IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_de576c89c85d95f63177b89249eef622329cc21c_49e505fd_3357012b-afc2-4ce1-8a80-97b8a19367d5\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9493.tmp.dmp
Mini DuMP crash report, 15 streams, Wed Nov 20 06:43:42 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER96D6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9715.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\unmYCIPOHmXNjqOesrEy.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 --field-trial-handle=2288,i,13659262306711728506,10044416239289748957,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7152 -s 1828
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
http://anglebug.com/82295
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
https://www.google.com/es-USx(
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://duckduckgo.com/?q=
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
http://anglebug.com/6876)
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://chrome.google.com/webstore?hl=en/
unknown
https://issuetracker.google.com/161903006
unknown
https://ace-snapper-privately.ngrok-free.app/test/testFailed
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
34.116.198.130
https://clients4.google.com/chrome-sync
unknown
http://html4/loose.dtd
unknown
http://unisolated.invalid/a
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/35022
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
https://google-ohttp-relay-join.fastly-edge.com/hj
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://anglebug.com/7161
unknown
https://drive-autopush.corp.google.com/
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
home.fvtekk5pn.top
34.116.198.130
www.google.com
142.250.185.196
fvtekk5pn.top
34.116.198.130

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
142.250.185.196
www.google.com
United States
34.116.198.130
home.fvtekk5pn.top
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProgramId
malicious
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
FileId
malicious
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LowerCaseLongPath
malicious
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LongPathHash
malicious
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Name
malicious
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
OriginalFileName
malicious
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Publisher
malicious
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Version
malicious
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinFileVersion
malicious
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinaryType
malicious
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductName
malicious
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
ProductVersion
malicious
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
LinkDate
malicious
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
BinProductVersion
malicious
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageFullName
malicious
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
AppxPackageRelativeId
malicious
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Size
malicious
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Language
malicious
\REGISTRY\A\{bb86ec2c-16ce-6b94-6932-e6df1de7d6ea}\Root\InventoryApplicationFile\file.exe|ff8e65d6b06db8e5
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6E31000
heap
page read and write
7AAD000
heap
page read and write
62300023C000
direct allocation
page read and write
70477FE000
unkown
page read and write
3B10000
direct allocation
page execute and read and write
6E31000
heap
page read and write
9F1000
unkown
page execute read
12F0000
heap
page read and write
197C02420000
trusted library allocation
page read and write
17358F5B000
heap
page read and write
7C29000
heap
page read and write
F50000
heap
page read and write
17358F6D000
heap
page read and write
17358F73000
heap
page read and write
7AA0000
heap
page read and write
17358F4C000
heap
page read and write
197C022E0000
trusted library allocation
page read and write
197C031F4000
trusted library allocation
page read and write
197C02C24000
trusted library allocation
page read and write
F40000
direct allocation
page read and write
1735F356000
trusted library section
page read and write
7862000
direct allocation
page read and write
9F0000
unkown
page readonly
706FFFE000
unkown
page readonly
197C02410000
trusted library allocation
page read and write
173578C0000
heap
page read and write
17358F5F000
heap
page read and write
67A000
stack
page read and write
197C02550000
trusted library allocation
page read and write
17358F73000
heap
page read and write
197C03250000
trusted library allocation
page read and write
70487FF000
stack
page read and write
17355840000
heap
page read and write
7AA9000
heap
page read and write
197C023C4000
trusted library allocation
page read and write
3B10000
direct allocation
page execute and read and write
17358F52000
heap
page read and write
7AA1000
heap
page read and write
7D4B000
heap
page read and write
197C00C01000
trusted library allocation
page read and write
17358F6C000
heap
page read and write
17358F5B000
heap
page read and write
17358F65000
heap
page read and write
17358F6C000
heap
page read and write
17358F5F000
heap
page read and write
704FFFE000
unkown
page readonly
6E31000
heap
page read and write
8F4000
heap
page read and write
17358F5B000
heap
page read and write
17358F5F000
heap
page read and write
31C800664000
trusted library allocation
page read and write
197C02613000
trusted library allocation
page read and write
17358F6C000
heap
page read and write
17358F5B000
heap
page read and write
17355978000
heap
page read and write
7884002C0000
trusted library allocation
page read and write
9FA000
unkown
page readonly
788400201000
trusted library allocation
page read and write
197C02DB0000
trusted library allocation
page read and write
17358F6D000
heap
page read and write
7059FFE000
unkown
page readonly
7AA8000
heap
page read and write
17358F4F000
heap
page read and write
705CFFE000
unkown
page readonly
17358F6D000
heap
page read and write
17358F5F000
heap
page read and write
F40000
direct allocation
page read and write
197C02BDB000
trusted library allocation
page read and write
197C03150000
trusted library allocation
page read and write
31C800320000
trusted library allocation
page read and write
7068FFE000
unkown
page readonly
6E31000
heap
page read and write
197C0238C000
trusted library allocation
page read and write
197C02F3C000
trusted library allocation
page read and write
1735F3BE000
trusted library section
page read and write
705D7FB000
stack
page read and write
17358F73000
heap
page read and write
17358F5F000
heap
page read and write
9F0000
unkown
page readonly
7B84000
heap
page read and write
197C025EC000
trusted library allocation
page read and write
197C02FE0000
trusted library allocation
page read and write
31C800754000
trusted library allocation
page read and write
197C023E8000
trusted library allocation
page read and write
31C800390000
trusted library allocation
page read and write
7BB3000
heap
page read and write
17358F49000
heap
page read and write
17358F4A000
heap
page read and write
70617FC000
stack
page read and write
1A80000
heap
page read and write
173559B3000
heap
page read and write
31C800784000
trusted library allocation
page read and write
7E76000
heap
page read and write
197C02BE4000
trusted library allocation
page read and write
17358F97000
heap
page read and write
197C02CC8000
trusted library allocation
page read and write
6E31000
heap
page read and write
1735FE51000
trusted library section
page read and write
7064FFE000
unkown
page readonly
17358F69000
heap
page read and write
E0F000
stack
page read and write
1735F2BE000
trusted library section
page read and write
31C800750000
trusted library allocation
page read and write
197C02A0F000
trusted library allocation
page read and write
6E31000
heap
page read and write
17358F64000
heap
page read and write
