IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1019.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1059.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE34.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Nov 23 17:26:37 2024, 0x1205a4 type
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 --field-trial-handle=2000,i,3855741216998469249,4112657617320964053,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6592 -s 932

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://docs.google.com/document/O
unknown
https://duckduckgo.com/ac/?q=
unknown
https://lens.google.com/v3/uploadSidePanelCompanionDesktopM116PlusEnabled_UnPinned_NewTab_20230918=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
https://www.youtube.com/:
unknown
https://mail.google.com/mail/
unknown
https://mail.google.com/mail/:
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://crbug.com/368855.)
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://www.google.com/tools/feedback/chrome/__submit
unknown
https://curl.se/docs/hsts.html
unknown
https://www.google.com
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://www.google.com/speech-api/v2/synthesize?
unknown
https://mail.google.com/mail/J
unknown
http://unisolated.invalid/
unknown
https://drive.google.com/
unknown
https://chrome.google.com/webstore206E5
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
https://mail.google.com/mail/62
unknown
https://ch.search.yahoo.com/favicon.icofrom_play_api
unknown
https://www.youtube.com/s/notifications/manifest/cr_install.html
unknown
https://ch.search.yahoo.com/search
unknown
https://www.youtube.com/?feature=ytca
unknown
https://www.youtube.com/J
unknown
https://docs.google.com/forms/u/0/create?usp=chrome_actions
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/?utm_source=ga-chrome-actions&utm_medium=manageGA
unknown
https://docs.google.com/presentation/
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://www.google.com/chrome/tips/gs
unknown
https://drive-daily-2.corp.google.com/
unknown
https://drive-daily-4.corp.google.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://docs.google.com/forms/u/0/create?usp=chrome_actionsy
unknown
https://curl.se/docs/alt-svc.html
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://www.youtube.com/
unknown
https://www.youtube.com/m
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://fvtekk5pn.top/v1/upload.php
34.116.198.130
https://docs.google.com/spreadsheets/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.icoenterInsights
unknown
http://unisolated.invalid/6
unknown
https://google-ohttp-relay-join.fastly-edge.com/2J
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=b
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
https://drive-daily-4.c
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://drive-daily-4.cPW
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
34.116.198.130
https://www.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
https://docs.google.com/document/
unknown
http://google.com/
unknown
http://html4/loose.dtd
unknown
https://drive.google.com/?lfhs=2/
unknown
https://mail.google.com/mail/installwebapp?usp=chrome_default
unknown
https://www.ecosia.org/search?q=
unknown
https://docs.google.com/presentation/J
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://docs.google.com/document/installwebapp?usp=chrome_default
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://drive-daily-3.corp.googl
unknown
https://docs.google.com/presentation/:
unknown
https://docs.google.com/presentation/installwebapp?usp=chrome_default
unknown
https://docs.google.com/spreadsheets/J
unknown
https://docs.google.com/presentation/?usp=installed_webapplt
unknown
https://myactivity.google.com/
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/collections?rt=b
unknown
https://docs.google.com/spreadsheets/?usp=installed_webapp
unknown
https://drive-staging.corp.google.com/
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTE
unknown
https://docs.google.com/spreadsheets/:
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fvtekk5pn.top
34.116.198.130
fvtekk5pn.top
34.116.198.130

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
34.116.198.130
home.fvtekk5pn.top
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
malicious
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
malicious
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
malicious
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
malicious
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
malicious
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
malicious
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
malicious
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
malicious
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
malicious
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
malicious
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
malicious
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
malicious
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
malicious
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
malicious
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
malicious
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
malicious
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
malicious
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
malicious
\REGISTRY\A\{d64422af-cfe2-ec1a-14fb-001627be1301}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
F9379FE000
unkown
page readonly
18002F8C000
trusted library allocation
page read and write
79F000874000
trusted library allocation
page read and write
79F0007A0000
trusted library allocation
page read and write
F93F9FE000
unkown
page readonly
18002594000
trusted library allocation
page read and write
12C0000
direct allocation
page read and write
18002414000
trusted library allocation
page read and write
1800242C000
trusted library allocation
page read and write
18002690000
trusted library allocation
page read and write
18002E30000
trusted library allocation
page read and write
12A4000
heap
page read and write
F93D9FE000
unkown
page readonly
79F0006AC000
trusted library allocation
page read and write
18002568000
trusted library allocation
