IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_de576c89c85d95f63177b89249eef622329cc21c_49e505fd_8294a158-742f-49f7-a480-8988f128a410\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7D6B.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Nov 25 09:41:31 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7FCD.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER826E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 --field-trial-handle=2276,i,7761635936261596126,5114517660047510357,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6668 -s 1756

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://lens.google.com/v3/uploadSidePanelCompanionDesktopM116PlusEnabled_UnPinned_NewTab_20230918=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
https://www.youtube.com/:
unknown
https://mail.google.com/mail/
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=
unknown
https://mail.google.com/mail/:
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://www.google.com/tools/feedback/chrome/__submit
unknown
https://www.youtube.com/?feature=ytcap
unknown
https://curl.se/docs/hsts.html
unknown
https://www.google.com
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://www.google.com/speech-api/v2/synthesize?
unknown
https://mail.google.com/mail/J
unknown
https://www.youtube.com/Q
unknown
http://unisolated.invalid/
unknown
https://drive.google.com/
unknown
https://chrome.google.com/webstore206E5
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
https://ch.search.yahoo.com/favicon.icofrom_play_api
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=b(T
unknown
https://www.youtube.com/s/notifications/manifest/cr_install.html
unknown
https://ch.search.yahoo.com/search
unknown
https://www.youtube.com/?feature=ytca
unknown
https://docs.googl0
unknown
https://www.youtube.com/J
unknown
https://docs.google.com/forms/u/0/create?usp=chrome_actions
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/?utm_source=ga-chrome-actions&utm_medium=manageGA
unknown
https://docs.google.com/presentation/
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://www.google.com/chrome/tips/gs
unknown
https://drive-daily-2.corp.google.com/
unknown
https://drive-daily-4.corp.google.com/
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs(T
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://docs.google.com/forms/u/0/create?usp=chrome_actionsy
unknown
https://curl.se/docs/alt-svc.html
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://www.youtube.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://fvtekk5pn.top/v1/upload.php
34.116.198.130
https://docs.google.com/spreadsheets/
unknown
https://google-ohttp-relay-join.fastly-edge.com/2J
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/collection-images?rt=b
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
https://drive-daily-4.c
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://www.google.com/CharPk3
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
34.116.198.130
https://www.google.com/
unknown
https://clients4.google.com/chrome-sync
unknown
https://docs.google.com/document/
unknown
http://google.com/
unknown
http://html4/loose.dtd
unknown
https://drive.google.com/~
unknown
https://mail.google.com/mail/installwebapp?usp=chrome_default
unknown
https://www.ecosia.org/search?q=
unknown
https://docs.google.com/presentation/J
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://docs.google.com/document/installwebapp?usp=chrome_default
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://drive-daily-3.corp.googl
unknown
https://docs.google.com/presentation/:
unknown
https://docs.google.com/presentation/installwebapp?usp=chrome_default
unknown
https://docs.google.com/spreadsheets/J
unknown
https://docs.google.com/presentation/?usp=installed_webapplt
unknown
https://myactivity.google.com/
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/collections?rt=b
unknown
https://docs.google.com/spreadsheets/?usp=installed_webapp
unknown
https://drive-staging.corp.google.com/
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTE
unknown
https://docs.google.com/spreadsheets/:
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fvtekk5pn.top
34.116.198.130
www.google.com
142.250.181.100
fvtekk5pn.top
34.116.198.130

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
34.116.198.130
home.fvtekk5pn.top
United States
127.0.0.1
unknown
unknown
142.250.181.100
www.google.com
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
malicious
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
malicious
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
malicious
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
malicious
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
malicious
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
malicious
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
malicious
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
malicious
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
malicious
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
malicious
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
malicious
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
malicious
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
malicious
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
malicious
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
malicious
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
malicious
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
malicious
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
malicious
\REGISTRY\A\{1c9f0e34-9ceb-0735-48bd-a28edf0f41b3}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
malicious
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7ACF000
heap
page read and write
5DEC002F0000
trusted library allocation
page read and write
25DD24CA000
heap
page read and write
285400868000
trusted library allocation
page read and write
285400523000
trusted library allocation
page read and write
7B97000
heap
page read and write
5FC008A8000
trusted library allocation
page read and write
7B11000
heap
page read and write
AAE1BFD000
stack
page read and write
7962000
heap
page read and write
2854000FC000
trusted library allocation
page read and write
28540077E000
trusted library allocation
page read and write
5FC00788000
trusted library allocation
