IOC Report
6dPpCeWDig.exe

loading gif

Files

File Path
Type
Category
Malicious
6dPpCeWDig.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_6dPpCeWDig.exe_5b5344f9cb7648d524ec243936c13c7d45b2e2f9_98cae835_989df761-6271-4bdd-9180-5f376cd25ec4\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAB60.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Dec 23 07:57:22 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAD07.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAD47.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ELLRGATenShKoyKeRtXA.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\6dPpCeWDig.exe
"C:\Users\user\Desktop\6dPpCeWDig.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2460 --field-trial-handle=2296,i,1584049202898169738,758844349250763749,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6108 -s 1168
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
http://anglebug.com/3965.
unknown
http://anglebug.com/5371I
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/3584O
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://anglebug.com/5055H
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actionsRun
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://anglebug.com/7320E
unknown
https://www.google.com/chrome/tips/
unknown
http://anglebug.com/82290
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
https://anglebug.com/7489/
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://docs.googl0
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://issuetracker.google.com/issues/1664752737
unknown
https://anglebug.com/7489
unknown
https://docs.google.com/presentation/
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://www.youtube.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://docs.google.com/spreadsheets/
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://httpbin.org/ipbefore
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://drive-daily-4.c
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
http://anglebug.com/4551F
unknown
http://anglebug.com/5421_
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=b=
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/6141N
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://anglebug.com/5881:
unknown
http://anglebug.com/58819
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/4722~
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://anglebug.com/7162=
unknown
https://policies.google.com/
unknown
https://anglebug.com/6574G
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.com
142.250.181.132
home.twentytk20ht.top
185.121.15.192
twentytk20ht.top
185.121.15.192
httpbin.org
34.226.108.155

IPs

IP
Domain
Country
Malicious
185.121.15.192
home.twentytk20ht.top
Spain
34.226.108.155
httpbin.org
United States
239.255.255.250
unknown
Reserved
142.250.181.132
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
ProgramId
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
FileId
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
LowerCaseLongPath
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
LongPathHash
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
Name
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
OriginalFileName
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
Publisher
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
Version
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
BinFileVersion
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
BinaryType
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
ProductName
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
ProductVersion
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
LinkDate
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
BinProductVersion
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
AppxPackageFullName
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
AppxPackageRelativeId
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
Size
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
Language
\REGISTRY\A\{6af35749-8ff1-ccf1-9ba3-00ded291ecfc}\Root\InventoryApplicationFile\6dppcewdig.exe|326e0e90d9094b42
Usn
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
103C000
stack
page read and write
3D8400401000
trusted library allocation
page read and write
3D8400340000
trusted library allocation
page read and write
17A40039C000
trusted library allocation
page read and write
70E1000
heap
page read and write
3D84004B4000
trusted library allocation
page read and write
3AE3DFE000
unkown
page readonly
AEA000
unkown
page readonly
70E1000
heap
page read and write
19E0000
direct allocation
page read and write
70E1000
heap
page read and write
3D8400338000
trusted library allocation
page read and write
3D8400BCC000
trusted library allocation
page read and write
7F42000
heap
page read and write
3D840099C000
trusted library allocation
page read and write
18F8000
heap
page read and write
20F0AFC0000
heap
page read and write
AE1000
unkown
page execute read
8092000
heap
page read and write
44F800270000
direct allocation
page read and write
24D400201000
trusted library allocation
page read and write
20F0AF73000
heap
page read and write
17A400401000
trusted library allocation
page read and write
3D84001F4000
trusted library allocation
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
17A4002B8000
trusted library allocation
page read and write
70E1000
heap
page read and write
1902000
heap
page read and write
17A40082C000
trusted library allocation
page read and write
70E1000
heap
page read and write
20F129C2000
trusted library allocation
page read and write
70E1000
heap
page read and write
80B4000
heap
page read and write
20F0AE50000
heap
page readonly
3AEEDFE000
unkown
page readonly
70E1000
heap
page read and write
3D84002F0000
trusted library allocation
page read and write
70E1000
heap
page read and write
19E0000
direct allocation
page read and write
70E1000
heap
page read and write
1906000
heap
page read and write
3D8400478000
trusted library allocation
page read and write
3D8400214000
trusted library allocation
page read and write
7AB6000
heap
page read and write
77D0000
direct allocation
page execute and read and write
AE1000
unkown
page execute read
140E000
stack
page read and write
3D8401044000
trusted library allocation
page read and write
77D0000
direct allocation
page execute and read and write
80A6000
heap
page read and write
77D0000
direct allocation
page execute and read and write
3ACBDFE000
unkown
page readonly
3D84012CC000
trusted library allocation
page read and write
80A6000
heap
page read and write
70E1000
heap
page read and write
3D8400E9C000
trusted library allocation
page read and write
17A40095C000
trusted library allocation
page read and write
19E0000
direct allocation
page read and write
17A40020C000
trusted library allocation
page read and write
8030000
heap
page read and write
3D84007B4000
trusted library allocation
page read and write
17A400898000
trusted library allocation
page read and write
3D840034C000
trusted library allocation
page read and write
3D8400C4C000
trusted library allocation
page read and write
1460000
heap
page read and write
3D8400BD8000
trusted library allocation
page read and write
20F0E3E3000
heap
page read and write
3D8400E1C000
trusted library allocation
page read and write
3D84005BC000
trusted library allocation
page read and write
3D84007D8000
trusted library allocation
page read and write
3AC85FB000
stack
page read and write
AEA000
unkown
page readonly
20F12690000
trusted library allocation
page read and write
19E0000
direct allocation
page read and write
3D840060C000
trusted library allocation
page read and write
77D0000
direct allocation
page execute and read and write
70E1000
