IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_de576c89c85d95f63177b89249eef622329cc21c_49e505fd_021bcb68-4585-4400-9dd3-1ccbb23bcfd9\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBA63.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Nov 24 03:30:40 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBBCB.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBC0B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 --field-trial-handle=2312,i,7568906053248851717,9207987864527755389,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5400 -s 1356
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://chrome.google.com/webstoreHS
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://www.google.com/async/ddljson?async=ntp:2lidator
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://anglebug.com/3832K
unknown
http://anglebug.com/3965L
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=bSH
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
https://www.youtube.com/s/notifications/manifest/cr_install.html(
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/8229G
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://docs.googl0
unknown
http://anglebug.com/5371?
unknown
http://anglebug.com/7488(
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://issuetracker.google.com/issues/1664752733
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://docs.google.com/presentation/
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
http://anglebug.com/5881q
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://chrome.google.com/webstore?hl=en3
unknown
https://issuetracker.google.com/161903006
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://www.youtube.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://docs.google.com/spreadsheets/
unknown
http://anglebug.com/7406H
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEklyp
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/5421M
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://drive-daily-4.c
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
34.116.198.130
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/5881&
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://anglebug.com/7714U
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
https://docs.google.com/spreadsheets/0YcHS
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/6860B
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fvtekk5pn.top
34.116.198.130
www.google.com
172.217.21.36
fvtekk5pn.top
34.116.198.130

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
34.116.198.130
home.fvtekk5pn.top
United States
172.217.21.36
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
malicious
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
malicious
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
malicious
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
malicious
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
malicious
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
malicious
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
malicious
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
malicious
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
malicious
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
malicious
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
malicious
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
malicious
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
malicious
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
malicious
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
malicious
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
malicious
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
malicious
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
malicious
\REGISTRY\A\{ad3ba349-3b33-6574-a6e2-83c6505a81d8}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6D91000
heap
page read and write
1B0000
unkown
page readonly
53480033C000
trusted library allocation
page read and write
370400230000
trusted library allocation
page read and write
4200091C000
trusted library allocation
page read and write
7220000
direct allocation
page read and write
74A0000
direct allocation
page execute and read and write
534800E0C000
trusted library allocation
page read and write
534801084000
trusted library allocation
page read and write
B094FFE000
unkown
page readonly
B0A1FFE000
unkown
page readonly
1250000
heap
page read and write
534800E6C000
trusted library allocation
page read and write
B09D7FB000
stack
page read and write
4200087C000
trusted library allocation
page read and write
6C22F000
unkown
page readonly
B0A67FB000
stack
page read and write
534800565000
trusted library allocation
page read and write
F98000
heap
page read and write
53480033C000
trusted library allocation
page read and write
534800FE8000
trusted library allocation
page read and write
534800CA4000
trusted library allocation
page read and write
534800F48000
trusted library allocation
page read and write
6D91000
heap
page read and write
B08FFFE000
unkown
page readonly
1BA000
unkown
page readonly
3704002A0000
trusted library allocation
page read and write
5348012D8000
trusted library allocation
page read and write
534800380000
trusted library allocation
page read and write
7878000
heap
page read and write
534800144000
trusted library allocation
page read and write
534800D20000
trusted library allocation
page read and write
534801170000
trusted library allocation
page read and write
5348001D4000
trusted library allocation
page read and write
534800A28000
trusted library allocation
page read and write
79BB000
heap
page read and write
6D91000
heap
page read and write
793F000
heap
page read and write
420006AC000
trusted library allocation
page read and write
1B0000
unkown
page readonly
6D91000
heap
page read and write
7A48000
heap
page read and write
7BFF000
heap
page read and write
1E8DF912000
trusted library section
page read and write
787A000
heap
page read and write
534800350000
trusted library allocation
page read and write
534800228000
trusted library allocation
page read and write
1E8D9800000
heap
page read and write
534800E88000
trusted library allocation
page read and write
534800CC8000
trusted library allocation
page read and write
1100024C000
direct allocation
page read and write
534800454000
trusted library allocation
page read and write
1E8D97F3000
heap
page read and write
B0987FA000
stack
page read and write
370400235000
trusted library allocation
page read and write
B08B7FE000
stack
page read and write
5348005DC000
trusted library allocation
page read and write
534800EE4000
trusted library allocation
page read and write
53480052C000
trusted library allocation
page read and write
5348002A4000
trusted library allocation
page read and write
5348000AC000
trusted library allocation
page read and write
1E8E0487000
unclassified section
page read and write
534800B40000
trusted library allocation
page read and write
B08C7FE000
stack
