IOC Report
v9dVG4fAGa.exe

loading gif

Files

File Path
Type
Category
Malicious
v9dVG4fAGa.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_v9dVG4fAGa.exe_37d923ac5075daa3ee77f76dea4fb931ad92bfd7_7048b31b_c9d19246-7878-46f9-bf31-67fc86250348\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1D12.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Oct 27 13:47:21 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER205F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER20AE.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\MJtlcJQcMLPNfooLOLTv.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
modified
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\v9dVG4fAGa.exe
"C:\Users\user\Desktop\v9dVG4fAGa.exe"
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user~1\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user~1\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user~1\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user~1\AppData\Local\Temp\/service123.exe
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 --field-trial-handle=2140,i,9262034847209018925,11001102924279765534,262144 /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 5296 -ip 5296
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5296 -s 728
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
gPtventji20vs.top
malicious
http://home.tventji20vs.top/WoxlPHBXQCCaMPOisKAk1730000596
147.45.48.137
malicious
QUERY|rd|AAAA|IN|home.tventji20vs.top
malicious
http://tventji20vs.top/v1/upload.php
147.45.48.137
malicious
tventji20vs.top
malicious
QUERY|rd|A|IN|home.tventji20vs.top
malicious
analforeverlovyu.top
malicious
llowtventji20vs.top
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=br
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
HTTP://tventji20vs.top/v1/upload.php
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://issuetracker.google.com/161903006
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://home.tventji20vs.top/WoxlPHBXQCCaMPOisKAk96
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
https://anglebug.com/7382ar
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
https://anglebug.com/7369t
unknown
http://anglebug.com/7047h
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
https://www.google.com/search?q=$
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.tventji20vs.top
147.45.48.137
malicious
tventji20vs.top
147.45.48.137
malicious
www.google.com
142.250.184.196

IPs

IP
Domain
Country
Malicious
147.45.48.137
home.tventji20vs.top
Russian Federation
malicious
142.250.184.196
www.google.com
United States
239.255.255.250
unknown
Reserved
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
ProgramId
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
FileId
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
LowerCaseLongPath
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
LongPathHash
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
Name
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
OriginalFileName
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
Publisher
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
Version
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
BinFileVersion
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
BinaryType
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
ProductName
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
ProductVersion
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
LinkDate
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
BinProductVersion
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
AppxPackageFullName
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
AppxPackageRelativeId
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
Size
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
Language
\REGISTRY\A\{25bf7f8f-d3b1-2fcb-d6d7-42c975b8325d}\Root\InventoryApplicationFile\v9dvg4faga.exe|311c975a4ee15e47
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4844000
heap
page read and write
malicious
26E0310E000
heap
page read and write
B2197FC000
stack
page read and write
72AC00CE0000
trusted library allocation
page read and write
19A0000
heap
page read and write
72AC002A4000
trusted library allocation
page read and write
26E0362D000
heap
page read and write
72AC003A0000
trusted library allocation
page read and write
5394002F4000
trusted library allocation
page read and write
19A00020C000
trusted library allocation
page read and write
72AC00A24000
trusted library allocation
page read and write
3F95000
heap
page read and write
B2799FE000
unkown
page readonly
72AC00654000
trusted library allocation
page read and write
72AC004B3000
trusted library allocation
page read and write
72AC008A8000
trusted library allocation
page read and write
26E7B5C0000
trusted library allocation
page read and write
404F000
heap
page read and write
72AC00098000
trusted library allocation
page read and write
EEE000
unkown
page read and write
19A000348000
trusted library allocation
page read and write
26E03639000
heap
page read and write
11F000217000
direct allocation
page read and write
19B4000
heap
page read and write
7B7000
heap
page read and write
26E03689000
heap
page read and write
72AC00BAC000
trusted library allocation
page read and write
102E000
heap
page read and write
19C4000
heap
page read and write
402E000
heap
page read and write
B27F9FE000
unkown
page readonly
539400238000
trusted library allocation
page read and write
B26C9FE000
unkown
page readonly
72AC00500000
trusted library allocation
page read and write
190A000
heap
page read and write
3A51000
heap
page read and write
B202FFE000
unkown
page readonly
19A00039C000
trusted library allocation
page read and write
72AC00B70000
trusted library allocation
page read and write
3A51000
heap
page read and write
5394002BC000
trusted library allocation
page read and write
B209FFE000
unkown
page readonly
199E000
heap
page read and write
19A5000
heap
page read and write
3E8C000
heap
page read and write
3A5C000
heap
page read and write
26E07842000
heap
page read and write
B2719FE000
unkown
page readonly
26E030FE000
heap
page read and write
72AC00C0C000
trusted library allocation
page read and write
3A50000
heap
page read and write
26E09C76000
trusted library section
page read and write
72AC004B0000
trusted library allocation
page read and write
11DC000
unkown
page read and write
B2769FE000
unkown
page readonly
72AC00218000
trusted library allocation
page read and write
B2137FE000
stack
page read and write
1085000
unkown
page read and write
5394002A0000
trusted library allocation
page read and write
19A0007CC000
trusted library allocation
page read and write
26E09217000
unclassified section
page read and write
199E000
heap
page read and write
26E09392000
trusted library section
page read and write
72AC00E7C000
trusted library allocation
page read and write
539400230000
trusted library allocation
page read and write
EE1000
unkown
page execute read
26E09B62000
trusted library section
page read and write
72AC00A24000
trusted library allocation
