IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_de576c89c85d95f63177b89249eef622329cc21c_49e505fd_5418449f-07a8-4027-96eb-d75d643799d7\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1873.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Nov 24 12:33:34 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1A58.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1A98.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 --field-trial-handle=2316,i,660778272520788295,10458363181096637325,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 1296

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
http://anglebug.com/7553rei
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actionsA
unknown
http://unisolated.invalid/
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
http://anglebug.com/6953hwJ
unknown
https://issuetracker.google.com/161903006
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
http://anglebug.com/5430;d
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5906;d
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
http://anglebug.com/6878;d
unknown
https://drive-preprod.corp.google.com/
unknown
http://anglebug.com/6860k
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
34.116.198.130
https://clients4.google.com/chrome-sync
unknown
http://anglebug.com/6439;d
unknown
http://anglebug.com/5007ernt
unknown
http://html4/loose.dtd
unknown
https://docs.google.com/presentation/installwebapp?usp=chrome_defaultouch
unknown
https://anglebug.com/7714d
unknown
https://anglebug.com/7847d
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/5281f
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://chrome.google.com/webstore$
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://anglebug.com/8280er
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
http://anglebug.com/6048;d
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fvtekk5pn.top
34.116.198.130
www.google.com
172.217.21.36
fvtekk5pn.top
34.116.198.130

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
34.116.198.130
home.fvtekk5pn.top
United States
172.217.21.36
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProgramId
malicious
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
FileId
malicious
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LowerCaseLongPath
malicious
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LongPathHash
malicious
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Name
malicious
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
OriginalFileName
malicious
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Publisher
malicious
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Version
malicious
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinFileVersion
malicious
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinaryType
malicious
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProductName
malicious
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProductVersion
malicious
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LinkDate
malicious
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinProductVersion
malicious
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
AppxPackageFullName
malicious
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
AppxPackageRelativeId
malicious
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Size
malicious
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Language
malicious
\REGISTRY\A\{e85c447c-fb17-1858-5cff-5ccd5855cf7c}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
139E000
heap
page read and write
1F0836A4000
heap
page read and write
BD8002B0000
trusted library allocation
page read and write
1F08364C000
heap
page read and write
2400294000
trusted library allocation
page read and write
6C71000
heap
page read and write
6C71000
heap
page read and write
6233FFE000
unkown
page readonly
1F0818D3000
heap
page read and write
77F9000
direct allocation
page read and write
24007D8000
trusted library allocation
page read and write
7737000
heap
page read and write
1F08A1B0000
trusted library section
page read and write
2D1000
unkown
page execute read
6C71000
heap
page read and write
24005E4000
trusted library allocation
page read and write
48780024C000
direct allocation
page read and write
C7E000
stack
page read and write
2400A0C000
trusted library allocation
page read and write
2400618000
trusted library allocation
page read and write
2400878000
trusted library allocation
page read and write
6C5E0000
unkown
page readonly
2D1000
unkown
page execute read
6C71000
heap
page read and write
24006D4000
trusted library allocation
page read and write
773E000
heap
page read and write
2D1A000
stack
page read and write
BD800330000
trusted library allocation
page read and write
24001B4000
trusted library allocation
page read and write
1F087CB4000
heap
page read and write
1F082320000
unkown
page read and write
62237FE000
stack
page read and write
78B4000
heap
page read and write
7360000
direct allocation
page execute and read and write
2400664000
trusted library allocation
page read and write
BD800320000
trusted library allocation
page read and write
2DA000
unkown
page readonly
2400F38000
trusted library allocation
page read and write
2400715000
trusted library allocation
page read and write
121CD000
heap
page read and write
121400235000
trusted library allocation
page read and write
2DE000
unkown
page write copy
2400370000
trusted library allocation
page read and write
7826000
heap
page read and write
3670000
direct allocation
page read and write
2400F7C000
trusted library allocation
page read and write
2400B64000
trusted library allocation
page read and write
2400F6C000
trusted library allocation
page read and write
62267FD000
stack
page read and write
121400248000
trusted library allocation
page read and write
121400250000
trusted library allocation
page read and write
24006B0000
trusted library allocation
page read and write
2400CD4000
trusted library allocation
page read and write
77D0000
heap
page read and write
7732000
heap
page read and write
6C71000
heap
page read and write
1F083698000
heap
page read and write
3670000
direct allocation
page read and write
24009A0000
trusted library allocation
page read and write
78AB000
heap
page read and write
BD800688000
trusted library allocation
page read and write
BD800220000
trusted library allocation
page read and write
1A31000
heap
page read and write
2400601000
trusted library allocation
page read and write
BD800720000
trusted library allocation
page read and write
BD8006B0000
trusted library allocation
page read and write
1F083672000
heap
page read and write
24008E0000
trusted library allocation
page read and write
1214002B0000
trusted library allocation
page read and write
621BFFE000
unkown
page readonly
2400C38000
trusted library allocation
page read and write
1F083637000
heap
page read and write
BD800668000
trusted library allocation
page read and write
621C7FB000
stack
page read and write
1214002BD000
trusted library allocation
page read and write
1F0835D0000
heap
page read and write
6C71000
heap
page read and write
1F083676000
heap
page read and write
1F0FDEA0000
heap
page readonly
1F089AF0000