page read and write
79F00040C000
trusted library allocation
page read and write
11C4002F4000
trusted library allocation
page read and write
18002EA8000
trusted library allocation
page read and write
180025C8000
trusted library allocation
page read and write
1800306C000
trusted library allocation
page read and write
7081000
heap
page read and write
18002FE0000
trusted library allocation
page read and write
16A000
unkown
page readonly
220A1BA8000
heap
page read and write
1800241C000
trusted library allocation
page read and write
E0F000
unkown
page execute and write copy
71A5000
heap
page read and write
16E000
unkown
page write copy
F9321FE000
stack
page read and write
180022D0000
trusted library allocation
page read and write
7083000
heap
page read and write
640000
heap
page read and write
6C278000
unkown
page readonly
79F000878000
trusted library allocation
page read and write
18002DA4000
trusted library allocation
page read and write
18002612000
trusted library allocation
page read and write
18002C78000
trusted library allocation
page read and write
18003018000
trusted library allocation
page read and write
79F000230000
trusted library allocation
page read and write
18002AC4000
trusted library allocation
page read and write
18002D58000
trusted library allocation
page read and write
1800220C000
trusted library allocation
page read and write
180028D4000
trusted library allocation
page read and write
7102000
direct allocation
page read and write
18002F64000
trusted library allocation
page read and write
180023D8000
trusted library allocation
page read and write
7083000
heap
page read and write
66D1000
heap
page read and write
1800240C000
trusted library allocation
page read and write
2A30000
heap
page read and write
6C22F000
unkown
page readonly
18002924000
trusted library allocation
page read and write
71CF000
heap
page read and write
180024D0000
trusted library allocation
page read and write
180024A4000
trusted library allocation
page read and write
18002BC0000
trusted library allocation
page read and write
3E1800284000
direct allocation
page read and write
13FC000
stack
page read and write
18002434000
trusted library allocation
page read and write
F9391FA000
stack
page read and write
11C4002C0000
trusted library allocation
page read and write
18002870000
trusted library allocation
page read and write
18002FA8000
trusted library allocation
page read and write
F9451FC000
stack
page read and write
F95A1FE000
stack
page read and write
11C4002A0000
trusted library allocation
page read and write
220A9D9B000
heap
page read and write
18002B74000
trusted library allocation
page read and write
18002758000
trusted library allocation
page read and write
18002A90000
trusted library allocation
page read and write
220A1B7A000
heap
page read and write
7251000
heap
page read and write
F9581FC000
stack
page read and write
1800246C000
trusted library allocation
page read and write
12C0000
direct allocation
page read and write
220A1A80000
heap
page read and write
18002430000
trusted library allocation
page read and write
F9571FA000
stack
page read and write
66D1000
heap
page read and write
F95B1FE000
stack
page read and write
18002D6C000
trusted library allocation
page read and write
18002A40000
trusted library allocation
page read and write
18002724000
trusted library allocation
page read and write
18000001000
trusted library allocation
page read and write
18002F00000
trusted library allocation
page read and write
16E000
unkown
page write copy
11C4002A0000
trusted library allocation
page read and write
180023E0000
trusted library allocation
page read and write
220A1AD0000
heap
page read and write
79F000790000
trusted library allocation
page read and write
18002F4C000
trusted library allocation
page read and write
18002E0C000
trusted library allocation
page read and write
79F0006C8000
trusted library allocation
page read and write
F9311FF000
stack
page read and write
14D0000
heap
page read and write
728C000
heap
page read and write
6B50000
direct allocation
page read and write
7170000
heap
page read and write
66D1000
heap
page read and write
3E18002EC000
direct allocation
page read and write
7089000
heap
page read and write
3E18002E4000
direct allocation
page read and write
11C4002B0000
trusted library allocation
page read and write
180024A8000
trusted library allocation
page read and write
7419000
heap
page read and write
7080000
heap
page read and write
11C400230000
trusted library allocation
page read and write
66D1000
heap
page read and write
79F000728000
trusted library allocation
page read and write
3E1800215000
direct allocation
page read and write
721F000
heap
page read and write
79F00085C000
trusted library allocation
page read and write
79F000884000
trusted library allocation
page read and write
715A000
heap
page read and write
220A9D60000
trusted library allocation
page read and write
6DA0000
direct allocation
page execute and read and write
18002D10000
trusted library allocation
page read and write
18002994000
trusted library allocation
page read and write
7081000
heap
page read and write
F9469FE000
unkown
page readonly
180027AC000
trusted library allocation
page read and write
11C400201000
trusted library allocation
page read and write
220A5140000
heap
page read and write
66D1000
heap
page read and write
18002FF0000
trusted library allocation
page read and write
1800226C000
trusted library allocation
page read and write
171000
unkown
page readonly
220A1BB9000
heap
page read and write
3E1800234000
direct allocation
page read and write
18002B7C000
trusted library allocation
page read and write
11C4002BC000
trusted library allocation
page read and write
66D1000
heap
page read and write
16FA000
heap
page read and write
79F000238000
trusted library allocation
page read and write
1800269C000
trusted library allocation
page read and write
F9419FE000
unkown
page readonly
66D1000
heap
page read and write
18002594000
trusted library allocation
page read and write
6DA0000
direct allocation
page execute and read and write
18002EC8000
trusted library allocation
page read and write
12A4000
heap
page read and write
3E1800230000
direct allocation
page read and write
2A1F000
stack
page read and write
71B9000
heap
page read and write
18002388000
