IOC Report
WCeE1A6Xyz.exe

loading gif

Files

File Path
Type
Category
Malicious
WCeE1A6Xyz.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_WCeE1A6Xyz.exe_e7e2522a7f8ca0b6d72c4dc44c61e22d561de4_30049ca6_8097d568-4abf-4061-8bf9-edbe858e74ad\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAC42.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Dec 24 07:52:20 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERADE9.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAE57.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\0fe6fcd7-e6d8-4dd1-8b4c-0c03a1b60f4f.5454a7df-c3d0-4ab8-9367-1ac6ddca0f19.down_meta
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\0fe6fcd7-e6d8-4dd1-8b4c-0c03a1b60f4f.down_data
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop 24.4 (Windows), datetime=2023:05:13 18:14:04], baseline, precision 8, 1920x1080, components 3
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\221259af-84f1-4957-9af3-b81064ace3fc.3766cdc1-b4ae-44c6-8246-0658b3d99677.down_meta
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\221259af-84f1-4957-9af3-b81064ace3fc.up_meta_secure
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\22d9e0cd-5ff9-4437-b472-9be962740a2c.5eb27f51-5751-4fc2-90f7-cee72b37a825.down_meta
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\22d9e0cd-5ff9-4437-b472-9be962740a2c.down_data
JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop 24.4 (Windows), datetime=2023:05:13 18:14:38], baseline, precision 8, 1080x1920, components 3
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\3ab48a70-5fcc-43c2-8f69-9defa5f64553.9bef7ed1-7d6a-426e-b8c4-1c2653cf916a.down_meta
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\3ab48a70-5fcc-43c2-8f69-9defa5f64553.up_meta_secure
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\3de8abd4-bc4a-4a03-ba49-fdad2a9ef9ef.8708f345-944a-4b00-9fba-04138dd4f87a.down_meta
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\3de8abd4-bc4a-4a03-ba49-fdad2a9ef9ef.down_data
JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop 24.4 (Windows), datetime=2023:05:13 18:37:38], baseline, precision 8, 1080x1920, components 3
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\587ce4a3-e922-4b80-b8ee-345aca8a1540.5454a7df-c3d0-4ab8-9367-1ac6ddca0f19.down_meta
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\587ce4a3-e922-4b80-b8ee-345aca8a1540.up_meta_secure
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\5bb4cd59-5b52-49a4-a144-1aa6c8f5e72c.0de7df4b-4016-44cb-9873-58c0856c738f.down_meta
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\5bb4cd59-5b52-49a4-a144-1aa6c8f5e72c.up_meta_secure
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\5fd426b9-3ac2-4899-b1f5-65d5fb3af5bc.9bef7ed1-7d6a-426e-b8c4-1c2653cf916a.down_meta
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\5fd426b9-3ac2-4899-b1f5-65d5fb3af5bc.down_data
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop 24.4 (Windows), datetime=2023:05:13 18:37:11], baseline, precision 8, 1920x1080, components 3
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\7bf64714-7ac4-4e15-89e7-68caaa54304c.5eb27f51-5751-4fc2-90f7-cee72b37a825.down_meta
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\7bf64714-7ac4-4e15-89e7-68caaa54304c.up_meta_secure
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\8653c9ab-0984-4097-880c-914f0a067609.8708f345-944a-4b00-9fba-04138dd4f87a.down_meta
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\8653c9ab-0984-4097-880c-914f0a067609.up_meta_secure
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\9e4a9663-2f29-45c5-ab5f-ea42b51866f2.0de7df4b-4016-44cb-9873-58c0856c738f.down_meta
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\9e4a9663-2f29-45c5-ab5f-ea42b51866f2.down_data
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop 21.1 (Windows), datetime=2020:10:22 10:31:41], baseline, precision 8, 1080x1920, components 3
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\d9e0ec57-3074-4b2a-8ba4-90a088f69964.3766cdc1-b4ae-44c6-8246-0658b3d99677.down_meta
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\d9e0ec57-3074-4b2a-8ba4-90a088f69964.down_data
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, Exif Standard: [TIFF image data, big-endian, direntries=7, orientation=upper-left, xresolution=98, yresolution=106, resolutionunit=2, software=Adobe Photoshop 21.1 (Windows), datetime=2020:10:22 10:30:26], baseline, precision 8, 1920x1080, components 3
dropped
C:\Users\user\AppData\Local\Temp\CaHNbeclRGcBxNSvHjFX.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 22 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\WCeE1A6Xyz.exe
"C:\Users\user\Desktop\WCeE1A6Xyz.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2448 --field-trial-handle=2176,i,4166092667460423,2441331436335028329,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\BackgroundTransferHost.exe
"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6536 -s 1172
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
http://anglebug.com/3832;
unknown
https://anglebug.com/4966t
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239359955652_1UH15L5Z2LXM3P8PA&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
150.171.27.10
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actionsRun
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://anglebug.com/7488;
unknown
http://unisolated.invalid/
unknown
https://anglebug.com/7161gU3
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
http://anglebug.com/8229;
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
http://anglebug.com/4551;
unknown
http://anglebug.com/6439;
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
http://anglebug.com/7406d
unknown
https://anglebug.com/7369
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239359955652_1UH15L5Z2LXM3P8PA&pid=21.2&c=16&roil=0&roit=0&ro
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239400982061_1EHZVYH9FVJ5IHVOG&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
150.171.27.10
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
http://anglebug.com/5421hwJ
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/8229e2
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://httpbin.org/ipbefore
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/5055;
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239356671168_16FGHU1WN2XYJHSC0&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90
150.171.27.10
http://html4/loose.dtd
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://issuetracker.google.com/issues/166475273e
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
http://anglebug.com/5881;
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/7047f
unknown
http://anglebug.com/4384
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0=
unknown
http://anglebug.com/3970
unknown
https://calendar.google.com/calendar/u/0/r/eventedit?usp=chrome_actionshttps://docs.google.com/prese
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
https://tse1.mm.bing.net/th?id=OADD2.10239356671167_19HPP7IIREEX4KA57&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90
150.171.27.10
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fivetk5sb.top
185.121.15.192
www.google.com
142.250.181.68
fivetk5sb.top
185.121.15.192
ax-0001.ax-msedge.net
150.171.27.10
httpbin.org
98.85.100.80
tse1.mm.bing.net
unknown

IPs

IP
Domain
Country
Malicious
185.121.15.192
home.fivetk5sb.top
Spain
98.85.100.80
httpbin.org
United States
239.255.255.250
unknown
Reserved
142.250.181.68
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
ProgramId
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
FileId
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
LowerCaseLongPath
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
LongPathHash
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
Name
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
OriginalFileName
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
Publisher
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
Version
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
BinFileVersion
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
BinaryType
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
ProductName
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
ProductVersion
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
LinkDate
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
BinProductVersion
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
AppxPackageFullName
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
AppxPackageRelativeId
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