heap
page read and write
3D8400AB4000
trusted library allocation
page read and write
3D840034C000
trusted library allocation
page read and write
807A000
heap
page read and write
20F14D60000
trusted library section
page read and write
3D8400F80000
trusted library allocation
page read and write
3D84006E0000
trusted library allocation
page read and write
A20000
heap
page read and write
74F000
unkown
page read and write
70E1000
heap
page read and write
3D840020C000
trusted library allocation
page read and write
20F0E3E4000
heap
page read and write
20F14D00000
trusted library section
page read and write
3D8400E70000
trusted library allocation
page read and write
3AE6DFE000
unkown
page readonly
3D8400338000
trusted library allocation
page read and write
70E1000
heap
page read and write
3D84000B4000
trusted library allocation
page read and write
70E1000
heap
page read and write
3D84001E4000
trusted library allocation
page read and write
3D84005E0000
trusted library allocation
page read and write
70E1000
heap
page read and write
80B4000
heap
page read and write
20F0AF87000
heap
page read and write
80A1000
heap
page read and write
801D000
heap
page read and write
810F000
heap
page read and write
3D840040E000
trusted library allocation
page read and write
3D8400DB4000
trusted library allocation
page read and write
17A4006C8000
trusted library allocation
page read and write
3D8400E28000
trusted library allocation
page read and write
3D84000EC000
trusted library allocation
page read and write
3AEFDFE000
unkown
page readonly
1912000
heap
page read and write
70E1000
heap
page read and write
3D84001F0000
trusted library allocation
page read and write
3D84009CC000
trusted library allocation
page read and write
3D8401050000
trusted library allocation
page read and write
24D4002F0000
trusted library allocation
page read and write
70E1000
heap
page read and write
24D400250000
trusted library allocation
page read and write
3D8400418000
trusted library allocation
page read and write
44F8002EC000
direct allocation
page read and write
123E000
stack
page read and write
3AEA5FD000
stack
page read and write
1468000
heap
page read and write
80CD000
heap
page read and write
3D84001B4000
trusted library allocation
page read and write
3D8400500000
trusted library allocation
page read and write
17A4002F4000
trusted library allocation
page read and write
70E1000
heap
page read and write
17A4008A8000
trusted library allocation
page read and write
70E1000
heap
page read and write
AEE000
unkown
page read and write
AE1000
unkown
page execute read
77D0000
direct allocation
page execute and read and write
3AC15EF000
stack
page read and write
9EC000
stack
page read and write
3D8400EB8000
trusted library allocation
page read and write
17A4002F0000
trusted library allocation
page read and write
3D8400DC4000
trusted library allocation
page read and write
24D4002A0000
trusted library allocation
page read and write
3AD4DFE000
unkown
page readonly
18A1000
heap
page read and write
24D4002B0000
trusted library allocation
page read and write
70E1000
heap
page read and write
3D8400694000
trusted library allocation
page read and write
3D840032C000
trusted library allocation
page read and write
20F0E3DB000
heap
page read and write
D4C000
stack
page read and write
3D8400AC0000
trusted library allocation
page read and write
17A4007A0000
trusted library allocation
page read and write
6C79D000
unkown
page read and write
3D84003EC000
trusted library allocation
page read and write
3D8400318000
trusted library allocation
page read and write
8238000
heap
page read and write
3D840000C000
trusted library allocation
page read and write
17A4007E4000
trusted library allocation
page read and write
3D8400C34000
trusted library allocation
page read and write
19F0000
heap
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
8020000
heap
page read and write
3D8400074000
trusted library allocation
page read and write
AEE000
unkown
page write copy
70E1000
heap
page read and write
1902000
heap
page read and write
12C0000
heap
page read and write
44F800230000
direct allocation
page read and write
3D8400338000
trusted library allocation
page read and write
3D840112C000
trusted library allocation
page read and write
70E1000
heap
page read and write
805F000
heap
page read and write
FFC000
stack
page read and write
17A400700000
trusted library allocation
page read and write
3D840120C000
trusted library allocation
page read and write
3D8400E01000
trusted library allocation
page read and write
3D840016C000
trusted library allocation
page read and write
70E1000
heap
page read and write
3D84010C0000
trusted library allocation
page read and write
17A400404000
trusted library allocation
page read and write
20F15100000
trusted library section
page read and write
17A400960000
trusted library allocation
page read and write
17A400248000
trusted library allocation
page read and write
3D84002B4000
trusted library allocation
page read and write
70E1000
heap
page read and write
17A40025C000
trusted library allocation
page read and write
78F1000
heap
page read and write
175F000
stack
page read and write
815A000
heap
page read and write
20F14607000
unclassified section
page read and write
3D8400D84000
trusted library allocation
page read and write
17A400728000
trusted library allocation
page read and write
7F4A000
heap
page read and write
3B0000
heap
page read and write
70E000
unkown
page read and write
7F47000
heap
page read and write
3D840040C000
trusted library allocation
page read and write
3D8400A4C000
trusted library allocation
page read and write
70E1000
heap
page read and write
3D840075C000
trusted library allocation
page read and write
17A4006E8000
trusted library allocation
page read and write
3D8400218000
trusted library allocation
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
3D8400DE0000
trusted library allocation
page read and write
3ACA5FE000
stack
page read and write
17A400430000
trusted library allocation
page read and write
17A4006F4000
trusted library allocation
page read and write
3D840071C000
trusted library allocation
page read and write
20F0E9F0000
trusted library section
page read and write
24D4002BC000
trusted library allocation
page read and write
3D8400DD8000
trusted library allocation
page read and write
3D84001EC000
trusted library allocation
page read and write
24D4002F8000
trusted library allocation
page read and write
44F800284000
direct allocation
page read and write
70E1000
heap
page read and write
7FDA000
heap
page read and write
AE0000
unkown
page readonly
7F43000
heap
page read and write
3D8400494000
trusted library allocation
page read and write
3D8400FB8000
trusted library allocation
page read and write
82FA000
heap
page read and write
44F8002A8000
direct allocation
page read and write
20F0E919000
heap
page read and write
17A400408000
trusted library allocation
page read and write
3D8400D84000
trusted library allocation
page read and write
20F144C2000
trusted library section
page read and write
3ACC5FC000
stack
page read and write
70E1000
heap
page read and write
44F800234000
direct allocation
page read and write
17A4002EC000
trusted library allocation
page read and write
3D8400294000
trusted library allocation
page read and write
3D84002A8000
trusted library allocation
page read and write
17A4002EE000
trusted library allocation
page read and write
70E1000
heap
page read and write
7F4D000
heap
page read and write
70E1000
heap
page read and write
6C7E8000
unkown
page readonly
3D8400FB8000
trusted library allocation
page read and write
70E1000
heap
page read and write
3D840080C000
trusted library allocation
page read and write
3ADF5FD000
stack
page read and write
19E0000
direct allocation
page read and write
20F0AF5F000
heap
