IOC Report
UfRKIdsNvD.exe

loading gif

Files

File Path
Type
Category
Malicious
UfRKIdsNvD.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_UfRKIdsNvD.exe_dd69146b3a63e24f81695b34c9e2fc07c4c13_b481f7d4_37eb541d-c89e-4597-964b-2bb115b65574\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\cKVHNxTLdXDmoFXuLNoh.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7C92.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Oct 27 12:01:56 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7DAC.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7DCC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\UfRKIdsNvD.exe
"C:\Users\user\Desktop\UfRKIdsNvD.exe"
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 --field-trial-handle=2236,i,8175765210856130800,3496501643183743028,262144 /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6728 -s 1116

URLs

Name
IP
Malicious
http://anglebug.com/4836D
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
http://anglebug.com/4836B
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
http://anglebug.com/5055E
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actionsq
unknown
https://anglebug.com/7320-
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/6048=
unknown
http://anglebug.com/5281
unknown
http://anglebug.com/53719
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
http://anglebug.com/45517
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://docs.google.com/presentation/
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://chrome.google.com/webstore?hl=en3
unknown
https://issuetracker.google.com/161903006
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
http://anglebug.com/6439C
unknown
https://drive-daily-1.corp.google.com/
unknown
https://www.youtube.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://docs.google.com/spreadsheets/
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/3584/
unknown
http://anglebug.com/7556
unknown
https://drive-daily-4.c
unknown
https://chromewebstore.google.com/
unknown
http://anglebug.com/4551M
unknown
https://drive-preprod.corp.google.com/
unknown
http://anglebug.com/6141z
unknown
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
http://anglebug.com/54211
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
https://www.youtube.com/854a0aa2c5)
unknown
http://anglebug.com/4836
unknown
http://anglebug.com/5881;
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
https://issuetracker.google.com/issues/166475273L
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://unisolated.invalid/n
unknown
https://docs.google.com/document/?usp=installed_webappdator
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.thirtji13ht.top
46.173.214.92
malicious
thirtji13ht.top
46.173.214.92
malicious
www.google.com
142.250.185.100

IPs

IP
Domain
Country
Malicious
46.173.214.92
home.thirtji13ht.top
Russian Federation
malicious
239.255.255.250
unknown
Reserved
142.250.185.100
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
ProgramId
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
FileId
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
LowerCaseLongPath
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
LongPathHash
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
Name
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
OriginalFileName
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
Publisher
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
Version
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
BinFileVersion
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
BinaryType
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
ProductName
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
ProductVersion
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
LinkDate
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
BinProductVersion
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
AppxPackageFullName
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
AppxPackageRelativeId
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
Size
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
Language
\REGISTRY\A\{f2a5849c-2645-a6dd-5090-0d5de1a1816d}\Root\InventoryApplicationFile\ufrkidsnvd.exe|3ccd5eb100a867e7
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7160006D4000
trusted library allocation
page read and write
630800303000
direct allocation
page read and write
18D000248000
trusted library allocation
page read and write
EF0000
unkown
page readonly
7160007BC000
trusted library allocation
page read and write
7D0000
heap
page read and write
18D0008D8000
trusted library allocation
page read and write
640000
heap
page read and write
220ABAB0000
heap
page readonly
220ABBE0000
heap
page read and write
220ABDB5000
heap
page read and write
18D0008F4000
trusted library allocation
page read and write
716000EC0000
trusted library allocation
page read and write
716000074000
trusted library allocation
page read and write
18D0006BC000
trusted library allocation
page read and write
18D0008EC000
trusted library allocation
page read and write
18D000418000
trusted library allocation
page read and write
716000401000
trusted library allocation
page read and write
F40000
heap
page read and write
9BE000
stack
page read and write
18D000874000
trusted library allocation
page read and write
563FDFD000
stack
page read and write
18D000848000
trusted library allocation
page read and write
31FA000
heap
page read and write
716000AA4000
trusted library allocation
page read and write
716000C78000
trusted library allocation
page read and write
220B57E0000
trusted library section
page read and write
220AF6B0000
heap
page read and write
18D00084C000
trusted library allocation
page read and write
716000A7C000
trusted library allocation
page read and write
716000DDC000
trusted library allocation
page read and write
18D00079C000
trusted library allocation
page read and write
129F000
stack
page read and write
7160005B0000
trusted library allocation
page read and write
519C002A0000
trusted library allocation
page read and write
71600033C000
trusted library allocation
page read and write
220ABB40000
heap
page read and write
716000E64000
trusted library allocation
page read and write
519C00238000
trusted library allocation
page read and write
71600065C000
trusted library allocation
page read and write
519C00250000