Size
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
Language
\REGISTRY\A\{77491f82-c5f1-c9b3-a072-ab120fe01d98}\Root\InventoryApplicationFile\wcee1a6xyz.exe|ca41001f2bb4b030
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
10D402C5C000
trusted library allocation
page read and write
10D402401000
trusted library allocation
page read and write
10D402870000
trusted library allocation
page read and write
10D402E85000
trusted library allocation
page read and write
10D402B63000
trusted library allocation
page read and write
10D4023C4000
trusted library allocation
page read and write
632800274000
trusted library allocation
page read and write
10D402C20000
trusted library allocation
page read and write
6941000
heap
page read and write
7060000
direct allocation
page execute and read and write
10D4029D8000
trusted library allocation
page read and write
1DC17E85000
heap
page read and write
6D90000
trusted library allocation
page read and write
10D4032B8000
trusted library allocation
page read and write
10D4034EC000
trusted library allocation
page read and write
6941000
heap
page read and write
1DC17EB2000
heap
page read and write
75E1000
heap
page read and write
676B1FE000
unkown
page readonly
10D402418000
trusted library allocation
page read and write
78E1000
heap
page read and write
A81000
unkown
page readonly
7BD8000
heap
page read and write
10D402818000
trusted library allocation
page read and write
1240000
heap
page read and write
670B7FE000
unkown
page readonly
132800248000
trusted library allocation
page read and write
6941000
heap
page read and write
1328002F4000
trusted library allocation
page read and write
6941000
heap
page read and write
67709FE000
stack
page read and write
1DC1BCE0000
heap
page read and write
676F9FE000
stack
page read and write
7A18000
heap
page read and write
10D402E0C000
trusted library allocation
page read and write
1DC1DF10000
trusted library section
page read and write
675E1FE000
unkown
page readonly
1328003EC000
trusted library allocation
page read and write
6941000
heap
page read and write
140000
heap
page read and write
78E2000
heap
page read and write
1DC1BCD6000
heap
page read and write
6941000
heap
page read and write
175F000
stack
page read and write
6941000
heap
page read and write
4AD400294000
direct allocation
page read and write
6941000
heap
page read and write
3240000
heap
page read and write
67619FE000
stack
page read and write
6941000
heap
page read and write
10D402990000
trusted library allocation
page read and write
6941000
heap
page read and write
1DC17E20000
heap
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
1DC1DA02000
trusted library section
page read and write
A81000
unkown
page readonly
78E1000
heap
page read and write
1DC17E65000
heap
page read and write
675C9EF000
stack
page read and write
6941000
heap
page read and write
132800664000
trusted library allocation
page read and write
4AD400270000
direct allocation
page read and write
132800238000
trusted library allocation
page read and write
10D403048000
trusted library allocation
page read and write
6930000
direct allocation
page read and write
10D402801000
trusted library allocation
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
13E000
stack
page read and write
AD3000
unkown
page execute and write copy
67037FE000
unkown
page readonly
6703FFD000
stack
page read and write
632800220000
trusted library allocation
page read and write
10D403440000
trusted library allocation
page read and write
10D4031BC000
trusted library allocation
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
632800288000
trusted library allocation
page read and write
675E9FE000
stack
page read and write
4AD400284000
direct allocation
page read and write
132800330000
trusted library allocation
page read and write
6941000
heap
page read and write
10D400601000
trusted library allocation
page read and write
10D403388000
trusted library allocation
page read and write
6941000
heap
page read and write
6704FFE000
stack
page read and write
10D402CE0000
trusted library allocation
page read and write
6941000
heap
page read and write
4AD400280000
direct allocation
page read and write
4AD4002EC000
direct allocation
page read and write
A7E000
unkown
page write copy
7A8C000
heap
page read and write
10D40305C000
trusted library allocation
page read and write
A71000
unkown
page execute read
307A000
stack
page read and write
6941000
heap
page read and write
10D40340C000
trusted library allocation
page read and write
1328006D4000
trusted library allocation
page read and write
132800330000
trusted library allocation
page read and write
900000
heap
page read and write
6941000
heap
page read and write
10D4032A0000
trusted library allocation
page read and write
10D4024F0000
trusted library allocation
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
A71000
unkown
page execute read
6941000
heap
page read and write
6941000
heap
page read and write
10D403078000
trusted library allocation
page read and write
10D402A01000
trusted library allocation
page read and write
6328002BC000
trusted library allocation
page read and write
6941000
heap
page read and write
10D402E01000
trusted library allocation
page read and write
67621FE000
unkown
page readonly
7A60000
heap
page read and write
10D402AB0000
trusted library allocation
page read and write
78E5000
heap
page read and write
10D402A54000
trusted library allocation
page read and write
303D000
stack
page read and write
7A6B000
heap
page read and write
1860000
heap
page read and write
67711FE000
unkown
page readonly
6941000
heap
page read and write
10D403001000
trusted library allocation
page read and write
6C5C0000
unkown
page readonly
799D000
heap
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
10D4024F0000
trusted library allocation
page read and write
7060000
direct allocation
page execute and read and write
94E000
stack
page read and write
10D402F74000
trusted library allocation
page read and write
10D40300C000
trusted library allocation
page read and write
13280020C000
trusted library allocation
page read and write
10D402F1C000
trusted library allocation
page read and write
10D402434000
trusted library allocation
page read and write
6941000
heap
page read and write
6709FFC000
stack
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
132800694000
trusted library allocation
page read and write
67609FE000
stack
page read and write
10D403120000
trusted library allocation
page read and write
10D4024FC000
trusted library allocation
page read and write
6941000
heap
page read and write
7C4C000
heap
page read and write
1328006F0000
trusted library allocation
page read and write
6941000
heap
page read and write
1DC17E61000
heap
page read and write
1DC17E75000
heap
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
10D40305C000
trusted library allocation
page read and write
10D402F04000
trusted library allocation
page read and write
1DC17EC1000
heap
page read and write
10D402778000
trusted library allocation
page read and write
67659FE000
stack
page read and write
6D90000
trusted library allocation
page read and write
4AD400210000
direct allocation
page read and write
6941000
heap
page read and write
10D403234000
trusted library allocation
page read and write
10D402E24000
trusted library allocation
page read and write
10D402583000
trusted library allocation
page read and write
6941000
heap
page read and write
1DC1431D000
heap
page read and write
10D402498000
trusted library allocation
page read and write
A70000
unkown
page readonly
10D4028E0000
trusted library allocation
page read and write
13280035C000
trusted library allocation
page read and write
10D40237C000
trusted library allocation
page read and write
7A4C000
heap
page read and write
132800288000
trusted library allocation
page read and write
10D4029BC000
trusted library allocation
page read and write
78EF000
heap
page read and write
1DC14290000
heap
page read and write
1DC17E65000
heap
page read and write
67639FB000
stack
page read and write
4AD400220000
direct allocation
page read and write
10D402E74000
trusted library allocation
page read and write
10D40305C000
trusted library allocation
page read and write
10D402530000
trusted library allocation
page read and write
8AC000
stack
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
329E000
stack
page read and write
10D40253C000
trusted library allocation
page read and write
6328002A0000
trusted library allocation
page read and write
10D400001000
trusted library allocation
page read and write
10D4025A0000
trusted library allocation
page read and write
10D402420000
trusted library allocation