17358F73000
heap
page read and write
17358F6D000
heap
page read and write
197C031E0000
trusted library allocation
page read and write
17359650000
trusted library section
page read and write
197C023B4000
trusted library allocation
page read and write
17358F56000
heap
page read and write
79BB000
direct allocation
page read and write
9F0000
unkown
page readonly
7B68000
heap
page read and write
197C0328C000
trusted library allocation
page read and write
197C03150000
trusted library allocation
page read and write
197C0315C000
trusted library allocation
page read and write
3B10000
direct allocation
page execute and read and write
7C68000
heap
page read and write
7BCA000
heap
page read and write
197C02801000
trusted library allocation
page read and write
31C8006D0000
trusted library allocation
page read and write
31C800320000
trusted library allocation
page read and write
17358F56000
heap
page read and write
3B10000
direct allocation
page execute and read and write
197C03108000
trusted library allocation
page read and write
7884002B0000
trusted library allocation
page read and write
7E0000
heap
page read and write
A4A000
heap
page read and write
17359474000
heap
page read and write
17358F70000
heap
page read and write
9D0000
heap
page read and write
197C02C68000
trusted library allocation
page read and write
17358F4A000
heap
page read and write
137E000
stack
page read and write
1735FB0E000
trusted library section
page read and write
17358F20000
heap
page read and write
197C02864000
trusted library allocation
page read and write
788400270000
trusted library allocation
page read and write
197C02F08000
trusted library allocation
page read and write
7884002A0000
trusted library allocation
page read and write
70537FE000
stack
page read and write
197C02240000
trusted library allocation
page read and write
6E31000
heap
page read and write
197C028E4000
trusted library allocation
page read and write
197C032B8000
trusted library allocation
page read and write
7AA6000
heap
page read and write
17358F59000
heap
page read and write
197C02278000
trusted library allocation
page read and write
1735F2A0000
trusted library section
page read and write
197C02283000
trusted library allocation
page read and write
62300020C000
direct allocation
page read and write
7C3D000
heap
page read and write
17358F73000
heap
page read and write
17358F4D000
heap
page read and write
31C8002CC000
trusted library allocation
page read and write
197C03234000
trusted library allocation
page read and write
197C025DC000
trusted library allocation
page read and write
17358F59000
heap
page read and write
9FA000
unkown
page readonly
197C02418000
trusted library allocation
page read and write
7884002B0000
trusted library allocation
page read and write
17358F6D000
heap
page read and write
197C02E44000
trusted library allocation
page read and write
6E31000
heap
page read and write
7AAF000
heap
page read and write
17358F4E000
heap
page read and write
197C03218000
trusted library allocation
page read and write
31C800730000
trusted library allocation
page read and write
17358F5F000
heap
page read and write
9FA000
unkown
page readonly
17358F5B000
heap
page read and write
17358F5B000
heap
page read and write
197C02CE8000
trusted library allocation
page read and write
70697FD000
stack
page read and write
197C02550000
trusted library allocation
page read and write
17358F5F000
heap
page read and write
1735FDC0000
trusted library section
page read and write
197C02894000
trusted library allocation
page read and write
31C800238000
trusted library allocation
page read and write
197C023B4000
trusted library allocation
page read and write
6E31000
heap
page read and write
197C026E0000
trusted library allocation
page read and write
17358F56000
heap
page read and write
6E31000
heap
page read and write
17358F5B000
heap
page read and write
17358F5B000
heap
page read and write
31C800374000
trusted library allocation
page read and write
197C025DC000
trusted library allocation
page read and write
17358F73000
heap
page read and write
197C023B4000
trusted library allocation
page read and write
F40000
direct allocation
page read and write
197C02D34000
trusted library allocation
page read and write
197C030A3000
trusted library allocation
page read and write
6E31000
heap
page read and write
17358F9F000
heap
page read and write
197C02230000
trusted library allocation
page read and write
A01000
unkown
page readonly
F40000
direct allocation
page read and write
3B10000
direct allocation
page execute and read and write
197C02510000
trusted library allocation
page read and write
197C02AD8000
trusted library allocation
page read and write
9F1000
unkown
page execute read
17358F5F000
heap
page read and write
197C02EA8000
trusted library allocation
page read and write
17358F5F000
heap
page read and write
17358F56000
heap
page read and write
197C02684000
trusted library allocation
page read and write
7067FFE000
unkown
page readonly
197C029A4000
trusted library allocation
page read and write
6E31000
heap
page read and write
197C028C5000
trusted library allocation
page read and write
197C03044000
trusted library allocation
page read and write
17358F6C000
heap
page read and write
31C8006D4000
trusted library allocation
page read and write
31C8003EC000
trusted library allocation
page read and write
17359390000
trusted library section
page read and write
17358F30000
heap
page read and write
7884002C8000
trusted library allocation
page read and write
197C02F68000
trusted library allocation
page read and write
6E31000
heap
page read and write
7BBB000
heap
page read and write
197C024F3000
trusted library allocation
page read and write
197C02544000
trusted library allocation
page read and write
197C02C98000
trusted library allocation
page read and write
70567FD000
stack
page read and write
704E7FB000
stack
page read and write
17358F5F000
heap
page read and write
197C023EC000
trusted library allocation
page read and write
788400260000
trusted library allocation
page read and write
7C0E000
heap
page read and write
70737FE000
stack
page read and write
197C03058000
trusted library allocation
page read and write
7AA6000
heap
page read and write
17358FB0000
heap
page read and write
197C03224000
trusted library allocation
page read and write
7BE4000
heap
page read and write
17358F5F000
heap
page read and write
197C02DC4000
trusted library allocation
page read and write
17358F4F000
heap
page read and write
623000210000
direct allocation
page read and write
623000274000
direct allocation
page read and write
7B35000
heap
page read and write
197C02910000
trusted library allocation
page read and write
6230002E4000
direct allocation
page read and write
31C8002D4000
trusted library allocation
page read and write
17358F5F000
heap
page read and write
197C02F08000
trusted library allocation
page read and write
A01000
unkown
page readonly
6C20C000
unkown
page readonly
1735FB00000
trusted library section
page read and write
1CC0000
direct allocation
page execute and read and write
197C0227E000
trusted library allocation
page read and write
8F4000
heap
page read and write
197C02C3C000
trusted library allocation
page read and write
705B7FB000
stack
page read and write
1735F157000
unclassified section
page read and write
31C8002FC000
trusted library allocation
page read and write
623000230000
direct allocation
page read and write
8F4000
heap
page read and write
197C02B94000
trusted library allocation
page read and write
705DFFE000
unkown
page readonly
7AAE000
heap
page read and write
7884002F0000
trusted library allocation
page read and write
6E31000
heap
page read and write
17358F73000
heap
page read and write
31C800401000
trusted library allocation
page read and write
7884002BC000
trusted library allocation
page read and write
623000217000
direct allocation
page read and write
6E31000
heap
page read and write
197C0300C000
trusted library allocation
page read and write
197C0255C000
trusted library allocation
page read and write
7E97000
heap
page read and write
17358F5F000
heap
page read and write