page read and write
DD0000
heap
page read and write
72AC007E0000
trusted library allocation
page read and write
19A0006E8000
trusted library allocation
page read and write
B27D9FE000
unkown
page readonly
5394002A0000
trusted library allocation
page read and write
72AC001F0000
trusted library allocation
page read and write
11C7000
unkown
page readonly
539400294000
trusted library allocation
page read and write
72AC00C01000
trusted library allocation
page read and write
19A000758000
trusted library allocation
page read and write
72AC004B0000
trusted library allocation
page read and write
3A4C000
heap
page read and write
19A000330000
trusted library allocation
page read and write
3DEF000
heap
page read and write
19C0000
heap
page read and write
1997000
heap
page read and write
3A71000
heap
page read and write
539400201000
trusted library allocation
page read and write
6A629000
direct allocation
page readonly
6A0F9000
direct allocation
page read and write
72AC00C40000
trusted library allocation
page read and write
72AC00478000
trusted library allocation
page read and write
EE1000
unkown
page execute read
3E78000
heap
page read and write
3F41000
heap
page read and write
72AC00E40000
trusted library allocation
page read and write
26E09CBD000
trusted library section
page read and write
72AC00E1C000
trusted library allocation
page read and write
1325000
heap
page read and write
26E09D40000
trusted library section
page read and write
72AC002A4000
trusted library allocation
page read and write
26E0366E000
heap
page read and write
72AC00401000
trusted library allocation
page read and write
72AC00A24000
trusted library allocation
page read and write
26E7B5D5000
heap
page read and write
19A0006D4000
trusted library allocation
page read and write
EF1000
unkown
page readonly
72AC00B30000
trusted library allocation
page read and write
19C4000
heap
page read and write
72AC00D18000
trusted library allocation
page read and write
B2781FE000
stack
page read and write
B2711FD000
stack
page read and write
EF1000
unkown
page readonly
19A000310000
trusted library allocation
page read and write
19C4000
heap
page read and write
72AC00201000
trusted library allocation
page read and write
1931000
heap
page read and write
26E03693000
heap
page read and write
19A0007D0000
trusted library allocation
page read and write
B2007FE000
stack
page read and write
72AC00F28000
trusted library allocation
page read and write
72AC00EF4000
trusted library allocation
page read and write
120E000
stack
page read and write
19A000668000
trusted library allocation
page read and write
6CC1C000
unkown
page readonly
19A000644000
trusted library allocation
page read and write
72AC0018C000
trusted library allocation
page read and write
89C000
stack
page read and write
5394002C0000
trusted library allocation
page read and write
6A5BE000
direct allocation
page read and write
72AC0117C000
trusted library allocation
page read and write
72AC0040D000
trusted library allocation
page read and write
3ED6000
heap
page read and write
72AC0035C000
trusted library allocation
page read and write
72AC009E0000
trusted library allocation
page read and write
19A000694000
trusted library allocation
page read and write
B27E1FE000
stack
page read and write
276E000
stack
page read and write
3A5D000
heap
page read and write
72AC00708000
trusted library allocation
page read and write
19A000404000
trusted library allocation
page read and write
72AC00EB4000
trusted library allocation
page read and write
72AC00E8C000
trusted library allocation
page read and write
B2157FE000
stack
page read and write
72AC00DD0000
trusted library allocation
page read and write
EF1000
unkown
page readonly
72AC001EC000
trusted library allocation
page read and write
3F14000
heap
page read and write
B21B7FE000
stack
page read and write
3DE6000
heap
page read and write
26E023A0000
unkown
page read and write
72AC008DC000
trusted library allocation
page read and write
B2709FE000
unkown
page readonly
72AC00A30000
trusted library allocation
page read and write
19A000648000
trusted library allocation
page read and write
72AC00A70000
trusted library allocation
page read and write
EF1000
unkown
page readonly
69FB4000
direct allocation
page read and write
199E000
heap
page read and write
3F0A000
heap
page read and write
B2729FE000
unkown
page readonly
72AC004D0000
trusted library allocation
page read and write
3EF9000
heap
page read and write
26E01950000
heap
page read and write
72AC0017C000
trusted library allocation
page read and write
EEA000
unkown
page readonly
26E018D0000
trusted library section
page readonly
72AC003A8000
trusted library allocation
page read and write
26E09900000
trusted library section
page read and write
26E7B43B000
heap
page read and write
539400278000
trusted library allocation
page read and write
72AC003B4000
trusted library allocation
page read and write
72AC0022C000
trusted library allocation
page read and write
26E03635000
heap
page read and write
26E03668000
heap
page read and write
4073000
heap
page read and write
539400270000
trusted library allocation
page read and write
72AC001B4000
trusted library allocation
page read and write
19A000704000
trusted library allocation
page read and write
B20B7FD000
stack
page read and write
72AC00D7C000
trusted library allocation
page read and write
3BE1000
heap
page read and write
3DE3000
heap
page read and write
6A2BE000
direct allocation
page read and write
19A0006CC000
trusted library allocation
page read and write
EEA000
unkown
page readonly
3DEA000
heap
page read and write
19A000720000
trusted library allocation
page read and write
39D0000
heap
page read and write
11F000215000
direct allocation
page read and write
72AC001AC000
trusted library allocation
page read and write
B210FFE000
unkown
page readonly
B2097FC000
stack
page read and write
72AC0000C000
trusted library allocation
page read and write
72AC001E0000
trusted library allocation
page read and write
72AC0035C000
trusted library allocation
page read and write
26E09CF0000
trusted library section
page read and write
B27D1FE000
stack
page read and write
19A000760000
trusted library allocation
page read and write
72AC00CB8000
trusted library allocation
page read and write
72AC009B4000
trusted library allocation
page read and write
19C4000
heap
page read and write
26E03616000
heap
page read and write
6CBCF000
unkown
page readonly
72AC006A4000
trusted library allocation
page read and write
DC94000
heap
page read and write
72AC0035C000
trusted library allocation
page read and write
72AC00A24000
trusted library allocation
page read and write
72AC00ABC000
trusted library allocation
page read and write
199B000
heap
page read and write
B204FFE000
unkown
page readonly
19C0000
heap
page read and write
6CC18000
unkown
page readonly
72AC00C7C000
trusted library allocation
page read and write
2580000
heap
page read and write
3DE5000
heap
page read and write
72AC00735000
trusted library allocation
page read and write
B20C7FB000
stack
page read and write
72AC00D28000
trusted library allocation
page read and write