page read and write
6941000
heap
page read and write
10D402B00000
trusted library allocation
page read and write
78E0000
heap
page read and write
10D402494000
trusted library allocation
page read and write
1DC1BC93000
heap
page read and write
A81000
unkown
page readonly
10D4024F0000
trusted library allocation
page read and write
6705FFE000
stack
page read and write
10D402EB8000
trusted library allocation
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
10D402D0C000
trusted library allocation
page read and write
132800430000
trusted library allocation
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
10D402630000
trusted library allocation
page read and write
670CFFE000
stack
page read and write
677F9FE000
stack
page read and write
18D7000
heap
page read and write
132800630000
trusted library allocation
page read and write
67799FD000
stack
page read and write
10D4030BC000
trusted library allocation
page read and write
677E1FE000
unkown
page readonly
1DC1DBF7000
unclassified section
page read and write
7060000
direct allocation
page execute and read and write
6DD0000
direct allocation
page read and write
10D402410000
trusted library allocation
page read and write
10D402F64000
trusted library allocation
page read and write
10D4026A4000
trusted library allocation
page read and write
67781FE000
unkown
page readonly
18C4000
heap
page read and write
1DC17EDB000
heap
page read and write
132800624000
trusted library allocation
page read and write
18E000
stack
page read and write
10D402601000
trusted library allocation
page read and write
10D4024F0000
trusted library allocation
page read and write
A70000
unkown
page readonly
10D402CFC000
trusted library allocation
page read and write
4AD4002DC000
direct allocation
page read and write
A81000
unkown
page readonly
10D403448000
trusted library allocation
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
4AD40020C000
direct allocation
page read and write
632800201000
trusted library allocation
page read and write
10D402700000
trusted library allocation
page read and write
6941000
heap
page read and write
10D4032EC000
trusted library allocation
page read and write
1DC17EE7000
heap
page read and write
10D402AF4000
trusted library allocation
page read and write
10D4023DC000
trusted library allocation
page read and write
670D7FE000
unkown
page readonly
1328006EC000
trusted library allocation
page read and write
10D403140000
trusted library allocation
page read and write
6941000
heap
page read and write
5FC000
stack
page read and write
10D403098000
trusted library allocation
page read and write
A70000
unkown
page readonly
1328006C4000
trusted library allocation
page read and write
4AD4002E4000
direct allocation
page read and write
18D2000
heap
page read and write
A7E000
unkown
page write copy
10D402AF0000
trusted library allocation
page read and write
A7E000
unkown
page write copy
1DC17EC4000
heap
page read and write
1DC1BC8F000
heap
page read and write
BE0000
heap
page read and write
6941000
heap
page read and write
67631FE000
unkown
page readonly
6941000
heap
page read and write
67681FE000
unkown
page readonly
1DC14363000
heap
page read and write
10D402548000
trusted library allocation
page read and write
1DC15FC0000
heap
page read and write
6941000
heap
page read and write
67729FC000
stack
page read and write
BAE000
stack
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
10D401001000
trusted library allocation
page read and write
710000
heap
page read and write
6941000
heap
page read and write
7AED000
heap
page read and write
76E1000
heap
page read and write
132800374000
trusted library allocation
page read and write
10D4031A8000
trusted library allocation
page read and write
1DC1E4BE000
trusted library section
page read and write
7050000
direct allocation
page execute and read and write
10D4031D8000
trusted library allocation
page read and write
632800230000
trusted library allocation
page read and write
1DC1782F000
heap
page read and write
71E2000
heap
page read and write
10D402A64000
trusted library allocation
page read and write
10D402DC0000
trusted library allocation
page read and write
67719FE000
stack
page read and write
132800380000
trusted library allocation
page read and write
6941000
heap
page read and write
7AD4000
heap
page read and write
1DC1E4B0000
trusted library section
page read and write
67629FD000
stack
page read and write
1DC17E83000
heap
page read and write
10D4026C0000
trusted library allocation
page read and write
6941000
heap
page read and write
6C69D000
unkown
page read and write
10D40241C000
trusted library allocation
page read and write
132800760000
trusted library allocation
page read and write
10D4030A8000
trusted library allocation
page read and write
1DC14215000
heap
page read and write
1DC1D8F7000
unclassified section
page read and write
6941000
heap
page read and write
6328002C0000
trusted library allocation
page read and write
10D402394000
trusted library allocation
page read and write
677E9FD000
stack
page read and write
10D402EE8000
trusted library allocation
page read and write
10F0000
heap
page read and write
6941000
heap
page read and write
79DB000
heap
page read and write
132800744000
trusted library allocation
page read and write
10D4034D8000
trusted library allocation
page read and write
6328002BC000
trusted library allocation
page read and write
10D4023AC000
trusted library allocation
page read and write
6941000
heap
page read and write
7A28000
heap
page read and write
1328006B4000
trusted library allocation
page read and write
10D402498000
trusted library allocation
page read and write
6941000
heap
page read and write
7060000
direct allocation
page execute and read and write
78E7000
heap
page read and write
132800401000
trusted library allocation
page read and write
67731FE000
unkown
page readonly
13280027C000
trusted library allocation
page read and write
A7A000
unkown
page readonly
10D402638000
trusted library allocation
page read and write
10D403434000
trusted library allocation
page read and write
10D402528000
trusted library allocation
page read and write
A81000
unkown
page readonly
676A9FE000
stack
page read and write
6941000
heap
page read and write
10D402530000
trusted library allocation
page read and write
1DC17827000
heap
page read and write
6930000
direct allocation
page read and write
A70000
unkown
page readonly
10D402873000
trusted library allocation
page read and write
1DC14270000
trusted library allocation
page read and write
132800658000
trusted library allocation
page read and write
79B4000
heap
page read and write
6941000
heap
page read and write
6328002A0000
trusted library allocation
page read and write
6941000
heap
page read and write
677B9FC000
stack
page read and write
1DC17818000
heap
page read and write
132800408000
trusted library allocation
page read and write
1DC17E38000
heap
page read and write
79FC000
heap
page read and write
10D402318000
trusted library allocation
page read and write
31FE000
unkown
page read and write
10D40253C000
trusted library allocation
page read and write
6941000
heap
page read and write
132800390000
trusted library allocation
page read and write
4AD4002D0000
direct allocation
page read and write
10D4022A8000
trusted library allocation
page read and write
B8C000
stack
page read and write
A1C000
stack
page read and write
6941000
heap
page read and write
1328002FC000
trusted library allocation
page read and write
10D40256C000
trusted library allocation
page read and write
10D4028B0000
trusted library allocation
page read and write
6328002F8000
trusted library allocation
page read and write
6930000
direct allocation
page read and write
6328002C0000
trusted library allocation
page read and write
6328002E4000
trusted library allocation
page read and write
18D7000
heap
page read and write
E00000
heap
page read and write
6328002C0000
trusted library allocation
page read and write
6941000
heap
page read and write
7A71000
heap
page read and write
71E3000
heap
page read and write
4AD400234000
direct allocation
page read and write
7A87000
heap
page read and write
675D9FE000
unkown
page read and write
67679FB000
stack
page read and write
10D4028D4000
trusted library allocation
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
10D402788000
trusted library allocation
page read and write
670C7FE000
unkown
page readonly
1328006D0000
trusted library allocation
page read and write
4AD40025C000
direct allocation
page read and write
10D4024F0000
trusted library allocation
page read and write
677A9FB000
stack
page read and write
10D4025B0000
trusted library allocation
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
