IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_de576c89c85d95f63177b89249eef622329cc21c_49e505fd_b531ef6b-0b59-4502-aa17-7c5ca09d99bd\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC2D6.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Nov 24 01:29:33 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC49C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC50A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2544 --field-trial-handle=2316,i,2533003572395420932,2322176061652296180,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6432 -s 1824

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.icodexed
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.google.com/async/ddljson?async=ntp:2me/
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
http://anglebug.com/57508
unknown
https://issuetracker.google.com/161903006
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
34.116.198.130
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://unisolated.invalid/a
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.icoings
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/72794
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
https://google-ohttp-relay-join.fastly-edge.com/hj
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
https://www.google.com/search?q=$
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fvtekk5pn.top
34.116.198.130
www.google.com
142.250.181.100
fvtekk5pn.top
34.116.198.130

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
34.116.198.130
home.fvtekk5pn.top
United States
127.0.0.1
unknown
unknown
142.250.181.100
www.google.com
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
malicious
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
malicious
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
malicious
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
malicious
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
malicious
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
malicious
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
malicious
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
malicious
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
malicious
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
malicious
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
malicious
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
malicious
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
malicious
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
malicious
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
malicious
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
malicious
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
malicious
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
malicious
\REGISTRY\A\{d990cf0c-8b28-5c9f-a760-1d4f8dbcbe67}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
31240020C000
trusted library allocation
page read and write
56DC0035C000
trusted library allocation
page read and write
194DC95B000
heap
page read and write
72B40298D000
trusted library allocation
page read and write
194DC943000
heap
page read and write
10FBFE000
stack
page read and write
194DC97C000
heap
page read and write
56DC006CC000
trusted library allocation
page read and write
194DC958000
heap
page read and write
6731000
heap
page read and write
194DC958000
heap
page read and write
10EBFE000
stack
page read and write
194DC950000
heap
page read and write
6E40000
direct allocation
page execute and read and write
1203FE000
unkown
page readonly
72B400A01000
trusted library allocation
page read and write
194DCF05000
heap
page read and write
194DCEB0000
heap
page read and write
72B403094000
trusted library allocation
page read and write
72B402C2C000
trusted library allocation
page read and write
4F1000
unkown
page execute read
746E000
heap
page read and write
712C000
heap
page read and write
72B402C48000
trusted library allocation
page read and write
3124002F0000
trusted library allocation
page read and write
72B4031A4000
trusted library allocation
page read and write
2AC000
stack
page read and write
1133FE000
unkown
page readonly
194DCEF6000
heap
page read and write
72B40247C000
trusted library allocation
page read and write
194DC959000
heap
page read and write
194DC957000
heap
page read and write
56DC00644000
trusted library allocation
page read and write
312400274000
trusted library allocation
page read and write
194DC958000
heap
page read and write
194DC95B000
heap
page read and write
194E0520000
trusted library allocation
page read and write
72B4024C0000
trusted library allocation
page read and write
72B4023E0000
trusted library allocation
page read and write
71D7000
heap
page read and write
194DCECE000
heap
page read and write
3124002BC000
trusted library allocation
page read and write
3124002A0000
trusted library allocation
page read and write
1273FE000
unkown
page readonly
194DC950000
heap
page read and write
7128000
heap
page read and write
72B402D2C000
trusted library allocation
page read and write
31F0000
direct allocation
page read and write
72B400801000
trusted library allocation
page read and write
56DC00694000
trusted library allocation
page read and write
194DC941000
heap
page read and write
72B402414000
trusted library allocation
page read and write
72B40328C000
trusted library allocation
page read and write
7123000
heap
page read and write
72B402C1C000
trusted library allocation
page read and write
56DC0025C000
trusted library allocation
page read and write
56DC00758000
trusted library allocation
page read and write
56DC00230000
trusted library allocation
page read and write
194DC960000
heap
page read and write
194DC95B000
heap
page read and write
72B402D00000
trusted library allocation
page read and write
72B40313C000
trusted library allocation
page read and write
72B40249A000
trusted library allocation
page read and write
72B40251C000
trusted library allocation
page read and write
1043FE000
unkown
page readonly
194DC960000
heap
page read and write
6731000
heap
page read and write
56DC0060C000
trusted library allocation
page read and write
56DC003EC000
trusted library allocation
page read and write
56DC00310000
trusted library allocation
page read and write
72B4023D4000
trusted library allocation
page read and write
4F0000
unkown
page readonly
194DC958000
heap
page read and write
194DC958000
heap
page read and write
56DC006EC000
trusted library allocation
page read and write
72B4032C8000
trusted library allocation
page read and write
194DC958000
heap
page read and write
194DC95B000
heap
page read and write
194DC960000
heap
page read and write
72B403364000
trusted library allocation
page read and write
194DC958000
heap
page read and write
72B40249E000
trusted library allocation
page read and write
194DCEF0000
heap
page read and write
56DC00744000
trusted library allocation
page read and write
194DC950000
heap
page read and write
72B402590000
trusted library allocation
page read and write
6731000
heap
page read and write
72B40241C000
trusted library allocation
page read and write
72B402C38000
trusted library allocation
page read and write
10E3FE000
unkown
page readonly
72B4026F0000
trusted library allocation
page read and write
72B4026EC000
trusted library allocation
page read and write
72B4022D0000
trusted library allocation
page read and write
4FA000
unkown
page readonly
6BD90000
unkown
page readonly
3124002A0000
trusted library allocation
page read and write
4FA000
unkown
page readonly
6E40000
direct allocation
page execute and read and write
194DC95B000
heap
page read and write
102BFE000
stack
page read and write
6731000
heap
page read and write
72B4024A4000
trusted library allocation
page read and write
194DCEF4000
heap
page read and write
194DC958000
heap
page read and write
72B4024E0000
trusted library allocation
page read and write
3124002D8000
trusted library allocation
page read and write
194DC920000
heap
page read and write
56DC00760000
trusted library allocation
page read and write
194DC959000
heap
page read and write
194DC960000
heap
page read and write
