IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_de576c89c85d95f63177b89249eef622329cc21c_49e505fd_dea60c96-d75b-4267-8430-74a6c86bbcb5\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
modified
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9793.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Nov 25 14:23:47 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER99D6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9E4C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2588 --field-trial-handle=2244,i,15888928797470056610,12069267996106984436,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user~1\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user~1\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user~1\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user~1\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user~1\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7608 -s 1080
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://google-ohttp-relay-query.fastly-edge.com/q
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
https://chrome.google.com/webstore?hl=en3-
unknown
https://chrome.google.com/webstore?hl=enmojom.ModuleEventSinkMessageHeaderValidator
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://chrome.google.com/webstore0KQvGDdc=
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
34.116.198.130
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0B
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
https://www.google.com/search?q=$
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
http://anglebug.com/4937
unknown
https://issuetracker.google.com/166809097
unknown
http://issuetracker.google.com/200067929
unknown
https://anglebug.com/7847
unknown
https://google-ohttp-relay-join.fastly-edge.com/
unknown
https://google-ohttp-relay-join.fastly-edge.com/gj
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fvtekk5pn.top
34.116.198.130
www.google.com
142.250.181.68
fvtekk5pn.top
34.116.198.130

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
34.116.198.130
home.fvtekk5pn.top
United States
142.250.181.68
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{749f6df8-4bfb-6053-045b-e203108aed0a}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProgramId
malicious
\REGISTRY\A\{749f6df8-4bfb-6053-045b-e203108aed0a}\Root\InventoryApplicationFile\file.exe|634507f567776d77
FileId
malicious
\REGISTRY\A\{749f6df8-4bfb-6053-045b-e203108aed0a}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LowerCaseLongPath
malicious
\REGISTRY\A\{749f6df8-4bfb-6053-045b-e203108aed0a}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LongPathHash
malicious
\REGISTRY\A\{749f6df8-4bfb-6053-045b-e203108aed0a}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Name
malicious
\REGISTRY\A\{749f6df8-4bfb-6053-045b-e203108aed0a}\Root\InventoryApplicationFile\file.exe|634507f567776d77
OriginalFileName
malicious
\REGISTRY\A\{749f6df8-4bfb-6053-045b-e203108aed0a}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Publisher
malicious
\REGISTRY\A\{749f6df8-4bfb-6053-045b-e203108aed0a}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Version
malicious
\REGISTRY\A\{749f6df8-4bfb-6053-045b-e203108aed0a}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinFileVersion
malicious
\REGISTRY\A\{749f6df8-4bfb-6053-045b-e203108aed0a}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinaryType
malicious
\REGISTRY\A\{749f6df8-4bfb-6053-045b-e203108aed0a}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProductName
malicious
\REGISTRY\A\{749f6df8-4bfb-6053-045b-e203108aed0a}\Root\InventoryApplicationFile\file.exe|634507f567776d77
ProductVersion
malicious
\REGISTRY\A\{749f6df8-4bfb-6053-045b-e203108aed0a}\Root\InventoryApplicationFile\file.exe|634507f567776d77
LinkDate
malicious
\REGISTRY\A\{749f6df8-4bfb-6053-045b-e203108aed0a}\Root\InventoryApplicationFile\file.exe|634507f567776d77
BinProductVersion
malicious
\REGISTRY\A\{749f6df8-4bfb-6053-045b-e203108aed0a}\Root\InventoryApplicationFile\file.exe|634507f567776d77
AppxPackageFullName
malicious
\REGISTRY\A\{749f6df8-4bfb-6053-045b-e203108aed0a}\Root\InventoryApplicationFile\file.exe|634507f567776d77
AppxPackageRelativeId
malicious
\REGISTRY\A\{749f6df8-4bfb-6053-045b-e203108aed0a}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Size
malicious
\REGISTRY\A\{749f6df8-4bfb-6053-045b-e203108aed0a}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Language
malicious
\REGISTRY\A\{749f6df8-4bfb-6053-045b-e203108aed0a}\Root\InventoryApplicationFile\file.exe|634507f567776d77
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
756B000
heap
page read and write
7560000
heap
page read and write
776E000
heap
page read and write
722C00590000
trusted library allocation
page read and write
46DCDFC000
stack
page read and write
10E000
unkown
page write copy
2420361E000
heap
page read and write
722C00248000
trusted library allocation
page read and write
722C010E0000
trusted library allocation
page read and write
6BA1000
heap
page read and write
722C002B0000
trusted library allocation
page read and write
71C8006F0000
trusted library allocation
page read and write
722C00958000
trusted library allocation
page read and write
722C008FC000
trusted library allocation
page read and write
76CA000
heap
page read and write
242094D7000
unclassified section
page read and write
46BDDFE000
stack
page read and write
242092F3000
heap
page read and write
722C001C8000
trusted library allocation
page read and write
7657000
heap
page read and write
722C003A4000
trusted library allocation
page read and write
46D45FE000
unkown
page readonly
2427CE70000
trusted library allocation
page read and write
722C009D8000
trusted library allocation
page read and write
71C800320000
trusted library allocation
page read and write
722C00704000
trusted library allocation
page read and write
111000
unkown
page readonly
24B000230000
direct allocation
page read and write
7699000
heap
page read and write
7561000
heap
page read and write
722C0099C000
trusted library allocation
page read and write
542C002D8000
trusted library allocation
page read and write
770F000
heap
page read and write
242099F0000
trusted library section
page read and write
722C00A01000
trusted library allocation
page read and write
46CDDFE000
stack
page read and write
722C00FB8000
trusted library allocation
page read and write
722C00CDC000
trusted library allocation
page read and write
722C00525000
trusted library allocation
page read and write
722C00AB4000
trusted library allocation
page read and write
242058C0000
trusted library allocation
page read and write
722C002CC000
trusted library allocation
page read and write
7566000
heap
page read and write
46DEDFE000
stack
page read and write
722C00E4F000
trusted library allocation
page read and write
722C00728000
trusted library allocation
page read and write
24209C30000
trusted library section
page read and write
46D35FE000
unkown
page readonly
722C00178000
trusted library allocation
page read and write
76FE000
heap
page read and write
10A000
unkown
page readonly
756F000
heap
page read and write
46D4DFC000
stack
page read and write
6BA1000
heap
page read and write
722C0008C000
trusted library allocation
page read and write
B10000
heap
page read and write
19C0000
direct allocation