B20E7FE000
stack
page read and write
19C0000
heap
page read and write
B2107FD000
stack
page read and write
B2739FE000
unkown
page readonly
19A00069C000
trusted library allocation
page read and write
26E092DE000
trusted library section
page read and write
19A000734000
trusted library allocation
page read and write
26E077E4000
heap
page read and write
11F000290000
direct allocation
page read and write
72AC008D0000
trusted library allocation
page read and write
72AC00DD0000
trusted library allocation
page read and write
1300000
heap
page read and write
19A9000
heap
page read and write
72AC00134000
trusted library allocation
page read and write
26E092D2000
trusted library section
page read and write
72AC00A50000
trusted library allocation
page read and write
26E09B6E000
trusted library section
page read and write
19A0002ED000
trusted library allocation
page read and write
26E7B397000
heap
page read and write
B27A1FE000
stack
page read and write
19C1000
heap
page read and write
B2017FB000
stack
page read and write
3F39000
heap
page read and write
19A00025C000
trusted library allocation
page read and write
72AC00908000
trusted library allocation
page read and write
39E1000
heap
page read and write
6A2FF000
direct allocation
page read and write
72AC00C1C000
trusted library allocation
page read and write
B217FFE000
unkown
page readonly
199A000
heap
page read and write
72AC000EC000
trusted library allocation
page read and write
3A5C000
heap
page read and write
3A64000
heap
page read and write
B2751FA000
stack
page read and write
3A57000
heap
page read and write
11E1000
unkown
page readonly
72AC003E4000
trusted library allocation
page read and write
72AC0100C000
trusted library allocation
page read and write
72AC00418000
trusted library allocation
page read and write
11E1000
unkown
page readonly
19A0002FC000
trusted library allocation
page read and write
72AC00380000
trusted library allocation
page read and write
19A5000
heap
page read and write
72AC00B34000
trusted library allocation
page read and write
3BF0000
heap
page read and write
3EA4000
heap
page read and write
72AC0056C000
trusted library allocation
page read and write
19C4000
heap
page read and write
72AC006B8000
trusted library allocation
page read and write
72AC009E4000
trusted library allocation
page read and write
19A00027C000
trusted library allocation
page read and write
3F5F000
heap
page read and write
5394002BC000
trusted library allocation
page read and write
3A5C000
heap
page read and write
26E0367B000
heap
page read and write
6A310000
direct allocation
page read and write
72AC00850000
trusted library allocation
page read and write
3A5C000
heap
page read and write
19E0000
heap
page read and write
72AC00614000
trusted library allocation
page read and write
5394002BC000
trusted library allocation
page read and write
72AC00EC0000
trusted library allocation
page read and write
19A00040C000
trusted library allocation
page read and write
72AC00980000
trusted library allocation
page read and write
19A9000
heap
page read and write
3EAA000
heap
page read and write
3A64000
heap
page read and write
3A5D000
heap
page read and write
EE1000
unkown
page execute read
180000
heap
page read and write
72AC0035C000
trusted library allocation
page read and write
3DE5000
heap
page read and write
3DED000
heap
page read and write
72AC007C8000
trusted library allocation
page read and write
26E09BB0000
trusted library section
page read and write
730000
heap
page read and write
11F000201000
direct allocation
page read and write
72AC00054000
trusted library allocation
page read and write
3A4F000
heap
page read and write
EC0000
heap
page read and write
72AC00601000
trusted library allocation
page read and write
B2701FE000
stack
page read and write
72AC01078000
trusted library allocation
page read and write
26E7B39E000
heap
page read and write
19A0003EC000
trusted library allocation
page read and write
19A0002D4000
trusted library allocation
page read and write
B51000
unkown
page execute read
3F25000
heap
page read and write
11DC000
unkown
page write copy
19A0002B8000
trusted library allocation
page read and write
26E09190000
heap
page read and write
26E09290000
heap
page read and write
B205FFE000
unkown
page readonly
72AC0016C000
trusted library allocation
page read and write
B20F7FC000
stack
page read and write
1680000
heap
page read and write
19A000201000
trusted library allocation
page read and write
19A000230000
trusted library allocation
page read and write
3DE1000
heap
page read and write
EE1000
unkown
page execute read
72AC00F18000
trusted library allocation
page read and write
B2759FE000
unkown
page readonly
72AC00E01000
trusted library allocation
page read and write
B21AFFE000
unkown
page readonly
27AF000
stack
page read and write
B50000
unkown
page readonly
3A5C000
heap
page read and write
19A00035C000
trusted library allocation
page read and write
72AC00B9C000
trusted library allocation
page read and write
72AC00801000
trusted library allocation
page read and write
72AC002D0000
trusted library allocation
page read and write
6CBCD000
unkown
page read and write
3F1A000
heap
page read and write
6CAF0000
unkown
page readonly
19A6000
heap
page read and write
72AC00D48000
trusted library allocation
page read and write
72AC00C1C000
trusted library allocation
page read and write
19A0002F0000
trusted library allocation
page read and write
108E000
unkown
page readonly
72AC00380000
trusted library allocation
page read and write
198D000
heap
page read and write
72AC00EA4000
trusted library allocation
page read and write
72AC00778000
trusted library allocation
page read and write
B27C1FA000
stack
page read and write
19A0006D0000
trusted library allocation
page read and write
11F0002D0000
direct allocation
page read and write
26E077E8000
heap
page read and write
72AC00954000
trusted library allocation
page read and write
3BE1000
heap
page read and write
13F8000
heap
page read and write
3DE7000
heap
page read and write
6A31B000
direct allocation
page read and write
26E09BD3000
trusted library section
page read and write
18EF000
stack
page read and write
26E03648000
heap
page read and write
26E07812000
heap
page read and write
3A9C000
heap
page read and write
25CD000
unkown
page read and write
1D0000
heap
page read and write
B2027FB000
stack
page read and write
19A000664000
trusted library allocation
page read and write
72AC002F0000
trusted library allocation
page read and write
B200FFE000
unkown
page readonly
26E7B440000
heap
page read and write
EEE000
unkown
page write copy
72AC00590000
trusted library allocation
page read and write
72AC0006C000
trusted library allocation
page read and write
72AC00ADC000
trusted library allocation
page read and write
3DE1000
heap
page read and write
72AC00584000
trusted library allocation
page read and write
11F0002AC000
direct allocation
page read and write
6A326000
direct allocation
page read and write
72AC00F7C000
trusted library allocation
page read and write
72AC004B8000
trusted library allocation
page read and write
199B000
heap
page read and write
B27A9FE000
unkown
