IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_8b6bc30ae81dc2afea68c3eabac594fb8e9329_ac3115bf_e35ef701-adbc-4911-8025-93c23815d03e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC2D5.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Nov 29 18:18:50 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC4BB.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC519.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\HFInUAYNqgsnDSwNdDpz.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 --field-trial-handle=2264,i,13592779823444466378,7570623517769425458,262144 /prefetch:8
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5236 -s 1204
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://home.twentykx20pt.top/bugEWhhZIPIipxajeFfO1732855736?argument=V3pE2pk3ErlV9NFr1732904223
34.118.84.150
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://mail.google.com/mail/?usp=installed_webapp
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://clients3.google.com/cast/chromecast/home/wallpaper/image?rt=b
unknown
https://docs.google.com/document/J
unknown
https://myaccount.google.com/find-your-phone?utm_source=ga-chrome-actions&utm_medium=findYourPhone
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
https://keep.google.com/u/0/?usp=chrome_actions#NEWNOTEkly
unknown
http://polymer.github.io/AUTHORS.txt
unknown
https://docs.google.com/
unknown
https://docs.google.com/document/:
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://photos.google.com?referrer=CHROME_NTP
unknown
https://www.google.com/chrome/tips/
unknown
https://drive.google.com/?lfhs=2
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
https://www.youtube.com/?feature=ytca
unknown
https://docs.googl0
unknown
https://www.youtube.coP
unknown
https://issuetracker.google.com/255411748
unknown
https://docs.google.com/document/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/5750-
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://docs.google.com/presentation/
unknown
https://duckduckgo.com/?q=
unknown
http://anglebug.com/1423136$k
unknown
https://chrome.google.com/webstore
unknown
https://drive-daily-2.corp.google.com/
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://chrome.google.com/webstore$k
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
https://issuetracker.google.com/161903006
unknown
https://www.ecosia.org/newtab/
unknown
https://drive-daily-1.corp.google.com/
unknown
https://www.youtube.com/
unknown
https://drive-daily-5.corp.google.com/
unknown
https://duckduckgo.com/favicon.ico
unknown
https://docs.google.com/spreadsheets/u/0/create?usp=chrome_actions
unknown
https://myaccount.google.com/data-and-privacy?utm_source=ga-chrome-actions&utm_medium=managePrivacy
unknown
https://docs.google.com/spreadsheets/
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
http://anglebug.com/5375
unknown
https://httpbin.org/ipbefore
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
https://m.google.com/devicemanagement/data/api
unknown
http://developer.chrome.com/extensions/external_extensions.html)
unknown
https://docs.google.com/presentation/u/0/create?usp=chrome_actions
unknown
http://anglebug.com/7556
unknown
https://drive-daily-4.c
unknown
https://chromewebstore.google.com/
unknown
https://drive-preprod.corp.google.com/
unknown
https://mail.google.com/mail/?usp=installed_webapp$k
unknown
https://clients4.google.com/chrome-sync
unknown
https://www.google.com/Chark$
unknown
http://html4/loose.dtd
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://docs.google.com/presentation/J
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
https://www.ecosia.org/search?q=&addon=opensearch
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://.css
unknown
https://ch.search.yahoo.com/favicon.ico
unknown
https://docs.google.com/presentation/:
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/3970
unknown
https://myaccount.google.com/signinoptions/password?utm_source=ga-chrome-actions&utm_medium=changePW
unknown
http://safebrowsing.googleusercontent.com/safebrowsing/clientreport/chrome-certs
unknown
https://policies.google.com/
unknown
http://anglebug.com/3586il
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
http://.jpg
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://drive-daily-5.corp.go
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://anglebug.com/5901
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
twentykx20pt.top
34.118.84.150
home.twentykx20pt.top
34.118.84.150
www.google.com
172.217.21.36
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
217.20.56.102
httpbin.org
18.213.123.165

IPs

IP
Domain
Country
Malicious
18.213.123.165
httpbin.org
United States
239.255.255.250
unknown
Reserved
172.217.21.36
www.google.com
United States
127.0.0.1
unknown
unknown
34.118.84.150
twentykx20pt.top
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProgramId
malicious
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
FileId
malicious
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LowerCaseLongPath
malicious
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LongPathHash
malicious
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Name
malicious
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
OriginalFileName
malicious
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Publisher
malicious
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Version
malicious
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinFileVersion
malicious
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinaryType
malicious
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductName
malicious
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
ProductVersion
malicious
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
LinkDate
malicious
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
BinProductVersion
malicious
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageFullName
malicious
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
AppxPackageRelativeId
malicious
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Size
malicious
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Language
malicious
\REGISTRY\A\{df55df4b-a431-e2a2-2b6e-7f4cf53d463f}\Root\InventoryApplicationFile\file.exe|7bc5a156b3ccd649
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1CB4000
heap
page read and write
43A800220000
trusted library allocation
page read and write
64F400264000
trusted library allocation
page read and write
7E62000
heap
page read and write
2F4EB95F000
heap
page read and write
5848002DC000
direct allocation
page read and write
6B24009EC000
trusted library allocation
page read and write
6D61000
heap
page read and write
64F4002BC000
trusted library allocation
page read and write
B81000
unkown
page execute and write copy
6B24001DC000
trusted library allocation
page read and write
6B2400E30000
trusted library allocation
page read and write
43A800248000
trusted library allocation
page read and write
6B2400E78000
trusted library allocation
page read and write
1CC7000
heap
page read and write
6B2400F30000
trusted library allocation
page read and write
7480000
direct allocation
page execute and read and write
F5CD9FE000
unkown
page readonly
6B24001B4000
trusted library allocation
page read and write
5848002EC000
direct allocation
page read and write
2F4E7FFA000
heap
page read and write
6D61000
heap
page read and write
7CD6000
heap
page read and write
43A8007C0000
trusted library allocation
page read and write
2F4EBAA0000
trusted library section
page read and write
21E000
unkown
page read and write
6B2400A48000
trusted library allocation
page read and write
221000
unkown
page readonly
6B2400FE0000
trusted library allocation
page read and write
5848002A8000
direct allocation
page read and write
6D61000
heap
page read and write
2F4EB9F1000
heap
page read and write
6B2400340000
trusted library allocation
page read and write
