IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_de576c89c85d95f63177b89249eef622329cc21c_49e505fd_d29fc0e9-ec06-4e33-b036-781efa8b9542\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER34D4.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Nov 25 05:39:37 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER365B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER36BA.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 --field-trial-handle=2272,i,18268376404753230842,14554437344874496897,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6260 -s 1296

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://crbug.com/368855.)
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://chrome.google.com/webstore?hl=enu1
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://duckduckgo.com/chrome_newtab%
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
http://anglebug.com/7036q
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=b?
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
34.116.198.130
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://unisolated.invalid/a
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
https://issuetracker.google.com/250706693preferSubmitOnAnySamplesPassedQueryEnd
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
http://anglebug.com/4937
unknown
https://issuetracker.google.com/166809097
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fvtekk5pn.top
34.116.198.130
www.google.com
142.250.181.68
fvtekk5pn.top
34.116.198.130

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
34.116.198.130
home.fvtekk5pn.top
United States
142.250.181.68
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{577ebaaa-6085-db92-cafb-bf24c56ed3c7}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
malicious
\REGISTRY\A\{577ebaaa-6085-db92-cafb-bf24c56ed3c7}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
malicious
\REGISTRY\A\{577ebaaa-6085-db92-cafb-bf24c56ed3c7}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
malicious
\REGISTRY\A\{577ebaaa-6085-db92-cafb-bf24c56ed3c7}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
malicious
\REGISTRY\A\{577ebaaa-6085-db92-cafb-bf24c56ed3c7}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
malicious
\REGISTRY\A\{577ebaaa-6085-db92-cafb-bf24c56ed3c7}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
malicious
\REGISTRY\A\{577ebaaa-6085-db92-cafb-bf24c56ed3c7}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
malicious
\REGISTRY\A\{577ebaaa-6085-db92-cafb-bf24c56ed3c7}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
malicious
\REGISTRY\A\{577ebaaa-6085-db92-cafb-bf24c56ed3c7}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
malicious
\REGISTRY\A\{577ebaaa-6085-db92-cafb-bf24c56ed3c7}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
malicious
\REGISTRY\A\{577ebaaa-6085-db92-cafb-bf24c56ed3c7}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
malicious
\REGISTRY\A\{577ebaaa-6085-db92-cafb-bf24c56ed3c7}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
malicious
\REGISTRY\A\{577ebaaa-6085-db92-cafb-bf24c56ed3c7}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
malicious
\REGISTRY\A\{577ebaaa-6085-db92-cafb-bf24c56ed3c7}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
malicious
\REGISTRY\A\{577ebaaa-6085-db92-cafb-bf24c56ed3c7}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
malicious
\REGISTRY\A\{577ebaaa-6085-db92-cafb-bf24c56ed3c7}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
malicious
\REGISTRY\A\{577ebaaa-6085-db92-cafb-bf24c56ed3c7}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
malicious
\REGISTRY\A\{577ebaaa-6085-db92-cafb-bf24c56ed3c7}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
malicious
\REGISTRY\A\{577ebaaa-6085-db92-cafb-bf24c56ed3c7}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3FE0006F4000
trusted library allocation
page read and write
3FE0006B0000
trusted library allocation
page read and write
3FE00060C000
trusted library allocation
page read and write
3FE0001E0000
trusted library allocation
page read and write
174CF63F000
heap
page read and write
174CF63F000
heap
page read and write
6941000
heap
page read and write
2038002EC000
direct allocation
page read and write
3FE00082C000
trusted library allocation
page read and write
7326000
heap
page read and write
174CF650000
heap
page read and write
3FE000F5C000
trusted library allocation
page read and write
31B97FA000
stack
page read and write
BAE000
unkown
page read and write
174CF650000
heap
page read and write
3FE0001B4000
trusted library allocation
page read and write
174CF650000
heap
page read and write
31B0FFE000
unkown
page readonly
319E7FA000
stack
page read and write
31A2FFE000
unkown
page readonly
3FE000A68000
trusted library allocation
page read and write
6941000
heap
page read and write
3FE000201000
trusted library allocation
page read and write
174CF644000
heap
page read and write
174CF650000
heap
page read and write
6941000
heap
page read and write
174CF650000
heap
page read and write
3FE00016C000
trusted library allocation
page read and write
6941000
heap
page read and write
1B3800788000
trusted library allocation
page read and write
17C000
stack
page read and write
3FE000338000
trusted library allocation
page read and write
31BC7FE000
stack
page read and write
174CF650000
heap
page read and write
1B380080C000
trusted library allocation
page read and write
319FFFE000
unkown
page readonly
3FE000FD0000
trusted library allocation
page read and write
174CF644000
heap
page read and write
73B2000
heap
page read and write
203800260000
direct allocation
page read and write
174CF650000
heap
page read and write
1B38006E4000
trusted library allocation
page read and write
BAE000
unkown
page read and write
174CF650000
heap
page read and write
174CF650000
heap
page read and write
31B57FE000
stack
page read and write
6C20C000
unkown
page readonly
174D6570000
trusted library section
page read and write
174D1E87000
unclassified section
page read and write
174CF63D000
heap
page read and write
732E000
heap
page read and write
7589000
heap
page read and write
3FE00022C000
trusted library allocation
page read and write
3FE00059C000
trusted library allocation
page read and write
174CF63A000
heap
page read and write
3FE00037C000
trusted library allocation
page read and write
174CF63A000
heap
page read and write
174CF650000
heap
page read and write
BAA000
unkown
page readonly
732D000
heap
page read and write
732A000
heap
page read and write
840000
heap
page read and write
1B3800354000
trusted library allocation
page read and write
3FE000298000
trusted library allocation
page read and write
174CF644000
heap
page read and write
7326000
heap
page read and write
3FE000AE8000
trusted library allocation
page read and write
3FE0002A4000
trusted library allocation
page read and write
2038002DC000
direct allocation
page read and write
174CF642000
heap
page read and write
7323000
heap
page read and write
174CF632000
heap
page read and write
174CF650000
heap
page read and write
174CF644000
heap
page read and write
717800235000
trusted library allocation
page read and write
3FE0001C4000
trusted library allocation
page read and write
3FE0000EC000
trusted library allocation
page read and write
174CBF60000
heap
page read and write
174CBF80000
heap
page read and write
3FE000BB0000
trusted library allocation
page read and write
174CF650000
heap
page read and write
174CF63F000
heap
page read and write
3FE0000FC000
trusted library allocation
page read and write
31AAFFE000
unkown
page readonly
3FE000F14000
trusted library allocation
page read and write
174CC0B5000
heap
page read and write
3FE0005E8000
trusted library allocation
page read and write
174CF649000
heap
page read and write
