IOC Report
n1HBga77I1.exe

loading gif

Files

File Path
Type
Category
Malicious
n1HBga77I1.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_n1HBga77I1.exe_c2c7a414f5f413de81a9416d21be1e8328b484_d999afe2_2a2dbf14-771c-4199-bfe8-9a869df88dd7\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER43B4.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Dec 23 07:54:20 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER482A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4898.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\CaHNbeclRGcBxNSvHjFX.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\n1HBga77I1.exe
"C:\Users\user\Desktop\n1HBga77I1.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 --field-trial-handle=2104,i,12785038656914492081,4527561829418186468,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5640 -s 1372

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://www.google.com/chrome/tips/gsOpen
unknown
https://anglebug.com/7382
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=bd
unknown
https://issuetracker.google.com/284462263
unknown
http://anglebug.com/6755P
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://crbug.com/368855.)
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actionsd
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
https://anglebug.com/7246K
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
http://anglebug.com/5750d
unknown
https://docs.googl0
unknown
https://www.youtube.coP
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://docs.google.com/presentation/
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://www.youtube.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://docs.google.com/spreadsheets/
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://httpbin.org/ipbefore
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://drive-daily-4.c
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
https://www.youtube.com/s/notifications/manifest/cr_install.htmlr
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
https://anglebug.com/7319-data
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
http://unisolated.invalid/b
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fivetk5sb.top
185.121.15.192
www.google.com
172.217.19.228
fivetk5sb.top
185.121.15.192
httpbin.org
98.85.100.80

IPs

IP
Domain
Country
Malicious
185.121.15.192
home.fivetk5sb.top
Spain
172.217.19.228
www.google.com
United States
98.85.100.80
httpbin.org
United States
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
ProgramId
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
FileId
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
LowerCaseLongPath
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
LongPathHash
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
Name
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
OriginalFileName
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
Publisher
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
Version
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
BinFileVersion
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
BinaryType
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
ProductName
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
ProductVersion
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
LinkDate
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
BinProductVersion
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
AppxPackageFullName
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
AppxPackageRelativeId
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
Size
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
Language
\REGISTRY\A\{e454d89a-609a-4109-4e1e-2ce11738ff83}\Root\InventoryApplicationFile\n1hbga77i1.exe|66316f36a29347de
Usn
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6981000
heap
page read and write
642000DD8000
trusted library allocation
page read and write
87B67EF000
stack
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
8A0000
unkown
page readonly
970000
heap
page read and write
3470000
heap
page read and write
6588002A0000
trusted library allocation
page read and write
642000A24000
trusted library allocation
page read and write
ABD000
stack
page read and write
1200000
heap
page read and write
6981000
heap
page read and write
8AA000
unkown
page readonly
642000DB4000
trusted library allocation
page read and write
7800000
heap
page read and write
74F800868000
trusted library allocation
page read and write
74F800220000
trusted library allocation
page read and write
7223000
heap
page read and write
7090000
direct allocation
page execute and read and write
642000F78000
trusted library allocation
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
642000973000
trusted library allocation
page read and write
658800288000
trusted library allocation
page read and write
8AA000
unkown
page readonly
7803000
heap
page read and write
6981000
heap
page read and write
74F800790000
trusted library allocation
page read and write
642000E34000
trusted library allocation
page read and write
642000F88000
trusted library allocation
page read and write
74F8002FC000
trusted library allocation
page read and write
7225000
heap
page read and write
7803000
heap
page read and write
642000F08000
trusted library allocation
page read and write
64200120C000
trusted library allocation
page read and write
78F5000
heap
page read and write
792D000
heap
page read and write
6981000
heap
page read and write
642000350000
trusted library allocation
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
64200057C000
trusted library allocation
page read and write
642000830000
trusted library allocation
page read and write
6981000
heap
page read and write
270421E0000
trusted library allocation
page read and write
64200022C000
trusted library allocation
page read and write
642000439000
trusted library allocation
page read and write
642000C44000
trusted library allocation
page read and write
7A5E000
heap
page read and write
642000433000
trusted library allocation
page read and write
6981000
heap
page read and write
8B1000
unkown
page readonly
642000118000
trusted library allocation
page read and write
87CE7FD000
stack
page read and write
27042A93000
trusted library section
page read and write
2FDE000
unkown
page read and write
74F8008E4000
trusted library allocation
page read and write
5FC000
stack
page read and write
658800274000
trusted library allocation
page read and write
87C67FD000
stack
page read and write
7090000
direct allocation
page execute and read and write
642000DE0000
trusted library allocation
page read and write
87DD7FE000
stack
page read and write
7950000
heap
page read and write
74F80070C000
trusted library allocation
page read and write
7B3A000
heap
page read and write
642000D68000
trusted library allocation
page read and write
74F8006AC000
trusted library allocation
page read and write
642000F1C000
trusted library allocation
page read and write
2703A759000
heap
page read and write
642000C0C000
trusted library allocation
page read and write
7090000
direct allocation
page execute and read and write
C10000
heap
page read and write
8AE000
unkown
page read and write
6981000
heap
page read and write
6420001B4000
trusted library allocation
page read and write
954000
heap
page read and write
2703E1B0000
heap
page read and write
7934000
heap
page read and write