173558E0000
heap
page read and write
1735F7B0000
trusted library section
page read and write
9FA000
unkown
page readonly
197C02BA0000
trusted library allocation
page read and write
70467EF000
stack
page read and write
197C02FF8000
trusted library allocation
page read and write
17358F5F000
heap
page read and write
17358F69000
heap
page read and write
7B43000
heap
page read and write
70637FD000
stack
page read and write
1735FE40000
trusted library section
page read and write
705EFFE000
unkown
page readonly
7B5A000
heap
page read and write
7C0C000
heap
page read and write
197C027DC000
trusted library allocation
page read and write
7B6A000
heap
page read and write
197C03030000
trusted library allocation
page read and write
197C02FC0000
trusted library allocation
page read and write
7884002A0000
trusted library allocation
page read and write
31C800644000
trusted library allocation
page read and write
7C4D000
heap
page read and write
31C800640000
trusted library allocation
page read and write
17358F5F000
heap
page read and write
31C8007D0000
trusted library allocation
page read and write
706AFFE000
unkown
page readonly
173594A6000
heap
page read and write
17358F7B000
heap
page read and write
7075FFE000
unkown
page readonly
3B10000
direct allocation
page execute and read and write
8F4000
heap
page read and write
17358F64000
heap
page read and write
197C03201000
trusted library allocation
page read and write
133E000
stack
page read and write
7DD5000
heap
page read and write
1735F120000
heap
page read and write
17358F56000
heap
page read and write
7AA5000
heap
page read and write
17358F74000
heap
page read and write
9F1000
unkown
page execute read
197C02F08000
trusted library allocation
page read and write
173559CF000
heap
page read and write
7BEA000
heap
page read and write
197C02D20000
trusted library allocation
page read and write
197C0229F000
trusted library allocation
page read and write
17358F59000
heap
page read and write
17358F4D000
heap
page read and write
197C0234C000
trusted library allocation
page read and write
7B71000
heap
page read and write
7AA1000
heap
page read and write
7AA1000
heap
page read and write
31C800380000
trusted library allocation
page read and write
197C0276C000
trusted library allocation
page read and write
31C80039C000
trusted library allocation
page read and write
197C02570000
trusted library allocation
page read and write
6E31000
heap
page read and write
197C02A7C000
trusted library allocation
page read and write
197C02580000
trusted library allocation
page read and write
173594C7000
heap
page read and write
17358F73000
heap
page read and write
197C0301C000
trusted library allocation
page read and write
623000303000
direct allocation
page read and write
197C0260C000
trusted library allocation
page read and write
17358F6D000
heap
page read and write
197C02530000
trusted library allocation
page read and write
17358F4F000
heap
page read and write
17358F69000
heap
page read and write
31C80078C000
trusted library allocation
page read and write
17358F5B000
heap
page read and write
7058FFE000
unkown
page readonly
17358F6D000
heap
page read and write
17358F4D000
heap
page read and write
197C027B8000
trusted library allocation
page read and write
1735FFBE000
trusted library section
page read and write
197C024B4000
trusted library allocation
page read and write
7AA9000
heap
page read and write
31C8006E0000
trusted library allocation
page read and write
17355810000
heap
page read and write
197C02F2C000
trusted library allocation
page read and write
5F0000
heap
page read and write
17358F73000
heap
page read and write
7B93000
heap
page read and write
17358F5B000
heap
page read and write
F40000
direct allocation
page read and write
17358F69000
heap
page read and write
704AFFE000
unkown
page readonly
197C02FA4000
trusted library allocation
page read and write
197C031B4000
trusted library allocation
page read and write
1735F372000
trusted library section
page read and write
197C026BC000
trusted library allocation
page read and write
31C800418000
trusted library allocation
page read and write
197C02EF8000
trusted library allocation
page read and write
197C02288000
trusted library allocation
page read and write
17358F5F000
heap
page read and write
173594FC000
heap
page read and write
197C0280C000
trusted library allocation
page read and write
17358F51000
heap
page read and write
31C80060C000
trusted library allocation
page read and write
3B10000
direct allocation
page execute and read and write
6E31000
heap
page read and write
7D72000
heap
page read and write
197C00A01000
trusted library allocation
page read and write
197C032C8000
trusted library allocation
page read and write
8F4000
heap
page read and write
31C800678000
trusted library allocation
page read and write
31C800288000
trusted library allocation
page read and write
17358F4F000
heap
page read and write
17358F97000
heap
page read and write
6E31000
heap
page read and write
197C02494000
trusted library allocation
page read and write
11FC000
stack
page read and write
17358F5F000
heap
page read and write
197C0315C000
trusted library allocation
page read and write
197C02318000
trusted library allocation
page read and write
706F7FD000
stack
page read and write
17358F4D000
heap
page read and write
6E31000
heap
page read and write
17358F5F000
heap
page read and write
31C8006B4000
trusted library allocation
page read and write
31C8006F0000
trusted library allocation
page read and write
F61000
unkown
page execute and write copy
197C02528000
trusted library allocation
page read and write
17358F4F000
heap
page read and write
31C8002B8000
trusted library allocation
page read and write
173558C0000
trusted library section
page readonly
197C0306C000
trusted library allocation
page read and write
9F1000
unkown
page execute read
7884002C0000
trusted library allocation
page read and write
17358F56000
heap
page read and write
17358F5F000
heap
page read and write
31C800601000
trusted library allocation
page read and write
7DAE000
heap
page read and write
17358F56000
heap
page read and write
17358F73000
heap
page read and write
197C02A54000
trusted library allocation
page read and write
197C02ECC000
trusted library allocation
page read and write
1D33000
heap
page read and write
31C8006E8000
trusted library allocation
page read and write
6E31000
heap
page read and write
3B10000
direct allocation
page execute and read and write
197C028DC000
trusted library allocation
page read and write
17358F5F000
heap
page read and write
197C03150000
trusted library allocation
page read and write
17358F5F000
heap
page read and write
17358F69000
heap
page read and write
7AA9000
heap
page read and write
17358F65000
heap
page read and write
1CD0000
direct allocation
page execute and read and write
7AAA000
heap
page read and write
197C02628000
trusted library allocation
page read and write
7AAF000
heap
page read and write
788400230000
trusted library allocation
page read and write
17358F56000
heap
page read and write
173592F0000
trusted library section
page read and write
19F4000
unkown
page execute and write copy
173594E3000
heap
page read and write
6E31000
heap
page read and write
197C031BC000
trusted library allocation
page read and write
197C024A4000
trusted library allocation
page read and write
7C44000
heap
page read and write
7884002E4000
trusted library allocation
page read and write
9F1000
unkown
page execute read
17358F54000
heap
page read and write
F40000
direct allocation
page read and write
197C028C8000
trusted library allocation
page read and write
197C02F48000
trusted library allocation
page read and write
197C03090000
trusted library allocation
page read and write
197C02498000
trusted library allocation
page read and write
7AAB000
heap
page read and write
197C02E90000
trusted library allocation
page read and write
17358F5B000
heap
page read and write
197C0253C000
trusted library allocation
page read and write
197C023B4000
trusted library allocation
page read and write
31C800220000
trusted library allocation
page read and write
1510000
heap