page readonly
19E1000
heap
page read and write
72AC01158000
trusted library allocation
page read and write
16EF000
stack
page read and write
3A7A000
heap
page read and write
72AC00290000
trusted library allocation
page read and write
72AC002AA000
trusted library allocation
page read and write
B20AFFE000
unkown
page readonly
3DE3000
heap
page read and write
11DD000
unkown
page write copy
17ED000
stack
page read and write
19A5000
heap
page read and write
539400288000
trusted library allocation
page read and write
19A0006FC000
trusted library allocation
page read and write
B26D1FF000
stack
page read and write
199A000
heap
page read and write
72AC0035C000
trusted library allocation
page read and write
B2067FE000
stack
page read and write
12A0000
heap
page read and write
72AC0052F000
trusted library allocation
page read and write
72AC009AB000
trusted library allocation
page read and write
3DE4000
heap
page read and write
539400220000
trusted library allocation
page read and write
72AC0035C000
trusted library allocation
page read and write
B203FFE000
unkown
page readonly
EE1000
unkown
page execute read
72AC001AC000
trusted library allocation
page read and write
6A321000
direct allocation
page read and write
B26C1FE000
unkown
page read and write
6CAF1000
unkown
page execute read
19A000750000
trusted library allocation
page read and write
19A000248000
trusted library allocation
page read and write
19A0002F4000
trusted library allocation
page read and write
5394002C0000
trusted library allocation
page read and write
EBE000
stack
page read and write
3EF7000
heap
page read and write
72AC00368000
trusted library allocation
page read and write
539400274000
trusted library allocation
page read and write
72AC003A0000
trusted library allocation
page read and write
72AC000B4000
trusted library allocation
page read and write
19A000250000
trusted library allocation
page read and write
72AC00E4C000
trusted library allocation
page read and write
199A000
heap
page read and write
19C0000
heap
page read and write
72AC001D0000
trusted library allocation
page read and write
B216FFE000
unkown
page readonly
5394002C0000
trusted library allocation
page read and write
1900000
heap
page read and write
72AC00694000
trusted library allocation
page read and write
3DEC000
heap
page read and write
108E000
unkown
page readonly
B213FFE000
unkown
page readonly
72AC00078000
trusted library allocation
page read and write
26E03106000
heap
page read and write
108D000
unkown
page read and write
19A000430000
trusted library allocation
page read and write
EEE000
unkown
page write copy
72AC00918000
trusted library allocation
page read and write
3ED9000
heap
page read and write
19A000678000
trusted library allocation
page read and write
19A6000
heap
page read and write
3DED000
heap
page read and write
72AC00DE1000
trusted library allocation
page read and write
199B000
heap
page read and write
72AC00234000
trusted library allocation
page read and write
72AC001F4000
trusted library allocation
page read and write
72AC00FD4000
trusted library allocation
page read and write
72AC00DD0000
trusted library allocation
page read and write
26E09B27000
unclassified section
page read and write
3A5C000
heap
page read and write
190E000
heap
page read and write
B2117FD000
stack
page read and write
B2047FC000
stack
page read and write
3A5C000
heap
page read and write
72AC003A8000
trusted library allocation
page read and write
EEE000
unkown
page read and write
5394002BC000
trusted library allocation
page read and write
DF7F000
heap
page read and write
199E000
heap
page read and write
72AC00198000
trusted library allocation
page read and write
19A0007B4000
trusted library allocation
page read and write
FF9000
unkown
page read and write
72AC00A24000
trusted library allocation
page read and write
19A000688000
trusted library allocation
page read and write
3E97000
heap
page read and write
11F000210000
direct allocation
page read and write
193B000
heap
page read and write
19A000658000
trusted library allocation
page read and write
19A000354000
trusted library allocation
page read and write
5394002A0000
trusted library allocation
page read and write
19A000684000
trusted library allocation
page read and write
26E07807000
heap
page read and write
26E0366E000
heap
page read and write
3DE7000
heap
page read and write
19BF000
heap
page read and write
B2087FC000
stack
page read and write
19A0002CC000
trusted library allocation
page read and write
EE0000
unkown
page readonly
6A6F8000
direct allocation
page read and write
72AC00D5C000
trusted library allocation
page read and write
72AC003A0000
trusted library allocation
page read and write
19C4000
heap
page read and write
72AC00699000
trusted library allocation
page read and write
19A000320000
trusted library allocation
page read and write
72AC001B4000
trusted library allocation
page read and write
3A6F000
heap
page read and write
6A6F3000
direct allocation
page read and write
3F66000
heap
page read and write
3E8E000
heap
page read and write
72AC00224000
trusted library allocation
page read and write
194E000
heap
page read and write
72AC00A24000
trusted library allocation
page read and write
11F00026C000
direct allocation
page read and write
72AC00E6C000
trusted library allocation
page read and write
B218FFE000
unkown
page readonly
19C4000
heap
page read and write
72AC0129C000
trusted library allocation
page read and write
5394002F0000
trusted library allocation
page read and write
3DEF000
heap
page read and write
3A68000
heap
page read and write
3DE5000
heap
page read and write
539400264000
trusted library allocation
page read and write
72AC010B4000
trusted library allocation
page read and write
13F0000
heap
page read and write
102A000
heap
page read and write
3E9F000
heap
page read and write
900000
heap
page read and write
72AC000DC000
trusted library allocation
page read and write
72AC010D4000
trusted library allocation
page read and write
B2789FE000
unkown
page readonly
72AC003B4000
trusted library allocation
page read and write
72AC002FB000
trusted library allocation
page read and write
B2761FC000
stack
page read and write
3AE1000
heap
page read and write
72AC011B4000
trusted library allocation
page read and write
11C7000
unkown
page readonly
72AC012C4000
trusted library allocation
page read and write
3DE2000
heap
page read and write
69CC0000
direct allocation
page read and write
72AC002F3000
trusted library allocation
page read and write
72AC00E9C000
trusted library allocation
page read and write
3EB2000
heap
page read and write
EEA000
unkown
page readonly
72AC0035C000
trusted library allocation
page read and write
B50000
unkown
page readonly
72AC003C0000
trusted library allocation
page read and write
EF1000
unkown
page readonly
72AC00EA8000
trusted library allocation
page read and write
5394002D8000
trusted library allocation
page read and write
19A00033C000
trusted library allocation
page read and write
3EB8000
heap
page read and write
3DE7000
heap
page read and write
72AC00C4C000
trusted library allocation
page read and write
19A0006F0000