642000290000
trusted library allocation
page read and write
2703DC70000
heap
page read and write
642000218000
trusted library allocation
page read and write
63D000284000
direct allocation
page read and write
8AA000
unkown
page readonly
642000878000
trusted library allocation
page read and write
74F800848000
trusted library allocation
page read and write
6E00000
direct allocation
page read and write
64200124C000
trusted library allocation
page read and write
642000F44000
trusted library allocation
page read and write
63D000294000
direct allocation
page read and write
3590000
direct allocation
page read and write
27042612000
trusted library allocation
page read and write
7FC1000
heap
page read and write
642000788000
trusted library allocation
page read and write
6981000
heap
page read and write
ED0000
heap
page read and write
27042AD6000
trusted library section
page read and write
6588002C8000
trusted library allocation
page read and write
7802000
heap
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
6588002B0000
trusted library allocation
page read and write
74F800880000
trusted library allocation
page read and write
658800238000
trusted library allocation
page read and write
2703E240000
heap
page read and write
642000FAC000
trusted library allocation
page read and write
27044D46000
trusted library section
page read and write
3590000
direct allocation
page read and write
6981000
heap
page read and write
642000E28000
trusted library allocation
page read and write
74F800898000
trusted library allocation
page read and write
76E000
stack
page read and write
6420010E4000
trusted library allocation
page read and write
642000D5C000
trusted library allocation
page read and write
7809000
heap
page read and write
74F80081C000
trusted library allocation
page read and write
642000310000
trusted library allocation
page read and write
6588002B0000
trusted library allocation
page read and write
2703A6A8000
heap
page read and write
74F8008D8000
trusted library allocation
page read and write
6981000
heap
page read and write
642000044000
trusted library allocation
page read and write
6420011F0000
trusted library allocation
page read and write
6981000
heap
page read and write
64200090C000
trusted library allocation
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
6420010F4000
trusted library allocation
page read and write
963000
heap
page read and write
270431D0000
trusted library section
page read and write
642000D9B000
trusted library allocation
page read and write
6981000
heap
page read and write
87E77FE000
stack
page read and write
6981000
heap
page read and write
74F800974000
trusted library allocation
page read and write
6420011F0000
trusted library allocation
page read and write
2703DC96000
heap
page read and write
6C22D000
unkown
page read and write
642000A38000
trusted library allocation
page read and write
BC000
stack
page read and write
5E0000
heap
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
64200104C000
trusted library allocation
page read and write
74F8008E8000
trusted library allocation
page read and write
87C2FFE000
unkown
page readonly
74F8008F0000
trusted library allocation
page read and write
2703A796000
heap
page read and write
642000BF0000
trusted library allocation
page read and write
6981000
heap
page read and write
642000C70000
trusted library allocation
page read and write
780000
heap
page read and write
642000344000
trusted library allocation
page read and write
642000754000
trusted library allocation
page read and write
8B1000
unkown
page readonly
87E47FE000
stack
page read and write
642000194000
trusted library allocation
page read and write
6588002D8000
trusted library allocation
page read and write
642000CE0000
trusted library allocation
page read and write
87E1FFE000
unkown
page readonly
74F800844000
trusted library allocation
page read and write
7800000
heap
page read and write
642000074000
trusted library allocation
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
6420010B0000
trusted library allocation
page read and write
6420009F4000
trusted library allocation
page read and write
87C57FE000
stack
page read and write
7802000
heap
page read and write
6420000EC000
trusted library allocation
page read and write
642000CD5000
trusted library allocation
page read and write
642000A30000
trusted library allocation
page read and write
33CF000
stack
page read and write
642000FBC000
trusted library allocation
page read and write
87D0FFE000
unkown
page readonly
6981000
heap
page read and write
6981000
heap
page read and write
74F8002B8000
trusted library allocation
page read and write
6981000
heap
page read and write
642000201000
trusted library allocation
page read and write
787000
heap
page read and write
8A1000
unkown
page execute read
87CCFFE000
unkown
page readonly
74F800830000
trusted library allocation
page read and write
6981000
heap
page read and write
642000744000
trusted library allocation
page read and write
63D000290000
direct allocation
page read and write
27044C80000
trusted library section
page read and write
63D000270000
direct allocation
page read and write
27044C32000
trusted library section
page read and write
6981000
heap
page read and write
6420001DC000
trusted library allocation
page read and write
6981000
heap
page read and write
642000648000
trusted library allocation
page read and write
6588002BC000
trusted library allocation
page read and write
2703E0A0000
trusted library section
page read and write
2703E218000
heap
page read and write
87D07FC000
stack
page read and write
2703DC8F000
heap
page read and write
6981000
heap
page read and write
74F800404000
trusted library allocation
page read and write
74F800248000
trusted library allocation
page read and write
2703A78C000
heap
page read and write
642000FD0000
trusted library allocation
page read and write
74F8006E8000
trusted library allocation
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
642000977000
trusted library allocation
page read and write
6981000
heap
page read and write
74F80040C000
trusted library allocation
page read and write
642000AA8000
trusted library allocation
page read and write
6C150000
unkown
page readonly
642000DF4000
trusted library allocation
page read and write
642000BAC000
trusted library allocation
page read and write
2704487E000
trusted library section
page read and write
6981000
heap
page read and write
2703A75E000
heap
page read and write
6981000
heap
page read and write
642000774000
trusted library allocation
page read and write
6981000
heap
page read and write
3590000
direct allocation
page read and write
7090000
direct allocation
page execute and read and write
87D17FD000
stack
page read and write
7963000
heap
page read and write
6588002B0000
trusted library allocation
page read and write
6420005D0000
trusted library allocation
page read and write
7090000
direct allocation
page execute and read and write
74F8008A8000
trusted library allocation
page read and write
6420005B8000
trusted library allocation
page read and write
6981000
heap
page read and write
64200097B000
trusted library allocation
page read and write
2703DC60000
heap
page read and write
6420009D4000
trusted library allocation
page read and write
74F800860000
trusted library allocation
page read and write
642000D68000
trusted library allocation
page read and write
6420001F8000
trusted library allocation
page read and write
64200009C000