page read and write
3D8400410000
trusted library allocation
page read and write
70E1000
heap
page read and write
3D840034C000
trusted library allocation
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
3D840018C000
trusted library allocation
page read and write
3AD95FB000
stack
page read and write
3AD35FE000
stack
page read and write
70E1000
heap
page read and write
3D8400C44000
trusted library allocation
page read and write
3D8400B08000
trusted library allocation
page read and write
3D8400C98000
trusted library allocation
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
8273000
heap
page read and write
70E1000
heap
page read and write
3D840034C000
trusted library allocation
page read and write
3D8400AFC000
trusted library allocation
page read and write
3D8400618000
trusted library allocation
page read and write
3C70000
direct allocation
page read and write
70E1000
heap
page read and write
DF0000
heap
page read and write
123C000
stack
page read and write
3ADA5FD000
stack
page read and write
70E1000
heap
page read and write
20F0AF66000
heap
page read and write
70E1000
heap
page read and write
80BB000
heap
page read and write
44F800250000
direct allocation
page read and write
3D84008B4000
trusted library allocation
page read and write
44F800290000
direct allocation
page read and write
3AD75FB000
stack
page read and write
3D8400DE0000
trusted library allocation
page read and write
20F1510E000
trusted library section
page read and write
3D8400D04000
trusted library allocation
page read and write
70E1000
heap
page read and write
17A40060C000
trusted library allocation
page read and write
3D84004A4000
trusted library allocation
page read and write
3AC5DFE000
unkown
page readonly
17A4006E8000
trusted library allocation
page read and write
3D8400210000
trusted library allocation
page read and write
3D8400294000
trusted library allocation
page read and write
17A40084C000
trusted library allocation
page read and write
3D8400E64000
trusted library allocation
page read and write
3D840034C000
trusted library allocation
page read and write
3D8400E58000
trusted library allocation
page read and write
24D400238000
trusted library allocation
page read and write
44F800274000
direct allocation
page read and write
803E000
heap
page read and write
3D84010F0000
trusted library allocation
page read and write
70E1000
heap
page read and write
AE1000
unkown
page execute read
20F0E9E3000
heap
page read and write
70E1000
heap
page read and write
7F49000
heap
page read and write
70E1000
heap
page read and write
17A4008C8000
trusted library allocation
page read and write
3D8400340000
trusted library allocation
page read and write
70E1000
heap
page read and write
3D8400318000
trusted library allocation
page read and write
7C84000
direct allocation
page read and write
3D8400730000
trusted library allocation
page read and write
70E1000
heap
page read and write
3AD1DFE000
unkown
page readonly
70E1000
heap
page read and write
17A400874000
trusted library allocation
page read and write
A6E000
stack
page read and write
3D8400380000
trusted library allocation
page read and write
3D8400EAC000
trusted library allocation
page read and write
3AD9DFE000
unkown
page readonly
44F800294000
direct allocation
page read and write
3AEBDFE000
unkown
page readonly
3AE9DFE000
unkown
page readonly
44F800303000
direct allocation
page read and write
1906000
heap
page read and write
81EE000
heap
page read and write
20F14E4D000
trusted library section
page read and write
3ADADFE000
unkown
page readonly
3D84001D0000
trusted library allocation
page read and write
790F000
heap
page read and write
7F45000
heap
page read and write
1916000
heap
page read and write
20F0CC33000
heap
page read and write
7F40000
heap
page read and write
77D0000
direct allocation
page execute and read and write
3D8400994000
trusted library allocation
page read and write
70E1000
heap
page read and write
3D8400D74000
trusted library allocation
page read and write
24D40020C000
trusted library allocation
page read and write
3D84003A4000
trusted library allocation
page read and write
3D84001AC000
trusted library allocation
page read and write
20F0E98D000
heap
page read and write
8065000
heap
page read and write
3D8400E0C000
trusted library allocation
page read and write
17A40079C000
trusted library allocation
page read and write
44F8002DC000
direct allocation
page read and write
3D840129C000
trusted library allocation
page read and write
3D84004D4000
trusted library allocation
page read and write
24D4002BC000
trusted library allocation
page read and write
20F0AE90000
trusted library allocation
page read and write
3D8400B3C000
trusted library allocation
page read and write
3D8400FEC000
trusted library allocation
page read and write
70E1000
heap
page read and write
1927000
heap
page read and write
70E1000
heap
page read and write
3D84002C0000
trusted library allocation
page read and write
77D0000
direct allocation
page execute and read and write
3ADCDFE000
unkown
page readonly
191D000
heap
page read and write
20F0E3EB000
heap
page read and write
70E1000
heap
page read and write
7F4E000
heap
page read and write
70E1000
heap
page read and write
AEE000
unkown
page write copy
17A400788000
trusted library allocation
page read and write
3D8400370000
trusted library allocation
page read and write
3D840034C000
trusted library allocation
page read and write
EB0000
heap
page read and write
3ACB5FB000
stack
page read and write
161F000
stack
page read and write
17A400238000
trusted library allocation
page read and write
1906000
heap
page read and write
3D8401114000
trusted library allocation
page read and write
20F12FA0000
heap
page read and write
AEE000
unkown
page read and write
AE0000
unkown
page readonly
3D8400F8C000
trusted library allocation
page read and write
44F800215000
direct allocation
page read and write
1915000
heap
page read and write
24D4002A0000
trusted library allocation
page read and write
70E1000
heap
page read and write
20F0E913000
heap
page read and write
18FF000
heap
page read and write
3AE65FE000
stack
page read and write
1128000
heap
page read and write
17A4006F4000
trusted library allocation
page read and write
1919000
heap
page read and write
70E1000
heap
page read and write
3AEDDFE000
unkown
page readonly
70E1000
heap
page read and write
1906000
heap
page read and write
3D8401104000
trusted library allocation
page read and write
3D84002B4000
trusted library allocation
page read and write
18FF000
stack
page read and write
DA0000
heap
page read and write
3D8400CAD000
trusted library allocation
page read and write
3AD3DFE000
unkown
page readonly
1902000
heap
page read and write
3D8400380000
trusted library allocation
page read and write
20F12EE7000
unclassified section
page read and write
7F42000
heap
page read and write
70E1000
heap
page read and write
7F4F000
heap
page read and write
3D84002F0000
trusted library allocation
page read and write
44F8002D0000
direct allocation
page read and write
24D400230000
trusted library allocation
page read and write
3ADFDFE000
unkown
page readonly
1906000
heap
page read and write
3D8400FC8000
trusted library allocation
page read and write
3D8400F14000
trusted library allocation
page read and write
3D8400118000
trusted library allocation
page read and write
3D84002A4000
trusted library allocation
page read and write
19E0000
direct allocation
page read and write
17A400418000
trusted library allocation
page read and write
BC0000
unkown
page readonly
70E1000
heap
page read and write
3D8400F2C000
trusted library allocation
page read and write
7B20000
direct allocation
page read and write
20F0E8F0000
heap
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
20F0E9CC000
heap
page read and write
3D8401201000
trusted library allocation