page read and write
3704002C8000
trusted library allocation
page read and write
370400288000
trusted library allocation
page read and write
42000948000
trusted library allocation
page read and write
534800B00000
trusted library allocation
page read and write
1E8DFA40000
trusted library section
page read and write
2D60000
heap
page read and write
B0A17FA000
stack
page read and write
42000728000
trusted library allocation
page read and write
B0B5FFE000
unkown
page readonly
534800D34000
trusted library allocation
page read and write
13CA000
heap
page read and write
5348004D4000
trusted library allocation
page read and write
534800A5A000
trusted library allocation
page read and write
1E8D9D81000
heap
page read and write
370400270000
trusted library allocation
page read and write
B09F7FB000
stack
page read and write
53480009F000
trusted library allocation
page read and write
B0AF7FD000
stack
page read and write
534800064000
trusted library allocation
page read and write
5348001A0000
trusted library allocation
page read and write
6D80000
direct allocation
page read and write
11000270000
direct allocation
page read and write
534800888000
trusted library allocation
page read and write
534800124000
trusted library allocation
page read and write
1E8D6235000
heap
page read and write
53480033C000
trusted library allocation
page read and write
534800D58000
trusted library allocation
page read and write
7873000
heap
page read and write
B0A37FE000
unkown
page readonly
42000974000
trusted library allocation
page read and write
534800F3C000
trusted library allocation
page read and write
3704002F4000
trusted library allocation
page read and write
1E8D9E04000
heap
page read and write
B0B0FFE000
unkown
page readonly
6D91000
heap
page read and write
534800298000
trusted library allocation
page read and write
5348001A8000
trusted library allocation
page read and write
534800380000
trusted library allocation
page read and write
5348007E0000
trusted library allocation
page read and write
5348002E0000
trusted library allocation
page read and write
1C1000
unkown
page readonly
534800B40000
trusted library allocation
page read and write
42000840000
trusted library allocation
page read and write
1E8D9D88000
heap
page read and write
5348005A4000
trusted library allocation
page read and write
42000801000
trusted library allocation
page read and write
6C279000
unkown
page read and write
1B1000
unkown
page execute read
110002A8000
direct allocation
page read and write
5348001D8000
trusted library allocation
page read and write
534800328000
trusted library allocation
page read and write
42000418000
trusted library allocation
page read and write
53480029A000
trusted library allocation
page read and write
534800F5C000
trusted library allocation
page read and write
A00000
heap
page read and write
C0E000
stack
page read and write
6C150000
unkown
page readonly
42000918000
trusted library allocation
page read and write
6D91000
heap
page read and write
9C0000
heap
page read and write
534800CEC000
trusted library allocation
page read and write
534800C2C000
trusted library allocation
page read and write
53480060C000
trusted library allocation
page read and write
534800B30000
trusted library allocation
page read and write
3704002B0000
trusted library allocation
page read and write
534801184000
trusted library allocation
page read and write
534800C48000
trusted library allocation
page read and write
53480033C000
trusted library allocation
page read and write
7952000
heap
page read and write
1E8D9DBE000
heap
page read and write
534800F3C000
trusted library allocation
page read and write
11000250000
direct allocation
page read and write
3130000
heap
page read and write
1E8DFA4E000
trusted library section
page read and write
13C0000
heap
page read and write
534800350000
trusted library allocation
page read and write
534800601000
trusted library allocation
page read and write
534800124000
trusted library allocation
page read and write
534800070000
trusted library allocation
page read and write
1B1000
unkown
page execute read
B0B6FFE000
unkown
page readonly
53480061C000
trusted library allocation
page read and write
534801054000
trusted library allocation
page read and write
1E8D6220000
trusted library allocation
page read and write
B095FFE000
unkown
page readonly
534800654000
trusted library allocation
page read and write
42000884000
trusted library allocation
page read and write
534800D40000
trusted library allocation
page read and write
1E8DF9B6000
trusted library section
page read and write
7B6F000
heap
page read and write
B09DFFE000
unkown
page readonly
B0A7FFE000
unkown
page readonly
534800558000
trusted library allocation
page read and write
6D91000
heap
page read and write
53480074C000
trusted library allocation
page read and write
5348002B9000
trusted library allocation
page read and write
5348010E4000
trusted library allocation
page read and write
370400278000
trusted library allocation
page read and write
74A0000
direct allocation
page execute and read and write
74A0000
direct allocation
page execute and read and write
2C30000
heap
page read and write
1E8E0292000
trusted library section
page read and write
1330000
heap
page read and write
1E8D97C0000
heap
page read and write
5348010B0000
trusted library allocation
page read and write
B0B47FE000
stack
page read and write
534800294000
trusted library allocation
page read and write
7870000
heap
page read and write
534800DC0000
trusted library allocation
page read and write
1E8D97FC000
heap
page read and write
534800FE8000
trusted library allocation
page read and write
798C000
heap
page read and write
4200080C000
trusted library allocation
page read and write
3704002F8000
trusted library allocation
page read and write
5348009AF000
trusted library allocation
page read and write
534800570000
trusted library allocation
page read and write
534801044000
trusted library allocation
page read and write
6D91000
heap
page read and write
5348009F0000
trusted library allocation
page read and write
AF0000
heap
page read and write
7878000
heap
page read and write
1236000
unkown
page execute and write copy
534800184000
trusted library allocation
page read and write
7906000
heap
page read and write
42000904000
trusted library allocation
page read and write
5348001B4000
trusted library allocation
page read and write
787B000
heap
page read and write
534800FAC000
trusted library allocation
page read and write
1E8D6300000
heap
page read and write
B09EFFE000
unkown
page readonly
1E8D9D60000
heap
page read and write
3704002B0000
trusted library allocation
page read and write
1E8D9E4F000
heap
page read and write
7950000
heap
page read and write
53480129C000
trusted library allocation
page read and write
534800294000
trusted library allocation
page read and write
128F000
stack
page read and write
7ABD000
heap
page read and write
110002EC000
direct allocation
page read and write
4200081C000
trusted library allocation
page read and write
B0897FF000
stack
page read and write
