IOC Report
rGABp2MFj4.exe

loading gif

Files

File Path
Type
Category
Malicious
rGABp2MFj4.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rGABp2MFj4.exe_5021269d1b91148d215487fae3e2978b8ef25858_46079964_5e4b9f07-1aa6-4893-b1cd-551eb5cb1d15\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3B22.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Dec 23 07:43:17 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER43ED.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER44E8.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rGABp2MFj4.exe
"C:\Users\user\Desktop\rGABp2MFj4.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2532 --field-trial-handle=2272,i,11391944935882270509,647615027426193092,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7860 -s 1212

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://anglebug.com/5750~
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
https://anglebug.com/7899MS
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://docs.googl0
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://docs.google.com/presentation/
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://chrome.google.com/webstoreS
unknown
https://www.youtube.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://docs.google.com/spreadsheets/
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/3625Vulkan
unknown
https://httpbin.org/ipbefore
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://drive-daily-4.c
unknown
https://chromewebstore.google.com/
unknown
https://mail.google.com/mail/?usp=installed_webappS
unknown
https://drive-preprod.corp.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
https://anglebug.com/7369St
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://calendar.google.com/calendar/u/0/r/eventedit?usp=chrome_actionshttps://docs.google.com/prese
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://drive-daily-5.corp.go
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
172.217.19.228
home.twentytk20ht.top
185.121.15.192
twentytk20ht.top
185.121.15.192
httpbin.org
98.85.100.80

IPs

IP
Domain
Country
Malicious
185.121.15.192
home.twentytk20ht.top
Spain
172.217.19.228
www.google.com
United States
98.85.100.80
httpbin.org
United States
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
ProgramId
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
FileId
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
LowerCaseLongPath
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
LongPathHash
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
Name
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
OriginalFileName
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
Publisher
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
Version
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
BinFileVersion
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
BinaryType
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
ProductName
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
ProductVersion
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
LinkDate
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
BinProductVersion
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
AppxPackageFullName
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
AppxPackageRelativeId
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
Size
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
Language
\REGISTRY\A\{c80b0d6b-a10b-ad05-2375-7bc0752ed6d6}\Root\InventoryApplicationFile\rgabp2mfj4.exe|437edb7c717ddcae
Usn
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6E61000
heap
page read and write
711000
unkown
page readonly
6E61000
heap
page read and write
6E61000
heap
page read and write
55C800238000
trusted library allocation
page read and write
131D05FD000
heap
page read and write
117E000
stack
page read and write
7831000
heap
page read and write
318B1FE000
unkown
page read and write
7F05000
heap
page read and write
5300005C4000
trusted library allocation
page read and write
80F7000
heap
page read and write
150800290000
direct allocation
page read and write
530000DB0000
trusted library allocation
page read and write
6E61000
heap
page read and write
BFC000
stack
page read and write
55C800920000
trusted library allocation
page read and write
131D73E3000
trusted library section
page read and write
131CCF80000
heap
page read and write
7F22000
heap
page read and write
53000030C000
trusted library allocation
page read and write
7EFA000
heap
page read and write
6E61000
heap
page read and write
31AC9FE000
unkown
page readonly
5300007B1000
trusted library allocation
page read and write
31AA9FE000
unkown
page readonly
6E61000
heap
page read and write
55C8007E4000
trusted library allocation
page read and write
6E61000
heap
page read and write
1C74000
heap
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
530000560000
trusted library allocation
page read and write
31949FE000
unkown
page readonly
7A04000
direct allocation
page read and write
55C800890000
trusted library allocation
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
131D6CC0000
trusted library section
page read and write
7F32000
heap
page read and write
530000904000
trusted library allocation
page read and write
131D7351000
trusted library section
page read and write
7560000
direct allocation
page execute and read and write
318D9FE000
unkown
page readonly
31A29FE000
unkown
page readonly
530000DC8000
trusted library allocation
page read and write
5E0000294000
trusted library allocation
page read and write
55C800848000
trusted library allocation
page read and write
6E61000
heap
page read and write
8134000
heap
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
55C8007AC000
trusted library allocation
page read and write
530000AB8000
trusted library allocation
page read and write
530000CB8000
trusted library allocation
page read and write
530001080000
trusted library allocation
page read and write
5300005AC000
trusted library allocation
page read and write
6E61000
heap
page read and write
5E00002BC000
trusted library allocation
page read and write
530001090000
trusted library allocation
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
530000E4C000
trusted library allocation
page read and write
55C800960000
trusted library allocation
page read and write
318F9FE000
unkown
page readonly
6C6A0000
unkown
page readonly
530000988000
trusted library allocation
page read and write
1C74000
heap
page read and write
5300001A0000
trusted library allocation
page read and write
31A31FC000
stack
page read and write
530000364000
trusted library allocation
page read and write
6E61000
heap
page read and write
700000
unkown
page readonly
55C8008E8000
trusted library allocation
page read and write
7F00000
heap
page read and write
7560000
direct allocation
page execute and read and write
7560000
direct allocation
page execute and read and write
5300008F4000
trusted library allocation
page read and write
530000300000
trusted library allocation
page read and write
6E61000
heap
page read and write
530000D08000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
31989FE000
unkown