3FE0009E0000
trusted library allocation
page read and write
6941000
heap
page read and write
732C000
heap
page read and write
3FE000098000
trusted library allocation
page read and write
1AA0000
heap
page read and write
1B3800374000
trusted library allocation
page read and write
174CF63E000
heap
page read and write
1B38006B8000
trusted library allocation
page read and write
31937FD000
stack
page read and write
3FE000DB4000
trusted library allocation
page read and write
BA0000
unkown
page readonly
20380020C000
direct allocation
page read and write
174CF63F000
heap
page read and write
174CF644000
heap
page read and write
3FE000DEC000
trusted library allocation
page read and write
717800260000
trusted library allocation
page read and write
BB1000
unkown
page readonly
3FE0008A2000
trusted library allocation
page read and write
B3F000
stack
page read and write
63E000
stack
page read and write
3FE000918000
trusted library allocation
page read and write
3FE000A28000
trusted library allocation
page read and write
A7C000
stack
page read and write
7178002BC000
trusted library allocation
page read and write
7178002B0000
trusted library allocation
page read and write
33A0000
direct allocation
page read and write
3FE000134000
trusted library allocation
page read and write
BB1000
unkown
page readonly
174CF63A000
heap
page read and write
203800294000
direct allocation
page read and write
3FE000EFC000
trusted library allocation
page read and write
318EFFE000
unkown
page readonly
174CF650000
heap
page read and write
732D000
heap
page read and write
174CF63D000
heap
page read and write
174CF637000
heap
page read and write
3FE000454000
trusted library allocation
page read and write
3FE000300000
trusted library allocation
page read and write
31B1FFE000
unkown
page readonly
3FE000D34000
trusted library allocation
page read and write
1B38006F0000
trusted library allocation
page read and write
7460000
heap
page read and write
6DD0000
direct allocation
page read and write
174CF649000
heap
page read and write
3FE000601000
trusted library allocation
page read and write
1B3800364000
trusted library allocation
page read and write
174CF650000
heap
page read and write
7050000
direct allocation
page execute and read and write
1B3800320000
trusted library allocation
page read and write
3FE0006DC000
trusted library allocation
page read and write
174CF634000
heap
page read and write
174CFBE6000
heap
page read and write
DBC000
stack
page read and write
14C0000
heap
page read and write
174CF644000
heap
page read and write
174CF638000
heap
page read and write
3FE000300000
trusted library allocation
page read and write
174CF650000
heap
page read and write
31957FA000
stack
page read and write
174CF62E000
heap
page read and write
174CF650000
heap
page read and write
7456000
heap
page read and write
3FE0002A8000
trusted library allocation
page read and write
2038002AC000
direct allocation
page read and write
3FE000C8C000
trusted library allocation
page read and write
174CF637000
heap
page read and write
1B3800610000
trusted library allocation
page read and write
174CF638000
heap
page read and write
174CF650000
heap
page read and write
3FE000E88000
trusted library allocation
page read and write
31A1FFE000
unkown
page readonly
3FE0009EC000
trusted library allocation
page read and write
174CF650000
heap
page read and write
33A0000
direct allocation
page read and write
3FE00001C000
trusted library allocation
page read and write
319CFFE000
unkown
page readonly
318F7FE000
stack
page read and write
7556000
heap
page read and write
174CF634000
heap
page read and write
3FE000C0C000
trusted library allocation
page read and write
6941000
heap
page read and write
1B3800724000
trusted library allocation
page read and write
75EE000
heap
page read and write
3196FFE000
unkown
page readonly
7050000
direct allocation
page execute and read and write
174CF644000
heap
page read and write
174CF644000
heap
page read and write
203800280000
direct allocation
page read and write
15DF000
stack
page read and write
6941000
heap
page read and write
717800264000
trusted library allocation
page read and write
1B3800354000
trusted library allocation
page read and write
3199FFE000
unkown
page readonly
174CF649000
heap
page read and write
174CF650000
heap
page read and write
1FEF000
stack
page read and write
3FE000CF8000
trusted library allocation
page read and write
1E0000
heap
page read and write
1B38006FC000
trusted library allocation
page read and write
BAA000
unkown
page readonly
174CF650000
heap
page read and write
74DD000
heap
page read and write
7325000
heap
page read and write
7050000
direct allocation
page execute and read and write
7327000
heap
page read and write
1B380078C000
trusted library allocation
page read and write
7420000
heap
page read and write
31BBFFE000
unkown
page readonly
3FE000D64000
trusted library allocation
page read and write
7328000
heap
page read and write
174CFC28000
heap
page read and write
3FE000EC4000
trusted library allocation
page read and write
7526000
heap
page read and write
6941000
heap
page read and write
3FE000C28000
trusted library allocation
page read and write
3FE00026C000
trusted library allocation
page read and write
174CF650000
heap
page read and write
174CF650000
heap
page read and write
174CF642000
heap
page read and write
1B3800624000
trusted library allocation
page read and write
3FE000FBC000
trusted library allocation
page read and write
1B3800310000
trusted library allocation
page read and write
3FE000B64000
trusted library allocation
page read and write
318E7FE000
unkown
page read and write
174CF628000
heap
page read and write
6941000
heap
page read and write
3FE0001B4000
trusted library allocation
page read and write
3FE0002B4000
trusted library allocation
page read and write
6941000
heap
page read and write
174D6331000
trusted library section
page read and write
3FE000340000
trusted library allocation
page read and write
174CC235000
heap
page read and write
3FE000778000
trusted library allocation
page read and write
3FE000360000
trusted library allocation
page read and write
3FE000E7D000
trusted library allocation
page read and write
174CF650000
heap
page read and write
174CF644000
heap
page read and write
1B38006B4000
trusted library allocation
page read and write
174CF642000
heap
page read and write
3FE000C98000
trusted library allocation
page read and write
3FE00032C000
trusted library allocation
page read and write
174CF650000
heap
page read and write
174CF638000
heap
page read and write
3FE000ABC000
trusted library allocation
page read and write
174CF629000
heap
page read and write
3FE000D24000
trusted library allocation
page read and write
174CF650000
heap
page read and write
BB1000
unkown
page readonly
174CF650000
heap
page read and write
1B3800348000
trusted library allocation
page read and write
174CF63F000
heap
page read and write
1B3800750000
trusted library allocation
page read and write
1B3800320000
trusted library allocation
page read and write
174CF63D000
heap
page read and write
7050000
direct allocation
page execute and read and write
174CF63A000
heap
page read and write
3FE000298000
trusted library allocation
page read and write
174CFBB0000
heap
page read and write
31A0FFE000
unkown
page readonly
174CF644000
heap
page read and write
174D5DB0000
trusted library section
page read and write
BB1000
unkown
page readonly
3FE000294000
trusted library allocation
page read and write
174CF649000
heap
page read and write
174CF63A000
heap
page read and write
3FE00007C000
trusted library allocation
page read and write
7178002BC000
trusted library allocation
page read and write
3FE00051C000
trusted library allocation
page read and write
3FE00034C000
trusted library allocation
