IOC Report
X9d3758tok.exe

loading gif

Files

File Path
Type
Category
Malicious
X9d3758tok.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\BAAEHDBFID.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\Google\Chrome\updater.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_X9d3758tok.exe_7beab63b6af36e3551497cf0b8abc9f9e755e32_9a3c7dcd_3211a849-280e-456f-90ae-65679047e3ad\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\chrome.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\chrome_93[1].exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\System32\drivers\etc\hosts
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\ECBAEBGHDAECBGDGCAKEGHIIDA
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\FCAFIJJJKEGIECAKKEHIDHDAKK
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\IEHDBAAFIDGDAAAAAAAA
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\JEGHDAFIDGDAAKEBFHDA
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\JKFIDGDH
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KFCFIEHC
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KKJKKJJKJEGIECAKJJEB
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x070851ee, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB4B2.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Oct 29 03:17:39 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB698.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB6C7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB6E5.tmp.csv
data
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB763.tmp.txt
data
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0aj2w0z4.lbt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3fhc2j4o.ruj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ezisbe4z.qu5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kqfuyngo.aub.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
Chrome Cache Entry: 100
ASCII text, with very long lines (2287)
downloaded
Chrome Cache Entry: 101
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 95
ASCII text, with very long lines (5162), with no line terminators
downloaded
Chrome Cache Entry: 96
ASCII text, with very long lines (779)
downloaded
Chrome Cache Entry: 97
ASCII text
downloaded
Chrome Cache Entry: 98
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 99
ASCII text, with very long lines (1302)
downloaded
There are 42 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\X9d3758tok.exe
"C:\Users\user\Desktop\X9d3758tok.exe"
malicious
C:\ProgramData\BAAEHDBFID.exe
"C:\ProgramData\BAAEHDBFID.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop UsoSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop WaaSMedicSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop wuauserv
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop bits
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop dosvc
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop eventlog
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"
malicious
C:\ProgramData\Google\Chrome\updater.exe
C:\ProgramData\Google\Chrome\updater.exe
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2556 --field-trial-handle=2272,i,12078058665247208728,2668639212947365791,262144 /prefetch:8
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\ProgramData\BAAEHDBFID.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 7484 -ip 7484
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7484 -s 3096
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wusa.exe
wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 34 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://77.83.175.105/4db719b1f2f948b0/softokn3.dll
77.83.175.105
malicious
https://campuspersever.es/chrome_93.exe
87.106.236.48
malicious
http://77.83.175.105/4db719b1f2f948b0/nss3.dll
77.83.175.105
malicious
http://77.83.175.105/
77.83.175.105
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
http://77.83.175.105/4db719b1f2f948b0/sqlite3.dll3
unknown
https://docs.google.com/document/J
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://issuetracker.google.com/284462263
unknown
https://google-ohttp-relay-join.fastly-edge.com/C
unknown
https://publickeyservice.gcp.privacysandboxservices.com
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://google-ohttp-relay-join.fastly-edge.com/F
unknown
https://publickeyservice.pa.aws.privacysandboxservices.com
unknown
https://g.live.com/odclientsettings/Prod.C:
unknown
https://anglebug.com/7714
unknown
http://77.83.175.10518a9a962225b1ffb.phpition:
unknown
https://google-ohttp-relay-join.fastly-edge.com/H
unknown
https://google-ohttp-relay-join.fastly-edge.com/O
unknown
https://google-ohttp-relay-join.fastly-edge.com/yq
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
http://77.83.175.105/4db719b1f2f948b0/mozglue.dllk
unknown
https://drive.google.com/?lfhs=2
unknown
https://google-ohttp-relay-join.fastly-edge.com/U
unknown
http://anglebug.com/6248
unknown
https://ogs.google.com/widget/callout?eom=1
unknown
http://anglebug.com/6929
unknown
https://google-ohttp-relay-join.fastly-edge.com/zp
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17icrosoft
unknown
http://anglebug.com/5281
unknown
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
unknown
https://www.youtube.com/?feature=ytca
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://google-ohttp-relay-join.fastly-edge.com/e
unknown
https://issuetracker.google.com/255411748
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Ed1aWxkV
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.ver)
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://issuetracker.google.com/161903006
unknown
http://77.83.175.105/18a9a962225b1ffb.phpition:
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
https://google-ohttp-relay-join.fastly-edge.com/Jq
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://anglebug.com/7556
unknown
https://drive-preprod.corp.google.com/
unknown
https://publickeyservice.pa.gcp.privacysandboxservices.com
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://77.83.175.105/18a9a962225b1ffb.php:
unknown
http://anglebug.com/3862
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
http://77.83.175.105/4db719b1f2f948b0/msvcp140.dll=
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://docs.google.com/document/d/1z2sdBwnUF2tSlhl3R2iUlk7gvmSbuLVXOgriPIcJkXQ/preview29
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://77.83.175.105/18a9a962225b1ffb.php#
unknown
https://mail.google.com/mail/?tab=rm&ogbl
unknown
http://anglebug.com/3970
unknown
https://google-ohttp-relay-join.fastly-edge.com/Tq
unknown
https://apis.google.com
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://labs.google.com/search?source=ntp
unknown
https://google-ohttp-relay-join.fastly-edge.com/eq
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
https://google-ohttp-relay-join.fastly-edge.com/hj
unknown
http://anglebug.com/7761
unknown
https://ogs.google.com/widget/app/so?eom=1
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
apis.google.com
unknown
malicious
plus.l.google.com
142.250.185.142
play.google.com
142.250.185.78
www.google.com
142.250.186.100
campuspersever.es
87.106.236.48

IPs

IP
Domain
Country
Malicious
77.83.175.105
unknown
Ukraine
malicious
192.168.2.4
unknown
unknown
malicious
142.250.185.78
play.google.com
United States
87.106.236.48
campuspersever.es
Germany
239.255.255.250
unknown
Reserved
142.250.186.100
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT
DontOfferThroughWUAU
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\7484
Terminator
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\7484
Reason
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\7484
CreationTime
\REGISTRY\A\{7742da8e-7a47-ceb1-8a2b-9540789c1609}\Root\InventoryApplicationFile\x9d3758tok.exe|e5a31eeff1c2a107
ProgramId
\REGISTRY\A\{7742da8e-7a47-ceb1-8a2b-9540789c1609}\Root\InventoryApplicationFile\x9d3758tok.exe|e5a31eeff1c2a107
FileId
\REGISTRY\A\{7742da8e-7a47-ceb1-8a2b-9540789c1609}\Root\InventoryApplicationFile\x9d3758tok.exe|e5a31eeff1c2a107
LowerCaseLongPath
\REGISTRY\A\{7742da8e-7a47-ceb1-8a2b-9540789c1609}\Root\InventoryApplicationFile\x9d3758tok.exe|e5a31eeff1c2a107
LongPathHash
\REGISTRY\A\{7742da8e-7a47-ceb1-8a2b-9540789c1609}\Root\InventoryApplicationFile\x9d3758tok.exe|e5a31eeff1c2a107
Name
\REGISTRY\A\{7742da8e-7a47-ceb1-8a2b-9540789c1609}\Root\InventoryApplicationFile\x9d3758tok.exe|e5a31eeff1c2a107
OriginalFileName
\REGISTRY\A\{7742da8e-7a47-ceb1-8a2b-9540789c1609}\Root\InventoryApplicationFile\x9d3758tok.exe|e5a31eeff1c2a107
Publisher
\REGISTRY\A\{7742da8e-7a47-ceb1-8a2b-9540789c1609}\Root\InventoryApplicationFile\x9d3758tok.exe|e5a31eeff1c2a107
Version
\REGISTRY\A\{7742da8e-7a47-ceb1-8a2b-9540789c1609}\Root\InventoryApplicationFile\x9d3758tok.exe|e5a31eeff1c2a107
BinFileVersion
\REGISTRY\A\{7742da8e-7a47-ceb1-8a2b-9540789c1609}\Root\InventoryApplicationFile\x9d3758tok.exe|e5a31eeff1c2a107
BinaryType
\REGISTRY\A\{7742da8e-7a47-ceb1-8a2b-9540789c1609}\Root\InventoryApplicationFile\x9d3758tok.exe|e5a31eeff1c2a107
ProductName
\REGISTRY\A\{7742da8e-7a47-ceb1-8a2b-9540789c1609}\Root\InventoryApplicationFile\x9d3758tok.exe|e5a31eeff1c2a107
ProductVersion
\REGISTRY\A\{7742da8e-7a47-ceb1-8a2b-9540789c1609}\Root\InventoryApplicationFile\x9d3758tok.exe|e5a31eeff1c2a107
LinkDate
\REGISTRY\A\{7742da8e-7a47-ceb1-8a2b-9540789c1609}\Root\InventoryApplicationFile\x9d3758tok.exe|e5a31eeff1c2a107