10D402240000
trusted library allocation
page read and write
980000
heap
page read and write
67649FB000
stack
page read and write
78EA000
heap
page read and write
10D402798000
trusted library allocation
page read and write
10D40253C000
trusted library allocation
page read and write
10D403108000
trusted library allocation
page read and write
1DC17EED000
heap
page read and write
10D402508000
trusted library allocation
page read and write
1328006FC000
trusted library allocation
page read and write
7030000
direct allocation
page execute and read and write
10D403114000
trusted library allocation
page read and write
6930000
direct allocation
page read and write
1DC1781E000
heap
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
10D403234000
trusted library allocation
page read and write
78E5000
heap
page read and write
10D402268000
trusted library allocation
page read and write
78E1000
heap
page read and write
7A5D000
heap
page read and write
10D403401000
trusted library allocation
page read and write
10D4031A8000
trusted library allocation
page read and write
10D402328000
trusted library allocation
page read and write
10D402A34000
trusted library allocation
page read and write
6941000
heap
page read and write
1DC17826000
heap
page read and write
1DC1E6C1000
trusted library section
page read and write
1328007E0000
trusted library allocation
page read and write
1DC16A10000
unkown
page read and write
1260000
heap
page read and write
30E0000
heap
page read and write
10D402694000
trusted library allocation
page read and write
A70000
unkown
page readonly
10D4025F8000
trusted library allocation
page read and write
67661FE000
unkown
page readonly
950000
heap
page read and write
7973000
heap
page read and write
7A43000
heap
page read and write
6941000
heap
page read and write
10D403114000
trusted library allocation
page read and write
676E9FE000
stack
page read and write
10D402B7E000
trusted library allocation
page read and write
10D402F0C000
trusted library allocation
page read and write
10D4032CC000
trusted library allocation
page read and write
1DC1D983000
trusted library section
page read and write
10D403364000
trusted library allocation
page read and write
10D40235C000
trusted library allocation
page read and write
7C6C000
heap
page read and write
6941000
heap
page read and write
10D402940000
trusted library allocation
page read and write
FFC000
stack
page read and write
1DC1DAA0000
trusted library section
page read and write
1DC17831000
heap
page read and write
10D402508000
trusted library allocation
page read and write
6941000
heap
page read and write
10D402BD0000
trusted library allocation
page read and write
6941000
heap
page read and write
10D402694000
trusted library allocation
page read and write
10D403254000
trusted library allocation
page read and write
10D4024B4000
trusted library allocation
page read and write
A81000
unkown
page readonly
A70000
unkown
page readonly
132800610000
trusted library allocation
page read and write
67691FE000
unkown
page readonly
676F1FE000
unkown
page readonly
6941000
heap
page read and write
A7E000
unkown
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
A7E000
unkown
page write copy
10D4027D8000
trusted library allocation
page read and write
10D402928000
trusted library allocation
page read and write
10D40240C000
trusted library allocation
page read and write
1DC17F00000
heap
page read and write
1328002CC000
trusted library allocation
page read and write
6328002B0000
trusted library allocation
page read and write
10D4023EC000
trusted library allocation
page read and write
13280060C000
trusted library allocation
page read and write
132800640000
trusted library allocation
page read and write
79B6000
heap
page read and write
6328002C8000
trusted library allocation
page read and write
6941000
heap
page read and write
7B6C000
heap
page read and write
6941000
heap
page read and write
7060000
direct allocation
page execute and read and write
10D402AEA000
trusted library allocation
page read and write
10D40270C000
trusted library allocation
page read and write
1DC1E25E000
trusted library section
page read and write
A7A000
unkown
page readonly
677C1FE000
unkown
page readonly
6941000
heap
page read and write
1DC1781E000
heap
page read and write
1DC1E9A0000
trusted library section
page read and write
6941000
heap
page read and write
1DC17823000
heap
page read and write
10D4023A0000
trusted library allocation
page read and write
6930000
direct allocation
page read and write
1DC1DABE000
trusted library section
page read and write
6941000
heap
page read and write
4AD400250000
direct allocation
page read and write
10D4022EC000
trusted library allocation
page read and write
6941000
heap
page read and write
110E000
stack
page read and write
1328002B8000
trusted library allocation
page read and write
A70000
unkown
page readonly
632800264000
trusted library allocation
page read and write
18C4000
heap
page read and write
6941000
heap
page read and write
7BB9000
heap
page read and write
79DE000
heap
page read and write
6941000
heap
page read and write
10D402DEC000
trusted library allocation
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
10D40315C000
trusted library allocation
page read and write
10D40251C000
trusted library allocation
page read and write
10D4024FC000
trusted library allocation
page read and write
10D402878000
trusted library allocation
page read and write
10D402DD8000
trusted library allocation
page read and write
18C0000
heap
page read and write
1328006B8000
trusted library allocation
page read and write
10D4028D4000
trusted library allocation
page read and write
10D4031BC000
trusted library allocation
page read and write
6941000
heap
page read and write
67789FC000
stack
page read and write
1DC1BC80000
heap
page read and write
A71000
unkown
page execute read
10D4023E4000
trusted library allocation
page read and write
10D40286D000
trusted library allocation
page read and write
1DC1E812000
trusted library section
page read and write
1DC1D8B0000
heap
page read and write
10D4030D4000
trusted library allocation
page read and write
10D402E8B000
trusted library allocation
page read and write
10D4030C8000
trusted library allocation
page read and write
6941000
heap
page read and write
A7A000
unkown
page readonly
10D402C84000
trusted library allocation
page read and write
13280033C000
trusted library allocation
page read and write
6941000
heap
page read and write
10D403248000
trusted library allocation
page read and write
10D4024F0000
trusted library allocation
page read and write
1DC14344000
heap
page read and write
78E9000
heap
page read and write
78E9000
heap
page read and write
6941000
heap
page read and write
10D402CEC000
trusted library allocation
page read and write
78E3000
heap
page read and write
6941000
heap
page read and write
10D403174000
trusted library allocation
page read and write
6941000
heap
page read and write
10D4028D4000
trusted library allocation
page read and write
10D402494000
trusted library allocation
page read and write
1DC17E61000
heap
page read and write
6941000
heap
page read and write
10D4031F4000
trusted library allocation
page read and write
132800668000
trusted library allocation
page read and write
10D402201000
trusted library allocation
page read and write
BF0000
heap
page read and write
10D403318000
trusted library allocation
page read and write
A71000
unkown
page execute read
A71000
unkown
page execute read
78E8000
heap
page read and write
6941000
heap
page read and write
10D4028D4000
trusted library allocation
page read and write
6941000
heap
page read and write
67751FE000
unkown
page readonly
6941000
heap
page read and write
10D402724000
trusted library allocation
page read and write
10D4032FC000
trusted library allocation
page read and write
A7E000
unkown
page read and write
1328002E4000
trusted library allocation
page read and write
1DC1BFD2000
trusted library allocation
page read and write
7B1F000
heap
page read and write
10D402514000
trusted library allocation
page read and write
6941000
heap
page read and write
1DC17E49000
heap
page read and write
6941000
heap
page read and write
6930000
direct allocation
page read and write
20000
unkown
page readonly
10D40246C000
trusted library allocation
page read and write
6941000
heap
page read and write
1328002D4000
trusted library allocation
page read and write
67651FE000
unkown
page readonly
A81000
unkown
page readonly
1DC17EF0000
heap
page read and write
FFC000
stack
page read and write
7060000
direct allocation
page execute and read and write
10D400F74000
trusted library allocation
page read and write
132800788000