page read and write
33A0000
direct allocation
page read and write
174CF66B000
heap
page read and write
3FE000788000
trusted library allocation
page read and write
7178002A0000
trusted library allocation
page read and write
31B77FE000
stack
page read and write
769F000
heap
page read and write
33A0000
direct allocation
page read and write
174CDE83000
heap
page read and write
174CFBDB000
heap
page read and write
3FE0007AC000
trusted library allocation
page read and write
174CF644000
heap
page read and write
31B27FD000
stack
page read and write
3FE000F1C000
trusted library allocation
page read and write
7406000
heap
page read and write
3FE000EEC000
trusted library allocation
page read and write
3FE000BA4000
trusted library allocation
page read and write
7320000
heap
page read and write
174CFC39000
heap
page read and write
1B38002FC000
trusted library allocation
page read and write
3FE000230000
trusted library allocation
page read and write
3FE000CD4000
trusted library allocation
page read and write
3FE000338000
trusted library allocation
page read and write
174CF642000
heap
page read and write
174CF642000
heap
page read and write
BA0000
unkown
page readonly
174CF63A000
heap
page read and write
174CF644000
heap
page read and write
1B3800718000
trusted library allocation
page read and write
717800230000
trusted library allocation
page read and write
6DD0000
direct allocation
page read and write
3FE000E60000
trusted library allocation
page read and write
3FE000190000
trusted library allocation
page read and write
174CF650000
heap
page read and write
6941000
heap
page read and write
7499000
heap
page read and write
7441000
heap
page read and write
174CF638000
heap
page read and write
7050000
direct allocation
page execute and read and write
174CF643000
heap
page read and write
3FE0005AC000
trusted library allocation
page read and write
7050000
direct allocation
page execute and read and write
1B3800664000
trusted library allocation
page read and write
717800238000
trusted library allocation
page read and write
3FE00037C000
trusted library allocation
page read and write
203800210000
direct allocation
page read and write
3FE0001DC000
trusted library allocation
page read and write
3FE000E1C000
trusted library allocation
page read and write
174CF63F000
heap
page read and write
3FE0000A8000
trusted library allocation
page read and write
3FE000FA8000
trusted library allocation
page read and write
3FE000F4C000
trusted library allocation
page read and write
174CF638000
heap
page read and write
7178002BC000
trusted library allocation
page read and write
174CF644000
heap
page read and write
174CF633000
heap
page read and write
14B0000
heap
page read and write
1B38007B4000
trusted library allocation
page read and write
3FE0001A0000
trusted library allocation
page read and write
174CC007000
heap
page read and write
1B3800760000
trusted library allocation
page read and write
174CF650000
heap
page read and write
7659000
heap
page read and write
3FE0007A1000
trusted library allocation
page read and write
174CF642000
heap
page read and write
6941000
heap
page read and write
3FE000A38000
trusted library allocation
page read and write
1B38006CC000
trusted library allocation
page read and write
174CF650000
heap
page read and write
174CF650000
heap
page read and write
6DD0000
direct allocation
page read and write
174CF66B000
heap
page read and write
174CF642000
heap
page read and write
31B37FE000
stack
page read and write
174CF63A000
heap
page read and write
195E000
stack
page read and write
1B38007C8000
trusted library allocation
page read and write
717800248000
trusted library allocation
page read and write
6941000
heap
page read and write
174CF650000
heap
page read and write
717800274000
trusted library allocation
page read and write
31A8FFE000
unkown
page readonly
33A0000
direct allocation
page read and write
732B000
heap
page read and write
BAA000
unkown
page readonly
174CF642000
heap
page read and write
3FE0004C0000
trusted library allocation
page read and write
73DA000
heap
page read and write
1B3800408000
trusted library allocation
page read and write
31A17FE000
stack
page read and write
3FE000358000
trusted library allocation
page read and write
7050000
direct allocation
page execute and read and write
174D5507000
unclassified section
page read and write
3FE000E98000
trusted library allocation
page read and write
3FE000528000
trusted library allocation
page read and write
174CF644000
heap
page read and write
174CF642000
heap
page read and write
7178002C0000
trusted library allocation
page read and write
6C0E0000
unkown
page readonly
1B3800248000
trusted library allocation
page read and write
3FE000801000
trusted library allocation
page read and write
3FE0006FC000
trusted library allocation
page read and write
174CF638000
heap
page read and write
174CF650000
heap
page read and write
6C209000
unkown
page read and write
3FE000C8C000
trusted library allocation
page read and write
33A0000
direct allocation
page read and write
717800294000
trusted library allocation
page read and write
3FE0002A8000
trusted library allocation
page read and write
150E000
stack
page read and write
3FE000D0C000
trusted library allocation
page read and write
174CF63F000
heap
page read and write
3FE0004D0000
trusted library allocation
page read and write
1B38002B8000
trusted library allocation
page read and write
174CF644000
heap
page read and write
31A9FFE000
unkown
page readonly
6941000
heap
page read and write
174CF637000
heap
page read and write
174CF63A000
heap
page read and write
7178002C0000
trusted library allocation
page read and write
3FE00029C000
trusted library allocation
page read and write
174CF63D000
heap
page read and write
174CF63E000
heap
page read and write
174CF644000
heap
page read and write
BA1000
unkown
page execute read
174CF638000
heap
page read and write
174CF637000
heap
page read and write
7323000
heap
page read and write
174CF644000
heap
page read and write
174CF650000
heap
page read and write
1D0000
heap
page read and write
174CF63A000
heap
page read and write
174CF650000
heap
page read and write
3FE000198000
trusted library allocation
page read and write
3FE000924000
trusted library allocation
page read and write
3FE000300000
trusted library allocation
page read and write
33A0000
direct allocation
page read and write
3FE0008DC000
trusted library allocation
page read and write
73E9000
heap
page read and write
732A000
heap
page read and write
3FE000728000
trusted library allocation
page read and write
174D6507000
unclassified section
page read and write
3FE0001D0000
trusted library allocation
page read and write
732C000
heap
page read and write
3FE00020C000
trusted library allocation
page read and write
174CF644000
heap
page read and write
74DA000
heap
page read and write
31A3FFE000
unkown
page readonly
174CFBEE000
heap
page read and write
3191FFE000
unkown
page readonly
74B2000
heap
page read and write
174CF650000
heap
page read and write
6C208000
unkown
page readonly
3FE000294000
trusted library allocation
page read and write
1B3800248000
trusted library allocation
page read and write
203800201000
direct allocation
page read and write
BA0000
unkown
page readonly
73BC000
heap
page read and write
1B3800630000
trusted library allocation
page read and write
31AC7FC000
stack
page read and write
174CF650000
heap
page read and write
7050000
direct allocation
page execute and read and write
754D000
heap
page read and write
1520000
heap
page read and write
174CF650000
heap
page read and write
31B47FD000
stack
page read and write
174CF642000
heap
page read and write
174CFC4F000
heap
page read and write
174CF644000
heap
page read and write
3FE000A0C000
trusted library allocation
page read and write
174D657E000