B0907FE000
stack
page read and write
42000890000
trusted library allocation
page read and write
534800BD8000
trusted library allocation
page read and write
1080000
heap
page read and write
5348003B4000
trusted library allocation
page read and write
7A7A000
heap
page read and write
6D80000
direct allocation
page read and write
420002F2000
trusted library allocation
page read and write
1E8D631F000
heap
page read and write
1E8D631F000
heap
page read and write
420008E4000
trusted library allocation
page read and write
B0A07FC000
stack
page read and write
110002E4000
direct allocation
page read and write
1E8D97F7000
heap
page read and write
420008C4000
trusted library allocation
page read and write
B0B07FE000
unkown
page readonly
143F000
stack
page read and write
42000878000
trusted library allocation
page read and write
3704002BC000
trusted library allocation
page read and write
5348009B8000
trusted library allocation
page read and write
420002F4000
trusted library allocation
page read and write
534800A1C000
trusted library allocation
page read and write
B0957FE000
stack
page read and write
534800370000
trusted library allocation
page read and write
6D80000
direct allocation
page read and write
42000920000
trusted library allocation
page read and write
79AC000
heap
page read and write
1E8E0150000
trusted library section
page read and write
53480105C000
trusted library allocation
page read and write
534800F48000
trusted library allocation
page read and write
1E8DF72E000
heap
page read and write
79E6000
heap
page read and write
1100023C000
direct allocation
page read and write
7A07000
heap
page read and write
534800D10000
trusted library allocation
page read and write
7A32000
heap
page read and write
2D50000
heap
page read and write
1E8D9DB7000
heap
page read and write
1B1000
unkown
page execute read
42000880000
trusted library allocation
page read and write
5348004FC000
trusted library allocation
page read and write
5348000DC000
trusted library allocation
page read and write
6D80000
direct allocation
page read and write
420007E0000
trusted library allocation
page read and write
7872000
heap
page read and write
53480031C000
trusted library allocation
page read and write
1E8D6200000
heap
page read and write
5348004C4000
trusted library allocation
page read and write
420008AC000
trusted library allocation
page read and write
3704002BC000
trusted library allocation
page read and write
5348009A0000
trusted library allocation
page read and write
42000201000
trusted library allocation
page read and write
6D80000
direct allocation
page read and write
534800C64000
trusted library allocation
page read and write
930000
heap
page read and write
534800908000
trusted library allocation
page read and write
4200039C000
trusted library allocation
page read and write
3704002BC000
trusted library allocation
page read and write
1E8E04B0000
trusted library section
page read and write
790E000
heap
page read and write
6D91000
heap
page read and write
5348008B0000
trusted library allocation
page read and write
1E8D9D8F000
heap
page read and write
534800674000
trusted library allocation
page read and write
7877000
heap
page read and write
795D000
heap
page read and write
6D91000
heap
page read and write
420002FC000
trusted library allocation
page read and write
B0A9FFE000
unkown
page readonly
B0B17FD000
stack
page read and write
5348001C4000
trusted library allocation
page read and write
534800344000
trusted library allocation
page read and write
1E8E01B0000
trusted library section
page read and write
7B7D000
heap
page read and write
3704002F0000
trusted library allocation
page read and write
F4E000
stack
page read and write
B0B37FC000
stack
page read and write
534800EC8000
trusted library allocation
page read and write
7A1D000
heap
page read and write
420006D4000
trusted library allocation
page read and write
6D91000
heap
page read and write
534800555000
trusted library allocation
page read and write
5348002F3000
trusted library allocation
page read and write
53480031C000
trusted library allocation
page read and write
534800401000
trusted library allocation
page read and write
110002AC000
direct allocation
page read and write
B09AFFE000
unkown
page readonly
534800F14000
trusted library allocation
page read and write
534800298000
trusted library allocation
page read and write
1E8D9DCB000
heap
page read and write
534800CC8000
trusted library allocation
page read and write
534800720000
trusted library allocation
page read and write
DFC000
stack
page read and write
1B0000
unkown
page readonly
42000898000
trusted library allocation
page read and write
53480022C000
trusted library allocation
page read and write
6D91000
heap
page read and write
534800F6C000
trusted library allocation
page read and write
420006F4000
trusted library allocation
page read and write
534800304000
trusted library allocation
page read and write
534800CD8000
trusted library allocation
page read and write
3704002A0000
trusted library allocation
page read and write
1BA000
unkown
page readonly
7872000
heap
page read and write
53480035C000
trusted library allocation
page read and write
74A0000
direct allocation
page execute and read and write
6D91000
heap
page read and write
13A0000
heap
page read and write
6D91000
heap
page read and write
534800E60000
trusted library allocation
page read and write
420006E8000
trusted library allocation
page read and write
79DB000
heap
page read and write
7FC000
stack
page read and write
1B0000
unkown
page readonly
534800B8C000
trusted library allocation
page read and write
370400238000
trusted library allocation
page read and write
79E8000
heap
page read and write
74A0000
direct allocation
page execute and read and write
1E8D6300000
heap
page read and write
370400294000
trusted library allocation
page read and write
420002C4000
trusted library allocation
page read and write
5348002A8000
trusted library allocation
page read and write
1340000
heap
page read and write
1E8DE2F7000
unclassified section
page read and write
791F000
heap
page read and write
6D91000
heap
page read and write
6D91000
heap
page read and write
534800201000
trusted library allocation
page read and write
534800E01000
trusted library allocation
page read and write
B090FFE000
unkown
page readonly
7874000
heap
page read and write
4200027C000
trusted library allocation
page read and write
5348001DC000
trusted library allocation
page read and write
5348006DD000
trusted library allocation
page read and write
5348001D0000
trusted library allocation
page read and write
370400201000
trusted library allocation
page read and write
1BE000
unkown
page write copy
B0A2FFB000
stack
page read and write
1E8D61B0000
heap
page read and write
534800390000
trusted library allocation
page read and write
1E8E0457000
unclassified section
page read and write
6D91000
heap
page read and write
534800DD0000
trusted library allocation
page read and write
1B0000
unkown
page readonly
5348003A4000
trusted library allocation
page read and write