trusted library allocation
page read and write
7160003C8000
trusted library allocation
page read and write
71600033C000
trusted library allocation
page read and write
716000914000
trusted library allocation
page read and write
3226000
heap
page read and write
6308002AC000
direct allocation
page read and write
308B000
heap
page read and write
18D000858000
trusted library allocation
page read and write
18D000898000
trusted library allocation
page read and write
716000220000
trusted library allocation
page read and write
5627DFB000
stack
page read and write
220B3683000
heap
page read and write
716000D5C000
trusted library allocation
page read and write
3085000
heap
page read and write
220B5FCE000
trusted library section
page read and write
63080023C000
direct allocation
page read and write
519C002BC000
trusted library allocation
page read and write
EF0000
unkown
page readonly
7160008EF000
trusted library allocation
page read and write
18D000860000
trusted library allocation
page read and write
716000774000
trusted library allocation
page read and write
220AF1D3000
heap
page read and write
18D000920000
trusted library allocation
page read and write
7160009CC000
trusted library allocation
page read and write
71600033C000
trusted library allocation
page read and write
5636DFD000
stack
page read and write
31F4000
heap
page read and write
562F5FE000
unkown
page readonly
716000423000
trusted library allocation
page read and write
F01000
unkown
page readonly
564DDFE000
stack
page read and write
220B5312000
trusted library section
page read and write
630800284000
direct allocation
page read and write
716000C78000
trusted library allocation
page read and write
716000D18000
trusted library allocation
page read and write
562EDFD000
stack
page read and write
3083000
heap
page read and write
716000C90000
trusted library allocation
page read and write
716000BD4000
trusted library allocation
page read and write
FA0000
heap
page read and write
519C002BC000
trusted library allocation
page read and write
716000F64000
trusted library allocation
page read and write
EFE000
unkown
page read and write
716001064000
trusted library allocation
page read and write
716000384000
trusted library allocation
page read and write
630800280000
direct allocation
page read and write
71600096E000
trusted library allocation
page read and write
9A0000
heap
page read and write
3082000
heap
page read and write
308A000
heap
page read and write
716000398000
trusted library allocation
page read and write
220AF797000
heap
page read and write
630800250000
direct allocation
page read and write
33CC000
heap
page read and write
18D000220000
trusted library allocation
page read and write
716000D78000
trusted library allocation
page read and write
220AF1A0000
heap
page read and write
716000D2C000
trusted library allocation
page read and write
220AF1CA000
heap
page read and write
716000B5C000
trusted library allocation
page read and write
716000F4C000
trusted library allocation
page read and write
563CDFC000
stack
page read and write
324C000
heap
page read and write
716000C78000
trusted library allocation
page read and write
220AF1D6000
heap
page read and write
716000568000
trusted library allocation
page read and write
561CDEF000
stack
page read and write
716000FA4000
trusted library allocation
page read and write
7160002E0000
trusted library allocation
page read and write
220AF758000
heap
page read and write
7160002B0000
trusted library allocation
page read and write
519C002D8000
trusted library allocation
page read and write
220ABB48000
heap
page read and write
EFE000
unkown
page write copy
3253000
heap
page read and write
18D000894000
trusted library allocation
page read and write
716000F38000
trusted library allocation
page read and write
563BDFC000
stack
page read and write
3080000
heap
page read and write
18D0002ED000
trusted library allocation
page read and write
716000C34000
trusted library allocation
page read and write
519C002F0000
trusted library allocation
page read and write
EFA000
unkown
page readonly
716000A7C000
trusted library allocation
page read and write
18D00071C000
trusted library allocation
page read and write
324B000
heap
page read and write
562D5FE000
unkown
page readonly
716000028000
trusted library allocation
page read and write
18D0006C8000
trusted library allocation
page read and write
716000628000
trusted library allocation
page read and write
7160001AC000
trusted library allocation
page read and write
3083000
heap
page read and write
3082000
heap
page read and write
3237000
heap
page read and write
7160008E0000
trusted library allocation
page read and write
7160002A4000
trusted library allocation
page read and write
716000001000
trusted library allocation
page read and write
716000874000
trusted library allocation
page read and write
18D0002F0000
trusted library allocation
page read and write
716000C44000
trusted library allocation
page read and write
716000A48000
trusted library allocation
page read and write
FC000
stack
page read and write
160000
heap
page read and write
71600100C000
trusted library allocation
page read and write
EFE000
unkown
page write copy
56435FE000
unkown
page readonly
150000
heap
page read and write
71600020C000
trusted library allocation
page read and write
97C000
stack
page read and write
220B5A80000
trusted library section
page read and write
716000D50000
trusted library allocation
page read and write
561E5FE000
unkown
page readonly
71600096A000
trusted library allocation
page read and write
562B5FE000
unkown
page readonly
7160006E4000
trusted library allocation
page read and write
41000
unkown
page execute read
220ABAC0000
heap
page read and write
5625DFE000
stack
page read and write
71600021C000
trusted library allocation
page read and write
220AF760000
heap
page read and write
18D000974000
trusted library allocation
page read and write
71600102C000
trusted library allocation
page read and write
563B5FE000
unkown
page readonly
716000CFC000
trusted library allocation
page read and write
EF0000
unkown
page readonly
519C00264000
trusted library allocation
page read and write
308E000
heap
page read and write
6308002DC000
direct allocation
page read and write
7160001B4000
trusted library allocation
page read and write
716000B4C000
trusted library allocation
page read and write
71600113C000
trusted library allocation
page read and write