page readonly
70A000
unkown
page readonly
6E61000
heap
page read and write
530000A18000
trusted library allocation
page read and write
6E61000
heap
page read and write
31979FE000
unkown
page readonly
150800274000
direct allocation
page read and write
31A99FE000
unkown
page readonly
131D2DE0000
trusted library allocation
page read and write
7F50000
heap
page read and write
530000C54000
trusted library allocation
page read and write
6E61000
heap
page read and write
5300001AC000
trusted library allocation
page read and write
131D0B28000
heap
page read and write
530000E2C000
trusted library allocation
page read and write
31B59FE000
unkown
page readonly
31A39FE000
unkown
page readonly
6E61000
heap
page read and write
6E61000
heap
page read and write
1CC0000
direct allocation
page read and write
530000700000
trusted library allocation
page read and write
55C8002B8000
trusted library allocation
page read and write
7560000
direct allocation
page execute and read and write
55C80079C000
trusted library allocation
page read and write
31A81FD000
stack
page read and write
6E61000
heap
page read and write
5300001EC000
trusted library allocation
page read and write
150800217000
direct allocation
page read and write
55C8008D8000
trusted library allocation
page read and write
55C8006C8000
trusted library allocation
page read and write
6E61000
heap
page read and write
7560000
direct allocation
page execute and read and write
530000CB0000
trusted library allocation
page read and write
6E61000
heap
page read and write
5300010C0000
trusted library allocation
page read and write
6E61000
heap
page read and write
53000029E000
trusted library allocation
page read and write
530000294000
trusted library allocation
page read and write
5300001D8000
trusted library allocation
page read and write
31999FE000
unkown
page readonly
530000340000
trusted library allocation
page read and write
530000324000
trusted library allocation
page read and write
31969FE000
unkown
page readonly
6E61000
heap
page read and write
701000
unkown
page execute read
53000003C000
trusted library allocation
page read and write
8049000
heap
page read and write
530000C01000
trusted library allocation
page read and write
1C74000
heap
page read and write
1547000
heap
page read and write
143A000
unkown
page write copy
5E00002C0000
trusted library allocation
page read and write
530000494000
trusted library allocation
page read and write
530000294000
trusted library allocation
page read and write
6E61000
heap
page read and write
5300009EC000
trusted library allocation
page read and write
1C74000
heap
page read and write
1D6A000
heap
page read and write
7DC6000
heap
page read and write
5E00002F0000
trusted library allocation
page read and write
2920000
heap
page read and write
6E61000
heap
page read and write
530000D4C000
trusted library allocation
page read and write
131D67B6000
trusted library section
page read and write
530000194000
trusted library allocation
page read and write
131D0B85000
heap
page read and write
7F75000
heap
page read and write
700000
unkown
page readonly
31B19FE000
unkown
page readonly
55C800250000
trusted library allocation
page read and write
131D05D0000
heap
page read and write
319C1FE000
stack
page read and write
774F000
heap
page read and write
6E61000
heap
page read and write
131D6850000
trusted library section
page read and write
530000D78000
trusted library allocation
page read and write
31961FD000
stack
page read and write
131D0B65000
heap
page read and write
530000864000
trusted library allocation
page read and write
530000298000
trusted library allocation
page read and write
70A000
unkown
page readonly
55C800230000
trusted library allocation
page read and write
7DC0000
heap
page read and write
6E61000
heap
page read and write
1D6B000
heap
page read and write
55C800868000
trusted library allocation
page read and write
530000C7F000
trusted library allocation
page read and write
77A3000
heap
page read and write
15080023C000
direct allocation
page read and write
1C74000
heap
page read and write
7F00000
heap
page read and write
31AE9FE000
unkown
page readonly
55C800220000
trusted library allocation
page read and write
1D74000
heap
page read and write
530000014000
trusted library allocation
page read and write
5300008BC000
trusted library allocation
page read and write
55C80095C000
trusted library allocation
page read and write
146D000
stack
page read and write
80ED000
heap
page read and write
7FB5000
heap
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
7F5E000
heap
page read and write
7F22000
heap
page read and write
530001110000
trusted library allocation
page read and write
55C8006AC000
trusted library allocation
page read and write
530000C7C000
trusted library allocation
page read and write
6E61000
heap
page read and write
1C74000
heap
page read and write
6E61000
heap
page read and write
530000780000
trusted library allocation
page read and write
530000401000
trusted library allocation
page read and write
131D713E000
trusted library section
page read and write
530000949000
trusted library allocation
page read and write
7560000
direct allocation
page execute and read and write
530000648000
trusted library allocation
page read and write
53000080C000
trusted library allocation
page read and write
13FC000
stack
page read and write
530000594000
trusted library allocation
page read and write
5300009CC000
trusted library allocation
page read and write
1C74000
heap
page read and write
1540000
heap
page read and write
530000338000
trusted library allocation
page read and write
6E61000
heap
page read and write
711000
unkown
page readonly
6E61000
heap
page read and write
6E61000
heap
page read and write
7DCE000
heap
page read and write
31939FE000
unkown
page readonly
131CEE43000
heap
page read and write
7DCB000
heap
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
5300002E0000
trusted library allocation
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
55C8008F4000
trusted library allocation
page read and write
131CCFF0000
trusted library allocation
page read and write
6E61000
heap
page read and write
131D05EE000
heap
page read and write
55C800404000
trusted library allocation
page read and write
6E61000
heap
page read and write
5300005DC000
trusted library allocation
page read and write
7E90000
heap
page read and write
53000020C000
trusted library allocation
page read and write
7E76000
heap
page read and write
31AD1FD000
stack
page read and write
55C800430000
trusted library allocation
page read and write
55C8002E4000
trusted library allocation
page read and write
7560000
direct allocation
page execute and read and write
530000EF4000
trusted library allocation
page read and write
31AF9FE000
unkown
page readonly
6E61000
heap
page read and write
5300010D8000
trusted library allocation
page read and write
6E61000
heap
page read and write
131D05C0000
heap
page read and write
55C80027C000
trusted library allocation
page read and write
78A0000
direct allocation
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
530000F44000
trusted library allocation
page read and write
318E9FE000
unkown
page readonly
7560000
direct allocation