534800DA8000
trusted library allocation
page read and write
53480033C000
trusted library allocation
page read and write
5348004DC000
trusted library allocation
page read and write
534800294000
trusted library allocation
page read and write
11000230000
direct allocation
page read and write
534800F00000
trusted library allocation
page read and write
1E8DF700000
heap
page read and write
1E8DFCE0000
trusted library section
page read and write
534800F9C000
trusted library allocation
page read and write
1C1000
unkown
page readonly
1E8D631C000
heap
page read and write
370400250000
trusted library allocation
page read and write
42000874000
trusted library allocation
page read and write
534800C24000
trusted library allocation
page read and write
42000844000
trusted library allocation
page read and write
6D91000
heap
page read and write
42000288000
trusted library allocation
page read and write
534800EE4000
trusted library allocation
page read and write
534800EB8000
trusted library allocation
page read and write
534800A78000
trusted library allocation
page read and write
53480076A000
trusted library allocation
page read and write
6D91000
heap
page read and write
1BA000
unkown
page readonly
534800E28000
trusted library allocation
page read and write
420007C0000
trusted library allocation
page read and write
B0AC7FE000
stack
page read and write
534800234000
trusted library allocation
page read and write
1700000
heap
page read and write
B08DFFE000
unkown
page readonly
5348007C4000
trusted library allocation
page read and write
534800A64000
trusted library allocation
page read and write
1B1000
unkown
page execute read
6D91000
heap
page read and write
B08AFFE000
unkown
page readonly
6D80000
direct allocation
page read and write
534800E40000
trusted library allocation
page read and write
534800350000
trusted library allocation
page read and write
5348002F0000
trusted library allocation
page read and write
B09CFFE000
unkown
page readonly
1E8D9D75000
heap
page read and write
534800350000
trusted library allocation
page read and write
1E8E01D3000
trusted library section
page read and write
97E000
stack
page read and write
83C000
stack
page read and write
53480040C000
trusted library allocation
page read and write
6D91000
heap
page read and write
7A00000
heap
page read and write
1E8D9E37000
heap
page read and write
534800560000
trusted library allocation
page read and write
5348006F4000
trusted library allocation
page read and write
534801158000
trusted library allocation
page read and write
6D80000
direct allocation
page read and write
5348012C4000
trusted library allocation
page read and write
534800054000
trusted library allocation
page read and write
7771000
heap
page read and write
1E8E01A0000
trusted library section
page read and write
370400274000
trusted library allocation
page read and write
7220000
direct allocation
page read and write
534800E34000
trusted library allocation
page read and write
534800F14000
trusted library allocation
page read and write
534800124000
trusted library allocation
page read and write
42000248000
trusted library allocation
page read and write
11000284000
direct allocation
page read and write
3704002D8000
trusted library allocation
page read and write
8CC000
stack
page read and write
1C1000
unkown
page readonly
79AC000
heap
page read and write
42000848000
trusted library allocation
page read and write
B0AEFFE000
unkown
page readonly
6D91000
heap
page read and write
534800D08000
trusted library allocation
page read and write
11000215000
direct allocation
page read and write
6D91000
heap
page read and write
534800FD4000
trusted library allocation
page read and write
5348001F4000
trusted library allocation
page read and write
534800214000
trusted library allocation
page read and write
2D4E000
unkown
page read and write
42000220000
trusted library allocation
page read and write
1E8DA070000
trusted library section
page read and write
534801100000
trusted library allocation
page read and write
B0B4FFE000
unkown
page readonly
7876000
heap
page read and write
1E8D8B50000
unkown
page read and write
534800C70000
trusted library allocation
page read and write
1E8D8100000
heap
page read and write
9BE000
stack
page read and write
1E8D9DD9000
heap
page read and write
370400220000
trusted library allocation
page read and write
B0A8FFE000
unkown
page readonly
534800001000
trusted library allocation
page read and write
1E8D61D0000
heap
page read and write
534800344000
trusted library allocation
page read and write
534800304000
trusted library allocation
page read and write
7480000
direct allocation
page execute and read and write
7B45000
heap
page read and write
1E8D62FC000
heap
page read and write
3704002C0000
trusted library allocation
page read and write
6D91000
heap
page read and write
2DAF000
unkown
page read and write
B0A77FC000
stack
page read and write
5348000B4000
trusted library allocation
page read and write
2E50000
heap
page read and write
534800801000
trusted library allocation
page read and write
6D91000
heap
page read and write
534800330000
trusted library allocation
page read and write
534800F3C000
trusted library allocation
page read and write
534800AA4000
trusted library allocation
page read and write
1C1000
unkown
page readonly
42000237000
trusted library allocation
page read and write
B096FFE000
unkown
page readonly
7871000
heap
page read and write
534800C70000
trusted library allocation
page read and write
B09E7FD000
stack
page read and write
42000230000
trusted library allocation
page read and write
B09BFFE000
unkown
page readonly
42000408000
trusted library allocation
page read and write
1E8D9E04000
heap
page read and write
534801194000
trusted library allocation
page read and write
534800194000
trusted library allocation
page read and write
1C1000
unkown
page readonly
1E8E01C1000
trusted library section
page read and write
6D91000
heap
page read and write
6D91000
heap
page read and write
534800EA0000
trusted library allocation
page read and write
787B000
heap
page read and write
B0AAFFE000
unkown
page readonly
B0AB7FE000
stack
page read and write
5348006C4000
trusted library allocation
page read and write
6D91000
heap
page read and write
1E8D9DFF000
heap
page read and write
DFC000
stack
page read and write
534801001000
trusted library allocation
page read and write
534800294000
trusted library allocation
page read and write
7AEE000
heap
page read and write
1C1000
unkown
page readonly
534800454000
trusted library allocation
page read and write
5348012B4000
trusted library allocation
page read and write
1E8D9DD7000
heap
page read and write
4200085C000
trusted library allocation
page read and write
6D91000
heap
page read and write
420007E4000
trusted library allocation
page read and write
910000
heap
page read and write
ACE000
stack
page read and write
5348003CC000
trusted library allocation
page read and write
534800D6C000
trusted library allocation
page read and write
1BE000
unkown
page write copy
74A0000
direct allocation