trusted library section
page read and write
7731000
heap
page read and write
6C71000
heap
page read and write
62297FC000
stack
page read and write
77D8000
heap
page read and write
6C71000
heap
page read and write
7737000
heap
page read and write
2400228000
trusted library allocation
page read and write
6C71000
heap
page read and write
6C71000
heap
page read and write
2400350000
trusted library allocation
page read and write
487800280000
direct allocation
page read and write
77F3000
heap
page read and write
7360000
direct allocation
page execute and read and write
BD800714000
trusted library allocation
page read and write
BD800248000
trusted library allocation
page read and write
1F087CB4000
heap
page read and write
1F083613000
heap
page read and write
6C71000
heap
page read and write
2400762000
trusted library allocation
page read and write
2400DCC000
trusted library allocation
page read and write
6C71000
heap
page read and write
6216FFE000
unkown
page readonly
2400BF8000
trusted library allocation
page read and write
2400F14000
trusted library allocation
page read and write
BD800664000
trusted library allocation
page read and write
7731000
heap
page read and write
6C71000
heap
page read and write
1214002E4000
trusted library allocation
page read and write
2400EC7000
trusted library allocation
page read and write
2400304000
trusted library allocation
page read and write
2400B90000
trusted library allocation
page read and write
BD8002EC000
trusted library allocation
page read and write
2400330000
trusted library allocation
page read and write
79A9000
heap
page read and write
7730000
heap
page read and write
24001D0000
trusted library allocation
page read and write
24007B4000
trusted library allocation
page read and write
6C71000
heap
page read and write
CF8000
heap
page read and write
1F083666000
heap
page read and write
7868000
heap
page read and write
1F087ECE000
trusted library section
page read and write
19DD000
heap
page read and write
62227FD000
stack
page read and write
6C71000
heap
page read and write
240080C000
trusted library allocation
page read and write
6C71000
heap
page read and write
24001B4000
trusted library allocation
page read and write
2400F60000
trusted library allocation
page read and write
1F083601000
heap
page read and write
77C5000
heap
page read and write
24000F0000
trusted library allocation
page read and write
6C71000
heap
page read and write
BD8007E0000
trusted library allocation
page read and write
62257FE000
stack
page read and write
2400AA4000
trusted library allocation
page read and write
6227FFE000
unkown
page readonly
2D80000
heap
page read and write
24008EC000
trusted library allocation
page read and write
6C71000
heap
page read and write
6C71000
heap
page read and write
487800290000
direct allocation
page read and write
24003A0000
trusted library allocation
page read and write
2400C80000
trusted library allocation
page read and write
2D0000
unkown
page readonly
24009D8000
trusted library allocation
page read and write
621FFFE000
unkown
page readonly
240045B000
trusted library allocation
page read and write
622E7FD000
stack
page read and write
1F087C83000
heap
page read and write
2400C3C000
trusted library allocation
page read and write
240033C000
trusted library allocation
page read and write
2400B98000
trusted library allocation
page read and write
6C71000
heap
page read and write
623AFFE000
unkown
page readonly
2400D24000
trusted library allocation
page read and write
487800217000
direct allocation
page read and write
77E3000
heap
page read and write
240031C000
trusted library allocation
page read and write
7735000
heap
page read and write
761000
unkown
page execute and write copy
2400B28000
trusted library allocation
page read and write
6C71000
heap
page read and write
2DA000
unkown
page readonly
FFC000
stack
page read and write
BD8002F0000
trusted library allocation
page read and write
6215FFE000
unkown
page readonly
78F7000
heap
page read and write
2400D7C000
trusted library allocation
page read and write
240017C000
trusted library allocation
page read and write
24008A8000
trusted library allocation
page read and write
BD800230000
trusted library allocation
page read and write
6C71000
heap
page read and write
6C70C000
unkown
page readonly
1F08A090000
trusted library section
page read and write
7735000
heap
page read and write
1F08363A000
heap
page read and write
1F08363E000
heap
page read and write
6C71000
heap
page read and write
622EFFD000
stack
page read and write
2400494000
trusted library allocation
page read and write
BD80039C000
trusted library allocation
page read and write
622F7FE000
unkown
page readonly
BD8007CC000
trusted library allocation
page read and write
2400FA0000
trusted library allocation
page read and write
1F08364C000
heap
page read and write
BD800648000
trusted library allocation
page read and write
BD8006F0000
trusted library allocation
page read and write
24006A4000
trusted library allocation
page read and write
240027C000
trusted library allocation
page read and write
2400460000
trusted library allocation
page read and write
1F0FDE90000
heap
page read and write
623FFFE000
unkown
page readonly
BD80060C000
trusted library allocation
page read and write
2400993000
trusted library allocation
page read and write
BD800788000
trusted library allocation
page read and write
121400201000
trusted library allocation
page read and write
1214002BC000
trusted library allocation
page read and write
2400C90000
trusted library allocation
page read and write
6C71000
heap
page read and write
19F8000
heap
page read and write
1F083927000
unclassified section
page read and write
2CDD000
stack
page read and write
2400DDC000
trusted library allocation
page read and write
BD800734000
trusted library allocation
page read and write
2400C5C000
trusted library allocation
page read and write
1214002F4000
trusted library allocation
page read and write
1F087CA5000
heap
page read and write
1A43000
heap
page read and write
2400B64000
trusted library allocation
page read and write
2400D48000
trusted library allocation
page read and write
139A000
heap
page read and write
188F000
stack
page read and write
BFD000
stack
page read and write
2400BF8000
trusted library allocation
page read and write
1F0836CD000
heap
page read and write
1F083890000
trusted library section
page read and write
1214002A0000
trusted library allocation
page read and write
621DFFE000
unkown
page readonly
2400DDC000
trusted library allocation
page read and write
240020C000
trusted library allocation
page read and write
7A09000
heap
page read and write
BD800380000
trusted library allocation
page read and write
6C71000
heap
page read and write
1F0836A6000
heap
page read and write
1F087F23000
trusted library section
page read and write
1A5C000
heap
page read and write
240035C000
trusted library allocation
page read and write
24006E1000
trusted library allocation
page read and write
121400260000
trusted library allocation
page read and write
BD8006EC000
trusted library allocation
page read and write
6C71000
heap
page read and write
2401034000
trusted library allocation
page read and write
623DFFE000
unkown
page readonly
789F000
heap
page read and write