56215FE000
unkown
page readonly
56335FE000
unkown
page readonly
716000984000
trusted library allocation
page read and write
716000F70000
trusted library allocation
page read and write
C40000
heap
page read and write
18D000778000
trusted library allocation
page read and write
56355FE000
unkown
page readonly
716000C01000
trusted library allocation
page read and write
716000C1C000
trusted library allocation
page read and write
716000C6C000
trusted library allocation
page read and write
564C5FE000
unkown
page readonly
18D0008B8000
trusted library allocation
page read and write
220ADA20000
heap
page read and write
716000426000
trusted library allocation
page read and write
716000BCC000
trusted library allocation
page read and write
6308002E4000
direct allocation
page read and write
5647DFD000
stack
page read and write
716000D04000
trusted library allocation
page read and write
220B55E0000
trusted library section
page read and write
354E000
unkown
page read and write
7160003B8000
trusted library allocation
page read and write
220AF6F5000
heap
page read and write
716000C88000
trusted library allocation
page read and write
5630DFE000
stack
page read and write
716000ADC000
trusted library allocation
page read and write
18D000818000
trusted library allocation
page read and write
716000B4C000
trusted library allocation
page read and write
18D000801000
trusted library allocation
page read and write
716000398000
trusted library allocation
page read and write
7160003C8000
trusted library allocation
page read and write
3242000
heap
page read and write
564ADFE000
stack
page read and write
220B521E000
trusted library section
page read and write
71600129C000
trusted library allocation
page read and write
716000CC8000
trusted library allocation
page read and write
33EE000
heap
page read and write
716000C88000
trusted library allocation
page read and write
7160003C8000
trusted library allocation
page read and write
220B5C37000
unclassified section
page read and write
341A000
heap
page read and write
56465FE000
unkown
page readonly
311B000
heap
page read and write
3233000
heap
page read and write
3310000
heap
page read and write
18D000408000
trusted library allocation
page read and write
318B000
heap
page read and write
3082000
heap
page read and write
716000FB0000
trusted library allocation
page read and write
716000184000
trusted library allocation
page read and write
220ADA23000
heap
page read and write
3120000
heap
page read and write
716000818000
trusted library allocation
page read and write
308A000
heap
page read and write
18D00040C000
trusted library allocation
page read and write
716000B04000
trusted library allocation
page read and write
18D0006F4000
trusted library allocation
page read and write
18D00060C000
trusted library allocation
page read and write
32FE000
heap
page read and write
3138000
heap
page read and write
3410000
heap
page read and write
716000218000
trusted library allocation
page read and write
716000EA4000
trusted library allocation
page read and write
71600080C000
trusted library allocation
page read and write
3236000
heap
page read and write
EF0000
unkown
page readonly
716000B10000
trusted library allocation
page read and write
5643DFD000
stack
page read and write
18D000880000
trusted library allocation
page read and write
563ADFB000
stack
page read and write
519C002B0000
trusted library allocation
page read and write
220AF729000
heap
page read and write
220AF747000
heap
page read and write
3081000
heap
page read and write
561EDFF000
stack
page read and write
18D0007E0000
trusted library allocation
page read and write
71600022C000
trusted library allocation
page read and write
3150000
heap
page read and write
7160012C8000
trusted library allocation
page read and write
220B5A42000
trusted library section
page read and write
220AF73E000
heap
page read and write
7160012B8000
trusted library allocation
page read and write
220ABDB0000
heap
page read and write
56395FE000
unkown
page readonly
716000AE0000
trusted library allocation
page read and write
EF1000
unkown
page execute read
519C00260000
trusted library allocation
page read and write
716000C88000
trusted library allocation
page read and write
3205000
heap
page read and write
EFE000
unkown
page read and write
18D00095C000
trusted library allocation
page read and write
716000398000
trusted library allocation
page read and write
3081000
heap
page read and write
18D00091C000
trusted library allocation
page read and write
3089000
heap
page read and write
716000E0C000
trusted library allocation
page read and write
519C00270000
trusted library allocation
page read and write
716000210000
trusted library allocation
page read and write
630800290000
direct allocation
page read and write
562C5FE000
unkown
page readonly
3300000
heap
page read and write
716000E40000
trusted library allocation
page read and write
716000384000
trusted library allocation
page read and write
56315FE000
unkown
page readonly
3193000
heap
page read and write
5644DFD000
stack
page read and write
220AF1CA000
heap
page read and write
630800217000
direct allocation
page read and write
EFE000
unkown
page write copy
7160001B4000
trusted library allocation
page read and write
18D00080C000
trusted library allocation
page read and write
716001030000
trusted library allocation
page read and write
71600017C000
trusted library allocation
page read and write
716000D24000
trusted library allocation
page read and write
716000384000
trusted library allocation
page read and write
71600129C000
trusted library allocation
page read and write
18D000404000
trusted library allocation
page read and write
18D000828000
trusted library allocation
page read and write
220B5432000
trusted library section
page read and write
18D000728000
trusted library allocation
page read and write
716000F70000
trusted library allocation
page read and write
18D000790000
trusted library allocation
page read and write
716000F5C000
trusted library allocation
page read and write
716000421000
trusted library allocation
page read and write
716000128000
trusted library allocation
page read and write
5FC000
stack
page read and write
220ABAF0000
heap
page read and write
5649DFE000
stack
page read and write
7160008C8000
trusted library allocation
page read and write
EF0000
unkown
page readonly
716000914000
trusted library allocation
page read and write
EF0000
unkown