page read and write
5DEC002B0000
trusted library allocation
page read and write
1250000
heap
page read and write
108C000
stack
page read and write
285400B9C000
trusted library allocation
page read and write
6ED1000
heap
page read and write
25DD254F000
heap
page read and write
285400E20000
trusted library allocation
page read and write
25DD2469000
heap
page read and write
28540074C000
trusted library allocation
page read and write
285400988000
trusted library allocation
page read and write
5FC00960000
trusted library allocation
page read and write
5FC008C4000
trusted library allocation
page read and write
5FC008F0000
trusted library allocation
page read and write
6ED1000
heap
page read and write
5FC007E4000
trusted library allocation
page read and write
796A000
heap
page read and write
2854009C0000
trusted library allocation
page read and write
AACE3FE000
unkown
page readonly
154800234000
direct allocation
page read and write
285400D58000
trusted library allocation
page read and write
AACEBFE000
stack
page read and write
25DD62B0000
heap
page read and write
1714000
heap
page read and write
285400CE0000
trusted library allocation
page read and write
5DEC00260000
trusted library allocation
page read and write
AAD9BFE000
stack
page read and write
285400210000
trusted library allocation
page read and write
796F000
heap
page read and write
AAD2BFB000
stack
page read and write
285400EF0000
trusted library allocation
page read and write
285400DB4000
trusted library allocation
page read and write
25DCED50000
heap
page read and write
7965000
heap
page read and write
5DEC002B0000
trusted library allocation
page read and write
5FC00728000
trusted library allocation
page read and write
7A0C000
heap
page read and write
25DCED55000
heap
page read and write
AAD63FE000
unkown
page readonly
1714000
heap
page read and write
25DCEB4D000
heap
page read and write
25DD8460000
trusted library section
page read and write
25DD62E8000
heap
page read and write
5FC002E4000
trusted library allocation
page read and write
AAEBBFD000
stack
page read and write
AAECBFE000
stack
page read and write
27DF000
unkown
page read and write
25DCEB62000
heap
page read and write
7AA5000
heap
page read and write
6ED1000
heap
page read and write
7590000
direct allocation
page execute and read and write
AAF7BFE000
stack
page read and write
285400C64000
trusted library allocation
page read and write
8BA000
heap
page read and write
7960000
heap
page read and write
5FC008C8000
trusted library allocation
page read and write
7967000
heap
page read and write
5FC002FC000
trusted library allocation
page read and write
1C80000
direct allocation
page read and write
25DCE9D0000
heap
page read and write
B41000
unkown
page readonly
25DD24B1000
heap
page read and write
25DD2471000
heap
page read and write
9F0000
unkown
page readonly
285400D60000
trusted library allocation
page read and write
5FC007D0000
trusted library allocation
page read and write
A60000
heap
page read and write
5FC008E4000
trusted library allocation
page read and write
3B10000
direct allocation
page execute and read and write
25DD2551000
heap
page read and write
AACF3FE000
unkown
page readonly
25DCEA9E000
heap
page read and write
285400918000
trusted library allocation
page read and write
7AB2000
heap
page read and write
AAF53FE000
unkown
page readonly
7590000
direct allocation
page execute and read and write
285400374000
trusted library allocation
page read and write
285400320000
trusted library allocation
page read and write
7590000
direct allocation
page execute and read and write
28540070F000
trusted library allocation
page read and write
25DD2553000
heap
page read and write
25DD2460000
heap
page read and write
285400801000
trusted library allocation
page read and write
1C80000
direct allocation
page read and write
B3A000
unkown
page readonly
7A23000
heap
page read and write
6ED1000
heap
page read and write
285400968000
trusted library allocation
page read and write
285400EEC000
trusted library allocation
page read and write
285400B14000
trusted library allocation
page read and write
285400BA4000
trusted library allocation
page read and write
25DD2526000
heap
page read and write
25DD66D7000
unclassified section
page read and write
285400A0C000
trusted library allocation
page read and write
285400360000
trusted library allocation
page read and write
AADBBFE000
stack
page read and write
2854000E0000
trusted library allocation
page read and write
285400AA0000
trusted library allocation
page read and write
5FC0080C000
trusted library allocation
page read and write
285400180000
trusted library allocation
page read and write
AAE0BFE000
stack
page read and write
5FC002F4000
trusted library allocation
page read and write
285400218000
trusted library allocation
page read and write
25DD1F40000
heap
page read and write
5DEC002C0000
trusted library allocation
page read and write
154800215000
direct allocation
page read and write
5FC00864000
trusted library allocation
page read and write
285400494000
trusted library allocation
page read and write
25DD249F000
heap
page read and write
AAED3FE000
unkown
page readonly
28540060C000
trusted library allocation
page read and write
1714000
heap
page read and write
5FC00430000
trusted library allocation
page read and write
5FC002D4000
trusted library allocation
page read and write
25DD8950000
trusted library section
page read and write
2854006BC000
trusted library allocation
page read and write
285400B64000
trusted library allocation
page read and write
10E0000
heap
page read and write
6ED1000
heap
page read and write
AAE13FE000
unkown
page readonly
2854002F8000
trusted library allocation
page read and write
285400AF8000
trusted library allocation
page read and write
AAF2BFE000
stack
page read and write
25DCE990000
heap
page readonly
285400D94000
trusted library allocation
page read and write
285400C8C000
trusted library allocation
page read and write
2854000AC000
trusted library allocation
page read and write
28540090C000
trusted library allocation
page read and write
1C80000
direct allocation
page read and write
5FC0071C000
trusted library allocation
page read and write
5DEC00201000
trusted library allocation
page read and write
1C80000
direct allocation
page read and write
2854004F8000
trusted library allocation
page read and write
AAD4BFB000
stack
page read and write