page read and write
20F0E3C0000
heap
page read and write
3D8400CB4000
trusted library allocation
page read and write
70E1000
heap
page read and write
36A000
stack
page read and write
20F0E939000
heap
page read and write
70E1000
heap
page read and write
1915000
heap
page read and write
AF1000
unkown
page readonly
17A400948000
trusted library allocation
page read and write
3D8400E38000
trusted library allocation
page read and write
3D8400C34000
trusted library allocation
page read and write
3D840113C000
trusted library allocation
page read and write
AE0000
unkown
page readonly
195F000
stack
page read and write
3D84002FB000
trusted library allocation
page read and write
3D8400C98000
trusted library allocation
page read and write
70E1000
heap
page read and write
44F800220000
direct allocation
page read and write
3D8400F64000
trusted library allocation
page read and write
70E1000
heap
page read and write
17A4002B0000
trusted library allocation
page read and write
3AD15FE000
stack
page read and write
70E1000
heap
page read and write
3D8400338000
trusted library allocation
page read and write
AEE000
unkown
page write copy
70E1000
heap
page read and write
3D840027C000
trusted library allocation
page read and write
3AF15FB000
stack
page read and write
3D840032C000
trusted library allocation
page read and write
3AD0DFE000
unkown
page readonly
70E1000
heap
page read and write
70E1000
heap
page read and write
8253000
heap
page read and write
70E1000
heap
page read and write
819A000
heap
page read and write
17A4007BC000
trusted library allocation
page read and write
70E1000
heap
page read and write
192C000
heap
page read and write
17A4007D4000
trusted library allocation
page read and write
17A4006BC000
trusted library allocation
page read and write
AE0000
unkown
page readonly
FC0000
heap
page read and write
12EA000
unkown
page write copy
3D8400C34000
trusted library allocation
page read and write
8014000
heap
page read and write
70E1000
heap
page read and write
3ADB5FE000
stack
page read and write
3D840051B000
trusted library allocation
page read and write
17A400920000
trusted library allocation
page read and write
7961000
heap
page read and write
78F1000
heap
page read and write
20F12FD3000
heap
page read and write
24D400270000
trusted library allocation
page read and write
20F14D1E000
trusted library section
page read and write
17A400778000
trusted library allocation
page read and write
AEA000
unkown
page readonly
70E1000
heap
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
20F0E8A0000
trusted library section
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
3AEE5FE000
stack
page read and write
17A400848000
trusted library allocation
page read and write
3D8400BC0000
trusted library allocation
page read and write
3D8400768000
trusted library allocation
page read and write
3AC35FE000
stack
page read and write
7AEA000
heap
page read and write
70E1000
heap
page read and write
20F0E935000
heap
page read and write
3D840101C000
trusted library allocation
page read and write
8065000
heap
page read and write
17A400864000
trusted library allocation
page read and write
3AD55FE000
stack
page read and write
AF1000
unkown
page readonly
AC0000
heap
page read and write
24D4002A0000
trusted library allocation
page read and write
3D84006FD000
trusted library allocation
page read and write
77D0000
direct allocation
page execute and read and write
AB0000
heap
page read and write
17A40087C000
trusted library allocation
page read and write
190E000
heap
page read and write
3D84003EC000
trusted library allocation
page read and write
7F4A000
heap
page read and write
70E1000
heap
page read and write
AE0000
unkown
page readonly
790000
heap
page read and write
12E0000
heap
page read and write
160A000
heap
page read and write
3D840084C000
trusted library allocation
page read and write
24D4002B0000
trusted library allocation
page read and write
70E1000
heap
page read and write
17A4006F0000
trusted library allocation
page read and write
70E1000
heap
page read and write
3C70000
direct allocation
page read and write
3D8400F64000
trusted library allocation
page read and write
1AD0000
heap
page read and write
3D8400B18000
trusted library allocation
page read and write
3D84001E0000
trusted library allocation
page read and write
80CB000
heap
page read and write
70E1000
heap
page read and write
3D8400F3C000
trusted library allocation
page read and write
3D8400CCC000
trusted library allocation
page read and write
3AD05FE000
stack
page read and write
AF1000
unkown
page readonly
AEE000
unkown
page read and write
3D84002A8000
trusted library allocation
page read and write
3AE45FD000
stack
page read and write
20F0E3E3000
heap
page read and write
3ADE5FC000
stack
page read and write
3ADD5FC000
stack
page read and write
70E1000
heap
page read and write
7F42000
heap
page read and write
20F0AFB0000
heap
page read and write
1906000
heap
page read and write
3D8400A54000
trusted library allocation
page read and write
3D84001E8000
trusted library allocation
page read and write
77D0000
direct allocation
page execute and read and write
3D84012C4000
trusted library allocation
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
11FC000
stack
page read and write
3D8401001000
trusted library allocation
page read and write
3D84012A8000
trusted library allocation
page read and write
3AE55FD000
stack
page read and write
1915000
heap
page read and write
20F0CBF0000
trusted library section
page readonly
44F80020C000
direct allocation
page read and write
7C86000
direct allocation
page read and write
17A4008C4000
trusted library allocation
page read and write
17A40085C000
trusted library allocation
page read and write
3D84008D0000
trusted library allocation
page read and write
3D840017C000
trusted library allocation
page read and write
70E1000
heap
page read and write
801F000
heap
page read and write
3D840085C000
trusted library allocation
page read and write
3ACF5FE000
stack
page read and write
3D84008DC000
trusted library allocation
page read and write
7F43000
heap
page read and write
AF1000
unkown
page readonly
3D8400CBC000
trusted library allocation
page read and write
7F40000
heap
page read and write
3D840034C000
trusted library allocation
page read and write
1600000
heap
page read and write
70E1000
heap
page read and write
20F0E3D9000
heap
page read and write
70E1000
heap
page read and write
AF1000
unkown
page readonly
17A4007AC000
trusted library allocation
page read and write
AE0000
unkown
page readonly
3D84001B4000
trusted library allocation
page read and write
3D84006A8000
trusted library allocation
page read and write
20F0E97B000
heap
page read and write
3AE05FB000
stack
page read and write
70E1000
heap
page read and write
81DC000
heap
page read and write
20F0AE60000
heap
page read and write
3D840060C000
trusted library allocation
page read and write
20F144CE000
trusted library section
page read and write
AEE000
unkown
page write copy
3AD6DFE000
unkown
page readonly
3D84001D8000
trusted library allocation
page read and write
3D8400CE0000
trusted library allocation
page read and write
24D4002B0000
trusted library allocation
page read and write
3D8400014000
trusted library allocation
page read and write
3AE95FD000
stack
page read and write
AE1000
unkown
page execute read
F5C000
stack
page read and write
20F0E3E6000
heap
page read and write
6C7EC000
unkown
page readonly
3AD7DFE000
unkown
page readonly
3D8400B20000
trusted library allocation
page read and write
3D8400E48000
trusted library allocation
page read and write
3D8400C34000
trusted library allocation
page read and write
3D8400300000
trusted library allocation
page read and write
70E1000
heap
page read and write
3D840093C000
trusted library allocation