page readonly
5629DFC000
stack
page read and write
56245FE000
unkown
page readonly
716000090000
trusted library allocation
page read and write
18D0006E8000
trusted library allocation
page read and write
63080020C000
direct allocation
page read and write
308F000
heap
page read and write
519C002C0000
trusted library allocation
page read and write
716000370000
trusted library allocation
page read and write
716000CA0000
trusted library allocation
page read and write
220B5273000
trusted library section
page read and write
7160001D0000
trusted library allocation
page read and write
220B5473000
trusted library section
page read and write
18D00082C000
trusted library allocation
page read and write
220B3680000
heap
page read and write
312A000
heap
page read and write
716001048000
trusted library allocation
page read and write
220B3D57000
unclassified section
page read and write
519C002A0000
trusted library allocation
page read and write
9E0000
heap
page read and write
358F000
unkown
page read and write
18D000864000
trusted library allocation
page read and write
18D0007C4000
trusted library allocation
page read and write
220AF1D3000
heap
page read and write
519C002C8000
trusted library allocation
page read and write
31BC000
heap
page read and write
7160002F4000
trusted library allocation
page read and write
71600009C000
trusted library allocation
page read and write
716000840000
trusted library allocation
page read and write
562CDFE000
stack
page read and write
220AF6E9000
heap
page read and write
716000AE0000
trusted library allocation
page read and write
71600001C000
trusted library allocation
page read and write
18D000878000
trusted library allocation
page read and write
716000D5C000
trusted library allocation
page read and write
519C002B0000
trusted library allocation
page read and write
7160003DC000
trusted library allocation
page read and write
71600042C000
trusted library allocation
page read and write
562E5FE000
unkown
page readonly
716000BC8000
trusted library allocation
page read and write
EFA000
unkown
page readonly
220AF738000
heap
page read and write
18D000210000
trusted library allocation
page read and write
3088000
heap
page read and write
56425FE000
unkown
page readonly
220ABC2E000
heap
page read and write
308E000
heap
page read and write
56205FE000
unkown
page readonly
18D0008C4000
trusted library allocation
page read and write
308A000
heap
page read and write
18D000788000
trusted library allocation
page read and write
F01000
unkown
page readonly
71600111C000
trusted library allocation
page read and write
716000941000
trusted library allocation
page read and write
308A000
heap
page read and write
EAF000
heap
page read and write
7160005C4000
trusted library allocation
page read and write
5622DFD000
stack
page read and write
71600034C000
trusted library allocation
page read and write
7160004C4000
trusted library allocation
page read and write
7160002F0000
trusted library allocation
page read and write
220AF745000
heap
page read and write
3152000
heap
page read and write
7160008FC000
trusted library allocation
page read and write
18D000840000
trusted library allocation
page read and write
7160001B4000
trusted library allocation
page read and write
7160001F8000
trusted library allocation
page read and write
220B54F7000
unclassified section
page read and write
6C91D000
unkown
page read and write
519C002C0000
trusted library allocation
page read and write
7160001F4000
trusted library allocation
page read and write
716000EC0000
trusted library allocation
page read and write
10A0000
heap
page read and write
7160002A4000
trusted library allocation
page read and write
3082000
heap
page read and write
322D000
heap
page read and write
3086000
heap
page read and write
220B5A90000
trusted library section
page read and write
18D0007AC000
trusted library allocation
page read and write
220AF820000
trusted library section
page read and write
519C002C0000
trusted library allocation
page read and write
220B5420000
trusted library section
page read and write
18D000904000
trusted library allocation
page read and write
ED0000
heap
page read and write
18D000601000
trusted library allocation
page read and write
7160004A4000
trusted library allocation
page read and write
716000298000
trusted library allocation
page read and write
767000
unkown
page write copy
7160003A4000
trusted library allocation
page read and write
716000E18000
trusted library allocation
page read and write
56265FE000
unkown
page readonly
18D000230000
trusted library allocation
page read and write
716000801000
trusted library allocation
page read and write
DFC000
stack
page read and write
71600033C000
trusted library allocation
page read and write
220B5FB7000
unclassified section
page read and write
18D000430000
trusted library allocation
page read and write
716000D44000
trusted library allocation
page read and write
71600040C000
trusted library allocation
page read and write
716000294000
trusted library allocation
page read and write
18D00027C000
trusted library allocation
page read and write
56285FE000
unkown
page readonly
220AF726000
heap
page read and write
71600038C000
trusted library allocation
page read and write
18D0006D4000
trusted library allocation
page read and write
1300000
heap
page read and write
64A000
heap
page read and write
7160008B8000
trusted library allocation
page read and write
716000B90000
trusted library allocation
page read and write
18D0006E0000
trusted library allocation
page read and write
564A5FE000
unkown
page readonly
519C002F4000
trusted library allocation
page read and write
519C00230000
trusted library allocation
page read and write
716000A20000
trusted library allocation
page read and write
18D0002E4000
trusted library allocation
page read and write
716000848000
trusted library allocation
page read and write
31E5000
heap
page read and write
716000E80000
trusted library allocation
page read and write
360F000
stack
page read and write
18D000424000
trusted library allocation
page read and write
71600120C000
trusted library allocation
page read and write
716000A88000
trusted library allocation
page read and write
563E5FE000
unkown
page readonly
220AF741000
heap
page read and write
716000AC0000
trusted library allocation
page read and write
71600029E000
trusted library allocation
page read and write
5639DFD000
stack
page read and write
716000E80000
