IOC Report
1fgVMJOnF0.exe

loading gif

Files

File Path
Type
Category
Malicious
1fgVMJOnF0.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_1fgVMJOnF0.exe_4b23ec8207bd5196ba4b19a9356d6da698c89_145c913c_162c9f71-861f-4a7f-9fd2-fd99b81f2aa9\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB461.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Dec 23 06:32:46 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBA8D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBADC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1fgVMJOnF0.exe
"C:\Users\user\Desktop\1fgVMJOnF0.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 --field-trial-handle=2292,i,6432418105620109786,16203351336791091311,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 1232

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://crbug.com/368855.)
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/5658nt
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/6141m
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://httpbin.org/ipbefore
unknown
http://anglebug.com/5371
unknown
https://chrome.google.com/webstore?hl=enR1
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
https://anglebug.com/7369l
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
https://anglebug.com/7369G
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
http://anglebug.com/7761seed
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
https://www.google.com/search?q=$
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
142.250.181.132
home.twentytk20ht.top
185.121.15.192
twentytk20ht.top
185.121.15.192
fp2e7a.wpc.phicdn.net
192.229.221.95
httpbin.org
98.85.100.80

IPs

IP
Domain
Country
Malicious
185.121.15.192
home.twentytk20ht.top
Spain
98.85.100.80
httpbin.org
United States
239.255.255.250
unknown
Reserved
142.250.181.132
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
ProgramId
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
FileId
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
LowerCaseLongPath
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
LongPathHash
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
Name
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
OriginalFileName
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
Publisher
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
Version
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
BinFileVersion
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
BinaryType
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
ProductName
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
ProductVersion
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
LinkDate
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
BinProductVersion
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
AppxPackageFullName
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
AppxPackageRelativeId
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
Size
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
Language
\REGISTRY\A\{aec70c2c-e237-3775-3f8c-c10bfd3448a6}\Root\InventoryApplicationFile\1fgvmjonf0.exe|2b84f7b74cd4428b
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
478800BC4000
trusted library allocation
page read and write
6C10006AC000
trusted library allocation
page read and write
B9A000
unkown
page readonly
63ED1FE000
stack
page read and write
6B81000
heap
page read and write
478800490000
trusted library allocation
page read and write
478800001000
trusted library allocation
page read and write
5AF000
stack
page read and write
4788001BC000
trusted library allocation
page read and write
6B81000
heap
page read and write
24CA3D15000
heap
page read and write
984000
heap
page read and write
185000278000
trusted library allocation
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
6381FFE000
unkown
page readonly
478800FA4000
trusted library allocation
page read and write
478800E34000
trusted library allocation
page read and write
6B81000
heap
page read and write
B90000
unkown
page readonly
478800FB4000
trusted library allocation
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
B90000
unkown
page readonly
478800700000
trusted library allocation
page read and write
7597000
heap
page read and write
478800D8C000
trusted library allocation
page read and write
478800F14000
trusted library allocation
page read and write
1850002E4000
trusted library allocation
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
7CF0000
heap
page read and write
FFC000
stack
page read and write
6C1000368000
trusted library allocation
page read and write
478800DE8000
trusted library allocation
page read and write
63EA1EF000
stack
page read and write
6B81000
heap
page read and write
7A000250000
direct allocation
page read and write
4788006E8000
trusted library allocation
page read and write
63FE1FE000
stack
page read and write
478800594000
trusted library allocation
page read and write
6B81000
heap
page read and write
478800CE4000
trusted library allocation
page read and write
984000
heap
page read and write
87E000
stack
page read and write
6B81000
heap
page read and write
4788002EB000
trusted library allocation
page read and write
47880015C000
trusted library allocation
page read and write
984000
heap
page read and write
7A000234000
direct allocation
page read and write
6B81000
heap
page read and write
478800959000
trusted library allocation
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
6C1000354000
trusted library allocation
page read and write
6B81000
heap
page read and write
24CADD16000
trusted library section
page read and write
478800F7C000
trusted library allocation
page read and write
478800384000
trusted library allocation
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
1AE9000
heap
page read and write
6C1000624000
trusted library allocation
page read and write
76C4000
heap
page read and write
6B81000
heap
page read and write
24CA750C000
heap
page read and write
24CA753E000
heap
page read and write
6B81000
heap
page read and write
6C10002FC000
trusted library allocation
page read and write
478800354000
trusted library allocation
page read and write
3720000
direct allocation
page read and write
24CAB567000
unclassified section
page read and write
6B81000
heap
page read and write
7A000217000
direct allocation
page read and write
4788001E0000
trusted library allocation
page read and write
6B81000
heap
page read and write
7CFE000
heap
page read and write
6B81000
heap
page read and write
24CA3A60000
trusted library section
page readonly
6B81000
heap
page read and write
76DB000
heap
page read and write
6B81000
heap
page read and write
478800CF4000
trusted library allocation
page read and write
6B81000
heap
page read and write
185000260000
trusted library allocation
page read and write
478800494000
trusted library allocation
page read and write
6C100035C000
trusted library allocation
page read and write
47880041C000
trusted library allocation
page read and write
63FD9FE000
unkown
page readonly
6C1000310000
trusted library allocation
page read and write
638AFFE000
unkown
page readonly
24CA3D10000
heap
page read and write
478800340000
trusted library allocation
page read and write
6C1000404000
trusted library allocation
page read and write
6B81000
heap
page read and write
478800624000
trusted library allocation
page read and write
47880004D000
trusted library allocation
page read and write
478800EA0000
trusted library allocation
page read and write
6B81000
heap
page read and write
6C1000288000
trusted library allocation
page read and write
1AF7000
heap
page read and write
47880100C000
trusted library allocation
page read and write
742F000
heap