trusted library section
page read and write
174CF63E000
heap
page read and write
7020000
direct allocation
page execute and read and write
174CFC41000
heap
page read and write
3FE00036C000
trusted library allocation
page read and write
174CFAE0000
trusted library section
page read and write
174CF650000
heap
page read and write
174CF644000
heap
page read and write
7178002B0000
trusted library allocation
page read and write
6941000
heap
page read and write
3FE000CFC000
trusted library allocation
page read and write
1B3800320000
trusted library allocation
page read and write
174CF642000
heap
page read and write
3FE000768000
trusted library allocation
page read and write
7499000
heap
page read and write
748C000
heap
page read and write
174CF642000
heap
page read and write
3FE000224000
trusted library allocation
page read and write
3FE000A14000
trusted library allocation
page read and write
33A0000
direct allocation
page read and write
6941000
heap
page read and write
174CFA40000
trusted library section
page read and write
174CF650000
heap
page read and write
3192FFE000
unkown
page readonly
174CF63F000
heap
page read and write
7178002BC000
trusted library allocation
page read and write
174CF644000
heap
page read and write
174CFB7E000
heap
page read and write
174CF63A000
heap
page read and write
1B3800658000
trusted library allocation
page read and write
174CFC06000
heap
page read and write
1B3800700000
trusted library allocation
page read and write
174CF63D000
heap
page read and write
174CF644000
heap
page read and write
31A4FFE000
unkown
page readonly
7050000
direct allocation
page execute and read and write
3FE000454000
trusted library allocation
page read and write
6941000
heap
page read and write
174CF63E000
heap
page read and write
174CF634000
heap
page read and write
31B07FE000
stack
page read and write
174CF650000
heap
page read and write
3FE0005D4000
trusted library allocation
page read and write
BA1000
unkown
page execute read
3FE000FB8000
trusted library allocation
page read and write
174CF650000
heap
page read and write
174CF644000
heap
page read and write
31B17FE000
stack
page read and write
52D000
stack
page read and write
174CF644000
heap
page read and write
174CF650000
heap
page read and write
10E7000
heap
page read and write
174CF63F000
heap
page read and write
3FE000C50000
trusted library allocation
page read and write
7321000
heap
page read and write
174CF650000
heap
page read and write
1B380025C000
trusted library allocation
page read and write
174CF634000
heap
page read and write
174CF650000
heap
page read and write
3FE000FC4000
trusted library allocation
page read and write
3FE000BD0000
trusted library allocation
page read and write
174D5673000
heap
page read and write
3195FFE000
unkown
page readonly
1B3800250000
trusted library allocation
page read and write
1B380075C000
trusted library allocation
page read and write
174CF644000
heap
page read and write
31907FE000
stack
page read and write
74B4000
heap
page read and write
3FE000C94000
trusted library allocation
page read and write
174CF633000
heap
page read and write
174CF63F000
heap
page read and write
174D5BB0000
trusted library section
page read and write
174CF642000
heap
page read and write
746F000
heap
page read and write
174CF634000
heap
page read and write
732F000
heap
page read and write
174CF642000
heap
page read and write
3FE000F30000
trusted library allocation
page read and write
3193FFE000
unkown
page readonly
174CF63F000
heap
page read and write
6941000
heap
page read and write
3FE000B14000
trusted library allocation
page read and write
3FE000894000
trusted library allocation
page read and write
1B38002F4000
trusted library allocation
page read and write
B2F000
stack
page read and write
174D6340000
trusted library section
page read and write
717800250000
trusted library allocation
page read and write
174CF650000
heap
page read and write
174CF632000
heap
page read and write
3FE000938000
trusted library allocation
page read and write
3FE00015C000
trusted library allocation
page read and write
67E000
stack
page read and write
203800220000
direct allocation
page read and write
6941000
heap
page read and write
6941000
heap
page read and write
174CF644000
heap
page read and write
3FE00020C000
trusted library allocation
page read and write
174CF63D000
heap
page read and write
1B38002E4000
trusted library allocation
page read and write
174CF63F000
heap
page read and write
1B38006C4000
trusted library allocation
page read and write
746A000
heap
page read and write
3FE000978000
trusted library allocation
page read and write
7326000
heap
page read and write
BA1000
unkown
page execute read
3FE000294000
trusted library allocation
page read and write
74D2000
heap
page read and write
319A7FE000
stack
page read and write
1B3800430000
trusted library allocation
page read and write
3FE000338000
trusted library allocation
page read and write
174CF650000
heap
page read and write
3FE00080C000
trusted library allocation
page read and write
7178002C0000
trusted library allocation
page read and write
3FE000E54000
trusted library allocation
page read and write
1B3800238000
trusted library allocation
page read and write
6941000
heap
page read and write
AD0000
heap
page read and write
6941000
heap
page read and write
174CF644000
heap
page read and write
31ABFFE000
unkown
page readonly
174CF644000
heap
page read and write
6941000
heap
page read and write
174CF650000
heap
page read and write
3FE000A78000
trusted library allocation
page read and write
174CFB8E000
heap
page read and write
6941000
heap
page read and write
174CF63F000
heap
page read and write
5FC000
stack
page read and write
3FE000738000
trusted library allocation
page read and write
319BFFE000
unkown
page readonly
3FE000994000
trusted library allocation
page read and write
174CF650000
heap
page read and write
3FE0001B4000
trusted library allocation
page read and write
15F6000
heap
page read and write
174CF637000
heap
page read and write
174CF64E000
heap
page read and write
174CF633000
heap
page read and write
31AEFFE000
unkown
page readonly
174CF650000
heap
page read and write
174CFBC8000
heap
page read and write
3FE0002B8000
trusted library allocation
page read and write
33A0000
direct allocation
page read and write
31BCFFE000
unkown
page readonly
174CF650000
heap
page read and write
6941000
heap
page read and write
3FE000C9D000
trusted library allocation
page read and write
7452000
heap
page read and write
31BAFFE000
unkown
page readonly
31977FB000
stack
page read and write
319F7FE000
stack
page read and write
3FE000294000
trusted library allocation
page read and write
3FE0001AC000
trusted library allocation
page read and write
BAA000
unkown
page readonly
1B380035C000
trusted library allocation
page read and write
2038002A8000
direct allocation
page read and write
7050000
direct allocation
page execute and read and write
3FE000318000
trusted library allocation
page read and write
1B3800220000
trusted library allocation
page read and write
1B3800330000
trusted library allocation
page read and write
3FE000DE5000
trusted library allocation
page read and write
174CFBDF000
heap
page read and write
174CF643000
heap
page read and write
174CFB60000
heap
page read and write
6A40000
trusted library allocation
page read and write
174D3E20000
heap
page read and write
31B2FFE000
unkown
page readonly
174CFBB7000
heap
page read and write
6941000
heap
page read and write
3FE000CBC000
trusted library allocation
page read and write
717800270000
trusted library allocation
page read and write
3FE000D24000
trusted library allocation
page read and write
174CF644000
heap
page read and write
74AE000
heap
page read and write
6941000
heap
page read and write
1B38006AC000
trusted library allocation