BinProductVersion
\REGISTRY\A\{7742da8e-7a47-ceb1-8a2b-9540789c1609}\Root\InventoryApplicationFile\x9d3758tok.exe|e5a31eeff1c2a107
AppxPackageFullName
\REGISTRY\A\{7742da8e-7a47-ceb1-8a2b-9540789c1609}\Root\InventoryApplicationFile\x9d3758tok.exe|e5a31eeff1c2a107
AppxPackageRelativeId
\REGISTRY\A\{7742da8e-7a47-ceb1-8a2b-9540789c1609}\Root\InventoryApplicationFile\x9d3758tok.exe|e5a31eeff1c2a107
Size
\REGISTRY\A\{7742da8e-7a47-ceb1-8a2b-9540789c1609}\Root\InventoryApplicationFile\x9d3758tok.exe|e5a31eeff1c2a107
Language
\REGISTRY\A\{7742da8e-7a47-ceb1-8a2b-9540789c1609}\Root\InventoryApplicationFile\x9d3758tok.exe|e5a31eeff1c2a107
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
84E000
heap
page read and write
malicious
23E0000
direct allocation
page execute and read and write
malicious
2540000
direct allocation
page read and write
malicious
400000
unkown
page execute and read and write
malicious
2838012B4000
trusted library allocation
page read and write
1AE61000
heap
page read and write
283800C60000
trusted library allocation
page read and write
21092000
heap
page read and write
7FF7BAEC2000
unkown
page readonly
7FF7BA675000
unkown
page readonly
283802F1C000
trusted library allocation
page read and write
28380142C000
trusted library allocation
page read and write
1AE61000
heap
page read and write
20FD0000
heap
page read and write
283800C78000
trusted library allocation
page read and write
19E8310B000
heap
page read and write
273A7C80000
heap
page read and write
283800EA4000
trusted library allocation
page read and write
7FF7FC378000
unkown
page execute and read and write
2838001F4000
trusted library allocation
page read and write
1FEE44D8000
heap
page read and write
19E8310B000
heap
page read and write
19E830E4000
heap
page read and write
7FF7BA95D000
unkown
page execute and read and write
1F931106000
heap
page read and write
283800FA8000
trusted library allocation
page read and write
7FF7BAEC2000
unkown
page readonly
19E830E3000
heap
page read and write
283801820000
trusted library allocation
page read and write
283801A34000
trusted library allocation
page read and write
283801B00000
trusted library allocation
page read and write
283801A60000
trusted library allocation
page read and write
283802EF4000
trusted library allocation
page read and write
1F9366C4000
heap
page read and write
43D800688000
trusted library allocation
page read and write
2838015AC000
trusted library allocation
page read and write
283801730000
trusted library allocation
page read and write
24943D70000
direct allocation
page read and write
19E830EA000
heap
page read and write
19E830E4000
heap
page read and write
AF9BCFE000
stack
page read and write
24941F90000
direct allocation
page read and write
19E830EA000
heap
page read and write
28241E02000
heap
page read and write
2838012FC000
trusted library allocation
page read and write
1F936600000
heap
page read and write
283801258000
trusted library allocation
page read and write
2281D0F0000
heap
page read and write
4082B7E000
unkown
page readonly
4084C7E000
unkown
page readonly
2838013D0000
trusted library allocation
page read and write
6E8000
unkown
page execute and read and write
283800224000
trusted library allocation
page read and write
283801C0C000
trusted library allocation
page read and write
283800A10000
trusted library allocation
page read and write
1F9366E6000
heap
page read and write
283800F38000
trusted library allocation
page read and write
283800F48000
trusted library allocation
page read and write
1F936708000
heap
page read and write
20EEE000
heap
page read and write
19E830EA000
heap
page read and write
19BE47E000
stack
page read and write
43D80080C000
trusted library allocation
page read and write
19E830E5000
heap
page read and write
283800C70000
trusted library allocation
page read and write
20EF5000
heap
page read and write
1F936700000
heap
page read and write
19E830FC000
heap
page read and write
24943D70000
unkown
page read and write
7FF7B9FA2000
unkown
page readonly
19E830EA000
heap
page read and write
A88937E000
stack
page read and write
43D800354000
trusted library allocation
page read and write
283801C18000
trusted library allocation
page read and write
43D800320000
trusted library allocation
page read and write
283800394000
trusted library allocation
page read and write
16D668C0000
heap
page read and write
283801D4C000
trusted library allocation
page read and write
19E8311F000
heap
page read and write
16D66A13000
unkown
page read and write
A048E7F000
stack
page read and write
16D66D13000
heap
page read and write
19E830EA000
heap
page read and write
283800304000
trusted library allocation
page read and write
43D800614000
trusted library allocation
page read and write
212E8000
heap
page read and write
43D8006C8000
trusted library allocation
page read and write
273A7CC5000
heap
page read and write
43D8006D4000
trusted library allocation
page read and write
283800BE1000
trusted library allocation
page read and write
283801558000
trusted library allocation
page read and write
283801538000
trusted library allocation
page read and write
19E830EA000
heap
page read and write
19E830D2000
heap
page read and write
AB1818D000
stack
page read and write
28380039C000
trusted library allocation
page read and write
283802EFC000
trusted library allocation
page read and write
3C2C07F000
stack
page read and write
6D079000
unkown
page readonly
1F936640000
heap
page read and write
20EEB000
heap
page read and write
1A7BE000
stack
page read and write
1F9368F1000
trusted library allocation
page read and write
408467E000
unkown
page readonly
1F936818000
trusted library allocation
page read and write
1FEE44D0000
heap
page read and write
19E830E3000
heap
page read and write
AF9B4FD000
stack
page read and write
1F936810000
trusted library allocation
page read and write
19E830DF000
heap
page read and write
2838003A8000
trusted library allocation
page read and write
24941F90000
direct allocation
page read and write
1F9310B9000
heap
page read and write
283801B98000
trusted library allocation
page read and write
19E83117000
heap
page read and write
283800A10000
trusted library allocation
page read and write
19E830EA000
heap
page read and write
2838002A4000
trusted library allocation
page read and write
266A7D000
stack
page read and write
7FF7BA9F8000
unkown
page execute and read and write
28380142C000
trusted library allocation
page read and write
283800ED8000
trusted library allocation
page read and write
14897870000
direct allocation
page read and write
14897170000
direct allocation
page read and write
267E000
stack
page read and write
283801784000
trusted library allocation
page read and write
19E830D5000
heap
page read and write
2838019F0000
trusted library allocation
page read and write
43D800698000
trusted library allocation
page read and write
269FCDE8000
heap
page read and write
16D66B00000
trusted library allocation
page read and write
283800304000
trusted library allocation
page read and write
1D734FB000
stack
page read and write
61E00000
direct allocation
page execute and read and write
D7360FF000
stack
page read and write
1F9366F8000
heap
page read and write
2123F000
stack
page read and write
273A7CA0000
heap
page read and write
2838018CC000
trusted library allocation
page read and write
19E8366A000
heap
page read and write
283801598000
trusted library allocation
page read and write
4083B7C000
stack
page read and write
28241D50000
heap
page read and write
4083C7E000
unkown
page readonly
493000
unkown
page write copy
19E830FC000
heap
page read and write
28380189C000
trusted library allocation
page read and write
19E830EF000
heap
page read and write
283800394000
trusted library allocation
page read and write
19E8310A000
heap
page read and write
19E830E7000
heap
page read and write
283800A10000
trusted library allocation
page read and write
1F93191A000
heap
page read and write
283802C0C000
trusted library allocation
page read and write
283801248000
trusted library allocation
page read and write
19E830EA000
heap
page read and write
19E83692000
heap
page read and write
283800BD4000
trusted library allocation
page read and write
1AC9D000
stack
page read and write
283801B04000
trusted library allocation
page read and write
283801ADC000
trusted library allocation
page read and write
19E830E3000
heap
page read and write
408437B000
stack
page read and write
28380169C000
trusted library allocation
page read and write
1F931117000
heap
page read and write
2838013B4000
trusted library allocation
page read and write
1F931013000
heap
page read and write
19E830E4000
heap
page read and write
283802EFC000
trusted library allocation
page read and write
28380158C000
trusted library allocation
page read and write
20F02000
heap
page read and write
3C2BDCF000
stack
page read and write
1388002C0000
trusted library allocation
page read and write
283801A30000
trusted library allocation
page read and write
2838016D8000
trusted library allocation
page read and write
19E830E4000
heap
page read and write
2838016B0000
trusted library allocation
page read and write
43D800694000
trusted library allocation
page read and write
19E830E0000
heap
page read and write
283801C54000
trusted library allocation
page read and write
43D8006FC000
trusted library allocation
page read and write
7FF7FB925000
unkown
page read and write
2838017B0000
trusted library allocation