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
638DFFE000
unkown
page readonly
72A0000
direct allocation
page execute and read and write
24CADDB0000
trusted library section
page read and write
1AD8000
heap
page read and write
24CA74D1000
heap
page read and write
6B81000
heap
page read and write
72A0000
direct allocation
page execute and read and write
7622000
heap
page read and write
6B81000
heap
page read and write
6C1000720000
trusted library allocation
page read and write
10FA000
unkown
page write copy
24CA74F2000
heap
page read and write
47880042C000
trusted library allocation
page read and write
638E7FD000
stack
page read and write
63887FD000
stack
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
7CFE000
heap
page read and write
6C10002F0000
trusted library allocation
page read and write
478800D78000
trusted library allocation
page read and write
4788001A4000
trusted library allocation
page read and write
AE0000
heap
page read and write
24CA7542000
heap
page read and write
7CF8000
heap
page read and write
6B81000
heap
page read and write
63F29FE000
unkown
page readonly
478800FA4000
trusted library allocation
page read and write
6390FFE000
unkown
page readonly
6B81000
heap
page read and write
24CA703A000
heap
page read and write
478800234000
trusted library allocation
page read and write
B91000
unkown
page execute read
7A000294000
direct allocation
page read and write
478800BE4000
trusted library allocation
page read and write
47880060C000
trusted library allocation
page read and write
6B81000
heap
page read and write
762B000
heap
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
762A000
heap
page read and write
6B81000
heap
page read and write
4788002AC000
trusted library allocation
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
1AE0000
heap
page read and write
7A000230000
direct allocation
page read and write
6B81000
heap
page read and write
24CADBF0000
trusted library section
page read and write
63807FB000
stack
page read and write
6B81000
heap
page read and write
4788001F0000
trusted library allocation
page read and write
478800348000
trusted library allocation
page read and write
24CAB510000
heap
page read and write
478800EE8000
trusted library allocation
page read and write
478800FA8000
trusted library allocation
page read and write
24CAD520000
trusted library section
page read and write
638B7FE000
stack
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
24CAD420000
trusted library section
page read and write
6C1000320000
trusted library allocation
page read and write
6C1000684000
trusted library allocation
page read and write
478800A0C000
trusted library allocation
page read and write
24CA39E0000
heap
page read and write
478800074000
trusted library allocation
page read and write
BA1000
unkown
page readonly
478800FB4000
trusted library allocation
page read and write
478800124000
trusted library allocation
page read and write
24CA74C1000
heap
page read and write
4788006F4000
trusted library allocation
page read and write
478800494000
trusted library allocation
page read and write
478800320000
trusted library allocation
page read and write
6383FFE000
unkown
page readonly
4788000EC000
trusted library allocation
page read and write
478800104000
trusted library allocation
page read and write
4788002F8000
trusted library allocation
page read and write
47880020C000
trusted library allocation
page read and write
7CF2000
heap
page read and write
75E0000
direct allocation
page read and write
4788002CC000
trusted library allocation
page read and write
638D7FD000
stack
page read and write
478800354000
trusted library allocation
page read and write
6398FFE000
unkown
page readonly
24CAB780000
heap
page read and write
7FC000
stack
page read and write
478800E1D000
trusted library allocation
page read and write
6C100060C000
trusted library allocation
page read and write
7CFA000
heap
page read and write
478800D04000
trusted library allocation
page read and write
24CA7035000
heap
page read and write
6B81000
heap
page read and write
24CAB997000
unclassified section
page read and write
6C10006FC000
trusted library allocation
page read and write
7CFF000
heap
page read and write
890000
heap
page read and write
7CF9000
heap
page read and write
B9A000
unkown
page readonly
63977FE000
stack
page read and write
6B81000
heap
page read and write
478800184000
trusted library allocation
page read and write
B91000
unkown
page execute read
6B81000
heap
page read and write
6C100033C000
trusted library allocation
page read and write
478800AB4000
trusted library allocation
page read and write
6B81000
heap
page read and write
4788005CC000
trusted library allocation
page read and write
1AFE000
heap
page read and write
185000274000
trusted library allocation
page read and write
478800FA8000
trusted library allocation
page read and write
478800E70000
trusted library allocation
page read and write
478801298000
trusted library allocation
page read and write
7626000
heap
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
478800448000
trusted library allocation
page read and write
1850002F0000
trusted library allocation
page read and write
478800C70000
trusted library allocation
page read and write
984000
heap
page read and write
478800240000
trusted library allocation
page read and write
4788006F4000
trusted library allocation
page read and write
6B81000
heap
page read and write
478800A6C000
trusted library allocation
page read and write
24CAD272000
trusted library section
page read and write
478800F08000
trusted library allocation
page read and write
478800314000
trusted library allocation
page read and write
6391FFE000
unkown
page readonly
63847FD000
stack
page read and write
4788002D4000
trusted library allocation
page read and write
478800670000
trusted library allocation
page read and write
478800850000
trusted library allocation
page read and write
63FC9FE000
unkown
page readonly
1B04000
heap
page read and write
1850002BC000
trusted library allocation
page read and write
762A000
heap
page read and write
478800B94000
trusted library allocation
page read and write
80BD000
heap
page read and write
6B81000
heap
page read and write
4788004B0000
trusted library allocation
page read and write
478800238000
trusted library allocation
page read and write
24CA750C000
heap
page read and write
63987FE000
stack
page read and write
478800B9C000
trusted library allocation
page read and write
6B81000
heap
page read and write
1B14000
heap
page read and write
6C1000620000
trusted library allocation
page read and write
47880114C000
trusted library allocation
page read and write
63957FA000
stack
page read and write
24CADD70000
trusted library section
page read and write
4788000F8000
trusted library allocation
page read and write
7CF6000
heap
page read and write
6B81000
heap
page read and write
9D1000
unkown
page execute and write copy
B9A000
unkown
page readonly
4788002AC000
trusted library allocation
page read and write
83E000
stack
page read and write
7627000
heap
page read and write
6C10002EE000
trusted library allocation
page read and write
478800334000
trusted library allocation
page read and write
7CFB000
heap
page read and write
B9E000
unkown
page read and write
4788009C8000
trusted library allocation
page read and write
478800218000
trusted library allocation
page read and write
478800C84000
trusted library allocation
page read and write
6B81000
heap
page read and write
D3C000
stack
page read and write
762F000
heap
page read and write
6C10007CC000
trusted library allocation
page read and write
478800168000
trusted library allocation
page read and write
24CA7040000
heap
page read and write
4788002BC000
trusted library allocation
page read and write
