IOC Report
kFrGefsAK3.exe

loading gif

Files

File Path
Type
Category
Malicious
kFrGefsAK3.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_kFrGefsAK3.exe_71d7d36b2611530c69ddb8f49ab6d9892148_4b5bc6ba_5e39449e-084e-4963-9b16-48ae3216df9f\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER71A2.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Dec 23 09:34:44 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER76D4.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7713.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\CaHNbeclRGcBxNSvHjFX.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
modified
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\kFrGefsAK3.exe
"C:\Users\user\Desktop\kFrGefsAK3.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 --field-trial-handle=2284,i,17304781938837466691,17340018191184435159,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user~1\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user~1\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user~1\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user~1\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7660 -s 1152
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
http://anglebug.com/8215O
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
http://anglebug.com/3584H
unknown
http://anglebug.com/7724B
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://crbug.com/368855.)
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actionsA
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore?hl=enH
unknown
https://chrome.google.com/webstore
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://chrome.google.com/webstoreCXJWwLrk=
unknown
https://issuetracker.google.com/issues/166475273/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://httpbin.org/ipbefore
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/7279E
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
https://google-ohttp-relay-join.fastly-edge.com/gjtp
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/5375;p
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
https://issuetracker.google.com/255411748tor
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/5281C
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
https://google-ohttp-relay-query.fastly-edge.com/pti
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
https://anglebug.com/7369J
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fivetk5sb.top
185.121.15.192
www.google.com
142.250.181.132
fivetk5sb.top
185.121.15.192
httpbin.org
34.226.108.155

IPs

IP
Domain
Country
Malicious
185.121.15.192
home.fivetk5sb.top
Spain
34.226.108.155
httpbin.org
United States
239.255.255.250
unknown
Reserved
142.250.181.132
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
ProgramId
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
FileId
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
LowerCaseLongPath
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
LongPathHash
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
Name
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
OriginalFileName
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
Publisher
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
Version
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
BinFileVersion
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
BinaryType
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
ProductName
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
ProductVersion
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
LinkDate
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
BinProductVersion
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
AppxPackageFullName
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
AppxPackageRelativeId
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
Size
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
Language
\REGISTRY\A\{3fe3e73d-048f-ecb1-60e1-02a92417d163}\Root\InventoryApplicationFile\kfrgefsak3.exe|6218cdab891ddfef
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
34FF000
stack
page read and write
7074003EC000
trusted library allocation
page read and write
CD8B7FE000
unkown
page readonly
24F2E6A2000
trusted library section
page read and write
AA1000
unkown
page readonly
6F0002AC000
direct allocation
page read and write
8E0000
heap
page read and write
8139000
heap
page read and write
A74024E0000
trusted library allocation
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
121E000
stack
page read and write
7074006BC000
trusted library allocation
page read and write
7074002E4000
trusted library allocation
page read and write
A7402628000
trusted library allocation
page read and write
A74032AC000
trusted library allocation
page read and write
7EC00201000
trusted library allocation
page read and write
1D11000
heap
page read and write
A7402864000
trusted library allocation
page read and write
6DD1000
heap
page read and write
24F2791D000
heap
page read and write
1AE4000
heap
page read and write
A7402280000
trusted library allocation
page read and write
707400368000
trusted library allocation
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
3BC000
stack
page read and write
1D26000
heap
page read and write
6DC0000
direct allocation
page read and write
7074007D0000
trusted library allocation
page read and write
6DC0000
direct allocation
page read and write
A74023AC000
trusted library allocation
page read and write
A7403168000
trusted library allocation
page read and write
CDF95FE000
unkown
page readonly
6DD1000
heap
page read and write
CD987FE000
unkown
page readonly
24F243C0000
heap
page read and write
7EC00248000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A74026EB000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A7402254000
trusted library allocation
page read and write
A7402988000
trusted library allocation
page read and write
CD82FFE000
stack
page read and write
A7402B2C000
trusted library allocation
page read and write
6DD1000
heap
page read and write
24F2E5C0000
trusted library section
page read and write
A74026A0000
trusted library allocation
page read and write
81FF000
heap
page read and write
A7403174000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A7403314000
trusted library allocation
page read and write
CD827FE000
unkown
page readonly
6DD1000
heap
page read and write
A9E000
unkown
page write copy
7611000
heap
page read and write
A7402AB8000
trusted library allocation
page read and write
10E8000
heap
page read and write
70740080C000
trusted library allocation
page read and write
85E000
stack
page read and write
24F27F60000
trusted library section
page read and write
24F2DB80000
trusted library section
page read and write
1D26000
heap
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
CD80FFD000
stack
page read and write
78FA000
heap
page read and write
CD9FFFC000
stack
page read and write
6DD1000
heap
page read and write
6DC0000
direct allocation
page read and write
7F07000
heap
page read and write
6DD1000
heap
page read and write
74F0000
direct allocation
page execute and read and write
A7400401000
trusted library allocation
page read and write
A90000
unkown
page readonly
A7402F10000
trusted library allocation
page read and write
AA1000
unkown
page readonly
7F0D000
heap
page read and write
A7402F20000
trusted library allocation
page read and write
7EC00288000
trusted library allocation
page read and write
A9A000
unkown
page readonly
A7402498000
trusted library allocation
page read and write
816C000
heap
page read and write
A7402678000
trusted library allocation
page read and write
A74024F4000
trusted library allocation
page read and write
7EC002C0000
trusted library allocation
page read and write
78F1000
heap
page read and write