43A8008F4000
trusted library allocation
page read and write
43A80084C000
trusted library allocation
page read and write
6B2400E68000
trusted library allocation
page read and write
6B24004C8000
trusted library allocation
page read and write
F5D01FE000
stack
page read and write
6D61000
heap
page read and write
6B2400D94000
trusted library allocation
page read and write
2F4F1A60000
trusted library section
page read and write
2F4E7FF0000
heap
page read and write
F5F11FE000
stack
page read and write
21E000
unkown
page write copy
6D61000
heap
page read and write
7460000
direct allocation
page execute and read and write
6B24002F7000
trusted library allocation
page read and write
2F4E7F20000
heap
page read and write
2F4F05C3000
trusted library section
page read and write
6B2400E84000
trusted library allocation
page read and write
211000
unkown
page execute read
6B24010F8000
trusted library allocation
page read and write
7E89000
heap
page read and write
6B2400D07000
trusted library allocation
page read and write
6B2400F88000
trusted library allocation
page read and write
6B2401144000
trusted library allocation
page read and write
F5F09FE000
unkown
page readonly
43A800828000
trusted library allocation
page read and write
211000
unkown
page execute read
2F4EA8B0000
unkown
page read and write
F5E41FE000
stack
page read and write
6D61000
heap
page read and write
2F4EB900000
trusted library section
page read and write
2F4EB984000
heap
page read and write
43A8008C4000
trusted library allocation
page read and write
71B0000
trusted library allocation
page read and write
43A8006BC000
trusted library allocation
page read and write
F5D99FE000
unkown
page readonly
6B240046D000
trusted library allocation
page read and write
6D61000
heap
page read and write
64F400294000
trusted library allocation
page read and write
584800294000
direct allocation
page read and write
7CD4000
heap
page read and write
F5EB9FE000
unkown
page readonly
6D61000
heap
page read and write
584800260000
direct allocation
page read and write
2F4E8060000
trusted library allocation
page read and write
64F4002BC000
trusted library allocation
page read and write
FB8000
heap
page read and write
7F64000
heap
page read and write
7EAA000
heap
page read and write
7480000
direct allocation
page execute and read and write
6B2400E6C000
trusted library allocation
page read and write
7CD1000
heap
page read and write
6B24008E0000
trusted library allocation
page read and write
7E80000
heap
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
7D85000
heap
page read and write
6B24009F8000
trusted library allocation
page read and write
43A8006E8000
trusted library allocation
page read and write
6D61000
heap
page read and write
6B2400D7C000
trusted library allocation
page read and write
6B240100C000
trusted library allocation
page read and write
21A000
unkown
page readonly
F5ED1FA000
stack
page read and write
64F4002BC000
trusted library allocation
page read and write
64F4002C0000
trusted library allocation
page read and write
7D7E000
heap
page read and write
4DC000
heap
page read and write
6D61000
heap
page read and write
6B240120C000
trusted library allocation
page read and write
F5D11FE000
stack
page read and write
6B2400F38000
trusted library allocation
page read and write
12AF000
stack
page read and write
64F400278000
trusted library allocation
page read and write
6B2400B6C000
trusted library allocation
page read and write
2F4EB95A000
heap
page read and write
43A800868000
trusted library allocation
page read and write
7480000
direct allocation
page execute and read and write
6D61000
heap
page read and write
7CD0000
heap
page read and write
F5E71FD000
stack
page read and write
6D61000
heap
page read and write
6B24001A8000
trusted library allocation
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
43A80081C000
trusted library allocation
page read and write
6D61000
heap
page read and write
6B2401150000
trusted library allocation
page read and write
6B2400454000
trusted library allocation
page read and write
1CB4000
heap
page read and write
5848002D0000
direct allocation
page read and write
7480000
direct allocation
page execute and read and write
6D61000
heap
page read and write
2F4F0520000
trusted library section
page read and write
F5ED9FE000
unkown
page readonly
6B24005C8000
trusted library allocation
page read and write
F5D09FE000
unkown
page readonly
6D61000
heap
page read and write
2F4E8190000
heap
page read and write
6D61000
heap
page read and write
43A8006D4000
trusted library allocation
page read and write
6D61000
heap
page read and write
7EDB000
heap
page read and write
6B2400EC4000
trusted library allocation
page read and write
6B240097C000
trusted library allocation
page read and write
43A800230000
trusted library allocation
page read and write
6B2400E60000
trusted library allocation
page read and write
47E000
unkown
page read and write
2F4F22F1000
trusted library section
page read and write
6B2400DB8000
trusted library allocation
page read and write
64F400235000
trusted library allocation
page read and write
6D61000
heap
page read and write
6B2400EA0000
trusted library allocation
page read and write
6D61000
heap
page read and write
21E000
unkown
page write copy
6D61000
heap
page read and write
584800303000
direct allocation
page read and write
6D61000
heap
page read and write
2F4F0797000
unclassified section
page read and write
6B24001D4000
trusted library allocation
page read and write
43A800401000
trusted library allocation
page read and write
6D61000
heap
page read and write
6B240050C000
trusted library allocation
page read and write
7E7A000
heap
page read and write
F5D19FE000
unkown
page readonly
F5E99FE000
unkown
page readonly
6B2400E0C000
trusted library allocation
page read and write
6D61000
heap
page read and write
211000
unkown
page execute read
6B24007BC000
trusted library allocation
page read and write
70E000
stack
page read and write
F5C81FE000
stack
page read and write
7D94000
heap
page read and write
7734000
heap
page read and write
2F4F04E2000
trusted library section
page read and write
7CD3000
heap
page read and write
F5D51FA000
stack
page read and write
221000
unkown
page readonly
2F4EBC40000
trusted library section
page read and write
1CAB000
heap
page read and write
6B240041C000
trusted library allocation
page read and write
6D61000
heap
page read and write
43A800818000
trusted library allocation
page read and write
6B24009C0000
trusted library allocation
page read and write
6D61000
heap
page read and write
2F4E8018000
heap
page read and write
6D61000
heap
page read and write
1CC7000
heap
page read and write
6B24004C8000
trusted library allocation
page read and write
6D50000
direct allocation
page read and write
6D61000
heap
page read and write
43A8006F0000
trusted library allocation
page read and write
6D61000
heap
page read and write
6B2400060000
trusted library allocation
page read and write
6B2400ACC000
trusted library allocation
page read and write
6B24011C0000
trusted library allocation
page read and write
D00000
heap
page read and write
221000
unkown
page readonly
6D61000
heap
page read and write
6D61000
heap
page read and write
64F400201000
trusted library allocation
page read and write
6B24002A4000
trusted library allocation
page read and write
2F4E7FBA000
heap
page read and write
43A800801000
trusted library allocation
page read and write
2F4F22E0000
trusted library section
page read and write
7480000
direct allocation
page execute and read and write
6D61000
heap
page read and write
43A800974000
trusted library allocation
page read and write
64F40020C000
trusted library allocation
page read and write
64F4002BC000
trusted library allocation
page read and write
7CD1000
heap
page read and write
6B24008B4000
trusted library allocation
page read and write
43A800880000
trusted library allocation
page read and write
7F17000
heap
page read and write
4CA000
heap
page read and write