trusted library allocation
page read and write
67087FE000
unkown
page readonly
10D402E80000
trusted library allocation
page read and write
F0000
heap
page read and write
6941000
heap
page read and write
10D403084000
trusted library allocation
page read and write
677D1FE000
unkown
page readonly
1DC1E720000
trusted library section
page read and write
1DC1429B000
heap
page read and write
7AAE000
heap
page read and write
6706FFE000
stack
page read and write
32DF000
stack
page read and write
3250000
heap
page read and write
1DC14260000
trusted library allocation
page read and write
10D403114000
trusted library allocation
page read and write
132800354000
trusted library allocation
page read and write
132800700000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
13280035C000
trusted library allocation
page read and write
6930000
direct allocation
page read and write
132800614000
trusted library allocation
page read and write
6941000
heap
page read and write
1540000
heap
page read and write
10D403120000
trusted library allocation
page read and write
10D4024F0000
trusted library allocation
page read and write
10D4026C0000
trusted library allocation
page read and write
10D402BA0000
trusted library allocation
page read and write
10D4032E8000
trusted library allocation
page read and write
6941000
heap
page read and write
10D403278000
trusted library allocation
page read and write
6941000
heap
page read and write
1DC141E0000
heap
page read and write
1DC17E6D000
heap
page read and write
67641FE000
unkown
page readonly
10D4023B4000
trusted library allocation
page read and write
6941000
heap
page read and write
10D402CC8000
trusted library allocation
page read and write
6941000
heap
page read and write
A7E000
unkown
page write copy
18B1000
heap
page read and write
1DC17F10000
heap
page read and write
632800260000
trusted library allocation
page read and write
6941000
heap
page read and write
676A1FE000
unkown
page readonly
1DC17D40000
trusted library section
page read and write
10D4030B8000
trusted library allocation
page read and write
A71000
unkown
page execute read
10D402B58000
trusted library allocation
page read and write
632800248000
trusted library allocation
page read and write
10D4028E0000
trusted library allocation
page read and write
10D402274000
trusted library allocation
page read and write
670AFFD000
stack
page read and write
10D403050000
trusted library allocation
page read and write
10D40337C000
trusted library allocation
page read and write
18D9000
heap
page read and write
E80000
heap
page read and write
10D4025F8000
trusted library allocation
page read and write
132800230000
trusted library allocation
page read and write
1DC1D853000
heap
page read and write
1DC1D94E000
trusted library section
page read and write
1328007D0000
trusted library allocation
page read and write
132800601000
trusted library allocation
page read and write
132800714000
trusted library allocation
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
6930000
direct allocation
page read and write
6DD0000
direct allocation
page read and write
78E4000
heap
page read and write
1328006C8000
trusted library allocation
page read and write
67759FC000
stack
page read and write
675F9FE000
stack
page read and write
10D403168000
trusted library allocation
page read and write
10D4028FC000
trusted library allocation
page read and write
10D4023E8000
trusted library allocation
page read and write
116E000
stack
page read and write
18BB000
heap
page read and write
A7E000
unkown
page read and write
10D402B70000
trusted library allocation
page read and write
C8D000
stack
page read and write
67601FE000
unkown
page readonly
10D402DD0000
trusted library allocation
page read and write
799A000
heap
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
10D402B95000
trusted library allocation
page read and write
67769FB000
stack
page read and write
10D40290C000
trusted library allocation
page read and write
78E6000
heap
page read and write
6941000
heap
page read and write
6D80000
trusted library allocation
page read and write
10D402CB8000
trusted library allocation
page read and write
1960000
heap
page read and write
4AD400290000
direct allocation
page read and write
6941000
heap
page read and write
100A000
heap
page read and write
677D9FB000
stack
page read and write
79CF000
heap
page read and write
10D403120000
trusted library allocation
page read and write
7060000
direct allocation
page execute and read and write
6941000
heap
page read and write
7ABC000
heap
page read and write
7060000
direct allocation
page execute and read and write
10D402530000
trusted library allocation
page read and write
9C000
stack
page read and write
10D402888000
trusted library allocation
page read and write
632800278000
trusted library allocation
page read and write
10D403038000
trusted library allocation
page read and write
7A00000
heap
page read and write
6941000
heap
page read and write
132800754000
trusted library allocation
page read and write
10D40234C000
trusted library allocation
page read and write
10D4033E4000
trusted library allocation
page read and write
18C0000
heap
page read and write
10D4033E4000
trusted library allocation
page read and write
103E000
stack
page read and write
1DC17E73000
heap
page read and write
78EE000
heap
page read and write
1DC17EAA000
heap
page read and write
1DC1E7F6000
trusted library section
page read and write
132800758000
trusted library allocation
page read and write
10D4022DC000
trusted library allocation
page read and write
1DC1E6D0000
trusted library section
page read and write
10D403028000
trusted library allocation
page read and write
A71000
unkown
page execute read
67017FE000
unkown
page readonly
6C69F000
unkown
page readonly
1DC17E81000
heap
page read and write
7AB8000
heap
page read and write
1DC17F10000
heap
page read and write
10D40228C000
trusted library allocation
page read and write
78E1000
heap
page read and write
6941000
heap
page read and write
132800250000
trusted library allocation
page read and write
1DC1DAB2000
trusted library section
page read and write
132800724000
trusted library allocation
page read and write
10D400E01000
trusted library allocation
page read and write
79E5000
heap
page read and write
67791FE000
unkown
page readonly
6941000
heap
page read and write
10D402EF8000
trusted library allocation
page read and write
6941000
heap
page read and write
67701FE000
unkown
page readonly
6328002A0000
trusted library allocation
page read and write
1DC1782B000
heap
page read and write
10D400A01000
trusted library allocation
page read and write
10D40320C000
trusted library allocation
page read and write
A7E000
unkown
page read and write
18D7000
heap
page read and write
10D4026CC000
trusted library allocation
page read and write
1DC1DA0D000
trusted library section
page read and write
132800320000
trusted library allocation
page read and write
10D402530000
trusted library allocation
page read and write
78EA000
heap
page read and write
6941000
heap
page read and write
13280025C000
trusted library allocation
page read and write
10D402424000
trusted library allocation
page read and write
67779FD000
stack
page read and write
6328002D8000
trusted library allocation
page read and write
10D402554000
trusted library allocation
page read and write
4AD400201000
direct allocation
page read and write
1DC15FB0000
trusted library section
page readonly
73D0000
heap
page read and write
10D400401000
trusted library allocation
page read and write
6941000
heap
page read and write
1DC17E78000
heap
page read and write
1328006B0000
trusted library allocation
page read and write
1328006CC000
trusted library allocation
page read and write
A71000
unkown
page execute read
676C9FD000
stack
page read and write
A7A000
unkown
page readonly
10D4033F4000
trusted library allocation
page read and write
1DC14220000
heap
page read and write
676D1FE000
unkown
page readonly
A70000
unkown
page readonly
1DC1DB72000
trusted library section
page read and write
1DC1D787000
unclassified section
page read and write
132800620000
trusted library allocation
page read and write
1DC1A080000
trusted library section
page read and write
6941000
heap
page read and write
6328002BC000
trusted library allocation
page read and write
11C7000
heap
page read and write
10D402ACC000
trusted library allocation
page read and write
676C1FE000
unkown
page readonly
6941000
heap
page read and write
10D402280000
trusted library allocation
page read and write
10D402AEE000
trusted library allocation
page read and write
777000
heap
page read and write
738F000
direct allocation
page read and write
10D4031A8000
trusted library allocation