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
18F9000
heap
page read and write
20F0EC60000
trusted library section
page read and write
70E1000
heap
page read and write
3D8400BE4000
trusted library allocation
page read and write
70E1000
heap
page read and write
3D84001AC000
trusted library allocation
page read and write
3D840060C000
trusted library allocation
page read and write
3D84007A3000
trusted library allocation
page read and write
3ACEDFE000
unkown
page readonly
18F8000
heap
page read and write
3D8400A84000
trusted library allocation
page read and write
6C79F000
unkown
page readonly
20F0AEA8000
heap
page read and write
1408000
heap
page read and write
AE1000
unkown
page execute read
20F142C5000
heap
page read and write
7F45000
heap
page read and write
3D8400794000
trusted library allocation
page read and write
808D000
heap
page read and write
17A400288000
trusted library allocation
page read and write
A90000
heap
page read and write
20F0E3D9000
heap
page read and write
3D8400488000
trusted library allocation
page read and write
103E000
stack
page read and write
19E0000
direct allocation
page read and write
3AE15FB000
stack
page read and write
3D8400AD0000
trusted library allocation
page read and write
12DE000
stack
page read and write
3D8400F64000
trusted library allocation
page read and write
70E1000
heap
page read and write
3D8400D68000
trusted library allocation
page read and write
70E1000
heap
page read and write
1929000
heap
page read and write
8CF000
stack
page read and write
3D8400394000
trusted library allocation
page read and write
3AEB5FB000
stack
page read and write
70E1000
heap
page read and write
24D4002BC000
trusted library allocation
page read and write
7F41000
heap
page read and write
70E1000
heap
page read and write
17A4008B8000
trusted library allocation
page read and write
17A400880000
trusted library allocation
page read and write
70E1000
heap
page read and write
3D8400E9C000
trusted library allocation
page read and write
3D8400EF0000
trusted library allocation
page read and write
3D840021C000
trusted library allocation
page read and write
24D4002C0000
trusted library allocation
page read and write
1400000
heap
page read and write
70E1000
heap
page read and write
77D0000
direct allocation
page execute and read and write
44F80024C000
direct allocation
page read and write
3D8400CAC000
trusted library allocation
page read and write
78E000
stack
page read and write
70E1000
heap
page read and write
7F40000
heap
page read and write
3D8400727000
trusted library allocation
page read and write
3D8400F20000
trusted library allocation
page read and write
3D8400224000
trusted library allocation
page read and write
19E0000
direct allocation
page read and write
70E1000
heap
page read and write
3D8400CF8000
trusted library allocation
page read and write
7F41000
heap
page read and write
20F0E9D6000
heap
page read and write
70E1000
heap
page read and write
17A4007C4000
trusted library allocation
page read and write
17A400860000
trusted library allocation
page read and write
6C7E9000
unkown
page read and write
3F0000
heap
page read and write
24D4002A0000
trusted library allocation
page read and write
3D84009EC000
trusted library allocation
page read and write
17A4006C8000
trusted library allocation
page read and write
3D8400300000
trusted library allocation
page read and write
7F49000
heap
page read and write
70E1000
heap
page read and write
80D4000
heap
page read and write
70E1000
heap
page read and write
20F14503000
trusted library section
page read and write
77D0000
direct allocation
page execute and read and write
17A4008D8000
trusted library allocation
page read and write
3D8400D90000
trusted library allocation
page read and write
3D8400058000
trusted library allocation
page read and write
77D0000
direct allocation
page execute and read and write
70E1000
heap
page read and write
3D8400664000
trusted library allocation
page read and write
70E1000
heap
page read and write
AA0000
heap
page read and write
AEA000
unkown
page readonly
70E1000
heap
page read and write
3D8400380000
trusted library allocation
page read and write
7F48000
heap
page read and write
32D000
stack
page read and write
70E1000
heap
page read and write
AE1000
unkown
page execute read
3D84003A4000
trusted library allocation
page read and write
70E1000
heap
page read and write
18E1000
heap
page read and write
14CE000
stack
page read and write
70E1000
heap
page read and write
20F14EE0000
trusted library section
page read and write
3AF0DFE000
unkown
page readonly
44F8002AC000
direct allocation
page read and write
AF1000
unkown
page readonly
3D8400E90000
trusted library allocation
page read and write
20F0E998000
heap
page read and write
AEE000
unkown
page read and write
44F800201000
direct allocation
page read and write
17A400818000
trusted library allocation
page read and write
3D8400BD8000
trusted library allocation
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
3AD45FE000
stack
page read and write
17A4008B4000
trusted library allocation
page read and write
77D0000
direct allocation
page execute and read and write
70E1000
heap
page read and write
3D840034C000
trusted library allocation
page read and write
17A4006AC000
trusted library allocation
page read and write
20F14D50000
trusted library section
page read and write
3D8400300000
trusted library allocation
page read and write
AE1000
unkown
page execute read
3D8400A3C000
trusted library allocation
page read and write
70E1000
heap
page read and write
3D8400EC4000
trusted library allocation
page read and write
77D0000
direct allocation
page execute and read and write
17A400250000
trusted library allocation
page read and write
3AE2DFE000
unkown
page readonly
70E1000
heap
page read and write
3D84004BC000
trusted library allocation
page read and write
3D8400298000
trusted library allocation
page read and write
3AEADFE000
unkown
page readonly
24D4002BC000
trusted library allocation
page read and write
3AC4DFE000
unkown
page readonly
19E0000
direct allocation
page read and write
7520000
trusted library allocation
page read and write
3D84009B4000
trusted library allocation
page read and write
3D8400128000
trusted library allocation
page read and write
70E1000
heap
page read and write
7F4F000
heap
page read and write
70E1000
heap
page read and write
77D0000
direct allocation
page execute and read and write
17A40080C000
trusted library allocation
page read and write
17A40091C000
trusted library allocation
page read and write
3AC75FD000
stack
page read and write
3D84009B9000
trusted library allocation
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
AF1000
unkown
page readonly
3D8400324000
trusted library allocation
page read and write
3D8400368000
trusted library allocation
page read and write
3D8400340000
trusted library allocation
page read and write
20F0AFB5000
heap
page read and write
7F4E000
heap
page read and write
3D84006E4000
trusted library allocation
page read and write
811F000
heap
page read and write
20F14D12000
trusted library section
page read and write
3D8400300000
trusted library allocation
page read and write
141F000
stack
page read and write
18EF000
heap
page read and write
70E1000
heap
page read and write
160E000
heap
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
3D8400080000
trusted library allocation
page read and write
20F0E3F1000
heap
page read and write
3ADEDFE000
unkown
page readonly
20F14D83000
trusted library section
page read and write
7F44000
heap
page read and write
3ACCDFE000
unkown
page readonly
17A4002CC000
trusted library allocation
page read and write
3ACFDFE000
unkown
page readonly
20F0AF39000
heap
page read and write
17A400890000
trusted library allocation
page read and write
3ACE5FA000
stack
page read and write
6C6C0000