page read and write
623000220000
direct allocation
page read and write
17358F6E000
heap
page read and write
706D7FE000
stack
page read and write
197C026F0000
trusted library allocation
page read and write
173594CF000
heap
page read and write
7AAA000
heap
page read and write
17355880000
trusted library allocation
page read and write
8F4000
heap
page read and write
C0F000
stack
page read and write
9F1000
unkown
page execute read
197C02EF8000
trusted library allocation
page read and write
7AA7000
heap
page read and write
197C02C2C000
trusted library allocation
page read and write
1CB0000
direct allocation
page read and write
197C0220C000
trusted library allocation
page read and write
17358F6D000
heap
page read and write
17358FB1000
heap
page read and write
7AA5000
heap
page read and write
1735D94E000
heap
page read and write
31C800734000
trusted library allocation
page read and write
17358F5F000
heap
page read and write
77A1000
heap
page read and write
6E31000
heap
page read and write
17358F62000
heap
page read and write
7DFD000
heap
page read and write
9FE000
unkown
page read and write
17358F56000
heap
page read and write
7CE000
unkown
page read and write
197C027EC000
trusted library allocation
page read and write
70717FC000
stack
page read and write
6C1BF000
unkown
page readonly
7AA4000
heap
page read and write
197C02394000
trusted library allocation
page read and write
17358F5B000
heap
page read and write
17358F6D000
heap
page read and write
197C03050000
trusted library allocation
page read and write
197C031C8000
trusted library allocation
page read and write
704BFFE000
unkown
page readonly
17358F6D000
heap
page read and write
197C0253C000
trusted library allocation
page read and write
9FA000
unkown
page readonly
17358F56000
heap
page read and write
17359499000
heap
page read and write
7AA0000
heap
page read and write
A01000
unkown
page readonly
17355890000
trusted library allocation
page read and write
6E31000
heap
page read and write
A01000
unkown
page readonly
9F0000
unkown
page readonly
197C023AC000
trusted library allocation
page read and write
7BD7000
heap
page read and write
7C8A000
heap
page read and write
197C028D0000
trusted library allocation
page read and write
197C032B4000
trusted library allocation
page read and write
19D0000
heap
page read and write
197C026E8000
trusted library allocation
page read and write
9FE000
unkown
page write copy
173594B6000
heap
page read and write
1735FF22000
trusted library section
page read and write
623000280000
direct allocation
page read and write
197C02CB4000
trusted library allocation
page read and write
197C03118000
trusted library allocation
page read and write
1735FE63000
trusted library section
page read and write
17358F5E000
heap
page read and write
6C1BD000
unkown
page read and write
17358F74000
heap
page read and write
197C02500000
trusted library allocation
page read and write
17358F6D000
heap
page read and write
17358F6D000
heap
page read and write
79E000
stack
page read and write
197C030BC000
trusted library allocation
page read and write
17358F5C000
heap
page read and write
31C800620000
trusted library allocation
page read and write
197C023D8000
trusted library allocation
page read and write
17358F74000
heap
page read and write
17358F5F000
heap
page read and write
17358F6D000
heap
page read and write
17358F5F000
heap
page read and write
17358F73000
heap
page read and write
197C02544000
trusted library allocation
page read and write
31C8002B0000
trusted library allocation
page read and write
17358F4F000
heap
page read and write
31C800718000
trusted library allocation
page read and write
197C02EBC000
trusted library allocation
page read and write
31C800320000
trusted library allocation
page read and write
31C800201000
trusted library allocation
page read and write
62300024C000
direct allocation
page read and write
7070FFE000
unkown
page readonly
197C023AC000
trusted library allocation
page read and write
197C028F8000
trusted library allocation
page read and write
197C02E01000
trusted library allocation
page read and write
7051FFE000
unkown
page readonly
1735F313000
trusted library section
page read and write
6230002D0000
direct allocation
page read and write
6E31000
heap
page read and write
8F4000
heap
page read and write
7C6D000
heap
page read and write
1735F3F3000
trusted library section
page read and write
7056FFE000
unkown
page readonly
17358F5C000
heap
page read and write
17358F4F000
heap
page read and write
197C0291C000
trusted library allocation
page read and write
17358F6C000
heap
page read and write
17358F6E000
heap
page read and write
72B0000
direct allocation
page read and write
6E31000
heap
page read and write
9F0000
unkown
page readonly
197C02401000
trusted library allocation
page read and write
17358F5B000
heap
page read and write
31C800684000
trusted library allocation
page read and write
17358F6D000
heap
page read and write
70757FE000
stack
page read and write
17355820000
heap
page readonly
31C800424000
trusted library allocation
page read and write
6E31000
heap
page read and write
3B00000
direct allocation
page execute and read and write
197C02F60000
trusted library allocation
page read and write
197C030A4000
trusted library allocation
page read and write
17358F74000
heap
page read and write
1735F2B2000
trusted library section
page read and write
70527FC000
stack
page read and write
17358F5C000
heap
page read and write
17358F5F000
heap
page read and write
197C0315C000
trusted library allocation
page read and write
77A1000
heap
page read and write
31C8006FC000
trusted library allocation
page read and write
7B6B000
heap
page read and write
197C02878000
trusted library allocation
page read and write
31C800310000
trusted library allocation
page read and write
704CFFE000
unkown
page readonly
17358F73000
heap
page read and write
197C029B8000
trusted library allocation
page read and write
17358F65000
heap
page read and write
197C0288C000
trusted library allocation
page read and write
7060FFE000
unkown
page readonly
197C024BA000
trusted library allocation
page read and write
6E31000
heap
page read and write
3B10000
direct allocation
page execute and read and write
197C0281C000
trusted library allocation
page read and write
17358F5B000
heap
page read and write
6230002AC000
direct allocation
page read and write
704B7FE000
stack
page read and write
197C02BD0000
trusted library allocation
page read and write
197C02414000
trusted library allocation
page read and write
788400220000
trusted library allocation
page read and write
17358F97000
heap
page read and write
197C028E1000
trusted library allocation
page read and write
3B10000
direct allocation
page execute and read and write
9FE000
unkown
page write copy
7B3E000
heap
page read and write
197C02E80000
trusted library allocation
page read and write
7049FFE000
unkown
page readonly
7055FFE000
unkown
page readonly
788400278000
trusted library allocation
page read and write
8CF000
stack
page read and write
17358F77000
heap
page read and write
17358F5B000
heap
page read and write
197C02530000
trusted library allocation
page read and write
F40000
direct allocation
page read and write
980000
heap
page read and write
17358F73000
heap
page read and write
A01000
unkown
page readonly
31C800248000
trusted library allocation
page read and write
17358F73000
heap
page read and write
17358F5F000
heap
page read and write
17358F62000
heap
page read and write
78840020C000
trusted library allocation
page read and write
17358F5F000
heap
page read and write
9FE000
unkown
page read and write
7AA0000
heap
page read and write
1100000
heap
page read and write
7062FFE000
unkown
page readonly
188F000
stack
page read and write
197C00001000
trusted library allocation
page read and write
A40000
heap
page read and write
1735F3B2000
trusted library section
page read and write
7AAC000
heap
page read and write
705A7FC000
stack
page read and write
197C02E1C000
trusted library allocation
page read and write
6E31000
heap
page read and write
197C023C8000
trusted library allocation
page read and write
