030AE000
heap
page read and write
183030AE000
heap
page read and write
7BE000CA8000
trusted library allocation
page read and write
7221000
heap
page read and write
183030B4000
heap
page read and write
73F000624000
trusted library allocation
page read and write
7BE000B70000
trusted library allocation
page read and write
81FB000
heap
page read and write
183030B7000
heap
page read and write
7BE000E8C000
trusted library allocation
page read and write
183030C0000
heap
page read and write
73F000640000
trusted library allocation
page read and write
7BE000C14000
trusted library allocation
page read and write
7221000
heap
page read and write
50000
unkown
page readonly
183036A6000
heap
page read and write
18303699000
heap
page read and write
183030C0000
heap
page read and write
183030C0000
heap
page read and write
7940000
direct allocation
page execute and read and write
7BE000E3C000
trusted library allocation
page read and write
183030A4000
heap
page read and write
73F0006F0000
trusted library allocation
page read and write
EE1000
unkown
page execute and write copy
7BE000344000
trusted library allocation
page read and write
7BE000D14000
trusted library allocation
page read and write
38AE1FE000
stack
page read and write
183030C0000
heap
page read and write
183030B4000
heap
page read and write
7BE0001B4000
trusted library allocation
page read and write
183030B6000
heap
page read and write
7221000
heap
page read and write
7BE0002AC000
trusted library allocation
page read and write
73F0006FC000
trusted library allocation
page read and write
19F000234000
direct allocation
page read and write
50000
unkown
page readonly
7BE00016C000
trusted library allocation
page read and write
81F0000
heap
page read and write
1830309C000
heap
page read and write
1830309B000
heap
page read and write
38A19FE000
unkown
page readonly
38B39FE000
unkown
page readonly
1830364A000
heap
page read and write
183030A8000
heap
page read and write
7221000
heap
page read and write
73F000730000
trusted library allocation
page read and write
81FC000
heap
page read and write
183030A8000
heap
page read and write
7BE0001E8000
trusted library allocation
page read and write
183030C0000
heap
page read and write
7221000
heap
page read and write
183030B4000
heap
page read and write
19F00020C000
direct allocation
page read and write
846C000
heap
page read and write
183030A4000
heap
page read and write
7BE0002A8000
trusted library allocation
page read and write
7221000
heap
page read and write
7A7F000
heap
page read and write
7BE00014C000
trusted library allocation
page read and write
7BE0003B0000
trusted library allocation
page read and write
73F000784000
trusted library allocation
page read and write
1830309D000
heap
page read and write
7670000
trusted library allocation
page read and write
81F9000
heap
page read and write
18309EA0000
trusted library section
page read and write
7BE000328000
trusted library allocation
page read and write
7221000
heap
page read and write
7BE0001C8000
trusted library allocation
page read and write
38AC1FE000
stack
page read and write
18309C90000
trusted library section
page read and write
61000
unkown
page readonly
5E000
unkown
page read and write
183030AC000
heap
page read and write
73F0002B8000
trusted library allocation
page read and write
7940000
direct allocation
page execute and read and write
38A39FE000
unkown
page readonly
7221000
heap
page read and write
73F000770000
trusted library allocation
page read and write
7221000
heap
page read and write
7BE000AB4000
trusted library allocation
page read and write
7BE00027C000
trusted library allocation
page read and write
73F0002D4000
trusted library allocation
page read and write
183030C0000
heap
page read and write
13FF000
stack
page read and write
7BE000D18000
trusted library allocation
page read and write
12CF000
stack
page read and write
61000
unkown
page readonly
19F000201000
direct allocation
page read and write
38A31FD000
stack
page read and write
1830363D000
heap
page read and write
7221000
heap
page read and write
73F000288000
trusted library allocation
page read and write
73F000714000
trusted library allocation
page read and write
73F000220000
trusted library allocation
page read and write
5A000
unkown
page readonly
7CC0000
heap
page read and write
1830309E000
heap
page read and write
183030B4000
heap
page read and write
20EE000
heap
page read and write
183030B5000
heap
page read and write
1830363E000
heap
page read and write
183030B4000
heap
page read and write
7221000
heap
page read and write
18303097000
heap
page read and write
7BE000E98000
trusted library allocation
page read and write
183030C0000
heap
page read and write