trusted library allocation
page read and write
180024AE000
trusted library allocation
page read and write
3E180024C000
direct allocation
page read and write
F9539FE000
unkown
page readonly
F94D9FE000
unkown
page readonly
16E000
unkown
page write copy
180023A8000
trusted library allocation
page read and write
7181000
heap
page read and write
79F00027C000
trusted library allocation
page read and write
16E000
unkown
page read and write
66D1000
heap
page read and write
73B5000
heap
page read and write
220A39C0000
heap
page read and write
18002E20000
trusted library allocation
page read and write
F9549FE000
unkown
page readonly
180024C4000
trusted library allocation
page read and write
180025D8000
trusted library allocation
page read and write
6DA0000
direct allocation
page execute and read and write
220AA5DE000
trusted library section
page read and write
11C40020C000
trusted library allocation
page read and write
220A578B000
heap
page read and write
11C4002B0000
trusted library allocation
page read and write
F9499FE000
unkown
page readonly
18002344000
trusted library allocation
page read and write
F95D1FE000
stack
page read and write
1220000
heap
page read and write
18000201000
trusted library allocation
page read and write
18002F30000
trusted library allocation
page read and write
66D1000
heap
page read and write
220A516E000
heap
page read and write
F94D1FE000
stack
page read and write
180028CE000
trusted library allocation
page read and write
7140000
heap
page read and write
180025D8000
trusted library allocation
page read and write
3E18002D0000
direct allocation
page read and write
220A571E000
heap
page read and write
7082000
heap
page read and write
18002618000
trusted library allocation
page read and write
18000814000
trusted library allocation
page read and write
220A39C3000
heap
page read and write
79F000848000
trusted library allocation
page read and write
66D1000
heap
page read and write
105C000
stack
page read and write
79F0008C4000
trusted library allocation
page read and write
18002ED4000
trusted library allocation
page read and write
18003050000
trusted library allocation
page read and write
F95B9FE000
unkown
page readonly
12C0000
direct allocation
page read and write
18002CB4000
trusted library allocation
page read and write
79F00082C000
trusted library allocation
page read and write
66D1000
heap
page read and write
220A5165000
heap
page read and write
18003078000
trusted library allocation
page read and write
79F000860000
trusted library allocation
page read and write
72B7000
heap
page read and write
18002420000
trusted library allocation
page read and write
180023F0000
trusted library allocation
page read and write
220A1CD0000
trusted library allocation
page read and write
1800038E000
trusted library allocation
page read and write
F9529FE000
unkown
page readonly
7237000
heap
page read and write
18002E20000
trusted library allocation
page read and write
7082000
heap
page read and write
18000801000
trusted library allocation
page read and write
18002424000
trusted library allocation
page read and write
7230000
heap
page read and write
161000
unkown
page execute read
220A1AD8000
heap
page read and write
11C400250000
trusted library allocation
page read and write
79F000830000
trusted library allocation
page read and write
18000DAA000
trusted library allocation
page read and write
72C5000
heap
page read and write
380000
unkown
page readonly
F9569FE000
unkown
page readonly
F9481FC000
stack
page read and write
F93C9FE000
unkown
page readonly
18002C28000
trusted library allocation
page read and write
66D1000
heap
page read and write
11C400235000
trusted library allocation
page read and write
F9399FE000
unkown
page readonly
79F0002FC000
trusted library allocation
page read and write
18002E20000
trusted library allocation
page read and write
F9351FD000
stack
page read and write
F95C9FE000
unkown
page readonly
18002568000
trusted library allocation
page read and write
12A4000
heap
page read and write
7083000
heap
page read and write
220A5177000
heap
page read and write
220A9D88000
heap
page read and write
180022E0000
trusted library allocation
page read and write
180023E4000
trusted library allocation
page read and write
1800255C000
trusted library allocation
page read and write
180023B4000
trusted library allocation
page read and write
18003097000
trusted library allocation
page read and write
12A4000
heap
page read and write
180024F0000
trusted library allocation
page read and write
66D1000
heap
page read and write
220A5185000
heap
page read and write
18002260000
trusted library allocation
page read and write
220A57AC000
heap
page read and write
220A5330000
heap
page read and write
18002680000
trusted library allocation
page read and write
1800260C000
trusted library allocation
page read and write
7085000
heap
page read and write
18002CA8000
trusted library allocation
page read and write
220A1AA0000
heap
page read and write
18002E90000
trusted library allocation
page read and write
7255000
heap
page read and write
2AF0000
heap
page read and write
7082000
heap
page read and write
1110000
heap
page read and write
18002A0C000
trusted library allocation
page read and write
79F00079C000
trusted library allocation
page read and write
79F000248000
trusted library allocation
page read and write
3E1800280000
direct allocation
page read and write
180024B4000
trusted library allocation
page read and write
18002C48000
trusted library allocation
page read and write
6DA0000
direct allocation
page execute and read and write
7377000
heap
page read and write
16E000
unkown
page read and write
79F000418000
trusted library allocation
page read and write
F94E9FE000
unkown
page readonly
18002908000
trusted library allocation
page read and write
180023DC000
trusted library allocation
page read and write
79F000801000
trusted library allocation
page read and write
180022F0000
trusted library allocation
page read and write
79F00039C000
trusted library allocation
page read and write
5FC000
stack
page read and write
79F0007C0000
trusted library allocation
page read and write
79F0006E8000
trusted library allocation
page read and write
F9421FE000
stack
page read and write
F9339FE000
unkown
page readonly
220AA7D0000
trusted library section
page read and write