77FB000
direct allocation
page read and write
623BFFE000
unkown
page readonly
1F083611000
heap
page read and write
6C71000
heap
page read and write
B60000
heap
page read and write
621E7FA000
stack
page read and write
2400678000
trusted library allocation
page read and write
6C71000
heap
page read and write
BD800744000
trusted library allocation
page read and write
2400FAC000
trusted library allocation
page read and write
1F083088000
heap
page read and write
2400494000
trusted library allocation
page read and write
6C71000
heap
page read and write
BD8006FC000
trusted library allocation
page read and write
6C71000
heap
page read and write
24008D8000
trusted library allocation
page read and write
24007C0000
trusted library allocation
page read and write
BD800620000
trusted library allocation
page read and write
BD800354000
trusted library allocation
page read and write
BD800201000
trusted library allocation
page read and write
7738000
heap
page read and write
24001AC000
trusted library allocation
page read and write
2400AF0000
trusted library allocation
page read and write
6C71000
heap
page read and write
2400290000
trusted library allocation
page read and write
2400A01000
trusted library allocation
page read and write
1214002C0000
trusted library allocation
page read and write
6C71000
heap
page read and write
62197FA000
stack
page read and write
24002A4000
trusted library allocation
page read and write
6C6BF000
unkown
page readonly
7360000
direct allocation
page execute and read and write
3670000
direct allocation
page read and write
2400AD8000
trusted library allocation
page read and write
24001EC000
trusted library allocation
page read and write
BD800368000
trusted library allocation
page read and write
BD80025C000
trusted library allocation
page read and write
2400D14000
trusted library allocation
page read and write
2D1000
unkown
page execute read
6C71000
heap
page read and write
621EFFE000
unkown
page readonly
2400DA4000
trusted library allocation
page read and write
1F08369E000
heap
page read and write
2400AAB000
trusted library allocation
page read and write
1F08A0A1000
trusted library section
page read and write
1F0FDF98000
heap
page read and write
1F089D10000
trusted library section
page read and write
2400294000
trusted library allocation
page read and write
2400454000
trusted library allocation
page read and write
2400C78000
trusted library allocation
page read and write
62377FD000
stack
page read and write
773A000
heap
page read and write
2400BD4000
trusted library allocation
page read and write
6C71000
heap
page read and write
1F0836CD000
heap
page read and write
1A4A000
heap
page read and write
2400CA0000
trusted library allocation
page read and write
7531000
heap
page read and write
6C71000
heap
page read and write
6F0000
heap
page read and write
2400921000
trusted library allocation
page read and write
2400380000
trusted library allocation
page read and write
BD8002DC000
trusted library allocation
page read and write
1F083090000
heap
page read and write
2401058000
trusted library allocation
page read and write
BD800401000
trusted library allocation
page read and write
BD800424000
trusted library allocation
page read and write
BD80020C000
trusted library allocation
page read and write
6C71000
heap
page read and write
6C71000
heap
page read and write
121400288000
trusted library allocation
page read and write
240076C000
trusted library allocation
page read and write
2400128000
trusted library allocation
page read and write
BD800704000
trusted library allocation
page read and write
487800215000
direct allocation
page read and write
2400E7C000
trusted library allocation
page read and write
24001B4000
trusted library allocation
page read and write
2400EC4000
trusted library allocation
page read and write
487800201000
direct allocation
page read and write
759C000
heap
page read and write
6C71000
heap
page read and write
11AD6000
heap
page read and write
1F085680000
heap
page read and write
BD8006B8000
trusted library allocation
page read and write
1F08364C000
heap
page read and write
7736000
heap
page read and write
7731000
heap
page read and write
7360000
direct allocation
page execute and read and write
1214002BC000
trusted library allocation
page read and write
77EC000
heap
page read and write
2D0000
unkown
page readonly
2401030000
trusted library allocation
page read and write
2400A78000
trusted library allocation
page read and write
7811000
heap
page read and write
7735000
heap
page read and write
2400294000
trusted library allocation
page read and write
2400634000
trusted library allocation
page read and write
2400FAC000
trusted library allocation
page read and write
11F0000
heap
page read and write
2400E3C000
trusted library allocation
page read and write
240021C000
trusted library allocation
page read and write
2400E50000
trusted library allocation
page read and write
6C71000
heap
page read and write
BD8006C8000
trusted library allocation
page read and write
1F0836A4000
heap
page read and write
1F08A0B3000
trusted library section
page read and write
6C71000
heap
page read and write
623F7FE000
stack
page read and write
2400704000
trusted library allocation
page read and write
7893000
heap
page read and write
1F083641000
heap
page read and write
BD800724000
trusted library allocation
page read and write
24004C0000
trusted library allocation
page read and write
BD800364000
trusted library allocation
page read and write
7360000
direct allocation
page execute and read and write
7360000
direct allocation
page execute and read and write
2400CA0000
trusted library allocation
page read and write
2400FB8000
trusted library allocation
page read and write
6C71000
heap
page read and write
BD80033C000
trusted library allocation
page read and write
4878002AC000
direct allocation
page read and write
BD800750000
trusted library allocation
page read and write
1F087CA8000
heap
page read and write
6C71000
heap
page read and write
2DE000
unkown
page write copy
2400C4C000
trusted library allocation
page read and write
1214002BC000
trusted library allocation
page read and write
24001C4000
trusted library allocation
page read and write
BD800390000
trusted library allocation
page read and write
2400E0F000
trusted library allocation
page read and write
2400838000
trusted library allocation
page read and write
BD800760000
trusted library allocation
page read and write
1214002BC000
trusted library allocation
page read and write
6C71000
heap
page read and write
240045B000
trusted library allocation
page read and write
1F0FDFB8000
heap
page read and write
2400F1C000
trusted library allocation
page read and write
6219FFE000
unkown
page readonly
BD800770000
trusted library allocation
page read and write
6C71000
heap
page read and write
6C71000
heap
page read and write
7330000
direct allocation
page execute and read and write
6C71000
heap
page read and write
487800303000
direct allocation
page read and write
2400FC8000
trusted library allocation
page read and write
7360000
direct allocation
page execute and read and write
6232FFE000
unkown
page readonly
783F000
heap
page read and write
2401001000
trusted library allocation
page read and write
2400F1C000
trusted library allocation