6C100078C000
trusted library allocation
page read and write
6C10002B8000
trusted library allocation
page read and write
478800201000
trusted library allocation
page read and write
6C80000
trusted library allocation
page read and write
24CA3B4B000
heap
page read and write
24CADD3D000
trusted library section
page read and write
6C1000418000
trusted library allocation
page read and write
478800340000
trusted library allocation
page read and write
638CFFE000
unkown
page readonly
6C1000770000
trusted library allocation
page read and write
7621000
heap
page read and write
6B81000
heap
page read and write
478800210000
trusted library allocation
page read and write
7622000
heap
page read and write
7621000
heap
page read and write
7CF5000
heap
page read and write
478800490000
trusted library allocation
page read and write
6B81000
heap
page read and write
478800FF8000
trusted library allocation
page read and write
6B81000
heap
page read and write
76C9000
heap
page read and write
478800C1C000
trusted library allocation
page read and write
478800BE4000
trusted library allocation
page read and write
4788002A0000
trusted library allocation
page read and write
478800384000
trusted library allocation
page read and write
72A0000
direct allocation
page execute and read and write
3E0000
heap
page read and write
47880120C000
trusted library allocation
page read and write
478800314000
trusted library allocation
page read and write
6B81000
heap
page read and write
478800F40000
trusted library allocation
page read and write
6C1000430000
trusted library allocation
page read and write
24CA7029000
heap
page read and write
7622000
heap
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
4788008C4000
trusted library allocation
page read and write
1AE9000
heap
page read and write
478800654000
trusted library allocation
page read and write
72A0000
direct allocation
page execute and read and write
6B81000
heap
page read and write
478800174000
trusted library allocation
page read and write
7620000
heap
page read and write
6B81000
heap
page read and write
762A000
heap
page read and write
24CA74F6000
heap
page read and write
1850002BC000
trusted library allocation
page read and write
4788004D0000
trusted library allocation
page read and write
185000288000
trusted library allocation
page read and write
4788008D8000
trusted library allocation
page read and write
478800FD4000
trusted library allocation
page read and write
47880078C000
trusted library allocation
page read and write
24CA7546000
heap
page read and write
24CA7544000
heap
page read and write
B9A000
unkown
page readonly
980000
heap
page read and write
6B81000
heap
page read and write
24CAD172000
trusted library section
page read and write
6B81000
heap
page read and write
984000
heap
page read and write
478800B04000
trusted library allocation
page read and write
6392FFE000
unkown
page readonly
6B81000
heap
page read and write
63F99FE000
unkown
page readonly
478801294000
trusted library allocation
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
6C10002CC000
trusted library allocation
page read and write
6384FFE000
unkown
page readonly
4788010B0000
trusted library allocation
page read and write
11FC000
stack
page read and write
6C10002C4000
trusted library allocation
page read and write
478800439000
trusted library allocation
page read and write
7CFB000
heap
page read and write
3720000
direct allocation
page read and write
24CAD27D000
trusted library section
page read and write
7280000
direct allocation
page execute and read and write
6B81000
heap
page read and write
1850002D8000
trusted library allocation
page read and write
478800FA8000
trusted library allocation
page read and write
6B81000
heap
page read and write
63817FD000
stack
page read and write
6B81000
heap
page read and write
7A00024C000
direct allocation
page read and write
47880005F000
trusted library allocation
page read and write
6B81000
heap
page read and write
478800C9C000
trusted library allocation
page read and write
6C1000374000
trusted library allocation
page read and write
478800FC4000
trusted library allocation
page read and write
B90000
unkown
page readonly
185000250000
trusted library allocation
page read and write
6C1000730000
trusted library allocation
page read and write
6B81000
heap
page read and write
24CA39C0000
heap
page readonly
47880116C000
trusted library allocation
page read and write
24CA750C000
heap
page read and write
6C10006EC000
trusted library allocation
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
478800228000
trusted library allocation
page read and write
478800044000
trusted library allocation
page read and write
6B81000
heap
page read and write
6C1000744000
trusted library allocation
page read and write
3720000
direct allocation
page read and write
478800750000
trusted library allocation
page read and write
6C100075C000
trusted library allocation
page read and write
478800924000
trusted library allocation
page read and write
6C1000238000
trusted library allocation
page read and write
7A0002EC000
direct allocation
page read and write
43E000
stack
page read and write
7626000
heap
page read and write
7A000290000
direct allocation
page read and write
63837FC000
stack
page read and write
63967FC000
stack
page read and write
6B81000
heap
page read and write
4788006DE000
trusted library allocation
page read and write
24CAB7DB000
heap
page read and write
7270000
direct allocation
page execute and read and write
72A0000
direct allocation
page execute and read and write
6C1000330000
trusted library allocation
page read and write
478800B94000
trusted library allocation
page read and write
7A00025C000
direct allocation
page read and write
4788001BC000
trusted library allocation
page read and write
6B81000
heap
page read and write
24CA751B000
heap
page read and write
7CF6000
heap
page read and write
6B81000
heap
page read and write
6C1000694000
trusted library allocation
page read and write
72A0000
direct allocation
page execute and read and write
1ADB000
heap
page read and write
4788010DC000
trusted library allocation
page read and write
B90000
unkown
page readonly
6C1000700000
trusted library allocation
page read and write
984000
heap
page read and write
6393FFE000
unkown
page readonly
478800320000
trusted library allocation
page read and write
6B81000
heap
page read and write
3720000
direct allocation
page read and write
47880040C000
trusted library allocation
page read and write
6C1000648000
trusted library allocation
page read and write
6C1000348000
trusted library allocation
page read and write
47880076A000
trusted library allocation
page read and write
6B81000
heap
page read and write
7620000
heap
page read and write
7620000
heap
page read and write
478800A01000
trusted library allocation
page read and write
6388FFE000
unkown
page readonly
984000
heap
page read and write
478800C74000
trusted library allocation
page read and write
478801264000
trusted library allocation
page read and write
638F7FE000
stack
page read and write
6C100025C000
trusted library allocation
page read and write
478800D64000
trusted library allocation
page read and write
6B81000
heap
page read and write
B91000
unkown
page execute read
6C1000320000
trusted library allocation
page read and write
478800D20000
trusted library allocation
page read and write
6B81000
heap
page read and write
7A000220000
direct allocation
page read and write
478800C01000
trusted library allocation
page read and write
24CA750F000
heap
page read and write
478801278000
trusted library allocation
page read and write
4788001D8000
trusted library allocation
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
478800398000
trusted library allocation