2854004E4000
trusted library allocation
page read and write
1C80000
direct allocation
page read and write
25DCEB2E000
heap
page read and write
285400B24000
trusted library allocation
page read and write
B30000
unkown
page readonly
AADDBFE000
stack
page read and write
285400994000
trusted library allocation
page read and write
AAEABFE000
stack
page read and write
25DD62F4000
heap
page read and write
25DD2461000
heap
page read and write
285400624000
trusted library allocation
page read and write
6ED1000
heap
page read and write
25DD1F7C000
heap
page read and write
25DD1F75000
heap
page read and write
25DD24FA000
heap
page read and write
AAE93FE000
unkown
page readonly
285400703000
trusted library allocation
page read and write
5FC0060C000
trusted library allocation
page read and write
5FC006AC000
trusted library allocation
page read and write
7961000
heap
page read and write
B31000
unkown
page execute read
2854005B4000
trusted library allocation
page read and write
5DEC002B0000
trusted library allocation
page read and write
25DD8B5E000
trusted library section
page read and write
5FC0040C000
trusted library allocation
page read and write
7961000
heap
page read and write
AAEEBFD000
stack
page read and write
1714000
heap
page read and write
1548002DC000
direct allocation
page read and write
285400401000
trusted library allocation
page read and write
25DD254B000
heap
page read and write
2854008BC000
trusted library allocation
page read and write
6ED1000
heap
page read and write
6ED1000
heap
page read and write
1CA0000
direct allocation
page read and write
3B20000
direct allocation
page execute and read and write
6ED1000
heap
page read and write
870000
heap
page read and write
5FC00424000
trusted library allocation
page read and write
B3A000
unkown
page readonly
B41000
unkown
page readonly
1C80000
direct allocation
page read and write
7CA3000
heap
page read and write
5DEC002A0000
trusted library allocation
page read and write
7960000
heap
page read and write
25DD62BB000
heap
page read and write
176F000
stack
page read and write
285400C9C000
trusted library allocation
page read and write
285400768000
trusted library allocation
page read and write
15480024C000
direct allocation
page read and write
AAEB3FE000
unkown
page readonly
7ABD000
heap
page read and write
2854002D2000
trusted library allocation
page read and write
5DEC00220000
trusted library allocation
page read and write
7B04000
heap
page read and write
BA7000
heap
page read and write
25DD1F7D000
heap
page read and write
1C80000
direct allocation
page read and write
285400340000
trusted library allocation
page read and write
285400082000
trusted library allocation
page read and write
796E000
heap
page read and write
5FC00918000
trusted library allocation
page read and write
25DD8B50000
trusted library section
page read and write
2854004BC000
trusted library allocation
page read and write
285400D48000
trusted library allocation
page read and write
AAEE3FE000
unkown
page readonly
285400C3C000
trusted library allocation
page read and write
2780000
heap
page read and write
25DD1F74000
heap
page read and write
25DD895E000
trusted library section
page read and write
2854004B4000
trusted library allocation
page read and write
5FC00828000
trusted library allocation
page read and write
1C80000
direct allocation
page read and write
285400201000
trusted library allocation
page read and write
28540020C000
trusted library allocation
page read and write
6ED1000
heap
page read and write
25DD2518000
heap
page read and write
B30000
unkown
page readonly
7ABF000
heap
page read and write
5FC00601000
trusted library allocation
page read and write
1548002A8000
direct allocation
page read and write
7590000
direct allocation
page execute and read and write
7961000
heap
page read and write
25DD1F6F000
heap
page read and write
5FC00860000
trusted library allocation
page read and write
285400E50000
trusted library allocation
page read and write
25DD1F6A000
heap
page read and write
285400DBC000
trusted library allocation
page read and write
154800270000
direct allocation
page read and write
156E000
stack
page read and write
B3E000
unkown
page read and write
83C000
stack
page read and write
2854002AC000
trusted library allocation
page read and write
1714000
heap
page read and write
25DD24CA000
heap
page read and write
285400144000
trusted library allocation
page read and write
B3A000
unkown
page readonly
6C308000
unkown
page readonly
6ED1000
heap
page read and write
25DCEA30000
trusted library section
page readonly
285400314000
trusted library allocation
page read and write
B31000
unkown
page execute read
796E000
heap
page read and write
5FC006AC000
trusted library allocation
page read and write
AAD33FE000
unkown
page readonly
285400050000
trusted library allocation
page read and write
1714000
heap
page read and write
B30000
unkown
page readonly
285400A6C000
trusted library allocation
page read and write
285400C34000
trusted library allocation
page read and write
25DCEA00000
trusted library allocation
page read and write
AAE3BFC000
stack
page read and write
AAD0BFE000
stack
page read and write
154800217000
direct allocation
page read and write
5FC008D8000
trusted library allocation
page read and write
5FC00250000
trusted library allocation
page read and write
25DD7FB3000
heap
page read and write
AAEDBFE000
stack
page read and write
5FC00248000
trusted library allocation
page read and write
285400EE0000
trusted library allocation
page read and write
AAF93FE000
unkown
page readonly
25DD255B000
heap
page read and write
25DD2559000
heap
page read and write
AAFABFE000
stack
page read and write
28FB000
heap
page read and write
AAD5BFC000
stack
page read and write
5DEC002BC000
trusted library allocation
page read and write
5FC007BC000
trusted library allocation
page read and write
25DCE9F0000
trusted library allocation
page read and write
3B30000
direct allocation
page execute and read and write
285400BF0000
trusted library allocation
page read and write
7B2B000
heap
page read and write
1548002D0000
direct allocation
page read and write
AF0000
heap
page read and write
285400340000
trusted library allocation
page read and write
285400C9C000
trusted library allocation
page read and write
285400C0C000
trusted library allocation
page read and write
5FC00868000
trusted library allocation
page read and write