page read and write
6222FFE000
unkown
page readonly
1F08307F000
heap
page read and write
2400224000
trusted library allocation
page read and write
2400DA4000
trusted library allocation
page read and write
1F08A17D000
trusted library section
page read and write
6C71000
heap
page read and write
2400EF4000
trusted library allocation
page read and write
BD800210000
trusted library allocation
page read and write
7833000
heap
page read and write
240093C000
trusted library allocation
page read and write
6239FFE000
unkown
page readonly
6C71000
heap
page read and write
6226FFB000
stack
page read and write
6C71000
heap
page read and write
24001C8000
trusted library allocation
page read and write
BD8006D0000
trusted library allocation
page read and write
2400F3C000
trusted library allocation
page read and write
7730000
heap
page read and write
2400F54000
trusted library allocation
page read and write
1F083618000
heap
page read and write
2400454000
trusted library allocation
page read and write
2400B08000
trusted library allocation
page read and write
7350000
direct allocation
page execute and read and write
2400AB4000
trusted library allocation
page read and write
24007A4000
trusted library allocation
page read and write
6C71000
heap
page read and write
773C000
heap
page read and write
1F083060000
heap
page read and write
2D1000
unkown
page execute read
2400A60000
trusted library allocation
page read and write
1214002BC000
trusted library allocation
page read and write
6C71000
heap
page read and write
62317FE000
stack
page read and write
BD8003EC000
trusted library allocation
page read and write
2400EC4000
trusted library allocation
page read and write
7360000
direct allocation
page execute and read and write
6C71000
heap
page read and write
6C71000
heap
page read and write
7942000
heap
page read and write
6C71000
heap
page read and write
6C71000
heap
page read and write
6C71000
heap
page read and write
BD800408000
trusted library allocation
page read and write
62187FB000
stack
page read and write
2400EA0000
trusted library allocation
page read and write
77D3000
heap
page read and write
1F087CB5000
heap
page read and write
2400020000
trusted library allocation
page read and write
24010A4000
trusted library allocation
page read and write
48780023C000
direct allocation
page read and write
3670000
direct allocation
page read and write
6236FFE000
unkown
page readonly
2400B00000
trusted library allocation
page read and write
7360000
direct allocation
page execute and read and write
6C71000
heap
page read and write
1F0836AD000
heap
page read and write
24002B0000
trusted library allocation
page read and write
BD8006B4000
trusted library allocation
page read and write
BD8006AC000
trusted library allocation
page read and write
BD800658000
trusted library allocation
page read and write
121400230000
trusted library allocation
page read and write
3670000
direct allocation
page read and write
621CFFE000
unkown
page readonly
2DA000
unkown
page readonly
6C71000
heap
page read and write
2400F00000
trusted library allocation
page read and write
6C708000
unkown
page readonly
2400A30000
trusted library allocation
page read and write
1F0FE180000
heap
page read and write
1F083641000
heap
page read and write
1F083681000
heap
page read and write
7736000
heap
page read and write
62127FD000
unkown
page read and write
2400134000
trusted library allocation
page read and write
2400E9C000
trusted library allocation
page read and write
6C71000
heap
page read and write
BD800320000
trusted library allocation
page read and write
2DE000
unkown
page write copy
2400711000
trusted library allocation
page read and write
6C71000
heap
page read and write
4878002E4000
direct allocation
page read and write
6225FFE000
unkown
page readonly
240016C000
trusted library allocation
page read and write
77DD000
heap
page read and write
6C71000
heap
page read and write
1F083666000
heap
page read and write
1F083676000
heap
page read and write
2400218000
trusted library allocation
page read and write
2400DB8000
trusted library allocation
page read and write
2400778000
trusted library allocation
page read and write
BD80027C000
trusted library allocation
page read and write
240050C000
trusted library allocation
page read and write
1F0FE0D0000
trusted library allocation
page read and write
1F08A020000
trusted library section
page read and write
6C71000
heap
page read and write
6C71000
heap
page read and write
1F0FE185000
heap
page read and write
2400684000
trusted library allocation
page read and write
24004B4000
trusted library allocation
page read and write
1F0855C7000
unclassified section
page read and write
7340000
direct allocation
page execute and read and write
6212FFE000
unkown
page readonly
7733000
heap
page read and write
1F0836B3000
heap
page read and write
622D7FC000
stack
page read and write
6C71000
heap
page read and write
1A5C000
heap
page read and write
2400D00000
trusted library allocation
page read and write
BD80069C000
trusted library allocation
page read and write
6218FFE000
unkown
page readonly
24001D4000
trusted library allocation
page read and write
62337FE000
stack
page read and write
1F0836B3000
heap
page read and write
2400064000
trusted library allocation
page read and write
1F0836A6000
heap
page read and write
6C71000
heap
page read and write
6C71000
heap
page read and write
240033C000
trusted library allocation
page read and write
7811000
heap
page read and write
2400298000
trusted library allocation
page read and write
6C71000
heap
page read and write
773D000
heap
page read and write
2400350000
trusted library allocation
page read and write
7A8C000
heap
page read and write
2400F38000
trusted library allocation
page read and write
6C71000
heap
page read and write
70B0000
trusted library allocation
page read and write
62287FC000
stack
page read and write
BD800644000
trusted library allocation
page read and write
2400788000
trusted library allocation
page read and write
BD800698000
trusted library allocation
page read and write
6C71000
heap
page read and write
6C71000
heap
page read and write
2400CB0000
trusted library allocation
page read and write
1214002C0000
trusted library allocation
page read and write
6C71000
heap
page read and write
1F08369E000
heap
page read and write
24004E8000
trusted library allocation
page read and write
1A37000
heap
page read and write
6C71000
heap
page read and write
621D7FC000
stack
page read and write
2E1000
unkown
page readonly
6C5E1000
unkown
page execute read
1F087C74000
heap
page read and write
1214002A0000
trusted library allocation
page read and write
BD800610000
trusted library allocation
page read and write
62357FD000
stack
page read and write
2400304000
trusted library allocation
page read and write
7733000
heap
page read and write
6C71000
heap
page read and write
24001E0000
trusted library allocation
page read and write
1214002BC000
trusted library allocation
page read and write
62137FE000
stack
page read and write
2400E28000
trusted library allocation
page read and write
2400FA8000
trusted library allocation
page read and write
6C71000
heap
page read and write
6C71000
heap
page read and write
487800234000
direct allocation
page read and write
6C71000