page read and write
1DC1A070000
trusted library allocation
page read and write
10D40283C000
trusted library allocation
page read and write
10D4024B9000
trusted library allocation
page read and write
7971000
heap
page read and write
1DC14210000
heap
page read and write
67749FB000
stack
page read and write
6328002F0000
trusted library allocation
page read and write
10D402B30000
trusted library allocation
page read and write
1268000
heap
page read and write
10D402B84000
trusted library allocation
page read and write
132800424000
trusted library allocation
page read and write
1DC17EB5000
heap
page read and write
10D40256C000
trusted library allocation
page read and write
10D403248000
trusted library allocation
page read and write
78E7000
heap
page read and write
79DA000
heap
page read and write
10D402E48000
trusted library allocation
page read and write
6941000
heap
page read and write
10D4025F8000
trusted library allocation
page read and write
10D402528000
trusted library allocation
page read and write
6941000
heap
page read and write
10D4023D4000
trusted library allocation
page read and write
A7E000
unkown
page read and write
132800330000
trusted library allocation
page read and write
1DC1E81D000
trusted library section
page read and write
A71000
unkown
page execute read
10D4026DC000
trusted library allocation
page read and write
10D4024E0000
trusted library allocation
page read and write
7B3C000
heap
page read and write
1DC1433F000
heap
page read and write
7060000
direct allocation
page execute and read and write
10D402688000
trusted library allocation
page read and write
10D402678000
trusted library allocation
page read and write
7060000
direct allocation
page execute and read and write
10D403168000
trusted library allocation
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
13280069C000
trusted library allocation
page read and write
10D402F34000
trusted library allocation
page read and write
18BA000
heap
page read and write
10D403278000
trusted library allocation
page read and write
1DC17E89000
heap
page read and write
10D402A3C000
trusted library allocation
page read and write
10D402FE8000
trusted library allocation
page read and write
10D402490000
trusted library allocation
page read and write
6C6EC000
unkown
page readonly
10D403294000
trusted library allocation
page read and write
4AD40026C000
direct allocation
page read and write
10D402E4C000
trusted library allocation
page read and write
10D402D48000
trusted library allocation
page read and write
10D400801000
trusted library allocation
page read and write
A7A000
unkown
page readonly
14BF000
stack
page read and write
6707FFD000
stack
page read and write
13280080C000
trusted library allocation
page read and write
33F0000
heap
page read and write
632800270000
trusted library allocation
page read and write
6941000
heap
page read and write
10D4023F8000
trusted library allocation
page read and write
10D403244000
trusted library allocation
page read and write
10D4031A8000
trusted library allocation
page read and write
10D4023C8000
trusted library allocation
page read and write
10D402F90000
trusted library allocation
page read and write
10D4023B4000
trusted library allocation
page read and write
10D403234000
trusted library allocation
page read and write
18C0000
heap
page read and write
132800354000
trusted library allocation
page read and write
10D40011A000
trusted library allocation
page read and write
10D402B20000
trusted library allocation
page read and write
1158000
heap
page read and write
7B9B000
heap
page read and write
6941000
heap
page read and write
67047FE000
unkown
page readonly
10D402214000
trusted library allocation
page read and write
10D402898000
trusted library allocation
page read and write
10D403428000
trusted library allocation
page read and write
10D40262D000
trusted library allocation
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
67097FE000
unkown
page readonly
1328006E8000
trusted library allocation
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
13280075C000
trusted library allocation
page read and write
10D4030E0000
trusted library allocation
page read and write
78E2000
heap
page read and write
6DD0000
direct allocation
page read and write
6941000
heap
page read and write
132800730000
trusted library allocation
page read and write
10D4028D4000
trusted library allocation
page read and write
13FC000
stack
page read and write
10D402694000
trusted library allocation
page read and write
6941000
heap
page read and write
10D4030EC000
trusted library allocation
page read and write
6941000
heap
page read and write
1DC1D850000
heap
page read and write
10D4028EC000
trusted library allocation
page read and write
67669FA000
stack
page read and write
67067FE000
unkown
page readonly
21000
unkown
page execute and write copy
10D402E90000
trusted library allocation
page read and write
6708FFA000
stack
page read and write
132800248000
trusted library allocation
page read and write
10D4032B8000
trusted library allocation
page read and write
677A1FE000
unkown
page readonly
6941000
heap
page read and write
1DC17EB9000
heap
page read and write
132800784000
trusted library allocation
page read and write
10D40238C000
trusted library allocation
page read and write
6941000
heap
page read and write
10D4024B4000
trusted library allocation
page read and write
A7E000
unkown
page write copy
10D4024F0000
trusted library allocation
page read and write
10D403194000
trusted library allocation
page read and write
6328002F4000
trusted library allocation
page read and write
4AD40023C000
direct allocation
page read and write
10D402E6C000
trusted library allocation
page read and write
6941000
heap
page read and write
10D402828000
trusted library allocation
page read and write
1B0000
heap
page read and write
10D402974000
trusted library allocation
page read and write
10D403114000
trusted library allocation
page read and write
78EA000
heap
page read and write
6700FFD000
stack
page read and write
676B9FE000
stack
page read and write
10D40236C000
trusted library allocation
page read and write
6941000
heap
page read and write
10D402AA4000
trusted library allocation
page read and write
11C0000
heap
page read and write
132800320000
trusted library allocation
page read and write
6941000
heap
page read and write
1DC14321000
heap
page read and write
A7A000
unkown
page readonly
67077FE000
unkown
page readonly
6941000
heap
page read and write
10D402414000
trusted library allocation
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
1DC1DD10000
trusted library section
page read and write
10D402FA0000
trusted library allocation
page read and write
7060000
direct allocation
page execute and read and write
10D400201000
trusted library allocation
page read and write
6BC000
stack
page read and write
10D402C01000
trusted library allocation
page read and write
10D402B79000
trusted library allocation
page read and write
1DC17800000
heap
page read and write
6941000
heap
page read and write
79CD000
heap
page read and write
78E2000
heap
page read and write
6941000
heap
page read and write
10D402528000
trusted library allocation
page read and write
4AD400230000
direct allocation
page read and write
7F0000
heap
page read and write
BE0000
heap
page read and write
79B2000
heap
page read and write
78E5000
heap
page read and write
10D4024F0000
trusted library allocation
page read and write
670BFFE000
stack
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
10D4034E4000
trusted library allocation
page read and write
6941000
heap
page read and write
10D4025F8000
trusted library allocation
page read and write
6941000
heap
page read and write
78E6000
heap
page read and write
10D4023D8000
trusted library allocation
page read and write
1840000
heap
page read and write
10D40314C000
trusted library allocation
page read and write
6941000
heap
page read and write
10D40229E000
trusted library allocation
page read and write
10D403288000
trusted library allocation
page read and write
1410000
heap
page read and write
10D4022A2000
trusted library allocation
page read and write
132800644000
trusted library allocation
page read and write
1328006AC000
trusted library allocation
page read and write
144F000
stack
page read and write
7A4C000
heap
page read and write
132800698000
trusted library allocation
page read and write
6941000
heap
page read and write
78E4000
heap
page read and write
7996000
heap
page read and write
67771FE000
unkown
page readonly
10D402580000
trusted library allocation
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
677F1FE000
unkown
page readonly
10D4027AC000
trusted library allocation
page read and write