page execute and read and write
1E8DDE12000
trusted library allocation
page read and write
1E8D9DDB000
heap
page read and write
5348006D8000
trusted library allocation
page read and write
534801158000
trusted library allocation
page read and write
96C000
stack
page read and write
11000290000
direct allocation
page read and write
1E8D9DE5000
heap
page read and write
534800CF8000
trusted library allocation
page read and write
1BA000
unkown
page readonly
534800B3C000
trusted library allocation
page read and write
3704002B0000
trusted library allocation
page read and write
74A0000
direct allocation
page execute and read and write
7874000
heap
page read and write
534800224000
trusted library allocation
page read and write
1E8DF9D2000
trusted library section
page read and write
534800A5F000
trusted library allocation
page read and write
7A1B000
heap
page read and write
420008D8000
trusted library allocation
page read and write
74A0000
direct allocation
page execute and read and write
534800AF4000
trusted library allocation
page read and write
B0A3FFC000
stack
page read and write
1E8E016E000
trusted library section
page read and write
1E8D97EF000
heap
page read and write
534800EF4000
trusted library allocation
page read and write
420006AC000
trusted library allocation
page read and write
B0977FD000
stack
page read and write
4200082C000
trusted library allocation
page read and write
B0B57FE000
stack
page read and write
5348001F8000
trusted library allocation
page read and write
7A50000
heap
page read and write
534800C0C000
trusted library allocation
page read and write
42000830000
trusted library allocation
page read and write
11000303000
direct allocation
page read and write
534800E18000
trusted library allocation
page read and write
420002B0000
trusted library allocation
page read and write
5348002B4000
trusted library allocation
page read and write
534800AC8000
trusted library allocation
page read and write
534801074000
trusted library allocation
page read and write
6D91000
heap
page read and write
6D80000
direct allocation
page read and write
534801018000
trusted library allocation
page read and write
42000850000
trusted library allocation
page read and write
420007A0000
trusted library allocation
page read and write
840000
heap
page read and write
B097FFE000
unkown
page readonly
7A5A000
heap
page read and write
B0927FB000
stack
page read and write
6D91000
heap
page read and write
5348007A4000
trusted library allocation
page read and write
420006C8000
trusted library allocation
page read and write
1148000
heap
page read and write
6D91000
heap
page read and write
1E8D9DAF000
heap
page read and write
79BA000
heap
page read and write
3704002C0000
trusted library allocation
page read and write
534800C3C000
trusted library allocation
page read and write
420002B8000
trusted library allocation
page read and write
53480074C000
trusted library allocation
page read and write
6D80000
direct allocation
page read and write
3704002E4000
trusted library allocation
page read and write
B0A57FE000
unkown
page readonly
534800330000
trusted library allocation
page read and write
1BE000
unkown
page read and write
6D91000
heap
page read and write
534800F90000
trusted library allocation
page read and write
534800C70000
trusted library allocation
page read and write
7875000
heap
page read and write
534800C80000
trusted library allocation
page read and write
1E8E0141000
trusted library section
page read and write
1E8D9D97000
heap
page read and write
74A0000
direct allocation
page execute and read and write
534800F08000
trusted library allocation
page read and write
1E8D6268000
heap
page read and write
4200079C000
trusted library allocation
page read and write
6D91000
heap
page read and write
74A0000
direct allocation
page execute and read and write
534800CC0000
trusted library allocation
page read and write
53480007C000
trusted library allocation
page read and write
5348006E8000
trusted library allocation
page read and write
77D2000
direct allocation
page read and write
534800454000
trusted library allocation
page read and write
534800738000
trusted library allocation
page read and write
7924000
heap
page read and write
534801030000
trusted library allocation
page read and write
420006F0000
trusted library allocation
page read and write
4200084C000
trusted library allocation
page read and write
42000250000
trusted library allocation
page read and write
B08A7FE000
stack
page read and write
53480033C000
trusted library allocation
page read and write
1E8D80F0000
trusted library section
page readonly
53480040C000
trusted library allocation
page read and write
7874000
heap
page read and write
1E8D631A000
heap
page read and write
5348006E0000
trusted library allocation
page read and write
B0A5FFE000
unkown
page readonly
7490000
direct allocation
page execute and read and write
B08CFFE000
unkown
page readonly
1E8D9D97000
heap
page read and write
787A000
heap
page read and write
B0997FE000
stack
page read and write
2E68000
heap
page read and write
6D91000
heap
page read and write
1E8D627E000
heap
page read and write
42000210000
trusted library allocation
page read and write
1E8E0162000
trusted library section
page read and write
534800748000
trusted library allocation
page read and write
1E8D9DFF000
heap
page read and write
9C0000
heap
page read and write
B088FFE000
unkown
page readonly
534800304000
trusted library allocation
page read and write
B09B7FE000
stack
page read and write
7BE9000
heap
page read and write
B0B27FE000
stack
page read and write
534800DCC000
trusted library allocation
page read and write
1E8D9D10000
trusted library section
page read and write
5348003C1000
trusted library allocation
page read and write
B0967FE000
stack
page read and write
AD0000
heap
page read and write
534800390000
trusted library allocation
page read and write
534800BDF000
trusted library allocation
page read and write
420007BC000
trusted library allocation
page read and write
B09C7FE000
stack
page read and write
7A55000
heap
page read and write
7B0C000
heap
page read and write
6D91000
heap
page read and write
534800770000
trusted library allocation
page read and write
79D4000
heap
page read and write
B08E7FB000
stack
page read and write
7AAB000
heap
page read and write
534800F68000
trusted library allocation
page read and write
42000778000
trusted library allocation
page read and write
3704002C0000
trusted library allocation
page read and write
148F000
stack
page read and write
534800B84000
trusted library allocation
page read and write
5348002B7000
trusted library allocation
page read and write
534800C88000
trusted library allocation
page read and write
7220000
direct allocation
page read and write
7A46000
heap
page read and write
53480081C000
trusted library allocation
page read and write
53480078C000
trusted library allocation
page read and write
B0B67FE000
stack
page read and write
5348000FC000
trusted library allocation
page read and write
1E8D9DD5000
heap
page read and write
B099FFE000
unkown
page readonly