heap
page read and write
2400CBC000
trusted library allocation
page read and write
6C71000
heap
page read and write
240033C000
trusted library allocation
page read and write
240018C000
trusted library allocation
page read and write
2DA000
unkown
page readonly
487800250000
direct allocation
page read and write
BD800601000
trusted library allocation
page read and write
2400220000
trusted library allocation
page read and write
2400D88000
trusted library allocation
page read and write
2400FAC000
trusted library allocation
page read and write
BD800430000
trusted library allocation
page read and write
62117EF000
stack
page read and write
62167FE000
stack
page read and write
2400E01000
trusted library allocation
page read and write
240051C000
trusted library allocation
page read and write
1F083678000
heap
page read and write
78C1000
heap
page read and write
623D7FC000
stack
page read and write
6C71000
heap
page read and write
6C6BD000
unkown
page read and write
2400DCC000
trusted library allocation
page read and write
24002F0000
trusted library allocation
page read and write
1F0FDF00000
heap
page read and write
19E7000
heap
page read and write
8190000
heap
page read and write
7848000
heap
page read and write
6240FFE000
unkown
page readonly
7360000
direct allocation
page execute and read and write
1F08361F000
heap
page read and write
BEE000
stack
page read and write
2400794000
trusted library allocation
page read and write
240072C000
trusted library allocation
page read and write
2400380000
trusted library allocation
page read and write
BD80035C000
trusted library allocation
page read and write
4878002A8000
direct allocation
page read and write
24003B0000
trusted library allocation
page read and write
6234FFE000
unkown
page readonly
24002B4000
trusted library allocation
page read and write
BD800248000
trusted library allocation
page read and write
3670000
direct allocation
page read and write
6C71000
heap
page read and write
31C0000
heap
page read and write
2400B0A000
trusted library allocation
page read and write
623B7FE000
stack
page read and write
24002BC000
trusted library allocation
page read and write
6221FFE000
unkown
page readonly
BD8002EE000
trusted library allocation
page read and write
121400278000
trusted library allocation
page read and write
2DCE000
unkown
page read and write
487800294000
direct allocation
page read and write
2400194000
trusted library allocation
page read and write
77FD000
heap
page read and write
1F083090000
heap
page read and write
2400D30000
trusted library allocation
page read and write
310F000
unkown
page read and write
6C71000
heap
page read and write
2400304000
trusted library allocation
page read and write
BD8002F4000
trusted library allocation
page read and write
1F0FDFFE000
heap
page read and write
7360000
direct allocation
page execute and read and write
2400494000
trusted library allocation
page read and write
1214002D8000
trusted library allocation
page read and write
1F0FDFD3000
heap
page read and write
2400A88000
trusted library allocation
page read and write
1F0FDFE0000
heap
page read and write
2DA000
unkown
page readonly
62277FE000
unkown
page readonly
1214002C0000
trusted library allocation
page read and write
1F0836D0000
trusted library section
page read and write
BD800288000
trusted library allocation
page read and write
789A000
heap
page read and write
3670000
direct allocation
page read and write
6C71000
heap
page read and write
6235FFE000
unkown
page readonly
3690000
direct allocation
page read and write
2400DCC000
trusted library allocation
page read and write
791D000
heap
page read and write
BD800640000
trusted library allocation
page read and write
6C71000
heap
page read and write
2400310000
trusted library allocation
page read and write
1F083090000
heap
page read and write
623A7FE000
stack
page read and write
1A24000
heap
page read and write
BD8006C4000
trusted library allocation
page read and write
1F08A172000
trusted library section
page read and write
24005A8000
trusted library allocation
page read and write
BD800624000
trusted library allocation
page read and write
2400344000
trusted library allocation
page read and write
7360000
direct allocation
page execute and read and write
B50000
heap
page read and write
7898000
heap
page read and write
BD80078C000
trusted library allocation
page read and write
7A6A000
heap
page read and write
BD80040C000
trusted library allocation
page read and write
6C71000
heap
page read and write
4878002DC000
direct allocation
page read and write
6C71000
heap
page read and write
BD8007C8000
trusted library allocation
page read and write
BD800320000
trusted library allocation
page read and write
12140020C000
trusted library allocation
page read and write
62347FE000
stack
page read and write
773E000
heap
page read and write
2400330000
trusted library allocation
page read and write
2400FB8000
trusted library allocation
page read and write
623CFFE000
unkown
page readonly
24001DC000
trusted library allocation
page read and write
2400001000
trusted library allocation
page read and write
240033C000
trusted library allocation
page read and write
168F000
stack
page read and write
623E7FE000
stack
page read and write
2400470000
trusted library allocation
page read and write
1F089AFE000
trusted library section
page read and write
1F08308C000
heap
page read and write
2400F94000
trusted library allocation
page read and write
6C71000
heap
page read and write
62177FD000
stack
page read and write
622A7FB000
stack
page read and write
487800284000
direct allocation
page read and write
2400D41000
trusted library allocation
page read and write
621F7FE000
stack
page read and write
BD8002C4000
trusted library allocation
page read and write
1F08361D000
heap
page read and write
622CFFE000
unkown
page readonly
2400A40000
trusted library allocation
page read and write
1F08A04E000
trusted library section
page read and write
1F083624000
heap
page read and write
7360000
direct allocation
page execute and read and write
6224FFE000
unkown
page readonly
4878002EC000
direct allocation
page read and write
1F085597000
unclassified section
page read and write
BD800700000
trusted library allocation
page read and write
121400238000
trusted library allocation
page read and write
2400BB0000
trusted library allocation
page read and write
1F083636000
heap
page read and write
622C7FC000
stack
page read and write
6C71000
heap
page read and write
2E1000
unkown
page readonly
2400214000
trusted library allocation
page read and write
7857000
heap
page read and write
2400908000
trusted library allocation
page read and write
2400DA0000
trusted library allocation
page read and write
78CD000
heap
page read and write
7360000
direct allocation
page execute and read and write
62207FE000
stack
page read and write
622BFFE000
unkown
page readonly
31AF000
stack
page read and write
6C71000
heap
page read and write
BD8006E8000
trusted library allocation
page read and write
24005D0000
trusted library allocation
page read and write
6C71000
heap
page read and write
2400C3C000
trusted library allocation
page read and write
6C71000
heap
page read and write
BD800330000
trusted library allocation
page read and write
2DE000
unkown