page read and write
756A000
heap
page read and write
542C00264000
trusted library allocation
page read and write
242035B0000
heap
page read and write
786B000
heap
page read and write
722C00978000
trusted library allocation
page read and write
722C00A2C000
trusted library allocation
page read and write
24209476000
trusted library section
page read and write
1314000
heap
page read and write
9FC000
stack
page read and write
722C0129C000
trusted library allocation
page read and write
722C0129C000
trusted library allocation
page read and write
46D1DFD000
stack
page read and write
71C800424000
trusted library allocation
page read and write
722C001F8000
trusted library allocation
page read and write
46C05FE000
unkown
page readonly
722C0020C000
trusted library allocation
page read and write
46C65FE000
unkown
page readonly
6BA1000
heap
page read and write
722C0010C000
trusted library allocation
page read and write
769C000
heap
page read and write
722C00E24000
trusted library allocation
page read and write
768D000
heap
page read and write
A00000
heap
page read and write
722C007C0000
trusted library allocation
page read and write
10E000
unkown
page write copy
722C00601000
trusted library allocation
page read and write
9CF000
unkown
page read and write
111000
unkown
page readonly
242078C3000
heap
page read and write
242078D0000
heap
page read and write
722C0060C000
trusted library allocation
page read and write
242035C0000
heap
page read and write
542C002C8000
trusted library allocation
page read and write
792D000
heap
page read and write
722C00354000
trusted library allocation
page read and write
722C005AC000
trusted library allocation
page read and write
24B000280000
direct allocation
page read and write
722C0039C000
trusted library allocation
page read and write
71C80069C000
trusted library allocation
page read and write
10E000
unkown
page read and write
46C25FE000
unkown
page readonly
722C002AC000
trusted library allocation
page read and write
722C01030000
trusted library allocation
page read and write
242036A8000
heap
page read and write
7290000
direct allocation
page execute and read and write
722C00C01000
trusted library allocation
page read and write
6CAD9000
unkown
page read and write
6BA1000
heap
page read and write
7713000
heap
page read and write
722C00F24000
trusted library allocation
page read and write
722C00F44000
trusted library allocation
page read and write
722C0021C000
trusted library allocation
page read and write
5A1000
unkown
page execute and write copy
765D000
heap
page read and write
542C002B0000
trusted library allocation
page read and write
7280000
direct allocation
page execute and read and write
71C800201000
trusted library allocation
page read and write
722C0120C000
trusted library allocation
page read and write
7652000
heap
page read and write
756E000
heap
page read and write
722C00E58000
trusted library allocation
page read and write
11F0000
heap
page read and write
722C00214000
trusted library allocation
page read and write
B9E000
stack
page read and write
24209C62000
trusted library section
page read and write
71C800364000
trusted library allocation
page read and write
7D0000
heap
page read and write
722C004AC000
trusted library allocation
page read and write
46DE5FE000
unkown
page readonly
71C800658000
trusted library allocation
page read and write
19C0000
direct allocation
page read and write
722C0037C000
trusted library allocation
page read and write
722C00CEC000
trusted library allocation
page read and write
71C8006AC000
trusted library allocation
page read and write
722C00F5C000
trusted library allocation
page read and write
722C011E4000
trusted library allocation
page read and write
7608000
heap
page read and write
100000
unkown
page readonly
A60000
heap
page read and write
46D85FE000
unkown
page readonly
100000
unkown
page readonly
71C800368000
trusted library allocation
page read and write
722C00B0C000
trusted library allocation
page read and write
722C00B70000
trusted library allocation
page read and write
722C01201000
trusted library allocation
page read and write
E3E000
stack
page read and write
242030A0000
heap
page read and write
722C009B3000
trusted library allocation
page read and write
722C00D84000
trusted library allocation
page read and write
71C8007B4000
trusted library allocation
page read and write
CA0000
heap
page read and write
71C8002F4000
trusted library allocation
page read and write
10A000
unkown
page readonly
542C002F0000
trusted library allocation
page read and write
100000
unkown
page readonly
7627000
heap
page read and write
722C00E24000
trusted library allocation
page read and write
722C00082000
trusted library allocation
page read and write
71C800678000
trusted library allocation
page read and write
BAA000
heap
page read and write
2420360F000
heap
page read and write
722C00F50000
trusted library allocation
page read and write
71C8002CC000
trusted library allocation
page read and write
722C00FE4000
trusted library allocation
page read and write
59C000
stack
page read and write
46C2DFE000
stack
page read and write
722C00F50000
trusted library allocation
page read and write
242035EE000
heap
page read and write
6BA1000
heap
page read and write
722C0100C000
trusted library allocation
page read and write
71C800320000
trusted library allocation
page read and write
71C8006E4000
trusted library allocation
page read and write
722C00DC0000
trusted library allocation
page read and write
2420309F000
heap
page read and write
71C8007E0000
trusted library allocation
page read and write
24209E10000
trusted library section
page read and write
24209380000
heap
page read and write
7627000
heap
page read and write
722C00718000
trusted library allocation
page read and write
722C010F0000
trusted library allocation
page read and write
10A000
unkown
page readonly
773C000
heap
page read and write
6CADC000
unkown
page readonly
722C00B7C000
trusted library allocation
page read and write
5A0000
unkown
page readonly
7564000
heap
page read and write
242078CE000
heap
page read and write
2420949D000
trusted library section
page read and write
722C00F5C000
trusted library allocation
page read and write
722C00354000
trusted library allocation
page read and write
722C01118000
trusted library allocation
page read and write
6BA1000
heap
page read and write
722C00F50000
trusted library allocation
page read and write
722C00354000
trusted library allocation
page read and write
7721000
heap
page read and write
722C00E24000
trusted library allocation
page read and write
46BF5FE000
unkown
page readonly
46D55FE000
unkown
page readonly
7568000
heap
page read and write
71C8006E8000
trusted library allocation
page read and write
722C00CB4000
trusted library allocation
page read and write
7566000
heap
page read and write
46E15FE000
unkown
page readonly
722C00D1C000
trusted library allocation
page read and write
722C01118000
trusted library allocation
page read and write
24B000270000
direct allocation
page read and write
722C00354000
trusted library allocation
page read and write
AC0000
heap
page read and write
10A000
unkown
page readonly
722C00201000
trusted library allocation
page read and write
71C800664000
trusted library allocation
page read and write
542C002F8000
trusted library allocation
page read and write
1314000
heap
page read and write