trusted library allocation
page read and write
3DE1000
heap
page read and write
26E035E0000
heap
page read and write
3EBA000
heap
page read and write
EE0000
unkown
page readonly
72AC00CE0000
trusted library allocation
page read and write
72AC00B20000
trusted library allocation
page read and write
3EB4000
heap
page read and write
72AC004F4000
trusted library allocation
page read and write
199B000
heap
page read and write
26E09477000
unclassified section
page read and write
19A00035C000
trusted library allocation
page read and write
5394002BC000
trusted library allocation
page read and write
72AC00CD0000
trusted library allocation
page read and write
3DE0000
heap
page read and write
1327000
heap
page read and write
72AC00680000
trusted library allocation
page read and write
72AC00E58000
trusted library allocation
page read and write
5394002C8000
trusted library allocation
page read and write
72AC00724000
trusted library allocation
page read and write
19A0007E0000
trusted library allocation
page read and write
72AC00C5C000
trusted library allocation
page read and write
EF1000
unkown
page readonly
26E0310F000
heap
page read and write
26E058E0000
trusted library allocation
page read and write
19A000610000
trusted library allocation
page read and write
B2037FC000
stack
page read and write
72AC010F0000
trusted library allocation
page read and write
72AC00FB0000
trusted library allocation
page read and write
19A000320000
trusted library allocation
page read and write
19A000330000
trusted library allocation
page read and write
4849000
heap
page read and write
26E096B0000
trusted library section
page read and write
3EC7000
heap
page read and write
EE0000
unkown
page readonly
72AC002A4000
trusted library allocation
page read and write
72AC005A4000
trusted library allocation
page read and write
3A7D000
heap
page read and write
72AC00C70000
trusted library allocation
page read and write
26E0363B000
heap
page read and write
5394002B0000
trusted library allocation
page read and write
72AC00CF0000
trusted library allocation
page read and write
72AC002A4000
trusted library allocation
page read and write
199E000
heap
page read and write
EE0000
unkown
page readonly
72AC00300000
trusted library allocation
page read and write
72AC006C8000
trusted library allocation
page read and write
72AC00EC0000
trusted library allocation
page read and write
B2187FA000
stack
page read and write
19A000330000
trusted library allocation
page read and write
3DED000
heap
page read and write
EE0000
unkown
page readonly
960000
heap
page read and write
B201FFE000
unkown
page readonly
72AC00D20000
trusted library allocation
page read and write
B20A7FD000
stack
page read and write
3DEA000
heap
page read and write
72AC006E4000
trusted library allocation
page read and write
1470000
heap
page read and write
72AC003A0000
trusted library allocation
page read and write
19A0006AC000
trusted library allocation
page read and write
19A000624000
trusted library allocation
page read and write
19A00080C000
trusted library allocation
page read and write
72AC00220000
trusted library allocation
page read and write
18B6000
heap
page read and write
19B4000
heap
page read and write
3F3F000
heap
page read and write
3E9A000
heap
page read and write
72AC00820000
trusted library allocation
page read and write
19A00075C000
trusted library allocation
page read and write
5394002BC000
trusted library allocation
page read and write
72AC00C20000
trusted library allocation
page read and write
3C00000
heap
page read and write
72AC001A0000
trusted library allocation
page read and write
B2771FC000
stack
page read and write
3DE0000
heap
page read and write
72AC001D8000
trusted library allocation
page read and write
EEE000
unkown
page write copy
19A0006BC000
trusted library allocation
page read and write
26E7B41C000
heap
page read and write
72AC002A4000
trusted library allocation
page read and write
72AC003A0000
trusted library allocation
page read and write
72AC0038C000
trusted library allocation
page read and write
3DE0000
heap
page read and write
19A0006C8000
trusted library allocation
page read and write
6A6EE000
direct allocation
page read and write
EEE000
unkown
page write copy
19A5000
heap
page read and write
19C1000
heap
page read and write
72AC00124000
trusted library allocation
page read and write
69CC1000
direct allocation
page execute read
3DE4000
heap
page read and write
72AC01170000
trusted library allocation
page read and write
19A000418000
trusted library allocation
page read and write
11F00020C000
direct allocation
page read and write
EF1000
unkown
page readonly
19B4000
heap
page read and write
11F0002E4000
direct allocation
page read and write
26E7B388000
heap
page read and write
3A80000
heap
page read and write
3DE6000
heap
page read and write
72AC00CFC000
trusted library allocation
page read and write
19C0000
heap
page read and write
72AC003C8000
trusted library allocation
page read and write
26E092A7000
unclassified section
page read and write
26E03102000
heap
page read and write
72AC00EB4000
trusted library allocation
page read and write
19A000714000
trusted library allocation
page read and write
72AC00001000
trusted library allocation
page read and write
72AC008F8000
trusted library allocation
page read and write
19A0002B0000
trusted library allocation
page read and write
72AC00E34000
trusted library allocation
page read and write
B20BFFE000
unkown
page readonly
26E03674000
heap
page read and write
2810000
heap
page read and write
26E0A230000
trusted library section
page read and write
72AC010E0000
trusted library allocation
page read and write
72AC012B8000
trusted library allocation
page read and write
3A4D000
heap
page read and write
E961000
heap
page read and write
198A000
heap
page read and write
72AC0041C000
trusted library allocation
page read and write
B20EFFE000
unkown
page readonly
72AC00ED1000
trusted library allocation
page read and write
72AC00974000
trusted library allocation
page read and write
1477000
heap
page read and write
3A4C000
heap
page read and write
72AC00B70000
trusted library allocation
page read and write
26E037C0000
trusted library section
page read and write
19A0006B4000
trusted library allocation
page read and write
EEA000
unkown
page readonly
243A000
stack
page read and write
19A000238000
trusted library allocation
page read and write
3A88000
heap
page read and write
2550000
heap
page read and write
13FC000
stack
page read and write
26E09530000
trusted library section
page read and write
72AC00848000
trusted library allocation
page read and write
72AC00314000
trusted library allocation
page read and write
19C4000
heap
page read and write
19A0000
heap
page read and write
10FC000
stack
page read and write
4047000
heap
page read and write
72AC009E4000
trusted library allocation
page read and write
18B0000
heap
page read and write
72AC00E0C000
trusted library allocation
page read and write
EE0000
unkown
page readonly
72AC0021C000
trusted library allocation
page read and write
5394002F8000
trusted library allocation
page read and write
72AC00F44000
trusted library allocation