trusted library allocation
page read and write
74F8002F0000
trusted library allocation
page read and write
6420001CC000
trusted library allocation
page read and write
64200115C000
trusted library allocation
page read and write
63D000210000
direct allocation
page read and write
642000350000
trusted library allocation
page read and write
6981000
heap
page read and write
7806000
heap
page read and write
6981000
heap
page read and write
27044C21000
trusted library section
page read and write
6420001B4000
trusted library allocation
page read and write
64200080C000
trusted library allocation
page read and write
6420002F7000
trusted library allocation
page read and write
87DBFFE000
unkown
page readonly
6420002CC000
trusted library allocation
page read and write
642000CE9000
trusted library allocation
page read and write
6981000
heap
page read and write
6420009A0000
trusted library allocation
page read and write
6588002E4000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
7941000
heap
page read and write
6981000
heap
page read and write
5F0000
heap
page read and write
27042A5E000
trusted library section
page read and write
6420010D4000
trusted library allocation
page read and write
74F8008B8000
trusted library allocation
page read and write
87CB7FB000
stack
page read and write
63D000303000
direct allocation
page read and write
6981000
heap
page read and write
64200121C000
trusted library allocation
page read and write
74F80087C000
trusted library allocation
page read and write
74F80060C000
trusted library allocation
page read and write
6981000
heap
page read and write
63D000215000
direct allocation
page read and write
6981000
heap
page read and write
79C0000
heap
page read and write
74F80085C000
trusted library allocation
page read and write
27044650000
trusted library section
page read and write
87C1FFE000
unkown
page readonly
8A0000
unkown
page readonly
6981000
heap
page read and write
7060000
direct allocation
page execute and read and write
6981000
heap
page read and write
6981000
heap
page read and write
7A8C000
heap
page read and write
6588002F8000
trusted library allocation
page read and write
642000B14000
trusted library allocation
page read and write
7A1F000
heap
page read and write
642001268000
trusted library allocation
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
74F800840000
trusted library allocation
page read and write
74F800818000
trusted library allocation
page read and write
87BF7FE000
stack
page read and write
8AA000
unkown
page readonly
642001080000
trusted library allocation
page read and write
8B1000
unkown
page readonly
642000BAC000
trusted library allocation
page read and write
6420002A8000
trusted library allocation
page read and write
6981000
heap
page read and write
642000DA4000
trusted library allocation
page read and write
74F80039C000
trusted library allocation
page read and write
6420003A0000
trusted library allocation
page read and write
6981000
heap
page read and write
6420006EC000
trusted library allocation
page read and write
74F8007AC000
trusted library allocation
page read and write
7090000
direct allocation
page execute and read and write
6981000
heap
page read and write
6420004DC000
trusted library allocation
page read and write
2703DC94000
heap
page read and write
6981000
heap
page read and write
500000
heap
page read and write
7BBC000
heap
page read and write
6981000
heap
page read and write
658800250000
trusted library allocation
page read and write
642000C18000
trusted library allocation
page read and write
642000390000
trusted library allocation
page read and write
958000
heap
page read and write
74F8002E4000
trusted library allocation
page read and write
3590000
direct allocation
page read and write
7800000
heap
page read and write
6420005EC000
trusted library allocation
page read and write
642000A68000
trusted library allocation
page read and write
642000B24000
trusted library allocation
page read and write
87E37FE000
stack
page read and write
642000120000
trusted library allocation
page read and write
63D000201000
direct allocation
page read and write
642000EFC000
trusted library allocation
page read and write
642000C80000
trusted library allocation
page read and write
74F800430000
trusted library allocation
page read and write
6981000
heap
page read and write
3590000
direct allocation
page read and write
6981000
heap
page read and write
64200123C000
trusted library allocation
page read and write
6981000
heap
page read and write
4F0000
heap
page read and write
6420002A4000
trusted library allocation
page read and write
6981000
heap
page read and write
74F8002CC000
trusted library allocation
page read and write
64200050C000
trusted library allocation
page read and write
642000228000
trusted library allocation
page read and write
6981000
heap
page read and write
6420006F7000
trusted library allocation
page read and write
6981000
heap
page read and write
6420001C4000
trusted library allocation
page read and write
74F8007D4000
trusted library allocation
page read and write
642000F68000
trusted library allocation
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
2703A74A000
heap
page read and write
642000054000
trusted library allocation
page read and write
6981000
heap
page read and write
2703E263000
heap
page read and write
87D9FFE000
unkown
page readonly
642000154000
trusted library allocation
page read and write
752A000
direct allocation
page read and write
7B90000
heap
page read and write
74F80084C000
trusted library allocation
page read and write
5B0000
heap
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
8A1000
unkown
page execute read
27042DDB000
heap
page read and write
2EED000
stack
page read and write
642000D4C000
trusted library allocation
page read and write
642000B88000
trusted library allocation
page read and write
64200033C000
trusted library allocation
page read and write
2703E27F000
heap
page read and write
642000448000
trusted library allocation
page read and write
6420007C4000
trusted library allocation
page read and write
6981000
heap
page read and write
642000F18000
trusted library allocation
page read and write
74F8008C8000
trusted library allocation
page read and write
270423F3000
heap
page read and write
6420004A4000
trusted library allocation
page read and write
74F8006C8000
trusted library allocation
page read and write
87D7FFE000
unkown
page readonly
642000174000
trusted library allocation
page read and write
87CD7FD000
stack
page read and write
8A0000
unkown
page readonly
6A80000
trusted library allocation
page read and write
74F800230000
trusted library allocation
page read and write
64200100C000
trusted library allocation
page read and write
642001240000
trusted library allocation
page read and write
6981000
heap
page read and write
87D77FE000
stack
page read and write
74F800828000
trusted library allocation
page read and write
950000
heap
page read and write
6420008B0000
trusted library allocation
page read and write
642000BD0000
trusted library allocation
page read and write
74F800884000
trusted library allocation
page read and write
27042BA7000
unclassified section
page read and write
7892000
heap
page read and write
63D00024C000
direct allocation
page read and write
87D27FD000
stack
page read and write
642000F68000
trusted library allocation
page read and write
6588002C0000
trusted library allocation
page read and write
7070000
direct allocation
page execute and read and write