trusted library allocation
page read and write
56385FE000
unkown
page readonly
18D00039C000
trusted library allocation
page read and write
716000FDD000
trusted library allocation
page read and write
716001201000
trusted library allocation
page read and write
5633DFC000
stack
page read and write
7160007EC000
trusted library allocation
page read and write
716000E38000
trusted library allocation
page read and write
18D00025C000
trusted library allocation
page read and write
56415FE000
unkown
page readonly
7160010E0000
trusted library allocation
page read and write
563D5FE000
unkown
page readonly
716000201000
trusted library allocation
page read and write
71600048C000
trusted library allocation
page read and write
3239000
heap
page read and write
5620DFE000
stack
page read and write
716001104000
trusted library allocation
page read and write
EFA000
unkown
page readonly
563DDFB000
stack
page read and write
71600033C000
trusted library allocation
page read and write
716000398000
trusted library allocation
page read and write
220AE470000
unkown
page read and write
716000760000
trusted library allocation
page read and write
220B5031000
heap
page read and write
14AE000
stack
page read and write
716000511000
trusted library allocation
page read and write
716000FA4000
trusted library allocation
page read and write
716000954000
trusted library allocation
page read and write
564BDFE000
stack
page read and write
716000C2C000
trusted library allocation
page read and write
519C00235000
trusted library allocation
page read and write
716000C78000
trusted library allocation
page read and write
630800220000
direct allocation
page read and write
320C000
heap
page read and write
220AF1E1000
heap
page read and write
3750000
heap
page read and write
716000A30000
trusted library allocation
page read and write
18D000401000
trusted library allocation
page read and write
716000F80000
trusted library allocation
page read and write
220AF1CF000
heap
page read and write
71600064C000
trusted library allocation
page read and write
18D00081C000
trusted library allocation
page read and write
220ABB20000
trusted library allocation
page read and write
716001070000
trusted library allocation
page read and write
5641DFD000
stack
page read and write
71600072C000
trusted library allocation
page read and write
EF1000
unkown
page execute read
220AF743000
heap
page read and write
56235FE000
unkown
page readonly
5648DFC000
stack
page read and write
EFA000
unkown
page readonly
630800230000
direct allocation
page read and write
519C002A0000
trusted library allocation
page read and write
3386000
heap
page read and write
563EDFE000
stack
page read and write
220AF74F000
heap
page read and write
7160005E4000
trusted library allocation
page read and write
7160001E0000
trusted library allocation
page read and write
716000E1C000
trusted library allocation
page read and write
716000638000
trusted library allocation
page read and write
716000384000
trusted library allocation
page read and write
716000DD0000
trusted library allocation
page read and write
716000B84000
trusted library allocation
page read and write
519C002BC000
trusted library allocation
page read and write
519C002A0000
trusted library allocation
page read and write
220B52B6000
trusted library section
page read and write
716000927000
trusted library allocation
page read and write
562ADFE000
stack
page read and write
716000A6C000
trusted library allocation
page read and write
519C00274000
trusted library allocation
page read and write
716000084000
trusted library allocation
page read and write
56345FE000
unkown
page readonly
716000A5C000
trusted library allocation
page read and write
3086000
heap
page read and write
3164000
heap
page read and write
5621DFE000
stack
page read and write
328C000
heap
page read and write
716000EB6000
trusted library allocation
page read and write
EFA000
unkown
page readonly
3140000
heap
page read and write
630800201000
direct allocation
page read and write
519C002C0000
trusted library allocation
page read and write
71600058C000
trusted library allocation
page read and write
220AF78E000
heap
page read and write
18D000964000
trusted library allocation
page read and write
716000578000
trusted library allocation
page read and write
7160006B0000
trusted library allocation
page read and write
EF1000
unkown
page execute read
561FDFE000
stack
page read and write
519C002BC000
trusted library allocation
page read and write
7160001DC000
trusted library allocation
page read and write
716000AF4000
trusted library allocation
page read and write
335C000
heap
page read and write
18D0002CC000
trusted library allocation
page read and write
716000FA8000
trusted library allocation
page read and write
6C91F000
unkown
page readonly
716000FA4000
trusted library allocation
page read and write
716000C90000
trusted library allocation
page read and write
18D0008A8000
trusted library allocation
page read and write
220AF8E0000
trusted library section
page read and write
3379000
heap
page read and write
7160001D8000
trusted library allocation
page read and write
F01000
unkown
page readonly
220B5AA1000
trusted library section
page read and write
7160011C8000
trusted library allocation
page read and write
630800260000
direct allocation
page read and write
18D0007A0000
trusted library allocation
page read and write
220B5200000
trusted library section
page read and write
220AF1DC000
heap
page read and write
7160004F4000
trusted library allocation
page read and write
18D0006E8000
trusted library allocation
page read and write
716000780000
trusted library allocation
page read and write
71600033C000
trusted library allocation
page read and write
71600047C000
trusted library allocation
page read and write
3080000
heap
page read and write
220AF1D4000
heap
page read and write
7160009F8000
trusted library allocation
page read and write
716000378000
trusted library allocation
page read and write
9F0000
heap
page read and write
716000601000
trusted library allocation
page read and write
220AD9E0000
heap
page read and write
71600049C000
trusted library allocation
page read and write
220B3D80000
heap
page read and write
220AF971000
trusted library section
page read and write
3320000
heap
page read and write
18D0002F4000
trusted library allocation
page read and write
EFA000
unkown
page readonly
519C002E4000
trusted library allocation
page read and write