page read and write
72AC00DC4000
trusted library allocation
page read and write
5249000
heap
page read and write
B2779FE000
unkown
page readonly
19A000601000
trusted library allocation
page read and write
B26E9FE000
unkown
page readonly
72AC00E28000
trusted library allocation
page read and write
2470000
heap
page read and write
B206FFE000
unkown
page readonly
3DEC000
heap
page read and write
72AC005DC000
trusted library allocation
page read and write
72AC00394000
trusted library allocation
page read and write
72AC000A0000
trusted library allocation
page read and write
46E2000
heap
page read and write
108C000
unkown
page write copy
19E1000
heap
page read and write
72AC0105C000
trusted library allocation
page read and write
19B5000
heap
page read and write
26E0363D000
heap
page read and write
72AC00518000
trusted library allocation
page read and write
B2147FE000
stack
page read and write
1087000
unkown
page read and write
194D000
heap
page read and write
72AC003A8000
trusted library allocation
page read and write
72AC0035C000
trusted library allocation
page read and write
72AC00C98000
trusted library allocation
page read and write
3A63000
heap
page read and write
26E0360D000
heap
page read and write
72AC00890000
trusted library allocation
page read and write
72AC009E4000
trusted library allocation
page read and write
19A00078C000
trusted library allocation
page read and write
72AC01158000
trusted library allocation
page read and write
3F0A000
heap
page read and write
72AC00C20000
trusted library allocation
page read and write
18BA000
heap
page read and write
11F000270000
direct allocation
page read and write
3FCB000
heap
page read and write
3DE2000
heap
page read and write
199A000
heap
page read and write
26E09313000
trusted library section
page read and write
72AC00D34000
trusted library allocation
page read and write
72AC00D0C000
trusted library allocation
page read and write
199E000
heap
page read and write
26E0310B000
heap
page read and write
E197000
heap
page read and write
72AC008BC000
trusted library allocation
page read and write
72AC011A4000
trusted library allocation
page read and write
5394002B0000
trusted library allocation
page read and write
5394002BC000
trusted library allocation
page read and write
3BF0000
heap
page read and write
1993000
heap
page read and write
3DEC000
heap
page read and write
539400260000
trusted library allocation
page read and write
2638000
heap
page read and write
19A000408000
trusted library allocation
page read and write
3E92000
heap
page read and write
26E07720000
trusted library section
page read and write
19A5000
heap
page read and write
539400250000
trusted library allocation
page read and write
26E7B426000
heap
page read and write
72AC00FD4000
trusted library allocation
page read and write
72AC010CC000
trusted library allocation
page read and write
5394002C0000
trusted library allocation
page read and write
19A000788000
trusted library allocation
page read and write
72AC01201000
trusted library allocation
page read and write
26E0363F000
heap
page read and write
21CD000
stack
page read and write
B27C9FE000
unkown
page readonly
26E03110000
heap
page read and write
19A6000
heap
page read and write
26E077E0000
heap
page read and write
72AC00DE8000
trusted library allocation
page read and write
26E7B380000
heap
page read and write
11F00023C000
direct allocation
page read and write
72AC003A0000
trusted library allocation
page read and write
72AC00DDC000
trusted library allocation
page read and write
19C0000
heap
page read and write
19A000784000
trusted library allocation
page read and write
72AC00B10000
trusted library allocation
page read and write
19A000424000
trusted library allocation
page read and write
72AC004A4000
trusted library allocation
page read and write
19A000730000
trusted library allocation
page read and write
B2721FA000
stack
page read and write
26E09BC1000
trusted library section
page read and write
2630000
heap
page read and write
72AC00BA4000
trusted library allocation
page read and write
3FFD000
heap
page read and write
4006000
heap
page read and write
72AC00F88000
trusted library allocation
page read and write
72AC00EB4000
trusted library allocation
page read and write
19A000640000
trusted library allocation
page read and write
19A000248000
trusted library allocation
page read and write
3F29000
heap
page read and write
72AC00F04000
trusted library allocation
page read and write
B2177FE000
stack
page read and write
26E035FF000
heap
page read and write
3A75000
heap
page read and write
19A5000
heap
page read and write
11F000230000
direct allocation
page read and write
72AC0014C000
trusted library allocation
page read and write
5394002A0000
trusted library allocation
page read and write
72AC006FF000
trusted library allocation
page read and write
6A0BA000
direct allocation
page read and write
72AC0104C000
trusted library allocation
page read and write
72AC00AA8000
trusted library allocation
page read and write
72AC00E8C000
trusted library allocation
page read and write
72AC00214000
trusted library allocation
page read and write
5394002B0000
trusted library allocation
page read and write
3F11000
heap
page read and write
EF1000
unkown
page readonly
3FEF000
heap
page read and write
3EF1000
heap
page read and write
72AC01001000
trusted library allocation
page read and write
19A000401000
trusted library allocation
page read and write
3DEA000
heap
page read and write
26E0939D000
trusted library section
page read and write
19A0006B8000
trusted library allocation
page read and write
B2077FD000
stack
page read and write
3A82000
heap
page read and write
3E8F000
heap
page read and write
72AC0035C000
trusted library allocation
page read and write
B27E9FE000
unkown
page readonly
EE1000
unkown
page execute read
72AC00B84000
trusted library allocation
page read and write
72AC0015C000
trusted library allocation
page read and write
199B000
heap
page read and write
26E0367B000
heap
page read and write
72AC00A01000
trusted library allocation
page read and write
3DE0000
heap
page read and write
72AC00210000
trusted library allocation
page read and write
72AC00230000
trusted library allocation
page read and write
72AC002A4000
trusted library allocation
page read and write
3ECE000
heap
page read and write
72AC00314000
trusted library allocation
page read and write
72AC00410000
trusted library allocation
page read and write
72AC00C68000
trusted library allocation
page read and write
72AC003D4000
trusted library allocation
page read and write
B211FFE000
unkown
page readonly
539400235000
trusted library allocation
page read and write
EE1000
unkown
page execute read
DE0000
heap
page read and write
72AC0080C000
trusted library allocation
page read and write
26E7B5B0000
trusted library allocation
page read and write
26E09436000
trusted library section
page read and write
72AC00FB0000
trusted library allocation
page read and write
72AC001AC000
trusted library allocation
page read and write
B2741FE000
stack
page read and write
B2127FD000
stack
page read and write
72AC006FC000
trusted library allocation