24207890000
heap
page read and write
46D65FE000
unkown
page readonly
71C800418000
trusted library allocation
page read and write
C30000
heap
page read and write
722C003A4000
trusted library allocation
page read and write
46CA5FE000
unkown
page readonly
722C002CC000
trusted library allocation
page read and write
722C001F4000
trusted library allocation
page read and write
46E1DFD000
stack
page read and write
46BD5FE000
unkown
page readonly
722C0039C000
trusted library allocation
page read and write
10A000
unkown
page readonly
2427CE00000
heap
page readonly
2420366C000
heap
page read and write
242093D2000
trusted library section
page read and write
71C800700000
trusted library allocation
page read and write
722C003E0000
trusted library allocation
page read and write
71C8007D0000
trusted library allocation
page read and write
24209CC1000
trusted library section
page read and write
24B0002AC000
direct allocation
page read and write
71C80075C000
trusted library allocation
page read and write
6BA1000
heap
page read and write
722C00A0C000
trusted library allocation
page read and write
722C00CEC000
trusted library allocation
page read and write
24203655000
heap
page read and write
722C00EC8000
trusted library allocation
page read and write
722C01134000
trusted library allocation
page read and write
24209D9D000
trusted library section
page read and write
6BA1000
heap
page read and write
722C002AC000
trusted library allocation
page read and write
722C002BC000
trusted library allocation
page read and write
722C00E24000
trusted library allocation
page read and write
7260000
direct allocation
page execute and read and write
722C0049C000
trusted library allocation
page read and write
722C00A8C000
trusted library allocation
page read and write
A00000
heap
page read and write
71C800730000
trusted library allocation
page read and write
7799000
heap
page read and write
722C00500000
trusted library allocation
page read and write
7290000
direct allocation
page execute and read and write
542C00250000
trusted library allocation
page read and write
46E45FE000
unkown
page readonly
24B00023C000
direct allocation
page read and write
46E35FE000
unkown
page readonly
722C001F0000
trusted library allocation
page read and write
46C95FE000
unkown
page readonly
7564000
heap
page read and write
722C001C8000
trusted library allocation
page read and write
722C00F5C000
trusted library allocation
page read and write
71C8002FC000
trusted library allocation
page read and write
722C00D94000
trusted library allocation
page read and write
722C001C8000
trusted library allocation
page read and write
1314000
heap
page read and write
722C00740000
trusted library allocation
page read and write
7729000
direct allocation
page read and write
722C005A6000
trusted library allocation
page read and write
101000
unkown
page execute read
542C00220000
trusted library allocation
page read and write
19C0000
direct allocation
page read and write
7290000
direct allocation
page execute and read and write
722C00E24000
trusted library allocation
page read and write
71C800248000
trusted library allocation
page read and write
722C0074C000
trusted library allocation
page read and write
46D8DFB000
stack
page read and write
46DD5FE000
unkown
page readonly
722C012B0000
trusted library allocation
page read and write
101000
unkown
page execute read
19C0000
direct allocation
page read and write
722C003A4000
trusted library allocation
page read and write
2420367D000
heap
page read and write
46E4DFD000
stack
page read and write
722C010AC000
trusted library allocation
page read and write
24B000303000
direct allocation
page read and write
722C005BC000
trusted library allocation
page read and write
71C800698000
trusted library allocation
page read and write
722C00390000
trusted library allocation
page read and write
10E000
unkown
page read and write
722C007D8000
trusted library allocation
page read and write
722C00C0C000
trusted library allocation
page read and write
71C8006FC000
trusted library allocation
page read and write
7566000
heap
page read and write
CA7000
heap
page read and write
6BA1000
heap
page read and write
46D5DFB000
stack
page read and write
722C00B70000
trusted library allocation
page read and write
722C00220000
trusted library allocation
page read and write
7290000
direct allocation
page execute and read and write
722C00144000
trusted library allocation
page read and write
722C002B0000
trusted library allocation
page read and write
722C00AC6000
trusted library allocation
page read and write
24203300000
heap
page read and write
542C002BC000
trusted library allocation
page read and write
71C800250000
trusted library allocation
page read and write
2420367D000
heap
page read and write
24203667000
heap
page read and write
722C00574000
trusted library allocation
page read and write
722C006E0000
trusted library allocation
page read and write
2CF0000
heap
page read and write
10E000
unkown
page read and write
6BA1000
heap
page read and write
722C003A4000
trusted library allocation
page read and write
722C011A0000
trusted library allocation
page read and write
46D2DFC000
stack
page read and write
7564000
heap
page read and write
722C01001000
trusted library allocation
page read and write
722C00628000
trusted library allocation
page read and write
6BA1000
heap
page read and write
722C00F74000
trusted library allocation
page read and write
24207710000
trusted library section
page read and write
71C800401000
trusted library allocation
page read and write
722C00E94000
trusted library allocation
page read and write
5DC000
stack
page read and write
722C009E8000
trusted library allocation
page read and write
722C00CDC000
trusted library allocation
page read and write
7560000
heap
page read and write
242078C6000
heap
page read and write
722C0000C000
trusted library allocation
page read and write
46BADFE000
unkown
page read and write
24B00025C000
direct allocation
page read and write
722C0023C000
trusted library allocation
page read and write
7745000
heap
page read and write
10A000
unkown
page readonly
101000
unkown
page execute read
46DADFE000
stack
page read and write
2420308E000
heap
page read and write
722C00730000
trusted library allocation
page read and write
722C00224000
trusted library allocation
page read and write
722C00370000
trusted library allocation
page read and write
722C003B0000
trusted library allocation
page read and write
722C005E0000
trusted library allocation
page read and write
242093DE000
trusted library section
page read and write
24B00024C000
direct allocation
page read and write
722C00D70000
trusted library allocation
page read and write
71C800610000
trusted library allocation
page read and write
722C00198000
trusted library allocation
page read and write
6BA1000
heap
page read and write
775B000
heap
page read and write
19C0000
direct allocation
page read and write
722C00303000
trusted library allocation
page read and write
722C002D8000
trusted library allocation
page read and write
2427CF79000
heap
page read and write
1314000
heap
page read and write
46CC5FE000
unkown
page readonly
71C8006EC000
trusted library allocation
page read and write
71C80033C000
trusted library allocation
page read and write
24203093000
heap
page read and write
7020000
direct allocation
page read and write
24203680000
heap