page read and write
3FE000214000
trusted library allocation
page read and write
7324000
heap
page read and write
3FE000044000
trusted library allocation
page read and write
7050000
direct allocation
page execute and read and write
3FE000540000
trusted library allocation
page read and write
174CF644000
heap
page read and write
174D6320000
trusted library section
page read and write
7322000
heap
page read and write
3FE000BA4000
trusted library allocation
page read and write
174CF637000
heap
page read and write
33A0000
direct allocation
page read and write
740C000
heap
page read and write
1B3800688000
trusted library allocation
page read and write
3FE00029C000
trusted library allocation
page read and write
1B3800684000
trusted library allocation
page read and write
174CFC09000
heap
page read and write
7328000
heap
page read and write
1B3800678000
trusted library allocation
page read and write
31987FB000
stack
page read and write
741B000
heap
page read and write
7326000
heap
page read and write
31B7FFE000
unkown
page readonly
3FE000070000
trusted library allocation
page read and write
7050000
direct allocation
page execute and read and write
1B380060C000
trusted library allocation
page read and write
174CF642000
heap
page read and write
174CFBD0000
heap
page read and write
13DF000
stack
page read and write
174CF63F000
heap
page read and write
319DFFE000
unkown
page readonly
174CF650000
heap
page read and write
174CF63A000
heap
page read and write
7322000
heap
page read and write
1B38002ED000
trusted library allocation
page read and write
3FE000294000
trusted library allocation
page read and write
31AB7FD000
stack
page read and write
1B380035C000
trusted library allocation
page read and write
1B3800784000
trusted library allocation
page read and write
3FE000340000
trusted library allocation
page read and write
BA1000
unkown
page execute read
7178002C8000
trusted library allocation
page read and write
6941000
heap
page read and write
73D1000
heap
page read and write
3FE0003A4000
trusted library allocation
page read and write
3FE0009E5000
trusted library allocation
page read and write
174CF644000
heap
page read and write
3FE000CB0000
trusted library allocation
page read and write
3FE000F84000
trusted library allocation
page read and write
3FE000E44000
trusted library allocation
page read and write
3FE000A01000
trusted library allocation
page read and write
870000
heap
page read and write
174CF642000
heap
page read and write
3FE00072E000
trusted library allocation
page read and write
174CF642000
heap
page read and write
10000
unkown
page readonly
3FE00030C000
trusted library allocation
page read and write
1B3800390000
trusted library allocation
page read and write
BAE000
unkown
page write copy
3FE000D34000
trusted library allocation
page read and write
174D5610000
heap
page read and write
174CF650000
heap
page read and write
174CF650000
heap
page read and write
174CF644000
heap
page read and write
74D9000
direct allocation
page read and write
3FE000D6C000
trusted library allocation
page read and write
3FE000BD8000
trusted library allocation
page read and write
31947FA000
stack
page read and write
6C1BD000
unkown
page read and write
6941000
heap
page read and write
717800201000
trusted library allocation
page read and write
174CF650000
heap
page read and write
3FE0008E4000
trusted library allocation
page read and write
31A07FE000
stack
page read and write
3FE0009C4000
trusted library allocation
page read and write
31B8FFE000
unkown
page readonly
174CF650000
heap
page read and write
3FE000F9E000
trusted library allocation
page read and write
3FE000870000
trusted library allocation
page read and write
6941000
heap
page read and write
3FE000964000
trusted library allocation
page read and write
174CBFB0000
heap
page read and write
174CF650000
heap
page read and write
31ACFFE000
unkown
page readonly
6941000
heap
page read and write
1B3800330000
trusted library allocation
page read and write
31A87FB000
stack
page read and write
319EFFE000
unkown
page readonly
174CF650000
heap
page read and write
1B3800758000
trusted library allocation
page read and write
3FE000854000
trusted library allocation
page read and write
7040000
direct allocation
page execute and read and write
1B38007CC000
trusted library allocation
page read and write
174D6358000
trusted library section
page read and write
6941000
heap
page read and write
174CF650000
heap
page read and write
3FE000DAC000
trusted library allocation
page read and write
7322000
heap
page read and write
174CF650000
heap
page read and write
174CF642000
heap
page read and write
174CF650000
heap
page read and write
7178002E4000
trusted library allocation
page read and write
BAE000
unkown
page write copy
174CF650000
heap
page read and write
3FE0002F3000
trusted library allocation
page read and write
1B3800620000
trusted library allocation
page read and write
7382000
direct allocation
page read and write
174CF63B000
heap
page read and write
174CF650000
heap
page read and write
174CC07A000
heap
page read and write
3FE00032C000
trusted library allocation
page read and write
3FE000318000
trusted library allocation
page read and write
1B3800201000
trusted library allocation
page read and write
174CF63F000
heap
page read and write
3FE000A40000
trusted library allocation
page read and write
174CF637000
heap
page read and write
6C1BF000
unkown
page readonly
3FE000545000
trusted library allocation
page read and write
174CF635000
heap
page read and write
74DD000
heap
page read and write
174CFB69000
heap
page read and write
3FE000B28000
trusted library allocation
page read and write
3FE000CEC000
trusted library allocation
page read and write
174CF644000
heap
page read and write
7405000
heap
page read and write
174CF63E000
heap
page read and write
3FE0001E8000
trusted library allocation
page read and write
31A37FC000
stack
page read and write
3FE000464000
trusted library allocation
page read and write
3FE000218000
trusted library allocation
page read and write
174CF644000
heap
page read and write
174D38F2000
trusted library allocation
page read and write
3FE00029E000
trusted library allocation
page read and write
3FE000D84000
trusted library allocation
page read and write
174CF644000
heap
page read and write
3FE0000A0000
trusted library allocation
page read and write
174CF649000
heap
page read and write
203800215000
direct allocation
page read and write
7050000
direct allocation
page execute and read and write
174CF650000
heap
page read and write
3FE000BB8000
trusted library allocation
page read and write
174CF634000
heap
page read and write
174CF643000
heap
page read and write
8A0000
heap
page read and write
174CF650000
heap
page read and write
B1E000
stack
page read and write
174CF644000
heap
page read and write
174CF644000
heap
page read and write
31B9FFE000
unkown
page readonly
1B380027C000
trusted library allocation
page read and write
174CF63B000
heap
page read and write
174CF63C000
heap
page read and write
174CF63B000
heap
page read and write
174CF642000
heap
page read and write
6941000
heap
page read and write
3FE000A9C000
trusted library allocation
page read and write
174CF634000
heap
page read and write
174CF600000
heap
page read and write
174CF63F000
heap
page read and write
1B380069C000
trusted library allocation
page read and write
3FE000124000
trusted library allocation
page read and write
174CF644000
heap
page read and write
3FE0001E4000
trusted library allocation
page read and write
3FE0003BA000
trusted library allocation
page read and write
7517000
heap
page read and write
3FE0000D0000
trusted library allocation
page read and write
7050000
direct allocation
page execute and read and write
174CF650000
heap
page read and write
174CF650000
heap
page read and write