6981000
heap
page read and write
6981000
heap
page read and write
642000D40000
trusted library allocation
page read and write
87BB7FE000
stack
page read and write
642000C44000
trusted library allocation
page read and write
642000518000
trusted library allocation
page read and write
642000AC4000
trusted library allocation
page read and write
6420002F0000
trusted library allocation
page read and write
87C47FE000
stack
page read and write
64200073F000
trusted library allocation
page read and write
74F80091C000
trusted library allocation
page read and write
59E000
stack
page read and write
642001014000
trusted library allocation
page read and write
6981000
heap
page read and write
8A0000
unkown
page readonly
7800000
heap
page read and write
A5E000
heap
page read and write
6981000
heap
page read and write
27042A52000
trusted library section
page read and write
87B97FE000
stack
page read and write
6C151000
unkown
page execute read
78FA000
heap
page read and write
6981000
heap
page read and write
8B1000
unkown
page readonly
642000FA0000
trusted library allocation
page read and write
6981000
heap
page read and write
B10000
heap
page read and write
EE0000
heap
page read and write
642000828000
trusted library allocation
page read and write
642000F78000
trusted library allocation
page read and write
270423F0000
heap
page read and write
642000B44000
trusted library allocation
page read and write
7090000
direct allocation
page execute and read and write
64200049A000
trusted library allocation
page read and write
949000
heap
page read and write
7804000
heap
page read and write
270425D7000
unclassified section
page read and write
6420001A8000
trusted library allocation
page read and write
64200109C000
trusted library allocation
page read and write
87D5FFE000
unkown
page readonly
6420009AC000
trusted library allocation
page read and write
7803000
heap
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
87B87FF000
stack
page read and write
6981000
heap
page read and write
74F8006E0000
trusted library allocation
page read and write
71E000
stack
page read and write
79BF000
heap
page read and write
87C6FFE000
unkown
page readonly
74F8008F4000
trusted library allocation
page read and write
6588002C0000
trusted library allocation
page read and write
7A35000
heap
page read and write
2703A73E000
heap
page read and write
6981000
heap
page read and write
642000E4C000
trusted library allocation
page read and write
780B000
heap
page read and write
6981000
heap
page read and write
87DA7FE000
stack
page read and write
642000B54000
trusted library allocation
page read and write
87BD7FB000
stack
page read and write
55E000
stack
page read and write
2703A800000
trusted library allocation
page read and write
642000B08000
trusted library allocation
page read and write
642000001000
trusted library allocation
page read and write
73AA000
heap
page read and write
87D47FB000
stack
page read and write
6420007E4000
trusted library allocation
page read and write
642001234000
trusted library allocation
page read and write
642000214000
trusted library allocation
page read and write
B17000
heap
page read and write
6981000
heap
page read and write
642000F1C000
trusted library allocation
page read and write
110000
heap
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
74F800250000
trusted library allocation
page read and write
2703E26A000
heap
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
87D6FFE000
unkown
page readonly
6981000
heap
page read and write
642000694000
trusted library allocation
page read and write
2703DCA1000
heap
page read and write
6981000
heap
page read and write
642000FF0000
trusted library allocation
page read and write
74F8006F0000
trusted library allocation
page read and write
642000980000
trusted library allocation
page read and write
64200002C000
trusted library allocation
page read and write
642000C44000
trusted library allocation
page read and write
87C87FE000
stack
page read and write
6420001D4000
trusted library allocation
page read and write
6588002F4000
trusted library allocation
page read and write
64200021C000
trusted library allocation
page read and write
74F80078C000
trusted library allocation
page read and write
7801000
heap
page read and write
64200033C000
trusted library allocation
page read and write
87C07FA000
stack
page read and write
2703DC9C000
heap
page read and write
7090000
direct allocation
page execute and read and write
6981000
heap
page read and write
87C77FA000
stack
page read and write
6981000
heap
page read and write
7080000
direct allocation
page execute and read and write
6981000
heap
page read and write
6981000
heap
page read and write
87CC7FC000
stack
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
7B7C000
heap
page read and write
642000328000
trusted library allocation
page read and write
87C17FB000
stack
page read and write
C18000
heap
page read and write
79C2000
heap
page read and write
27044DA0000
trusted library section
page read and write
6420009C4000
trusted library allocation
page read and write
642000739000
trusted library allocation
page read and write
642000CD9000
trusted library allocation
page read and write
642000E90000
trusted library allocation
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
6588002BC000
trusted library allocation
page read and write
27042B80000
trusted library section
page read and write
5A0000
heap
page read and write
658800235000
trusted library allocation
page read and write
63D000217000
direct allocation
page read and write
642000BC0000
trusted library allocation
page read and write
63D000250000
direct allocation
page read and write
2703DC9C000
heap
page read and write
780E000
heap
page read and write
6981000
heap
page read and write
642000860000
trusted library allocation
page read and write
6981000
heap
page read and write
7927000
heap
page read and write
642000E70000
trusted library allocation
page read and write
642000734000
trusted library allocation
page read and write
74F80039C000
trusted library allocation
page read and write
8A1000
unkown
page execute read
7801000
heap
page read and write
6C278000
unkown
page readonly
6420005EA000
trusted library allocation
page read and write
87E5FFE000
unkown
page readonly
6420002F3000
trusted library allocation
page read and write
64200042D000
trusted library allocation
page read and write
94A000
heap
page read and write
74F800424000
trusted library allocation
page read and write
2703A743000
heap
page read and write
74F8002B0000
trusted library allocation
page read and write
7806000
heap
page read and write
7979000
heap
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
7956000
heap
page read and write
64200114C000
trusted library allocation
page read and write
87E4FFE000
unkown
page readonly
642000F68000
trusted library allocation
page read and write
F0F000
stack
page read and write
642000FAC000
trusted library allocation
page read and write
87CEFFE000
unkown
page readonly
87C3FFE000
unkown
page readonly
6981000
heap
page read and write
87D97FE000
stack
page read and write
330F000
unkown
page read and write
642001088000
trusted library allocation
page read and write
27042207000
unclassified section
page read and write
6981000
heap
page read and write
642000144000
trusted library allocation
page read and write
63D000230000
direct allocation
page read and write
642000FE0000
trusted library allocation
page read and write