page execute and read and write
530001144000
trusted library allocation
page read and write
55C80084C000
trusted library allocation
page read and write
7DC6000
heap
page read and write
7DCF000
heap
page read and write
530000A8C000
trusted library allocation
page read and write
55C8008A8000
trusted library allocation
page read and write
5300010B4000
trusted library allocation
page read and write
131D05F2000
heap
page read and write
6E61000
heap
page read and write
5E00002C0000
trusted library allocation
page read and write
6E61000
heap
page read and write
53000018C000
trusted library allocation
page read and write
131D0BDF000
heap
page read and write
5300002F7000
trusted library allocation
page read and write
530000FD0000
trusted library allocation
page read and write
55C80087C000
trusted library allocation
page read and write
6E61000
heap
page read and write
55C800964000
trusted library allocation
page read and write
5300007EC000
trusted library allocation
page read and write
53000081C000
trusted library allocation
page read and write
55C8008F0000
trusted library allocation
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
7560000
direct allocation
page execute and read and write
6E61000
heap
page read and write
131D05FB000
heap
page read and write
31A79FE000
unkown
page readonly
530000720000
trusted library allocation
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
1480000
heap
page read and write
530000F98000
trusted library allocation
page read and write
530000D94000
trusted library allocation
page read and write
131D05F3000
heap
page read and write
530000690000
trusted library allocation
page read and write
530000B98000
trusted library allocation
page read and write
530000F88000
trusted library allocation
page read and write
6E61000
heap
page read and write
530000A48000
trusted library allocation
page read and write
7560000
direct allocation
page execute and read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
31A31FA000
stack
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
298E000
unkown
page read and write
7FDA000
heap
page read and write
31B01FD000
stack
page read and write
55C80078C000
trusted library allocation
page read and write
5E00002E4000
trusted library allocation
page read and write
5E00002B0000
trusted library allocation
page read and write
530000DBC000
trusted library allocation
page read and write
1D97000
heap
page read and write
6E61000
heap
page read and write
31B11FE000
stack
page read and write
31B39FE000
unkown
page readonly
1D8C000
heap
page read and write
701000
unkown
page execute read
530000ED8000
trusted library allocation
page read and write
6E61000
heap
page read and write
530000884000
trusted library allocation
page read and write
814B000
heap
page read and write
530000BE8000
trusted library allocation
page read and write
31AB9FE000
unkown
page readonly
5300001F0000
trusted library allocation
page read and write
28BA000
stack
page read and write
6E61000
heap
page read and write
1D11000
heap
page read and write
530000BF8000
trusted library allocation
page read and write
1AC0000
heap
page read and write
5300009A4000
trusted library allocation
page read and write
6E61000
heap
page read and write
7932000
heap
page read and write
701000
unkown
page execute read
1C74000
heap
page read and write
55C800974000
trusted library allocation
page read and write
6E61000
heap
page read and write
7560000
direct allocation
page execute and read and write
131D2DF0000
trusted library section
page read and write
1490000
heap
page read and write
530000224000
trusted library allocation
page read and write
150800250000
direct allocation
page read and write
530000430000
trusted library allocation
page read and write
530000C7C000
trusted library allocation
page read and write
530000F6C000
trusted library allocation
page read and write
1D78000
heap
page read and write
7DC0000
heap
page read and write
131CCF90000
heap
page readonly
6E61000
heap
page read and write
530000494000
trusted library allocation
page read and write
150800280000
direct allocation
page read and write
530000954000
trusted library allocation
page read and write
6E61000
heap
page read and write
5E00002A0000
trusted library allocation
page read and write
700000
unkown
page readonly
7E54000
heap
page read and write
6E61000
heap
page read and write
31A49FE000
unkown
page readonly
6E61000
heap
page read and write
530000484000
trusted library allocation
page read and write
7E8B000
heap
page read and write
131D0C00000
trusted library section
page read and write
1508002DC000
direct allocation
page read and write
530000C58000
trusted library allocation
page read and write
F90000
heap
page read and write
6E61000
heap
page read and write
7DC8000
heap
page read and write
1CC0000
direct allocation
page read and write
1680000
heap
page read and write
3B40000
direct allocation
page read and write
31A61FB000
stack
page read and write
5300000DC000
trusted library allocation
page read and write
55C800801000
trusted library allocation
page read and write
53000032C000
trusted library allocation
page read and write
5300006D0000
trusted library allocation
page read and write
70A000
unkown
page readonly
5300009BC000
trusted library allocation
page read and write
131D0B43000
heap
page read and write
701000
unkown
page execute read
711000
unkown
page readonly
530000201000
trusted library allocation
page read and write
131D6812000
trusted library section
page read and write
6E61000
heap
page read and write
701000
unkown
page execute read
1C74000
heap
page read and write
7EB4000
heap
page read and write
1508002AC000
direct allocation
page read and write
7DC2000
heap
page read and write
150800210000
direct allocation
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
131CD295000
heap
page read and write
530000434000
trusted library allocation
page read and write
6E61000
heap
page read and write
55C80039C000
trusted library allocation
page read and write
7560000
direct allocation
page execute and read and write
70E000
unkown
page read and write
1050000
heap
page read and write
6E61000
heap
page read and write
7DC9000
heap
page read and write
5300001C8000
trusted library allocation
page read and write
530000858000
trusted library allocation
page read and write
131CD0ED000
heap
page read and write
530000D94000
trusted library allocation
page read and write
55C8007BC000
trusted library allocation
page read and write
53000096C000
trusted library allocation
page read and write
530000978000
trusted library allocation
page read and write
2FC0000
heap
page read and write
5E00002C0000
trusted library allocation
page read and write
5300007D0000
trusted library allocation
page read and write
55C8006F4000
trusted library allocation
page read and write
55C80081C000
trusted library allocation
page read and write
131D7486000
trusted library section
page read and write
1C74000
heap
page read and write
7530000
trusted library allocation
page read and write
1D74000
heap
page read and write
55C800874000
trusted library allocation
page read and write
530000ACC000
trusted library allocation
page read and write
14C0000
heap
page read and write
55C8002FC000