180024C4000
trusted library allocation
page read and write
220A5150000
heap
page read and write
220A1BA9000
heap
page read and write
1800240C000
trusted library allocation
page read and write
3E1800260000
direct allocation
page read and write
79F0006F4000
trusted library allocation
page read and write
220A5168000
heap
page read and write
18000C01000
trusted library allocation
page read and write
66D1000
heap
page read and write
79F0008E4000
trusted library allocation
page read and write
12C0000
direct allocation
page read and write
708A000
heap
page read and write
71EA000
heap
page read and write
11C400278000
trusted library allocation
page read and write
F9439FE000
unkown
page readonly
180030A0000
trusted library allocation
page read and write
79F000250000
trusted library allocation
page read and write
11C4002BC000
trusted library allocation
page read and write
18002D88000
trusted library allocation
page read and write
79F000818000
trusted library allocation
page read and write
5F0000
heap
page read and write
18002DB0000
trusted library allocation
page read and write
11C4002BC000
trusted library allocation
page read and write
7085000
heap
page read and write
708E000
heap
page read and write
66D1000
heap
page read and write
180023B4000
trusted library allocation
page read and write
6DA0000
direct allocation
page execute and read and write
F93D1FA000
stack
page read and write
79F0007E0000
trusted library allocation
page read and write
171000
unkown
page readonly
66D1000
heap
page read and write
6C22D000
unkown
page read and write
66D1000
heap
page read and write
180028AC000
trusted library allocation
page read and write
F93B9FE000
unkown
page readonly
1800291C000
trusted library allocation
page read and write
220A9D80000
heap
page read and write
83E000
unkown
page read and write
F93E1FE000
stack
page read and write
3E180023C000
direct allocation
page read and write
720E000
heap
page read and write
18002E1C000
trusted library allocation
page read and write
18002C1C000
trusted library allocation
page read and write
2DE0000
heap
page read and write
18002F70000
trusted library allocation
page read and write
12C0000
direct allocation
page read and write
18002318000
trusted library allocation
page read and write
3E1800294000
direct allocation
page read and write
1FE000
stack
page read and write
66D1000
heap
page read and write
220A1B7E000
heap
page read and write
F9349FE000
unkown
page readonly
F93A9FE000
unkown
page readonly
220A7767000
unclassified section
page read and write
79F0007D0000
trusted library allocation
page read and write
3E1800303000
direct allocation
page read and write
66D1000
heap
page read and write
18002A38000
trusted library allocation
page read and write
11C4002A0000
trusted library allocation
page read and write
1800290C000
trusted library allocation
page read and write
161000
unkown
page execute read
F9579FE000
unkown
page readonly
6DA0000
direct allocation
page execute and read and write
79F000864000
trusted library allocation
page read and write
66D1000
heap
page read and write
F9519FE000
unkown
page readonly
18002EB8000
trusted library allocation
page read and write
73F9000
heap
page read and write
18002B68000
trusted library allocation
page read and write
18002F98000
trusted library allocation
page read and write
18002F24000
trusted library allocation
page read and write
7087000
heap
page read and write
160000
unkown
page readonly
F93A1FB000
stack
page read and write
F9491FB000
stack
page read and write
18002674000
trusted library allocation
page read and write
66D1000
heap
page read and write
79F0006E0000
trusted library allocation
page read and write
18002318000
trusted library allocation
page read and write
18002320000
trusted library allocation
page read and write
7081000
heap
page read and write
7236000
heap
page read and write
71D8000
heap
page read and write
6DA0000
direct allocation
page execute and read and write
18002690000
trusted library allocation
page read and write
220A5719000
heap
page read and write
11C4002C8000
trusted library allocation
page read and write
71BF000
heap
page read and write
180023F8000
trusted library allocation
page read and write
12C0000
direct allocation
page read and write
18002EF0000
trusted library allocation
page read and write
18003038000
trusted library allocation
page read and write
1800232C000
trusted library allocation
page read and write
66D1000
heap
page read and write
79F0009C4000
trusted library allocation
page read and write
220A5178000
heap
page read and write
18000AE2000
trusted library allocation
page read and write
66D1000
heap
page read and write
1800259C000
trusted library allocation
page read and write
E5C000
stack
page read and write
6DA0000
direct allocation
page execute and read and write
18002201000
trusted library allocation
page read and write
742A000
heap
page read and write
18002C7C000
trusted library allocation
page read and write
6C150000
unkown
page readonly
18002A2C000
trusted library allocation
page read and write
79F000894000
trusted library allocation
page read and write
F9329FE000
unkown
page readonly
79F000974000
trusted library allocation
page read and write
18002C0C000
trusted library allocation
page read and write
F94C9FE000
unkown
page readonly
7267000
heap
page read and write
F9591FE000
stack
page read and write
12A4000
heap
page read and write
180023C4000
trusted library allocation
page read and write
12C0000
direct allocation
page read and write
6DA0000
direct allocation
page execute and read and write
1349000
heap
page read and write
73C0000
heap
page read and write
F9599FE000
unkown
page readonly
220A1BB2000
heap
page read and write
3E1800220000
direct allocation
page read and write
180024C9000
trusted library allocation
page read and write
220A5173000
heap
page read and write
66D1000
heap
page read and write
71FD000
heap
page read and write
180024AA000
trusted library allocation
page read and write
180023B4000
trusted library allocation
page read and write
18002601000
trusted library allocation
page read and write
79F0002ED000
trusted library allocation
page read and write
18002428000
trusted library allocation
page read and write
220A5792000
heap
page read and write
220A1CA0000
heap
page read and write
732F000
heap