6D91000
heap
page read and write
11000220000
direct allocation
page read and write
7C4B000
heap
page read and write
37040020C000
trusted library allocation
page read and write
1E8D9A60000
heap
page read and write
5348011AC000
trusted library allocation
page read and write
420002DC000
trusted library allocation
page read and write
534800344000
trusted library allocation
page read and write
6D91000
heap
page read and write
5348008F4000
trusted library allocation
page read and write
1E8D97EF000
heap
page read and write
5348012C0000
trusted library allocation
page read and write
1B0000
unkown
page readonly
53480129C000
trusted library allocation
page read and write
5348011B8000
trusted library allocation
page read and write
7A1000
unkown
page execute and write copy
A3C000
stack
page read and write
1BA000
unkown
page readonly
1E8E04BE000
trusted library section
page read and write
1E8D9E0B000
heap
page read and write
1E8E0130000
trusted library section
page read and write
79FC000
heap
page read and write
11000274000
direct allocation
page read and write
534800294000
trusted library allocation
page read and write
1E8DF900000
trusted library section
page read and write
6D80000
direct allocation
page read and write
7872000
heap
page read and write
1B1000
unkown
page execute read
534800DCC000
trusted library allocation
page read and write
7A9D000
heap
page read and write
1E8D635C000
heap
page read and write
42000248000
trusted library allocation
page read and write
1E8D9DC1000
heap
page read and write
6D91000
heap
page read and write
11000201000
direct allocation
page read and write
5348002B4000
trusted library allocation
page read and write
53480012C000
trusted library allocation
page read and write
6D91000
heap
page read and write
370400264000
trusted library allocation
page read and write
110002DC000
direct allocation
page read and write
5348002D0000
trusted library allocation
page read and write
534800294000
trusted library allocation
page read and write
1E8D9D88000
heap
page read and write
B0A87FE000
stack
page read and write
11000234000
direct allocation
page read and write
1C1000
unkown
page readonly
534800C9C000
trusted library allocation
page read and write
74A0000
direct allocation
page execute and read and write
74A0000
direct allocation
page execute and read and write
1B0000
unkown
page readonly
534800D60000
trusted library allocation
page read and write
1B1000
unkown
page execute read
B08F7FC000
stack
page read and write
4200060C000
trusted library allocation
page read and write
1E8D9DBA000
heap
page read and write
A80000
heap
page read and write
53480020C000
trusted library allocation
page read and write
5348001E0000
trusted library allocation
page read and write
B0B87FE000
stack
page read and write
1E8E0276000
trusted library section
page read and write
534800AE8000
trusted library allocation
page read and write
42000964000
trusted library allocation
page read and write
1E8D9DE6000
heap
page read and write
5348008CC000
trusted library allocation
page read and write
534800EA0000
trusted library allocation
page read and write
534800F3C000
trusted library allocation
page read and write
4200095C000
trusted library allocation
page read and write
B0AD7FD000
stack
page read and write
4200039C000
trusted library allocation
page read and write
420002CC000
trusted library allocation
page read and write
534800E54000
trusted library allocation
page read and write
534800F5C000
trusted library allocation
page read and write
534800210000
trusted library allocation
page read and write
B0AA7FD000
stack
page read and write
787F000
heap
page read and write
53480040C000
trusted library allocation
page read and write
370400260000
trusted library allocation
page read and write
2E5B000
heap
page read and write
1E8D9DF6000
heap
page read and write
79DA000
heap
page read and write
534800E98000
trusted library allocation
page read and write
420008C8000
trusted library allocation
page read and write
1BE000
unkown
page read and write
7929000
direct allocation
page read and write
7876000
heap
page read and write
1570000
heap
page read and write
42000894000
trusted library allocation
page read and write
CE0000
heap
page read and write
534800A80000
trusted library allocation
page read and write
534800F3C000
trusted library allocation
page read and write
110002D0000
direct allocation
page read and write
1E8E0477000
unclassified section
page read and write
534800B70000
trusted library allocation
page read and write
787F000
heap
page read and write
3704002BC000
trusted library allocation
page read and write
29CA000
stack
page read and write
960000
heap
page read and write
1E8D6230000
heap
page read and write
42000404000
trusted library allocation
page read and write
B0887FD000
unkown
page read and write
7C19000
heap
page read and write
53480056B000
trusted library allocation
page read and write
5348002F0000
trusted library allocation
page read and write
1E8D97F6000
heap
page read and write
534801190000
trusted library allocation
page read and write
B08BFFE000
unkown
page readonly
3704002A0000
trusted library allocation
page read and write
534800290000
trusted library allocation
page read and write
6D91000
heap
page read and write
53480074C000
trusted library allocation
page read and write
420007D0000
trusted library allocation
page read and write
53480077C000
trusted library allocation
page read and write
5348005CC000
trusted library allocation
page read and write
1E8DE337000
unclassified section
page read and write
74A0000
direct allocation
page execute and read and write
F0E000
stack
page read and write
1B0000
unkown
page readonly
1E8DF9DD000
trusted library section
page read and write
7A4B000
heap
page read and write
534800C80000
trusted library allocation
page read and write
74A0000
direct allocation
page execute and read and write
1BE000
unkown
page read and write
1C1000
unkown
page readonly
7875000
heap
page read and write
42000430000
trusted library allocation
page read and write
534800310000
trusted library allocation
page read and write
1E8DF973000
trusted library section
page read and write
11FC000
stack
page read and write
534800894000
trusted library allocation
page read and write
74A0000
direct allocation
page execute and read and write
4200071C000
trusted library allocation
page read and write
534800954000
trusted library allocation
page read and write
6D91000
heap
page read and write
534800368000
trusted library allocation
page read and write
420006C8000
trusted library allocation
page read and write
FDF000
stack
page read and write
BC0000
heap
page read and write
534801094000
trusted library allocation
page read and write
420007D4000
trusted library allocation
page read and write
420008A8000
trusted library allocation
page read and write
534800164000
trusted library allocation
page read and write
6D91000
heap
page read and write
298D000
stack
page read and write
1E8D9D99000
heap
page read and write
7965000
heap
page read and write
7873000
heap
page read and write