7090000
direct allocation
page execute and read and write
49C000
stack
page read and write
270429F0000
trusted library section
page read and write
78D3000
heap
page read and write
7909000
heap
page read and write
63D0002E4000
direct allocation
page read and write
2703A920000
heap
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
8AE000
unkown
page read and write
338E000
stack
page read and write
64200012C000
trusted library allocation
page read and write
6420001E8000
trusted library allocation
page read and write
6420001E0000
trusted library allocation
page read and write
27042247000
unclassified section
page read and write
6981000
heap
page read and write
642000B4C000
trusted library allocation
page read and write
71CF000
heap
page read and write
74F800874000
trusted library allocation
page read and write
6420001B4000
trusted library allocation
page read and write
87CAFFE000
unkown
page readonly
6981000
heap
page read and write
2703E390000
trusted library section
page read and write
2703DC8A000
heap
page read and write
642000368000
trusted library allocation
page read and write
6E10000
direct allocation
page read and write
6588002A0000
trusted library allocation
page read and write
7803000
heap
page read and write
2703DCA1000
heap
page read and write
6981000
heap
page read and write
6C27C000
unkown
page readonly
780A000
heap
page read and write
8A1000
unkown
page execute read
87D1FFE000
unkown
page readonly
642000490000
trusted library allocation
page read and write
6420008E4000
trusted library allocation
page read and write
A5A000
heap
page read and write
6981000
heap
page read and write
7800000
heap
page read and write
642000C28000
trusted library allocation
page read and write
642001258000
trusted library allocation
page read and write
2704465E000
trusted library section
page read and write
74F8008C4000
trusted library allocation
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
7090000
direct allocation
page execute and read and write
642000601000
trusted library allocation
page read and write
6420008C8000
trusted library allocation
page read and write
73C4000
direct allocation
page read and write
642000EFC000
trusted library allocation
page read and write
6981000
heap
page read and write
87BE7FB000
stack
page read and write
2703E25F000
heap
page read and write
6420006B4000
trusted library allocation
page read and write
87BA7FE000
stack
page read and write
642000F18000
trusted library allocation
page read and write
642000ECC000
trusted library allocation
page read and write
87E0FFE000
unkown
page readonly
27044C70000
trusted library section
page read and write
A50000
heap
page read and write
6981000
heap
page read and write
74F800418000
trusted library allocation
page read and write
3340000
heap
page read and write
6981000
heap
page read and write
64200019C000
trusted library allocation
page read and write
6981000
heap
page read and write
2703A7A0000
heap
page readonly
642000490000
trusted library allocation
page read and write
6981000
heap
page read and write
6420003A0000
trusted library allocation
page read and write
87DE7FE000
stack
page read and write
3590000
direct allocation
page read and write
63D000220000
direct allocation
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
74F80079C000
trusted library allocation
page read and write
642000E0C000
trusted library allocation
page read and write
74F80020C000
trusted library allocation
page read and write
78C2000
heap
page read and write
642000801000
trusted library allocation
page read and write
6981000
heap
page read and write
642001228000
trusted library allocation
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
354B000
heap
page read and write
789A000
heap
page read and write
73CF000
direct allocation
page read and write
8A0000
unkown
page readonly
27042AFD000
trusted library section
page read and write
87C8FFE000
unkown
page readonly
8B1000
unkown
page readonly
6981000
heap
page read and write
6588002BC000
trusted library allocation
page read and write
7804000
heap
page read and write
67C000
stack
page read and write
79A4000
heap
page read and write
7A57000
heap
page read and write
3590000
direct allocation
page read and write
74F80082C000
trusted library allocation
page read and write
64200033C000
trusted library allocation
page read and write
27042DE1000
heap
page read and write
642000EFC000
trusted library allocation
page read and write
7090000
direct allocation
page execute and read and write
6981000
heap
page read and write
3540000
heap
page read and write
6981000
heap
page read and write
64200043C000
trusted library allocation
page read and write
64200033C000
trusted library allocation
page read and write
87E27F4000
stack
page read and write
954000
heap
page read and write
2703E1DA000
heap
page read and write
74F800408000
trusted library allocation
page read and write
3590000
direct allocation
page read and write
2703E279000
heap
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
2703E243000
heap
page read and write
6981000
heap
page read and write
79EF000
heap
page read and write
2703E1E3000
heap
page read and write
27042AF2000
trusted library section
page read and write
7801000
heap
page read and write
87D37FB000
stack
page read and write
2703E29A000
heap
page read and write
795B000
heap
page read and write
2703A6A0000
heap
page read and write
6981000
heap
page read and write
87BFFFE000
unkown
page readonly
642000350000
trusted library allocation
page read and write
74F800920000
trusted library allocation
page read and write
47C000
stack
page read and write
8A0000
unkown
page readonly
6981000
heap
page read and write
7090000
direct allocation
page execute and read and write
6420007DC000
trusted library allocation
page read and write
63D000260000
direct allocation
page read and write
6981000
heap
page read and write
E0F000
stack
page read and write
27044C10000
trusted library section
page read and write
642001264000
trusted library allocation
page read and write
7804000
heap
page read and write
6981000
heap
page read and write
74F800918000
trusted library allocation
page read and write
7370000
heap
page read and write
3590000
direct allocation
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
642000300000
trusted library allocation
page read and write
87C4FFE000
unkown
page readonly
110F000
stack
page read and write
2703DC93000
heap
page read and write
7090000
direct allocation
page execute and read and write
642000628000
trusted library allocation
page read and write
87C7FFE000
unkown
page readonly
6420002D0000
trusted library allocation
page read and write
642000F44000
trusted library allocation
page read and write
658800264000
trusted library allocation
page read and write
8A1000
unkown
page execute read
642000500000
trusted library allocation
page read and write
642000D34000
trusted library allocation
page read and write
7090000
direct allocation
page execute and read and write
7090000
direct allocation
page execute and read and write
642000330000
trusted library allocation
page read and write
510000
heap
page read and write
2703E272000
heap
page read and write
8B1000
unkown
page readonly
94B000
heap
page read and write
7801000
heap
page read and write
658800294000
trusted library allocation
page read and write
8AE000
unkown
page write copy
74F800210000
trusted library allocation
page read and write
642000C34000
trusted library allocation