page read and write
19E830F7000
heap
page read and write
19E830EA000
heap
page read and write
20EEE000
heap
page read and write
1F936856000
trusted library allocation
page read and write
19E830DF000
heap
page read and write
283800CB8000
trusted library allocation
page read and write
14897170000
direct allocation
page read and write
283800C14000
trusted library allocation
page read and write
1F9364C0000
trusted library allocation
page read and write
1388002C0000
trusted library allocation
page read and write
1F93191B000
heap
page read and write
283800EE8000
trusted library allocation
page read and write
283801C28000
trusted library allocation
page read and write
20ED0000
heap
page read and write
230983E5000
heap
page read and write
24941F90000
direct allocation
page read and write
19E830F1000
heap
page read and write
43D800678000
trusted library allocation
page read and write
283802EFC000
trusted library allocation
page read and write
1F9364C0000
trusted library allocation
page read and write
19E83100000
heap
page read and write
43D80060C000
trusted library allocation
page read and write
283800214000
trusted library allocation
page read and write
283800F48000
trusted library allocation
page read and write
283800BE1000
trusted library allocation
page read and write
20EEF000
heap
page read and write
807000
heap
page read and write
14897170000
direct allocation
page read and write
283802EF0000
trusted library allocation
page read and write
283800BD0000
trusted library allocation
page read and write
1F9368E8000
trusted library allocation
page read and write
283801278000
trusted library allocation
page read and write
283801AFC000
trusted library allocation
page read and write
7FF7FB910000
unkown
page readonly
283801554000
trusted library allocation
page read and write
1388002A4000
trusted library allocation
page read and write
648000
unkown
page execute and read and write
408357B000
stack
page read and write
283800BD0000
trusted library allocation
page read and write
38580FE000
stack
page read and write
2838002B8000
trusted library allocation
page read and write
19E830EA000
heap
page read and write
228F4700000
heap
page read and write
283800304000
trusted library allocation
page read and write
283801A88000
trusted library allocation
page read and write
24941FC0000
unkown
page read and write
2838001AC000
trusted library allocation
page read and write
AF9B7FE000
unkown
page readonly
43D8003EC000
trusted library allocation
page read and write
28380100C000
trusted library allocation
page read and write
28241E2B000
heap
page read and write
1F9310B5000
heap
page read and write
1F147FE8000
heap
page read and write
7FF7BA675000
unkown
page readonly
43D800380000
trusted library allocation
page read and write
2838016C4000
trusted library allocation
page read and write
283801C58000
trusted library allocation
page read and write
1F9368A3000
trusted library allocation
page read and write
19E8368B000
heap
page read and write
1F932401000
trusted library allocation
page read and write
283801674000
trusted library allocation
page read and write
19E830DC000
heap
page read and write
28380140C000
trusted library allocation
page read and write
1AA4E000
stack
page read and write
283800388000
trusted library allocation
page read and write
2838003A8000
trusted library allocation
page read and write
1F1E61D8000
heap
page read and write
7FF7FBFF1000
unkown
page readonly
28380199C000
trusted library allocation
page read and write
283802F0C000
trusted library allocation
page read and write
283800F2C000
trusted library allocation
page read and write
19E830DD000
heap
page read and write
197000
stack
page read and write
1EF47D45000
heap
page read and write
19E830F1000
heap
page read and write
283800218000
trusted library allocation
page read and write
807000
heap
page read and write
7FF7BA957000
unkown
page execute and read and write
20F1B000
heap
page read and write
283800F48000
trusted library allocation
page read and write
273A7CC0000
heap
page read and write
28380179C000
trusted library allocation
page read and write
283800F70000
trusted library allocation
page read and write
2882EC78000
heap
page read and write
1F93688E000
trusted library allocation
page read and write
2838003D8000
trusted library allocation
page read and write
5A7000
unkown
page execute and read and write
19E830F1000
heap
page read and write
19E830E5000
heap
page read and write
1F936800000
trusted library allocation
page read and write
1A269050000
heap
page read and write
16D66A11000
unkown
page read and write
14896E9E000
heap
page read and write
283801BE8000
trusted library allocation
page read and write
283801A64000
trusted library allocation
page read and write
20F6B000
heap
page read and write
1F93686C000
trusted library allocation
page read and write
1F9364D0000
trusted library allocation
page read and write
283801718000
trusted library allocation
page read and write
283801AD8000
trusted library allocation
page read and write
19E8310B000
heap
page read and write
273A7D20000
heap
page read and write
1F936620000
heap
page read and write
1F936B20000
trusted library allocation
page read and write
28380160C000
trusted library allocation
page read and write
24941F90000
direct allocation
page read and write
20EEE000
heap
page read and write
283801C84000
trusted library allocation
page read and write
2838019C8000
trusted library allocation
page read and write
27D40000
heap
page read and write
24941F90000
direct allocation
page read and write
1F93691A000
trusted library allocation
page read and write
19E830EA000
heap
page read and write
43D80069C000
trusted library allocation
page read and write
1F936891000
trusted library allocation
page read and write
1388002D8000
trusted library allocation
page read and write
28241E26000
heap
page read and write
1F931913000
heap
page read and write
19E830EA000
heap
page read and write
902000
heap
page read and write
84A000
heap
page read and write
283800394000
trusted library allocation
page read and write
283801318000
trusted library allocation
page read and write
1F936907000
trusted library allocation
page read and write
283800BD0000
trusted library allocation
page read and write
1F936B10000
trusted library allocation
page read and write
19E830FB000
heap
page read and write
15559968000
heap
page read and write
4083A7E000
unkown
page readonly
283800E58000
trusted library allocation
page read and write
43D8006E8000
trusted library allocation
page read and write
2838003A8000
trusted library allocation
page read and write
283800320000
trusted library allocation
page read and write
283800304000
trusted library allocation
page read and write
7FF7BABBC000
unkown
page execute read
2838001E8000
trusted library allocation
page read and write
7FF7FC2C7000
unkown
page execute and read and write
283801734000
trusted library allocation
page read and write
7FF7FC372000
unkown
page execute and read and write
2494459E000
unkown
page read and write
283800BE1000
trusted library allocation
page read and write
1ACEE000
stack
page read and write
283801334000
trusted library allocation
page read and write
283800BD0000
trusted library allocation
page read and write
16D66B15000
trusted library allocation
page read and write
1F1E6180000
heap
page read and write
1F931079000
heap
page read and write
A88947F000
stack
page read and write
2838016E0000
trusted library allocation
page read and write
283800C78000
trusted library allocation
page read and write
40827FB000
stack
page read and write
19E830CE000
heap
page read and write
283800394000
trusted library allocation
page read and write
283800394000
trusted library allocation
page read and write
6F902000
unkown
page readonly
283801991000
trusted library allocation
page read and write
1FEE4480000
heap
page read and write
24942285000
heap
page read and write
283800C78000
trusted library allocation
page read and write
1F1E61B0000
heap
page read and write
43D80033C000
trusted library allocation
page read and write
228F4528000
heap
page read and write
2838015B8000
trusted library allocation
page read and write
20EF7000
heap
page read and write
2838015E4000
trusted library allocation
page read and write
18F27725000
heap
page read and write
7FF7FBFEE000
unkown
page readonly
6F8FE000
unkown
page read and write
283800F6C000
trusted library allocation
page read and write
28380154C000
trusted library allocation
page read and write
2838015E8000
trusted library allocation
page read and write
283801988000
trusted library allocation
page read and write
283801C54000
trusted library allocation
page read and write
197400244000
direct allocation
page read and write
20F05000
heap
page read and write
283802EE4000
trusted library allocation
page read and write
2838001F0000
trusted library allocation
page read and write
43D800310000
trusted library allocation
page read and write
2838015B0000
trusted library allocation
page read and write
20FF0000
heap
page read and write
283800230000
trusted library allocation
page read and write
283800F70000
trusted library allocation
page read and write
2838002A4000
trusted library allocation
page read and write
283800AF4000
trusted library allocation
page read and write
2530000
heap
page read and write
28241E22000
heap
page read and write
2838017B4000
trusted library allocation
page read and write
2882EC35000
heap
page read and write
2838012FC000
trusted library allocation
page read and write