72B400001000
trusted library allocation
page read and write
56DC0035C000
trusted library allocation
page read and write
72B40305C000
trusted library allocation
page read and write
6731000
heap
page read and write
72BE000
heap
page read and write
194DC960000
heap
page read and write
602400274000
direct allocation
page read and write
72B4030C0000
trusted library allocation
page read and write
6731000
heap
page read and write
72DD000
heap
page read and write
71DA000
heap
page read and write
194DC958000
heap
page read and write
194DCEEC000
heap
page read and write
11C3FE000
unkown
page readonly
A10000
heap
page read and write
4F0000
unkown
page readonly
12F3FE000
unkown
page readonly
56DC00238000
trusted library allocation
page read and write
501000
unkown
page readonly
72B402494000
trusted library allocation
page read and write
72B402C01000
trusted library allocation
page read and write
194DC960000
heap
page read and write
72B4024B4000
trusted library allocation
page read and write
6731000
heap
page read and write
194E3530000
trusted library section
page read and write
121BFB000
stack
page read and write
120BFD000
stack
page read and write
194DC959000
heap
page read and write
72B402FF0000
trusted library allocation
page read and write
72B402A0C000
trusted library allocation
page read and write
72B403088000
trusted library allocation
page read and write
56DC002F4000
trusted library allocation
page read and write
103BFE000
stack
page read and write
194E3A5D000
trusted library section
page read and write
194DC960000
heap
page read and write
6E40000
direct allocation
page execute and read and write
194DCEF0000
heap
page read and write
7378000
heap
page read and write
72B402BCC000
trusted library allocation
page read and write
1143FE000
unkown
page readonly
4F0000
unkown
page readonly
72B402FB8000
trusted library allocation
page read and write
72B402C2C000
trusted library allocation
page read and write
194DCF15000
heap
page read and write
194DC95B000
heap
page read and write
6731000
heap
page read and write
72B4025A4000
trusted library allocation
page read and write
194DC958000
heap
page read and write
194E2CA3000
heap
page read and write
56DC00698000
trusted library allocation
page read and write
151000
unkown
page execute and write copy
6731000
heap
page read and write
194E2B70000
heap
page read and write
6731000
heap
page read and write
72B403144000
trusted library allocation
page read and write
72B402BE8000
trusted library allocation
page read and write
72B402A2C000
trusted library allocation
page read and write
56DC002D4000
trusted library allocation
page read and write
6731000
heap
page read and write
194DC958000
heap
page read and write
72B402E0C000
trusted library allocation
page read and write
72B402410000
trusted library allocation
page read and write
72B403238000
trusted library allocation
page read and write
194D955B000
heap
page read and write
194DC983000
heap
page read and write
72B402504000
trusted library allocation
page read and write
72B4023F0000
trusted library allocation
page read and write
72B4023D8000
trusted library allocation
page read and write
749E000
heap
page read and write
7120000
heap
page read and write
194DC963000
heap
page read and write
194DC960000
heap
page read and write
194DC960000
heap
page read and write
72B402601000
trusted library allocation
page read and write
72B402550000
trusted library allocation
page read and write
194DC958000
heap
page read and write
194DC983000
heap
page read and write
7129000
heap
page read and write
194DC95B000
heap
page read and write
56DC0027C000
trusted library allocation
page read and write
194DCF95000
heap
page read and write
194DC959000
heap
page read and write
56DC00658000
trusted library allocation
page read and write
72B40275C000
trusted library allocation
page read and write
4F0000
unkown
page readonly
72B4028BC000
trusted library allocation
page read and write
194E1343000
heap
page read and write
4FA000
unkown
page readonly
602400210000
direct allocation
page read and write
7123000
heap
page read and write
4FA000
unkown
page readonly
726D000
heap
page read and write
11EBFD000
stack
page read and write
194E1340000
heap
page read and write
72B4030F4000
trusted library allocation
page read and write
194DCF20000
heap
page read and write
72B403168000
trusted library allocation
page read and write
72B402E90000
trusted library allocation
page read and write
7122000
heap
page read and write
2B5E000
unkown
page read and write
194DC950000
heap
page read and write
72B40253C000
trusted library allocation
page read and write
4F1000
unkown
page execute read
6E40000
direct allocation
page execute and read and write
1283FE000
unkown
page readonly
72B4028CC000
trusted library allocation
page read and write
194DC93D000
heap
page read and write
194DC958000
heap
page read and write
72B403168000
trusted library allocation
page read and write
72B40349C000
trusted library allocation
page read and write
194DC950000
heap
page read and write
72B4030A0000
trusted library allocation
page read and write
194DC958000
heap
page read and write
72B402868000
trusted library allocation
page read and write
71BF000
heap
page read and write
720E000
heap
page read and write
194DC959000
heap
page read and write
194DCF22000
heap
page read and write
194DC95B000
heap
page read and write
72B402938000
trusted library allocation
page read and write
72B402ABC000
trusted library allocation
page read and write
56DC00714000
trusted library allocation
page read and write
6731000
heap
page read and write
12C3FE000
unkown
page readonly
100BEF000
stack
page read and write
194DC97C000
heap
page read and write
72B403354000
trusted library allocation
page read and write
194D93E0000
heap
page readonly
56DC00788000
trusted library allocation
page read and write
56DC00718000
trusted library allocation
page read and write
72B40225F000
trusted library allocation
page read and write
72B402EBC000
trusted library allocation
page read and write
194DC94C000
heap
page read and write
115BFE000
stack
page read and write
56DC00404000
trusted library allocation
page read and write
72B402328000
trusted library allocation
page read and write
56DC00630000
trusted library allocation
page read and write
72B4028C2000
trusted library allocation
page read and write
6731000
heap
page read and write
72B40234C000
trusted library allocation
page read and write
194E2CF2000
trusted library section
page read and write
501000
unkown
page readonly
56DC0039C000
trusted library allocation
page read and write
31F0000
direct allocation
page read and write
194DC959000
heap
page read and write
72B4023AC000
trusted library allocation
page read and write
194E3A90000
trusted library section
page read and write
11FBFC000
stack
page read and write
56DC00770000
trusted library allocation
page read and write
194DCEF4000
heap
page read and write
194E134D000
heap
page read and write
72B402F50000
trusted library allocation
page read and write
11D3FE000
unkown
page readonly
194DC958000
heap
page read and write
602400270000
direct allocation
page read and write
72B4031E8000
trusted library allocation
page read and write
72B402D30000
trusted library allocation
page read and write
194D9561000
heap
page read and write
56DC00374000
trusted library allocation
page read and write
56DC00801000
trusted library allocation
page read and write
194D9440000
trusted library allocation
page read and write
194DC950000
heap
page read and write
194DC93B000
heap
page read and write
3124002C0000
trusted library allocation
page read and write
31F0000
direct allocation
page read and write
7344000
heap
page read and write
72B4031A4000
trusted library allocation
page read and write
194DC958000
heap
page read and write
72B402801000
trusted library allocation
page read and write
72B403198000
trusted library allocation
page read and write
194DC950000
heap
page read and write
56DC00210000
trusted library allocation
page read and write
72F2000
heap
page read and write
194DC93E000
heap
page read and write
1053FE000
unkown
page readonly
72B4031C0000