43A80020C000
trusted library allocation
page read and write
F5CA1FA000
stack
page read and write
6B2400590000
trusted library allocation
page read and write
DFC000
stack
page read and write
6B240006C000
trusted library allocation
page read and write
7734000
heap
page read and write
6B240060C000
trusted library allocation
page read and write
1CC1000
heap
page read and write
6B2400FD4000
trusted library allocation
page read and write
6B2400CE0000
trusted library allocation
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
7E34000
heap
page read and write
2F4F2480000
trusted library section
page read and write
6B2400601000
trusted library allocation
page read and write
6B2400718000
trusted library allocation
page read and write
43A8008C8000
trusted library allocation
page read and write
6B240039C000
trusted library allocation
page read and write
210000
unkown
page readonly
2F4E7E20000
heap
page read and write
1CA000
stack
page read and write
221000
unkown
page readonly
6C141000
unkown
page execute read
584800274000
direct allocation
page read and write
71F0000
direct allocation
page read and write
43A8007A0000
trusted library allocation
page read and write
6D61000
heap
page read and write
F5CF1FC000
stack
page read and write
6B2400480000
trusted library allocation
page read and write
6D61000
heap
page read and write
F5C71FE000
stack
page read and write
6B2400C94000
trusted library allocation
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
6B240042C000
trusted library allocation
page read and write
6B2400FB0000
trusted library allocation
page read and write
6D61000
heap
page read and write
6B2400124000
trusted library allocation
page read and write
6B2400A76000
trusted library allocation
page read and write
6D61000
heap
page read and write
169F000
stack
page read and write
6D61000
heap
page read and write
7CD5000
heap
page read and write
7D94000
heap
page read and write
6B2400A70000
trusted library allocation
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
7CD4000
heap
page read and write
6B240020C000
trusted library allocation
page read and write
6B2400FEC000
trusted library allocation
page read and write
43A800238000
trusted library allocation
page read and write
6D61000
heap
page read and write
1CA1000
heap
page read and write
14AE000
stack
page read and write
6B2401044000
trusted library allocation
page read and write
F5D59FE000
unkown
page readonly
2F4F0660000
trusted library section
page read and write
6B2400D58000
trusted library allocation
page read and write
F5D89FB000
stack
page read and write
6D61000
heap
page read and write
6B2400FD4000
trusted library allocation
page read and write
6D61000
heap
page read and write
64F400238000
trusted library allocation
page read and write
6D61000
heap
page read and write
6B2400338000
trusted library allocation
page read and write
2F4F20E0000
trusted library section
page read and write
43A800848000
trusted library allocation
page read and write
E60000
heap
page read and write
6B2400C7C000
trusted library allocation
page read and write
43A8002F4000
trusted library allocation
page read and write
6B2400290000
trusted library allocation
page read and write
6B2400F00000
trusted library allocation
page read and write
560000
heap
page read and write
6B2401201000
trusted library allocation
page read and write
2F4F244D000
trusted library section
page read and write
6B2400E78000
trusted library allocation
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
6B24002B4000
trusted library allocation
page read and write
2F4EB987000
heap
page read and write
6B2400518000
trusted library allocation
page read and write
6B2400D7C000
trusted library allocation
page read and write
14FE000
heap
page read and write
6B2400870000
trusted library allocation
page read and write
43A800874000
trusted library allocation
page read and write
6D61000
heap
page read and write
F5EA1FC000
stack
page read and write
1680000
heap
page read and write
7E6B000
heap
page read and write
6B2400B7C000
trusted library allocation
page read and write
58480023C000
direct allocation
page read and write
210000
unkown
page readonly
6B240101C000
trusted library allocation
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
7CDA000
heap
page read and write
D08000
heap
page read and write
64F4002D8000
trusted library allocation
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
6B2400684000
trusted library allocation
page read and write
71F0000
direct allocation
page read and write
6B2400338000
trusted library allocation
page read and write
6D61000
heap
page read and write
6B2400188000
trusted library allocation
page read and write
F5E01FC000
stack
page read and write
43A80070C000
trusted library allocation
page read and write
6B2400FD4000
trusted library allocation
page read and write
FB0000
heap
page read and write
6B24007D0000
trusted library allocation
page read and write
6B2400DF8000
trusted library allocation
page read and write
43A8007BC000
trusted library allocation
page read and write
6B2400144000
trusted library allocation
page read and write
6D61000
heap
page read and write
64F4002A0000
trusted library allocation
page read and write
4C0000
heap
page read and write
6D61000
heap
page read and write
6B2400F20000
trusted library allocation
page read and write
6D61000
heap
page read and write
43A800408000
trusted library allocation
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
211000
unkown
page execute read
F5E51FD000
stack
page read and write
6D61000
heap
page read and write
6B2400801000
trusted library allocation
page read and write
F5D61FE000
stack
page read and write
2F4E7FB6000
heap
page read and write
7450000
direct allocation
page execute and read and write
211000
unkown
page execute read
6B2400F20000
trusted library allocation
page read and write
6B24011D0000
trusted library allocation
page read and write
6B240038C000
trusted library allocation
page read and write
43A8002CC000
trusted library allocation
page read and write
6B24002A4000
trusted library allocation
page read and write
6D61000
heap
page read and write
43A800864000
trusted library allocation
page read and write
21A000
unkown
page readonly
6D61000
heap
page read and write
2F4E7F00000
heap
page readonly
7DC7000
heap
page read and write
21A000
unkown
page readonly
6B2400154000
trusted library allocation
page read and write
7E6F000
heap
page read and write
6D50000
direct allocation
page read and write
43A800418000
trusted library allocation
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
43A8008E4000
trusted library allocation
page read and write
43A8008D8000
trusted library allocation
page read and write
6C21D000
unkown
page read and write
6D61000
heap
page read and write
6B2400704000
trusted library allocation
page read and write
6B2400368000
trusted library allocation
page read and write
6B2400078000
trusted library allocation
page read and write
7FDE000
heap
page read and write
6D61000
heap
page read and write
F5C99FE000
unkown
page readonly
6D61000
heap
page read and write
6D61000
heap
page read and write
6B2400AC0000
trusted library allocation
page read and write
6B2401044000
trusted library allocation
page read and write
6D61000
heap
page read and write
211000
unkown
page execute read
6B2400AF8000
trusted library allocation
page read and write
7CDD000
heap
page read and write
7CD4000
heap
page read and write
6B2400B04000
trusted library allocation
page read and write
5848002E4000
direct allocation
page read and write
7D64000
heap
page read and write
6D61000
heap
page read and write
43A800424000
trusted library allocation
page read and write
7E94000
heap
page read and write
584800290000
direct allocation
page read and write
7480000
direct allocation
page execute and read and write
2F4EBA2F000
heap
page read and write
6B2400CA8000
trusted library allocation
page read and write
64F4002F0000
trusted library allocation
page read and write
7D84000
heap