7BE000AF4000
trusted library allocation
page read and write
183030C0000
heap
page read and write
183030B4000
heap
page read and write
18309C42000
trusted library section
page read and write
7BE000D50000
trusted library allocation
page read and write
87C000
stack
page read and write
7221000
heap
page read and write
183030AC000
heap
page read and write
7221000
heap
page read and write
183030AE000
heap
page read and write
7221000
heap
page read and write
5A000
unkown
page readonly
7221000
heap
page read and write
7221000
heap
page read and write
38931FE000
stack
page read and write
183030C0000
heap
page read and write
7221000
heap
page read and write
183030AD000
heap
page read and write
7221000
heap
page read and write
1830364F000
heap
page read and write
183030AC000
heap
page read and write
183030B5000
heap
page read and write
7BE000CD0000
trusted library allocation
page read and write
183030AE000
heap
page read and write
7221000
heap
page read and write
7BE000CC4000
trusted library allocation
page read and write
183030C0000
heap
page read and write
7BE000B30000
trusted library allocation
page read and write
7BE000DDC000
trusted library allocation
page read and write
7BE000770000
trusted library allocation
page read and write
183030B5000
heap
page read and write
2610002BC000
trusted library allocation
page read and write
183030C0000
heap
page read and write
7BE0002B4000
trusted library allocation
page read and write
73F000694000
trusted library allocation
page read and write
837C000
heap
page read and write
61000
unkown
page readonly
838D000
heap
page read and write
7BE0002A8000
trusted library allocation
page read and write
19F000274000
direct allocation
page read and write
7221000
heap
page read and write
7BE00060C000
trusted library allocation
page read and write
82CA000
heap
page read and write
73F00078C000
trusted library allocation
page read and write
183030C0000
heap
page read and write
20F6000
heap
page read and write
183030B5000
heap
page read and write
6C29C000
unkown
page readonly
183030BF000
heap
page read and write
81F3000
heap
page read and write
73F000684000
trusted library allocation
page read and write
7BE000F08000
trusted library allocation
page read and write
7221000
heap
page read and write
183744AF000
heap
page read and write
261000220000
trusted library allocation
page read and write
81F8000
heap
page read and write
183030C0000
heap
page read and write
183030C0000
heap
page read and write
6C171000
unkown
page execute read
7221000
heap
page read and write
73F0006E0000
trusted library allocation
page read and write
7BE0006A0000
trusted library allocation
page read and write
7940000
direct allocation
page execute and read and write
73F000724000
trusted library allocation
page read and write
73F0007C8000
trusted library allocation
page read and write
61000
unkown
page readonly
81F1000
heap
page read and write
7221000
heap
page read and write
38861FE000
stack
page read and write
828A000
heap
page read and write
38B09FE000
unkown
page readonly
73F0002F0000
trusted library allocation
page read and write
38991FE000
stack
page read and write
183030AE000
heap
page read and write
7BE0004F0000
trusted library allocation
page read and write
7BE0001D4000
trusted library allocation
page read and write
18303659000
heap
page read and write
73F0006D4000
trusted library allocation
page read and write
389C9FE000
unkown
page readonly
38921FE000
stack
page read and write
183030B4000
heap
page read and write
183030B5000
heap
page read and write
7221000
heap
page read and write
183030B5000
heap
page read and write
8557000
heap
page read and write
7BE000D6C000
trusted library allocation
page read and write
183030BF000
heap
page read and write
183030B4000
heap
page read and write
7221000
heap
page read and write
183030A6000
heap
page read and write
8BC000
stack
page read and write
7BE000328000
trusted library allocation
page read and write
7221000
heap
page read and write
7BE0002E0000
trusted library allocation
page read and write
73F000348000
trusted library allocation
page read and write
7221000
heap
page read and write
7BE00081C000
trusted library allocation
page read and write
183030AE000
heap
page read and write
183030C0000
heap
page read and write
73F000354000
trusted library allocation
page read and write
7221000
heap
page read and write
183743F0000
heap
page read and write
7221000
heap
page read and write
7221000
heap
page read and write
38831EF000
stack
page read and write
7BE00018C000
trusted library allocation
page read and write
7221000
heap
page read and write
1240000
heap
page read and write
7221000
heap
page read and write
50000
unkown