283800380000
trusted library allocation
page read and write
1D730AD000
stack
page read and write
18F275A0000
heap
page read and write
1AB4E000
stack
page read and write
20EEE000
heap
page read and write
1F147F10000
heap
page read and write
16D66A76000
heap
page read and write
7FF7FBFF5000
unkown
page readonly
228F4870000
heap
page read and write
1F1E61D0000
heap
page read and write
283800374000
trusted library allocation
page read and write
283801524000
trusted library allocation
page read and write
7FF7FB925000
unkown
page write copy
19E830D6000
heap
page read and write
7FF7BA671000
unkown
page readonly
16D668E0000
heap
page read and write
283801C48000
trusted library allocation
page read and write
28380020C000
trusted library allocation
page read and write
43D800248000
trusted library allocation
page read and write
19E830E3000
heap
page read and write
2838001E0000
trusted library allocation
page read and write
283800C78000
trusted library allocation
page read and write
28242602000
trusted library allocation
page read and write
283800EB4000
trusted library allocation
page read and write
283801C54000
trusted library allocation
page read and write
283801A0C000
trusted library allocation
page read and write
2838016F0000
trusted library allocation
page read and write
16D669C0000
trusted library allocation
page read and write
2838012FC000
trusted library allocation
page read and write
28380142C000
trusted library allocation
page read and write
19E830E3000
heap
page read and write
283800C78000
trusted library allocation
page read and write
2838012B4000
trusted library allocation
page read and write
1388002A0000
trusted library allocation
page read and write
41C000
unkown
page execute read
20EDD000
heap
page read and write
2838013D0000
trusted library allocation
page read and write
1F9366EC000
heap
page read and write
19E830EA000
heap
page read and write
19E830EA000
heap
page read and write
1388002A0000
trusted library allocation
page read and write
24941FB0000
unkown
page read and write
61ED3000
direct allocation
page read and write
7FF7BA9B7000
unkown
page execute and read and write
283800F6C000
trusted library allocation
page read and write
61ED4000
direct allocation
page readonly
283801B3C000
trusted library allocation
page read and write
6F870000
unkown
page readonly
2838001F8000
trusted library allocation
page read and write
28380184C000
trusted library allocation
page read and write
283801898000
trusted library allocation
page read and write
20F10000
heap
page read and write
2838015F4000
trusted library allocation
page read and write
2838013B4000
trusted library allocation
page read and write
1BC11A50000
heap
page read and write
283800C60000
trusted library allocation
page read and write
2838001DC000
trusted library allocation
page read and write
1388002B0000
trusted library allocation
page read and write
19E8310B000
heap
page read and write
7FF7FB922000
unkown
page readonly
283800F04000
trusted library allocation
page read and write
5AA000
unkown
page execute and read and write
2882EC30000
heap
page read and write
283801528000
trusted library allocation
page read and write
20F02000
heap
page read and write
1BC11C80000
heap
page read and write
4084BFE000
stack
page read and write
385817E000
stack
page read and write
16D66A2B000
heap
page read and write
8FD000
heap
page read and write
1BC11A58000
heap
page read and write
4082BFD000
stack
page read and write
408327E000
unkown
page readonly
19E830EA000
heap
page read and write
230983C0000
heap
page read and write
2838002A4000
trusted library allocation
page read and write
43D800630000
trusted library allocation
page read and write
283801AF4000
trusted library allocation
page read and write
283801770000
trusted library allocation
page read and write
1F93102B000
heap
page read and write
14897170000
direct allocation
page read and write
7FF7FBFF1000
unkown
page readonly
19E830EA000
heap
page read and write
AB184FF000
stack
page read and write
1F936AA0000
trusted library allocation
page read and write
19E830C9000
heap
page read and write
283801B40000
trusted library allocation
page read and write
283800368000
trusted library allocation
page read and write
43D800408000
trusted library allocation
page read and write
28380168C000
trusted library allocation
page read and write
C5E0DCD000
stack
page read and write
43D800664000
trusted library allocation
page read and write
283800F38000
trusted library allocation
page read and write
19E830DC000
heap
page read and write
19E830EA000
heap
page read and write
28380178C000
trusted library allocation
page read and write
1F9368A0000
trusted library allocation
page read and write
43D800734000
trusted library allocation
page read and write
7FF7FC2B7000
unkown
page execute and read and write
7FF7FBFF3000
unkown
page read and write
19E830CE000
heap
page read and write
2838019C4000
trusted library allocation
page read and write
2838001EC000
trusted library allocation
page read and write
20F10000
heap
page read and write
1A77F000
stack
page read and write
7FF7FC53C000
unkown
page execute read
269FCDE0000
heap
page read and write
1F931096000
heap
page read and write
28380162C000
trusted library allocation
page read and write
19E830EA000
heap
page read and write
7BAEDFF000
stack
page read and write
283800BE1000
trusted library allocation
page read and write
2838017A0000
trusted library allocation
page read and write
1A268E20000
heap
page read and write
2838017EC000
trusted library allocation
page read and write
1F931802000
heap
page read and write
2838012B4000
trusted library allocation
page read and write
283800F2C000
trusted library allocation
page read and write
61ECC000
direct allocation
page read and write
2838015E0000
trusted library allocation
page read and write
807000
heap
page read and write
283801B0C000
trusted library allocation
page read and write
2838002A4000
trusted library allocation
page read and write
1F936504000
trusted library allocation
page read and write
7BAEEFE000
stack
page read and write
1AFB4FD000
stack
page read and write
408367E000
unkown
page readonly
19E83669000
heap
page read and write
1F9368FF000
trusted library allocation
page read and write
915000
heap
page read and write
283800E0C000
trusted library allocation
page read and write
2838002F3000
trusted library allocation
page read and write
19E83662000
heap
page read and write
283801708000
trusted library allocation
page read and write
408347E000
unkown
page readonly
AC8DF7E000
stack
page read and write
19E83146000
heap
page read and write
283801780000
trusted library allocation
page read and write
24941F90000
direct allocation
page read and write
1F9368C2000
trusted library allocation
page read and write
19E830D3000
heap
page read and write
14897170000
direct allocation
page read and write
2838002A4000
trusted library allocation
page read and write
283800EA4000
trusted library allocation
page read and write
19E830EA000
heap
page read and write
43D8006F0000
trusted library allocation
page read and write
283801B10000
trusted library allocation
page read and write
16D66C13000
heap
page read and write
19E830DC000
heap
page read and write
2838016F4000
trusted library allocation
page read and write
28380183C000
trusted library allocation
page read and write
7FF7FBFF6000
unkown
page execute and read and write
1F932430000
trusted library allocation
page read and write
138800248000
trusted library allocation
page read and write
385807C000
stack
page read and write
283801760000
trusted library allocation
page read and write
19E830EA000
heap
page read and write
19E830E3000
heap
page read and write
283801710000
trusted library allocation
page read and write
1F936872000
trusted library allocation
page read and write
2882EC40000
heap
page read and write
19BE12D000
stack
page read and write
1A268E88000
heap
page read and write
230983F8000
heap
page read and write
D200F7F000
stack
page read and write
C5E10FF000
stack
page read and write
21031000
heap
page read and write
805000
heap
page read and write
19E830E4000
heap
page read and write
283801A7C000
trusted library allocation
page read and write
2838003D8000
trusted library allocation
page read and write
7FF7B9F90000
unkown
page readonly
283801680000
trusted library allocation
page read and write
2281D0F7000
heap
page read and write
21260000
remote allocation
page read and write
28380182C000
trusted library allocation
page read and write
1F9365C0000
trusted library allocation
page read and write
19E830E5000
heap
page read and write
19E8310B000
heap
page read and write
28380164C000
trusted library allocation
page read and write
59B000
unkown
page execute and read and write
14897170000
direct allocation
page read and write
6C87F000
unkown
page write copy
283801A9C000
trusted library allocation
page read and write
212DA000
heap
page read and write
1F0000
heap
page read and write
24941F90000
direct allocation
page read and write
2882EC70000
heap
page read and write
9B000
stack
page read and write
2838003A8000
trusted library allocation
page read and write
19E8311F000
heap
page read and write
43D800320000
trusted library allocation
page read and write
1F9364D1000
trusted library allocation
page read and write
7FF7BA937000
unkown
page execute and read and write
19E830F3000
heap
page read and write
2281D3B0000
heap
page read and write
7FF7B9F90000
unkown
page readonly
1F936704000
heap
page read and write