page read and write
762A000
heap
page read and write
478800374000
trusted library allocation
page read and write
984000
heap
page read and write
6C1000724000
trusted library allocation
page read and write
478800E54000
trusted library allocation
page read and write
6B81000
heap
page read and write
478800401000
trusted library allocation
page read and write
6B81000
heap
page read and write
478800FA4000
trusted library allocation
page read and write
6C1000368000
trusted library allocation
page read and write
6B81000
heap
page read and write
24CADC73000
trusted library section
page read and write
984000
heap
page read and write
984000
heap
page read and write
6C1000320000
trusted library allocation
page read and write
24CA59A0000
heap
page read and write
63F11FB000
stack
page read and write
6C1000210000
trusted library allocation
page read and write
478800354000
trusted library allocation
page read and write
478800494000
trusted library allocation
page read and write
6B81000
heap
page read and write
6C1000630000
trusted library allocation
page read and write
DA000
stack
page read and write
1AF2000
heap
page read and write
24CA754D000
heap
page read and write
6B81000
heap
page read and write
6380FFE000
unkown
page readonly
478800FD4000
trusted library allocation
page read and write
7CF5000
heap
page read and write
478800340000
trusted library allocation
page read and write
24CA73C0000
trusted library section
page read and write
6B81000
heap
page read and write
6C1000784000
trusted library allocation
page read and write
47880050C000
trusted library allocation
page read and write
6B81000
heap
page read and write
478800B94000
trusted library allocation
page read and write
478801264000
trusted library allocation
page read and write
47880089C000
trusted library allocation
page read and write
63937FE000
stack
page read and write
72A0000
direct allocation
page execute and read and write
24CAD437000
unclassified section
page read and write
3720000
direct allocation
page read and write
638FFFE000
unkown
page readonly
6C1000698000
trusted library allocation
page read and write
24CA702E000
heap
page read and write
47880020C000
trusted library allocation
page read and write
77F1000
heap
page read and write
6B81000
heap
page read and write
4788001DC000
trusted library allocation
page read and write
63827FC000
stack
page read and write
478800584000
trusted library allocation
page read and write
4788010C0000
trusted library allocation
page read and write
6B81000
heap
page read and write
4788001BC000
trusted library allocation
page read and write
63EE1FE000
stack
page read and write
24CA7032000
heap
page read and write
6C1000734000
trusted library allocation
page read and write
1850002C0000
trusted library allocation
page read and write
185000230000
trusted library allocation
page read and write
72A0000
direct allocation
page execute and read and write
6B81000
heap
page read and write
24CA7029000
heap
page read and write
478800FF8000
trusted library allocation
page read and write
7411000
heap
page read and write
6B81000
heap
page read and write
185000220000
trusted library allocation
page read and write
63F09FE000
unkown
page readonly
7CFD000
heap
page read and write
6C1000401000
trusted library allocation
page read and write
24CA74AF000
heap
page read and write
6B81000
heap
page read and write
47880028C000
trusted library allocation
page read and write
1850002BD000
trusted library allocation
page read and write
63F41FB000
stack
page read and write
24CA7033000
heap
page read and write
4788001C4000
trusted library allocation
page read and write
1AF3000
heap
page read and write
478800D30000
trusted library allocation
page read and write
4788001E8000
trusted library allocation
page read and write
24CAD2B0000
trusted library section
page read and write
B9A000
unkown
page readonly
6B81000
heap
page read and write
7CFF000
heap
page read and write
478800944000
trusted library allocation
page read and write
76C1000
heap
page read and write
478800CDC000
trusted library allocation
page read and write
63997FE000
stack
page read and write
638EFFE000
unkown
page readonly
1850002C0000
trusted library allocation
page read and write
63927FE000
stack
page read and write
63F79FE000
unkown
page readonly
4788000CC000
trusted library allocation
page read and write
DDE000
stack
page read and write
BA1000
unkown
page readonly
478800858000
trusted library allocation
page read and write
478800770000
trusted library allocation
page read and write
4788001F4000
trusted library allocation
page read and write
478800DDC000
trusted library allocation
page read and write
762A000
heap
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
6C10002DC000
trusted library allocation
page read and write
4788007C0000
trusted library allocation
page read and write
478800340000
trusted library allocation
page read and write
B9E000
unkown
page write copy
478801094000
trusted library allocation
page read and write
24CA3A20000
trusted library allocation
page read and write
24CA3AB0000
heap
page read and write
478800CA0000
trusted library allocation
page read and write
6C10003EC000
trusted library allocation
page read and write
7628000
heap
page read and write
6C100080C000
trusted library allocation
page read and write
7626000
heap
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
24CA3B17000
heap
page read and write
6B81000
heap
page read and write
13C7000
heap
page read and write
478800734000
trusted library allocation
page read and write
478800904000
trusted library allocation
page read and write
63F81FE000
stack
page read and write
6B81000
heap
page read and write
478800530000
trusted library allocation
page read and write
18500020C000
trusted library allocation
page read and write
1AF7000
heap
page read and write
6B81000
heap
page read and write
774D000
heap
page read and write
6B81000
heap
page read and write
479000
heap
page read and write
4788002BC000
trusted library allocation
page read and write
24CAD720000
trusted library section
page read and write
6C100033C000
trusted library allocation
page read and write
478800A98000
trusted library allocation
page read and write
984000
heap
page read and write
6C10007E0000
trusted library allocation
page read and write
6C1000678000
trusted library allocation
page read and write
63FC1FA000
stack
page read and write
762A000
heap
page read and write
6B81000
heap
page read and write
478801034000
trusted library allocation
page read and write
478800D64000
trusted library allocation
page read and write
478800D44000
trusted library allocation
page read and write
4788008B4000
trusted library allocation
page read and write
7CF7000
heap
page read and write
7A000280000
direct allocation
page read and write
478800801000
trusted library allocation
page read and write
72A0000
direct allocation
page execute and read and write
BA1000
unkown
page readonly
6B81000
heap
page read and write
6C1000248000
trusted library allocation
page read and write
6C1000601000
trusted library allocation
page read and write
4788001B0000
trusted library allocation
page read and write
7A00020C000
direct allocation
page read and write
478800FF8000
trusted library allocation
page read and write
130E000
stack
page read and write
24CA702E000
heap
page read and write
7621000
heap
page read and write
6B81000
heap
page read and write
63ED9FE000
unkown
page readonly
3720000
direct allocation
page read and write
63FB1FD000
stack
page read and write
478800194000
trusted library allocation
page read and write
1850002A0000
trusted library allocation
page read and write
7010000
direct allocation
page read and write
478800ED0000
trusted library allocation
page read and write