A74025E8000
trusted library allocation
page read and write
AA1000
unkown
page readonly
A74024F4000
trusted library allocation
page read and write
3380000
heap
page read and write
CD8BFFC000
stack
page read and write
6DD1000
heap
page read and write
A7402494000
trusted library allocation
page read and write
CDF5DFE000
stack
page read and write
A740252C000
trusted library allocation
page read and write
7EC002F8000
trusted library allocation
page read and write
6DD1000
heap
page read and write
24F2A130000
trusted library section
page read and write
16BF000
stack
page read and write
A7402778000
trusted library allocation
page read and write
6DD1000
heap
page read and write
8036000
heap
page read and write
A9E000
unkown
page read and write
CD9DFFA000
stack
page read and write
A7402DC4000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A74023DC000
trusted library allocation
page read and write
707400330000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A90000
unkown
page readonly
7710000
trusted library allocation
page read and write
A7402F3C000
trusted library allocation
page read and write
A7402BDC000
trusted library allocation
page read and write
A7403060000
trusted library allocation
page read and write
707400248000
trusted library allocation
page read and write
6DD1000
heap
page read and write
24F24480000
heap
page read and write
A7402560000
trusted library allocation
page read and write
A9E000
unkown
page write copy
7074002ED000
trusted library allocation
page read and write
A740340C000
trusted library allocation
page read and write
6DD1000
heap
page read and write
24F2DB60000
heap
page read and write
6DD1000
heap
page read and write
A74023B4000
trusted library allocation
page read and write
707400714000
trusted library allocation
page read and write
24F2D463000
heap
page read and write
A74024F4000
trusted library allocation
page read and write
6F00020C000
direct allocation
page read and write
24F244C0000
heap
page read and write
6DD1000
heap
page read and write
A90000
unkown
page readonly
A7402A38000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A74030EC000
trusted library allocation
page read and write
A74026E4000
trusted library allocation
page read and write
7F0C000
heap
page read and write
6DD1000
heap
page read and write
A7402AE4000
trusted library allocation
page read and write
A7402D90000
trusted library allocation
page read and write
1D10000
heap
page read and write
A7402740000
trusted library allocation
page read and write
6DD1000
heap
page read and write
707400248000
trusted library allocation
page read and write
6DD1000
heap
page read and write
1D34000
heap
page read and write
6DD1000
heap
page read and write
806B000
heap
page read and write
A740341C000
trusted library allocation
page read and write
A7402BD4000
trusted library allocation
page read and write
74C0000
direct allocation
page execute and read and write
A9E000
unkown
page read and write
6DD1000
heap
page read and write
A9A000
unkown
page readonly
A740252C000
trusted library allocation
page read and write
7B01000
heap
page read and write
6DD1000
heap
page read and write
A7403040000
trusted library allocation
page read and write
7F04000
heap
page read and write
CD96FFD000
stack
page read and write
CD84FFE000
stack
page read and write
7260000
direct allocation
page read and write
CD8CFFC000
stack
page read and write
6DD1000
heap
page read and write
74F0000
direct allocation
page execute and read and write
7FC7000
heap
page read and write
A90000
unkown
page readonly
7074006B0000
trusted library allocation
page read and write
A9A000
unkown
page readonly
A74027F8000
trusted library allocation
page read and write
24F27915000
heap
page read and write
A7402910000
trusted library allocation
page read and write
74F0000
direct allocation
page execute and read and write
A90000
unkown
page readonly
CD98FFD000
stack
page read and write
7EC002A0000
trusted library allocation
page read and write
A91000
unkown
page execute read
707400250000
trusted library allocation
page read and write
6DD1000
heap
page read and write
7074006C8000
trusted library allocation
page read and write
24F27910000
heap
page read and write
24F27EB2000
heap
page read and write
6DC0000
direct allocation
page read and write
CD807FE000
unkown
page readonly
A7402CF0000
trusted library allocation
page read and write
807B000
heap
page read and write
6DD1000
heap
page read and write
24F2DC36000
trusted library section
page read and write
24F2E6E0000
trusted library section
page read and write
805C000
heap
page read and write
24F27E80000
heap
page read and write
1D47000
heap
page read and write
24F2DF50000
trusted library section
page read and write
6DD1000
heap
page read and write
A7402BEC000
trusted library allocation
page read and write
A7402908000
trusted library allocation
page read and write
6DD1000
heap
page read and write
24F244BA000
heap
page read and write
6DD1000
heap
page read and write
A74033E0000
trusted library allocation
page read and write
6F00026C000
direct allocation
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
1010000
heap
page read and write
A7402BEC000
trusted library allocation
page read and write
CD897FE000
unkown
page readonly
A7402594000
trusted library allocation
page read and write
707400430000
trusted library allocation
page read and write
CD947FE000
unkown
page readonly
A740237C000
trusted library allocation
page read and write
A7402DA0000
trusted library allocation
page read and write
A74033EC000
trusted library allocation
page read and write
24F2E790000
trusted library section
page read and write
CD86FFE000
stack
page read and write
8207000
heap
page read and write
740000
heap
page read and write
A90000
unkown
page readonly
A7402EC8000
trusted library allocation
page read and write
707400330000
trusted library allocation
page read and write
707400348000
trusted library allocation
page read and write
7F07000
heap
page read and write
CDF1DEF000
stack
page read and write
80C7000
heap
page read and write
801D000
heap
page read and write
3250000
heap
page read and write
A7402C94000
trusted library allocation
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
24F27B60000
heap
page read and write
A74030E0000
trusted library allocation
page read and write
A740260C000
trusted library allocation
page read and write
70740078C000
trusted library allocation
page read and write
10E0000
heap
page read and write
A74026C0000
trusted library allocation
page read and write
7F0F000
heap
page read and write
7074002CC000
trusted library allocation
page read and write
707400648000
trusted library allocation
page read and write
A9E000
unkown
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
BE0000
heap
page read and write
7EC002D8000
trusted library allocation
page read and write
A7402270000
trusted library allocation
page read and write
105C000
stack
page read and write
A7402735000
trusted library allocation
page read and write
7FA3000
heap
page read and write
A7402BF8000
trusted library allocation
page read and write
6DD1000
heap
page read and write
707400220000
trusted library allocation
page read and write
6DD1000
heap
page read and write
CDF7DFD000
stack
page read and write
6DD1000
heap
page read and write
7F0E000
heap
page read and write
A7402A01000
trusted library allocation
page read and write
24F2DC9D000
trusted library section
page read and write
A7402F48000
trusted library allocation
page read and write
7EC002C0000
trusted library allocation
page read and write
70740025C000
trusted library allocation
page read and write
A7400C01000
trusted library allocation
page read and write
707400624000
trusted library allocation
page read and write
A7402894000
trusted library allocation
page read and write
A74022F0000
trusted library allocation
page read and write