716000F64000
trusted library allocation
page read and write
18D000884000
trusted library allocation
page read and write
5624DFB000
stack
page read and write
7160003C8000
trusted library allocation
page read and write
562A5FE000
unkown
page readonly
220B5BB0000
trusted library section
page read and write
7160004E8000
trusted library allocation
page read and write
716001134000
trusted library allocation
page read and write
716000FE0000
trusted library allocation
page read and write
18D0006AC000
trusted library allocation
page read and write
56255FE000
unkown
page readonly
18D0002B8000
trusted library allocation
page read and write
716000B8C000
trusted library allocation
page read and write
716000E74000
trusted library allocation
page read and write
56375FE000
unkown
page readonly
71600050D000
trusted library allocation
page read and write
716000750000
trusted library allocation
page read and write
716000ECC000
trusted library allocation
page read and write
716000714000
trusted library allocation
page read and write
71600047C000
trusted library allocation
page read and write
12AF000
stack
page read and write
56225FE000
unkown
page readonly
7160001E4000
trusted library allocation
page read and write
220ABAA0000
heap
page read and write
5645DFD000
stack
page read and write
3288000
heap
page read and write
716000CD4000
trusted library allocation
page read and write
18D0008E8000
trusted library allocation
page read and write
519C002BC000
trusted library allocation
page read and write
EF1000
unkown
page execute read
7160001F0000
trusted library allocation
page read and write
716000688000
trusted library allocation
page read and write
64E000
heap
page read and write
4AD000
unkown
page write copy
7160002F4000
trusted library allocation
page read and write
716000C50000
trusted library allocation
page read and write
56495FE000
unkown
page readonly
18D0002B0000
trusted library allocation
page read and write
F01000
unkown
page readonly
220B543E000
trusted library section
page read and write
716000F64000
trusted library allocation
page read and write
18D00085C000
trusted library allocation
page read and write
18D000248000
trusted library allocation
page read and write
630800234000
direct allocation
page read and write
18D000918000
trusted library allocation
page read and write
630800274000
direct allocation
page read and write
716000294000
trusted library allocation
page read and write
716000F38000
trusted library allocation
page read and write
716000CC0000
trusted library allocation
page read and write
71600046C000
trusted library allocation
page read and write
18D0006AC000
trusted library allocation
page read and write
15B0000
heap
page read and write
716000BE9000
trusted library allocation
page read and write
3080000
heap
page read and write
618000
unkown
page readonly
716000CEC000
trusted library allocation
page read and write
71600033C000
trusted library allocation
page read and write
220B3C67000
unclassified section
page read and write
3082000
heap
page read and write
6C96C000
unkown
page readonly
561DDFE000
unkown
page read and write
3084000
heap
page read and write
18D0006F0000
trusted library allocation
page read and write
3084000
heap
page read and write
716000224000
trusted library allocation
page read and write
71600015C000
trusted library allocation
page read and write
18D000700000
trusted library allocation
page read and write
F4E000
stack
page read and write
519C002BC000
trusted library allocation
page read and write
716000B64000
trusted library allocation
page read and write
6C841000
unkown
page execute read
716000894000
trusted library allocation
page read and write
7160003EC000
trusted library allocation
page read and write
56365FE000
unkown
page readonly
716000C0C000
trusted library allocation
page read and write
7160001C4000
trusted library allocation
page read and write
519C002F8000
trusted library allocation
page read and write
220B0AE0000
trusted library allocation
page read and write
716000D5C000
trusted library allocation
page read and write
7160011C8000
trusted library allocation
page read and write
31D0000
heap
page read and write
31AC000
heap
page read and write
716000C88000
trusted library allocation
page read and write
308D000
heap
page read and write
716000294000
trusted library allocation
page read and write
716000358000
trusted library allocation
page read and write
716000384000
trusted library allocation
page read and write
716000228000
trusted library allocation
page read and write
716000384000
trusted library allocation
page read and write
716000378000
trusted library allocation
page read and write
6308002EC000
direct allocation
page read and write
71600000C000
trusted library allocation
page read and write
7160006B0000
trusted library allocation
page read and write
716000CB0000
trusted library allocation
page read and write
6C969000
unkown
page read and write
321C000
heap
page read and write
716000134000
trusted library allocation
page read and write
716000E84000
trusted library allocation
page read and write
EF1000
unkown
page execute read
220B531D000
trusted library section
page read and write
716000ED8000
trusted library allocation
page read and write
5626DFB000
stack
page read and write
5632DFE000
stack
page read and write
71600014C000
trusted library allocation
page read and write
716000994000
trusted library allocation
page read and write
564E5FE000
unkown
page readonly
716001168000
trusted library allocation
page read and write
18D0008B4000
trusted library allocation
page read and write
716000A7C000
trusted library allocation
page read and write
18D000868000
trusted library allocation
page read and write
5646DFA000
stack
page read and write
220B5B56000
trusted library section
page read and write
33BA000
heap
page read and write
220ABB10000
trusted library allocation
page read and write
220B5B7D000
trusted library section
page read and write
7160003AC000
trusted library allocation
page read and write
7160002C0000
trusted library allocation
page read and write
7160001C8000
trusted library allocation
page read and write
716000C90000
trusted library allocation
page read and write
18D000890000
trusted library allocation
page read and write
630800270000
direct allocation
page read and write
18D000288000
trusted library allocation
page read and write
56325FE000
unkown
page readonly
7160001A0000
trusted library allocation