trusted library allocation
page read and write
72B4024A8000
trusted library allocation
page read and write
194DC939000
heap
page read and write
6731000
heap
page read and write
194DCEDD000
heap
page read and write
194DD1E0000
trusted library allocation
page read and write
72B402E94000
trusted library allocation
page read and write
56DC00654000
trusted library allocation
page read and write
6E40000
direct allocation
page execute and read and write
194DCF55000
heap
page read and write
12A3FE000
unkown
page readonly
194D94A0000
heap
page read and write
72B4030DC000
trusted library allocation
page read and write
72B401001000
trusted library allocation
page read and write
194DC958000
heap
page read and write
4FE000
unkown
page write copy
72B40260C000
trusted library allocation
page read and write
194DC960000
heap
page read and write
31F0000
direct allocation
page read and write
72B403001000
trusted library allocation
page read and write
72B402BA4000
trusted library allocation
page read and write
194DC958000
heap
page read and write
194DC958000
heap
page read and write
194DC950000
heap
page read and write
4F1000
unkown
page execute read
5E0000
heap
page read and write
312400238000
trusted library allocation
page read and write
10D3FE000
unkown
page readonly
194E34E0000
trusted library section
page read and write
72B4030CC000
trusted library allocation
page read and write
9FC000
stack
page read and write
72B402950000
trusted library allocation
page read and write
72B402550000
trusted library allocation
page read and write
11CF000
stack
page read and write
72B403040000
trusted library allocation
page read and write
10B3FE000
unkown
page readonly
194DC95B000
heap
page read and write
194DC943000
heap
page read and write
194DCEE4000
heap
page read and write
194DC950000
heap
page read and write
194DCEB9000
heap
page read and write
1263FE000
unkown
page readonly
194DCBB0000
heap
page read and write
194DCEDD000
heap
page read and write
72B402D7C000
trusted library allocation
page read and write
72B40277C000
trusted library allocation
page read and write
72B402DC8000
trusted library allocation
page read and write
56DC00678000
trusted library allocation
page read and write
72B403198000
trusted library allocation
page read and write
72B402494000
trusted library allocation
page read and write
194DC93D000
heap
page read and write
194DC960000
heap
page read and write
194E34C0000
trusted library section
page read and write
1083FE000
unkown
page readonly
194DC960000
heap
page read and write
72B4032A4000
trusted library allocation
page read and write
72B4027A4000
trusted library allocation
page read and write
6024002AC000
direct allocation
page read and write
72B400201000
trusted library allocation
page read and write
60240024C000
direct allocation
page read and write
72B4031C4000
trusted library allocation
page read and write
72B402B40000
trusted library allocation
page read and write
194DC943000
heap
page read and write
72B4024F0000
trusted library allocation
page read and write
194DC957000
heap
page read and write
72B402A88000
trusted library allocation
page read and write
194E2B17000
unclassified section
page read and write
194E3A36000
trusted library section
page read and write
72B402684000
trusted library allocation
page read and write
72B40284C000
trusted library allocation
page read and write
194E2CE0000
trusted library section
page read and write
72B402CE0000
trusted library allocation
page read and write
194DC983000
heap
page read and write
7128000
heap
page read and write
602400234000
direct allocation
page read and write
194DC959000
heap
page read and write
727D000
heap
page read and write
194DCE60000
trusted library section
page read and write
9FC000
stack
page read and write
72B402C2C000
trusted library allocation
page read and write
194DC958000
heap
page read and write
6731000
heap
page read and write
72B4023AC000
trusted library allocation
page read and write
194DC959000
heap
page read and write
194DC958000
heap
page read and write
194DC960000
heap
page read and write
56DC00430000
trusted library allocation
page read and write
4F0000
unkown
page readonly
7449000
heap
page read and write
72B4034B0000
trusted library allocation
page read and write
1243FE000
unkown
page readonly
1233FE000
unkown
page readonly
6731000
heap
page read and write
74DD000
heap
page read and write
72B402644000
trusted library allocation
page read and write
72B40278C000
trusted library allocation
page read and write
194DC94E000
heap
page read and write
72B402430000
trusted library allocation
page read and write
72B40306C000
trusted library allocation
page read and write
72B4023B4000
trusted library allocation
page read and write
6731000
heap
page read and write
194DC950000
heap
page read and write
72B402504000
trusted library allocation
page read and write
194DC95B000
heap
page read and write
72B402E54000
trusted library allocation
page read and write
72B402E20000
trusted library allocation
page read and write
312400220000
trusted library allocation
page read and write
194DC958000
heap
page read and write
194DC959000
heap
page read and write
194DC95B000
heap
page read and write
6BEB8000
unkown
page readonly
194E3A52000
trusted library section
page read and write
312400260000
trusted library allocation
page read and write
117BFC000
stack
page read and write
194DCF75000
heap
page read and write
194DC950000
heap
page read and write
6E40000
direct allocation
page execute and read and write
12FBFE000
stack
page read and write
72B402EBC000
trusted library allocation
page read and write
72B402ED4000
trusted library allocation
page read and write
194DC958000
heap
page read and write
194DC958000
heap
page read and write
72B402CA4000
trusted library allocation
page read and write
7126000
heap
page read and write
56DC00750000
trusted library allocation
page read and write
110BFE000
stack
page read and write
194DC959000
heap
page read and write
72B402544000
trusted library allocation
page read and write
194DC949000
heap
page read and write
712C000
heap
page read and write
194DC959000
heap
page read and write
72B402878000
trusted library allocation
page read and write
72B4029E4000
trusted library allocation
page read and write
72B403401000
trusted library allocation
page read and write
725D000
heap
page read and write
7123000
heap
page read and write
72B402490000
trusted library allocation
page read and write
194DCECE000
heap
page read and write
11A3FE000
unkown
page readonly
2D8E000
stack
page read and write
7120000
heap
page read and write
194DC95B000
heap
page read and write
6BC0000
direct allocation
page read and write
72B40316C000
trusted library allocation
page read and write
194DBB80000
unkown
page read and write
72B403040000
trusted library allocation
page read and write
56DC007D0000
trusted library allocation
page read and write
194DC958000
heap
page read and write
312400250000
trusted library allocation
page read and write
194DC958000
heap
page read and write
BDB000
unkown
page execute and write copy
56DC006E4000
trusted library allocation
page read and write
72B40240C000
trusted library allocation
page read and write
7120000
heap
page read and write
72B402AF4000
trusted library allocation
page read and write
724E000
heap
page read and write
72B402334000
trusted library allocation
page read and write
194DC95B000
heap
page read and write
72B402E84000
trusted library allocation
page read and write
72B402BB4000
trusted library allocation
page read and write
56DC00354000
trusted library allocation
page read and write
194DC97C000
heap
page read and write
6E40000
direct allocation
page execute and read and write
6731000
heap
page read and write
72B402F8C000
trusted library allocation
page read and write
194E2CB7000
unclassified section
page read and write
501000
unkown
page readonly
72B4032E8000
trusted library allocation
page read and write
312400264000
trusted library allocation
page read and write
194DC950000
heap
page read and write
194DC958000
heap
page read and write
6731000
heap
page read and write
194DC950000
heap
page read and write
72B402A4C000