page read and write
211000
unkown
page execute read
6B24010E0000
trusted library allocation
page read and write
21A000
unkown
page readonly
71F0000
direct allocation
page read and write
6B24006DC000
trusted library allocation
page read and write
6B2400EF0000
trusted library allocation
page read and write
43A8002B8000
trusted library allocation
page read and write
2F4F062D000
trusted library section
page read and write
43A80071C000
trusted library allocation
page read and write
F5CB1FA000
stack
page read and write
6B2400124000
trusted library allocation
page read and write
6D61000
heap
page read and write
6B2400268000
trusted library allocation
page read and write
6D61000
heap
page read and write
13AE000
stack
page read and write
6D61000
heap
page read and write
584800270000
direct allocation
page read and write
43A8006AC000
trusted library allocation
page read and write
1C5D000
heap
page read and write
6B2400B40000
trusted library allocation
page read and write
F5DC9FE000
unkown
page readonly
6B2400E3C000
trusted library allocation
page read and write
6B240032C000
trusted library allocation
page read and write
6B24001E4000
trusted library allocation
page read and write
7480000
direct allocation
page execute and read and write
6B2401130000
trusted library allocation
page read and write
1CB4000
heap
page read and write
210000
unkown
page readonly
6B24011D4000
trusted library allocation
page read and write
6D61000
heap
page read and write
7CD7000
heap
page read and write
6D61000
heap
page read and write
43A800700000
trusted library allocation
page read and write
F5DF1FC000
stack
page read and write
6B2400D2C000
trusted library allocation
page read and write
21E000
unkown
page write copy
6B24000DC000
trusted library allocation
page read and write
6B2400500000
trusted library allocation
page read and write
1210000
heap
page read and write
6B24002A4000
trusted library allocation
page read and write
6B24006A8000
trusted library allocation
page read and write
7E4E000
heap
page read and write
6B2400934000
trusted library allocation
page read and write
801E000
heap
page read and write
6B2401060000
trusted library allocation
page read and write
221000
unkown
page readonly
7480000
direct allocation
page execute and read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
6B24007E4000
trusted library allocation
page read and write
1200000
heap
page read and write
F5D39FE000
unkown
page readonly
B80000
unkown
page readonly
6B24005B4000
trusted library allocation
page read and write
6D61000
heap
page read and write
6B240001C000
trusted library allocation
page read and write
F5E49FE000
unkown
page readonly
6B2400DDC000
trusted library allocation
page read and write
2F4EB4EF000
heap
page read and write
6B2400DA0000
trusted library allocation
page read and write
6B240115C000
trusted library allocation
page read and write
221000
unkown
page readonly
6D61000
heap
page read and write
7480000
direct allocation
page execute and read and write
7735000
heap
page read and write
64F4002B0000
trusted library allocation
page read and write
B50000
heap
page read and write
6D50000
direct allocation
page read and write
6D50000
direct allocation
page read and write
2F4EDA37000
unclassified section
page read and write
2F4F2442000
trusted library section
page read and write
7FFF000
heap
page read and write
7CD6000
heap
page read and write
6D61000
heap
page read and write
6B2400442000
trusted library allocation
page read and write
21A000
unkown
page readonly
F5E69FE000
unkown
page readonly
6B2400E90000
trusted library allocation
page read and write
2F4F0042000
trusted library allocation
page read and write
F5E29FE000
unkown
page readonly
6D61000
heap
page read and write
1CAA000
heap
page read and write
6B240064C000
trusted library allocation
page read and write
2F4EB963000
heap
page read and write
2F4F231E000
trusted library section
page read and write
6B24008C4000
trusted library allocation
page read and write
189F000
stack
page read and write
14D0000
heap
page read and write
7CDA000
heap
page read and write
6B240039C000
trusted library allocation
page read and write
43A8007D4000
trusted library allocation
page read and write
805B000
heap
page read and write
F5F29FE000
unkown
page readonly
6D61000
heap
page read and write
F5D31FD000
stack
page read and write
6B2400580000
trusted library allocation
page read and write
6B24001C4000
trusted library allocation
page read and write
6B2400CC8000
trusted library allocation
page read and write
6B24012BC000
trusted library allocation
page read and write
2F4EB97D000
heap
page read and write
F5E89FE000
unkown
page readonly
6D61000
heap
page read and write
64F4002C8000
trusted library allocation
page read and write
221000
unkown
page readonly
7ED9000
heap
page read and write
12E2000
unkown
page write copy
6B2400CFC000
trusted library allocation
page read and write
43A800201000
trusted library allocation
page read and write
6C21F000
unkown
page readonly
21E000
unkown
page write copy
6B2400C14000
trusted library allocation
page read and write
6B2400758000
trusted library allocation
page read and write
2F4E7F37000
heap
page read and write
13FC000
stack
page read and write
7F99000
heap
page read and write
21A000
unkown
page readonly
6D61000
heap
page read and write
F5E81FD000
stack
page read and write
75A1000
heap
page read and write
83E1000
heap
page read and write
6B2400C62000
trusted library allocation
page read and write
F5EF1FE000
stack
page read and write
43A8008EC000
trusted library allocation
page read and write
6D61000
heap
page read and write
6B2400790000
trusted library allocation
page read and write
6B24000AC000
trusted library allocation
page read and write
7480000
direct allocation
page execute and read and write
6B2400DDC000
trusted library allocation
page read and write
F5E39FE000
unkown
page readonly
2F4F20EE000
trusted library section
page read and write
6D61000
heap
page read and write
6B2400198000
trusted library allocation
page read and write
6B2400C8C000
trusted library allocation
page read and write
6D61000
heap
page read and write
6B240020C000
trusted library allocation
page read and write
6D61000
heap
page read and write
43A8006F4000
trusted library allocation
page read and write
6D61000
heap
page read and write
43A8007AC000
trusted library allocation
page read and write
761F000
heap
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
7DAE000
heap
page read and write
6B2400DDC000
trusted library allocation
page read and write
6D61000
heap
page read and write
1CB8000
heap
page read and write
7732000
heap
page read and write
43A80027C000
trusted library allocation
page read and write
7480000
direct allocation
page execute and read and write
64F4002A0000
trusted library allocation
page read and write
77C0000
heap
page read and write
6B2400D7C000
trusted library allocation
page read and write
584800280000
direct allocation
page read and write
6B2401114000
trusted library allocation
page read and write
43A800250000
trusted library allocation
page read and write
21A000
unkown
page readonly
6B2401001000
trusted library allocation
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
6B24001D8000
trusted library allocation
page read and write
F5D71FC000
stack
page read and write
6D61000
heap
page read and write
6B2400F10000
trusted library allocation
page read and write
6B2400324000
trusted library allocation
page read and write
2F4E9E63000
heap
page read and write
6B2400220000
trusted library allocation
page read and write
584800220000
direct allocation
page read and write
6B2400C7C000
trusted library allocation
page read and write
F5C31EF000
stack
page read and write
F5EE1FC000
stack
page read and write
6E60000
trusted library allocation
page read and write
6D61000
heap
page read and write
6B2400B40000
trusted library allocation
page read and write
1CB8000
heap
page read and write
7E37000
heap
page read and write
F5CC1FE000
stack