24CA7460000
heap
page read and write
7CFD000
heap
page read and write
B90000
unkown
page readonly
478801054000
trusted library allocation
page read and write
4788002BC000
trusted library allocation
page read and write
4788000BC000
trusted library allocation
page read and write
6B81000
heap
page read and write
7A0002E4000
direct allocation
page read and write
478801178000
trusted library allocation
page read and write
478800CF4000
trusted library allocation
page read and write
63867FC000
stack
page read and write
24CA7040000
heap
page read and write
478800964000
trusted library allocation
page read and write
4788001BC000
trusted library allocation
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
76B4000
heap
page read and write
478800340000
trusted library allocation
page read and write
4788004E8000
trusted library allocation
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
11F0000
heap
page read and write
478800348000
trusted library allocation
page read and write
478800354000
trusted library allocation
page read and write
B9A000
unkown
page readonly
4788010A8000
trusted library allocation
page read and write
478800BD0000
trusted library allocation
page read and write
4788002AC000
trusted library allocation
page read and write
7CF4000
heap
page read and write
1850002A0000
trusted library allocation
page read and write
6B81000
heap
page read and write
6C1000354000
trusted library allocation
page read and write
6B81000
heap
page read and write
24CA7530000
heap
page read and write
478800CC0000
trusted library allocation
page read and write
6B81000
heap
page read and write
1850002BC000
trusted library allocation
page read and write
478800F74000
trusted library allocation
page read and write
478800F4C000
trusted library allocation
page read and write
6B81000
heap
page read and write
478800308000
trusted library allocation
page read and write
7010000
direct allocation
page read and write
1850002C0000
trusted library allocation
page read and write
6C1000230000
trusted library allocation
page read and write
478801084000
trusted library allocation
page read and write
6B81000
heap
page read and write
7CF3000
heap
page read and write
478800AC8000
trusted library allocation
page read and write
6B81000
heap
page read and write
478800BBC000
trusted library allocation
page read and write
24CA7720000
trusted library section
page read and write
478800DB8000
trusted library allocation
page read and write
4788002B0000
trusted library allocation
page read and write
24CAD99E000
trusted library section
page read and write
478800308000
trusted library allocation
page read and write
984000
heap
page read and write
478800601000
trusted library allocation
page read and write
4788001C4000
trusted library allocation
page read and write
B90000
unkown
page readonly
B9E000
unkown
page read and write
6C1000220000
trusted library allocation
page read and write
72A0000
direct allocation
page execute and read and write
478800334000
trusted library allocation
page read and write
24CABEC0000
heap
page read and write
478800CB0000
trusted library allocation
page read and write
7A000303000
direct allocation
page read and write
63917FD000
stack
page read and write
6387FFE000
unkown
page readonly
6C100020C000
trusted library allocation
page read and write
7623000
heap
page read and write
24CA63F0000
unkown
page read and write
6B81000
heap
page read and write
478800E98000
trusted library allocation
page read and write
6C100040C000
trusted library allocation
page read and write
7746000
direct allocation
page read and write
24CAD990000
trusted library section
page read and write
4788006F4000
trusted library allocation
page read and write
7A00026C000
direct allocation
page read and write
638A7FE000
stack
page read and write
6399FFE000
unkown
page readonly
4788004CC000
trusted library allocation
page read and write
478800354000
trusted library allocation
page read and write
478801034000
trusted library allocation
page read and write
478800220000
trusted library allocation
page read and write
24CADC02000
trusted library section
page read and write
24CA74F2000
heap
page read and write
47880013C000
trusted library allocation
page read and write
478800308000
trusted library allocation
page read and write
984000
heap
page read and write
478800354000
trusted library allocation
page read and write
1AF2000
heap
page read and write
1AF7000
heap
page read and write
6C100069C000
trusted library allocation
page read and write
FEF000
stack
page read and write
6B81000
heap
page read and write
47880001C000
trusted library allocation
page read and write
6C1000610000
trusted library allocation
page read and write
24CAB7C6000
heap
page read and write
6B81000
heap
page read and write
7A0002D0000
direct allocation
page read and write
7CFE000
heap
page read and write
63F71FB000
stack
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
478800614000
trusted library allocation
page read and write
24CAB537000
unclassified section
page read and write
47880106C000
trusted library allocation
page read and write
478800D24000
trusted library allocation
page read and write
4788002AC000
trusted library allocation
page read and write
4788004A7000
trusted library allocation
page read and write
6B81000
heap
page read and write
47880022C000
trusted library allocation
page read and write
6C1000364000
trusted library allocation
page read and write
63FE9FE000
unkown
page readonly
7707000
heap
page read and write
6B81000
heap
page read and write
6C100039C000
trusted library allocation
page read and write
478800490000
trusted library allocation
page read and write
7621000
heap
page read and write
478800490000
trusted library allocation
page read and write
762C000
heap
page read and write
478800EDC000
trusted library allocation
page read and write
6B81000
heap
page read and write
478800910000
trusted library allocation
page read and write
6B81000
heap
page read and write
6C100035C000
trusted library allocation
page read and write
7ED6000
heap
page read and write
7020000
direct allocation
page read and write
478800088000
trusted library allocation
page read and write
478800F7C000
trusted library allocation
page read and write
478800224000
trusted library allocation
page read and write
4788011B0000
trusted library allocation
page read and write
24CA74C1000
heap
page read and write
3720000
direct allocation
page read and write
478800E8C000
trusted library allocation
page read and write
24CA703F000
heap
page read and write
478800EB8000
trusted library allocation
page read and write
63F91FE000
stack
page read and write
24CA702E000
heap
page read and write
478800990000
trusted library allocation
page read and write
BA1000
unkown
page readonly
7A0002A8000
direct allocation
page read and write
24CA74F2000
heap
page read and write
478800DD4000
trusted library allocation
page read and write
72A0000
direct allocation
page execute and read and write
4788002AC000
trusted library allocation
page read and write
6382FFE000
unkown
page readonly
7A00023C000
direct allocation
page read and write
1AF2000
heap
page read and write
4788009B0000
trusted library allocation
page read and write
5E0000
heap
page read and write
13C0000
heap
page read and write
6B81000
heap
page read and write
24CAB520000
trusted library allocation
page read and write
185000235000
trusted library allocation
page read and write
1D0000
heap
page read and write
478800E44000
trusted library allocation
page read and write
24CADC61000
trusted library section
page read and write
478800EFC000
trusted library allocation
page read and write
6C10006E4000
trusted library allocation
page read and write
6C10006B8000
trusted library allocation
page read and write