trusted library allocation
page read and write
312400288000
trusted library allocation
page read and write
72B402F14000
trusted library allocation
page read and write
194DC95B000
heap
page read and write
194DC958000
heap
page read and write
194E2CA0000
heap
page read and write
194DC958000
heap
page read and write
72B4029C0000
trusted library allocation
page read and write
31F0000
direct allocation
page read and write
72B403274000
trusted library allocation
page read and write
194DC960000
heap
page read and write
7321000
heap
page read and write
72B4028BC000
trusted library allocation
page read and write
10DBFE000
stack
page read and write
194DCF50000
heap
page read and write
721F000
heap
page read and write
1293FE000
unkown
page readonly
194D9420000
heap
page read and write
6731000
heap
page read and write
194E3AD0000
trusted library section
page read and write
1113FE000
unkown
page readonly
1023FE000
unkown
page readonly
72B40334C000
trusted library allocation
page read and write
194DC960000
heap
page read and write
4A0000
heap
page read and write
44C000
stack
page read and write
72B40317C000
trusted library allocation
page read and write
56DC006C8000
trusted library allocation
page read and write
72B402FD4000
trusted library allocation
page read and write
6E20000
direct allocation
page execute and read and write
194DC95B000
heap
page read and write
312400201000
trusted library allocation
page read and write
194DCEEC000
heap
page read and write
194DC94E000
heap
page read and write
72B40263C000
trusted library allocation
page read and write
712E000
heap
page read and write
194DB130000
heap
page read and write
104BFE000
stack
page read and write
194DC957000
heap
page read and write
731C000
heap
page read and write
194DC958000
heap
page read and write
125BFE000
stack
page read and write
194DCEEC000
heap
page read and write
72B402401000
trusted library allocation
page read and write
3124002C8000
trusted library allocation
page read and write
72B402D20000
trusted library allocation
page read and write
11CBFD000
stack
page read and write
194DC960000
heap
page read and write
194DC964000
heap
page read and write
56DC00330000
trusted library allocation
page read and write
740C000
heap
page read and write
72B403378000
trusted library allocation
page read and write
126BFE000
stack
page read and write
72B402AA8000
trusted library allocation
page read and write
194DC97C000
heap
page read and write
194DC95B000
heap
page read and write
1313FE000
unkown
page readonly
72B40221C000
trusted library allocation
page read and write
194DC97C000
heap
page read and write
194DC958000
heap
page read and write
194DC950000
heap
page read and write
3124002C0000
trusted library allocation
page read and write
602400217000
direct allocation
page read and write
194DC96B000
heap
page read and write
56DC006AC000
trusted library allocation
page read and write
C2E000
stack
page read and write
56DC0075C000
trusted library allocation
page read and write
72E5000
heap
page read and write
72B402494000
trusted library allocation
page read and write
194DC95B000
heap
page read and write
194E3563000
trusted library section
page read and write
56DC00364000
trusted library allocation
page read and write
56DC006B0000
trusted library allocation
page read and write
4FA000
unkown
page readonly
72B4022E0000
trusted library allocation
page read and write
4FE000
unkown
page write copy
72B402BD4000
trusted library allocation
page read and write
194DC958000
heap
page read and write
194DC941000
heap
page read and write
6731000
heap
page read and write
72B402E30000
trusted library allocation
page read and write
E6E000
stack
page read and write
194DC95B000
heap
page read and write
194DCF52000
heap
page read and write
194DCF4E000
heap
page read and write
6731000
heap
page read and write
194E3551000
trusted library section
page read and write
12CBFC000
stack
page read and write
6BEB9000
unkown
page read and write
72B400401000
trusted library allocation
page read and write
602400220000
direct allocation
page read and write
72B402550000
trusted library allocation
page read and write
194DC960000
heap
page read and write
7127000
heap
page read and write
56DC00724000
trusted library allocation
page read and write
12B3FE000
unkown
page readonly
194DC958000
heap
page read and write
72B4026A8000
trusted library allocation
page read and write
194DC952000
heap
page read and write
31F0000
direct allocation
page read and write
72B402ED4000
trusted library allocation
page read and write
72B402AD0000
trusted library allocation
page read and write
72B402590000
trusted library allocation
page read and write
194DC950000
heap
page read and write
72B4023C4000
trusted library allocation
page read and write
1153FE000
unkown
page readonly
194DC960000
heap
page read and write
72B402BD4000
trusted library allocation
page read and write
2E90000
heap
page read and write
1223FE000
unkown
page readonly
72B4023E8000
trusted library allocation
page read and write
194DC95C000
heap
page read and write
194DC958000
heap
page read and write
194DC93D000
heap
page read and write
72B402EBC000
trusted library allocation
page read and write
194E2E27000
unclassified section
page read and write
72B5000
heap
page read and write
31F0000
direct allocation
page read and write
6BE6F000
unkown
page readonly
194DC960000
heap
page read and write
194E32C0000
trusted library section
page read and write
72B403108000
trusted library allocation
page read and write
6731000
heap
page read and write
105BFE000
stack
page read and write
194E34FE000
trusted library section
page read and write
194DC95B000
heap
page read and write
194DC960000
heap
page read and write
194DC957000
heap
page read and write
194DC957000
heap
page read and write
7123000
heap
page read and write
194DC950000
heap
page read and write
72B4023B4000
trusted library allocation
page read and write
119BFA000
stack
page read and write
128BFE000
stack
page read and write
194DC950000
heap
page read and write
10ABFB000
stack
page read and write
72B40255C000
trusted library allocation
page read and write
56DC00401000
trusted library allocation
page read and write
4FE000
unkown
page read and write
7123000
heap
page read and write
6731000
heap
page read and write
72B402A64000
trusted library allocation
page read and write
71FE000
heap
page read and write
7123000
heap
page read and write
7255000
heap
page read and write
194DC936000
heap
page read and write
6731000
heap
page read and write
194DCFC0000
trusted library section
page read and write
74E5000
heap
page read and write
12E3FE000
unkown
page readonly
6BD91000
unkown
page execute read
72B402B6C000
trusted library allocation
page read and write
6731000
heap
page read and write
194E1380000
heap
page read and write
72B402510000
trusted library allocation
page read and write
56DC00784000
trusted library allocation
page read and write
602400250000
direct allocation
page read and write
7252000
heap
page read and write
194D9300000
heap
page read and write
7232000
heap
page read and write
6731000
heap
page read and write
194DC950000
heap
page read and write
72B40293B000
trusted library allocation
page read and write
72B40334C000
trusted library allocation
page read and write
194DC950000
heap
page read and write
72B402D90000
trusted library allocation
page read and write
194DC958000
heap
page read and write
602400230000
direct allocation
page read and write
72B402EE4000
trusted library allocation
page read and write
194DCEEC000
heap
page read and write
72B403168000
trusted library allocation
page read and write
194DC960000
heap
page read and write
72B402D70000
trusted library allocation
page read and write
C47000
heap
page read and write
72B400C01000
trusted library allocation
page read and write
71BF000
heap
page read and write
194DC950000
heap
page read and write
10BBFC000
stack
page read and write
72B402280000
trusted library allocation
page read and write
194DC960000
heap
page read and write
194DC95B000
heap
page read and write
72B4022A8000
trusted library allocation
page read and write
194DC951000
heap
page read and write