7178002F4000
trusted library allocation
page read and write
3FE000324000
trusted library allocation
page read and write
31BA7FC000
stack
page read and write
174CF63F000
heap
page read and write
3FE000E74000
trusted library allocation
page read and write
174CF649000
heap
page read and write
11000
unkown
page execute and write copy
3FE000710000
trusted library allocation
page read and write
31A5FFE000
unkown
page readonly
3FE0001AC000
trusted library allocation
page read and write
6941000
heap
page read and write
3FE0002BA000
trusted library allocation
page read and write
31967FE000
stack
page read and write
319D7FE000
stack
page read and write
174CF644000
heap
page read and write
7050000
direct allocation
page execute and read and write
31AFFFE000
unkown
page readonly
1B3800601000
trusted library allocation
page read and write
3FE00000C000
trusted library allocation
page read and write
174CF650000
heap
page read and write
174CC0E8000
heap
page read and write
3FE0004D8000
trusted library allocation
page read and write
7178002D8000
trusted library allocation
page read and write
7321000
heap
page read and write
BAE000
unkown
page write copy
174CF650000
heap
page read and write
3FE0009BB000
trusted library allocation
page read and write
7327000
heap
page read and write
3FE0006FF000
trusted library allocation
page read and write
3FE000D7C000
trusted library allocation
page read and write
174CF634000
heap
page read and write
3FE000220000
trusted library allocation
page read and write
3FE0003A4000
trusted library allocation
page read and write
6941000
heap
page read and write
3FE0002C0000
trusted library allocation
page read and write
74DB000
direct allocation
page read and write
3FE0002B4000
trusted library allocation
page read and write
174CF643000
heap
page read and write
7408000
heap
page read and write
1B3800424000
trusted library allocation
page read and write
6941000
heap
page read and write
1B38002B0000
trusted library allocation
page read and write
7050000
direct allocation
page execute and read and write
174CF644000
heap
page read and write
174CF650000
heap
page read and write
7636000
heap
page read and write
BA1000
unkown
page execute read
AB2000
unkown
page execute and write copy
3FE000F90000
trusted library allocation
page read and write
C50000
heap
page read and write
1B380033C000
trusted library allocation
page read and write
203800303000
direct allocation
page read and write
1B3800770000
trusted library allocation
page read and write
174CF637000
heap
page read and write
31B87FE000
stack
page read and write
7050000
direct allocation
page execute and read and write
174CF650000
heap
page read and write
3FE000300000
trusted library allocation
page read and write
3FE000C74000
trusted library allocation
page read and write
3FE00054C000
trusted library allocation
page read and write
174CF644000
heap
page read and write
7327000
heap
page read and write
3FE000730000
trusted library allocation
page read and write
848000
heap
page read and write
1B38006EC000
trusted library allocation
page read and write
7178002BC000
trusted library allocation
page read and write
174CF644000
heap
page read and write
3FE00037C000
trusted library allocation
page read and write
7498000
heap
page read and write
3FE000B54000
trusted library allocation
page read and write
1B3800654000
trusted library allocation
page read and write
31927FE000
stack
page read and write
174CF644000
heap
page read and write
174CF650000
heap
page read and write
145D000
stack
page read and write
BAE000
unkown
page read and write
DBF000
stack
page read and write
174CBF70000
heap
page readonly
56A000
stack
page read and write
152A000
heap
page read and write
174CBFD0000
trusted library allocation
page read and write
174CF650000
heap
page read and write
7030000
direct allocation
page execute and read and write
3FE000D4C000
trusted library allocation
page read and write
174CFC28000
heap
page read and write
174CF642000
heap
page read and write
1B3800401000
trusted library allocation
page read and write
7178002C0000
trusted library allocation
page read and write
1B38003EC000
trusted library allocation
page read and write
3FE0004F8000
trusted library allocation
page read and write
1B38006E0000
trusted library allocation
page read and write
174CFB66000
heap
page read and write
1B38006C8000
trusted library allocation
page read and write
1B3800320000
trusted library allocation
page read and write
174D3E34000
heap
page read and write
174CF644000
heap
page read and write
1B3800694000
trusted library allocation
page read and write
3FE000630000
trusted library allocation
page read and write
3FE00017C000
trusted library allocation
page read and write
174CF650000
heap
page read and write
174CC0BB000
heap
page read and write
83E000
unkown
page read and write
6941000
heap
page read and write
3FE0002E0000
trusted library allocation
page read and write
7178002F0000
trusted library allocation
page read and write
3FE000210000
trusted library allocation
page read and write
174CF63F000
heap
page read and write
6941000
heap
page read and write
3FE000F3C000
trusted library allocation
page read and write
3FE000CFC000
trusted library allocation
page read and write
BAA000
unkown
page readonly
1B3800368000
trusted library allocation
page read and write
174CF642000
heap
page read and write
174CF63C000
heap
page read and write
1B380033C000
trusted library allocation
page read and write
6941000
heap
page read and write
174CF644000
heap
page read and write
174CF63A000
heap
page read and write
31B67FD000
stack
page read and write
31A97FD000
stack
page read and write
174CF63D000
heap
page read and write
75BF000
heap
page read and write
174CFBD9000
heap
page read and write
3FE0006BC000
trusted library allocation
page read and write
3FE000001000
trusted library allocation
page read and write
6941000
heap
page read and write
7178002C0000
trusted library allocation
page read and write
1B3800380000
trusted library allocation
page read and write
11000
unkown
page execute and write copy
174CF643000
heap
page read and write
174CF642000
heap
page read and write
31AA7FC000
stack
page read and write
174CF644000
heap
page read and write
5E0000
heap
page read and write
31A77FC000
stack
page read and write
3FE0000E0000
trusted library allocation
page read and write
3FE00030C000
trusted library allocation
page read and write
203800250000
direct allocation
page read and write
3FE0001F0000
trusted library allocation
page read and write
174CF650000
heap
page read and write
174CF634000
heap
page read and write
203800290000
direct allocation
page read and write
174CF644000
heap
page read and write
3FE0002FB000
trusted library allocation
page read and write
7474000
heap
page read and write
1B38002CC000
trusted library allocation
page read and write
3FE0001D4000
trusted library allocation
page read and write
174CF644000
heap
page read and write
1B380039C000
trusted library allocation
page read and write
31A67FA000
stack
page read and write
1B38007D0000
trusted library allocation
page read and write
717800288000
trusted library allocation
page read and write
BA1000
unkown
page execute read
174D6110000
trusted library section
page read and write
3FE000F9C000
trusted library allocation
page read and write
174CF650000
heap
page read and write
3FE000D18000
trusted library allocation
page read and write
3FE0008BC000
trusted library allocation
page read and write
174CFB9B000
heap
page read and write
6941000
heap
page read and write
1B3800614000
trusted library allocation
page read and write
3FE000C88000
trusted library allocation
page read and write
174CF644000
heap
page read and write
3FE000A5C000
trusted library allocation
page read and write
174CF644000
heap
page read and write