page read and write
756B000
heap
page read and write
71C80078C000
trusted library allocation
page read and write
C37000
heap
page read and write
46D6DFD000
stack
page read and write
722C004C0000
trusted library allocation
page read and write
722C00530000
trusted library allocation
page read and write
722C00E01000
trusted library allocation
page read and write
2427CFB0000
heap
page read and write
722C000B4000
trusted library allocation
page read and write
722C00A38000
trusted library allocation
page read and write
1314000
heap
page read and write
722C004CB000
trusted library allocation
page read and write
46CEDFE000
stack
page read and write
46E3DFD000
stack
page read and write
46C1DFC000
stack
page read and write
722C00CDC000
trusted library allocation
page read and write
24203691000
heap
page read and write
722C00CDC000
trusted library allocation
page read and write
7A0000
heap
page read and write
C77000
heap
page read and write
2420308E000
heap
page read and write
722C00480000
trusted library allocation
page read and write
722C00CA4000
trusted library allocation
page read and write
24209DD0000
trusted library section
page read and write
722C001D0000
trusted library allocation
page read and write
722C00C54000
trusted library allocation
page read and write
7662000
heap
page read and write
71C800648000
trusted library allocation
page read and write
6BA1000
heap
page read and write
722C00E88000
trusted library allocation
page read and write
781E000
heap
page read and write
722C00CEC000
trusted library allocation
page read and write
71C800354000
trusted library allocation
page read and write
542C002A0000
trusted library allocation
page read and write
24209CA0000
trusted library section
page read and write
542C002C0000
trusted library allocation
page read and write
722C01134000
trusted library allocation
page read and write
722C002B6000
trusted library allocation
page read and write
1314000
heap
page read and write
6BA1000
heap
page read and write
24B000284000
direct allocation
page read and write
722C003B0000
trusted library allocation
page read and write
722C00F18000
trusted library allocation
page read and write
960000
heap
page read and write
6BA1000
heap
page read and write
46CBDFA000
stack
page read and write
24201880000
heap
page read and write
46C5DFC000
stack
page read and write
6BA1000
heap
page read and write
722C0083C000
trusted library allocation
page read and write
6BA1000
heap
page read and write
2420363B000
heap
page read and write
722C00AE8000
trusted library allocation
page read and write
71C800220000
trusted library allocation
page read and write
6BA1000
heap
page read and write
722C00D78000
trusted library allocation
page read and write
A10000
heap
page read and write
46E25FE000
unkown
page readonly
71C800330000
trusted library allocation
page read and write
7563000
heap
page read and write
24B0002EC000
direct allocation
page read and write
6BA1000
heap
page read and write
722C00230000
trusted library allocation
page read and write
242035C2000
heap
page read and write
722C00ED4000
trusted library allocation
page read and write
24209E1E000
trusted library section
page read and write
46E7DFC000
stack
page read and write
2420365C000
heap
page read and write
71C800620000
trusted library allocation
page read and write
722C002AC000
trusted library allocation
page read and write
46E6DFB000
stack
page read and write
722C004DC000
trusted library allocation
page read and write
756E000
heap
page read and write
791E000
heap
page read and write
722C00FDC000
trusted library allocation
page read and write
722C0040C000
trusted library allocation
page read and write
6BA1000
heap
page read and write
722C00528000
trusted library allocation
page read and write
722C00F6C000
trusted library allocation
page read and write
722C00EB0000
trusted library allocation
page read and write
71C800390000
trusted library allocation
page read and write
71C80033C000
trusted library allocation
page read and write
2427CE40000
heap
page read and write
46C7DFD000
stack
page read and write
71C80060C000
trusted library allocation
page read and write
6BA1000
heap
page read and write
46C8DFE000
stack
page read and write
722C00388000
trusted library allocation
page read and write
78D7000
heap
page read and write
46C15FE000
unkown
page readonly
542C002A0000
trusted library allocation
page read and write
46DB5FE000
unkown
page readonly
722C0092C000
trusted library allocation
page read and write
3800000
direct allocation
page read and write
722C0011C000
trusted library allocation
page read and write
542C002C0000
trusted library allocation
page read and write
542C002BC000
trusted library allocation
page read and write
722C00A4C000
trusted library allocation
page read and write
2427D0D5000
heap
page read and write
71C800784000
trusted library allocation
page read and write
722C0009C000
trusted library allocation
page read and write
722C00B84000
trusted library allocation
page read and write
722C00FB8000
trusted library allocation
page read and write
1314000
heap
page read and write
722C00F50000
trusted library allocation
page read and write
6CA8D000
unkown
page read and write
71C8007C8000
trusted library allocation
page read and write
71C800320000
trusted library allocation
page read and write
542C00238000
trusted library allocation
page read and write
722C00A0C000
trusted library allocation
page read and write
24B000217000
direct allocation
page read and write
1314000
heap
page read and write
100000
unkown
page readonly
7563000
heap
page read and write
46E5DFD000
stack
page read and write
722C00238000
trusted library allocation
page read and write
7290000
direct allocation
page execute and read and write
722C00001000
trusted library allocation
page read and write
111000
unkown
page readonly
722C00DB4000
trusted library allocation
page read and write
722C001EC000
trusted library allocation
page read and write
722C000E0000
trusted library allocation
page read and write
542C002BC000
trusted library allocation
page read and write
722C007A4000
trusted library allocation
page read and write
2427D0D0000
heap
page read and write
46BBDFE000
stack
page read and write
24209C50000
trusted library section
page read and write
46D0DFB000
stack
page read and write
7562000
heap
page read and write
722C00650000
trusted library allocation
page read and write
722C005F8000
trusted library allocation
page read and write
71C8002DC000
trusted library allocation
page read and write
59D000
stack
page read and write
46D7DFD000
stack
page read and write
722C00694000
trusted library allocation
page read and write
722C00354000
trusted library allocation
page read and write
6BA1000
heap
page read and write
722C00BB8000
trusted library allocation
page read and write
722C00D1C000
trusted library allocation
page read and write
771B000
heap
page read and write
46C4DFB000
stack
page read and write
722C01020000
trusted library allocation
page read and write
24B00020C000
direct allocation
page read and write
722C00218000
trusted library allocation
page read and write
1314000
heap
page read and write
722C01038000
trusted library allocation
page read and write
71C800704000
trusted library allocation
page read and write
46E8DFE000
stack
page read and write
722C00920000
trusted library allocation
page read and write