trusted library allocation
page read and write
530000C7C000
trusted library allocation
page read and write
5300009D4000
trusted library allocation
page read and write
802C000
heap
page read and write
131D0BE7000
heap
page read and write
530000C1C000
trusted library allocation
page read and write
131CD124000
heap
page read and write
7FA3000
heap
page read and write
FFC000
stack
page read and write
55C8006C8000
trusted library allocation
page read and write
53000021C000
trusted library allocation
page read and write
318C1FE000
stack
page read and write
15080024C000
direct allocation
page read and write
131D0B72000
heap
page read and write
131CCFD0000
heap
page read and write
530000F50000
trusted library allocation
page read and write
530000950000
trusted library allocation
page read and write
530000AC8000
trusted library allocation
page read and write
6E61000
heap
page read and write
7EB5000
heap
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
2930000
heap
page read and write
5E0000270000
trusted library allocation
page read and write
530000FC0000
trusted library allocation
page read and write
530000CD0000
trusted library allocation
page read and write
55C800401000
trusted library allocation
page read and write
7DCC000
heap
page read and write
530000B48000
trusted library allocation
page read and write
131D4F51000
heap
page read and write
2940000
heap
page read and write
7DC7000
heap
page read and write
6E61000
heap
page read and write
5E0000260000
trusted library allocation
page read and write
5300003A4000
trusted library allocation
page read and write
319F9FE000
unkown
page readonly
530000AA8000
trusted library allocation
page read and write
6E61000
heap
page read and write
1C74000
heap
page read and write
1C74000
heap
page read and write
131D4A52000
trusted library allocation
page read and write
14C0000
heap
page read and write
55C800248000
trusted library allocation
page read and write
530000F04000
trusted library allocation
page read and write
530000A01000
trusted library allocation
page read and write
55C8008B4000
trusted library allocation
page read and write
6E61000
heap
page read and write
53000017C000
trusted library allocation
page read and write
55C8006D4000
trusted library allocation
page read and write
7DC7000
heap
page read and write
6E61000
heap
page read and write
530000738000
trusted library allocation
page read and write
31B71FC000
stack
page read and write
7560000
direct allocation
page execute and read and write
6E61000
heap
page read and write
5300006E0000
trusted library allocation
page read and write
6E61000
heap
page read and write
7DCD000
heap
page read and write
6C7CC000
unkown
page readonly
530000601000
trusted library allocation
page read and write
55C8006E0000
trusted library allocation
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
5300002B4000
trusted library allocation
page read and write
5300000A8000
trusted library allocation
page read and write
7DC7000
heap
page read and write
5300001E0000
trusted library allocation
page read and write
131D66B2000
trusted library section
page read and write
55C800860000
trusted library allocation
page read and write
530000300000
trusted library allocation
page read and write
53000100C000
trusted library allocation
page read and write
6E61000
heap
page read and write
1CC0000
direct allocation
page read and write
7DC7000
heap
page read and write
6E61000
heap
page read and write
530000F80000
trusted library allocation
page read and write
5300010E4000
trusted library allocation
page read and write
6E61000
heap
page read and write
7560000
direct allocation
page execute and read and write
1CFF000
stack
page read and write
31931FE000
stack
page read and write
131D73B0000
trusted library section
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
31B41FE000
stack
page read and write
6E61000
heap
page read and write
77A1000
heap
page read and write
5E00002F4000
trusted library allocation
page read and write
131D0B7D000
heap
page read and write
5E0000230000
trusted library allocation
page read and write
530000F60000
trusted library allocation
page read and write
530000A0C000
trusted library allocation
page read and write
31A01FD000
stack
page read and write
530000429000
trusted library allocation
page read and write
55C80039C000
trusted library allocation
page read and write
5E00002A0000
trusted library allocation
page read and write
530000C7C000
trusted library allocation
page read and write
530000768000
trusted library allocation
page read and write
530000E58000
trusted library allocation
page read and write
1D78000
heap
page read and write
15DE000
stack
page read and write
6E61000
heap
page read and write
7DC0000
heap
page read and write
31A91FB000
stack
page read and write
530000E8C000
trusted library allocation
page read and write
319B9FE000
unkown
page readonly
6E61000
heap
page read and write
31941FB000
stack
page read and write
6E61000
heap
page read and write
7E57000
heap
page read and write
700000
unkown
page readonly
131D0B16000
heap
page read and write
5300006F4000
trusted library allocation
page read and write
2C8B000
heap
page read and write
530000CA8000
trusted library allocation
page read and write
72E0000
direct allocation
page read and write
55C8002D4000
trusted library allocation
page read and write
7F80000
heap
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
131D5367000
unclassified section
page read and write
131D0B6E000
heap
page read and write
D40000
heap
page read and write
701000
unkown
page execute read
5E0000274000
trusted library allocation
page read and write
5E00002BC000
trusted library allocation
page read and write
55C8006E8000
trusted library allocation
page read and write
5300007B3000
trusted library allocation
page read and write
5300008C0000
trusted library allocation
page read and write
80BD000
heap
page read and write
1508002E4000
direct allocation
page read and write
530000218000
trusted library allocation
page read and write
131D05FF000
heap
page read and write
7EB6000
heap
page read and write
131D6743000
trusted library section
page read and write
7F64000
heap
page read and write
530000474000
trusted library allocation
page read and write
6E61000
heap
page read and write
53000030C000
trusted library allocation
page read and write
530000B94000
trusted library allocation
page read and write
5300002A4000
trusted library allocation
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
530000E20000
trusted library allocation
page read and write
530000CF9000
trusted library allocation
page read and write
6E61000
heap
page read and write
7ED5000
heap
page read and write
5300006D4000
trusted library allocation
page read and write
1D78000
heap
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
711000
unkown
page readonly
530000FC0000
trusted library allocation
page read and write
C20000
heap
page read and write
6E61000
heap
page read and write
530000230000
trusted library allocation
page read and write
6E61000
heap
page read and write
5E00002BC000
trusted library allocation
page read and write
7DC5000
heap
page read and write
530000B5C000
trusted library allocation
page read and write