3FE000AF8000
trusted library allocation
page read and write
3FE000CA8000
trusted library allocation
page read and write
174CFBDD000
heap
page read and write
174CF644000
heap
page read and write
174D5687000
unclassified section
page read and write
174D38D4000
trusted library allocation
page read and write
7178002BC000
trusted library allocation
page read and write
3FE0001EC000
trusted library allocation
page read and write
B60000
heap
page read and write
31A47FC000
stack
page read and write
3FE000620000
trusted library allocation
page read and write
1B3800404000
trusted library allocation
page read and write
6941000
heap
page read and write
31917FE000
stack
page read and write
174CF650000
heap
page read and write
3FE000DC4000
trusted library allocation
page read and write
174CF642000
heap
page read and write
319B7FE000
stack
page read and write
8AA000
heap
page read and write
3FE00014C000
trusted library allocation
page read and write
174CF63B000
heap
page read and write
174CF650000
heap
page read and write
73ED000
heap
page read and write
1B3800640000
trusted library allocation
page read and write
174CF642000
heap
page read and write
74B9000
heap
page read and write
1B38006D0000
trusted library allocation
page read and write
174CF650000
heap
page read and write
174CF650000
heap
page read and write
73E3000
heap
page read and write
6941000
heap
page read and write
3FE000B00000
trusted library allocation
page read and write
3FE0004CC000
trusted library allocation
page read and write
BB1000
unkown
page readonly
3FE0007D8000
trusted library allocation
page read and write
174CF63F000
heap
page read and write
174CC076000
heap
page read and write
174CF650000
heap
page read and write
3FE000EE0000
trusted library allocation
page read and write
3FE000044000
trusted library allocation
page read and write
3FE000B38000
trusted library allocation
page read and write
3FE000690000
trusted library allocation
page read and write
174CF644000
heap
page read and write
3FE000E28000
trusted library allocation
page read and write
3FE000228000
trusted library allocation
page read and write
31A7FFE000
unkown
page readonly
1B3800210000
trusted library allocation
page read and write
1B3800330000
trusted library allocation
page read and write
7324000
heap
page read and write
1B3800310000
trusted library allocation
page read and write
174CF644000
heap
page read and write
31AF7FE000
stack
page read and write
1B3800230000
trusted library allocation
page read and write
3FE0001D8000
trusted library allocation
page read and write
31BB7FE000
stack
page read and write
174CF650000
heap
page read and write
2038002E4000
direct allocation
page read and write
BA0000
unkown
page readonly
174CF63F000
heap
page read and write
191F000
stack
page read and write
203800234000
direct allocation
page read and write
732A000
heap
page read and write
174CF650000
heap
page read and write
7433000
heap
page read and write
174CFC39000
heap
page read and write
3FE00074C000
trusted library allocation
page read and write
830000
heap
page read and write
3FE000AC4000
trusted library allocation
page read and write
3FE000D58000
trusted library allocation
page read and write
174CF644000
heap
page read and write
174CF644000
heap
page read and write
33A0000
direct allocation
page read and write
174D1DF0000
trusted library allocation
page read and write
174CF650000
heap
page read and write
748D000
heap
page read and write
174CF650000
heap
page read and write
6C0000
heap
page read and write
174CF634000
heap
page read and write
1B380040C000
trusted library allocation
page read and write
174CF63E000
heap
page read and write
3FE000E68000
trusted library allocation
page read and write
6941000
heap
page read and write
174D6352000
trusted library section
page read and write
6941000
heap
page read and write
3FE00009D000
trusted library allocation
page read and write
31B5FFE000
unkown
page readonly
74A5000
heap
page read and write
10E0000
heap
page read and write
174CF644000
heap
page read and write
1B3800754000
trusted library allocation
page read and write
1B3800730000
trusted library allocation
page read and write
174D611E000
trusted library section
page read and write
7327000
heap
page read and write
174CF635000
heap
page read and write
3FE000E7F000
trusted library allocation
page read and write
174CF642000
heap
page read and write
174CE8D0000
unkown
page read and write
174CF610000
heap
page read and write
3FE000D8C000
trusted library allocation
page read and write
732E000
heap
page read and write
6941000
heap
page read and write
3FE000E0C000
trusted library allocation
page read and write
7484000
heap
page read and write
174CF644000
heap
page read and write
33A0000
direct allocation
page read and write
174CF642000
heap
page read and write
174CF650000
heap
page read and write
7050000
direct allocation
page execute and read and write
174CF637000
heap
page read and write
73E7000
heap
page read and write
174CF650000
heap
page read and write
3FE00021C000
trusted library allocation
page read and write
3FE000E01000
trusted library allocation
page read and write
6941000
heap
page read and write
1070000
heap
page read and write
3FE000EA4000
trusted library allocation
page read and write
174CF650000
heap
page read and write
7320000
heap
page read and write
174CF644000
heap
page read and write
174CF650000
heap
page read and write
174CFBD7000
heap
page read and write
1B3800734000
trusted library allocation
page read and write
1B3800744000
trusted library allocation
page read and write
3FE000EDC000
trusted library allocation
page read and write
174CDE80000
heap
page read and write
174CC0CC000
heap
page read and write
7424000
heap
page read and write
1B38006E8000
trusted library allocation
page read and write
152E000
heap
page read and write
7178002F8000
trusted library allocation
page read and write
3FE000704000
trusted library allocation
page read and write
7178002A0000
trusted library allocation
page read and write
3FE000D24000
trusted library allocation
page read and write
7178002BC000
trusted library allocation
page read and write
3FE0009B0000
trusted library allocation
page read and write
7327000
heap
page read and write
174CF642000
heap
page read and write
3FE000BE4000
trusted library allocation
page read and write
7432000
heap
page read and write
174CF63A000
heap
page read and write
174D1E00000
trusted library section
page read and write
174CF642000
heap
page read and write
3FE000D3C000
trusted library allocation
page read and write
174CF642000
heap
page read and write
6941000
heap
page read and write
203800230000
direct allocation
page read and write
174CBFF0000
heap
page read and write
3FE000E63000
trusted library allocation
page read and write
174CF650000
heap
page read and write
3FE000EB0000
trusted library allocation
page read and write
1B380020C000
trusted library allocation
page read and write
AEE000
stack
page read and write
174CF63D000
heap
page read and write
174CF63A000
heap
page read and write
75CF000
heap
page read and write
3FE0003A4000
trusted library allocation
page read and write
2038002D0000
direct allocation
page read and write
6941000
heap
page read and write
174CFB8F000
heap
page read and write
732D000
heap
page read and write
1B38006B0000
trusted library allocation
page read and write
BB1000
unkown
page readonly
717800278000
trusted library allocation
page read and write
31B4FFE000
unkown
page readonly
31B6FFE000
unkown
page readonly
174CBFE0000
trusted library allocation
page read and write
3FE000390000
trusted library allocation
page read and write
318D7EF000
stack
page read and write
203800284000
direct allocation
page read and write
3FE000E64000
trusted library allocation
page read and write
3FE0003B5000
trusted library allocation