722C004B8000
trusted library allocation
page read and write
71C800724000
trusted library allocation
page read and write
46D3DFA000
stack
page read and write
6FE0000
trusted library allocation
page read and write
6BA1000
heap
page read and write
722C00E24000
trusted library allocation
page read and write
24B000250000
direct allocation
page read and write
77EC000
heap
page read and write
783D000
heap
page read and write
722C0022C000
trusted library allocation
page read and write
722C00210000
trusted library allocation
page read and write
7660000
heap
page read and write
722C005EC000
trusted library allocation
page read and write
722C00D54000
trusted library allocation
page read and write
BAE000
heap
page read and write
722C002F8000
trusted library allocation
page read and write
773F000
heap
page read and write
1314000
heap
page read and write
722C00E64000
trusted library allocation
page read and write
722C00228000
trusted library allocation
page read and write
24203605000
heap
page read and write
71C800624000
trusted library allocation
page read and write
763A000
heap
page read and write
722C00B98000
trusted library allocation
page read and write
722C00418000
trusted library allocation
page read and write
762E000
heap
page read and write
722C01148000
trusted library allocation
page read and write
BD8000
heap
page read and write
71C8002B8000
trusted library allocation
page read and write
6BA1000
heap
page read and write
722C00234000
trusted library allocation
page read and write
46CF5FE000
unkown
page readonly
7560000
heap
page read and write
6BA1000
heap
page read and write
71C8006CC000
trusted library allocation
page read and write
46C45FE000
unkown
page readonly
75C000
stack
page read and write
722C00EB8000
trusted library allocation
page read and write
103E000
stack
page read and write
722C00CFC000
trusted library allocation
page read and write
10E000
unkown
page write copy
6BA1000
heap
page read and write
542C00270000
trusted library allocation
page read and write
1314000
heap
page read and write
71C800310000
trusted library allocation
page read and write
722C00050000
trusted library allocation
page read and write
71C800368000
trusted library allocation
page read and write
71C80039C000
trusted library allocation
page read and write
722C00B2C000
trusted library allocation
page read and write
242030A0000
heap
page read and write
71C800750000
trusted library allocation
page read and write
46C3DFB000
stack
page read and write
722C004B8000
trusted library allocation
page read and write
7893000
heap
page read and write
722C00F6C000
trusted library allocation
page read and write
722C0104C000
trusted library allocation
page read and write
5F0000
heap
page read and write
722C00D0C000
trusted library allocation
page read and write
7290000
direct allocation
page execute and read and write
24209433000
trusted library section
page read and write
71C8006E0000
trusted library allocation
page read and write
71C800758000
trusted library allocation
page read and write
722C00244000
trusted library allocation
page read and write
46E05FE000
unkown
page readonly
722C008D4000
trusted library allocation
page read and write
7560000
heap
page read and write
542C00248000
trusted library allocation
page read and write
6BA1000
heap
page read and write
71C800714000
trusted library allocation
page read and write
722C011A0000
trusted library allocation
page read and write
7290000
direct allocation
page execute and read and write
2420367D000
heap
page read and write
722C00801000
trusted library allocation
page read and write
6C9B1000
unkown
page execute read
722C00C94000
trusted library allocation
page read and write
76F7000
heap
page read and write
71C8007CC000
trusted library allocation
page read and write
76F8000
heap
page read and write
2420A047000
unclassified section
page read and write
722C00AF4000
trusted library allocation
page read and write
24205800000
trusted library section
page read and write
101000
unkown
page execute read
24209C6E000
trusted library section
page read and write
7698000
heap
page read and write
722C00FDC000
trusted library allocation
page read and write
722C00A0C000
trusted library allocation
page read and write
1140000
heap
page read and write
24B000294000
direct allocation
page read and write
6CA8F000
unkown
page readonly
542C002B0000
trusted library allocation
page read and write
722C01118000
trusted library allocation
page read and write
71C800288000
trusted library allocation
page read and write
722C003B0000
trusted library allocation
page read and write
6BA1000
heap
page read and write
6BA1000
heap
page read and write
722C00370000
trusted library allocation
page read and write
71C800788000
trusted library allocation
page read and write
46CD5FE000
unkown
page readonly
722C00F50000
trusted library allocation
page read and write
722C00440000
trusted library allocation
page read and write
10E000
unkown
page read and write
24209CD3000
trusted library section
page read and write
722C00041000
trusted library allocation
page read and write
722C00E0C000
trusted library allocation
page read and write
76E8000
heap
page read and write
756F000
heap
page read and write
71C80020C000
trusted library allocation
page read and write
542C00201000
trusted library allocation
page read and write
71C8002C4000
trusted library allocation
page read and write
542C00278000
trusted library allocation
page read and write
756C000
heap
page read and write
722C001B0000
trusted library allocation
page read and write
7290000
direct allocation
page execute and read and write
722C00CDC000
trusted library allocation
page read and write
722C00E30000
trusted library allocation
page read and write
71C80080C000
trusted library allocation
page read and write
111000
unkown
page readonly
7634000
heap
page read and write
BFC000
stack
page read and write
24B00026C000
direct allocation
page read and write
2420361D000
heap
page read and write
722C00E4D000
trusted library allocation
page read and write
756F000
heap
page read and write
722C002AC000
trusted library allocation
page read and write
242022D0000
unkown
page read and write
722C007B0000
trusted library allocation
page read and write
46E9DFE000
stack
page read and write
24203667000
heap
page read and write
71C800430000
trusted library allocation
page read and write
2420366C000
heap
page read and write
100000
unkown
page readonly
7563000
heap
page read and write
46CE5FE000
unkown
page readonly
722C00C74000
trusted library allocation
page read and write
46EA5FE000
unkown
page readonly
722C00B30000
trusted library allocation
page read and write
7568000
heap
page read and write
722C008E0000
trusted library allocation
page read and write
722C00EB4000
trusted library allocation
page read and write
242035CA000
heap
page read and write
46BB5FE000
unkown
page readonly
722C00BA0000
trusted library allocation
page read and write
722C009B7000
trusted library allocation
page read and write
24209D76000
trusted library section
page read and write
772B000
direct allocation
page read and write
2427CF7D000
heap
page read and write
722C003BC000
trusted library allocation
page read and write
7290000
direct allocation
page execute and read and write
722C00FAD000
trusted library allocation
page read and write
1400000
heap
page read and write
A1B000
heap