page readonly
183030C0000
heap
page read and write
38951FE000
stack
page read and write
38B19FE000
unkown
page readonly
1830368E000
heap
page read and write
18309C21000
trusted library section
page read and write
2610002BC000
trusted library allocation
page read and write
183030AE000
heap
page read and write
38AD1FE000
stack
page read and write
61000
unkown
page readonly
D3D000
stack
page read and write
7BE000214000
trusted library allocation
page read and write
7221000
heap
page read and write
7BE000E0C000
trusted library allocation
page read and write
2610002BC000
trusted library allocation
page read and write
20E7000
heap
page read and write
7221000
heap
page read and write
831A000
heap
page read and write
183030B5000
heap
page read and write
7BE000CE0000
trusted library allocation
page read and write
183030B4000
heap
page read and write
183747C0000
heap
page read and write
7221000
heap
page read and write
1830365E000
heap
page read and write
7221000
heap
page read and write
7221000
heap
page read and write
7221000
heap
page read and write
183092DE000
trusted library section
page read and write
7BE000A80000
trusted library allocation
page read and write
7AD2000
heap
page read and write
7221000
heap
page read and write
7221000
heap
page read and write
73F000201000
trusted library allocation
page read and write
18303647000
heap
page read and write
183030C0000
heap
page read and write
7BE000B94000
trusted library allocation
page read and write
73F000248000
trusted library allocation
page read and write
2040000
direct allocation
page read and write
7221000
heap
page read and write
2610002C8000
trusted library allocation
page read and write
73F0006B0000
trusted library allocation
page read and write
7221000
heap
page read and write
7BE000300000
trusted library allocation
page read and write
1830734C000
heap
page read and write
183030C0000
heap
page read and write
7221000
heap
page read and write
1830363B000
heap
page read and write
7221000
heap
page read and write
261000238000
trusted library allocation
page read and write
183030AA000
heap
page read and write
8328000
heap
page read and write
38A71FE000
stack
page read and write
7BE00017C000
trusted library allocation
page read and write
73F0006E4000
trusted library allocation
page read and write
73F000320000
trusted library allocation
page read and write
7BE000CE0000
trusted library allocation
page read and write
183030B4000
heap
page read and write
7221000
heap
page read and write
7BE000380000
trusted library allocation
page read and write
7BE000748000
trusted library allocation
page read and write
261000201000
trusted library allocation
page read and write
7BE000080000
trusted library allocation
page read and write
7BE000EC8000
trusted library allocation
page read and write
2610002A0000
trusted library allocation
page read and write
183030B0000
heap
page read and write
7940000
direct allocation
page execute and read and write
38969FE000
unkown
page readonly
50000
unkown
page readonly
38949FE000
unkown
page readonly
73F000320000
trusted library allocation
page read and write
1830A0F0000
trusted library section
page read and write
83FF000
heap
page read and write
7221000
heap
page read and write
848A000
heap
page read and write
20F2000
heap
page read and write
7221000
heap
page read and write
7221000
heap
page read and write
7BE000680000
trusted library allocation
page read and write
183030A8000
heap
page read and write
7910000
direct allocation
page execute and read and write
19F000284000
direct allocation
page read and write
38A69FE000
unkown
page readonly
183030C0000
heap
page read and write
D40000
heap
page read and write
183030C0000
heap
page read and write
183030B4000
heap
page read and write
7221000
heap
page read and write
7221000
heap
page read and write
7BE000BF4000
trusted library allocation
page read and write
828F000
heap
page read and write
6C299000
unkown
page read and write
82C7000
heap
page read and write
11FF000
stack
page read and write
2123000
heap
page read and write
7CCA000
heap
page read and write
19F000260000
direct allocation
page read and write
183030C6000
heap
page read and write
18309AF7000
unclassified section
page read and write
5E000
unkown
page write copy
7BE00093C000
trusted library allocation
page read and write
D60000
heap
page read and write
76C0000
direct allocation
page read and write
7221000
heap
page read and write
7DF3000
direct allocation
page read and write
7221000
heap
page read and write
389E1FD000
stack
page read and write
7221000
heap
page read and write
8343000
heap
page read and write
7221000
heap
page read and write
7221000
heap
page read and write
81F7000