24CA3B64000
heap
page read and write
24CA7470000
heap
page read and write
B91000
unkown
page execute read
6B81000
heap
page read and write
1850002BC000
trusted library allocation
page read and write
7A000284000
direct allocation
page read and write
984000
heap
page read and write
4788000AC000
trusted library allocation
page read and write
24CA3CC0000
heap
page read and write
4788002C8000
trusted library allocation
page read and write
638C7FB000
stack
page read and write
6B81000
heap
page read and write
478800348000
trusted library allocation
page read and write
478800A48000
trusted library allocation
page read and write
4788009E0000
trusted library allocation
page read and write
72A0000
direct allocation
page execute and read and write
B90000
unkown
page readonly
24CA3B4F000
heap
page read and write
D90000
heap
page read and write
6B81000
heap
page read and write
63877FC000
stack
page read and write
6C10006B4000
trusted library allocation
page read and write
1850002B0000
trusted library allocation
page read and write
478800CDC000
trusted library allocation
page read and write
478800B04000
trusted library allocation
page read and write
7627000
heap
page read and write
1AE1000
heap
page read and write
BA1000
unkown
page readonly
6B81000
heap
page read and write
B9E000
unkown
page write copy
24CA38E0000
heap
page read and write
7627000
heap
page read and write
6C10006E8000
trusted library allocation
page read and write
7CFA000
heap
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
72A0000
direct allocation
page execute and read and write
478800490000
trusted library allocation
page read and write
4788002A5000
trusted library allocation
page read and write
24CA74FD000
heap
page read and write
478800494000
trusted library allocation
page read and write
1850002C0000
trusted library allocation
page read and write
6B81000
heap
page read and write
1492000
unkown
page execute and write copy
478800638000
trusted library allocation
page read and write
6C100027C000
trusted library allocation
page read and write
7620000
heap
page read and write
6B81000
heap
page read and write
1AF2000
heap
page read and write
6C10002F4000
trusted library allocation
page read and write
1B08000
heap
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
478800FB4000
trusted library allocation
page read and write
478801018000
trusted library allocation
page read and write
24CAB513000
heap
page read and write
24CA7555000
heap
page read and write
478800C70000
trusted library allocation
page read and write
6B81000
heap
page read and write
24CA755C000
heap
page read and write
478800ECD000
trusted library allocation
page read and write
4788001F8000
trusted library allocation
page read and write
478800CDF000
trusted library allocation
page read and write
6C10006D4000
trusted library allocation
page read and write
24CA3A30000
trusted library allocation
page read and write
13F0000
heap
page read and write
478800917000
trusted library allocation
page read and write
478800340000
trusted library allocation
page read and write
24CA7010000
heap
page read and write
76E0000
heap
page read and write
478800C2C000
trusted library allocation
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
6C1000330000
trusted library allocation
page read and write
478800F30000
trusted library allocation
page read and write
4788005B8000
trusted library allocation
page read and write
478800AE4000
trusted library allocation
page read and write
6B81000
heap
page read and write
7624000
heap
page read and write
478800C70000
trusted library allocation
page read and write
984000
heap
page read and write
1AE0000
heap
page read and write
DE0000
heap
page read and write
478800868000
trusted library allocation
page read and write
72A0000
direct allocation
page execute and read and write
478800C0C000
trusted library allocation
page read and write
6C1000320000
trusted library allocation
page read and write
6C1000658000
trusted library allocation
page read and write
63FF1FE000
stack
page read and write
63F01FD000
stack
page read and write
1850002A0000
trusted library allocation
page read and write
1850002C0000
trusted library allocation
page read and write
6B81000
heap
page read and write
478800705000
trusted library allocation
page read and write
478801188000
trusted library allocation
page read and write
6C1000754000
trusted library allocation
page read and write
72A0000
direct allocation
page execute and read and write
6B81000
heap
page read and write
478800E7C000
trusted library allocation
page read and write
6B81000
heap
page read and write
6C1000248000
trusted library allocation
page read and write
984000
heap
page read and write
478800518000
trusted library allocation
page read and write
47880032C000
trusted library allocation
page read and write
4788004CC000
trusted library allocation
page read and write
478800214000
trusted library allocation
page read and write
1850002C8000
trusted library allocation
page read and write
6B81000
heap
page read and write
6C1000664000
trusted library allocation
page read and write
185000238000
trusted library allocation
page read and write
478800CDC000
trusted library allocation
page read and write
6B81000
heap
page read and write
478800DAC000
trusted library allocation
page read and write
1AE9000
heap
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
24CA7033000
heap
page read and write
762B000
heap
page read and write
478800CE4000
trusted library allocation
page read and write
63F39FE000
unkown
page readonly
1CF000
unkown
page read and write
478800C90000
trusted library allocation
page read and write
185000248000
trusted library allocation
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
4788009BF000
trusted library allocation
page read and write
4788002AC000
trusted library allocation
page read and write
4788006F4000
trusted library allocation
page read and write
4788001C4000
trusted library allocation
page read and write
7A000270000
direct allocation
page read and write
63907FD000
stack
page read and write
6C10006E0000
trusted library allocation
page read and write
478800494000
trusted library allocation
page read and write
638BFFE000
unkown
page readonly
63EE9FE000
unkown
page readonly
478800384000
trusted library allocation
page read and write
6B81000
heap
page read and write
4788002AC000
trusted library allocation
page read and write
4788011A8000
trusted library allocation
page read and write
24CADD32000
trusted library section
page read and write
1AF7000
heap
page read and write
478800354000
trusted library allocation
page read and write
6B81000
heap
page read and write
478800E85000
trusted library allocation
page read and write
7625000
heap
page read and write
478800348000
trusted library allocation
page read and write
24CA74EE000
heap
page read and write
4788007A0000
trusted library allocation
page read and write
478800780000
trusted library allocation
page read and write
478800D3C000
trusted library allocation
page read and write
7CFD000
heap
page read and write
6C1000758000
trusted library allocation
page read and write
478800FA8000
trusted library allocation
page read and write
478800058000
trusted library allocation
page read and write
6B81000
heap
page read and write
984000
heap
page read and write
478800E28000
trusted library allocation
page read and write
63EF1FE000
stack
page read and write
7626000
heap
page read and write
478800EDC000
trusted library allocation
page read and write
478800CDC000
trusted library allocation
page read and write
24CA74F5000
heap
page read and write
B9A000
unkown
page readonly
478801118000
trusted library allocation
page read and write
63FB9FE000
unkown
page readonly
72A0000
direct allocation