5FC00974000
trusted library allocation
page read and write
5DEC0020C000
trusted library allocation
page read and write
285400A50000
trusted library allocation
page read and write
285400544000
trusted library allocation
page read and write
7960000
heap
page read and write
154800220000
direct allocation
page read and write
5FC00220000
trusted library allocation
page read and write
285400C60000
trusted library allocation
page read and write
2854004C0000
trusted library allocation
page read and write
2854009E0000
trusted library allocation
page read and write
6ED1000
heap
page read and write
5FC002F0000
trusted library allocation
page read and write
AAF5BFA000
stack
page read and write
285400CFC000
trusted library allocation
page read and write
2854002C0000
trusted library allocation
page read and write
7B5B000
heap
page read and write
5DEC002E4000
trusted library allocation
page read and write
5FC00238000
trusted library allocation
page read and write
2854005A0000
trusted library allocation
page read and write
AAE8BFC000
stack
page read and write
1714000
heap
page read and write
25DD1F6A000
heap
page read and write
2854002AC000
trusted library allocation
page read and write
AACBBFE000
unkown
page read and write
B41000
unkown
page readonly
154800290000
direct allocation
page read and write
285400DD4000
trusted library allocation
page read and write
2854002AC000
trusted library allocation
page read and write
1714000
heap
page read and write
E8C000
stack
page read and write
AAF63FE000
unkown
page readonly
AAD13FE000
unkown
page readonly
5DEC00235000
trusted library allocation
page read and write
5FC00840000
trusted library allocation
page read and write
25DD8040000
heap
page read and write
25DD2469000
heap
page read and write
5FC0078C000
trusted library allocation
page read and write
7969000
heap
page read and write
7C5A000
heap
page read and write
8BE000
heap
page read and write
7B23000
heap
page read and write
B3A000
unkown
page readonly
5DEC002BC000
trusted library allocation
page read and write
2854006D0000
trusted library allocation
page read and write
6ED1000
heap
page read and write
285400E1C000
trusted library allocation
page read and write
5FC0082C000
trusted library allocation
page read and write
5FC0039C000
trusted library allocation
page read and write
1148000
heap
page read and write
5FC006BC000
trusted library allocation
page read and write
28540069C000
trusted library allocation
page read and write
7961000
heap
page read and write
AAE9BFE000
stack
page read and write
28540024C000
trusted library allocation
page read and write
7590000
direct allocation
page execute and read and write
28540070C000
trusted library allocation
page read and write
7861000
heap
page read and write
285400700000
trusted library allocation
page read and write
7AED000
heap
page read and write
6ED1000
heap
page read and write
7A2D000
heap
page read and write
B3E000
unkown
page read and write
5DEC00278000
trusted library allocation
page read and write
7B8D000
heap
page read and write
7350000
direct allocation
page read and write
285400A44000
trusted library allocation
page read and write
1714000
heap
page read and write
AAF8BFE000
stack
page read and write
B30000
unkown
page readonly
1150000
heap
page read and write
7C79000
heap
page read and write
2854004B7000
trusted library allocation
page read and write
B3E000
unkown
page write copy
285400214000
trusted library allocation
page read and write
285400220000
trusted library allocation
page read and write
285400EA4000
trusted library allocation
page read and write
5FC002B0000
trusted library allocation
page read and write
25DD26F0000
trusted library section
page read and write
5FC00904000
trusted library allocation
page read and write
7969000
heap
page read and write
AAF23FE000
unkown
page readonly
AAEFBFD000
stack
page read and write
83C000
stack
page read and write
2854001B0000
trusted library allocation
page read and write
285400AB8000
trusted library allocation
page read and write
285400E10000
trusted library allocation
page read and write
5FC007AC000
trusted library allocation
page read and write
285F000
stack
page read and write
285400C7C000
trusted library allocation
page read and write
7A59000
heap
page read and write
25DD0713000
heap
page read and write
1C80000
direct allocation
page read and write
1548002E4000
direct allocation
page read and write
2854002B0000
trusted library allocation
page read and write
5DEC002BC000
trusted library allocation
page read and write
285400E60000
trusted library allocation
page read and write
285400D04000
trusted library allocation
page read and write
154800260000
direct allocation
page read and write
285400C01000
trusted library allocation
page read and write
285400308000
trusted library allocation
page read and write
7590000
direct allocation
page execute and read and write
7590000
direct allocation
page execute and read and write
5FC00818000
trusted library allocation
page read and write
2854002BC000
trusted library allocation
page read and write
285400B88000
trusted library allocation
page read and write
285400384000
trusted library allocation
page read and write
7B4F000
heap
page read and write
5FC00288000
trusted library allocation
page read and write
6ED1000
heap
page read and write
1548002EC000
direct allocation
page read and write
285400248000
trusted library allocation
page read and write
5DEC002F8000
trusted library allocation
page read and write
2854008A4000
trusted library allocation
page read and write
285400E0C000
trusted library allocation
page read and write
25DD24A6000
heap
page read and write
25DD8877000
unclassified section
page read and write
5FC0095C000
trusted library allocation
page read and write
AADC3FE000
unkown
page readonly
AAE43FE000
unkown
page readonly
7962000
heap
page read and write
154800280000
direct allocation
page read and write
6C1E0000
unkown
page readonly
285400A01000
trusted library allocation
page read and write
1C80000
direct allocation
page read and write
25DD1F77000
heap
page read and write
B31000
unkown
page execute read
25DD1F82000
heap
page read and write
5FC00850000
trusted library allocation
page read and write
28540040C000
trusted library allocation
page read and write
285400D30000
trusted library allocation
page read and write
AAD6BFD000
stack
page read and write
285400B64000
trusted library allocation