page read and write
542C00230000
trusted library allocation
page read and write
7290000
direct allocation
page execute and read and write
542C002B0000
trusted library allocation
page read and write
722C00569000
trusted library allocation
page read and write
46DFDFE000
stack
page read and write
46C35FE000
unkown
page readonly
101000
unkown
page execute read
722C003E0000
trusted library allocation
page read and write
7290000
direct allocation
page execute and read and write
76C8000
heap
page read and write
46BCDFE000
stack
page read and write
242097A0000
trusted library section
page read and write
722C001C8000
trusted library allocation
page read and write
101000
unkown
page execute read
722C012B8000
trusted library allocation
page read and write
722C00E54000
trusted library allocation
page read and write
6BA1000
heap
page read and write
6BA1000
heap
page read and write
722C00C64000
trusted library allocation
page read and write
71C800230000
trusted library allocation
page read and write
101000
unkown
page execute read
722C00354000
trusted library allocation
page read and write
242093C0000
trusted library section
page read and write
75D2000
direct allocation
page read and write
71C800744000
trusted library allocation
page read and write
2420363B000
heap
page read and write
24201883000
heap
page read and write
10CF000
stack
page read and write
24209357000
unclassified section
page read and write
542C002BC000
trusted library allocation
page read and write
722C004BB000
trusted library allocation
page read and write
71C800684000
trusted library allocation
page read and write
46D95FE000
unkown
page readonly
722C00CC4000
trusted library allocation
page read and write
722C00DA0000
trusted library allocation
page read and write
722C00E18000
trusted library allocation
page read and write
722C0079B000
trusted library allocation
page read and write
722C003E0000
trusted library allocation
page read and write
46BEDFE000
stack
page read and write
76BF000
heap
page read and write
722C00EA0000
trusted library allocation
page read and write
7290000
direct allocation
page execute and read and write
542C002A0000
trusted library allocation
page read and write
722C0024C000
trusted library allocation
page read and write
24203060000
heap
page read and write
101000
unkown
page execute read
722C00CDC000
trusted library allocation
page read and write
71C8006B8000
trusted library allocation
page read and write
46C85FE000
unkown
page readonly
7566000
heap
page read and write
542C002C0000
trusted library allocation
page read and write
2427CE60000
trusted library allocation
page read and write
6BA1000
heap
page read and write
10A000
unkown
page readonly
46CFDFE000
stack
page read and write
19C0000
direct allocation
page read and write
722C0039C000
trusted library allocation
page read and write
24203089000
heap
page read and write
542C002C0000
trusted library allocation
page read and write
756A000
heap
page read and write
722C01140000
trusted library allocation
page read and write
77CF000
heap
page read and write
76A3000
heap
page read and write
75F8000
heap
page read and write
722C00F80000
trusted library allocation
page read and write
74C000
stack
page read and write
722C00435000
trusted library allocation
page read and write
71C8003EC000
trusted library allocation
page read and write
722C00154000
trusted library allocation
page read and write
722C011BC000
trusted library allocation
page read and write
101000
unkown
page execute read
722C004B8000
trusted library allocation
page read and write
46C0DFA000
stack
page read and write
722C001A8000
trusted library allocation
page read and write
722C00AD8000
trusted library allocation
page read and write
2420951E000
trusted library section
page read and write
722C00188000
trusted library allocation
page read and write
101000
unkown
page execute read
6BA1000
heap
page read and write
9FC000
stack
page read and write
722C0039C000
trusted library allocation
page read and write
6BA1000
heap
page read and write
71C8006D4000
trusted library allocation
page read and write
7D0000
heap
page read and write
7565000
heap
page read and write
722C00F80000
trusted library allocation
page read and write
24203680000
heap
page read and write
722C00910000
trusted library allocation
page read and write
C3E000
stack
page read and write
7290000
direct allocation
page execute and read and write
722C011D4000
trusted library allocation
page read and write
5DA000
stack
page read and write
71C800238000
trusted library allocation
page read and write
722C009BC000
trusted library allocation
page read and write
722C00C2C000
trusted library allocation
page read and write
722C011EC000
trusted library allocation
page read and write
19C0000
direct allocation
page read and write
722C0089C000
trusted library allocation
page read and write
722C00EB8000
trusted library allocation
page read and write
722C00D1C000
trusted library allocation
page read and write
7C0000
heap
page read and write
46C75FE000
unkown
page readonly
111000
unkown
page readonly
722C00354000
trusted library allocation
page read and write
6BA1000
heap
page read and write
111000
unkown
page readonly
10A000
unkown
page readonly
722C00E40000
trusted library allocation
page read and write
722C004B8000
trusted library allocation
page read and write
2427CFA0000
heap
page read and write
722C001BC000
trusted library allocation
page read and write
722C00E4C000
trusted library allocation
page read and write
722C001D0000
trusted library allocation
page read and write
722C000FC000
trusted library allocation
page read and write
76E2000
heap
page read and write
71C800408000
trusted library allocation
page read and write
46D05FE000
unkown
page readonly
100000
unkown
page readonly
46CADFE000
stack
page read and write
722C00C48000
trusted library allocation
page read and write
24B0002D0000
direct allocation
page read and write
71C800601000
trusted library allocation
page read and write
722C0050C000
trusted library allocation
page read and write
6BA1000
heap
page read and write
722C00D44000
trusted library allocation
page read and write
71C800380000
trusted library allocation
page read and write
76CC000
heap
page read and write
1043000
unkown
page execute and write copy
722C00354000
trusted library allocation
page read and write
6BA1000
heap
page read and write
76F2000
heap
page read and write
722C00C8C000
trusted library allocation
page read and write
1314000
heap
page read and write
2427CE10000
heap
page read and write
6BA1000
heap
page read and write
71C80027C000
trusted library allocation
page read and write
722C00F5C000
trusted library allocation
page read and write
722C000A8000
trusted library allocation
page read and write
71C800688000
trusted library allocation
page read and write
242035D2000
heap
page read and write
46E75FE000
unkown
page readonly
95E000
unkown
page read and write
756F000
heap
page read and write
7565000
heap
page read and write
46CB5FE000
unkown
page readonly
242035F2000
heap
page read and write
71C800404000
trusted library allocation
page read and write
722C00354000
trusted library allocation
page read and write
722C00EE0000
trusted library allocation
page read and write
75F2000
heap
page read and write
71C800354000
trusted library allocation
page read and write
6BA1000
heap
page read and write