A74023AC000
trusted library allocation
page read and write
A740235C000
trusted library allocation
page read and write
A9E000
unkown
page read and write
78E000
stack
page read and write
6F000210000
direct allocation
page read and write
A7403304000
trusted library allocation
page read and write
A740329C000
trusted library allocation
page read and write
A7402B8F000
trusted library allocation
page read and write
6DD1000
heap
page read and write
1230000
heap
page read and write
AA1000
unkown
page readonly
A7402C84000
trusted library allocation
page read and write
24F27ED6000
heap
page read and write
A7402ED8000
trusted library allocation
page read and write
24F2E35E000
trusted library section
page read and write
A74030EC000
trusted library allocation
page read and write
CAF000
stack
page read and write
CDF55FE000
unkown
page readonly
7074002B8000
trusted library allocation
page read and write
A7402EE8000
trusted library allocation
page read and write
80AC000
heap
page read and write
A91000
unkown
page execute read
CD81FFD000
stack
page read and write
A7402494000
trusted library allocation
page read and write
707400424000
trusted library allocation
page read and write
CDF75FE000
unkown
page readonly
A7402A30000
trusted library allocation
page read and write
7074006EC000
trusted library allocation
page read and write
24F2E350000
trusted library section
page read and write
6DD1000
heap
page read and write
707400310000
trusted library allocation
page read and write
1AE4000
heap
page read and write
A7402B80000
trusted library allocation
page read and write
A7402500000
trusted library allocation
page read and write
6DD1000
heap
page read and write
CD837FE000
unkown
page readonly
A7401001000
trusted library allocation
page read and write
24F27914000
heap
page read and write
707400801000
trusted library allocation
page read and write
6F000280000
direct allocation
page read and write
707400374000
trusted library allocation
page read and write
A7403154000
trusted library allocation
page read and write
6DD1000
heap
page read and write
7F06000
heap
page read and write
A91000
unkown
page execute read
707400630000
trusted library allocation
page read and write
6F0002A8000
direct allocation
page read and write
A7402428000
trusted library allocation
page read and write
CD91FFC000
stack
page read and write
A7402F18000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A7402E31000
trusted library allocation
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
6F000294000
direct allocation
page read and write
7F05000
heap
page read and write
7632000
heap
page read and write
CD9F7FE000
unkown
page readonly
A74023E0000
trusted library allocation
page read and write
6DD1000
heap
page read and write
2F8A000
stack
page read and write
A7402CDC000
trusted library allocation
page read and write
707400320000
trusted library allocation
page read and write
6DD1000
heap
page read and write
7EC002F0000
trusted library allocation
page read and write
A7402264000
trusted library allocation
page read and write
7074006CC000
trusted library allocation
page read and write
7FC0000
heap
page read and write
24F245E0000
trusted library section
page readonly
7F0D000
heap
page read and write
804B000
heap
page read and write
CDF85FE000
unkown
page readonly
FFC000
stack
page read and write
CDA0FFE000
stack
page read and write
A740314C000
trusted library allocation
page read and write
A74028A4000
trusted library allocation
page read and write
12D0000
heap
page read and write
A7402EC8000
trusted library allocation
page read and write
24F27EC4000
heap
page read and write
74F0000
direct allocation
page execute and read and write
A90000
unkown
page readonly
707400730000
trusted library allocation
page read and write
7F05000
heap
page read and write
782F000
direct allocation
page read and write
1200000
unkown
page write copy
70740069C000
trusted library allocation
page read and write
6DD1000
heap
page read and write
CD887FE000
unkown
page readonly
7FC000
stack
page read and write
A74024F4000
trusted library allocation
page read and write
8072000
heap
page read and write
6DD1000
heap
page read and write
A740242C000
trusted library allocation
page read and write
7EC002B0000
trusted library allocation
page read and write
3640000
heap
page read and write
6DD1000
heap
page read and write
707400330000
trusted library allocation
page read and write
A7402ADC000
trusted library allocation
page read and write
1CEB000
heap
page read and write
6DD1000
heap
page read and write
24F2E79E000
trusted library section
page read and write
707400354000
trusted library allocation
page read and write
A74028FD000
trusted library allocation
page read and write
74F0000
direct allocation
page execute and read and write
A9A000
unkown
page readonly
A7402D90000
trusted library allocation
page read and write
819E000
heap
page read and write
A7402E6C000
trusted library allocation
page read and write
7EC002A0000
trusted library allocation
page read and write
8005000
heap
page read and write
7EC00294000
trusted library allocation
page read and write
A7402490000
trusted library allocation
page read and write
7611000
heap
page read and write
7FB7000
heap
page read and write
A7403058000
trusted library allocation
page read and write
CDFADFE000
stack
page read and write
8189000
heap
page read and write
A7402C9A000
trusted library allocation
page read and write
1100000
heap
page read and write
6DD1000
heap
page read and write
74F0000
direct allocation
page execute and read and write
24F24685000
heap
page read and write
24F2447B000
heap
page read and write
A74027BC000
trusted library allocation
page read and write
A7402F84000
trusted library allocation
page read and write
74F0000
direct allocation
page execute and read and write
707400664000
trusted library allocation
page read and write
CDF4DFE000
stack
page read and write
A7402B54000
trusted library allocation
page read and write
8E8000
heap
page read and write
6DD1000
heap
page read and write
A7402F54000
trusted library allocation
page read and write
A74029F0000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A7402494000
trusted library allocation
page read and write
A7402AF0000
trusted library allocation
page read and write
A90000
unkown
page readonly
6DD1000
heap
page read and write
6DD1000
heap
page read and write
7074006D4000
trusted library allocation
page read and write
CDFFDFE000
stack
page read and write
707400404000
trusted library allocation
page read and write
A7402CB4000
trusted library allocation
page read and write
A74030C4000
trusted library allocation
page read and write
A7403070000
trusted library allocation
page read and write
6AC000
stack
page read and write
A7403030000
trusted library allocation
page read and write
24F27EAE000
heap
page read and write
6DD1000
heap
page read and write
1D3B000
heap
page read and write
A7403201000
trusted library allocation
page read and write
A7402688000
trusted library allocation
page read and write
A74023B4000
trusted library allocation
page read and write
74F0000
direct allocation
page execute and read and write
6DD1000
heap
page read and write
6DC0000
direct allocation
page read and write
6DD1000
heap
page read and write
A74033AC000
trusted library allocation
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
24F27EF2000
heap
page read and write
A740220C000
trusted library allocation
page read and write
A7402E31000
trusted library allocation
page read and write
A7402DBC000
trusted library allocation
page read and write
7F0D000
heap
page read and write
7B03000
heap
page read and write
7EC002B0000
trusted library allocation
page read and write
A740228C000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A74023AC000
trusted library allocation
page read and write
840000
heap
page read and write
3A0000
heap