page read and write
F90000
heap
page read and write
6B2400A28000
trusted library allocation
page read and write
6B2400EFC000
trusted library allocation
page read and write
2F4E8003000
heap
page read and write
7DE9000
heap
page read and write
2F4EB4EF000
heap
page read and write
2F4EBA0B000
heap
page read and write
6B2400700000
trusted library allocation
page read and write
6B2400BD4000
trusted library allocation
page read and write
6D61000
heap
page read and write
F5DF9FE000
unkown
page readonly
77E9000
direct allocation
page read and write
6D50000
direct allocation
page read and write
6D61000
heap
page read and write
F5EC1FE000
stack
page read and write
6D61000
heap
page read and write
7CD7000
heap
page read and write
6B2400E48000
trusted library allocation
page read and write
7470000
direct allocation
page execute and read and write
6D61000
heap
page read and write
6B2400C0C000
trusted library allocation
page read and write
6D61000
heap
page read and write
2F4EB4EA000
heap
page read and write
7CD8000
heap
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
2F4F0622000
trusted library section
page read and write
6B24009D0000
trusted library allocation
page read and write
2F4EDBE3000
heap
page read and write
14FA000
heap
page read and write
43A80085C000
trusted library allocation
page read and write
6D61000
heap
page read and write
6B2400ED4000
trusted library allocation
page read and write
71B0000
trusted library allocation
page read and write
6B24002D0000
trusted library allocation
page read and write
6B24001E0000
trusted library allocation
page read and write
6B24000FC000
trusted library allocation
page read and write
43A8002B0000
trusted library allocation
page read and write
F5D69FE000
unkown
page readonly
2F4F056E000
trusted library section
page read and write
6B24008CC000
trusted library allocation
page read and write
21E000
unkown
page write copy
2F4EB4F6000
heap
page read and write
7480000
direct allocation
page execute and read and write
2F4EB981000
heap
page read and write
6B2400DAC000
trusted library allocation
page read and write
7CD3000
heap
page read and write
21A000
unkown
page readonly
9D0000
heap
page read and write
6B24006F5000
trusted library allocation
page read and write
6B2401168000
trusted library allocation
page read and write
43A8002DC000
trusted library allocation
page read and write
6B24002F0000
trusted library allocation
page read and write
6B2400F7C000
trusted library allocation
page read and write
6B2400E90000
trusted library allocation
page read and write
211000
unkown
page execute read
6B2400C28000
trusted library allocation
page read and write
6B2400098000
trusted library allocation
page read and write
6B2400C18000
trusted library allocation
page read and write
6D50000
direct allocation
page read and write
7480000
direct allocation
page execute and read and write
7480000
direct allocation
page execute and read and write
7B56000
heap
page read and write
7CDB000
heap
page read and write
F5EB1FE000
stack
page read and write
6D61000
heap
page read and write
6B2400FB0000
trusted library allocation
page read and write
7CDB000
heap
page read and write
6B2400BB0000
trusted library allocation
page read and write
7E96000
heap
page read and write
6B2400C8C000
trusted library allocation
page read and write
6B24006DC000
trusted library allocation
page read and write
64F400270000
trusted library allocation
page read and write
6D61000
heap
page read and write
6B24002C4000
trusted library allocation
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
11FF000
stack
page read and write
6B2400C14000
trusted library allocation
page read and write
6B2400D04000
trusted library allocation
page read and write
6D61000
heap
page read and write
6B24005A0000
trusted library allocation
page read and write
2F4EB9E6000
heap
page read and write
2F4F2312000
trusted library section
page read and write
7CD4000
heap
page read and write
6B2400224000
trusted library allocation
page read and write
6B2400401000
trusted library allocation
page read and write
6B2400D20000
trusted library allocation
page read and write
6B2401108000
trusted library allocation
page read and write
F5F21FE000
stack
page read and write
6B2400B50000
trusted library allocation
page read and write
1238000
heap
page read and write
6B240039C000
trusted library allocation
page read and write
2F4F0606000
trusted library section
page read and write
6C26C000
unkown
page readonly
2F4EBA1C000
heap
page read and write
210000
unkown
page readonly
6D50000
direct allocation
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
1230000
heap
page read and write
6B2400A80000
trusted library allocation
page read and write
2F4EB96E000
heap
page read and write
221000
unkown
page readonly
F5E19FE000
unkown
page readonly
43A8006C8000
trusted library allocation
page read and write
6D61000
heap
page read and write
6B2400D14000
trusted library allocation
page read and write
43A800964000
trusted library allocation
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
794C000
direct allocation
page read and write
21A000
unkown
page readonly
480000
heap
page read and write
7CDA000
heap
page read and write
6D61000
heap
page read and write
43A800844000
trusted library allocation
page read and write
CD0000
heap
page read and write
7CD4000
heap
page read and write
64F4002B0000
trusted library allocation
page read and write
5848002AC000
direct allocation
page read and write
1C74000
heap
page read and write
6B2400C7C000
trusted library allocation
page read and write
2F4EB4F4000
heap
page read and write
74F000
stack
page read and write
584800284000
direct allocation
page read and write
6B2400E78000
trusted library allocation
page read and write
6D61000
heap
page read and write
43A800860000
trusted library allocation
page read and write
6D61000
heap
page read and write
FFF000
stack
page read and write
6B2400658000
trusted library allocation
page read and write
6B24002A8000
trusted library allocation
page read and write
43A80078C000
trusted library allocation
page read and write
F5C51FE000
stack
page read and write
6D61000
heap
page read and write
64F4002BC000
trusted library allocation
page read and write
6B2400FD8000
trusted library allocation
page read and write
6D61000
heap
page read and write
6B2400054000
trusted library allocation
page read and write
6B2400E54000
trusted library allocation
page read and write
1C92000
heap
page read and write
210000
unkown
page readonly
430000
heap
page read and write
6B24001B4000
trusted library allocation
page read and write
2F4E8020000
heap
page read and write
21A000
unkown
page readonly
2F4F1E77000
unclassified section
page read and write
6B2400EE8000
trusted library allocation
page read and write
F5CE9FE000
unkown
page readonly
6B2400C8C000
trusted library allocation
page read and write
6B2400448000
trusted library allocation
page read and write
E3E000
stack
page read and write
F5CD1FA000
stack
page read and write
6D50000
direct allocation
page read and write
43A800728000
trusted library allocation
page read and write
7F09000
heap
page read and write
F5CF9FE000
unkown
page readonly
2F4E8011000
heap
page read and write
7CDA000
heap
page read and write
7CD0000
heap
page read and write
6D61000
heap
page read and write
5F0000
heap
page read and write
64F400260000
trusted library allocation
page read and write
2F4F1EB0000
trusted library section
page read and write
6B2400210000
trusted library allocation
page read and write
2F4EFE3E000
heap
page read and write
6B24009B0000
trusted library allocation
page read and write
F5E21FB000
stack
page read and write
43A800430000
trusted library allocation
page read and write
1CB8000
heap
page read and write
43A80040C000
trusted library allocation
page read and write
6D50000
direct allocation
page read and write
7DF1000
heap
page read and write
6B240129C000
trusted library allocation
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
6B24001E8000