72B40225A000
trusted library allocation
page read and write
194DC958000
heap
page read and write
194D9465000
heap
page read and write
11ABFC000
stack
page read and write
112BFE000
stack
page read and write
72B403114000
trusted library allocation
page read and write
1123FE000
unkown
page readonly
72B402E3C000
trusted library allocation
page read and write
72B402428000
trusted library allocation
page read and write
56DC002CC000
trusted library allocation
page read and write
73EF000
heap
page read and write
6731000
heap
page read and write
6E40000
direct allocation
page execute and read and write
194DC960000
heap
page read and write
31F0000
direct allocation
page read and write
72B403201000
trusted library allocation
page read and write
72B40253C000
trusted library allocation
page read and write
194DC95B000
heap
page read and write
72B4023DC000
trusted library allocation
page read and write
72B40253C000
trusted library allocation
page read and write
72B402504000
trusted library allocation
page read and write
194DB133000
heap
page read and write
194DC958000
heap
page read and write
312400278000
trusted library allocation
page read and write
7128000
heap
page read and write
72B400E01000
trusted library allocation
page read and write
4F1000
unkown
page execute read
72B403284000
trusted library allocation
page read and write
12BBFA000
stack
page read and write
7123000
heap
page read and write
72B402420000
trusted library allocation
page read and write
31F0000
direct allocation
page read and write
194DC94C000
heap
page read and write
194D9450000
trusted library allocation
page read and write
194DC95B000
heap
page read and write
111BFA000
stack
page read and write
72B402969000
trusted library allocation
page read and write
107BFA000
stack
page read and write
4F1000
unkown
page execute read
72B403188000
trusted library allocation
page read and write
194DCEDD000
heap
page read and write
6731000
heap
page read and write
72B40249A000
trusted library allocation
page read and write
194E35C0000
trusted library section
page read and write
B40000
heap
page read and write
194DC958000
heap
page read and write
194DC958000
heap
page read and write
72B40220C000
trusted library allocation
page read and write
56DC00614000
trusted library allocation
page read and write
72A7000
heap
page read and write
3124002F8000
trusted library allocation
page read and write
118BFD000
stack
page read and write
7236000
heap
page read and write
6731000
heap
page read and write
194DC959000
heap
page read and write
56DC00320000
trusted library allocation
page read and write
7302000
heap
page read and write
194DC958000
heap
page read and write
6731000
heap
page read and write
867000
heap
page read and write
72B402ECC000
trusted library allocation
page read and write
72B40253C000
trusted library allocation
page read and write
56DC00354000
trusted library allocation
page read and write
194DC980000
heap
page read and write
194E3540000
trusted library section
page read and write
72A7000
heap
page read and write
56DC006B4000
trusted library allocation
page read and write
72B402958000
trusted library allocation
page read and write
72B40253C000
trusted library allocation
page read and write
194DC958000
heap
page read and write
194DC958000
heap
page read and write
194DC958000
heap
page read and write
72B402528000
trusted library allocation
page read and write
1213FE000
unkown
page readonly
1253FE000
unkown
page readonly
72B40276C000
trusted library allocation
page read and write
109BFE000
stack
page read and write
194DC950000
heap
page read and write
194DCF62000
heap
page read and write
7286000
heap
page read and write
72C4000
heap
page read and write
72B402201000
trusted library allocation
page read and write
56DC006B8000
trusted library allocation
page read and write
194DC936000
heap
page read and write
194DC950000
heap
page read and write
56DC00601000
trusted library allocation
page read and write
194DC960000
heap
page read and write
3124002F4000
trusted library allocation
page read and write
6731000
heap
page read and write
194DC959000
heap
page read and write
56DC0033C000
trusted library allocation
page read and write
194DC960000
heap
page read and write
72B402B30000
trusted library allocation
page read and write
194E34F2000
trusted library section
page read and write
6E40000
direct allocation
page execute and read and write
72B402494000
trusted library allocation
page read and write
72B402C58000
trusted library allocation
page read and write
602400215000
direct allocation
page read and write
194DC958000
heap
page read and write
194DC958000
heap
page read and write
560000
heap
page read and write
72B402504000
trusted library allocation
page read and write
194DCED5000
heap
page read and write
194D93F0000
heap
page read and write
194DC960000
heap
page read and write
72B402ECC000
trusted library allocation
page read and write
106BFD000
stack
page read and write
6731000
heap
page read and write
72B40326C000
trusted library allocation
page read and write
194DC960000
heap
page read and write
194DC97C000
heap
page read and write
6731000
heap
page read and write
312400248000
trusted library allocation
page read and write
72B402ECF000
trusted library allocation
page read and write
72B402530000
trusted library allocation
page read and write
72B402F1C000
trusted library allocation
page read and write
72B4023AC000
trusted library allocation
page read and write
1093FE000
unkown
page readonly
194D9460000
heap
page read and write
56DC0080C000
trusted library allocation
page read and write
72B402C2C000
trusted library allocation
page read and write
194DC951000
heap
page read and write
72B4026BC000
trusted library allocation
page read and write
194DC959000
heap
page read and write
194DC958000
heap
page read and write
56DC007C8000
trusted library allocation
page read and write
72B4022F0000
trusted library allocation
page read and write
56DC00380000
trusted library allocation
page read and write
151000
unkown
page execute and write copy
4FE000
unkown
page read and write
56DC00390000
trusted library allocation
page read and write
7391000
heap
page read and write
6E40000
direct allocation
page execute and read and write
72B4030AC000
trusted library allocation
page read and write
113BFE000
stack
page read and write
194DC959000
heap
page read and write
194DC97C000
heap
page read and write
72B403040000
trusted library allocation
page read and write
72B4024FF000
trusted library allocation
page read and write
520000
heap
page read and write
194DC95D000
heap
page read and write
194DC95B000
heap
page read and write
194DCED5000
heap
page read and write
72B4027DC000
trusted library allocation
page read and write
72B402E01000
trusted library allocation
page read and write
72B400601000
trusted library allocation
page read and write
123BFD000
stack
page read and write
72B402C78000
trusted library allocation
page read and write
194DC958000
heap
page read and write
6731000
heap
page read and write
72B402C0C000
trusted library allocation
page read and write
72B4026E0000
trusted library allocation
page read and write
56DC00610000
trusted library allocation
page read and write
56DC006F0000
trusted library allocation
page read and write
72B402E74000
trusted library allocation
page read and write
194DC943000
heap
page read and write
6E40000
direct allocation
page execute and read and write
72B402D10000
trusted library allocation
page read and write
73DF000
heap
page read and write
194DC950000
heap
page read and write
72B40240C000
trusted library allocation
page read and write
72B402B08000
trusted library allocation
page read and write
194DCF38000
heap
page read and write
7122000
heap
page read and write
194E2DB2000
trusted library section
page read and write
72B402494000
trusted library allocation
page read and write
6731000
heap
page read and write
194E30C0000
trusted library section
page read and write
56DC00624000
trusted library allocation
page read and write
72B402E34000
trusted library allocation
page read and write
72B402945000
trusted library allocation
page read and write