page read and write
28540022C000
trusted library allocation
page read and write
25DCEB2A000
heap
page read and write
AACC3FE000
unkown
page readonly
5FC008F4000
trusted library allocation
page read and write
5FC00830000
trusted library allocation
page read and write
AAE4BFC000
stack
page read and write
2854009EC000
trusted library allocation
page read and write
7A91000
heap
page read and write
285400D6C000
trusted library allocation
page read and write
25DD2557000
heap
page read and write
7A02000
heap
page read and write
1714000
heap
page read and write
28540075D000
trusted library allocation
page read and write
285400AE8000
trusted library allocation
page read and write
7CDA000
heap
page read and write
6ED1000
heap
page read and write
285400EBC000
trusted library allocation
page read and write
6ED1000
heap
page read and write
5FC008B8000
trusted library allocation
page read and write
25DD24CF000
heap
page read and write
285400CC4000
trusted library allocation
page read and write
285400BBC000
trusted library allocation
page read and write
1C80000
direct allocation
page read and write
6ED1000
heap
page read and write
6ED1000
heap
page read and write
2854005C8000
trusted library allocation
page read and write
154800201000
direct allocation
page read and write
2854002B0000
trusted library allocation
page read and write
6ED1000
heap
page read and write
6ED1000
heap
page read and write
5DEC002BC000
trusted library allocation
page read and write
796E000
heap
page read and write
AAD7BFB000
stack
page read and write
5FC00884000
trusted library allocation
page read and write
AAEC3FE000
unkown
page readonly
5DEC002C0000
trusted library allocation
page read and write
AAD1BFB000
stack
page read and write
285400AD0000
trusted library allocation
page read and write
7BF4000
heap
page read and write
5DEC002C0000
trusted library allocation
page read and write
7969000
heap
page read and write
79F8000
heap
page read and write
7C39000
heap
page read and write
5FC00898000
trusted library allocation
page read and write
7963000
heap
page read and write
285400854000
trusted library allocation
page read and write
285400340000
trusted library allocation
page read and write
6ED1000
heap
page read and write
7A59000
direct allocation
page read and write
285400CA4000
trusted library allocation
page read and write
2854001F0000
trusted library allocation
page read and write
285400320000
trusted library allocation
page read and write
6ED1000
heap
page read and write
7962000
heap
page read and write
5FC00700000
trusted library allocation
page read and write
7960000
heap
page read and write
AA0000
heap
page read and write
7A8B000
heap
page read and write
285400898000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
28540071C000
trusted library allocation
page read and write
25DD251C000
heap
page read and write
285400D14000
trusted library allocation
page read and write
6ED1000
heap
page read and write
285400784000
trusted library allocation
page read and write
2854001E0000
trusted library allocation
page read and write
17C0000
heap
page read and write
2854007B4000
trusted library allocation
page read and write
6ED1000
heap
page read and write
7590000
direct allocation
page execute and read and write
5DEC00274000
trusted library allocation
page read and write
7ADD000
heap
page read and write
B3E000
unkown
page write copy
B41000
unkown
page readonly
AAD03FE000
unkown
page readonly
7B26000
heap
page read and write
285400888000
trusted library allocation
page read and write
6C2BD000
unkown
page read and write
B3A000
unkown
page readonly
25DD1F81000
heap
page read and write
1C80000
direct allocation
page read and write
7AB3000
heap
page read and write
285400938000
trusted library allocation
page read and write
860000
heap
page read and write
25DD1F6F000
heap
page read and write
28540010C000
trusted library allocation
page read and write
2854001D0000
trusted library allocation
page read and write
5FC006AC000
trusted library allocation
page read and write
6ED1000
heap
page read and write
5DEC002A0000
trusted library allocation
page read and write
7963000
heap
page read and write
5FC0027C000
trusted library allocation
page read and write
AAD23FE000
unkown
page readonly
AAF1BFE000
stack
page read and write
5DEC002C0000
trusted library allocation
page read and write
285400900000
trusted library allocation
page read and write
285400298000
trusted library allocation
page read and write
25DD7FB0000
heap
page read and write
AAE7BFE000
stack
page read and write
285400E98000
trusted library allocation
page read and write
25DD1F74000
heap
page read and write
2854001C4000
trusted library allocation
page read and write
6ED1000
heap
page read and write
285400EF4000
trusted library allocation
page read and write
2854008D4000
trusted library allocation
page read and write
285400E01000
trusted library allocation
page read and write
7A3C000
heap
page read and write
285400170000
trusted library allocation
page read and write
5FC0084C000
trusted library allocation
page read and write
5FC002ED000
trusted library allocation
page read and write
285400714000
trusted library allocation
page read and write
7AE5000
heap
page read and write
63C000
stack
page read and write
5FC00848000
trusted library allocation
page read and write
285400384000
trusted library allocation
page read and write
28540014C000
trusted library allocation
page read and write
6ED1000
heap
page read and write
2854002AC000
trusted library allocation
page read and write
285400CD0000
trusted library allocation
page read and write
AADFBFE000
stack
page read and write
5FC006C8000
trusted library allocation
page read and write
285400CD0000
trusted library allocation
page read and write
25DD62E1000
heap
page read and write
5DEC00248000
trusted library allocation
page read and write
5FC0081C000
trusted library allocation
page read and write
5FC00230000
trusted library allocation
page read and write
B31000
unkown
page execute read
AAE73FE000
unkown
page readonly
AACABF5000
stack
page read and write
5FC00880000
trusted library allocation
page read and write
28540064C000
trusted library allocation
page read and write
154800303000
direct allocation
page read and write
5DEC00230000
trusted library allocation
page read and write
5FC0020C000
trusted library allocation
page read and write
285400A90000
trusted library allocation