page read and write
A70000
heap
page read and write
74E0000
direct allocation
page execute and read and write
24F24613000
heap
page read and write
A740236C000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A91000
unkown
page execute read
A7402BC8000
trusted library allocation
page read and write
A7402540000
trusted library allocation
page read and write
7074002B0000
trusted library allocation
page read and write
A7402B70000
trusted library allocation
page read and write
157E000
stack
page read and write
74F0000
direct allocation
page execute and read and write
6F0002EC000
direct allocation
page read and write
CD907FE000
unkown
page readonly
A74024F4000
trusted library allocation
page read and write
7F03000
heap
page read and write
707400668000
trusted library allocation
page read and write
A7402678000
trusted library allocation
page read and write
AE1000
unkown
page execute and write copy
7F0E000
heap
page read and write
A74029B0000
trusted library allocation
page read and write
A7402570000
trusted library allocation
page read and write
CD817FE000
unkown
page readonly
A7403264000
trusted library allocation
page read and write
D67000
heap
page read and write
7EC00250000
trusted library allocation
page read and write
24F2E561000
trusted library section
page read and write
A7402334000
trusted library allocation
page read and write
AA1000
unkown
page readonly
CD8E7FE000
unkown
page readonly
24F2E5D1000
trusted library section
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
8C0000
heap
page read and write
6F00023C000
direct allocation
page read and write
6DD1000
heap
page read and write
CAC000
stack
page read and write
A74031E8000
trusted library allocation
page read and write
CDFCDFB000
stack
page read and write
7FEC000
heap
page read and write
AA1000
unkown
page readonly
CD89FFD000
stack
page read and write
A9A000
unkown
page readonly
6DD1000
heap
page read and write
6DD1000
heap
page read and write
74F0000
direct allocation
page execute and read and write
6DD1000
heap
page read and write
CD967FE000
unkown
page readonly
A74030AC000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A7402B98000
trusted library allocation
page read and write
AA1000
unkown
page readonly
323E000
unkown
page read and write
707400758000
trusted library allocation
page read and write
A7402801000
trusted library allocation
page read and write
24F2790B000
heap
page read and write
A9E000
unkown
page write copy
6DD1000
heap
page read and write
6DD1000
heap
page read and write
A740252C000
trusted library allocation
page read and write
14BF000
stack
page read and write
707400614000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A740252C000
trusted library allocation
page read and write
6DD1000
heap
page read and write
7074007B4000
trusted library allocation
page read and write
710000
heap
page read and write
A74023D8000
trusted library allocation
page read and write
A7400801000
trusted library allocation
page read and write
A9A000
unkown
page readonly
24F26BB0000
unkown
page read and write
338B000
heap
page read and write
A7402570000
trusted library allocation
page read and write
707400354000
trusted library allocation
page read and write
707400620000
trusted library allocation
page read and write
6DD1000
heap
page read and write
7FAD000
heap
page read and write
6DD1000
heap
page read and write
707400418000
trusted library allocation
page read and write
7F0A000
heap
page read and write
CD917FE000
unkown
page readonly
A7403378000
trusted library allocation
page read and write
12D7000
heap
page read and write
8107000
heap
page read and write
A7402FF4000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A9A000
unkown
page readonly
A74031B8000
trusted library allocation
page read and write
24F27914000
heap
page read and write
A74023AC000
trusted library allocation
page read and write
105E000
stack
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
7F0D000
heap
page read and write
810000
heap
page read and write
24F27922000
heap
page read and write
CD92FFE000
unkown
page readonly
6DD1000
heap
page read and write
7074006E0000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A7402F94000
trusted library allocation
page read and write
A7402FE4000
trusted library allocation
page read and write
6DD1000
heap
page read and write
39E000
stack
page read and write
A7402424000
trusted library allocation
page read and write
7F0C000
heap
page read and write
74F0000
direct allocation
page execute and read and write
7710000
trusted library allocation
page read and write
A74024A4000
trusted library allocation
page read and write
70740020C000
trusted library allocation
page read and write
24F2DB57000
unclassified section
page read and write
A7402D00000
trusted library allocation
page read and write
1D26000
heap
page read and write
A7402622000
trusted library allocation
page read and write
BBC000
stack
page read and write
80DD000
heap
page read and write
7EC002BC000
trusted library allocation
page read and write
6DD1000
heap
page read and write
CD8C7FE000
unkown
page readonly
7EC002BC000
trusted library allocation
page read and write
A7402901000
trusted library allocation
page read and write
70740027C000
trusted library allocation
page read and write
7FFA000
heap
page read and write
A90000
unkown
page readonly
6DD1000
heap
page read and write
6F0002D0000
direct allocation
page read and write
74F0000
direct allocation
page execute and read and write
6DD1000
heap
page read and write
24F27E88000
heap
page read and write
7CE000
stack
page read and write
A7403090000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A7403168000
trusted library allocation
page read and write
A74023C8000
trusted library allocation
page read and write
1D22000
heap
page read and write
7F0E000
heap
page read and write
A7402A0C000
trusted library allocation
page read and write
74F0000
direct allocation
page execute and read and write
A7402F75000
trusted library allocation
page read and write
A7402A70000
trusted library allocation
page read and write
6F000215000
direct allocation
page read and write
1D38000
heap
page read and write
6DC0000
direct allocation
page read and write
A740229E000
trusted library allocation
page read and write
A74025DC000
trusted library allocation
page read and write
70740060C000
trusted library allocation
page read and write
A9A000
unkown
page readonly
A7402E50000
trusted library allocation
page read and write
80C1000
heap
page read and write
6DD1000
heap
page read and write
70740040C000
trusted library allocation
page read and write
A74025DC000
trusted library allocation
page read and write
707400734000
trusted library allocation
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
807A000
heap
page read and write
707400230000
trusted library allocation
page read and write
6DD1000
heap
page read and write
CDA07FE000
unkown
page readonly
1D1F000
heap
page read and write
6DD1000
heap
page read and write
6F000201000
direct allocation
page read and write
A7402998000
trusted library allocation
page read and write
A7403118000
trusted library allocation
page read and write
CD9D7FE000
unkown
page readonly
AE0000
unkown
page readonly
6DD1000
heap
page read and write
A7402F28000
trusted library allocation
page read and write
A740313C000
trusted library allocation
page read and write
6DD1000
heap
page read and write
1AE4000
heap
page read and write
6DC0000
direct allocation
page read and write
707400678000
trusted library allocation
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
A740300C000
trusted library allocation
page read and write
CD927FB000
stack
page read and write
6DD1000
heap
page read and write
A7402884000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A7402418000
trusted library allocation
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