page execute and read and write
6B81000
heap
page read and write
11EF000
stack
page read and write
4788009EC000
trusted library allocation
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
6C1000310000
trusted library allocation
page read and write
63857FC000
stack
page read and write
72A0000
direct allocation
page execute and read and write
19A0000
heap
page read and write
7CF2000
heap
page read and write
6B81000
heap
page read and write
24CADBE1000
trusted library section
page read and write
478801084000
trusted library allocation
page read and write
6B81000
heap
page read and write
478800494000
trusted library allocation
page read and write
762F000
heap
page read and write
24CAE090000
trusted library section
page read and write
478800BB4000
trusted library allocation
page read and write
185000201000
trusted library allocation
page read and write
1AF2000
heap
page read and write
1350000
heap
page read and write
6B81000
heap
page read and write
1850002BC000
trusted library allocation
page read and write
63897FB000
stack
page read and write
6B81000
heap
page read and write
72A0000
direct allocation
page execute and read and write
63FA1FE000
stack
page read and write
63F21FA000
stack
page read and write
478800360000
trusted library allocation
page read and write
478800FA8000
trusted library allocation
page read and write
4788008FC000
trusted library allocation
page read and write
762F000
heap
page read and write
7CFB000
heap
page read and write
639B7FE000
stack
page read and write
6B81000
heap
page read and write
76E8000
heap
page read and write
47880113C000
trusted library allocation
page read and write
3720000
direct allocation
page read and write
4788007AC000
trusted library allocation
page read and write
24CA750B000
heap
page read and write
BA1000
unkown
page readonly
7621000
heap
page read and write
7CF3000
heap
page read and write
24CAB9C2000
trusted library allocation
page read and write
478801110000
trusted library allocation
page read and write
6C10007C8000
trusted library allocation
page read and write
6C1000750000
trusted library allocation
page read and write
6389FFE000
unkown
page readonly
6B81000
heap
page read and write
478800ED0000
trusted library allocation
page read and write
1AF7000
heap
page read and write
76D0000
heap
page read and write
478800E01000
trusted library allocation
page read and write
762D000
heap
page read and write
478800C74000
trusted library allocation
page read and write
6C10006F0000
trusted library allocation
page read and write
6B81000
heap
page read and write
6C1000390000
trusted library allocation
page read and write
72A0000
direct allocation
page execute and read and write
63EC1FE000
stack
page read and write
24CA7560000
trusted library section
page read and write
478800FA8000
trusted library allocation
page read and write
7CF2000
heap
page read and write
478800308000
trusted library allocation
page read and write
6B81000
heap
page read and write
47880126C000
trusted library allocation
page read and write
7CF8000
heap
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
478800765000
trusted library allocation
page read and write
24CA3AB8000
heap
page read and write
4788004D8000
trusted library allocation
page read and write
478800F4C000
trusted library allocation
page read and write
6C1000760000
trusted library allocation
page read and write
6B81000
heap
page read and write
185000294000
trusted library allocation
page read and write
478800494000
trusted library allocation
page read and write
478800D10000
trusted library allocation
page read and write
6B81000
heap
page read and write
CF0000
heap
page read and write
24CADC50000
trusted library section
page read and write
1AE1000
heap
page read and write
478800DA4000
trusted library allocation
page read and write
63EB1FF000
unkown
page read and write
6397FFE000
unkown
page readonly
6C10007D0000
trusted library allocation
page read and write
6B81000
heap
page read and write
7706000
heap
page read and write
63F69FE000
unkown
page readonly
6C1000688000
trusted library allocation
page read and write
7CFF000
heap
page read and write
4788002B0000
trusted library allocation
page read and write
16EE000
stack
page read and write
1AE6000
heap
page read and write
24CA74C8000
heap
page read and write
47880014C000
trusted library allocation
page read and write
6B81000
heap
page read and write
47880021C000
trusted library allocation
page read and write
478800728000
trusted library allocation
page read and write
478800D98000
trusted library allocation
page read and write
63947FE000
stack
page read and write
24CAD1D3000
trusted library section
page read and write
6B81000
heap
page read and write
639BFFE000
unkown
page readonly
1AF2000
heap
page read and write
478800775000
trusted library allocation
page read and write
BA1000
unkown
page readonly
9E0000
heap
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
1AE2000
heap
page read and write
7EEE000
heap
page read and write
478800368000
trusted library allocation
page read and write
1850002BC000
trusted library allocation
page read and write
4788005E0000
trusted library allocation
page read and write
7628000
heap
page read and write
63FD1FE000
stack
page read and write
478800D6C000
trusted library allocation
page read and write
6386FFE000
unkown
page readonly
7CFE000
heap
page read and write
478800384000
trusted library allocation
page read and write
7CF9000
heap
page read and write
478800494000
trusted library allocation
page read and write
478800F1C000
trusted library allocation
page read and write
7290000
direct allocation
page execute and read and write
4788002A7000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
478800BE0000
trusted library allocation
page read and write
7CF4000
heap
page read and write
6C10006C8000
trusted library allocation
page read and write
1850002BC000
trusted library allocation
page read and write
478800354000
trusted library allocation
page read and write
1850002F4000
trusted library allocation
page read and write
B91000
unkown
page execute read
6B81000
heap
page read and write
7270000
trusted library allocation
page read and write
6C10002EC000
trusted library allocation
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
478800A38000
trusted library allocation
page read and write
6B81000
heap
page read and write
63F31FE000
stack
page read and write
984000
heap
page read and write
6C1000668000
trusted library allocation
page read and write
24CA59A3000
heap
page read and write
4788006F4000
trusted library allocation
page read and write
7CF9000
heap
page read and write
4788002AC000
trusted library allocation
page read and write
B9E000
unkown
page write copy
7CFD000
heap
page read and write
1AE9000
heap
page read and write
478800BE4000
trusted library allocation
page read and write
4788006F4000
trusted library allocation
page read and write
6C1000201000
trusted library allocation
page read and write
6B81000
heap
page read and write
24CAD216000
trusted library section
page read and write
4788001EC000
trusted library allocation
page read and write
7744000
direct allocation
page read and write
B30000
heap
page read and write
72A0000
direct allocation
page execute and read and write
6C10006CC000
trusted library allocation
page read and write
24CA703A000
heap
page read and write
7629000
heap
page read and write
63F89FE000
unkown
page readonly
7A000210000
direct allocation
page read and write
7CF7000
heap
page read and write
24CA7000000
heap
page read and write
478800915000
trusted library allocation
page read and write
4788007E0000
trusted library allocation
page read and write
6C1000704000
trusted library allocation
page read and write
6B81000
heap
page read and write