55C800700000
trusted library allocation
page read and write
7E92000
heap
page read and write
530000D71000
trusted library allocation
page read and write
7DC9000
heap
page read and write
530000318000
trusted library allocation
page read and write
6E61000
heap
page read and write
55C80085C000
trusted library allocation
page read and write
55C8002F0000
trusted library allocation
page read and write
530000EE8000
trusted library allocation
page read and write
7DC4000
heap
page read and write
1CC0000
direct allocation
page read and write
530000927000
trusted library allocation
page read and write
6E61000
heap
page read and write
131CD030000
heap
page read and write
55C8008C8000
trusted library allocation
page read and write
530000AF4000
trusted library allocation
page read and write
530000F44000
trusted library allocation
page read and write
6E61000
heap
page read and write
530000118000
trusted library allocation
page read and write
5300006B0000
trusted library allocation
page read and write
6E61000
heap
page read and write
70A000
unkown
page readonly
5300001D4000
trusted library allocation
page read and write
131D6EC7000
unclassified section
page read and write
5300000FC000
trusted library allocation
page read and write
131D2E77000
unclassified section
page read and write
6E61000
heap
page read and write
530001001000
trusted library allocation
page read and write
53000015C000
trusted library allocation
page read and write
530000F20000
trusted library allocation
page read and write
31901FD000
stack
page read and write
6E61000
heap
page read and write
530000C48000
trusted library allocation
page read and write
6E61000
heap
page read and write
8056000
heap
page read and write
31A21FA000
stack
page read and write
131CD000000
trusted library allocation
page read and write
3B40000
direct allocation
page read and write
131D4F20000
heap
page read and write
530000ECC000
trusted library allocation
page read and write
319F1FB000
stack
page read and write
31B81FE000
stack
page read and write
31A11FA000
stack
page read and write
318E1FE000
stack
page read and write
1CC0000
direct allocation
page read and write
1ED0000
heap
page read and write
55C800828000
trusted library allocation
page read and write
55C800894000
trusted library allocation
page read and write
53000014C000
trusted library allocation
page read and write
55C800408000
trusted library allocation
page read and write
530000BB0000
trusted library allocation
page read and write
55C800790000
trusted library allocation
page read and write
7F6A000
heap
page read and write
131CD0C9000
heap
page read and write
131D0B19000
heap
page read and write
530000EA8000
trusted library allocation
page read and write
6E61000
heap
page read and write
7DC3000
heap
page read and write
6E61000
heap
page read and write
530000B54000
trusted library allocation
page read and write
7540000
direct allocation
page execute and read and write
55C8008B8000
trusted library allocation
page read and write
7530000
direct allocation
page execute and read and write
530000A24000
trusted library allocation
page read and write
7DCD000
heap
page read and write
131D0600000
heap
page read and write
6E61000
heap
page read and write
150800270000
direct allocation
page read and write
5300002B4000
trusted library allocation
page read and write
150800201000
direct allocation
page read and write
7F2F000
heap
page read and write
17AB000
unkown
page execute and write copy
131D74E0000
trusted library section
page read and write
530000584000
trusted library allocation
page read and write
53000016C000
trusted library allocation
page read and write
131D681D000
trusted library section
page read and write
53000060C000
trusted library allocation
page read and write
5300010F4000
trusted library allocation
page read and write
55C800918000
trusted library allocation
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
31A19FE000
unkown
page readonly
701000
unkown
page execute read
5E0000248000
trusted library allocation
page read and write
1C74000
heap
page read and write
6E61000
heap
page read and write
31AD9FE000
unkown
page readonly
530000134000
trusted library allocation
page read and write
150800303000
direct allocation
page read and write
5300001F4000
trusted library allocation
page read and write
6E61000
heap
page read and write
530001080000
trusted library allocation
page read and write
318D1FE000
stack
page read and write
530000A58000
trusted library allocation
page read and write
6E61000
heap
page read and write
1D9A000
heap
page read and write
31971FE000
stack
page read and write
7DC3000
heap
page read and write
55C80060C000
trusted library allocation
page read and write
7DC000
stack
page read and write
6E61000
heap
page read and write
53000032C000
trusted library allocation
page read and write
1CC0000
direct allocation
page read and write
530000B48000
trusted library allocation
page read and write
7A06000
direct allocation
page read and write
7DC3000
heap
page read and write
1508002EC000
direct allocation
page read and write
6E61000
heap
page read and write
530000074000
trusted library allocation
page read and write
6E61000
heap
page read and write
5300001B4000
trusted library allocation
page read and write
7DC5000
heap
page read and write
70E000
unkown
page write copy
5300001E4000
trusted library allocation
page read and write
530000F2C000
trusted library allocation
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
530000F8C000
trusted library allocation
page read and write
530000CE0000
trusted library allocation
page read and write
530000C84000
trusted library allocation
page read and write
1CC0000
direct allocation
page read and write
8154000
heap
page read and write
6E61000
heap
page read and write
53000022C000
trusted library allocation
page read and write
7F34000
heap
page read and write
31919FE000
unkown
page readonly
318B9FE000
unkown
page readonly
530000D64000
trusted library allocation
page read and write
5300010A0000
trusted library allocation
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
55C800418000
trusted library allocation
page read and write
319D9FE000
unkown
page readonly
711000
unkown
page readonly
131D6F00000
trusted library section
page read and write
53000037C000
trusted library allocation
page read and write
319C9FE000
unkown
page readonly
7DC9000
heap
page read and write
530000298000
trusted library allocation
page read and write
6E61000
heap
page read and write
530000300000
trusted library allocation
page read and write
530000D18000
trusted library allocation
page read and write
5300000EC000
trusted library allocation
page read and write
6E61000
heap
page read and write
55C800248000
trusted library allocation
page read and write
6E61000
heap
page read and write
55C8002ED000
trusted library allocation
page read and write
6C77F000
unkown
page readonly
530000A6C000
trusted library allocation
page read and write
5E00002B0000
trusted library allocation
page read and write
131D7340000
trusted library section
page read and write
5300001B4000
trusted library allocation
page read and write
131D74AD000
trusted library section
page read and write
6E61000
heap
page read and write
55C80070C000