1735FDD1000
trusted library section
page read and write
17358F69000
heap
page read and write
7884002C0000
trusted library allocation
page read and write
6E31000
heap
page read and write
17358F5B000
heap
page read and write
1735F0D0000
heap
page read and write
623000201000
direct allocation
page read and write
31C800624000
trusted library allocation
page read and write
197C023F8000
trusted library allocation
page read and write
1735FAB7000
unclassified section
page read and write
31C800760000
trusted library allocation
page read and write
197C02CD8000
trusted library allocation
page read and write
7065FFE000
unkown
page readonly
197C0220C000
trusted library allocation
page read and write
17358F5F000
heap
page read and write
FF0000
heap
page read and write
7A0000
heap
page read and write
17358F5B000
heap
page read and write
197C02E80000
trusted library allocation
page read and write
197C024E0000
trusted library allocation
page read and write
197C02A0C000
trusted library allocation
page read and write
197C02328000
trusted library allocation
page read and write
6C0E0000
unkown
page readonly
75E000
stack
page read and write
788400264000
trusted library allocation
page read and write
17358F5A000
heap
page read and write
197C0296C000
trusted library allocation
page read and write
173559C9000
heap
page read and write
9FE000
unkown
page write copy
840000
heap
page read and write
197C02B14000
trusted library allocation
page read and write
7071FFE000
unkown
page readonly
6E31000
heap
page read and write
197C022D0000
trusted library allocation
page read and write
623000250000
direct allocation
page read and write
197C032A4000
trusted library allocation
page read and write
197C024FB000
trusted library allocation
page read and write
9F1000
unkown
page execute read
197C02C78000
trusted library allocation
page read and write
706EFFE000
unkown
page readonly
B10000
heap
page read and write
17358F73000
heap
page read and write
3B10000
direct allocation
page execute and read and write
8F4000
heap
page read and write
7AA6000
heap
page read and write
7BEE000
heap
page read and write
197C0249C000
trusted library allocation
page read and write
7C9F000
heap
page read and write
7B84000
heap
page read and write
70597FE000
stack
page read and write
197C022F0000
trusted library allocation
page read and write
197C027A4000
trusted library allocation
page read and write
7047FFE000
unkown
page readonly
197C023F4000
trusted library allocation
page read and write
17358F4F000
heap
page read and write
7884002B0000
trusted library allocation
page read and write
17358F74000
heap
page read and write
31C800310000
trusted library allocation
page read and write
197C02DB8000
trusted library allocation
page read and write
1CB0000
direct allocation
page read and write
17358F56000
heap
page read and write
197C024F0000
trusted library allocation
page read and write
197C02E75000
trusted library allocation
page read and write
6E31000
heap
page read and write
31C80069C000
trusted library allocation
page read and write
7884002F4000
trusted library allocation
page read and write
17358F58000
heap
page read and write
197C02D94000
trusted library allocation
page read and write
9FA000
unkown
page readonly
7884002A0000
trusted library allocation
page read and write
197C02B34000
trusted library allocation
page read and write
17358F5B000
heap
page read and write
7074FFE000
unkown
page readonly
70517FB000
stack
page read and write
197C0316C000
trusted library allocation
page read and write
17358F5F000
heap
page read and write
788400250000
trusted library allocation
page read and write
173559C9000
heap
page read and write
3B10000
direct allocation
page execute and read and write
704C7FD000
stack
page read and write
197C0277C000
trusted library allocation
page read and write
197C0226C000
trusted library allocation
page read and write
31C800714000
trusted library allocation
page read and write
7BC6000
heap
page read and write
197C00E01000
trusted library allocation
page read and write
78A1000
heap
page read and write
1735D4D0000
trusted library allocation
page read and write
197C02858000
trusted library allocation
page read and write
17358F74000
heap
page read and write
197C0309C000
trusted library allocation
page read and write
7B6A000
heap
page read and write
197C02201000
trusted library allocation
page read and write
197C02D9C000
trusted library allocation
page read and write
17358F6D000
heap
page read and write
17358F65000
heap
page read and write
7061FFE000
unkown
page readonly
197C02C0C000
trusted library allocation
page read and write
17358F5B000
heap
page read and write
197C02D44000
trusted library allocation
page read and write
5FC000
stack
page read and write
623000294000
direct allocation
page read and write
7AA5000
heap
page read and write
31C8006B0000
trusted library allocation
page read and write
706E7FE000
stack
page read and write
17358F5F000
heap
page read and write
197C02504000
trusted library allocation
page read and write
17358F5F000
heap
page read and write
6E31000
heap
page read and write
197C023F0000
trusted library allocation
page read and write
7884002A0000
trusted library allocation
page read and write
197C0251C000
trusted library allocation
page read and write
623000260000
direct allocation
page read and write
7C37000
heap
page read and write
31C800320000
trusted library allocation
page read and write
31C800354000
trusted library allocation
page read and write
17358F76000
heap
page read and write
17358F4E000
heap
page read and write
706DFFE000
unkown
page readonly
197C03084000
trusted library allocation
page read and write
6E31000
heap
page read and write
7AAB000
heap
page read and write
17358F73000
heap
page read and write
705F7FB000
stack
page read and write
623000270000
direct allocation
page read and write
197C03001000
trusted library allocation
page read and write
1735950E000
heap
page read and write
88E000
stack
page read and write
31C80027C000
trusted library allocation
page read and write
31C800610000
trusted library allocation
page read and write
6230002A8000
direct allocation
page read and write
197C03140000
trusted library allocation
page read and write
1735FAF7000
unclassified section
page read and write
197C030B0000
trusted library allocation
page read and write
17358F5F000
heap
page read and write
940000
heap
page read and write
31C8006E4000
trusted library allocation
page read and write
640000
heap
page read and write
17358F59000
heap
page read and write
1735B064000
trusted library allocation
page read and write
197C02B20000
trusted library allocation
page read and write
7C3F000
heap
page read and write
31C8006AC000
trusted library allocation
page read and write
197C03100000
trusted library allocation
page read and write
17358F6D000
heap
page read and write
6E31000
heap
page read and write
70707FA000
stack
page read and write
70727FE000
stack
page read and write
197C02FF0000
trusted library allocation
page read and write
31C80080C000
trusted library allocation
page read and write
17358F4B000
heap
page read and write
6E31000
heap
page read and write
197C02E44000
trusted library allocation
page read and write
9F0000
unkown
page readonly
197C0260F000
trusted library allocation
page read and write
197C0235C000
trusted library allocation
page read and write
17358F5F000
heap
page read and write
9FA000
unkown
page readonly
17358F4F000
heap
page read and write
7AAF000
heap
page read and write
17358F4E000
heap
page read and write
197C02B54000
trusted library allocation
page read and write
70627FE000
stack
page read and write
31C80025C000
trusted library allocation
page read and write
197C025DC000
trusted library allocation
page read and write
17358F6D000
heap
page read and write
1735D98D000
heap
page read and write
9FE000
unkown
page read and write
197C02790000
trusted library allocation
page read and write
1735FFB0000
trusted library section
page read and write
7884002BC000
trusted library allocation
page read and write
1735FE30000
trusted library section
page read and write
31C800698000
trusted library allocation