page read and write
3670000
direct allocation
page read and write
1F08362F000
heap
page read and write
1F0FDFF3000
heap
page read and write
7739000
heap
page read and write
6214FFE000
unkown
page readonly
BD800758000
trusted library allocation
page read and write
6C71000
heap
page read and write
6C71000
heap
page read and write
1214002F0000
trusted library allocation
page read and write
48780026C000
direct allocation
page read and write
1214002C8000
trusted library allocation
page read and write
1F089AC7000
unclassified section
page read and write
1360000
heap
page read and write
2DD0000
heap
page read and write
2400DE8000
trusted library allocation
page read and write
24001E4000
trusted library allocation
page read and write
6C71000
heap
page read and write
2400298000
trusted library allocation
page read and write
3670000
direct allocation
page read and write
2400454000
trusted library allocation
page read and write
1F0836A0000
heap
page read and write
6C71000
heap
page read and write
240029A000
trusted library allocation
page read and write
2400C2C000
trusted library allocation
page read and write
2400D90000
trusted library allocation
page read and write
3670000
direct allocation
page read and write
2400B74000
trusted library allocation
page read and write
2400080000
trusted library allocation
page read and write
2400454000
trusted library allocation
page read and write
773C000
heap
page read and write
2E1000
unkown
page readonly
623EFFE000
unkown
page readonly
2400948000
trusted library allocation
page read and write
7737000
heap
page read and write
6217FFE000
unkown
page readonly
2400210000
trusted library allocation
page read and write
773D000
heap
page read and write
62417FE000
stack
page read and write
7733000
heap
page read and write
BD800684000
trusted library allocation
page read and write
1F08366C000
heap
page read and write
6C71000
heap
page read and write
2400C6C000
trusted library allocation
page read and write
2E1000
unkown
page readonly
1F088660000
trusted library section
page read and write
7360000
direct allocation
page execute and read and write
2400201000
trusted library allocation
page read and write
2400F7C000
trusted library allocation
page read and write
121400220000
trusted library allocation
page read and write
487800270000
direct allocation
page read and write
118CB000
heap
page read and write
1F083681000
heap
page read and write
787E000
heap
page read and write
1F0836A2000
heap
page read and write
1F087F8D000
trusted library section
page read and write
2400854000
trusted library allocation
page read and write
7739000
heap
page read and write
1F08307A000
heap
page read and write
6228FFE000
unkown
page readonly
2400A24000
trusted library allocation
page read and write
2400328000
trusted library allocation
page read and write
3690000
direct allocation
page read and write
2400C1C000
trusted library allocation
page read and write
62367FE000
stack
page read and write
1F083686000
heap
page read and write
6C71000
heap
page read and write
6C71000
heap
page read and write
BD800330000
trusted library allocation
page read and write
1A2D000
heap
page read and write
BD8006D4000
trusted library allocation
page read and write
6223FFE000
unkown
page readonly
622B7FA000
stack
page read and write
1F087E60000
heap
page read and write
2400F40000
trusted library allocation
page read and write
240096C000
trusted library allocation
page read and write
2400490000
trusted library allocation
page read and write
77E3000
heap
page read and write
2400294000
trusted library allocation
page read and write
62217FE000
stack
page read and write
1F0836AD000
heap
page read and write
3670000
direct allocation
page read and write
2400EAC000
trusted library allocation
page read and write
24000A8000
trusted library allocation
page read and write
2400074000
trusted library allocation
page read and write
1F08307F000
heap
page read and write
BD8007D0000
trusted library allocation
page read and write
6C71000
heap
page read and write
1A5C000
heap
page read and write
2400494000
trusted library allocation
page read and write
6C71000
heap
page read and write
6C71000
heap
page read and write
6C71000
heap
page read and write
7738000
heap
page read and write
7360000
direct allocation
page execute and read and write
BD800310000
trusted library allocation
page read and write
7986000
heap
page read and write
1F083077000
heap
page read and write
6C71000
heap
page read and write
240092C000
trusted library allocation
page read and write
62157FE000
stack
page read and write
2400988000
trusted library allocation
page read and write
2400D3C000
trusted library allocation
page read and write
62387FE000
stack
page read and write
24008B0000
trusted library allocation
page read and write
240000C000
trusted library allocation
page read and write
BAE000
stack
page read and write
6C71000
heap
page read and write
1F088460000
trusted library section
page read and write
6C71000
heap
page read and write
6A6F8000
direct allocation
page read and write
BD8007B4000
trusted library allocation
page read and write
BD800404000
trusted library allocation
page read and write
6C71000
heap
page read and write
2400401000
trusted library allocation
page read and write
1214002A0000
trusted library allocation
page read and write
2400CE4000
trusted library allocation
page read and write
2400E44000
trusted library allocation
page read and write
487800230000
direct allocation
page read and write
24004B4000
trusted library allocation
page read and write
6C71000
heap
page read and write
1F0FDF0B000
heap
page read and write
780E000
heap
page read and write
1F083087000
heap
page read and write
78EB000
heap
page read and write
2400294000
trusted library allocation
page read and write
6237FFE000
unkown
page readonly
24004A4000
trusted library allocation
page read and write
2400D50000
trusted library allocation
page read and write
783B000
heap
page read and write
773C000
heap
page read and write
48780020C000
direct allocation
page read and write
6C71000
heap
page read and write
6C71000
heap
page read and write
2400344000
trusted library allocation
page read and write
BD800678000
trusted library allocation
page read and write
7851000
heap
page read and write
6C71000
heap
page read and write
6C71000
heap
page read and write
BD80033C000
trusted library allocation
page read and write
6C71000
heap
page read and write
2400CF8000
trusted library allocation
page read and write
24000A0000
trusted library allocation
page read and write
24001E8000
trusted library allocation
page read and write
24002C0000
trusted library allocation
page read and write
240071C000
trusted library allocation
page read and write
2400380000
trusted library allocation
page read and write
BD8002B8000
trusted library allocation
page read and write
240008C000
trusted library allocation
page read and write
1A3B000
heap
page read and write
487800210000
direct allocation
page read and write
6C71000
heap
page read and write
19E4000
heap
page read and write
2400CCC000
trusted library allocation
page read and write
BD80080C000
trusted library allocation
page read and write
773D000
heap
page read and write
1F0FDFF5000
heap
page read and write
1F0836A0000
heap
page read and write