page read and write
6588002A0000
trusted library allocation
page read and write
6420004A0000
trusted library allocation
page read and write
74F8008AC000
trusted library allocation
page read and write
6981000
heap
page read and write
642000490000
trusted library allocation
page read and write
642000B2C000
trusted library allocation
page read and write
658800270000
trusted library allocation
page read and write
642000EB8000
trusted library allocation
page read and write
642000844000
trusted library allocation
page read and write
6981000
heap
page read and write
642000A80000
trusted library allocation
page read and write
27042DF9000
heap
page read and write
78E0000
heap
page read and write
6981000
heap
page read and write
64200020C000
trusted library allocation
page read and write
6420008B8000
trusted library allocation
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
8AE000
unkown
page write copy
6420001D8000
trusted library allocation
page read and write
2703E270000
heap
page read and write
642000C01000
trusted library allocation
page read and write
78A3000
heap
page read and write
6981000
heap
page read and write
642000BB0000
trusted library allocation
page read and write
87D3FFE000
unkown
page readonly
74F800700000
trusted library allocation
page read and write
74F8006F4000
trusted library allocation
page read and write
6981000
heap
page read and write
642000C78000
trusted library allocation
page read and write
2703E218000
heap
page read and write
27044D6D000
trusted library section
page read and write
6420002B4000
trusted library allocation
page read and write
6420004AC000
trusted library allocation
page read and write
6420001B4000
trusted library allocation
page read and write
74F800894000
trusted library allocation
page read and write
6420000DC000
trusted library allocation
page read and write
642001160000
trusted library allocation
page read and write
74F80027C000
trusted library allocation
page read and write
63D0002DC000
direct allocation
page read and write
6981000
heap
page read and write
7801000
heap
page read and write
950000
heap
page read and write
64200031C000
trusted library allocation
page read and write
6981000
heap
page read and write
87C37FE000
stack
page read and write
642000013000
trusted library allocation
page read and write
6981000
heap
page read and write
658800220000
trusted library allocation
page read and write
74F8007E4000
trusted library allocation
page read and write
6981000
heap
page read and write
962000
heap
page read and write
74F8006C8000
trusted library allocation
page read and write
79DC000
heap
page read and write
74F8007E0000
trusted library allocation
page read and write
7B56000
heap
page read and write
6981000
heap
page read and write
780A000
heap
page read and write
64200063C000
trusted library allocation
page read and write
63D00020C000
direct allocation
page read and write
6420001F4000
trusted library allocation
page read and write
7803000
heap
page read and write
642000210000
trusted library allocation
page read and write
2703D050000
unkown
page read and write
2703C603000
heap
page read and write
6981000
heap
page read and write
87D8FFE000
unkown
page readonly
642000390000
trusted library allocation
page read and write
6981000
heap
page read and write
74F8006BC000
trusted library allocation
page read and write
6981000
heap
page read and write
642000EFC000
trusted library allocation
page read and write
642000C9C000
trusted library allocation
page read and write
6588002BC000
trusted library allocation
page read and write
64200065C000
trusted library allocation
page read and write
2703DC8F000
heap
page read and write
6420001F0000
trusted library allocation
page read and write
7AAF000
heap
page read and write
6981000
heap
page read and write
8AA000
unkown
page readonly
642000304000
trusted library allocation
page read and write
2703DC93000
heap
page read and write
958000
heap
page read and write
87DEFFE000
unkown
page readonly
73A0000
heap
page read and write
2F90000
heap
page read and write
87DC7FD000
stack
page read and write
642000D74000
trusted library allocation
page read and write
87DF7FE000
stack
page read and write
642000884000
trusted library allocation
page read and write
642000E40000
trusted library allocation
page read and write
6420010C8000
trusted library allocation
page read and write
6981000
heap
page read and write
642000948000
trusted library allocation
page read and write
87D67FE000
stack
page read and write
83E000
stack
page read and write
642000DA4000
trusted library allocation
page read and write
642000DC4000
trusted library allocation
page read and write
6981000
heap
page read and write
7968000
heap
page read and write
642000224000
trusted library allocation
page read and write
642000344000
trusted library allocation
page read and write
7090000
direct allocation
page execute and read and write
63D0002AC000
direct allocation
page read and write
87BBFFE000
unkown
page readonly
74F800401000
trusted library allocation
page read and write
87DCFFE000
unkown
page readonly
79D4000
heap
page read and write
642000CF8000
trusted library allocation
page read and write
63D0002A8000
direct allocation
page read and write
7090000
direct allocation
page execute and read and write
87C27FC000
stack
page read and write
642000CC0000
trusted library allocation
page read and write
64200114C000
trusted library allocation
page read and write
71B1000
heap
page read and write
6588002C0000
trusted library allocation
page read and write
78EE000
heap
page read and write
6D0000
heap
page read and write
74F8002F4000
trusted library allocation
page read and write
642000D80000
trusted library allocation
page read and write
87E7FFE000
unkown
page readonly
74F8006AC000
trusted library allocation
page read and write
87CA7FB000
stack
page read and write
8AA000
unkown
page readonly
8A1000
unkown
page execute read
2703A810000
trusted library allocation
page read and write
6420003A0000
trusted library allocation
page read and write
74F800864000
trusted library allocation
page read and write
87E07FB000
stack
page read and write
944000
heap
page read and write
7090000
direct allocation
page execute and read and write
87B9FFE000
unkown
page readonly
74F80080C000
trusted library allocation
page read and write
6420002A4000
trusted library allocation
page read and write
6981000
heap
page read and write
64200098C000
trusted library allocation
page read and write
642000FAC000
trusted library allocation
page read and write
79A6000
heap
page read and write
642000DC4000
trusted library allocation
page read and write
6420006DC000
trusted library allocation
page read and write
642000490000
trusted library allocation
page read and write
64200006A000
trusted library allocation
page read and write
6981000
heap
page read and write
2703E130000
trusted library section
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
74F800601000
trusted library allocation
page read and write
6588002C0000
trusted library allocation
page read and write
958000
heap
page read and write
949000
heap
page read and write
642000304000
trusted library allocation
page read and write
642000868000
trusted library allocation
page read and write
642000590000
trusted library allocation
page read and write
642000E01000
trusted library allocation
page read and write
795B000
heap
page read and write
6981000
heap
page read and write
74F800960000
trusted library allocation