712C000
heap
page read and write
56DC00248000
trusted library allocation
page read and write
194DC958000
heap
page read and write
6731000
heap
page read and write
56DC00348000
trusted library allocation
page read and write
56DC00220000
trusted library allocation
page read and write
72B40237C000
trusted library allocation
page read and write
72B4031B4000
trusted library allocation
page read and write
72B402F80000
trusted library allocation
page read and write
194DC97C000
heap
page read and write
12DBFE000
stack
page read and write
56DC007B4000
trusted library allocation
page read and write
194DC950000
heap
page read and write
7291000
heap
page read and write
72B402580000
trusted library allocation
page read and write
72B40289C000
trusted library allocation
page read and write
27FD000
stack
page read and write
72B402FD9000
trusted library allocation
page read and write
108BFC000
stack
page read and write
11BBFC000
stack
page read and write
10C3FE000
unkown
page readonly
72B403388000
trusted library allocation
page read and write
72B402A7C000
trusted library allocation
page read and write
194E3847000
unclassified section
page read and write
11DBFC000
stack
page read and write
194DC962000
heap
page read and write
72B402F00000
trusted library allocation
page read and write
56DC00754000
trusted library allocation
page read and write
501000
unkown
page readonly
194DC958000
heap
page read and write
2AF0000
heap
page read and write
194DC943000
heap
page read and write
72B40253C000
trusted library allocation
page read and write
194DC97C000
heap
page read and write
72B402974000
trusted library allocation
page read and write
72CB000
direct allocation
page read and write
3124002BC000
trusted library allocation
page read and write
72B402ECC000
trusted library allocation
page read and write
194DC959000
heap
page read and write
194E0D34000
trusted library allocation
page read and write
72B402900000
trusted library allocation
page read and write
72B402BD4000
trusted library allocation
page read and write
72B4025B0000
trusted library allocation
page read and write
3124002C0000
trusted library allocation
page read and write
72B402DB0000
trusted library allocation
page read and write
56DC0078C000
trusted library allocation
page read and write
56DC00664000
trusted library allocation
page read and write
72B402570000
trusted library allocation
page read and write
194DC958000
heap
page read and write
72B4028BC000
trusted library allocation
page read and write
194DCECE000
heap
page read and write
194DCF10000
heap
page read and write
122BFE000
stack
page read and write
194DCF09000
heap
page read and write
72B4023F4000
trusted library allocation
page read and write
501000
unkown
page readonly
194DC962000
heap
page read and write
72DD000
heap
page read and write
72B402CB4000
trusted library allocation
page read and write
6731000
heap
page read and write
72B4032D4000
trusted library allocation
page read and write
194DC95B000
heap
page read and write
56DC00730000
trusted library allocation
page read and write
72B4024B4000
trusted library allocation
page read and write
6BC0000
direct allocation
page read and write
194DC959000
heap
page read and write
72B402910000
trusted library allocation
page read and write
194DCEBC000
heap
page read and write
72B402564000
trusted library allocation
page read and write
72B402A01000
trusted library allocation
page read and write
194DCEE2000
heap
page read and write
72B402274000
trusted library allocation
page read and write
56DC00330000
trusted library allocation
page read and write
194DC960000
heap
page read and write
72B402DF0000
trusted library allocation
page read and write
56DC00288000
trusted library allocation
page read and write
72B402E34000
trusted library allocation
page read and write
194D94A8000
heap
page read and write
11F3FE000
unkown
page readonly
2B80000
heap
page read and write
56DC00668000
trusted library allocation
page read and write
72B402FA0000
trusted library allocation
page read and write
194DC958000
heap
page read and write
72B402EA4000
trusted library allocation
page read and write
71CC000
heap
page read and write
194DC958000
heap
page read and write
194DCF27000
heap
page read and write
7172000
direct allocation
page read and write
72B402CC4000
trusted library allocation
page read and write
114BFE000
stack
page read and write
3124002BC000
trusted library allocation
page read and write
72B402EBC000
trusted library allocation
page read and write
6024002EC000
direct allocation
page read and write
194DC960000
heap
page read and write
7223000
heap
page read and write
194DC958000
heap
page read and write
1073FE000
unkown
page readonly
72B402A24000
trusted library allocation
page read and write
56DC00424000
trusted library allocation
page read and write
72B402E30000
trusted library allocation
page read and write
72B4031A4000
trusted library allocation
page read and write
56DC002ED000
trusted library allocation
page read and write
1193FE000
unkown
page readonly
6731000
heap
page read and write
A00000
heap
page read and write
4FE000
unkown
page write copy
10F3FE000
unkown
page readonly
72B402F94000
trusted library allocation
page read and write
860000
heap
page read and write
194DC97C000
heap
page read and write
194DC959000
heap
page read and write
10A3FE000
unkown
page readonly
194DC950000
heap
page read and write
194DCEE4000
heap
page read and write
7129000
heap
page read and write
72B4023E4000
trusted library allocation
page read and write
72B4031E8000
trusted library allocation
page read and write
194DC959000
heap
page read and write
7294000
heap
page read and write
6E30000
direct allocation
page execute and read and write
11B3FE000
unkown
page readonly
72B40229E000
trusted library allocation
page read and write
3124002E4000
trusted library allocation
page read and write
7126000
heap
page read and write
A1A000
heap
page read and write
194E2DBD000
trusted library section
page read and write
312400270000
trusted library allocation
page read and write
72B402504000
trusted library allocation
page read and write
194DCEF4000
heap
page read and write
72B4032EC000
trusted library allocation
page read and write
56DC007CC000
trusted library allocation
page read and write
56DC006FC000
trusted library allocation
page read and write
72B4030BF000
trusted library allocation
page read and write
3124002B0000
trusted library allocation
page read and write
602400260000
direct allocation
page read and write
194DD140000
trusted library section
page read and write
194DCF13000
heap
page read and write
7284000
heap
page read and write
602400294000
direct allocation
page read and write
194DC980000
heap
page read and write
56DC00320000
trusted library allocation
page read and write
59C000
stack
page read and write
72B403050000
trusted library allocation
page read and write
6731000
heap
page read and write
194E3ADE000
trusted library section
page read and write
194D9490000
trusted library section
page readonly
194DC960000
heap
page read and write
71E4000
heap
page read and write
72B403114000
trusted library allocation
page read and write
72B402F78000
trusted library allocation
page read and write
194DC950000
heap
page read and write
194DC93B000
heap
page read and write
194DC950000
heap
page read and write
194DC959000
heap
page read and write
6731000
heap
page read and write
12D3FE000
unkown
page readonly
194DC97C000
heap
page read and write
56DC00201000
trusted library allocation
page read and write
194DC950000
heap
page read and write
3124002C0000
trusted library allocation
page read and write
194DC950000
heap
page read and write
72B402928000
trusted library allocation
page read and write
1303FE000
unkown
page readonly
501000
unkown
page readonly
194DC958000
heap
page read and write
194DC958000
heap
page read and write
72B40340C000
trusted library allocation
page read and write
72B403074000
trusted library allocation
page read and write
194DC939000
heap
page read and write
124BFE000
stack
page read and write
6E40000
direct allocation
page execute and read and write
194DC94C000
heap
page read and write