page read and write
3FE000DDC000
trusted library allocation
page read and write
7324000
heap
page read and write
174CF644000
heap
page read and write
174CF642000
heap
page read and write
6941000
heap
page read and write
174CF644000
heap
page read and write
174CF644000
heap
page read and write
174CF650000
heap
page read and write
31ADFFE000
unkown
page readonly
174CF634000
heap
page read and write
174CF650000
heap
page read and write
174CF634000
heap
page read and write
174CF650000
heap
page read and write
3FE000670000
trusted library allocation
page read and write
3FE000ED0000
trusted library allocation
page read and write
31A57FC000
stack
page read and write
33A0000
direct allocation
page read and write
174CF644000
heap
page read and write
174CF650000
heap
page read and write
174CFBB4000
heap
page read and write
174CF642000
heap
page read and write
174CF63F000
heap
page read and write
3FE000234000
trusted library allocation
page read and write
174CF650000
heap
page read and write
3FE000D34000
trusted library allocation
page read and write
BA0000
unkown
page readonly
1B3800698000
trusted library allocation
page read and write
732B000
heap
page read and write
73BD000
heap
page read and write
1B38006D4000
trusted library allocation
page read and write
1B38002D4000
trusted library allocation
page read and write
6941000
heap
page read and write
717800220000
trusted library allocation
page read and write
6941000
heap
page read and write
174CF63A000
heap
page read and write
7050000
direct allocation
page execute and read and write
203800217000
direct allocation
page read and write
3FE00090C000
trusted library allocation
page read and write
174CF644000
heap
page read and write
174CF63D000
heap
page read and write
174CDE30000
heap
page read and write
B5E000
stack
page read and write
3FE000401000
trusted library allocation
page read and write
174CF634000
heap
page read and write
174D5670000
heap
page read and write
319C7FE000
stack
page read and write
319AFFE000
unkown
page readonly
174CF650000
heap
page read and write
3FE0002F0000
trusted library allocation
page read and write
20380023C000
direct allocation
page read and write
203800274000
direct allocation
page read and write
3FE00065C000
trusted library allocation
page read and write
174CFBC2000
heap
page read and write
174CBFF8000
heap
page read and write
3198FFE000
unkown
page readonly
6941000
heap
page read and write
1B3800668000
trusted library allocation
page read and write
1B3800714000
trusted library allocation
page read and write
7178002A0000
trusted library allocation
page read and write
7178002A0000
trusted library allocation
page read and write
174CF644000
heap
page read and write
174CC230000
heap
page read and write
6941000
heap
page read and write
174CF650000
heap
page read and write
174CF644000
heap
page read and write
174CF642000
heap
page read and write
3FE000DA4000
trusted library allocation
page read and write
3FE000CC4000
trusted library allocation
page read and write
3FE00071C000
trusted library allocation
page read and write
174CF650000
heap
page read and write
6941000
heap
page read and write
31AE7FE000
stack
page read and write
7178002B0000
trusted library allocation
page read and write
174CF642000
heap
page read and write
3FE0006B0000
trusted library allocation
page read and write
174CF634000
heap
page read and write
3FE000EBC000
trusted library allocation
page read and write
174CF644000
heap
page read and write
174CC0E6000
heap
page read and write
3FE000D34000
trusted library allocation
page read and write
174CF644000
heap
page read and write
174CC1E0000
trusted library section
page readonly
756E000
heap
page read and write
3FE0001AC000
trusted library allocation
page read and write
3194FFE000
unkown
page readonly
76B9000
heap
page read and write
74F6000
heap
page read and write
3FE0002B4000
trusted library allocation
page read and write
74EF000
heap
page read and write
3FE000B44000
trusted library allocation
page read and write
174CF644000
heap
page read and write
174CF63F000
heap
page read and write
3FE000868000
trusted library allocation
page read and write
174CF644000
heap
page read and write
174CF63F000
heap
page read and write
174CF650000
heap
page read and write
1B3800704000
trusted library allocation
page read and write
BA0000
unkown
page readonly
31997FC000
stack
page read and write
125C000
stack
page read and write
3FE000C01000
trusted library allocation
page read and write
3FE000093000
trusted library allocation
page read and write
174CFB81000
heap
page read and write
174CF644000
heap
page read and write
3197FFE000
unkown
page readonly
3FE0001F4000
trusted library allocation
page read and write
3FE0001B4000
trusted library allocation
page read and write
73BB000
heap
page read and write
7321000
heap
page read and write
174CF644000
heap
page read and write
174CF644000
heap
page read and write
7320000
heap
page read and write
3FE000D24000
trusted library allocation
page read and write
3FE0001F8000
trusted library allocation
page read and write
174CC0E9000
heap
page read and write
3FE000E68000
trusted library allocation
page read and write
3FE000C60000
trusted library allocation
page read and write
174CF63C000
heap
page read and write
F50000
heap
page read and write
203800270000
direct allocation
page read and write
174CF63E000
heap
page read and write
3190FFE000
unkown
page readonly
174CF650000
heap
page read and write
3FE000290000
trusted library allocation
page read and write
3FE000F28000
trusted library allocation
page read and write
174CF63E000
heap
page read and write
3FE000F08000
trusted library allocation
page read and write
5D0000
heap
page read and write
1B3800288000
trusted library allocation
page read and write
31B3FFE000
unkown
page readonly
71780020C000
trusted library allocation
page read and write
174CF642000
heap
page read and write
174CF642000
heap
page read and write
174CF650000
heap
page read and write
6941000
heap
page read and write
7050000
direct allocation
page execute and read and write
6C0E1000
unkown
page execute read
6941000
heap
page read and write
174CF63F000
heap
page read and write
3FE0006B0000
trusted library allocation
page read and write
732F000
heap
page read and write
1640000
heap
page read and write
3FE0005C0000
trusted library allocation
page read and write
174CF650000
heap
page read and write
1B38002F0000
trusted library allocation
page read and write
174CC0DF000
heap
page read and write
31A6FFE000
unkown
page readonly
1B3800644000
trusted library allocation
page read and write
3FE0002F0000
trusted library allocation
page read and write
AAE000
unkown
page read and write
174CF634000
heap
page read and write
3FE0008B0000
trusted library allocation
page read and write
7424000
heap
page read and write
174CF63A000
heap
page read and write
BAA000
unkown
page readonly
31A27FC000
stack
page read and write
732D000
heap
page read and write
31AD7FE000
stack
page read and write
3FE000064000
trusted library allocation
page read and write
73E8000
heap
page read and write
3FE000D3C000
trusted library allocation
page read and write
3FE000790000
trusted library allocation
page read and write
761E000
heap
page read and write
33A0000
direct allocation
page read and write
174CF650000
heap
page read and write
20380024C000
direct allocation
page read and write
7D74000
heap
page read and write
3FE000454000
trusted library allocation
page read and write
174CF63F000
heap
page read and write
174CF63F000
heap
page read and write
1B3800418000
trusted library allocation
page read and write
3FE000CBC000
trusted library allocation
page read and write
174CF63A000
heap
page read and write
3FE000E30000
trusted library allocation
page read and write
There are 1269 hidden memdumps, click here to show them.