page read and write
1140000
heap
page read and write
154800294000
direct allocation
page read and write
5FC00874000
trusted library allocation
page read and write
2854004C8000
trusted library allocation
page read and write
1C80000
direct allocation
page read and write
25DD2509000
heap
page read and write
2660000
heap
page read and write
25DD24DE000
heap
page read and write
25DD8660000
trusted library section
page read and write
25DD62C2000
heap
page read and write
6ED1000
heap
page read and write
5FC00948000
trusted library allocation
page read and write
5FC00920000
trusted library allocation
page read and write
AADB3FE000
unkown
page readonly
5FC006E8000
trusted library allocation
page read and write
7969000
heap
page read and write
25DD2518000
heap
page read and write
285400368000
trusted library allocation
page read and write
5FC007C0000
trusted library allocation
page read and write
B41000
unkown
page readonly
AAF6BFC000
stack
page read and write
25DD2560000
trusted library section
page read and write
25DCED10000
heap
page read and write
285400E34000
trusted library allocation
page read and write
25DD6331000
heap
page read and write
5FC0079C000
trusted library allocation
page read and write
7A28000
heap
page read and write
7A72000
heap
page read and write
5FC006E8000
trusted library allocation
page read and write
7BCF000
heap
page read and write
2854006F0000
trusted library allocation
page read and write
285400718000
trusted library allocation
page read and write
2854000A0000
trusted library allocation
page read and write
6C2BF000
unkown
page readonly
6ED1000
heap
page read and write
AAF9BFE000
stack
page read and write
5FC00790000
trusted library allocation
page read and write
5DEC002D8000
trusted library allocation
page read and write
6C309000
unkown
page read and write
285400CF0000
trusted library allocation
page read and write
285400303000
trusted library allocation
page read and write
5DEC002F4000
trusted library allocation
page read and write
2854002CC000
trusted library allocation
page read and write
5FC00890000
trusted library allocation
page read and write
7A99000
heap
page read and write
6ED1000
heap
page read and write
5FC0085C000
trusted library allocation
page read and write
5FC00894000
trusted library allocation
page read and write
6ED1000
heap
page read and write
B31000
unkown
page execute read
1714000
heap
page read and write
154800230000
direct allocation
page read and write
285400E64000
trusted library allocation
page read and write
5DEC002BC000
trusted library allocation
page read and write
7590000
direct allocation
page execute and read and write
28540023C000
trusted library allocation
page read and write
154800274000
direct allocation
page read and write
285400CB4000
trusted library allocation
page read and write
8B0000
heap
page read and write
285400041000
trusted library allocation
page read and write
AAF33FE000
unkown
page readonly
25DD7FC7000
unclassified section
page read and write
5FC00844000
trusted library allocation
page read and write
28540021C000
trusted library allocation
page read and write
7590000
direct allocation
page execute and read and write
7B16000
heap
page read and write
2854003B8000
trusted library allocation
page read and write
AACCBFF000
stack
page read and write
5DEC002BC000
trusted library allocation
page read and write
AAFA3FE000
unkown
page readonly
285400308000
trusted library allocation
page read and write
25DD2543000
heap
page read and write
AACDBFE000
stack
page read and write
880000
heap
page read and write
79FB000
heap
page read and write
25DD24DC000
heap
page read and write
5FC007E0000
trusted library allocation
page read and write
5DEC002C0000
trusted library allocation
page read and write
AAD73FE000
unkown
page readonly
5FC008E8000
trusted library allocation
page read and write
5FC007A0000
trusted library allocation
page read and write
5FC00778000
trusted library allocation
page read and write
285400BF0000
trusted library allocation
page read and write
A3C000
stack
page read and write
285400DF0000
trusted library allocation
page read and write
25DD252A000
heap
page read and write
28540068C000
trusted library allocation
page read and write
AAF13FE000
unkown
page readonly
285400CD0000
trusted library allocation
page read and write
2854006E0000
trusted library allocation
page read and write
B3E000
unkown
page read and write
112E000
stack
page read and write
25DCEB4A000
heap
page read and write
2790000
heap
page read and write
285400001000
trusted library allocation
page read and write
6ED1000
heap
page read and write
6ED1000
heap
page read and write
AAE03FE000
unkown
page readonly
7590000
direct allocation
page execute and read and write
285400C40000
trusted library allocation
page read and write
7590000
direct allocation
page execute and read and write
7590000
direct allocation
page execute and read and write
7A5C000
heap
page read and write
B41000
unkown
page readonly
285400190000
trusted library allocation
page read and write
285400394000
trusted library allocation
page read and write
2854002D8000
trusted library allocation
page read and write
25DD1F7F000
heap
page read and write
5FC006F4000
trusted library allocation
page read and write
796C000
heap
page read and write
AAEF3FE000
unkown
page readonly
25DD24D7000
heap
page read and write
28540071C000
trusted library allocation
page read and write
5FC007D4000
trusted library allocation
page read and write
2854001A0000
trusted library allocation
page read and write
6ED1000
heap
page read and write
7965000
heap
page read and write
2854004A0000
trusted library allocation
page read and write
285400DA4000
trusted library allocation
page read and write
5FC00878000
trusted library allocation
page read and write
23BD000
stack
page read and write
285400EF8000
trusted library allocation
page read and write
148D000
unkown
page execute and write copy
5FC006D4000
trusted library allocation
page read and write
AADE3FE000
unkown
page readonly
23FA000
stack
page read and write
285400EB0000
trusted library allocation
page read and write
7A93000
heap
page read and write
25DD1F50000
heap
page read and write
79FF000
heap
page read and write
7A2D000
heap
page read and write
7590000
direct allocation
page execute and read and write
5DEC002C8000
trusted library allocation
page read and write
AAF0BFE000
stack
page read and write
AADA3FE000