72A0000
direct allocation
page execute and read and write
478800E54000
trusted library allocation
page read and write
478800CD0000
trusted library allocation
page read and write
478800448000
trusted library allocation
page read and write
6C1000330000
trusted library allocation
page read and write
24CA7512000
heap
page read and write
A8C000
stack
page read and write
4788001D4000
trusted library allocation
page read and write
7A000201000
direct allocation
page read and write
24CA74F2000
heap
page read and write
3720000
direct allocation
page read and write
4788003AC000
trusted library allocation
page read and write
6C1000640000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
770B000
heap
page read and write
47880081C000
trusted library allocation
page read and write
6B81000
heap
page read and write
478801001000
trusted library allocation
page read and write
63F59FE000
unkown
page readonly
63F61FC000
stack
page read and write
13B0000
heap
page read and write
478800308000
trusted library allocation
page read and write
9D000
stack
page read and write
6B81000
heap
page read and write
478801120000
trusted library allocation
page read and write
6C10006B0000
trusted library allocation
page read and write
185000270000
trusted library allocation
page read and write
3720000
direct allocation
page read and write
984000
heap
page read and write
3720000
direct allocation
page read and write
4788006C0000
trusted library allocation
page read and write
63EF9FE000
unkown
page readonly
1850002F8000
trusted library allocation
page read and write
6B81000
heap
page read and write
6C10006C4000
trusted library allocation
page read and write
6B81000
heap
page read and write
B9E000
unkown
page read and write
478800FB4000
trusted library allocation
page read and write
6B81000
heap
page read and write
63F51FB000
stack
page read and write
478800974000
trusted library allocation
page read and write
24CA7032000
heap
page read and write
7CF5000
heap
page read and write
7A0002AC000
direct allocation
page read and write
6B81000
heap
page read and write
13F8000
heap
page read and write
24CAD17E000
trusted library section
page read and write
7483000
heap
page read and write
7A0002DC000
direct allocation
page read and write
185000264000
trusted library allocation
page read and write
478801050000
trusted library allocation
page read and write
6B81000
heap
page read and write
3720000
direct allocation
page read and write
1AE9000
heap
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
47880040C000
trusted library allocation
page read and write
63F19FE000
unkown
page readonly
24CA3B7C000
heap
page read and write
18E000
unkown
page read and write
63FF9FE000
unkown
page readonly
7483000
heap
page read and write
6B81000
heap
page read and write
478801201000
trusted library allocation
page read and write
6395FFE000
unkown
page readonly
478800230000
trusted library allocation
page read and write
4788004A4000
trusted library allocation
page read and write
478800CE4000
trusted library allocation
page read and write
47880129C000
trusted library allocation
page read and write
470000
heap
page read and write
478800E64000
trusted library allocation
page read and write
6B81000
heap
page read and write
6C1000408000
trusted library allocation
page read and write
6B81000
heap
page read and write
6C10006D0000
trusted library allocation
page read and write
1850002B0000
trusted library allocation
page read and write
478800F5C000
trusted library allocation
page read and write
478801284000
trusted library allocation
page read and write
48C000
heap
page read and write
6C1000250000
trusted library allocation
page read and write
140000
heap
page read and write
24CA7540000
heap
page read and write
6396FFE000
unkown
page readonly
24CA3B6A000
heap
page read and write
6C10007B4000
trusted library allocation
page read and write
B91000
unkown
page execute read
24CA7032000
heap
page read and write
7AF1000
heap
page read and write
6B81000
heap
page read and write
B91000
unkown
page execute read
4788006D8000
trusted library allocation
page read and write
762B000
heap
page read and write
47880102C000
trusted library allocation
page read and write
6B81000
heap
page read and write
CF8000
heap
page read and write
478800718000
trusted library allocation
page read and write
24CADC0E000
trusted library section
page read and write
24CA7535000
heap
page read and write
7A000215000
direct allocation
page read and write
478800D50000
trusted library allocation
page read and write
4788005A4000
trusted library allocation
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
7CFB000
heap
page read and write
7625000
heap
page read and write
24CAD160000
trusted library section
page read and write
6C10002B0000
trusted library allocation
page read and write
478800660000
trusted library allocation
page read and write
6C1000380000
trusted library allocation
page read and write
24CADC40000
trusted library section
page read and write
4788002F8000
trusted library allocation
page read and write
24CADDBE000
trusted library section
page read and write
984000
heap
page read and write
6B81000
heap
page read and write
6B81000
heap
page read and write
478800308000
trusted library allocation
page read and write
762D000
heap
page read and write
6B81000
heap
page read and write
47880000C000
trusted library allocation
page read and write
478800354000
trusted library allocation
page read and write
4788002E8000
trusted library allocation
page read and write
4788002D8000
trusted library allocation
page read and write
478801060000
trusted library allocation
page read and write
75EA000
heap
page read and write
24CADB97000
unclassified section
page read and write
478800AA8000
trusted library allocation
page read and write
6B81000
heap
page read and write
24CAB799000
heap
page read and write
984000
heap
page read and write
3720000
direct allocation
page read and write
9D0000
unkown
page readonly
75E0000
heap
page read and write
47880070C000
trusted library allocation
page read and write
72A0000
direct allocation
page execute and read and write
6C1000714000
trusted library allocation
page read and write
24CADBD0000
trusted library section
page read and write
478800EAC000
trusted library allocation
page read and write
6C1000644000
trusted library allocation
page read and write
478800E0C000
trusted library allocation
page read and write
24CA3A00000
heap
page read and write
2AC000
stack
page read and write
7CFE000
heap
page read and write
6B81000
heap
page read and write
47880023C000
trusted library allocation
page read and write
478800A20000
trusted library allocation
page read and write
478801044000
trusted library allocation
page read and write
478800448000
trusted library allocation
page read and write
47880080C000
trusted library allocation
page read and write
300000
heap
page read and write
6394FFE000
unkown
page readonly
24CA74F6000
heap
page read and write
1AE9000
heap
page read and write
B9E000
unkown
page write copy
63FA9FE000
unkown
page readonly
4788006A0000
trusted library allocation
page read and write
72A0000
direct allocation
page execute and read and write
3720000
direct allocation
page read and write
1850002A0000
trusted library allocation
page read and write
1850002BC000
trusted library allocation
page read and write
6385FFE000
unkown
page readonly
6C1000424000
trusted library allocation
page read and write
18EF000
stack
page read and write
6C1000788000
trusted library allocation
page read and write
72A0000
direct allocation
page execute and read and write
6C1000614000
trusted library allocation
page read and write
63F49FE000
unkown
page readonly
There are 1265 hidden memdumps, click here to show them.