page read and write
26E09B41000
trusted library section
page read and write
EE0000
unkown
page readonly
72AC00374000
trusted library allocation
page read and write
3F1F000
heap
page read and write
B27F1FE000
stack
page read and write
B2749FE000
unkown
page readonly
72AC0092C000
trusted library allocation
page read and write
72AC002B4000
trusted library allocation
page read and write
187E000
stack
page read and write
E70000
heap
page read and write
26E035B0000
heap
page read and write
19C4000
heap
page read and write
26E7B550000
heap
page readonly
26E03103000
heap
page read and write
72AC00374000
trusted library allocation
page read and write
72AC00EB4000
trusted library allocation
page read and write
3F4F000
heap
page read and write
11F000234000
direct allocation
page read and write
11F000280000
direct allocation
page read and write
11F00024C000
direct allocation
page read and write
72AC001D4000
trusted library allocation
page read and write
11D8000
unkown
page read and write
26E03641000
heap
page read and write
26E09CB2000
trusted library section
page read and write
11F00025C000
direct allocation
page read and write
72AC002C4000
trusted library allocation
page read and write
11F0002DC000
direct allocation
page read and write
72AC00228000
trusted library allocation
page read and write
72AC003A8000
trusted library allocation
page read and write
26E01910000
heap
page read and write
3EA4000
heap
page read and write
72AC010AC000
trusted library allocation
page read and write
3EAB000
heap
page read and write
72AC001AC000
trusted library allocation
page read and write
B2167FE000
stack
page read and write
72AC00D6C000
trusted library allocation
page read and write
19A000320000
trusted library allocation
page read and write
72AC007B1000
trusted library allocation
page read and write
ED0000
heap
page read and write
B21A7FE000
stack
page read and write
19C0000
heap
page read and write
1020000
heap
page read and write
26E03690000
heap
page read and write
72AC00DB4000
trusted library allocation
page read and write
3EC0000
heap
page read and write
72AC001E8000
trusted library allocation
page read and write
72AC002A8000
trusted library allocation
page read and write
26E09F40000
trusted library section
page read and write
26E0368D000
heap
page read and write
3DEF000
heap
page read and write
3DE5000
heap
page read and write
B219FFE000
unkown
page readonly
19A000288000
trusted library allocation
page read and write
72AC0020C000
trusted library allocation
page read and write
3DE3000
heap
page read and write
26E7B5D0000
heap
page read and write
B27B1FD000
stack
page read and write
26E7B418000
heap
page read and write
72AC00E4C000
trusted library allocation
page read and write
3FBD000
heap
page read and write
72AC002C4000
trusted library allocation
page read and write
26E7B560000
heap
page read and write
199C000
heap
page read and write
72AC0118C000
trusted library allocation
page read and write
72AC012A8000
trusted library allocation
page read and write
19C4000
heap
page read and write
72AC00AF8000
trusted library allocation
page read and write
72AC002A8000
trusted library allocation
page read and write
72AC00F54000
trusted library allocation
page read and write
EEA000
unkown
page readonly
26E03102000
heap
page read and write
72AC00C83000
trusted library allocation
page read and write
19A000700000
trusted library allocation
page read and write
39DA000
heap
page read and write
B212FFE000
unkown
page readonly
199A000
heap
page read and write
72AC003E4000
trusted library allocation
page read and write
B51000
unkown
page execute read
72AC00C68000
trusted library allocation
page read and write
19A000310000
trusted library allocation
page read and write
26E7B370000
heap
page read and write
12C000
stack
page read and write
EE1000
unkown
page execute read
1997000
heap
page read and write
11F000284000
direct allocation
page read and write
3ED6000
heap
page read and write
26E030FE000
heap
page read and write
19C0000
heap
page read and write
19A000770000
trusted library allocation
page read and write
19A000630000
trusted library allocation
page read and write
3A74000
heap
page read and write
19A0006B0000
trusted library allocation
page read and write
72AC003E4000
trusted library allocation
page read and write
72AC00A18000
trusted library allocation
page read and write
19A0006EC000
trusted library allocation
page read and write
26E01953000
heap
page read and write
E10000
heap
page read and write
5394002B0000
trusted library allocation
page read and write
72AC00C88000
trusted library allocation
page read and write
19A000380000
trusted library allocation
page read and write
B26F1FE000
stack
page read and write
3DE9000
heap
page read and write
11F000250000
direct allocation
page read and write
19A000220000
trusted library allocation
page read and write
26E077B7000
unclassified section
page read and write
19A9000
heap
page read and write
B26B1EF000
stack
page read and write
11F000220000
direct allocation
page read and write
72AC0020C000
trusted library allocation
page read and write
72AC00A80000
trusted library allocation
page read and write
72AC005C8000
trusted library allocation
page read and write
260E000
unkown
page read and write
19A000368000
trusted library allocation
page read and write
B26F9FE000
unkown
page readonly
72AC00F7C000
trusted library allocation
page read and write
72AC00394000
trusted library allocation
page read and write
26E7B590000
heap
page read and write
72AC00870000
trusted library allocation
page read and write
3B74000
heap
page read and write
72AC009D0000
trusted library allocation
page read and write
EEA000
unkown
page readonly
19A000614000
trusted library allocation
page read and write
7B0000
heap
page read and write
3A4C000
heap
page read and write
72AC012BC000
trusted library allocation
page read and write
EE0000
unkown
page readonly
199B000
heap
page read and write
E3C000
stack
page read and write
1085000
unkown
page write copy
72AC00DD0000
trusted library allocation
page read and write
3F2C000
heap
page read and write
3FBC000
heap
page read and write
EEE000
unkown
page read and write
72AC00D50000
trusted library allocation
page read and write
72AC00B04000
trusted library allocation
page read and write
53940020C000
trusted library allocation
page read and write
72AC00B98000
trusted library allocation
page read and write
72AC003A0000
trusted library allocation
page read and write
72AC00DA8000
trusted library allocation
page read and write
19C0000
heap
page read and write
199B000
heap
page read and write
72AC0060C000
trusted library allocation
page read and write
72AC00634000
trusted library allocation
page read and write
26E09F4E000
trusted library section
page read and write
72AC00CC4000
trusted library allocation
page read and write
19C0000
heap
page read and write
3EA3000
heap
page read and write
3DEB000
heap
page read and write
19A000368000
trusted library allocation
page read and write
11F0002EC000
direct allocation
page read and write
FF9000
unkown
page write copy
19B4000
heap
page read and write
B2731FA000
stack