trusted library allocation
page read and write
6B2400230000
trusted library allocation
page read and write
2F4EB9DE000
heap
page read and write
6B24001A0000
trusted library allocation
page read and write
7CD0000
heap
page read and write
6B2400338000
trusted library allocation
page read and write
43A8007E4000
trusted library allocation
page read and write
7D82000
heap
page read and write
6B2400DC8000
trusted library allocation
page read and write
6D61000
heap
page read and write
2F4EB972000
heap
page read and write
6D61000
heap
page read and write
43A8002FC000
trusted library allocation
page read and write
6D61000
heap
page read and write
584800215000
direct allocation
page read and write
211000
unkown
page execute read
794E000
direct allocation
page read and write
6B24006EC000
trusted library allocation
page read and write
9E0000
heap
page read and write
7480000
direct allocation
page execute and read and write
F5EC9FE000
unkown
page readonly
43A8006E8000
trusted library allocation
page read and write
7CDC000
heap
page read and write
6B2400C8F000
trusted library allocation
page read and write
6B24010C0000
trusted library allocation
page read and write
43A80060C000
trusted library allocation
page read and write
6D61000
heap
page read and write
6B240034C000
trusted library allocation
page read and write
43A800884000
trusted library allocation
page read and write
2F4F0010000
trusted library section
page read and write
7CDF000
heap
page read and write
7F49000
heap
page read and write
166D000
unkown
page execute and write copy
6B24012A4000
trusted library allocation
page read and write
64F4002C0000
trusted library allocation
page read and write
7E3C000
heap
page read and write
64F400220000
trusted library allocation
page read and write
7620000
heap
page read and write
6B240044C000
trusted library allocation
page read and write
6B240012C000
trusted library allocation
page read and write
21E000
unkown
page write copy
7E7D000
heap
page read and write
2F4EB4FB000
heap
page read and write
6B2400641000
trusted library allocation
page read and write
6B2400AB0000
trusted library allocation
page read and write
64F4002BC000
trusted library allocation
page read and write
6B2400FB0000
trusted library allocation
page read and write
F5D41FE000
stack
page read and write
F5C69FE000
unkown
page readonly
77CA000
heap
page read and write
2F4E7FF5000
heap
page read and write
7E40000
heap
page read and write
6B2400C7C000
trusted library allocation
page read and write
21E000
unkown
page read and write
6B2400DC8000
trusted library allocation
page read and write
6C269000
unkown
page read and write
43A800790000
trusted library allocation
page read and write
6B2400D7C000
trusted library allocation
page read and write
6D61000
heap
page read and write
F5EA9FE000
unkown
page readonly
2F4EBA0F000
heap
page read and write
43A800850000
trusted library allocation
page read and write
221000
unkown
page readonly
6B2400B74000
trusted library allocation
page read and write
6B24001D0000
trusted library allocation
page read and write
584800250000
direct allocation
page read and write
6D61000
heap
page read and write
5AE000
stack
page read and write
7480000
direct allocation
page execute and read and write
F5D21FE000
stack
page read and write
7DD6000
heap
page read and write
2F4F0463000
trusted library section
page read and write
F5E91FE000
stack
page read and write
6D61000
heap
page read and write
2F4EBA09000
heap
page read and write
21E000
unkown
page read and write
6B240110C000
trusted library allocation
page read and write
6B2400888000
trusted library allocation
page read and write
6CF000
unkown
page read and write
210000
unkown
page readonly
6B24001F0000
trusted library allocation
page read and write
6D61000
heap
page read and write
43A800920000
trusted library allocation
page read and write
F5E11FD000
stack
page read and write
6B24001EC000
trusted library allocation
page read and write
43A8007D0000
trusted library allocation
page read and write
6B2400E01000
trusted library allocation
page read and write
F5EE9FE000
unkown
page readonly
13C0000
heap
page read and write
F5CA9FE000
unkown
page readonly
6D61000
heap
page read and write
211000
unkown
page execute read
6D61000
heap
page read and write
6B24004C8000
trusted library allocation
page read and write
7CD1000
heap
page read and write
43A800878000
trusted library allocation
page read and write
2F4F2383000
trusted library section
page read and write
2F4EDBE0000
heap
page read and write
43A8006C8000
trusted library allocation
page read and write
2F4EB9EF000
heap
page read and write
2F4E7F2B000
heap
page read and write
6D61000
heap
page read and write
43A800960000
trusted library allocation
page read and write
43A8002EE000
trusted library allocation
page read and write
2F4EDBA0000
heap
page read and write
210000
unkown
page readonly
6B24001CC000
trusted library allocation
page read and write
64F400248000
trusted library allocation
page read and write
6D61000
heap
page read and write
136E000
stack
page read and write
2F4E8040000
heap
page read and write
6B2400F5C000
trusted library allocation
page read and write
64F400274000
trusted library allocation
page read and write
2F4F04ED000
trusted library section
page read and write
43A8008E8000
trusted library allocation
page read and write
F5DA9FE000
unkown
page readonly
6B24004C8000
trusted library allocation
page read and write
1CC7000
heap
page read and write
43A80080C000
trusted library allocation
page read and write
64F4002F8000
trusted library allocation
page read and write
43A8002C4000
trusted library allocation
page read and write
43A8008B8000
trusted library allocation
page read and write
50C000
stack
page read and write
6B2400A01000
trusted library allocation
page read and write
6B2400340000
trusted library allocation
page read and write
7DE7000
heap
page read and write
2F4EBA07000
heap
page read and write
6B2400B58000
trusted library allocation
page read and write
6B24002F3000
trusted library allocation
page read and write
6B24002C9000
trusted library allocation
page read and write
2F4EB4EF000
heap
page read and write
7E23000
heap
page read and write
2F4E7F6F000
heap
page read and write
F5DD9FE000
unkown
page readonly
210000
unkown
page readonly
6B2400973000
trusted library allocation
page read and write
64F4002A0000
trusted library allocation
page read and write
F5D29FE000
unkown
page readonly
6D50000
direct allocation
page read and write
F3C000
stack
page read and write
6D61000
heap
page read and write
F5F01FE000
stack
page read and write
7F5C000
heap
page read and write
2F4F2360000
trusted library section
page read and write
6D61000
heap
page read and write
7480000
direct allocation
page execute and read and write
6B24003B0000
trusted library allocation
page read and write
6B240043D000
trusted library allocation
page read and write
6D61000
heap
page read and write
2F4EB501000
heap
page read and write
43A80039C000
trusted library allocation
page read and write
6B2400338000
trusted library allocation
page read and write
64F4002B0000
trusted library allocation
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
6B2400C6C000
trusted library allocation
page read and write
4A0000
heap
page read and write
F5E31FE000
stack
page read and write
2F4E8195000
heap
page read and write
43A800840000
trusted library allocation
page read and write
6B2400214000
trusted library allocation
page read and write
6B2400F7C000
trusted library allocation
page read and write
F7E000
stack
page read and write
43A800918000
trusted library allocation
page read and write
6B240037C000
trusted library allocation
page read and write
6D61000
heap
page read and write
6B240047C000
trusted library allocation
page read and write
6B2400300000
trusted library allocation
page read and write
43A80025C000
trusted library allocation
page read and write
6B24002A8000
trusted library allocation
page read and write
6B2400CB0000