unkown
page readonly
70E1000
heap
page read and write
DEE000
stack
page read and write
17A40078C000
trusted library allocation
page read and write
3AC95FA000
stack
page read and write
6C6C1000
unkown
page execute read
3D8400230000
trusted library allocation
page read and write
20F148A0000
trusted library section
page read and write
80F7000
heap
page read and write
17A4006AC000
trusted library allocation
page read and write
3D8400C18000
trusted library allocation
page read and write
20F142A0000
heap
page read and write
7FF3000
heap
page read and write
AEA000
unkown
page readonly
70E1000
heap
page read and write
3AE85FD000
stack
page read and write
3D84004B0000
trusted library allocation
page read and write
3D840030C000
trusted library allocation
page read and write
10A0000
heap
page read and write
17A400918000
trusted library allocation
page read and write
7F43000
heap
page read and write
3D8400ED4000
trusted library allocation
page read and write
3AF05FE000
stack
page read and write
3D8400B94000
trusted library allocation
page read and write
20F14646000
trusted library section
page read and write
70E1000
heap
page read and write
3D8400E70000
trusted library allocation
page read and write
70E1000
heap
page read and write
3D8400F38000
trusted library allocation
page read and write
70E1000
heap
page read and write
19E0000
direct allocation
page read and write
70E1000
heap
page read and write
7FFB000
heap
page read and write
77D0000
direct allocation
page execute and read and write
3D84003EC000
trusted library allocation
page read and write
16FF000
stack
page read and write
7F4E000
heap
page read and write
24D4002BC000
trusted library allocation
page read and write
3D8400601000
trusted library allocation
page read and write
3D8400F00000
trusted library allocation
page read and write
AEA000
unkown
page readonly
44F8002E4000
direct allocation
page read and write
20F14CB7000
unclassified section
page read and write
AEA000
unkown
page readonly
3D8400D64000
trusted library allocation
page read and write
20F14E42000
trusted library section
page read and write
3D8400F3C000
trusted library allocation
page read and write
3D8400C0C000
trusted library allocation
page read and write
24D400235000
trusted library allocation
page read and write
3D8400C98000
trusted library allocation
page read and write
3D84001B4000
trusted library allocation
page read and write
3D8400E9C000
trusted library allocation
page read and write
24D400260000
trusted library allocation
page read and write
17A400424000
trusted library allocation
page read and write
70E1000
heap
page read and write
3D840100C000
trusted library allocation
page read and write
20F1458D000
trusted library section
page read and write
13FC000
stack
page read and write
3AEC5FD000
stack
page read and write
1120000
heap
page read and write
3AE5DFE000
unkown
page readonly
3D8400958000
trusted library allocation
page read and write
3D8400228000
trusted library allocation
page read and write
3D84001DC000
trusted library allocation
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
3AE35FD000
stack
page read and write
44F800280000
direct allocation
page read and write
20F0E3E3000
heap
page read and write
77A0000
direct allocation
page execute and read and write
70E1000
heap
page read and write
24D400278000
trusted library allocation
page read and write
70E1000
heap
page read and write
AEE000
unkown
page read and write
24D400264000
trusted library allocation
page read and write
70E1000
heap
page read and write
20F14582000
trusted library section
page read and write
70E1000
heap
page read and write
24D4002C0000
trusted library allocation
page read and write
17A4008E8000
trusted library allocation
page read and write
3ACDDFE000
unkown
page readonly
3D8400D9C000
trusted library allocation
page read and write
3AD2DFE000
unkown
page readonly
3D8400778000
trusted library allocation
page read and write
3D8400524000
trusted library allocation
page read and write
3D8401138000
trusted library allocation
page read and write
3D8400F14000
trusted library allocation
page read and write
3D8400098000
trusted library allocation
page read and write
AEE000
unkown
page write copy
3D84001C4000
trusted library allocation
page read and write
17A4002D4000
trusted library allocation
page read and write
70E1000
heap
page read and write
3ADC5FC000
stack
page read and write
3D8400519000
trusted library allocation
page read and write
3AE75FE000
stack
page read and write
70E1000
heap
page read and write
24D4002F4000
trusted library allocation
page read and write
3AC65FE000
stack
page read and write
24D4002C0000
trusted library allocation
page read and write
1906000
heap
page read and write
17A4002FC000
trusted library allocation
page read and write
3D8400C44000
trusted library allocation
page read and write
3D840060C000
trusted library allocation
page read and write
17A40027C000
trusted library allocation
page read and write
17A4008EC000
trusted library allocation
page read and write
70E1000
heap
page read and write
19E0000
direct allocation
page read and write
AE1000
unkown
page execute read
CFC000
stack
page read and write
3D8400338000
trusted library allocation
page read and write
20F0AEA0000
heap
page read and write
7D41000
heap
page read and write
3D8400DA8000
trusted library allocation
page read and write
3D8400E80000
trusted library allocation
page read and write
77D0000
direct allocation
page execute and read and write
77D0000
direct allocation
page execute and read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
3D84003EC000
trusted library allocation
page read and write
3D84000FC000
trusted library allocation
page read and write
44F800210000
direct allocation
page read and write
20F12EB7000
unclassified section
page read and write
3D8400CE8000
trusted library allocation
page read and write
70E1000
heap
page read and write
7963000
heap
page read and write
3AC9DFE000
unkown
page readonly
77D0000
direct allocation
page execute and read and write
3D8400C28000
trusted library allocation
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
3D8400468000
trusted library allocation
page read and write
3D84003A4000
trusted library allocation
page read and write
AF1000
unkown
page readonly
AEA000
unkown
page readonly
3D8400F78000
trusted library allocation
page read and write
167B000
unkown
page execute and write copy
3D8400358000
trusted library allocation
page read and write
3AE8DFE000
unkown
page readonly
7FD5000
heap
page read and write
3AD65FD000
stack
page read and write
14B0000
heap
page read and write
3D8400C34000
trusted library allocation
page read and write
17A4006D4000
trusted library allocation
page read and write
17A40081C000
trusted library allocation
page read and write
17A400790000
trusted library allocation
page read and write
8005000
heap
page read and write
1902000
heap
page read and write
44F800217000
direct allocation
page read and write
17A400801000
trusted library allocation
page read and write
3AC45FE000
stack
page read and write
7F47000
heap
page read and write
70E1000
heap
page read and write
20F0E3F1000
heap
page read and write
3E0000
heap
page read and write
20F0E99D000
heap
page read and write
3D8400708000
trusted library allocation
page read and write
20F0E3B0000
heap
page read and write
3AC6DFE000
unkown
page readonly
3D8400C74000
trusted library allocation
page read and write
3D840022C000
trusted library allocation
page read and write
3D8401110000
trusted library allocation
page read and write
7F45000
heap
page read and write
3AD25FD000
stack
page read and write
20F12FD0000
heap
page read and write
70E1000
heap
page read and write
AAE000
stack
page read and write
17A40071C000
trusted library allocation
page read and write
19E0000
direct allocation