1F087882000
trusted library allocation
page read and write
79C6000
heap
page read and write
2400D08000
trusted library allocation
page read and write
2D0000
unkown
page readonly
2400C01000
trusted library allocation
page read and write
BD800784000
trusted library allocation
page read and write
1F083083000
heap
page read and write
2400298000
trusted library allocation
page read and write
3670000
direct allocation
page read and write
6C71000
heap
page read and write
2400350000
trusted library allocation
page read and write
6C71000
heap
page read and write
773B000
heap
page read and write
6C71000
heap
page read and write
24009E0000
trusted library allocation
page read and write
2400750000
trusted library allocation
page read and write
6C71000
heap
page read and write
2400230000
trusted library allocation
page read and write
7360000
direct allocation
page execute and read and write
78D5000
heap
page read and write
700000
heap
page read and write
2400694000
trusted library allocation
page read and write
6241FFE000
unkown
page readonly
1F087EB0000
trusted library section
page read and write
BD800614000
trusted library allocation
page read and write
6C71000
heap
page read and write
24006EC000
trusted library allocation
page read and write
2DE000
unkown
page write copy
6C71000
heap
page read and write
6C71000
heap
page read and write
773C000
heap
page read and write
2400ACC000
trusted library allocation
page read and write
24001B4000
trusted library allocation
page read and write
2400C78000
trusted library allocation
page read and write
6C71000
heap
page read and write
7A38000
heap
page read and write
6C71000
heap
page read and write
2400CDC000
trusted library allocation
page read and write
78C0000
heap
page read and write
2400644000
trusted library allocation
page read and write
7969000
heap
page read and write
BD8006E0000
trusted library allocation
page read and write
2400D68000
trusted library allocation
page read and write
62147FE000
stack
page read and write
773C000
heap
page read and write
2400294000
trusted library allocation
page read and write
2400E28000
trusted library allocation
page read and write
787A000
heap
page read and write
1F08A080000
trusted library section
page read and write
2400F28000
trusted library allocation
page read and write
2400118000
trusted library allocation
page read and write
24005BC000
trusted library allocation
page read and write
77C4000
heap
page read and write
2400480000
trusted library allocation
page read and write
1390000
heap
page read and write
24001AC000
trusted library allocation
page read and write
1F083083000
heap
page read and write
7833000
heap
page read and write
240045B000
trusted library allocation
page read and write
240001C000
trusted library allocation
page read and write
2D1000
unkown
page execute read
622FFFE000
unkown
page readonly
1F083613000
heap
page read and write
4878002D0000
direct allocation
page read and write
6C71000
heap
page read and write
2400D29000
trusted library allocation
page read and write
C3E000
stack
page read and write
1F08A031000
trusted library section
page read and write
24001A0000
trusted library allocation
page read and write
CF0000
heap
page read and write
773B000
heap
page read and write
1F087F82000
trusted library section
page read and write
62307FB000
stack
page read and write
2400EDC000
trusted library allocation
page read and write
2D0000
unkown
page readonly
BD800374000
trusted library allocation
page read and write
6C71000
heap
page read and write
6C71000
heap
page read and write
7735000
heap
page read and write
240020C000
trusted library allocation
page read and write
7843000
heap
page read and write
1F085610000
trusted library section
page read and write
2401030000
trusted library allocation
page read and write
6C71000
heap
page read and write
240106C000
trusted library allocation
page read and write
240022C000
trusted library allocation
page read and write
7813000
heap
page read and write
1F083615000
heap
page read and write
787C000
heap
page read and write
789D000
heap
page read and write
240045B000
trusted library allocation
page read and write
62247FE000
stack
page read and write
622DFFE000
unkown
page readonly
2400DD8000
trusted library allocation
page read and write
1F08307A000
heap
page read and write
78B4000
heap
page read and write
2400801000
trusted library allocation
page read and write
24001D8000
trusted library allocation
page read and write
BD800630000
trusted library allocation
page read and write
240033C000
trusted library allocation
page read and write
2400584000
trusted library allocation
page read and write
76A2000
direct allocation
page read and write
2401078000
trusted library allocation
page read and write
1214002A0000
trusted library allocation
page read and write
2DE000
unkown
page read and write
2400EB8000
trusted library allocation
page read and write
6C71000
heap
page read and write
2400598000
trusted library allocation
page read and write
62407FE000
stack
page read and write
2400F8C000
trusted library allocation
page read and write
6C71000
heap
page read and write
621A7FE000
stack
page read and write
BD800320000
trusted library allocation
page read and write
2400894000
trusted library allocation
page read and write
1F083086000
heap
page read and write
240015C000
trusted library allocation
page read and write
623C7FA000
stack
page read and write
77F2000
heap
page read and write
6C71000
heap
page read and write
6231FFE000
unkown
page readonly
2400E6C000
trusted library allocation
page read and write
773A000
heap
page read and write
70F0000
direct allocation
page read and write
24004B8000
trusted library allocation
page read and write
240014C000
trusted library allocation
page read and write
240060C000
trusted library allocation
page read and write
1F083678000
heap
page read and write
6C71000
heap
page read and write
6229FFE000
unkown
page readonly
FEF000
stack
page read and write
7A53000
heap
page read and write
1F0FDFD8000
heap
page read and write
2401088000
trusted library allocation
page read and write
1F085683000
heap
page read and write
24001F0000
trusted library allocation
page read and write
720000
heap
page read and write
24006E6000
trusted library allocation
page read and write
1F0FDF94000
heap
page read and write
8B90000
heap
page read and write
1214002BC000
trusted library allocation
page read and write
2400B7C000
trusted library allocation
page read and write
1F08A156000
trusted library section
page read and write
1214002B0000
trusted library allocation
page read and write
621AFFE000
unkown
page readonly
2E1000
unkown
page readonly
62397FE000
stack
page read and write
6C71000
heap
page read and write
24010E0000
trusted library allocation
page read and write
6C71000
heap
page read and write
11EF000
stack
page read and write
BD800368000
trusted library allocation
page read and write
6C71000
heap
page read and write
2400DB0000
trusted library allocation
page read and write
1F0FE0E0000
trusted library allocation
page read and write
1F0FDFF5000
heap
page read and write
1F08307F000
heap
page read and write
1F0FDEE0000
heap
page read and write
24002A4000
trusted library allocation
page read and write
2400ED0000
trusted library allocation