page read and write
716000E4C000
trusted library allocation
page read and write
3087000
heap
page read and write
716001080000
trusted library allocation
page read and write
3216000
heap
page read and write
7160000EC000
trusted library allocation
page read and write
5631DFE000
stack
page read and write
562DDFE000
stack
page read and write
519C002BC000
trusted library allocation
page read and write
716000CF4000
trusted library allocation
page read and write
716000974000
trusted library allocation
page read and write
91C000
stack
page read and write
220AF749000
heap
page read and write
18D0008F0000
trusted library allocation
page read and write
716000498000
trusted library allocation
page read and write
3083000
heap
page read and write
716000FDC000
trusted library allocation
page read and write
716000230000
trusted library allocation
page read and write
71600006A000
trusted library allocation
page read and write
18D0008C8000
trusted library allocation
page read and write
6308002A8000
direct allocation
page read and write
3135000
heap
page read and write
5634DFC000
stack
page read and write
3082000
heap
page read and write
220AF722000
heap
page read and write
40000
unkown
page readonly
76C000
unkown
page readonly
71600027C000
trusted library allocation
page read and write
716000A0C000
trusted library allocation
page read and write
220B61C0000
trusted library section
page read and write
7160002B4000
trusted library allocation
page read and write
18D00020C000
trusted library allocation
page read and write
63080024C000
direct allocation
page read and write
5638DFC000
stack
page read and write
18D0006C8000
trusted library allocation
page read and write
716000FCC000
trusted library allocation
page read and write
220AF1D3000
heap
page read and write
716000E28000
trusted library allocation
page read and write
630800294000
direct allocation
page read and write
519C00248000
trusted library allocation
page read and write
308C000
heap
page read and write
71600020C000
trusted library allocation
page read and write
716000E5C000
trusted library allocation
page read and write
630800215000
direct allocation
page read and write
716000EE8000
trusted library allocation
page read and write
220AF1E0000
heap
page read and write
7160006F4000
trusted library allocation
page read and write
716000E84000
trusted library allocation
page read and write
31F8000
heap
page read and write
716000EF8000
trusted library allocation
page read and write
716001090000
trusted library allocation
page read and write
7160006D7000
trusted library allocation
page read and write
716000290000
trusted library allocation
page read and write
716000AB4000
trusted library allocation
page read and write
318A000
heap
page read and write
F48000
heap
page read and write
220AF1DC000
heap
page read and write
56295FE000
unkown
page readonly
716000FE8000
trusted library allocation
page read and write
716000FC5000
trusted library allocation
page read and write
716000F10000
trusted library allocation
page read and write
18D000948000
trusted library allocation
page read and write
56405FE000
unkown
page readonly
716000C78000
trusted library allocation
page read and write
220B5022000
heap
page read and write
6C840000
unkown
page readonly
71600034C000
trusted library allocation
page read and write
716000398000
trusted library allocation
page read and write
7160006D9000
trusted library allocation
page read and write
18D000960000
trusted library allocation
page read and write
7160001EC000
trusted library allocation
page read and write
220AF74B000
heap
page read and write
220B5C70000
trusted library section
page read and write
3082000
heap
page read and write
716001001000
trusted library allocation
page read and write
32AE000
heap
page read and write
716000CA0000
trusted library allocation
page read and write
5628DFB000
stack
page read and write
56455FE000
unkown
page readonly
6308002D0000
direct allocation
page read and write
220AF731000
heap
page read and write
71600060C000
trusted library allocation
page read and write
220B57EC000
trusted library section
page read and write
519C0020C000
trusted library allocation
page read and write
716000A01000
trusted library allocation
page read and write
7160005F4000
trusted library allocation
page read and write
716000C90000
trusted library allocation
page read and write
220B5212000
trusted library section
page read and write
220B5C7E000
trusted library section
page read and write
716000194000
trusted library allocation
page read and write
71600038C000
trusted library allocation
page read and write
716000294000
trusted library allocation
page read and write
3159000
heap
page read and write
519C002C0000
trusted library allocation
page read and write
F01000
unkown
page readonly
71600016C000
trusted library allocation
page read and write
71600099C000
trusted library allocation
page read and write
31EA000
heap
page read and write
220B5350000
trusted library section
page read and write
220AF1B0000
heap
page read and write
EF1000
unkown
page execute read
56275FE000
unkown
page readonly
716000214000
trusted library allocation
page read and write
7160001AC000
trusted library allocation
page read and write
7160012A8000
trusted library allocation
page read and write
716001170000
trusted library allocation
page read and write
5623DFB000
stack
page read and write
716000E90000
trusted library allocation
page read and write
519C002B0000
trusted library allocation
page read and write
3332000
heap
page read and write
716000F64000
trusted library allocation
page read and write
220AF5D0000
trusted library section
page read and write
716000358000
trusted library allocation
page read and write
7160008D8000
trusted library allocation
page read and write
3259000
heap
page read and write
7160012B4000
trusted library allocation
page read and write
220ABBFB000
heap
page read and write
6C968000
unkown
page readonly
60F000
unkown
page write copy
716001018000
trusted library allocation
page read and write
31DC000
heap
page read and write
716000DF4000
trusted library allocation
page read and write
56445FE000
unkown
page readonly
970000
heap
page read and write
220AF1E1000
heap
page read and write
220ABC01000
heap
page read and write
220AF1CF000
heap
page read and write
3210000
heap
page read and write
716000ECF000
trusted library allocation
page read and write
35CE000
stack
page read and write