page read and write
7A68000
heap
page read and write
642000C4C000
trusted library allocation
page read and write
7809000
heap
page read and write
6981000
heap
page read and write
63D000234000
direct allocation
page read and write
642000118000
trusted library allocation
page read and write
642000EA8000
trusted library allocation
page read and write
642000084000
trusted library allocation
page read and write
74F80025C000
trusted library allocation
page read and write
642000EFC000
trusted library allocation
page read and write
87D2FFE000
unkown
page readonly
7AC7000
heap
page read and write
4BC000
stack
page read and write
6588002BC000
trusted library allocation
page read and write
2703E26E000
heap
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
74F800788000
trusted library allocation
page read and write
642001201000
trusted library allocation
page read and write
6981000
heap
page read and write
64200040C000
trusted library allocation
page read and write
7090000
direct allocation
page execute and read and write
642000D14000
trusted library allocation
page read and write
6981000
heap
page read and write
6DC0000
trusted library allocation
page read and write
6981000
heap
page read and write
6420005A0000
trusted library allocation
page read and write
6981000
heap
page read and write
B8F000
stack
page read and write
642000184000
trusted library allocation
page read and write
642000E9C000
trusted library allocation
page read and write
6981000
heap
page read and write
14E0000
unkown
page write copy
7090000
direct allocation
page execute and read and write
752C000
direct allocation
page read and write
642000C47000
trusted library allocation
page read and write
74F800288000
trusted library allocation
page read and write
87CBFFE000
unkown
page readonly
6420009E4000
trusted library allocation
page read and write
74F800238000
trusted library allocation
page read and write
6981000
heap
page read and write
74F8007A0000
trusted library allocation
page read and write
63D000280000
direct allocation
page read and write
642000380000
trusted library allocation
page read and write
2703DC8A000
heap
page read and write
74F8006D4000
trusted library allocation
page read and write
6981000
heap
page read and write
7AB5000
heap
page read and write
27044C91000
trusted library section
page read and write
7601000
heap
page read and write
2703C600000
heap
page read and write
87DDFFE000
unkown
page readonly
87E17FC000
stack
page read and write
6981000
heap
page read and write
8A1000
unkown
page execute read
642000A0C000
trusted library allocation
page read and write
2703C5A0000
heap
page read and write
642000928000
trusted library allocation
page read and write
642000F74000
trusted library allocation
page read and write
642000164000
trusted library allocation
page read and write
63D0002EC000
direct allocation
page read and write
6981000
heap
page read and write
642000090000
trusted library allocation
page read and write
7917000
heap
page read and write
2703A8F0000
trusted library section
page readonly
7090000
direct allocation
page execute and read and write
642000448000
trusted library allocation
page read and write
642000490000
trusted library allocation
page read and write
8AE000
unkown
page read and write
6420000FC000
trusted library allocation
page read and write
642000CB8000
trusted library allocation
page read and write
642001020000
trusted library allocation
page read and write
642000FA0000
trusted library allocation
page read and write
642000A01000
trusted library allocation
page read and write
7932000
heap
page read and write
8AE000
unkown
page write copy
87E2FFE000
unkown
page readonly
94A000
heap
page read and write
74F8007D0000
trusted library allocation
page read and write
642000350000
trusted library allocation
page read and write
27044C3E000
trusted library section
page read and write
7090000
direct allocation
page execute and read and write
780F000
heap
page read and write
7803000
heap
page read and write
642000E28000
trusted library allocation
page read and write
6981000
heap
page read and write
2FE0000
heap
page read and write
642000118000
trusted library allocation
page read and write
8A0000
unkown
page readonly
6981000
heap
page read and write
6588002BC000
trusted library allocation
page read and write
2703E26C000
heap
page read and write
642000700000
trusted library allocation
page read and write
6420006CC000
trusted library allocation
page read and write
97A000
heap
page read and write
642000350000
trusted library allocation
page read and write
74F80095C000
trusted library allocation
page read and write
8AE000
unkown
page read and write
6981000
heap
page read and write
2703A7E0000
heap
page read and write
27044870000
trusted library section
page read and write
642000A78000
trusted library allocation
page read and write
87C9FFE000
unkown
page readonly
7A07000
heap
page read and write
6588002BC000
trusted library allocation
page read and write
64200060C000
trusted library allocation
page read and write
6981000
heap
page read and write
6420001E4000
trusted library allocation
page read and write
87BAFFE000
unkown
page readonly
642000EA8000
trusted library allocation
page read and write
74F8006E8000
trusted library allocation
page read and write
87E57FE000
stack
page read and write
642000EDC000
trusted library allocation
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
87D57FB000
stack
page read and write
64200000C000
trusted library allocation
page read and write
6981000
heap
page read and write
2703A7C0000
heap
page read and write
6420005E4000
trusted library allocation
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
74F800890000
trusted library allocation
page read and write
6420004A0000
trusted library allocation
page read and write
6420002C0000
trusted library allocation
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
DC1000
unkown
page execute and write copy
2703E1EB000
heap
page read and write
64200115C000
trusted library allocation
page read and write
7801000
heap
page read and write
74F800964000
trusted library allocation
page read and write
6981000
heap
page read and write
74F80071C000
trusted library allocation
page read and write
6981000
heap
page read and write
7808000
heap
page read and write
87BEFFE000
unkown
page readonly
27044CA3000
trusted library section
page read and write
7B17000
heap
page read and write
7801000
heap
page read and write
7090000
direct allocation
page execute and read and write
642000D8C000
trusted library allocation
page read and write
3590000
direct allocation
page read and write
87DAFFE000
unkown
page readonly
6981000
heap
page read and write
6420003B4000
trusted library allocation
page read and write
642000304000
trusted library allocation
page read and write
958000
heap
page read and write
27044D62000
trusted library section
page read and write
6588002F0000
trusted library allocation
page read and write
7AB5000
heap
page read and write
642000F08000
trusted library allocation
page read and write
64200115C000
trusted library allocation
page read and write
64200027C000
trusted library allocation
page read and write
74F8008EC000
trusted library allocation
page read and write
3590000
direct allocation
page read and write
78B4000
heap
page read and write
74F800801000
trusted library allocation
page read and write
87CFFFE000
unkown
page readonly
642000350000
trusted library allocation
page read and write