page read and write
1120000
heap
page read and write
160000
unkown
page readonly
11C4002B0000
trusted library allocation
page read and write
66D1000
heap
page read and write
18002FC3000
trusted library allocation
page read and write
708C000
heap
page read and write
5E0000
heap
page read and write
F95D9FE000
unkown
page readonly
F93C1FD000
stack
page read and write
1227000
heap
page read and write
66D1000
heap
page read and write
1800254C000
trusted library allocation
page read and write
F95F1FD000
stack
page read and write
11C400248000
trusted library allocation
page read and write
7164000
heap
page read and write
11C400264000
trusted library allocation
page read and write
220A1DB0000
trusted library section
page readonly
220A57B2000
heap
page read and write
220AA170000
trusted library section
page read and write
18002EDC000
trusted library allocation
page read and write
18002410000
trusted library allocation
page read and write
18002E01000
trusted library allocation
page read and write
18003094000
trusted library allocation
page read and write
220A1AEE000
heap
page read and write
12C0000
direct allocation
page read and write
18002FC0000
trusted library allocation
page read and write
79F0008EC000
trusted library allocation
page read and write
6DA0000
direct allocation
page execute and read and write
18002C01000
trusted library allocation
page read and write
10F0000
heap
page read and write
79F00025C000
trusted library allocation
page read and write
3E1800201000
direct allocation
page read and write
719A000
heap
page read and write
79F000850000
trusted library allocation
page read and write
18002EA8000
trusted library allocation
page read and write
220A56F0000
heap
page read and write
66D1000
heap
page read and write
11C400260000
trusted library allocation
page read and write
E50000
heap
page read and write
F95E1FE000
stack
page read and write
180027BC000
trusted library allocation
page read and write
18002594000
trusted library allocation
page read and write
79F0002CC000
trusted library allocation
page read and write
18000752000
trusted library allocation
page read and write
180024B8000
trusted library allocation
page read and write
79F0008AC000
trusted library allocation
page read and write
7084000
heap
page read and write
220A5173000
heap
page read and write
66D1000
heap
page read and write
79F000948000
trusted library allocation
page read and write
16D0000
heap
page read and write
220A1DE5000
heap
page read and write
7161000
heap
page read and write
160000
unkown
page readonly
3E18002A8000
direct allocation
page read and write
11C4002F0000
trusted library allocation
page read and write
220A58F7000
unclassified section
page read and write
220A56F4000
heap
page read and write
7220000
heap
page read and write
180024FF000
trusted library allocation
page read and write
18002970000
trusted library allocation
page read and write
18002F58000
trusted library allocation
page read and write
220A517F000
heap
page read and write
1800015A000
trusted library allocation
page read and write
18002F08000
trusted library allocation
page read and write
18002964000
trusted library allocation
page read and write
79F000404000
trusted library allocation
page read and write
161000
unkown
page execute read
220A9D8C000
heap
page read and write
18002CC8000
trusted library allocation
page read and write
16A000
unkown
page readonly
7275000
heap
page read and write
12C0000
direct allocation
page read and write
11C4002BC000
trusted library allocation
page read and write
18002E44000
trusted library allocation
page read and write
F95C1FD000
stack
page read and write
180027E0000
trusted library allocation
page read and write
79F0007AC000
trusted library allocation
page read and write
7083000
heap
page read and write
18002D64000
trusted library allocation
page read and write
18002AE0000
trusted library allocation
page read and write
18000E01000
trusted library allocation
page read and write
79F000778000
trusted library allocation
page read and write
79F00020C000
trusted library allocation
page read and write
F9309FE000
unkown
page readonly
79F000964000
trusted library allocation
page read and write
11C4002BC000
trusted library allocation
page read and write
220A572E000
heap
page read and write
7125000
heap
page read and write
12A4000
heap
page read and write
1800221C000
trusted library allocation
page read and write
18002364000
trusted library allocation
page read and write
18002778000
trusted library allocation
page read and write
18002F1C000
trusted library allocation
page read and write
220A1DE0000
heap
page read and write
180027CC000
trusted library allocation
page read and write
71CB000
heap
page read and write
18002D58000
trusted library allocation
page read and write
79F0002F4000
trusted library allocation
page read and write
220A1A90000
heap
page readonly
66D1000
heap
page read and write
220A9DCB000
heap
page read and write
1800254C000
trusted library allocation
page read and write
180025BC000
trusted library allocation
page read and write
F9409FE000
unkown
page readonly
71CC000
heap
page read and write
11C4002C0000
trusted library allocation
page read and write
79F00080C000
trusted library allocation
page read and write
180024A4000
trusted library allocation
page read and write
66D1000
heap
page read and write
1800302E000
trusted library allocation
page read and write
F94A1FC000
stack
page read and write
66D1000
heap
page read and write
381000
unkown
page execute and write copy
12A4000
heap
page read and write
7089000
heap
page read and write
220A9D93000
heap
page read and write
F94F1FE000
stack
page read and write
160000
unkown
page readonly
299F000
unkown
page read and write
11C4002D8000
trusted library allocation
page read and write
79F000828000
trusted library allocation
page read and write
18002D00000
trusted library allocation
page read and write
180028F8000
trusted library allocation
page read and write
F9429FE000
unkown
page readonly
6B10000
trusted library allocation
page read and write
7185000
heap
page read and write
18002A80000
trusted library allocation
page read and write
79F0008F0000
trusted library allocation
page read and write
11C4002E4000
trusted library allocation
page read and write
7081000
heap
page read and write
719F000
heap