heap
page read and write
388D1FA000
stack
page read and write
183030B4000
heap
page read and write
18374610000
trusted library allocation
page read and write
7BE000228000
trusted library allocation
page read and write
7221000
heap
page read and write
7BE00033C000
trusted library allocation
page read and write
183036DC000
heap
page read and write
183030B4000
heap
page read and write
183030CB000
heap
page read and write
73F000320000
trusted library allocation
page read and write
183030C0000
heap
page read and write
1830364D000
heap
page read and write
7221000
heap
page read and write
7BE000A5C000
trusted library allocation
page read and write
19F0002DC000
direct allocation
page read and write
73F000760000
trusted library allocation
page read and write
7221000
heap
page read and write
7221000
heap
page read and write
183030C0000
heap
page read and write
183030AE000
heap
page read and write
38881FE000
stack
page read and write
73F0002CC000
trusted library allocation
page read and write
183030C0000
heap
page read and write
183030B5000
heap
page read and write
38959FE000
unkown
page readonly
2610002B0000
trusted library allocation
page read and write
7BE000F4C000
trusted library allocation
page read and write
7221000
heap
page read and write
7BE000C64000
trusted library allocation
page read and write
7221000
heap
page read and write
183069A0000
trusted library allocation
page read and write
7BE0001EC000
trusted library allocation
page read and write
DF0000
heap
page read and write
183030B4000
heap
page read and write
12DF000
stack
page read and write
A9E000
stack
page read and write
7BE000C3C000
trusted library allocation
page read and write
7221000
heap
page read and write
5A000
unkown
page readonly
82D6000
heap
page read and write
19F00024C000
direct allocation
page read and write
73F000310000
trusted library allocation
page read and write
73F000630000
trusted library allocation
page read and write
73F0006C4000
trusted library allocation
page read and write
73F0007D0000
trusted library allocation
page read and write
7221000
heap
page read and write
183743E0000
heap
page readonly
183030C5000
heap
page read and write
832D000
heap
page read and write
8347000
heap
page read and write
38AD9FE000
unkown
page readonly
2040000
direct allocation
page read and write
38AB9FE000
unkown
page readonly
835D000
heap
page read and write
7221000
heap
page read and write
183030C0000
heap
page read and write
183030A8000
heap
page read and write
D00000
heap
page read and write
73F000620000
trusted library allocation
page read and write
7BE0003AC000
trusted library allocation
page read and write
183030AA000
heap
page read and write
261000270000
trusted library allocation
page read and write
7221000
heap
page read and write
8338000
heap
page read and write
6C170000
unkown
page readonly
183030C0000
heap
page read and write
183030CA000
heap
page read and write
7221000
heap
page read and write
183030C6000
heap
page read and write
7221000
heap
page read and write
7BE00020C000
trusted library allocation
page read and write
7BE000B1C000
trusted library allocation
page read and write
7BE000A40000
trusted library allocation
page read and write
C57000
heap
page read and write
183030AE000
heap
page read and write
183030AE000
heap
page read and write
73F000401000
trusted library allocation
page read and write
7221000
heap
page read and write
7940000
direct allocation
page execute and read and write
7BE0002F0000
trusted library allocation
page read and write
7BE0000F0000
trusted library allocation
page read and write
73F000788000
trusted library allocation
page read and write
8441000
heap
page read and write
183030BF000
heap
page read and write
73F0006C8000
trusted library allocation
page read and write
183030B1000
heap
page read and write
82AD000
heap
page read and write
183030C0000
heap
page read and write
81F4000
heap
page read and write
7BE0007A8000
trusted library allocation
page read and write
7BE0005E8000
trusted library allocation
page read and write
1830362C000
heap
page read and write
7BE0001A0000
trusted library allocation
page read and write
7BC000
stack
page read and write
7221000
heap
page read and write
910000
heap
page read and write
2040000
direct allocation
page read and write
7BE000C14000
trusted library allocation
page read and write
7BE00021C000
trusted library allocation
page read and write
7BE0006D5000
trusted library allocation
page read and write
183030B4000
heap
page read and write
124E000
heap
page read and write
7BE000E78000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
19F000217000
direct allocation
page read and write
183030D8000
heap
page read and write