trusted library allocation
page read and write
2F4E8005000
heap
page read and write
43A800404000
trusted library allocation
page read and write
1CB8000
heap
page read and write
43A8006E0000
trusted library allocation
page read and write
64F4002A0000
trusted library allocation
page read and write
9FC000
stack
page read and write
2F4F2300000
trusted library section
page read and write
43A800778000
trusted library allocation
page read and write
6D61000
heap
page read and write
F5C61FE000
stack
page read and write
6B2400C94000
trusted library allocation
page read and write
6B2400EAC000
trusted library allocation
page read and write
43A8008F0000
trusted library allocation
page read and write
2F4EB4D0000
heap
page read and write
43A8002EC000
trusted library allocation
page read and write
F5E61FD000
stack
page read and write
7E03000
heap
page read and write
7480000
direct allocation
page execute and read and write
2F4EB950000
heap
page read and write
6D61000
heap
page read and write
210000
unkown
page readonly
6D61000
heap
page read and write
2F4E8150000
trusted library section
page readonly
2F4EB965000
heap
page read and write
2F4EFC00000
trusted library allocation
page read and write
6B2400358000
trusted library allocation
page read and write
F5C79FE000
unkown
page readonly
6B2400201000
trusted library allocation
page read and write
6B2400480000
trusted library allocation
page read and write
6D61000
heap
page read and write
7480000
direct allocation
page execute and read and write
64F4002BC000
trusted library allocation
page read and write
6B2400228000
trusted library allocation
page read and write
6D61000
heap
page read and write
7E5A000
heap
page read and write
43A80095C000
trusted library allocation
page read and write
2F4EB4F3000
heap
page read and write
6B2400924000
trusted library allocation
page read and write
64F4002E4000
trusted library allocation
page read and write
6B2400E78000
trusted library allocation
page read and write
584800201000
direct allocation
page read and write
6B24006C8000
trusted library allocation
page read and write
71B0000
trusted library allocation
page read and write
6D61000
heap
page read and write
F5D79FE000
unkown
page readonly
43A800788000
trusted library allocation
page read and write
6B24004C8000
trusted library allocation
page read and write
6B240040C000
trusted library allocation
page read and write
11FC000
stack
page read and write
6D61000
heap
page read and write
6B2400648000
trusted library allocation
page read and write
6B2400C78000
trusted library allocation
page read and write
F5CC9FE000
unkown
page readonly
6B2400630000
trusted library allocation
page read and write
6D61000
heap
page read and write
F5DB1FD000
stack
page read and write
6D61000
heap
page read and write
6B2400448000
trusted library allocation
page read and write
2F4EB501000
heap
page read and write
2F4EBA03000
heap
page read and write
6D61000
heap
page read and write
F5E79FE000
unkown
page readonly
1CB8000
heap
page read and write
7D94000
heap
page read and write
43A80091C000
trusted library allocation
page read and write
2F4F2371000
trusted library section
page read and write
6B2400768000
trusted library allocation
page read and write
6B24011D8000
trusted library allocation
page read and write
43A80087C000
trusted library allocation
page read and write
6D61000
heap
page read and write
43A800288000
trusted library allocation
page read and write
EF000
stack
page read and write
6B24002A4000
trusted library allocation
page read and write
6D61000
heap
page read and write
64F4002C0000
trusted library allocation
page read and write
F5DB9FE000
unkown
page readonly
2F4F20B7000
unclassified section
page read and write
6B2400E18000
trusted library allocation
page read and write
6B240102C000
trusted library allocation
page read and write
F5D91FE000
unkown
page readonly
6B240008F000
trusted library allocation
page read and write
6B240080C000
trusted library allocation
page read and write
6D61000
heap
page read and write
2F4F1C60000
trusted library section
page read and write
6D61000
heap
page read and write
2F4E8070000
trusted library allocation
page read and write
64F4002F4000
trusted library allocation
page read and write
1CAA000
heap
page read and write
6B2400218000
trusted library allocation
page read and write
6B2400834000
trusted library allocation
page read and write
F5DE1FC000
stack
page read and write
6B2401124000
trusted library allocation
page read and write
6B2400954000
trusted library allocation
page read and write
F5C89FE000
unkown
page readonly
6B240032C000
trusted library allocation
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
6B2400D70000
trusted library allocation
page read and write
64F4002C0000
trusted library allocation
page read and write
6D61000
heap
page read and write
14F0000
heap
page read and write
6B2400234000
trusted library allocation
page read and write
2F4EB4EA000
heap
page read and write
2F4EB4C0000
heap
page read and write
F5C91FD000
stack
page read and write
43A800894000
trusted library allocation
page read and write
2F4EB4F3000
heap
page read and write
2F4ED9F7000
unclassified section
page read and write
6B24007F8000
trusted library allocation
page read and write
7E37000
heap
page read and write
F5D49FE000
unkown
page readonly
2F4F042E000
trusted library section
page read and write
7CD6000
heap
page read and write
6D61000
heap
page read and write
6B2400E90000
trusted library allocation
page read and write
6B24001F4000
trusted library allocation
page read and write
7480000
direct allocation
page execute and read and write
6B2400848000
trusted library allocation
page read and write
6D61000
heap
page read and write
21E000
unkown
page read and write
6B2400CB8000
trusted library allocation
page read and write
6D61000
heap
page read and write
2F4E9E60000
heap
page read and write
1CC7000
heap
page read and write
6B2400124000
trusted library allocation
page read and write
2F4EBA0D000
heap
page read and write
7E10000
heap
page read and write
6B2400F88000
trusted library allocation
page read and write
6B2400858000
trusted library allocation
page read and write
6B240030C000
trusted library allocation
page read and write
F5CE1FB000
stack
page read and write
F5D81FC000
stack
page read and write
7CD0000
heap
page read and write
6B2400164000
trusted library allocation
page read and write
F5E09FE000
unkown
page readonly
6B24000A0000
trusted library allocation
page read and write
43A800830000
trusted library allocation
page read and write
2F4E9E00000
heap
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
F5E59FE000
unkown
page readonly
6B240089C000
trusted library allocation
page read and write
5EE000
stack
page read and write
2F4F0562000
trusted library section
page read and write
6B24000B4000
trusted library allocation
page read and write
6B2400730000
trusted library allocation
page read and write
850000
heap
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
43A800248000
trusted library allocation
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
6B2400B90000
trusted library allocation
page read and write
2F4E7FFD000
heap
page read and write
6B24005DC000
trusted library allocation
page read and write
6B2400C98000
trusted library allocation
page read and write
58480024C000
direct allocation
page read and write
2F4EB96D000
heap
page read and write
2F4EFE00000
heap
page read and write
7E8B000
heap
page read and write
6D61000
heap
page read and write
2F4EB4F4000
heap
page read and write
64F400288000
trusted library allocation
page read and write
6D61000
heap
page read and write
6B2400D7C000
trusted library allocation
page read and write
6B2400300000
trusted library allocation
page read and write
43A8002F0000
trusted library allocation
page read and write
F5EF9FE000
unkown
page readonly
6D61000
heap
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
6B2400BF8000
trusted library allocation
page read and write
1A00000
heap
page read and write