page read and write
F94C1FD000
stack
page read and write
730D000
heap
page read and write
11C400288000
trusted library allocation
page read and write
7088000
heap
page read and write
66D1000
heap
page read and write
F9449FE000
unkown
page readonly
171000
unkown
page readonly
79F0008D8000
trusted library allocation
page read and write
66D1000
heap
page read and write
66D1000
heap
page read and write
F9511FE000
stack
page read and write
180023B4000
trusted library allocation
page read and write
18002BE8000
trusted library allocation
page read and write
18002B0C000
trusted library allocation
page read and write
71FC000
heap
page read and write
79F0006C8000
trusted library allocation
page read and write
F95E9FE000
unkown
page readonly
F9369FE000
unkown
page readonly
79F0007E4000
trusted library allocation
page read and write
29DE000
stack
page read and write
11C400220000
trusted library allocation
page read and write
18000601000
trusted library allocation
page read and write
79F00060C000
trusted library allocation
page read and write
711E000
heap
page read and write
18002588000
trusted library allocation
page read and write
12C0000
direct allocation
page read and write
66D1000
heap
page read and write
7259000
direct allocation
page read and write
79F000601000
trusted library allocation
page read and write
180023D4000
trusted library allocation
page read and write
3250000
direct allocation
page read and write
220A516E000
heap
page read and write
15D0000
heap
page read and write
18000401000
trusted library allocation
page read and write
6D90000
direct allocation
page execute and read and write
180028BC000
trusted library allocation
page read and write
18002AAC000
trusted library allocation
page read and write
66D1000
heap
page read and write
3E1800250000
direct allocation
page read and write
7081000
heap
page read and write
220A57B4000
heap
page read and write
71DE000
heap
page read and write
3260000
direct allocation
page execute and read and write
724B000
heap
page read and write
7080000
heap
page read and write
66D1000
heap
page read and write
12C0000
direct allocation
page read and write
18002E58000
trusted library allocation
page read and write
18000D98000
trusted library allocation
page read and write
18002EA0000
trusted library allocation
page read and write
12A4000
heap
page read and write
18002930000
trusted library allocation
page read and write
66D1000
heap
page read and write
18002BD0000
trusted library allocation
page read and write
18003074000
trusted library allocation
page read and write
648000
heap
page read and write
6C27C000
unkown
page readonly
220A78B0000
heap
page read and write
79F0007D4000
trusted library allocation
page read and write
180026F7000
trusted library allocation
page read and write
725B000
direct allocation
page read and write
7353000
heap
page read and write
6C279000
unkown
page read and write
18001001000
trusted library allocation
page read and write
2AFA000
heap
page read and write
7086000
heap
page read and write
F94B1FC000
stack
page read and write
79F0006E8000
trusted library allocation
page read and write
79F0006D4000
trusted library allocation
page read and write
713C000
heap
page read and write
79F000890000
trusted library allocation
page read and write
F92F1F5000
stack
page read and write
1800274D000
trusted library allocation
page read and write
16A000
unkown
page readonly
F9371FB000
stack
page read and write
16F0000
heap
page read and write
57A000
stack
page read and write
6DA0000
direct allocation
page execute and read and write
18002D90000
trusted library allocation
page read and write
18002EE8000
trusted library allocation
page read and write
79F000844000
trusted library allocation
page read and write
79F00081C000
trusted library allocation
page read and write
79F00071C000
trusted library allocation
page read and write
66D1000
heap
page read and write
3E1800290000
direct allocation
page read and write
79F0006AC000
trusted library allocation
page read and write
220A5179000
heap
page read and write
79F000210000
trusted library allocation
page read and write
18002574000
trusted library allocation
page read and write
7083000
heap
page read and write
708E000
heap
page read and write
18002F84000
trusted library allocation
page read and write
18002CBC000
trusted library allocation
page read and write
79F0008A8000
trusted library allocation
page read and write
79F00078C000
trusted library allocation
page read and write
714E000
heap
page read and write
10A0000
heap
page read and write
F9509FE000
unkown
page readonly
220A5860000
trusted library section
page read and write
79F000700000
trusted library allocation
page read and write
3E180020C000
direct allocation
page read and write
12A4000
heap
page read and write
79F000220000
trusted library allocation
page read and write
F9551FC000
stack
page read and write
7085000
heap
page read and write
F9589FE000
unkown
page readonly
18002718000
trusted library allocation
page read and write
79F00091C000
trusted library allocation
page read and write
171000
unkown
page readonly
11C4002C0000
trusted library allocation
page read and write
18002318000
trusted library allocation
page read and write
11C4002BC000
trusted library allocation
page read and write
F9431FE000
stack
page read and write
220A5660000
trusted library section
page read and write
180025B4000
trusted library allocation
page read and write
12A4000
heap
page read and write
18002374000
trusted library allocation
page read and write
18002CB8000
trusted library allocation
page read and write
F93E9FE000
unkown
page readonly
18002E84000
trusted library allocation
page read and write
73BC000
heap
page read and write
79F0008F4000
trusted library allocation
page read and write
79F00095C000
trusted library allocation
page read and write
18002700000
trusted library allocation
page read and write
1800305C000
trusted library allocation
page read and write
171000
unkown
page readonly
180023E8000
trusted library allocation
page read and write
180029B0000
trusted library allocation
page read and write
F9411FD000
stack
page read and write
18002CDC000
trusted library allocation
page read and write
66D1000
heap
page read and write
79F000248000
trusted library allocation
page read and write
600000
heap
page read and write