722C0039C000
trusted library allocation
page read and write
C70000
heap
page read and write
722C00354000
trusted library allocation
page read and write
10E000
unkown
page write copy
2BAF000
stack
page read and write
722C00FDC000
trusted library allocation
page read and write
2427CEE8000
heap
page read and write
722C0069C000
trusted library allocation
page read and write
722C00F50000
trusted library allocation
page read and write
7561000
heap
page read and write
46E95FE000
unkown
page readonly
24203617000
heap
page read and write
722C00AC0000
trusted library allocation
page read and write
722C01124000
trusted library allocation
page read and write
10A000
unkown
page readonly
722C01100000
trusted library allocation
page read and write
7562000
heap
page read and write
722C00CEC000
trusted library allocation
page read and write
722C00FB2000
trusted library allocation
page read and write
722C01024000
trusted library allocation
page read and write
722C0030C000
trusted library allocation
page read and write
722C01110000
trusted library allocation
page read and write
7561000
heap
page read and write
722C003C4000
trusted library allocation
page read and write
71C800734000
trusted library allocation
page read and write
2420309B000
heap
page read and write
722C00D2C000
trusted library allocation
page read and write
1314000
heap
page read and write
71C800614000
trusted library allocation
page read and write
7601000
heap
page read and write
722C00354000
trusted library allocation
page read and write
78BA000
heap
page read and write
24B000201000
direct allocation
page read and write
BD0000
heap
page read and write
756A000
heap
page read and write
6CAD8000
unkown
page readonly
722C00660000
trusted library allocation
page read and write
100000
unkown
page readonly
722C003A4000
trusted library allocation
page read and write
103F000
stack
page read and write
24209492000
trusted library section
page read and write
722C00CEC000
trusted library allocation
page read and write
722C001E0000
trusted library allocation
page read and write
6BA1000
heap
page read and write
6BA1000
heap
page read and write
24209510000
trusted library section
page read and write
722C0039C000
trusted library allocation
page read and write
71C800720000
trusted library allocation
page read and write
71C8002ED000
trusted library allocation
page read and write
2420309A000
heap
page read and write
BFC000
stack
page read and write
790000
heap
page read and write
7290000
direct allocation
page execute and read and write
111000
unkown
page readonly
7290000
direct allocation
page execute and read and write
542C002F4000
trusted library allocation
page read and write
722C00890000
trusted library allocation
page read and write
7565000
heap
page read and write
111000
unkown
page readonly
24203092000
heap
page read and write
46CCDFE000
stack
page read and write
722C002AC000
trusted library allocation
page read and write
722C01064000
trusted library allocation
page read and write
24209C41000
trusted library section
page read and write
722C00834000
trusted library allocation
page read and write
722C002FB000
trusted library allocation
page read and write
2427CD20000
heap
page read and write
722C00A2C000
trusted library allocation
page read and write
24B000215000
direct allocation
page read and write
542C002E4000
trusted library allocation
page read and write
242035C4000
heap
page read and write
7C0000
heap
page read and write
46BE5FE000
unkown
page readonly
242036A2000
heap
page read and write
46E55FE000
unkown
page readonly
722C0039C000
trusted library allocation
page read and write
722C00401000
trusted library allocation
page read and write
71C800310000
trusted library allocation
page read and write
100000
unkown
page readonly
7290000
direct allocation
page execute and read and write
46B9DEF000
stack
page read and write
722C00A2C000
trusted library allocation
page read and write
111000
unkown
page readonly
24B0002E4000
direct allocation
page read and write
542C002A0000
trusted library allocation
page read and write
722C00774000
trusted library allocation
page read and write
722C00F50000
trusted library allocation
page read and write
24B000234000
direct allocation
page read and write
722C01080000
trusted library allocation
page read and write
10A000
unkown
page readonly
19C0000
direct allocation
page read and write
71C8002B0000
trusted library allocation
page read and write
722C00AA0000
trusted library allocation
page read and write
46C9DFE000
stack
page read and write
A6C000
stack
page read and write
242035D0000
heap
page read and write
71C800348000
trusted library allocation
page read and write
722C00EF4000
trusted library allocation
page read and write
722C00CFC000
trusted library allocation
page read and write
B80000
heap
page read and write
722C002F8000
trusted library allocation
page read and write
722C00D38000
trusted library allocation
page read and write
71C800668000
trusted library allocation
page read and write
980000
heap
page read and write
1020000
heap
page read and write
71C800374000
trusted library allocation
page read and write
46DF5FE000
unkown
page readonly
127F000
stack
page read and write
1A37000
heap
page read and write
722C00C80000
trusted library allocation
page read and write
722C01064000
trusted library allocation
page read and write
722C00298000
trusted library allocation
page read and write
7290000
direct allocation
page execute and read and write
756D000
heap
page read and write
2420364C000
heap
page read and write
77D5000
heap
page read and write
24203092000
heap
page read and write
24B0002A8000
direct allocation
page read and write
6BA1000
heap
page read and write
722C00E70000
trusted library allocation
page read and write
722C00F74000
trusted library allocation
page read and write
6BA1000
heap
page read and write
542C00235000
trusted library allocation
page read and write
722C00160000
trusted library allocation
page read and write
7290000
direct allocation
page execute and read and write
BA0000
heap
page read and write
71C800320000
trusted library allocation
page read and write
722C00354000
trusted library allocation
page read and write
6C9B0000
unkown
page readonly
10E000
unkown
page write copy
6BA1000
heap
page read and write
100000
unkown
page readonly
722C001D0000
trusted library allocation
page read and write
722C00DDC000
trusted library allocation
page read and write
542C002BC000
trusted library allocation
page read and write
71C8002F0000
trusted library allocation
page read and write
46DC5FE000
unkown
page readonly
46D9DFE000
stack
page read and write
722C006C0000
trusted library allocation
page read and write
542C002BC000
trusted library allocation
page read and write
A0E000
stack
page read and write
24B000220000
direct allocation
page read and write
76A5000
heap
page read and write
722C003B0000
trusted library allocation
page read and write
76BE000
heap
page read and write
542C00274000
trusted library allocation
page read and write
722C002AC000
trusted library allocation
page read and write
24203680000
heap
page read and write
722C00B1C000
trusted library allocation
page read and write
768D000
heap
page read and write
19C0000
direct allocation
page read and write
722C00390000
trusted library allocation
page read and write
BA0000
heap
page read and write
722C00CB0000