trusted library allocation
page read and write
1187000
heap
page read and write
E20000
heap
page read and write
55C80091C000
trusted library allocation
page read and write
1AFF000
stack
page read and write
6E61000
heap
page read and write
5300008B8000
trusted library allocation
page read and write
131CD290000
heap
page read and write
530000DD9000
trusted library allocation
page read and write
530000E01000
trusted library allocation
page read and write
6E61000
heap
page read and write
5E00002A0000
trusted library allocation
page read and write
1CCF000
stack
page read and write
530000C68000
trusted library allocation
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
5300008B5000
trusted library allocation
page read and write
131D7107000
unclassified section
page read and write
530000D94000
trusted library allocation
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
530000850000
trusted library allocation
page read and write
72A0000
trusted library allocation
page read and write
6E61000
heap
page read and write
5300001F8000
trusted library allocation
page read and write
7E9B000
heap
page read and write
1620000
heap
page read and write
530000D20000
trusted library allocation
page read and write
7560000
direct allocation
page execute and read and write
31BA9FE000
unkown
page readonly
8088000
heap
page read and write
7560000
direct allocation
page execute and read and write
147F000
stack
page read and write
53000040C000
trusted library allocation
page read and write
55C800844000
trusted library allocation
page read and write
530000220000
trusted library allocation
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
55C8008EC000
trusted library allocation
page read and write
131CD038000
heap
page read and write
530000234000
trusted library allocation
page read and write
5300002F3000
trusted library allocation
page read and write
2C3E000
stack
page read and write
1C74000
heap
page read and write
150800220000
direct allocation
page read and write
5E00002F8000
trusted library allocation
page read and write
131D73C0000
trusted library section
page read and write
530000E70000
trusted library allocation
page read and write
530000340000
trusted library allocation
page read and write
6E61000
heap
page read and write
1CC0000
direct allocation
page read and write
530001038000
trusted library allocation
page read and write
31A71FC000
stack
page read and write
701000
unkown
page execute read
5E00002C0000
trusted library allocation
page read and write
6E61000
heap
page read and write
1808000
heap
page read and write
1060000
heap
page read and write
131D53F3000
heap
page read and write
801B000
heap
page read and write
55C800601000
trusted library allocation
page read and write
6E61000
heap
page read and write
150800294000
direct allocation
page read and write
7F78000
heap
page read and write
55C80080C000
trusted library allocation
page read and write
5300006C0000
trusted library allocation
page read and write
6E61000
heap
page read and write
53000037C000
trusted library allocation
page read and write
55C80082C000
trusted library allocation
page read and write
5E00002BC000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
1D78000
heap
page read and write
131D05F5000
heap
page read and write
5300001B4000
trusted library allocation
page read and write
131D7372000
trusted library section
page read and write
161E000
stack
page read and write
6E61000
heap
page read and write
530000228000
trusted library allocation
page read and write
5300002A8000
trusted library allocation
page read and write
6E61000
heap
page read and write
1D9B000
heap
page read and write
131D0B39000
heap
page read and write
31911FB000
stack
page read and write
319B1FA000
stack
page read and write
711000
unkown
page readonly
55C800858000
trusted library allocation
page read and write
6E61000
heap
page read and write
7560000
direct allocation
page execute and read and write
53000020C000
trusted library allocation
page read and write
31929FE000
unkown
page readonly
53000000C000
trusted library allocation
page read and write
131D6F0E000
trusted library section
page read and write
530000E4C000
trusted library allocation
page read and write
70E000
unkown
page read and write
5E0000238000
trusted library allocation
page read and write
150800215000
direct allocation
page read and write
7F80000
heap
page read and write
7DC9000
heap
page read and write
530000128000
trusted library allocation
page read and write
6E61000
heap
page read and write
1CC0000
direct allocation
page read and write
6C7C8000
unkown
page readonly
6E61000
heap
page read and write
7DC2000
heap
page read and write
6E61000
heap
page read and write
53000008C000
trusted library allocation
page read and write
530000E0C000
trusted library allocation
page read and write
700000
unkown
page readonly
530000E80000
trusted library allocation
page read and write
6E61000
heap
page read and write
5E0000201000
trusted library allocation
page read and write
6E61000
heap
page read and write
55C800288000
trusted library allocation
page read and write
5300008A0000
trusted library allocation
page read and write
5E0000220000
trusted library allocation
page read and write
530000FD0000
trusted library allocation
page read and write
6E61000
heap
page read and write
530000C6C000
trusted library allocation
page read and write
5300004A0000
trusted library allocation
page read and write
D30000
heap
page read and write
55C800948000
trusted library allocation
page read and write
7EB7000
heap
page read and write
7560000
direct allocation
page execute and read and write
31921FA000
stack
page read and write
1508002A8000
direct allocation
page read and write
530000E3C000
trusted library allocation
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
55C80071C000
trusted library allocation
page read and write
319E9FE000
unkown
page readonly
6E61000
heap
page read and write
55C800880000
trusted library allocation
page read and write
6E61000
heap
page read and write
711000
unkown
page readonly
5E00002BC000
trusted library allocation
page read and write
530000B70000
trusted library allocation
page read and write
C2A000
heap
page read and write
55C8002F4000
trusted library allocation
page read and write
131D0830000
heap
page read and write
530000F98000
trusted library allocation
page read and write
530000214000
trusted library allocation
page read and write
150800260000
direct allocation
page read and write
31A69FE000
unkown
page readonly
530000001000
trusted library allocation
page read and write
1508002D0000
direct allocation
page read and write
530000620000
trusted library allocation
page read and write
55C800788000
trusted library allocation
page read and write
D10000
unkown
page readonly
31B89FE000
unkown
page readonly
530000EB8000
trusted library allocation
page read and write
6E61000
heap
page read and write
55C8006F4000
trusted library allocation
page read and write
70A000
unkown
page readonly
31951FB000
stack
page read and write
530000300000
trusted library allocation
page read and write
131D0B00000
heap
page read and write
5300001AC000
trusted library allocation
page read and write
131D05E8000
heap