page read and write
19A000354000
trusted library allocation
page read and write
72AC002B8000
trusted library allocation
page read and write
72AC0008F000
trusted library allocation
page read and write
26E09293000
heap
page read and write
19A5000
heap
page read and write
26E030E0000
heap
page read and write
6CC19000
unkown
page read and write
26E09B50000
trusted library section
page read and write
B27B9FE000
unkown
page readonly
3DE4000
heap
page read and write
72AC001E4000
trusted library allocation
page read and write
72AC007B8000
trusted library allocation
page read and write
72AC00F74000
trusted library allocation
page read and write
72AC006EC000
trusted library allocation
page read and write
26E0A220000
trusted library section
page read and write
199C000
heap
page read and write
72AC009A4000
trusted library allocation
page read and write
72AC0009E000
trusted library allocation
page read and write
E824000
heap
page read and write
19A000754000
trusted library allocation
page read and write
5FC000
stack
page read and write
72AC001DC000
trusted library allocation
page read and write
3A4C000
heap
page read and write
72AC00F64000
trusted library allocation
page read and write
26E03628000
heap
page read and write
406A000
heap
page read and write
19A000390000
trusted library allocation
page read and write
19A000374000
trusted library allocation
page read and write
26E09D4E000
trusted library section
page read and write
19A000620000
trusted library allocation
page read and write
72AC00624000
trusted library allocation
page read and write
3AA5000
heap
page read and write
1890000
heap
page read and write
72AC00538000
trusted library allocation
page read and write
3A50000
heap
page read and write
EEA000
unkown
page readonly
72AC001B4000
trusted library allocation
page read and write
72AC00488000
trusted library allocation
page read and write
72AC0035C000
trusted library allocation
page read and write
72AC00EE8000
trusted library allocation
page read and write
72AC00E40000
trusted library allocation
page read and write
D7C000
stack
page read and write
26E030F9000
heap
page read and write
26E03675000
heap
page read and write
B214FFE000
unkown
page readonly
3DEA000
heap
page read and write
1850000
heap
page read and write
B215FFE000
unkown
page readonly
72AC01040000
trusted library allocation
page read and write
B90000
heap
page read and write
72AC005B4000
trusted library allocation
page read and write
19A000320000
trusted library allocation
page read and write
72AC001CC000
trusted library allocation
page read and write
3E8E000
heap
page read and write
19A00033C000
trusted library allocation
page read and write
72AC01020000
trusted library allocation
page read and write
539400248000
trusted library allocation
page read and write
12AB000
stack
page read and write
72AC00798000
trusted library allocation
page read and write
19A0002E4000
trusted library allocation
page read and write
1990000
heap
page read and write
B2057FD000
stack
page read and write
11F000294000
direct allocation
page read and write
72AC00CD0000
trusted library allocation
page read and write
B21BFFE000
unkown
page readonly
72AC0035C000
trusted library allocation
page read and write
72AC0076C000
trusted library allocation
page read and write
19A000364000
trusted library allocation
page read and write
B208FFE000
unkown
page readonly
19A000744000
trusted library allocation
page read and write
19A0006E4000
trusted library allocation
page read and write
26E0364F000
heap
page read and write
72AC00CA4000
trusted library allocation
page read and write
19A5000
heap
page read and write
19C4000
heap
page read and write
3FD4000
heap
page read and write
72AC00F6C000
trusted library allocation
page read and write
19A000724000
trusted library allocation
page read and write
B20DFFE000
unkown
page readonly
19BF000
heap
page read and write
3E7A000
heap
page read and write
6A309000
direct allocation
page read and write
3DE6000
heap
page read and write
72AC001C4000
trusted library allocation
page read and write
1320000
heap
page read and write
72AC0001C000
trusted library allocation
page read and write
72AC000AC000
trusted library allocation
page read and write
72AC0120C000
trusted library allocation
page read and write
72AC00F44000
trusted library allocation
page read and write
19A000698000
trusted library allocation
page read and write
B20D7FE000
stack
page read and write
72AC00DD0000
trusted library allocation
page read and write
72AC00740000
trusted library allocation
page read and write
72AC002F0000
trusted library allocation
page read and write
198A000
heap
page read and write
72AC00A0C000
trusted library allocation
page read and write
72AC00EDC000
trusted library allocation
page read and write
72AC01030000
trusted library allocation
page read and write
72AC01100000
trusted library allocation
page read and write
3F79000
heap
page read and write
26E030D0000
heap
page read and write
B20CFFE000
unkown
page readonly
3DE2000
heap
page read and write
8F0000
heap
page read and write
19A0007C8000
trusted library allocation
page read and write
EEA000
unkown
page readonly
26E09B30000
trusted library section
page read and write
72AC00EC0000
trusted library allocation
page read and write
72AC00B7C000
trusted library allocation
page read and write
B2791FE000
stack
page read and write
11F0002A8000
direct allocation
page read and write
B26E1FE000
stack
page read and write
3EE9000
heap
page read and write
3EED000
heap
page read and write
72AC0129C000
trusted library allocation
page read and write
1310000
heap
page read and write
11F000303000
direct allocation
page read and write
3DE5000
heap
page read and write
19A000210000
trusted library allocation
page read and write
72AC001B4000
trusted library allocation
page read and write
EEE000
unkown
page read and write
26E036B0000
trusted library section
page read and write
72AC00268000
trusted library allocation
page read and write
72AC000FC000
trusted library allocation
page read and write
198A000
heap
page read and write
72AC00A8C000
trusted library allocation
page read and write
19A0006E0000
trusted library allocation
page read and write
72AC00060000
trusted library allocation
page read and write
26E03693000
heap
page read and write
72AC001F8000
trusted library allocation
page read and write
5394002E4000
trusted library allocation
page read and write
3B74000
heap
page read and write
72AC00AC8000
trusted library allocation
page read and write
B207FFE000
unkown
page readonly
3A4C000
heap
page read and write
26E09BA0000
trusted library section
page read and write
26E093D0000
trusted library section
page read and write
1086000
unkown
page write copy
19A00060C000
trusted library allocation
page read and write
B20FFFE000
unkown
page readonly
DFD000
stack
page read and write
421D000
heap
page read and write
72AC00494000
trusted library allocation
page read and write
26E07322000
trusted library allocation
page read and write
3A5D000
heap
page read and write
72AC00750000
trusted library allocation
page read and write
There are 1112 hidden memdumps, click here to show them.