page read and write
17358F5F000
heap
page read and write
17358F56000
heap
page read and write
623000290000
direct allocation
page read and write
17358F73000
heap
page read and write
7884002BC000
trusted library allocation
page read and write
1735FDE0000
trusted library section
page read and write
17358F5F000
heap
page read and write
704F7FE000
stack
page read and write
17358F4F000
heap
page read and write
1D37000
heap
page read and write
1735FF60000
trusted library section
page read and write
197C02E8C000
trusted library allocation
page read and write
6C0E1000
unkown
page execute read
197C02F20000
trusted library allocation
page read and write
DC0000
heap
page read and write
17358F73000
heap
page read and write
17358F56000
heap
page read and write
704D7FB000
stack
page read and write
17358F5F000
heap
page read and write
197C02580000
trusted library allocation
page read and write
197C02EE0000
trusted library allocation
page read and write
17358F73000
heap
page read and write
A01000
unkown
page readonly
17358F4C000
heap
page read and write
3B10000
direct allocation
page execute and read and write
197C02494000
trusted library allocation
page read and write
788400248000
trusted library allocation
page read and write
197C02550000
trusted library allocation
page read and write
17358FB1000
heap
page read and write
7AA6000
heap
page read and write
197C02D88000
trusted library allocation
page read and write
197C03284000
trusted library allocation
page read and write
197C02910000
trusted library allocation
page read and write
FA0000
heap
page read and write
197C0302C000
trusted library allocation
page read and write
7AAE000
heap
page read and write
1735947F000
heap
page read and write
6C209000
unkown
page read and write
810000
heap
page read and write
197C02BAC000
trusted library allocation
page read and write
3B10000
direct allocation
page execute and read and write
706BFFE000
unkown
page readonly
7884002BC000
trusted library allocation
page read and write
6E31000
heap
page read and write
1735F37D000
trusted library section
page read and write
17358F5B000
heap
page read and write
6E31000
heap
page read and write
1EC000
stack
page read and write
197C0253C000
trusted library allocation
page read and write
17358F6A000
heap
page read and write
706C7FE000
stack
page read and write
706CFFE000
unkown
page readonly
705FFFE000
unkown
page readonly
197C029AC000
trusted library allocation
page read and write
17358F56000
heap
page read and write
17358F5B000
heap
page read and write
197C02E40000
trusted library allocation
page read and write
17358F73000
heap
page read and write
31C8002E4000
trusted library allocation
page read and write
197C02494000
trusted library allocation
page read and write
17358F75000
heap
page read and write
17358F6D000
heap
page read and write
197C02AEC000
trusted library allocation
page read and write
70497FE000
stack
page read and write
197C02550000
trusted library allocation
page read and write
6E31000
heap
page read and write
70647FB000
stack
page read and write
197C02494000
trusted library allocation
page read and write
70577FA000
stack
page read and write
6E31000
heap
page read and write
197C030C0000
trusted library allocation
page read and write
17358F5F000
heap
page read and write
197C02A40000
trusted library allocation
page read and write
197C02EBC000
trusted library allocation
page read and write
31C8006B8000
trusted library allocation
page read and write
197C02490000
trusted library allocation
page read and write
197C02504000
trusted library allocation
page read and write
17358F76000
heap
page read and write
17358F73000
heap
page read and write
788400288000
trusted library allocation
page read and write
17358F65000
heap
page read and write
3B10000
direct allocation
page execute and read and write
17358F5D000
heap
page read and write
7052FFE000
unkown
page readonly
197C029F8000
trusted library allocation
page read and write
17358F6A000
heap
page read and write
17358F56000
heap
page read and write
197C03078000
trusted library allocation
page read and write
8F4000
heap
page read and write
31C800700000
trusted library allocation
page read and write
197C02580000
trusted library allocation
page read and write
197C02334000
trusted library allocation
page read and write
17358F56000
heap
page read and write
31C800694000
trusted library allocation
page read and write
197C023E0000
trusted library allocation
page read and write
63D000
stack
page read and write
197C0242C000
trusted library allocation
page read and write
F40000
direct allocation
page read and write
7C7D000
heap
page read and write
17358F73000
heap
page read and write
788400274000
trusted library allocation
page read and write
80E000
unkown
page read and write
9F0000
unkown
page readonly
31C800801000
trusted library allocation
page read and write
7066FFE000
unkown
page readonly
17358F6A000
heap
page read and write
17358F56000
heap
page read and write
17358F59000
heap
page read and write
623000234000
direct allocation
page read and write
168F000
stack
page read and write
1735D985000
heap
page read and write
197C03190000
trusted library allocation
page read and write
17355C35000
heap
page read and write
197C02938000
trusted library allocation
page read and write
70587FE000
stack
page read and write
197C024F0000
trusted library allocation
page read and write
17358F6A000
heap
page read and write
31C800368000
trusted library allocation
page read and write
31C8006CC000
trusted library allocation
page read and write
17358F5F000
heap
page read and write
17358F7F000
heap
page read and write
7C61000
heap
page read and write
9F0000
unkown
page readonly
197C01001000
trusted library allocation
page read and write
197C023D4000
trusted library allocation
page read and write
197C02C01000
trusted library allocation
page read and write
7063FFE000
unkown
page readonly
197C028EC000
trusted library allocation
page read and write
14D0000
heap
page read and write
17358F54000
heap
page read and write
17358F5F000
heap
page read and write
1398000
heap
page read and write
17358F4F000
heap
page read and write
6E31000
heap
page read and write
197C029C8000
trusted library allocation
page read and write
17358F49000
heap
page read and write
7884002BC000
trusted library allocation
page read and write
17358F5F000
heap
page read and write
197C0289C000
trusted library allocation
page read and write
31C800330000
trusted library allocation
page read and write
17358F5B000
heap
page read and write
7B5D000
heap
page read and write
17358F5F000
heap
page read and write
197C0320C000
trusted library allocation
page read and write
197C00801000
trusted library allocation
page read and write
197C02580000
trusted library allocation
page read and write
197C02F10000
trusted library allocation
page read and write
17358F73000
heap
page read and write
8F4000
heap
page read and write
31C8002F4000
trusted library allocation
page read and write
197C022A8000
trusted library allocation
page read and write
31C800364000
trusted library allocation
page read and write
31C800404000
trusted library allocation
page read and write
7BF7000
heap
page read and write
17358F4F000
heap
page read and write
7AA0000
heap
page read and write
197C024A8000
trusted library allocation
page read and write
17358F5F000
heap
page read and write
31C80075C000
trusted library allocation
page read and write
17358F73000
heap
page read and write
1735FDFE000
trusted library section
page read and write
623000284000
direct allocation
page read and write
197C0288D000
trusted library allocation
page read and write
17358F73000
heap
page read and write
1517000
heap
page read and write
17355985000
heap
page read and write
17358F74000
heap
page read and write
A01000
unkown
page readonly
197C023DC000
trusted library allocation
page read and write
31C8007C8000
trusted library allocation
page read and write
197C02B78000
trusted library allocation
page read and write
7AA4000
heap
page read and write
197C02564000
trusted library allocation
page read and write
17358F56000
heap
page read and write
7AA0000