194DC958000
heap
page read and write
712B000
heap
page read and write
6731000
heap
page read and write
72B402B60000
trusted library allocation
page read and write
6731000
heap
page read and write
7121000
heap
page read and write
6E40000
direct allocation
page execute and read and write
72B40261C000
trusted library allocation
page read and write
194DC941000
heap
page read and write
6731000
heap
page read and write
6731000
heap
page read and write
71E8000
heap
page read and write
72B402544000
trusted library allocation
page read and write
6BC0000
direct allocation
page read and write
72B402EB0000
trusted library allocation
page read and write
194DC97C000
heap
page read and write
72B403168000
trusted library allocation
page read and write
6731000
heap
page read and write
6B70000
trusted library allocation
page read and write
72B402498000
trusted library allocation
page read and write
602400201000
direct allocation
page read and write
530000
heap
page read and write
72B402FA6000
trusted library allocation
page read and write
56DC006E0000
trusted library allocation
page read and write
72C4000
heap
page read and write
194DC958000
heap
page read and write
1063FE000
unkown
page readonly
194DC983000
heap
page read and write
6731000
heap
page read and write
56DC00368000
trusted library allocation
page read and write
194DC960000
heap
page read and write
72B4024F7000
trusted library allocation
page read and write
194DC960000
heap
page read and write
194DC980000
heap
page read and write
72B402510000
trusted library allocation
page read and write
72B402AE4000
trusted library allocation
page read and write
194DC95B000
heap
page read and write
194DC980000
heap
page read and write
72B403294000
trusted library allocation
page read and write
194DC950000
heap
page read and write
56DC006D0000
trusted library allocation
page read and write
72B4025B0000
trusted library allocation
page read and write
56DC0040C000
trusted library allocation
page read and write
1173FE000
unkown
page readonly
312400230000
trusted library allocation
page read and write
194DC958000
heap
page read and write
72B402264000
trusted library allocation
page read and write
56DC002B8000
trusted library allocation
page read and write
6024002A8000
direct allocation
page read and write
56DC00320000
trusted library allocation
page read and write
74AA000
heap
page read and write
194DC96B000
heap
page read and write
6731000
heap
page read and write
72B4024B4000
trusted library allocation
page read and write
72B402EBC000
trusted library allocation
page read and write
72B402F80000
trusted library allocation
page read and write
72E5000
heap
page read and write
72B402394000
trusted library allocation
page read and write
72B402D70000
trusted library allocation
page read and write
72B40228C000
trusted library allocation
page read and write
6731000
heap
page read and write
194DC959000
heap
page read and write
72B402244000
trusted library allocation
page read and write
743A000
heap
page read and write
72B4023F8000
trusted library allocation
page read and write
C40000
heap
page read and write
72B402494000
trusted library allocation
page read and write
56DC002B0000
trusted library allocation
page read and write
1103FE000
unkown
page readonly
56DC006D4000
trusted library allocation
page read and write
72B402EBC000
trusted library allocation
page read and write
150000
unkown
page readonly
56DC00310000
trusted library allocation
page read and write
72B402EF0000
trusted library allocation
page read and write
72B402424000
trusted library allocation
page read and write
194DC959000
heap
page read and write
56DC00620000
trusted library allocation
page read and write
7122000
heap
page read and write
194DC958000
heap
page read and write
3124002C0000
trusted library allocation
page read and write
72B402F68000
trusted library allocation
page read and write
6024002E4000
direct allocation
page read and write
72B402FAC000
trusted library allocation
page read and write
72B40303C000
trusted library allocation
page read and write
712F000
heap
page read and write
72B40249E000
trusted library allocation
page read and write
194DC958000
heap
page read and write
72C9000
direct allocation
page read and write
56DC002E4000
trusted library allocation
page read and write
194E2D53000
trusted library section
page read and write
72B40235C000
trusted library allocation
page read and write
7120000
heap
page read and write
7129000
heap
page read and write
31F0000
direct allocation
page read and write
72B4027EC000
trusted library allocation
page read and write
194DC958000
heap
page read and write
127BFE000
stack
page read and write
2AEE000
unkown
page read and write
72B4023A0000
trusted library allocation
page read and write
72B402F60000
trusted library allocation
page read and write
56DC00640000
trusted library allocation
page read and write
6E40000
direct allocation
page execute and read and write
72B40313C000
trusted library allocation
page read and write
72B402550000
trusted library allocation
page read and write
56DC0069C000
trusted library allocation
page read and write
6731000
heap
page read and write
6E40000
direct allocation
page execute and read and write
194DC960000
heap
page read and write
6731000
heap
page read and write
194DC960000
heap
page read and write
56DC00320000
trusted library allocation
page read and write
5E0000
heap
page read and write
6E10000
direct allocation
page execute and read and write
72B402F48000
trusted library allocation
page read and write
3124002BC000
trusted library allocation
page read and write
194DC966000
heap
page read and write
72B40316C000
trusted library allocation
page read and write
2B8B000
heap
page read and write
194DC96B000
heap
page read and write
72B402894000
trusted library allocation
page read and write
72B40281C000
trusted library allocation
page read and write
602400280000
direct allocation
page read and write
194E2D96000
trusted library section
page read and write
194DC937000
heap
page read and write
72B402E5C000
trusted library allocation
page read and write
194DC958000
heap
page read and write
72B40242C000
trusted library allocation
page read and write
194E0D52000
trusted library allocation
page read and write
72B402B9B000
trusted library allocation
page read and write
3124002B0000
trusted library allocation
page read and write
7215000
heap
page read and write
4F0000
unkown
page readonly
7306000
heap
page read and write
194DC958000
heap
page read and write
72B402590000
trusted library allocation
page read and write
7279000
heap
page read and write
194DCF46000
heap
page read and write
129BFE000
stack
page read and write
194DC943000
heap
page read and write
56DC002FC000
trusted library allocation
page read and write
56DC00330000
trusted library allocation
page read and write
72B40320C000
trusted library allocation
page read and write
56DC006E8000
trusted library allocation
page read and write
1498000
heap
page read and write
56DC0020C000
trusted library allocation
page read and write
194E34D1000
trusted library section
page read and write
10CBFD000
stack
page read and write
6731000
heap
page read and write
72B402E30000
trusted library allocation
page read and write
6731000
heap
page read and write
194DC941000
heap
page read and write
72B402DA8000
trusted library allocation
page read and write
194DC950000
heap
page read and write
712C000
heap
page read and write
194DC95B000
heap
page read and write
72B4029A8000
trusted library allocation
page read and write
194DC959000
heap
page read and write
72B40321C000
trusted library allocation
page read and write
72B402550000
trusted library allocation
page read and write
742F000
heap
page read and write
194DC96B000
heap
page read and write
72B403198000
trusted library allocation
page read and write
72B40313C000
trusted library allocation
page read and write
72B4024F4000
trusted library allocation
page read and write
602400303000
direct allocation
page read and write
6E40000
direct allocation
page execute and read and write
72FE000
heap
page read and write
56DC00700000
trusted library allocation
page read and write