1F936860000
remote allocation
page read and write
2838013A4000
trusted library allocation
page read and write
7FF7BA66E000
unkown
page readonly
6F8ED000
unkown
page readonly
21011000
heap
page read and write
56E000
unkown
page execute and read and write
283800A10000
trusted library allocation
page read and write
7FF7BA959000
unkown
page execute and read and write
1F9365A0000
trusted library allocation
page read and write
283801B60000
trusted library allocation
page read and write
192000
stack
page read and write
19E830E4000
heap
page read and write
408457D000
stack
page read and write
28380166C000
trusted library allocation
page read and write
514000
unkown
page execute and read and write
283802EE0000
trusted library allocation
page read and write
1F1481F5000
heap
page read and write
24941F90000
direct allocation
page read and write
1F9365B0000
trusted library allocation
page read and write
18F273D0000
heap
page read and write
14897170000
direct allocation
page read and write
1AF62000
heap
page read and write
283801548000
trusted library allocation
page read and write
283801993000
trusted library allocation
page read and write
D7361FF000
stack
page read and write
283801B34000
trusted library allocation
page read and write
15559930000
heap
page read and write
7BAECFF000
stack
page read and write
20ED4000
heap
page read and write
19E830F1000
heap
page read and write
19E830E4000
heap
page read and write
1F9364D2000
trusted library allocation
page read and write
43D80075C000
trusted library allocation
page read and write
1AFB7FE000
stack
page read and write
283801738000
trusted library allocation
page read and write
1AF60000
trusted library allocation
page read and write
56B308D000
stack
page read and write
1F93680E000
trusted library allocation
page read and write
1388002C0000
trusted library allocation
page read and write
2838016C8000
trusted library allocation
page read and write
28380142C000
trusted library allocation
page read and write
283800F70000
trusted library allocation
page read and write
19E830EB000
heap
page read and write
283801768000
trusted library allocation
page read and write
1388002C0000
trusted library allocation
page read and write
908000
heap
page read and write
283800394000
trusted library allocation
page read and write
28241E32000
heap
page read and write
283800F2C000
trusted library allocation
page read and write
283800F2C000
trusted library allocation
page read and write
20F02000
heap
page read and write
20EEE000
heap
page read and write
283800BD4000
trusted library allocation
page read and write
283800F2C000
trusted library allocation
page read and write
16D66C02000
heap
page read and write
1F9368FC000
trusted library allocation
page read and write
269FCFD5000
heap
page read and write
16D66B02000
trusted library allocation
page read and write
1F931900000
heap
page read and write
2838002A8000
trusted library allocation
page read and write
2838017E8000
trusted library allocation
page read and write
283801878000
trusted library allocation
page read and write
283801474000
trusted library allocation
page read and write
2838012D8000
trusted library allocation
page read and write
283801788000
trusted library allocation
page read and write
283801C6C000
trusted library allocation
page read and write
283800FCC000
trusted library allocation
page read and write
43D800730000
trusted library allocation
page read and write
408447E000
unkown
page readonly
283801078000
trusted library allocation
page read and write
20ED0000
trusted library allocation
page read and write
283800320000
trusted library allocation
page read and write
43D800700000
trusted library allocation
page read and write
28380137C000
trusted library allocation
page read and write
1A268E80000
heap
page read and write
283801394000
trusted library allocation
page read and write
283801AF4000
trusted library allocation
page read and write
56B318E000
stack
page read and write
20EF3000
heap
page read and write
1388002A0000
trusted library allocation
page read and write
1F1481F0000
heap
page read and write
228F4620000
heap
page read and write
269FCFD0000
heap
page read and write
19E83692000
heap
page read and write
1F930FE0000
heap
page read and write
20F6C000
heap
page read and write
7FF7FC53C000
unkown
page execute read
283800BE1000
trusted library allocation
page read and write
2838016B8000
trusted library allocation
page read and write
1F936702000
heap
page read and write
C5E11FF000
stack
page read and write
57B0BFE000
stack
page read and write
1F931000000
heap
page read and write
1FEE4380000
heap
page read and write
1F93107E000
heap
page read and write
15559B30000
heap
page read and write
283800FA8000
trusted library allocation
page read and write
283800A10000
trusted library allocation
page read and write
1D735FF000
stack
page read and write
1F9310A3000
heap
page read and write
4E6000
unkown
page execute and read and write
228F4720000
heap
page read and write
18F27720000
heap
page read and write
408307E000
unkown
page readonly
2281D0C0000
heap
page read and write
2838016DC000
trusted library allocation
page read and write
283800394000
trusted library allocation
page read and write
1A268E40000
heap
page read and write
228F4875000
heap
page read and write
2838006CC000
trusted library allocation
page read and write
2838013AC000
trusted library allocation
page read and write
20EF4000
heap
page read and write
283801C58000
trusted library allocation
page read and write
2838001B4000
trusted library allocation
page read and write
283801B30000
trusted library allocation
page read and write
43D800368000
trusted library allocation
page read and write
43D800620000
trusted library allocation
page read and write
14897170000
direct allocation
page read and write
283800394000
trusted library allocation
page read and write
283800304000
trusted library allocation
page read and write
230985E0000
heap
page read and write
283801868000
trusted library allocation
page read and write
283800304000
trusted library allocation
page read and write
43D8006E0000
trusted library allocation
page read and write
283801AEC000
trusted library allocation
page read and write
283800C60000
trusted library allocation
page read and write
43D8006B4000
trusted library allocation
page read and write
61E01000
direct allocation
page execute read
2281ECE0000
heap
page read and write
2281D3B5000
heap
page read and write
283801B38000
trusted library allocation
page read and write
2838002A4000
trusted library allocation
page read and write
97E000
stack
page read and write
19E830EA000
heap
page read and write
283801AC4000
trusted library allocation
page read and write
7FF7FB922000
unkown
page readonly
1F936860000
remote allocation
page read and write
283801A98000
trusted library allocation
page read and write
6CFD1000
unkown
page execute read
18F275C0000
heap
page read and write
1F931100000
heap
page read and write
1F1E6550000
heap
page read and write
269FCD50000
heap
page read and write
AF9BDFE000
unkown
page readonly
283800DBC000
trusted library allocation
page read and write
20F02000
heap
page read and write
24941F90000
direct allocation
page read and write
1F9310B5000
heap
page read and write
2838002A8000
trusted library allocation
page read and write
24941E60000
heap
page read and write
1F936864000
trusted library allocation
page read and write
283801AF0000
trusted library allocation
page read and write
1F93684D000
trusted library allocation
page read and write
283801684000
trusted library allocation
page read and write
287E0000
heap
page read and write
1F931815000
heap
page read and write
283801A68000
trusted library allocation
page read and write
2838002A4000
trusted library allocation
page read and write
283802CDC000
trusted library allocation
page read and write
283800234000
trusted library allocation
page read and write
1F931113000
heap
page read and write
28380138C000
trusted library allocation
page read and write
20F13000
heap
page read and write
7FF7BA671000
unkown
page readonly
283801740000
trusted library allocation
page read and write
1A8BF000
stack
page read and write
2882EB50000
heap
page read and write
19E830DB000
heap
page read and write
19E830E4000
heap
page read and write
1388002A0000
trusted library allocation
page read and write
61ECD000
direct allocation
page readonly
19E830EA000
heap
page read and write
19E830F3000
heap
page read and write
4082D77000
stack
page read and write
1F9364B0000
trusted library allocation
page read and write
14897170000
direct allocation
page read and write
43D8006E4000
trusted library allocation
page read and write
19E830F1000
heap
page read and write
2838002A8000
trusted library allocation
page read and write
6C885000
unkown
page readonly
6D077000
unkown
page read and write
283800C10000
trusted library allocation
page read and write
2838012D8000
trusted library allocation
page read and write
408407E000
stack
page read and write
283800394000
trusted library allocation
page read and write
57B0EFE000
stack
page read and write
1F930F00000
heap
page read and write
19E8313A000
heap
page read and write
43D8002FC000
trusted library allocation
page read and write
14897195000
heap
page read and write
20EF7000
heap
page read and write
28380100C000
trusted library allocation
page read and write
283801B20000
trusted library allocation
page read and write
1F931040000
heap
page read and write
2494204C000
heap
page read and write