heap
page read and write
31C800330000
trusted library allocation
page read and write
197C02494000
trusted library allocation
page read and write
7AA7000
heap
page read and write
17355BE0000
heap
page read and write
31C800408000
trusted library allocation
page read and write
31C800614000
trusted library allocation
page read and write
17358F5F000
heap
page read and write
1735F137000
unclassified section
page read and write
17358F65000
heap
page read and write
70507FB000
stack
page read and write
7E5E000
heap
page read and write
31C80033C000
trusted library allocation
page read and write
6E31000
heap
page read and write
7AA9000
heap
page read and write
31C800430000
trusted library allocation
page read and write
197C02B00000
trusted library allocation
page read and write
7C81000
heap
page read and write
31C800210000
trusted library allocation
page read and write
6B0000
heap
page read and write
197C03140000
trusted library allocation
page read and write
704EFFE000
unkown
page readonly
197C0240C000
trusted library allocation
page read and write
197C030EC000
trusted library allocation
page read and write
17358F6D000
heap
page read and write
31C800658000
trusted library allocation
page read and write
173594F3000
heap
page read and write
9FE000
unkown
page read and write
7C27000
heap
page read and write
1735D98F000
heap
page read and write
3B10000
direct allocation
page execute and read and write
197C0247C000
trusted library allocation
page read and write
17358F4F000
heap
page read and write
197C03038000
trusted library allocation
page read and write
17358F73000
heap
page read and write
17358F73000
heap
page read and write
F40000
direct allocation
page read and write
17358F73000
heap
page read and write
9FE000
unkown
page write copy
7AA6000
heap
page read and write
197C02690000
trusted library allocation
page read and write
17358F66000
heap
page read and write
7884002F8000
trusted library allocation
page read and write
17358F5F000
heap
page read and write
9F1000
unkown
page execute read
197C02938000
trusted library allocation
page read and write
31C8002ED000
trusted library allocation
page read and write
D6C000
stack
page read and write
31C800770000
trusted library allocation
page read and write
197C031A0000
trusted library allocation
page read and write
197C02960000
trusted library allocation
page read and write
F4C000
stack
page read and write
FFC000
stack
page read and write
9FE000
unkown
page read and write
3B10000
direct allocation
page execute and read and write
173594BD000
heap
page read and write
17358F5F000
heap
page read and write
17358F5F000
heap
page read and write
197C02A12000
trusted library allocation
page read and write
7C78000
heap
page read and write
197C024C0000
trusted library allocation
page read and write
7C16000
heap
page read and write
6C208000
unkown
page readonly
197C02F70000
trusted library allocation
page read and write
197C02D88000
trusted library allocation
page read and write
7057FFE000
unkown
page readonly
7CD4000
heap
page read and write
31C800788000
trusted library allocation
page read and write
87E000
heap
page read and write
17358F65000
heap
page read and write
7BE9000
heap
page read and write
31C800654000
trusted library allocation
page read and write
7BA6000
heap
page read and write
9C0000
heap
page read and write
6E31000
heap
page read and write
17358F4F000
heap
page read and write
197C02E0C000
trusted library allocation
page read and write
31C800704000
trusted library allocation
page read and write
197C03030000
trusted library allocation
page read and write
31C8006EC000
trusted library allocation
page read and write
197C02498000
trusted library allocation
page read and write
17358F56000
heap
page read and write
7C78000
heap
page read and write
17358F74000
heap
page read and write
7AA5000
heap
page read and write
C0D000
stack
page read and write
197C025DC000
trusted library allocation
page read and write
17358F5F000
heap
page read and write
6E31000
heap
page read and write
197C02F84000
trusted library allocation
page read and write
197C02D48000
trusted library allocation
page read and write
7069FFE000
unkown
page readonly
17358F5C000
heap
page read and write
197C00401000
trusted library allocation
page read and write
197C03140000
trusted library allocation
page read and write
17358F73000
heap
page read and write
9FA000
unkown
page readonly
70547FE000
stack
page read and write
197C02430000
trusted library allocation
page read and write
7E3A000
heap
page read and write
197C02EAC000
trusted library allocation
page read and write
A01000
unkown
page readonly
17358F6D000
heap
page read and write
197C02A40000
trusted library allocation
page read and write
197C02504000
trusted library allocation
page read and write
197C02994000
trusted library allocation
page read and write
6230002DC000
direct allocation
page read and write
84C000
stack
page read and write
17358F56000
heap
page read and write
6E31000
heap
page read and write
7C25000
heap
page read and write
8F4000
heap
page read and write
9FE000
unkown
page write copy
7073FFE000
unkown
page readonly
197C02A01000
trusted library allocation
page read and write
17358F73000
heap
page read and write
197C030E8000
trusted library allocation
page read and write
197C03190000
trusted library allocation
page read and write
173558EB000
heap
page read and write
7CF8000
heap
page read and write
197C02260000
trusted library allocation
page read and write
197C0241C000
trusted library allocation
page read and write
17358F6D000
heap
page read and write
7AAA000
heap
page read and write
197C026FC000
trusted library allocation
page read and write
197C02F94000
trusted library allocation
page read and write
F60000
unkown
page readonly
31C8007B4000
trusted library allocation
page read and write
17358F62000
heap
page read and write
6E31000
heap
page read and write
17358F5F000
heap
page read and write
705BFFC000
stack
page read and write
197C02E6C000
trusted library allocation
page read and write
197C02A38000
trusted library allocation
page read and write
70687FE000
stack
page read and write
7C4C000
heap
page read and write
17358F7B000
heap
page read and write
17358F6D000
heap
page read and write
197C02694000
trusted library allocation
page read and write
197C02FCC000
trusted library allocation
page read and write
9F0000
unkown
page readonly
197C029D8000
trusted library allocation
page read and write
A01000
unkown
page readonly
31C800668000
trusted library allocation
page read and write
17358F4F000
heap
page read and write
197C0269C000
trusted library allocation
page read and write
197C02910000
trusted library allocation
page read and write
70677FC000
stack
page read and write
17358F5F000
heap
page read and write
197C02428000
trusted library allocation
page read and write
17355C30000
heap
page read and write
87A000
heap
page read and write
70747FE000
stack
page read and write
197C02CE0000
trusted library allocation
page read and write
197C00601000
trusted library allocation
page read and write
173594B4000
heap
page read and write
DD0000
heap
page read and write
1D2D000
heap
page read and write
17358F5F000
heap
page read and write
197C0329C000
trusted library allocation
page read and write
F40000
direct allocation
page read and write
197C02EF8000
trusted library allocation
page read and write
704A7FE000
stack
page read and write
17358F4F000
heap
page read and write
8F4000
heap
page read and write
173559D3000
heap
page read and write
1167000
heap
page read and write
8E8000
heap
page read and write
7D37000
heap
page read and write
31C800688000
trusted library allocation
page read and write
31C800354000
trusted library allocation
page read and write
17358F46000
heap
page read and write
705E7FA000
stack
page read and write
17358F44000
heap
page read and write
3B10000
direct allocation
page execute and read and write
31C800250000
trusted library allocation
page read and write
17358F6D000
heap
page read and write
1390000
heap
page read and write
6E31000
heap
page read and write
1735FF06000
trusted library section
page read and write