6B24001B4000
trusted library allocation
page read and write
6D61000
heap
page read and write
43A8007E0000
trusted library allocation
page read and write
6B24002A4000
trusted library allocation
page read and write
6B2400001000
trusted library allocation
page read and write
7480000
direct allocation
page execute and read and write
6D61000
heap
page read and write
6B2400A9C000
trusted library allocation
page read and write
43A80079C000
trusted library allocation
page read and write
43A8008A8000
trusted library allocation
page read and write
6B2401054000
trusted library allocation
page read and write
F5C49FE000
unkown
page readonly
6D61000
heap
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
6C140000
unkown
page readonly
7ECB000
heap
page read and write
6B2400C54000
trusted library allocation
page read and write
6D61000
heap
page read and write
43A800890000
trusted library allocation
page read and write
6D61000
heap
page read and write
2F4EB9FB000
heap
page read and write
6B2400300000
trusted library allocation
page read and write
6B240038C000
trusted library allocation
page read and write
6B240022C000
trusted library allocation
page read and write
6D61000
heap
page read and write
2F4F2350000
trusted library section
page read and write
7480000
direct allocation
page execute and read and write
43A800210000
trusted library allocation
page read and write
2F4EB977000
heap
page read and write
6D61000
heap
page read and write
7CDA000
heap
page read and write
6B240108C000
trusted library allocation
page read and write
6B2400644000
trusted library allocation
page read and write
6D61000
heap
page read and write
43A800601000
trusted library allocation
page read and write
6B24002A4000
trusted library allocation
page read and write
6D61000
heap
page read and write
18D000
stack
page read and write
43A8006AC000
trusted library allocation
page read and write
64F400250000
trusted library allocation
page read and write
7480000
direct allocation
page execute and read and write
7CDE000
heap
page read and write
6D50000
direct allocation
page read and write
6D61000
heap
page read and write
6B2401070000
trusted library allocation
page read and write
6B240074C000
trusted library allocation
page read and write
6B2400A30000
trusted library allocation
page read and write
1CA4000
heap
page read and write
6B2400DF0000
trusted library allocation
page read and write
6D61000
heap
page read and write
6B240021C000
trusted library allocation
page read and write
2F4EB4F3000
heap
page read and write
6B240061C000
trusted library allocation
page read and write
FB0000
heap
page read and write
7CD2000
heap
page read and write
7E0C000
heap
page read and write
F5DC1FE000
stack
page read and write
221000
unkown
page readonly
6B2400174000
trusted library allocation
page read and write
6B2400300000
trusted library allocation
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
F5C41FE000
unkown
page read and write
6D61000
heap
page read and write
6B2400CF0000
trusted library allocation
page read and write
6D61000
heap
page read and write
2F4F2426000
trusted library section
page read and write
6D61000
heap
page read and write
7480000
direct allocation
page execute and read and write
6B240063D000
trusted library allocation
page read and write
F5F19FE000
unkown
page readonly
584800234000
direct allocation
page read and write
2F4F1EBE000
trusted library section
page read and write
43A80082C000
trusted library allocation
page read and write
6B240070C000
trusted library allocation
page read and write
2F4EB961000
heap
page read and write
6B2400318000
trusted library allocation
page read and write
2F4EB4FB000
heap
page read and write
64F4002C0000
trusted library allocation
page read and write
F5CB9FE000
unkown
page readonly
6B24004DC000
trusted library allocation
page read and write
6D61000
heap
page read and write
6B2400F6C000
trusted library allocation
page read and write
803B000
heap
page read and write
6B2401140000
trusted library allocation
page read and write
6B24008FC000
trusted library allocation
page read and write
6D50000
direct allocation
page read and write
6B2400338000
trusted library allocation
page read and write
6B24001F8000
trusted library allocation
page read and write
6D61000
heap
page read and write
6B24002B8000
trusted library allocation
page read and write
6D61000
heap
page read and write
210000
unkown
page readonly
6D61000
heap
page read and write
FA0000
heap
page read and write
6D61000
heap
page read and write
F5DE9FE000
unkown
page readonly
6B2400EDC000
trusted library allocation
page read and write
58480020C000
direct allocation
page read and write
2F4EB97A000
heap
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
6B24010C8000
trusted library allocation
page read and write
F5DD1FC000
stack
page read and write
6D61000
heap
page read and write
43A800904000
trusted library allocation
page read and write
6B24007C4000
trusted library allocation
page read and write
43A800948000
trusted library allocation
page read and write
6B2400340000
trusted library allocation
page read and write
6D61000
heap
page read and write
2F4EFE46000
heap
page read and write
7E16000
heap
page read and write
6B2400A0C000
trusted library allocation
page read and write
7DD7000
heap
page read and write
6B2400FD4000
trusted library allocation
page read and write
6B2400D44000
trusted library allocation
page read and write
1CB8000
heap
page read and write
7E0A000
heap
page read and write
6B2400374000
trusted library allocation
page read and write
6B2400994000
trusted library allocation
page read and write
75C2000
heap
page read and write
6B240000C000
trusted library allocation
page read and write
7F7B000
heap
page read and write
7CDD000
heap
page read and write
7CD0000
heap
page read and write
6D50000
direct allocation
page read and write
64F400230000
trusted library allocation
page read and write
6B2400C01000
trusted library allocation
page read and write
DAC000
stack
page read and write
6B24012B0000
trusted library allocation
page read and write
F5DA1FC000
stack
page read and write
584800230000
direct allocation
page read and write
2F4EB9EB000
heap
page read and write
6D61000
heap
page read and write
6B240064C000
trusted library allocation
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
7CDC000
heap
page read and write
7AD1000
heap
page read and write
6D61000
heap
page read and write
6D61000
heap
page read and write
584800210000
direct allocation
page read and write
43A80039C000
trusted library allocation
page read and write
6D61000
heap
page read and write
2F4EB9DA000
heap
page read and write
6B24000EC000
trusted library allocation
page read and write
1CC4000
heap
page read and write
584800217000
direct allocation
page read and write
7FBD000
heap
page read and write
43A800898000
trusted library allocation
page read and write
6D61000
heap
page read and write
6D50000
direct allocation
page read and write
2F4F0422000
trusted library section
page read and write
1CB4000
heap
page read and write
6B2400CC0000
trusted library allocation
page read and write
6B2400C7C000
trusted library allocation
page read and write
6D61000
heap
page read and write
6B2400708000
trusted library allocation
page read and write
6D61000
heap
page read and write
6B2400544000
trusted library allocation
page read and write
6B2400D89000
trusted library allocation
page read and write
43A8008AC000
trusted library allocation
page read and write
7E2D000
heap
page read and write
6D61000
heap
page read and write
6B24002CB000
trusted library allocation
page read and write
7DC2000
heap
page read and write
43A8006AC000
trusted library allocation
page read and write
6D61000
heap
page read and write
7CD2000
heap
page read and write
6B240101C000
trusted library allocation
page read and write
97C000
stack
page read and write
7DBE000
heap
page read and write
6D61000
heap
page read and write
There are 1252 hidden memdumps, click here to show them.