page read and write
530000801000
trusted library allocation
page read and write
318F1FE000
stack
page read and write
70A000
unkown
page readonly
7560000
direct allocation
page execute and read and write
7DC2000
heap
page read and write
319D1FE000
stack
page read and write
6E61000
heap
page read and write
55C8008E4000
trusted library allocation
page read and write
5300005EC000
trusted library allocation
page read and write
5300000B4000
trusted library allocation
page read and write
31959FE000
unkown
page readonly
55C8006E8000
trusted library allocation
page read and write
55C8006BC000
trusted library allocation
page read and write
6E61000
heap
page read and write
5300009EC000
trusted library allocation
page read and write
55C800898000
trusted library allocation
page read and write
530000080000
trusted library allocation
page read and write
1D74000
heap
page read and write
7560000
direct allocation
page execute and read and write
C2E000
heap
page read and write
70E000
unkown
page write copy
5300006B0000
trusted library allocation
page read and write
70A000
unkown
page readonly
55C80020C000
trusted library allocation
page read and write
7550000
direct allocation
page execute and read and write
55C800210000
trusted library allocation
page read and write
6E61000
heap
page read and write
131D0B1E000
heap
page read and write
55C80025C000
trusted library allocation
page read and write
55C800424000
trusted library allocation
page read and write
5E00002C8000
trusted library allocation
page read and write
7E67000
heap
page read and write
53000093D000
trusted library allocation
page read and write
5300007BC000
trusted library allocation
page read and write
131D66BE000
trusted library section
page read and write
31AF1FE000
stack
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
530000C58000
trusted library allocation
page read and write
530000CEC000
trusted library allocation
page read and write
131D4F30000
heap
page read and write
131D0B3B000
heap
page read and write
131CEE40000
heap
page read and write
15080020C000
direct allocation
page read and write
7DC4000
heap
page read and write
530000500000
trusted library allocation
page read and write
7EDB000
heap
page read and write
131D53F0000
heap
page read and write
1CC0000
direct allocation
page read and write
6E61000
heap
page read and write
70E000
unkown
page write copy
6E61000
heap
page read and write
5300002A8000
trusted library allocation
page read and write
55C800878000
trusted library allocation
page read and write
31991FE000
stack
page read and write
1800000
heap
page read and write
5E0000288000
trusted library allocation
page read and write
6E61000
heap
page read and write
5300007AC000
trusted library allocation
page read and write
1CC0000
direct allocation
page read and write
55C800818000
trusted library allocation
page read and write
1CC0000
direct allocation
page read and write
53000034C000
trusted library allocation
page read and write
319A9FE000
unkown
page readonly
55C8007A0000
trusted library allocation
page read and write
5300000A2000
trusted library allocation
page read and write
55C8006AC000
trusted library allocation
page read and write
31A09FE000
unkown
page readonly
530000294000
trusted library allocation
page read and write
5E00002B0000
trusted library allocation
page read and write
131CF890000
unkown
page read and write
5E00002BC000
trusted library allocation
page read and write
6E61000
heap
page read and write
1D64000
heap
page read and write
6E61000
heap
page read and write
131D0B7B000
heap
page read and write
530000498000
trusted library allocation
page read and write
7560000
direct allocation
page execute and read and write
70E000
unkown
page write copy
1C74000
heap
page read and write
318A1EF000
stack
page read and write
530000D40000
trusted library allocation
page read and write
7DC1000
heap
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
31B31FE000
stack
page read and write
6E61000
heap
page read and write
530000058000
trusted library allocation
page read and write
53000036C000
trusted library allocation
page read and write
6E61000
heap
page read and write
7F49000
heap
page read and write
131D7130000
trusted library section
page read and write
150800284000
direct allocation
page read and write
530000E40000
trusted library allocation
page read and write
31B69FE000
unkown
page readonly
5E00002C0000
trusted library allocation
page read and write
5300006E5000
trusted library allocation
page read and write
700000
unkown
page readonly
131D5320000
heap
page read and write
31B51FB000
stack
page read and write
5E00002BC000
trusted library allocation
page read and write
6E61000
heap
page read and write
55C8006F0000
trusted library allocation
page read and write
55C800728000
trusted library allocation
page read and write
6C7C9000
unkown
page read and write
31B61FE000
stack
page read and write
530001030000
trusted library allocation
page read and write
7DCB000
heap
page read and write
5300002B4000
trusted library allocation
page read and write
FE0000
heap
page read and write
7F58000
heap
page read and write
131D05FF000
heap
page read and write
55C8006AC000
trusted library allocation
page read and write
6E61000
heap
page read and write
53000075C000
trusted library allocation
page read and write
1C74000
heap
page read and write
55C8007C0000
trusted library allocation
page read and write
55C800201000
trusted library allocation
page read and write
55C8008C4000
trusted library allocation
page read and write
530000DA0000
trusted library allocation
page read and write
31B49FE000
unkown
page readonly
6E61000
heap
page read and write
5E0000278000
trusted library allocation
page read and write
7DC7000
heap
page read and write
55C800840000
trusted library allocation
page read and write
126C000
stack
page read and write
6E61000
heap
page read and write
5300001AC000
trusted library allocation
page read and write
530001030000
trusted library allocation
page read and write
6E61000
heap
page read and write
11E0000
heap
page read and write
31A41FC000
stack
page read and write
6E61000
heap
page read and write
530000E0C000
trusted library allocation
page read and write
530000338000
trusted library allocation
page read and write
1C74000
heap
page read and write
530000C6C000
trusted library allocation
page read and write
6E61000
heap
page read and write
530000BF8000
trusted library allocation
page read and write
530000290000
trusted library allocation
page read and write
5E00002D8000
trusted library allocation
page read and write
6E61000
heap
page read and write
530000D5E000
trusted library allocation
page read and write
31909FE000
unkown
page readonly
530000300000
trusted library allocation
page read and write
131D0A60000
trusted library section
page read and write
131D737E000
trusted library section
page read and write
31B79FE000
unkown
page readonly
55C8007D4000
trusted library allocation
page read and write
55C8007C4000
trusted library allocation
page read and write
55C800904000
trusted library allocation
page read and write
31AC1FE000
stack
page read and write
31AB1FE000
stack
page read and write
131D0BA1000
heap
page read and write
53000037C000
trusted library allocation