197C025DC000
trusted library allocation
page read and write
17358F4F000
heap
page read and write
6230002EC000
direct allocation
page read and write
6E31000
heap
page read and write
197C025DC000
trusted library allocation
page read and write
70557FE000
stack
page read and write
17358F73000
heap
page read and write
F40000
direct allocation
page read and write
197C02AA8000
trusted library allocation
page read and write
7AA3000
heap
page read and write
8F4000
heap
page read and write
197C02EF8000
trusted library allocation
page read and write
197C0240C000
trusted library allocation
page read and write
17355974000
heap
page read and write
197C02EF8000
trusted library allocation
page read and write
197C02A5C000
trusted library allocation
page read and write
31C800630000
trusted library allocation
page read and write
7CAF000
heap
page read and write
6E31000
heap
page read and write
1735FDF2000
trusted library section
page read and write
9F1000
unkown
page execute read
17358F6D000
heap
page read and write
197C0253C000
trusted library allocation
page read and write
197C02618000
trusted library allocation
page read and write
8E0000
heap
page read and write
17358F9A000
heap
page read and write
31C8006C8000
trusted library allocation
page read and write
8A0000
heap
page read and write
1735F560000
trusted library section
page read and write
7B8F000
heap
page read and write
7AA4000
heap
page read and write
17358F65000
heap
page read and write
31C800744000
trusted library allocation
page read and write
197C02601000
trusted library allocation
page read and write
31C800348000
trusted library allocation
page read and write
70607FC000
stack
page read and write
9FA000
unkown
page readonly
17358F6D000
heap
page read and write
197C02FB9000
trusted library allocation
page read and write
197C02758000
trusted library allocation
page read and write
3B10000
direct allocation
page execute and read and write
197C0237C000
trusted library allocation
page read and write
17358F52000
heap
page read and write
704DFFE000
unkown
page readonly
1735949D000
heap
page read and write
197C02F58000
trusted library allocation
page read and write
70657FD000
stack
page read and write
17358F6D000
heap
page read and write
17358F73000
heap
page read and write
623000215000
direct allocation
page read and write
197C02A2D000
trusted library allocation
page read and write
A01000
unkown
page readonly
7884002D8000
trusted library allocation
page read and write
1735947C000
heap
page read and write
31C800758000
trusted library allocation
page read and write
1D34000
heap
page read and write
17358F52000
heap
page read and write
6E31000
heap
page read and write
1735946E000
heap
page read and write
17358F5F000
heap
page read and write
705AFFE000
unkown
page readonly
3B10000
direct allocation
page execute and read and write
7884002C0000
trusted library allocation
page read and write
6E31000
heap
page read and write
197C02E64000
trusted library allocation
page read and write
17358F65000
heap
page read and write
510000
heap
page read and write
17358F56000
heap
page read and write
31C800330000
trusted library allocation
page read and write
1735F260000
trusted library section
page read and write
17358F6D000
heap
page read and write
17358F4F000
heap
page read and write
4BC000
stack
page read and write
7884002C0000
trusted library allocation
page read and write
197C02D04000
trusted library allocation
page read and write
7072FFE000
unkown
page readonly
17358F5F000
heap
page read and write
9F1000
unkown
page execute read
9F0000
unkown
page readonly
7054FFE000
unkown
page readonly
197C0236C000
trusted library allocation
page read and write
197C023AC000
trusted library allocation
page read and write
17358F5F000
heap
page read and write
17358F63000
heap
page read and write
788400238000
trusted library allocation
page read and write
197C023E4000
trusted library allocation
page read and write
17358F6D000
heap
page read and write
31C80020C000
trusted library allocation
page read and write
17358F7F000
heap
page read and write
17358F5F000
heap
page read and write
17359410000
heap
page read and write
197C02424000
trusted library allocation
page read and write
788400235000
trusted library allocation
page read and write
17358310000
unkown
page read and write
F40000
direct allocation
page read and write
31C8007CC000
trusted library allocation
page read and write
173578C3000
heap
page read and write
17358F56000
heap
page read and write
197C00201000
trusted library allocation
page read and write
31C800724000
trusted library allocation
page read and write
F40000
direct allocation
page read and write
17358F7F000
heap
page read and write
705C7FE000
unkown
page readonly
17358FB1000
heap
page read and write
17358F5F000
heap
page read and write
6E31000
heap
page read and write
8F4000
heap
page read and write
31C80040C000
trusted library allocation
page read and write
197C02F8C000
trusted library allocation
page read and write
197C02A9C000
trusted library allocation
page read and write
17358F56000
heap
page read and write
6E31000
heap
page read and write
706A7FE000
stack
page read and write
1735FF2D000
trusted library section
page read and write
1735D940000
heap
page read and write
17358F5F000
heap
page read and write
7053FFE000
unkown
page readonly
17358F76000
heap
page read and write
17358F56000
heap
page read and write
31C800248000
trusted library allocation
page read and write
17358F56000
heap
page read and write
1735B082000
trusted library allocation
page read and write
173594B2000
heap
page read and write
6E31000
heap
page read and write
197C024B4000
trusted library allocation
page read and write
197C02910000
trusted library allocation
page read and write
13FC000
stack
page read and write
197C023D0000
trusted library allocation
page read and write
31C80035C000
trusted library allocation
page read and write
17358F46000
heap
page read and write
197C03028000
trusted library allocation
page read and write
7884002BC000
trusted library allocation
page read and write
17358F76000
heap
page read and write
79B9000
direct allocation
page read and write
17358F5B000
heap
page read and write
8F4000
heap
page read and write
197C02510000
trusted library allocation
page read and write
788400294000
trusted library allocation
page read and write
197C02D14000
trusted library allocation
page read and write
70667FE000
stack
page read and write
197C03118000
trusted library allocation
page read and write
197C028AC000
trusted library allocation
page read and write
17358F58000
heap
page read and write
17358F4F000
heap
page read and write
197C02A18000
trusted library allocation
page read and write
17358F56000
heap
page read and write
7884002BC000
trusted library allocation
page read and write
31C80033C000
trusted library allocation
page read and write
197C02E98000
trusted library allocation
page read and write
17358F5B000
heap
page read and write
197C030CC000
trusted library allocation
page read and write
17358F4F000
heap
page read and write
1735F123000
heap
page read and write
17358F56000
heap
page read and write
7050FFE000
unkown
page readonly
31C800230000
trusted library allocation
page read and write
17355860000
heap
page read and write
17358F54000
heap
page read and write
197C023A0000
trusted library allocation
page read and write
F40000
direct allocation
page read and write
1160000
heap
page read and write
6F30000
trusted library allocation
page read and write
197C02594000
trusted library allocation
page read and write
17358F98000
heap
page read and write
870000
heap
page read and write
197C02928000
trusted library allocation
page read and write
17358F6A000
heap
page read and write
17358F59000
heap
page read and write
173594CC000
heap
page read and write
197C0251C000
trusted library allocation
page read and write
31C8006C4000
trusted library allocation
page read and write
706B7FE000
stack
page read and write
9FA000
unkown
page readonly
31C80035C000
trusted library allocation
page read and write
6E31000
heap
page read and write
There are 1321 hidden memdumps, click here to show them.