42000864000
trusted library allocation
page read and write
6D91000
heap
page read and write
534800B40000
trusted library allocation
page read and write
420006BC000
trusted library allocation
page read and write
6D91000
heap
page read and write
534800230000
trusted library allocation
page read and write
420008EC000
trusted library allocation
page read and write
B0ADFFE000
unkown
page readonly
53480079C000
trusted library allocation
page read and write
5348012CC000
trusted library allocation
page read and write
53480000C000
trusted library allocation
page read and write
4200040C000
trusted library allocation
page read and write
42000818000
trusted library allocation
page read and write
B0937FC000
stack
page read and write
534800868000
trusted library allocation
page read and write
1B0000
unkown
page readonly
1E8E02D0000
trusted library section
page read and write
7A26000
heap
page read and write
7871000
heap
page read and write
7942000
heap
page read and write
6D91000
heap
page read and write
1E8D9FF0000
trusted library section
page read and write
B08D7FD000
stack
page read and write
5348004B4000
trusted library allocation
page read and write
F80000
heap
page read and write
1E8D6260000
heap
page read and write
420008F0000
trusted library allocation
page read and write
6D91000
heap
page read and write
534800D48000
trusted library allocation
page read and write
5348008C4000
trusted library allocation
page read and write
1E8D9DF9000
heap
page read and write
11000210000
direct allocation
page read and write
7879000
heap
page read and write
534800DD4000
trusted library allocation
page read and write
B092FFE000
unkown
page readonly
6D91000
heap
page read and write
534800C70000
trusted library allocation
page read and write
53480080C000
trusted library allocation
page read and write
1C1000
unkown
page readonly
B0B8FFE000
unkown
page readonly
7A09000
heap
page read and write
534800EAC000
trusted library allocation
page read and write
370400248000
trusted library allocation
page read and write
53480120C000
trusted library allocation
page read and write
5348001B4000
trusted library allocation
page read and write
6D80000
direct allocation
page read and write
534800C70000
trusted library allocation
page read and write
7A0000
unkown
page readonly
B093FFE000
unkown
page readonly
1E8D62BF000
heap
page read and write
7BC3000
heap
page read and write
1E8DFEE0000
trusted library section
page read and write
6D80000
direct allocation
page read and write
534800930000
trusted library allocation
page read and write
7873000
heap
page read and write
1B1000
unkown
page execute read
B0AE7FD000
stack
page read and write
42000424000
trusted library allocation
page read and write
534801048000
trusted library allocation
page read and write
534800220000
trusted library allocation
page read and write
3704002BC000
trusted library allocation
page read and write
6D91000
heap
page read and write
1B1000
unkown
page execute read
B0A47FE000
unkown
page readonly
42000828000
trusted library allocation
page read and write
1E8D9800000
heap
page read and write
2DEE000
stack
page read and write
7470000
direct allocation
page execute and read and write
7ADA000
heap
page read and write
B0B1FFE000
unkown
page readonly
6C22D000
unkown
page read and write
5348002FB000
trusted library allocation
page read and write
1BA000
unkown
page readonly
1E8DE3E0000
heap
page read and write
42000860000
trusted library allocation
page read and write
42000601000
trusted library allocation
page read and write
787E000
heap
page read and write
B09A7FE000
stack
page read and write
B08EFFE000
unkown
page readonly
1B1000
unkown
page execute read
420008F4000
trusted library allocation
page read and write
3704002C0000
trusted library allocation
page read and write
534800454000
trusted library allocation
page read and write
42000401000
trusted library allocation
page read and write
534800E7C000
trusted library allocation
page read and write
79AD000
heap
page read and write
6D91000
heap
page read and write
534800C24000
trusted library allocation
page read and write
6D91000
heap
page read and write
420002EC000
trusted library allocation
page read and write
1BE000
unkown
page read and write
5348001E4000
trusted library allocation
page read and write
534800728000
trusted library allocation
page read and write
534800634000
trusted library allocation
page read and write
534800EA0000
trusted library allocation
page read and write
534800C70000
trusted library allocation
page read and write
7870000
heap
page read and write
6D91000
heap
page read and write
420006E8000
trusted library allocation
page read and write
534800AB8000
trusted library allocation
page read and write
534800758000
trusted library allocation
page read and write
534800FD8000
trusted library allocation
page read and write
7993000
heap
page read and write
74A0000
direct allocation
page execute and read and write
53480100C000
trusted library allocation
page read and write
1BE000
unkown
page read and write
1BA000
unkown
page readonly
B0A4FFD000
stack
page read and write
7BAE000
heap
page read and write
7874000
heap
page read and write
B0A27FD000
stack
page read and write
6D91000
heap
page read and write
3704002A0000
trusted library allocation
page read and write
534800CC8000
trusted library allocation
page read and write
1E8D8103000
heap
page read and write
79CA000
heap
page read and write
420006E0000
trusted library allocation
page read and write
534800F58000
trusted library allocation
page read and write
11000217000
direct allocation
page read and write
420007AC000
trusted library allocation
page read and write
534800DC5000
trusted library allocation
page read and write
53480026C000
trusted library allocation
page read and write
7A22000
heap
page read and write
420008B8000
trusted library allocation
page read and write
534800520000
trusted library allocation
page read and write
CE7000
heap
page read and write
6C27C000
unkown
page readonly
42000790000
trusted library allocation
page read and write
1E8D9E60000
trusted library section
page read and write
792B000
direct allocation
page read and write
13CE000
heap
page read and write
5348004D0000
trusted library allocation
page read and write
1E8D9E0B000
heap
page read and write
B0A0FFE000
unkown
page readonly
3704002BC000
trusted library allocation
page read and write
5348000EC000
trusted library allocation
page read and write
1E8D9E02000
heap
page read and write
1100020C000
direct allocation
page read and write
534800C1C000
trusted library allocation
page read and write
534801174000
trusted library allocation
page read and write
42000788000
trusted library allocation
page read and write
534800154000
trusted library allocation
page read and write
1BA000
unkown
page readonly
534800093000
trusted library allocation
page read and write
1BE000
unkown
page write copy
534800CC8000
trusted library allocation
page read and write
B0917FB000
stack
page read and write
53480021C000
trusted library allocation
page read and write
B0ACFFE000