79F000788000
trusted library allocation
page read and write
220A9DCF000
heap
page read and write
79F000904000
trusted library allocation
page read and write
18002B2C000
trusted library allocation
page read and write
180024C7000
trusted library allocation
page read and write
6DA0000
direct allocation
page execute and read and write
6DA0000
direct allocation
page execute and read and write
12A4000
heap
page read and write
744A000
heap
page read and write
180026B8000
trusted library allocation
page read and write
79F000840000
trusted library allocation
page read and write
F94A9FE000
unkown
page readonly
3250000
direct allocation
page read and write
12C0000
direct allocation
page read and write
6DA0000
direct allocation
page execute and read and write
220A5177000
heap
page read and write
F95F9FE000
unkown
page readonly
79F000430000
trusted library allocation
page read and write
18002354000
trusted library allocation
page read and write
18003088000
trusted library allocation
page read and write
220A5185000
heap
page read and write
7268000
heap
page read and write
180024A4000
trusted library allocation
page read and write
18002D80000
trusted library allocation
page read and write
220A5180000
heap
page read and write
18002820000
trusted library allocation
page read and write
708A000
heap
page read and write
18002E90000
trusted library allocation
page read and write
F94F9FE000
unkown
page readonly
18002D18000
trusted library allocation
page read and write
F94B9FE000
unkown
page readonly
A5F000
stack
page read and write
7083000
heap
page read and write
7084000
heap
page read and write
11C4002F8000
trusted library allocation
page read and write
220A9F70000
trusted library section
page read and write
18002EA0000
trusted library allocation
page read and write
18002764000
trusted library allocation
page read and write
F9341FE000
stack
page read and write
7112000
heap
page read and write
79F000880000
trusted library allocation
page read and write
3E1800270000
direct allocation
page read and write
737D000
heap
page read and write
7290000
heap
page read and write
18002E64000
trusted library allocation
page read and write
79F00039C000
trusted library allocation
page read and write
220A5700000
heap
page read and write
F9301FE000
unkown
page read and write
180026CC000
trusted library allocation
page read and write
220AA7DE000
trusted library section
page read and write
220A7860000
heap
page read and write
66D1000
heap
page read and write
180028A0000
trusted library allocation
page read and write
220AAA02000
trusted library allocation
page read and write
7084000
heap
page read and write
180022A8000
trusted library allocation
page read and write
180026F0000
trusted library allocation
page read and write
66D1000
heap
page read and write
18002490000
trusted library allocation
page read and write
780000
heap
page read and write
220A5763000
heap
page read and write
F93B1FC000
stack
page read and write
1BE000
stack
page read and write
79F000201000
trusted library allocation
page read and write
11C4002BC000
trusted library allocation
page read and write
18002CE8000
trusted library allocation
page read and write
180027F8000
trusted library allocation
page read and write
79F000918000
trusted library allocation
page read and write
66D1000
heap
page read and write
FF0000
heap
page read and write
18002C34000
trusted library allocation
page read and write
220AA597000
unclassified section
page read and write
F9541FD000
stack
page read and write
66D1000
heap
page read and write
7211000
heap
page read and write
1800300C000
trusted library allocation
page read and write
F9471FB000
stack
page read and write
F9561FE000
stack
page read and write
7244000
heap
page read and write
12C0000
direct allocation
page read and write
F9479FE000
unkown
page readonly
18002594000
trusted library allocation
page read and write
160000
unkown
page readonly
79F000920000
trusted library allocation
page read and write
18002418000
trusted library allocation
page read and write
53D000
stack
page read and write
6DA0000
direct allocation
page execute and read and write
66D1000
heap
page read and write
1800297C000
trusted library allocation
page read and write
79F0006F0000
trusted library allocation
page read and write
220A579B000
heap
page read and write
3E1800210000
direct allocation
page read and write
79F0008C8000
trusted library allocation
page read and write
1800280C000
trusted library allocation
page read and write
1800227C000
trusted library allocation
page read and write
F9559FE000
unkown
page readonly
18002E1C000
trusted library allocation
page read and write
18002AFC000
trusted library allocation
page read and write
7124000
heap
page read and write
180000DA000
trusted library allocation
page read and write
220A78B3000
heap
page read and write
18002F3C000
trusted library allocation
page read and write
18003048000
trusted library allocation
page read and write
11C4002A0000
trusted library allocation
page read and write
220A57D3000
heap
page read and write
66D1000
heap
page read and write
18002398000
trusted library allocation
page read and write
7081000
heap
page read and write
66D1000
heap
page read and write
F9521FE000
stack
page read and write
F9381FE000
stack
page read and write
180025A8000
trusted library allocation
page read and write
161000
unkown
page execute read
18002DE4000
trusted library allocation
page read and write
F9489FE000
unkown
page readonly
79F0006BC000
trusted library allocation
page read and write
3E1800274000
direct allocation
page read and write
3E1800217000
direct allocation
page read and write
16E000
unkown
page read and write
3E18002AC000
direct allocation
page read and write
71AC000
heap
page read and write
71F5000
heap
page read and write
11C400274000
trusted library allocation
page read and write
220A9D70000
heap
page read and write
6DA0000
direct allocation
page execute and read and write
79F00087C000
trusted library allocation
page read and write
66D1000
heap
page read and write
F9C000
stack
page read and write
79F000898000
trusted library allocation
page read and write
18000E40000
trusted library allocation
page read and write
220AA5D0000
trusted library section
page read and write
F93F1FE000
stack
page read and write
18002E38000