1EF47AA0000
heap
page read and write
2838012FC000
trusted library allocation
page read and write
283801230000
trusted library allocation
page read and write
1F931670000
trusted library allocation
page read and write
28241E13000
heap
page read and write
283800F04000
trusted library allocation
page read and write
7FF7BA947000
unkown
page execute and read and write
2838003A8000
trusted library allocation
page read and write
283801368000
trusted library allocation
page read and write
43D800750000
trusted library allocation
page read and write
283801C80000
trusted library allocation
page read and write
7FF7FC2C5000
unkown
page execute and read and write
14897190000
heap
page read and write
283801670000
trusted library allocation
page read and write
28241E42000
heap
page read and write
20F05000
heap
page read and write
2882ED70000
heap
page read and write
19E830F5000
heap
page read and write
83E000
heap
page read and write
2838019DC000
trusted library allocation
page read and write
19E83117000
heap
page read and write
833000
heap
page read and write
AF9AF2B000
stack
page read and write
283800394000
trusted library allocation
page read and write
7FF7BA945000
unkown
page execute and read and write
7FF7FBFF3000
unkown
page write copy
19E830E4000
heap
page read and write
283800F90000
trusted library allocation
page read and write
24941F90000
direct allocation
page read and write
43D800644000
trusted library allocation
page read and write
1F931102000
heap
page read and write
8AF000
heap
page read and write
43D800330000
trusted library allocation
page read and write
283801C4C000
trusted library allocation
page read and write
20EF4000
heap
page read and write
1ADED000
stack
page read and write
16D66D02000
heap
page read and write
28380100C000
trusted library allocation
page read and write
43D800624000
trusted library allocation
page read and write
273A7C70000
heap
page read and write
2802C000
stack
page read and write
AF9BBFE000
unkown
page readonly
61EB4000
direct allocation
page read and write
19E830F1000
heap
page read and write
14896E80000
heap
page read and write
1F930EE0000
heap
page read and write
8F5000
heap
page read and write
283801348000
trusted library allocation
page read and write
273A7D29000
heap
page read and write
14896E8C000
heap
page read and write
19E830EA000
heap
page read and write
1D736FE000
stack
page read and write
283801A94000
trusted library allocation
page read and write
1F936440000
trusted library allocation
page read and write
43D8006B0000
trusted library allocation
page read and write
283800F70000
trusted library allocation
page read and write
2360000
direct allocation
page execute and read and write
19C000
stack
page read and write
1F936590000
trusted library allocation
page read and write
283801AE8000
trusted library allocation
page read and write
283801040000
trusted library allocation
page read and write
2838017C0000
trusted library allocation
page read and write
283801D3A000
trusted library allocation
page read and write
7FF7B9FA5000
unkown
page read and write
1F93105D000
heap
page read and write
401000
unkown
page execute read
43D800320000
trusted library allocation
page read and write
283801988000
trusted library allocation
page read and write
283800FCC000
trusted library allocation
page read and write
1AE50000
heap
page read and write
1FEE4460000
heap
page read and write
283801714000
trusted library allocation
page read and write
43D800758000
trusted library allocation
page read and write
1AB9E000
stack
page read and write
283801B44000
trusted library allocation
page read and write
283801880000
trusted library allocation
page read and write
283800F48000
trusted library allocation
page read and write
283801534000
trusted library allocation
page read and write
6C6A1000
unkown
page execute read
283801688000
trusted library allocation
page read and write
263F000
stack
page read and write
28380173C000
trusted library allocation
page read and write
4082C7E000
unkown
page readonly
283801B44000
trusted library allocation
page read and write
2838010D0000
trusted library allocation
page read and write
AF9BAFC000
stack
page read and write
4082AFE000
stack
page read and write
20EF3000
heap
page read and write
2838001C8000
trusted library allocation
page read and write
43D80035C000
trusted library allocation
page read and write
1BC11C85000
heap
page read and write
283800394000
trusted library allocation
page read and write
7BAE90D000
stack
page read and write
283800DC0000
trusted library allocation
page read and write
1A9FF000
stack
page read and write
283800FBC000
trusted library allocation
page read and write
20F1C000
heap
page read and write
283800F2C000
trusted library allocation
page read and write
283800394000
trusted library allocation
page read and write
283801638000
trusted library allocation
page read and write
2838012D8000
trusted library allocation
page read and write
283800660000
trusted library allocation
page read and write
28241C70000
heap
page read and write
20F05000
heap
page read and write
20F1C000
heap
page read and write
19E830EA000
heap
page read and write
20F08000
heap
page read and write
1388002C0000
trusted library allocation
page read and write
283801848000
trusted library allocation
page read and write
28380187C000
trusted library allocation
page read and write
283801550000
trusted library allocation
page read and write
6D031000
unkown
page readonly
1A8FE000
stack
page read and write
283801AB8000
trusted library allocation
page read and write
283801650000
trusted library allocation
page read and write
24941F90000
direct allocation
page read and write
283800394000
trusted library allocation
page read and write
283800F2C000
trusted library allocation
page read and write
90F000
heap
page read and write
19E83689000
heap
page read and write
283800394000
trusted library allocation
page read and write
283800BD0000
trusted library allocation
page read and write
2838016A0000
trusted library allocation
page read and write
7BAE91D000
stack
page read and write
1BC11870000
heap
page read and write
1F9310AB000
heap
page read and write
2838013C4000
trusted library allocation
page read and write
43D800330000
trusted library allocation
page read and write
8F2000
heap
page read and write
19E830F1000
heap
page read and write
282D7000
heap
page read and write
1F931902000
heap
page read and write
D200B5C000
stack
page read and write
1F936430000
trusted library allocation
page read and write
1EF47980000
heap
page read and write
1388002A0000
trusted library allocation
page read and write
283801B8C000
trusted library allocation
page read and write
20F13000
heap
page read and write
7C0000
heap
page read and write
1F93686F000
trusted library allocation
page read and write
4083379000
stack
page read and write
1F9364F0000
trusted library allocation
page read and write
24942040000
heap
page read and write
283800394000
trusted library allocation
page read and write
43D800354000
trusted library allocation
page read and write
28380022C000
trusted library allocation
page read and write
19E830E4000
heap
page read and write
283800368000
trusted library allocation
page read and write
283801568000
trusted library allocation
page read and write
14897170000
direct allocation
page read and write
28380204F000
trusted library allocation
page read and write
16D66D00000
heap
page read and write
2838002A4000
trusted library allocation
page read and write
1F931904000
heap
page read and write
283801648000
trusted library allocation
page read and write
AC8DE7C000
stack
page read and write
28380180C000
trusted library allocation
page read and write
20ED0000
trusted library allocation
page read and write
19E830EA000
heap
page read and write
1AE61000
heap
page read and write
19E830EA000
heap
page read and write
1F9368BA000
trusted library allocation
page read and write
19E830E3000
heap
page read and write
7FF7BA977000
unkown
page execute and read and write
283800228000
trusted library allocation
page read and write
19E830F0000
heap
page read and write
283801634000
trusted library allocation
page read and write
283802EFC000
trusted library allocation
page read and write
28380021C000
trusted library allocation
page read and write
24941F40000
heap
page read and write
283801B74000
trusted library allocation
page read and write
2281D2C0000
heap
page read and write
1F931800000
heap
page read and write
1F147EF0000
heap
page read and write
283800C60000
trusted library allocation
page read and write
7FF7FC2DD000
unkown
page execute and read and write
43D8006BC000
trusted library allocation
page read and write
283801B84000
trusted library allocation
page read and write
212E0000
heap
page read and write
1388002A0000
trusted library allocation
page read and write
7FF7FC2D7000
unkown
page execute and read and write
283801D4E000
trusted library allocation
page read and write
28380039C000
trusted library allocation
page read and write
283800210000
trusted library allocation
page read and write
A88927C000
stack
page read and write
2838003A8000
trusted library allocation
page read and write
283801B44000
trusted library allocation
page read and write
1A269055000
heap
page read and write
1AFB6FE000
stack
page read and write
1AE60000
heap
page read and write
1F9366BD000
heap
page read and write
18F273D8000
heap
page read and write
7FF7FC842000
unkown
page readonly
283800BD4000
trusted library allocation
page read and write
7FF7FC2F7000