page read and write
7BC1000
heap
page read and write
53000093F000
trusted library allocation
page read and write
53000062C000
trusted library allocation
page read and write
530000570000
trusted library allocation
page read and write
55C800778000
trusted library allocation
page read and write
80DA000
heap
page read and write
55C8002B0000
trusted library allocation
page read and write
143E000
stack
page read and write
6E61000
heap
page read and write
530000DE4000
trusted library allocation
page read and write
6E61000
heap
page read and write
7E8C000
heap
page read and write
5300004F4000
trusted library allocation
page read and write
1CC0000
direct allocation
page read and write
190F000
stack
page read and write
6E61000
heap
page read and write
5300001AC000
trusted library allocation
page read and write
6E61000
heap
page read and write
70E000
unkown
page read and write
6E61000
heap
page read and write
530000338000
trusted library allocation
page read and write
131D0B99000
heap
page read and write
5300006C5000
trusted library allocation
page read and write
1C74000
heap
page read and write
83D000
stack
page read and write
1CC0000
direct allocation
page read and write
53000091B000
trusted library allocation
page read and write
7EEA000
heap
page read and write
31BA1FE000
stack
page read and write
7731000
heap
page read and write
6E61000
heap
page read and write
31A51FC000
stack
page read and write
7560000
direct allocation
page execute and read and write
FDE000
stack
page read and write
2C80000
heap
page read and write
55C800864000
trusted library allocation
page read and write
31A89FE000
unkown
page readonly
319A1FD000
stack
page read and write
131D7360000
trusted library section
page read and write
31A59FE000
unkown
page readonly
55C8002CC000
trusted library allocation
page read and write
31B09FE000
unkown
page readonly
319E1FE000
stack
page read and write
530000484000
trusted library allocation
page read and write
131CCFA0000
heap
page read and write
F3C000
stack
page read and write
7EED000
heap
page read and write
1C74000
heap
page read and write
6E61000
heap
page read and write
711000
unkown
page readonly
1C74000
heap
page read and write
794A000
heap
page read and write
530000C9C000
trusted library allocation
page read and write
5E000020C000
trusted library allocation
page read and write
6E61000
heap
page read and write
7F0A000
heap
page read and write
29CF000
unkown
page read and write
530000F7C000
trusted library allocation
page read and write
7EF1000
heap
page read and write
530000B7C000
trusted library allocation
page read and write
31B21FE000
stack
page read and write
530000EBC000
trusted library allocation
page read and write
7560000
direct allocation
page execute and read and write
6E61000
heap
page read and write
530000C0C000
trusted library allocation
page read and write
31AA1FE000
stack
page read and write
131D66A0000
trusted library section
page read and write
D11000
unkown
page execute and write copy
31981FE000
stack
page read and write
530000294000
trusted library allocation
page read and write
6E61000
heap
page read and write
6E61000
heap
page read and write
5E0000250000
trusted library allocation
page read and write
5300002F0000
trusted library allocation
page read and write
6E61000
heap
page read and write
70A000
unkown
page readonly
53000034C000
trusted library allocation
page read and write
6E61000
heap
page read and write
530000390000
trusted library allocation
page read and write
530000F10000
trusted library allocation
page read and write
31B29FE000
unkown
page readonly
6E61000
heap
page read and write
131CD0CD000
heap
page read and write
77A1000
heap
page read and write
530000934000
trusted library allocation
page read and write
1C74000
heap
page read and write
530000518000
trusted library allocation
page read and write
5300004D0000
trusted library allocation
page read and write
530000D88000
trusted library allocation
page read and write
131CD260000
trusted library section
page readonly
31AE1FD000
stack
page read and write
6E61000
heap
page read and write
7940000
heap
page read and write
55C80040C000
trusted library allocation
page read and write
55C800830000
trusted library allocation
page read and write
7560000
direct allocation
page execute and read and write
77A1000
heap
page read and write
7F36000
heap
page read and write
31A11FC000
stack
page read and write
2C7F000
stack
page read and write
530000E40000
trusted library allocation
page read and write
530000210000
trusted library allocation
page read and write
6C6A1000
unkown
page execute read
5E0000235000
trusted library allocation
page read and write
7DC4000
heap
page read and write
53000009E000
trusted library allocation
page read and write
1D6A000
heap
page read and write
6E61000
heap
page read and write
5300001C4000
trusted library allocation
page read and write
530001080000
trusted library allocation
page read and write
7DC3000
heap
page read and write
7FAE000
heap
page read and write
530000F6C000
trusted library allocation
page read and write
55C800884000
trusted library allocation
page read and write
7FF3000
heap
page read and write
530000D6C000
trusted library allocation
page read and write
5300002C0000
trusted library allocation
page read and write
530000B08000
trusted library allocation
page read and write
131D0B43000
heap
page read and write
53000026C000
trusted library allocation
page read and write
6E61000
heap
page read and write
530000C94000
trusted library allocation
page read and write
131D73D1000
trusted library section
page read and write
5300001E8000
trusted library allocation
page read and write
7F27000
heap
page read and write
5300001DC000
trusted library allocation
page read and write
530000828000
trusted library allocation
page read and write
530000318000
trusted library allocation
page read and write
6E61000
heap
page read and write
7DC5000
heap
page read and write
700000
unkown
page readonly
530000D94000
trusted library allocation
page read and write
700000
unkown
page readonly
BFC000
stack
page read and write
31B99FE000
unkown
page readonly
1180000
heap
page read and write
6C77D000
unkown
page read and write
530000D30000
trusted library allocation
page read and write
31B91FE000
stack
page read and write
6E61000
heap
page read and write
131D74A2000
trusted library section
page read and write
5E00002A0000
trusted library allocation
page read and write
131D05FB000
heap
page read and write
1D83000
heap
page read and write
150800230000
direct allocation
page read and write
150800234000
direct allocation
page read and write
530000E98000
trusted library allocation
page read and write
55C8007E0000
trusted library allocation
page read and write
7ECC000
heap
page read and write
1D82000
heap
page read and write
8108000
heap
page read and write
530000C6C000
trusted library allocation
page read and write
6E61000
heap
page read and write
5E0000264000
trusted library allocation
page read and write
530000358000
trusted library allocation
page read and write
53000066C000
trusted library allocation
page read and write
70E000
unkown
page read and write
There are 1183 hidden memdumps, click here to show them.