trusted library allocation
page read and write
18003060000
trusted library allocation
page read and write
18002580000
trusted library allocation
page read and write
18002758000
trusted library allocation
page read and write
66D1000
heap
page read and write
F9461FB000
stack
page read and write
16A000
unkown
page readonly
66D1000
heap
page read and write
7081000
heap
page read and write
79F000868000
trusted library allocation
page read and write
72FA000
heap
page read and write
11C400238000
trusted library allocation
page read and write
1800260E000
trusted library allocation
page read and write
1800254C000
trusted library allocation
page read and write
18002B98000
trusted library allocation
page read and write
66D1000
heap
page read and write
F9459FE000
unkown
page readonly
79F00084C000
trusted library allocation
page read and write
F9441FC000
stack
page read and write
11C400294000
trusted library allocation
page read and write
79F00070C000
trusted library allocation
page read and write
F9331FE000
stack
page read and write
1800070E000
trusted library allocation
page read and write
C5F000
stack
page read and write
79F0002B8000
trusted library allocation
page read and write
161000
unkown
page execute read
18002B48000
trusted library allocation
page read and write
79F000408000
trusted library allocation
page read and write
150000
heap
page read and write
18000A01000
trusted library allocation
page read and write
220A57B0000
heap
page read and write
180024A8000
trusted library allocation
page read and write
F94E1FE000
stack
page read and write
79F000401000
trusted library allocation
page read and write
F9389FE000
unkown
page readonly
FC000
stack
page read and write
180029F0000
trusted library allocation
page read and write
220A9D98000
heap
page read and write
18002801000
trusted library allocation
page read and write
180024F7000
trusted library allocation
page read and write
220A57C0000
heap
page read and write
3E18002DC000
direct allocation
page read and write
220A77F7000
unclassified section
page read and write
6DA0000
direct allocation
page execute and read and write
18002FB8000
trusted library allocation
page read and write
180024F4000
trusted library allocation
page read and write
180023A0000
trusted library allocation
page read and write
18002E90000
trusted library allocation
page read and write
18003084000
trusted library allocation
page read and write
12A4000
heap
page read and write
18002AF0000
trusted library allocation
page read and write
7210000
heap
page read and write
18002244000
trusted library allocation
page read and write
18002588000
trusted library allocation
page read and write
180023EC000
trusted library allocation
page read and write
6DA0000
direct allocation
page execute and read and write
1800228F000
trusted library allocation
page read and write
708C000
heap
page read and write
18002FD0000
trusted library allocation
page read and write
220A578F000
heap
page read and write
220A5184000
heap
page read and write
180029CC000
trusted library allocation
page read and write
220A5173000
heap
page read and write
18002401000
trusted library allocation
page read and write
171000
unkown
page readonly
66D1000
heap
page read and write
6DA0000
direct allocation
page execute and read and write
79F0002E4000
trusted library allocation
page read and write
180023F4000
trusted library allocation
page read and write
71E9000
heap
page read and write
79F0007BC000
trusted library allocation
page read and write
220A1CC0000
trusted library allocation
page read and write
18002A01000
trusted library allocation
page read and write
12A4000
heap
page read and write
12C0000
direct allocation
page read and write
6DA0000
direct allocation
page execute and read and write
739F000
heap
page read and write
708B000
heap
page read and write
18002860000
trusted library allocation
page read and write
220A4410000
unkown
page read and write
18002F4C000
trusted library allocation
page read and write
220A5177000
heap
page read and write
220A57B8000
heap
page read and write
F9359FE000
unkown
page readonly
F95A9FE000
unkown
page readonly
1800255C000
trusted library allocation
page read and write
161000
unkown
page execute read
1800255C000
trusted library allocation
page read and write
79F0008B8000
trusted library allocation
page read and write
180023C8000
trusted library allocation
page read and write
180026B4000
trusted library allocation
page read and write
6C151000
unkown
page execute read
79F0008E8000
trusted library allocation
page read and write
18000B00000
trusted library allocation
page read and write
220A1B9E000
heap
page read and write
180028C9000
trusted library allocation
page read and write
16A000
unkown
page readonly
11C4002C0000
trusted library allocation
page read and write
1800287C000
trusted library allocation
page read and write
18002C28000
trusted library allocation
page read and write
18002272000
trusted library allocation
page read and write
12A4000
heap
page read and write
3270000
direct allocation
page execute and read and write
12A4000
heap
page read and write
79F000424000
trusted library allocation
page read and write
F9531FE000
stack
page read and write
11C4002C0000
trusted library allocation
page read and write
F9501FD000
stack
page read and write
79F000288000
trusted library allocation
page read and write
16A000
unkown
page readonly
160000
unkown
page readonly
7334000
heap
page read and write
66D1000
heap
page read and write
18003001000
trusted library allocation
page read and write
220A5722000
heap
page read and write
11C400270000
trusted library allocation
page read and write
1800283C000
trusted library allocation
page read and write
F9401FE000
stack
page read and write
220A57B6000
heap
page read and write
79F0002D4000
trusted library allocation
page read and write
18002574000
trusted library allocation
page read and write
18002E54000
trusted library allocation
page read and write
79F0002B0000
trusted library allocation
page read and write
18002E3C000
trusted library allocation
page read and write
79F000960000
trusted library allocation
page read and write
F9361FB000
stack
page read and write
16FE000
heap
page read and write
79F0006AC000
trusted library allocation
page read and write
There are 927 hidden memdumps, click here to show them.