3124002BC000
trusted library allocation
page read and write
72B402318000
trusted library allocation
page read and write
194DC958000
heap
page read and write
56DC0033C000
trusted library allocation
page read and write
194DC950000
heap
page read and write
194DC950000
heap
page read and write
312400294000
trusted library allocation
page read and write
BE0000
heap
page read and write
194DC958000
heap
page read and write
72B402E68000
trusted library allocation
page read and write
60240020C000
direct allocation
page read and write
194DC93D000
heap
page read and write
72B402CF0000
trusted library allocation
page read and write
2B10000
heap
page read and write
6024002DC000
direct allocation
page read and write
2A3A000
stack
page read and write
194DC960000
heap
page read and write
194DC962000
heap
page read and write
7126000
heap
page read and write
72B403030000
trusted library allocation
page read and write
712B000
heap
page read and write
194DC960000
heap
page read and write
72B402F0C000
trusted library allocation
page read and write
194DCF38000
heap
page read and write
72B4024A8000
trusted library allocation
page read and write
712C000
heap
page read and write
12ABFE000
stack
page read and write
3124002B0000
trusted library allocation
page read and write
7120000
heap
page read and write
72B402494000
trusted library allocation
page read and write
6BEBC000
unkown
page readonly
194DC958000
heap
page read and write
72FA000
heap
page read and write
194DC949000
heap
page read and write
194DC958000
heap
page read and write
194DC959000
heap
page read and write
194D952B000
heap
page read and write
194DC958000
heap
page read and write
194DC95B000
heap
page read and write
1183FE000
unkown
page readonly
72B4023B4000
trusted library allocation
page read and write
12EBFE000
stack
page read and write
194DC95B000
heap
page read and write
194DC958000
heap
page read and write
194DCF6B000
heap
page read and write
194DC958000
heap
page read and write
194DC958000
heap
page read and write
72B402418000
trusted library allocation
page read and write
72B4031D0000
trusted library allocation
page read and write
72B40236C000
trusted library allocation
page read and write
31F0000
direct allocation
page read and write
72B4023D0000
trusted library allocation
page read and write
72B402590000
trusted library allocation
page read and write
6731000
heap
page read and write
56DC00688000
trusted library allocation
page read and write
72B402858000
trusted library allocation
page read and write
72B402C2C000
trusted library allocation
page read and write
6E40000
direct allocation
page execute and read and write
194DC958000
heap
page read and write
3124002A0000
trusted library allocation
page read and write
6E40000
direct allocation
page execute and read and write
6731000
heap
page read and write
31F0000
direct allocation
page read and write
72B4028AC000
trusted library allocation
page read and write
194DCEF0000
heap
page read and write
730C000
heap
page read and write
4F1000
unkown
page execute read
194DC95B000
heap
page read and write
6731000
heap
page read and write
194DC959000
heap
page read and write
312400235000
trusted library allocation
page read and write
56DC00250000
trusted library allocation
page read and write
194DC950000
heap
page read and write
11E3FE000
unkown
page readonly
4AC000
stack
page read and write
56DC00734000
trusted library allocation
page read and write
194DC959000
heap
page read and write
56DC00704000
trusted library allocation
page read and write
194DC950000
heap
page read and write
56DC00248000
trusted library allocation
page read and write
3124002A0000
trusted library allocation
page read and write
712E000
heap
page read and write
72B402708000
trusted library allocation
page read and write
194DC960000
heap
page read and write
194D9527000
heap
page read and write
194DC962000
heap
page read and write
72B4023EC000
trusted library allocation
page read and write
6731000
heap
page read and write
72B403144000
trusted library allocation
page read and write
56DC00684000
trusted library allocation
page read and write
116BFB000
stack
page read and write
72B40253C000
trusted library allocation
page read and write
56DC00418000
trusted library allocation
page read and write
31F0000
direct allocation
page read and write
A1E000
heap
page read and write
194DC95B000
heap
page read and write
72B403294000
trusted library allocation
page read and write
72B402E34000
trusted library allocation
page read and write
72B4034A0000
trusted library allocation
page read and write
194DCEE4000
heap
page read and write
2DCF000
stack
page read and write
2AA0000
heap
page read and write
7125000
heap
page read and write
72B40269C000
trusted library allocation
page read and write
194DC95B000
heap
page read and write
7121000
heap
page read and write
194DC950000
heap
page read and write
72B403168000
trusted library allocation
page read and write
194DC958000
heap
page read and write
72B402F24000
trusted library allocation
page read and write
72B40251C000
trusted library allocation
page read and write
194DC950000
heap
page read and write
56DC00408000
trusted library allocation
page read and write
72B402FE4000
trusted library allocation
page read and write
72B402544000
trusted library allocation
page read and write
31F0000
direct allocation
page read and write
3124002BC000
trusted library allocation
page read and write
3124002BC000
trusted library allocation
page read and write
72B402F38000
trusted library allocation
page read and write
602400284000
direct allocation
page read and write
E2F000
stack
page read and write
194DC94C000
heap
page read and write
FC0000
heap
page read and write
72B4023B4000
trusted library allocation
page read and write
194DC959000
heap
page read and write
130BFE000
stack
page read and write
194DC959000
heap
page read and write
56DC006C4000
trusted library allocation
page read and write
72B40280C000
trusted library allocation
page read and write
194DC95B000
heap
page read and write
194DC94C000
heap
page read and write
6E40000
direct allocation
page execute and read and write
101BFE000
unkown
page read and write
194DCF1C000
heap
page read and write
72B40300C000
trusted library allocation
page read and write
72B402998000
trusted library allocation
page read and write
194DC950000
heap
page read and write
7296000
heap
page read and write
B70000
heap
page read and write
194DC95B000
heap
page read and write
7257000
heap
page read and write
71D5000
heap
page read and write
60240023C000
direct allocation
page read and write
72B403040000
trusted library allocation
page read and write
602400290000
direct allocation
page read and write
194DC952000
heap
page read and write
6BE6D000
unkown
page read and write
194DD1D7000
unclassified section
page read and write
194DC959000
heap
page read and write
194DC941000
heap
page read and write
72B402EBC000
trusted library allocation
page read and write
72B402530000
trusted library allocation
page read and write
72B40283C000
trusted library allocation
page read and write
D80000
heap
page read and write
6024002D0000
direct allocation
page read and write
194DC958000
heap
page read and write
72B4032F4000
trusted library allocation
page read and write
72B402498000
trusted library allocation
page read and write
194DC95B000
heap
page read and write
7205000
heap
page read and write
72B4027C4000
trusted library allocation
page read and write
194DC910000
heap
page read and write
72B4026A0000
trusted library allocation
page read and write
194DC948000
heap
page read and write
194DC95B000
heap
page read and write
194DC958000
heap
page read and write
6E40000
direct allocation
page execute and read and write
1163FE000
unkown
page readonly
4FA000
unkown
page readonly
4FE000
unkown
page read and write
194E35CE000
trusted library section
page read and write
72B402D88000
trusted library allocation
page read and write
72B4028E0000
trusted library allocation
page read and write
72B40238C000
trusted library allocation
page read and write
194DC962000
heap
page read and write
There are 1317 hidden memdumps, click here to show them.