809E000
heap
page read and write
24F2DB63000
heap
page read and write
1AE4000
heap
page read and write
3240000
heap
page read and write
A7402318000
trusted library allocation
page read and write
A7402E1C000
trusted library allocation
page read and write
1AE4000
heap
page read and write
AA1000
unkown
page readonly
A7402878000
trusted library allocation
page read and write
A7402794000
trusted library allocation
page read and write
8277000
heap
page read and write
A7402520000
trusted library allocation
page read and write
AA1000
unkown
page readonly
CD93FFE000
unkown
page readonly
A7402964000
trusted library allocation
page read and write
A91000
unkown
page execute read
7260000
direct allocation
page read and write
A74023A0000
trusted library allocation
page read and write
A7402420000
trusted library allocation
page read and write
A7402A58000
trusted library allocation
page read and write
CD90FFD000
stack
page read and write
A90000
unkown
page readonly
6F000234000
direct allocation
page read and write
A7403401000
trusted library allocation
page read and write
A74033DC000
trusted library allocation
page read and write
24F24390000
heap
page readonly
A91000
unkown
page execute read
6DC0000
direct allocation
page read and write
707400750000
trusted library allocation
page read and write
A74032FC000
trusted library allocation
page read and write
1AE4000
heap
page read and write
A740254C000
trusted library allocation
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
78FB000
heap
page read and write
A74023E8000
trusted library allocation
page read and write
A7402500000
trusted library allocation
page read and write
112F000
stack
page read and write
CDF65FE000
unkown
page readonly
24F27F34000
heap
page read and write
A7402E2C000
trusted library allocation
page read and write
1D22000
heap
page read and write
6DD1000
heap
page read and write
A9E000
unkown
page write copy
11A0000
heap
page read and write
70740035C000
trusted library allocation
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
A7402FA4000
trusted library allocation
page read and write
CD937FB000
stack
page read and write
A7400A01000
trusted library allocation
page read and write
7F0C000
heap
page read and write
7074007E0000
trusted library allocation
page read and write
6DD1000
heap
page read and write
CDFD5FE000
unkown
page readonly
7F00000
heap
page read and write
A740327C000
trusted library allocation
page read and write
6DC0000
direct allocation
page read and write
6DD1000
heap
page read and write
A7403084000
trusted library allocation
page read and write
A740234C000
trusted library allocation
page read and write
1D22000
heap
page read and write
6DD1000
heap
page read and write
8138000
heap
page read and write
24F2DB47000
unclassified section
page read and write
6F000270000
direct allocation
page read and write
89E000
stack
page read and write
822A000
heap
page read and write
7F09000
heap
page read and write
6DD1000
heap
page read and write
7074006AC000
trusted library allocation
page read and write
A7402518000
trusted library allocation
page read and write
A7402AA4000
trusted library allocation
page read and write
24F27F27000
heap
page read and write
1D22000
heap
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
A740313C000
trusted library allocation
page read and write
CD8F7FE000
unkown
page readonly
A7403064000
trusted library allocation
page read and write
24F27F51000
heap
page read and write
CD957FE000
unkown
page readonly
A7402520000
trusted library allocation
page read and write
A9A000
unkown
page readonly
24F27914000
heap
page read and write
A740290D000
trusted library allocation
page read and write
A74024B0000
trusted library allocation
page read and write
A740309F000
trusted library allocation
page read and write
CD85FFE000
stack
page read and write
707400704000
trusted library allocation
page read and write
7F03000
heap
page read and write
A74031B8000
trusted library allocation
page read and write
A7403254000
trusted library allocation
page read and write
7074006FC000
trusted library allocation
page read and write
A7403218000
trusted library allocation
page read and write
A74030A0000
trusted library allocation
page read and write
A74024B4000
trusted library allocation
page read and write
A74024A4000
trusted library allocation
page read and write
7EC002C0000
trusted library allocation
page read and write
A74033C4000
trusted library allocation
page read and write
800C000
heap
page read and write
74F0000
direct allocation
page execute and read and write
1AE4000
heap
page read and write
7F02000
heap
page read and write
7EC00230000
trusted library allocation
page read and write
74F0000
direct allocation
page execute and read and write
A74032C8000
trusted library allocation
page read and write
A7402ED8000
trusted library allocation
page read and write
A740250C000
trusted library allocation
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
24F2D987000
unclassified section
page read and write
6DD1000
heap
page read and write
24F2DCD0000
trusted library section
page read and write
A7402594000
trusted library allocation
page read and write
A90000
unkown
page readonly
A74029D0000
trusted library allocation
page read and write
707400380000
trusted library allocation
page read and write
7F0C000
heap
page read and write
35E000
stack
page read and write
707400364000
trusted library allocation
page read and write
1AE4000
heap
page read and write
24F27910000
heap
page read and write
A7403230000
trusted library allocation
page read and write
11B0000
heap
page read and write
A740252C000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A74029A5000
trusted library allocation
page read and write
A74024EB000
trusted library allocation
page read and write
24F27910000
heap
page read and write
A74031C4000
trusted library allocation
page read and write
A7402C01000
trusted library allocation
page read and write
707400210000
trusted library allocation
page read and write
80F9000
heap
page read and write
A74027D0000
trusted library allocation
page read and write
A7400E01000
trusted library allocation
page read and write
1CC1000
heap
page read and write
10C0000
heap
page read and write
A91000
unkown
page execute read
7FCB000
heap
page read and write
A7403424000
trusted library allocation
page read and write
A74031C4000
trusted library allocation
page read and write
A74022D0000
trusted library allocation
page read and write
A74023D0000
trusted library allocation
page read and write
A7400CEA000
trusted library allocation
page read and write
A7402A88000
trusted library allocation
page read and write
7EC00270000
trusted library allocation
page read and write
798C000
direct allocation
page read and write
A91000
unkown
page execute read
A7402BEC000
trusted library allocation
page read and write
24F2445F000
heap
page read and write
A91000
unkown
page execute read
6DD1000
heap
page read and write
6DD1000
heap
page read and write
A7400601000
trusted library allocation
page read and write
707400784000
trusted library allocation
page read and write
7B03000
heap
page read and write
CD847FE000
unkown
page readonly
A740312C000
trusted library allocation
page read and write
70740039C000
trusted library allocation
page read and write
81CC000
heap
page read and write
24F2DB92000
trusted library section
page read and write
A74023F0000
trusted library allocation
page read and write
6DD1000
heap
page read and write
7074006B4000
trusted library allocation
page read and write
A74024E0000
trusted library allocation
page read and write
7074007C8000
trusted library allocation
page read and write
7074002FC000
trusted library allocation
page read and write
A7402FDC000
trusted library allocation
page read and write
CD877FE000
unkown
page readonly
A7402EB8000
trusted library allocation