74F8007C0000
trusted library allocation
page read and write
2703E24C000
heap
page read and write
6981000
heap
page read and write
6981000
heap
page read and write
2703E410000
trusted library section
page read and write
6981000
heap
page read and write
87DB7FE000
stack
page read and write
642000D68000
trusted library allocation
page read and write
780D000
heap
page read and write
D8E000
stack
page read and write
6981000
heap
page read and write
642000E85000
trusted library allocation
page read and write
87C5FFE000
unkown
page readonly
6981000
heap
page read and write
6981000
heap
page read and write
3590000
direct allocation
page read and write
87C0FFE000
unkown
page readonly
642000230000
trusted library allocation
page read and write
64200035C000
trusted library allocation
page read and write
74F800878000
trusted library allocation
page read and write
63D00023C000
direct allocation
page read and write
3590000
direct allocation
page read and write
6981000
heap
page read and write
2703A925000
heap
page read and write
642000CAC000
trusted library allocation
page read and write
8A0000
unkown
page readonly
6420001EC000
trusted library allocation
page read and write
65880020C000
trusted library allocation
page read and write
6981000
heap
page read and write
642000C5C000
trusted library allocation
page read and write
798A000
heap
page read and write
642000DC4000
trusted library allocation
page read and write
642000E68000
trusted library allocation
page read and write
658800230000
trusted library allocation
page read and write
642000A18000
trusted library allocation
page read and write
7912000
heap
page read and write
6420006A4000
trusted library allocation
page read and write
27042DD0000
heap
page read and write
87CF7FD000
stack
page read and write
642000490000
trusted library allocation
page read and write
720000
heap
page read and write
78CD000
heap
page read and write
6981000
heap
page read and write
642000C68000
trusted library allocation
page read and write
27042FD0000
trusted library section
page read and write
74F8002D4000
trusted library allocation
page read and write
642000D98000
trusted library allocation
page read and write
6981000
heap
page read and write
642000718000
trusted library allocation
page read and write
74F8002ED000
trusted library allocation
page read and write
6981000
heap
page read and write
87BCFFE000
unkown
page readonly
7B8E000
heap
page read and write
642000401000
trusted library allocation
page read and write
74F8006AC000
trusted library allocation
page read and write
799F000
heap
page read and write
2703E1BB000
heap
page read and write
6981000
heap
page read and write
2703E257000
heap
page read and write
6981000
heap
page read and write
642001001000
trusted library allocation
page read and write
6981000
heap
page read and write
6C279000
unkown
page read and write
7090000
direct allocation
page execute and read and write
642000330000
trusted library allocation
page read and write
6981000
heap
page read and write
642000344000
trusted library allocation
page read and write
87D87FE000
stack
page read and write
658800201000
trusted library allocation
page read and write
6C22F000
unkown
page readonly
658800248000
trusted library allocation
page read and write
799C000
heap
page read and write
64200033C000
trusted library allocation
page read and write
74F800850000
trusted library allocation
page read and write
87DFFFE000
unkown
page readonly
7808000
heap
page read and write
87CDFFE000
unkown
page readonly
87B77FE000
unkown
page read and write
797C000
heap
page read and write
6981000
heap
page read and write
64200056C000
trusted library allocation
page read and write
74F8007BC000
trusted library allocation
page read and write
6981000
heap
page read and write
64200033C000
trusted library allocation
page read and write
642000220000
trusted library allocation
page read and write
87BC7FD000
stack
page read and write
78FF000
heap
page read and write
954000
heap
page read and write
DC0000
unkown
page readonly
6981000
heap
page read and write
74F800201000
trusted library allocation
page read and write
8A1000
unkown
page execute read
642000FAC000
trusted library allocation
page read and write
87BDFFE000
unkown
page readonly
6981000
heap
page read and write
6981000
heap
page read and write
642000668000
trusted library allocation
page read and write
6588002A0000
trusted library allocation
page read and write
27042277000
unclassified section
page read and write
2703A5C0000
heap
page read and write
7223000
heap
page read and write
87D4FFE000
unkown
page readonly
789C000
heap
page read and write
1872000
unkown
page execute and write copy
658800278000
trusted library allocation
page read and write
7B0000
heap
page read and write
8AE000
unkown
page write copy
642000B58000
trusted library allocation
page read and write
74F800248000
trusted library allocation
page read and write
6981000
heap
page read and write
270423A0000
heap
page read and write
642001030000
trusted library allocation
page read and write
6588002C0000
trusted library allocation
page read and write
7997000
heap
page read and write
74F800904000
trusted library allocation
page read and write
3590000
direct allocation
page read and write
6981000
heap
page read and write
2F2A000
stack
page read and write
7223000
heap
page read and write
642000EFC000
trusted library allocation
page read and write
8AA000
unkown
page readonly
642000907000
trusted library allocation
page read and write
ABD000
stack
page read and write
2703E1D2000
heap
page read and write
2703DCA0000
heap
page read and write
6981000
heap
page read and write
6DC0000
trusted library allocation
page read and write
6420000B4000
trusted library allocation
page read and write
74F800948000
trusted library allocation
page read and write
87C97FE000
stack
page read and write
6981000
heap
page read and write
78CC000
heap
page read and write
6981000
heap
page read and write
8B1000
unkown
page readonly
642000E5C000
trusted library allocation
page read and write
64200020C000
trusted library allocation
page read and write
1F0000
heap
page read and write
8AA000
unkown
page readonly
6E00000
direct allocation
page read and write
642000AD8000
trusted library allocation
page read and write
658800260000
trusted library allocation
page read and write
7AF0000
heap
page read and write
64200091C000
trusted library allocation
page read and write
642000A48000
trusted library allocation
page read and write
6420001D0000
trusted library allocation
page read and write
642000BB0000
trusted library allocation
page read and write
78B7000
heap
page read and write
8B1000
unkown
page readonly
87E3FFE000
unkown
page readonly
6981000
heap
page read and write
74F800728000
trusted library allocation
page read and write
6981000
heap
page read and write
642000D68000
trusted library allocation
page read and write
63D000274000
direct allocation
page read and write
74F800778000
trusted library allocation
page read and write
6981000
heap
page read and write
642000490000
trusted library allocation
page read and write
780A000
heap
page read and write
6981000
heap
page read and write
642000EC4000
trusted library allocation
page read and write
2703DC93000
heap
page read and write
642000370000
trusted library allocation
page read and write
770000
heap
page read and write
63D0002D0000
direct allocation
page read and write
There are 1211 hidden memdumps, click here to show them.