1DC17E86000
heap
page read and write
7060000
direct allocation
page execute and read and write
6941000
heap
page read and write
10D403248000
trusted library allocation
page read and write
6941000
heap
page read and write
1DC177F0000
heap
page read and write
78E3000
heap
page read and write
6941000
heap
page read and write
67741FE000
unkown
page readonly
7040000
direct allocation
page execute and read and write
10D40253C000
trusted library allocation
page read and write
6941000
heap
page read and write
632800250000
trusted library allocation
page read and write
10D40242C000
trusted library allocation
page read and write
1DC1E6EE000
trusted library section
page read and write
132800320000
trusted library allocation
page read and write
7A0D000
heap
page read and write
1DC1DB7D000
trusted library section
page read and write
7060000
direct allocation
page execute and read and write
10D4022B4000
trusted library allocation
page read and write
10D400C01000
trusted library allocation
page read and write
67027FE000
unkown
page readonly
7060000
direct allocation
page execute and read and write
6941000
heap
page read and write
78E7000
heap
page read and write
1328007B4000
trusted library allocation
page read and write
78E5000
heap
page read and write
1DC17824000
heap
page read and write
10D402F54000
trusted library allocation
page read and write
1DC1E741000
trusted library section
page read and write
733D000
heap
page read and write
6941000
heap
page read and write
10D403114000
trusted library allocation
page read and write
1530000
heap
page read and write
7A36000
heap
page read and write
6328002BD000
trusted library allocation
page read and write
A7A000
unkown
page readonly
677C9FE000
stack
page read and write
10D4029A0000
trusted library allocation
page read and write
A90000
heap
page read and write
6941000
heap
page read and write
1DC1E753000
trusted library section
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
677B1FE000
unkown
page readonly
6930000
direct allocation
page read and write
6941000
heap
page read and write
A71000
unkown
page execute read
10D40260C000
trusted library allocation
page read and write
18C4000
heap
page read and write
A7A000
unkown
page readonly
6941000
heap
page read and write
6328002A0000
trusted library allocation
page read and write
632800294000
trusted library allocation
page read and write
10D4023B4000
trusted library allocation
page read and write
6941000
heap
page read and write
A71000
unkown
page execute read
6941000
heap
page read and write
10D4030F4000
trusted library allocation
page read and write
6941000
heap
page read and write
10D402B77000
trusted library allocation
page read and write
A81000
unkown
page readonly
10D402BAC000
trusted library allocation
page read and write
10D402A7C000
trusted library allocation
page read and write
10D402FE0000
trusted library allocation
page read and write
132800220000
trusted library allocation
page read and write
10D4022FC000
trusted library allocation
page read and write
7060000
direct allocation
page execute and read and write
6941000
heap
page read and write
10D402334000
trusted library allocation
page read and write
7A94000
heap
page read and write
7171000
heap
page read and write
10D402F0C000
trusted library allocation
page read and write
6941000
heap
page read and write
A70000
unkown
page readonly
10D403278000
trusted library allocation
page read and write
1DC17ED3000
heap
page read and write
10D402694000
trusted library allocation
page read and write
A7A000
unkown
page readonly
4AD400303000
direct allocation
page read and write
18D6000
heap
page read and write
6941000
heap
page read and write
67699FE000
stack
page read and write
10D402F67000
trusted library allocation
page read and write
1DC15FC3000
heap
page read and write
670A7FE000
unkown
page readonly
10D402BE4000
trusted library allocation
page read and write
74EC000
direct allocation
page read and write
A71000
unkown
page execute read
10D402C0C000
trusted library allocation
page read and write
10D40295C000
trusted library allocation
page read and write
1DC14240000
heap
page read and write
1DC1E6E2000
trusted library section
page read and write
C8F000
stack
page read and write
6941000
heap
page read and write
7060000
direct allocation
page execute and read and write
10D402590000
trusted library allocation
page read and write
1328007C8000
trusted library allocation
page read and write
4AD4002A8000
direct allocation
page read and write
6930000
direct allocation
page read and write
132800368000
trusted library allocation
page read and write
10D402428000
trusted library allocation
page read and write
10D403018000
trusted library allocation
page read and write
132800704000
trusted library allocation
page read and write
10D402694000
trusted library allocation
page read and write
6328002B0000
trusted library allocation
page read and write
1DC1E250000
trusted library section
page read and write
10D4025B0000
trusted library allocation
page read and write
1DC1E6B0000
trusted library section
page read and write
67739FD000
stack
page read and write
13280033C000
trusted library allocation
page read and write
A81000
unkown
page readonly
7060000
direct allocation
page execute and read and write
10D40280C000
trusted library allocation
page read and write
6941000
heap
page read and write
632800238000
trusted library allocation
page read and write
10D402EDC000
trusted library allocation
page read and write
6941000
heap
page read and write
7C79000
heap
page read and write
132800648000
trusted library allocation
page read and write
A70000
unkown
page readonly
A81000
unkown
page readonly
10D403120000
trusted library allocation
page read and write
FDC000
stack
page read and write
10D4023AC000
trusted library allocation
page read and write
1DC141F0000
heap
page readonly
18C4000
heap
page read and write
1DC1E227000
unclassified section
page read and write
10D402E9C000
trusted library allocation
page read and write
132800368000
trusted library allocation
page read and write
10D4024A8000
trusted library allocation
page read and write
1328002B0000
trusted library allocation
page read and write
A7A000
unkown
page readonly
6941000
heap
page read and write
10D40255C000
trusted library allocation
page read and write
6941000
heap
page read and write
10D402B75000
trusted library allocation
page read and write
67761FE000
unkown
page readonly
1DC1E730000
trusted library section
page read and write
7060000
direct allocation
page execute and read and write
7AB4000
heap
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
10D4032DC000
trusted library allocation
page read and write
13280040C000
trusted library allocation
page read and write
10D402B50000
trusted library allocation
page read and write
1DC17823000
heap
page read and write
10D403130000
trusted library allocation
page read and write
FFC000
stack
page read and write
6941000
heap
page read and write
10D40253C000
trusted library allocation
page read and write
132800404000
trusted library allocation
page read and write
10D40338C000
trusted library allocation
page read and write
10D40253C000
trusted library allocation
page read and write
10D4026C4000
trusted library allocation
page read and write
7A3C000
heap
page read and write
6C6E9000
unkown
page read and write
63280020C000
trusted library allocation
page read and write
10D402494000
trusted library allocation
page read and write
10D40253C000
trusted library allocation
page read and write
78E2000
heap
page read and write
6328002BC000
trusted library allocation
page read and write
4AD400215000
direct allocation
page read and write
10D402F24000
trusted library allocation
page read and write
132800720000
trusted library allocation
page read and write
1DC17A90000
heap
page read and write
4AD4002AC000
direct allocation
page read and write
7060000
direct allocation
page execute and read and write
13280078C000
trusted library allocation
page read and write
1328006E4000
trusted library allocation
page read and write
6328002BC000
trusted library allocation
page read and write
6941000
heap
page read and write
1DC17D90000
trusted library section
page read and write
1DC1D942000
trusted library section
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
74EA000
direct allocation
page read and write
10D4031CC000
trusted library allocation
page read and write
7AE2000
heap
page read and write
1DC1DB13000
trusted library section
page read and write
132800678000
trusted library allocation
page read and write
6328002C0000
trusted library allocation
page read and write
78EA000
heap
page read and write
18D7000
heap
page read and write
10D402F3C000
trusted library allocation