unkown
page readonly
42000700000
trusted library allocation
page read and write
5348001B4000
trusted library allocation
page read and write
53480020C000
trusted library allocation
page read and write
B098FFE000
unkown
page readonly
5348002C0000
trusted library allocation
page read and write
53480057C000
trusted library allocation
page read and write
534800EA0000
trusted library allocation
page read and write
42000868000
trusted library allocation
page read and write
534800300000
trusted library allocation
page read and write
5348001B4000
trusted library allocation
page read and write
797E000
heap
page read and write
1BE000
unkown
page write copy
534800DEC000
trusted library allocation
page read and write
534800AD8000
trusted library allocation
page read and write
1E8D97F3000
heap
page read and write
534800FC4000
trusted library allocation
page read and write
7971000
heap
page read and write
534800F90000
trusted library allocation
page read and write
7873000
heap
page read and write
B091FFE000
unkown
page readonly
534800DB8000
trusted library allocation
page read and write
9D0000
heap
page read and write
6D80000
direct allocation
page read and write
534800174000
trusted library allocation
page read and write
534800941000
trusted library allocation
page read and write
7876000
heap
page read and write
534800B78000
trusted library allocation
page read and write
1140000
heap
page read and write
5348001F0000
trusted library allocation
page read and write
534800D88000
trusted library allocation
page read and write
5348010EC000
trusted library allocation
page read and write
1BE000
unkown
page write copy
1B0000
unkown
page readonly
11000260000
direct allocation
page read and write
4200020C000
trusted library allocation
page read and write
74A0000
direct allocation
page execute and read and write
534800FBA000
trusted library allocation
page read and write
534800F6C000
trusted library allocation
page read and write
7872000
heap
page read and write
5348002A8000
trusted library allocation
page read and write
534800FB8000
trusted library allocation
page read and write
74A0000
direct allocation
page execute and read and write
6C278000
unkown
page readonly
1B1000
unkown
page execute read
6D91000
heap
page read and write
11DF000
stack
page read and write
B09FFFE000
unkown
page readonly
534800294000
trusted library allocation
page read and write
534800454000
trusted library allocation
page read and write
B0B2FFE000
unkown
page readonly
534800310000
trusted library allocation
page read and write
7879000
heap
page read and write
B0947FE000
stack
page read and write
7877000
heap
page read and write
4200025C000
trusted library allocation
page read and write
534800F90000
trusted library allocation
page read and write
79DC000
heap
page read and write
7BBD000
heap
page read and write
534800350000
trusted library allocation
page read and write
7981000
heap
page read and write
BC7000
heap
page read and write
1E8D9DF9000
heap
page read and write
534800C01000
trusted library allocation
page read and write
6D91000
heap
page read and write
534800304000
trusted library allocation
page read and write
1BA000
unkown
page readonly
6D80000
direct allocation
page read and write
1E8D9D99000
heap
page read and write
11000280000
direct allocation
page read and write
7873000
heap
page read and write
534800694000
trusted library allocation
page read and write
B0B3FFE000
unkown
page readonly
F90000
heap
page read and write
7934000
heap
page read and write
534800B54000
trusted library allocation
page read and write
1E8D97EA000
heap
page read and write
534800900000
trusted library allocation
page read and write
5348002B4000
trusted library allocation
page read and write
534800544000
trusted library allocation
page read and write
1E8D61C0000
heap
page readonly
534800B5C000
trusted library allocation
page read and write
5348006E2000
trusted library allocation
page read and write
534800A0C000
trusted library allocation
page read and write
534800390000
trusted library allocation
page read and write
534800344000
trusted library allocation
page read and write
B0A6FFE000
unkown
page readonly
534800A01000
trusted library allocation
page read and write
534800984000
trusted library allocation
page read and write
6C151000
unkown
page execute read
1BA000
unkown
page readonly
534800454000
trusted library allocation
page read and write
1E8DDBC0000
trusted library allocation
page read and write
11000294000
direct allocation
page read and write
5348004B4000
trusted library allocation
page read and write
7879000
heap
page read and write
74A0000
direct allocation
page execute and read and write
7A19000
heap
page read and write
5348012A8000
trusted library allocation
page read and write
534800840000
trusted library allocation
page read and write
534800960000
trusted library allocation
page read and write
74A0000
direct allocation
page execute and read and write
5348009D0000
trusted library allocation
page read and write
4200078C000
trusted library allocation
page read and write
420008E8000
trusted library allocation
page read and write
B0ABFFE000
unkown
page readonly
534800D00000
trusted library allocation
page read and write
6D91000
heap
page read and write
534801201000
trusted library allocation
page read and write
534800BEC000
trusted library allocation
page read and write
1E8D9D77000
heap
page read and write
5348001E8000
trusted library allocation
page read and write
1E8D9E02000
heap
page read and write
534800C70000
trusted library allocation
page read and write
534800218000
trusted library allocation
page read and write
7877000
heap
page read and write
42000960000
trusted library allocation
page read and write
534800390000
trusted library allocation
page read and write
B0877EF000
stack
page read and write
71D0000
trusted library allocation
page read and write
1E8DE493000
heap
page read and write
1E8D6240000
trusted library allocation
page read and write
5348005EC000
trusted library allocation
page read and write
1E8DE490000
heap
page read and write
B0AFFFA000
stack
page read and write
53480001C000
trusted library allocation
page read and write
6D91000
heap
page read and write
534800CDC000
trusted library allocation
page read and write
B0A97FD000
stack
page read and write
163F000
stack
page read and write
1110000
heap
page read and write
5348001EC000
trusted library allocation
page read and write
5348006A0000
trusted library allocation
page read and write
3EC000
stack
page read and write
1C1000
unkown
page readonly
420006AC000
trusted library allocation
page read and write
2E2F000
stack
page read and write
3704002C0000
trusted library allocation
page read and write
1E8DF91E000
trusted library section
page read and write
4200070C000
trusted library allocation
page read and write
DFC000
stack
page read and write
1E8D97D0000
heap
page read and write
1E8E029D000
trusted library section
page read and write
3704002BC000
trusted library allocation
page read and write
There are 1069 hidden memdumps, click here to show them.