page read and write
1AE4000
heap
page read and write
AA1000
unkown
page readonly
A7402F68000
trusted library allocation
page read and write
6DD1000
heap
page read and write
8046000
heap
page read and write
1D1A000
heap
page read and write
7EC002C0000
trusted library allocation
page read and write
A7403030000
trusted library allocation
page read and write
24F27E6B000
heap
page read and write
6DD1000
heap
page read and write
11A0000
heap
page read and write
8005000
heap
page read and write
7074006D0000
trusted library allocation
page read and write
6DC0000
direct allocation
page read and write
6DC0000
direct allocation
page read and write
6DD1000
heap
page read and write
CDF8DFB000
stack
page read and write
707400694000
trusted library allocation
page read and write
707400754000
trusted library allocation
page read and write
CDA27FE000
unkown
page readonly
CD977FE000
unkown
page readonly
10A8000
heap
page read and write
6DD1000
heap
page read and write
A7403428000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A7402D90000
trusted library allocation
page read and write
707400788000
trusted library allocation
page read and write
A7402F70000
trusted library allocation
page read and write
7EC00235000
trusted library allocation
page read and write
1CC5000
heap
page read and write
A74030D0000
trusted library allocation
page read and write
707400610000
trusted library allocation
page read and write
8049000
heap
page read and write
A7402328000
trusted library allocation
page read and write
A74033D4000
trusted library allocation
page read and write
B3C000
stack
page read and write
A7402494000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A7402E31000
trusted library allocation
page read and write
24F2791D000
heap
page read and write
78F5000
heap
page read and write
74F0000
direct allocation
page execute and read and write
6DD1000
heap
page read and write
7EC002BC000
trusted library allocation
page read and write
7EC002E4000
trusted library allocation
page read and write
A7403164000
trusted library allocation
page read and write
CDFC5FE000
unkown
page readonly
A7402E01000
trusted library allocation
page read and write
6DD1000
heap
page read and write
707400640000
trusted library allocation
page read and write
24F27E60000
heap
page read and write
A7403320000
trusted library allocation
page read and write
A74031E8000
trusted library allocation
page read and write
6DD1000
heap
page read and write
70740075C000
trusted library allocation
page read and write
A74026A8000
trusted library allocation
page read and write
707400744000
trusted library allocation
page read and write
A90000
unkown
page readonly
707400760000
trusted library allocation
page read and write
80C9000
heap
page read and write
A7403168000
trusted library allocation
page read and write
A74030EC000
trusted library allocation
page read and write
A740247C000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A7402C4C000
trusted library allocation
page read and write
A74022A8000
trusted library allocation
page read and write
A7403190000
trusted library allocation
page read and write
A740225A000
trusted library allocation
page read and write
707400644000
trusted library allocation
page read and write
A74026F4000
trusted library allocation
page read and write
74F0000
direct allocation
page execute and read and write
A7403190000
trusted library allocation
page read and write
707400698000
trusted library allocation
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
7074007CC000
trusted library allocation
page read and write
A7400001000
trusted library allocation
page read and write
AA1000
unkown
page readonly
700000
heap
page read and write
8083000
heap
page read and write
A740225E000
trusted library allocation
page read and write
720000
heap
page read and write
7074006B8000
trusted library allocation
page read and write
7EC002BC000
trusted library allocation
page read and write
A74024C0000
trusted library allocation
page read and write
D60000
heap
page read and write
24F2E57E000
trusted library section
page read and write
7074006E8000
trusted library allocation
page read and write
A740305D000
trusted library allocation
page read and write
24F24463000
heap
page read and write
A740250C000
trusted library allocation
page read and write
24F27E61000
heap
page read and write
CD8FFFC000
stack
page read and write
6DD1000
heap
page read and write
7F0A000
heap
page read and write
A740270C000
trusted library allocation
page read and write
1AE4000
heap
page read and write
A74023EC000
trusted library allocation
page read and write
80CA000
heap
page read and write
A7402E7C000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A7402974000
trusted library allocation
page read and write
3D0000
heap
page read and write
CD88FFC000
stack
page read and write
6DD1000
heap
page read and write
7EC002F4000
trusted library allocation
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
A74024B4000
trusted library allocation
page read and write
24F278F0000
heap
page read and write
6DD1000
heap
page read and write
A7403388000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A7400C0A000
trusted library allocation
page read and write
24F2790B000
heap
page read and write
CD94FFE000
stack
page read and write
6DD1000
heap
page read and write
707400684000
trusted library allocation
page read and write
A74025DC000
trusted library allocation
page read and write
A74033B4000
trusted library allocation
page read and write
7EC00274000
trusted library allocation
page read and write
A7403108000
trusted library allocation
page read and write
A740281C000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A7402EB8000
trusted library allocation
page read and write
177F000
stack
page read and write
A740282C000
trusted library allocation
page read and write
A7402E0C000
trusted library allocation
page read and write
6F000303000
direct allocation
page read and write
A740221C000
trusted library allocation
page read and write
A7403028000
trusted library allocation
page read and write
24F2A1B0000
trusted library section
page read and write
24F2E572000
trusted library section
page read and write
A7403264000
trusted library allocation
page read and write
CD997FE000
unkown
page readonly
806D000
heap
page read and write
1AE4000
heap
page read and write
6DD1000
heap
page read and write
24F27916000
heap
page read and write
6F000230000
direct allocation
page read and write
6DD1000
heap
page read and write
7EC00260000
trusted library allocation
page read and write
7FC000
stack
page read and write
707400601000
trusted library allocation
page read and write
CD8DFFB000
stack
page read and write
A7403184000
trusted library allocation
page read and write
A7403020000
trusted library allocation
page read and write
B90000
heap
page read and write
A7403288000
trusted library allocation
page read and write
8A0000
heap
page read and write
A740240C000
trusted library allocation
page read and write
6DD1000
heap
page read and write
CDFA5FE000
unkown
page readonly
A740280C000
trusted library allocation
page read and write
7EC002A0000
trusted library allocation
page read and write
6DD1000
heap
page read and write
707400288000
trusted library allocation
page read and write
CD9AFFD000
stack
page read and write
A740293C000
trusted library allocation
page read and write
707400724000
trusted library allocation
page read and write
A7402C0C000
trusted library allocation
page read and write
74F0000
direct allocation
page execute and read and write
6DD1000
heap
page read and write
80AA000
heap
page read and write
A9A000
unkown
page readonly
CD9EFFE000
stack
page read and write
74F0000
direct allocation
page execute and read and write
24F243B0000
trusted library allocation
page read and write
A7402EB8000
trusted library allocation
page read and write