220B5B72000
trusted library section
page read and write
9FE000
stack
page read and write
519C00294000
trusted library allocation
page read and write
18D0002FC000
trusted library allocation
page read and write
564B5FE000
unkown
page readonly
7160000DC000
trusted library allocation
page read and write
18D000830000
trusted library allocation
page read and write
716000D80000
trusted library allocation
page read and write
18D0007BC000
trusted library allocation
page read and write
31BF000
heap
page read and write
519C00220000
trusted library allocation
page read and write
563C5FE000
unkown
page readonly
31D5000
heap
page read and write
220ABC35000
heap
page read and write
7160007E4000
trusted library allocation
page read and write
7160009E8000
trusted library allocation
page read and write
5640DFE000
stack
page read and write
220B5FC0000
trusted library section
page read and write
7160010AC000
trusted library allocation
page read and write
716000FC1000
trusted library allocation
page read and write
FA7000
heap
page read and write
519C00278000
trusted library allocation
page read and write
71600034C000
trusted library allocation
page read and write
325D000
stack
page read and write
5637DFD000
stack
page read and write
220B5A30000
trusted library section
page read and write
18D0008E4000
trusted library allocation
page read and write
7160010F4000
trusted library allocation
page read and write
56485FE000
unkown
page readonly
7160000B4000
trusted library allocation
page read and write
716000F10000
trusted library allocation
page read and write
18D0007D4000
trusted library allocation
page read and write
18D0006F4000
trusted library allocation
page read and write
716001048000
trusted library allocation
page read and write
716000D8C000
trusted library allocation
page read and write
716000364000
trusted library allocation
page read and write
716000DBC000
trusted library allocation
page read and write
716001154000
trusted library allocation
page read and write
18D00078C000
trusted library allocation
page read and write
3088000
heap
page read and write
220ABBDC000
heap
page read and write
716000C78000
trusted library allocation
page read and write
7160002E7000
trusted library allocation
page read and write
F01000
unkown
page readonly
56305FE000
unkown
page readonly
563A5FE000
unkown
page readonly
7160010E8000
trusted library allocation
page read and write
220AF76D000
heap
page read and write
5642DFE000
stack
page read and write
716000F38000
trusted library allocation
page read and write
3087000
heap
page read and write
18D0006AC000
trusted library allocation
page read and write
3083000
heap
page read and write
3085000
heap
page read and write
31C1000
heap
page read and write
3124000
heap
page read and write
716000FA4000
trusted library allocation
page read and write
716000F80000
trusted library allocation
page read and write
716000398000
trusted library allocation
page read and write
41000
unkown
page execute read
18D00039C000
trusted library allocation
page read and write
7160001AC000
trusted library allocation
page read and write
716000854000
trusted library allocation
page read and write
71600092C000
trusted library allocation
page read and write
71600059C000
trusted library allocation
page read and write
7160001AC000
trusted library allocation
page read and write
56475FE000
unkown
page readonly
716000EB4000
trusted library allocation
page read and write
562BDFE000
stack
page read and write
562FDFA000
stack
page read and write
7160000FC000
trusted library allocation
page read and write
18D00070C000
trusted library allocation
page read and write
7160001E8000
trusted library allocation
page read and write
716000118000
trusted library allocation
page read and write
18D0007E4000
trusted library allocation
page read and write
18D000250000
trusted library allocation
page read and write
519C00288000
trusted library allocation
page read and write
519C00201000
trusted library allocation
page read and write
716000C90000
trusted library allocation
page read and write
716000B78000
trusted library allocation
page read and write
DFC000
stack
page read and write
71600034C000
trusted library allocation
page read and write
563F5FE000
unkown
page readonly
18D0007C0000
trusted library allocation
page read and write
7160001D4000
trusted library allocation
page read and write
18D000844000
trusted library allocation
page read and write
716001058000
trusted library allocation
page read and write
18D000238000
trusted library allocation
page read and write
3183000
heap
page read and write
716000398000
trusted library allocation
page read and write
220AF960000
trusted library section
page read and write
716000D6C000
trusted library allocation
page read and write
31AE000
heap
page read and write
3167000
heap
page read and write
220B5AB3000
trusted library section
page read and write
329A000
stack
page read and write
716000ED8000
trusted library allocation
page read and write
31DE000
heap
page read and write
716000298000
trusted library allocation
page read and write
716000518000
trusted library allocation
page read and write
220B5000000
heap
page read and write
330A000
heap
page read and write
716000F70000
trusted library allocation
page read and write
3080000
heap
page read and write
716000E01000
trusted library allocation
page read and write
31F2000
heap
page read and write
32DA000
heap
page read and write
716000C88000
trusted library allocation
page read and write
220ABD80000
trusted library section
page readonly
308A000
heap
page read and write
220B5A4E000
trusted library section
page read and write
630800210000
direct allocation
page read and write
716000A3C000
trusted library allocation
page read and write
716000C78000
trusted library allocation
page read and write
18D000201000
trusted library allocation
page read and write
7160006E0000
trusted library allocation
page read and write
18D00087C000
trusted library allocation
page read and write
3088000
heap
page read and write
3419000
heap
page read and write
18D0002D4000
trusted library allocation
page read and write
5635DFA000
stack
page read and write
220B3882000
trusted library allocation
page read and write
716000AE0000
trusted library allocation
page read and write
EFE000
unkown
page read and write
7160006C0000
trusted library allocation
page read and write
There are 924 hidden memdumps, click here to show them.