page read and write
77B0000
direct allocation
page execute and read and write
70E1000
heap
page read and write
3D8400C84000
trusted library allocation
page read and write
70E1000
heap
page read and write
3D8400E90000
trusted library allocation
page read and write
3D8400C5C000
trusted library allocation
page read and write
810C000
heap
page read and write
17A400894000
trusted library allocation
page read and write
70E1000
heap
page read and write
FD0000
heap
page read and write
20F0E985000
heap
page read and write
3ACD5FD000
stack
page read and write
3D840034C000
trusted library allocation
page read and write
70E1000
heap
page read and write
20F14CF1000
trusted library section
page read and write
20F14EEE000
trusted library section
page read and write
3D8400C01000
trusted library allocation
page read and write
70E1000
heap
page read and write
18F2000
heap
page read and write
1912000
heap
page read and write
20F142D9000
heap
page read and write
804C000
heap
page read and write
3D8400584000
trusted library allocation
page read and write
A40000
heap
page read and write
24D400288000
trusted library allocation
page read and write
17A400884000
trusted library allocation
page read and write
3D84001AC000
trusted library allocation
page read and write
3D84009F4000
trusted library allocation
page read and write
7AE0000
heap
page read and write
3D840030C000
trusted library allocation
page read and write
3D840108C000
trusted library allocation
page read and write
77D0000
direct allocation
page execute and read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
3D8401060000
trusted library allocation
page read and write
3D8400B44000
trusted library allocation
page read and write
3D84001A0000
trusted library allocation
page read and write
AEA000
unkown
page readonly
17A400868000
trusted library allocation
page read and write
3D8400092000
trusted library allocation
page read and write
20F0E9B0000
heap
page read and write
70E1000
heap
page read and write
20F145C0000
trusted library section
page read and write
70E1000
heap
page read and write
3AE25FE000
stack
page read and write
70E1000
heap
page read and write
17A4007E0000
trusted library allocation
page read and write
3AC7DFE000
unkown
page readonly
17A400904000
trusted library allocation
page read and write
20F0CC30000
heap
page read and write
3D84012B4000
trusted library allocation
page read and write
17A400974000
trusted library allocation
page read and write
BC1000
unkown
page execute and write copy
70E1000
heap
page read and write
3D8400194000
trusted library allocation
page read and write
79A000
heap
page read and write
FB0000
heap
page read and write
70E1000
heap
page read and write
20F142A2000
heap
page read and write
7CC000
stack
page read and write
8113000
heap
page read and write
81FA000
heap
page read and write
3AEF5FE000
stack
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
3D8400EF0000
trusted library allocation
page read and write
24D4002BC000
trusted library allocation
page read and write
70E1000
heap
page read and write
19E0000
direct allocation
page read and write
70E1000
heap
page read and write
7F4B000
heap
page read and write
20F0EBD0000
trusted library section
page read and write
17A4008F4000
trusted library allocation
page read and write
20F0E9D2000
heap
page read and write
7961000
heap
page read and write
44F800260000
direct allocation
page read and write
3D8400A94000
trusted library allocation
page read and write
1902000
heap
page read and write
808B000
heap
page read and write
17A4007C0000
trusted library allocation
page read and write
70E1000
heap
page read and write
44F80023C000
direct allocation
page read and write
70E1000
heap
page read and write
3D8400864000
trusted library allocation
page read and write
1915000
heap
page read and write
3D84001D4000
trusted library allocation
page read and write
3D84002BC000
trusted library allocation
page read and write
70E1000
heap
page read and write
7F41000
heap
page read and write
3D8400DEC000
trusted library allocation
page read and write
3D84010D0000
trusted library allocation
page read and write
20F14D71000
trusted library section
page read and write
7AC000
heap
page read and write
20F0D680000
unkown
page read and write
3D84012C0000
trusted library allocation
page read and write
3D8400A0C000
trusted library allocation
page read and write
3D8400CEC000
trusted library allocation
page read and write
7F44000
heap
page read and write
7F47000
heap
page read and write
3D8400E90000
trusted library allocation
page read and write
70E1000
heap
page read and write
3AE0DFE000
unkown
page readonly
80F5000
heap
page read and write
3D8400830000
trusted library allocation
page read and write
3D840129C000
trusted library allocation
page read and write
1915000
heap
page read and write
7F4D000
heap
page read and write
20F0E91E000
heap
page read and write
70E1000
heap
page read and write
3D8400E90000
trusted library allocation
page read and write
3D8400C47000
trusted library allocation
page read and write
3D84000DC000
trusted library allocation
page read and write
3D8400B34000
trusted library allocation
page read and write
24D400294000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
20F0E3DE000
heap
page read and write
70E1000
heap
page read and write
18F0000
heap
page read and write
70E1000
heap
page read and write
3D8400FD4000
trusted library allocation
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
17A400601000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
3D8400D58000
trusted library allocation
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
12CF000
stack
page read and write
70E1000
heap
page read and write
3AED5FC000
stack
page read and write
70E1000
heap
page read and write
7F40000
heap
page read and write
3D8400634000
trusted library allocation
page read and write
80D3000
heap
page read and write
3D8400C34000
trusted library allocation
page read and write
20F0AF3D000
heap
page read and write
19E0000
direct allocation
page read and write
3D840020C000
trusted library allocation
page read and write
3D8400134000
trusted library allocation
page read and write
8046000
heap
page read and write
24D4002BC000
trusted library allocation
page read and write
3D8400D2C000
trusted library allocation
page read and write
80AE000
heap
page read and write
3AE1DFE000
unkown
page readonly
A8E000
stack
page read and write
3D8400644000
trusted library allocation
page read and write
7F49000
heap
page read and write
70E1000
heap
page read and write
3D840088C000
trusted library allocation
page read and write
7961000
heap
page read and write
3D8400BB4000
trusted library allocation
page read and write
7520000
trusted library allocation
page read and write
3D8401148000
trusted library allocation
page read and write
3D8400991000
trusted library allocation
page read and write
3D8400E90000
trusted library allocation
page read and write
1290000
heap
page read and write
3D84002F3000
trusted library allocation
page read and write
24D4002C0000
trusted library allocation
page read and write
3D8400574000
trusted library allocation
page read and write
3D84001AC000
trusted library allocation
page read and write
70E1000
heap
page read and write
3D8400C7C000
trusted library allocation
page read and write
3D8400874000
trusted library allocation
page read and write
3D8400908000
trusted library allocation
page read and write
3AD5DFE000
unkown
page readonly
70E1000
heap
page read and write
20F0E9CF000
heap
page read and write
3D84003EC000
trusted library allocation
page read and write
3D84004F4000
trusted library allocation
page read and write
7F41000
heap
page read and write
17A400230000
trusted library allocation
page read and write
3D8401050000
trusted library allocation
page read and write
17A4006AC000