trusted library allocation
page read and write
2420364C000
heap
page read and write
46D15FE000
unkown
page readonly
24203092000
heap
page read and write
7270000
direct allocation
page execute and read and write
3800000
direct allocation
page read and write
722C01118000
trusted library allocation
page read and write
19C0000
direct allocation
page read and write
71C80025C000
trusted library allocation
page read and write
46C6DFB000
stack
page read and write
6BA1000
heap
page read and write
100000
unkown
page readonly
722C0001C000
trusted library allocation
page read and write
542C002BC000
trusted library allocation
page read and write
6BA1000
heap
page read and write
46E65FE000
unkown
page readonly
46E2DFD000
stack
page read and write
722C002C0000
trusted library allocation
page read and write
542C00260000
trusted library allocation
page read and write
2427CF9B000
heap
page read and write
71C800644000
trusted library allocation
page read and write
24203088000
heap
page read and write
722C00308000
trusted library allocation
page read and write
1314000
heap
page read and write
71C8006C8000
trusted library allocation
page read and write
46BFDFD000
stack
page read and write
767B000
heap
page read and write
722C00D4C000
trusted library allocation
page read and write
46E0DFE000
stack
page read and write
71C8006D0000
trusted library allocation
page read and write
542C00288000
trusted library allocation
page read and write
24209BF7000
unclassified section
page read and write
24203093000
heap
page read and write
542C002B0000
trusted library allocation
page read and write
722C0063C000
trusted library allocation
page read and write
6BA1000
heap
page read and write
722C00EB4000
trusted library allocation
page read and write
7684000
heap
page read and write
6BA1000
heap
page read and write
A40000
heap
page read and write
722C01090000
trusted library allocation
page read and write
722C0080C000
trusted library allocation
page read and write
71C800330000
trusted library allocation
page read and write
46D75FE000
unkown
page readonly
840000
heap
page read and write
722C005A1000
trusted library allocation
page read and write
7290000
direct allocation
page execute and read and write
722C00240000
trusted library allocation
page read and write
71C800248000
trusted library allocation
page read and write
722C00E7C000
trusted library allocation
page read and write
46E85FE000
unkown
page readonly
722C00E20000
trusted library allocation
page read and write
24B000290000
direct allocation
page read and write
722C0020C000
trusted library allocation
page read and write
722C006D0000
trusted library allocation
page read and write
6BA1000
heap
page read and write
111000
unkown
page readonly
71C8006B4000
trusted library allocation
page read and write
24B000210000
direct allocation
page read and write
242092A7000
unclassified section
page read and write
722C0052B000
trusted library allocation
page read and write
722C00984000
trusted library allocation
page read and write
19C0000
direct allocation
page read and write
722C00EE4000
trusted library allocation
page read and write
722C00C78000
trusted library allocation
page read and write
722C003D0000
trusted library allocation
page read and write
7623000
heap
page read and write
722C011AC000
trusted library allocation
page read and write
107E000
stack
page read and write
71C80040C000
trusted library allocation
page read and write
71C80035C000
trusted library allocation
page read and write
46C55FE000
unkown
page readonly
7B0000
heap
page read and write
722C000D7000
trusted library allocation
page read and write
19C0000
direct allocation
page read and write
71C800760000
trusted library allocation
page read and write
7564000
heap
page read and write
78E3000
heap
page read and write
722C00490000
trusted library allocation
page read and write
722C003B0000
trusted library allocation
page read and write
722C00250000
trusted library allocation
page read and write
19C0000
direct allocation
page read and write
722C00F70000
trusted library allocation
page read and write
71C800754000
trusted library allocation
page read and write
71C8006B0000
trusted library allocation
page read and write
722C003B0000
trusted library allocation
page read and write
722C00BA8000
trusted library allocation
page read and write
722C008C0000
trusted library allocation
page read and write
ECF000
stack
page read and write
6BA1000
heap
page read and write
46DBDFE000
stack
page read and write
722C0085C000
trusted library allocation
page read and write
722C01048000
trusted library allocation
page read and write
6BA1000
heap
page read and write
24207312000
trusted library allocation
page read and write
7717000
heap
page read and write
542C0020C000
trusted library allocation
page read and write
6BA1000
heap
page read and write
722C010E8000
trusted library allocation
page read and write
71C80035C000
trusted library allocation
page read and write
722C00D5C000
trusted library allocation
page read and write
24209CB0000
trusted library section
page read and write
B5E000
stack
page read and write
722C002D2000
trusted library allocation
page read and write
7567000
heap
page read and write
71C800330000
trusted library allocation
page read and write
722C00A20000
trusted library allocation
page read and write
24201870000
trusted library section
page readonly
1314000
heap
page read and write
71C8006BC000
trusted library allocation
page read and write
46DA5FE000
unkown
page readonly
242092F0000
heap
page read and write
542C00294000
trusted library allocation
page read and write
722C00EE4000
trusted library allocation
page read and write
7560000
heap
page read and write
722C009A8000
trusted library allocation
page read and write
2427CEE0000
heap
page read and write
24209D92000
trusted library section
page read and write
71C800630000
trusted library allocation
page read and write
71C800770000
trusted library allocation
page read and write
722C0077C000
trusted library allocation
page read and write
722C0067C000
trusted library allocation
page read and write
19C0000
direct allocation
page read and write
24203070000
heap
page read and write
46D25FE000
unkown
page readonly
722C00360000
trusted library allocation
page read and write
71C800694000
trusted library allocation
page read and write
722C003B0000
trusted library allocation
page read and write
71C800210000
trusted library allocation
page read and write
722C0056F000
trusted library allocation
page read and write
722C0039C000
trusted library allocation
page read and write
46DDDFD000
stack
page read and write
2420366B000
heap
page read and write
77A7000
heap
page read and write
10E000
unkown
page read and write
2420A070000
trusted library section
page read and write
7290000
direct allocation
page execute and read and write
7717000
heap
page read and write
722C00F34000
trusted library allocation
page read and write
242036B0000
trusted library section
page read and write
242035C6000
heap
page read and write
86C000
stack
page read and write
71C800640000
trusted library allocation
page read and write
722C00F5C000
trusted library allocation
page read and write
722C012A0000
trusted library allocation
page read and write
6BA1000
heap
page read and write
24B0002DC000
direct allocation
page read and write
There are 1100 hidden memdumps, click here to show them.