7221000
heap
page read and write
1830364D000
heap
page read and write
7BE0006D0000
trusted library allocation
page read and write
7221000
heap
page read and write
7221000
heap
page read and write
7BE000304000
trusted library allocation
page read and write
7BE000394000
trusted library allocation
page read and write
7BE0009A8000
trusted library allocation
page read and write
18303647000
heap
page read and write
261000235000
trusted library allocation
page read and write
81F3000
heap
page read and write
51000
unkown
page execute read
7BE000CE8000
trusted library allocation
page read and write
50000
unkown
page readonly
7BE000D2C000
trusted library allocation
page read and write
2040000
direct allocation
page read and write
183030AE000
heap
page read and write
7BE000F7C000
trusted library allocation
page read and write
183030B4000
heap
page read and write
7221000
heap
page read and write
7BE000CA8000
trusted library allocation
page read and write
7221000
heap
page read and write
261000278000
trusted library allocation
page read and write
E58000
heap
page read and write
7221000
heap
page read and write
7BE0002A4000
trusted library allocation
page read and write
2610002A0000
trusted library allocation
page read and write
73F000734000
trusted library allocation
page read and write
19F000210000
direct allocation
page read and write
183030B4000
heap
page read and write
5C0000
heap
page read and write
7221000
heap
page read and write
81F1000
heap
page read and write
7BE000304000
trusted library allocation
page read and write
7221000
heap
page read and write
18303696000
heap
page read and write
7BE00033C000
trusted library allocation
page read and write
38849FE000
unkown
page readonly
7221000
heap
page read and write
73F000320000
trusted library allocation
page read and write
B40000
heap
page read and write
51000
unkown
page execute read
261000260000
trusted library allocation
page read and write
7221000
heap
page read and write
183030C0000
heap
page read and write
83BC000
heap
page read and write
8368000
heap
page read and write
7221000
heap
page read and write
38A61FC000
stack
page read and write
7940000
direct allocation
page execute and read and write
7221000
heap
page read and write
183030B4000
heap
page read and write
183030A1000
heap
page read and write
7BE000304000
trusted library allocation
page read and write
7221000
heap
page read and write
38A91FD000
stack
page read and write
183030B5000
heap
page read and write
8290000
heap
page read and write
388C9FE000
unkown
page readonly
81F6000
heap
page read and write
7BE00097C000
trusted library allocation
page read and write
183092C0000
trusted library section
page read and write
183030B4000
heap
page read and write
73F000430000
trusted library allocation
page read and write
7AD0000
heap
page read and write
7BE000DF8000
trusted library allocation
page read and write
8399000
heap
page read and write
76B0000
direct allocation
page read and write
38979FE000
unkown
page readonly
38AF9FE000
unkown
page readonly
7BE000D78000
trusted library allocation
page read and write
7221000
heap
page read and write
18374418000
heap
page read and write
183030B5000
heap
page read and write
18303610000
heap
page read and write
7BE0008FC000
trusted library allocation
page read and write
EE0000
unkown
page readonly
7940000
direct allocation
page execute and read and write
81F9000
heap
page read and write
73F00020C000
trusted library allocation
page read and write
8309000
heap
page read and write
82C3000
heap
page read and write
82AD000
heap
page read and write
7221000
heap
page read and write
183744AB000
heap
page read and write
1830309B000
heap
page read and write
5BF000
unkown
page read and write
2040000
direct allocation
page read and write
18309C80000
trusted library section
page read and write
183030B5000
heap
page read and write
5FC000
stack
page read and write
2610002C0000
trusted library allocation
page read and write
73F00039C000
trusted library allocation
page read and write
38A51FE000
stack
page read and write
7BE000601000
trusted library allocation
page read and write
1830364F000
heap
page read and write
7BE000E30000
trusted library allocation
page read and write
7BEF000
heap
page read and write
81F2000
heap
page read and write
7BE000EA4000
trusted library allocation
page read and write
7BE000380000
trusted library allocation
page read and write
38A41FB000
stack
page read and write
18303673000
heap
page read and write
10CF000
stack
page read and write
7BE00015C000
trusted library allocation
page read and write
18374620000
trusted library allocation
page read and write
There are 1501 hidden memdumps, click here to show them.