unkown
page execute and read and write
4082F7E000
stack
page read and write
283800394000
trusted library allocation
page read and write
7FF7FB911000
unkown
page execute read
61ED0000
direct allocation
page read and write
2838017CC000
trusted library allocation
page read and write
16D66A02000
unkown
page read and write
A048EFF000
stack
page read and write
28380156C000
trusted library allocation
page read and write
283801A48000
trusted library allocation
page read and write
283800304000
trusted library allocation
page read and write
43D80033C000
trusted library allocation
page read and write
283800F6C000
trusted library allocation
page read and write
228F4520000
heap
page read and write
16D66C00000
heap
page read and write
283800AF4000
trusted library allocation
page read and write
283800F74000
trusted library allocation
page read and write
283801AA4000
trusted library allocation
page read and write
283801724000
trusted library allocation
page read and write
20F1C000
heap
page read and write
1F936860000
remote allocation
page read and write
57B000
unkown
page execute and read and write
283801764000
trusted library allocation
page read and write
19E830E3000
heap
page read and write
283800F84000
trusted library allocation
page read and write
1F936500000
trusted library allocation
page read and write
19E830EA000
heap
page read and write
19E830E3000
heap
page read and write
283801AB4000
trusted library allocation
page read and write
D200E7E000
stack
page read and write
2838001B4000
trusted library allocation
page read and write
19E83670000
heap
page read and write
19E830E4000
heap
page read and write
43D800658000
trusted library allocation
page read and write
283801578000
trusted library allocation
page read and write
AB1847F000
stack
page read and write
230983F0000
heap
page read and write
283800F2C000
trusted library allocation
page read and write
283801E04000
trusted library allocation
page read and write
283801588000
trusted library allocation
page read and write
24941F90000
direct allocation
page read and write
16D66D02000
heap
page read and write
19E830E4000
heap
page read and write
283800BD0000
trusted library allocation
page read and write
840000
heap
page read and write
7FF7BABBC000
unkown
page execute read
6C87E000
unkown
page read and write
283801B5C000
trusted library allocation
page read and write
283801C54000
trusted library allocation
page read and write
19E83117000
heap
page read and write
283800A10000
trusted library allocation
page read and write
283800368000
trusted library allocation
page read and write
15559940000
heap
page read and write
24D0000
heap
page read and write
19E83692000
heap
page read and write
19E830E4000
heap
page read and write
283801AC0000
trusted library allocation
page read and write
19E830E4000
heap
page read and write
283800FBC000
trusted library allocation
page read and write
6C83F000
unkown
page readonly
2838002F0000
trusted library allocation
page read and write
283801884000
trusted library allocation
page read and write
212B0000
heap
page read and write
283802EFC000
trusted library allocation
page read and write
283801AD4000
trusted library allocation
page read and write
283800320000
trusted library allocation
page read and write
2838001AC000
trusted library allocation
page read and write
210AF000
heap
page read and write
20EDD000
heap
page read and write
283800C78000
trusted library allocation
page read and write
15559960000
heap
page read and write
43D800704000
trusted library allocation
page read and write
1F9368F4000
trusted library allocation
page read and write
43D800714000
trusted library allocation
page read and write
1FEE47C0000
heap
page read and write
283801220000
trusted library allocation
page read and write
2838018AC000
trusted library allocation
page read and write
212D2000
heap
page read and write
21240000
trusted library allocation
page read and write
7FF7BA9F2000
unkown
page execute and read and write
6C880000
unkown
page read and write
7FF7B9F91000
unkown
page execute read
283801C58000
trusted library allocation
page read and write
283800394000
trusted library allocation
page read and write
21260000
remote allocation
page read and write
AC8E07F000
stack
page read and write
43D800640000
trusted library allocation
page read and write
1F931F80000
trusted library allocation
page read and write
19E830E5000
heap
page read and write
2838017D0000
trusted library allocation
page read and write
1388002E4000
trusted library allocation
page read and write
19E830F0000
heap
page read and write
1F931102000
heap
page read and write
7FF7BA673000
unkown
page write copy
19E830E3000
heap
page read and write
283800368000
trusted library allocation
page read and write
283801988000
trusted library allocation
page read and write
283801A5C000
trusted library allocation
page read and write
7FF7BA943000
unkown
page execute and read and write
28241C50000
heap
page read and write
2838012D8000
trusted library allocation
page read and write
1F931A90000
trusted library allocation
page read and write
2838015D0000
trusted library allocation
page read and write
1F93107C000
heap
page read and write
20F02000
heap
page read and write
2838016B4000
trusted library allocation
page read and write
AF9B6FE000
stack
page read and write
2113E000
stack
page read and write
2281D0FF000
heap
page read and write
43D800788000
trusted library allocation
page read and write
19E830EA000
heap
page read and write
1F9310AD000
heap
page read and write
20EF7000
heap
page read and write
2838003D8000
trusted library allocation
page read and write
4082E7E000
unkown
page readonly
16D66B24000
heap
page read and write
1F93665A000
heap
page read and write
28380039C000
trusted library allocation
page read and write
283800FCC000
trusted library allocation
page read and write
283801824000
trusted library allocation
page read and write
26A0000
heap
page read and write
283801630000
trusted library allocation
page read and write
20EEE000
heap
page read and write
1F936590000
trusted library allocation
page read and write
16D66D00000
heap
page read and write
283800C60000
trusted library allocation
page read and write
408317A000
stack
page read and write
19BE57E000
stack
page read and write
66E000
unkown
page execute and read and write
283800394000
trusted library allocation
page read and write
19E83100000
heap
page read and write
283800394000
trusted library allocation
page read and write
A048BDD000
stack
page read and write
283801644000
trusted library allocation
page read and write
28380039C000
trusted library allocation
page read and write
1388002A4000
trusted library allocation
page read and write
24941F60000
heap
page read and write
283801ABC000
trusted library allocation
page read and write
230983E0000
heap
page read and write
2838017F4000
trusted library allocation
page read and write
6CFD0000
unkown
page readonly
20F05000
heap
page read and write
1F1E6555000
heap
page read and write
D735DAC000
stack
page read and write
1F93664D000
heap
page read and write
283800394000
trusted library allocation
page read and write
1D737F9000
stack
page read and write
19E830EA000
heap
page read and write
2838019E4000
trusted library allocation
page read and write
20F6B000
heap
page read and write
2129E000
stack
page read and write
283800EA4000
trusted library allocation
page read and write
283801838000
trusted library allocation
page read and write
27D4A000
heap
page read and write
1AFB5FF000
stack
page read and write
16D66A37000
heap
page read and write
4AE000
unkown
page readonly
19E830FC000
heap
page read and write
283800494000
trusted library allocation
page read and write
283802F38000
trusted library allocation
page read and write
61EB7000
direct allocation
page readonly
283800D54000
trusted library allocation
page read and write
1EF47D40000
heap
page read and write
1F937000000
heap
page read and write
549000
unkown
page execute and read and write
1F9364D0000
trusted library allocation
page read and write
1EF47A80000
heap
page read and write
7FF7FB911000
unkown
page execute read
7FF7FB910000
unkown
page readonly
28380039C000
trusted library allocation
page read and write
283801D68000
trusted library allocation
page read and write
1F9365B0000
trusted library allocation
page read and write
43D800320000
trusted library allocation
page read and write
19E830EA000
heap
page read and write
19E83139000
heap
page read and write
28241E00000
heap
page read and write
2838013C4000
trusted library allocation
page read and write
28380172C000
trusted library allocation
page read and write
1F1E6190000
heap
page read and write
1F931129000
heap
page read and write
19E830E5000
heap
page read and write
40839FE000
stack
page read and write
AF9B9FE000
unkown
page readonly
283800AF4000
trusted library allocation
page read and write
19E830EA000
heap
page read and write
283800C70000
trusted library allocation
page read and write
283800FCC000
trusted library allocation
page read and write
1F936800000
trusted library allocation
page read and write
283801828000
trusted library allocation
page read and write
8FA000
heap
page read and write
19E830ED000
heap
page read and write
230985C0000
heap
page read and write
7FF7FC2C3000
unkown
page execute and read and write
283800BE1000
trusted library allocation
page read and write
AF9B8FE000
stack
page read and write
283801844000
trusted library allocation
page read and write
2838001E4000