A7402F08000
trusted library allocation
page read and write
6DD1000
heap
page read and write
7EC00264000
trusted library allocation
page read and write
10B0000
heap
page read and write
6DD1000
heap
page read and write
74F0000
direct allocation
page execute and read and write
A7402534000
trusted library allocation
page read and write
7F0B000
heap
page read and write
24F2D46D000
heap
page read and write
A7402494000
trusted library allocation
page read and write
A74023F4000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A7402570000
trusted library allocation
page read and write
AA1000
unkown
page readonly
24F27E76000
heap
page read and write
A74023E4000
trusted library allocation
page read and write
6DD1000
heap
page read and write
166F000
stack
page read and write
6DD1000
heap
page read and write
2FF0000
heap
page read and write
6DD1000
heap
page read and write
707400320000
trusted library allocation
page read and write
FFC000
stack
page read and write
150F000
stack
page read and write
310000
heap
page read and write
24F2DBF3000
trusted library section
page read and write
6DD1000
heap
page read and write
A7402DCC000
trusted library allocation
page read and write
A74031E8000
trusted library allocation
page read and write
A7402CA8000
trusted library allocation
page read and write
6DD1000
heap
page read and write
24F27921000
heap
page read and write
CD95FFE000
stack
page read and write
7EC0020C000
trusted library allocation
page read and write
707400720000
trusted library allocation
page read and write
A74023D4000
trusted library allocation
page read and write
8035000
heap
page read and write
A7402913000
trusted library allocation
page read and write
CD9B7FE000
unkown
page readonly
6DD1000
heap
page read and write
707400770000
trusted library allocation
page read and write
A7403030000
trusted library allocation
page read and write
A9E000
unkown
page write copy
7F09000
heap
page read and write
A740241C000
trusted library allocation
page read and write
77F1000
heap
page read and write
829D000
heap
page read and write
707400390000
trusted library allocation
page read and write
6DC0000
direct allocation
page read and write
1D16000
heap
page read and write
A740326C000
trusted library allocation
page read and write
A7403001000
trusted library allocation
page read and write
70740033C000
trusted library allocation
page read and write
A7402C40000
trusted library allocation
page read and write
A9E000
unkown
page read and write
A7402BC0000
trusted library allocation
page read and write
1AE4000
heap
page read and write
A7402EB8000
trusted library allocation
page read and write
CDFE5FE000
unkown
page readonly
1CEB000
heap
page read and write
70740087C000
trusted library allocation
page read and write
1AE4000
heap
page read and write
6DD1000
heap
page read and write
24F24476000
heap
page read and write
74F0000
direct allocation
page execute and read and write
7710000
trusted library allocation
page read and write
A740300C000
trusted library allocation
page read and write
A7402D00000
trusted library allocation
page read and write
A7402BEC000
trusted library allocation
page read and write
7EC00238000
trusted library allocation
page read and write
8061000
heap
page read and write
A74024F0000
trusted library allocation
page read and write
707400201000
trusted library allocation
page read and write
74F0000
direct allocation
page execute and read and write
34BE000
stack
page read and write
7EC002C8000
trusted library allocation
page read and write
7FD0000
heap
page read and write
A90000
unkown
page readonly
A7402CC0000
trusted library allocation
page read and write
7EC002BC000
trusted library allocation
page read and write
CD9BFFE000
stack
page read and write
CDFBDFA000
stack
page read and write
A7402414000
trusted library allocation
page read and write
6F000290000
direct allocation
page read and write
7EC00220000
trusted library allocation
page read and write
A7402E2C000
trusted library allocation
page read and write
CD8EFFC000
stack
page read and write
6DD1000
heap
page read and write
1D38000
heap
page read and write
CDFB5FE000
unkown
page readonly
A9A000
unkown
page readonly
CDA17FE000
unkown
page readonly
7824000
direct allocation
page read and write
A7402DA8000
trusted library allocation
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
CD857FE000
unkown
page readonly
7074006E4000
trusted library allocation
page read and write
2F4D000
stack
page read and write
A7402534000
trusted library allocation
page read and write
A7402768000
trusted library allocation
page read and write
E5C000
stack
page read and write
24F2A220000
trusted library allocation
page read and write
7F06000
heap
page read and write
A74023B4000
trusted library allocation
page read and write
707400408000
trusted library allocation
page read and write
7F05000
heap
page read and write
707400310000
trusted library allocation
page read and write
7270000
direct allocation
page read and write
7F03000
heap
page read and write
6DD1000
heap
page read and write
CD8AFFA000
stack
page read and write
A740295A000
trusted library allocation
page read and write
CD9C7FE000
unkown
page readonly
6DD1000
heap
page read and write
CD8A7FE000
unkown
page readonly
A74028CC000
trusted library allocation
page read and write
7EC002BC000
trusted library allocation
page read and write
109E000
stack
page read and write
F7F000
stack
page read and write
A7403378000
trusted library allocation
page read and write
A7402EC8000
trusted library allocation
page read and write
24F27DF0000
trusted library section
page read and write
6DD1000
heap
page read and write
6F00024C000
direct allocation
page read and write
24F24610000
heap
page read and write
1D18000
heap
page read and write
A74030FC000
trusted library allocation
page read and write
A74030BC000
trusted library allocation
page read and write
6DD1000
heap
page read and write
24F27E88000
heap
page read and write
7EC002A0000
trusted library allocation
page read and write
1AE4000
heap
page read and write
70740033C000
trusted library allocation
page read and write
A740300C000
trusted library allocation
page read and write
A7402FC0000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A7402B00000
trusted library allocation
page read and write
A74028DC000
trusted library allocation
page read and write
A91000
unkown
page execute read
CDFDDFC000
stack
page read and write
A74023F8000
trusted library allocation
page read and write
A7402BEC000
trusted library allocation
page read and write
6DD1000
heap
page read and write
80BC000
heap
page read and write
A9A000
unkown
page readonly
6DD1000
heap
page read and write
7F03000
heap
page read and write
6DD1000
heap
page read and write
7074006F0000
trusted library allocation
page read and write
7210000
trusted library allocation
page read and write
A7402EB8000
trusted library allocation
page read and write
A74023B4000
trusted library allocation
page read and write
1AE4000
heap
page read and write
7F04000
heap
page read and write
1AE4000
heap
page read and write
707400688000
trusted library allocation
page read and write
6F00025C000
direct allocation
page read and write
A7402EAC000
trusted library allocation
page read and write
A740240C000
trusted library allocation
page read and write
A74024A4000
trusted library allocation
page read and write
7FAD000
heap
page read and write
A74024E3000
trusted library allocation
page read and write
A7402EC8000
trusted library allocation
page read and write
7F08000
heap
page read and write
A7403168000
trusted library allocation
page read and write
CDF2DFE000
unkown
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
1AE4000
heap
page read and write
A7402F64000
trusted library allocation
page read and write
11E0000
heap
page read and write
6DC0000
direct allocation
page read and write