page read and write
BD8002CC000
trusted library allocation
page read and write
1F083050000
heap
page read and write
2400044000
trusted library allocation
page read and write
6C71000
heap
page read and write
6C71000
heap
page read and write
121400274000
trusted library allocation
page read and write
62327FE000
stack
page read and write
6C71000
heap
page read and write
48780025C000
direct allocation
page read and write
7734000
heap
page read and write
2DA000
unkown
page readonly
6C71000
heap
page read and write
11F3000
unkown
page execute and write copy
2400D24000
trusted library allocation
page read and write
2D0000
unkown
page readonly
2400300000
trusted library allocation
page read and write
1F083083000
heap
page read and write
1F0FDFFE000
heap
page read and write
24000D0000
trusted library allocation
page read and write
31DB000
heap
page read and write
24001F8000
trusted library allocation
page read and write
BD80035C000
trusted library allocation
page read and write
2400AC0000
trusted library allocation
page read and write
7857000
heap
page read and write
6C71000
heap
page read and write
6C71000
heap
page read and write
773F000
heap
page read and write
2400C0C000
trusted library allocation
page read and write
621B7FB000
stack
page read and write
1F083087000
heap
page read and write
BD8006CC000
trusted library allocation
page read and write
2400494000
trusted library allocation
page read and write
2400EE8000
trusted library allocation
page read and write
7360000
direct allocation
page execute and read and write
2400678000
trusted library allocation
page read and write
BD800310000
trusted library allocation
page read and write
7874000
heap
page read and write
240005A000
trusted library allocation
page read and write
1214002C0000
trusted library allocation
page read and write
6C71000
heap
page read and write
1F087EC2000
trusted library section
page read and write
2400350000
trusted library allocation
page read and write
1F0FDFF3000
heap
page read and write
6C71000
heap
page read and write
487800220000
direct allocation
page read and write
6C709000
unkown
page read and write
6C71000
heap
page read and write
1214002BC000
trusted library allocation
page read and write
BD80075C000
trusted library allocation
page read and write
121400270000
trusted library allocation
page read and write
1A37000
heap
page read and write
622AFFE000
unkown
page readonly
6C71000
heap
page read and write
1F08A042000
trusted library section
page read and write
78B8000
heap
page read and write
2400C78000
trusted library allocation
page read and write
BD800694000
trusted library allocation
page read and write
1F083698000
heap
page read and write
316E000
stack
page read and write
31D0000
heap
page read and write
1F087C89000
heap
page read and write
6C71000
heap
page read and write
1214002F8000
trusted library allocation
page read and write
7360000
direct allocation
page execute and read and write
2400B1C000
trusted library allocation
page read and write
6C71000
heap
page read and write
1310000
heap
page read and write
240040C000
trusted library allocation
page read and write
2400454000
trusted library allocation
page read and write
760000
unkown
page readonly
2400368000
trusted library allocation
page read and write
78EA000
heap
page read and write
6C71000
heap
page read and write
24001AC000
trusted library allocation
page read and write
24002F3000
trusted library allocation
page read and write
BD8006E4000
trusted library allocation
page read and write
24002F7000
trusted library allocation
page read and write
1214002C0000
trusted library allocation
page read and write
6C71000
heap
page read and write
2400E0D000
trusted library allocation
page read and write
1F08366C000
heap
page read and write
BD800754000
trusted library allocation
page read and write
3670000
direct allocation
page read and write
7736000
heap
page read and write
240033C000
trusted library allocation
page read and write
24002A4000
trusted library allocation
page read and write
6C71000
heap
page read and write
121400264000
trusted library allocation
page read and write
3670000
direct allocation
page read and write
6230FFE000
unkown
page readonly
3120000
heap
page read and write
6C71000
heap
page read and write
BD800250000
trusted library allocation
page read and write
1F083672000
heap
page read and write
240104C000
trusted library allocation
page read and write
1F0FDEC0000
heap
page read and write
BD800354000
trusted library allocation
page read and write
2400C80000
trusted library allocation
page read and write
7735000
heap
page read and write
24000E0000
trusted library allocation
page read and write
2E1000
unkown
page readonly
2400534000
trusted library allocation
page read and write
2D0000
unkown
page readonly
1F08368D000
heap
page read and write
2400F38000
trusted library allocation
page read and write
6238FFE000
unkown
page readonly
2400394000
trusted library allocation
page read and write
6C71000
heap
page read and write
2400298000
trusted library allocation
page read and write
6C71000
heap
page read and write
6C71000
heap
page read and write
6C71000
heap
page read and write
1F083300000
heap
page read and write
2400628000
trusted library allocation
page read and write
1F087C60000
heap
page read and write
121400294000
trusted library allocation
page read and write
2D1000
unkown
page execute read
BD800418000
trusted library allocation
page read and write
1F083641000
heap
page read and write
AFC000
stack
page read and write
1F083580000
trusted library section
page read and write
1F087F66000
trusted library section
page read and write
240104C000
trusted library allocation
page read and write
7964000
heap
page read and write
7734000
heap
page read and write
6C71000
heap
page read and write
BD800238000
trusted library allocation
page read and write
24002E0000
trusted library allocation
page read and write
2400E80000
trusted library allocation
page read and write
69C000
stack
page read and write
2400FB8000
trusted library allocation
page read and write
2400E18000
trusted library allocation
page read and write
2400C4C000
trusted library allocation
page read and write
1F083150000
trusted library section
page readonly
240100C000
trusted library allocation
page read and write
7360000
direct allocation
page execute and read and write
1F0836A2000
heap
page read and write
2400E90000
trusted library allocation
page read and write
1F0818D0000
heap
page read and write
2400DDC000
trusted library allocation
page read and write
6C71000
heap
page read and write
BD800348000
trusted library allocation
page read and write
24001F4000
trusted library allocation
page read and write
1F083646000
heap
page read and write
1F089D1E000
trusted library section
page read and write
7631000
heap
page read and write
BD800730000
trusted library allocation
page read and write
1A2C000
heap
page read and write
1F085580000
trusted library allocation
page read and write
6220FFE000
unkown
page readonly
24010D8000
trusted library allocation
page read and write
6C71000
heap
page read and write
BD8002FC000
trusted library allocation
page read and write
24009BC000
trusted library allocation
page read and write
There are 1158 hidden memdumps, click here to show them.