trusted library allocation
page read and write
8066000
heap
page read and write
3D84003EC000
trusted library allocation
page read and write
70E1000
heap
page read and write
3D8400DCC000
trusted library allocation
page read and write
3D84001C8000
trusted library allocation
page read and write
17A40070C000
trusted library allocation
page read and write
3D8400220000
trusted library allocation
page read and write
17A40039C000
trusted library allocation
page read and write
24D400220000
trusted library allocation
page read and write
812D000
heap
page read and write
3AE7DFE000
unkown
page readonly
17A400201000
trusted library allocation
page read and write
20F0E3E4000
heap
page read and write
3D8400973000
trusted library allocation
page read and write
70E1000
heap
page read and write
17A400844000
trusted library allocation
page read and write
82BB000
heap
page read and write
3D840074C000
trusted library allocation
page read and write
24D4002C0000
trusted library allocation
page read and write
70E1000
heap
page read and write
3AE4DFE000
unkown
page readonly
82DA000
heap
page read and write
3D840102C000
trusted library allocation
page read and write
70E1000
heap
page read and write
3D84006F0000
trusted library allocation
page read and write
3D8400D84000
trusted library allocation
page read and write
3D8400D84000
trusted library allocation
page read and write
3D8400044000
trusted library allocation
page read and write
70E1000
heap
page read and write
77D0000
direct allocation
page execute and read and write
3D840008E000
trusted library allocation
page read and write
3D8400F94000
trusted library allocation
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
7F43000
heap
page read and write
3D8400B74000
trusted library allocation
page read and write
20F0AFA0000
trusted library allocation
page read and write
77D0000
direct allocation
page execute and read and write
3D8400D80000
trusted library allocation
page read and write
3D840091C000
trusted library allocation
page read and write
70E1000
heap
page read and write
17A400858000
trusted library allocation
page read and write
3D8400BE4000
trusted library allocation
page read and write
1A20000
heap
page read and write
17A40040C000
trusted library allocation
page read and write
70E1000
heap
page read and write
AF1000
unkown
page readonly
8701000
heap
page read and write
3D8400AA0000
trusted library allocation
page read and write
24D4002E4000
trusted library allocation
page read and write
3D8400A01000
trusted library allocation
page read and write
17A400248000
trusted library allocation
page read and write
80FA000
heap
page read and write
77C0000
direct allocation
page execute and read and write
3D8400E9C000
trusted library allocation
page read and write
3D840014C000
trusted library allocation
page read and write
817C000
heap
page read and write
3D8400290000
trusted library allocation
page read and write
3D8401070000
trusted library allocation
page read and write
17A400964000
trusted library allocation
page read and write
3ADBDFE000
unkown
page readonly
77D0000
direct allocation
page execute and read and write
17A4008F0000
trusted library allocation
page read and write
17A4002E4000
trusted library allocation
page read and write
17A400878000
trusted library allocation
page read and write
3D8400628000
trusted library allocation
page read and write
3AD8DFE000
unkown
page readonly
12F0000
heap
page read and write
70E1000
heap
page read and write
20F14E26000
trusted library section
page read and write
3ACADFE000
unkown
page readonly
20F14CE0000
trusted library section
page read and write
7FF1000
heap
page read and write
70E1000
heap
page read and write
20F0E3EB000
heap
page read and write
3ADDDFE000
unkown
page readonly
70E1000
heap
page read and write
AE1000
unkown
page execute read
70E1000
heap
page read and write
3D8400FEC000
trusted library allocation
page read and write
70E1000
heap
page read and write
20F14AA0000
trusted library section
page read and write
AEA000
unkown
page readonly
3D8400B90000
trusted library allocation
page read and write
3D8400D4C000
trusted library allocation
page read and write
24D400248000
trusted library allocation
page read and write
AE0000
unkown
page readonly
7FDC000
heap
page read and write
20F14E80000
trusted library section
page read and write
20F14AAC000
trusted library section
page read and write
AE0000
unkown
page readonly
3D8400001000
trusted library allocation
page read and write
3AC2DFE000
unkown
page readonly
70E1000
heap
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
AF1000
unkown
page readonly
17A4008E4000
trusted library allocation
page read and write
3D8400201000
trusted library allocation
page read and write
3D84006D0000
trusted library allocation
page read and write
AE0000
unkown
page readonly
3D84008A0000
trusted library allocation
page read and write
70E1000
heap
page read and write
FD8000
heap
page read and write
20F14EC7000
unclassified section
page read and write
3D84010C8000
trusted library allocation
page read and write
70E1000
heap
page read and write
20F0E620000
heap
page read and write
20F0AD70000
heap
page read and write
70E1000
heap
page read and write
3D8400D14000
trusted library allocation
page read and write
3AD85FD000
stack
page read and write
24D400274000
trusted library allocation
page read and write
20F142CD000
heap
page read and write
7F4D000
heap
page read and write
3D840060C000
trusted library allocation
page read and write
AE0000
unkown
page readonly
3D84008E8000
trusted library allocation
page read and write
17A400830000
trusted library allocation
page read and write
8202000
heap
page read and write
3D8400F94000
trusted library allocation
page read and write
17A400840000
trusted library allocation
page read and write
3D8400EE4000
trusted library allocation
page read and write
3D8400B94000
trusted library allocation
page read and write
3D84002B4000
trusted library allocation
page read and write
77D0000
direct allocation
page execute and read and write
24D4002D8000
trusted library allocation
page read and write
3D84005A8000
trusted library allocation
page read and write
3D8400B90000
trusted library allocation
page read and write
3D8400598000
trusted library allocation
page read and write
3D84001F8000
trusted library allocation
page read and write
3D8401040000
trusted library allocation
page read and write
3AC55FE000
stack
page read and write
70E1000
heap
page read and write
3AF1DFE000
unkown
page readonly
24D4002C8000
trusted library allocation
page read and write
20F142D7000
heap
page read and write
7560000
direct allocation
page read and write
3D84006C0000
trusted library allocation
page read and write
8085000
heap
page read and write
3D8400EC8000
trusted library allocation
page read and write
17A400220000
trusted library allocation
page read and write
17A4006E0000
trusted library allocation
page read and write
3D8400801000
trusted library allocation
page read and write
70E1000
heap
page read and write
3AC8DFE000
unkown
page readonly
3D8400C34000
trusted library allocation
page read and write
70E1000
heap
page read and write
17A400828000
trusted library allocation
page read and write
17A400210000
trusted library allocation
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
70E1000
heap
page read and write
3AC25FE000
unkown
page read and write
70E1000
heap
page read and write
3D84002E0000
trusted library allocation
page read and write
70E1000
heap
page read and write
3D840015C000
trusted library allocation
page read and write
3AECDFE000
unkown
page readonly
3D840097C000
trusted library allocation
page read and write
E70000
heap
page read and write
70E1000
heap
page read and write
80F4000
heap
page read and write
There are 1267 hidden memdumps, click here to show them.