A7402410000
trusted library allocation
page read and write
707400401000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A7400201000
trusted library allocation
page read and write
1AE4000
heap
page read and write
A74033BC000
trusted library allocation
page read and write
10A0000
heap
page read and write
CD8D7FE000
unkown
page readonly
24F2E5B0000
trusted library section
page read and write
CD867FE000
unkown
page readonly
A91000
unkown
page execute read
A7402C30000
trusted library allocation
page read and write
707400320000
trusted library allocation
page read and write
24F2DB10000
trusted library section
page read and write
7F0F000
heap
page read and write
24F2BDE2000
trusted library allocation
page read and write
CD9E7FE000
unkown
page readonly
7F09000
heap
page read and write
6DD1000
heap
page read and write
74D0000
direct allocation
page execute and read and write
A74022E0000
trusted library allocation
page read and write
24F244B7000
heap
page read and write
24F2DB9E000
trusted library section
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
1AE4000
heap
page read and write
EAF000
stack
page read and write
6DD1000
heap
page read and write
707400700000
trusted library allocation
page read and write
A7402E5C000
trusted library allocation
page read and write
A740252C000
trusted library allocation
page read and write
A7402E2C000
trusted library allocation
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
A7402918000
trusted library allocation
page read and write
A9E000
unkown
page write copy
A74024B8000
trusted library allocation
page read and write
D7E000
stack
page read and write
A7402554000
trusted library allocation
page read and write
7EC002BC000
trusted library allocation
page read and write
CD83FFA000
stack
page read and write
2BC000
stack
page read and write
1D36000
heap
page read and write
6DD1000
heap
page read and write
6DC0000
direct allocation
page read and write
CD97FFE000
stack
page read and write
24F2DA00000
heap
page read and write
24F2E686000
trusted library section
page read and write
A7403434000
trusted library allocation
page read and write
A74028CC000
trusted library allocation
page read and write
24F27EFE000
heap
page read and write
A7402494000
trusted library allocation
page read and write
80A6000
heap
page read and write
A740320C000
trusted library allocation
page read and write
24F2E6AD000
trusted library section
page read and write
A74023C4000
trusted library allocation
page read and write
A7400AA2000
trusted library allocation
page read and write
A91000
unkown
page execute read
A7403264000
trusted library allocation
page read and write
707400658000
trusted library allocation
page read and write
A7402601000
trusted library allocation
page read and write
A7402954000
trusted library allocation
page read and write
8019000
heap
page read and write
A7402668000
trusted library allocation
page read and write
A7402BEC000
trusted library allocation
page read and write
A7403264000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A7402E31000
trusted library allocation
page read and write
1D16000
heap
page read and write
8B0000
heap
page read and write
8012000
heap
page read and write
158C000
unkown
page execute and write copy
6DD1000
heap
page read and write
24F24500000
trusted library allocation
page read and write
6DD1000
heap
page read and write
CD99FFE000
stack
page read and write
AA1000
unkown
page readonly
A7402584000
trusted library allocation
page read and write
A7402E3C000
trusted library allocation
page read and write
24F27F3E000
heap
page read and write
24F27922000
heap
page read and write
A9A000
unkown
page readonly
24F27921000
heap
page read and write
6DD1000
heap
page read and write
A9E000
unkown
page write copy
7F00000
heap
page read and write
7F09000
heap
page read and write
6F000284000
direct allocation
page read and write
24F2D957000
unclassified section
page read and write
24F2E5E3000
trusted library section
page read and write
809C000
heap
page read and write
A9E000
unkown
page read and write
6DD1000
heap
page read and write
1D19000
heap
page read and write
A7402498000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A740339C000
trusted library allocation
page read and write
6F000220000
direct allocation
page read and write
8254000
heap
page read and write
707400238000
trusted library allocation
page read and write
707400368000
trusted library allocation
page read and write
6DD1000
heap
page read and write
7074002D4000
trusted library allocation
page read and write
A74028EC000
trusted library allocation
page read and write
1D36000
heap
page read and write
6DD1000
heap
page read and write
798A000
direct allocation
page read and write
A7402384000
trusted library allocation
page read and write
6DD1000
heap
page read and write
74F0000
direct allocation
page execute and read and write
24F242B0000
heap
page read and write
1D1A000
heap
page read and write
6F0002DC000
direct allocation
page read and write
7FFC000
heap
page read and write
7EC00278000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A7402201000
trusted library allocation
page read and write
1AE4000
heap
page read and write
A74027A8000
trusted library allocation
page read and write
6DD1000
heap
page read and write
A74025DC000
trusted library allocation
page read and write
A74027E8000
trusted library allocation
page read and write
CDF6DFE000
stack
page read and write
24F24680000
heap
page read and write
CD9CFFE000
stack
page read and write
CD87FFE000
stack
page read and write
74F0000
direct allocation
page execute and read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
6F000217000
direct allocation
page read and write
24F2791C000
heap
page read and write
24F243C8000
heap
page read and write
24F27EF9000
heap
page read and write
848000
heap
page read and write
24F244E0000
heap
page read and write
78F0000
heap
page read and write
CDA1FFE000
stack
page read and write
80AD000
heap
page read and write
6DD1000
heap
page read and write
7EC002B0000
trusted library allocation
page read and write
CDF9DFB000
stack
page read and write
6DD1000
heap
page read and write
A7402430000
trusted library allocation
page read and write
24F27EDE000
heap
page read and write
1D19000
heap
page read and write
1AE4000
heap
page read and write
6DD1000
heap
page read and write
A7402401000
trusted library allocation
page read and write
24F2DC92000
trusted library section
page read and write
6DD1000
heap
page read and write
6DD1000
heap
page read and write
24F2A1C7000
unclassified section
page read and write
707400320000
trusted library allocation
page read and write
CD9A7FE000
unkown
page readonly
CDF3DFF000
stack
page read and write
A74030B0000
trusted library allocation
page read and write
6F000250000
direct allocation
page read and write
A7403240000
trusted library allocation
page read and write
24F2E150000
trusted library section
page read and write
A74031B8000
trusted library allocation
page read and write
A7402BB0000
trusted library allocation
page read and write
336F000
unkown
page read and write
A740304C000
trusted library allocation
page read and write
1530000
heap
page read and write
24F2E550000
trusted library section
page read and write
A91000
unkown
page execute read
7FAD000
heap
page read and write
6DD1000
heap
page read and write
6F0002E4000
direct allocation
page read and write
A7402E90000
trusted library allocation
page read and write
24F278E0000
heap
page read and write
70740035C000
trusted library allocation
page read and write
7074002F4000
trusted library allocation
page read and write
24F2D440000
heap
page read and write
7EC002B0000
trusted library allocation
page read and write
A7402394000
trusted library allocation
page read and write
6DD1000
heap
page read and write
There are 1305 hidden memdumps, click here to show them.