page read and write
10D4023F0000
trusted library allocation
page read and write
1328007CC000
trusted library allocation
page read and write
10D4034E8000
trusted library allocation
page read and write
100E000
heap
page read and write
6941000
heap
page read and write
132800684000
trusted library allocation
page read and write
6941000
heap
page read and write
6328002BC000
trusted library allocation
page read and write
10D40220C000
trusted library allocation
page read and write
740000
unkown
page write copy
10D403354000
trusted library allocation
page read and write
6941000
heap
page read and write
ACE000
stack
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
7BEF000
heap
page read and write
6941000
heap
page read and write
10D4025F8000
trusted library allocation
page read and write
10D40253C000
trusted library allocation
page read and write
6C5C1000
unkown
page execute read
1DC17E58000
heap
page read and write
1328006E0000
trusted library allocation
page read and write
1DC1E467000
unclassified section
page read and write
1DC17EEB000
heap
page read and write
78E6000
heap
page read and write
6C6E8000
unkown
page readonly
718F000
heap
page read and write
7060000
direct allocation
page execute and read and write
18BA000
heap
page read and write
10D4029E0000
trusted library allocation
page read and write
1000000
heap
page read and write
132800210000
trusted library allocation
page read and write
10D402F80000
trusted library allocation
page read and write
10D402528000
trusted library allocation
page read and write
10D403094000
trusted library allocation
page read and write
A70000
unkown
page readonly
4AD400217000
direct allocation
page read and write
7060000
direct allocation
page execute and read and write
6941000
heap
page read and write
7060000
direct allocation
page execute and read and write
1417000
heap
page read and write
10D403098000
trusted library allocation
page read and write
10D402494000
trusted library allocation
page read and write
132800734000
trusted library allocation
page read and write
10D402A94000
trusted library allocation
page read and write
6930000
direct allocation
page read and write
10D4028D0000
trusted library allocation
page read and write
33C0000
heap
page read and write
676D9FA000
stack
page read and write
10D4027C0000
trusted library allocation
page read and write
10D402494000
trusted library allocation
page read and write
132800750000
trusted library allocation
page read and write
1328002ED000
trusted library allocation
page read and write
A7A000
unkown
page readonly
1DC1DB56000
trusted library section
page read and write
10D4023AC000
trusted library allocation
page read and write
6941000
heap
page read and write
10D402CAC000
trusted library allocation
page read and write
10D402430000
trusted library allocation
page read and write
132800364000
trusted library allocation
page read and write
6328002BC000
trusted library allocation
page read and write
1DC1D930000
trusted library section
page read and write
132800770000
trusted library allocation
page read and write
770000
heap
page read and write
10D4024A4000
trusted library allocation
page read and write
67611FE000
unkown
page readonly
67689FC000
stack
page read and write
132800688000
trusted library allocation
page read and write
10D40253C000
trusted library allocation
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
7A70000
heap
page read and write
1DC17E65000
heap
page read and write
6930000
direct allocation
page read and write
164F000
stack
page read and write
18D0000
heap
page read and write
7A1D000
heap
page read and write
7384000
direct allocation
page read and write
1DC17E61000
heap
page read and write
10D4031E0000
trusted library allocation
page read and write
7993000
heap
page read and write
67721FE000
unkown
page readonly
6941000
heap
page read and write
10D402A0C000
trusted library allocation
page read and write
10D402587000
trusted library allocation
page read and write
6941000
heap
page read and write
6930000
direct allocation
page read and write
A7A000
unkown
page readonly
10D403114000
trusted library allocation
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
132800201000
trusted library allocation
page read and write
78E9000
heap
page read and write
10D40320C000
trusted library allocation
page read and write
10D40256C000
trusted library allocation
page read and write
78EF000
heap
page read and write
BB0000
heap
page read and write
10D402F5C000
trusted library allocation
page read and write
6941000
heap
page read and write
632800235000
trusted library allocation
page read and write
6328002BC000
trusted library allocation
page read and write
7C0C000
heap
page read and write
10D402530000
trusted library allocation
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
676E1FE000
unkown
page readonly
10D402F2C000
trusted library allocation
page read and write
13280039C000
trusted library allocation
page read and write
10D402C4C000
trusted library allocation
page read and write
33FB000
heap
page read and write
10D402528000
trusted library allocation
page read and write
78EA000
heap
page read and write
7A40000
heap
page read and write
132800310000
trusted library allocation
page read and write
6702FFD000
stack
page read and write
10D402FD0000
trusted library allocation
page read and write
A7E000
unkown
page read and write
1DC1DA40000
trusted library section
page read and write
10D402528000
trusted library allocation
page read and write
132800310000
trusted library allocation
page read and write
797B000
heap
page read and write
7060000
direct allocation
page execute and read and write
10D4024C0000
trusted library allocation
page read and write
73DA000
heap
page read and write
6941000
heap
page read and write
67057FE000
unkown
page readonly
7A10000
heap
page read and write
6941000
heap
page read and write
10D403201000
trusted library allocation
page read and write
10D4023E0000
trusted library allocation
page read and write
10D402494000
trusted library allocation
page read and write
10D4023F4000
trusted library allocation
page read and write
132800320000
trusted library allocation
page read and write
6930000
direct allocation
page read and write
6328002C0000
trusted library allocation
page read and write
1DC1E850000
trusted library section
page read and write
6941000
heap
page read and write
10D402FD4000
trusted library allocation
page read and write
10D402E48000
trusted library allocation
page read and write
6941000
heap
page read and write
10D4031A0000
trusted library allocation
page read and write
E00000
heap
page read and write
10D40251C000
trusted library allocation
page read and write
10D402DC0000
trusted library allocation
page read and write
7C39000
heap
page read and write
10D4034D8000
trusted library allocation
page read and write
1DC17830000
heap
page read and write
A81000
unkown
page readonly
10D403254000
trusted library allocation
page read and write
323E000
unkown
page read and write
1120000
heap
page read and write
7AA2000
heap
page read and write
6941000
heap
page read and write
10D4023AC000
trusted library allocation
page read and write
10D402DC0000
trusted library allocation
page read and write
A6F000
stack
page read and write
10D40253C000
trusted library allocation
page read and write
67671FE000
unkown
page readonly
6941000
heap
page read and write
10D402E4C000
trusted library allocation
page read and write
10D40294C000
trusted library allocation
page read and write
799E000
heap
page read and write
A81000
unkown
page readonly
1150000
heap
page read and write
16BF000
stack
page read and write
10D402BDC000
trusted library allocation
page read and write
78E9000
heap
page read and write
7060000
direct allocation
page execute and read and write
67007FE000
unkown
page readonly
10D403070000
trusted library allocation
page read and write
10D40334C000
trusted library allocation
page read and write
4AD40024C000
direct allocation
page read and write
78E3000
heap
page read and write
6941000
heap
page read and write
10D4031B0000
trusted library allocation
page read and write
A70000
unkown
page readonly
6941000
heap
page read and write
132800348000
trusted library allocation
page read and write
10D40240C000
trusted library allocation
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
155E000
stack
page read and write
10D403234000
trusted library allocation
page read and write
21000
unkown
page execute and write copy
132800418000
trusted library allocation
page read and write
6701FFD000
stack
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
7B4F000
heap
page read and write
There are 1316 hidden memdumps, click here to show them.