trusted library allocation
page read and write
283801AF8000
trusted library allocation
page read and write
1F936663000
heap
page read and write
2838019CC000
trusted library allocation
page read and write
19E830E3000
heap
page read and write
19E830E0000
heap
page read and write
43D800684000
trusted library allocation
page read and write
19E83689000
heap
page read and write
2838015B4000
trusted library allocation
page read and write
283801790000
trusted library allocation
page read and write
20EF3000
heap
page read and write
7FF7FBFEE000
unkown
page readonly
2838003A8000
trusted library allocation
page read and write
2838003A8000
trusted library allocation
page read and write
24941F90000
direct allocation
page read and write
6F871000
unkown
page execute read
266B7E000
stack
page read and write
283801B70000
trusted library allocation
page read and write
212E0000
heap
page read and write
893000
heap
page read and write
19E830E3000
heap
page read and write
14897170000
direct allocation
page read and write
283801A38000
trusted library allocation
page read and write
15559C15000
heap
page read and write
19E830EA000
heap
page read and write
283801374000
trusted library allocation
page read and write
2838002C4000
trusted library allocation
page read and write
19E830E0000
heap
page read and write
7FF7BA673000
unkown
page read and write
766097F000
stack
page read and write
2812C000
stack
page read and write
15559C10000
heap
page read and write
20EF7000
heap
page read and write
1F931D40000
trusted library allocation
page read and write
7FF7FC337000
unkown
page execute and read and write
2838015BC000
trusted library allocation
page read and write
76608FF000
stack
page read and write
24942280000
heap
page read and write
19E830F9000
heap
page read and write
283800EE8000
trusted library allocation
page read and write
1F147E10000
heap
page read and write
1F936656000
heap
page read and write
19E830E3000
heap
page read and write
283801A78000
trusted library allocation
page read and write
28380176C000
trusted library allocation
page read and write
283801704000
trusted library allocation
page read and write
19E830DD000
heap
page read and write
1F931090000
heap
page read and write
56B34FE000
stack
page read and write
1F9365F0000
trusted library allocation
page read and write
766087D000
stack
page read and write
252E000
stack
page read and write
283800AF4000
trusted library allocation
page read and write
19E830E5000
heap
page read and write
19E830EF000
heap
page read and write
19E830E3000
heap
page read and write
19E8310B000
heap
page read and write
16D66A00000
unkown
page read and write
830000
heap
page read and write
7FF7FC842000
unkown
page readonly
43D800760000
trusted library allocation
page read and write
2838003A8000
trusted library allocation
page read and write
19E830EA000
heap
page read and write
19E83142000
heap
page read and write
7FF7B9F91000
unkown
page execute read
283800C78000
trusted library allocation
page read and write
20EEE000
heap
page read and write
20F1B000
heap
page read and write
24942051000
heap
page read and write
283800304000
trusted library allocation
page read and write
18F273C0000
heap
page read and write
20F0C000
heap
page read and write
7FF7B9FA2000
unkown
page readonly
20EE9000
heap
page read and write
7FF7B9FA5000
unkown
page write copy
43D8006CC000
trusted library allocation
page read and write
43D800754000
trusted library allocation
page read and write
43D80040C000
trusted library allocation
page read and write
43D800418000
trusted library allocation
page read and write
28380170C000
trusted library allocation
page read and write
19E830E4000
heap
page read and write
283800C78000
trusted library allocation
page read and write
283800C60000
trusted library allocation
page read and write
2838011DC000
trusted library allocation
page read and write
2494205F000
heap
page read and write
283801660000
trusted library allocation
page read and write
ABE000
stack
page read and write
883000
heap
page read and write
283801C28000
trusted library allocation
page read and write
28380198C000
trusted library allocation
page read and write
283801A2C000
trusted library allocation
page read and write
27D0F000
stack
page read and write
1F931100000
heap
page read and write
1F936808000
trusted library allocation
page read and write
400000
unkown
page readonly
1F936815000
trusted library allocation
page read and write
2838001D0000
trusted library allocation
page read and write
7FF7FC2D9000
unkown
page execute and read and write
19E830E4000
heap
page read and write
283801524000
trusted library allocation
page read and write
7FF7BA676000
unkown
page execute and read and write
800000
heap
page read and write
AF9B5FE000
unkown
page readonly
14896E93000
heap
page read and write
1A268D40000
heap
page read and write
283800368000
trusted library allocation
page read and write
283801858000
trusted library allocation
page read and write
1F9364A0000
trusted library allocation
page read and write
283801B88000
trusted library allocation
page read and write
19E830EA000
heap
page read and write
19E830E3000
heap
page read and write
16D66D13000
heap
page read and write
3C2BD4D000
stack
page read and write
BBF000
stack
page read and write
19E830EA000
heap
page read and write
19E830F1000
heap
page read and write
2838018D8000
trusted library allocation
page read and write
19E830D2000
heap
page read and write
43D800668000
trusted library allocation
page read and write
28380114C000
trusted library allocation
page read and write
1EF47AA8000
heap
page read and write
19E830EA000
heap
page read and write
2838001B4000
trusted library allocation
page read and write
19E8310B000
heap
page read and write
43D800654000
trusted library allocation
page read and write
408417E000
unkown
page readonly
19E830DD000
heap
page read and write
283800F84000
trusted library allocation
page read and write
43D800610000
trusted library allocation
page read and write
43D80039C000
trusted library allocation
page read and write
19E830F3000
heap
page read and write
283801744000
trusted library allocation
page read and write
19E830E3000
heap
page read and write
14896E70000
heap
page read and write
2838015CC000
trusted library allocation
page read and write
2838003D8000
trusted library allocation
page read and write
1EF47A60000
heap
page read and write
19E83153000
heap
page read and write
19E830E4000
heap
page read and write
6EB000
unkown
page readonly
283800220000
trusted library allocation
page read and write
283801A1C000
trusted library allocation
page read and write
1388002C8000
trusted library allocation
page read and write
269FCD30000
heap
page read and write
266C7E000
stack
page read and write
28841000
heap
page read and write
7FF7FBFF5000
unkown
page readonly
20F13000
heap
page read and write
269FCC50000
heap
page read and write
2838013C4000
trusted library allocation
page read and write
19E830E4000
heap
page read and write
283800C70000
trusted library allocation
page read and write
19E830E3000
heap
page read and write
A7E000
stack
page read and write
2838016EC000
trusted library allocation
page read and write
1F147FE0000
heap
page read and write
1F9368E5000
trusted library allocation
page read and write
2838003D8000
trusted library allocation
page read and write
283802EFC000
trusted library allocation
page read and write
19E830EA000
heap
page read and write
283801894000
trusted library allocation
page read and write
283802EFC000
trusted library allocation
page read and write
14897070000
heap
page read and write
14897050000
heap
page read and write
1FEE47C5000
heap
page read and write
1F9310B9000
heap
page read and write
283801BE8000
trusted library allocation
page read and write
1F93662D000
heap
page read and write
1BC11950000
heap
page read and write
20EE6000
heap
page read and write
20EDD000
heap
page read and write
43D800424000
trusted library allocation
page read and write
283801B08000
trusted library allocation
page read and write
668000
unkown
page execute and read and write
19E830E4000
heap
page read and write
43D8006D0000
trusted library allocation
page read and write
7FF7BA66E000
unkown
page readonly
1F9364F0000
trusted library allocation
page read and write
2838001CC000
trusted library allocation
page read and write
57B0AFD000
stack
page read and write
283801238000
trusted library allocation
page read and write
1BC11970000
heap
page read and write
28241D80000
trusted library allocation
page read and write
19E830EA000
heap
page read and write
283801C4E000
trusted library allocation
page read and write
14897170000
direct allocation
page read and write
1F936690000
heap
page read and write
283800E0C000
trusted library allocation
page read and write
2281D0B0000
heap
page read and write
19E830EA000
heap
page read and write
283800C30000
trusted library allocation
page read and write
6C6A0000
unkown
page readonly
1F931074000
heap
page read and write
283801728000
trusted library allocation
page read and write
43D800390000
trusted library allocation
page read and write
19E830EF000
heap
page read and write
283800EE8000
trusted library allocation
page read and write
28241F02000
heap
page read and write
83C000
heap
page read and write
2838019A8000
trusted library allocation
page read and write
21260000
remote allocation
page read and write
1F9366F3000
heap
page read and write
19E83100000
heap
page read and write
There are 1348 hidden memdumps, click here to show them.