unkown
page readonly
2854004BC000
trusted library allocation
page read and write
285400238000
trusted library allocation
page read and write
6ED1000
heap
page read and write
25DD62C5000
heap
page read and write
28540052C000
trusted library allocation
page read and write
AAFB3FE000
unkown
page readonly
285400E8C000
trusted library allocation
page read and write
5DEC002A0000
trusted library allocation
page read and write
6ED1000
heap
page read and write
5FC0070C000
trusted library allocation
page read and write
285400828000
trusted library allocation
page read and write
6ED1000
heap
page read and write
25DD250C000
heap
page read and write
6ED1000
heap
page read and write
5FC00964000
trusted library allocation
page read and write
2854007A4000
trusted library allocation
page read and write
2854001B8000
trusted library allocation
page read and write
2854008CC000
trusted library allocation
page read and write
285400030000
trusted library allocation
page read and write
5DEC00288000
trusted library allocation
page read and write
1548002AC000
direct allocation
page read and write
25DCE9A0000
heap
page read and write
285400BAC000
trusted library allocation
page read and write
7590000
direct allocation
page execute and read and write
285400E8C000
trusted library allocation
page read and write
285400334000
trusted library allocation
page read and write
285400D0C000
trusted library allocation
page read and write
5DEC00250000
trusted library allocation
page read and write
7968000
heap
page read and write
28540051C000
trusted library allocation
page read and write
AAD8BFE000
stack
page read and write
285400250000
trusted library allocation
page read and write
6ED1000
heap
page read and write
285400234000
trusted library allocation
page read and write
7967000
heap
page read and write
2854002B4000
trusted library allocation
page read and write
7B5D000
heap
page read and write
285400314000
trusted library allocation
page read and write
1D10000
heap
page read and write
2854007E0000
trusted library allocation
page read and write
285400DE4000
trusted library allocation
page read and write
7A77000
heap
page read and write
285400601000
trusted library allocation
page read and write
28540003C000
trusted library allocation
page read and write
285400DC8000
trusted library allocation
page read and write
154800250000
direct allocation
page read and write
2854001F4000
trusted library allocation
page read and write
285400D78000
trusted library allocation
page read and write
7A48000
heap
page read and write
285400454000
trusted library allocation
page read and write
AAD83FE000
unkown
page readonly
285400590000
trusted library allocation
page read and write
154800210000
direct allocation
page read and write
25DCEB50000
heap
page read and write
796A000
heap
page read and write
285400334000
trusted library allocation
page read and write
B31000
unkown
page execute read
6ED1000
heap
page read and write
AAE5BFC000
stack
page read and write
7A5B000
direct allocation
page read and write
2854009D8000
trusted library allocation
page read and write
285400712000
trusted library allocation
page read and write
AAF4BFE000
stack
page read and write
1714000
heap
page read and write
1714000
heap
page read and write
285400E44000
trusted library allocation
page read and write
AAD53FE000
unkown
page readonly
285400AB4000
trusted library allocation
page read and write
28540073C000
trusted library allocation
page read and write
5FC0091C000
trusted library allocation
page read and write
5FC00210000
trusted library allocation
page read and write
AAE2BFA000
stack
page read and write
25DD8867000
unclassified section
page read and write
AADEBFE000
stack
page read and write
285400158000
trusted library allocation
page read and write
285400AC4000
trusted library allocation
page read and write
285400658000
trusted library allocation
page read and write
285400224000
trusted library allocation
page read and write
285400240000
trusted library allocation
page read and write
285400C54000
trusted library allocation
page read and write
7960000
heap
page read and write
7960000
heap
page read and write
AAF73FE000
unkown
page readonly
25DCEB6D000
heap
page read and write
5FC006C8000
trusted library allocation
page read and write
AADCBFA000
stack
page read and write
5FC006F0000
trusted library allocation
page read and write
5FC00408000
trusted library allocation
page read and write
2854000C4000
trusted library allocation
page read and write
25DD250D000
heap
page read and write
2854001EC000
trusted library allocation
page read and write
9F1000
unkown
page execute and write copy
7966000
heap
page read and write
285400C8C000
trusted library allocation
page read and write
285400454000
trusted library allocation
page read and write
2854002CC000
trusted library allocation
page read and write
285400638000
trusted library allocation
page read and write
6ED1000
heap
page read and write
2854000D7000
trusted library allocation
page read and write
28540008C000
trusted library allocation
page read and write
AAE83FE000
unkown
page readonly
285400E10000
trusted library allocation
page read and write
AAE63FE000
unkown
page readonly
285400354000
trusted library allocation
page read and write
AAE23FE000
unkown
page readonly
6ED1000
heap
page read and write
285400ADC000
trusted library allocation
page read and write
B30000
unkown
page readonly
7A9E000
heap
page read and write
2854002AC000
trusted library allocation
page read and write
7A52000
heap
page read and write
5FC00201000
trusted library allocation
page read and write
AADD3FE000
unkown
page readonly
AAF43FE000
unkown
page readonly
6ED1000
heap
page read and write
2854001D0000
trusted library allocation
page read and write
1714000
heap
page read and write
25DCEA80000
heap
page read and write
AADABFE000
stack
page read and write
5DEC002BC000
trusted library allocation
page read and write
285400144000
trusted library allocation
page read and write
1714000
heap
page read and write
285400340000
trusted library allocation
page read and write
7A3B000
heap
page read and write
7C12000
heap
page read and write
285400C88000
trusted library allocation
page read and write
25DCEA88000
heap
page read and write
28F0000
heap
page read and write
7590000
direct allocation
page execute and read and write
5DEC00264000
trusted library allocation
page read and write
285400D4D000
trusted library allocation
page read and write
AAE33FE000
unkown
page readonly
AAD43FE000
unkown
page readonly
5DEC00294000
trusted library allocation
page read and write
277E000
unkown
page read and write
2BD0000
heap
page read and write
1130000
heap
page read and write
5FC00248000
trusted library allocation
page read and write
2854002C0000
trusted library allocation
page read and write
1040000
heap
page read and write
7A6F000
heap
page read and write
7AA8000
heap
page read and write
6C30C000
unkown
page readonly
7590000
direct allocation
page execute and read and write
6ED1000
heap
page read and write
7902000
direct allocation
page read and write
25DD2534000
heap
page read and write
281E000
stack
page read and write
AAF83FE000
unkown
page readonly
15480023C000
direct allocation
page read and write
B3A000
unkown
page readonly
B3E000
unkown
page write copy
5FC00418000
trusted library allocation
page read and write
5FC006E0000
trusted library allocation
page read and write
25DCEB17000
heap
page read and write
B30000
unkown
page readonly
285400B74000
trusted library allocation
page read and write
6ED1000
heap
page read and write
6ED1000
heap
page read and write
285400958000
trusted library allocation
page read and write
28540020C000
trusted library allocation
page read and write
285400308000
trusted library allocation
page read and write
6C1E1000
unkown
page execute read
5FC002CC000
trusted library allocation
page read and write
7A93000
heap
page read and write
AAD3BFE000
stack
page read and write
6ED1000
heap
page read and write
796D000
heap
page read and write
5FC008EC000
trusted library allocation
page read and write
AAE53FE000
unkown
page readonly
285400348000
trusted library allocation
page read and write
25DD1F81000
heap
page read and write
AADF3FE000
unkown
page readonly
285400244000
trusted library allocation
page read and write
25DD2555000
heap
page read and write
5DEC00270000
trusted library allocation
page read and write
285400340000
trusted library allocation
page read and write
285400B80000
trusted library allocation
page read and write
7B14000
heap
page read and write
5FC00801000
trusted library allocation
page read and write
7AE3000
heap
page read and write
7B06000
heap
page read and write
5FC0087C000
trusted library allocation
page read and write
285400230000
trusted library allocation
page read and write
2854005F0000
trusted library allocation
page read and write
5FC008AC000
trusted library allocation
page read and write
5FC0039C000
trusted library allocation
page read and write
28540080C000
trusted library allocation
page read and write
7CF4000
heap
page read and write
5FC0025C000
trusted library allocation
page read and write
25DCE8B0000
heap
page read and write
AAF3BFE000
stack
page read and write
285400EFC000
trusted library allocation
page read and write
285400E28000
trusted library allocation
page read and write
2854003A8000
trusted library allocation
page read and write
285400454000
trusted library allocation
page read and write
796E000
heap
page read and write
AAEA3FE000
unkown
page readonly
25DD64C0000
trusted library allocation
page read and write
28540000C000
trusted library allocation
page read and write
2854002CC000
trusted library allocation
page read and write
796D000
heap
page read and write
BA0000
heap
page read and write
25DD1160000
unkown
page read and write
2854007F0000
trusted library allocation
page read and write
285400348000
trusted library allocation
page read and write
5DEC002A0000
trusted library allocation
page read and write
6ED1000
heap
page read and write
285400788000
trusted library allocation
page read and write
28540032C000
trusted library allocation
page read and write
1C80000
direct allocation
page read and write
7960000
heap
page read and write
285400340000
trusted library allocation
page read and write
15480020C000
direct allocation
page read and write
6ED1000
heap
page read and write
AAE6BFD000
stack
page read and write
7AF6000
heap
page read and write
28540011C000
trusted library allocation
page read and write
285400A80000
trusted library allocation
page read and write
7590000
direct allocation
page execute and read and write
2854002F8000
trusted library allocation
page read and write
6ED1000
heap
page read and write
7590000
direct allocation
page execute and read and write
AAF03FE000
unkown
page readonly
25DD6702000
trusted library allocation
page read and write
796D000
heap
page read and write
2854001F8000
trusted library allocation
page read and write
285400A20000
trusted library allocation
page read and write
285400C44000
trusted library allocation
page read and write
25DD24B1000
heap
page read and write
2854002FB000
trusted library allocation
page read and write
7960000
heap
page read and write
285400C44000
trusted library allocation
page read and write
285400728000
trusted library allocation
page read and write
285400CA4000
trusted library allocation
page read and write
285400384000
trusted library allocation
page read and write
25DD0710000
heap
page read and write
5FC002B8000
trusted library allocation
page read and write
285400144000
trusted library allocation
page read and write
2854004B0000
trusted library allocation
page read and write
7B0C000
heap
page read and write
2854001D0000
trusted library allocation
page read and write
7590000
direct allocation
page execute and read and write
2854001D0000
trusted library allocation
page read and write
7960000
heap
page read and write
285400228000
trusted library allocation
page read and write
154800284000
direct allocation
page read and write
6ED1000
heap
page read and write
2854005DC000
trusted library allocation
page read and write
152F000
stack
page read and write
1CA0000
direct allocation
page read and write
2854000B8000
trusted library allocation
page read and write
7B74000
heap
page read and write
7BCB000
heap
page read and write
5DEC00238000
trusted library allocation
page read and write
6ED1000
heap
page read and write
5FC00401000
trusted library allocation
page read and write
5FC00404000
trusted library allocation
page read and write
7967000
heap
page read and write
285400454000
trusted library allocation
page read and write
AAD93FE000
unkown
page readonly
285400D3C000
trusted library allocation
page read and write
AACFBFE000
stack
page read and write
There are 939 hidden memdumps, click here to show them.